List two reasons why a systems analyst would use a closed question on a questionnaire.

What will be an ideal response?


Two reasons for using a closed question are (a) when the systems analyst is able to effectively list all the possible responses to the question and (b) when the analyst wants to survey a large sample of people.

Computer Science & Information Technology

You might also like to view...

Match each term with the correct statement below.

A. a liberty or entitlement owed to a person simply because he or she is a person B. former justice of the 7th Court of Appeals and a law professor at the University of Chicago; believes that there is no fundamental right to privacy C. the view articulated by Posner that concealment is most useful to criminals, and least useful to honest people; a.k.a. the "I have nothing to hide" argument D. professor at the George Washington University School of Law; instead of a single clear definition, he starts with a taxonomy of privacy problems E. collecting many small pieces of information about a person and linking them together to get new information F. communication with people in a way that disturbs their peace or makes them feel uncomfortable G. a court case in 1969 regarding the discovery of a man's pornographic films, deemed to be obscene; he was ruled innocent since his privacy was breached H. publishing or broadcasting false statements about another person, usually with the intent of harming the other person's reputation I. a situation in which one feels pressure not to do something, even though it is legal to do so, because of fear of prosecution J. crossing a national border in order to get access to a drug that is illegal on the other side K. studied and wrote essays about the history of social institutions, namely "Panopticism," to explore the influence of persistent serveillance on society L. English philosopher; proposed the design of the Panopticon M. popularized the commonly-used definition of the right to privacy in the Harvard Law Review N. prohibits telemarketers from calling phone numbers listed on the registry; stops businesses from intruding into our personal lives to try to sell us things O. publicly displaying certain physical or emotional attributes of another that are normally considered private, especially if such display is humiliating P. publishing private, but true, information in a way that damages the reputation of a subject

Computer Science & Information Technology

Building blocks you have created will remain on your own computer until you delete them

Indicate whether the statement is true or false

Computer Science & Information Technology

Where in the workbook is the change history worksheet inserted?

A) Before the last worksheet B) After the last worksheet C) After the first worksheet D) Before the first worksheet

Computer Science & Information Technology

Which of the following is not one of the best defenses against spyware?

a. Avoid visiting questionable Web sites and download software only from reputable sources. b. Use a firewall, a program or device that allows you to access the Internet but strictly limits the ability of outside users to access local, corporate, or personal data. c. Click on pop-up ads with caution. d. Install an antispyware program and update it frequently.

Computer Science & Information Technology