What are the systems perceived deficiencies

Assignment Help Computer Engineering
Reference no: EM131291718

Systems Improvement

Purpose

Have you ever found using software to be frustrating? Is the system tedious to use, or does it fail to fully meet the needs of its users? Sometimes such problems can be addressed by changing some aspects of a system, or changing how it is used. For this assignment, you will identify problems and propose improvements to an existing information system.

Identify a system at your workplace or another workplace you know well (i.e. manual inventory system, cash register, tablet, etc...whatever you like) with which everyone is not completely happy at work. Please support your answers on ideas for improving the system with your knowledge of it.

What is the purpose of the system?

What are the system's perceived deficiencies?

What changes can you propose to improve perceived deficiencies?

What data and processes will be affected by these changes?

What changes in procedures and policies will be required?

What other systems and hardware resources will be needed to support these changes?

What challenges to you anticipate in implementing the changes? Consider ideas from Adventures of an IT Leader. If possible, incorporate

your knowledge of resources and history of projects in your workplace to bring realism to your plans.

What actions do you recommend to overcome these challenges?

Students normally choose the same system for this assignment and the System Replacement assignment. You are encouraged to read the criteria for that assignment to determine whether you'd like to employ this strategy, and if so, to choose a system that will work for both.

Please label the sections of your response. Be sure to cite work documents and other sources as appropriate.

Reference no: EM131291718

Questions Cloud

Describe proper communication techniques : Summarize the process of addressing prohibited content/activity, and explain privacy, licensing, and policy concepts. Describe proper communication techniques and professionalism when working with users.
Which view do you subscribe to and why : "Some people view conflict as inherently bad whereas others believe that some degree of conflict in organizations is desirable" Which view do you subscribe to and why?
Firewalls own user management software : You have configured your firewall to authenticate a group of 100 users within your company. You set up the user database with the firewalls own user management software.
Reasons for organizations to use workforce planning : What do you understand from the term workforce planning? Explain three reasons for organizations to use workforce planning?
What are the systems perceived deficiencies : What are system's perceived deficiencies? What changes can you propose to improve perceived deficiencies? What data and processes will be affected by these changes? What changes in procedures and policies will be required?
Is the chair violating any ethical principle : Are there ethical and legal concerns being exposed in this scenario? If so, specifically identify the ethical standards that apply.Is the chair violating any ethical principles? If so, which?What are the pros and cons of teaching the class? Support ..
What would be different if this scenario was held at a high : What would be different if this scenario was held at a high-end large technology company as opposed to your home? What would be different at a K-12 school?
Define the basic concepts used in the discipline of sociolog : Define the basic concepts used in the discipline of sociology.Define the various methodologies for sociological research.Identify the sociological perspective to the inequalities of class, race, gender, ethnicity, sexual orientation, socioeconomics..
Prepare a classroom behavior management strategy for student : Create a PowerPoint presentation in which you use 12-15 slides to develop a Classroom Behavior Management Strategy for students demonstrating anger and aggression toward classmates, teachers, and administration.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Next generation technology grants access based on human

next generation technology grants access based on human attributes?

  When recording digital audio what is the relation of the

question 1 what is a cpu? which two companies manufacture cpus for personal computers?question 2 in what form does a

  Assume that the cross section of each strand is a circle

A regional telephone company has 10 million subscribers. Each of their telephones is connected to a central office by a copper twisted pair. The average length of these twisted pairs is 10 km. How much is copper in the local loops worth.

  How to write a python program

design a Python program that would prompt the user for the number of employees to be entered, and then prompt for employee name, followed by wage, followed by hours worked.

  Analyze the trade-off between storage and transmission time

Try saving it in different formats and with different options set. Analyze the trade-off between storage and transmission time versus resolution and quality.

  What is the itsec

What is the meaning of CIA triad in Information Security.What is the difference between Symmetric and Asymmetric Key Cryptography

  How to create a poster or presentation

For an on line poster presentation, you need to use PowerPoint, Visio, MS Word, or another program that allows you to use graphics and pictures along with words to tell a story. Posters are created to tell a visual story so the intent is to use le..

  Recommend a removable storage backup

Managers want to be able to print schedules on any printer at any restaurant if traveling and in a motel with a laptop. Please explain what you would have to do to allow managers to do this and how they will reference the printer.

  You have been put in a role of the cio chief information

you have been put in a role of the cio chief information officer you may choose the type of facility. looking at the

  Generates a random number in the range of 1

Write down a pseudocode statement that generates a random number in the range of 1 through 100 and assigns it to a variable named rand.

  Using microsoft visio or an open source alternative such as

write a two to three page paper in which you using microsoft visio or an open source alternative such as dia create a

  Services commonly supported by a server

explain five services commonly supported by a server and address security mechanisms and devices that are used to support client/server functions.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd