Provide a goms description of the procedure, Basic Computer Science

Assignment Help:

Question :

(a) You want to perform the task of sending an e-mail message to three of your friends. You can assume that the email addresses, of the people you want to send the e-mail to, are already in your address book.

(i) Provide a GOMS description of the procedure.
(ii) Provide a Hierarchical Task Analysis of the same procedure.

(b) The university is putting in place a new library system that should improve the efficiency of the resource centre. You are to use CUSTOM to identify the requirements of the different stakeholders. Classify the following roles according to the different stakeholder categories available for CUSTOM.

• Students
• Librarians
• Lecturers
• Head of School
• Programmers
• Registrar
• Chairman of School board


Related Discussions:- Provide a goms description of the procedure

Cryptography, Consider the one-time pad encryption scheme to encrypt a 1-bi...

Consider the one-time pad encryption scheme to encrypt a 1-bit message m, and assume m is chosen with uniform distribution from message space M={0,1}. Let E1 be the event "message

Digital electronic, draw the logic diagram of 2*4 decoder in only NOR gate ...

draw the logic diagram of 2*4 decoder in only NOR gate .include enable inputs .

Cai, what is cai

what is cai

Algorithms and psuedocodes, write an algorithm and psuedo code for the oper...

write an algorithm and psuedo code for the operation of the cramer`s rule

Optical fibres, Optical Fibres: Coaxial cables have limitations such a...

Optical Fibres: Coaxial cables have limitations such as broadband transmission medium which can be overcome by the use of optical fibres. Optical fibres carry light waves (rep

Evolution of erp , Evolution of ERP  The origin of using computers for ...

Evolution of ERP  The origin of using computers for business, traces the following line of story. Originally, they were designed to support the repetitive and time consuming fu

What is the benefit of Threads?, Following are some causes why we use threa...

Following are some causes why we use threads in designing operating systems. A process with several threads makes a great server for instance printer server. For the reason that t

Keystroke logger and data-stealing, Keystroke logger and Data-stealing: ...

Keystroke logger and Data-stealing: Keystroke loggers: This is a program, once installed on the system, which intercepts the keys when entering the password or the Credit Ca

Digital transmission, Digital Transmission: In digital transmission, w...

Digital Transmission: In digital transmission, wave patterns are translated into discrete bits and are separated by intervals. Bits (contraction for binary digits) are the sma

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd