Stakeholders of customer support systems

Assignment Help Basic Computer Science
Reference no: EM131081897

Stakeholders of Customer Support Systems

Charlie and Suzanne have been given a new assignment: PPI has decided to build a new website. All information about the company and its products will be available via the website. The website will also include a private intranet, available only to employees of PPI. Charlie and Suzanne have to identify the possible stakeholders of this project. Later, those stakeholders will be interviewed to obtain the requirements for the website.

  • Who do you think the list of stakeholders should include? Justify your response.
  • Are there any possible stakeholders that you decided not to include? Why?

Reference no: EM131081897

Questions Cloud

Should education really be a determining factor in wages : Is the opposition to the Affordable Health Care Act really based on serious constitutional issue or is it really mostly politically motivated?
Generations of computer programming languages : Briefly describe the four generations of computer programming languages, concentrating on the major differences among the generations. How does object-oriented programming fit into these generations? How does HTML fit into these generations?
Business functions that the systems support : Contact at least three people at your school or a nearby company who use information systems. List the systems, the position titles of the users, and the business functions that the systems support.
Explain the steps you would take in testing modifications : Developers can spend much time in making database and program modifications to improve or expand system functionality. Explain some of the steps you would take in testing modifications.
Stakeholders of customer support systems : Charlie and Suzanne have been given a new assignment: PPI has decided to build a new website. All information about the company and its products will be available via the website.
Dominate the worldwide software market-microsoft : As you have read in newspapers and magazines, one firm seems to dominate the worldwide software market-Microsoft.
What values of p may it be desirable to foul the shooter : what values of p may it be desirable to foul the shooter?
Threatening the relational database : 1). Do a Google search and find out what is a NoSQL database and how they are threatening the relational database? 2.) Which companies created the NoSQL databases Cassandra, Bigtable and Dynamo?
What is your expected net profit e[q] : what is your expected net profit E[Q]?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Analyze regulations and external information management

Provide the rationale for each action item. In other words, assess the value of each action item within the context of the business processes, quality management, or organization impact.

  Preparing simple er diagram or schema

Composite and multi-valued attributes can be nested to any number of levels. Suppose we want to design an attribute (one attribute) for a STUDENT entity type to keep track of previous college education.

  Describe four business trends and three technology trends

Name and describe four business trends and three technology trends shaping e-commerce today. What are the principal e-commerce business and revenue models? How has e-commerce transformed marketing? Explain how social networking and the "wisdom of cro..

  List the entity sets and their primary keys

List the entity sets and their primary keys.

  Calculate the bandwidth necessary for transmitting

HDCD high-definition audio of 24-bit samples at 88.2 KHz. 30 Discuss the relative performance needs of the following applications, in terms of average bandwidth, peak bandwidth, latency, jitter, and loss tolerance:

  Write a program that uses this scheme with select()

One solution is to fork a separate child process that copies each message from the queue to a pipe included among the file descriptors monitored by the parent. Write a program that uses this scheme with select() to monitor input from both the term..

  What needs to be protected and from what to protect it

In order to successfully manage risk, one must understand risk itself and the assets at risks. The way one goes about managing risk will depend on what needs to be protected, and from what to protect it.

  Change the page orientation to landscape

Retrieve Expense Report, save it on your computer, and open it in Excel. This partially completed workbook contains the column headings and several expense items.

  Process of encoding and decoding messages

Symmetric encryption is the process of encoding and decoding messages using the same key. An important aspect of this type encryption is to ensure that the key is not compromised and that only the sender and receiver have access to the key used t..

  Implement a sequence recognizer

Implement a sequence recognizer

  Different kinds of tasks which humans could perform by ai

Intelligence use AI to do different kinds of tasks which only humans could perform. Research Internet and explain how AI works to make bots resemble human intelligence.

  Assembly language program to simulate

The program now generates paper tape output. This format is based on the well known 'Morse Code', which consists of 'dots' and 'dashes'. On paper tape, a 'dash' is represented by a hole in the bottom half of the paper, and a 'dot' by a hole in the..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd