What fact-finding methods could you use to collect information from employees at ColonialMovers? Suggest at least three methods, and explain the pros and cons of each.

What will be an ideal response?


• Interviewing is especially important because it is an interactive process. The systems analyst can listen carefully, evaluate the response, and react with follow-up questions if necessary. Another advantage of interviewing is that the analyst can observe and gauge nonverbal responses, which often are an important source of input.
• Document review can help you understand how the current system is supposed to work.
• Observation evaluates the operation of the current system and verifies statements made or documentation references.
• Surveys and questionnaires obtain input from a large number of people by asking standard questions, so that the results can be tabulated and analyzed.
• Sampling examines examples of actual documents and transactions that represent the overall population.
• Research can provide you with background information, technical material, and news about IT industry trends and developments.

Computer Science & Information Technology

You might also like to view...

MC The______ method determines if a mapping has a specified key.

a) is. b) contains. c) has_key. d) None of the above.

Computer Science & Information Technology

_____ is a special-purpose programming language for accessing and manipulating data stored in a relational database.

A. Query by Example (QBE) B. Access C. Structured Query Language (SQL) D. Java

Computer Science & Information Technology

Which of the following statements is TRUE when comparing forms and reports?

A) Themes can be used with Reports, but not with Forms. B) The same wizard can be used for creating forms and reports. C) Forms and reports contain the same controls. D) Creating forms and reports begins by sketching an outline of the form or report.

Computer Science & Information Technology

The JavaScript built-in function ____ encodes a text string so that it becomes a valid URI.

A. toURI(string) B. encode(string) C. eval(string) D. encodeURI(string)

Computer Science & Information Technology