Review the interview summaries in Chapter 2. For each person (Marie, Martin, Phil, Alice, and Joe), develop three additional questions: an open-ended question, a closed-ended question, and a range-of-response question.

What will be an ideal response?


A description of open-ended, closed-ended, and range-of-response questions is provided in Section 4.10 on page 122 (11th ed). The student’s response should follow the structure of these three different interview question styles in the context of the four paper mentioned from Chapter 2.

Computer Science & Information Technology

You might also like to view...

A ____ is a specific architecture of controls designed to mitigate a given set of risks within a particular organizational context.

A. security manager B. security task C. security function D. security solution

Computer Science & Information Technology

Which of the following fields is designed to be used as the primary key in an empty table?

A. AutoNumber B. Primary Key C. ID D. Identifier

Computer Science & Information Technology

With very few commands in Processing, you can create intricate pieces of art that may include all of these EXCEPT ________

A) color B) images C) audio D) holograms

Computer Science & Information Technology

To reduce the storage requirements of an e-mail message and increase the transfer speed of the message, you should always provide the ________ for an image or video clip stored on a file server, rather than attach it to the e-mail

Fill in the blank(s) with correct word

Computer Science & Information Technology