Explain the concepts of object orientation methodology

Assignment Help Computer Engineering
Reference no: EM132271636

Case Study- University Enrolment system

Task: You are provided with a case study about a university that needs information system for student enrolment. In your role as System Analyst, you will help the business in development of the new information system.

Read the detailed case study which is available in Interact2 site under "Assessment" category and then complete the following task. Please note, you will use the same case study to complete assignment 1, assignment 2 and assignment 3.

In inception phase of the project, your goal is to investigate the scope of business information systems of the given case study. To present your understanding of the project, you are required to submit a System Vision Document which includes the project introduction, important system capabilities, perceived business benefits, resources required, stakeholder map, the broad feasibility of the project (i.e., risks) and proposed outcome based on the analysis of the case study.

Rationale: This assessment task will assess the following learning outcome/s:

• be able to explain and apply the concepts of object orientation methodology.

• be able to describe the relationship of analysis and design activities to the System Development Life Cycle (SDLC).

• be able to analyse a case study and construct a business proposal to argue the feasibility of a client software proposal.

Information related to above question is enclosed below:

Attachment:- Casestudy.rar

Reference no: EM132271636

Questions Cloud

Major changes in the last decade : Do you think the internet services in the U.S. has had major changes in the last decade? Why or why not?
Obstacles for readers of technical writing : All of the following are obstacles for readers of technical writing EXCEPT:
Why is metacognition important with regards to resilience : Why is metacognition important with regards to resilience, professional and personal growth?
Partnering with third-party data centers : 1) Summarize the major reasons why businesses are partnering with third-party data centers?
Explain the concepts of object orientation methodology : You are provided with a case study about a university that needs information system for student enrolment. In your role as System Analyst, you will help.
Create the return a dictionary : Write the function named shareALetter that takes one parameter, wordList - a list of words. Create the return a dictionary in which each word in wordList
More rest and less stress : Time Wasters: Share few of the things in your life that you consider to be “time-wasters” that you need to get rid of or reprioritize.
Responsive and responsible in terms of sourcing : Explain the difference between being responsive and responsible in terms of sourcing. Can a bidder be responsive, but not responsible?
Discuss what wireless technologies : Discuss what wireless technologies you have used. Do you have wireless networks at home? If so, what standards does it use?

Reviews

Write a Review

Computer Engineering Questions & Answers

  What error will takes place when executing the following

what error will occur when executing the following code? explain fully how you get to your answer. what changes should

  Developing the algorithm and analyzing its running time

Katt wishes you to develop an algorithm that, provided a string X, computer efficiently how many ways X can be broken up into the sequence of words.

  Create a application that contains two textboxes and buttons

Create a Windows application that contains two textboxes and two buttons. The textboxes should be used to allow the user to input two positive numeric values.

  Why do we need groups for user management

What are the three files mentioned in this chapter that contain information about a user's account and the user's group?

  Write a function that will accept a structure an argument

Write a function that will accept a structure an argument, and return two cell as arrays containing the names of the fields of that structure.

  What are the information security policies

Using a web browser, search for any information security policies used at your academic institution. Compare them to the ones discussed in this chapter.

  What are the advantages of this architecture

Reduced instruction set computers provide a large number of general-purpose registers and very few memory access instructions. Most instructions use registers instead of memory. What are the benefits of such architecture? Can you think of a disadv..

  Research about the network security tools

Research one of the tools listed in the chapter or linked above. Discuss its relevance to the job and output. Does it give enough information?

  How you will apply collaboration in course with your team

Consider the multiple definitions of collaboration. Define collaboration and how you will apply it in this course with your Learning Team. Be sure to reference and cite your sources.

  What network device or devices can be used to address

In relation to Internet connectivity, both you and the chemists at Plains Research are concerned about security.

  What is effect of memory organization on microinstruction

Assume that ASC memory is built by (two-way) interleaving two 32 Kwords blocks. What is the effect of this memory organization on the microinstruction sequence.

  Cost benefits to cloud computing

discuss whether or not there are cost benefits to cloud computing using specific examples. Be sure to include at least three reference sources.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd