Describe the relationship between systems and infrastructure

Assignment Help Management Information Sys
Reference no: EM131321795

Project Assignment: Business Requirements

Please it has to be original work never sold to no one and no PLAGIARISM

This assignment consists of two sections: a business requirements document and a project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

Procuring quality business requirements is an important step toward the design of quality information systems. Completion of a quality requirements document allows user needs and expectations to be captured, so that infrastructure and information systems can be designed properly. Your company, which is a data-collection and analysis company that has been operating less than two years, is seeking to create a repository for collected data beyond standard relational databases. Your ten terabyte data warehouse is expected to grow by 20% each year. You are mindful of data warehousing best practices which will aid you immensely in your requirements gathering effort. Using the requirements document provided in the course shell, you are to speculate on the needs of the company. You must consider current and future requirements; however, assumptions should be realistic and carefully considered.

Section 1: Business Requirements Document

1. Write a four to six page original business requirements document for the project plan using the template provided. Note: The template is provided under the Additional Resources in the Student Center tab of the online course shell.

o Describe the project including the following:

- Describe and define the scope of the project.
- Speculate as to how to control the scope.
- Identify possible risks, constraints, and assumptions.
- Describe the relationship and integration between systems and infrastructure. Note: Database and Data Warehousing, Analytics, Interfaces and Cloud Technology, and Infrastructure and Security should be considered.
- Speculate upon potential outsourcing or offshoring needs.
- Identify and justify the necessary resources including staffing that are necessary.
- Define relevant terms that will be used throughout project.

o Use at least two quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Section 2: Revised Project Plan

Use Microsoft Project to:

2. Update the project plan from Project Deliverable 1: Project Plan Inception, with three to five new project tasks each consisting of five to ten sub-tasks.

The specific course learning outcomes associated with this assignment are:

• Evaluate an organization through the lens of non-IT senior management in deciding how information systems enable core and supportive business processes as well as those that interface with suppliers and customers.

• Use technology and information resources to research issues in information systems.

• Write clearly and concisely about strategic issues and practices in the information systems domain using proper writing mechanics and technical style conventions.

Reference no: EM131321795

Questions Cloud

Design and conduct if possible an archival research study : Design an observational study of your own, including the creation of a set of behavioral categories that would be used to code for one or more variables of interest to you.
Discuss any security surveillance system : What is social engineering? Why do security experts worry about social engineering? What is the best way to deal with social engineering?
What cultural tools might you use : What cultural tools might you use to maintain the historical traditions of your country? Please give two specific examples - Provide two positive examples of cross-cultural influences to the people of your country. Why would they be considered posi..
Describe the procedures of hypothesis testing : With reference to the flow chart in Figure, use your own words to describe the procedures of hypothesis testing.- Explain why scientists can never be certain whether their data really support their research hypothesis.
Describe the relationship between systems and infrastructure : Identify possible risks, constraints, and assumptions. Describe the relationship and integration between systems and infrastructure. Identify and justify the necessary resources including staffing that are necessary.
Discuss a good security auditing system : What is the best way to deal with the security threat due to human factors?
Evolution of multicultural management ethics theory : Assessing the evolution of multicultural management ethics theory from the foundational thinking in the field to present-day concepts. Evaluating how multiculturalism affects an organization's management
Prepare two schedules for inventory : Prepare two separate schedules computing cost of goods sold and supporting schedules showing the composition of the ending inventory under both cost flow assumptions.
List as many of the emergency agencies in your community : We pointed out that the development of a good disaster recovery plan requires risk assessment. Design a matrix for the risk assessment of your security lab.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Importance of balancing security and business functionality

Discuss in your own words the importance of balancing security and business functionality. Determine why upper management buy-in for a security program is essential for the program's success and compliance of end users.

  Identify the strengths and weaknesses of reliance

Identify the strengths and weaknesses of reliance on quantitative data for this type of research design

  Discussion of the registered traveler program

Provide a discussion of the Registered Traveler program. Be sure to include a discussion of the technology as well as the impact for airports and airlines. How do Centralized Communication Centers improve airport efficiency

  Describing your selected organizations security posture

create an executive summary presentation describing your selected organization's security posture and your recommendations for improvement

  Write a research paper and also a draft for the homelessness

Write a research paper and also a draft for the Homelessness.

  Analysis of use of new technologywhat are some of the pros

analysis of use of new technologywhat are some of the pros and cons of using newer communications technologies when

  Technology in business changes and challengeswhat changes

technology in business changes and challengeswhat changes have you experienced in your job role recently as a result of

  Improve e-discovery and incident management

From the e-Activity, determine which of the seven recommendations to improve e-Discovery and incident management you would consider the most important for organizations to address. Justify your answer

  Explain offshore outsourcing for software development

Tablets Take Their Place in the PC Market - What will happen to offshore outsourcing for software development? Can outsourcing firms in India and China for example be expected to develop software systems for use in U.S. schools?

  Your work as a management information consultant has led

your work as a management information consultant has led you to a long-term project working on a custom decision

  What is the difference between usability and accessibility

What is Web Technology? Define and provide two examples of webtechnology and where is has been implemented. How has digitization changed the manner in which society consumes information? How has perception of information by the public changed as a re..

  Create an annotated bibliography with all of your articles

For this assignment, locate and read seven scholarly articles on a topic of interest in Information Systems. Next, create an annotated bibliography with all of your articles. Annotated bibliographies contain an alphabetical list of your references..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd