Perform a systems analysis

Assignment Help Basic Computer Science
Reference no: EM131233511

This project requires you to perform a systems analysis and then design a system solution using database software. Ace Auto Dealers specializes in selling new vehicles from Subaru. The company advertises in local newspapers and is listed as an authorized dealer on the Subaru Website and other major Web sites for auto buyers. The company benefits from a good local word of-mouth reputation and name recognition and is a leading source of information for Subaru vehicles in the Portland, Oregon, area. When a prospective customer enters the showroom, he or she is greeted by an Ace sales representative. The sales representative manually fills out a form with information such as the prospective customer's name, address, telephone number, date of visit, and make and model of the vehicle in which the customer is interested. The representative also asks where the prospect heard about Ace- whether it was from a newspaper ad, the Web, or word of mouth- and this information is noted on the form also. If the customer decides to purchase an auto, the dealer fills out a bill of sale form.

Ace does not believe it has enough information about its customers. It cannot easily determine which prospects have made auto purchases, nor can it identify which customer touch points have produced the greatest number of sales leads or actual sales so it can focus advertising and marketing more on the channels that generate the most revenue. Are purchasers discovering Ace from newspaper ads, from word of mouth, or from the Web?

Prepare a two-page systems analysis report, in APA format, detailing Ace's problem and a system solution that can be implemented using PC database management software. Then use database software to develop a simple system solution. Your systems analysis report should include the following:

  • Description of the problem and its organizational and business impact.
  • Proposed solution, solution objectives, and solution feasibility.
  • Costs and benefits of the solution you have selected. The company has a PC with Internet access and the full suite of Microsoft Office desktop productivity tools.
  • Information requirements to be addressed by the solution.
  • People, organization, and technology issues to be addressed by the solution, including any proposed changes in business processes.

Based on the requirements you have identified:

  • Prepare an entity relationship diagram which models your proposed design.
  • Write the SQL statements to create the database tables, relationships and populate each table with at least 10 records per table, where applicable.
  • Use Microsoft Access to create a database called Ace-Auto-Dealers.accdb using your SQL scripts.
  • Finally, use the database system you have created to generate data input forms, queries and reports that would be of most interest to management. The system is to support only the processing requirements described for the existing manual system. You should have:
    • A minimum of 3 data input forms depending upon your database design
    • The following queries are required:
      • Which touch point generates the most sales leads? Least sales leads?
      • Which touch point generates the most purchases? Least purchases?
      • Which sales representative sells the most vehicles?
      • What is the best-selling make of model?
    • The following reports are required:
      • Customer profile
      • Leads by touch point including customer information
      • Sales by touch point including customer and vehicle information

You may choose to add more sophistication to your DBMS application, but you are not required to do so. While the more you do, the better your performance will be judged, it is better to do the basics right, than to develop a sophisticated DBMS application which does not work properly. In making your decision, please keep in mind the time available to complete the project, your relative experience with DBMS software, and your prior experience with Access' advanced capabilities. You are not required to go beyond the basic application framework.

Reference no: EM131233511

Questions Cloud

Calculate second-law efficiency of the counter flowing heat : A heat exchanger brings 10 kg/s water from 100?C up to 500?C at 2000 kPa using air coming in at 1400 K and leaving at 460 K. What is the second law efficiency?
Common elements of the tcp three-way handshake : Question A: What are the common elements of the TCP three-way handshake to begin communication, and what are the additional elements that can be sent when the handshake fails?
Does the sample generalize to the population : Does the sample generalize to the population? Explain why or why not. What inclusion criteria would be used? What exclusion criteria would be used, if any? What ethical issues might be encountered when collecting your information from this sample?
What information do you gain about valero : What information do you gain about Valero from these calculations? - Do you see many similarities among the results of the five different calculations?
Perform a systems analysis : This project requires you to perform a systems analysis and then design a system solution using database software. Ace Auto Dealers specializes in selling new vehicles from Subaru.
Calculate the mass flow rate of the air : The rate of irreversibility for the overall process is 175 kW. Calculate the mass flow rate of the air and the thermal efficiency of the heat engine.
Why using one oscillator is preferable to using information : Most analysts will choose one oscillator to use in their analysis. - Explain why using one oscillator is preferable to using the information from multiple oscillators.
Find the heat transfer out of the extra work : Find the heat transfer out of the R-134a, the extra work input to the refrigerator due to this process, and the total irreversibility including that of the refrigerator.
Kind of vulnerabilities might they exploit : Consider a program to display on a local retail store's website that includes the city's current time and temperature. In your opinion, who might want to attack the program? What types of harm might they want to cause? What kind of vulnerabilities..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Explaining kind of malicious software

What kind of malicious software is this? if username and password are valid return ALLOW_LOGIN else return DENY_LOGIN.

  Information systems as the key driver or component

Question 1: Describe a global present day business that has been under pressure to perform better due to competition from competitors and has transformed successfully using information systems as the key driver or component.

  Compute hash for nifty hash function

Bob allots the numeric value VChar to each letter in alphabet equal to letter's position in alphabet, i.e., VA = 1, VB = 2, ..., VZ = 26. For the message, he computes the hash.

  How funny they found the cartoon to be

Workers at a company were assigned to one of two conditions: One group completed a stress management training program; another group of workers did not participate in the training. The number of sick days taken by these workers was examined for th..

  Whether the player''s guess was correct

Display a message indicating whether the player's guess was correct, too high, or too low. (After you fi nish Chapter 4, you will be able to modify the application so that the user can continue to guess until thecorrect answer is entered.)

  Executing critical section in mutual exclusion protocol

In Lamport's mutual exclusion protocol, if process i is implementing critical section.

  Present value of a discount bond and its time to maturity

What, in general, is the relationship between the present value of a discount bond and its time to maturity?

  Discuss the role of incident containment in an incident

Discuss the role of incident containment in an incident response strategy and how a lack of planning for containment is a potential pitfall for any response strategy.

  Show that these operations on vectors can be implemented

The assembly-language instructions of Fig. 3.18 operate on integers. Show that the operations AND, OR, and NOT can be realized on Boolean variables with these instructions. Show also that these operations on vectors can be implemented.

  Subsets of integers which sum to the same number

How many numbers do you require from this generator to guarantee that there exist 2 subsets of integers which  sum to the same number? Write steps how derive the solution.

  How would you measure product quality

How would you measure product quality in  Agile project management?

  The digital living network

Define digital convergence. Find out more about "The Digital Living Network" at dina.org. Discuss the various devices that may communicate over a common network.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd