Understanding of the effectiveness of maintenance

Assignment Help Basic Computer Science
Reference no: EM13776221

Question 1:

1. What is information systems analysis and design? How has systems analysis and design change over the past four decades?

2. List and explain the different phases in the SDLC. List and explain some of the problems with the traditional waterfall SDLC.

Question 2:

1. Describe and compare the various sources of software.

2. How can you decide among various off-the-self software options? What criteria should you use in your decision?

3. What methods can a systems analyst employ to verify vendor claims about a software package?

Give a brief overview and history of CASE.

1) What are the basic categories of CASE? (Hint: There are usually three)

2) What are some of the applications of CASE?

3) What are some common risks and associated controls with CASE?

Question 3:

1. Contrast the following terms and concepts:

a. critical path scheduling vs. Gantt charts vs. network diagramming vs. slack time
b. project vs. project management vs. project manager
c. project initiation vs. project planning vs. project execution vs. project closedown
d. project workbook vs. resources vs. work breakdown structure (WBS)

2. List the various project team communications methods, plus, describe an example of the type of information that might be shared among team members using each method.

Question 4:

1. Describe the project identification process.

2. Describe value chain analysis and how organizations use this technique to evaluate and compare projects.

3. Describe the steps involved in corporate strategic planning.

Question 5:

1. Contrast the following terms and concepts:

a. break-even analysis vs. present value vs. net present value vs. return on investment.
b. Intangible benefit vs. tangible benefit
c. Intangible cost vs. tangible cost

2. List and describe the steps in project initiation and process planning.

Question 6:

1. Describe systems analysis and the major activities that occur, during this phase of the systems development life cycle.

2. Describe how prototyping can be used during requirements determination. How is it better, or worse, than traditional methods?

3. Why is continual user involvement a useful way to discover system requirements? Under what condition might it be used? Under what conditions might it not be used?

Question 7:

1. What is DFD? Why do systems analysts use DFDs? Briefly explain the rules for drawing good DFDs.

2. Explain the convention for naming different levels of DFDs. Why do analysts draw multiple sets of DFDs?

Question 8:

3. Discuss why you believe some systems developers feel a data model is one of the most important parts of the statement of information system requirements.

4. Distinguish between the data modeling done, during information systems planning, project initiation and planning, and the analysis phases of the SDLC.

5. List the deliverables from the conceptual data modeling part of the analysis phase of the systems development process.

Question 9:

1. What is the purpose of normalization? List the five properties of relations. What problems can arise when merging relations? (Hint: view integration)

2. Can instances of a relation (sample data) prove the existence of a functional dependency? Why or why not?

3. What is the purpose of denormalization? Why might you not want to create one physical table or file for each relation in a logical data model? Please explain your answer.

Question 10:

4. Describe the prototyping process of designing forms and reports. What deliverables are produced from this process? Are these deliverables the same for all types of system projects? Why or why not?

5. In your opinion, what type of labeling can you use in a table or list to improve its usability? What column, row, and text formatting issues are important when designing tables and lists?

Question 11:

1. Contrast the following terms and concepts:

a. dialogue vs. interface
b. command language interaction vs. form interaction vs. menu interaction vs. natural language interaction vs. object-based interaction
c. drop-down menu vs. pop-up menu

2. Describe the general guidelines for the design of menus. Can you think of any instances when it would be appropriate to validate these guidelines? Please explain your answer.

Question 12:

3. Summarize the six (6) possible architectures for client/server systems.

4. Summarize the reasons for using three-tiered client/server architecture.

5. Discuss how you can instill customer loyalty and trust worthiness when designing an Internet-based electronic commerce system.

Question 13:

1. What are the deliverables from coding, testing, and installation?

2. Explain the code-testing process.

3. What are the four approaches to installation? Which is the most expensive? Which is the most risky? How does an organization decide which approach to use?

4. What are the common methods of computer training? What is self-training? What is eLearning? In your opinion, is there proof that individual differences matter in computer training?

5. Describe the various roles typically found in a help desk function.

Question 14:

6. Contrast the following terms and concepts:

a. adaptive maintenance vs. corrective maintenance vs. perfective maintenance vs. preventive maintenance

b. baseline modules vs. build routines vs. system librarian

c. maintenance vs. maintainability

7. List the steps in the maintenance process and contrast them with the phases of the SDLC.

8. Describe three ways for organizing maintenance personnel and contrast the advantages and disadvantages of each approach.

9. What types of measurements must be taken to gain an understanding of the effectiveness of maintenance? Why is tracking "mean time," between failures, an important measurement?

10. Suppose you were a system librarian. Using entity-relationship diagramming notation, describe the database you would need to keep track of the information necessary in your job. Consider operational, managerial, and planning for the job.

Reference no: EM13776221

Questions Cloud

Define the information security governance and management : Define the information security governance and management tasks that senior management needs to address.Describe the outcomes and the items that will be delivered to the organization through the information security program.
Making ammonia from nitrogen and hydrogen : How many significant figures are in the following - Making ammonia from nitrogen and hydrogen
Effectiveness and efficiency of retail management : Write a 750- to 1,000-word paper in which you explore how technology has improved the effectiveness and efficiency of retail management. Consider the following questions in your paper:
Write a papers that demonstrates the necessary ethical care : What information is provided in the two papers that demonstrates the necessary ethical care and concern for the rights of the participants?
Understanding of the effectiveness of maintenance : What types of measurements must be taken to gain an understanding of the effectiveness of maintenance. Why is tracking "mean time," between failures, an important measurement.
Write essay paper of the fedreal agencies around the world : Write an essay research paper of the fedreal agencies around the world like FBI CIA MI6 KGP and all of those to the powerful countries.
Identify one example of our gender binary system in action : Identify one example of our gender binary system in action (e.g. gender segregated bathrooms), and propose a solution that we could use if we abandoned the binary system (e.g. gender neutral bathrooms).
Applying information security and sdlc to business : Write a paper of no more than 3,000 words in which you discuss one of the bookstores, use the SDLC method to implement a new technology into the bookstore, and detail a disaster recovery plan for the bookstore.
Principles of user interface design presentation : Review the Principles of User Interface Design presentation located in the Week Three section of the student website. Evaluate a website of your choice for adherence to the six design principles outlined in the presentation.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Systems analysis report

Systems Analysis Report

  Components of an instructional strategy

we discussed the importance of planning your instructional strategy. What are the components of an instructional strategy? How important is the room layout and what impact does it have on the effectiveness of training?

  How can build 32bits shift left logical or shift right

how can i build 32bits shift left logical or shift right arithmetic with logisim?

  Write java code for your hello/loop

Write java code for your hello/loop

  Write a short structured design-using pseudocode

Write a short, structured design-using pseudocode only-that accomplishes this task.

  Describe various system changeover methods

Briefly describe various system changeover methods. Suggest a changeover method for the system described in the case study and provide specific reasons to support your choice.

  Translate infix mathematical expression into postfix express

Write a program in java to translate infix mathematical expression into postfix expression and a program to evaluate the posfix expression. There should be three separate progams. use stack data abstraction and class implementation.

  Deliverable associated required to complete process

Explain in scholarly detail department expense predicting processes and deliverable associated required to complete process.

  What type of malware attack is this

What type of malware attack is this and what vulnerability is she trying to exploit in order to get her malware code past the network firewalls of these companies?

  Factors finding whether something is politically feasible

Describe political feasibility. What factors go into determining whether something is politically feasible in an organization? Answers may include whether a sponsor exists

  Network security & how do they work together

1. In reference to firewalls, proxies, Intrusion Prevention Systems and Intrusion Detection Systems. Why are they important for network security & how do they work together?

  From the analog to the digital age

From the Analog to the Digital Age

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd