What are your recommendations for backup and disaster

Assignment Help Computer Engineering
Reference no: EM132182783

Willowbrook School Chapter 12 Willowbrook School is a small private school that has retained your services as a systems analyst to assist in the development of a new information system for the school's administrative needs.

Background After implementation of a new system, it moves into the support phase of the SDLC. The system at Willowbrook has been up and running for five months now, and things are moving reasonably smoothly.

Willowbrook is pleased with the system's ability to handle registration and some of the school's other administrative and financial tasks. You have been asked to contract for ongoing support services on an as needed basis. The school would like to arrange for support services in such a way that your time is used as efficiently as possible because their budget for support is small.

Tasks

1. You are willing to charge a lower rate for ongoing support services because you designed the system. You want Willowbrook to use a specific procedure for requesting assistance and changes so you can plan your activities efficiently. Prepare a complete, written procedure for Willowbrook School maintenance change requests. Include appropriate forms with your procedure.

2. Write a brief report explaining the different types of maintenance activities, how they affect the system, and what the cost patterns are for the different maintenance types. Given the anticipated five year useful life of the system, can you suggest any priorities for spending maintenance dollars in each of those five years?

3. What are your recommendations for backup and disaster recovery for the new system? Provide Willowbrook with at least two scenarios for backup and disaster recovery, and present the strengths and weaknesses of both. Which is your preferred scenario and why?

4. You decide to prepare a security checklist for Willowbrook. Prepare a list of security issues that the firm should evaluate and monitor. Be sure to organize the items into categories that match the six security levels.

Reference no: EM132182783

Questions Cloud

How can we overcome these : Wireless is susceptible to many impediments due to the nature of the signal.
Write a system design specification document : Now you will determine the system architecture, which translates the logical design of an information system into a physical blueprint.
Takeover of the crimea in march 2014 : What level of analysis best explains the Russian takeover of the Crimea in March 2014? Which theory best explains the troubles of the subversion of eastern?
Bureaucracies of the executive branch : What is the relationship between the president and the bureaucracies of the executive branch, of which he is head?
What are your recommendations for backup and disaster : What are your recommendations for backup and disaster recovery for the new system?
Define the term hyperpartisanship : Define the term hyperpartisanship, and discuss why it has become more prevalent in modern American politics.
Diversity of hispanic americans : Explain the problems created by the diversity of Hispanic Americans.
What has been your concern about sharing information : Discussion deals with security controls available for Operating systems and more specifically it deals with firewalls and DLPs.
What about the dispersion of power : Countries with limits on government have usually had feudal pasts, which suggests what about the dispersion of power?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Give one example of a group using a set of residues

Show the number of elements in Galois fields in terms of a prime number. Give one example of a group using a set of residues.

  How does the skill set of an it sales manager differ

How does the skill set of an IT Sales Manager differ from that of the technical manager? Who do you think has the broader skills set

  Hokusai - sketching streams in real time

You will implement and experiment with several algorithms to approximate historical item counts in a space-efficient manner.

  What is the average number of bits necessary

suppose that symbols are compressed using Huffman Coding and that the most likely symbol is encoded as a 0, what is the decompressed value of the following compressed string of bits?

  Write pseudo code - program and draw flow chart

Write pseudo code, program and draw flow chart for programs

  Address the difficulties you think you will face

Briefly address the difficulties you think you will face in trying to deal with the five Practical Steps mentioned in Chapter 19.

  What file modes are available with sequential files

What file modes are available with sequential files? With direct files? What does the use type clause allow us to do? What occurs when an exception is raised?

  Derive the stagnation enthalpy equation

Derive the stagnation enthalpy equation (5-31), and reduce it to its low-velocity, constant-property boundary-layer form given by Eq. (5-34).

  Write a program that computes the markup percentage

Two other marketing terms are: percentage markup = markup/purchase price & profit margin = markup/selling price where the quotients are expressed as percentage

  Write register transfer sequences for instructions on asc

Write register transfer sequences for the following new instructions on ASC.

  Questionin following case statement replaces the 14 7 3

questionin following case statement replaces the 14 7 3 with values that are pulled from a table known as

  Implement a stack using linked lists

Implement the remaining operations defined in the Ordered List ADT. Implement a stack using linked lists. Implement a queue using linked lists.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd