Systems analysts must work systematically to elicit and evaluate users’ reactions to the prototype. There are three ways the user is involved:

What will be an ideal response?

A. Experimenting with the prototype
B. Giving open reactions to the prototype
C. Suggesting additions to and/or deletions from the prototype

Computer Science & Information Technology

You might also like to view...

Which of the following is an example of social engineering?

A) Spamming B) Phishing C) Spyware D) Malware

Computer Science & Information Technology

The rectangle that defines an ellipse is called its ________.

a) bounding box b) boundary c) elliptical rectangle d) elliptical box e) ellipse boundary

Computer Science & Information Technology