Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Willowbrook School

Willowbrook School is a small private school that has retained your services as a systems analyst to assist in the development of a new information system for the school's administrative needs.

Background

Your preliminary investigation and fact-finding tasks are complete. You join Victoria Owens, Willowbrook's director, for a status update meeting to discuss the progress you have made with the requirements documents you put together.  You discuss the system requirements and she is in agreement with you on what you have identified as necessary components of the new system. The new information system will contain components that will register students, generate drop-in reports, generate bills, record payments, generate receipts, and generate monthly reports.

The next step is to develop a logical model of the proposed billing system.  You explain to her how you will develop data flow diagrams (DFDs) that will be used to graphically show how data input will move through a system and be turned into useful information. 

Tasks

1. Prepare a context diagram for the new system.

2. Prepare a diagram 0 DFD for the new system.

3. Prepare a list of data stores and data flows needed for the system. Under each data store, list the data elements required.

4. To help explain to Victoria the processes used to further develop the diagrams into the system model, write a brief memo that explains the importance of leveling and balancing a set of DFDs. Make sure the memo contains the proper formal heading and formatting.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91522615
  • Price:- $40

Priced at Now at $40, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Explain the differences between working in the web based

Explain the differences between working in the web based version of Outlook in Office 365 to the desktop application version of Outlook.

What data management considerations must be reviewed to

What data management considerations must be reviewed to ensure success for both companies and assure regulatory compliance, ethical responsibility, and business performance?

1 explain why fukayama thinks we are at the end of history

1. Explain why Fukayama thinks we are at the "end of history". How do you respond to his contention? 2. Explain what information a Lorenz curve gives you. How is this information summarized by a Gini coefficient. 3. Expl ...

If the annualized five-year rate of return is 15 and if the

If the annualized five-year rate of return is 15%, and if the first year's rate of return is 20%, and if the returns in all other years are equal, what are they? Provide the answer in % with four decimal places without r ...

My kids love playing uno and we just finished up an intense

My kids love playing UNO and we just finished up an intense round. Lets say that the deck has 80 cards. 20 red, 20 blue, 20 green and 20 yellow.  What is the probability of pulling 3 green cards if the first 2 are replac ...

What are the best practices to follow for microsoft windows

What are the best practices to follow for Microsoft Windows network security. Which two would you start with and why?

Suppose the following matrix represents the number of saws

Suppose the following matrix represents the number of saws ordered from your company each month over the last year. saws = [1,4,5,3,7,5,3,10,12,8, 7, 4] All the numbers should be zero or positive. (a) Use an if statement ...

Stacksthere are two main operations associated with stacks1

Stacks There are two main operations associated with stacks; 1) putting things on the stack which is referred to as push, 2) taking things from the stack which is referred to as pop. We can create a stack using linked li ...

Identify at least two 2 factors that have led to the

Identify at least two (2) factors that have led to the explosive growth of digital crime over the past a few decades. Next, describe the most common forms of digital crime, and give your opinion as to why those forms you ...

Summarizes the results of a risk assessment for business

Summarizes the results of a risk assessment for Business Continuity Risk. Determine the steps that can be taken to mitigate Business Continuity risks. What's identified should be cost-effective based on the overall risk ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As