Develop a plan for data conversion and system changeover

Assignment Help Computer Networking
Reference no: EM13835612

System Design Part A

The Willowbrook School staff accepted your interface, output, input, and data designs. Now you will determine the system architecture, which translates the logical design of an information system into a physical blueprint.

Tasks

1. Design a system architecture for Willowbrook School based on file server or client/server architecture? Discuss advantages and disadvantages that should be considered when making this decision within the context of Willowbrook School. Speak to the cost-benefit
issues of file server and client/server designs.

2. Based on your chosen architecture from task 1, what physical and logical network topology would you recommend for Willowbrook School?

3. Now that you have developed a systems architecture and physical topology for the network, make a list of the hardware that will be required for Willowbrook. Review the background information in previous chapters to develop your list.

4. Write a system design specification document for Willowbrook's new information system.

System Design Part B

The systems design has been completed and design specifications approved. You are now beginning the implementation phase of the SDLC, which includes application development, installation, and evaluation. One of the parents at Willowbrook has extensive experience with the database package as a Database Administrator at a local company, and has committed to providing 15 hours per week working with you to develop and test the project. You should assume that the server, switch, and workstations discussed in Part A have been purchased,
installed, and networked.

Tasks

5. Choose an application development methodology for the Willowbrook system. Discuss the advantages and disadvantages of structured, object oriented, and agile development.

6. What types of testing should be performed? What types of test data should be used?

7. Identify the specific groups of people who need training on the new system. For each group, describe the type of training you would recommend and list the topics you would cover.

8. Develop a plan for data conversion and system changeover that specifies which data items must be entered, the order in which the data should be entered, and which data items are the most time critical. Discuss what method should be used for system changeover.

Reference no: EM13835612

Questions Cloud

Permanent collection of the indianapolis museum of art : You will be writing a compare/contrast essay based upon two works of art from the permanent collection of the Indianapolis Museum of Art. The works you choose should be from the time period we study in this course: Prehistoric through Gothic
Describe a decision tree how such a tool can be utilized : Describe a decision tree how such a tool can be utilized
Find a description in a computer or business magazine : Analyze Toromont and its business model using the value chain model - How well did Toromont's systems support its business model? What management, organization, and technology factors were responsible for its problems?
How is quality of healthcare data defined : How is quality of healthcare data defined
Develop a plan for data conversion and system changeover : Develop a plan for data conversion and system changeover that specifies which data items must be entered, the order in which the data should be entered, and which data items are the most time critical.
Create an annotated bibliography : Create an annotated bibliography
Inadequate pay for performance : No clear link between strategy and the operating budget. Lack of individual accountability for results. Lack of meaningful performance measures. Inadequate pay for performance.
Evaluate capital project technique and cost of capital : Evaluate capital project techniques and cost of capital valuation
Manipulation is a potential concern in money markets : Manipulation is a potential concern in money markets, particularly when a commercial bank holds a profitable position in which it can gain from may be an increase in interest rates.

Reviews

Write a Review

Computer Networking Questions & Answers

  Explaining sliding window protocol with the window size

Terminal A is sending data to terminal B using a sliding window protocol with the window size equal to 5 and the maximum sequence number equal to 6.

  Describe and implement virtual local area networks

Describe and implement Virtual Local Area Networks (VLANs) on a computing network. Compare and contrast dynamic routing, distance vector routing, and link-state routing protocols.

  Advantages and disadvantages of remote access solution

Describe whether or not your network design will support dial-up or VPN remote access by using descriptions of following aspects: advantages and disadvantages of remote access solution.

  What problem area would the internet intervention address

What problem area would the internet intervention address

  Discuss some of the malicious things thomas can do

Suppose Ali and Jim are sending packets to each other over a computer network.

  Determine size of address block to request from isp

Determine size of address block must you request from your ISP? How many class C equivalent addresses would you require? How many subnets would you have left over from your allocation?

  Justify whether or not network design will support vpn

Justify whether or not your network design will support dial-up or VPN remote access using descriptions of the following aspects: the advantages and disadvantages of your remote access solution.

  Wide area network configurations and connections

Explain how your network addresses the needs of Western County Bank in the following areas: Wide area network configurations and connections

  Create visual examples for four topographies

Create visual examples for four topographies- a bus, ring, star and mesh topography. Copy and paste the provided shapes below into a Microsoft Word document.

  What are the primary differences between tcp and udp

What are the primary differences between TCP and UDP. Would you recommend UDP or TCP for a voice over IP phone call? Justify your choice

  Many organization struggle with writing policies

Information Security Policy. An Information Security Policy is the cornerstone of an Information Security Program. It should reflect the organization's objectives for security and the agreed upon management strategy for securing information.

  Describe the use of network management

Explain how the components of an information technology system interrelate in an organizational context. Describe the use of network management, Web, wireless, and mobility technologies.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd