Based on the fact statements provided, summarize the maintenance department’s most important strengths, weaknesses, opportunities, and threats.

What will be an ideal response?


Answers will vary, but the facts presented in the chapter offer ample material for students to develop a SWOT analysis. This might be good team exercise for the class, with a group of students pretending to be IT consulting firms called in to provide the town with their input. Encourage students to use imagination, but also suggest that they follow the guidelines on page 42 and ask questions similar to the ones in the bulleted list.

Computer Science & Information Technology

You might also like to view...

The bitwise AND operator & is often used to bits (i.e., to select certain bits from a bit string while zeroing others).

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A codec improves digital video resolution

Indicate whether the statement is true or false

Computer Science & Information Technology

Which type of attack includes SYN Flood, broadcast amplification attacks, and buffer overflow?

A. DoS-related B. Brute force-related C. Man-in-the-middle-related D. IP service-related

Computer Science & Information Technology

By applying ________ to a worksheet, the data will be forced into a selected number of pages

A) scaling B) extra pages C) percentages D) formulas

Computer Science & Information Technology