Describe the roles and responsibilities of systems analyst

Assignment Help Computer Engineering
Reference no: EM133706888

Assignment: Assessment & Feasibility of an IT System

Competencies

A. IT systems request and feasibility analysis

B. Analysis and recommendation for the methodology that best suits this project

C. Evaluate methodologies and strategies applicable to information technology research

D. Determine and decompose stakeholder and sponsor business needs to solve complex challenges

E. Design software and hardware technology solutions to best meet business needs

F. Identify potential vulnerabilities using established network practices

Scenario

The scope of this project will be to define the problem (including a problem statement), look at constraints and opportunities, analyze potential risks, ensure business continuity, and provide a comprehensive analysis of internal and external factors to ensure that the project will be successful. You will be responsible to provide a robust analysis and propose a solution to the business problem.

You work for a medium-sized company that is in the travel and leisure industry called AllAboutYourTravel.com. (This is an imaginary company and any similarity to anyone or anything is purely unintentional). AllAboutYourTravel.com is very heavily invested in technology to conduct business. There is a call center of over 200 reservationists that books travel for individual and corporate clients. The reservationist population is expected to swell to 375 during the next peak time 4 months from now. This will now include 24-hour operations with 125 per shift. This can involve hotel, cruise, land packages, car rental, and air travel. There is approximately 250 people in the entire company, including executive management, human resources, the information technology department as well as marketing. You are the liaison between the various departments within the company and the information technology department.

You are tasked with finding a solution to the current reservation system that only allows 100 people in the system at a time and crashes frequently when there are over 90. It is determined that for every hour the system is down, there is a potential loss of $10,000 in revenue. When it crashes, it can take up to 45 minutes to get the system back up. Operations are typically two shifts from 8 a.m. to 4 p.m. and from 4 p.m. to midnight. During 2 peak periods of the year, executive management has decided to add a third shift from midnight to 8 a.m. with an additional 125 reservationists bring the total to 375. Marketing did a great job overseas and there are more and more international calls using the company's services.

The phone system is limited to 115 users and is a voice over IP (VoIP). Overtime is not allowed and each reservationist must work a minimum of 20 hours per week (unless they are out sick or on vacation. Some reservationists have had their hours cut so that their fellow employee can meet their 20-hour minimums to keep their fringe benefits like medical coverage. This has happened since only one reservationist can access the current reservation system at a time (no sharing) and again there is a limit to the two major systems that every reservationist uses. There is a third system each reservationist uses to look up fares and rates for various travel components previously listed (e.g. cruises, airfare, etc.). Currently there is no interface between the company reservation system and the individual vendor's lookup systems. There are dozens of vendors.

Instructions

Create a PowerPoint presentation of 8 - 14 slides (not counting the cover slide or reference slide) that is informative, engaging with thorough speaker notes. Consider this something you would be presenting in a group setting. The target audience will be the leadership of the organization. The speaking notes should be written in complete sentences. Avoid text heavy slides.

The presentation should include:

A. A cover slide with the organization's name. Speaking notes on the organization should be included.

B. An explanation of what an IT systems request and feasibility analysis contains. Include how business needs shape the requirements.

C. Identify three possible methodologies for a technology project with the pros and cons of each type.

D. Describe the roles and responsibilities of the systems analyst, software developer, stakeholder, executive sponsor and end-user in an information technology project life cycle.

E. Analysis results and recommendation for the methodology that best suits this type of project.

F. Identify all the business needs of the above scenario and how your recommendation will solve the complex challenges.

G. Describe the proposed solution in detail and what scope creep is and how you plan to avoid it.

H. Include a detailed budget for the software and hardware needs.

I. Explain possible vulnerabilities in the system and solutions to mitigate.

J. Close with a summation of immediate steps you recommend.

K. Include thorough speaking notes for each slide.

Reference no: EM133706888

Questions Cloud

Maximization to trace out pikachus demand curve : With this new income ($220) and assuming the price of apples is fixed at $3, use utility maximization to trace out Pikachu's demand curve for ketchup
Difference between delirium-dementia : What are your priorities? Please address the difference between delirium and dementia as it applies to this case. Discuss key education components.
Discuss the purpose of the risk plan and risk identification : Discuss The purpose of the risk plan, Risk identification, Risk analysis and Risk monitoring, controlling, and reporting.
Does this competitive bundle maximize social welfare : Does this competitive bundle maximize social welfare? Find one allocation that would improve the overall social welfare based on this function.
Describe the roles and responsibilities of systems analyst : Describe roles and responsibilities of systems analyst, software developer, executive sponsor and end-user in information technology project life cycle.
Impact of the opioid crisis on communities : So many critical issues to explore in our world today! Let's look at the impact of the opioid crisis on communities.
Calculate the utility of anne and bob : Calculate the utility of Anne and Bob for the following allocations. Note that the allocations are given in the format (xA, xB, e). i. A
How would nurse actualize parses theory of human becoming : Based on this case study how would the nurse actualize Parse's theory of Human Becoming?
Knowledge of cellular biology to develop more targeted : In the context of cellular adaptations, injury, and death, how can nurse practitioners apply their knowledge of cellular biology to develop more targeted

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd