Design a multidisciplinary research project applying

Assignment Help Computer Engineering
Reference no: EM133258570

System Analysis and Design

ASSIGNMENT

Note: Indicate references used (print and non-print books and journals)

What are information systems, and who are the stakeholders in the information systems game?
Define systems analysis and relate the term to the preliminary investigation, problem analysis, requirements analysis, and decision analysis phases of the systems development methodology.
What are the six general skills all project team members should have?
Describe a number of systems analysis approaches for solving business system problems.
Describe the preliminary investigation, problem analysis, requirements analysis, and decision analysis phases in terms of your information system building blocks.
Describe the preliminary investigation, problem analysis, requirements analysis, and decision analysis phases in terms of purpose, participants, inputs, outputs, techniques, and steps.
Describe the three dimensions of feasibility analysis.
What factors are used to determine project size?
Describe a "risky" project in terms of technical feasibility. Describe a project that would not be considered risky.
What are the steps for assessing economic feasibility? Describe each step. List two intangible benefits. Describe how these benefits can be quantified. List two tangible benefits and two operational costs for a system. How would you determine the values that should be assigned to each item?

MINI CASE

Barbara Singleton, manager of western regional sales at the WAMAP Company, requested that the IS department develop a sales force management and tracking system that would enable her to better monitor the performance of her sales staff. Unfortunately, due to the massive backlog of work facing the IS department, her request was given a low priority. After six months of inaction by the IS department, Barbara decided to take matters into her own hands. Following the advice of friends, Barbara purchased a PC and simple database software and constructed a sales force management and tracking system on her own. Although Barbara's system has been "completed" for about six weeks, it still has many features that do not work correctly, and some functions are full of errors. Barbara's assistant is so mistrustful of the system that she has secretly gone back to using her old paper-based system, since it is much more reliable. Over dinner one evening, Barbara complained to a systems analyst friend, "I don't know what went wrong with this project. It seemed pretty simple to me. Those IS guys wanted me to follow this elaborate set of steps and tasks, but I didn't think all that really applied to a PC-based system. I just thought I could build this system and weak it around until I got what I wanted without all the fuss and bother of the methodology the IS guys were pushing. I mean, doesn't that just apply to their big, expensive systems?" Assuming that you are Barbara's systems analyst friend, how would you respond to her complaint?

COURSE PROJECT

Design a multidisciplinary research project applying the concepts and principles of Advanced System Analysis and Design with Quality Control. ( Submit research title for discussion and approval)

The project must be industry-based, you are required to write a formal letter asking for the approval of the industry you wish to conduct the study.

A memorandum of agreement must be signed with the industry as a proof of acceptance to have a collaborative research with the industry partner identified. After completing the project, implementation will take place. You will also monitor the implementation of the project.
The project can be done in tandem. (You can select your own partner)

The research project will be presented in a research colloquium (your class will organize research colloquium for your presentation.

Reference no: EM133258570

Questions Cloud

Show step by step putting each law : ENGR 207 Zewail University of Science and Technology Using the laws of logical equivalence, show step by step putting each law it must be same as the right hand
Problem based on rape in i know why the caged bird sings : Construct a synthesis-style, documented argumentative essay based on rape in I Know Why the Caged Bird Sings by Maya Angelou.
What changes need to be made to the workstation : Describe the current work area at home to show what it looks like Based on the OSHA checklist, what changes need to be made to the workstation?
Discuss how they are pushing their agenda : Discuss how they are pushing their agenda (mechanisms used to influence policy makers) key obstacles, and spending (consult Center for Responsible Politics)
Design a multidisciplinary research project applying : EE 563 Yuan Ze University Design a multidisciplinary research project applying the concepts and principles of Advanced System Analysis and Design with Quality
Is there any transaction schedule that is recoverable : In database systems transaction theory, Is there any transaction schedule that is recoverable but not cascadeless?
Review the concept of a supply chain management : INFO 1113 Kwantlen Polytechnic University Review the concept of a supply chain management. Although Passing Lane offers services rather than products
What you think about the article : A reaction to a KHN article from the previous week. Students can pick any KHN article from the week, What you think about the article
Identify and explain an alternative solution : CS 6300 Harward Institute of Management & Technology Identify and explain an alternative solution to avoid having your own Data Centre housed with Window server

Reviews

Write a Review

Computer Engineering Questions & Answers

  Explain why you believe planning is important

Explain in your own words why you believe planning is important. Select one of the following businesses: a large bank, a government agency, or a hospital.

  What types of users are there to information security chain

Do you agree that people are the weakest link in the information security chain? If yes, what types of users are there to the information security chain.

  Read a sentence as input and converts each word

Write a java program in netbeans or eclipse that reads a sentence as input and converts each word to "Pig Latin".

  Questionfind nearby pair and most-distant pair from a given

questionfind nearby pair and most-distant pair from a given point.produce two random integer numbers between 1 and 200.

  Create a symbolic equation for het capacity

Empirical constants do not have physical meaning but are used to make the equation fir the data. Create a symbolic equation for het capacity and solve it for T.

  Make use of apa for referencing and citation

Your database is performing poorly, and you just began this new job within the past month. You ask to see the documentation for the system and are told it does not exist.

  Define saml and describe its purpose

Define and describe both SSO and IDaaS. Define SAML and describe its purpose. List factors that make mobile ID management difficult.

  Identify a case study with an appropriate situation

Identify a case study with an appropriate situation related to penetration testing or hacking for or against a business, organization, or government facility.

  What would be the error of the training set

If we used the above k-NN algorithm to score the training data, what would be the error of the training set? What is the best k? What does it mean?

  Questiontwo stacks of positive integers are required both

questiontwo stacks of positive integers are required both containing integers with values less than or equal to 1000.

  Explain when to use the different types of loops

Explain when to use these different types of loops. How do you include a ‘loop' structure programming in Python? How do you control a loop?

  Describing the main components and users of the system

Decompose the application using data flow diagrams, system architecture diagrams, and a table describing the main components and users of the system

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd