What should be the most suitable training methods that need

Assignment Help Computer Engineering
Reference no: EM133396604

Case Study: Gary's Consultancy Firm, Inc. operates accounting and financial consultancy centres in a number of regions in Queensland and the main head office is in Toowoomba. The centres have done well, and the company is planning to improve their business information system and to develop a web-based system. William is the owner of the firm and he runs the firm for last 10 years. Gary discussed with IT manager, Mary Peter, to develop a new information system for the company. During the project, Mary will work closely with Patrick Lewis, who will manage the new project. This new information system will support its business and information management and replace a mix of paper-based and legacy systems.

You are enjoying your job as a junior IT help desk at Gary's firm. Last week, Mary asked you to help her plan the new information system project. Mary knows that you have completed studying several information systems courses at USQ, and that you have studied project management tools and techniques as well.

Specifically, she wants you to get ready for the next set of systems development tasks, which will be requirements modeling for the new system. Yesterday, Mary called you into her office to discuss the specific tasks she wants you to perform. You will explore the possibility of a business support system for the scheduling, billing, accounting, HR and payroll functions of the practice as well as a system to support the accounting applications of Customer Taxation records and Supplier records so that it allows each office worker to conduct their job more efficiently.

After meeting with Mary, you sit down and review your notes. She wants you to treat the set of tasks as a project, and to use project management skills to plan the tasks. You began the systems analysis phase at Gary's consultancy firm by completing a series of interviews, reviewing existing reports, and observing office operations. You also acquired more information and developed a set of DFDs, process descriptions, and a data dictionary. The next step in the SDLC is to perform an object-oriented analysis of the new system.

Based on Mary's analysis and your report, Gary decides to move forward with in house development of a new business support system.

Questions:

1 What should be the most suitable training methods that need to provide by Gary's company to its staff members for the new development system?

2 Identify any three types of attackers that may cause harm to Gary's information system once it is live.

3 In a typical system design specification, the _____ section contains the complete design for a new system, including the user interface, outputs, inputs, files, databases, and network specifications

Reference no: EM133396604

Questions Cloud

What differentiates the receiver and transmitter addresses : What differentiates the receiver and transmitter addresses from the source and destination addresses?proved device whitelist? Note that those not on the list
What was the process of filling checklist of self-care : What was the process of filling checklist of self-care assessment like for you? Were you surprised by any of your responses? If so, which ones?
What is the nurses best action at this time : A patient, who is receiving continuous IV heparin, has an aPTT of 105 seconds. What is the nurse's best action at this time? Why?
How does the phenomenon of a young : How does the phenomenon of a young, male caregiver differ from the older caregiver dyads included in Macleod's (2011) article
What should be the most suitable training methods that need : What should be the most suitable training methods that need to provide by Gary's company to its staff members for the new development system?
How has nursing assisted us in meeting the development : How has nursing assisted us in meeting the development of resilience and personal health and why it is important in professional practice?
Describe what would be important to remember : Describe what would be important to remember while you interview this patient. Discuss the health care support systems available in your community
Why is it crucial to back up a corporate server : Why is it crucial to back up a corporate server? . Can you please provide at least one strategy for a regular back-up plan? Please complete the main post with
Explain how you determined the timeline for your change : Share your time management plan with your peers and explain how you determined the timeline for your change project steps/processes

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd