answersLogoWhite

0


Best Answer

"Evaluate a system" could mean several different things. I am somewhat confused as you asked this question under the following categories: Database Programming, Algebra and Calculus.

Under Database Programming, I am not sure. However, I would imagine it would mean to describe the effectiveness of the system that has been put in place. If this does not answer your question, you will have to be more specific and ask your question in plain and proper English.

Under algebra or calculus, "evaluating a system" would probably mean to determine the values of any unknown variables/constants in a system of equations or functions.

User Avatar

Wiki User

13y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is to evaluate a system?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Computer Science

How can an organisation evaluate the impact of the internet on its business?

There are a lot of programs designed to monitor page traffic on websites and the things that people then do. They could track where people click and evaluate the responses.


What is the first step in network design used to evaluate underlying requirements?

Answer the question "What am I going to network"


How do you evaluate whether scientific information is reliable?

It helps if you know a bit about the corresponding scientific area.


What is the only driver that is mandatory when using the DLPDCM and is also responsible to evaluate the device blocking rules?

7


How does one use an access control system?

Access control is more and more of a concern for many as privacy invasion becomes more commonplace. Logically, the first step toward protecting privacy is governing access to your personal space. As the need has risen, so have the companies who claim to have the right system for you. With security systems, one size never fits all. Before going out and buying the wrong system for your particular application, do some access control system research. Do a personal access inventory. Identify and evaluate access vulnerabilities, and the best way to shore up access protection of these areas of exposure. Establish perimeters and review options for securing them. Set your security perimeter. Decide on the level of access control that is needed and what you are comfortable with. Think about and check out the available technologies for the system you have in mind. Make your list of who will share access, and who will be excluded. Make sure that each person on your access list agrees, and is willing to keep his access information confidential. Instruct them not to share it with friends or others who are "harmless." Restriction of access is, after all, the whole idea behind a control system. Do not trust your security to newcomers. Shop your access system requirements. Meet with and speak to three or four well-established, trusted companies in your area about what you want. Schedule a time for them to do an on-site estimate. Be present for that on-site evaluation; do not leave it to someone else. Narrow down your system company prospects to two; then, carefully re-evaluate what each offers. Compare pricing versus what the package presented really offers. Check out their work by asking for and visiting at least two of their current customers. Quickly resolve any doubts you may have about your new system. Re-evaluate one final time on your way to your final decision, after making your site visits. Look specifically for the best reliability of the system. Consider next the convenience and level of comfort you personally feel about each system you are considering. Review how the system works, and assess your degree of confidence with it. Do not buy a system that you feel is too complicated to operate. Do not buy a system you do not have complete protection confidence in, and do not buy a system that is too pricey for what it offers.