Concept explainers
Explanation of Solution
Alternative methods of building
An information system is a system which provides the necessary information to an organization to achieve the goals. The following alternative methods are using to building an information system...
Explanation of Solution
Traditional systems life cycle:
It is a formal methodology for managing the development of systems in development life cycle. It has the six step process to develop the system. They are:
- Analyzing the
system - Design the system
Programming - Test the system
- Implementation of system
- Maintenance of system.
Advantages for systems building:
The advantages of traditional system life cycle for system building is as follows:
- It is simple to implement and easy to understand...
Explanation of Solution
Information system prototyping:
It is an alternative model for building information system. It has a prototype which represents the requirements of the user.
Benefits of information system prototyping:
- The benefit of information system prototyping is exactly matches to the customer requirements and these model is mainly used to enhance the bigger projects.
- It is useful for routine problems and this information system is very structured and well-understood.
- It reduces the implementation cost of the project.
Limitations of information system prototyping:
- It is not appropriate for massive amounts of data...
Explanation of Solution
End-user development:
End-user development of information system is refers the programmers and system analysts. It gives the direct control to the project. By using the end-user development model, the project is rapidly developed with standard programming tools.
Advantages of end-user development:
- It takes minimal time to finish the software and the customer requirements in project.
- The tools are used by professional programmers in productivity levels...
Explanation of Solution
Application software packages and cloud software services (SaaS):
- The software packages is common tool for all business organizations for its daily process like payroll, inventory control, etc. Many organizations use cloud services for its higher security.
- SaaS is one of the cloud software services in cloud computing. In SaaS, the software is deployed from a cloud provider; internet is used to deliver the service and the subscribers access the service through the browser.
Advantages:
- Using application software packages, the organization got a solution in quick and easy way...
Explanation of Solution
Outsourcing:
Outsourcing means taking a company for contract to complete the specific task of some other company project using the in-house employees.
Advantages of outsourcing:
- Company takes specialized skills.
- Provides labor flexibility.
- Cost effective.
Drawbacks of outsourcing:
- Increases the confidence on third parties.
- Lacking the knowledge of in-house for complex business operations.
Favorable circumstances for the outsourcing strategy are as given below:
Lack in experience:
- Whenever there are less experienced professionals in any organization, then for a new system design, the organization always prefer the outsourcing strategy.
- Hence, the product is designed by the other firm.
Inadequate resources:
- If an organization does not have adequate resources, then outsourcing of the project must be done.
- Organization can hire different vendors, developers, or suppliers to meet their needs...
Explanation of Solution
Explanation of developing e-business applications:
- Developing e-business application is a needed one for every business for its development. RAD is the technology of process for developing systems in short period of time...
Explanation of Solution
Development of the mobile application:
- Smart phone tend to become more important part in every person’s day to day life routine.
- Every process required to be made in a smart manner and it is considered to be more important in case of the business process.
- Every customer requires process that is made should be effective a...
Want to see the full answer?
Check out a sample textbook solutionChapter 12 Solutions
Essentials of MIS (13th Edition)
- solve and show the tree on paperarrow_forwardI need help to resolve the following activityarrow_forwardModern life has been impacted immensely by computers. Computers have penetrated every aspect of oursociety, either for better or for worse. From supermarket scanners calculating our shopping transactionswhile keeping store inventory; robots that handle highly specialized tasks or even simple human tasks,computers do much more than just computing. But where did all this technology come from and whereis it heading? Does the future look promising or should we worry about computers taking over theworld? Or are they just a necessary evil? Provide three references with your answer.arrow_forward
- What are the steps you will follow in order to check the database and fix any problems with it? Have in mind that you SHOULD normalize it as well. Describe in full, consider the following:• Taking the database offline is not allowed since people are connected to it.• Personal data might be bridged and not secured. Provide three refernces with you answerarrow_forwardYou are called by your supervisor to go and check a potential data bridge problem. What are the stepsyou will follow in order to check the database and fix any problems with it? Have in mind that youSHOULD normalize it as well. Describe in full, consider the following:• Taking the database offline is not allowed since people are connected to it.• Personal data might be bridged and not secured. Provide three refernces with you answerarrow_forward(A) A cellular system has 12 microcells with 10 channels per cell. The microcells are split into 3 microcells, and each microcell is further split into 4 picocells. Determine the number of channels available in system after splitting into picocelles.arrow_forward
- Question 8 (10 points) Produce a relational schema diagram that corresponds to the following ER diagram for a Vacation Property Rentals database. Your relational schema diagram should include primary & foreign keys. Upload your relational schema diagram as a PDF document. Don't forget that the relation schemas for "Beach Property" and "Mountain Property" should each have primary keys. FYI: "d" in this notation denotes a subclass. Figure 2: ER Diagram for Question 8 id first RENTER name middle last address phone email 1 signs N id begin date RENTAL AGREEMENT end date amount N street address books city id 1 state address num. rooms PROPERTY zip code base rate type propertyType blocks to beach activity "B" "M" BEACH PROPERTY MOUNTAIN PROPERTYarrow_forwardNotes: 1) Answer All Question, 2) 25 points for each question QI Figurel shows the creation of the Frequency Reuse Pattern Using the Cluster Size K: (A) illustrates how i and j can be used to locate a co-channel cell. huster 3 Cluster Cluster 2 X=7(i=2,j1)arrow_forwardYou are called by your supervisor to go and check a potential data bridge problem. What are the stepsyou will follow in order to check the database and fix any problems with it? Have in mind that youSHOULD normalize it as well. Describe in full, consider the following taking the database offline is not allowed since people are connected to it and how personal data might be bridged and not secured.Provide three references with you answer.arrow_forward
- You are called by your supervisor to go and check a potential data bridge problem. What are the stepsyou will follow in order to check the database and fix any problems with it? Have in mind that youSHOULD normalize it as well. Describe in full, consider the following:• Taking the database offline is not allowed since people are connected to it.• Personal data might be bridged and not secured. Provide three refernces with you answerarrow_forwardYou are called by your supervisor to go and check a potential data bridge problem. What are the stepsyou will follow in order to check the database and fix any problems with it? Have in mind that youSHOULD normalize it as well. Describe in full, consider the following:• Taking the database offline is not allowed since people are connected to it.• Personal data might be bridged and not secured. Provide three refernces with you answer from websitesarrow_forwardModern life has been impacted immensely by computers. Computers have penetrated every aspect of oursociety, either for better or for worse. From supermarket scanners calculating our shopping transactionswhile keeping store inventory; robots that handle highly specialized tasks or even simple human tasks,computers do much more than just computing. But where did all this technology come from and whereis it heading? Does the future look promising or should we worry about computers taking over theworld? Or are they just a necessary evil? Provide three references with your answer.arrow_forward
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781305082168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningInformation Technology Project ManagementComputer ScienceISBN:9781337101356Author:Kathy SchwalbePublisher:Cengage Learning