Requirements analysis phase answers the question

Assignment Help Basic Computer Science
Reference no: EM13960631

The requirements analysis phase answers the question, "What does the user need and want from a new system?" The requirements analysis phase is critical to the success of any new information system! In this milestone we need to identify what information systems requirements need to be defined from the system users' perspectives and draw graphical, logical models to document the data requirements for a new and improved system.

Data modeling is a technique for organizing and documenting a system's data. Data modeling is sometimes called database modeling because a data model is usually implemented as a database. Data is viewed as a resource to be shared by as many processes as possible. As a result, data must be organized in a way that is flexible and adaptable to unanticipated business requirements - and that is the purpose of data modeling.

In this milestone, you will first discover those entities in the system that are or might be described by data. Then you will define each entity you identify in respect to the business in an Entity Definition Matrix. Then you will do the data model tutorial in doc sharing that will prepare you for doing the logical entity relational diagram (ERD).

Objectives

After completing this milestone, you should be able to:

• Understand and perform the techniques for entity discovery.

• Define each entity with respect to the business and complete an entity definition
matrix.

• Perform the necessary data modeling techniques to organize and document the
data requirements for the proposed system.

• Construct the Context data model (Logical ERD).

Prerequisites
Before starting this milestone, the following topics should be covered:
• Data modeling - Chapters 8 and 14.
• Milestone 1-3 Solutions (provided by your instructor)

Assignment
Now that we have studied the current system and analyzed some of its problems and opportunities, plus gained approval to proceed, we can now start to identify the business data requirements and graphically model them. In this assignment, we will use our results of the previous milestones, samples of forms we have collected, and a copy of a transcript of an interview with Dan Stantz's staff. The results of this activity will identify the business data requirements for the proposed system.

Activities

1. Complete an Entity Definition Matrix. Analyze each of the forms referenced by the user interview and make assumptions where necessary. (Note: While it is appropriate to make assumptions, you should document those assumptions and include them in your submission to your instructor.) If you create the matrix in Excel, paste it into a Word document prior to submission.

2. Complete the Visio tutorial which walks you through how to create an Entity
Relationship Diagram (ERD), located in Doc Sharing.
When you have completed the tutorial, paste the diagram you have created to the end
of the Word document that already holds your Entity Definition Matrix.

3. Prepare a Context Data Model.

Deliverable format and software to be used are according to your instructor's specifications. Deliverables should be neatly packaged in a binder, separated with a tab divider labeled "Milestone 4-Part I".

Reference no: EM13960631

Questions Cloud

A sinusoidal electromagnetic wave from a radio station : How much energy does this wave carry through the window during a 30.0-s commercial?
Write a java console based program : The Java main method should call a void method. The name of the void method should be your last name. Their main method should print your first name and last name and number of characters. Below is the pseudo code for this program
Determine the lagrangian for the system in terms of theta : A horizontal seismometer consists of a pendulum of length "l" constrained to rotate about a nearly vertical axis. The angle away from vertical for the axis is "a" (alpha) and the mass is "m", Determine the Lagrangian for the system in terms of "the..
Show that in the bohr model the frequency of revolution : Show that in the Bohr model, the frequency of revolution of an electron in its circular orbit around a stationary hydrogen nucleus is f = me4/4µ02n3h3.
Requirements analysis phase answers the question : The requirements analysis phase answers the question, "What does the user need and want from a new system?" The requirements analysis phase is critical to the success of any new information system! In this milestone we need to identify what inform..
Department of management : The chairperson of the department of management at State University wants to forecast the number of students who will enroll in production and operatiosn management (POM) next semester, in order to determine how many sections to schedule. The cahi..
Describes the government or nonprofit organization : An explanation of how the issues you raised are related to at least two of the four social justice themes (human rights, equality, liberty, and justice)
How many ways are there to form a task force of seven people : How many ways are there to form a task force of 7 people from that list of 21 candidates if at least one member of the task force has to be a Republican and at least one member has to be a Democrat?
More of the databases for computer networks : Using one or more of the databases for Computer Networks and Cyber Security, search for peer-reviewed journal articles about the communication theory or by the name of the person you selected to see if communication research on that theory has be..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Which command will create a hard link called file

Which command will create a hard link called FILE3.TXT that is linked to the content of an original file called FILE1.TXT

  Explaining network attacker steal secure google cookies

Explain how a network attacker (an active attacker that can intercept or forge network packets, etc.) could steal secure google.com cookies.

  Common types of policies for web services

What are the most common types of policies for Web services? 12.2 What are the main components of WS-Policy Framework?

  Summary of physical tamper-resistant

Summary of physical tamper-resistant devices how to approach this homework question: a. First, make a list of all of the different types of physical tamper-resistant devices and their characteristics.

  Representing information by predicate-calculus sentences

Represent this information by predicate-calculus sentences in such a way that you can represent the question Is there a member of the alpine club

  Discuss the runway excursion

There are five imaginary surfaces that make up an airport's navigable airspace.  Most aviation accidents happen in the primary surface, and they are usually the flavor of runway incursions.  Do some research and tell the class why you think these run..

  Write select statement create this column and format columns

Write a Select statement that returns one column from the Vendors table named Full Name.

  Case analysis - personal navigation devices

Case Analysis - Personal Navigation Devices, Why have Personal Navigation Devices become popular? What technologies are required to facilitate the success of PNDs

  Modify your handling of the quantity of items

Only values in the range 1-99 are accepted. Illegal or out-of-range values cause a reprompt for a valid input. Up to 3 such requests for valid input are made, and the program terminates if a valid numeric in-range quantity is not entered by the cu..

  The preferred method of interacting with a computer

Graphical User Interface (GUI) became the preferred method of interacting with a computer system. Beginning with the Xerox-developed GUI in 1970, GUI-based platforms have evolved from the Apple Macintosh to the Microsoft Windows operating syste..

  Which kinds of computing and information systems

Which kinds of computing and information systems do users really need to care about underlying technologies? Which kinds of users ought to pay more attention how well a variety of devices and applications work together (and how seamlessly)? Do you wa..

  What can data mining do to help tej electronics

What can data mining do to help Tej Electronics? From the example in the case, do you think Tej be more likely to use rool up or drill down navigation? Why?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd