Determining the feasibility study

Assignment Help Basic Computer Science
Reference no: EM131240248

The Feasibility Study

Assignment Overview

IT systems are a major capital investment and the systems analyst is called to investigate the feasibility of a system and help answer the questions - Will the system pay for itself? In how long will it pay off? Are the other technologies that will have a better return on the investment? Module 3 emphasizes the need of making management recommendations in a proposal called the feasibility study report. Feasibility is defined as the value that an IT system will provide to the organization in terms of tangible and intangible benefits. Following the problem analysis definition and requirements, the feasibility study is prepared considering elements such as economic, technical, operational, schedule, legal/contractual, and political challenges. This analysis determines the readiness and worthiness of an IT system, and the category domains are defined as follows.

Economic - What is the TCO (total cost of ownership)? Is the ROI positive?

Technical - Is hardware available? Do we need to purchase it?

Operational - Are resources available? Do we need training and change management plans?

Schedule - Can the system be available within a reasonable time?

Legal - Are permissions being filed with state and federal regulations?

Political - Is the system in compliance with federal and state agencies?

Most analysts agree that the first four categories are sufficient to analyze a system, but legal and political criteria are used to evaluate R&D projects or projects using emerging technologies. Holdstrand and Holz-Clause' articles closely examine the four feasibility categories.

Holdstrand, D, & Holz-Clause, M. (2009). What is a feasibility study. AG Decision Marker. Retrieved from

https://www.extension.iastate.edu/agdm/wholefarm/html/c5-65.html

https://www.extension.iastate.edu/agdm/wholefarm/html/c5-66.html

https://www.extension.iastate.edu/agdm/wholefarm/html/c5-64.html

Case Assignment

The Case for Module 3 is a hands-on project illustrating how a business analyst would build a short feasibility report. You can review Sage Peachtree accounting system at https://na.sage.com/sage-50-accounting-us/ to formulate an idea of accounting systems and how the features work for your in-house development assignment. Please assume that the new system is for a small company growing to medium size.

  • You have been assigned to prepare a feasibility study report for an accounting information system. At this point, please assume that you will build an in-house solution.

Use the following site as a reference to develop the feasibility study report.

FreeTutes. (2012). Feasibility study. Systems Analysis and Design. Retrieved from https://www.freetutes.com/systemanalysis/sa3-feasibility-study.html

Include the following report sections with corresponding section subtitles to organize the report:

  • Cover page
  • Introduction page stating the problem background, summary of needs for an accounting system, interviews conducted, and project stakeholders
  • Articulate 3-5 system requirements
  • Discuss the economic, technical, operational, and scheduled feasibility.
  • Conclusions

Assignment Expectations

Your paper should be short (2-4 pages, not including cover sheet and references) and to the point. It is to be structured in the following manner.

You are expected to:

  • Write this paper using the recommended feasibility study sections
  • Cite appropriate sources and answer questions directly. Be sure to make the most effective case you can. Then present the best evidence you can, again citing appropriate sources.

By the end of your paper, you should be able to distinguish the types of feasibility studies applicable to a new project and document such findings into a management report.

Reference no: EM131240248

Questions Cloud

Develop formula for predicting stable output value : Describe briefly (10 sentences maximum) all the differences between a feed-forward neural network and a neural network having feedback.
Prepare a statement of retained earnings in proper : Prepare a statement of retained earnings in proper form for White Corporation for the year ended December 31, 2012, from the following: Retained Earnings, January 1, 2012 $2,000Dividends paid.
Determine the type of representation of knowledge : Determine the type of representation of knowledge of the robot's simulated environment to be used and processed by a self-organizing neural network acting as its "brain." By changing the environmental conditions, determine which conditions the rob..
What conclusions can you draw from this exercise : Compare the effect with a map of a cerebral cortex (Figure 10.40). What conclusions can you draw from this exercise?
Determining the feasibility study : IT systems are a major capital investment and the systems analyst is called to investigate the feasibility of a system and help answer the questions - Will the system pay for itself?
What is the expected effect of increasing horsepower : What is the expected effect of increasing horsepower on 0-60 time? - Interpret your estimated coefficient on WEIGHT.
Study the impact of changing the epsalpha coefficient : You can set a value 1 to this coefficient and the learning coefficients will not decrease or set a value slightly more than 1, which will result in more "brutal" learning at every step. Describe the results.
Benefits of using wsus over the traditional imaging process : What are the benefits of using WSUS over the traditional imaging process?
How many neurons constitute a neighborhood : This number should depend on network size and the default setting. However, we suggest as an exercise a careful examination of its impact on network behavior. Note that larger neighborhood range numbers visibly slow the learning process.

Reviews

Write a Review

 

Basic Computer Science Questions & Answers

  Review the nist guide to industrial control systems

Review the NIST Guide to Industrial Control Systems Security.NIST Special Publication (800-82). Specifically review section 6.2, which covers the application of security controls for ICS's.

  Corporate proposal for sql server

ESL Inc. is a large company that has been using a series of spreadsheets, access databases, and manual records to keep track of the majority of the organization's internal and customer data. They have grown significantly over the years and are now..

  Write voip research paper

Write VoIP Research Paper. Write a term paper in which you introduce the issue, define the problem, research the literature, analyze the problem, offer possible solutions, propose a single solution, develop an implementation plan, and justify why/..

  Building successful information systems

Building successful information systems, Management support systems

  Successful technological innovations

Many successful technological innovations originated in small start-up organizations, while others originated in large, well-established organizations. Successful technological innovations

  New database system to record

An IT company developed a new database system to record the statics data of the coming Opera House Open Day including the number of reservations X, remaining gifts Y and meal combos ordered Z. Here is a schedule of three transactions:

  Determines how the agent would use the system trigger

This example use case determines how the Agent would use the system Trigger: Relationships: Normal Flow of events: Subflows: None Alternate / Exceptional Flows:

  Contrast social media and social networks

o Compare and contrast social media and social networks. o Correctly identify social media cites or social networks.

  Copy and paste the code

Copy and paste the code below in a filename LastFirst_lab43.cpp (e.g. DoeJoe_lab43.cpp) and save it in Lab 4 folder. Bring in the LastFirst_lab43.cpp program from the Lab 3 folder.

  What social engineering and physical security aspects

What sort of attacks would work in this case. Give some examples and how you would carry them out. What social engineering and physical security aspects were discovered/devised. Give a detailed explanation.

  Security being a top concern for any organisation

Task Task: Security being a top concern for any organisation, choosing the correct security solutions is of utmost importance. Consider an area of information technology (IT) security, such as, network security, e-mail security, database security ..

  Compute mttf of the system

Suppose we have an eight CPU computer with four hard drives. MTTF of each cpu is 100000 hours and the MTTF of the hard drive is 50000 hours. What is the mttf of the system?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd