Advantage
Will meet the exact needs of the users as it is designed specifically for the client Off the shelf software will be generic
Closer involvement with development team during system maintenance/training/installation
marlinbito answered the question on July 2, 2018 at 08:36
-
The computer has a touch screen. Describe the main features of touch screen technology
(Solved)
The computer has a touch screen. Describe the main features of touch screen technology
Date posted:
July 2, 2018
.
Answers (1)
-
A laptop computer has a keyboard and a touch sensitive pad. Identify and justify one use for which the touch sensitive pad would be more...
(Solved)
A laptop computer has a keyboard and a touch sensitive pad. Identify and justify one use for which the touch sensitive pad would be more suitable than the keyboard.
Date posted:
July 2, 2018
.
Answers (1)
-
Explain how data is read by a barcode reader
(Solved)
Explain how data is read by a barcode reader
Date posted:
July 2, 2018
.
Answers (1)
-
Identify two benefits of a command line interface
(Solved)
Identify two benefits of a command line interface
Date posted:
July 2, 2018
.
Answers (1)
-
One type of user interface is a command line interface. Describe the main features of a command line interface.
(Solved)
One type of user interface is a command line interface. Describe the main features of a command line interface.
Date posted:
July 2, 2018
.
Answers (1)
-
The hospital plans to use an expert system to help diagnose illnesses.One component of the expert system will contain the knowledge and rules to be...
(Solved)
The hospital plans to use an expert system to help diagnose illnesses.One component of the expert system will contain the knowledge and rules to be used.
Explain how this component will be created.
Date posted:
July 2, 2018
.
Answers (1)
-
Describe two advantages of using RFID instead of bar codes to identify aircraft parts.
(Solved)
Describe two advantages of using RFID instead of bar codes to identify aircraft parts.
Date posted:
July 2, 2018
.
Answers (1)
-
Describe the main features of a typical browser.
(Solved)
Describe the main features of a typical browser.
Date posted:
July 2, 2018
.
Answers (1)
-
Identify three different types of internal memory and describe how each is used
(Solved)
Identify three different types of internal memory and describe how each is used
Date posted:
July 2, 2018
.
Answers (1)
-
Data can be processed using batch processing. Describe the main features of batch processing.
(Solved)
Data can be processed using batch processing. Describe the main features of batch processing.
Date posted:
July 2, 2018
.
Answers (1)
-
Describe two benefits of using OCR to capture data
(Solved)
Describe two benefits of using OCR to capture data
Date posted:
July 2, 2018
.
Answers (1)
-
A scanner is used to input a text document. Describe the main features of Optical Character Recognition (OCR).
(Solved)
A scanner is used to input a text document. Describe the main features of Optical Character Recognition (OCR).
Date posted:
July 2, 2018
.
Answers (1)
-
A manufacturer uses robots to assemble touch screens for computers. Describe the main features of touch screen technology.
(Solved)
A manufacturer uses robots to assemble touch screens for computers. Describe the main features of touch screen technology.
Date posted:
July 2, 2018
.
Answers (1)
-
Describe the main features of an interactive DVD which make it suitable for training users
(Solved)
Describe the main features of an interactive DVD which make it suitable for training users
Date posted:
July 1, 2018
.
Answers (1)
-
Computer users can get support and training in various ways. Explain how users could get support from a user group.
(Solved)
Computer users can get support and training in various ways. Explain how users could get support from a user group.
Date posted:
July 1, 2018
.
Answers (1)
-
Name and describe two psychological factors which can influence how humans interact with a computer.
(Solved)
Name and describe two psychological factors which can influence how humans interact with a computer.
Date posted:
July 1, 2018
.
Answers (1)
-
Describe one method of ensuring that data transmitted over a network is secure.
(Solved)
Describe one method of ensuring that data transmitted over a network is secure.
Date posted:
July 1, 2018
.
Answers (1)
-
It is important that data on a network is kept secure. Describe one method of ensuring that access to data on a network is restricted
(Solved)
It is important that data on a network is kept secure. Describe one method of ensuring that access to data on a network is restricted
Date posted:
July 1, 2018
.
Answers (1)
-
Name and describe one other method of detecting data transmission errors
(Solved)
Name and describe one other method of detecting data transmission errors
Date posted:
July 1, 2018
.
Answers (1)
-
Parity bits can be used to detect errors. Evaluate the use of parity bits in detecting data transmission errors.
(Solved)
Parity bits can be used to detect errors. Evaluate the use of parity bits in detecting data transmission errors.
Date posted:
July 1, 2018
.
Answers (1)