The feasibility study-assignment overview

Assignment Help Basic Computer Science
Reference no: EM131233324

The Feasibility Study

Assignment Overview

IT systems are a major capital investment and the systems analyst is called to investigate the feasibility of a system and help answer the questions - Will the system pay for itself? In how long will it pay off? Are the other technologies that will have a better return on the investment? Module 3 emphasizes the need of making management recommendations in a proposal called the feasibility study report. Feasibility is defined as the value that an IT system will provide to the organization in terms of tangible and intangible benefits. Following the problem analysis definition and requirements, the feasibility study is prepared considering elements such as economic, technical, operational, schedule, legal/contractual, and political challenges. This analysis determines the readiness and worthiness of an IT system, and the category domains are defined as follows.

Economic - What is the TCO (total cost of ownership)? Is the ROI positive?

Technical - Is hardware available? Do we need to purchase it?

Operational - Are resources available? Do we need training and change management plans?

Schedule - Can the system be available within a reasonable time?

Legal - Are permissions being filed with state and federal regulations?

Political - Is the system in compliance with federal and state agencies?

Most analysts agree that the first four categories are sufficient to analyze a system, but legal and political criteria are used to evaluate R&D projects or projects using emerging technologies. Holdstrand and Holz-Clause' articles closely examine the four feasibility categories.

Holdstrand, D, & Holz-Clause, M. (2009). What is a feasibility study. AG Decision Marker. Retrieved from

https://www.extension.iastate.edu/agdm/wholefarm/html/c5-65.html

https://www.extension.iastate.edu/agdm/wholefarm/html/c5-66.html

https://www.extension.iastate.edu/agdm/wholefarm/html/c5-64.html

Case Assignment

The Case for Module 3 is a hands-on project illustrating how a business analyst would build a short feasibility report. You can review Sage Peachtree accounting system at https://na.sage.com/sage-50-accounting-us/ to formulate an idea of accounting systems and how the features work for your in-house development assignment. Please assume that the new system is for a small company growing to medium size.

  • You have been assigned to prepare a feasibility study report for an accounting information system. At this point, please assume that you will build an in-house solution.

Use the following site as a reference to develop the feasibility study report.

FreeTutes. (2012). Feasibility study. Systems Analysis and Design. Retrieved from https://www.freetutes.com/systemanalysis/sa3-feasibility-study.html

Include the following report sections with corresponding section subtitles to organize the report:

  • Cover page
  • Introduction page stating the problem background, summary of needs for an accounting system, interviews conducted, and project stakeholders
  • Articulate 3-5 system requirements
  • Discuss the economic, technical, operational, and scheduled feasibility.
  • Conclusions

Assignment Expectations

Your paper should be short (2-4 pages, not including cover sheet and references) and to the point. It is to be structured in the following manner.

You are expected to:

  • Write this paper using the recommended feasibility study sections
  • Cite appropriate sources and answer questions directly. Be sure to make the most effective case you can. Then present the best evidence you can, again citing appropriate sources.

By the end of your paper, you should be able to distinguish the types of feasibility studies applicable to a new project and document such findings into a management report.

Reference no: EM131233324

Questions Cloud

Find out what the estimated global proved reserve : Find out what the estimated global proved reserve of the mineral is today not including recycling (recycled material has already been removed from the earth, so it is not part of the proved reserve estimate).
Two mobile network routing protocols : OLSR and DSR are two mobile network routing protocols. Refer to [1] and briefly (in one paragraph) describe their similarities and differences.
Identify what specific behaviors you want to collect data : Find a crowded area where there are people for at least fifteen minutes (e.g., mall, restaurant, baseball game, or waiting room). Create a research question and hypothesis that has to do with people's behaviors in this environment. Identify what s..
Describe what the authors mean by the glass cliff phenomenon : Discuss your thoughts on what contributes to the perception that female characteristics are needed to lead a company out of crisis, but masculine traits are preferred in times of success and stability.
The feasibility study-assignment overview : IT systems are a major capital investment and the systems analyst is called to investigate the feasibility of a system and help answer the questions - Will the system pay for itself? In how long will it pay off? Are the other technologies that wil..
Describe crashing-fast tracking and scope reduction : In your own words, describe crashing, fast tracking, and scope reduction as means of schedule compression. When would each be appropriate? Which methods would you consider better first-choice methods by most project sponsors? Would any of these metho..
Find the entropy increase of the argon gas : We wish to obtain a supply of cold helium gas by applying the following technique. Helium contained in a cylinder under ambient conditions, 100 kPa, 20?C, is compressed in a reversible isothermal process to 600 kPa, after which the gas is expanded..
Integration-addition-extinction and starvation : There are four common ways to close or terminate a project: Integration, Addition, Extinction, Starvation. Select one and give a reason or example of how the project's end satisfied the customer.
Traditional imaging process : What are the benefits of using WSUS over the traditional imaging process?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Best way to multiply a chain

What is the best way to multiply a chain of matrices with dimensions that are 10 x 5, 5 x 2, 2 x 20, 20 x 12, 12 x 4, and 4 x 60? Please show work.

  How many frames are destroyed

In a Standard Ethernet LAN, the average size of a frame is 1000 bytes. If a noise of 2 ms occurs on the LAN, how many frames are destroyed? Also repeat this problem with Gigabit Ethernet LAN.

  Using social media for marketing

Using Social Media for Marketing

  Differentiate computer data state of computer-s electrical

Differentiate between computer data represented by the state of a computer's electrical switches and the meaningful information that is displayed to the user.

  Description of the new system-description its component

A full description of the new system, a description of its components, and the benefit it will provide to Riordan

  Write a program that assigns integer flows to each edge

Write a program that assigns integer flows to each edge in any given digraph

  Safety of long-distance traveling

Sales of home swimming pools increased. This decision to stay at home reflects a change in attitudes toward the perceived safety of long-distance traveling. This is an example of a change in the ____ component of the general environment.

  Define the conditional jump statements causes a jump to dest

Assume for each part of this problem that the EAX register contains 00 00 00 4F and the doubleword referenced by value contains FF FF FF 38. Determine whether each of the conditional jump statements causes a jump to dest.

  Describe the representation of the transition matrix

Consider a Web graph that is a chain, like Fig. 5.9, with n nodes. As a function of k, which you may assume divides n, describe the representation of the transition matrix for this graph, using the method of Section 5.2.4

  Reflect upon the it strategies

Reflect upon the IT strategies that are used to encourage economic development. Select two strategies and discuss how economic factors affect the strategies that a government may use to facilitate economic development.

  What types of threats does the tool mitigate

Research various security tools that an employee can use to keep his or her data safe or to thwart denial of service attacks.

  How would you describe the inaccuracies introduced visually

What quality setting is sufficient to recover the file exactly?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd