Name two different styles of prototyping

Assignment Help Management Information Sys
Reference no: EM132348306

INFORMATION SYSTEMS

SECTION A

Answer TWO questions out of FOUR in Answer Book A.

A1. A new business is being set up by a group of parents to organise a toy and book lending library in aid of a local charity. None of the parents are IT literate and require an IT technician to help with setting up a small database and a manageable system.

Advertisements will be placed in local newspapers, shops and local community halls asking for donations of suitable books and toys. After inspection for their suitability, the toys and books will be classified into age group categories and priced accordingly. This data will need to be stored on the database. Potential borrowers will need to register and provide contact details such as name, address, phone number and email address.

A small charge will be imposed to register. The parents have arranged to hire a local community hall and will pay a small rent each month to the community hall committee, and have to pay for the newspaper advertisements so require enough money to cover the cost as well as make money for the charity. They also intend to make money by providing refreshments. Toys and books can be borrowed for a specified period, usually one week, with a fine being imposed if it is not returned within that period.

Toys or books which are no longer suitable for hire are offered for sale or destroyed if they cannot be sold and will be removed from the database.

The system is required to record the details of the toys and books, borrowers’ details, hall rental due dates and payments, charity donations and simple accounts.

a) Identify the processes, data stores and external entities in the above scenario.

b) Write brief notes on each of the following giving an example using the above scenario :

i) Dataflow diagrams

ii) Class diagrams

iii) Entity life histories

c) Describe the role of the following:

i) Systems Analyst

ii) Database Administrator

A2. a) Describe what issues need to be considered when designing screens and reports for the system described in Question A1.

b) Design a set of screens which will deal with logging onto the system described in Question A1 and the borrowing of toys and books. Explain the process and validation behind each screen.

c) Give the main reasons why a methodology is used to analyse an information system describing briefly the stages in a relevant methodology with which you are familiar.

A3. a) Describe, with the aid of a diagram, each of the three main levels of information in an organisation. Provide an example of this information at each level.

b) Briefly discuss the differences between the following specification techniques and give examples of each:

i) Flowchart

ii) Decision Table

iii) Pseudocode

c) Give examples of the following concepts used in relational data modelling:

i) Optionality

ii) An arc

iii) Intersection entities

iv) Involuted relationships

A4. a) There are three ways a new system can be introduced to the user. Briefly describe the advantages and disadvantages of the following:

i) Direct changeover

ii) Parallel running

iii) Pilot running

b) Testing is a vital part of system development.

i) Discuss how you would prepare a testing strategy.

ii) Describe the differences between black and white box testing.

c) Protecting company data is vitally important. Outline measures you would take to protect the data.

SECTION B

Answer FIVE questions out of EIGHT in Answer Book B.

B5. Write a brief description of what is meant by the following terms:

a) RAD

b) JAD

c) JRP

B6. a) What is meant by the following terms?

i) (raw) Data

ii) Information

b) Discuss the following database terms and comment with respect to data and information.

i) Database Management System

ii) Data Warehouse

B7. Describe what is meant by the following terms and how they are used?

a) PERT Chart

b) CPM

c) Gantt Chart

B8. a) Explain what is meant by the following data modelling techniques.

i) Normalisation

ii) Entity relationship modelling

b) Which would you recommend to use to develop a set of database tables and why?

B9. a) Name two different styles of prototyping.

b) Discuss these two different styles of prototyping outlining the advantages and disadvantages of each.

B10. a) Briefly discuss what is meant by the term soft methodology

b) Outline the tools and techniques you would use when applying a soft  methodology

B11. With the increased use of Social Networking, there are reports that companies are monitoring their employees on Social Media sites

a) In this context, discuss what is meant by the following terms:

i) Ethics

ii) Social networking / Social Media

b) Do you agree or disagree with companies monitoring their employees activities on social networking sites and discuss why a company might do so?

B12. One possible extraction of data from a database is an Excel spreadsheet. Discuss three different ways that an organisation could process and present the data from an Excel, or similar, spreadsheet, in a more visual manner and how this might aid decision making.

Reference no: EM132348306

Questions Cloud

Organisational standards and procedures : As long as you comply with organisational standards and procedures, there is no need to consider the needs, wants and expectations of people making an enquiry
Create database about technology devices using given element : Educators need to remain current regarding assistive technology trends and types of AAC that are being used in classrooms. It can be helpful to have a database.
Expert judgement and subject matter experts : What is the difference between expert judgement and subject matter experts? Please justify your answer.
Estimating method that encompasses using a work : Comparative or analogous estimating shows that you can use your knowledge and past comparable projects to base your new project off
Name two different styles of prototyping : BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 4 Certificate in IT- INFORMATION SYSTEMS
Having the best resources assigned to the project : How do you ensure you have diversity within your projects when your management may be more focused on having the best resources assigned to the project?
Described a special-cause or common-cause : Describe the experience in project. Was the case you described a special-cause or common-cause? Do you feel the solution or approach used appropriate for case.
Current project and keeping a talented team happy : Project estimations vary from each project the key is adjusting to the level of your current project and keeping a talented team happy and together.
What was the main purpose of using the printing press : What was the main purpose of using the printing press, according to the Volti text? In what ways are the two movements different\

Reviews

Write a Review

Management Information Sys Questions & Answers

  Examine this ethical decision from the christian worldview

At what point does the decision to not implement best practices based on business priorities become an ethical question?

  How can virtualization be used by cloud service providers

identify businesses who have suffered because of cloud security weaknesses or failures. What can companies who are contemplating cloud computing services learn

  Leading departmental changeq1 leading departmental

leading departmental changeq1 leading departmental changewho should lead the migration plan from an existing process to

  Explore the advantages of using ad for sso access

Some businesses and organizations use Active Directory (AD) to provide SSO access to the enterprise. Analyze the advantages and disadvantages of using AD for SSO access.

  Explain the verification and validation walk

Perform and explain the verification and validation walk-through of the package diagram. Create a set of invariants for attributes and relationships and add them to the CRC cards for each class in the structural model using Object Constraint Langu..

  Gem infosys, a small software company

Gem Infosys, a small software company, has decided to better secure its computer systems after a malware attack shut down its network operations for 2 full days. The organization uses a firewall, three file servers, two Web servers, one Windows 2008 ..

  Supply chain and inventory strategyputting together a

supply chain and inventory strategyputting together a syllabus for my course starting in january.cases produce a two-to

  Find the receive field in the headers

Find the receive field in the headers and write down as many as DNS names or IP address as you can, also look for common details.

  Write about any two business intelligence tools

Write about any two business intelligence tools and describe briefly about them. The paper should include the introduction about business intelligence. Paper must be in APA format, contain more than 1400 words, and use at least 4 peer reviewed so..

  Elements of the innovative process

Elements of the Innovative process - Write a paper in which you examine the elements of the innovative process as well as compare and contrast incremental

  Focus on the concept of information systems

Describe an organization of your choice. You will use this organization as you focus on the concept of information systems

  List different types of training such as classroom

Discussion: IT Security Policy Implementations. List different types of training, such as classroom, computer-based training (CBT), and so on.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd