answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
OverLord2011 [107]
2 years ago
4

Leading Edge Climbing Equipment is a retail rock climbing equipment vendor that is planning to install a new order entry and tra

nsaction processing system. As Leading Edge's IT manager, you are preparing for a follow-up meeting to confirm the owner's decision to move forward with the system.Tasks1. In deciding on your proposal, what options do the owners have?2. If the owners decide to purchase or customize a software package, what steps will you take?3. Explain the difference between logical and physical design.4. Describe the steps typically performed in systems design.
Computers and Technology
1 answer:
Bumek [7]2 years ago
8 0

Answer:

1)-The owners of Leading Edge

Climbing Equipment have the

following options for order entry

and transaction processing

system:

Developing Software In-House:

• Companies choose in-house

development to satisfy unique

business requirements.

• It meets the constraints of

existing systems and also satisfies

unique security requirements.

Purchasing a software package:

• A Software package is obtained

from a vendor or application

service provider

• Purchasing a software package

lowers the cost

• It has proven reliability and

performance benchmarks.

2)- If the owner decides to purchase or

customize a Software Package, the

following steps are taken:

1. Evaluation of the requirements

of information system

2. Identifying potential vendors and

outsourcing providers

3. Evaluation of different

alternatives

4. Performing cost-benefit analysis

5. Preparing recommendation

Evaluation of the requirements of

information system:

• This involves identifying the key

features in the system

requirements that have been

analyzed. An overall specification

for the system is developed.

• All network and web-related

issues are to be considered.

Decision regarding whether the

software must be run on internet

or intranet is to be analyzed.

• A request for proposal or

quotation is to be prepared.

Identifying potential vendors and

outsourcing providers:

• The potential vendors and

outsourcing providers for the

software are identified.

• The search can be conducting

using Internet

Evaluation of different

alternatives:

• Among the several alternatives,

one alternative is chosen that best

serves the company's needs.

• Vendor presentation, product

documentation, trade publications,

etc helps in taking the decision.

Performing cost-benefit analysis:

• A cost benefit analysis is

performed to evaluate the

software.

• All the costs must be included

while calculating TCO.

Preparing recommendation:

• Prepare a recommendation that

evaluates the alternatives, together

with the costs , benefits,

advantages and disadvantages.

Implementing the solution:

• Implement the solution depends

on the alternative selected.

• In-house or outsourcing options

can be selected.

• Complete all the implementation

steps such as loading, configuring,

and testing the software, training

users etc. before the software

becomes operational.

3)-Following are the differences

between logical and physical

design:

Logical design:

•The logical design of the information system

helps in defining the features and functions of the system.

•Logical design is not concerned about the way in which the tasks are accomplished.

•The method of implementation is not addressed by the logical design.

Physical design:

•The Physical design of the information system helps in defining the way in which

tasks are accomplished.

•Physical design is concerned about the way in which the tasks are accomplished.

•The method of implementation is addressed by the physical design.

4)- The steps typically performed in

system design are as follows:

• In this phase the system

designing is done to define the

architecture of the system that

fulfills the requirements

documented in the analysis phase.

• The aim of the design phase is to

understand inputs, outputs and

processes.

• It ensures the reliability, accuracy,

maintainability and security of the

system.

• At the end of the phase the

System Design specification is

presented to users and

management for review and for

approval.

Explanation:

You might be interested in
PYTHON PROGRAMMING: At one college, the tuition for a full-time student is $8,000 per semester.
lozanna [386]

Answer:

Try :

Semester_Fee = 8000.0

for x in range(1, 6):

   import decimal

   Semester_Fee = Semester_Fee + Semester_Fee *(3/(100*1.0))

   if x==1:

       print("In",x,"year, the tuition will be" ,'$', Semester_Fee, end='.')

   else:

       print("In",x,"years, the tuition will be" ,'$', Semester_Fee, end='.')

6 0
2 years ago
Using the college registration example from section 6.7.3 as a starting point, do the following:
Arada [10]

Answer:

Explanation:

NCLUDE Irvine32.inc

TRUE = 1

FALSE = 0

.data

gradeAverage WORD ?

credits WORD ?

oKToRegister BYTE ?

str1 BYTE "Error: Credits must be between 1 and 30" , 0dh,0ah,0

main PROC

call CheckRegs

exit

main ENDP

CheckRegs PROC

push edx

mov OkToRegister,FALSE

; Check credits for valid range 1-30

cmp credits,1 ; credits < 1?

jb E1

cmp credits,30 ; credits > 30?

ja E1

jmp L1 ; credits are ok

; Display error message: credits out of range

E1:

mov edx,OFFSET str1

call WriteString

jmp L4

L1:

cmp gradeAverage,350 ; if gradeAverage > 350

jna L2

mov OkToRegister,TRUE ; OkToRegister = TRUE

jmp L4

L2:

cmp gradeAverage,250 ; elseif gradeAverage > 250

jna L3

cmp credits,16 ; && credits <= 16

jnbe L3

mov OkToRegister,TRUE ; OKToRegister = TRUE

jmp L4

L3:

cmp credits,12 ; elseif credits <= 12

ja L4

mov OkToRegister,TRUE ; OKToRegister = TRUE

L4:

pop edx ; endif

ret

CheckRegs ENDP

END main

8 0
2 years ago
The most common data link layer protocol for wired connections is _____.
harkovskaia [24]

The answer is Ethernet

Ethernet is by far the most popular LAN by a mile. It is a group of protocols that work at either the Data link layer or the Physical layer of the OSI model. Ethernet in the engineering world is defined as the IEEE 802.3 specification.






7 0
2 years ago
Which two factors most influenced the growth of the Internet during the 1970s?
eduard

Answer:

The answer is "increase in the power of public universities and increased appreciation for a liberal arts education". DARPA and Russia had nothing to do with this. Yes, the computer hardware improvement led to a growth, but National Science Foundation funding in 1981, and hence this is also not an option. And electrical power supply had nothing to do with this. Hence, the above answer. as the concept of the internet is based on liberal arts of education, to impart practical and intellectual skillsets, and hence to grow the social responsibility among the citizens of the whole world. Also, the power of public universities had a big role to play definitely, and this was confirmed from Pentagon as well then when the question was raised, is this due to the risk of a nuclear attack.

Many people think that the main reason was the nuclear attack threat, but that was not an issue definitely. Actually this was the time of liberalization, and the power of the public universities was increased. Hence, they got the chance to share the information of various sorts with the people, and in the process internet started expanding.

Explanation:

The answer is self explanatory.

8 0
2 years ago
Read 2 more answers
Mrs. Patel uses a computer program to balance her checkbook. Which of the following best explains how the
Alexandra [31]

Answer:

c it reduces errors

Explanation:

Instead of Mrs.Patel doing it she has an online program made for checks to do it for her.

6 0
2 years ago
Other questions:
  • Compare the encryption algorithms found in s-tools: idea, mdc, des, and 3des.
    5·1 answer
  • 14. If B3=10 and D5=8, what would the following function return? IF(B3&gt;D5, "Closed", D5-B3) *
    9·1 answer
  • Type two statements that use rand() to print 2 random integers between (and including) 100 and 149. End with a newline. Ex:
    8·2 answers
  • Given an n-element array X, algorithm D calls algorithm E on each element X[i]. Algorithm E runs in O(i) time when it is called
    7·1 answer
  • You’re trying to cast a video presentation from your tablet to a projector for a training session with some new hires. Although
    5·1 answer
  • In Java please.
    12·1 answer
  • 1.the following code example would print the data type of x, what data type would that be?
    12·1 answer
  • PLEASE HELP!!~~
    7·1 answer
  • Which XXX and YYY correctly output the smallest values? Vector user Vals contains integers (which may be positive or negative).
    15·1 answer
  • A customer opened a file attachment, and now her PC is infected with ransomware. She's unable to open any of her files. Which ac
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!