While investigating an existing system, observation, interviews and questionnaires can be used. Compare and contrast these three methods.​

Answers

Answer 1

Observation, interviews, and questionnaires are commonly used methods for investigating existing systems. Here's a comparison and contrast of these three methods:

Observation:

Observation involves directly watching and documenting the system, its processes, and interactions. It can be done in a natural or controlled setting.

Comparison:

Observation allows for firsthand experience of the system, providing rich and detailed information.It enables the researcher to capture non-verbal cues, behaviors, and contextual factors that may be missed through other methods.It can be flexible and adaptable, allowing the researcher to focus on specific aspects of the system.

Contrast:

Observation can be time-consuming, requiring significant time and effort to observe and document the system accurately.It may have limitations in capturing subjective experiences, intentions, or underlying motivations.Observer bias and interpretation can affect the objectivity of the collected data.

Interviews:

Interviews involve direct interaction with individuals or groups to gather information about the system, their experiences, opinions, and perspectives.

Comparison:

Interviews allow for in-depth exploration of participants' thoughts, experiences, and perceptions.They provide opportunities for clarification, follow-up questions, and probing into specific areas of interest.Interviews can capture qualitative data that is difficult to obtain through other methods.

Contrast:

Conducting interviews can be time-consuming, especially when dealing with a large number of participants.The quality of data gathered through interviews is dependent on the interviewee's willingness to disclose information and their ability to articulate their thoughts.Interviewer bias and influence can affect the responses obtained.

Questionnaires:

Questionnaires involve the distribution of structured sets of questions to individuals or groups to collect data systematically.

Comparison:

Questionnaires allow for efficient data collection from a large number of participants.They can be easily standardized, ensuring consistent data across respondents.Questionnaires enable quantitative analysis and statistical comparisons.

Contrast:

Questionnaires may lack depth in capturing nuanced or complex information.There is limited flexibility for participants to provide detailed explanations or clarifications.Respondents may provide incomplete or inaccurate information due to misunderstandings or rushed responses.

From the above we can summaries that each method has its strengths and weaknesses, and researchers often choose a combination of these methods to obtain a comprehensive understanding of the existing system.

Learn more about Investigating Existing Systems:

https://brainly.com/question/32111010


Related Questions

Allie is choosing a URL for her band’s website, which is the best method of making the URL easy to understand?

Answers

Answer:

Making a URL that is readable by humans. That is the best way and if it will be readable like that, it will meet the URL protocol requirements as well.  

Hope this helps!

Answer:

Making a URL that is readable by humans.

Please answer in C++ programming language
Define a function shift () that receives an array and its size. The function will shift all the elements of the array to the left. The last element will take the value of the first element. (4 marks)

Answers

The solution to the problem is as follows:

#include  using namespace std;

void shift(int arr[], int size)

{

int temp = arr[0];

 for(int i=0;

i> size;

int arr[size];  

for(int i=0;

i> arr[i];

}  

shift(arr, size);

cout << "Array after shifting left:" << endl;

 for(int i=0;

iusing namespace std;

void shift(int arr[], int size)

{

int temp = arr[0];

for(int i=0;

i> size;

int arr[size];

for(int i=0;

i> arr[i];

}

shift(arr, size);

cout << "Array after shifting left:" << endl;

for(int i=0

i

To know more about problem svisit:

https://brainly.com/question/32147976

#SPJ11

PLEASEEE HELP HURRY

PLEASEEE HELP HURRY

Answers

To start searching for a scholarly article on G. o. ogle Scholar, you should:

"Type the title of the article or keywords associated with it." (Option A)

What is the rationale for the above response?

Here are the steps you can follow:

Go to Go. o. gle Scholar website In the search box, type the title of the article or relevant keywords associated with it.Click the "Search" button.Browse through the search results to find the article you are looking for.Click on the title of the article to view the abstract and other details.If the article is available for free, you can download or access it directly from the search results page. If not, you may need to purchase or access it through a library or other academic institution.

Note that you can also use advanced search options and filters available on Go. ogle Scholar to narrow down your search results based on various criteria, such as publication date, author, and journal.

Learn more about G. o. ogle at:

https://brainly.com/question/28727776

#SPJ1

Discuss the reasons why organizations undertake information system projects.
List and describe the common skills and activities of a project manager. Which skill do you think is most important? Why?
Describe the activities performed by the project manager during project initiation.
Describe the activities performed by the project manager during project planning.
Describe the activities performed by the project manager during project execution.
Describe the activities performed by the project manager during project closedown.
In which phase of the system development life cycle does project planning typically occur?
In which phase does project management occur?

Answers

Organizations work on information system initiatives to develop new systems or redesign existing ones. An expensive and time-consuming manual process is automated while creating a new system.

Which of the following project management activities and common abilities do you believe is most crucial and why?

A project manager's most important skills include leadership, communication, time management, negotiation, team management, and critical thinking. Also, he or she must be able to stay up with project management trends and make the best use of the available tools.

What part does the project manager play in the success of the company and project?

Project managers (PMs) are in charge of organising, planning, and supervising the execution of projects in a wide sense.

To know more about information visit:-

https://brainly.com/question/15709585

#SPJ1

You can click the tabs at the bottom of a workbook to switch between.

Answers

Notes or screens? I think

When gathering information, which of the following tasks might you need to
perform?
A. Apply standards, such as measures of quality, beauty, usefulness,
or othics
B. Study objects, conduct tests, research written materials, and ask
questions
C. Seek out ideas from others and share your own ideas
D. Fill out forms, follow procedures, and apply math and science

Answers

I think it would be B but I’m not entirely sure.

Answer:

Study objects, conduct tests, research written materials, and ask questions

Explanation:

Which of the components of the box model is transparent and does not take a background color? content padding border margin

Answers

Answer:

the answer is

ও d- margin

Explanation:

⁂ just did the cumulative exam review, hope this helped ☺

Margin is the component of the box model which is transparent and does not take a background color. Thus, the correct option is D.

What is background color?

The background color is, in most of the cases, displayed in the form of an RGB triplet or a hexadecimal code of colors. The three separate pairs of different numbers which are given in the command, represent the different set of color values of the RGB spectrum. The first value in this set stands for the red color, the second color stands for the green color and the last one stands for the blue color.

The background style of the content, padding, and border areas of a box model are specified by the background property of the generating element of the system. Margin backgrounds are the elements which are always transparent in color.

Therefore, the correct option is D.

Learn more about Background color here:

https://brainly.com/question/14928554

#SPJ2

how to make a benefit analysis paper

Answers

The ways to make a benefit analysis paper are:

Establish a background for Your Analysis Identify Your Costs as well as the Benefits Assign a given Amount in dollars or Value to all of Cost and BenefitLink all the Total Value of Benefits and Costs and then make comparison.

What is a benefit analysis report?

A cost-benefit analysis is known to be the act of making a comparison of the projected or the  estimated costs as well as the benefits (or a given opportunities) that is known to be linked with a project decision to know or tell if if it makes any sense from a given business perspective.

Note that the  Benefit Analysis report gives a kind of clear and concise form of comparisons of work scenarios to reduce over payment and as such, The ways to make a benefit analysis paper are:

Establish a background for Your Analysis Identify Your Costs as well as the Benefits Assign a given Amount in dollars or Value to all of Cost and BenefitLink all the Total Value of Benefits and Costs and then make comparison.

Learn more about benefit analysis from

https://brainly.com/question/199821
#SPJ1

Select the correct answer.
Which relationship is possible when two tables share the same primary key?
А.
one-to-one
B.
one-to-many
C.
many-to-one
D.
many-to-many

Answers

Answer:

Many-to-one

Explanation:

Many-to-one relationships is possible when two tables share the same primary key it is because one entity contains values that refer to another entity that has unique values. It often enforced by primary key relationships, and the relationships typically are between fact and dimension tables and between levels in a hierarchy.

Write a class called Person that has two data members - the person's name and age. It should have an init method that takes two values and uses them to initialize the data members. Write a separate function (not part of the Person class) called std_dev that takes as a parameter a list of Person objects (only one parameter: person_list) and returns the standard deviation of all their ages (the population standard deviation that uses a denominator of N, not the sample standard deviation, which uses a different denominator).


The files must be named: std_dev.py


Here is an example test:


p1 = Person("Kyoungmin", 73)

p2 = Person("Mercedes", 24)

p3 = Person("Beatrice", 48)

person_list = [p1, p2, p3]

print(std_dev(person_list))

Answers

Sure! Here's the code for the `std_dev.py` file for the class called Person that has 2 data members, the person's name and age:

import math

class Person:

   def __init__(self, name, age):

       self.name = name

       self.age = age

def std_dev(person_list):

   ages = [person.age for person in person_list]

   mean = sum(ages) / len(person_list)

   variance = sum((age - mean) ** 2 for age in ages) / len(person_list)

   std_deviation = math.sqrt(variance)

   return std_deviation

p1 = Person("Kyoungmin", 73)

p2 = Person("Mercedes", 24)

p3 = Person("Beatrice", 48)

person_list = [p1, p2, p3]

print(std_dev(person_list))

The code defines a class called Person with two data members, name and age. `The __init__` method initializes these data members with the provided values.

The `std_dev` function takes a list of Person objects as input. It extracts the ages of all the persons and calculates the mean age. Then, it calculates the variance by summing the squared differences between each age and the mean age. Finally, it calculates the standard deviation by taking the square root of the variance and returns the result.

In the example test, three Person objects are created, their ages are added to the `person_list`, and `std_dev` is called on this list to calculate the standard deviation of their ages, which is then printed.

Learn more about data members: https://brainly.com/question/32350097

#SPJ11

what is a basic principle that applies to both internal and external devices?

Answers

A basic principle that applies to both internal and external devices is the need for proper security measures, such as encryption and access controls, to protect sensitive data.

Regardless of whether a device is internal (e.g., within a network) or external (e.g., connected via USB or other interfaces), safeguarding sensitive data is crucial. Encryption plays a vital role in protecting data on both internal and external devices by encoding the information, making it unreadable to unauthorized individuals.

Access controls, such as passwords or biometric authentication, are essential for both internal and external devices to ensure that only authorized individuals can access the data. Implementing these security measures helps maintain the confidentiality, integrity, and availability of data, regardless of the device's location or connection.

Learn more about encryption here:

https://brainly.com/question/28283722

#SPJ11

I CANT DO SKIN MODS ON BRAWLHALLA RIGHT!!!! IM SO MADDDDDDDDDDD

Answers

I'm better then u in brawhlla

which of the following is true about a null attribute? group of answer choices if the column is not null, entering the data for that field is optional if the column is null, entering the data for that field is required. it indicates whether or not the value of the column can be null. a primary key can be null

Answers

A null attribute value is often the same as nothing, it indicates whether or not the value of the column can be null.

What is a null attribute?

However, since there are several ways to describe nothing, it's critical that we utilize exact language: There is a value for a property that represents emptiness (null) Despite existing, a characteristic is worthless (empty) A property doesn't exist (missing)

A certain condition of an attribute denotes emptiness (null) A certain value of an attribute denotes emptiness (for example, -999). it indicates whether or not the value of the column can be null.

Therefore, the null attribute value is often the same as nothing, it indicates whether or not the value of the column can be null.

Learn more about null, here:

https://brainly.com/question/25997106

#SPJ1

Please please help ASAP it’s timed

Please please help ASAP its timed

Answers

Answer:

First Part = def add(numA, numB) : Return numA + numB

Second Part = answer = add(8,2)

Third Part = print (asnwer)

Hope my answer helps :)

what is a workbook? help please

what is a workbook? help please

Answers

Answer:

A wordbook is a book with questions for you to answer.

Explanation:

I used workbooks to learn when I was small, it's like many worksheets in a book. hop this helps :D

PLS HELP ILL GIVE BRAINLY) enter the answer) desktop publishing software enables users to create products for print or __________ distribution

Answers

Answer:

Electronic

Explanation:

Create a C++ program that will accept five (5) numbers using the cin function and display the numbers on different lines with a comma after each number.

Answers

Answer:

code:

#include<iostream>

using namespace std;

int main()

{

//declare an array of size 5

int array[5];

cout<<"Enter the numbers"<<endl;

//applying the for loop

for(int i=0;i<5;i++)

{

   //taking the input from user

   cin>>array[i];

}

cout<<"The Entered numbers are : "<<endl;

for(int i=0;i<5;i++)

{

   //displaying the output

   cout<<array[i]<<", "<<endl;

}

return 0;

}

Explanation:

First of all you will declare an array of size 5

then you are going to apply the for loop logic where you will take input from the user

again you will apply the for loop to print the entered numbers on screen

#include <iostream>

int store[5];

int main() {

   

   for(int i=0;i<5;i++) {

       std::cin>>store[i];

   }

   

   for(auto& p:store) {

       std::cout << p << ",\n";

   }

   return 0;

}

Enabling the iPendant gives motion solely to whom?
A. The PLC
B. The Controller
C. The Operator

Answers

Enabling the iPendant gives motion solely to the operator. Option C is the correct answer.

The iPendant is a handheld pendant device used in industrial automation systems, particularly in robotics. It allows the operator to control and command the motion of the robotic system. By enabling the iPendant, the operator gains direct control over the robot's movements and can manipulate it to perform specific tasks or actions. The iPendant provides a user-friendly interface with buttons, joysticks, and touchscreens that enable the operator to interact with the robot and control its motion accurately.

Option C is the correct answer.

You can learn more about iPendant at

https://brainly.com/question/27250848

#SPJ11

Question 38 of 40
What is efficiency?
A. Doing more than one task at a time
B. The activity of selecting what to do next
C. A measure of output for any given project, task, or activity
D. The ability to do something well without wasted time or effort

Answers

Answer:

The answer should be d i think.

A(n) ____ comment occupies only a single line or part of a line. a. variable b. element c. line d. block. line.

Answers

A line remark only takes up one line or a portion of a line. The best choice is c).

What are the fundamentals of a line?

A line is a simple, one-dimensional shape that may go on forever in the opposing directions. A line may be vertical or horizontal. It can be written either top to bottom or left to right.

What does the line represent?

Depending on the context, the vertical bar (|), sometimes known as the vertical line, horizontal slash, pipe, pipe sign, or upright slash, is a symbol used in arithmetic, computers, and other fields to symbolize a certain kind of logic or action.

To know more about Lines visit :

https://brainly.com/question/28258792

#SPJ4

Whose email address may the agent enter into the applicant information section of LEAN enrollment application

Answers

It is the customer's email address may be entered into the applicant information section of LEAN enrollment application

What is LEAN enrollment application?

LEAN enrollment application is a kind of electronic enrollment program which is specifically designed to make enrollments easier for agent

So therefore, It is the customer's email address which may be entered into the applicant information section of LEAN enrollment application

Learn more about enrollment application:

https://brainly.com/question/18186504

#SPJ1

"failed to login the authentication servers are currently not reachable" how to fix this problem ?

Answers

Most likely a other party sever issue

Which object oriented element is best defined as "an object should have complete authority over its responsibilities"?

Answers

The object-oriented element that is best defined as "an object should have complete authority over its responsibilities" is the principle of encapsulation.

Encapsulation refers to the bundling of data and methods within an object, where the object has sole control over its internal state and operations.

Encapsulation ensures that an object is responsible for managing and manipulating its own data, and other objects can interact with it only through defined interfaces. This principle promotes information hiding, as the internal workings of an object are encapsulated and not accessible to external entities.

By granting an object complete authority over its responsibilities, encapsulation enables better control and organization of the codebase. It helps in achieving modular and maintainable software by limiting direct access to an object's internal state, enforcing proper data handling and validation. Encapsulation also promotes code reusability, as objects with well-defined interfaces can be easily integrated into different systems without impacting their internal implementation.

Overall, encapsulation plays a crucial role in object-oriented programming by promoting the idea of objects having full authority over their responsibilities, leading to more robust, modular, and maintainable software systems.

Learn more about encapsulation here:

brainly.com/question/13147634

#SPJ11

how do you get the regis in pokemon alpha sapphire

Answers


The legendary trio Regirock, Regice, and Registeel are well hidden in Pokemon Omega Ruby and Alpha Sapphire, but they can be found before completing the main story. A few steps must be done before their chambers can be opened. First, you must capture a Relicanth and Wailord.

the programmer usually enters source code into a computer using

Answers

The programmer usually enters source code into a computer using a text editor or an integrated development environment (IDE).

Source code refers to the collection of computer instructions written in a programming language that a computer programmer utilizes to create a computer software program, application, or operating system.

It is often written in a human-readable programming language that is subsequently translated into machine code, which is computer-readable and executable.

The source code is frequently entered into a text editor or an integrated development environment (IDE) by a programmer.

Know more about programmer here:

https://brainly.com/question/23275071

#SPJ11

1.Which one of the following buttons returns a window to its original size?

A.
Maximize button

B.
Close button

C.
Minimize button

D.
Restore button
2.What is the name used to identify the pointer that is controlled by the mouse?

A.
Alert

B.
Boot

C.
Cursor

D.
Drag
3.What is the process called when information from your computer is transferred to another computer?

A.
Upload

B.
Copy

C.
Transfer

D.
Download
4.Which one of the following indicates a file's format?

A.
Icon

B.
Extension

C.
Platform

D.
Driver

5.What term refers to a single directory that can hold a collection of files? A. Platform B. Folder C. Extension D. Icon
6.6.
What term refers to a single directory that can hold a collection of files?

A.
Platform

B.
Folder

C.
Extension

D.
Icon
7.What is the common term used to describe a single computer document?

A.
Driver

B.
File

C.
Screenshot

D.
Icon
8.
What is the main piece of computer software on which every other piece of software relies?

A.
Desktop

B.
Operating system

C.
Database

D.
Driver
BUT DOES ANYONE HAVE AL 20 ANSWERSSSSS I'LL MARK YOU THE BRAINLIEST PLEASEEEE HELPPPP

Answers

Answer:

1. D

2.C

3. D

4. A

5. B

6.B

7.B or D

8.C

Explanation:

Not 100% sure about 3,4, 8

assume the variable planet distances refers to a dictionary that maps planet names to planetary distances from the sun. write a statement that deletes the element with the key 'pluto'.

Answers

To delete an element from a dictionary in Python, we can use the 'del' statement followed by the key of the element we want to remove.

Given a dictionary named 'planet distances' that maps planet names to planetary distances from the sun, we can delete the element with the key 'pluto' using the following statement:

del planet_distances['pluto']

This will remove the key-value pair for 'pluto' from the dictionary.

In summary, to delete an element with a specific key from a dictionary in Python, we can use the 'del' statement followed by the key of the element we want to remove, as demonstrated in the statement 'del planet_distances['pluto']' to remove the 'pluto' key-value pair from the 'planet distances' dictionary.

To learn more about Python, visit:

https://brainly.com/question/30427047

#SPJ11

which mode allows an intrusion detection system (ids) to inspect a copy of every packet on a network?

Answers

The mode that allows an intrusion detection system (IDS) to inspect a copy of every packet on a network is known as promiscuous mode.

How to determine the mode that allows an intrusion detection system?

The mode that allows an intrusion detection system (IDS) to inspect a copy of every packet on a network is known as promiscuous mode.

In this mode, the IDS is connected to a network tap or a switch span port, which allows it to capture and analyze all the packets passing through the network.

By inspecting every packet, the IDS can detect and alert on any suspicious or malicious activity, such as unauthorized access attempts, network scanning, or data exfiltration.

This helps to enhance the security posture of the network and protect against various types of cyber threats.

Learn more about mode

brainly.com/question/30891252

#SPJ11

Please help!!
What does a for loop look for in the sequence of
data? Check all that apply
the first variable
the second variable
the third variable
the last variable

Answers

Answer:

The first and last variable

Explanation:

Answer:

A) the first variable and D) the last variable

Explanation:

because i said so, you're welcome !

What is the value of the var variable after the execution of the following snippet of code:
int var;
var = -1;
var = var - 1;
var = var - var;

Answers

Answer:

The value of var is 0

Explanation:

Given:

The code snippet above

Required

Find the value of var after program execution

This line declares var as type integer

int var;

This line initializes var to -1

var = -1;

This line subtracts 1 from var; var - 1 = -1 -1 = -2

var = var - 1;

At this stage the value of var is -2

This line subtracts the value of var from var; i.e. -2 - (-2) = -2 + 2 = 0

var = var - var;

At this stage, the value of var is 0

Other Questions
What is the output value (T/F) lauren can be described as assertive because she has strongly held convictions and expresses her convictions publicly. Which earthquake was used as an example for liquefaction destruction on the pnsn website? charismatic leaders are likely to cultivate relationships with group members by The coordinate of an object is given as a function of time by 8=7t-3t2, where is in radians and t is in seconds. Its angular velocity at t =3s is:O-11 rad/sO -3.7 rad/sO 1.0 rad/sO 3.7 rad/sO 11 rad/s dentify the methods used to compensate for the scarcity of resources in the ancient world.Neolithic humans built their dwellings to take advantage of solar and wind power be easily carried from place to place last only during the planting season contain their domesticated pets Find the value of the exponential function e at the point z = 2 + ni Given the functions (z) = z z and g(z) = 3z 2, find g o f y f o g. Find the image of the vertical line x=1 under the function (z) = z. What is |-x| >(less than or equal to) 3 1. Economics is the science that studies: a. How the scarce needs and resources of society are managed. b. How is wealth distributed in society? c. How scarce resources are managed in view of the unlimited needs of society and the way in which people make decisions. d. The behavior of companies and consumers in the market. and. None of the above. Which hipaa standard requires providers and their business associates to put in place policies and procedures that ensure privacy of the health record?. Question(1 point)A fish normally displace its ownOA) none of the other answersB) volumeC) weightOD) all the other answers You were asked to simplify the following algebraic expression:1/4+5x+1/4 The fourth term of the sequence is 216 the sixth term is 96 Please helppp ASAP Content attributionQUESTION 12 1 POINT53mFind the LCD for 5/m2+9m+20, 3m/m2+11m+28 A person fires a gun close to a wall (40m). An echo is heard 0.24 after the original shot. Based on this information only, find the speed of sound in air? Which pre-columbian civilization was the earliest to exist? question 4 options: inca toltec maya aztec 2k=18. find the value of k Help me pleaseeeeeeeeeeeeeee You return from a trip with 130 British pounds. How much are your pounds worth in U.S. dollars? How important is color in art? Do you think a black & white piece can have the same visual impact as one in color? Please provide examples from the text (title and page number) to illustrate your opinion.