Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Management Information System Expert

Consider the following description of an information system. Document the described business processes using data flow diagrams and MS Visio. Create the context and level 0 diagrams. At level 0 the system can be represented by 5 major processes. One of these major processes is the ‘finalize travel booking’ process, shown in italics. Also create a level 1 diagram for the ‘finalize travel booking’ process. 

 

Bronco Airlines:

 

Bronco Airlines (BA) is a new regional airline recently founded by an SCU graduate. BA management has asked you to design an online ticket purchasing information system to allow BA customers to book their air travel. For your professional design, they intend to compensate you with a significant stake in the firm. Management envisions the business process for a customer purchasing a ticket from BA to be as follows. When customers enter the website they would initially provide the details of their desired air travel, including the departure and return travel dates, source and destination airports, and the number of passengers traveling. Flight information would then be extracted from the BA flight data store, and the available flights for the dates and airports specified would be determined and offered to the customer. This flight information would include BA flights, fares, and the number of seats available on the flights. After reviewing the flights available for their travel, the customer would then provide their flight selections. Next, the customer would specify the passengers to be traveling on the selected BA flights and provide their passenger information. To comply with Federal Aviation Administration regulations, the information on each passenger would need to be passed to the Department of Homeland Security (DHS) to check their security clearance for air travel. Passengers that are approved for air travel by DHS would then be recorded in the passenger data store. Next, customers would be allowed to select seats for each approved passenger and flight, using seat availability information extracted from the seat data store. Finally, customers would book their selected travel with BA. Booking travel entails calculating the total price of the travel and providing the travel details and total price to the customer. The customer would then provide their customer and payment information and the system would process payment through a third-party credit clearinghouse. When payment approval is received, the customer would then be issued an e-ticket for their travel and an email confirmation, DHS would be notified of the booked travel, and the details for the travel booking would be recorded in the system data stores. The flight data store would be updated to reflect the purchase of seats on the flight, the seat data store would be updated to reflect the reservation of the selected seats, customer and payment information would be stored in the customer data store, and the details of the travel reservation would be recorded in the flight reservations data store. In addition to supporting this customer-facing business process, the system should allow BA management to maintain the flight information in the flight data store and the seat availability information in the seat data store. The system should provide the existing flight and seat information to BA management, and allow them to provide updates to flight and seat information as necessary.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92829

Have any Question? 


Related Questions in Management Information System

Project part -system support and maintenanceyou discussed

Project Part -System Support and Maintenance You discussed the system acquisition strategy and discussed the system architecture. You created a physical data model and drafted the inheritance structure of your objects. Y ...

The project will be creating a security policy and

The project will be creating a security policy and procedures manual. The project will be completed by a group of no more than 8 students. Students need to select an existing business and analyze and assess security need ...

Aritique the article is attached middot

Article Critique (The article is attached ) · APA Format · Four (4) References/Citations from Professional Journals · 2-3 Page Minimum · Identify the main topic/question · Identify the author's intended audience · Critiq ...

Project assignment business requirementsthis assignment

Project Assignment: Business Requirements This assignment consists of two sections: a business requirements document and a Gantt chart or project plan. You must submit both sections as separate files for the completion o ...

Integration of nursing informatics skills and

Integration of Nursing Informatics Skills and Competencies Reflect on your own practice. Explain how much informatics you use in a shift or day of work For your discussion, consider the following questions: 1. Are you sa ...

Security threats to employee information please respond to

"Security Threats to Employee Information" Please respond to the following: Cybersecurity threats have been on the rise over the last few decades. With more advanced technology, hackers have found ways to break through s ...

Assignmentcorporate fraud please respond to the

Assignment "Corporate Fraud" Please respond to the following: • Organizations must adhere to strict anti-fraud requirements in how they prevent, detect, and correct fraud-related incidents. However, in the American corpo ...

Experts believe that many of todays new terrorist groups

Experts believe that many of today's new terrorist groups are more concerned with continuity rather than change, religious vs. political change. For example, they no longer want a seat at the table, they would rather blo ...

Assignmentevaluate information management planning and

Assignment Evaluate information management, planning, and control in business environments. Please watch the following videos, 5 principles of using information technology to improve your business and 6 Stages of Funding ...

Write a 1400- to 1750-word paper on police corruption

Write a 1,400- to 1,750-word paper on police corruption, police misconduct, and police brutality. Include the following in your paper: Describe the extent of police corruption, misconduct, and brutality in the United Sta ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro