1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kobusy [5.1K]
3 years ago
15

During the Requirements Definition stage of a systems development​ project, the employees who will be the primary users of the n

ew system are not asked about their needs. The IS department is violating which of its​ responsibilities?
Computers and Technology
1 answer:
Lisa [10]3 years ago
8 0

Answer:

enabling users to contribute to requirements for new system features and functions

Explanation:

Based on the scenario being described within the question it can be said that the main responsibility that is being violated is enabling users to contribute to requirements for new system features and functions. They are responsible for gathering user feedback, in order to get a sense of what the user's like and dislike regarding a system in order to later make the necessary changes needed to the system.

You might be interested in
The second stage of digestion takes place in the small intestine. <br> True Or False?
DedPeter [7]
False. The second stage of digestion happens in the stomach.
8 0
3 years ago
How does a router handle a packet destined for a network that is not listed in the routing table?
kogti [31]
The packet is dropped or discarded. By default, a router will send packets to a network that has been listed in the routing table. If it happens that the network is not listed, the packet will be discarded or dropped. Packets that do not have a default route or gateway of last resort are dropped.

 






5 0
3 years ago
Question #5
Anestetic [448]

Answer:

d;  attribute

Explanation:

8 0
3 years ago
Read 2 more answers
The responsibilities of the IT department and the needs of the user departments may cause conflicts over A. the color of the use
monitta

I'd say B: the amount and type of security placed on an application.

This is a common problem that exists between IT and other user departments. The IT department is well known for closing up certain sites and applications needed by other departments all in the name of security. As a result, it might slow down operations within different department and may cause inefficiency.

4 0
3 years ago
Please help me 30pts to someone who has done this correctly and to where I can understand it.
RUDIKE [14]
Marie could use a word processor for her documents of school writings to store important writing , help with test , and it would benefit her by knowing the important points of her documents . Could also benefit her by correcting mistakes , saving work to come back to , spelling and grammar checks , good formatting usage . hope this helps
6 0
3 years ago
Other questions:
  • Which two computer peripherals are connected to the computer through a port?
    9·1 answer
  • At the aquarium Grandma Simpson hugged the dolphin is that passive or active sentence​?
    6·1 answer
  • Whats the wire that connects to the wifi box
    15·2 answers
  • An aircraft departs an airport in the mountain standard time zone at 1615 MST for a 2-hour 15-minute flight to an airport locate
    14·1 answer
  • The advancements in which of the following technologies has most changed the American job market in recent years?
    14·2 answers
  • What kind of skill is persuasion?
    7·1 answer
  • 17. What are the basic modes of operation of 8255?Write the features of mode 0 in 8255?
    8·1 answer
  • Select all the correct answers.
    13·2 answers
  • Which insert image option allows a user to compile, modify, and add captions to images?
    5·2 answers
  • CALLING ALL COMPUTER SCIENCE LOVERS!!!!!!!
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!