1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olga2289 [7]
3 years ago
10

You are going to interview a small business owner about creating a database for his sandwich shop and bakery. Make a list of que

stions for this initial interview. Remember at this point you just want the big picture and major requirements. Don't get too deep into the details.
Computers and Technology
1 answer:
sveticcg [70]3 years ago
7 0

Answer:

  1. what is your background? education  and work experience?
  2. Tell about description of your business.
  3. How society will be benefited by our business?
  4. What skills are necessary to run this business?
  5. Do you know who are your competitors?
  6. How will you launch your business in market ? How will you make people aware of your business?
  7. Where do you see your business in upcoming years?
  8. What will you do with the profits?
  9. What if u face all loss in this business any other option?
  10. Do you have employees for this business?

You might be interested in
Stages of reverse engineering
ivann1987 [24]

Answer:

Capture Data, Refine the Model, and then Manufacture it.

Explanation:

5 0
3 years ago
If you get your foot stuck in a cloud how many colors can you smell with you ears
suter [353]

Answer: 42 is the answer to everything and just remember, Don,t panic.

For i am the hitch hikers guide to the galaxy.

 

Explanation:

7 0
3 years ago
What type of system security malware allows for access to a computer, program, or service without authorization?
olasank [31]

Answer:

"backdoor" is the correct answer for the above question

Explanation:

  • The backdoor is a type of attack which is done by the type of backdoor programs to remotely access the computers without the authorization of the user of the computer.
  • It is inserted on the computer with the help of the internet and accessed the computer without using authorization techniques.
  • The above question asked about the virus which is used to access the computer without the permission of the right use of the system. Hence the answer is backdoor which is defined above.
7 0
4 years ago
Utilitarianism does not mean "the greatest good of the greatest number" because a) it is impossible to calculate "the greatest g
pantera1 [17]

Answer:

The correct option is B: It focuses solely on "the greatest good" and pays no attention to how "the good" is distributed.

Explanation:

The theory of Utilitarianism promotes actions that enhances pleasure and the greatest good and opposes actions that can result to harm or unhappiness. However, this theory does not imply the greatest good for the greatest number of people and has been criticized for it. Critics state that Utilitarianism only focuses on the greatest good, but it shows no concern for the distribution of the good.

8 0
4 years ago
Read 2 more answers
In this laboratory, we are going to maintain a username-password system by storing the usernames and passwords in a file. The fi
Dominik [7]

Answer:

Explanation:

ok i will do it for ya

5 0
3 years ago
Other questions:
  • What are some of the challenges that could arise from setting up a file management system on a computer?
    8·1 answer
  • Whats the agenda for annual general meeting ??
    10·1 answer
  • If a secret key is to be used as a _________ for conventional encryption a single number must be generated.
    13·1 answer
  • Cliff just started working with a client who has a very disorganized AdWords account. What’s an effective way for him to begin r
    15·1 answer
  • What shoul i get, Airpods or a ps4 cooling fan ???
    7·2 answers
  • Select the correct answer.
    8·1 answer
  • What is presentation software in bussiness used for
    9·1 answer
  • Use NAND operator to write; P or Q, and P -Q make an everyday implication sentence using only NAND
    14·1 answer
  • In python, sorry if it’s blurry
    13·2 answers
  • ______ creates a unique and fixed-length signature for a set of data. It involves converting a numerical input into another comp
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!