1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
seraphim [82]
2 years ago
7

You are part of the team assigned to implement new software at XYZ Inc. The employees at XYZ Inc. trust the results obtained fro

m the old software, but are cautious about accepting those from the proposed new software. What software implementation strategy would you recommend in this situation to allow users fall-back access to the old system as the new one is implemented
Computers and Technology
1 answer:
Ad libitum [116K]2 years ago
7 0

There are different kinds of software implementation strategy. The software implementation strategy would you recommend in this situation to allow users fall-back access to the old system as the new one is implemented is parallel start up.

  • Parallel running often called parallel start up strategy for system changeover where a new system slowly takes over the roles of the older system even when both systems operate.

This conversion often occur when the technology of the old system is outdated and as such a new system is needed to be installed to replace the old one.

The parallel running phase is the act of changing a fragment of business information technology operation to a new system.

Learn more about Parallel start up from

brainly.com/question/9343211

You might be interested in
Which domain refers to the equipment and data an organization uses to support its IT infrastructure. It includes hardware, opera
vovikov84 [41]

Answer:

D. System/Application Domain

Explanation:

A system or application domain is used by an organization to supports its IT infrastructure, holding all the business critical mission system, applications and data. All the resources of the company are contained in this domain, and is accessible by a member.

LAN to WAN domain links the company's infrastructure or local area network to a wide area network or the internet. The WAN domain simply holds publicly the data of an organisation, while remote access domain is meant for a small group of workers in the office or working from home.

8 0
4 years ago
Help Asap! Marking brainliest!✨
gulaghasi [49]

Answer:

The answer would be After the slide you are viewing.

I hope this helped!

8 0
3 years ago
Read 2 more answers
The ___________ method returns the length of an array.
MaRussiya [10]

Answer:

A. Append

Explanation:

4 0
3 years ago
Read 2 more answers
The New option is found in the ...............tab.​
morpeh [17]

in your notes books and in your vopy

3 0
3 years ago
Read 2 more answers
In symmetric encryption the same key is used to encrypt and decrypt a message. in asymmetric encryption different keys are used
Brrunno [24]

A useful advantage of Asymmetric encryption over symmetric encryption is that there is no secret channel necessary for the exchange of the public key, unlike in the symmetric encryption which requires a secret channel to send the secret key.  

Another advantage of Asymmetric encryption is that is has increased security. Asymmetric uses two different keys (Public and private) for both encryption and decryption of data while symmetric uses one.

5 0
3 years ago
Read 2 more answers
Other questions:
  • the part of the computer that contains the brain , or central processing unit , is also known the what ?
    12·1 answer
  • You are given two int variables j and k, an int array zipcodeList that has been declared and initialized, an int variable nZips
    10·2 answers
  • Please describe in a few sentences
    14·1 answer
  • From the Software Engineering Code of Ethics, which clauses relate to intellectual property (check all that apply)
    15·1 answer
  • A(n) ____ local area network is a network in which devices use high-frequency radio waves to communicate with a base station, wh
    11·1 answer
  • Which of the following is NOT areserved word in Java?intpublicstaticnum
    9·1 answer
  • Instructions
    8·1 answer
  • Bonjour ma question est: expliquer comment fonctionne une calculatrice qui ne contient pas une pile. Pouvez-vous m'aider?
    12·1 answer
  • Modern life is not possible if computer stops working? Give your opinion<br>​
    7·1 answer
  • There is overlap in the subjects of study in the different information technology disciplines. true or false
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!