Joint application development session leader, Computer Engineering

Assignment Help:

Q.Joint Application Development session leader?

JAD session leader: JAD leader organizes and runs the JAD. This person is trained in group management and facilitation as well as system analysis. JAD leader sets agenda and sees that it is met. JAD leader remains neutral on issues and doesn't contribute opinions or ideas though rather concentrates on keeping the group on agenda, resolving conflicts and disagreements and soliciting all ideas. 

(1)  Users: The key users of system under consideration are vital participants in a JAD. They are only ones who have a clear understanding of what it means to use system on a regular basis.

(2)  Managers: The role of managers at the time of JAD is to approve project objectives, establish project priorities, approve schedules and costs and approve identified training requirements and implementation plans. 

(3)  Sponsors: A JAD must be sponsored by someone at a relatively high level in company which means the person from top management. If sponsor attends any session it's generally at the very beginning or at the end.

(4)  Systems Analysts: Members of systems analysis team attend JAD session though their actual participation can be limited. Analysts are there to learn from managers and customers though not to run or control process.

(5) Scribe: The scribe takes down the notes throughout the JAD sessions. This is generally done on a laptop or a personal computer. Notes can be taken using a word processor. Diagrams can directly be entered into a CASE tool.

(6) IS staff such as systems analysts, other IS staff like programmers, database analysts, IS planners and data centre personnel can attend to learn from discussions and possibly to contribute their ideas on technical feasibility of proposed ideas or on technical limitations of current systems.


Related Discussions:- Joint application development session leader

Write a verilog code to swap contents of two registers, Write  a  verilog  ...

Write  a  verilog  code  to  swap  contents  of  two registers  with  and without  a  temporary register? With temp reg : always @ (posedge clock) begin temp=b; b

Explain instruction stream and data stream, Instruction Stream and Data Str...

Instruction Stream and Data Stream The term 'stream' indicates to a series or flow of either instructions or data operated on by computer. In the entire cycle of instruction ex

Allocation of bits among opcode and operand, Allocation of Bits among Opcod...

Allocation of Bits among Opcode and Operand The trade-off here is between numbers of bits of opcode vs. the addressing capabilities. An interesting development in this regard i

State and prove demorgan’s first theorems, State and prove Demorgan’s First...

State and prove Demorgan’s First theorems: Ans. Statement of First Theorem of De Morgan: = A‾. B‾   Proof: The two sides of the equation i.e. = is represented with logic

Find out decimal equivalent of the hexadecimal number, What is the decimal ...

What is the decimal equivalent of the hexadecimal number 'A0' ? Ans. The decimal equivalent value is 160 of the hexadecimal number 'A0'. As   A        0      16 1     16 0    =

How does tcp/ip decide the size of an ip fragment, How does TCP/IP decide t...

How does TCP/IP decide the size of an IP fragment? Explain. TCP/IP protocol utilizes the name IP datagram to refer to an Internet packet. The amount of data carried into a data

Internet programming, Futoshiki is a game played on an N by N (usually 5 by...

Futoshiki is a game played on an N by N (usually 5 by 5) grid and uses the symbols 1 .. N. The objective of the game is to place each symbol on the grid so that it only occurs once

Show the simple arithmetic application, Q. Show the Simple Arithmetic Appli...

Q. Show the Simple Arithmetic Application? The question is why can't we simply employ XCHG instruction with 2 memory variables as operand? To answer the question let's look int

Why we use addressing schemes, Q Why we use addressing schemes? An ope...

Q Why we use addressing schemes? An operation code of an instruction tells the operation to be performed. This operation is executed on some data stored in memory or register.

Minmax search - artificial intelligence, MinMax Search Parents frequent...

MinMax Search Parents frequently get two children to share a cake by asking one to cut the cake and the other to select which half they want to eat. In this two player cake-sco

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd