Identify, analyse and document business goals and objectives

Assignment Help Computer Engineering
Reference no: EM133453404

Case Scenario:

TAFE wonderland, NSW, has had influx of student this year. The student number has grown from 70 to 250 students in Victoria building at a time. The college policy provides free Wi-Fi to students so they can access over phones and their laptops.

All access to the Wi-Fi is provided by using student ID and password. The students are restricted to accessing certain websites, games and streaming services as per the college's policy.

The students are complaining their Wi-Fi access keep dropping regularly. They also complain their signal also tends to be weak.

You as the IT Officer, has identified that the previous Wi-Fi router maximum capacity was 50 users at a time. It was installed specifically to cover 500sqm 10 years ago.

The Victoria building has recently been refurbished to accommodate the increase in the number of students in TAFE with additional 10 classroom totalling to 1500sqm.

The management has budgeted $10,000.00 including all costs for the ICT upgrade. The project time allocated is a 4 weeks.

Questions: The ICT Manager has asked you to provide information as per the questions below

Examine business situation in detail and document a business case for a proposed solution that addresses:
a. Business need
b. Required capabilities
c. Solution scope
d. Risk assessment
e. Cost estimates
f. Most feasible approach

Complete the following actions to define business need:

  1. Identify, analyse and document business goals and objectives and link to measures.
  2. Analyse and document business processes, model and strategies and applicable organisational policies and guidelines.
  3. Identify and investigate issues and determine business problems and opportunities according to organisational requirements.
  4. Discuss consequences of business problems to organisation with required personnel.
  5. Identify and discuss applicable ICT solutions to business problem and speed of implementing solution.
  6. Determine and note the desired outcomes of proposed solutions.
  7. Document research outcomes including business problems and potential solutions.

Perform the below actions to assess capability gaps:

  1. Determine and document the existing capabilities of organisation and relate to desired objectives and outcomes.
  2. Identify and note the capabilities required to achieve the desired future state and assess gaps.
  3. Test assumptions and use results in decision making process.
  4. Document identified capability gaps according to organisational requirements.

Determine solution approach by completing the following steps:

  1. Discuss identified ICT solutions and applicability to business objectives.
  2. Generate assumptions and identify constraints and risks which may affect choice of solutions, according to organisational procedures.
  3. Identify and document processes, tools and software required in implementing proposed solutions.
  4. Assess and rank solution approaches and select applicable solutions.

Complete the below actions to define solution scope:

  1. Determine and document the solution scope in terms of major features and functions to be included.
  2. Explain implementation approach and how chosen solution will deliver solution scope to required personnel.
  3. Identify, analyse and document major business and technical dependencies.
  4. Document determined solution approach and scope according to organisational requirements.

Perform the following steps to define business case and finalise process:

  1. Identify and document the benefits of recommended solution in terms of both qualitative and quantitative gains to organisation.
  2. Estimate and note the total net cost of solution.
  3. Perform and document the initial risk assessment.
  4. Agree how identified costs and benefits will be assessed and evaluated.
  5. Finalise documentation and seek feedback from required personnel.
  6. Amend accordingly, and obtain sign-off from required personnel.

Reference no: EM133453404

Questions Cloud

Describe the research problem of this paper : Describe the research problem of this paper. What is (are) the major finding(s)? are these findings important?
Do computer programs contain any special documentation : Do computer programs contain any special documentation? How are some programming language more sophisticated than others?
Why do software manufacturers continue to produce and users : Why do software manufacturers continue to produce and users continue to buy unreliable and insecure software?
Discuss emerging theories regarding cyber-deterrence : The relevance of the traditional pillars of deterrence in cyberspace is increasingly questioned. Discuss emerging theories regarding cyber-deterrence
Identify, analyse and document business goals and objectives : Identify, analyse and document business goals and objectives and link to measures. Analyse and document business processes, model and strategies and applicable
Calculate the amount of the gain or loss that will appear : Calculate the amount of the gain or loss that will appear as a separate item on the 2019 consolidated income statement, as a result of the bond transaction.
Discuss and explain stock and flow models : Briefly discuss and explain Stock and Flow Models of the following; Why are they important, does it apply or not to engineering field?
What amoeba can be found in warm water : What amoeba can be found in warm water? how does it have to enter the person to do harm?
What asymmetric operations does the security of ecc reply on : What asymmetric operations does the security of ECC reply on? (We all know the security of RSA depends on the following asymmetric operation

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd