Draw a context-level diagram for the Courses Registration system.

Question 1 of 5: (10 points)
Part 1 (6 points)

1. Systems analyst                                 2. Data structure

3. Bipolar closed questions                        4. Logical data structures

5. Context diagram                                 6. Data store

7. Agile approach                                  8. Funnel structure

9. Level-0 diagram/                                10. Systems analysis and design

11. Object-oriented systems analysis & design      12. Prototyping

13. Data flow diagram                              14. Physical data structures

15. Probes                                         16. Sampling

17. Open-ended questions                           18. Closed-ended questions

19. Agile modeling                                 20. Ajax

21. Data element                                   22. Questionnaire

23. External entity                                24. Child diagram

25. Joint application design                       26. Systems consultant

27. Human-computer interaction                     28. Data dictionary

29. Systems development life cycle                 30. Application service provider

 

Match any of the key terms above with the definition that best fits it (Ignore any
key terms that do not fit.)

 

·       ___________________ is the organizational role most responsible for the analysis and design of information systems.

·       _______________________ is a picture of the movement of data between external entities and the processes and the data stores within a system.

·       _______________________ are questions in interviews that ask those responding to choose from among a set of specified responses.

·       ________________________ is a data flow diagram that represents a system’s major processes, data flows, and data stores at a high level of detail.

·       ________________ is a data flow diagram of the scope of an organizational system that shows the system boundaries, external entities that interact with a system, and the major information flows between entities and the system.

·       __________________________ is a structured process in which users, managers, and analysts work together for several days in a series of intensive meetings to specify or review system requirements.

Part 2 (4 points)

Label each question as either closed-ended (CE) question or open-ended (OE) question.

a.  Why do you perform the task that way?  ______________________________________

b.  How are the checks reconciled?  _____________________________________________

c.  Is the calculation procedure described in the manual?  ______________________

d.  Do you review the reports before they are sent out?  ________________________

e.  What is the volume of shipments on an average day? __________________________

f.  How is the system updated when a shipment is sent? __________________________

g.  How are returns handled? ____________________________________________________

h.  How are employee responsibilities divided among the various procedures? _____

Question 2 of 5: (25 points)
Part 1 (10 points)

An analyst needs an organized method for collecting facts. Some systems analysts will frequently jump right into interviews. They believe, “Go to the people. That’s where the real facts are!” Wrong! This approach fails to recognize an important fact of life: People must complete their day-to-day jobs. You may be thinking, “But I thought you’ve been seen saying that the system is for people and that direct end user involvement in systems development is essential. Aren’t you contradicting yourselves?”

Write a paragraph to offer your opinion on the issue described in the above statement.

*** For this question, please limit your response to half a page.

Part 2 (15 points)

Given that you can use all six information-gathering techniques: (1) document analysis or investigation, (2) conduct interviews and discussion with users, (3) observe the work environment and document business processes, (4) distribute and collect questionnaires, (5) sampling, and (6) conduct joint application design (JAD) sessions.

Using all of these six techniques, propose a general step-by-step strategy (which technique goes first and which technique goes next) to discover information system requirements and provide an explanation of your strategy decision.

*** For this question, please limit your response to a maximum of one page.

 

Question 3 of 5: (25 points)
Part 1 (15 points)

Suppose you are evaluating two hardware lease proposals. Option 1 costs $10,000, but requires that the entire amount be paid in advance. Option 2 costs $12,000, but thepayments can be made $2,000 now and $2,000 per year for the next five years.

If you do a present value analysis assuming a 2 percent discount rate, which proposal is less expensive? (Hint: Use the formula  1/(1 + i)n to find the multipliers
for years 1 to 5.)

*** For this question, please limit you response to a maximum of two pages.
Justify all your numerical answers and answer all the questions using your own words.
Show all your work, including how you found your answer (this is very important and
essential to have your answer graded appropriately!).

 

Part 2 (10 points)

Mr. Smith, who owns a furniture company, wants to develop an information system for tracking shipments to warehouses. Using the data from the table below, please do the following:

  1. Draw a Gantt chart to help Mr. Smith organize his design project. (4 points)
  2. Drawn a PERT diagram and then list all paths, calculate and identify the critical path. (6 points)

 

Description Task Must Follow Time (Weeks)
Generate data flow A None 7
Build decision tree B A 4
Build data dictionary C B 10
Write up project D C and H 4
Design output prototype E None 2
Revise output design F E 9
Write use cases G None 10
Design database H G and F 8

 

 

Question 4 of 5: (10 points)

In the following proposed DFD design, there are some typical errors among external entities (E1 and E2), processes (P1, P2, and P3) and data stores (DS1, DS2, and DS3). Identify and explain any errors in the following design.

 

 

 

Question 5 of 5: (30 points)

A summary of business activities for registering courses for enrolled students
and for registering class lists for faculty members and administrators at an
online university is as follows:

Students log into a system with their “user name and password” that is validated by a secure logon system handled by a “Network and Security” department. Students then send in a course registration form consisting of their personal information and their desired courses. The system checks that the courses are available and that the student is academically qualified to take the course.

Students could pay for their courses by credit cards or they could pay through the Federal Student Aid (FAFSA), if qualified. For the FAFSA students, the system checks with the “Business” department to see if the student is financially qualified to take the course. For credit cards, the system validates students’ credit card information through a credit card company and generated appropriate status message to students.

Based on the checking results, the system will send to the student a confirmation and/or rejection letter for each requesting course with detailed information of what to do next in either case. In addition, for any rejection cases, the system will also notify the Counselor department so students could arrange appointments to talk with their counselors to resolve their issues, if possible.

1. Draw a context-level diagram for the Courses Registration system. Please make sure to include reasonable data flows for the diagram (20 points)

2. For the level-0 diagram, please list necessary processes and data stores for the Courses Registration system. Note that there is no need to draw this level-0 diagram. (10 points)

Explain how to make the file transfer process more secure.

erm Paper Project: Designing a Secure Network

Due Week 10 and worth 190 points

This term paper involves putting together the various concepts learned throughout this course. You are tasked with designing the most secure network possible, keeping in mind your goal of supporting three (3) IT services: email, file transfer (centralized), and VPN. Your first step is to design a single network capable of supporting there three (3) different services. Once you have fully designed your network, you will need to provide three (3) workflow diagrams explaining how your designed network handles the three (3) different transactions. The first is an internal user sending an email using his / her corporate email address to a user on the Yahoo domain with an arbitrary address of user534@yahoo.com. The second workflow diagram should show a user initiating an FTP session from inside your network to the arbitrary site of ftp.netneering.com. The third workflow is an externally located employee initiating a VPN session to corporate in order to access files on the Windows desktop computer, DT-Corp534-HellenS, at work.

Write a ten to fifteen (10-15) page paper in which you complete the following three (3) Parts. Note: Please use the following page breakdown to complete your assignment:

  • Overall network diagram: One (1) page
  • Datapath diagrams: Three (3) pages (one for each diagram)
  • Write-up: six to ten (6-10) pages

Part 1

  • Using Microsoft Visio or its open source alternative, create a diagram showing the overall network you’ve designed from the user or endpoint device to the Internet cloud, and everything in between, in which you:
    • Follow the access, core, distribution layer model.
    • Include at a minimum:
      • Authentication server (i.e. Microsoft Active Directory)
      • Routers
      • Switches (and / or hubs)
      • Local users
      • Remote users
      • Workstations
      • Files share (i.e. CIFS)
      • Mail server
      • Web servers (both internal and external)
      • Firewalls
      • Internet cloud
      • Web proxy
      • Email proxy
      • FTP server (for internal-to-external transport)

 

  • Explain each network device’s function and your specific configuration of each networking device.
  • Design and label the bandwidth availability or capacity for each wired connection.

Part 2

  • Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:
    • Local user sends email to a Yahoo recipient. Local (corporate) user having email address jonny.hill@Corp534.comsends an email to user534@yahoo.com.
      • Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination.
      • Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow.
      • Show user authentication when necessary.
  • Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:
    • Local user, Jonny Hill, transfers file using ftp through the Internet to another company’s site (ftp.netneering.com). He has to access the secure shell using his active directory credentials to authenticate to the ftp server (linux running Redhat) on the DMZ. He needs to transfer files from his desktop across the Internet to ftp.netneering.com.
      • Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination.
      • Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow.
      • Show user authentication when necessary.
  • Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:
    • Remote user, Hellen Stover, connects via VPN from home through the Internet to her corporate desktop, DT-Corp534-HellenS. Hellen uses a browser to initiate her VPN connection. By browsing to https://VPNaccess.corp534.com, she arrives at a login page where she needs to authenticate using her Active Directory credentials before the VPN tunnel is built.
  • Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination.
  • Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow.
  • Show user authentication when necessary.
  • Explain how your overall design protects the organization from both inside and outside attacks. Give examples.
  • Explain how your layered design compensates for possible device failures or breaches in network security.
  • Determine whether any possible bottlenecks exist in your design.
  • Explain how to make the file transfer process more sec

What opportunities in the marketing environment did Gannett seize in launching USA Today?

 

Case Analysis: USA Today

This Week’s Case

USA Today: Innovation in an Evolving Industry

Write an analysis paper on the USA Today case study. Within your paper be sure to answer the following questions:

1.      What opportunities in the marketing environment did Gannett seize in launching USA Today? How did the company learn about and respond to these opportunities? Answer the same questions for USAToday.com

2.      How has a continuous strategy of marketing innovation proved successful for USA Today as it looks toward its future? Explain.

3.      Based on USA Today’s experiences with print and online news, evaluate the long-term potential of printed news and the newspaper publishing industry. Do you believe printed newspapers will continue to survive despite digital competition?

 

The requirements below must be met for your paper to be accepted and graded:

·         Write between 750 – 1,250 words (approximately 3 – 5 pages) using Microsoft Word in APA style.

·         Use font size 12 and 1” margins.

·         Include cover page and reference page.

·         At least 80% of your paper must be original content/writing.

·         No more than 20% of your content/information may come from references.

·         Use an appropriate number of references to support your position, and defend your arguments. The following are examples of primary and secondary sources that may be used, and non-credible and opinion based sources that may not be used.

·

1.      Primary sources such as, government websites (United States Department of Labor Bureau of Labor Statistics, United States Census Bureau, The World Bank, etc.), peer reviewed and scholarly journals in EBSCOhost and Google Scholar.

2.      Secondary and credible sources such as CNN Money, The Wall Street Journal, trade journals, and publications in EBSCOhost.

3.      Non-credible and opinion based sources such as, Wikis, Yahoo Answers, eHow, blogs, etc. should not be used.

Challenges in the Global Business Environment

Complete the Power Point and the Writing portion

Assignment 2: Challenges in the Global Business Environment

Due Week 9 and worth 330 points

According to the textbook, ongoing challenges in the global business environment are mostly attributed to unethical business practices, failure to embrace technology advancements, and stiff competition among businesses. Imagine that you have been appointed as Apple’s Chief Compliance Officer and must prepare a video presentation for Apple’s suppliers regarding Apple’s Supplier Code of Conduct to deliver via a web meeting. To prepare for your presentation, review Apple’s Supplier Code of Conduct, located at https://www.apple.com/supplier-responsibility/. Next, use a tablet, smartphone, laptop, desktop, or traditional video recorder to record a maximum of a five to seven (5-7) minute dynamic video on Apple’s Code of Conduct. Alternatively, you may submit a four to six (4-6) page paper instead of the video submission.

In addition to the recorded video, you must also create a presentation using PowerPoint (or other equivalent software) summarizing the important changes and explanations regarding the code of conduct that you communicated in your video presentation to email to the suppliers after the meeting for future reference.

You must submit both parts of the assignment to receive full credit.

Note: If you are using a tablet or smartphone you will need to email the video file to yourself, then save it to a computer in order to upload to Blackboard. You may want to upload your video to a file sharing service, such as Dropbox, if your email will not let you send a large video file. Dropbox is accessible from all smartphones and tablets from the Dropbox app.

Once you are ready to upload your video to Blackboard, view the Kaltura video tutorial found in your online course shell (Week 9).

Please use the following naming convention in the popup window for your video once it is finished uploading:

  • Title: Your First Name, Your Last Name – Challenges in the Business Environment
  • Tags: BUS475, Business Environment
  • Description: First Name, Last Name – BUS475 Assignment 2 (Date Uploaded ex. 11-14-2014)

Part 1: Video Presentation OR Paper

Prepare and present a video that is a maximum of five to seven (5-7) minutes OR write a four to six (4-6) page paper in which you:

  1. List specific changes that Apple has made to its Code of Conduct in recent years. Provide at least one (1) example of each change.
  2. Explain the identified changes to the suppliers in such a way that they will understand the standards that Apple requires in order to maintain their relationship with the company.

Part 2: PowerPoint Presentation

Create a six to eight (6-8) slide PowerPoint presentation in which you:

  1. Summarize Apple’s Supplier Responsibility information.
  2. Discuss Apple’s stance on each of the following areas:
    1. Empowering workers
    2. Labor and Human Rights
    3. Health and Safety
    4. The Environment
    5. Accountability
  1. Identify the key ways that Apple’s Progress Report has changed since last year.
  2. Examine the manner in which Apple’s Supplier Code of Conduct helps the organization operate as a socially responsible organization.
  3. Provide detailed speaker notes of what you would say if you were delivering the presentation.
  4. Submit a reference page with at least two (2) quality references that you have used for this presentation / paper. Note: Wikipedia and other Websites do not qualify as academic resources.

Your PowerPoint presentation must follow these formatting requirements:

  • Format the PowerPoint presentation with headings on each slide and three to four (3-4) relevant graphics (photographs, graphs, clip art, etc.), ensuring that the presentation is visually appealing and readable from 18 feet away. Check with your professor for any additional instructions.
  • Include a title slide containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The title and reference slides are not included in the required slide length.

If you choose the written paper, your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Evaluate the influences of changing economic, political, social, cultural, and technological forces on business and society.
  • Use technology and information resources to research issues in business and society.
  • Write clearly and concisely about business and society using proper writing mechanics.

Click here to view the grading rubric for this assignment