1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
harkovskaia [24]
3 years ago
8

Discuss how the user-designer communications gap can cause a good project to go bad.

Computers and Technology
1 answer:
Mila [183]3 years ago
3 0
This gap between user-designer communications <span>can cause a good project to go bad i</span>f the user is not able to process what is required to be fixed in order for the project to run smoothly. The user may have one way of fixing something while the designer has another. In this case, the designer understands how the project fully works while the user does not and this may end up compromising the whole project.

The law that “designers are not users” and “users are not designers” should always be followed.




You might be interested in
Class.object.method is an example of using the ______<br> to access the elements of a class.
Aleonysh [2.5K]

Answer:

dot operator

I hope I helped ^-^

6 0
2 years ago
A web ______ is a computer that delivers requested webpages to your computer or mobile device.
Goshia [24]
I believe that the answer you are looking for is a Web Server.
7 0
3 years ago
Fern has set up a computer network for the entire building. Unfortunately, the signal strength diminishes as it reaches toward t
goldfiish [28.3K]

Answer:

signal repeaters.

Explanation:

The best device to use in this scenario would be signal repeaters. These basically grab an already existing signal and repeats it in a specific direction therefore amplifying the range. These devices are usually used when a large network system is not reaching certain devices that are located too far away. These devices are then placed in midpoints between the network and the device and aimed towards the direction of the device. It then picks up the existing signal and retransmits it to the devices' location so that the device can pick up the network signal and access it.

6 0
3 years ago
A multi-national retail company has multiple business divisions with each division having its own AWS account. The engineering t
velikii [3]

Answer:

C. X-ray

Explanation:

AWS X-ray is a form of service that assists developers in carrying out analysis and debugging functions, and at the same time helps in the allotted applications, including those built using a microservices architecture.

In other words, an X-ray, in this case, will assist the developers in carrying out the following:

1. Establish a service map

2. Single out errors and bugs

3. Construct analysis and visualization apps

4. Enhancing the experience for end-users of the application under x-ray.

4 0
2 years ago
Information systems security is the collection of activities that protect the information system and the data stored in it.
ivann1987 [24]

Answer:

The answer is A. True.

Explanation:

Information systems security,refers to all the methods involved with assuring information integrity as well as keeping it confidential, and available.

It can also be defined as -

The detection and provisoon of solutions to security breaches.

Access controls, which prevents unauthorized system access.

Protection of information either in transit or in a storage area.

3 0
3 years ago
Other questions:
  • What do we call a subset of new media in which groups and their fans can interact directly?
    14·1 answer
  • Given the following class import java.util.ArrayList; public class RectangleTester { public static void main(String[ ] args) { A
    7·1 answer
  • The material of this section assumes that search keys are unique. However, only small modifications are needed to allow the tech
    7·1 answer
  • If you define a destructor, are you required to define an operator '=' and a copy constructor?
    9·1 answer
  • The stack pop operation
    10·1 answer
  • How are computers 35 years ago and how are they presently and how are they going to be in the next 35 years
    9·1 answer
  • Does anyone know how to change your username? plz help I don't want my name on this lmo
    8·2 answers
  • 14. Which of the following is NOT a
    6·2 answers
  • De acuerdo con las generaciones de la computación, ¿Creen que estamos en la 5ta generación o aun no? y ¿por qué?
    13·1 answer
  • 30 POINTS FOR THE CORRECT ANSWERS
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!