1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sladkaya [172]
3 years ago
11

Describe four traditional tehniques for collecting information during analysis.

Computers and Technology
1 answer:
Zarrin [17]3 years ago
7 0

Answer:

1.Interviewing and listening- Involves talking with users individually or as a group to discover their views about the current and target systems; it also involves carefully preparing an interview outline and guide before conducting the interview

2.Administering questionnaires- Involves designing a questionnaire and determining who should respond to it; this method is typically used when there are too many key users to interview individually.

3.Directly observing users- involves watching how people work in order to uncover information users may not be consciously aware of. Direct observation is best when detailed or complicated procedures must be documented, when you do not want people to know they are giving you information you need, when only a few people are involved, and observational data are representative of all situations

. 4.Analyzing procedures and other documents- involves identifying and collecting written procedures, forms, reports, and other relevant documents in order to better identify data and processes that would be part of the current and target systems.

You might be interested in
Which of the following documents should beprepared before the commencement of a softwareproject?
ludmilkaskok [199]

Answer:

Software requirement specification

Explanation:

requirement specification is the first step before proceeding with any project.

we should validate our output at all phases with software requirement specification

7 0
3 years ago
After an extruded feature has been created, you can always go back and edit the feature. When you edit an existing extrude featu
Pani-rosa [81]

Answer:

After an extruded feature has been created, you can always go back and edit the feature. When you edit an existing extrude feature, <u>the shape of the sketch profile</u> cannot be changed from the Extrude Property Manager.

<u>Extrude PropertyManager</u>

A tool that is used to draw different sketch. The sketches are related to different fields. Extrude property manager is used to edit the sketch, delete some objects form the sketch but we cannot edit the shape of the sketch profile.

<em>In this tool we can edit every thing but cannot edit the shape of the sketch profile.</em>

3 0
3 years ago
Choose the types of work a person in the network systems administration field might do on a regular
solniwko [45]

Answer:troubleshooting the network when there are problems with the connectivity ||||||| improving network speed

Explanation:

7 0
3 years ago
Read 2 more answers
Investigators are combing the site of an explosion with mesh screens to collect evidence. The explosion was very large, leaving
rewona [7]

Answer: SCANNING ELECTRON MICROSCOPY,

Explanation:Many methods are available for use in an explosion site to determine or confirm the explosive materials or bomb fragment seen or obtained from the site they include the following; SCANNING ELECTRON MICROSCOPY,

CHROMATOGRAPHY-MASS SPECTROMETRY, STEREO MICROSCOPY, CAPILLARY ELECTROPHORESIS.

SCANNING ELECTRON MICROSCOPY, is a technique used to identify or confirm a material by scanning the surface of the material using FOCUSED BEAM OF ELECTRONS IN AN ELECTRON MICROSCOPE.

6 0
3 years ago
Read 2 more answers
When using bits to represent fractions of a number, can you create all possible fractions? Why or why not?
seropon [69]

Explanation:

Using this technique a number is represented in bits by three parts: sign, exponent, and fraction. This is similar to scientific notation used to represent large or small numbers (e.g. ). The sign is negative, the exponent is 8 and the fraction is 0.35.

8 0
3 years ago
Other questions:
  • What is the seventh byte in the roller coasters file?
    12·1 answer
  • Individuals with desirable traits will be __________ to have young that survive than individuals without these traits. (2 points
    5·2 answers
  • What does an SQL injection do
    12·2 answers
  • Communication is defined as__________.
    10·1 answer
  • Writing in Java, write a program that prompts the user to input an integer and then outputs both the individual digits of the nu
    15·1 answer
  • Similarites between hardware and software
    9·1 answer
  • On his website, Mario has a video that visitors must click to play. He wants the video to play automatically when the page loads
    9·1 answer
  • What is ABC computer?​
    14·1 answer
  • Fill in the blanks with the correct words.
    7·1 answer
  • I want the answer of this task ( using prolog language ) ASAP because the deadline is tomorrow. Please help :"
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!