The image above is the Student Records Information Systems (SRIS) screenshot of the university from Joan Dandoy's post.
Looking the fields for PRF form and SRIS form they differ in content of data. This data Civil Status, Birthdate, Desired Career, Parents, Email and Contact Numbers can only be seen in SRIS form but not in PRF form. By these SRIS and PRF form must be consist. The reliability or uniformity of successive results of SRIS and PRF form should be consistent.A consistent approach to layout of the enrollment system allows the user can quickly understand and confidently predict the location of information controls across the enrollment system.
Also data should be Specific. To be specific means to use facts and details to make sure you are communicating clearly. First question, where part of the design cause the delay of the student, then on that part we may improved well or be specific so that the user can easily get it.
Interview your university network specialist. Ask how various parts of the system communicates with each other throughout the university. (Q) Given the chance to redesign the existing setup, enumerate and discuss your keypoints for an effective and efficient network environment ideal for the university.
In this assignment we are task to interview a network specialist in our university. By the way a network specialist is someone who deals with computer networks professionally.
Engr. Ariel Roy Reyes is the currently network specialist in the university. We prepare list of question to be answer by Sir Reyes. Supposed to be the interview where conducted last week but due to the some important matter it was postponed. So, we decided to pass it via email. Good to know Sir Reyes response and answer the question given to him.
First question was to explain what are the components involved in the system(s) in the university in hardware, software, technology, etc. According to Sir Reyes, I am not in the right position to discuss the details of the software components used as there are other assigned personnel for such job. However, talking about hardware component and technology used, basically I, assigned as the network administrator, is entrusted to maintain our different servers to run 24/7. Currently, we have our Web Server hosted here in our University in our HP ProLiant ML350 Server. Its an old but stable server set-up here in our Networks Office and has been active since Engr. Val A. Quimno , not yet a dean, was appointed as the Network Administrator. The said server has the following specification:
• Intel Xeon 3.0 GHz, 3.2 GHz, or 3.4 GHz processors (dual processor capability) with 1MB level 2 cache standard. Processors include support for Hyper-Threading and Extended Memory 64 Technology (EM64T)
• Intel® E7520 chipset
• 800-MHz Front Side Bus
• Integrated Dual Channel Ultra320 SCSI Adapter
• Smart Array 641 Controller (standard in Array Models only)
• NC7761 PCI Gigabit NIC (embedded)
• Up to 1 GB of PC2700 DDR SDRAM with Advanced ECC capabilities (Expandable to 8 GB)
• Six expansion slots: one 64-bit/133-MHz PCI-X, two 64-bit/100-MHz PCI-X, one 64-bit/66-MHz PCI-X, one x4 PCI-Express, and one x8 PCI-Express
• New HP Power Regulator for ProLiant delivering server level, policy based power management with industry leading energy efficiency and savings on system power and cooling costs
• Three USB ports: 1 front, 1 internal, 1 rear
• Support for Ultra320 SCSI hard drives (six hot plug or four non-hot plug drives supported standard, model dependent)
• Internalstorage capacity of up to 1.8TB; 2.4TB with optional 2-bay hot plug SCSI drive
• 725W Hot-Plug Power Supply (standard, most models); optional 725W Hot-Pluggable Redundant Power Supply (1+1) available. Non hot plug SCSI models include a 460W non-hot plug power supply.
• Tool-free chassis entry and component access
• Support for ROM based setup utility (RBSU) and redundant ROM
• Systems Insight Manager, SmartStart, and Automatic Server Recovery 2 (ASR-2) included
• Protected by HP Services and a worldwide network of resellers and service providers. Three-year Next Business Day, on-site limited global warranty. Certain restrictions and exclusions apply. Pre-Failure Notification on processors, memory, and SCSI hard drives.
Aside from it, our mail server running under Compaq Proliant ML330 Server, our oldest server, is also hosted here in our Networks Office. Together with other Servers, such as Proxy and Enrollment Servers, both proxy and our enrollment servers are running in a microcomputer/personal computers but with higher specifications to act as servers.
Second question was to explain how do these communicate with one another (topology, network connectivity, protocols, etc.) – may include data flow/ UML diagrams to better explain. According to Sir Reyes, “All Servers are connected in a shared medium grouped as one subnetwork. In general, our network follows the extended star topology which is connected to a DUAL WAN Router that serves as the load balancer between our two Internet Service Providers. All other workstations are grouped into different subnetworks as in star topology branching out from our servers subnetwork as in extended star topology. At present, we are making use of class C IP Address for private IP address assignments. Other workstations IP assignments are configured statically (example: laboratories) while others are Dynamic (example: offices). All workstations are connected via our proxy servers that do some basic filtering/firewall to control users access to the internet aside from router filtering/firewall management. So, whenever any workstation has to connect to the internet, it has to pass through software and hardware based firewall.”
Third question was to explain what are the processes involved in the communication with each system to other systems. According to Sir Reyes,”As mentioned above, in item 3, all workstations are connected via a proxy server. It means that whenever a workstation is turned on, it requests for an IP address from the proxy server (for dynamically configured IP address) and connect to the network after IP address is acquired. As connection is established, each system can now communicate and share resources within the same subnetwork and to server following the concepts discuss in your Computer Network Class.”
Fourth question was to explain how do you go along with the maintenance of the system. According to Sir Reyes,” Basically, our servers are expected to be in good condition since it is required to be up 24/7. Daily, during my vacant period, monitoring on the servers are observed that includes checking logs, checking hardware performance such as CPU health, etc. If problems are observed, remedies are then and then applied. Once in a week, regular overall checkup is observed as preventive maintenance to ensure not to experience longer downtime if possible.”
Fifth question was to explain does the system follow a specific standard. According to Sir Reyes, “As I was appointed as the Network Administrator, everything was already in place except for some minor changes. Basically, different networking standards was already observed such as cabling standards, TIA/EIA 568A-B, different IEEE standards as discussed in your Computer Networks Subject, etc.”
Sixth question was to explain how is the security of the system if are there any vulnerabilities, risk, corresponding mitigation techniques, access control. According to Sir Reyes,” As I have mentioned, we have implemented both software and hardware based filtering/firewall. Basically, Risks or vulnerabilities and different mitigation techniques were considered to increase security in our network. Aside from filtering/firewall, constant monitoring on networks activity also increases the security of the system.”
Last question was to explain if are there any interference during what (most) times do these occur and explain their effects especially with regards to the business of the university. According to Sir Reyes,” Major Interferences are normally encountered as an effect of unforeseen and beyond our control events such as black outs, and the like. The said interference would of course affect University’s day-to-day businesses for obviously this will paralyze all our activities that rely on electricity and further this might cause damage on our network devices, etc. that may later be the reason for longer downtime. Problems encountered by our providers such as connection to the National/International Gateway also affect University’s business such as correlating to University’s Business Partners outside and within the country.”
The general category of network specialist includes individuals who do a lot of different work with various computer networking systems.
Given the chance to redesign the existing setup, enumerate and discuss your keypoints for an effective and efficient network environment ideal for the university. Before hearing the answer of Sir Reyes I would say yes but now after hearing his answer I would say no. Even Sir Reyes has not redesigned the previous network environment and he just improved and maintained it instead. I think the current network environment is already working well with the university’s functions and only some function needs development and enhancements on the performance to have a quality
Relative to your answer in Assignment 1 .... what's your take on the design of the enrollment system?
Design of the Enrollment System
Relating my answer in assignment 1, with observation and to the new enrollment system implemented this semester are not so organized because of long line in the registrar and cashier and sometimes cause of delay of student to enroll on that day.
With this, the main purpose in design of the enrollment is to communicate effectively to the viewers of the system. The communication effectiveness is measured by the speed, accuracy and ease with which the information content can be easily to understand. These provide practical guidance for both designers and users because the designer is just communicating to the user telling him where to go.
Analyzing the design of the enrollment system would lessen the delay of the student.
Be Specific. First question, where part of the design cause the delay of the student, then on that part we may improved well or be specific so that the user can easily get it.
Consistency. A consistent approach to layout of the enrollment system allows the user can quickly understand and confidently predict the location of information controls across the enrollment system.
All these actions must properly well-planned to come up with a better result that would satisfy the needs of the university.
Assuming I’m tapped by the university president to evaluate the new enrollment system implemented this semester, and enumerates my observations/comments and suggests possible areas and ways where improvements can be made in this university.
My evaluation to the new enrollment system implemented this semester are not so organized because of long line in the registrar and cashier and sometimes cause of delay of student to enroll on that day.
My observations/comments and suggests possible areas and ways where improvements can be made in this university.
• Clearance and Student Account: Student should facilitate their clearance and student account before enrollment so that it will not delay them and they will not also delay others.
• OSS (Scholars Only): Scholars should facilitate their scholarship before enrollment. Sometimes it may take days to them to validate their card cause of many process to undergo.
• Miscellaneous Fee: Sometimes, pay all the fees coming from different organization like Local Council fee, Obrero Campus Student Council fee and collegiate headlight fee cause of delay of the student. I more convenient to assigned each student to each department to collect fees.
• Advising: Before doing these, you should accomplish the two mentions above, before going to this process and also you should completed your grades. And then they will give you a PRF.
• Encoding: After fill-up your PRF you should give it to the assigned person to your department. But looking the PRF and the COR, it is not consistent to the data.
• Student Account (Scholars Only): From all the process, it is the easiest because they just see your name if you are a scholars and stamp your card.
• Cashier: It is longest line among all cause only 3 and sometimes 2 cashier are available to accommodates different colleges with lots number of student.
• Registrar: It is also one of the most numbers of students waiting in this area. It is more convenient to assigned different staff in each department to different window.
All in all enrollment process should illustrate in this university should be complete and brief. Complete in terms of there should be a Library in the diagram so that student will not forget to validate their library card. It should brief and the words are easy to understand.
About Management Dynamics, Inc.
Management Dynamics is a leading provider of global trade management solutions that improve the performance of global supply chains for importers, exporters, logistics service providers, and carriers. The company's solutions synchronize the flow of information among trading partners, optimize supply chain execution decisions, and streamline import and export processes to ensure regulatory compliance and minimize cost and risk involved in cross-border transactions. Management Dynamics' time-proven solutions are used by more than 13,000 global users at some of the world's most successful 3PLs, carriers, manufacturers, retailers, and high technology companies.
Baker Hughes Selects Management Dynamics to Automate Trade Compliance.
EAST RUTHERFORD, N.J. -- Management Dynamics, a leading provider of global trade management solutions, today announced that Baker Hughes Incorporated (NYSE :BHI),a leading services provider to the worldwide oil and gas industry, has selected Management Dynamics' Global Trade Compliance solution suite to automate import and export compliance for shipping to over 70 countries as part of a corporate-wide commitment to compliance.
With an international distribution network, Baker Hughes is required to maintain ongoing compliance with both U.S. and foreign trade regulations. To accomplish this, Baker Hughes is planning a worldwide deployment to integrate Management Dynamics' Global Trade Compliance solution suite with its SAP enterprise resource planning system. system. Baker Hughes expects to take advantage of operational efficiencies such as minimizing human error and eliminating time-consuming manual tasks to allow its logistics team to spend more time on strategic initiatives.
After carefully evaluating its needs and several global trade management software applications on the market, Baker Hughes selected Management Dynamics. "Global trade content coverage, functionality, and scenario testing were some of the key factors pointing to Management Dynamics," said Bryan Schillinger, Senior Trade Director and Legal Counsel for Baker Hughes. "Management Dynamics had broad global trade content, and a demonstrated process for keeping it current. Its architecture reflected a true understanding of the needs faced by our trade practitioners. And when we asked some of the vendors to show how their software resolved various scenarios using sample data, Management Dynamics performed perfectly, even in scenarios that were designed to be difficult."
Management Dynamics' Trade Compliance Solution will meet Baker Hughes' key requirements for automating import and export compliance, including:
* Automation of many import and export processes across its worldwide enterprise;
* Integration with Baker Hughes' SAP ERP system, providing the scalability to accommodate hundreds of users and high transaction volumes with around-the-clock access; and
* Comprehensive, in-depth, up-to-date global trade content that covers all international business rules including tariff and contract rates, preferential duties and taxes for calculating total landed cost, import and export controls, harmonized system content, economic sanction screening, restricted parties lists and all trade documents required for cross-border commerce.
"Today, global companies have identified corporate compliance as a key initiative and an essential technology expense as compliance mandates continue to flourish," said Jim Preuninger, CEO of Management Dynamics. "Baker Hughes understands the urgency and is leading the oil and gas industry in the movement towards automating compliance on a global level."
Implementation of an ERP System
Implementing an ERP system in an organization is an extremely complex process. It takes lot of systematic planning, expert consultation and well structured approach. Due to its extensive scope it may even take years to implement in a large organization. Implementing an ERP system will eventually necessitate significant changes on staff and work processes. While it may seem practical for an in-house IT administration to head the project, it is commonly advised that special ERP implementation experts be consulted, since they are specially trained in deploying these kinds of systems.
Organizations generally use ERP vendors or consulting companies to implement their customized ERP system. There are three types of professional services that are provided when implementing an ERP system, they are Consulting, Customization and Support.
• Consulting Services - are responsible for the initial stages of ERP implementation where they help an organization go live with their new system, with product training, workflow, improve ERP's use in the specific organization, etc.
• Customization Services - work by extending the use of the new ERP system or changing its use by creating customized interfaces and/or underlying application code. While ERP systems are made for many core routines, there are still some needs that need to be built or customized for a particular organization.
• Support Services - include both support and maintenance of ERP systems. For instance, trouble shooting and assistance with ERP issues.
References:
http://encyclopedia.thefreedictionary.com/Baker+Hughes
http://www.thefreelibrary.com/Baker+Hughes+Selects+Management+Dynamics+to+Automate+Trade+Compliance.-a0161511170
http://www.topbits.com/erp.html
The information systems analyst assists a senior analyst or consultant in determining the feasibility of implementing new computer applications or upgrades. The information systems analyst meets with users to determine and assess user needs, and designs and tests applications and enhancements. The information systems analyst is also responsible for debugging applications and providing technical support and training to users. The information systems analyst will prepare technical documentation and procedural instructions for implementing systems software.
Characteristics that an Anlayst
Analyst is the most responsible person for the new system project management and therefore he should possess and behaves the following characteristics. The analyst should:
1. Knowledge of computer capabilities, systems analysis, data processing, and programming techniques.
2. Ability to interpret diagrammatic presentations of work flow, and prepare computer block diagrams and flow charts.
3. Pay intension to each and every single answer because each answer could generate many important questions related to problems of current system.
4. Identify and translate the problem of current system.
5. Generate the maximum solution of the problem.
6. Explain the logic of his solutions.
7. Learn from mistakes.
References:
http://www.flcourts.org/gen_public/employment/bin/infosystanalyst.pdf
http://www.about-knowledge.com/software-project-analysis-and-characteristics-of-an-analyst-and-types-of-analysis/
The model generally starts with a context diagram showing the system as a single process flowchart connected to external entities outside of the system boundary. This process explodes to a lower level DFD that divides the system into smaller parts and balances the flow of information between parent and child diagrams. Many diagram levels may be needed to express a complex system.
The Data Flow Diagram is an excellent communication tool for analysts to model processes and functional requirements. The analyst should be a critical thinker to use it effectively, it is a useful and easy to understand modeling tool. It has broad application and usability across most software development projects. It is easily integrated with data modeling, workflow modeling tools, and textual specs. Together with these, it provides analysts and developers with solid models and specs. Alone, however, it has limited usability. It is simple and easy to understand by users and can be easily extended and refined with further specification into a physical version for the design and development teams.
Purpose/Objective:
The purpose of data flow diagrams is to provide a semantic bridge between users and systems developers. The diagrams are:
•graphical, eliminating thousands of words;
•logical representations, modeling WHAT a system does, rather than physical models showing HOW it does it;
•hierarchical, showing systems at any level of detail; and
•jargonless, allowing user understanding and reviewing.
The goal of data flow diagramming is to have a commonly understood model of a system. The diagrams are the basis of structured systems analysis. Data flow diagrams are supported by other techniques of structured systems analysis such as data structure d iagrams, data dictionaries, and procedure-representing techniques such as decision tables, decision trees, and structured English.
Data flow diagrams have the objective of avoiding the cost of:
•user/developer misunderstanding of a system, resulting in a need to redo systems or in not using the system.
•having to start documentation from scratch when the physical system changes since the logical system, WHAT gets done, often remains the same when technology changes.
•systems inefficiencies because a system gets "computerized" before it gets "systematized".
•being unable to evaluate system project boundaries or degree of automation, resulting in a project of inappropriate scope.
Analyzing the Current Processes
Data flow analysis work is often difficult due to the sheer complexity of the processes involved. It is easy for the analyst to become overwhelmed. To prevent this, we use a two-step process to understand the situation:
•A focus on the physical data flows. This means observing the process as a savage would, with no focus on the logic behind, or information on, a particular piece of paper (or contained in a conversation or email).
•A focus on the conceptual data flows. This process can only begin after the physical data flow documentation is complete, since it analyzes the conceptual essentials behind the physical data flow.
Procedure
The procedure for producing a data flow diagram is to:
1. identify and list external entities providing inputs/receiving outputs from system;
2. identify and list inputs from/outputs to external entities;
3. create a context diagram with system at center and external entities sending and receiving data flows;
4. identify the business functions included within the system boundary;
5. identify the data connections between business functions;
6. confirm through personal contact sent data is received and vice-versa;
7. trace and record what happens to each of the data flows entering the system (data movement, data storage, data transformation/processing)
8. attempt to connect any diagram segments into a roughdraft;
9. verify all data flows have a source and destination;
10. verify data coming out of a data store goes in;
11. redraw to simplify--ponder and question result;
12. review with "informed";
13. explode and repeat above steps as needed.
Context Diagram Guidelines
Firstly, draw and name a single process box that represents the entire system. Next, identify and add the external entities that communicate directly with the process box. Do this by considering origin and destination of the resource flows and data flows. Finally, add the resource flows and data flows to the diagram.
In drawing the context diagram you should only be concerned with the most important information flows. These will be concerned with issues such as: how orders are received and checked, with providing good customer service and with the paying of invoices. Remember that no business process diagram is the definitive solution - there is no absolute right or wrong.
Reference:
http://www.edrawsoft.com/Data-Flow-Diagrams.php
http://spot.colorado.edu/~kozar/DFDtechnique.html
http://danang.files.wordpress.com/2006/07/8dfd.pdf
General Diagram- The general data flow diagram of the system.
Context Diagram- defines the scope of the system by identifying the system boundary.
Level-0 Diagram- describes the overall processing of the system.
References:
http://en.wikipedia.org/wiki/Data_flow_diagram
Now, there are more ways to communicate effectively. Students have a range of skills to express themselves not only through paper and pencil, but also audio, video, animation, design software as well as a host of new environments (e-mail, Web sites, message boards, blogs, streaming media, etc.).
Factors Facilitating Technology-Supported Education Change
• Authentic challenging tasks are best supported with flexible technology applications rather than with canned instructional programs.
• Having project-based, cooperative learning skills in place is important.
• Teachers need time to develop their own skills with technology.
• Easily available access to technical assistance is critical, especially in the early years.
• Schools need permission and support for innovations from the district, state, and federal levels.
• Using the technology tools of the professional community adds significance and cultural value to school tasks.
• Technology implementation provides a safe context for teachers to become learners again and to share their ideas about curriculum and method.
• Outside funding may be required to support the level of technical assistance and professional development opportunity needed to implement technology-supported education reform efforts.
1. Developing Plan
The first step in developing a technology plan is convening a planning committee or team to review the school-improvement plan already in place and research the district needs. In the case of USEP it is important to develop a plan in technology because technology continues to play an important role in modern industrial society, integrating technology into the schools will help prepare students to succeed in a rapidly changing world.
An effective team enlists educators but also takes advantage of the expertise of community members and the input of parents and students. Planning partners may include administrators, principals, teachers, district office representatives, parents, potential business partners, and a representative from the county office, regional agency, or department of education (Cradler, 1996). The specific organizational structures, committees, and membership may vary among schools that have integrated technology effectively, but the plan should be the result of input from educators and community members with knowledge, experience, and expectations of the role of technology in their school (Massachusetts Software Council, 1994). The support of key administrators and influential teachers is critical to the plan's implementation and success.
2. ICT Infrastructure Management
ICT Infrastructure Management processes recommend best practice for requirements analysis, planning, design, deployment and ongoing operations management and technical support of an ICT Infrastructure. ("ICT" is an acronym for "Information and Communication Technology".)
• ICT Design and Planning
From the word itself it defines the in designing and planning a specific process that fit to the organization. ICT Design and Planning provides a framework and approach for the Strategic and Technical Design and Planning of ICT infrastructures. It includes the necessary combination of business (and overall IS) strategy, with technical design and architecture.
• ICT Deployment
ICT Deployment provides a framework for the successful management of design, build, test and roll-out (deploy) projects within an overall ICT programme. It includes many project management disciplines in common with PRINCE2, but has a broader focus to include the necessary integration of Release Management and both functional and non functional testing.
• ICT Technical Support
ICT Technical Support is the specialist technical function for infrastructure within ICT. Primarily as a support to other processes, both in Infrastructure Management and Service Management.
3. RFID( as Student ID)
There is an especially effective technology that surrounds ID cards today and one that is slipping into greater use among companies and employers. This technology is called RFID, and the cards it powers are called ‘contactless smart cards.’
The technology behind the card is Radio frequency identification, or RFID. Wikipedia defines Radio-frequency identification (RFID)as an object (typically referred to as an RFID tag) applied to or incorporated into a product, animal, or person for the purpose of identification and tracking using radio waves. Some tags can be read from several meters away and beyond the line of sight of the reader.
RFID is a broad term that encompasses the span of technologies that use radio waves to automatically identify people or objects and work with a microchip to store information. The most common way of storing information is to store a serial number that identifies a person, object, or information on a microchip. The microchip is attached to an antenna and imbedded between the layers of the card. Information can be written, erased, and rewritten, and is stored on the microchip and transmitted by the antenna.
Instead of inserting your card into a card acceptor or scanning it through, all you have to do is passing within range of the radio frequency acceptor and you are done. You usually have to be within a few inches of the machine for it to operate, but it still saves a ton of time and headache. The greatest benefit of this card is its inherent security. Forging a card like RFID is very difficult and it greatly minimizes security risks. RFID cards can be used by anyone, and are most effective in every environment from the very large to the very small. Therefore, using this object as a student ID it will have a substantial impact to the university because it makes the lives of the student and faculty easier.
References:
http://www.nsba.org/sbot/toolkit/tnc.html
http://www.ncrel.org/sdrs/areas/issues/methods/technlgy/te300.htm
http://en.wikipedia.org/wiki/Information_Technology_Infrastructure_Library
http://www.associatedcontent.com/article/48795/rfid_id_card_overview.html
In past few years, the importance of the information systems and technology has changed and the need to manage IS/IT strategically has increased. Many organizations are looking at IS/IT and are concerned about obtaining acceptable rate of returns from the investments. They are concerned about meeting the current and future business requirements. These concerns require effective planning and management in the changing business environment.
The use of Strategic Information Systems Planning (SISP) process can address the concerns related with the implementation of IS/IT systems and provide communication between the IS/IT and the business function.
Information has emerged as an agent of integration and the enabler of new competitiveness for today’s enterprise in the global marketplace. Looking fast forward, if I were hired and have been tasked to develop a strategic information systems plan for a company and the company officers have extended an invitation for me to meet with them to discuss the direction of the company. Before this meeting, they have asked that you provide a list of questions with some explanation about the "why" of the question so they can be prepared, thus maximizing the output from this meeting.
These are list of questions you would ask the officers of the company and give an explanation and justification for each question.
Is strategic planning changed sufficiently to support the new role of information systems and technology?
The task of strategic information systems planning is difficult and often time organizations do not know how to do it. Strategic information systems planning is a major change for organizations, from planning for information systems based on users’ demands to those based on business strategy. Information-based enterprises must be planned in an integrated way whereby all stages of the life cycle are engaged to bring about agility, quality, and productivity. This integration is similar in nature to the integration of product life cycle for an enterprise.
What is IS/IT Strategy?
This question examines the capabilities of the company on how to deal with the company’s goals in fulfilling its business. Clarke (2005) defines strategic information system (SIS) as “an information system which supports an organization in fulfilling its business goals”. According to Ward and Peppard (2002), SIS functions in ways that are similar to data processing and management information systems, however, it is the impact it causes on the business due to the continual changes the enable or cause that makes the difference. SIS help improve business competitiveness by changing the way business is conducted.
What are the competitive advantages of SISP?
In a company it is important to know the competitive advantage of Strategic Information Plan, to know the capabilities, competencies and resources of the company to provide a distinct attraction to the customers of the company.
What strategy model is used for developing a IS plan?
Model is very important in a company because it helps the company to know the sequence of their plan. This question examines the process of the company and how they help them in improving the status of the company.
What is the effect of the implementation of IS Plan on the business?
The implementation of IS plan does impact the business activities. There is a certain effect on the business processes and the overall business. Their views on the effects of the implementation of the systems on the business processes and the overall business will be compared if there are improving our not.
What types of implementation in the systems is use (in-house or outsourced)?
Company needs a system that will cater their needs. Implementing the system needs a specialize person who will develop and maintain the system. This time outsourcing and in- house come. Outsourcing is a contracting transaction through which one company purchases services from another while keeping ownership and ultimate responsibility for the underlying processes. It occurs when the staffs of the company has no enough knowledge in the system. While, in- house is opposite to outsource, it often involves bringing the specialists person in the company to fill temporary needs or training existing personnel to perform tasks.
Reference:
http://www.coda.ac.nz/cgi/viewcontent.cgi?article=1000&context=unitec_scit_di
A use case is initiated by a user with a particular goal in mind, and completes successfully when that goal is satisfied. It describes the sequence of interactions between actors and the system necessary to deliver the service that satisfies the goal.Generally, use case steps are written in an easy-to-understand structured narrative using the vocabulary of the domain.
Actors:
Applicant – the aspiring person who wants to admit in the university.
UGTO In-charge – assists and evaluates applications of students and give them schedules and evaluates the result of the exam.
Cashier – collects payment
Examiner – any college faculty who conducts the exam
Interviewer- college faculty of the selected college who conducts the interview.
Clinic Staff– attending nurse or doctor in the clinic who does the medical check-up
Dean/Adviser – the college they want to enroll where students submit requirements if fully qualified to their collage.
Brief Description: