Describe the context of an information system

Assignment Help Basic Computer Science
Reference no: EM13836121

Further background: Youth assigned to a headspace case worker may subsequently be admitted to the Emergency Department (ED) of the local regional hospital. Currently there is no requirement for the ED staff to notify the headspace case worker when a client has been released. Sometimes case workers are notified, but often not. It means that days and even weeks can transpire before a case worker becomes aware of that release. In the mean time the young person tends to return to their previous environment and circles of influence, without the coping and support mechanisms that a case worker can provide.

Outputs should include the following:
• A draft Project Vision.
This sets out the business case, and summarises other aspects of the project, including 'needs and features', and other product requirements.

  • Functional Requirements Specification.
    This should involve a Use Case Model, backed up by short use case descriptions. There should be at least one full use case description for a critical core use case; this could be an Emergency Department admission, or inter-agency communication, such as between a public hospital psychiatrist and a headspace case worker. (Identifying critical core use cases allows us to address the issue of project risk).
  • Please note: Prior to the mid session break further information will be released in the Interact subject site. This is to mirror what often happens in real life. It will further build up the case study.

RationaleThis assessment has been designed to allow students to test and demonstrate their topic understanding related to:

  • describe the context of an information system;
  • compare the range of requirements gathering techniques;
  • describe and apply feasibility study methods and approaches;
  • develop system requirements models

Reference no: EM13836121

Questions Cloud

What are some of the conventions of academic writing : What are some of the conventions of academic writing
Difference between conventional and modern software project : Difference between conventional and modern software project management.
Write a memo one page for given articles : Write a memo one page for both articles- You reflect on the readings and lectures for a week. Primary reflection memos will consist of critical evaluation of lecture and reading material
Using balance sheets compute working capital : Applied Managerial Finance FINC615- 1530A-02 - Using balance sheets, compute working capital. Provide your analysis regarding working capital.
Describe the context of an information system : Describe the context of an information system; compare the range of requirements gathering techniques; describe and apply feasibility study methods and approaches; develop system requirements models
English short story mood analysis : English Short Story Mood Analysis
Explore a significant supreme court or state legal decision : For this week's discussion, explore a significant Supreme Court or state legal decision that dealt with the rights of people with mental illness, either mentioned above or found elsewhere
Identify five deficiency in queensland health payroll system : Identify 5 deficiencies in the Queensland Health Payroll System project, and provide recommendations on how these deficiencies may be overcome in future projects.
What is the purpose of monitoring consumer behavior : What is the purpose of monitoring consumer behavior? How are consumers monitored in a brick and mortar store and how are they monitored online

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Procedure for checking suitcases for secret compartments

You are responsible for checking suitcases for secret compartments in which bulky items like jewelry might be hidden. Explain procedure you would follow to check for these compartments.

  How many members of the group like all parties

while two dislike the Liberals, NDP, and Green Party; three dislike the Conservatives, New Democrats, and Greens; and four dislike the Conservatives, Liberals, and Greens. Two people dislike all four parties. How many members of the group like all..

  Why supply-demand-equilibrium price different in short term

Price of product in short-term and long-term also describe why you believe supply, demand, or equilibrium price will be different, if at all, in short-term and long-term.

  Strayer databases to research the advantages

Use the Internet or Strayer databases to research the advantages, features, and common examples of OOP and EDP. Note: You may use the Association for Computing Machinery (ACM) Digital Library to support research on the above topics. Instructions deta..

  Calculate the total price based on several key parts

Calculate the total price based on several key parts required to build a state-of-the-art gaming computer. The user will have the option of selecting different parts. For example, Windows 7, Windows 8 or Mac OS/X for Operating systems, 4 GB, 8 GB or ..

  Discuss which types of portfolio seem best suited

Discuss which types of portfolio seem best suited for you, considering the specific IT areas you have targeted. Would a PDF portfolio, which you can e-mail, or a website be best

  How to copy multiple files from anywhere to anywhere

Shell scrips are used in Linux to automate complicated and repetitive tasks. Such scripts often use variables, pipes, parameters and grep to achieve the desired outcome.

  Create a gui application with jframe

Create a GUI application with JFrame that contains five labels describing reasons that a customer might not buy a specific product (e.g. "too expensive"). Place a JButton on the JFrame, and code its functionality so that every time the user cl..

  Identify possible areas in which research can be extended

What is the main research problem addressed in the article? Summarize the research questions in a few sentences.

  Creating a apa outline for my netw250 class from devry

Creating a APA outline for my NETW250 class from Devry

  Service in spite of ip unreliable service

TCP creates a reliable data transfer service, in addition to IP's unreliable best-effort service. Study this statement, and in your own words, summarize how TCP provides a reliable data transfer service.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd