1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gulaghasi [49]
2 years ago
10

Thomas is preparing to implement a new software package that his project team has selected and purchased. Thomas should _____. G

roup of answer choices help his coworkers identify and make any needed changes to their current processes using a DFD rely on the vendor to execute the implementation of the package without his company's participation keep the new software separate from their existing software and historical data create an RFI to collect information from the software vendor about their product's implementation
Computers and Technology
1 answer:
anyanavicka [17]2 years ago
4 0

There are different kinds of software. Thomas should Unlike create an RFI to collect information from the software vendor about their product's implementation.

  • A software package often belongs to several organization and the team or one going to install it in your machine.

A request for information (RFI) is known to be a standard business procedure. It is often used to collate basic information about the experience and skills of software development companies you'd like to work with.

Learn more from

brainly.com/question/15016176

You might be interested in
An interrupt priority scheme can be used to ____. allow the most urgent work to be finished first make it possible for high-prio
Nana76 [90]

Answer:

All of the above

Explanation:

An interrupt priority scheme is a system which decides the priority at which various work is done and it perform all of the above mention task so therefore all of the above is the right answer.

5 0
3 years ago
Clicking on the sheet tab with the _______ adds another worksheet to an Excel file.
alekssr [168]
Circled plus sign adds another worksheet
7 0
3 years ago
Write a Java statement that declares and creates an array of Strings named Breeds. Your array should be large enough to hold the
Leno4ka [110]

Answer: String[]Breeds = new String[100]

5 0
3 years ago
Part of implementing Ken 7 Windows Limited new enterprise resource planning (ERP) software is ensuring all workstations and serv
spayn [35]

Answer:

Explanation:

1) The Functions a software application provide to keep a web browser secured includes:

a) The web browser should always be updated, you can keep it on "automatic update" option enable on your browser settings so that it will be automatically updated whenever the browser gets an update.

b) Always keep the third party cookies disabled because of the many unauthorized and phishing sites over the internet. This leaves the browser unsafe and cause higher security risk so block all the third party sites and cookies from the browser.

2) The Functions a software application prohibit to keep a web browser secured includes:

a) Do not store passwords on your web browser, deny the "store password" option on your browser settings. This is very important Even if you store passwords on your web browser do set a very strong master password to access all the stored passwords.

b) Don't ever click on unwanted and unknown hyperlinks. There will be many unsolicited attachments, files, etc over the internet please do not open or download it unnecessarily.

3) The functions a software application should provide to keep a web server secured includes:

a) Always using an application scanner. Whenever you install or download any new applications, scan the application before accessing it or opening it.

b) Install all the security patches to keep off hackers as they are many on the internet.

4) The Functions a software application should prohibit to keep a web server secured includes:

1) Uninstall an application that has not been used for long time, because they are actually of no use.

b) There may be scripts, files, setups, codes stored on the web server unknowingly so do check it and delete all the sample scripts, files and codes from the web server.

3 0
3 years ago
All of these (except the ______) go unnoticed by the computer
astra-53 [7]
VIRUS I SERIOUSLY DONT KNOW THOUGH

5 0
3 years ago
Other questions:
  • Drag the tiles to the correct boxes to complete the pairs.
    7·2 answers
  • 2. You have classes to represent different shapes (see below). You realize you can benefit from inheritance and polymorphism by
    13·1 answer
  • How does classless inter-domain routing (cidr) help reduce waste of ip addresses?
    8·1 answer
  • Which of these expressions evaluates to 4.0?
    12·2 answers
  • Name similarities between innovation and invention
    6·1 answer
  • A person appreciation of a food taste and flavor is commonly referred to as what
    14·1 answer
  • The picture that graphically represents the items you use in Windows is called a/an <br> ___?
    14·1 answer
  • Individual internet users connect to isps through a(n ________.
    11·1 answer
  • What is the best wi-fi name you have ever seen?
    10·1 answer
  • What is the accurate description
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!