Wednesday, March 15, 2017

E-commerce | Questions & Solutions

Chapter 1:

What is e-commerce? How does it differ from e-business? Where does it intersect with e-business? 
E-commerce, in the popular sense, can be defined as: the use of the Internet and the Web to conduct business transactions. A more technical definition would be: e-commerc e involves digitally enabled commercial transactions between and among organizations and individuals. E-commerce differs from e-business in that no commercial transaction, an exchange of value across organizational or individual boundaries, takes place in e-business. E-business is the digital enablement of transactions and processes withina firm and therefore does not include any exchange in value. E-commerce and e-business intersect at the business firm boundary at the point where internal business systems link up with suppliers. For instance, e-business turns into e-commerce when an exchange of value occurs across firm boundaries.

Compare online and traditional transactions in terms of richness.

Traditional transactions can provide more richness in terms of face-to-face service including visual and aural cues. However, traditional transactions are limited in terms of how many people can be reached at a single time. Online transactions, which can be global in reach, can provide content that is both complex and rich, overcoming the traditional trade-off between reach and richness.

What is Web 2.0? Give examples of Web 2.0 sites and explain why you included them in your list.

Web 2.0 is a set of applications and technologies that allows users to create, edit, and distribute content; share preferences, bookmarks, and online personas; participate in virtual lives; and build online communities. In other words, Web 2.0 is the set of new, advanced applications that have evolved along with the Web’s ability to support larger audiences and more involved content. Students may list Facebook, MySpace, YouTube, Photo bucket, Google, Wikipedia, Second Life,
Digg, and WordPress, among others, as example sites.

How are the Internet and the Web similar to or different from other technologies that have changed commerce in the past?
The Internet and the Web are similar to other technologies that have changed commerce in the past in that each new technological innovation spawns explosive growth characterized by thousands of startup companies. Many of these fail in the period of retrenchment and consolidation that follows. As with other technological revolutions, eventually it is the large, already established firms who have the resources to exploit the new technology. The growth of the Internet, when compared to other electronic technologies such as radio and television, has been much more rapid: the Internet and Web achieved a 53percent share of U.S households in only 10 years. In comparison, it took 38 years for radio and 17 for television to achieve a 30 percent share

What are some of the major advantages and disadvantages of being a first mover?
The major advantages of being a first mover are the ability to build a brand name early on and establish a large customer base before followers enter the market, and the ability to build switching costs into the technology or services offered sothat customers will find it discomfiting to change to a late entering competitor. The major disadvantage is that historically, many first movers have not succeeded and are instead replaced by the fast follower, larger firms with the financial, marketing, legal, and production assets necessary to develop mature markets. Generally, only a handful of first mover firms become successful long-term businesses as the start-up costs and time it takes to build a profitable business are often underestimated.

Define disintermediation and explain the benefits to Internet users of such a phenomenon. How does disintermediation impact friction-free commerce?

Disintermediation means the removal of the market middlemen—the distributors, wholesalers, and other intermediaries—between producers and consumers. The predicted benefits to Internet users include the decline of prices for products and services as manufacturers and content originators develop a direct relationship with their customers, and the elimination of payments to these middlemen. Disintermediation of markets would create intense competition. This, along with lowered transaction costs, would eliminate product brands, eventually resulting in the elimination of unfair competitive advantages and extraordinary returns on capital: the vision of friction-free commerce.

Discuss the ways in which the early years of e-commerce can be considered both a success and a failure
The early years of e-commerce can be considered a success because of the technological success that occurred as Web-enabled transactions grew from thousands to billions. The digital infrastructure proved to be a solid foundation on which to build a viable marketing channel. From a business perspective, the early years of e-commerce were a mixed success with just a tiny percentage of dot-com companies surviving. However, the survivors have benefited from the continued growth in B2C revenues. The early years of e-commerce can also be considered a
success in that the transfer of information has been a huge accomplishment as consumers learned to use the Web to procure information about products they wanted to purchase (Internet-influenced commerce)

Describe the three different stages in the evolution of e-commerce.

The three stages in the evolution of e-commerce are innovation, consolidation, and reinvention. Innovation took place from 1995–2000 and was characterized by excitement and idealistic vision s of markets in which quality information was equally available to both buyers and merchants. However, e-commerce did not fulfill these visions during its early years. After 2000, e-commerce entered its second stage of development: consolidation. In this stage, more traditional firms began to use the Web to enhance their existing businesses. Less emphasis was placed on creating new brands. In 2006, though, e-commerce entered its current stage, reinvention, as social networking and Web 2.0 applications rein vigorated e-commerce and encouraged the development of new business models

Given the development and history of e-commerce in the years from 1995–2013, what do you predict we will see during the next five years of e-commerce? Describe some of the technological, business, and societal shifts that may occur as the Internet continues to grow and expand

Although each student’s answer may differ depending on their personal perspective on e-commerce, here are some possible predictions:

Technological Shifts: the Internet will continue to grow, but at a slower pace.  Internet usage, however, will become more focused, targeted, and intense.  New client platforms like tablet computers will emerge.  New networking technologies will emerge to permit mobile commerce.

Business Shifts: Larger traditional firms will come to dominate e-commerce.  There will be a greater emphasis on profitability for online ventures.

Societal Shifts: There will be a greater emphasis on regulation and control over the Internet and e-commerce in areas such as taxation, content, and entertainment.


Chapter-2:

What are Amazon’s primary customer value propositions?

Ans: Amazon’s primary customer value propositions are unparalleled selection and convenience.
Values play an important role in Amazon.com's succeeding. A value is like a goal and forms an ongoing objective. There are two strong values that are practised by Amazon.com. These include customer satisfaction and operational frugality. A value proposition can be a goal and it can be something that the company aspires to as part of their ongoing objectives, but to say "a value is like a goal" is not the same as saying that "a value proposition is like a goal .. Value proposition": The unique value a business offers to its customers. It's why your customers will want to do business with you.

Why is targeting a market niche generally smarter for a community provider than targeting a large market segment?

Targeting a market niche is generally a smarter strategy for a community provider than targeting a large market segment because targeting large market segments will only pit a company against bigger and more established competitors. Small sub-segments of larger markets have a greater potential for growth without the intense competitive pressure. Communities that place a strong emphasis on the advertising revenue model will find marketers more interested in placing ads on a site that targets a specific niche

What are some of the specific ways that a company can obtain a competitive advantage?

Some specific ways a company can obtain a competitive advantage are by developing a global market while its competitors only have a national or regional market; by obtaining favorable terms from shippers, suppliers, or labor sources that its competitors do not have; by developing a more experienced, knowledgeable, and loyal employee base than its competitors; by obtaining a patent on a product that its competitors will not be able to imitate; by having an inside track to investors willing to put up capital; by establishing a powerful brand name or a popular image that it will be difficult for competitors to duplicate; and by any type of asymmetry that will give it more resources than its competitors in any area such as financial backing, knowledge, information, and/or power.


Why is it difficult to categorize e-commerce business models?
It is difficult to categorize e-commerce business models because the number of models is limited only by the human imagination, and new business models are being invented daily. Even within the broad-based generic types, there are overlaps, and fundamentally similar business models may appear in more than one. The type of e-commerce technology used can also affect the classification of a business model. Also, some companies may employ multiple business models.
For example, eBay is essentially a C2C marketplace, but also functions as a B2C market maker, and in addition, has an m-commerce business model.


Besides the examples given in the chapter, what are some other examples of vertical and horizontal portals in existence today?
Some other examples of vertical portals (vortals) include ESPN.com (sports), iVillage.com (women’s issues), Bloomberg.com (business), NFL.com (sports), WebMD.com (medical issues), Gamers.com (games), Away.com (travel), and Sina.com (China and Chinese communities). Some other examples of horizontal or general portals include Lycos.com and Sympatico.ca (Canadian). Note that many of these can also be considered community sites as well.

Besides news and articles, what other forms of information or content do content providers offer?
Besides news and articles, content providers may also supply music, photos, video, artwork, educational materials, or games.
What are four generic business strategies for achieving a profitable business?
The four generic business strategies for achieving a profitable business are differentiation, cost, scope, and focus. Differentiation involves setting your firm or product apart from the competition by establishing some unique property or consumption experience that your competitors do not have. A firm that adopts a cost strategy must have a unique set of business processes, a unique resource, or a low cost supplier. It is essential that other firms in the marketplace do not have access to, or cannot duplicate, this because it will allow them to charge a lower price while still making a profit. A scope strategy sets out to compete in all markets around the globe, rather than just locally or regionally. A focus strategy on the other hand, is a plan to compete within a narrow market segment or product segment. Specialization strategists seek to become the premier provider in a small market segment or niche.


Chapter 3:

What are the three basic building blocks of the Internet?
The three basic building blocks are packet switching, the Transmission Control Protocol/Internet Protocol (TCP/IP) communications protocol, and client/server computing. Packet switching is a method of splitting messages up into parcels, routing them along available communications paths, and reassembling them at the destination point. The TCP protocol is the set of rules that specifies how these messages should be formatted, ordered, compressed, and error-checked. The IP protocol provides the addressing scheme for the Internet. Client/server computing refers to networks of powerful client computers that are connected to one or more server computers. The clients are powerful enough to display, process, and store very large files including graphics and sound files. The servers are dedicated to common functions that all of the clients need including file storage, and they also house many software applications and utility programs that the clients frequently use.
How is the TCP/IP protocol related to information transfer on the Internet?
The TCP/IP protocol determines how messages are formatted, compressed and error-checked and how they are addressed so that they reach the correct destination in the correct order and format. TCP establishes the connections between sending and receiving computers, and it handles the assembly of packets at the point of transmission and their reassembly at the receiving end. IP provides the Internet’s addressing scheme, and is responsible for the actual delivery of the packets.

What is cloud computing, and how has it impacted the Internet?


What are the some major limitations of today’s Internet?
The four major limitations of today’s Internet are bandwidth, quality of service, network architecture, and language development. There is insufficient bandwidth capacity throughout the backbone, the metropolitan switching centers, and most importantly, to the houses and small businesses at the end of the information pipeline. Due to insufficient bandwidth and the circuitous nature of packet switching, video and voice traffic suffers from latency. This causes these types of messages to arrive with noticeable delays and a jerky quality. Because today’s Internet uses “best efforts” quality of service, each packet is provided with the same level of service. This means that all packets traveling through the communication system are treated the same, no matter who is sending them or what type of message they are.
Network architecture restrictions also limit the performance of the Internet. A thousand requests for the same file result in a server having to download the file one thousand times rather than being able to transmit it once to all one thousand computers at the same time. This significantly slows down network performance. Finally, HTML, the language for displaying Web pages, has proven to be insufficient for displaying rich documents such as database files, business documents and graphics.

What are some of the challenges of policing the Internet? Who has the final say when it comes to content?
One challenge of policing the Internet is that there are multiple organizations that influence the system and monitor its operations. It is hard to make the Internet conform to the laws of the sovereign nation states in which it operates, and it is difficult to enforce the various and often contradictory laws of all of these nations. Many countries want to put far stricter restrictions on freedom of expression than the U.S. does. Different cultures have different social morals, and what is acceptable in some countries is decidedly not in others. The issue of who has the final say is also quite controversial and varies from country to country. For instance, in China, the Chinese government has “the final say” about what content is available to viewers who access the Internet from within China. Other countries also regulate the availability of certain types of content.  Critics complain that attempting to create “legal harmony” will result in major content restrictions on the Internet with only content that is legally acceptable worldwide being made accessible.
What are some of the major technological advancements that are anticipated to accompany Internet II? Define and discuss the importance of each.
First, a bandwidth explosion fueled by fiber optic technology, will allow the Internet to move from narrowband to broadband digital service. Second, wireless Web and 3G technologies, will allow the Internet to move from cable-based stationary service to mobile service. Third, wireless LANS will allow laptop computers to be connected to other computers, as well as to other digital devices including: home appliances, vending machines, and remote sensors. Fourth, new Internet appliances will make it possible to connect nearly all the electronic devices in our lives to the Internet and to private intranets. These new Internet appliances will include thin client computing devices (PCs without hard drives), which rely totally on the Internet server to handle all information processing. Lightweight, portable, full-function PCs and handheld devices will be able to activate and deactivate virtually any device that can be connected to the Internet. This is expected to include home appliances-- TVs, stereos, telephones, games, security systems, cars and Net PCs-- which will be interconnected so that they can all be controlled from one source.
Describe the potential capabilities of internet of future



Investigate the Internet of Things. Select one example and describe what it is and how it works.





Broad Question:

Please describe with examples the unique features of e-commerce technology today
Ans: Ubiquity: It is available just about everywhere and at all times. Consumer can connect it to the Internet at any time, including at their homes, their offices, on their video game systems with an Internet connection and mobile phone devices. ECommerce is ubiquitous technology which is available everywhere and can access all times by using internet and Wi-Fi hotspot such as airport, coffee cafe and hill station places.

Global reach: The potential market size is roughly equal to the size of the online population of the world. Ecommerce Technology seamlessly stretch across traditional cultural and national boundaries and enable worldwide access to the client. ECommerce website have ability to translate the multilingual websites as well as allow the access to international visitors all over the world.

Universal standards: The technical standards of the Internet and therefore of conducting eCommerce, are shared by all of the nations in the world. The whole online tradition are growing and expanding their own features in the world. To development the any kind of business need Internet and communication application which make the business relationship more lovingly and attractive for secure business and successful business. ECommerce Technology provide us powerful application to access our social networking and online eCommerce store any time and everywhere.

Richness: Information that is complex and content-rich can be delivered without sacrificing reach. It has been so simple to keep the record of our tradition communication within the eCommerce time. You can save your audio, video, sent files, received files or data in your user account.

Interactivity: E-commerce technologies allow two-way communication between the merchant and the consumer. You can call them by using the voip and track the communication record. And second is is email communication which allow you to access all kind of mailing systems and tracking.

Information density: The total amount and quality of information available to all market participants is vastly increased and is cheaper to deliver. Most business owners use the shopping cart and do the order of product and purchasing online. Online shopping process allows a consumer or company to receive personal details, product shipping, billing and payment information from a customer all at once and sends the customer's information to the appropriate departments in a matter of seconds priority.

Personalization/Customization: E-commerce technologies enable merchants to target their marketing messages to a person’s name, interests and past purchases. They allow a merchant to change the product or service to suit the purchasing behavior and preferences of a consumer.

Social technology: User content generation and social networking technologies is most useful features which accelerate the client activity to share the information and content with one click. ECommerce technology has tie up the social media networking application to provide the best source of content sharing technology and eMarketing systems. You can share you content or data easily in just one click.

Identify the key components of e-commerce business models.
A successful business model effectively addresses eight key elements:
●Value proposition - how a company's product or service fulfills the needs of customers. Typical e-commerce value propositions include personalization, customization, convenience, and reduction of product search and price delivery costs.
●Revenue model -- how the company plans to make money from its operations. Major e-commerce revenue models include the advertising model, subscription model, transaction fee model, sales model, and affiliate model.
●Market opportunity -- the revenue potential within a company's intended marketspace.
●Competitive environment-the direct and indirect competitors doing business in the same marketspace, including how many there are and how profitable they are.
●Competitive advantage - the factors that differentiate the business from its competition, enabling it to provide a superior product at a lower cost.
●Market strategy -- the plan a company develops that outlines how it will enter a market and attract customers.
●Organizational development - the process of defining all the functions within a business and the skills necessary to perform each job, as well as the process of recruiting and hiring strong employees.
●Management team - the group of individuals retained to guide the company's growth and expansion.
Describe the key B2C business models.

There are a number of different business models being used in the B2C e-commerce arena. The major models include the following:
• Portal—offers powerful search tools plus an integrated package of content and services; typically utilizes a combined subscription/advertising revenue/transaction fee model; may be general or specialized (vortal).
• E-tailer—online version of traditional retailer; includes virtual merchants (online retail store only), bricks-and-clicks e-tailers (online distribution channel for a company that also has physical stores), catalog merchants (online version of
direct mail catalog), and manufacturers selling directly over the Web.
• Content provider—information and entertainment companies that provide digital content over the Web; typically utilizes an advertising, subscription, or affiliate referral fee revenue model.
• Transaction broker—processes online sales transactions; typically utilizes a transaction fee revenue model.
• Market creator—uses Internet technology to create markets that bring buyers and sellers together; typically utilizes a transaction fee revenue model.
• Service provider—offers services online.
• Community provider—provides an online community of like-minded individuals for networking and information sharing; revenue is generated by advertising,
referral fees, and subscriptions.
During the early days of e-commerce, first-mover advantage was touted as one way to success. On the other hand, some suggest that being a market follower can yield rewards as well. Which approach has proven to be more successful—first mover or follower? Choose two e-commerce companies that prove your point and prepare a brief presentation to explain your analysis and position.
For students that argue for first mover advantage as a way to success, examples might include Amazon, Yahoo, Travelocity, eBay, VeriSign, Priceline, E*Trade, and PayPal. Although each of these has encountered competition, their early arrival and commitment to becoming the predominant player in their respective marketspace have helped to assure their continuing success.
Those who argue for market followers can point to the demise of many of
e-commerce’s first movers. Examples might include Pets.com, Garden.com, Webvan, eToys.com, Kozmo.com, and theGlobe.com. They might point instead to companies who were not among the first on the Web, but today are successful such as Walmart.com, JCPenney.com, PetSmart.com, Williams-Sonoma.com, Fidelity.com, and Bluenile.com
Describe how Internet and Web features and services support e-commerce
Ans from book.






Tuesday, March 14, 2017

About Me



Md. Sabbir Bin Sams



BBA in MIS, Green University of Bangladesh

Email : sojib.sams@gmail.com

Cell : 8801722488422


System Analysis and Design 9th EditionChapter 2 Review Questions




System Analysis and Design 9th EditionChapter 2 Review Questions



1.What is a business case? How does a business case affect an IT project?Business case refers to the reasons, or justification, for a proposal. A business caseshould be comprehensive, yet easy to understand. It should describe the project clearly,provide the justification to proceed, and estimate the project's financial impact. Abusiness case should answer questions such as the following:Why are we doing this project?What is the project about?How does this solution address key business issues?2.What is a SWOT analysis and why is it important?Strategic planning starts with a management review called a SWOT analysis . Theletters stand for strengths, weaknesses, opportunities, and threats. A SWOT analysisusually starts with a broad overview. The first step is for top management to respond toquestions like these:What are our strengths, and how can we use them to achieve our business goals?What are our weaknesses, and how can we reduce or eliminate them?What are our opportunities, and how do we plan to take advantage of them?What are our threats, and how can we assess, manage, and respond to the possiblerisks?A SWOT analysis is a solid foundation for the strategic planning process, because itexamines a firm's technical, human, and financial resources. As the SWOT processcontinues, management reviews specific resources and business operations.3.What are five common reasons for systems projects?The starting point for most projects is called a systems request , which is a formal way ofasking for IT support. A systems request might propose enhancements for an existingsystem, the correction of problems, the replacement of an older system, or thedevelopment of an entirely new information system that is needed to support a

Tuesday, March 7, 2017

System Integration, Security & Internet | Questions & Answers

System Integration, Security & Internet
Questions & Answers


What are the three components of the C.I.A. triangle? What are they used for?
Answer:
1. Confidentiality:  protect information from disclosure or exposure to unauthorized individuals or systems
2. Integrity:  when information is whole, complete and uncorrupted
3. Availability:  allows authorized users to access information without interference or obstruction and to receive it in the required format
C.I.A.: the industry standard for computer security since the development of the mainframe

3. What is privacy in an information security context?
ANS: Privacy in an information system refers to how the information that you supply will be protected. Will the information will be confidential, will they sell it? Will the information be leaked or not. Privacy cannot be considered as absolute freedom from observation. But rather it is more precise “state of being free from unsanctioned intrusion of information”.
OR
Vulnerability is a weaknesses or fault in a system or protection mechanism that opens it to attack or damage. Exposure is a condition or state of being exposed. In information security, exposure exists when a vulnerability known to an attacker is present.

5. What is the difference between vulnerability and exposure?
  Vulnerability is a fault within the system, such as software package flaws, unlocked doors or an unprotected system port. It leaves things open to an attack or damage.  Exposure is a single instance when a system is open to damage. Vulnerabilities can in turn be the cause of exposure.

8. What is a policy? How is it different from a law?
policy is that which outlines what a government is going to do and what it can achieve for the society as a whole. “Policy” also means what a government does not intend to do. It also evolves the principles that are needed for achieving the goal. Policies are only documents and not law, but these policies can lead to new laws.

Laws and policies are vary needed in our society as they help in maintaining law and order in the society and help in shaping political and social aspects of the society. Though policies and laws can be interrelated, they are definitely two terms having different purposes. No nation can go forward without having certain laws and policies.
Laws are for the people, and policies are made in the name of the people. Policies can be called a set of rules that guide any government or any organization. Laws are administered through the courts. Laws are enforceable in which the policies comply.
A law is more formal as it is a system of rules and guidelines that are derived for the welfare and equity in society. A policy is just informal as it is just a statement or a document of what is intended to be done in the future.
10. What is civil law, and what does it accomplish?
Ans: A wide variety of laws that govern a nation or state and deal with the relationships and conflicts between organizational and entities and people.

11. What is the difference between a threat agent and a threat?
Answer:
Threat: a category of objects, persons, or other entities that presents a danger to an asset.
Threat agent: the specific instance or component of a threat.
OR
A threat agent is the facilitator of an attack, whereas a threat is a category of objects, persons, or other entities that represents a potential danger to an asset. Threats are always present. Some threats manifest themselves in accidental occurrences and others are purposeful. Fire is a threat; however, a fire that has begun in a building is an attack. If an arsonist set the fire then the arsonist is the threat agent. If an accidental electrical short started the fire, the short is the threat agent.

12. Briefly describe two critical characteristics of information?
* Availability: the accessibility of information. In Computer Security, access to data is usually restricted to particular users, this making it unavailable to unauthorized users.
* Accuracy: freedom from errors due to mistakes in data entry, as opposed to errors that arise during the transmission or reproduction of information (see Integrity). Obviously, in Computer Security accuracy is essential. Inaccurate information is at best useless, and at worst dangerous.
* Authenticity: the data is original, rather than a reproduction (or forgery). In computer security, it is important to ensure that information is authentic; that is, that the information is exactly the same in content and state as the original produced by its creator.

13. What are the various types of Malware? How do worms differ from viruses? Do Trojan horses carry viruses or worms?
Common types of malware are viruses, worms, Trojan horses, logic bombs, and back doors.
Computer viruses are segments of code that induce other programs to perform actions. Worms are malicious programs that replicate themselves constantly without requiring another program to provide a safe environment for replication.
Once a trusting user executes a Trojan horse program it will unleash viruses or worms to the local workstation and the network as a whole
14. How can an attacker use social engineering to gather information against his/her victims?
In the context of information security, social engineering is the process of using social skills to convince people to reveal access credentials or other valuable information to the attacker. There are several social engineering techniques, which usually involve a perpetrator posing as a person higher in the organizational hierarchy than the victim. To prepare for this false representation, the perpetrator may have used social engineering tactics against others in the organization to collect seemingly unrelated information that, when used together, makes the false representation more credible. For instance, anyone can check a company’s Web site, or even call the main switchboard to get the name of the CIO; an attacker may then obtain even more information by calling others in the company and asserting his or her (false) authority by mentioning the CIO’s name. Social engineering attacks may involve individuals posing as new employees or as current employees requesting assistance to prevent getting fired. Sometimes attackers threaten, cajole, or beg to sway the target.
Another social engineering attack called the advance-fee fraud (AFF), and internationally known as the 4-1-9 fraud, is named after a section of the Nigerian penal code. The perpetrators of 4-1-9 schemes often name fictitious companies, such as the Nigerian National Petroleum Company. Alternatively, they may invent other entities, such as a bank, government agency, or a nongovernmental organization. See Figure 2-14 for a sample letter from this type of scheme. This scam is notorious for stealing funds from credulous individuals, first by requiring that people who wish to participate in the proposed money-making venture send money up front, and then by soliciting an endless series of fees. These 4-1-9 schemes are even suspected to involve kidnapping, extortion, and murder, and they have, according to the Secret Service, bilked over $100 million from unsuspecting Americans lured into


15. Why is a methodology important in the implementation of information security? How
does a methodology improve the process?
Answer:
A methodology is a formal technique that has a structured sequence of procedures that is used to solve a problem. Methodology is important in the implementation of information security because it ensures that development is structured in an orderly, comprehensive fashion. The methodology unifies the process of identifying specific threats and the creation of specific controls to counter those threats into a coherent program. Thus, a methodology is important in the implementation of information security for two main reasons:
-First, it entails all the rigorous steps for the organizations' employees to follow, therefore avoiding any unnecessary mistakes that may compromise the end goal (i.e., to have a comprehensive security posture). An example of this is that a methodology guides an organization to solve the root cause of the information security problem, not just its symptoms.
16. What is intellectual property (IP)? Is it afforded the same protection in every country of the world? What laws currently protect it in the United States and Europe?
Ans: A work or invention that is the result of creativity, such as a manuscript or a design, to which one has rights and for which one may apply for a patent, copyright, trademark, etc.
In today's economic environment, intangible assets are becoming increasingly important. These assets which are the result of human intellectual creative activity such as invention, design, know-how, and artistic creation are known as "intellectual property." Among the forms of intellectual property specifically entitled to legal protection are inventions, trademarks, designs, literary works, layout-designs of integrated circuits and trade secrets. As the volume of trade in goods and services involving intellectual property has increased greatly in recent years, the importance of the protection of intellectual property for the world economy has grown enormously. Inappropriate and insufficient protection of intellectual property can distort free trade.
In developing countries, the protection of intellectual property rights is often insufficient. For example, developing countries often limit protection to a very narrow subject area, or provide protection for only a short period of time, or lack strict enforcement. Some developed countries also have problematic intellectual property regimes that, for example, openly discriminated against foreign nations, provide excessive protection or otherwise have regimes so different from those employed by the rest of the world that its effect is discriminatory.


17. What are the primary examples of public law?
Ans: Criminal, administrative and constitutional law.

What is methodology? Describe the steps taken in secSDLC?
The systems development life cycle (SDLC) is a methodology for the design and implementation of an information system. A methodology is a formal approach to solving a problem by means of a structured sequence of procedures.
Investigation
The first phase, investigation, is the most important. What problem is the system being developed to solve? The investigation phase begins with an examination of the event or plan that initiates the process. During the investigation phase, the objectives, constraints, and scope of the project are specified. A preliminary cost-benefit analysis evaluates the perceived benefits
and the appropriate levels of cost for those benefits. At the conclusion of this phase, and at
every phase following, a feasibility analysis assesses the economic, technical, and behavioral
feasibilities of the process and ensures that implementation is worth the organization’s time
and effort.
Analysis
The analysis phase begins with the information gained during the investigation phase. This
phase consists primarily of assessments of the organization, its current systems, and its capability to support the proposed systems. Analysts begin by determining what the new system is
expected to do and how it will interact with existing systems. This phase ends with the documentation of the findings and an update of the feasibility analysis.
Logical Design
In the logical design phase, the information gained from the analysis phase is used to begin
creating a systems solution for a business problem. In any systems solution, it is imperative
that the first and driving factor is the business need. Based on the business need, applications
are selected to provide needed services, and then data support and structures capable of providing the needed inputs are chosen. Finally, based on all of the above, specific technologies
to implement the physical solution are delineated. The logical design is, therefore, the blueprint for the desired solution. The logical design is implementation independent, meaning that it contains no reference to specific technologies, vendors, or products. It addresses,
instead, how the proposed system will solve the problem at hand. In this stage, analysts generate a number of alternative solutions, each with corresponding strengths and weaknesses,
and costs and benefits, allowing for a general comparison of available options. At the end of
this phase, another feasibility analysis is performed.
Physical Design
During the physical design phase, specific technologies are selected to support the alternatives identified and evaluated in the logical design. The selected components are evaluated
based on a make-or-buy decision (develop the components in-house or purchase them
from a vendor). Final designs integrate various components and technologies. After yet
another feasibility analysis, the entire solution is presented to the organizational management for approval.
Implementation
In the implementation phase, any needed software is created. Components are ordered,
received, and tested. Afterward, users are trained and supporting documentation created.
Once all components are tested individually, they are installed and tested as a system. Again
a feasibility analysis is prepared, and the sponsors are then presented with the system for a
performance review and acceptance test.
Maintenance and Change
The maintenance and change phase is the longest and most expensive phase of the process.
This phase consists of the tasks necessary to support and modify the system for the remainder of its useful life cycle. Even though formal development may conclude during this phase,
the life cycle of the project continues until it is determined that the process should begin
again from the investigation phase. At periodic points, the system is tested for compliance,
and the feasibility of continuance versus discontinuance is evaluated. Upgrades, updates, and
patches are managed. As the needs of the organization change, the systems that support the
organization must also change. It is imperative that those who manage the systems, as well
as those who support them, continually monitor the effectiveness of the systems in relation
to the organization’s environment. When a current system can no longer support the evolving
mission of the organization, the project is terminated and a new project is implemented.
Malware
Regroups viruses, spyware, Trojans, and all sorts of small programs designed to harm your system, steal information, track your activities…etc 

Spyware
Spyware (spy software or spyware) is a program designed to collect personal data about users of the infected system and to send them to a third party via the Internet or computer network without permission users.  Use Ad-Aware and Spybot to remove them. 

Viruses
A virus is a piece of malicious computer program designed to replicate itself. This ability to replicate, can affect your computer without your permission and without your knowledge. In layman’s term a classical virus will attach itself to a executable program and systematically replicate to all executable that you run. 
Worms
A worm (or worm) is a particular type of virus that can replicate through terminals connected to a network, then to perform certain actions which would impair the integrity of operating systems. 
Trojans
A Trojan looks like a valid program. But in reality it contains hidden features, through which the security mechanisms of the system are bypassed, allowing access to your files (to view, modify or destroy them). Unlike a worm, the Trojan does not replicate: it may stay harmless, in a game or a utility until the scheduled date of its entry into action. 
Key loggers
A key logger is software that records keystrokes to steal, for example, a password. 
Dialer
The dialers are programs that make up a number to connect your computer to the Internet. It may be safe and legitimate if it is from your ISP for example. However, some dialers are malicious and can move without your knowledge on your machine and dial a number very expensive number. 
Rootkits
A rootkit is a very complex malicious code that can merge with your system, and sometimes to very core of the operating system. It is thus able to take full control of a PC without leaving a trace. Detection is difficult, even impossible on some systems.



System Analysis & Design Question & Solutions


Chapter-1







1 - Identify the main components of an information system and describe the systems stakeholders.
An information system is comprised of Hardware, Software, processes and data. The systems stake holders are the end users, the system managers, IT Staff and anyone that interacts with an information system.
2-Explain the use of models, prototypes, and CASE tools in the systems development process. Also explain the pros and cons of agile development methods.
Computer-aided system engineering (CASE) is used by system analysts to develop and maintain models of business processes. Analyst use case tools to build a models and prototypes of a business process.
The end result of an agile system development method can result in a better product for the end user owing to the fact it takes into account high levels of user feedback but without a detailed set of system requirement the user could ask for things in the system that don’t fit into the organizations overall business strategy
3-Describe the phases of the systems development life cycle, and compare the SDLC waterfall model with the spiral model.
Software development life cycle or SDLC for short is a methodology for designing, building, and maintaining information and industrial systems. So far, there exist many SDLC models, such as the Waterfall model, which comprises five phases to be completed sequentially in order to develop a software solution
  • Project planning, feasibility study: Establishes a high-level view of the intended project and determines its goals.
  • Systems analysis, requirements definition: Refines project goals into defined functions and operation of the intended application. Analyzes end-user information needs.
  • Systems design: Describes desired features and operations in detail, including screen layouts, business rules, process diagrams, pseudocode and other documentation.
  • Implementation: The real code is written here.
  • Integration and testing: Brings all the pieces together into a special testing environment, then checks for errors, bugs and interoperability.
  • Acceptance, installation, deployment: The final stage of initial development, where the software is put into production and runs actual business.
  • Maintenance: What happens during the rest of the software's life: changes, correction, additions, moves to a different computing platform and more. This, the least glamorous and perhaps most important step of all, goes on seemingly forever.
Waterfall Model vs Spiral Model
In spiral model, we can easily adjust the software development with the required changes. The prototypes which are created in every stage, enables us to roll back only a few steps. As soon as any new changes are requested or required we can start up from the last left over prototype version. Whereas, Waterfall model the stages are executed under a sequential flow. Every new phase is processed only after completing the previous phase. This is a big reason why any sudden changes are very hard to accommodate under Waterfall model.
Again, simply because of the sequential nature of the waterfall model if a bug is found or an error is incurred for a preliminary reason, we need to start from the scratch again. Whereas, under spiral model every prototype is tried and tested and hence the chances of find errors at later stages are very rare. For complete list of differences you can check out our Difference category.
4-Some experts believe that the growth in e-commerce will cause states and local governments to lose a significant amount of sales tax revenue, unless Internet transactions are subject to sales tax. Do you agree? Why or why not?
I feel that this is an over step of bounds, the tax for items that are purchased on the internet should not be taxed. The reason for the tax was to help the local economy but the taxation of these items will just push sellers to areas where taxes are not collected on their business.

5-Present an argument for and against the following proposition: Because IT managers mustunderstand all phases of the business, a company should fill top management vacancies by promoting IT managers.
Some possible arguments for the proposition follow

a.Information technology (IT) management has a broad understanding of the information processing of the company instead of the narrower view held by managers from other areas of the company.
b. IT management deals with all functional company areas so members of IT management know and interrelate with the people who lead and who work in these areas. Because they provide needed services to these areas, IT management personnel have the support of the key personnel from these areas.
c. information systems development and maintenance is complex and requires extraordinary management skills to operate successfully. These same skills are necessary in top-level management positions.
d. Computer technology dominates many companies today. Today's technology leaders should be tomorrow's business leaders.
Some possible arguments against the proposition follow:
a.       IT management is more comfortable dealing with computers and with procedures, and less comfortable dealing with people. Top-level management positions require a strong interest in people and strong skills in dealing with people.
b.      Whether a firm is product-oriented or service-oriented, it must make a profit to survive. Future company leaders should, therefore, come from the production, service, or financial areas, because these areas are the most important to a company. Possibly, in Internet-dependent firms, the best choice would be an IT manager — but only if he or she had extraordinary business skills apart from technical ability.
c.       It is unwise to restrict prospects for top-level management positions to one specific area of the company. Competent leaders are apt to rise from many different departments.
d.      People who have worked in several different functional areas are better rounded than those restricted to just one area. So, unless the IT manager has worked outside the IT department, he or she essentially is a specialist and is at a disadvantage compared to someone with more general knowledge and skills.

6-The head of the IT group in a company often is called the chief information officer (CIO) or chief technology officer (CTO). Should the CIO or CTO report to the company president, to the finance department, where many of the information systems are used, or to someone or somewhere else? Why would it matter?
Several possible advantages of having the IT director report to the chief financial officer of the company follow:
a. The operation of the IT department represents a large expense for most companies. The chief financial officer is in the best position to monitor and control this expense.
b. Financial information systems are among the first in a company to be computerized, and it is natural, therefore, to place the IT department under the chief financial officer.
c. It would be difficult for a company to make a profit if it did not have excellent control over its data and information. The chief financial officer has responsibility for all centralized monetary functions. Therefore, this same person should have responsibility for all centralized data and information processing functions
d. Too many technical details are involved with the operation of the information technology department, and having the department report to the president would beun wise. Logically the finance area is the only lower-level area of the company that hasthe breadth of responsibility necessary to manage the IT department.
Several possible disadvantages of having the IT director report to the chief financial officer of the company follow:
a. There is a danger that too much attention would be paid to the financial information systems and not enough to other information systems.
b. The IT department should report to the president of the company because information technology is as important to the company as the company's financial functions. They, therefore, deserve equal attention from the president.
c. Information technology is too complicated to assign to someone whose expertise is finance and not computer technology.

7-Computers perform many jobs that previously were performed by people. Will computer- based transactions and expanded e-commerce eventually replace person-to-person contact? From a customer’s point of view, is this better? Why or why not?

IT professionals agree that computer technology is changing the way companies do business. Many brick-and-mortar firms are launching large-scale B2B and B2C ventures that profoundly will affect traditional business practices and operations. Few observers think that IT will replace person-to-person contact totally, although many clerical and administrative functions will become automated. The real question is how these changes will affect people in an information-oriented society. Many observers feel that the implications of huge quantities of information and 24/7 access can cut in both directions. Reasonable people differ on these issues, and you might want to propose a debate among   your students. For additional background and viewpoints about the impact of computer technology on traditional person-to-person interaction, students can perform research onthe Internet and compare the views of technology-based publications such as
Info World, to mainstream business publications such as
Fortune, Forbes, and the Harvard Business Review, among others.

Broad Ques: Apply your Knowledge:
Low voltage components
You are the IT manager at Hi-Voltage Components, a medium-sized frm that makes specialized circuit boards. Hi-Voltage’s largest customer, Green Industries, recently installed a computerized purchasing system. IF Hi- Voltage connects to the purchasing system, Green Industries will be able to submit purchase orders electronically. Although Hi-Voltage has a computerized accounting system, that system is not capable oF handling EDI.
Ques:
 1. Should Low-Voltage develop a system to connect with TX Industries’ purchasing system? Why and why not?
Yes, I would develop a system to connect with TX Industries’ purchasing system. Usually it is the larger companies that push the technology implementations of smaller companies. In order to streamline the order process for TX Industries we need to get on board in implementing an accounting system that is able to connect with TX Industries’ purchasing system. If we do not develop a system we run the risk of losing TX Industries to a competitor who will be able to mesh up their system with TX Industries system.

 2. What term or concepts describe the proposed computer-to-computer relationship between Hi-Voltage and Green Industries? The computer-to-computer relationship between Hi-Voltage and Green Industries is an exchange of information between the both of them which is referred to as a Business-to-Business (B2B). B2B technologies such as Electronic Data Interchange (EDI), help businesses integrate their supply chains to gain e±ciency.
3. Would Hi-Voltage`s proposed new system be a transaction processing system? Why or why not? Hi- Voltage`s proposed system would be a Transactions Processing system (TPS)because it would handle daily, or routine, transaction of the ²rm, such as sales and billing of customers. Transactions processing System record routine transactions that must place for the ²rm to remain in business.
4. BeFore Hi-Voltage makes a fnal decision, should the company consider an ERP system? Why or why not? They should consider and Enterprise resource planning(ERP) system that supports company-Wide Processes, such as accounting, Production and customer relationship management. Integration of these processes will help mangers make better decisions.

System Analyst Salaries:

1. Find information about a career as a information systems analysts.
 Job Description – Computer Systems Analyst:
A computer systems analyst helps a company or other organization use computer technology effectively and efficiently. He or she incorporates new technology into a company’s current system.
Employment Facts – Computer Systems Analyst:
There were 532,000 computer systems analysts employed in 2008.
Educational Requirements – Computer Systems Analyst:
A bachelor’s degree is required for many jobs, while more technically complex jobs require a master’s degree.
Other Requirements – Computer Systems Analyst:
To work as a computer systems analyst one must have strong problem-solving, analytical, interpersonal and communication skills. He or she must be able to think logically and have the ability to concentrate and pay attention to detail.
Advancement Opportunities – Computer Systems Analyst:
A computer systems analyst, after getting experience, may be promoted to senior or lead systems analyst. If one has leadership ability and good business skills, he or she may have a future as a computer and information systems manager or may end up in another management position.
Job Outlook – Computer Systems Analyst:
The U.S. Bureau of Labor Statistics predicts much faster than average job growth for this field through 2018. It is one of the Top 10 Fastest Growing Jobs for which a bachelor’s degree is required.
Earnings – Computer Systems Analyst:
Median annual earnings of computer systems analyst were $77,080 in 2009.

2. Using internet, determine whether the federal Bureau Labor Statistics list salary information for system analysts. If so summarize the information you find.
Quick Facts: Computer Systems Analysts
2010 Median Pay
$77,740 per year
$37.38 per hour
Entry-Level Education
Bachelor’s degree
Work Experience in a Related Occupation
None
On-the-job Training
None
Number of Jobs, 2010
544,400
Job Outlook, 2010-20
22% (Faster than average)
Employment Change, 2010-20
120,400
3. Find at least two online ads for system analysts and list the employers, the qualification and the salaries, if mentioned.
Project Budget (USD)
$30 – $250
Project Description:
Need a Software Developer to develop a GAME software for a online game.
Skills required:
Engineering, Software Architecture
Project posted by:
Online advertising
Project Budget (NZD)
$250 – $750
Project Description:
I am wanting to develop some banner ads (in various sizers) that I can then utilise for google adwords “re-marketing”
The requirements for the banners etc…
Skills required:
Banner Design, Graphic Design
 4. Find at least one ad for it position that specially mentions e-commerce.
Cs Cart customizations Cart customization
Project Budget (EUR)
€12 – €18 / hr
Project Description:
We want to build our webshop on cs cart, the skin needs to be customized and some add ons should be implanted.
Hours of work: 10 hours / week                
Project Duration: < 1 week Skills required:
ecommerce, HTML, Shopping Carts, Website Design

 


 

 

Case Study: New Century Health Clinic:


1. An organization chart of the office.
Description: E:\Education\9th Semester\System Analysis & Design\new_century.jpg
Identify at least three business processes that New Century performs, and explain who is responsible for the specific tasks.
          A business processes is a collection of related, structured activities or tasks that produce a specific service or product
          Basically, New Century performs its business processes mainly with the management of Anita Davenport. She manages Fried Brown who handles office payroll, tax reporting, and profit distribution among the associates. She makes sure that Susan Gifford, performs her job of maintaining the patient records for future references, as well as, Tom Capaletti, handling most of the paperwork  concerning to insurance reporting and accounting for New Century. Also, she has to make sure that the reminder calls to patients and daily appointment list are prepared by Lisa Sung. Finally, as a manager, she has to keep track of supply chain and motivate Carla Herrera performs this job efficiently for her four doctors, three registered nurses and four physical therapist so that, they won’t have any problem in performing their practices.
          Hence, New Century Health Clinic has five business processes if we look at it from its management’s perspective.

Explain how New Century might use a transaction processing system, a business support system, and user productivity system. For each type of system, provide a specific example, and explain how the system would benefit the clinic.
          Since, we need to develop a system for New Century for its operation and future growth we have option of choosing one of the following information systems:-
a.      Transaction Processing System
Transaction processing systems process data generated by day-to-day business operation. It is a good system which protects the integrity of data in our organization and therefore if single element of a transaction fails, the system doesn’t process the rest of the transaction. (System Analysis and Design [Eighth Edition], Page 12).
          A simple example of such kind of system would be company who sells products and services online. E-bay, where a buyer bids for the item they want to purchase must bid higher than other buyers who are also bidding for the same item. Also, the system would not confirm its sale unless the buyer confirms the payment by check, credit card or PayPal.
          One of the many ways transaction processing system would help New Century Health Clinic would be to set up an appointment or take the patients for the checkups after confirming that the doctors are free and the clinic supplies are enough to perform the checkups of the individual patients.
b. Business Support System
Business Support System provides job-related information support to users at all levels of a company. They help replace manual tasks as payroll processing (System Analysis and Design [Eighth Edition], Page 13). We need to collect all the information from every process and enter them in to our system to get valuable information about our business which helps make decisions for our company’s growth.
          We can have all the available information of 3,500 patients and their history of transactions with our business to analyze and make important decisions and increase the sales in future. Susan Gifford could perform her job more efficiently with recording patient’s information in the system which could be used efficiently by the manager for efficient decision making in future. Lisa Sung would be equally benefited by this system to make appointments lists daily and to make reminder calls to the patients. Hence, the system would benefit New Century Health Clinic in being efficient in the daily tasks that they have to perform and also would help better decision making for future growth of the business.
          One of the best examples of business support system is RFID (Radio Frequency Identification) chips that Wal-Mart and other large businesses are using to keep tract of the inventories in and out and set up a decision making system for the profit/loss, sales growth, most frequently used inventory by customers and other decisions that a system would make it for us and we can make decision based on the system’s results.
c.       User Productivity System
User Productivity Systems include all the levels of technology that improves productivity which include e-mail, voicemail, video conferencing, database management, desktop publishing, high speed internet, and company intranets (System Analysis and Design [Eighth Edition], Page 14).
          If the clinic would expand its business in future and would have different branches, company intranet would be nearly mandatory for effective data processing and would be very helpful. The processes and system could be shared by all other branches which would decrease the cost of investment for the clinic to expand. Also, the patient information could be retrieved from any other locations of the clinic. They could have a facility of having their checkups in any of the branches of the clinic. The database and video conferencing would help managers and the doctors make decisions on the processes and operation of the clinic respectively. All the user productivity systems are very important. These days, these productivity systems are becoming mandatory for any forms of business as everything we process and perform is going digital.
          Most of the organizations that have branches at different locations, uses company intranet to use the corporate data to perform their jobs are the best examples of User Productivity System. One of the specific examples would be UN (United Nations) that uses the internet to access corporate data from every branch in the world to perform its operations.

During the systems development processes, should New Century consider any of the following: B2B, vertical and horizontal system packages, or Internet-based solutions? Explain your answers.
System development processes includes the following steps:-
a. System Planning
b. System Analysis
c. System Design
d. System Implementation
e. System Support and Security
New Century should consider mostly the Internet-based solutions among B2B and vertical and horizontal system packages. The reason behind selecting internet-based solutions in the system development processes is that most of, the users, who are one of the important key components of information systems are accessible to internet and they demand the services as appointment setting and paying bills online. They would want to have their medical history online and it is convenient for them to remember when their next visit is due if they get alert in emails or from the website of the company. They can check out the updates of the company and available time frame they can visit the clinic. Also, many prospective patients would be exposed to the company promotions online and the company could substantially increase the growth in the market by taking many new patients. Therefore, if I were an IT consultant for New Century Health Clinic then I would most definitely consider internet-based solutions in the system development processes.

Chapter-2
8-What is a business case? How does a business case affect an IT project?
Business case refers to the reasons, or justification, for a proposal. A business case should be comprehensive, yet easy to understand. It should describe the project clearly, provide the justification to proceed, and estimate the project's financial impact. A business case should answer questions such as the following:
Why are we doing this project?
What is the project about?
How does this solution address key business issues?
9-What is a SWOT analysis? And why is it important?
Strategic planning starts with a management review called a SWOT analysis. The letters stand for strengths, weaknesses, opportunities, and threats. A SWOT analysis usually starts with a broad overview. The first step is for top management to respond to questions like these:
What are our strengths, and how can we use them to achieve our business goals?
What are our weaknesses, and how can we reduce or eliminate them?
What are our opportunities, and how do we plan to take advantage of them?
What are our threats, and how can we assess, manage, and respond to the possible risks?
A SWOT analysis is a solid foundation for the strategic planning process, because it examines a firm's technical, human, and financial resources. As the SWOT process continues, management reviews specific resources and business operations.


10: What are some internal and external factors that affect systems projects?
Internal Factors:
Strategic plans
Top managers
User requests
Information Technology department
Existing Systems and data
External Factors:
Technology
Suppliers
Customers
Competitors
The economy
The Government
11: What is feasibility? List and briefly discuss four feasibility tests.
A systems request must pass several tests, called a feasibility study, to see whether it is worthwhile to proceed further. A feasibility study uses four main yardsticks to measure a proposal:
Operational Feasibility: Operational feasibility means that a proposed system will be used effectively after it has been developed. If users have difficulty with a new system, it will not produce the expected benefits. Operational feasibility depends on several vital issues. For example, consider the following questions:
Does management support the project? Do users support the project? Is the current system well liked and effectively used? Do users see the need for change?
Will the new system result in a workforce reduction? If so, what will happen to affected employees?
Will the new system require training for users? If so, is the company prepared to provide the necessary resources for training current employees?
Will users be involved in planning the new system right from the start?
Will the new system place any new demands on users or require any operating changes? For example, will any information be less accessible or produced less frequently? Will performance decline in any way? If so, will an overall gain to the organization outweigh individual losses?
Will customers experience adverse effects in any way, either temporarily or permanently?
Will any risk to the company's image or goodwill result?
Does the development schedule conflict with other company priorities?
Do legal or ethical issues need to be considered?
Technical feasibility: Technical feasibility refers to the technical resources needed to develop, purchase, install, or operate the system. When assessing technical feasibility, an analyst must consider the following points:
Does the company have the necessary hardware, software, and network resources? If not, can those resources be acquired without difficulty?
Does the company have the needed technical expertise? If not, can it be acquired?
Does the proposed platform have sufficient capacity for future needs? If not, can it be expanded?
Will a prototype be required?
Will the hardware and software environment be reliable? Will it integrate with other company information systems, both now and in the future? Will it interface properly with external systems operated by customers and suppliers?
Will the combination of hardware and software supply adequate performance? Do clear expectations and performance specifications exist?
Will the system be able to handle future transaction volume and company growth?
Economic Feasibility: Economic feasibility means that the projected benefits of the proposed system outweigh the estimated costs usually considered the total cost of ownership (TCO) , which includes ongoing support and maintenance costs, as well as acquisition costs. To determine TCO, the analyst must estimate costs in each of the following areas:
People, including IT staff and users
Hardware and equipment
Software, including in-house development as well as purchases from vendors
Formal and informal training
Licenses and fees
Consulting expenses
Facility costs
The estimated cost of not developing the system or postponing the project
Schedule Feasibility: Schedule feasibility means that a project can be implemented in an acceptable time frame. When assessing schedule feasibility, a systems analyst must consider the interaction between time and costs. For example, speeding up a project schedule might make a project feasible, but much more expensive.
Other issues that relate to schedule feasibility include the following:
Can the company or the IT team control the factors that affect schedule feasibility?
Has management established a firm timetable for the project?
What conditions must be satisfied during the development of the system?
Will an accelerated schedule pose any risks? If so, are the risks acceptable?
Will project management techniques be available to coordinate and control the project?
Will a project manager be appointed?

12: What are the steps in a preliminary investigation?
The six steps of a preliminary investigation are:
STEP 1 - Understand the problem or opportunity.
STEP 2 - Define the project scope and constraints
STEP 3 - Perform fact-finding
STEP 4 - Analyse project usability, cost, benefit and schedule data
STEP 5 - Evaluate feasibility
STEP 6 - Present results and recommendations to management.

13: What is project scope? What is constraint? In what three ways are constraints classified?
Project scope: Refers to defining the specific boundaries, or extent, of the project.
Constraint: A constraint(s) is a requirement or condition that the system must satisfy or an outcome that the system must achieve. Constraints are classified as:
Present VS Future: Is the constraint something that must be met as soon as the system is developed or modified, or is the constraint necessary at some future time?
Internal VS External: Is the constraint due to a requirement within the organization or does some external force, such as government regulation, impose it?
Mandatory VS Desirable: Is the constraint mandatory? Is it absolutely essential to meet the constraint, or is it merely desirable?




14-
Description: E:\Education\9th Semester\System Analysis & Design\Screenshot_6.png

Apply Your knowledge: 1

Description: E:\Education\9th Semester\System Analysis & Design\Screenshot_1.png

Description: E:\Education\9th Semester\System Analysis & Design\Screenshot_2.png
Description: E:\Education\9th Semester\System Analysis & Design\Screenshot_3.png
Description: E:\Education\9th Semester\System Analysis & Design\Screenshot_5.png
Description: E:\Education\9th Semester\System Analysis & Design\Screenshot_4.png

15. The vice president of accounting says to you, the IT director, “This systems development life cycle stuff takes too long.” She tells you that her people know what they are doing and that all systems requests coming from her department are necessary and important to the organization. She suggests that the IT department bypass the initial steps for any accounting department request and immediately get to work at the solution. What would you say to her?
The Systems Development Life Cycle (SDLC) is a conceptual model that describes the stages involved in a system development project starting from Identifying problems, opportunities and objectives through maintenance of the application. There are several models developed to guide the process involved. Documentation is crucial regardless of the type of model chosen for any application and is usually done in parallel with the development process. Success of a project depends on how closely the plan was followed and implemented throughout the project development. During the initial phases, systems analyst is concerned with correctly identifying the problems, opportunities and objectives. The success of the rest of the project depends on this because if the problem is not identified correctly at the initial stages or skip this stage then the rest of the team would be addressing the wrong problem. The cost of fixing a defect in the early stages of the project is very less when compared to fixing a defect at later stages of the project development because it would cost a lot to fix the defect when project is in production

stage. Below is a simple graph of cost and time graph that can explain the cost of change as we progress in the project.

