Overview of company and client business case

Assignment Help Computer Engineering
Reference no: EM13828405

Develop a Key Assignment Project. The Key Assignment should be a Business Case that will consist of the following components:

  • Section 1 - Overview of Company and Client Business Case
  • Section 2 - Application Requirement Elicitation Strategy 
  • Section 3 - System Components and Design Requirements
  • Section 4- Methodology for Application Development Process
  • Section 5 - Complete Features and Trade-off Analysis
  • Section 6 - Milestones and Deliverables based on Date and Dependencies
  • Section 7 - System Architecture Aligned with System Requirements
  • Section 8 - Technical Design Document
  • Section 9 - Design Review Checklist
  • Section 10 - Testing and Deployment

Section 1 - Overview of Company and Client Business Case

Make a decision on a business case that will require the development and deployment of an IT Network System Application for a Millennium Church.  The business case will be for a church which delivers to its members and congregation via the Internet: Podcasts, Streaming Videos, and Books.

  • Create a name for your company and a profile for your company
    • What is your company's expertise?
    • Ensure that the expertise matches the skill sets required for the business case you have chosen 
  • Client Case Overview
    • What client business case did you choose and why?
    • How does your company expertise match your client's needs?
  • Client Application Solution
    • Based on the case you have chosen, what do you believe is the application solution? Why? 

Section 2 - Application Requirement Elicitation and Strategy

Determine the following:

  • How will requirement elicitation be conducted by your team?
  • Who will be the main stakeholder that you will be eliciting information from? 
  • What questions need to be answered and why?
  • How will you implement your elicitation strategy?

Section 3 - System Components and Design Requirements

Decide and discuss the following:

  • Based on the elicitation results, finalize the system components and design requirements that are needed for your business case.
  • Does the design solution support all the customer needs?
  • Provide specifics that the proposed application should address

Section 4- Methodology for Application Development Process

 Complete the following:

  • Choose a system development methodology for your project.
  • The methodology chosen should align with achieving the overall objective of your business case.

Summary and format of Deliverables


Section 1 - Overview of Company and Business Case

  • Your group's company name and profile
  • Client Case Overview
  • Client Application Solution

Section 2 - Application Requirement Elicitation and Strategy

Based on the group discussion, complete the following:

  • What elicitation strategy you will implement?
  • Who is the target audience?
  • What questions need to be answered and why?
  • Based on the implementation of your elicitation strategy, how did your application requirements change? Why?

Section 3 - System Components and Design Requirements

Leveraging the information gathered from the requirements elicitation process, complete the following specific to the system component you have been assigned:

  • Develop a document that clearly identifies the system component and design requirements meeting the client's need.

Section 4- Methodology for Application Development Process

  • What System Development Methodology was chosen and why?
  • How will this methodology be leveraged in this application solution? 
  • How did this differ from what you originally discussed in the discussion board?
  • Do you agree with the methodology chosen? Why or why not?
  • What are the benefits and constraints of the methodology specific to the system component you are working on?

Section 5 - Complete Features and Trade-Off Analysis

To be successful in the attempt to address your client's needs it is good practice to:

  • Develop a list of the deliverables based on the system requirements and their needs.
  • Complete a trade-off analysis
  • Update and finalize your requirements based on the trade-off analysis

Complete an analysis to identify features that might not be necessary to the client's needs versus their wants. 

  • Identify tasks that can be completed simultaneously in an effort to reduce development time and cost.
  • Keep in mind that the overall quality of the product should not be compromised during this rapid development.
  • These steps will aid in keeping the project within budget or reducing the overall development cost without compromising quality.

Section 6 - Milestones and Deliverables based on Date and Dependencies

In addition, you will start with the development of a schedule for deliverables. Be sure to include in this section the following:

  • Outline your milestones and due dates
  • Discuss the dependencies
  • Include information discovered during your small group discussion regarding quality
  • Use a program (like Microsoft Project) to show the specific milestones and dates which the will be completed.

The template document should follow this format:

  • Business Document Shell
  • Use Microsoft Word
  • Title Page
    • Course number and name----Leave Blank
    • Project name---Leave Blank
    • Student name---Leave Blank
    • Team Number and Members---Leave Blank
    • Date
  • Table of Contents
    • Use auto-generated TOC.
    • Separate page
    • Maximum of three levels deep
    • Be sure to update the fields of the TOC so it is up-to-date before submitting your project.
  • Section Headings (create each heading on a new page with TBD as content except for sections listed under New Content below)
    • Section 1 - Overview of Company and Client Business Case
    • Section 2 - Application Requirement Elicitation Strategy 
    • Section 3 - System Components and Design Requirements
    • Section 4- Methodology for Application Development Process
    • Section 5 - Complete Features and Trade-off Analysis
    • Section 6 - Milestones and Deliverables
    • Section 7 - System Architecture Aligned with System Requirements
    • Section 8 - Technical Design Document
    • Section 9 - Design Review Checklist
    • Section 10 - Testing and Deployment

Reference no: EM13828405

Questions Cloud

About xerox company : about Xerox company
Discuss the different kinds of storage devices : Discuss the different kinds of storage devices that you have used or that are available in the market.
Case study of bernard l madoff : Some say that Bernard L. Madoff is the biggest financial fraud in history. The New York Times gives us some background on Mr.Madoff "For Bernard L. Madoff, there was also his multimillion-dollar private foundation that doled out money to hospitals..
Importance of government regulation of financial markets : The regulations of financial services and institutions have received lots of attention especially in Europe and America, but the Middle East region has been somewhat inactive.
Overview of company and client business case : What is your companys expertise and Ensure that the expertise matches the skill sets required for the business case you have chosen - Overview of Company and Client Business Case
Discuss the pros and cons of the reimbursement method : Summarize 3 different reimbursement methods that are used by health care providers and organizations. Discuss the pros and cons of the reimbursement method(s) that you chose
How both formal and personal power is used in organization : Next, share an example of how both formal and personal power is used in your organization (past or present).  Do you believe that one way of attaining power is more effective than the other? Why
Analysis of the statistical tests : Create a draft of the graphs, summaries, and tables. You will be evaluated on the correct use of Minitab in performing the statistical tests. The results and analysis will be incorporated into your final paper.
Determine gibsons cost of capital - required rate of return : Determine the discrete probability distribution of Gibson's Net Present Value for this joint venture and calculate the Expected Net Present Value - What do you think would be the key underlying factor that would have the most influence on the prof..

Reviews

Write a Review

 

Computer Engineering Questions & Answers

  Why would a computer have difficulty answering them welldo

why would a computer have difficulty answering them well?do you think that there are also dangers involved? please

  Avoiding breaches in health care information system

Analyze the financial and privacy impacts of the breaches to health care information systems and make at least two recommendations in order to prevent such breaches in future.

  Questiondevelop a program that displays information about a

questiondevelop a program that displays information about a family member or friend. this program must print out

  How to organize the data for the high school reunion

many of your family members have found out that you are using Excel to arrange the data for the high school reunion. Your Uncle Larry wants to create an inventory of the over 800 video games that he collects.

  Difference between encapsulation and information hiding

define the difference between encapsulation and information hiding. In addition, I need to explain the role both of these concepts play in helping to make designs more robust and extensible.

  1 create a short email message on the importance of a

1. create a short email message on the importance of a college education.2. add a signature to the email.3. email the

  What are the different kinds of storage

What are the different sorts of storage available for a computer system? Regardless of the type of storage used by your computer systems, why would you want to back it up.

  Make a proposal to deploy windows server onto an existing

make a proposal to deploy windows server onto an existing network based on the provided scenario. the proposal will

  What some of the most common symptoms of malware

What are instance of harmful spyware application? What risk or threat do they pose to workstation domain.

  Find out if they can be formed into a triangle

Write down a JavaScript program that allows a user to input three integers using text boxes in a form. (Hint: You need to use the built-in parseInt function to convert the input strings to integers.) Test the three integers to determine if they ca..

  Advantages of technologies

List some of the advantages of some of current technologies explained in our reading this week involving VoIP, Virtual Private Networks, Unified Communications, Wi-Fi and wireless technologies such as RFID.

  Given the following array declaration and program statement

given the following array declaration and program statement describe--in detail--the condition and what potential

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd