C. N. Itall has been a systems analyst for Tun-L-Vision Corporation for many years. When he came on board as part of the systems analysis team and suggested prototyping as part of the SDLC for a current project, C. N. said, “Sure, but you can’t pay any attention to what users say. They have no idea what they want. I’ll prototype, but I’m not ‘observing’ any users.”

a. As tactfully as possible, so as not to upset C. N. Itall, make a list of the reasons that support the importance of observing user reactions, suggestions, and innovations in the prototyping process.
b. In a paragraph, describe what might happen if part of a system is prototyped and no user feedback about it is incorporated into the successive system.


a. The following is a list of reasons why prototyping is important:

1. Through gathering reactions of users about the prototype, many perspectives about the system will be obtained, including whether there will be difficulty in selling or implementing it.

2. Suggestions from users can point out the ways of refining the prototype, changing it, or “cleaning it up” so that it better fits users’ needs.

3. Innovations that have not been thought of prior to interaction with the prototype can add new features to the current one.

4. Prototyping helps to preview the future system and helps to identify priorities for what should be prototyped next. This approach will help set priorities and in turn redirect plans inexpensively, with a minimum of disruption.

b. If no user feedback is incorporated into the successive system, user needs will not be adequately addressed. In addition, users will think that their suggestions were not considered. They will not be as helpful in the future.

Computer Science & Information Technology

You might also like to view...

Declaring a(n) Android layout in XML makes it easier to visualize the structure of a user interface.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The program into which you insert an object is called the ________ program

A) destination B) object C) final D) source

Computer Science & Information Technology

Match the term with its use

4. E-chip blocking software a. fragments data and places on various servers 5. Data encryption b. filters information, though unable to distinguish between legitimate and indecent information 6. Data stripping c. provides privacy and security for consumers by protecting data

Computer Science & Information Technology

Which of the following is not found in an input format control string?

A. flag B. maximum width C. precision D. size E. conversion code

Computer Science & Information Technology