Principles of Information Systems, Loose-Leaf Version
13th Edition
ISBN: 9781305971820
Author: Ralph Stair, George Reynolds
Publisher: Course Technology
expand_more
expand_more
format_list_bulleted
Textbook Question
Chapter 12, Problem 3TA
You and your team have been hired to perform a system investigation for a fast food restaurant that wants to implement new tools and processes to improve its customer service. Currently, the restaurant has a poor reputation for not correctly filling customers’ orders and for taking too long to do it. Perform a functional decomposition to define the scope and basic requirements of such a system. Brainstorm some ideas to improve the situation, and choose one to pursue based on its technical, economic, legal, operational, and schedule feasibility.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
You have been hired to perform a system investigation for a fast food restaurant that wants to implement new tools and processes to improve its customer service. Currently, the restaurant has a poor reputation for not correctly filling customers' orders and for taking too long to do it.
Give a functional decomposition to define the scope and basic requirements of such a system.
Provide some ideas to improve the situation
Choose one to pursue based on its technical, economic, legal, operational, and schedule feasibility.
You're going to design a system that enables online driver's license renewals. It is necessary to provide thorough descriptions of the system's inputs, procedures, results, and feedback.
You are asked to do some requirement development. Suppose you are asked to develop a booking system for a public library system
Define a possible scope for the system using the following steps. First list a wide range of things that the system could do. Then narrow down the scope by selecting the most important features that you would implement in the first release of the system. Finally, give a precise problem statement for the system.
Identify stakeholders of the system. Then select one important stakeholder and design a list of questions for interviewing that stakeholder.
Give functional requirements and quality requirements of the system.
Create a list of use cases and describe two of them in detail using the method discussed in class (two-column method). Then draw use cases diagram to describe the system Using UML. Indicate extension, generalization and inclusion, if there are any.
Chapter 12 Solutions
Principles of Information Systems, Loose-Leaf Version
Ch. 12.2 - Outline the tasks that must be accomplished to...Ch. 12.2 - Following your discussion, one of the team members...Ch. 12.2 - There is likely to be some confusion over the role...Ch. 12.2 - Prob. 2CTQCh. 12.3 - Prob. 1RQCh. 12.3 - Prob. 2RQCh. 12.3 - Prob. 1CTQCh. 12.3 - What other potential problems can you anticipate...Ch. 12.4 - Prob. 1RQCh. 12.4 - Prob. 2RQ
Ch. 12.4 - Prob. 1CTQCh. 12.4 - A safety-critical system is one whose failure or...Ch. 12 - Prob. 1SATCh. 12 - _______________ software can provide a better...Ch. 12 - Prob. 3SATCh. 12 - Prob. 4SATCh. 12 - The purpose of the system investigation phase is...Ch. 12 - ______________ is a diagram used to document the...Ch. 12 - The overall emphasis of the __________ phase is on...Ch. 12 - The primary tool for assessing the software...Ch. 12 - Prob. 9SATCh. 12 - Prob. 10SATCh. 12 - Prob. 11SATCh. 12 - Prob. 12SATCh. 12 - A preliminary evaluation of software packages and...Ch. 12 - Prob. 1RQCh. 12 - Prob. 2RQCh. 12 - Prob. 3RQCh. 12 - Prob. 4RQCh. 12 - Prob. 5RQCh. 12 - What are the key elements of a system...Ch. 12 - Prob. 7RQCh. 12 - Prob. 8RQCh. 12 - Prob. 9RQCh. 12 - Prob. 10RQCh. 12 - Prob. 11RQCh. 12 - Prob. 12RQCh. 12 - Prob. 13RQCh. 12 - Prob. 14RQCh. 12 - An organization has selected and is now...Ch. 12 - Prob. 1DQCh. 12 - Thoroughly discuss the pros and cons of buying...Ch. 12 - Prob. 3DQCh. 12 - Prob. 4DQCh. 12 - Prob. 5DQCh. 12 - Prob. 6DQCh. 12 - Prob. 7DQCh. 12 - Define the Pareto principle, and discuss how it...Ch. 12 - Prob. 9DQCh. 12 - Prob. 10DQCh. 12 - Prob. 11DQCh. 12 - Prob. 12DQCh. 12 - Identify and briefly discuss four key tasks...Ch. 12 - A new sales ordering system needs a relational...Ch. 12 - Prob. 2TACh. 12 - You and your team have been hired to perform a...Ch. 12 - Prob. 1WECh. 12 - Prob. 2WECh. 12 - Do research to determine the current level of...Ch. 12 - Prob. 1CECh. 12 - Prob. 2CECh. 12 - Identify an information system frequently employed...Ch. 12 - It is perhaps not surprising that Etsy was an...Ch. 12 - Prob. 2CTQ1Ch. 12 - What would be some of the criteria you would use...Ch. 12 - Prob. 1CTQ2Ch. 12 - Prob. 2CTQ2Ch. 12 - Prob. 3CTQ2
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- This paper compares and contrasts three different techniques for establishing system requirements throughout the analytical process. Consider the following questions: When do you believe each of the methods you compared would be most helpful, and what are the disadvantages of each of the techniques you examined?arrow_forwardFor my capstone on crime heat map, I need to focus on three main areas: IS design and development, IT infrastructure, and programming languages. These three areas are crucial for building an effective and efficient crime heat map that can help law enforcement agencies and communities identify and respond to crime patterns in real time. By paying close attention to these areas, you can ensure that your project is well-designed, secure, and capable of handling large amounts of data. please help.arrow_forwardOver the course of the study, system requirements were determined using three different approaches: a classic method, a modern methodology, and a radical strategy. You've examined a variety of approaches throughout your investigation. What, in your view, are the benefits and downsides of each strategy?arrow_forward
- During the analytical process, one classic, one current, and one radical technique for determining system requirements will be compared. Consider the following questions: When do you believe each of the strategies you compared would be most effective, and what are the disadvantages of each of the techniques you considered?arrow_forwardA local college has an older student registration system that needs to be improved. The administration asked us to develop a new system that would be more user-friendly. We decided to develop a use case diagram as the first step in your analysis of the current system. Tasks 1. Identify possible use cases and actors for the College Registration System. 2. Create a diagram that contains the use cases and actors from task 1.arrow_forwardBecause NDCP is a membership cooperative, Dunkin Donuts franchisees are both owners and customers. What might be some advantages to such an ownership structure in terms of getting the support of all stakeholders for a massive project like the one NDCP undertook? What might be some disadvantages?arrow_forward
- The overall emphasis of the __________ phase is on gathering data on the existing system, determining the requirements of the new system, considering alternatives within identified constraints, and investigating the feasibility of alternative solutions. a. investigation b. analysis c. design d. constructionarrow_forwardYou are working as a software engineer at Golden Solutions (GS), a company that designs and builds software solutions for financial auditing companies. Your company received the requirements and you have started working on developing the required system that contains multiple features such as: creating financial reports, submitting financial reports for management review, editing financial reports, and printing reports. The company also requested that the employees can be able to search through financial records and sort these financial records. After considering the above scenario, your responsibility as a software engineer is to build certain features and discuss some topics with your teams that will help make implementation decisions. 6- As mentioned in the scenario, the management needs to review all financial reports being audited, the management should receive reviewing requests through the system, clarify how does a queue data structure will be suitable to handle these review…arrow_forwardsolve the questions: Tony and his team identified some risks during the first month of the Recreation and Wellness Intranet Project. However, all they did was document the risks in a list. They never ranked the risks or developed any response strategies. Because the project has had several problems, such as key team members leaving the company, users being uncooperative, and team members not providing good status information. Tony has decided to be more proactive in managing risks. He also wants to address positive risks as well as negative risks. the quation is : 1- Plot the six risks on a probability/impact matrix. 2- assign a numeric value for the probability and impact of each risk on meeting the main project objective.arrow_forward
- 3. Haziq has recently been hired by a mid-sized machine shop that supplies various machine parts on contract to a large manufacturer. Haziq has several years of systems development experience, including programming, analysis, and design. He has been hired with the express purpose of developing the Electronic Data Interchange (EDI) system that has been mandated by the firm's large business partner. Haziq has not been in the position of project manager before, and he is not sure what to do or where to begin. Based on this chapter's materials, what are three initial tasks that Haziq should undertake?arrow_forwardYou have been asked to design an application that can be used by the school of trades and technology to track vehicle safety inspections carried out by apprentice mechanics. The government has set a list of standards for tasks that must be included in every vehicle safety inspection. Your application must include these mandatory safety checks. The vehicle safety inspection application should capture details about the inspection, including the vehicle being inspected and the individual performing the inspection. The application should also include a report that provides recommendations to address problems identified during the vehicle inspection. a. Describe, in two or three paragraphs, the architecture pattern that you will use for this design. Explain why you chose this pattern. b. Describe the architecture of an application that would meet the requirements for vehicle safety inspections. Your description should be at least five to six paragraphs in length. c.…arrow_forwardVista Clinic intends to revamp its hospital management system and requires your expertise to manage the tasks. You were tasked with creating four use-case diagrams to show the roles and responsibilities of actors. The four subsystems that must be modelled are as follows:• Patient file system• Accounting system• Consultation system• User administration system Create four use-case diagrams for the above systems and use the following instructions for your scenario:1. Place the actors and use cases in a use case diagram using your modelling tool.2. Name the use case diagrams appropriately to represent the subject area for that diagram. 3. Since actors and use cases can appear in various diagrams, it is expected that you must clearly label them and use notes where possible. A minimum of 4 and a maximum of 8 use cases may be used. In total, you should have four use case diagrams to represent each system above.4. Ensure to use both <<include>> and <<extend>>…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningSystems Analysis and Design (Shelly Cashman Serie...Computer ScienceISBN:9781305494602Author:Scott Tilley, Harry J. RosenblattPublisher:Cengage Learning
- Systems ArchitectureComputer ScienceISBN:9781305080195Author:Stephen D. BurdPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Systems Analysis and Design (Shelly Cashman Serie...
Computer Science
ISBN:9781305494602
Author:Scott Tilley, Harry J. Rosenblatt
Publisher:Cengage Learning
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
9.1.2 Software Development Approaches; Author: EIToppo;https://www.youtube.com/watch?v=Z9znuSQ7Sz8;License: Standard YouTube License, CC-BY