1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
seraphim [82]
2 years ago
7

You are part of the team assigned to implement new software at XYZ Inc. The employees at XYZ Inc. trust the results obtained fro

m the old software, but are cautious about accepting those from the proposed new software. What software implementation strategy would you recommend in this situation to allow users fall-back access to the old system as the new one is implemented
Computers and Technology
1 answer:
Ad libitum [116K]2 years ago
7 0

There are different kinds of software implementation strategy. The software implementation strategy would you recommend in this situation to allow users fall-back access to the old system as the new one is implemented is parallel start up.

  • Parallel running often called parallel start up strategy for system changeover where a new system slowly takes over the roles of the older system even when both systems operate.

This conversion often occur when the technology of the old system is outdated and as such a new system is needed to be installed to replace the old one.

The parallel running phase is the act of changing a fragment of business information technology operation to a new system.

Learn more about Parallel start up from

brainly.com/question/9343211

You might be interested in
URGENT!! Which graphic design tools help you draw circles and rectangles?
laila [671]

B. Geometric shape tools

This is because circles and rectangles are geometric shapes.

6 0
3 years ago
Read 2 more answers
The creation of​ __________ with digital media allows for large quantities of numerical or textual data to be searched online by
ANEK [815]

Answer:

Option A- Reference materials

Explanation:

Reference Materials A digital reference library that provides more than 600 high-quality reference books from the world's leading publishers to be searched online by data points and trends

3 0
3 years ago
Read 2 more answers
Which of these are correctly formatted python dictionaries? Check all that apply.
Pachacha [2.7K]

Answer:

A and D sorry if i get it wrong.

Explanation:

8 0
3 years ago
Read 2 more answers
The default paper size is _____. <br> a. letter <br> b. legal <br> c. executive <br> d. statement
jok3333 [9.3K]
I believe the correct answer would be letter. The default size of paper for documents would be letter. It has dimensions of 8.5 inches x 11 inches. You can see this clearly when you open a blank word file. However, you can freely change this.
6 0
3 years ago
Describe the concepts of Defense in Depth and Detection in Depth. Compare and contrast. What's different? What's similar?
olchik [2.2K]

Answer:

 The main concept of the defense in depth is that the various defensive mechanism series are used for protecting the data and the information in the system. This approach is basically used multiple layers to control the cyber security. It also mainly provide the redundancy for controlling the security failure in the system.

The detection in depth basically provide the redundant overlapping approach and it is used for detecting the security and also accomplish the response that are available in the security detection.  

5 0
4 years ago
Other questions:
  • Edmund wants to visit his university's website. Which software application would he use?
    14·1 answer
  • Extending the web server functionality implies that the web server and the web-to-database middleware will properly communicate
    10·1 answer
  • A user who has special security and access to a system, such as the right to assign passwords, is called a ____.​ a. ​ technical
    8·1 answer
  • What is one purpose of an essay’s conclusion paragraph?
    13·1 answer
  • What 2 important components are found on a motherboard? (2 points each)
    13·1 answer
  • The goal of a system is to
    10·1 answer
  • What 3 types of data can be entered in a spreadsheet
    14·1 answer
  • Which approach to bandwidth usage consumes all of the available frequencies on a medium to transmit data
    7·1 answer
  • The current annual interest rate is 5 percent, and you are taking out a 20-year loan with a monthly end-of-month payment. If you
    5·1 answer
  • if a manager identifies numerous data integrity issues, she/he should consider the reports generated from that data as invalid a
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!