You are on page 1of 6

Instructions: Each answer should be no more than one page and may only require one or two paragraphs.

Quantity will not make up for quality. Use your own words, this is an individual assignment. Copying answers from other students or from other sources may result in a grade of zero for the problem and/or the exam. 1. Explain what a message is, using examples to demonstrate your understanding, and use the terms black box and encapsulation in your response. According to Shelly and Rosenblatt, a message is a command that tells an object to perform a certain method. For example, when using a video game ( Microsoft Xbox, Sony Play system 3, Nintendo Game boy) when the start screen shows up, the screen says to press start to begin the game. When the button is depressed, it in turn sends a message to the system to move forward with the start process. The hand controller the user uses is much like a black box, because the user does not attempt to understand in what fashion, or what manner the game is advanced into a preliminary starts stages. He/she simply presses the start button from the black box which sends the message to the game system. When the user simply presses the start button to begin the game, the user in essence encapsulates a message to the game system because the simple action of pressing a button send a coded message to the system the user is actively using. In this case, the message to start a video 2. Discuss in detail at least four of the main reasons for systems requests, including examples where appropriate. Pg 59 A) Improved Service to customer The case study were worked on as a project earlier in the semester for this class was a prime example of improving services to the customer. As I recall, the issue at hand was that the Martial Arts Academy had a paper filing system to keep track of promotions, attendance, and a few more items. A paper clip was used to signify certain milestones on the route to promotion. The purpose of the case study was to create a business case, but while working it, the ultimate intent was to foster a better customer service interface by creating an IS database to make things easier for the customer and owner. As part of my business case, I insisted on creating a customer interfacing portal to connect the consumer and business to better facilitate communications. This would fall under improved customer service .

B)

Better Performance Primarily takes place when routine obligations are not being met. Performance limitations would also be a consequence of initiating this system request. Here at my place of employment, a small database was created locally for a specific segment of our market segment. The system was used to track customer appointments, customer orders, and certain milestones. It was created in the exact fashion we had hoped it would be created, except that it was designed to be used by 40 or so people. As word got out as to the ease of the system, more users were allowed have access, and higher leaders were allowed to make changes, while never increasing its initial support capabilities. This caused routine reports to take up to 10 minutes, when the original return on reports was moments. The end result was a new division wide implementation of a system which could track the original intent of the system, with the upgrades executive leaders wanted.

C)

More information System request comes in when the current system does not provide ample information required for the organizations needs. Our class textbook provides the example of customer orders being tracked by a system, but the system is not capable of analyzing trending reports. When this cannot be produced, there is an issue because most of the good business practices are conducted in a hyper competitive environment. If leaders do not have the best possible information at hand, they will lag behind. Leaders will then not be able to market their products as needed, eventually leading to poor decision making.

D)

Stronger Controls A system must have a effective controls to ensure that data is secure and accurate. One example of this now is how all banks which provide online banking offer 128k encryption. This encryption allows for banks to offer a secure sight to their consumers via online without fear of their accounts being compromised. Los Alametos, in Palo Alto Califormia uses biometrics as a source of stronger controls. Their systems take an eye scan to include an electronic fingerprint to ensure authenticity of the individual being granted access to certain locations of their buildings. The state of TX also used biometrics when any state resident goes and renews .their state ID of drivers license. This specific control can be used to ensure there is no fraud ( other individual than person listed on id).

Here at my place of employment, Verizon Business, I have different levels of access to various company systems. On some I have full access to engineer networks, while on a few I only have read only rights. This is done to ensure that certain documents and pieces of networks are utilized by authorized people 3. JAD, RAD, and agile methods all have advantages and disadvantages. What are they? Joint application Development is a that technique engages participants actively. Advantages: 1. JAD allows significant participants to engage and participate effectively 2. JAD may be able to provide a further accurate statement of system requirements, 3. JAD provides a better understanding of common goals 4. JAD provides stronger commitment to the success of the new system Disadvantages: 1. JAD is expensive 2. JAD can be burdensome if the group is larger in relation to the size of the project Rapid Application Development is a team based technique that speeds up information systems development and produces a functioning information system. RAD relies on prototyping and user engagement. Advantages: 1. The system can be developed in a short time frame/ 2. Decrease in cost due to short time development frame Disadvantages: 1. RAD does not take into account the strategic business needs of the company, but rather the mechanics of the system 2. Short time frame does not allow maximization quality of the product. Agile Methods builds a system incrementally, by building a series of prototypes and constantly adjusting them to user requirements. Advantages: 1. Flexible and efficient in dealing with adjustments 2. Stress team communication/relations 3. Reflect ideal cooperative values

Disadvantages 1. Need for high level technical and interpersonal skills required amongst team 2 Possible increase in risk due to lack of structure and records 3. Possible scope creep due to change in user requirements

4. Briefly describe the four phases of the RAD model. The RAD model four phases consist of 10 requirements planning, 20 user design, 3) construction, and 4) cutover Requirements Planning Stakeholders agree on business needs, as well as the scope of the project to define the parameters of what they are attempting to do. Here the stakeholders also clarify what the database requirements need to be. User Design This stage has also be referred to as the functional design stage. During this stage, various techniques and CASE tools are used to model the databases to transform them into functional models. This is a nonstop, process, where ultimately, users approve a functioning model of the system. Construction This stage is referred to as the Development stage as well. This phase of the RAD model has continuous user engagement. Users can still recommend for changes. There is a heavy focus on program and application development responsibilities. Cutover During the last phase of this there are several things that take place. The new database is built, delivered, and placed in operation much sooner as an end product of the entire process being compacted and compressed.

5. Project managers typically perform four main tasks. Identify these and explain what they are. Project Planning PM Identifies all project tasks which will be involved in the project PM estimates completion time of each task PM estimates cost of each task Project scheduling Creation of exact schedule/agenda. This is done by providing charts (PERT, GNATT) PM scheduling also involves staffing the project team PM assigns a task to member of the team Project monitoring In this task, PM guides teams workload PM supervises team PM coordinates teams work load for effectiveness PM monitors progress of the tasks assigned PM evaluates results gathered from work assigned Any corrective action required for project success to meet project objectives and meet project deadline Project reporting PM provides ordinary progress information to leaders/management/users PM requires strong communications skills PM needs to know what people reviewing reports want to see, and know about the project 6. What are the disadvantages of each of the three system development methods? Structured Analysis

Costly changes, more often in the latter parts of process Does not emphasize interactivity among phases

Object Oriented Analysis


Newer methodology could not be as familiar to the development team

Cross functioning teams could experience hardships in larger systems

Agile/Adaptive Methods

Pose higher risk than other traditional methods Weak documentation Blurred lines of accountability Too little emphasis on the larger business picture Possible iterations can add to cost of project and lengthen development time

You might also like