What are the major business objectives and processes

Assignment Help Computer Networking
Reference no: EM13186305

You are required to analyse the effectiveness of the Hotel Booking systems. To do this you are required to employ at least two data gathering techniques including research and observation. You will need to research the existing Hotel Booking  systems and other information you can find about airlines. You also need to observe how at least three (3) users interact with the system. Suppose the 3 users want to book accommodation in different hotels. Depending on the site you choose, you need to script two or more scenarios for these users, and then observe their interaction. For instance, the two possible scenarios might be as follows:

(A) You want to book a hotel in Perth for next Friday. Before booking your accommodation, you want to be sure that you are getting the best rates for the room. You therefore want to find out what other similar hotels charge for similar accommodation (choose the same one for all 3 participants) on that day.

(B) You would like to pay for your accommodation in advance (to confirm room availability). You would like to prefer a secure checkout to prevent fraud and protect your privacy. You therefore want to compare the different payment mechanisms (Cash, Cheque, Credit Card, PayPal etc) available at the 3 hotels.

Questions you need to address are:

1. What are the major business objectives and processes (operations) that the hotel company carries out?

2. List the information systems that are used to support their portal and describe how they are related to the overall business objectives and processes.

3. Detail the scenarios you developed and how the users you observed interacted with the system as a registered member of the system, a temporary member and without registration, when carrying out the tasks of those scenarios.

4. Recommend improvements to the system and describe the analytic consequences. For instance, not all airlines provide systems for online boarding. If the company were to add such functionality, what do the analysts need to consider?

5. Describe the stakeholders involved. Who are they? Why do analysts need to consider their interests?

6. Discuss, in detail, the data collection techniques you used to answer the above questions.

Reference no: EM13186305

Questions Cloud

Which scale will allow her to make the tallest model : A building is 388 feet tall. For a class project, Kari is to make a scale model of the building to place in the front hall display case. The display case is 17 inches tall. Which scale will allow her to make the tallest model that will fit in the ..
Find the height of the tree : A tree stands on a hillside of slope 28 degrees from the horizontal. From a point 75 feet down the hill, the angle of elevation to the top of the tree is 45 degrees. Find the height of the tree.
Which is the controlling portion of deposits banks must hold : The FED has three ways to expand or contract money and credit. The first way would be for the FED to buy existing U.S. Treasury securities. They do this by using the equivalent of newly issued currency. What this does is it helps to expand the res..
Find a cubic function : Find a cubic function y=ax^3+bx^2+cx+d whose graph has horizontal tangents at the points (-2,6) and (2,0).
What are the major business objectives and processes : What are the major business objectives and processes (operations) that the hotel company carries out and list the information systems that are used to support their portal and describe how they are related to the overall business objectives and pro..
How many liters of water are in a bucket : How many liters of water are in a bucket that has 8,800 cm3 of water in it?
Explain and identify object-oriented concepts : Explain and identify object-oriented concepts and identify object-oriented classes and also the attributes and methods they contain.
What will happen to the unemployment rate : As a result of the situation above what will happen to the unemployment rate,Suppose the government increases the minimum wage, substantially increasing firms labor costs.As a result of the situation above what will happen to inflation,As a result of..
Explain the phrase outside the scope of the model : Explain the phrase "outside the scope of the model". Why is it dangerous to make predictions outside the scope of the model?

Reviews

Write a Review

Computer Networking Questions & Answers

  Determine percentage of ip datagram will be overhead

Determine percentage of each IP datagram will be overhead and percentage will be application data? Illustrate all computations required.

  Derive the state equations

Derive the state equations A(t+1) and B(t+1) by substituting the input equations for the J and K variables, and draw the state diagram of the circuit.

  Which protocol is used to avoid defeat

You and Luke Sky Walker are commanders in rebel army preparing to attack Darth Vader and his Death Star. Is there protocol which you and Luke can use to avoid defeat? If not, describe why not.

  Kind of security drill typical in organization

Which kind of security drill do you believe is the most typical in an organization? Which type of security drill do you believe is the most effective? Why?

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Outline a new network security design

Utilize the following information to outline a new network security design. Employee breakdown; 2 partners, 28 accountants, 5 administrative assistants, 2 technology specialists, 1 human resources manager.

  Determine the maximum sustainable data rate

New token is put into bucket every 5 μsec. Each token is good for one cell, which comprises 48 bytes of data. Determine the maximum sustainable data rate?

  Reasons to prevent outsider obtaining free network acces

List three reasons you might still want to prevent an outsider obtaining free network access by intruding into your wireless network.

  Disadvantages of several different web technologies

Describe the advantages and disadvantages of several different Web 2.0 technologies. How could these technologies be used for good? What types of problems might these technologies cause?

  Initial values of cache tags-accesses lead to hit and miss

Suppose that initial values of cache tags and cache lines are completely arbitrary, illustrate which accesses will lead to hit, and which will cause to miss.

  Explain networking concepts by using osi model as framework

Explain networking concepts by using OSI Model as framework. Explain protocols at different layers of the OSI model and describe their functionality.

  Investigate and write report on using internet phone

you are asked to investigate and write a report on using Internet phone and the company's existing LAN to replace the company's PBX.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd