Evaluating two hardware lease proposals

Assignment Help Basic Computer Science
Reference no: EM131156728

Question 1 of 5:

a)  Suppose you are evaluating two hardware lease proposals. Option 1 costs $10,000, but requires that the entire amount be paid in advance. Option 2 costs $14,000, but the payments can be made $2,000 now and $2,000 per year for the next six years. If you do a present value analysis assuming a 15 percent discount rate, which proposal is less expensive?

*** For this question, please limit you response to a maximum of two pages.
    Justify all your numerical answers and answer all the questions using your own words.
    Show all your work, including how you found your answer (this is very important and
    essential to have your answer graded appropriately!).

b)  In the following proposed DFD design, there are some typical errors among external entities (E), processes (P) and data stores (DS). Identify and explain any errors in the following design.

2199_evaluating two hardware lease proposals.png

a)  You are a project manager at L & D Inc., specialized in information technology and network engineering. One of your junior systems analyst came to you for an advice of a technology to capture user information requirements. He described to you that he had talked with his client several times in the past week to define user information requirements. Each time he thought he had captured user information requirements, they've already changed. Finally, he thinks his clients do not even know what they want for their system.

Give your junior systems analyst an advice of a technology that he could use to capture user information requirements and explain to him how this technology can help him to better define users' information requirements.

*** For this question, please limit you response to a maximum of one page.

Clarification:

Students should take the word "technology" as being defined in several dictionaries as a scientific method, technique, theory, or practice to solve a practical problem. I copy here some definitions of the word "technology" from several dictionaries that you might refer to answer your question.

1. The application of science, especially to industrial or commercial objectives.
2. The scientific method and material used to achieve a commercial or industrial objective.

3. The application of practical sciences to industry or commerce.
4. The methods, theory, and practices governing such application a highly developed technology.

1. The use of scientific knowledge to solve practical problems, especially in industry & commerce.
2. The specific methods, materials, and devices used to solve practical problems.

Question 2 of 5:

Mr. Smith, who owns a furniture company, wants to develop an information system for tracking shipments to warehouses. Using the data from the table below, please do the following:

1.  Draw a Gantt chart (learned from this course) to help Mr. Smith organize his design project.

2.  When is it appropriate to use a Gantt chart?  What are the disadvantages?

3.  Drawn a PERT diagram (learned from this course) and then list all paths, calculate and identify the critical path.

*** For this question, please limit you response to a maximum of two pages.

Description

Task

Must Follow

Time (Weeks)

Generate data flow

A

None

7

Build decision tree

B

A

4

Build data dictionary

C

B

10

Write up project

D

C and H

4

Design output prototype

E

None

2

Revise output design

F

E

9

Write use cases

G

None

10

Design database

H

G and F

8

Question 3 of 5: (20 points)

A summary of business activities for registering courses for enrolled students
and for registering class lists for faculty members and administrators at an
online university is as follows:

Students log into a system with their "user name and password" that is validated by a secure logon system handled by a "Network and Security" department. Students then send in a course registration form consisting of their personal information and their desired courses. The system checks that the courses are available and that the student is academically qualified to take the course.

Students could pay for their courses by credit cards or they could pay through the Federal Student Aid (FAFSA), if qualified. For the FAFSA students, the system checks with the "Business" department to see if the student is financially qualified to take the course. For credit cards, the system validates students' credit card information through a credit card company and generated appropriate status message to students.

Based on the checking results, the system will send to the student a confirmation and/or rejection letter for each requesting course with detailed information of what to do next in either case. In addition, for any rejection cases, the system will also notify the Counselor department so students could arrange appointments to talk with their counselors to resolve their issues, if possible.

Draw a context diagram for the "Courses Registration" system.

Question 4 of 5:

Draw an entity-relationship diagram (ERD) in the third normal form for a "student database record" system based on the following situation:

  • A student may register for many courses, and a course may have many students.
  • A student may have many professors, and a professor may teach many students.
  • A student is assigned only one counselor, but each counselor usually has many students.

Identify relationships among the diagram entities as "one-to-one" and/or "one-to-many", if any. Identify entities as "entity" or "associative entity".

Question 5 of 5:

Consider a research management system in which faculty members from different departments are often collaborated to a research project. Each faculty member
is allocated with a certain amount of research fund. The following is an
example of an un-normalized RESEARCH-DATA table for two research projects.

RESEARCH-DATA

Research ID

Research Name

Start Date

Faculty ID

Faculty Name

Research Fund

Department ID

Department Name

1

E-Commerce

04/10/2015

2489

Smith

$200,000

1

ITEC

 

 

 

1887

Jones

$5,000

1

ITEC

 

 

 

9540

Mike

$25,000

5

ISAS

2

Cloud Computing

12/15/2015

3436

Catherine

$200,000

2

BUS

 

 

 

2489

Smith

$10,000

1

ITEC

Perform the normalization process to convert the above un-normalized table to:

1. First normal form (1NF)

2. Second normal form (2NF)

3. Third normal form (3NF)

Please show all your work. Please show each step along the way and identify primary keys, if any, in each table in each step.

Reference no: EM131156728

Questions Cloud

Compare and contrast the three different vendors : Compare and contrast the three different vendors. Be sure to consider the services, data solutions, and security features they provide. Based on your analysis, provide a recommendation about which provider or solution you think would work best.
Determine the direct material quantity variance : The following data is given for the stringer Company:- Overhead is applied on standard labor hours. Determine the direct material quantity variance
Discuss the effects of your own enculturation or group : Examine at least two (2) types of biases that you likely experienced as you evaluated the premises for and against your position. Discuss the effects of your own enculturation or group identification that may have influenced your biases
Will the hemispheres come apart : The sphere is hung from the ceiling and you pull the other half with the force of your body weight. Will the hemispheres come apart? Support your answer with calculations.
Evaluating two hardware lease proposals : a)  Suppose you are evaluating two hardware lease proposals. Option 1 costs $10,000, but requires that the entire amount be paid in advance. Option 2 costs $14,000, but the payments can be made $2,000 now and $2,000 per year for the next six years..
Transformational leaders and charismatic leaders : Three important types of leadership are transactional leaders, transformational leaders, and charismatic leaders. For this post, provide specific situations where each of these leadership types could be useful.
Explain importance of mis in relation to datadriven decision : Explain the importance of MIS in relation to data-driven decisions. Describe the techniques and tools that can be utilized to manage the data. Include at least 2 effective techniques and 3 effective tools.
Calculate the saturation pressure at 100 °c : If EV, LE, are the distances between points (L, E) and (E, V) respectively (Fig. 2-3), show that the liquid and vapor fractions corresponding to point E satisfy the relationship
Estimate the equipment : he equipment was ready for use on April 1, 2012, but the company did not start using it until May 1, 2012.

Reviews

Write a Review

 

Basic Computer Science Questions & Answers

  Develop in accordance with systems development life cycle

This assignment consists of two (2) sections: a project introduction and a Gantt chart or project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the ass..

  Covert the subsequent decimal numbers into binary numbers

Write the results of the two numbers (in decimal) after the BIT operations and please covert the subsequent decimal numbers into binary numbers:  (using 2 bytes = 16 bits)

  Migrating business-critical applications

Migrating business-critical applications

  Convert hand-drawn diagram to a fully labeled visio diagram

1.Using the IP addresses provided by your instructor, hand-draw a network diagram of your network configuration. (This will include at least two Windows Servers and one Workstation.)2.Convert the hand-drawn diagram to a fully labeled Visio diagram.

  Write a method called evenly divisible

Write a method called evenly Divisible that accepts two integer parameters and returns true if the first parameter is evenly divisible by the second, or vice versa, and false otherwise. Return false if either parameter is zero.

  Time evolution of a closed circular string

At t = 0, a closed string forms a circle of radi us R on the (x , y) plane and has zero veloci ty. The ti me development of this string can be studied usi ng the action (6.88).

  What sequence of bytes would be transmitted

What sequence of bytes would be transmitted immediately prior to the CRC?

  Why they are important in business intranets and extranets.

Why is it increasing most important for a CIO or IT executive who oversees geographically distributed enterprise networks to be business literate?

  Why is the internet a stupid network

Briefly define an "intelligent" network and a "stupid" network. Why is the Internet a stupid network? How do the two types differ in terms of security and privacy qualities?

  Show that the average cost of garbage collection

Assuming that the total amount of heap space live at any point is constant, show that the average cost of garbage collection (per heap object allocated) can be made arbitrarily cheap by simply by increasing the memory size allocated to the heap.

  Operating system of a computer executes

What is the name of the technique in which the operating system of a computer executes several programs concurrently by switching back and forth between them?

  Effectiveness of different ways of mitigating

Describe one of the security threats that might be encountered when using cloud-based resources and then compare and contrast the effectiveness of different ways of mitigating this threat. Have you heard of any threats similar to this really happe..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd