Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Problem

Scenario: You work in your company's payroll department and are asked to acquire software that will automate the process for employees to submit their timesheets to the payroll department. Timesheets are the means by which hourly employees submit their time. Time sheets are approved by managers and t hen processed by the payroll department for payment. Using the new system, employees will input their time weekly into a computer system. Once employees complete their time sheets, managers will be able to view and approve them when they log into the system.

Using the preceding scenario described, answer the following:

1. What methods would you use and why to gather the requirements for the system?

2. Document the information and system requirements using the outline of the requirements documented provided in the chapter.

3. Describe two or three alternatives solutions that should be considered.

4. Using the categories provided in the text and one of the alternatives that you described in Exercise 2, perform a feasibility analysis.

5. Perform a risk analysis for the proposed system.

6. Who would you recommend to be on the acceptance testing team?

7. In the acceptance plan, what tests would you recommend to ensure that information requirements are met?

8. In the acceptance plan, what tests would you recommend to ensure that the system performance requirements are met?

9. In the acceptance plan, what tests would you recommend to ensure that the system requirements are met?

10. How can a resource such as NIST or Carnegie Mellon's SEI be helpful in the software acquisition process?

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92727897

Have any Question?


Related Questions in Management Information System

Assignment1 you are a member of the human resources

Assignment 1) You are a member of the Human Resources Department of a medium-sized organization that is implementing a new interorganizational system that will impact employees, customers, and suppliers. Your manager has ...

Part 1 - create an 8 slide powerpoint presentation on

Part 1 - Create an 8 slide PowerPoint presentation on foundational concepts specific to physical security. Part 2 - Write 4 pages detailing the framework for the design of an integrated data center. Assessment Instructio ...

Information systems and computer applications clep practice

Information Systems and Computer Applications CLEP Practice Test 1) An 8 bit video card can display how many colors? A) 8 B) 16 C) 64 D) 256 E) 512 2) POS terminals are found everywhere BUT the following? A) Grocery stor ...

You are the project manager for an upgrade of computers in

You are the project manager for an upgrade of computers in your company. You need to upgrade 30 systems, including 10 desktops (for office personnel) and 20 laptops (for remote workers). Each system must access the compa ...

Discussion question what do you perceive to be some of the

Discussion Question : What do you perceive to be some of the Modern Network Security Threats? How do today's Threats differ from threats 10 years ago? Post Requirements: Your post must use at least two (2) sources of inf ...

Youre working for a local coffee shop that offers free

You're working for a local coffee shop that offers free wireless access to customers. Your supervisor has asked you to create a flyer for patrons that warns them of the potential dangers of surfing the Internet in public ...

Response 1annotations have been identified as an important

Response 1 Annotations have been identified as an important aid in analysis record-keeping and recently data discovery. In this paper we discuss the use of annotations on visualization dashboards, with a special focus on ...

Question social engineering techniques are often used to

Question : Social Engineering techniques are often used to trick users into giving out important information. List two of the recommendations from the OER readings for avoiding social engineering attacks and briefly desc ...

Compare presentations of lessons learned on byod

Compare presentations of lessons learned on BYOD implementations. Develop a BYOD policy, in conjunction with a deployment of an MDM device for a medium sized hospital. What compliance issues and ethical issues are there ...

Create an infographic using an infographic maker such as

Create an infographic using an infographic maker, such as Piktochart, Venngage, or Canva, displaying an organization chart showing the following: The job titles provided in your summary and how they fit in with the exist ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As