1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SpyIntel [72]
3 years ago
10

Answer the following questions: • What is the source of the user’s request? Can a technical solution solve his problem? Perhaps

his problem is procedural or even political. Maybe it’s a process, workflow, or education issue. • Why is the user confused about this message? How does he interpret its meaning? • Why does the user get lost between these two screens? • Why did he miss this alert? Is he just ignoring it? If so, why? • Why is the user completing tasks in the wrong order? Is there a better way to organize the layout to ensure he does it the right way?
Computers and Technology
1 answer:
Anuta_ua [19.1K]3 years ago
6 0

Answer:

1. Reports on bugs, enhancement to the system

2. A technical solution may or may not solve his problem

3. Because users often dwell on the technical issues.

4. Wrong sequencing

5. Properly sequencing tasks to ensure they are completed in the right order

Explanation:

Users may identify bugs in the system that needs to be fixed or may identify the need for some enhancement to the system. These are the main sources of user's request.

A technical solution will solve his problem only if the problem is technical but not when it is a process, workflow or educational issue. Users tend to ignore this latter possibility and dwell mostly on technical. This is because they have the impression that all problems encountered while using the system is technical in nature.

The reason why the user is completing tasks in the wrong order is due to poor sequencing. Users must be able to accurately sequence their project tasks and schedule them appropriate. This will ensure that things are done in the right order.

You might be interested in
According to social penetration theory, the __________ dimension concerns the number of topics disclosed whereas the __________
dimulka [17.4K]
I am definitely sure that complete statement looks like this: According to social penetration theory, the breadth dimension concerns the number of topics disclosed whereas the depth dimension concerns the level of detail in topics disclosed. <span>Social penetration theory explains the differences between various levels of </span><span>interpersonal communication</span> in relation to the depth of interpersonal relationships.
7 0
3 years ago
A specially formatted encrypted message that validates the information the CA requires to issue a digital certificate is known a
Pavel [41]

Answer:

Certificate Signing Request(CSR).

Explanation:

Certificate Signing Request(CSR):- It is a message that is specially encrypted Which validates the information that is required by CA for the issuing of a digital certificate.

It is the first step towards getting your own SSL certificate.

So we conclude that the answer to this question is Certificate Signing Request (CSR).

5 0
3 years ago
A company is concerned that hackers may gain access to its computer system or that it may be
lesantik [10]

Answer:

computer virus is an spreading disease in a computer

Explanation

a virus can be spread through many ways by servers , wifi ,and the cloud

so its better to have an safe and secure firewall by your domain or you could use cloud computing to test viruses

it also can spread pretty fast so u better have a good antivirus

4 0
2 years ago
Select the images that are isometric drawings
valkas [14]

Answer:

There’s no images

Explanation:

7 0
3 years ago
Is it possible to build a portal in real life?
san4es73 [151]

No because we are not that  far in technology.

3 0
3 years ago
Read 2 more answers
Other questions:
  • Write a program totake a depth (in kilometers) inside the earth as input data;compute
    15·1 answer
  • Briefly describe "SoftwareEngineering Framework". Do provide examples and diagrams wherenecessary.
    15·1 answer
  • In the space below, write the formula that needs to be added to the blank cells under the fourth column of the table.
    13·1 answer
  • How are economics<br> and scarcity related?
    14·1 answer
  • We can include following item(s) during configuration itemidentification:
    10·1 answer
  • Assembly (Procedure and Conditional Processing). For the following program, what are outputs for register EAX, EBX, ECX, and EDX
    11·1 answer
  • What does a page break do?
    13·1 answer
  • Most airlines use very modern hardware and software.<br><br><br> True<br><br> False
    9·1 answer
  • Unwanted email sent to large groups of people who did not request the communication is called _____
    12·1 answer
  • What does ATM mean on lego mario mean I know that this is not school related but I trying to help my brother ​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!