Identify and describe various roles and key users

Assignment Help Management Information Sys
Reference no: EM133389184

Case: Aggies anywhere is a campus virtual desktop that allow students and faculty anywhere to access North Carolina A&T state University Desktop.

Information system your choosing is VMware horizon to work with a development team to plan and implement website enhancements. This might include adding new features, upgrading current ones, making the site more user-friendly, and making sure the site is accessible to all users. The purpose of this stage is to modify the website so that it is more successful in satisfying the demands of the students. Following the completion of the modifications, test the updated website with a small group of students to obtain feedback. Make any required changes to the website based on their input.

The school gets students to login aggiesanywhere.ncat.edu on the school portal which takes you to VMware horizon. (You can also look this up so you can get an idea on what I'm talking about)

There has been complaining about student's login into their aggies anywhere portal and VMware horizon most of the times does not work when many students are trying to use and it's too slow. It's hard for students to submit their work through the website and most students don't know that there's a aggies anywhere website. The website be down most of the time where students and faculty can't access it. The website is for students and faculty/staff.

These are the 3 issues you should focus on after reading this

Too slow

Not available at times

Most students don't know that there is a aggies anywhere virtual desktop

Project Introduction

a. Project background (Talk about North Carolina A&T state University)

b. Structure of the organization (Talk more about who is aggies anywhere for)

Identify and describe various roles and key users of the system

c. Problem definition (issues)

Issues with the system that the project aims to resolve

d. Project scope (Will you will do to make this successful and what you won't do)

Boundaries and constraints

Information system Requirements

a. Business requirements (why the project is being undertaken)

b. Functional requirements (What users will be able to do with the updated system)

c. Non-functional requirements (security, reliability, performance, time, resource, quality. Etc.)

d. Recommendations (what you recommend the company to do)

Executive Summary (including recommendations)

Project management

a. Gantt chart

b. Feasibility analysis(economic, technical, and operational, schedule, legal and contractual, and political)

Reference no: EM133389184

Questions Cloud

What are the capital gains tax implications : What are the capital gains tax (CGT) implications in relation to the sale of the Southern Highlands house (Australian Tax Law implication, please referring
Discuss the historical tradition of laws : Discuss the historical 'tradition' of laws that circumscribed certain avenues of life among the citizens of the Holy Roman Empire.
Calculate a specific earned value measurement : Budget at Completion (BAC) for hypothetical projects. You will then be asked to calculate a specific Earned Value Measurement based upon these values
Compute the income tax due of mr. sita : Mr. Vi Sita, a Norwegian residing in the Philippines, earned the following income during the taxable year, net income from the Philippines, P 800,000
Identify and describe various roles and key users : Aggies anywhere is a campus virtual desktop that allow students and faculty anywhere to access North Carolina A&T state University Desktop
How do realities of history of encounters between europeans : What knowledge or assumptions did you come to this class with about the history of encounters between Europeans/European Americans and CA Indians?
Describe three ways that police legitimacy derives from them : Using relevant examples from Ontario, describe three ways that police legitimacy derives from them risking their lives. Support your answer with relevant peer
Why might want ceiling preemption : Using examples from the reading, comment on whether we should be concerned about state preemption and why might want ceiling preemption.
Discuss why the issue is important and include examples : Discuss why the issue is important and include examples of what could happen if the issue was not properly addressed by the vendor.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Evaluate the level of impact of it on information management

Evaluate the level of impact of IT / enterprise architecture on information management (e.g., the flow of information throughout the company / organization, etc.) within a company or industry of your choice.

  How well the usa patriot act balances the interests

Perform a web search to identify a law or regulation meant to protect against terrorism or similar security threats in a country other than the U.S.

  What are the five barriers to effective critical thinking

What are the five barriers to effective critical thinking? Explain What are the 3 parts of an argument? Explain

  Analyze the existing security situation

Analyze the existing security situation in your virtual organization. Identify the predominant electronic and physical threats to communications networks.

  Should employees be involved in developing the new system

Forever Floors has a system that manages orders, measuring appointments, installations, and so on. It is also accessible to everyone at the company.

  Explain the process implementation competitive strategies

What is the purpose of Porter's five forces model? Support your argument with an example of a strong force and an example of a weak force. Be sure to support your example by explaining why it was a strong force or a weak force using Porter's five ..

  Which of the given is an intent of the bank secrecy act

Which of the following is an intent of the Bank Secrecy Act? Which act strengthens computer and network security within the U.S. federal government?

  What are three examples of programming languages

What are three examples of programming languages? What makes each of these languages useful to programmers?With what programming language are you most familiar or do you have experience?

  How erm adoption and implementation in the higher education

How ERM adoption and implementation in the higher education (HE) environment differs from the for-profit environment.

  Sdlv versus agile explained in detailthe problem statements

sdlv versus agile explained in detailthe problem statements requires an explanation and comparison of sdlc and the

  What is the optimal production schedule for firm

What is the optimal production schedule for firm? What is the profit contribution of each of these products and How many hours are used for machine 3 with the optimal solution?

  Protocols of streaming live audio and video

Explore by reviewing the underlying mechanism, middle ware, protocols of streaming live Audio and Video in distributed Cloud Environment.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd