Final Project

pptx

School

Florida SouthWestern State College, Collier *

*We aren’t endorsed by this school

Course

CIS2321

Subject

Computer Science

Date

Feb 20, 2024

Type

pptx

Pages

8

Uploaded by ChefGoosePerson605

Report
Final Project CIS2321 Summer 2022
Scenario: You are an IT consulting firm that specializes in system design and analysis. The company's president has asked you to put together a presentation to include notes for a group of potential clients. The following information is being requested in this presentation: Describe methods of communication tools that an analyst can use to write clearly, speak effectively, and deliver powerful presentations. This presentation must have good written and oral communication skills to be able to relay to an analyst how to perform his or her job effectively. Describe which computer-aided software engineering (CASE) tools will be used to design, construct, and document an information system. Explain the history, characteristics, and features of CASE tools. Provide examples of the CASE tool and how the analyst will use it in support of various development tasks. In addition, you will explain the integrated software development environments and application life-cycle management you will use for the project. Describe the financial analysis tool that will be used to measure project feasibility, develop accurate cost-benefit estimates, and make sound decisions. Explain to the systems analyst how to calculate costs and benefits when conducting preliminary investigations, evaluating IT projects, and making recommendations to management. Describe the six security levels, and explain to the analysis the overall picture of recommendations how it could impact the strategic and budget decisions. Describe Internet resource tools that can be used to locate information, obtain reference material, and monitor IT trends and developments.
Describe methods of communication tools that an analyst can use to write clearly, speak effectively, and deliver powerful presentations. To communicate successfully, an analyst must not only know their subject well, but they must also know their audience and what questions they may ask about the subject. They must keep in mind who they are talking to, what points they want to get across, and why they are attempting to communicate these ideas in the first place. The analyst should know beforehand what exactly is expected from them, as this will determine the design of their presentation. An effective presentation uses a balanced style that is concise, easy to understand, and captivating without containing too much information at once. Slideshow presentations should be visually pleasing, while avoiding overly distracting decorative elements.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Describe which computer-aided software engineering (CASE) tools will be used to design, construct, and document an information system. Explain the history, characteristics, and features of CASE tools. Provide examples of the CASE tool and how the analyst will use it in support of various development tasks. In addition, you will explain the integrated software development environments and application life-cycle management you will use for the project. A CASE (Computer Aided Software Engineering) tool is a software application that can aid in the design and development of information systems. CASE tools have been used since the 1960s to develop applications and have since evolved into powerful and essential tools needed to create the information systems of today. An analyst selects which CASE tools to use based on specifications of the project, such as the type of project, scope, budget, and time constraints. Many helpful CASE tools with various functions exist, such as those that can generate code and those that can write up a report based on data. Some software comes paired with an integrated development environment (IDE) that assists with design and development within that specific software. Application life-cycle management (ALM) tools may also be included, which assist with all the steps of creating an information system, from the beginning to the end of the process.
Describe the financial analysis tool that will be used to measure project feasibility, develop accurate cost-benefit estimates, and make sound decisions. Explain to the systems analyst how to calculate costs and benefits when conducting preliminary investigations, evaluating IT projects, and making recommendations to management. When deciding whether a project is feasible, it is essential to analyze the project’s potential benefits versus its projected costs. Many techniques and tools exist to help figure this out, such as the return-on- investment analysis method, or Total Cost of Ownership (TCO) calculators. The costs of a project fall under several different categories: tangible/intangible, direct/indirect, fixed/variable, and developmental/operational. It is necessary to calculate each of these in order to produce an accurate projected cost for the project. Payback analysis can be used to determine the projected benefits of completing a project. Comparing costs to payback during your preliminary investigation will allow you to decide whether the project is financially worth carrying out. Tools like Microsoft Excel can be used to calculate payback. A project’s ROI (return on investment) is calculated by comparing the return to the investment, not including the value of the time spent on the project. It would be wise to define a minimum ROI that must be met or exceeded by all projects.
Describe the six security levels, and explain to the analysis the overall picture of recommendations how it could impact the strategic and budget decisions. There are six security levels to consider when making decisions: physical security, network security, application security, user security, file security, and procedural security. While making plans and determining strategies for developing information systems, these six security factors must be addressed in order to minimize threats and the risk of having data compromised by hackers. Ensure maximum safety and security by taking measures such as encrypting data, keeping software up-to-date, utilizing password security, establishing security policies, and transmitting data only through secured/protected networks.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Describe Internet resource tools that can be used to locate information, obtain reference material, and monitor IT trends and developments. Internet search engines, such as Google, can be used to research topics relevant to your project. This is also useful for finding evidence and references to support the information you use. Social media, forums, and other online sources allow IT professionals to stay up-to- date with new and trending topics within the field, as well as communicate with others in the IT community.
SOURCE OF INFORMATION USED: Cengage; Systems Analysis and Design - Toolkits Part A, B, C, and D