Understanding of the effectiveness of maintenance

Assignment Help Basic Computer Science
Reference no: EM13776221

Question 1:

1. What is information systems analysis and design? How has systems analysis and design change over the past four decades?

2. List and explain the different phases in the SDLC. List and explain some of the problems with the traditional waterfall SDLC.

Question 2:

1. Describe and compare the various sources of software.

2. How can you decide among various off-the-self software options? What criteria should you use in your decision?

3. What methods can a systems analyst employ to verify vendor claims about a software package?

Give a brief overview and history of CASE.

1) What are the basic categories of CASE? (Hint: There are usually three)

2) What are some of the applications of CASE?

3) What are some common risks and associated controls with CASE?

Question 3:

1. Contrast the following terms and concepts:

a. critical path scheduling vs. Gantt charts vs. network diagramming vs. slack time
b. project vs. project management vs. project manager
c. project initiation vs. project planning vs. project execution vs. project closedown
d. project workbook vs. resources vs. work breakdown structure (WBS)

2. List the various project team communications methods, plus, describe an example of the type of information that might be shared among team members using each method.

Question 4:

1. Describe the project identification process.

2. Describe value chain analysis and how organizations use this technique to evaluate and compare projects.

3. Describe the steps involved in corporate strategic planning.

Question 5:

1. Contrast the following terms and concepts:

a. break-even analysis vs. present value vs. net present value vs. return on investment.
b. Intangible benefit vs. tangible benefit
c. Intangible cost vs. tangible cost

2. List and describe the steps in project initiation and process planning.

Question 6:

1. Describe systems analysis and the major activities that occur, during this phase of the systems development life cycle.

2. Describe how prototyping can be used during requirements determination. How is it better, or worse, than traditional methods?

3. Why is continual user involvement a useful way to discover system requirements? Under what condition might it be used? Under what conditions might it not be used?

Question 7:

1. What is DFD? Why do systems analysts use DFDs? Briefly explain the rules for drawing good DFDs.

2. Explain the convention for naming different levels of DFDs. Why do analysts draw multiple sets of DFDs?

Question 8:

3. Discuss why you believe some systems developers feel a data model is one of the most important parts of the statement of information system requirements.

4. Distinguish between the data modeling done, during information systems planning, project initiation and planning, and the analysis phases of the SDLC.

5. List the deliverables from the conceptual data modeling part of the analysis phase of the systems development process.

Question 9:

1. What is the purpose of normalization? List the five properties of relations. What problems can arise when merging relations? (Hint: view integration)

2. Can instances of a relation (sample data) prove the existence of a functional dependency? Why or why not?

3. What is the purpose of denormalization? Why might you not want to create one physical table or file for each relation in a logical data model? Please explain your answer.

Question 10:

4. Describe the prototyping process of designing forms and reports. What deliverables are produced from this process? Are these deliverables the same for all types of system projects? Why or why not?

5. In your opinion, what type of labeling can you use in a table or list to improve its usability? What column, row, and text formatting issues are important when designing tables and lists?

Question 11:

1. Contrast the following terms and concepts:

a. dialogue vs. interface
b. command language interaction vs. form interaction vs. menu interaction vs. natural language interaction vs. object-based interaction
c. drop-down menu vs. pop-up menu

2. Describe the general guidelines for the design of menus. Can you think of any instances when it would be appropriate to validate these guidelines? Please explain your answer.

Question 12:

3. Summarize the six (6) possible architectures for client/server systems.

4. Summarize the reasons for using three-tiered client/server architecture.

5. Discuss how you can instill customer loyalty and trust worthiness when designing an Internet-based electronic commerce system.

Question 13:

1. What are the deliverables from coding, testing, and installation?

2. Explain the code-testing process.

3. What are the four approaches to installation? Which is the most expensive? Which is the most risky? How does an organization decide which approach to use?

4. What are the common methods of computer training? What is self-training? What is eLearning? In your opinion, is there proof that individual differences matter in computer training?

5. Describe the various roles typically found in a help desk function.

Question 14:

6. Contrast the following terms and concepts:

a. adaptive maintenance vs. corrective maintenance vs. perfective maintenance vs. preventive maintenance

b. baseline modules vs. build routines vs. system librarian

c. maintenance vs. maintainability

7. List the steps in the maintenance process and contrast them with the phases of the SDLC.

8. Describe three ways for organizing maintenance personnel and contrast the advantages and disadvantages of each approach.

9. What types of measurements must be taken to gain an understanding of the effectiveness of maintenance? Why is tracking "mean time," between failures, an important measurement?

10. Suppose you were a system librarian. Using entity-relationship diagramming notation, describe the database you would need to keep track of the information necessary in your job. Consider operational, managerial, and planning for the job.

Reference no: EM13776221

Questions Cloud

Define the information security governance and management : Define the information security governance and management tasks that senior management needs to address.Describe the outcomes and the items that will be delivered to the organization through the information security program.
Making ammonia from nitrogen and hydrogen : How many significant figures are in the following - Making ammonia from nitrogen and hydrogen
Effectiveness and efficiency of retail management : Write a 750- to 1,000-word paper in which you explore how technology has improved the effectiveness and efficiency of retail management. Consider the following questions in your paper:
Write a papers that demonstrates the necessary ethical care : What information is provided in the two papers that demonstrates the necessary ethical care and concern for the rights of the participants?
Understanding of the effectiveness of maintenance : What types of measurements must be taken to gain an understanding of the effectiveness of maintenance. Why is tracking "mean time," between failures, an important measurement.
Write essay paper of the fedreal agencies around the world : Write an essay research paper of the fedreal agencies around the world like FBI CIA MI6 KGP and all of those to the powerful countries.
Identify one example of our gender binary system in action : Identify one example of our gender binary system in action (e.g. gender segregated bathrooms), and propose a solution that we could use if we abandoned the binary system (e.g. gender neutral bathrooms).
Applying information security and sdlc to business : Write a paper of no more than 3,000 words in which you discuss one of the bookstores, use the SDLC method to implement a new technology into the bookstore, and detail a disaster recovery plan for the bookstore.
Principles of user interface design presentation : Review the Principles of User Interface Design presentation located in the Week Three section of the student website. Evaluate a website of your choice for adherence to the six design principles outlined in the presentation.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Own research findings on tcp hijacking

Submit a discussion that shares your own research findings on TCP hijacking

  What are the possible limitations for use

What benefits do cookies provide to an application lifecycle? What are the possible limitations for use?

  Demonstrate skills in drawing tools

To begin to combine and demonstrate skills in drawing tools, tweens, working with text, and telling a story

  What is the minimum required frame length for this ethernet

Assume that two nodes in a 10Mbps Ethernet cable are 1200 meters apart. Also assume that the signal propagation speed is 2 x 10 8 meters/second. What is the minimum required frame length for this Ethernet?

  Retrieves a student name and three scores

Write an application that retrieves a student name and three scores per line from a text file. Process the values by calculating the average of the scores per student. Write the name and average to a different text file. Test your application with a ..

  Address the use of software repositories from fedora

Include only those repositories that are used by default in Fedora. Cite the resources that you used for writing this paper in the Chicago Manual of Style format.

  Write a class encapsulating a course

I must include a constructor, the accessors and mutators, and methods toString and equals. As part of this assignment, I have to write a client class to test all the methods

  Explain the means of investigating trademark

Discuss and explain the means of investigating trademark and copyright infringement, sexual harassment incidents, and child pornography and laws concerning those incidents.

  What are two main functions of user accounts in a network

1. What are the two main functions of user accounts in a network? As a network administrator, how would you establish user rights and permissions to minimize maintenance efforts? How would you assign work groups? what are some issues with user..

  Analyse the effectiveness of the qantas

You are required to analyse the effectiveness of the Qantas Online Air Ticketing system

  How do you create a 4d array of int in c++

How do you create a 4D array of int in C++

  Now utilize software such as microsoft office on the web

You can now utilize software such as Microsoft office on the web in platforms such as Google Docs. This allows you to create any document you can in office online as well as share this document and update much easier. Then you have social netwo..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd