Describe and compare the six sources of software

Assignment Help Management Information Sys
Reference no: EM131177156 , Length: word count:1500

COIT20248 Information Systems Analysis and Design

Assignment - About Systems Development

The tasks

For  the  purpose  of  this  assignment,  you  are  assumed  to  be  one  of  the  consultants  appointed  to shoulder  the  system analysis  responsibilities  in,  Logistics  Information  Systems  (LIS)  in  the project  outlined in the case study.

You will  plan  and manage  the project  as well  as  investigate  and document  its  system  requirements. For your Assignment 1 submission, you will produce a report that discusses this project based on your understanding of it and the related investigation results through the tasks below.

Task 1: Approaches to Systems Development

  • Discuss two approaches to system development. Describe system analysis and the major activities that occur during this phase of the systems development life cycle.
  • Describe and compare the six sources of software. How can you decide among various off-the-shelf software options? What criteria should you use? Do you think that in the given case study you can use any off-the-shelf software? Please provide justifications to your answer.

Task 2: Systems Requirements

  • What are the primary functional requirements for the system in the case study?
  • What are the non-functional requirements for the system in the case study?

Task 3: Project Cost Benefit Analysis

  • Discuss your Project Cost Benefit Analysis.
  • Provide an excel spread sheet with details in a Project Cost Benefit Analysis.

Task 4: Project Schedule

  • Show a work breakdown structure and a project schedule as a Gantt chart. Explain both of them and discuss how they relate to each other.
  • Given the system goals, requirements, and scope as they are currently understood, is the project schedule reasonable? Why or why not?

Task 5: System Information Requirement Investigation Techniques

  • Who are the stakeholders involved? Clearly list all identified external and internal stakeholders.
  • Describe three traditional techniques for collecting information during analysis. When might one be better than another?
  • Justify the usefulness of these 3 investigation techniques.


Attachment:- Assignment.rar

Reference no: EM131177156

Questions Cloud

In the context of software development projects : In the context of software development projects, a program manager was faced with the following choice last year: He had to option of going with a vendor who proposed a bid which was partly based on future integration costs that were beyond their con..
Ten principles of economics teach about : As part of a marketing research committee for your organization, you have been assigned the task of preparing a 700-word research paper about current microeconomic thought and theory. Use Principles of Microeconomics, Chs. 1, 2, 3, 4, 5, and 6, as..
What do you think is most important for hr professionals : Why do you think many new changes at the organizational level quickly fizzle out? What do you think is most important for HR professionals to know in order to avoid this?
Find a spanning tree for graph using breadth first search : Given the adjacency matrix of a connected undirected simple graph, find a spanning tree for this graph using breadth-first search.
Describe and compare the six sources of software : COIT20248 Information Systems Analysis and Design. Describe and compare the six sources of software. How can you decide among various off-the-shelf software options? What criteria should you use? Do you think that in the given case study you can us..
Unwanted economic policies unwillingly : Being that the government could impose unwanted economic policies unwillingly, what do you think will be domino effect of such actions?
Determine the bid price for contract : Stephen and Cory, Inc., invites bids for supply of 200,000 units of widget lids a year. You would like to bid on the contract. The plant manager believes that it would be cheaper to make these lids rather than buy them. Determine the bid price for th..
What are reasons why people react very differently : What are at least two reasons why people react very differently to the 9/11 attack than they do to daily starvation? What is Singer's goal with the Dora example? In other words, what is he trying to show us with the example?
Compute the number of different spanning trees of kn : Compute the number of different spanning trees of Kn for n = 1, 2, 3, 4, 5, 6. Conjecture a formula for the number of such spanning trees whenever n is a positive integer.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Explain a software selection process

Software Selection Process - Explain a software selection process for an organization. Describe the evaluation criteria that you would use.

  How to deploy and configure intranet and web applications

Propose the best way to plan, deploy, and configure the file servers. Determine how to deploy and configure the intranet and Web applications

  What are the responsibility of the systems analysts

How would you describe a programmer's primary responsibilities and contribution to the quality of the finished product? What are the responsibility of the systems analysts when training users

  Identify the discriminating value drivers

Identiy value drivers in purchasing a home computer. What if you were Dell? and You are buying a computer for home. Please identify the discriminating value drivers that would motivate your purchase decision.

  Supply and demand explained in this solution

Supply and demand explained in this solution - Which supply and demand hedging strategies (commodities futures, vertical/horizontal integration, etc.) would be the most appropriate to meet your customer requirements, based on the country's specific..

  Explain the difference between data and information

In 350 words explain the difference between data, information, and knowledge. Explain why information is a critical organizational asset, and explain the security professional's role in protecting this critical asset

  User documentation and system documentation

Explain the difference between user documentation and system documentation. What are the reasons underlying the popularity of online documentation? Are there any limitations to online documentation? Explain

  How to protect an organization

From the e-Activity, explain, in your own words, each security compliance measure and how each, in general, is designed to protect an organization

  Explain why and how the internet has influenced

Choose two of the assigned reading above and explain why and how the internet has influenced or changed our perception of time. For example, very few people wear watches anymore. The internet makes everything much faster, therefore we are expected..

  Examples of the growing use of blogs for politicsdefinition

examples of the growing use of blogs for politicsdefinition of blogging?1. address the features functions of a key

  Determine fundamental business advantages of e-business

Determine the fundamental business advantages and disadvantages of e-business and e-commerce across the business organization.

  Operation of ballarat trade fair consultancy

Analyse a set of data, and write a brief report (in Microsoft Word), identifying and explaining your insights into the operation of "Ballarat Trade Fair Consultancy".

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd