Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Management Information System Expert

Consider the following description of an information system. Document the described business processes using data flow diagrams and MS Visio. Create the context and level 0 diagrams. At level 0 the system can be represented by 5 major processes. One of these major processes is the ‘finalize travel booking’ process, shown in italics. Also create a level 1 diagram for the ‘finalize travel booking’ process. 

 

Bronco Airlines:

 

Bronco Airlines (BA) is a new regional airline recently founded by an SCU graduate. BA management has asked you to design an online ticket purchasing information system to allow BA customers to book their air travel. For your professional design, they intend to compensate you with a significant stake in the firm. Management envisions the business process for a customer purchasing a ticket from BA to be as follows. When customers enter the website they would initially provide the details of their desired air travel, including the departure and return travel dates, source and destination airports, and the number of passengers traveling. Flight information would then be extracted from the BA flight data store, and the available flights for the dates and airports specified would be determined and offered to the customer. This flight information would include BA flights, fares, and the number of seats available on the flights. After reviewing the flights available for their travel, the customer would then provide their flight selections. Next, the customer would specify the passengers to be traveling on the selected BA flights and provide their passenger information. To comply with Federal Aviation Administration regulations, the information on each passenger would need to be passed to the Department of Homeland Security (DHS) to check their security clearance for air travel. Passengers that are approved for air travel by DHS would then be recorded in the passenger data store. Next, customers would be allowed to select seats for each approved passenger and flight, using seat availability information extracted from the seat data store. Finally, customers would book their selected travel with BA. Booking travel entails calculating the total price of the travel and providing the travel details and total price to the customer. The customer would then provide their customer and payment information and the system would process payment through a third-party credit clearinghouse. When payment approval is received, the customer would then be issued an e-ticket for their travel and an email confirmation, DHS would be notified of the booked travel, and the details for the travel booking would be recorded in the system data stores. The flight data store would be updated to reflect the purchase of seats on the flight, the seat data store would be updated to reflect the reservation of the selected seats, customer and payment information would be stored in the customer data store, and the details of the travel reservation would be recorded in the flight reservations data store. In addition to supporting this customer-facing business process, the system should allow BA management to maintain the flight information in the flight data store and the seat availability information in the seat data store. The system should provide the existing flight and seat information to BA management, and allow them to provide updates to flight and seat information as necessary.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92829

Have any Question? 


Related Questions in Management Information System

Mis assignmentdeliverable length 400-500

MIS Assignment Deliverable Length: 400-500 words Description Although she does not report to you, you have already begun a series of discussions with the company's Management Information Systems Director. She has explain ...

Information technologysecurity expert wantedafter

Information Technology/Security Expert WANTED After identifying your organizations' vulnerabilities through previous weekly assignments, you now need to develop security measures to protect those vulnerabilities. Create ...

Question 1 describe the two primary components of a cpu

Question 1: Describe the two primary components of a CPU architecture. Question2 : Describe the purpose of the Instruction Register. Question 3 : Describe the roles of the data and address registers in a CPU architecture ...

Project assignment business requirementsthis assignment

Project Assignment: Business Requirements This assignment consists of two sections: a business requirements document and a Gantt chart or project plan. You must submit both sections as separate files for the completion o ...

Assignmentthe design of your research should now be

Assignment The design of your research should now be completed, and you are ready for the execution phase. This is a key step in the research process and should result is meaningful, measurable, and useful information th ...

Provide a financial analysis for the information system

Provide a financial analysis for the Information System Plan. Include an estimate of time and resources (e.g. facilities. technology, vendor and employee expenses. etc.) with associated cost. Also. include a break-even a ...

As the system administrator you are always looking for ways

As the system administrator, you are always looking for ways to improve your network. Although there are many different types of operating systems, there are many versions of the operating systems, as well. After much re ...

Select one of the four primary categories of terrorist

Select one of the four primary categories of terrorist hazards (Chemical, Biological, Radiological/Nuclear, Explosives). Provide a history of its use as a weapon of mass destruction (WMD); describe how it is made and dis ...

Computer sciencethe management team is particularly

Computer Science The management team is particularly concerned about the right to protect company resources and restrict what employees can use the resources for. They want to ensure that they have a policy in place that ...

Write a 3-5 page report microsoft wordwhat are the major

Write a 3-5 page report (Microsoft Word). What are the major strategies and why is it important to implement security policy's in today's organizations? Make sure you include the following: 1. Include a summary paragraph ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro