Why object-oriented techniques have improved systems design

Assignment Help Computer Engineering
Reference no: EM131291634

Question 1.

If someone at a party asked you what a systems analyst (SA) was and why anyone would want to be one, what would you say?

Write your answer in a 400-word essay. Include a discussion of IT project failure rates, key activities of an SA in systems analysis and in systems design and the impact on the business outcomes.

Question 2.

a) Explain this statement: "We need to institutionalize the SDLC as our organizational project management methodology."

b) Describe two advantages and two disadvantages of using interviews in requirements gathering.

c) Explain the difference between a waterfall and an iterative/incremental agile method. Illustrate your answer with diagrams.

d) Compare the use of a DFD model with a UML activity diagram for modeling business processes (No need to show diagrams).

Question 3.

Draw a use-case diagram for the following scenario:

You are at a restaurant and you need a ride home. You heard about Unter...the on-demand car services company. You down load the mobile app, which supports multiple operating system versions, onto your smart phone and set up an account including credit card information. Once the app is setup, you enter your pickup location and your destination address. When a nearby Unter driver accepts your request, the app displays an estimated arrival time. The driver arrives and takes you home. When you at your home, the fare is automatically and securely billed to your credit card on file with Unter. Before leaving the car, you provide feedback on the driver's performance via the Unter app. Once Unter has its commission, the remaining fare is deposited automatically and securely into the driver's account. Your trip has ended.

(Use MS Office tools, Visio or a free tool from Creately.com; no hand-drawn maps).

Question 4.

a) Explain the difference between functional and non-functional requirements. Using the scenario in Question 3, provide two examples of each.

b) Explain two reasons why the object-oriented techniques have improved systems analysis and design.

c) Give an example of an output bias and two strategies to avoid UI design output bias.

d) What is the significance of defining forward facing "to-be" functionality.

Reference no: EM131291634

Questions Cloud

List the course number for database system principles : List the course number for "Database System Principles". Set "Database System Principles" as the prerequisite for "Relational Database Systems". List all courses that have "Database System Principles" as prerequisite.
What technologies can a company use to safeguard information : How can companies participating in ebusinesses keep its information safe guarded? What technologies can a company use to safeguard information?
How can cyberterrorism be a threat to mitigation efforts : how can cyberterrorism be a threat to mitigation efforts? Explain if the WikiLeaks intelligence leak scandal of 2010 can be considered cyberterrorism or not.
Create preventative controls for video game design company : Create Preventative Controls for SunGrafix, a video game design company. In some cases, the outage impacts identified in the BIA may be mitigated or eliminated through preventive measures that deter, detect, and/or reduce impacts to the system.
Why object-oriented techniques have improved systems design : Explain two reasons why the object-oriented techniques have improved systems analysis and design. Give an example of an output bias and two strategies to avoid UI design output bias.
Dependability of systems : Give various reasons as to why the dependability of systems is now usually more important than their detailed functionality.
Determining the cybersecurity industry : You have been invited to present your "case study research" Is there a cybersecurity industry? during a "lightening round" panel for your CTO's monthly "brown bag" luncheon. The CTO sponsors these panels to help staff members learn more about tech..
What technolgies can a company use to safeguard information : How cana company participating in e business keep its information secure? What technolgies can a company use to safeguard information?
Field of modern security : Write a 700- to 1,050-word paper in which you compare how technology has affected the field of modern security over the last 20 years.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Review the agile and systems development life cycle sdlc

question 1. review the agile and systems development life cycle sdlc software development methodologies in your

  Explain a requirement-specification method that would be

describe a requirement-specification technique that would be appropriate for an online college student registration

  Explain interval and arithmetic coding

Evaluate the cumulative distribution function and the binary intervals

  What would be the mappings between cache block

take a memory of 64 blocks (labeled 0 through 63) and a cache of 16 blocks (labeled 0 through 15). In the questions below, list only correct results.

  Defined the derivative of the gaussian function

E27: Computer Vision Spring 2016 - HOMEWORK 3. The partial derivative of a Gaussian is separable. Let G→(x, y) be defined as the derivative of the Gaussian function with respect to x: G→(x, y) = (∂/∂x)G(x, y)

  Tere was a study released in june 2008 by transportation

our response must be 200 words in length for each questions. you are required to use at least your textbook as source

  Suggestions for ensuring an adequate change control

What are two suggestions for ensuring the adequate change control on projects that involve outside contracts.

  How to an edited version of the same text to another file

create a program that reads text from one file and writes an edited version of the same text to another file.

  Create a table with uneven cell sizes

Trying to make use of a table with uneven cell sizes. I have made the cells and 2 tables which I'm trying to combine into 1 table and then make borders around that table (and around the cells as well).

  Resolving the ambiguities in the software

Describe what you must do in such a situation. You know that cost to your current employer will increase in case the ambiguities are not resolved. Though, you have also a responsibility of confidentiality to your previous employer.

  Design a program which computes and displays the number of

design a program that calculates and displays the number of miles per hour over the speed limit that a speeding driver

  Write down a unix shell script

For an example, if I want to search for a text file/script that contains the most number of for loop statements, and have it displayed on the screen, How will I do that?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd