Prepare storyboards that show the proposed screens

Assignment Help Computer Engineering
Reference no: EM132145640

Systems analysis project

Personal Trainer, Inc. owns and operates fitness centers in a dozen Midwestern cities. The centers have done well, and the company is planning an international expansion by opening a new "supercenter" in the Toronto area.

Personal Trainer's president, Cassia Umi, hired an IT consultant, Susan Park, to help develop an information system for the new facility. During the project, Susan will work closely with Gray Lewis, who will manage the new operation.

Background

Following the decision to use an in-house team to develop a design prototype, Susan began to work on the physical design for Personal Trainer's new information system.

At this stage, she is ready to begin working with Gray on the output and user interface design. Together, Susan and Gray will seek to develop a user-centered design that is easy to learn and use. Personal Trainer users will include managers, fitness instructors, support staff, and members themselves.

Tasks:

1. For the prototype user interface, design a switchboard that leads from main sections to subsections of related system tasks. The main sections may include member information, registration, payments, fitness instructors, and any other top-level sections necessary for Personal Trainer's system. Subsections may include account information, class registration, schedules, and class rosters. Prepare storyboards that show the proposed screens, including at least two sublevel tasks for each action.

2. Members need to be able to register for classes online. Design an online class registration screen form.

3. In addition to being available online, members can register for fitness classes through the mail or by dropping off a mail-in form. Design a paper source document.

4. Personal Trainer is very concerned about the security and protection of the information they collect in the new information system. Prepare a memo to Gray and Personal Trainer's staff that explains the input and output security controls that will be built into the new systems and the policies that will enforce these controls.

Reference no: EM132145640

Questions Cloud

Describe a difficulty in semaphore solution to this barrier : A barrier is supposed to block a calling thread until all N threads have reached the barrier.
What is the market value of the bond : Given the market rate of interest of 4.4 percent, what is the market value of the bond? (Round answer to 2 decimal places, e.g. 15.25.)
What is the maximum amount mark should be willing to pay : If the current market rate is 7.50 percent, what is the maximum amount Mark should be willing to pay for this bond? (Round answer to 2 decimal places, e.g. 15.2
Display the value of element of string array mystringarray : Display the value of element of string array myStringArray with index 5 .
Prepare storyboards that show the proposed screens : Prepare storyboards that show the proposed screens, including at least two sublevel tasks for each action.
What is the average throughput for this connection : What is the average throughput (in terms of MSS and RTT) for this connection for 10 RTTs with congestion occurring immediately after the 5th RTT?
What is the yield to maturity of bond : Sunland Industries has a three-year bond outstanding that pays a 7.80 percent coupon rate and is currently priced at $938.80. What is the yield to maturity of t
Disadvantages of the capital asset pricing model : 1. Investment risk and default risk are interchangeable terms and essentially mean the same thing.
Interchangeable terms and essentially mean : 1. Investment risk and default risk are interchangeable terms and essentially mean the same thing.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd