What is your understanding of entity integrity

Assignment Help Management Information Sys
Reference no: EM131405336

IT Project Management

Question 1: Answer (scenario might be an app for an equipment dealership for sales, service and parts)

Write a paragraph describing a hypothetical project scenario and then provide an example of a change for each of the following categories:

External Event

Error or omission in scope of product

Error or omission in scope of project

Value-added change

Risk response

Question 2: Answer

Develop a work breakdown structure for a project identifiedbelow:

• Proposed Project Scenario:

I will develop software for a medium sized horse breeding farm that would track, mare cycle dates, follicle sizes, breeding dates, gestation lengths, and foaling dates in order to track trends and predict foaling dates and the best times to breed each mare.

External Event:

The effect of weather, length of day, and animal health issues which can change breeding conditions and tendencies.

Error or Omission in Scope of Product:

The software does not allow for input of new mares mid-season (a mare was purchased that was already pregnant).

Error or Omission in Scope of Project:

The gender of the foals is left out of the tracking criteria, which is a factor of gestation length and could affect overall data.

Value Added Change:

Addition of an IoT device that tracks mare hormone levels and temperatures without human intervention.

Risk Response:

The risk is that the system will be too difficult for the farm to use and they will continue using paper to track data.

Question 3: Create the items below on: The benefits and challenges of Agile Project Management

1. Present a tentative title for your topic.

2. Briefly describe how the topic relates to project management.

3. State a concrete, specific research question to guide your review of the literature. (State the research question in true question format, not as an intention or objective)

4. List at least one suitable reference source in APA format related to your topic.

Question 4,5, 6: Read these three answers and give feedback on what's good or anything that you would add in 100-120 words each one.

4. Project Scenario: Consider a major hotel chain (i.e. Marriott). I would like to develop a property management system that manages and monitors all the work related to managing the property of Marriott hotels. It will keep records of guest information, check-in and check-out times as well as their preferences.

External Event: Reservations for VIPs should be carried out via SSL level data transfers to ensure their privacy.

Error or omission in scope of product: Marriott forgets to add the option of integrating the inventory management system in the product.

Error or omission in scope of project: Marriott forgets to consider its franchisee hotels in the integration scope.

Value-added change: Use of this system should help the company lower its overall costs and become more efficient.

Risk response: The risk from this may come from system being broken down or inaccessible via loss of network.
• 5. Project Description: Design an APP with the name iCare. ICare will serve as a service portal where customers can request for service using the APP and will receive emails when specialist are in route, onsite and work completion in real time.

External event: All customers need to have an account created before roll out, but most have not sent their account information for iCare log in.

Error or omission in scope of product: Job hazard analysis(JHA) report which is a requirement by companies in oil and gas was excluded from the APP design.

Error or omission in scope of project: iCare was supposed to be tested with a few customers before the final roll out.

Value added change: Customers don't have to make service request via phone calls. Service request are sent in real time via iCare and customers receive updates in real time.

Risk response: All service specialist will have to be provided a smartphone or tablet for proper ticket update in iCare.

• 6. WBS for scenerio

"Project Scenario: Consider a major hotel chain (i.e. Marriott). I would like to develop a property management system that manages and monitors all the work related to managing the property of Marriott hotels. It will keep records of guest information, check-in and check-out times as well as their preferences."

Actually Marriott implemented cloud-based MICROS OPERA as its propery management system for all North America Properties
"MICROS OPERA PMS is a robust property management system that is designed to address the needs of any size hotel, and manage all daily activities necessary in a hotel's operation. From handling reservations to managing accounting and billing, OPERA offers a feature set that can be configured to any hotel's requirements. With the advanced interface capabilities that are offered with MICROS OPERA, hotels have an invaluable solution to increase productivity, drive sales and customer satisfaction, and boost profits."

OPERA Cloud Services is an enterprise platform offered by Oracle for hotel operations and distributions

Implementing OPERA Cloud Services WBD

1. Client Relationships

2. Bookings

2.1. Reservations

2.1.1. Manage Reservations

2.1.2.Manage Billing

2.2. Blocks

2.2.1.Manage blocks

3. Inventory

3.1. Inventory Management

3.1.1.Manage Sell Limits

3.1.2.Manage Restrictions

3.1.3.Room Management

3.2. Monitor

3.2.1.Rooms Availability

3.2.2.Channel Evaluation

4. Financials

4.1. Manage Accounts Receivable

4.2. Manage Commissions

4.3. Cash management

4.3.1.Cashiering Workspace

4.3.2.Marketplace posting

4.4. Financial Admin

4.4.1. Pricing

4.4.1.1. Rates

4.4.1.2. Packages

4.4.2. Financial Transaction Mangement

5. Enterprise Management

5.1. Parameters

5.2. Roles and tasks

References

• OPERA Cloud Help Links - Standalone. (n.d.). Retrieved from

https://docs.oracle.com/cd/E68940_01/1.18_oh/index.htm

• Hospitality for Hotels-OPERA Cloud Services l Oracle. (n.d.). Retrieved from

https://www.oracle.com/industries/hospitality/products/opera-cloud-services.html

Question 7:

1. What is your understanding of Entity Integrity Vs Referential Integrity. Illustrated with simple examples for ease of understanding of the concepts.

Question 8:

2. describe various types of keys (Primary, Foreign, Superkeyetc) with simple examples.

Question 9: Provide 100 word feedback for each of these two answers. Could be something positive or something you would add.

1. What is your understanding of Entity Integrity Vs Referential Integrity. Illustrated with simple examples for ease of understanding of the concepts.

2. From your reading of the lecture, describe various types of keys (Primary, Foreign, Superkeyetc) with simple examples.

Reference no: EM131405336

Questions Cloud

Difference between theoretical and empirical growth models : 1. What is the difference between theoretical and empirical growth models? What are the advantages and disadvantages of each? 2. William Easterly and Jeffrey Sachs disagree over the role that foreign assistance should play in promoting economic gro..
Does the research deal with significant- meaningful problem : Does the research deal with significant and meaningful problem that lends itself to a substantial research effort?Is there a justification that demonstrates why the problem is worth studying?Is it clear who or what will be aided by research findings?..
Advise on the implementation of an abc system : Show how an activity based system would change the analysis of the costs between the standard and specialist products. Advise on the implementation of an ABC system. How can Davina's fears be lessened
Adding reserves to the banking system : If banks desire to increase their lending, but the Federal Reserve is not adding reserves to the banking system, what will happen to the level of short term interest rates?
What is your understanding of entity integrity : What is your understanding of Entity Integrity Vs Referential Integrity. Illustrated with simple examples for ease of understanding of the concepts. From your reading of the lecture, describe various types of keys (Primary, Foreign, Superkeyetc) w..
Macroeconomic worldviews for david ricardo : What are the macroeconomic worldviews for david ricardo, karl marx, and john stuart mill?
Difference between a null and an alternative hypothesis : What is the difference between a null hypothesis and an alternative hypothesis? Is the null hypothesis always the same as the verbal claim or assertion that led to the test? Why or why not?
Identify and explain the maximum likely error in the study : A research firm has found that 39% of U.S. adults in the over-$75,000 income category work at least 51 hours per week.- For each of the confidence intervals, identify and explain the maximum likely error in the study.
Discuss about creating and managing wireless security policy : The research project will give the graduate student an opportunity to think independently to address issues in an area of network security that is of interest to the student. The work should be documented in the form of an analytic research paper,..

Reviews

Write a Review

Management Information Sys Questions & Answers

  Describe about current collaborative relationships

Which of the guideline elements does your organization already perform well and Which elements could your organization easily integrate into their current collaborative relationships? How?

  Develop the project initiation document

Develop the Project Initiation Document and complete the remaining sections of the Project Initiation Document template including the executive summary.

  Computer applications- clipart

Computer Applications- clipart - Explore the Internet to discover at least two additional sites (other than Microsoft) that offer clipart, either free or for a price.

  Should responsibility for open innovation be centralized

Why did Siemens create an open innovation initiative and what metrics should be used by Siemens to assess the effectiveness of open innovation?

  Discuss the advantages and disadvantages of nesting the

discuss the advantages and disadvantages of nesting the information security role within the information technology it

  Show the variability in barilla''s supply chain

What are the reasons for the increase in variability in Barilla's supply chain and How can Barilla cope with the increase in variability?

  Develop a comprehensive network design document

Discuss about the Network Design Executive PowerPoint Presentation . Develop a comprehensive network design document. Use technology and information resources to research issues in network architecture and analysis.

  Compare the three top browsers

Compare the Three Top Browsers: Chrome, MS IE and Firefox - indicate whether or not you changed your position based upon the discussion.

  Prepare an abbreviated annotated bibliography

Prepare an abbreviated annotated bibliography on four important components Operations Management' as a business function

  What do the media say about the rules for relationships

Do the popular media approve of certain types of relationships and not others? How do the media "define" friendship, love, and family? What do the media say about the rules for relationships?

  Discuss about 3d printing

It is part of my group paper talking about 3D Printing. I am responsible for 2 pages of the paper relate to the ethical problems raised by the use of 3D Printing in Medical area.

  Evaluate risks and security concerns with cloud computing

Analyse and evaluate risks and security concerns with cloud computing in the context of a company providing accounting software. Discuss strategies for addressing them

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd