Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

1. Suppose you are explaining the concept of prototyping to your manager to persuade her to approve the prototype approach to a proposed system that you are working on.

Her response to your explanation is that "prototyping is a waste of time and money". As a systems analyst, how could you respond to her?

2. A systems analyst junior in my organization just took a course in the Agile development. He liked the new approach and he really wanted to know how to decide which approach to follow for Software Development Lifecycle (SDLC).

He was debating whether it is better to use Waterfall or Agile for big projects.

His thinking was that Agile should be used for big projects with non-sequential product development and for projects that are often prone to change in requirements and cost. Is he right?

3. ABC Inc. wants to build a new web site to sell their "clearance" products and they are planning to publish a proposed website site designed to obtain feedback from "potential customers".

The question is whether ABC Inc. should use a prototype to obtain feedback from "potential customers" about the proposed website.

There are four available prototypes: patched-up, nonoperational, first-of-a-series, and selected features.

What type of prototype is appropriate for ABC Inc. in this case? Explain why each type would apply (or would not apply) to this problem

Please answer all 3 questions separately with 250+ words each and references. Do not combined all 3 question into one report.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92855465
  • Price:- $50

Priced at Now at $50, Verified Solution

Have any Question?


Related Questions in Management Information System

Answer the following questions 1 discuss in 500 words how

Answer the following Questions : 1) Discuss in 500 words, how much redaction is necessary to anonymize an electronic health record. Is it enough to redact the name? The name and address? Is a medical record like a finger ...

1 write a report at least 400 words on how to use data

1. Write a report (at least 400 words) on how to use data mining to help marketing managers specifically. Give a title to your report an interesting title to reflect the theme(s) of your report. You must use a specific b ...

Using proper apa formatting write an initial 400-600 word

Using proper APA formatting write an initial 400-600 word discussion paper relating to the following: 1. What are protective barriers and what should they entail? 2. What mitigation procedures can be used to ensure the r ...

Develop a 2- to 3-page paper or a 10- to 12-slide

Develop a 2- to 3-page paper, or a 10- to 12-slide PowerPoint® presentation with speaker notes along with a 1-page executive summary. Cover the following: Identify the event and the issues surrounding the security breach ...

List and describe two forms of organizational changehow

List and describe two forms of organizational change. How does organizational change create business innovation? Give an example. Answer should be 250 to 300 words. with 2 references and in text citation and no plagiaris ...

Assessment instructionsfirst select a global it

Assessment Instructions First, select a global IT organization with which you are currently affiliated or have worked for in the past, or one you would like to learn more about. This organization should be relevant to yo ...

Management of itexercise - providing it assurance

Management of IT Exercise - Providing IT Assurance Policies: • Submissions made through a means other than the GeorgiaView (D2L) Dropbox will be ignored and earn a 0. • Submissions without your name stated above earn a 0 ...

Question in roughly 200 words -explain the relationship

Question : In roughly 200 words - Explain the relationship between vulnerability and threat in an information systems context, and discuss how to develop an IT security policy framework to reduce risk from threats and vu ...

Read cybercrime deterrence and international legislation

Read "Cybercrime Deterrence and International Legislation: Evidence From Distributed Denial of Service Attacks," by Hui, Kim, and Wang, from MIS Quarterly (2017). Refer to this reading when completing Topic 8 DQ1. Read " ...

Suburban homes construction project quality management plan

Suburban Homes Construction Project Quality Management Plan (QMP) Prepare a quality management plan using the elements described in the PMBOK 6e (Section 8.1.3.1) for the Suburban Homes Construction Project. Content Over ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As