System analysis and design final project

Assignment Help Basic Computer Science
Reference no: EM13660206 , Length: 1600 Words

System analysis and design final project.

Project Report 1: Steps 1-4


Project Report 1 (steps 1?4) focuses on defining, justifying, and planning the project.

Step 1: Define the project

This step should clearly define the project including, at a minimum: a description of the business need to be addressed, a statement of the project's scope and general feasibility, a "ballpark" schedule, and a resource plan and budget.

Step 2: Identify system requirements

This step should discuss the analysis activities associated with understanding and documenting the business needs and processing requirements for the proposed system. What are the desired outputs of the system and what are the major data requirements? Also, the constraints that are expected should be discussed.

Step 3: Develop a feasibility study

This section of the report will use the items developed in steps 1 and 2 to specify the project's risks and probability of its success, and will confirm the project's feasibility in each of the dimensions mentioned in the textbook: economic, technological, organizational, etc.

Step 4: Schedule the project

This final section of Report 1 will develop a detailed project schedule and indicate specific resource needs.

Project Report 2: Steps 5-8

Project Report 2 (steps 5?8) focuses on some of the tasks associated with developing and implementing the plan proposed in Project Report 1.

Step 5: Gather and organize data

This step should discuss how data will be collected, organized, manipulated, and presented. There also should be some discussion of how the user will interface with the system and how data and system security and integrity will be assured.

Step 6: Design system and documentation

This step should indicate the major elements and decision points of the proposed system and should identify the types of system and user documentation that will be produced, ideally with examples.

Step 7: Develop an implementation approach

This step should detail a plan for implementing the system including schedules, resources, data conversion techniques, and a "fall-back" or contingency approach.

Step 8: Develop a training approach and schedule for end users

This section should detail a plan and schedule for training and supporting users in the use of the new system.

Reference no: EM13660206

Questions Cloud

Why ac rated in tons : Why AC rated in Tons, Not in kW or kVA?Also A Guide about Airconditioner and Refrigeration
Electronics components and devices with multimeter : How to Testing Electrical and Electronics Components and Devices with Multimeter ?
Why is security of operation useful : 1. Why is security of operation useful to overall information assurance
Maintain multiple databases for the two companies : Maintain multiple databases for the two companies
System analysis and design final project : System analysis and design final project.
Compute what minimum work does one need : A wooden cube 0.5 meter in size is floating in a lake, with 2/3 of its volume being submerged. Compute what minimum work does one need to do to fully push it under water
Find the period of the spaceships orbit : Consider a spaceship in an elliptical orbit around the earth. At the low point, or perigee, of its orbit, it is 400 kilometer above the earth's surface; at the high point, or apogee, it is 4000 kilometer above the earth's surface. Find the period ..
Find the kinetic energy of the recoiling daughter nucleus : A nucleus of mass 228 u, initially at rest, undergoes alpha decay. find the kinetic energy of the recoiling daughter nucleus
Calculate what is the angle between the two vectors : Two vectors C and D are given by C= 5i + 6j + 7k and D= 3i - 8j +2k. If these two vectors are drawn starting at the equal point, calculate what is the angle between the two vectors

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What properties can be added in referential integrity

What properties can be added in referential integrity

  What is the code to remove the space at the end of string

What is the code to remove the space at the end of the string below and return the result in a textbox? Dim d As String = "CSC 232 " 2. What is the code to display just the text "232" from the string "CSC 232" in a textbox?

  Explaining final results in cell to a percentage

Second quarter revenue total has increased from first quarter revenue total by 60.16%. Make sure to change cell format for final results in the cell to a percentage.

  Function in programs to print upside down triangles

Apply function in programs to prints triangles, upside down triangles, and diamond.

  Explain the two methods which are used to give concurrent

describe the two methods that are used to provide concurrent operations of multiple processes on a single cpu. what are

  Systems development quality and use case

SYSTEMS DEVELOPMENT QUALITY AND USE CASES:The purpose of SLP 5 is to get acquainted with a third modeling technique and use the output model to document the system and train users. Structure process and data models were introduced in previous modules..

  Find whether bit string contains two consecutive one bits

You wish to find out whether bit string contains two consecutive 1 bits. Obviously, you can do this using n probes. For which values of n in range {3, 4, 5, 6, 7} can this be done using fewer than n probes?

  What is the smallest and largest integer

Show how the value ASCII "MIRIAM" is stored in memory in Big Endian format starting at location 100 hexadecimal. Assume that each memory location stored two ASCII characters.

  How to make components of system user-friendly

How do components of your computer system interact within system? What improvements or additions to your system do you think would benefit you or make system more user-friendly? Why?

  Suggest a change to the closest-pair algorithm

Suggest a change to the closest-pair algorithm that avoids presorting the Y array but leaves the running time as O(n lg n). (Hint: Merge sorted arrays YL and YR to form the sorted array Y .)

  Two vulnerability analysis tools used in research

two Vulnerability Analysis tools used in research and/or commercially available and describe their main features and functionality. Compare and contrast their relative strengths and weaknesses

  Writing return statement in a value returning function

What would be wrong with not writing returnstatement in a value returing function? Can you have a returnstatement in a void function? Does the return statement in the following function cause syntax error?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd