Develop a single dfd that shows processing for all events

Assignment Help Data Structure & Algorithms
Reference no: EM131098011

Case Study

Read chapters 4, 5 and 6 of the text and the case studies at the end of these chapters. Then answer the questions about the Rocky Mountain Outfitters case studies at the end of these chapters. Make answers short (2-3 sentences).

Textbook

Systems Analysis and Design in a Changing World by Satzinger, Jackson, and Burd Course Technology, Fifth Edition

Please find the attached paper for reading instructions

Suggestions and Guidelines:

-Use your own words and Thoughts. No Plagiarism.
-Give short answers to each question (not more than 3-4 lines)
-Total page length (not more than 3 pages, 300 words per page)
-1-inch margins, Double spaced, 12-point, Times New Roman font

Instructions:

Chapter 4

RETHINKING ROCKY MOUNTAIN OUTFITTERS

Barbara Halifax, the project manager for the CSS project, had finished identifying the list of stakeholders in the project. As shown earlier in the chapter, quite a few senior executives would be involved. Most of them would not have major input. Those in Bill McDougal's area would, of course. Not only was he the project sponsor, but all his assistants were excited about this new system and its potential to help the business grow. Barbara had a good working relationship with all of these executives. Barbara had also identified numerous department managers and senior customer service representatives who would be able to provide detailed processing requirements. She had divided her list of stakeholders into two groups. The first group consisted of all those with primary responsibility to help define user requirements. The second group included those who would not have direct use of the system but would need reports and information from the system. She wanted to make sure the needs of these people were also satisfied. As an experienced project manager, Barbara had her checklists of things to do. She used a project manager checklist to help her remember all important tasks. Being a project manager was much too critical, and potentially stressful, to do it "by the seat of your pants." As she reviewed her list, she noticed several activities that she had not yet considered on the CSS project. She was thinking that before she let her project team start to meet with the users, she ought to consider these items and review them with her team.

The items that most caught her attention were the following:

• Develop a communications plan with the user.
• Manage user expectations.
• Control the scope and avoid scope creep.

Based on the concepts you learned in this chapter, what would you do if you were Barbara? (You also might want to review Appendix A on the book's Web site). Obviously, you want to provide the best possible solution for the company, but you also need to control the project, the scope, and the users so that the system will be successful and be installed on time.

1. Identify the major points you would include in a communications plan at this point in the project.
2. What advice would you give your project team to help it manage the user expectations?
3. What early planning can you do now to ensure that the scope is realistic-to meet the need but within the time and budget allotted?

Chapter 5

RETHINKING ROCKY MOUNTAIN OUTFITTERS

When listing nouns and making some decisions about the initial list of things (see Figure 5-19), the RMO team decided to research Customer Account as a possible data entity or class if the system included an RMO payment plan (similar to a company charge account plan). Many retail store chains have their own charge accounts for the convenience of the customer-to increase sales to the customer and to better track customer purchase behavior. Consider the implications to the system if management decided to incorporate an RMO charge account and payment plan as part of the customer support system.

1. Discuss the implications that such a change would have on the scope of the project. How might this new capability change the list of stakeholders the team would involve when collecting information and defining the requirements? Would the change have any effect on other RMO systems or system projects planned or under way? Would the change have any effect on the project plan originally developed by Barbara Halifax? In other words, is this a minor change or a major change?

2. What events need to be added to the event table? Complete the event table entries for these additional events. What activities or use cases for existing events might be changed because of a charge account and payment plan? Explain.

3. What are some additional things and relationships among things that the system would be required to store because of the charge account and payment plan? Modify the entity-relationship diagram and the class diagram to reflect these charges.

Chapter 6

RETHINKING ROCKY MOUNTAIN OUTFITTERS

This chapter contains many DFDs describing the RMO order-entry subsystem but no DFDs describing the RMO order fulfillment subsystem, customer maintenance subsystem, or catalog maintenance subsystem (see the subsystem event lists in Figure 6-10).

Review the RMO event table (Figure 5-12) and ERD (Figure 5-29) and perform the following tasks:

1. Develop DFD fragments for all of the events not documented in Figure 6-12.

2. Develop a single DFD that shows processing for all events, using one process for each subsystem and showing all needed data stores. To simplify the diagram, place all external agents along the outer edge, and duplicate them as necessary to minimize long or crossing data flows. Place all data stores in the middle of the diagram.

3. Develop a data flow definition for the RMO customer order form in Figure 6-35.

Reference no: EM131098011

Questions Cloud

Develop a class for feasible-flow problems : Develop a class for feasible-flow problems that includes methods allowing clients to set supply-demand values and to check that flow values are properly related at each vertex.
Metal-tagged penguins : Do these data provide evidence that metal-tagged penguins have a later mean arrival time?
Explain how you might educate parents on implementing : Consider strategies for mitigating each issue that promote good self-perception, positive behavior, and mental wellness in the age group you selected. Reflect on how you might educate parents on implementing these strategies with their children.
Thresholds of a data-communications system : A manufacturer of power meters, which are used to regulate energy thresholds of a data-communications system, claims that when its production process is operating correctly, only 10% of the power meters will be defective.
Develop a single dfd that shows processing for all events : Develop DFD fragments for all of the events not documented in Figure 6-12. Develop a single DFD that shows processing for all events, using one process for each subsystem and showing all needed data stores.
Mutation develop breast cancer : In the general population, one woman in ten will develop breast cancer. Research has shown that 1 woman in 600 carries a mutation of the BRCA gene. Seven out of 10 women with this mutation develop breast cancer.
Find that a successful vectorized implementation is faster : E19: Numerical Methods for Engineering Applications Spring 2016 - HOMEWORK 13. You will find that a successful vectorized implementation is vastly faster than one with explicit loops. On my laptop, for N = 32, the looped code takes about 130 ms per..
Explain how the health concern is linked to health inequity : Explain how you would evaluate the effectiveness of the nursing action plan created in part D. Identify the measurable tools necessary to perform the evaluation.
Assisted reproductive technology : A study found that 38%of the assisted reproductive technology(ART) cycles resulted in pregnancies. Twenty-six percent of the ART pregnancies resulted in multiple births.

Reviews

Write a Review

Data Structure & Algorithms Questions & Answers

  Astronaut.data must be read into a 1-d array

Data from the Astronaut.data must be read into a 1-D array of structures(or classes) named ASTRONAUT and thereafter all processing must be performed on the array of structures.

  Calculate the diffie-hellman key values

Calculate the Diffie-Hellman key values. Calculate values for both keys (secret key a and secret key b). You must show your work for full credit.This includes the calculations each person performs to calculate and verify the values.

  Determine which of the following two graphs are planar

Determine which of the following two graphs are planar. Justify your answer. (You need to either show a planar embedding or use Kuratowski's theorem.

  Write an algorithm to add and multiply two large integers

Write an algorithm to add and multiply two large integers, which cannot be represented by built-in types. How do you represent a stack and a queue by using one-dimensional array?

  Evaluate algebraic expression by code with three-operand

Evaluate a short algebraic expression using code with three-operand instructions. The expression should have a minimum of three operands and 2 operators.

  Create a pda with 2 stacks

Create a PDA with 2 stacks. The first stack is preloaded with data (example below), the data input consists of 1 & 0 as well. Your PDA should process the input data, adding the binary string to the values in the first stack and storing the result in ..

  Writing the opeartors which contains the states

I want help with writing the opeartors which contains the states includiing its precondition and action for the eight queens problem. that is placing 8 pieces (the queens) on an 8 by 8 chess board. i want the code to be as basic and uncomplicated ..

  Primitives-remove ambiguities in algorithm-s representation

Describe how the use of primitives helps remove ambiguities in an algorithm's representation.

  Java program to find largest and smallest numbers

Create a Java program that will search a text document of strings representing numbers of type int and will write the largest and the smallest numbers to screen.

  State two different self-reductions for the sum problem

State two different self-reductions for the SUM problem and give recursive algorithms based on your divide-and-conquer self-reductions to solve the SUM problem.

  Determine effective transfer rate

Assume a network transmits 1024 byte packets having a 128-byte header and a four byte checksum. If a workstation on the network is guaranteed to be able to transmit one packet every x time units,

  What is the probability that you hire exactly n times

What is the smallest value of n such that an algorithm whose running time is 100n2 runs faster than an algorithm whose running time is 2n on the same machine?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd