To what three different audiences might you have to give a presentation? How would the presentation differ for each? Which one would be the most challenging for you?

What will be an ideal response?


[Note: To help students answer this question, you can suggest that they review the Presentations section in Part A of the Systems Analyst’s Toolkit that follows Chapter 12.]
In addition to a presentation given to middle management, you might give a second presentation to upper-level management and a third presentation to the information systems staff. A presentation to upper-level management usually is less detailed, presenting more of an overview. A presentation to IT personnel usually is more technical. When the audience consists of several different types and levels of people, the presentation should be aimed at those listeners who will be making a decision based on the information in the presentation.

Computer Science & Information Technology

You might also like to view...

What is a mask used for? What is a format used for? Which can affect the way that data isstored?

What will be an ideal response?

Computer Science & Information Technology

Any symbol that displays on your screen in response to moving your mouse and with which you can select objects is called a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

A copy of one or more files that is made in case the originals become damaged is generally referred to as a restore.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Simone is aware that there are a variety of security tools available for her new computer, but she is not entirely sure which kinds of products she needs for which situations. She asks you for some advice. ? Simone does her banking with Bank of America and was nervous lately when she began to be the victim of scams in which she was the recipient of official-looking email messages that appeared to be coming from Bank of America but ultimately turned out not to be legitimate. Which of the following can she use to keep this from happening in the future? a. pop-up blockerc. adware removerb. phishing filterd. anti-spam program

What will be an ideal response?

Computer Science & Information Technology