Provide a goms description of the procedure, Basic Computer Science

Assignment Help:

Question :

(a) You want to perform the task of sending an e-mail message to three of your friends. You can assume that the email addresses, of the people you want to send the e-mail to, are already in your address book.

(i) Provide a GOMS description of the procedure.
(ii) Provide a Hierarchical Task Analysis of the same procedure.

(b) The university is putting in place a new library system that should improve the efficiency of the resource centre. You are to use CUSTOM to identify the requirements of the different stakeholders. Classify the following roles according to the different stakeholder categories available for CUSTOM.

• Students
• Librarians
• Lecturers
• Head of School
• Programmers
• Registrar
• Chairman of School board


Related Discussions:- Provide a goms description of the procedure

Explain data movement ?, In any program it is essential to move the data in...

In any program it is essential to move the data in the memory and in the CPU registers; there are a number of ways to do this: it can copy data in the memory to a number of registe

Explain FDM : Frequency Division Multiplexing, Frequency Division Multiplex...

Frequency Division Multiplexing : FDM is an analog technique that is applied when he bandwidth of link is greater than the combined bandwidth of the signals to be transmitted. a

Concept of instruction, Concept of instruction: The CPU is a semicondu...

Concept of instruction: The CPU is a semiconductor integrated  circuit chip consisting of a large number of transistors. In personal computers, the CPU is also referred by the

Expert system, Develop a simple expert system to pick ten stocks to conside...

Develop a simple expert system to pick ten stocks to consider. Create seven or more rules that could be used in such an expert system. Create five cases and use the rules

Mr, Please what is the different between computer science and information t...

Please what is the different between computer science and information technology? Which of this require too much reading? Thanks

Virtual memory, What is virtual memory? How address mapping is done in cach...

What is virtual memory? How address mapping is done in cache memory? Elaborate your answer with examples.

Logic instructions , They are used to act upon logic operations on the oper...

They are used to act upon logic operations on the operators. AND OR, NEG NOT TEST XOR AND INSTRUCTION Function: It acts upon the conjunction of the operators bit by bit. Syntax: A

Fuction to delete a record in phone book in c, function to delete a telepho...

function to delete a telephone book record in c programing using struct and objects...?

What is Semaphore and explain with example?, Description A semaphore is a...

Description A semaphore is a confined variable whose value can be accessed and changed only by the operations P and V and initialization operation known as ''Semaphoiinitislize''.

Search strategies, Search strategies are evaluated along four main dimensio...

Search strategies are evaluated along four main dimensions. Name those dimensions and briefly describe each one

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd