Stakeholders of customer support systems

Assignment Help Basic Computer Science
Reference no: EM131081897

Stakeholders of Customer Support Systems

Charlie and Suzanne have been given a new assignment: PPI has decided to build a new website. All information about the company and its products will be available via the website. The website will also include a private intranet, available only to employees of PPI. Charlie and Suzanne have to identify the possible stakeholders of this project. Later, those stakeholders will be interviewed to obtain the requirements for the website.

  • Who do you think the list of stakeholders should include? Justify your response.
  • Are there any possible stakeholders that you decided not to include? Why?

Reference no: EM131081897

Questions Cloud

Should education really be a determining factor in wages : Is the opposition to the Affordable Health Care Act really based on serious constitutional issue or is it really mostly politically motivated?
Generations of computer programming languages : Briefly describe the four generations of computer programming languages, concentrating on the major differences among the generations. How does object-oriented programming fit into these generations? How does HTML fit into these generations?
Business functions that the systems support : Contact at least three people at your school or a nearby company who use information systems. List the systems, the position titles of the users, and the business functions that the systems support.
Explain the steps you would take in testing modifications : Developers can spend much time in making database and program modifications to improve or expand system functionality. Explain some of the steps you would take in testing modifications.
Stakeholders of customer support systems : Charlie and Suzanne have been given a new assignment: PPI has decided to build a new website. All information about the company and its products will be available via the website.
Dominate the worldwide software market-microsoft : As you have read in newspapers and magazines, one firm seems to dominate the worldwide software market-Microsoft.
What values of p may it be desirable to foul the shooter : what values of p may it be desirable to foul the shooter?
Threatening the relational database : 1). Do a Google search and find out what is a NoSQL database and how they are threatening the relational database? 2.) Which companies created the NoSQL databases Cassandra, Bigtable and Dynamo?
What is your expected net profit e[q] : what is your expected net profit E[Q]?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Digital terrorism and criminology of computer crime

List at least three (3) major categories of cyber terrorism and / or information warfare. Among the chosen categories, determine the one (1) that should be the top priority for the federal government to address. Provide a rationale to support your re..

  Process to get merchandize to your customers

• Some process to get merchandize to your customers. To spice things up a bit you have decided to sell something funny and demanding like: • T-shirts with a Superhero image and your company logo on them.

  Children internet protection act

The Children's Online Privacy Protection Act (COPPA) and the Children's Internet Protection Act (CIPA) are both intended to provide protections for children accessing the Internet. However, they both have had some opposition.

  Billing records can be stored for the bookkeeper

Billing records can be stored for the bookkeeper

  Example of an actual data warehouse

Find an example of an actual data warehouse. For this example, describe the content, purpose, user access methods, and sources of data (what on-line transaction processing [OLTP] databases feed data into the data warehouse) - (make sure that your ..

  What the draw is for the business to provide such a service

What are the dangers, if any, that come along with offering such a service?

  Describe the three principles of direct manipulation

Describe the three (3) principles of direct manipulation and give examples as to how they are used in video game controls.

  Write a code using greedy best first search

Write a code using Greedy Best First Search and A* in Java language to find the shortest path in Romania path to Bucharest

  Design and code a project to calculate the amount due

Design and code a project to calculate the amount due for rentals. Movies may be in VHS(videotape) format or DVD format. Videotapes rent for $1.80 each and DVDs rent for $2.50.

  Compare a public network to a private network

Explain the various privacy rights that businesses on the Web are lawfully obligated to adhere to. Describe some of the gray areas in enforcing these laws on the Internet.

  External share between the two domains

You have two domains (contoso.com and adatum.com) that have an external share between the two domains. You want to configure selective authentication. What should you do.

  The value display style tells the browser not the element

The ____ value of the display style tells the browser not the display the element.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd