Size and type of business: In a very small company, one person can be able to produce all the necessary information. However as the company increases in size, more people and aids e.g. calculators and small computers will be needed. Large volumes of data and information will require the use of large computers.
Timing aspects:Some information requirements are less time critical than others. The timing requirement for information will have a considerable bearing on the methods and equipment needed to provide it.
Link between applications:Where data is needed for more than one information requirement, a different method of processing it may be suggested.
Steve ju answered the question on June 7, 2018 at 18:14
-
What are the disadvantages of computers
(Solved)
What are the disadvantages of computers
Date posted:
June 7, 2018
.
Answers (1)
-
The two primary objectives of Operating System
(Solved)
The two primary objectives of Operating System use
Date posted:
June 6, 2018
.
Answers (1)
-
Explain two roles of a computer driver
(Solved)
Explain two roles of a computer driver.
Date posted:
June 4, 2018
.
Answers (1)
-
List three categories of operating systems
(Solved)
List three categories of operating systems.
Date posted:
May 26, 2018
.
Answers (1)
-
Define the following terms as used in computer programming: (a.) A compiler (b.) A debugger (c.) An algorithm
(Solved)
Define the following terms as used in computer programming: (a.) A compiler (b.) A debugger (c.) An algorithm
Date posted:
May 26, 2018
.
Answers (1)
-
Create a C++ class called stopwatch that emulates a stopwatch that keeps track of elapse time. Use a constructor to initially set the elapse time...
(Solved)
Create a C++ class called stopwatch that emulates a stopwatch that keeps track of elapse time. Use a constructor to initially set the elapse time to 0.Provide two member function called start() and stop() that turns on and off the timer, respectively. Include a member function called show() that displays the elapsed time.Also, have the destructor function automatically display elapsed when stopwatch object is destroyed.
Date posted:
May 5, 2018
.
Answers (1)
-
How does computer technology threaten the privacy of our data?
(Solved)
How does computer technology threaten the privacy of our data?
Date posted:
April 28, 2018
.
Answers (1)
-
1.(i) Define WIMP
(ii) Explain the elements of WIMP (windows, icons, menus, pointer)
(Solved)
1.(i) Define WIMP
(ii) Explain the elements of WIMP (windows, icons, menus, pointer)
Date posted:
April 24, 2018
.
Answers (1)
-
Explain the meaning of information and communication technology (ICT)
(Solved)
Explain the meaning of information and communication technology (ICT).
Date posted:
April 19, 2018
.
Answers (1)
-
Differentiate between a macro and a module as used in computer applications.
(Solved)
Differentiate between a macro and a module as used in computer applications.
Date posted:
April 3, 2018
.
Answers (1)
-
Explain the disadvantages of digitizers in transferring of spatial data to GIS.
(Solved)
Explain the disadvantages of digitizers in transferring of spatial data to GIS.
Date posted:
March 29, 2018
.
Answers (1)
-
(a) Explain the following categories of systems in connection with management decision making, clearly distinguishing between the categories: (i.) Transaction processing systems; ...
(Solved)
(a) Explain the following categories of systems in connection with management decision making, clearly distinguishing between the categories:
(i.) Transaction processing systems;
(ii.) Management Information Systems;
(iii.) Decision Support Systems;
(iv.) Executive Support Systems;
(b) Identify and briefly explain the three fundamental components of an expert system. Explain how an expert system may be used in a business application.
Date posted:
March 28, 2018
.
Answers (1)
-
In data communication, the communication channel is the route along which data is transmitted. The transmission of data can be described by the following four...
(Solved)
In data communication, the communication channel is the route along which data is transmitted. The transmission of data can be described by the following four characteristics:
A. Direction of flow of data.
B. Communication lines.
C. Speed of data transmission.
D. Mode of data transmission.
Required: For each of the following data communication concepts/devices, indicate under which ONE of the above listed characteristics A-D they would best fall: ii. Protocol; iii. Half duplex; iv. Fibre optics; v. Simplex; vi. Analog signal; vii. Micro wave; viii. Band width; ix. Start/stop bit; x. Voice bad.
Explain the term internetworking within the context of data communication. How does a call-back unit and data-encryption equipment enhance security in a computer network?
Date posted:
March 28, 2018
.
Answers (1)
-
Distinguish between adaptive and probabilistic systems
(Solved)
Distinguish between adaptive and probabilistic systems.
Date posted:
March 24, 2018
.
Answers (1)
-
Which is the first web browser invented in 1990?
(Solved)
Which is the first web browser invented in 1990?
Date posted:
February 26, 2018
.
Answers (1)
-
Write a C language program to create file “odd” to store all odd numbers between 1 and n.
(Solved)
Write a C language program to create file “odd” to store all odd numbers between 1 and n.
Date posted:
February 24, 2018
.
Answers (1)
-
Explain the concept of files, records and fields
(Solved)
Explain the concept of files, records and fields.
Date posted:
February 24, 2018
.
Answers (1)
-
A system analyst in the development of computerized information systems is defined as an agent of change.Required: (a) Define the term 'agent of change‘ and describe...
(Solved)
A system analyst in the development of computerized information systems is defined as an 'agent of change'.
Required:
a) Define the term =agent of change‘ and describe four roles of a system analyst in the
development of computerized information systems.
b) Outline five advantages of an external system analyst in the development of
computerized information systems.
Date posted:
February 15, 2018
.
Answers (1)
-
State rules of naming variables in C++. How do they differ from ANSI C rules?
(Solved)
State rules of naming variables in C++. How do they differ from ANSI C rules?
Date posted:
February 9, 2018
.
Answers (1)
-
Describe the limitations of using getchar and scanf functions for reading strings.
(Solved)
Describe the limitations of using getchar and scanf functions for reading strings.
Date posted:
February 8, 2018
.
Answers (1)