Closed questions should be used when the analyst:

A) needs to explore a new situation.
B) is able to list all possible responses.
C) needs to learn an opinion.
D) has only a small group of people to obtain information from.


B) is able to list all possible responses.

Computer Science & Information Technology

You might also like to view...

The number of positive integers less than n and relatively prime to n is referred to as __________ function.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The pseudocode for the following problem is ____.Suppose all students in grade 12 at a high school are to be selected for a field trip, but the boys are leaving on the 8:30 a.m. bus and the girls are leaving at 9:00 a.m.

A. If gradeLevel == 12 Then    Display "Enter M for male, or F for female: "    If gender == "M" Then       Display "Your bus leaves at 8:30 a.m."    Else If       Display "Your bus leaves at 9:00 a.m."    End If End If B. If gradeLevel == 12;    Display "Enter M for male, or F for female: "    If gender == "M" Then;       Display "Your bus leaves at 8:30 a.m."    Else;       Display "Your bus leaves at 9:00 a.m."    End If; End If C. If gradeLevel == 12 Then    Display "Enter M for male, or F for female: "    Input gender    If gender == "M" Then       Display "Your bus leaves at 8:30 a.m."    Else       Display "Your bus leaves at 9:00 a.m."    End If End If D. If gradeLevel >= 12 Then    Display "Enter M for male, or F for female: "    If gender == "M"       Display "Your bus leaves at 8:30 a.m."    Else       Display "Your bus leaves at 9:00 a.m."    End End If

Computer Science & Information Technology

What are step-by-step instructions that depict a specific scenario or situation that the use case will encounter as well as the expected result?

A. Secure test scripts B. Functional test scripts C. User acceptance D. Load testing

Computer Science & Information Technology

The sender uses the public key of the recipient in ________.

A. public key encryption for authentication B. public key encryption for confidentiality C. public key encryption for integrity D. public key encryption for non-repudiation

Computer Science & Information Technology