Tom Jenson is a professional who specializes in systems development and is the only person who will see the system in totality. He is a(n):

a. programmer
b. systems analyst
c. stakeholder
d. end-user


Answer: b. systems analyst

Computer Science & Information Technology

You might also like to view...

The process of obtaining a subject’s proven identity is known as:

a. Enrollment b. Identification c. Authentication d. Authorization

Computer Science & Information Technology

Each TextField has a text property that’s returned by its textProperty method as a StringProperty. The StringProperty method ________ receives an ObservableValue as an argument. When the ObservableValue changes, the bound property is updated accordingly.

a. tie b. join c. attach d. bind

Computer Science & Information Technology

If there is a finally block after the last catch block, the finally block always executes.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Port scanning is a sophisticated technique of authenticating one machine to another by forging packets from a trusted source

a. true b. false

Computer Science & Information Technology