Why object-oriented techniques have improved systems design

Assignment Help Computer Engineering
Reference no: EM131291634

Question 1.

If someone at a party asked you what a systems analyst (SA) was and why anyone would want to be one, what would you say?

Write your answer in a 400-word essay. Include a discussion of IT project failure rates, key activities of an SA in systems analysis and in systems design and the impact on the business outcomes.

Question 2.

a) Explain this statement: "We need to institutionalize the SDLC as our organizational project management methodology."

b) Describe two advantages and two disadvantages of using interviews in requirements gathering.

c) Explain the difference between a waterfall and an iterative/incremental agile method. Illustrate your answer with diagrams.

d) Compare the use of a DFD model with a UML activity diagram for modeling business processes (No need to show diagrams).

Question 3.

Draw a use-case diagram for the following scenario:

You are at a restaurant and you need a ride home. You heard about Unter...the on-demand car services company. You down load the mobile app, which supports multiple operating system versions, onto your smart phone and set up an account including credit card information. Once the app is setup, you enter your pickup location and your destination address. When a nearby Unter driver accepts your request, the app displays an estimated arrival time. The driver arrives and takes you home. When you at your home, the fare is automatically and securely billed to your credit card on file with Unter. Before leaving the car, you provide feedback on the driver's performance via the Unter app. Once Unter has its commission, the remaining fare is deposited automatically and securely into the driver's account. Your trip has ended.

(Use MS Office tools, Visio or a free tool from Creately.com; no hand-drawn maps).

Question 4.

a) Explain the difference between functional and non-functional requirements. Using the scenario in Question 3, provide two examples of each.

b) Explain two reasons why the object-oriented techniques have improved systems analysis and design.

c) Give an example of an output bias and two strategies to avoid UI design output bias.

d) What is the significance of defining forward facing "to-be" functionality.

Reference no: EM131291634

Questions Cloud

List the course number for database system principles : List the course number for "Database System Principles". Set "Database System Principles" as the prerequisite for "Relational Database Systems". List all courses that have "Database System Principles" as prerequisite.
What technologies can a company use to safeguard information : How can companies participating in ebusinesses keep its information safe guarded? What technologies can a company use to safeguard information?
How can cyberterrorism be a threat to mitigation efforts : how can cyberterrorism be a threat to mitigation efforts? Explain if the WikiLeaks intelligence leak scandal of 2010 can be considered cyberterrorism or not.
Create preventative controls for video game design company : Create Preventative Controls for SunGrafix, a video game design company. In some cases, the outage impacts identified in the BIA may be mitigated or eliminated through preventive measures that deter, detect, and/or reduce impacts to the system.
Why object-oriented techniques have improved systems design : Explain two reasons why the object-oriented techniques have improved systems analysis and design. Give an example of an output bias and two strategies to avoid UI design output bias.
Dependability of systems : Give various reasons as to why the dependability of systems is now usually more important than their detailed functionality.
Determining the cybersecurity industry : You have been invited to present your "case study research" Is there a cybersecurity industry? during a "lightening round" panel for your CTO's monthly "brown bag" luncheon. The CTO sponsors these panels to help staff members learn more about tech..
What technolgies can a company use to safeguard information : How cana company participating in e business keep its information secure? What technolgies can a company use to safeguard information?
Field of modern security : Write a 700- to 1,050-word paper in which you compare how technology has affected the field of modern security over the last 20 years.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd