1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dovator [93]
2 years ago
8

End user needs assessment is a formal procedure to analyze a user's computer needs; it involves a specific set of steps that are

performed in sequence in each assessment project.
a.True
b.False
Computers and Technology
1 answer:
Veseljchak [2.6K]2 years ago
6 0

Answer:

The answer is option b.

Explanation:

  • An end-user is an individual user that includes a configured hardware or software that is not operated by another person. Many computer users with one way or another are called end-users.
  • Assessment is the method that collects and shares information from different sources and end-users are not needs the assessment which involves a particular set of steps and does not take place sequentially.
You might be interested in
True or False: The term whitespace speaks to the design of a website
prisoha [69]

Answer:

True

Explanation:

I took the test a little while ago

7 0
3 years ago
Read 2 more answers
Search and read all phenomenon listed below and identify the ICT platform they used.
Amanda [17]

Answer:

1. Radio broadcast

2. Text brigades

3. Social media and change website

4. Internet and text brigades

Explanation:

I'm having issues posting my answer. Please go through the attachment.

Answer:

1. Radio broadcast

2. Text brigade

3. Social media and change website

4. Internet and text brigades

Explanation:

ICT can serve as a medium through which change can be effected in a society.

1 EDSA and cardinal

The ICT used here was the radio.

2. EDSA dos

The ICT that was used her was the text brigades.

3. Million people march

The ICT used here was social media and the change website.

4. ICT used here is internet and text messaging.

Please I have provided background information to what caused these events. I typed my answers but the editor did not allow me post it.

Thank you.

6 0
2 years ago
What feature would be used to collect how many times users downloaded a product catalog?
yaroslaw [1]

Answer:

Event Tracking

Explanation:

Event Tracking is a useful feature in google analytics and it is used to record how the user interacted with the elements of your website.

8 0
3 years ago
Write an expression whose value is the str that consists of the second through fifth characters of the str associated with s. Wr
Lera25 [3.4K]
>>> s = "012345678"
>>> s
'012345678'
>>> s[ 1 : 6 ]
'12345'



4 0
3 years ago
Read 2 more answers
Which web application attack is more likely to extract privacy data elements out of a database?
klasskru [66]
<span>The answer is SQL Injection
</span>
This kind of attack is the most prone to extract privacy data elements out of a database. An SQL injection like any other attack may take several attempts to pull it off and is more likely to extract private data. With admin rights or escalated priviledges, SQL injections can be used to enter the database.







6 0
2 years ago
Other questions:
  • If all of Earth's history were squeezed into one 12-hour period, how long ago did Precambrian time end? How long did the Cenozoi
    15·1 answer
  • Answer the following questions which are based on the study "Patients' Engagement with Sweet Talk." Submit your answers to the e
    9·1 answer
  • PLEASE PLEASE PLEASE HELP!! WILL GIVE A BRAINLIEST IF UR RIGHT!!
    14·1 answer
  • Please Help!
    6·2 answers
  • List the steps in setting up an online banking account
    12·2 answers
  • 1. The programmer intends for this pseudocode to display three random numbers in the range of 1 through 7. According to the way
    12·1 answer
  • To show the navigation pane if it is hidden, click the ____ button
    12·2 answers
  • What are some of the functions in the Consolidate dialog box? Check all that apply.
    6·1 answer
  • Overview In this assignment, you will gain more practice with designing a program. Specifically, you will create pseudocode for
    7·1 answer
  • What do you think Amazon should fix?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!