What do you think of these arguments and why

Assignment Help Computer Engineering
Reference no: EM133482171

Question: Some systems analysts argue, "Give users what they ask for. If they want lots of reports and reams of data, then that is what you should provide. Otherwise, they will feel that you are trying to tell them how to do their jobs." Others say, "Systems analysts should let users know what information can be obtained from the system. If you listen to users, you will never get anywhere because they really don't know what they want and don't understand information systems." What do you think of these arguments and why?

Reference no: EM133482171

Questions Cloud

Logically arrange the essential concepts : logically arrange the essential concepts about threads and process synchronization into a hierarchy of nodes that branch from the main idea
Explain your reasons for choosing each language : Explain your reasons for choosing each language, identifying the benefits and potential limitations depending on future changes.
Describe the role of the consensus model for aprn : What standardized decision-making tool has created to guide nurses at all levels to make practice decisions? Describe the role of the Consensus Model for APRN.
Data warehouse and strong management leadership : Powered by a real-time data warehouse and strong management leadership around data, the company has dramatically changed all aspects of its business
What do you think of these arguments and why : what they want and don't understand information systems." What do you think of these arguments and why
Are there professional healthcare organization in america : Are there any professional healthcare organization in America that are involved in depression screening?
Discuss computer network defense in terms : Discuss Computer Network Defense in terms of the fundamental purpose and discuss one key element of it.
What does that look like in your own life : EDL 822- What does that look like in your own life? How are you flourishing? How are you helping others to flourish?
Evaluate the effectiveness of digital time management : How can we evaluate the effectiveness of digital time management tools and determine whether they are a good fit for our needs and preferences

Reviews

Write a Review

Computer Engineering Questions & Answers

  What is the corresponding c statement

For the contents of registers $s0 and $s1 as specified above, what is the value of $t0 for the following assembly code?

  Write a java program to accept a 3x4 integer array from user

Write a Java program to accept a 3x4 integer array from user. You are required to find the row or column having maximum number of prime numbers.

  CIS5308 Management of Information Technology Services

CIS5308 Management of Information Technology Services Assignment help and solution, University of Southern Queensland - assessment writing service

  Implement an interpreter for algebraic chess notation

Implement an interpreter for algebraic chess notation, which is a system used to describe the moves made over the course of a chess game. In order to finish this program, you will need to learn a bit about chess: how pieces can move on the game bo..

  Explain porter competitive forces and value chain models

Explain Porter's competitive forces and value chain models then analyze Sears, using the competitive forces and value chain models. APA style referencing

  Which would be a better suited program to use for this

Which would be a better suited program to use for this purpose: a word processing application or a spreadsheet application? (You may answer that both are

  Write a program that reads in name and salary of an employee

Write a program that reads in the name and salary of an employee. Here the salary will denote an hourly wage, such as $9.25.

  Discuss company identifies acceptable software and permits

A process in which a company identifies acceptable software and permits it to run, and either prevents anything else from running

  What kinds of reports would the users of proposed system

What types of information or data would the users of the proposed system like to have compiled

  Describe the process you used to create the KML file

BUS5DWR - DATA WRANGLING AND R - La Trobe University - How do they differ and in which cases is the KMZ format more suitable over KML

  How can apply that security protocol in real life situations

What encryption standard is currently recommended by NIST and why? Explain your answer with examples. How can we apply that security protocol in real life.

  Write a subroutine to perform the search

A 68000 subroutine is designed to search a table for a longword. On entry, AO contains the starting address of the table to be searched, DO contains.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd