Systems analysts must work systematically to elicit and evaluate users’ reactions to the prototype. There are three ways the user is involved:
What will be an ideal response?
A. Experimenting with the prototype
B. Giving open reactions to the prototype
C. Suggesting additions to and/or deletions from the prototype
Computer Science & Information Technology
You might also like to view...
Which of the following is an example of social engineering?
A) Spamming B) Phishing C) Spyware D) Malware
Computer Science & Information Technology
The rectangle that defines an ellipse is called its ________.
a) bounding box b) boundary c) elliptical rectangle d) elliptical box e) ellipse boundary
Computer Science & Information Technology