Closed questions should be used when the analyst:
A) needs to explore a new situation.
B) is able to list all possible responses.
C) needs to learn an opinion.
D) has only a small group of people to obtain information from.
B) is able to list all possible responses.
You might also like to view...
The number of positive integers less than n and relatively prime to n is referred to as __________ function.
Fill in the blank(s) with the appropriate word(s).
The pseudocode for the following problem is ____.Suppose all students in grade 12 at a high school are to be selected for a field trip, but the boys are leaving on the 8:30 a.m. bus and the girls are leaving at 9:00 a.m.
A. If gradeLevel == 12 Then Display "Enter M for male, or F for female: " If gender == "M" Then Display "Your bus leaves at 8:30 a.m." Else If Display "Your bus leaves at 9:00 a.m." End If End If B. If gradeLevel == 12; Display "Enter M for male, or F for female: " If gender == "M" Then; Display "Your bus leaves at 8:30 a.m." Else; Display "Your bus leaves at 9:00 a.m." End If; End If C. If gradeLevel == 12 Then Display "Enter M for male, or F for female: " Input gender If gender == "M" Then Display "Your bus leaves at 8:30 a.m." Else Display "Your bus leaves at 9:00 a.m." End If End If D. If gradeLevel >= 12 Then Display "Enter M for male, or F for female: " If gender == "M" Display "Your bus leaves at 8:30 a.m." Else Display "Your bus leaves at 9:00 a.m." End End If
What are step-by-step instructions that depict a specific scenario or situation that the use case will encounter as well as the expected result?
A. Secure test scripts B. Functional test scripts C. User acceptance D. Load testing
The sender uses the public key of the recipient in ________.
A. public key encryption for authentication B. public key encryption for confidentiality C. public key encryption for integrity D. public key encryption for non-repudiation