Joint application development session leader, Computer Engineering

Assignment Help:

Q.Joint Application Development session leader?

JAD session leader: JAD leader organizes and runs the JAD. This person is trained in group management and facilitation as well as system analysis. JAD leader sets agenda and sees that it is met. JAD leader remains neutral on issues and doesn't contribute opinions or ideas though rather concentrates on keeping the group on agenda, resolving conflicts and disagreements and soliciting all ideas. 

(1)  Users: The key users of system under consideration are vital participants in a JAD. They are only ones who have a clear understanding of what it means to use system on a regular basis.

(2)  Managers: The role of managers at the time of JAD is to approve project objectives, establish project priorities, approve schedules and costs and approve identified training requirements and implementation plans. 

(3)  Sponsors: A JAD must be sponsored by someone at a relatively high level in company which means the person from top management. If sponsor attends any session it's generally at the very beginning or at the end.

(4)  Systems Analysts: Members of systems analysis team attend JAD session though their actual participation can be limited. Analysts are there to learn from managers and customers though not to run or control process.

(5) Scribe: The scribe takes down the notes throughout the JAD sessions. This is generally done on a laptop or a personal computer. Notes can be taken using a word processor. Diagrams can directly be entered into a CASE tool.

(6) IS staff such as systems analysts, other IS staff like programmers, database analysts, IS planners and data centre personnel can attend to learn from discussions and possibly to contribute their ideas on technical feasibility of proposed ideas or on technical limitations of current systems.


Related Discussions:- Joint application development session leader

Syntax and semantics for first-order logic , Syntax and Semanticsx and Sema...

Syntax and Semanticsx and Semantics for First-order logic - artificial intelligence: Propositional logic is limited  in its expressiveness: it may just represent true and false

What are the benefits of web-based spreadsheets, What are the Benefits of W...

What are the Benefits of Web-Based Spreadsheets? The spreadsheets can be accessed from any Internet-connected computer, not just the computer originally formed the spreadsh

What is called when distortion caused on telephone line, Distortion caused ...

Distortion caused on telephone line by an adjacent one is called (A) Cross Fire                      (B) Inductive Disturbance (C)  Cross Talk                     (D) Non

Technical Support Engineer, I''m seeking a challenging professional working...

I''m seeking a challenging professional working position in the field of Information Technology,where I’ll be given the chance to enhance & expand the skills & experience

#microprocessor, Program to transfer 10 byte of data from DMS to EMS using ...

Program to transfer 10 byte of data from DMS to EMS using 8086 instructions

Exit command, Your shell must accept the exit command. This command will ...

Your shell must accept the exit command. This command will be in the form: e x i t When you encounter this command, your shell should terminate. Please note that when you

What is a switchboard, What is a switchboard A switchboard is only a f...

What is a switchboard A switchboard is only a form with command button that open other switchboard or perform tasks like opening forms and printing reports. Switchboard is a t

Describe the working of CRT in detail, Describe the Working of CRT The ...

Describe the Working of CRT The electron beam produces a tiny, bright visible spot when it strikes the phosphor-coated screen. A colour CRT monitor has three different coloured

Define about EMS, Define EMS The area at location C8000H-DFFFFFH is oft...

Define EMS The area at location C8000H-DFFFFFH is often free oropen. This area is used for the expanded memory system in a XT or PC system, or for the upper memory system in an

Explain about butterfly permutation, Q. Explain about Butterfly permutation...

Q. Explain about Butterfly permutation? Butterfly permutation:  This kind of permutation is attained by interchanging the most significant bit in address with least significant

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd