highlight the possible risks and problems that should be address during the implementation of information system process

Answers

Answer 1

Answer:

The answer is below

Explanation:

The possible risks and problems that should be addressed during the implementation of the information system process are:

1. power loss or data corruption

2. System design faults

3. Cultural barriers

4. Integration of Software Development device

5. Using the same processes in the company

6. Security breaches

7. Hardware and Software failure

8. Work environment


Related Questions

Francesca wants to create a program that will produce the phrase “Hello, world” on the screen. Which of these functions should Francesca use?

Answers

Answer:

It would be print.

Explanation:

If you want to execute a function it should be print so it will show up in the output box.

Chlorine has two naturally occurring isotopes that are 35cland 37cl, the accurate masses and abundance are 34.96 and 75.6%and 36.97 and 24.4% respectively calculate the relative atomic mass of cl.

Answers

[tex] \implies \huge \tt \underline \red{answer}[/tex]

Hlo

Ram cannot be written again and again true or false​

Answers

Answer:

The answer is: False


b. An advantage of a WAN is that everyone on the network can access the same
data and​

Answers

Ns provide dedicated traffic for your organization, and they are much more secure than the internet itself. Additionally, sending your information across the internet means that you have to share bandwidth with millions of other businesses rather than having your own dedicated bandwidth by using WAN

Which occurs when private details of a class are hidden from other classes or parts of the program that uses instances of the class?
inheritance

polymorphism

encapsulation

operation overloading

Answers

Answer:

Encapsulation

Explanation: got it right

Answer:

Encapsulation

Explanation:

I took the quiz.

An application programming interface (API) is ________. (1 point) the code the application software uses to take advantage of code written by others the currently active part of an application the code to interface between an application and a peripheral like a printer the code to interface between an application and RAM

Answers

Answer:

an interface

Explanation:

(API) is an interface that defines interactions between multiple software applications or mixed hardware-software intermediaries.

Treston, an automobile manufacturer, has recently implemented a new database system. It is confident that this system will help enhance the company's internal (employees) and external (customers and channel partners) communication. Treston is planning to pursue a just-in-time inventory system soon after the database system is implemented. After the implementation of the database system, however, Treston realized that the database system was not effective. Which of the following, if true, can be cited as a reason for the failure of Treston's database system?
A. Microsoft launched a new version of Enterprise Microsoft Access which is better than Treston's database system.
B. The maintenance cost of Treston's new database system was less than the one it was previously using.
C. Treston's new database system was not supported by the database system of its suppliers and distributors.
D. Treston's competitors implemented its database a few days prior to Treston's implementation date.
E. Treston had internally trained personnel managing its new database system, keeping costs low.

By combining human intelligence and reasoning capabilities with technology's retrieval and analysis capabilities, visual analytics can help in decision making.
A. True
B. False

In a distributed online environment, performing real-time analytical processing enhances the performance of transaction processing.
A. True
B. False

________ are produced at predefined intervals to support routine decisions.
A. Ad hoc queries
B. Exception reports
C. Drill-down reports
D. Scheduled reports
E. Key-indicator reports

________ help analyze why a key indicator is not at an appropriate level or why an exception occurred.
A. Ad hoc queries
B. Exception reports
C. Drill-down reports
D. Scheduled reports
E. Key-indicator reports

Answers

Answer:

C. The New database system of Treston was not supported by the database system of its suppliers and distributors.

TRUE

False

Scheduled reports

Drill down reports

Explanation:

The just-in-time is popularly known as the JIT. The JIT inventory system is defined as a management strategy in which the company gets goods and products as close as when they are actually needed. Some goods are received 'just in time' at the processing or at the manufacturing time of the final product.

In the context, the data base system failed for Treston company as the new data base system did not support the database system for the suppliers as well as the distributors of the car manufacturing company, Treston.

It is true that by combining the intelligence of human and the reasoning capabilities with that of retrieval and the analysis of the technology, the visual analytics can help in the process of decision making.

In the distributed environment done online, performing the real-time analytical processes does not enhances the performance of the transaction processing. So the answer is false.

A scheduled report is a report that is sent out or delivered at a specified time by an email provider. They are produced to support the routine decisions at predefined intervals.

A Drill down reports helps to see the data for a more detailed and a comprehensive view. It helps to analyze that a key indicator is not the appropriate level.

             

What is the difference between manual and computer typesetting?

Answers

Answer:

Manual typesetting: The form was placed in a press, inked, and an impression made on paper. During typesetting, individual sorts are picked from a type case with the right hand, and set into a composing stick held in the left hand from left to right, and as viewed by the setter upside down.

Computer typesetting: Computerized typesetting, method of typesetting in which characters are generated by computer and transferred to light-sensitive paper or film by means of either pulses from a laser beam or moving rays of light from a stroboscopic source or a cathode-ray tube (CRT).

What does Spam mean in tech

Answers

Answer:

Spam is digital junk mail. They are unsolicited communications sent in bulk over the internet or through any electronic messaging system. For example, when you text someone "hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi" they will tell you "stop spamming!"

Answer:

Spam means Digit Junk Mail in tech context.

Explanation:

Spam is digital junk mail: unsolicited communications sent in bulk over the internet or through any electronic messaging system. It is unsolicited bulk messages, spamming is the act of sending these messages, and a person who engages the practice is a spammer. Most of the time, spamming is commercial in nature, and though the spam is bothersome, it isn’t necessarily malicious or fraudulent (though it can be).

Where do animators work?
How do companies use web sites?
What is an operating system?
What is a database?
What is an app?

Answers

1. Most animators work in big cities where movie and television studios, animation studios, software developers, and video game design firms are located.
2. I’m confused about this one.
3. An operating system (OS) is system software that manages computer hardware, software resources, and provides common services for computer programs. ... The dominant general-purpose desktop operating system is Microsoft Windows with a market share of around 76.45%.
4. A database is an organized collection of data, generally stored and accessed electronically from a computer system.
5. An app, which is short for "application," is a type of software that can be installed and run on a computer, tablet, smartphone or other electronic devices. An app most frequently refers to a mobile application or a piece of software that is installed and used on a computer.

PLS HELP SOON

Output: Your goal
You will write a program that asks a user to fill in a story. Store each response in a variable, then print the story based on the responses.

Part 1: Plan and Write the Pseudocode
Use the following guidelines to write your pseudocode for a fill-in story program.

Decide on a list of items the program will ask the user to input.
Your program should include at least four interactive prompts.
Input from the user should be assigned to variables and used in the story.
Use concatenation to join strings together in the story.
Print the story for the user to read.


Write your pseudocode here:











Part 2: Code the Program
Use the following guidelines to code your program.

Use the Python IDLE to write your program.
Using comments, type a heading that includes your name, today’s date, and a short description.
Set up your def main(): statement. (Don’t forget the parentheses and colon.)
Conclude the program with the main() statement.
Include at least two print statements and two variables.
Include at least four input prompts.
Use concatenation to join strings.
Follow the Python style conventions regarding indentation in your program.
Run your program to ensure it is working properly. Fix any errors you may observe.
Example of expected output: The output below is an example of a “Favorite Animal” message. Your specific results will vary depending on the choices you make about your message.

Output

The kangaroo is the cutest of all. It has 5 toes and a beautiful heart. It loves to eat chips and salsa, although it will eat pretty much anything. It lives in New York, and you must be super sweet to it, or you may end up as its meal!


When you've completed writing your program code, save your work by selecting 'Save' in the Python IDLE. When you submit your assignment, you will attach this Python file separately.

Part 3: Post Mortem Review (PMR)
Using complete sentences, respond to all the questions in the PMR chart.

Review Question Response
What was the purpose of your program?
How could your program be useful in the real world?
What is a problem you ran into, and how did you fix it?
Describe one thing you would do differently the next time you write a program.

Answers

Answer:

Explanation:

I will answer Part 1 and you can go on from there.

Decide on a list of items the program will ask the user to input.

Your program should include at least four interactive prompts.

Input from the user should be assigned to variables and used in the story.

"What is your favorite animal?"

Variable: animal

"What word best describes your favorite animal?"

Variable: description

"What does your favorite animal like to eat?"

Variable: food

"Where do your favorite animal live?"

Variable: location

In a school 50% of the students are younger than 10, 1/20 are 10 years old and 1/10 are older than 10 but younger than 12, the remaining 70 students are 12 or older. How many students are 10?

Answers

Answer: 10 students

Explanation:

Students younger than 10 = 50%

Students that are 10years old = 1/20 = 1/20 × 100 = 5%

Students that are older than 10 but younger than 12 = 1/10= 1/10 × 100 = 10%

Students that are 12 years or older

= 100% - (50% + 5% + 10%)

= 100% - 65%

= 35%

This means that 35% of the students are 12 years or older and we've been given the number as 70.

Let's say the total number of students is x. Therefore,

35% of x = 70

0.35 × x = 70

0.35x = 70

x = 70/0.35

x = 200

The total number of students is 200.

Therefore, the number of students that are 10years will be:

= 1/20 × 200

= 10 students

Therefore, 10 students are 10 years.

Olivia works at a company that creates mobile phones. She wanted to estimate the mean amount of time their new phone's battery lasts with regular use after a full charge. She took a random sample of
6
66 of these phones and randomly assigned each of them to a volunteer. She instructed them to fully charge the phones and use them as they regularly would until the battery died (without recharging the phone). Here are the data they reported:
Phone
1
11
2
22
3
33
4
44
5
55
6
66
Battery life (hours)
8.0
8.08, point, 0
6.0
6.06, point, 0
10.5
10.510, point, 5
9.0
9.09, point, 0
8.5
8.58, point, 5
12
1212
Mean
x
ˉ
=
9
x
ˉ
=9x, with, \bar, on top, equals, 9 hours
Standard deviation
s
x
=
2.07
s
x

=2.07s, start subscript, x, end subscript, equals, 2, point, 07 hours
Assume that all conditions for inference are met.
Which of the following is a
90
%
90%90, percent confidence interval for the mean battery life (in hours)?
Choose 1 answer:
Choose 1 answer:

(Choice A)
A
9
±
1.4
9±1.49, plus minus, 1, point, 4

(Choice B)
B
9
±
1.7
9±1.79, plus minus, 1, point, 7

(Choice C)
C
9
±
2.0
9±2.09, plus minus, 2, point, 0

(Choice D)
D
9
±
2.07
9±2.079, plus minus, 2, point, 07

Answers

An swer:  

                               

 E. xpl an ation:    

                               

(25 POINTS)Which statement best reflects the importance of following safety guidelines?

Workplace injuries can result in losses to an organization’s profits.

OSHA responds to complaints of unsafe work environments, and can fine or take negligent employers to court.

Every year, thousands of people die as a result of workplace injuries.

Using equipment safely is faster and makes work more efficient.

Answers

Answer:

I think, Every year, thousands of people die as a result of workplace injuries.

Answer:

B

Explanation:

Need answer ASAP!!!!

Answers

Hi,

I tried answering this. Lol. Look at the image.

which processor is compatible with an AM2+ socket

Answers

Answer:

Amd phenom x4 9950 black edition

Explanation:

Look at the following partial class definition, and then respond to the questions that follow it:


public class Book


{


private String title;


private String author;


private String publisher;


private int copiesSold;


}


a. Write a constructor for this class. The constructor should accept an argument for each of the fields.


b. Write accessor and mutator methods for each field.


c. Draw a UML diagram for the class, including the methods you have written.

Answers

Solution :

a.

public Book([tex]$\text{String title}$[/tex], String author, [tex]$\text{String publisher}$[/tex], int [tex]$\text{copiesSold}$[/tex]) {

 this.[tex]$\text{title}$[/tex] = [tex]$\text{title}$[/tex];

 this.[tex]$\text{author}$[/tex] = [tex]$\text{author}$[/tex];

 this.[tex]$\text{publisher}$[/tex] = [tex]$\text{publisher}$[/tex];

 this.[tex]$\text{copiesSold}$[/tex] = [tex]$\text{copiesSold}$[/tex];

b). [tex]$\text{public String}$[/tex] getTitle() {

 return [tex]$\text{title}$[/tex];

}

[tex]$\text{public void}$[/tex] setTitle([tex]$\text{String title}$[/tex]) {

 this.[tex]$\text{title}$[/tex] = [tex]$\text{title}$[/tex];

}

[tex]$\text{public String}$[/tex] getAuthor() {

 return author;

}

[tex]$\text{public void}$[/tex] setAuthor(String author) {

 this.[tex]$\text{author}$[/tex] = [tex]$\text{author}$[/tex];

}

[tex]$\text{public String}$[/tex] getPublisher() {

 return [tex]$\text{publisher}$[/tex];

}

[tex]$\text{public void}$[/tex] setPublisher(String [tex]$\text{publisher}$[/tex]) {

 this.[tex]$\text{publisher}$[/tex] =[tex]$\text{publisher}$[/tex];

}

public int get[tex]$\text{copiesSold}$[/tex]() {

 return [tex]$\text{copiesSold}$[/tex];

}

[tex]$\text{public void}$[/tex] set[tex]$\text{copiesSold}$[/tex](int [tex]$\text{copiesSold}$[/tex]) {

 this.[tex]$\text{copiesSold}$[/tex] = [tex]$\text{copiesSold}$[/tex];

}

Pascal system . write the program that will calculate the perimeter of a rectangle if its area is A (m²) and one of its sides has a length of B (m). A and B are entered from the keyboard.​

Answers

Answer:

The program in Pascal is as follows:

Program Perimeter;

Uses Crt;

Var

 Length : Real;

 Width : Real;

 Area    : Real;

 Perim : Real;

Begin

 Clrscr;

 Write('Area: ');

 Readln(Area);

 Write('Length : ');

 Readln(Length);

 Width := Area/Length;

 Perim := 2 * (Length + Width);

 Write('Perimeter: ' ,Perim:5:2,'.');

End.

Explanation:

This declares all variables as real

Var

 Length : Real;

 Width : Real;

 Area    : Real;

 Perim : Real;

The program execution begins here

Begin

This clears the screen

 Clrscr;

This prompts the user for Area

 Write('Area: ');

This gets input for Area

 Readln(Area);

This prompts the user for Length

 Write('Length : ');

This gets input for Length

 Readln(Length);

This calculates the width

 Width := Area/Length;

This calculates the perimeter

 Perim := 2 * (Length + Width);

This prints the calculated perimeter

 Write('Perimeter: ' ,Perim:5:2,'.');

This ends the program

End.

fill in the blanks with correct pronounce
i like watches.The nice watch is for ________​

Answers

Answer:

I like watches. This nice watch is for me.

(25 POINTS) Some applications work on all devices while others work on some devices. True or False?

Answers

Answer:

True.

Explanation:

It is true that some applications work on some devices but not on others. This is so because it depends on the operating system of each device, that is, if the device has an operating system compatible with the application in question, said application will work, but if, on the contrary, the operating system is not compatible, the application will not be useful in this.

I need the answer ASAP!!!! I’ll mark brainliest if correct

Select the correct answer.
What model defines data structures and expands software architecture and components?
O A.
architectural design model
OB.
data design model
O C.
interface design model
OD.
component-level design model

Answers

Answer:

Option D

Explanation:

option d component level design model is the correct answer

product of -6/13 and reciprocal of -7/16 is ____________​

Answers

Answer:

-250/91

Explanation:

Use a calculator

Help! ASAP! 1 Question.........°○°​

Answers

Answer: I think D)?

Explanation: Or B)

what is a cell address in xsl sheet

Answers

Answer:

cell address is the exact location of a particular cell of ms-excle

Explanation:

A1 refers to first row and first column.

A2 refers to second row first column.

i.e.

in 'A1' : 'A' indicate column { A= first column, B= second

column, C= third column. and soon.....}

'1' indicate row { 1 = first row, 2 = second row, 3= third row..... soon .......}

A network utilizes a network access control (NAC) solution to protect against malware. When a wired or wireless host tries to connect to the network, a NAC agent on the host checks it to make sure it has all of the latest operating system updates installed and that the latest antivirus definitions have been applied. What is this process called

Answers

Answer: Posture assessment

Explanation:

Posture assessment, also refers to posture validation and it is when somw set of rules are applied to the posture data which then gives an assessment of the trust level which can be placed in th e endpoint.

Posture assessment has to do with how the system security is evaluated based on the applications and the settings.

Write short notes on slide show view. (In easy way)​

Answers

Answer:

Slide Show View takes up the full computer screen, like an actual slide show presentation. In this full-screen view, the presentation is shown the way it will be seen by the audience. Graphics, timings, movies, animated elements, and transition effects are shown how they will look in the actual show.

Hey guys.....Help pls 1 small question! I need it ASAP!!!!!!!!​

Answers

Answer:

I'm pretty Sure that is a yes.

Explanation:

It would make sense because even though it is a hyperlink the location is still different than the Original.

Hope this Helps!

Select all the correct answers.

John travels all over the country visiting various clients. He needs to access his documents and services on the go. Which of these technologies
allows him to access documents and software while on the move?

A:cloud computing
B: grid computing
C:mobile computing
D:green computing
E:virtualization

Answers

Answer:

acd

Explanation:

i cant explain

Answer:

A

C

D

Explanation:

Plato

You are designing an ecommerce web application that will scale to hundreds of thousands of concurrent users. Which database technology is best suited to hold the session state in this example

Answers

Answer: Amazon DynamoDB

Explanation:

The database technology that is best suited to hold the session state in this example is the Amazon DynamoDB.

Amazon DynamoDB is a document database which helps in delivering high quality and fast cperformance at any scale. It can be used to scale to hundreds of thousands of concurrent users as it's multi-active, and has a durable database that has built-in security.

If you are worried that team members will not keep sensitive information private, you could ask them to sign a ________ agreement.
A. Non-confidentiality
B. Security
C. Non-disclosure

Answers

Answer:

C

Explanation:

It has legal reproduction if you break it, many nannys that work for a famous person/people have to sign a non-disclosure before they're hired.

Other Questions
9. Cellular respiration occurs in what types of cells? ap human geography I NEED HELP PLEASEEEEE Find the mean for the following set of data. Write the NUMBER ONLY for the answer.25, 27, 30, 15, 18, 24, 15 What decision is Wiesel faced with while he is in the hospital? What is Elies choice and why does he choose this option? the book noght Activity 7 Connecting ConceptsReview topics: Homeostasis, Acids and Bases, the Cell Membrane, and Functions of the Integumentary System in Unit 1 Learning Content to respond to the following 1-2 well-composed paragraphs written in your own words. If any outside sources are used to inspire and support your response, please properly cite and reference them in APA format.At the beginning of this unit we discussed the idea that our systems function on many levels organs, tissues, cells, and chemicals working together to fulfill their purpose. When everything works correctly, we are in a state of homeostasis. In this task, youll share your understanding of homeostasis and provide examples of how the body works to maintain homeostasis.Part One: Briefly compare and contrast negative and positive feedback in your own words make sure you discuss both similarities and differences.Part Two: Chemical Homeostasis: Define what a buffer is and briefly describe how it interacts with chemical substances to maintain the balance of pH needed by the body to function. Cellular Homeostasis: Saline is an isotonic solution; however, if a patient was accidentally hydrated with sterile water instead of saline:o Describe the tonicity/osmolarity of the water and the relative tonicity/osmolarity of the patients red blood cells.o What will happen to the patients red blood cells over time as they attempt to reach equilibrium? Are the cells maintaining homeostasis as they undergo this process justify your answer. Tissue/Organ Homeostasis: o Describe 2 roles of the skin in homeostasis making sure to include how a specific organ, tissue, cell, or chemical related to the skin helps the body maintain the proper conditions to function. Type your paragraph(s) here:Click or tap here to enter text. Activity 7 Connecting ConceptsReview topics: Homeostasis, Acids and Bases, the Cell Membrane, and Functions of the Integumentary System in Unit 1 Learning Content to respond to the following 1-2 well-composed paragraphs written in your own words. If any outside sources are used to inspire and support your response, please properly cite and reference them in APA format.At the beginning of this unit we discussed the idea that our systems function on many levels organs, tissues, cells, and chemicals working together to fulfill their purpose. When everything works correctly, we are in a state of homeostasis. In this task, youll share your understanding of homeostasis and provide examples of how the body works to maintain homeostasis.Part One: Briefly compare and contrast negative and positive feedback in your own words make sure you discuss both similarities and differences.Part Two: Chemical Homeostasis: Define what a buffer is and briefly describe how it interacts with chemical substances to maintain the balance of pH needed by the body to function. Cellular Homeostasis: Saline is an isotonic solution; however, if a patient was accidentally hydrated with sterile water instead of saline:o Describe the tonicity/osmolarity of the water and the relative tonicity/osmolarity of the patients red blood cells.o What will happen to the patients red blood cells over time as they attempt to reach equilibrium? Are the cells maintaining homeostasis as they undergo this process justify your answer. Tissue/Organ Homeostasis: o Describe 2 roles of the skin in homeostasis making sure to include how a specific organ, tissue, cell, or chemical related to the skin helps the body maintain the proper conditions to function. Type your paragraph(s) here:Click or tap here to enter text. Fill in the dialogue with the correct word from the bank.estsbientalgustotestgraciasSeorapresentocmoCarlos: Hola, Sara. QuL?Sara: Muy bien, gracias, y?Carlos: No muyHoy es lunes.Sara: Carlos, tea mi maestra de espaol, laPierce.Sra. Pierce: MuchoCarlos. ests?Carlos: Estoy terrible. Y usted? Cmohoy?Sra. Pierce: Regular. Cmot, Sara?Sara: Estoy muy bien, By beginning and ending "For the Union Dead" with images of breaking bubbles, Robert Lowell wants the reader torecognizethat Colonel Shaw should never have been given a monument and he would like to break itthat the aquarium should be rebuilt in the place where the monument to Colonel Shaw is standingthat the monument of Colonel Shaw is no more meaningful than the torn down aquariumthat the monument of Colonel Shaw, like the aquarium, will one day likely be destroyed and forgotten Drageachtle to the correct locationIdentity the viewpoints of the Republican Party and the Democratic Party on the subject of increasing taxes.Higher taxes enablethe government todo more for society,such as fund welfareprogramsHigher taxes make itharder for companieslo grow and makeprofits, which hasa negative impacton the economyRepublican PartyDemocratic Party Alice invests $5,000 at age 28 from the signing bonus of her new job. She hopes the investments will be worth $20,000 when she turns 40. If the interest compounds continuously, approximately what rate of growth will she need to achieve her goal? identify two conjugate base for each compound HCN and HBr whenever i have anxiety i cant eat, why is that? Malcom is filling bags with rice. He starts with 5 1/4 lbs. container of rice and fills each bag with 5/8 pound of rice. How many bags can Malcom fill? French sentences. Worksheet below (do not have to download file or open link): (Will gift Thanks, 5 stars, and Brainliest): Marulla's z score on a college entrance exam is 1.3. If the raw scores have a mean of 480 and a standard deviation of 70 points, what is her raw score? A computer can perform 4.66 x 10 exponent 8 calculations per second. How many calculations can this computer perform in one minute Solve For Qq/10=4Please Answer This For Me. Thanks. Re-write the quadratic function belbw in Standard Formy = 3(x - 3)(x - 2) 150.0 grams of an unknown metal is heated to 100.0C and then placed in a calorimeter with 250.0 mL of water. If the final temperature of themetal is 29.1C and the calorimeter absorbed 824 Joules of energy, whatis the specific heat of the unknown metal? * g The perfectly competitive firm's supply curve: Group of answer choices coincides with its perfectly elastic demand curve. is the firm's average total cost curve above the shutdown point. is perfectly inelastic at the market price. is the firm's marginal cost curve above the minimum point on the AVC curve. Help asap, best explained or best answer given will get brainliest :p