Systems analysts must work systematically to elicit and evaluate users’ reactions to the prototype. There are three ways the user is involved:

What will be an ideal response?


A. Experimenting with the prototype
B. Giving open reactions to the prototype
C. Suggesting additions to and/or deletions from the prototype

Computer Science & Information Technology

You might also like to view...

Which of the following best describes the accountability key information security principle?

A) The logging of access and usage of information resources B) The configuring of the Security log to record events C) The process of tracing actions to their source D) The process of identifying users who seek access to secure information

Computer Science & Information Technology

The ________ tool can be used to change the background color of an image.

Draw Filled Region. (c) Get color. (d) Fill region.

Computer Science & Information Technology

Internal styles are the ones you will probably use in a work environment.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A __________ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time.

A. denial of service B. distributed denial of service C. virus D. spam

Computer Science & Information Technology