You are required to analyse the effectiveness of the hotel

Assignment Help Computer Networking
Reference no: EM13379934

You are required to analyse the effectiveness of the Hotel Booking systems. To do this you are required to employ at least two data gathering techniques including research and observation. You will need to research the existing Hotel Booking  systems and other information you can find about airlines. You also need to observe how at least three (3) users interact with the system. Suppose the 3 users want to book accommodation in different hotels. Depending on the site you choose, you need to script two or more scenarios for these users, and then observe their interaction. For instance, the two possible scenarios might be as follows:

(A) You want to book a hotel in Perth for next Friday. Before booking your accommodation, you want to be sure that you are getting the best rates for the room. You therefore want to find out what other similar hotels charge for similar accommodation (choose the same one for all 3 participants) on that day.

(B) You would like to pay for your accommodation in advance (to confirm room availability). You would like to prefer a secure checkout to prevent fraud and protect your privacy. You therefore want to compare the different payment mechanisms (Cash, Cheque, Credit Card, PayPal etc) available at the 3 hotels.

Questions you need to address are:

1. What are the major business objectives and processes (operations) that the hotel company carries out?

2. List the information systems that are used to support their portal and describe how they are related to the overall business objectives and processes.

3. Detail the scenarios you developed and how the users you observed interacted with the system as a registered member of the system, a temporary member and without registration, when carrying out the tasks of those scenarios.

4. Recommend improvements to the system and describe the analytic consequences. For instance, not all airlines provide systems for online boarding. If the company were to add such functionality, what do the analysts need to consider?

5. Describe the stakeholders involved. Who are they? Why do analysts need to consider their interests?

6. Discuss, in detail, the data collection techniques you used to answer the above questions.

Reference no: EM13379934

Questions Cloud

1 identify the operating system and note whether you are : 1 identify the operating system and note whether you are andor have been running your operating system updates
A let deskp denote the des encryption of the plain text p : a let deskp denote the des encryption of the plain text p by the key k.i if we set k to be the key consisting of all
Athe keyspace for a cipher is the set all of possible keys : athe keyspace for a cipher is the set all of possible keys that can be used for the cipher. a des key consists of 56
Select a large multinational organisation that has : select a large multinational organisation that has succeeded in effectively aligning its business and isit strategies
You are required to analyse the effectiveness of the hotel : you are required to analyse the effectiveness of the hotel booking systems. to do this you are required to employ at
Use the internet or strayer databases to research the : use the internet or strayer databases to research the advantages features and common examples of oop and edp. note you
As the lead analyst for the hoosier burger project you have : as the lead analyst for the hoosier burger project you have worked closely with bob and thelma nbspmellankamp. having
1 write a six to eight 6-8 page wireless deployment plan : 1. write a six to eight 6-8 page wireless deployment plan for an education institution with a single campus but with
Implementing wireless technologies involves technical and : implementing wireless technologies involves technical and management issues or considerations that have strategic

Reviews

Write a Review

Computer Networking Questions & Answers

  How can these be used to compare

Using the Internet, search for commercial IDPS systems. What classification systems and descriptions are used? How can these be used to compare the features and components of each IDPS? Breifly compare the different classifications of systems you ..

  Design an ethernet network to connect a single client pc

Design an Ethernet network to connect a single client PC to a single server.  The two devices are 410 feet apart.  They need to communicate at 800 Mbps.  Your design will specify the locations of switches and the transmission line between the switche..

  What is the subnet address used by the company

What is the subnet address used by the company in decimal numbers and write major difference between TDMA and FDMA with less than three sentences

  Write a java application that allows the user to read

Write a java  application that  allows  the user  to  read,  validate, store,  display,  sort and search  the account number and balance for N bank customers.

  Advantages and disadvantages of simultaneous tcp connections

Can you configure the browser to open multiple simultaneous connections to the Web site? Write down the advantages and disadvantages of having large number of simultaneous TCP connections?

  Questiona give an example of a cross site scripting xss

questiona give an example of a cross site scripting xss attack. include an explanation of the differences between

  How to decrypt a message using classical cryptography

Part 1a. How to encrypt a message using classical cryptography algorithms we covered in class? Are these methods secure?b. How to decrypt a message using classical cryptography

  Multiplexing signals directly onto sonet sts-1 channel

Suppose you could multiplex these signals directly onto SONET STS-1 channel how many MP3 songs could be trasmitted simultaneously?

  What are the benefits of cloud computing adoption

What are the key organisational and environmental factors that influence SMEs to adopt Cloud based services?

  How client process in given end system can find location

Describe how client process in given end system can find location of given user to establish connection, for instance, Internet telephone, at given point in time.

  Design a simple layout of omni directional antennas

Consider a warehouse that is 60m by 30m. Wireless networking is required so that up to 20 staff members working in the warehouse can track stock movements and perform stock checks using mobile devices.

  Determining entropy of ciphertext message

A crypto device encrypts each message into 20 bits of ciphertext.What is the entropy of the plaintext message? What is the entropy of the ciphertext message?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd