Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

How the following factors can affect the choice of system: cost, availability, user needs, data security

No description
by

Matthew Carney

on 4 February 2013

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of How the following factors can affect the choice of system: cost, availability, user needs, data security

How the following factors can affect the choice of system: cost, availability, user needs, data security Availability Data security Availability is also important because it is the probability of a computer system is operational at any given time. physical faults can permanently affect your computers availability. User needs The system you have purchased may or may not be capable of doing what you want it to do.
there are several factors, such as: accessibility, error handling, maintainability and response time. Matthew Carney COST OF SYSTEM. The cost of a system can be very expensive as there are several factors to think about: the hardware and software. If the hardware and software are expensive then you can be certain that they are efficient, but, if the hardware and software are cheaper than there's a chance they could be inefficient. data security protects a database from destructive forces and unwanted actions of unauthorized users and are a very important when considering a system to purchase.
Full transcript