What are your recommendations for backup and disaster

Assignment Help Computer Engineering
Reference no: EM132182783

Willowbrook School Chapter 12 Willowbrook School is a small private school that has retained your services as a systems analyst to assist in the development of a new information system for the school's administrative needs.

Background After implementation of a new system, it moves into the support phase of the SDLC. The system at Willowbrook has been up and running for five months now, and things are moving reasonably smoothly.

Willowbrook is pleased with the system's ability to handle registration and some of the school's other administrative and financial tasks. You have been asked to contract for ongoing support services on an as needed basis. The school would like to arrange for support services in such a way that your time is used as efficiently as possible because their budget for support is small.

Tasks

1. You are willing to charge a lower rate for ongoing support services because you designed the system. You want Willowbrook to use a specific procedure for requesting assistance and changes so you can plan your activities efficiently. Prepare a complete, written procedure for Willowbrook School maintenance change requests. Include appropriate forms with your procedure.

2. Write a brief report explaining the different types of maintenance activities, how they affect the system, and what the cost patterns are for the different maintenance types. Given the anticipated five year useful life of the system, can you suggest any priorities for spending maintenance dollars in each of those five years?

3. What are your recommendations for backup and disaster recovery for the new system? Provide Willowbrook with at least two scenarios for backup and disaster recovery, and present the strengths and weaknesses of both. Which is your preferred scenario and why?

4. You decide to prepare a security checklist for Willowbrook. Prepare a list of security issues that the firm should evaluate and monitor. Be sure to organize the items into categories that match the six security levels.

Reference no: EM132182783

Questions Cloud

How can we overcome these : Wireless is susceptible to many impediments due to the nature of the signal.
Write a system design specification document : Now you will determine the system architecture, which translates the logical design of an information system into a physical blueprint.
Takeover of the crimea in march 2014 : What level of analysis best explains the Russian takeover of the Crimea in March 2014? Which theory best explains the troubles of the subversion of eastern?
Bureaucracies of the executive branch : What is the relationship between the president and the bureaucracies of the executive branch, of which he is head?
What are your recommendations for backup and disaster : What are your recommendations for backup and disaster recovery for the new system?
Define the term hyperpartisanship : Define the term hyperpartisanship, and discuss why it has become more prevalent in modern American politics.
Diversity of hispanic americans : Explain the problems created by the diversity of Hispanic Americans.
What has been your concern about sharing information : Discussion deals with security controls available for Operating systems and more specifically it deals with firewalls and DLPs.
What about the dispersion of power : Countries with limits on government have usually had feudal pasts, which suggests what about the dispersion of power?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd