Provide a goms description of the procedure, Basic Computer Science

Assignment Help:

Question :

(a) You want to perform the task of sending an e-mail message to three of your friends. You can assume that the email addresses, of the people you want to send the e-mail to, are already in your address book.

(i) Provide a GOMS description of the procedure.
(ii) Provide a Hierarchical Task Analysis of the same procedure.

(b) The university is putting in place a new library system that should improve the efficiency of the resource centre. You are to use CUSTOM to identify the requirements of the different stakeholders. Classify the following roles according to the different stakeholder categories available for CUSTOM.

• Students
• Librarians
• Lecturers
• Head of School
• Programmers
• Registrar
• Chairman of School board


Related Discussions:- Provide a goms description of the procedure

Read only memory (rom), Read only memory (rom): The problem with RAM is...

Read only memory (rom): The problem with RAM is that its memory is volatile, i.e. it loses all its data when the power supply is removed.  A non-volatile memory is a permanent

What is a socket, QUESTION (a) You have been asked to design and implem...

QUESTION (a) You have been asked to design and implement a chat application. Which protocol would you used TCP or UDP? Justify your answer. (b) Explain why multithreading is

Multiprocessor dsp systems, Multiprocessor DSP Systems Over modern time...

Multiprocessor DSP Systems Over modern times several organizations have provided forums made up of several DSPs. More lately, semiconductor organizations have been providing sn

Types of software interface, different types of software interfaces which f...

different types of software interfaces which falls in different categories

What is a Process and process mangemen in operating system? , A process is ...

A process is a chronological program in execution. The constituents of a process are the following: • The object program to be executed ( described the program text in UNIX) • Th

Pseudocode, How Much Insurance? Many financial experts advise that property...

How Much Insurance? Many financial experts advise that property owners should insure their homes or buildings for at least 80 percent of the amount it would cost to replace the st

Artificial intelligence research, Artificial Intelligence research: Art...

Artificial Intelligence research: Artificial Intelligence research may be describe  in terms of how the following question has been answered: "How are we going to get a comp

Two-tiered architecture, Two-tiered architecture: This approach basic...

Two-tiered architecture: This approach basically introduced a database server to replace the file server. The emergence of relational database management systems and graphica

Calculate simple interest -algorithm, Algorithm : 1. Read the values of pri...

Algorithm : 1. Read the values of principal amount, time and rate of simple interest into the locations labelled as P, T, R. 2. Set the count T to 1 implying the end of a year. 3.

Ip basics, IP provide connectionless service to upper layer IP protocol is ...

IP provide connectionless service to upper layer IP protocol is very simple could not guarantee the reliability of transportations IP protocol is Point to Point IP provide the unif

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd