
What are the core problem-solving steps for developing new information systems?
- List and describe the problem-solving steps for building a new system.
- Define information requirements and explain why they are important for developing a system solution.
- List the various types of design specifications required for a new
information system . - Explain why the testing stage of systems development is so important. Name and describe the three stages of testing for an information system.
- Describe the roles of documentation, conversion, production, and maintenance in systems development.

Explanation of Solution
Problem-solving:
It is a technique to find a solution of a particular problem. These solving strategy may include mathematical and systematic operations in the process.
Problem solving steps for building a new system:
Problem solving is the method to find the solution to the problem. It has some steps to follow for building a new system is as follows:
- Step 1: Define and understand the problem
- Step 2: Develop the alternative solution
- Step 3: Select the appropriate approach
- Step 4: Implement the solution
- Step 5: Monitor the implementation
- Step 6: Verify the problem
Step 1: Define and understand the problem:
Defining the problem is essential to solve this. The definition includes as identifying its causes, solution objectives, and information requirements. It also includes the reviewing the document that how process currently work and evaluate the possible impact of new tools in the problem.
Step 2: Develop the alternative solution:
Developing the alternative solution gives the path to follow the nature of the problem. Using this step the user can compare the characteristics of final solution with desired result.
Step 3: Select the appropriate approach:
Choosing the best solution for the problem is based on the technical, financial, and organizational feasibility of each alternative solution.
Step 4: Implement the solution:
Implementing the selected solution by involving the efforts of other attributes. The implementation should involve the design specification, hardware and software tools, testing, and documentation.
Step 5: Monitor the implementation:
This step is considered about maintenance of the problem. The maintenance involves software and hardware updating operation, and other techniques.
Step 6: Verify the problem:
It is the final step of problem solving. In this step the solution should be verified using certain process and procedures.

Explanation of Solution
Information requirements:
- Information requirement is the business activity which describe about information type and information procedure. It defines the objective of new or modified system and has detailed description of functions the new system performed.
- The information requirement is important to developing the system solution because gathering the information requirements is difficult task of the system analyst and developing the functional requirement can meet the need of the end user.
Therefore the information requirement is important for developing a system solution.

Explanation of Solution
Various types of design specifications needed for a new information system:
The new information system requires some design specification. These specification should consider about technical, organizational and people needs. The basic specification for the information system is as follows:
- Input
- Output
- User interface
- Database management
- Security and controls
- Training and documentation
- Other organizational changes
Each specification performs particular functionality for the system.

Explanation of Solution
Importance of testing stage of systems development:
Testing stage is one of the phase in system development. It act as a success criteria of the system. Using this stage, the user test the system produce right results for appropriate input. If error occurred on the system, the project will be reorganized.
Three stages of testing an information system:
Three stages are available when testing an information system. These stages are:
- Unit testing
- System testing
- Acceptance testing
Unit testing:
- Unit test is one of the stages defined for the tests. It is used to test the single module for some sort of specific test.
- It is performed once the programmer develops the program, tests the code, and believes that there is no error in that code.
- It is conducted by the analyst or programmer for that tested code.
System testing:
- System testing is done by the analysts to ensure that the set of the programs and module work together without error.
- System testing scope is much broader than that of the integration and unit testing.
Acceptance testing:
- Acceptance testing is purely in the acceptance of the users.
- Acceptance testing scope is not that much broader than system testing.
- It checks that the system meets all requirements for which it was specified by the user.

Explanation of Solution
Role of documentation:
Documentation is the important step in project development; this is because the documentation of the project provides the overall details about the project.
- The documentation process lies at the fifth phase of the Program Development Life Cycle (PDLC).
Role of conversion:
Conversion process is to change the old system into new one. It is performed in projects in four ways. They are: parallel conversion, pilot conversion, phased conversion, and direct conversion.
Role of production:
It is the process of producing the system with a particular form. The produced system will be reviewed by the users or technical specialists.
Role of maintenance:
After installation of the program, maintenance plays an important role to run the program successfully. In this phase, the existing problems in the code are rectified. After implementation of the program, necessary changes are made to upgrade the program in the maintenance phase.
Want to see more full solutions like this?
Chapter 12 Solutions
Essentials of MIS (12th Edition)
- using r language in an accelerated failure test, components are operated under extreme conditions so that a substantial number will fail in a rather short time. in such a test involving two types of microships 600 chips manufactured by an existing process were tested and 125 of them failed then 800 chips manufactured by a new process were tested and 130 of them failed what is the 90%confidence interval for the difference between the proportions of failure for chips manufactured by two processes? using r languagearrow_forwardI want a picture of the tools and the pictures used Cisco Packet Tracer Smart Home Automation:o Connect a temperature sensor and a fan to a home gateway.o Configure the home gateway so that the fan is activated when the temperature exceedsa set threshold (e.g., 30°C).2. WiFi Network Configuration:o Set up a wireless LAN with a unique SSID.o Enable WPA2 encryption to secure the WiFi network.o Implement MAC address filtering to allow only specific clients to connect.3. WLC Configuration:o Deploy at least two wireless access points connected to a Wireless LAN Controller(WLC).o Configure the WLC to manage the APs, broadcast the configured SSID, and applyconsistent security settings across all APs.arrow_forwardA. What will be printed executing the code above?B. What is the simplest way to set a variable of the class Full_Date to January 26 2020?C. Are there any empty constructors in this class Full_Date?a. If there is(are) in which code line(s)?b. If there is not, how would an empty constructor be? (create the code lines for it)D. Can the command std::cout << d1.m << std::endl; be included after line 28 withoutcausing an error?a. If it can, what will be printed?b. If it cannot, how could this command be fixed?arrow_forward
- Cisco Packet Tracer Smart Home Automation:o Connect a temperature sensor and a fan to a home gateway.o Configure the home gateway so that the fan is activated when the temperature exceedsa set threshold (e.g., 30°C).2. WiFi Network Configuration:o Set up a wireless LAN with a unique SSID.o Enable WPA2 encryption to secure the WiFi network.o Implement MAC address filtering to allow only specific clients to connect.3. WLC Configuration:o Deploy at least two wireless access points connected to a Wireless LAN Controller(WLC).o Configure the WLC to manage the APs, broadcast the configured SSID, and applyconsistent security settings across all APs.arrow_forwardTransform the TM below that accepts words over the alphabet Σ= {a, b} with an even number of a's and b's in order that the output tape head is positioned over the first letter of the input, if the word is accepted, and all letters a should be replaced by the letter x. For example, for the input aabbaa the tape and head at the end should be: [x]xbbxx z/z,R b/b,R F ① a/a,R b/b,R a/a, R a/a,R b/b.R K a/a,R L b/b,Rarrow_forwardGiven the C++ code below, create a TM that performs the same operation, i.e., given an input over the alphabet Σ= {a, b} it prints the number of letters b in binary. 1 #include 2 #include 3 4- int main() { std::cout > str; for (char c : str) { if (c == 'b') count++; 5 std::string str; 6 int count = 0; 7 char buffer [1000]; 8 9 10 11- 12 13 14 } 15 16- 17 18 19 } 20 21 22} std::string binary while (count > 0) { binary = std::to_string(count % 2) + binary; count /= 2; std::cout << binary << std::endl; return 0;arrow_forward
- Considering the CFG described below, answer the following questions. Σ = {a, b} • NT = {S} Productions: P1 S⇒aSa P2 P3 SbSb S⇒ a P4 S⇒ b A. List one sequence of productions that can accept the word abaaaba; B. Give three 5-letter words that can be accepted by this CFG; C. Create a Pushdown automaton capable of accepting the language accepted by this CFG.arrow_forwardGiven the FSA below, answer the following questions. b 1 3 a a b b с 2 A. Write a RegEx that is equivalent to this FSA as it is; B. Write a RegEx that is equivalent to this FSA removing the states and edges corresponding to the letter c. Note: To both items feel free to use any method you want, including analyzing which words are accepted by the FSA, to generate your RegEx.arrow_forward3) Finite State Automata Given the FSA below, answer the following questions. a b a b 0 1 2 b b 3 A. Give three 4-letter words that can be accepted by this FSA; B. Give three 4-letter words that cannot be accepted by this FSA; C. How could you describe the words accepted by this FSA? D. Is this FSA deterministic or non-deterministic?arrow_forward
- Considering the TM below, answer the following questions. a/x,R €/E,L €/E,R €/E,L x/E,R c/c,R b/E.L c/c,L x/x,R I J K L M F b/E.L D A. Give three 4-letter words that can be accepted by this TM; B. Give three 4-letter words that cannot be accepted by this TM; C. How could you describe the words accepted by this TM? D. What is the alphabet of the language accepted by this TM?arrow_forwardWhat is the generator? Explain motor generator motorarrow_forwardThis battle room is focused on entry level tasks for a network analyst where you will be given trials and reconnaissance, sensor tuning, log aggregation, SIEM queries, and network analysis. For this week’s project, complete the following tasks: From your Project Ares portal, LOG IN Click on LAUNCH GAME. Select the region NORTH AMERICA Click on Battle School Under the BATTLE SCHOOL pop-up window, click on START TRAINING. Under the BATTLE ROOMS tile, click on ENTER. Under the NETWORK ANALYST tile, click on PLAY. Wait for the Battle Room to load. While loading, the BATTLE ROOM button will display red. Once the Battle Room is loaded, the BATTLE ROOM button will turn yellow and the center of the disk display will indicate CONNECTED. Click on the BATTLE ROOM button to enter the Battle Room. Below the TASKS folder, make sure you click on INSTRUCTIONS to download the Network Analyst Fundamentals material. In the Battle Room, under the TASKS menu select task INTRUSION DETECTION. Complete…arrow_forward
- Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- Fundamentals of Information SystemsComputer ScienceISBN:9781305082168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningSystems Analysis and Design (Shelly Cashman Serie...Computer ScienceISBN:9781305494602Author:Scott Tilley, Harry J. RosenblattPublisher:Cengage LearningManagement Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,





