Explain the concept of alternative matrix

Assignment Help Management Information Sys
Reference no: EM132170440

Question One

Explain the concept of “Alternative Matrix”, and give an example of comparison using this form of Matrix to presentthree acquisition methods.

Note: Do not use the slides or Book example.

Question Two

Suppose you are hired by a mega service company (e.g., Saudi Electricity Company).  Your new role is the Chief IS Architect in charge of overseeing the establishment of the e-Business Infrastructure.  The company decided to offer services through an Electronic Customer Relationship Management Channel or (e-CRM).

Here are the major requirements for the IS Architecture:

•     The company has more than 25 Million customers including individuals, enterprises, and government institutes.

•    Customers’ records are stored into a DB2 server from IBM running MVS operating system.

•    Employees and suppliers files are stored on an Oracle database to facilitate end-to-end eProcessing.

•    Individual customers can access the new e-CRM using multiple platforms including mac, windows as client PCs, tablets and smart phones (iOS and Android) as handheld devices.

•    Underno circumstance, shall the customers be allowed to access the back-end DB.

•    There are 2 intermediate layers that reside between users and the enterprise IS.

•    Customers are given the authority to establish/modify/configure services online, so all communication with customers are encrypted and strong authentication mechanism is in place.

Based on the given requirements, complete the diagram below with the necessary information, write the required information on the space provided.

Question Three

Suppose you have to perform requirement analysis for a web-based forum system. There are only two type of users that interact with such a system: regular users and administrators. Each type of user has different set of responsibilities. Both type of users can sign in to the system, and part of signing in is an internal authentication process. Both type of users can also register with the system, which also uses internal authentication.

After logging in, everyone can post new messages to the board, however only administrators can check statistics and create new threads. Regular users can send private messages to other users, while administrators do not have this ability. 
Draw a use-case diagram that contains actors, use cases and their relationship from the scenario described above.

Question Four

Consider an abstract class Duck, representing all available ducks. Every duck can quack and walk, which are their publicly accessible functionalities.

While every duck walks the same way, they quack differently which makes quacking an abstract feature of a duck. Every duck has a weight which determines their ability to float, which can be checked by everybody through canFloat method. The weight of a duck can be set through a method available only for all concrete duck implementations

A rubber duck, a kind of a duck, has all the features of a duck (yes, it quacks), but when asked to walk - it acts differently, because a rubber duck can’t walk, so it overrides a duck walk feature and does nothing. Another example of a duck is a wild duck that apart of quacking and walking, can also fly.

Draw a class diagram depicting classes, with names, attributes and methods along with proper relationship between classes. Skip constructors and destructors, but don’t forget to annotate elements visibility using UML notation. For the actual attributes types or method signatures you can use Java notation, if you wish. Precede a name with a ‘/’ symbol to indicate slanted (italicized) text.

Attachment:- Assignment-Questions.rar

Reference no: EM132170440

Questions Cloud

Perform an eco-critical analysis of the movie safe : This term we have covered numerous environmental consequences of man's interactions with nature. One such example is the movie Safe.
Filtering undesirable network traffic from the internet : Filtering the traffic to the Internet that does not adhere to the organizational acceptable use policy (AUP) for the Web
Develop a compensation and benefits package : Utilizing Compensation and Benefits , develop a compensation and benefits package that you would like to be offered from your organization.
Analyze how the character of eyad enables the viewer : In your post analyze how the character of Eyad enables the viewer to question the paramount theme of identity amidst issues of affiliation and belonging.
Explain the concept of alternative matrix : Consider an abstract class Duck, representing all available ducks. Every duck can quack and walk, which are their publicly accessible functionalities.
Program for binary search tree operations : Could you please provide program for binary search tree operations with iterative solutions to do insert, delete and search in any programming languages.
Discuss the ways effective critical thinker assesses claims : The video clip, "The Baloney Detection Kit," this week discusses the ways an effective critical thinker assesses claims made by others.
How well does the psa appeal to the audience : Make judgements about what you are writing about and to assess the research/sources you use in your writing - Why or why not was the PSA effective?
Why you think it is being overlooked by people : Explore the internet and find what you think is a worthwhile artistic expression from somewhere in the world that you are unfamiliar with.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Prepare a plan to communicate with key stakeholders

Apple is about to release its latest technology. The company needs to prepare a plan to communicate with key stakeholders about the release.

  Would you like to have a job for which you telecommute

A network is a collection of computers and devices connected together. The internet is the world's largest computer network.

  Is change control necessary for use of modified technologies

Is change control necessary for use of modified technologies? How and in what possible ways? Among the three (3) primary areas of responsibility of IT department (technical support, system development, and operations), which of them plays an essen..

  How can technology reduce errors in medical coding

Based on your past experiences or research and the knowledge gained during your coursework, consider the following question, and post a substantive initial post: How can technology reduce errors in medical coding while helping organizations remai..

  What you need to know about supply chain managementhow do

what you need to know about supply chain managementhow do you see the concepts of supply chain management being a force

  Draft an executive summary to the dr plan

Draft an executive summary to the DR plan and explain the purpose of the plan and high-level specifics for upper management.

  Examine the cannibalization strategy

Examine how firms can use social IT in alignment with organizational strategy and IS strategy. Consider collaborative capabilities, what, how, and who should use social IT for a social business strategy.

  Provide insight into likelihood of certain threats occurring

Once the protocols have been analyzed, students will synthesize this knowledge to provide insight into the likelihood of certain threats occurring. The skills acquired from this exercise will prove to be beneficial during the final stages of design..

  Find an article about model using machine learning approach

Select three areas of interest. For each area of interest select at least 3 articles related to this area of interest where the authors have proposed.

  The ipacs project- when it hits the fan

Read the case The IPACS Project: When IT Hits the Fan. As you read the case think about it three-sphere model terms. After reading through the case, please create a post containing the following: Three problems that occurred during the project

  How does the principles of information technology

What are the two important features of a help desk that you have learnt from Chapter 6 (Help Desk Operation) from the textbook? Supplement it with any literature [300 words;]

  What can be done to limit software errors

The largest power blackout in North American history hit the northeastern United States and southeastern Canada. More than 50 million people lost power, some for up to two days. At least 11 people died as a result of the blackout. Total cost: $6 b..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd