answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
harkovskaia [24]
2 years ago
8

Discuss how the user-designer communications gap can cause a good project to go bad.

Computers and Technology
1 answer:
Mila [183]2 years ago
3 0
This gap between user-designer communications <span>can cause a good project to go bad i</span>f the user is not able to process what is required to be fixed in order for the project to run smoothly. The user may have one way of fixing something while the designer has another. In this case, the designer understands how the project fully works while the user does not and this may end up compromising the whole project.

The law that “designers are not users” and “users are not designers” should always be followed.




You might be interested in
How has the perception of the hacker changed over recent years? What is the profile of a hacker today?
finlep [7]

Answer:

Hackers frequently spend long hours examining the types and structures of targeted systems because they must use guile, or fraud to bypass the controls placed on information owned by someone else.

Explanation

The perception of a hacker has evolved over the years.

  • The traditional hacker profile was a male, aged 14 to 18.
  • 76% of hackers are men whose ages are between 14 years (8%) to 50 (11%). The average age is 35 years (43%).
  • A hacker is persevering, patient, creative, bright and having a passion for what he does.
  • Hackers today can be expert or novices.
  • The experts create the software and schemes to attack computer systems.
  • While the novices merely use software created by the experts.
4 0
2 years ago
The groups_per_user function receives a dictionary, which contains group names with the list of users. Users can belong to multi
Akimi4 [234]

The groups_per_user function receives a dictionary, which contains group names with the list of users.

Explanation:

The blanks to return a dictionary with the users as keys and a list of their groups as values is shown below :

def groups_per_user(group_dictionary):

   user_groups = {}

   # Go through group_dictionary

   for group,users in group_dictionary.items():

       # Now go through the users in the group

       for user in users:

       # Now add the group to the the list of

         # groups for this user, creating the entry

         # in the dictionary if necessary

         user_groups[user] = user_groups.get(user,[]) + [group]

   return(user_groups)

print(groups_per_user({"local": ["admin", "userA"],

       "public":  ["admin", "userB"],

       "administrator": ["admin"] }))

3 0
1 year ago
At age 16, Cheyenne just got her driver's license. She loves to drive and is thinking of becoming a truck driver, because she he
Ivenika [448]
<span> the answer would be: Does she have or can she develop the strengths needed for this type of work?</span><span />
6 0
1 year ago
Read 2 more answers
The class Date has a single constructor that accepts the integer value: a month- (1 for January through 12 for December), a day
vaieri [72.5K]

Answer:

public class Date{

Public Date(int month,int day,int year){

}

}

void main(){

Date datep=new Date(3,12,2006);

}

Explanation:

Here we declared a class "Date" and defined one public constructor which will take month,day and year. In main we created an object to that Date class by invoking this parameterized constructor and assigned that object to "dateap" Date variable

8 0
2 years ago
Henry, a graphic artist, wants to create posters. Which software should Henry use for this purpose?
Ede4ka [16]

Answer:

which is free graphic software or use

Explanation:

3 0
1 year ago
Other questions:
  • When conducting research, protecting the privacy of patients requires careful attention to ensure ?
    11·2 answers
  • The number of operations executed by algorithms A and B is 40n2 and 2n3, respectively. Determine n0 such that A is better than B
    12·1 answer
  • Interpretations of​ Moore's law assert​ that:
    13·1 answer
  • You'd like to change the minimum password length policy in the Default Domain Policy group policy preference (GPO). What's the b
    10·1 answer
  • Print either "Fruit", "Drink", or "Unknown" (followed by a newline) depending on the value of userItem. Print "Unknown" (followe
    13·1 answer
  • What is an input to the Program Increment Planning process that highlights how Product Management plans to accomplish the Vision
    15·1 answer
  • There are two cons to an OLTP database. Which of the following are a solution of these cons?​
    9·1 answer
  • [20 points] 3.3 Code Practice: Question 2
    7·1 answer
  • 1-(50 points) The function sum_n_avgcomputes the sum and the average of three input arguments and relays its results through two
    8·1 answer
  • In a particular field, there are trees in a l single row from left to right. Each tree has a value V You cut trees from left to
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!