Design a questionnaire to learn what students think of the registration process at your school. Apply the guidelines you learned in this chapter.

What will be an ideal response?

Using the sample in Figure 4-22 as a model, students should be able to design a simple questionnaire. This would be a good team exercise, with teams acting as the responders to each other’s questionnaire, then offering feedback and suggestions for improvement.

Computer Science & Information Technology

You might also like to view...

Match the following terms with their description

I. Plagiarism II. Fair use III. Censorship IV. CC license V. TurnItIn A. Allows use without permission B. Restricts what can be posted or published C. The use of someone else's work without permission D. Online tool that helps detect plagiarism E. Determines what someone can do with your work

Computer Science & Information Technology

A security incident occurs that requires a systems administrator to take an image of a user's workstation hard drive. Which of the following should be taken at the time the system image is generated and retained through the file of the investigation to assure files have not been modified since?

A. A checksum hash of the drive image or files B. Copies of the system logs at specific intervals C. A snapshot of the file system D. The user's credentials and permissions

Computer Science & Information Technology