Provide a goms description of the procedure, Basic Computer Science

Assignment Help:

Question :

(a) You want to perform the task of sending an e-mail message to three of your friends. You can assume that the email addresses, of the people you want to send the e-mail to, are already in your address book.

(i) Provide a GOMS description of the procedure.
(ii) Provide a Hierarchical Task Analysis of the same procedure.

(b) The university is putting in place a new library system that should improve the efficiency of the resource centre. You are to use CUSTOM to identify the requirements of the different stakeholders. Classify the following roles according to the different stakeholder categories available for CUSTOM.

• Students
• Librarians
• Lecturers
• Head of School
• Programmers
• Registrar
• Chairman of School board


Related Discussions:- Provide a goms description of the procedure

Arrays and strings, This is a C file. 1. The program starts by printing you...

This is a C file. 1. The program starts by printing your name with an end sign ">". For example, "NAME >"; 2. Then, you can type in a string. If the string is not "vi xxx", you pri

Widening web, The Widening Web The idea, the whole world is agog...

The Widening Web The idea, the whole world is agog now had accidental origins. Here is how it all began. In early 1969, the U.S. Defence department financed a network fo

How is the ack request formed, QUESTION a) The handling of the INVITE t...

QUESTION a) The handling of the INVITE transaction in SIP is completely different from the handling of other transactions. The handling of the INVITE is one of the most complex

Briefly explain html and xml, Question 1 Briefly explain principles of eff...

Question 1 Briefly explain principles of effective navigation Question 2 Explain the terms URI and URL. Why should you use Relative URI? Question 3 What are the di

How to avoid race conditions with critical section?, • The key to preventi...

• The key to preventing problem involving shared storage is get some way to prohibit more than one process from reading and writing the shared data concurrently. That part of the p

Explain the important features of creational patterns, Question 1 Explain ...

Question 1 Explain the role of object oriented designers in developing a software system Question 2 What are the four essential elements of design patterns? Explain Question 3

Encoders, compare encoders and multiplers

compare encoders and multiplers

Rom, what is rom

what is rom

Why is the random class in the .net framework not suitable, QUESTION (a...

QUESTION (a) (i) Why is the Random class in the .NET framework not suitable for generating random bytes for cryptography purposes? (ii) Mention two characteristics required

Overview of a computer system, Overview of a Computer System The...

Overview of a Computer System There are three major elements in every computer solution. They are:     Data     Hardware     Software Hardware + Softwa

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd