Your company has a hundred employees who all have access to a sharYour company has a hundred
Question:
Your company has a hundred employees who all have access to a sharYour company has a hundred employees who all have access to a shared database of resources. One day, a large portion of the database is deleted (possibly by mistake, possibly on purpose) by one of the employees. There is no way to check who initiated the deletion since the log has been corrupted, but you have a good idea who did it. Your colleague Daria also says she thinks she knows. You want to check with Daria that you are thinking of the same person, but since you don't want to unfairly accuse someone, you only want to reveal who you think it is, if Daria is thinking of the same person. You decide to find a method to allow you to do this. What method do you choose and why? Are there any problems associated with this method? ed database of resources. One day, a large portion of the database is deleted (possibly by mistake, possibly on purpose) by one of the employees. There is no way to check who initiated the deletion since the log has been corrupted, but you have a good idea who did it. Your colleague Daria also says she thinks she knows. You want to check with Daria that you are thinking of the same person, but since you don't want to unfairly accuse someone, you only want to reveal who you think it is, if Daria is thinking of the same person. You decide to find a method to allow you to do this. What method do you choose and why? Are there any problems associated with this method?
Project Management A Systems Approach to Planning Scheduling and Controlling
ISBN: 978-0470278703
10th Edition
Authors: Harold Kerzner