 

Case study: New Century Health Clinic (Chapter 2)

Dr. Jones has arranged an introductory meeting between the associates of New Century Health Clinic and you to determine if mutual interests exists in pursuing the project. What should the associates try to learn about you? What should you try to learn about in this meeting?

Since, the computerized system would reduce the paperwork as well as the load of work done by all the associates of New Century Health Clinic; there exists a strong business case in pursuing the project. The associates are the one who would be actually using the system that I would be developing, hence, they should look in to the system that I propose and the way I communicate with people. They should make sure that I can communicate with them very well and they understand what I say. They should be able to provide me with every tiny detail of the processes in the business so that I could make an efficient system for them which would make their work easier.
          In this meeting, I would try to learn all about the business. The mission, objectives and vision of the businesses are very important for me to feel them so that I could design the system that would match those needs. I should talk to each associate and their tasks in details so that I can convert them in to computerized system. Since, none of the member of the staff has computer experience; I should avoid using jargons while I talk to them or while I teach them to use the applications. I should also consider the budget provided by the company and the rough feasibility study. I should figure out if the system could be built within the budget separated by the company. I have to think about the risks involved in re-engineering the system. I should also consider the future growth of the company and my system being capable of supporting the possible changes in the business processes.
Basically, we need to have a very good, two way communication and the support of management in every aspect.
1.     Does the proposed system present a strong business case? Why or why not?
In my opinion, the proposed system presents a very strong business case and they should re-engineer their system completely in to a digital system which would increase their profit, market share, decision making capabilities, faster services and efficiency.
          Since, the clinic is busier than ever and more profitable than ever the current manual system would be inefficient to handle the growing business. If the clinic would use the digital system to perform its business processes then the efficiency would increase and more application softwares could come handy for the manager and decision makers to see the graphical representation of current business and make decisions based on the digital information. They could use marketing tools to promote the business and so many things which would be next to impossible if they would continue with the same manual system.
3.      For each type of feasibility, prepare at least two questions that will help you reach a feasibility determination.
Operational Feasibility:
1. Will the new digital system would ease the current and future work overload, due to company’s increasing market share?
 2. Will the new digital system be user friendly as none of the member of the staff has computer experience?
Technical Feasibility
1. Will the company have the necessary hardware, software, and network resources which supports the system that I’m going to built for the business? If not, can those resources be acquired within the budget the company is setting to separate for the re-engineering?
          2. Will the system be able to handle future transaction volume and company growth?
Economic Feasibility:
1. Does the projected benefits of the proposed system outweigh the estimated costs usually considered the total cost of ownership (TCO)?
          2. Does the budget provided by the company to build the new system to make profit in long run be supported by the tangible and intangible benefits the system would provide to the company?
Schedule Feasibility:
1. Can the project be completed within the timeframe the company wants us to finish? If not, are they willing to increase the budget to finish it on that particular time frame?
          2. Will the project management techniques be available to coordinate and control the project?
You begin the preliminary investigation. What information is needed? From whom will you obtain it? What techniques will you use in your fact-finding?
I would need the information as current business process, problems, opportunities, project scope and constraints, project benefits, and estimated development time and costs. I would obtain this information from the manager of the clinic and the staff working for her.
          To gather data about project usability, costs, benefits, and schedules different techniques are used. I would prefer to analyze the organizational chart and conduct a user survey to perform fact-finding for the clinic. I would get the understanding of the business processes of the clinic and I could decide whom do I inquire to collect the data that I need for the development the new system for the clinic.

Chapter 3

18-What is project management, and what are its main objectives?
Project management is the process of defining, planning, organizing, leading, and controlling the development of an information system. Project management is important throughout the entire SDLC but is especially vital during systems implementation, which usually is the longest and most costly phase. The overall goal of project management is to deliver an information system that is acceptable to users and is developed on time and within budget. The project cannot be considered successful unless it meets all criteria for acceptability, deadlines, and budgets.

19-What is the relationship between tasks and events, or milestones?
 A task is any work that has a beginning and an end and requires the use of company resources such as people, time, or money. An event, or milestone, is a recognizable reference point in a project that you can use to monitor progress. We can schedule events either between tasks or during tasks to help us monitor the progress of the overall project.

20. What are task patterns, and how can you recognize them?
Ans:
See page 110-112

21 Define the following terms: best-case estimate, probable-case estimate, and worst-case estimate, and describe how a project manager can use these concepts to estimate task duration.
PERT/CPM techniques use a weighted formula for estimating the duration of each activity. The project manager first makes three time estimates for each activity: an optimistic, or best-case, estimate (B); a probable-case estimate (P); and a pessimistic, or worst-case, estimate (W). The manager then assigns an importance value to each estimate and calculates a weighted average.
The weight can vary, but a common approach is to use a ratio of B=1, P=4, and W=1. The expected activity duration then is calculated as:
B + 4P + W
--------------
6


22-What is a critical path, and why it important to project managers?
A critical path is a series of tasks which, if delayed, would affect the final completion date of the overall project. In other words, tasks on the critical path have no slack time. Slack time is the amount of time that the task could be late without pushing back the completion date of the entire project.
23. What is risk management, and why is it important?
Risk management is a process for identifying, assessing, and prioritizing risks of different kinds. Once the risks are identified, the risk manager will create a plan to minimize or eliminate the impact of negative events. A variety of strategies is available, depending on the type of risk and the type of business. There are a number of risk management standards, including those developed by the Project Management Institute, the International Organization for Standardization (ISO), the National Institute of Science and Technology, and actuarial societies.
Effective risk management strategies allow you to identify your project’s strengths, weaknesses, opportunities and threats. By planning for unexpected events, you can be ready to respond if they arise. To ensure your project’s success, define how you will handle potential risks so you can identify, mitigate or avoid problems when you need to do. Successful project managers recognize that risk management is important, because achieving a project’s goals depends on planning, preparation, results and evaluation that contribute to achieving strategic goals.

24-In Poor Richard’s Almanac, Benjamin Franklin penned the familiar lines: “For the want of a nail the shoe was lost, for the want of a shoe the horse was lost, for the want of a horse the rider was lost, for the want of a rider the battle was lost, for the want of a battle the kingdom was lost — and all for the want of a horseshoe nail.” Looking at the outcome in hindsight, could project management concepts have avoided the loss of the kingdom?
As we consider this quote written by Benjamin Franklin we look at the nail and how although it may not seem innocuous and small but it had catastrophic impact in the end. Using project management tools such as the Work Breakdown structure and project monitoring leaders could have identified the problem early on an remedied the missing nail in horse shoe thus preventing the events that lead to the loss of the kingdom.
25. Microsoft Project is powerful, but quite expensive. As a manager, how would you justify the purchase of this software?

As a manager I would look at cost associated with waste of time, budget due to failed projects or defects in a process, waste of materials and how using a project management application would cut waste and provide a cost savings that would allow additional funding of needed projects