The study of a current business and information system application and the definition of user requirements and priorities for a new or improved information system are part of which phase? (Points : 2) Problem analysis phaseScope definition phase
Requirements analysis phase
Decision analysis phase
None of the above

Answers

Answer 1
Answer:

Answer: Problem analysis phase

Explanation: Problem phase analysis is the mechanism that helps in studying the problems and issue that occur in the application and system of any business organization.It helps in identification of the reason and consequences of the detected problems.The requirements of user and resources to accomplish business system is also analyzed.

Other options are incorrect because scope definition phase is used for identification of the boundaries of any project regarding opportunities and issue in business .

Requirement analysis phase is used for gathering the need of the user and the condition requirement to fulfill a project. Decision phase analysis is done to bring out the best possible solution for any project. Thus, the correct option is problem analysis phase.


Related Questions

What is this car first to awnser is the brianliest
How can we make our programs behave differently each time they are run?
When C++ is working with an operator, it strives to convert operands to the same type. This is known as A) type correction B) type conversion C) demotion D) promotion E) None of these
In a clustered column chart, the names of each column are part of the ____ series. select one:a. category b. data c. label d. legend
Suppose an array with six rows and eight columns is stored in row major order starting at address 20 (base 10). If each entry in the array requires only one memory cell, what is the address of the entry in the third row and fourth column?

A(n) _____ is a harmful program that resides in the active memory of the computer and duplicates itself.Worm
Virus
Keylogger
Timebomb

Answers

Answer: Worm

Explanation: Worm is the malicious software program which acts as the infection in the computer system. It has the ability to replicate itself and spread in the other systems .It is found in those parts that have automatic operation and non-noticeable.

The effect of the worm is slowing down the operations ,disturb the network etc.Other options are incorrect because virus is the malicious program that infects the host, key-loggers are used for monitoring of system and  time bomb is the program for releasing the virus in computer network. Thus, the correct option is worm.

A) What actions or steps in Excel can you take to rank them from 1st to 10th (4 marks) b) State the specific action(s) or step(s) in Excel that will produce a list/display of those countries with 800 or more medals in total? (4 marks)

c) Which type of graph will be suitable for representing only gold medals information? (2 marks)

d) In which column(s) might replication have been used?
(2 marks)

e) What Excel formula can be used to calculate the overall total medals awarded? (3 marks)


14) Write the Excel functions for the following: (5 Marks each)

a. Give the total number of medals for Germany and Great Britain.

b. Give the average number of silver medals for a European country,

c. Sum the Medals Total for Gold for those countries with less than 20 games involvement.

d. Search the database (the whole spreadsheet) to find ‘Italy’ and also the corresponding Medals Total.

Answers

Answer:

a) highlight row F by clicking on F, go to toolbar at top undar DATA click filter, you will see an arrow next to F now, click the dropdown on the arrow and sort

Explanation:

Is spread spectrum transmission done for security reasons in commercial WLANs?

Answers

Answer: No

Explanation: Spread spectrum transmission is the wireless transmission technique for the wide channel that helps in decrement of the potential interference.The transmission of signal is based on the varying the frequency knowingly to achieve larger bandwidth.

The use of spread spectrum transmission in the WLAN(wireless local area network)is used for the regulatory purpose The regulation is the controlling of the area  through policies.Thus,security is not the service that is provided to WLAN by spread spectrum transmission.

Assume you're running a query on your orders in the past year. You want to see how many orders were placed after May. What type of query would you use to find this data? A. Select
B. Range
C. Complex
D. Parameter

Answers

Your answer is A. Because a query is a question about a an organization to check how it's going


Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network?(A) A virus
(B) A warm
(C) A trojan horse
(D) A rootkit

Answers

Answer: Option (B) is correct.

Explanation:

A worm in technical sense is also known as a computer worm which is a self-replicating virus/ malicious content that replicates itself in order to spread to the uninfected PC. They often use components of an OS (operating system) which are automatic and also invisible to an individual. It should be duly noted that it is usual for a computer worm to be observed only when their replication utilizes system content, slowing other tasks at hand.

In computer programming, what is syntax?

Answers

Answer: syntax is a set of rules for grammar and spelling. In other words, it means using character structures that a computer can interpret

Answer:

in computer science, the syntax of a computer language is the set of rules that defines the combinations of symbols that are considered to be correctly structured statements or expressions on that language.