Essay Instructions: Please answer the questions with inline citations and list references.
Q1. What are some sources of risk in a systems analysis and design project, and how does a project manager cope with risk during the stages of project management?
Q2. Suppose that you have been contracted by a jewelry store to manage a project to create a new inventory tracking system. Describe your initial approach to the project. What should your first activity be? What information would you need? To whom might you need to speak?
Q3The economic analysis carried out during project identification and selection is rather superficial. Why is this? Consequently, what factors do you think tend to be most important for a potential project to survive this first phase of the life cycle?
Q4. Assuming monetary benefits of an information system at $85,000 per year, one-time costs of $75,000, recurring costs of $35,000 per year, a discount rate of 12 percent, and a five-year time horizon, calculate the net present value of these costs and benefits of an information system. Also calculate the overall return on investment of the project and then present abreak-even analysis. At what point does breakeven occur?
Excerpt From Essay:
Essay Instructions: Prepare a 1400 word paper that analyzes a work-related project that used systems analysis for a selected business system at the department or division level. Include information-gathering techniques and design methods used in the project. Analyze and evaluate what made the project a success or a failure utilizing concepts from Business Process Re-engineering (BPR) and Workflow Management. (I will email or fax the notes about BPR and Workflow Management) This project situation will be used as the basis for other papers later on "This is part 1 of 3". Cite and discuss 2 references in addition to the two papers I will fax you.
These are what the papers will consist later on (pt 2 and 3), which I will send to essaytown for help using this paper one to get an idea: Maybe the writer who does the first paper can also help with the pt 2 and 3 paper, that way I can get an idea of how I can write my own problem.
(Pt. 2)Prepare a 1400 word paper that analyzes a work-related project specified in the first paper describing a workplace application architecture and process design. Apply the tools of systems analysis to describe a work-related information system?s architecture in terms of data, processes, interfaces and network. Draw the physical data flow diagram(s) and be prepared to present and explain the diagram to the class. Use Visio to prepare examples of flow charts and data flow diagrams. Consider this assignment as follow-on to the workshop one assignment. This assignment incorporates transition from analysis to design for the selected business system. Cite and discuss 2 references.
(Pt. 3)Prepare a 1400 word paper, which describes the individual project situation specified for the first two papers for the implementation stage. Include discussion of the six major activities for the implementation stage as described within the text: (1) coding, (2) testing, (3) installation, (4) documentation, (5) training, and (6) support. The discussion of these six activities should describe specifically how each activity would be planned for the individual project situation. Also, include discussion of benefits of using defined and repeatable processes for accomplishing these activities for the implementation stage. Discussion should identify which Workflow Application Categories are most appropriate and why, as introduced in the -Workflow Management I will fax. Use the same project addressed in the paper 2. Consider this as a follow-on assignment, which incorporates the transition from design to implementation for selected business system at the department or division level. Cite and discuss 2 references .
There are faxes for this order.
Excerpt From Essay:
Essay Instructions: Assignment 3: Input Controls
for computer information systems course
There are many kinds of input controls. Write a 4 page paper in which you:
Explain the function of input controls.
Identify four (4) types of input control and explain the function of each.
Provide an example of a data integrity error that could occur if each of these types of input control were not in place.
Explain the advantages and disadvantages of restricting user interfaces. (User interfaces can often be restricted, limiting the user’s ability to navigate to other areas of the system, or out of the system.)
Design and build a graphical representation of a Web-based input for making a hotel reservation, using Visio or PowerPoint or an equivalent and paste it within the paper --make sure this is included
Your assignment must:
Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
Include charts or diagrams created in Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice. The completed diagrams/charts must be imported into the Word document before the paper is submitted.
The specific Course Learning Outcomes associated with this assignment are:
Design high-level logical system characteristics (user interface design, design of data, and information requirements).
Use contemporary CASE tools in process and data modeling.
Use technology and information resources to research issues in systems analysis and development.
Write clearly and concisely about systems analysis and development using proper writing mechanics.
Excerpt From Essay:
Essay Instructions: An IT Security Plan & Implementation for a Small Corporation.
Part 1. IT Security Proposal Summary [3 pages (900 words)]
Summarize a project proposal. Describe an existing small business network. 30 computers with 3 servers (web, e-mail, and database application server). Describe its lack of current security on each layer of the OSI model. Describe the need to implement IT security measures and list details. Firewalls, anti- virus, a DMZ are possible requirements.
Part 2. Review of Other Security Implementations (40 words)
Review of other people’s work. Site examples of real life similar projects that have been completed.
Part 3. Rationale and Systems Analysis for IT Security Upgrade [2 pages (600 words)]
Provide a rationale and system analysis of proposed project. Describe of purpose of the project. Describe the details of the project. Describe the importance of IT security. Site real life examples of IT attacks and data lose.
Part 4. Goals and Objectives for Upgrade IT Security [5 pages (1500 words)]
Provide a list of goals and objectives. Describe the list of goals for the project in detail. Describe the objectives to reach each of these goals. Each goal should have objectives. Describe the implementation of every security upgrade in phases.
Part 5. Project Deliverables (Equipment or Services to be Given to Customer) [5 pages (1500 words)]
Provide description of project deliverable. Describe in detail equipment that will be purchased and delivered to the customer business. Describe the problem that each new piece of equipment of software will solve. User training on security can be a deliverable.
Part 6. Project Plan and Timelines [1 Page]
Provide a timeline to implement each phrase of IT security upgrades to customer’s business network.
Excerpt From Essay:
I really do appreciate HelpMyEssay.com. I'm not a good writer and the service really gets me going in the right direction. The staff gets back to me quickly with any concerns that I might have and they are always on time.
I have had all positive experiences with HelpMyEssay.com. I will recommend your service to everyone I know. Thank you!
I am finished with school thanks to HelpMyEssay.com. They really did help me graduate college..