Explain the costs involved in the creation of the system

Assignment Help Management Information Sys
Reference no: EM131829878 , Length: 4

Your sister owns a small clothing store. During a conversation at a family dinner, she mentions her frustration with having to manually track and reorder high demand items.

She would like an automated system but has a very small budget.

Write a 4-5 page paper in which you create a plan for a low-cost automated inventory system in which you:

• Describe all the necessary equipment.

• Explain the costs involved in the creation of the system.

• Describe the ongoing maintenance that will be required.

• Provide a workflow diagram in Visio or equivalent software to illustrate how the system will work.

Your assignment must:

• Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

• Include charts or diagrams created in Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice. The completed diagrams/charts must be imported into the Word document before the paper is submitted.

The specific Course Learning Outcomes associated with this assignment are:

• Describe the types of business needs that can be addressed using information technology-based solutions.

• Create requirements for a system through a formal technique that enables a productive change in a way the business is conducted.

• Use contemporary CASE tools in process and data modeling.

• Use technology and information resources to research issues in systems analysis and development.

• Write clearly and concisely about Systems Analysis and Development topics using proper writing mechanics and technical style conventions.

Reference no: EM131829878

Questions Cloud

Determine the pr of the number of red balls : If 5 balls are selected at random, without replacement, determine the pr. of the number of red balls that will be obtained.
What is the probability that more than 3 red balls : If 10 percent of the balls in a certain box art red and if 20 balls are selected from the box at random, with replacement
How many cones will ticsell per year : Betsy McGee launched the Thai Ice Cream (TIC) shop in an area where with 35 potential customers per square mile. How many cones will TICsell per year?
Suppose that on each play of a certain game : Suppose that on each play of a certain game, a person will either win one dollar with probability 1/3 or lose one dollar with probability 2/3.
Explain the costs involved in the creation of the system : During a conversation at a family dinner, she mentions her frustration with having to manually track and reorder high demand items.
What is the probability that box a will become empty : If this process of selecting a box at random and transferring one ball from that box to the other box is repeated indefinitely, what is the probability that box
Problem on-Performance Appraisals and the Law : Most employee complaints related to performance evaluations are based on alleged violations of employment law. Determine what you think would.
What is the probability that the first three rolls : What is the probability that the first three rolls each yielded the number 6?
What is the probability that the person is a statistician : If you meet a shy person at random at the gathering, what is the probability that the person is a statistician?

Reviews

Write a Review

Management Information Sys Questions & Answers

  What are the steps in creating each budget

Discuss the difference between an operating budget and a capital budget. What are the steps in creating each budget?

  Describe functional and non-functional requirements

Practice elicitation techniques, define functional and non-functional requirements, write use case scenarios, explore user interface alternatives, learn how to analyze and model the requirements, and develop a requirements traceability matrix that..

  How do you feel health care reform will promote approach

How do you feel health care reform will promote or hinder collaboration and an interdisciplinary approach at community health centers?

  Explain benefit of risk assessment for an it infrastructure

Explain the benefit of risk assessment for an IT infrastructure. How does an IT manager faced with a list of several risks know which risks to focus on first?

  Advantages and disadvantages of twisted pair cabling

Create an 8- to 10-slide presentation explaining the advantages and disadvantages of twisted pair cabling and fiber optics as well as the importance of wireless communication in today's business environment

  Describe and discuss the three types of enterprise systems

Research recent news concerning this data breach. Has Target recovered from it? Explain.

  Compare the planning and control mechanisms

Compare and contrast the planning and control mechanisms required by one traditional software development process model

  Discuss about the backup and restore options

Once, Strata sourced a RAID system for a client without explicitly checking how backups would be done. She was shocked and dismayed to find that the vendor claimed that backups were unnecessary! The vendor did plan- eventually-to support a tape de..

  Evaluate three pros and three cons of e-prescribing

Evaluate three pros and three cons of e-prescribing. Summarize the e-prescription standards as described by the National Council for Prescription Drug Programs.

  The two classes of coherent and noncoherent detection

In this problem we take a different viewpoint and use the average probability of symbol error Pe, to do the comparison. Plot Pe versus Eb/N0 for each of these schemes and comment on your results.

  Evaluation of security technologies and methodologies

Write a 3- to 5-page evaluation of security technologies and methodologies used to mitigate information management risks. An evaluation is generally based on specific criteria and standards

  Supply chain concernsprepare a presentation for john and

supply chain concernsprepare a presentation for john and michael explaining some of the common symptomsproblems of

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd