Develop a plan for data conversion and system changeover

Assignment Help Computer Networking
Reference no: EM13835612

System Design Part A

The Willowbrook School staff accepted your interface, output, input, and data designs. Now you will determine the system architecture, which translates the logical design of an information system into a physical blueprint.

Tasks

1. Design a system architecture for Willowbrook School based on file server or client/server architecture? Discuss advantages and disadvantages that should be considered when making this decision within the context of Willowbrook School. Speak to the cost-benefit
issues of file server and client/server designs.

2. Based on your chosen architecture from task 1, what physical and logical network topology would you recommend for Willowbrook School?

3. Now that you have developed a systems architecture and physical topology for the network, make a list of the hardware that will be required for Willowbrook. Review the background information in previous chapters to develop your list.

4. Write a system design specification document for Willowbrook's new information system.

System Design Part B

The systems design has been completed and design specifications approved. You are now beginning the implementation phase of the SDLC, which includes application development, installation, and evaluation. One of the parents at Willowbrook has extensive experience with the database package as a Database Administrator at a local company, and has committed to providing 15 hours per week working with you to develop and test the project. You should assume that the server, switch, and workstations discussed in Part A have been purchased,
installed, and networked.

Tasks

5. Choose an application development methodology for the Willowbrook system. Discuss the advantages and disadvantages of structured, object oriented, and agile development.

6. What types of testing should be performed? What types of test data should be used?

7. Identify the specific groups of people who need training on the new system. For each group, describe the type of training you would recommend and list the topics you would cover.

8. Develop a plan for data conversion and system changeover that specifies which data items must be entered, the order in which the data should be entered, and which data items are the most time critical. Discuss what method should be used for system changeover.

Reference no: EM13835612

Questions Cloud

Permanent collection of the indianapolis museum of art : You will be writing a compare/contrast essay based upon two works of art from the permanent collection of the Indianapolis Museum of Art. The works you choose should be from the time period we study in this course: Prehistoric through Gothic
Describe a decision tree how such a tool can be utilized : Describe a decision tree how such a tool can be utilized
Find a description in a computer or business magazine : Analyze Toromont and its business model using the value chain model - How well did Toromont's systems support its business model? What management, organization, and technology factors were responsible for its problems?
How is quality of healthcare data defined : How is quality of healthcare data defined
Develop a plan for data conversion and system changeover : Develop a plan for data conversion and system changeover that specifies which data items must be entered, the order in which the data should be entered, and which data items are the most time critical.
Create an annotated bibliography : Create an annotated bibliography
Inadequate pay for performance : No clear link between strategy and the operating budget. Lack of individual accountability for results. Lack of meaningful performance measures. Inadequate pay for performance.
Evaluate capital project technique and cost of capital : Evaluate capital project techniques and cost of capital valuation
Manipulation is a potential concern in money markets : Manipulation is a potential concern in money markets, particularly when a commercial bank holds a profitable position in which it can gain from may be an increase in interest rates.

Reviews

Write a Review

Computer Networking Questions & Answers

  Which leading vendor monitoring package would you select

you are working as the network administrator in abc technologies. your companys network has been experiencing many

  Describe the osi model and how it relates to a network

Describe the OSI model and how it relates to a network in 200 to 300 words. Your response must include answers to the following: On which layers of the OSI model do WAN protocols operate

  Decision of what type of wan or man architecture to use

The Internet is easily the mostly widely used and accessible network in the world. But how is it constructed? Many say the Internet is simply many separate networks connected together.

  Calculating higher data rate in atm line

Dog can travel to your side, wherever you may be, at 18 km/hour. For what range of distances does dog have a higher data rate than 155 Mbps ATM line?

  Explaining web-based interface running on another serve

Display it via a Web-based interface running on another server. What are security issues that could plague this solution if not attended to?

  Create a network design for training environment

Create a network design which accommodates these requirements and keeps costs down. These training environments a maximum of one instructor and 12 students.

  Will it travel through any routers

A host with IP address 122.34.23.11 sends a message to a host with IP address 136.34.23.11. Does the message travel through any routers? Explain why. (Assume no sub-netting)

  News regarding wireless hacking-hardware hacking

The key to this assignment is to demonstrate your understanding of the topics, not to re-word the text or reference material. Please see Appendix A for the grading rubric on all written assignments.

  Give an illustration of a software system for which

question 1 give an example of a software system for which developing a prototype would result in saving a significant

  Alphabet of 10 digits, 26 letters, and 3 punctuation marks

the ciphers in the following problem use this alphabet of 10 digits, 26 letters, and 3 punctuation marks - 39 charactters is all 0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ

  Compute maximum throughput rate-host can achieve in network

Consider a 100mbps token ring network with 10 stations having a ring latency of 50¹s. Calculate the maximum throughput rate that one host can achieve in the network.

  Snmp security

SNMPv1 is the most commonly used version of SNMP even though it provides little support for security. Why not change to another version of SNMP?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd