Joint application development session leader, Computer Engineering

Assignment Help:

Q.Joint Application Development session leader?

JAD session leader: JAD leader organizes and runs the JAD. This person is trained in group management and facilitation as well as system analysis. JAD leader sets agenda and sees that it is met. JAD leader remains neutral on issues and doesn't contribute opinions or ideas though rather concentrates on keeping the group on agenda, resolving conflicts and disagreements and soliciting all ideas. 

(1)  Users: The key users of system under consideration are vital participants in a JAD. They are only ones who have a clear understanding of what it means to use system on a regular basis.

(2)  Managers: The role of managers at the time of JAD is to approve project objectives, establish project priorities, approve schedules and costs and approve identified training requirements and implementation plans. 

(3)  Sponsors: A JAD must be sponsored by someone at a relatively high level in company which means the person from top management. If sponsor attends any session it's generally at the very beginning or at the end.

(4)  Systems Analysts: Members of systems analysis team attend JAD session though their actual participation can be limited. Analysts are there to learn from managers and customers though not to run or control process.

(5) Scribe: The scribe takes down the notes throughout the JAD sessions. This is generally done on a laptop or a personal computer. Notes can be taken using a word processor. Diagrams can directly be entered into a CASE tool.

(6) IS staff such as systems analysts, other IS staff like programmers, database analysts, IS planners and data centre personnel can attend to learn from discussions and possibly to contribute their ideas on technical feasibility of proposed ideas or on technical limitations of current systems.


Related Discussions:- Joint application development session leader

Order in which filters get implemented, If we have multiple filters implet...

If we have multiple filters impleted, what is the order in which these filters get implemented?   Ans) 1. Authorization filters 2. Response filters 3. Action filters

Elaborate the various steps in performing a mail merge, COMPUTER FUNDAMENTA...

COMPUTER FUNDAMENTALS 1. Elaborate the various steps in performing a Mail Merge. Perform one mail merge operation for sending invitation for a conference which is being conduc

Explain arithmetic data processing instructions, Q. Explain Arithmetic Data...

Q. Explain Arithmetic Data Processing Instructions? These instructions carry outlogical and arithmetic operations on data. Arithmetic: The four fundamental operations are

Why the tcp checksum is necessary, Is the TCP checksum necessary? Yes, ...

Is the TCP checksum necessary? Yes, TCP Checksum is essential. TCP layer is liable for error detection, transmission of packets if needed, error control, reassembly of packe

Software project planning, Software Project Planning In the previous da...

Software Project Planning In the previous days of computing software costs comprised a small % of overall computer based system cost. In order of magnitude error software cost

What are the parts of a deployment diagram, ? Nodes: A node shows any hardw...

? Nodes: A node shows any hardware component. The configuration of hardware is shown by attributes of nodes. ? Components: A component shows software. Every component straight

Why we need to construct state transition diagram, Why we need to construct...

Why we need to construct state transition diagram Basically you need to construct a state transition diagram for each object with important behaviour. You need not construct on

Illustrate design of combinational circuits, The digital circuits that we u...

The digital circuits that we use now-a-days are constructed with NOR or NAND gates in place of AND-OR-NOT gates. NOR & NAND gates are known as Universal Gates as we can realize any

Return a string, Write a function that will prompt the user individually fo...

Write a function that will prompt the user individually for a filename and extension and will make and return a string with the form 'filename.ext'.

Virtual manufacturing system, Virtual Manufacturing System Virtual manu...

Virtual Manufacturing System Virtual manufacturing system or VMS is a synthetic, integrated manufacturing environment, developed by using information technology tools, exercise

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd