1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sladkaya [172]
3 years ago
11

Describe four traditional tehniques for collecting information during analysis.

Computers and Technology
1 answer:
Zarrin [17]3 years ago
7 0

Answer:

1.Interviewing and listening- Involves talking with users individually or as a group to discover their views about the current and target systems; it also involves carefully preparing an interview outline and guide before conducting the interview

2.Administering questionnaires- Involves designing a questionnaire and determining who should respond to it; this method is typically used when there are too many key users to interview individually.

3.Directly observing users- involves watching how people work in order to uncover information users may not be consciously aware of. Direct observation is best when detailed or complicated procedures must be documented, when you do not want people to know they are giving you information you need, when only a few people are involved, and observational data are representative of all situations

. 4.Analyzing procedures and other documents- involves identifying and collecting written procedures, forms, reports, and other relevant documents in order to better identify data and processes that would be part of the current and target systems.

You might be interested in
Obtaining the data of a video file from a flash drive is an example of a(n) _________ operation.
galben [10]

Obtaining the data of a video file from a flash drive is an example of a(n) _________ operation.

a)retrieval. b)comparison. c)storage. d)exponentiation.  

Answer:

a)retrieval.

Explanation:

A retrieval operation simply means obtaining data or information that is stored in a system.

Therefore, getting the data of a video file from a flash drive is a retrieval operation because it brings the video file from the storage device.

3 0
3 years ago
WILL GIVE BRAINLIEST
GenaCL600 [577]

Answer:

None of those answers is correct because E[1101] is index out of range.

8 0
3 years ago
In the well-known ____________________ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and ins
Oduvanchick [21]

Answer:

MAN IN THE MIDDLE

Explanation:

Man in the middle attack is an attack where the attacker secretly relays and possibly alters the communications between two parties. When data is sent between a computer and a server, a cybercriminal can get in between and spy or eavesdrop.

A man in the middle attack can positions himself in a conversation between a user and an application in other to impersonate one of the parties, making it appear as if a normal exchange of information is underway.

In a man-in-the-middle cyber-attack, the attacker places themselves in between two devices and monitor packets from the network, modifies them, and inserts them back into the network without the other parties knowing.

3 0
3 years ago
Which of the following is the best example of a manager with a delegator leadership style
Vera_Pavlovna [14]
I think the answer should be answer D.
8 0
3 years ago
Read 2 more answers
100 POINTSSSSSSS!!
lianna [129]

i need help on that too :cc

5 0
3 years ago
Other questions:
  • CNG and gasoline-powered vehicles use the same internal combustion engine, but different fuel types. A) True B) False
    8·2 answers
  • To use the program service routines, the user's program makes requests to the operating system through the
    10·1 answer
  • Co to jest podprogram (procedura lub funkcja)? Zaznacz poprawną odpowiedź. a) Wielokrotne powtarzanie tych samych poleceń. b) Wy
    8·1 answer
  • Drugs of addiction act upon a portion of the Brain called the lambic system ? True or false.
    7·1 answer
  • True or False? In a C++ floating-point constant, a decimal point is not required if exponential (E) notation is used
    13·1 answer
  • Your organization is planning to deploy wireless access points across their campus network, and you have been tasked with securi
    5·1 answer
  • Hi whats airpods good for
    15·2 answers
  • Who invented the speaker?
    14·2 answers
  • The product of two integers is -180 if one of them is 12 find the other​
    14·1 answer
  • An Excel file that contains one or more worksheets
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!