1.Schedule feasibility-This is the time bracket within which all activities towards completing the project are done,how long it will take and what should be done within a certain time period.
2.Financial feasibility- This evaluates the total cost of developing the system and whether resources are available.
3.Economic feasibility- This involves evaluation of the total income the project is supposed to earn and the profits and thus whether the project is worth developing.
4.Technical feasibilty- Checks whether the system is compatible with the available hardware and whether it can allow upgrade of the system.
5.Social feasibility- Does the system interact well with the users, are the users able to work with the system well
6.Legal feasibility-Is the system going to comply with legal rules of the region within which it is going to be applied and used.
Rennykid answered the question on January 20, 2018 at 07:37
- Discuss the positive impacts of information technology (IT) in business(Solved)
Discuss the positive impacts of information technology (IT) in business.
Date posted: January 16, 2018. Answers (1)
- Why must user needs be considered when acquiring new software?(Solved)
Why must user needs be considered when acquiring new software?
Date posted: January 16, 2018. Answers (1)
- State FOUR functions of an operating system(Solved)
State FOUR functions of an operating system
Date posted: January 16, 2018. Answers (1)
- State the use of the following application software. Give two examples of each
(i) Word processor
(ii) Spreadsheet
(iii) Databases
(Solved)
State the use of the following application software. Give two examples of each
(i) Word processor
(ii) Spreadsheet
(iii) Databases
Date posted: January 16, 2018. Answers (1)
- A student in Form one describes the computers found in their schools as useless. When his teacher asked him the reasons, he said that they...(Solved)
A student in Form one describes the computers found in their schools as useless. When his teacher asked him the reasons, he said that they did not have USB ports.
a) What does USB mean in full
b) Name FOUR devices that may be connected through the USB port.
Date posted: January 16, 2018. Answers (1)
- Give the functions of the following keyboard keysa) Space bar b) Home key (Solved)
Give the functions of the following keyboard keys
a) Space bar
b) Home key
Date posted: January 16, 2018. Answers (1)
- Differentiate between PROM and EPROM.(Solved)
Differentiate between PROM and EPROM.
Date posted: January 16, 2018. Answers (1)
- State FOUR behaviors that should be avoided in a computer laboratory(Solved)
State FOUR behaviors that should be avoided in a computer laboratory
Date posted: January 16, 2018. Answers (1)
- Give TWO types of documentation that accompanies software (Solved)
Give TWO types of documentation that accompanies software
Date posted: January 16, 2018. Answers (1)
- What is meant by the term software authenticity as with regard to software selection? (Solved)
What is meant by the term software authenticity as with regard to software selection?
Date posted: January 16, 2018. Answers (1)
- Mention any TWO ports that are used to connect peripheral devices (Solved)
Mention any TWO ports that are used to connect peripheral devices.
Date posted: January 15, 2018. Answers (1)
- Give any FOUR examples of peripheral devices?(Solved)
Give any FOUR examples of peripheral devices?
Date posted: January 15, 2018. Answers (1)
- What is a spyware?(Solved)
What is a spyware?
Date posted: January 15, 2018. Answers (1)
- Explain the three components of an expert system. (Solved)
Explain the three components of an expert system.
Date posted: January 15, 2018. Answers (1)
- A recent breakthrough in the manufacturing industry is the development of a fuel manufacturing plant that can produce vehicles using robots.Despite these advances some manufacturers...(Solved)
A recent breakthrough in the manufacturing industry is the development of a fuel manufacturing plant that can produce vehicles using robots.Despite these advances some manufacturers prefer to use human labour.Give two advantages and two disadvantages of fully automated manufacturing industry.
Date posted: January 15, 2018. Answers (1)
- State three measures that can be taken to protect data against computer threats. (Solved)
State three measures that can be taken to protect data against computer threats.
Date posted: January 15, 2018. Answers (1)
- Describe 3 security threats of data stored in a computer system(Solved)
Describe 3 security threats of data stored in a computer system
Date posted: January 15, 2018. Answers (1)
- Define the following terms
(i) Internet:
(ii) Domain name:
(iii) ISP:
(iv)WWW
(Solved)
Define the following terms
(i) Internet:
(ii) Domain name:
(iii) ISP:
(iv)WWW
Date posted: January 15, 2018. Answers (1)
- List six database programs available in the market today.(Solved)
List six database programs available in the market today.
Date posted: January 15, 2018. Answers (1)
- From the below fields in a database which field can be used as the primary key field? Explain?
(i) Name:
(ii) Admission number
(iii) Fees:
(iv) Gender:(Solved)
From the below fields in a database which field can be used as the primary key field? Explain?
(i) Name:
(ii) Admission number
(iii) Fees:
(iv) Gender:
Date posted: January 15, 2018. Answers (1)