_____ document key points, issues, next steps, and decisions throughout a joint application development (JAD) session.
a. Facilitators
b. Users
c. Scribes
d. System developers
Answer: c. Scribes
You might also like to view...
What type of driver does an antivirus agent use to intercept files that contain viruses?
A. function B. virus C. filter D. object
The transpose function allows you to arrange a vertical range of cells horizontally.?
Answer the following statement true (T) or false (F)
Identify the letter of the choice that best matches the phrase or definition.
A. Number of heading styles used in a table of contents B. Used to provide details about the text and are usually located at the bottom of the page C. Number or symbol indicating that there is a footnote or endnote D. Dots, dashes, or lines that fill the empty space before a tab stop E. Used to provide details about the text and are usually located at the end of a document
Which of the following will allow the use of BitLocker if the computer does not have a TPM chip?
A. External hard drive B. SCSI hard drive C. USB key D. CD-ROM drive