Understanding of the effectiveness of maintenance

Assignment Help Basic Computer Science
Reference no: EM13776221

Question 1:

1. What is information systems analysis and design? How has systems analysis and design change over the past four decades?

2. List and explain the different phases in the SDLC. List and explain some of the problems with the traditional waterfall SDLC.

Question 2:

1. Describe and compare the various sources of software.

2. How can you decide among various off-the-self software options? What criteria should you use in your decision?

3. What methods can a systems analyst employ to verify vendor claims about a software package?

Give a brief overview and history of CASE.

1) What are the basic categories of CASE? (Hint: There are usually three)

2) What are some of the applications of CASE?

3) What are some common risks and associated controls with CASE?

Question 3:

1. Contrast the following terms and concepts:

a. critical path scheduling vs. Gantt charts vs. network diagramming vs. slack time
b. project vs. project management vs. project manager
c. project initiation vs. project planning vs. project execution vs. project closedown
d. project workbook vs. resources vs. work breakdown structure (WBS)

2. List the various project team communications methods, plus, describe an example of the type of information that might be shared among team members using each method.

Question 4:

1. Describe the project identification process.

2. Describe value chain analysis and how organizations use this technique to evaluate and compare projects.

3. Describe the steps involved in corporate strategic planning.

Question 5:

1. Contrast the following terms and concepts:

a. break-even analysis vs. present value vs. net present value vs. return on investment.
b. Intangible benefit vs. tangible benefit
c. Intangible cost vs. tangible cost

2. List and describe the steps in project initiation and process planning.

Question 6:

1. Describe systems analysis and the major activities that occur, during this phase of the systems development life cycle.

2. Describe how prototyping can be used during requirements determination. How is it better, or worse, than traditional methods?

3. Why is continual user involvement a useful way to discover system requirements? Under what condition might it be used? Under what conditions might it not be used?

Question 7:

1. What is DFD? Why do systems analysts use DFDs? Briefly explain the rules for drawing good DFDs.

2. Explain the convention for naming different levels of DFDs. Why do analysts draw multiple sets of DFDs?

Question 8:

3. Discuss why you believe some systems developers feel a data model is one of the most important parts of the statement of information system requirements.

4. Distinguish between the data modeling done, during information systems planning, project initiation and planning, and the analysis phases of the SDLC.

5. List the deliverables from the conceptual data modeling part of the analysis phase of the systems development process.

Question 9:

1. What is the purpose of normalization? List the five properties of relations. What problems can arise when merging relations? (Hint: view integration)

2. Can instances of a relation (sample data) prove the existence of a functional dependency? Why or why not?

3. What is the purpose of denormalization? Why might you not want to create one physical table or file for each relation in a logical data model? Please explain your answer.

Question 10:

4. Describe the prototyping process of designing forms and reports. What deliverables are produced from this process? Are these deliverables the same for all types of system projects? Why or why not?

5. In your opinion, what type of labeling can you use in a table or list to improve its usability? What column, row, and text formatting issues are important when designing tables and lists?

Question 11:

1. Contrast the following terms and concepts:

a. dialogue vs. interface
b. command language interaction vs. form interaction vs. menu interaction vs. natural language interaction vs. object-based interaction
c. drop-down menu vs. pop-up menu

2. Describe the general guidelines for the design of menus. Can you think of any instances when it would be appropriate to validate these guidelines? Please explain your answer.

Question 12:

3. Summarize the six (6) possible architectures for client/server systems.

4. Summarize the reasons for using three-tiered client/server architecture.

5. Discuss how you can instill customer loyalty and trust worthiness when designing an Internet-based electronic commerce system.

Question 13:

1. What are the deliverables from coding, testing, and installation?

2. Explain the code-testing process.

3. What are the four approaches to installation? Which is the most expensive? Which is the most risky? How does an organization decide which approach to use?

4. What are the common methods of computer training? What is self-training? What is eLearning? In your opinion, is there proof that individual differences matter in computer training?

5. Describe the various roles typically found in a help desk function.

Question 14:

6. Contrast the following terms and concepts:

a. adaptive maintenance vs. corrective maintenance vs. perfective maintenance vs. preventive maintenance

b. baseline modules vs. build routines vs. system librarian

c. maintenance vs. maintainability

7. List the steps in the maintenance process and contrast them with the phases of the SDLC.

8. Describe three ways for organizing maintenance personnel and contrast the advantages and disadvantages of each approach.

9. What types of measurements must be taken to gain an understanding of the effectiveness of maintenance? Why is tracking "mean time," between failures, an important measurement?

10. Suppose you were a system librarian. Using entity-relationship diagramming notation, describe the database you would need to keep track of the information necessary in your job. Consider operational, managerial, and planning for the job.

Reference no: EM13776221

Questions Cloud

Define the information security governance and management : Define the information security governance and management tasks that senior management needs to address.Describe the outcomes and the items that will be delivered to the organization through the information security program.
Making ammonia from nitrogen and hydrogen : How many significant figures are in the following - Making ammonia from nitrogen and hydrogen
Effectiveness and efficiency of retail management : Write a 750- to 1,000-word paper in which you explore how technology has improved the effectiveness and efficiency of retail management. Consider the following questions in your paper:
Write a papers that demonstrates the necessary ethical care : What information is provided in the two papers that demonstrates the necessary ethical care and concern for the rights of the participants?
Understanding of the effectiveness of maintenance : What types of measurements must be taken to gain an understanding of the effectiveness of maintenance. Why is tracking "mean time," between failures, an important measurement.
Write essay paper of the fedreal agencies around the world : Write an essay research paper of the fedreal agencies around the world like FBI CIA MI6 KGP and all of those to the powerful countries.
Identify one example of our gender binary system in action : Identify one example of our gender binary system in action (e.g. gender segregated bathrooms), and propose a solution that we could use if we abandoned the binary system (e.g. gender neutral bathrooms).
Applying information security and sdlc to business : Write a paper of no more than 3,000 words in which you discuss one of the bookstores, use the SDLC method to implement a new technology into the bookstore, and detail a disaster recovery plan for the bookstore.
Principles of user interface design presentation : Review the Principles of User Interface Design presentation located in the Week Three section of the student website. Evaluate a website of your choice for adherence to the six design principles outlined in the presentation.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd