You are required to analyse the effectiveness of the hotel

Assignment Help Computer Networking
Reference no: EM13379934

You are required to analyse the effectiveness of the Hotel Booking systems. To do this you are required to employ at least two data gathering techniques including research and observation. You will need to research the existing Hotel Booking  systems and other information you can find about airlines. You also need to observe how at least three (3) users interact with the system. Suppose the 3 users want to book accommodation in different hotels. Depending on the site you choose, you need to script two or more scenarios for these users, and then observe their interaction. For instance, the two possible scenarios might be as follows:

(A) You want to book a hotel in Perth for next Friday. Before booking your accommodation, you want to be sure that you are getting the best rates for the room. You therefore want to find out what other similar hotels charge for similar accommodation (choose the same one for all 3 participants) on that day.

(B) You would like to pay for your accommodation in advance (to confirm room availability). You would like to prefer a secure checkout to prevent fraud and protect your privacy. You therefore want to compare the different payment mechanisms (Cash, Cheque, Credit Card, PayPal etc) available at the 3 hotels.

Questions you need to address are:

1. What are the major business objectives and processes (operations) that the hotel company carries out?

2. List the information systems that are used to support their portal and describe how they are related to the overall business objectives and processes.

3. Detail the scenarios you developed and how the users you observed interacted with the system as a registered member of the system, a temporary member and without registration, when carrying out the tasks of those scenarios.

4. Recommend improvements to the system and describe the analytic consequences. For instance, not all airlines provide systems for online boarding. If the company were to add such functionality, what do the analysts need to consider?

5. Describe the stakeholders involved. Who are they? Why do analysts need to consider their interests?

6. Discuss, in detail, the data collection techniques you used to answer the above questions.

Reference no: EM13379934

Questions Cloud

1 identify the operating system and note whether you are : 1 identify the operating system and note whether you are andor have been running your operating system updates
A let deskp denote the des encryption of the plain text p : a let deskp denote the des encryption of the plain text p by the key k.i if we set k to be the key consisting of all
Athe keyspace for a cipher is the set all of possible keys : athe keyspace for a cipher is the set all of possible keys that can be used for the cipher. a des key consists of 56
Select a large multinational organisation that has : select a large multinational organisation that has succeeded in effectively aligning its business and isit strategies
You are required to analyse the effectiveness of the hotel : you are required to analyse the effectiveness of the hotel booking systems. to do this you are required to employ at
Use the internet or strayer databases to research the : use the internet or strayer databases to research the advantages features and common examples of oop and edp. note you
As the lead analyst for the hoosier burger project you have : as the lead analyst for the hoosier burger project you have worked closely with bob and thelma nbspmellankamp. having
1 write a six to eight 6-8 page wireless deployment plan : 1. write a six to eight 6-8 page wireless deployment plan for an education institution with a single campus but with
Implementing wireless technologies involves technical and : implementing wireless technologies involves technical and management issues or considerations that have strategic

Reviews

Write a Review

Computer Networking Questions & Answers

  Dac system explain how mac system could be implemented

Given a DAC system explain how a MAC system could be "implemented" on top of this DAC system. Explain any problems and assumptions.

  Operation of one-product vending machine using semaphores

Keep track of number of products keeping in machine and amount of money customer has inserted. Two processes are utilized, one which accepts money and keeps track of amount paid.

  What is the biggest problem in routing security

Describe what is the biggest problem in routing security also discuss political feasibility and what factors go into determining whether something is politically feasible in an organization

  What are the pitfalls of networking

By now, we should all know the "benefits" of networking from a technological sense (being more efficient, productive, etc.). However, based on your experience, what are the pitfalls of networking?

  Draw message sequence diagram using stop-and-wait arq

Consider the Stop-and-Wait ARQ. Drawing message sequence diagram illustrating that if network connection between sender and receiver can reorder messages,

  Assume a dual-railed system

(Multiplexers) Assume a dual-railed system, where you have access to any vari- able and its complement. Implement the following four-input Boolean function as indicated in each of the following subsections.

  Will it travel through any routers

A host with IP address 122.34.23.11 sends a message to a host with IP address 136.34.23.11. Does the message travel through any routers? Explain why. (Assume no sub-netting)

  Discuss core technology design

You have been hired as a network consultant by an organization called Dwight Motors. Your job is to recommend an elegant solution to support their needs and to address their current problems. The IT manager of Dwight motors wants you to be aware o..

  Advantage-disadvantage of simple network management protocol

Differentiate network monitoring tools and their uses. Write one major advantage and one major disadvantage of "Simple Network Management Protocol (SNMP)".

  Question 1a identify and describe the different component

question 1a identify and describe the different component parts of the followingurl

  Case studythe ip version we are all using nowadays in our

case studythe ip version we are all using nowadays in our corporate networks and in the internet is ip version 4 short

  Certificate authority with well-known public key

Suppose there is a Certificate Authority (CA) with well-known public key. Further suppose every user is issued a certificate for his/her public key.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd