case_study_1_crs_-_milestone_08_system_proposal

合集下载

LTE_3GPP_36.213-860(中文版)

LTE_3GPP_36.213-860(中文版)

3GPP
Release 8
3
3GPP TS 36.213 V8.6.0 (2009-03)
Contents
Foreword ...................................................................................................................................................... 5 1 2 3
Internet

Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media.
© 2009, 3GPP Organizational Partners (ARIB, ATIS, CCSA, ETSI, TTA, TTC). All rights reserved. UMTS™ is a Trade Mark of ETSI registered for the benefit of its members 3GPP™ is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners LTE™ is a Trade Mark of ETSI currently being registered for the benefit of i ts Members and of the 3GPP Organizational Partners GSM® and the GSM logo are registered and owned by the GSM Association

IBM SPSS Statistics Version 28 授权用户许可管理员指南说明书

IBM SPSS Statistics Version 28 授权用户许可管理员指南说明书
Installing the product on the local desktop computers..............................................................................1 Pushing an installation to Windows computers.....................................................................................2 Running a silent installation on macOS computers ..............................................................................6 Using licenseactivator............................................................................................................................ 6 License File............................................................................................................................................. 7
To push to the local desktops running Windows
Because IBM SPSS Statistics installations are compatible with Microsoft Windows Installer (MSI), you can push an installation to the end-user desktop computers.

(完整版)人工智能原理MOOC习题集及答案北京大学王文敏课件

(完整版)人工智能原理MOOC习题集及答案北京大学王文敏课件

正确答案:A、B 你选对了Quizzes for Chapter 11 单选(1 分)图灵测试旨在给予哪一种令人满意的操作定义得分/ 5 多选(1 分)选择下列计算机系统中属于人工智能的实例得分/总分总分A. W eb搜索引擎A. 人类思考B.超市条形码扫描器B. 人工智能C.声控电话菜单该题无法得分/1.00C.机器智能 1.00/1.00D.智能个人助理该题无法得分/1.00正确答案:A、D 你错选为C、DD.机器动作正确答案: C 你选对了6 多选(1 分)选择下列哪些是人工智能的研究领域得分/总分2 多选(1 分)选择以下关于人工智能概念的正确表述得分/总分A.人脸识别0.33/1.00A. 人工智能旨在创造智能机器该题无法得分/1.00B.专家系统0.33/1.00B. 人工智能是研究和构建在给定环境下表现良好的智能体程序该题无法得分/1.00C.图像理解C.人工智能将其定义为人类智能体的研究该题无法D.分布式计算得分/1.00正确答案:A、B、C 你错选为A、BD.人工智能是为了开发一类计算机使之能够完成通7 多选(1 分)考察人工智能(AI) 的一些应用,去发现目前下列哪些任务可以通过AI 来解决得分/总分常由人类所能做的事该题无法得分/1.00正确答案:A、B、D 你错选为A、B、C、DA.以竞技水平玩德州扑克游戏0.33/1.003 多选(1 分)如下学科哪些是人工智能的基础?得分/总分B.打一场像样的乒乓球比赛A. 经济学0.25/1.00C.在Web 上购买一周的食品杂货0.33/1.00B. 哲学0.25/1.00D.在市场上购买一周的食品杂货C.心理学0.25/1.00正确答案:A、B、C 你错选为A、CD.数学0.25/1.008 填空(1 分)理性指的是一个系统的属性,即在_________的环境下正确答案:A、B、C、D 你选对了做正确的事。

得分/总分正确答案:已知4 多选(1 分)下列陈述中哪些是描述强AI (通用AI )的正确答案?得1 单选(1 分)图灵测试旨在给予哪一种令人满意的操作定义得分/ 分/总分总分A. 指的是一种机器,具有将智能应用于任何问题的A.人类思考能力0.50/1.00B.人工智能B. 是经过适当编程的具有正确输入和输出的计算机,因此有与人类同样判断力的头脑0.50/1.00C.机器智能 1.00/1.00C.指的是一种机器,仅针对一个具体问题D.机器动作正确答案: C 你选对了D.其定义为无知觉的计算机智能,或专注于一个狭2 多选(1 分)选择以下关于人工智能概念的正确表述得分/总分窄任务的AIA. 人工智能旨在创造智能机器该题无法得分/1.00B.专家系统0.33/1.00B. 人工智能是研究和构建在给定环境下表现良好的C.图像理解智能体程序该题无法得分/1.00D.分布式计算C.人工智能将其定义为人类智能体的研究该题无法正确答案:A、B、C 你错选为A、B得分/1.00 7 多选(1 分)考察人工智能(AI) 的一些应用,去发现目前下列哪些任务可以通过AI 来解决得分/总分D.人工智能是为了开发一类计算机使之能够完成通A.以竞技水平玩德州扑克游戏0.33/1.00常由人类所能做的事该题无法得分/1.00正确答案:A、B、D 你错选为A、B、C、DB.打一场像样的乒乓球比赛3 多选(1 分)如下学科哪些是人工智能的基础?得分/总分C.在Web 上购买一周的食品杂货0.33/1.00A. 经济学0.25/1.00D.在市场上购买一周的食品杂货B. 哲学0.25/1.00正确答案:A、B、C 你错选为A、CC.心理学0.25/1.008 填空(1 分)理性指的是一个系统的属性,即在_________的环境下D.数学0.25/1.00 做正确的事。

CISA考试练习(习题卷8)

CISA考试练习(习题卷8)

CISA考试练习(习题卷8)第1部分:单项选择题,共100题,每题只有一个正确答案,多选或少选均不得分。

1.[单选题]下列哪一种行为是互联网上常见的攻击形式?A)查找软件设计错误B)猜测基于个人信息的口令C)突破门禁系统闯入安全场地D)种值特洛伊木马答案:D解析:2.[单选题]IS审计师应建议采取以下哪项措施来保护数据仓库中存储的特定敏感信息?A)实施列级和行级权限B)通过强密码增强用户身份认证C)将数据仓库组织成为特定主题的数据库D)记录用户对数据仓库的访问答案:A解析:选项A通过控制用户可访问的信息内容专门用于解决敏感数据问题。

列级安全性可防止用户查看表中的一个或多个属性。

而行级安全性则可对表中的某一组信息进行限制;例如,如果某个表中包含员工薪资的详细信息,则应适当加以限制,以确保用户无法在未经专门授权的情况下查看高级职员的薪资。

在关系数据库中,通过允许用户访问数据的逻辑表示而不是物理表,可以实现列级和行级安全性。

这种“细化”安全模型可在信息保护与支持各种分析和报告应用之间达到最佳平衡。

通过强密码增强用户身份认证是一种应对所有数据仓库用户实施的安全控制,而不应专门用于解决敏感数据保护问题。

将数据仓库组织成为特定主题的数据库可能是一种有效的做法,但实际上并不能充分保护敏感数据。

数据库级安全性通常过于“低级”,无法为信息提供有效且高效的保护。

例如,一个数据库可能包含员工薪资和客户收益率详细信息等信息,必须对这些信息加以限制;而对于其中包含的员工部门等其他信息,则允许大量用户进行合法访问。

将数据仓库组织成特定主题的数据库与选项B类似,因为通常也应用此控制。

审查包含敏感数据的表的访问权限时可能应更加仔细,如此控制在缺少选项A中所指定的强预防性控制时不足以保护相关信息。

3.[单选题]下列哪些组件,在入侵检测系统( ID、S )中负责收集数据 ?A)分析器B)管理控制台C)用户界面D)传感器答案:A解析:传感器负责收集数据。

计算机英语试题及答案

计算机英语试题及答案

计算机英语试题及答案一、选择题(每题2分,共20分)1. Which of the following is not a programming language?A. JavaB. C++C. PythonD. Photoshop2. What does CPU stand for?A. Central Processing UnitB. Central Power UnitC. Central Printing UnitD. Central Programming Unit3. What is the full form of HTML?A. Hyper Text Markup LanguageB. Hyper Text Markup LanguageC. Hyper Text Markup LanguageD. Hyper Text Markup Language4. In computer networking, what does IP stand for?A. Internet ProtocolB. Internet ProgrammingC. Internet ProviderD. Internet Processor5. What is the primary function of a router?A. To print documentsB. To store dataC. To connect multiple networksD. To provide internet access6. Which of the following is a type of database management system?A. MS WordB. MS ExcelC. MS AccessD. MS PowerPoint7. What does the acronym RAM stand for?A. Random Access MemoryB. Rapid Access MemoryC. Remote Access MemoryD. Real Access Memory8. What is the term for a collection of data stored in a computer in a structured format?A. FileB. DocumentC. DatabaseD. Folder9. Which of the following is not a type of computer virus?A. TrojanB. WormC. AntivirusD. Ransomware10. What does the term "bandwidth" refer to in the context ofinternet usage?A. The width of the cableB. The speed of data transferC. The number of usersD. The quality of the connection二、填空题(每题2分,共20分)1. The basic unit of data in computing is called a ________.2. A ________ is a type of software that is designed to prevent, detect, and remove malware.3. The process of converting data into a form that can be easily transmitted or stored is known as ________.4. A ________ is a hardware device that allows a computer to connect to a network.5. The term "cybersecurity" refers to the practice of protecting systems, networks, and programs from ________ and other types of cyber attacks.6. A ________ is a collection of related data and the way it is organized.7. The ________ is a type of computer memory that retains data even when the power is off.8. The process of finding and fixing errors in a program is known as ________.9. A ________ is a type of software that allows users to create and edit documents.10. The ________ is a set of rules that define how data is formatted, transmitted, and received.三、简答题(每题10分,共30分)1. Explain the difference between a server and a client in a network.2. Describe the role of an operating system in a computer system.3. What are the key components of a computer system?四、论述题(每题30分,共30分)1. Discuss the importance of data backup and recovery in a computer system.答案:一、选择题1. D2. A3. A4. A5. C6. C7. A8. C9. C10. B二、填空题1. bit2. Antivirus3. Encoding4. Network Interface Card (NIC)5. unauthorized access6. Database7. Hard disk8. Debugging9. Word processor10. Protocol三、简答题1. In a network, a server is a computer system or device that provides resources or services to other computers, known as clients. The server manages network traffic, centralizes data storage, and provides access to shared resources, while the client is a computer that requests and uses these resourcesor services.2. An operating system is the software that manages computer hardware, software resources, and provides services for computer programs. It acts as an intermediary between theuser and the computer hardware, allowing users to interactwith the computer without needing detailed knowledge of the hardware.3. The key components of a computer system include thecentral processing unit (CPU), memory (RAM), storage devices (hard disk, SSD), input devices (keyboard, mouse), output devices (monitor, printer), and peripheral devices (scanner, webcam).四、论述题1. Data backup and recovery are critical in a computer system because they ensure that data is preserved in case ofhardware failure, data loss, or cyber attacks. Regularbackups allow for the restoration of data to a previous state, minimizing downtime and potential loss of information. This process is essential for maintaining business continuity and protecting against data loss.。

CISA考试练习(习题卷13)

CISA考试练习(习题卷13)

CISA考试练习(习题卷13)说明:答案和解析在试卷最后第1部分:单项选择题,共100题,每题只有一个正确答案,多选或少选均不得分。

1.[单选题]在实施电子数据交换(EDI)程序项目时,下面那一项应该是被包括在项目可行性分析中?A)加密算法形式B)详细的内部控制流程C)必要的通讯协议D)推荐的可信任第三方协议2.[单选题]使用数字签名时,由谁计算消息摘要:A)仅由发送者B)仅由接收者。

C)由发送者和接收者。

D)由证书颁发机构(CA)。

3.[单选题]以下哪一项是判断事故严重级别的首要标准?A)业务影响B)恢复速度C)识别时间D)数据完整性4.[单选题]在人力资源(HR)审计期间,IS审计师被告知,IT与HR部门之间就期望的T服务级别达成一项口头协议。

在这种情况下,IS审计师首先应该做什么A)推迟审计,直至将协议记录在案。

B)将存在未记录的协议这一情况报告给高级管理层。

C)与两个部门确认协议的内容。

D)为两个部门起草一份服务等级协议(SLA)。

5.[单选题]对每个字符和每一帧都传输冗余信息,可以实现对错误的检测和校正,这种方法称为:A)回馈错误控制B)块求和校验C)转发错误控制D)循环冗余校验6.[单选题]组织实施一个新的系统以替代遗留的系统。

下面哪个转换方法产生了最大的风险?A)试点B)并行C)直接转换D)逐步实施7.[单选题]一家企业试图在整个信息生命周期中控制与存储介质相关的成本,同时仍然满足业务和法规要求。

以下哪一项是达成这一目标的最佳方式?A)实施数据保留政策B)将备份流式传输到云端C)执行定期磁带备份D)利用固态内存8.[单选题]IS审计师发现在一天的某些时段数据仓库的查询性能会明显降低。

以下哪项控制措施与其最为相关,需要IS审计师进行审查?A)永久性表空间分配B)提交和回滚控制C)用户假脱机和数据库限制控制D)日志的读写访问权限控制9.[单选题]應該首先審閱:A)IT基礎架構B)企業的管理政策、標准和流程C)法律和法規的要求D)企業的管理政策、標准和流程是否得到有效的執行10.[单选题]为了最好地实现IT项目组合与战略性的组织优先级的一致性,IS审计师应建议下列哪个选项A)为测量绩效定义一个平衡记分卡(BSC)B)考虑关键绩效指标(KPI)中的用户满意度C)根据业务效益和风险选择项目。

5 WHY -Problem Solving Process

5 WHY -Problem Solving Process

PRACTICAL PROBLEM SOLVINGIntroductionIn the Delphi organization, a common problem solving process is used to analyze and solve quality problems.There are four major parts of the process:∙ Grasp the Situation ∙ Cause Investigation ∙ Problem Correction∙ Prevention through Errorproofing♦ Grasp the SituationDuring the first part of the process, you: ∙ Identify the Problem ∙ Clarify the Problem∙ Locate the Point of Cause (PoC)♦ Cause InvestigationIn the second part of the process, you:∙ Conduct a “5-Why” investigation to identify the root cause▪ for the specific problem▪ for why the problem was not detected▪ for why the “system” allowed the problem to occur♦ Problem CorrectionIn the third part of the process, you:∙ Take specific action to correct the problem. At a minimum, short-term temporary measures are required to protect the customer.♦ Prevention Thru ErrorproofingIn the fourth part of the process, you:∙ Take specific action to make sure the problem cannot recur, typically through errorproofing∙Capture Lessons LearnedPRACTICAL PROBLEM SOLVING MODEL5 Why FunnelT I O N¯Root Cause¯Corrective Action¯Lessons LearnedBASIC STEPS OFPRACTICAL PROBLEM SOLVINGPart I – Grasp the Situation♦Step 1: Identify the ProblemIn the first step of the process, you become aware of a problem that may be large, vague, or complicated. You have some information, but do not have detailed facts.Ask:▪What do I know?♦Step 2: Clarify the ProblemThe next step in the process is to clarify the problem. To gain a more clearunderstanding, ask:▪What is actually happening?▪What should be happening?♦Step 3: Break Down the ProblemAt this point, break the problem down into smaller, individual elements, if necessary.▪What else do I know about the problem?▪Are there other sub-problems?♦Step 4: Locate the Point of Cause (PoC)Now, the focus is on locating the actual point of cause of the problem. You need to track back to see the point of cause first-hand. Ask:▪Where do I need to go?▪What do I need to see?▪Who might have information about the problem?♦Step 5: Grasp the Tendency of the ProblemTo grasp the tendency of the problem, ask:▪Who?▪Which?▪When?▪How often?▪How much?It is important to ask these questions before asking “Why?”Part II: Cause Investigation♦Step 6: Identify and confirm the direct cause of the abnormal occurrence.If the cause is visible, verify it. If the cause is not visible, consider potential causes and check the most likely causes. Confirm the direct cause based on fact. Ask: ▪Why is the problem occurring?▪Can I see the direct cause of the problem?▪If not, what do I suspect as potential causes?▪How can I check the most likely potential causes?▪How can I confirm the direct cause?♦Step 7: Use 5-Why investigation to build a chain of cause/effect relationships that lead to the root cause. Ask:▪Will addressing the direct cause prevent recurrence?▪If not, can I see the next level of cause?▪If not, what do I suspect as the next level of cause?▪How can I check and confirm the next level of cause?▪Will addressing this level of cause prevent recurrence?If not, continue asking “Why?” until you find the root cause.Stop at the cause that must be addressed to prevent recurrence. Ask:▪Have I found the root cause of the problem?▪Can I prevent recurrence by addressing this cause?▪Is this cause linked to the problem by a chain of cause/effect relationships that are based on fact?▪Does the chain pass the “therefore” test?▪If I ask “Why?” again, will I be into another problem?Be sure you have used 5-Why Investigation to answer these questions:▪Why did we have the problem?▪Why did the problem get to the customer?▪Why did our “system” allow it to occur?5 WHY CAUSE INVESTIGATIONStep 8: Take Specific Action to Address the ProblemUse temporary measures to eliminate the abnormal occurrence until the root cause can be addressed. Ask:▪Does it contain the problem until a permanent solution can be implemented?Implement corrective actions to address the root cause to prevent recurrence. Ask: ▪Does it prevent the problem?Follow-up and check results. Ask:▪Is the solution working?▪How do I know?PRACTICAL PROBLEM SOLVING CHECKLISTTo be sure you have followed the problem solving model, use this checklist as you complete the problem solving process.ACTIVITY:FLEX INDUSTRIES CASE STUDYDirections:▪Use the Delphi Problem Solving Process to evaluate the Flex Industries Case Study below and on the following pages. Review the 5-Why Investigation results on Page11.▪Use the worksheets on Pages 13 and 14 to record your work.▪Use only the information provided.▪Do not try to re-engineer the rivets or solve the technical problems in the case study.The purpose of this activity is to use the Problem Solving model to organize thegiven data.FLEX INDUSTRIES CASE STUDYBackgroundJake Ryan is the Quality Manager at Flex Industries. Flex is a component supplier that manufactures metal stampings and light assembly products. The company has a reputation for supplying high quality parts on a consistent basis. Seldom has there been a customer complaint. Flex has Quality representatives called Customer Support Engineers (CSE’s) at every customer assembly plant. The CSE’s report any problems to Jake for investigation and follow-up.At 7:00 a.m. this morning, Jake received a call from Janet, CSE at the Winding River Assembly Plant. Janet informed him that the customer had found five defective stabilizing brackets on second shift last night. She checked the remaining inventory and there were no defects in the remaining 326 pieces. The manufacturing sticker on the back of the brackets indicated that they were made by the second shift operator. Normally, the stabilizing bracket is fastened to the regulator motor with three rivets. The five defective brackets had only two rivets in them. The lower set of rivets on all five brackets was missing a rivet. This was the first time that the problem occurred.GOOD BADJake set-up containment procedures at the plant warehouse to sort for discrepant materials. As of this morning, two more defective brackets had been found in the remaining 2019 pieces of inventory at Flex.Cause InvestigationJake went out to the floor to talk with the team leader of the two rivet lines (East and West) and the area quality assurance auditor. He informed Sam (the team leader) of the quality problem and asked him to identify the line which runs the stabilizing bracket assembly. Sam directed Jake to the East line which runs Winding River assembly brackets only.At the East Line, he spoke with Judy (the QA Auditor for the area) and asked to see the quality log sheets. Jake and Judy reviewed the Nov. 11th log sheet and could not find anything out of the ordinary. He asked her to set-up in-house containment procedures to sort for any discrepant material in the finished goods area.Next, Jake tried to locate the second shift operator whose clock number was on the defective parts. Since that operator was gone, Jake spoke with the current machine operator (Ben). He asked Ben about any recent difficulties with the rivet machine. Ben said that he hadn’t noticed anything out of the ordinary. Ben also mentioned, however, that there had never been any quality bulletins posted in the two years that this particular part has been running.Jake decided to stay in the area to watch the machine run for a while. After about 15 minutes, he watched Ben dump rivets into the feeder bowl to prepare for the next run.Shortly after restarting rivet operations, Ben walked over to another riveter and came back with a steel rod. Ben poked around the rivet chute and then continued working. Jake approached Ben and asked him about the steel rod. Ben replied that from time to time the chute gets jammed and he has to clear it out. This happens two or three times during a shift. He didn’t mention this in his earlier conversation with Jake because the problem has existed ever since he started working with this machine. The previous operator showed him how to clear the chute. All the rivet machines are like this.Jake called the Machine Repair Department and asked that someone look at the rivet track. A slight gap in the track was found and removed, and Ben continued to work. Two hours later, Jake got a call from Ben saying that the track was still jamming. As far as Jake could see, only rivets were in the bowl. Next, Jake looked into the rivet supplier containers. There was some foreign material in the blue container, but none in the red container. The label on the blue container showed that it was from Ajax Rivet, Inc., and the label on the red container indicated that it was from Frank’s Fasteners. Obviously, the foreign material was entering the rivet feeder bowl and jamming the track.Jake called Maintenance and requested that the bowl be cleaned. He also added the cleaning operation to the preventive maintenance schedule on the equipment. He then called both Ajax Rivet, Inc. and Frank’s Fasteners. He asked about the cleaning procedures on the returnable containers. Frank’s did a full container purge and clean. Ajax just re-introduced the containers back into their system. When Jake asked why Ajax did not clean their containers, he was told that Ajax was not aware that such a policy was needed.Upon further investigation, Jake learned that Frank’s Fasteners supplies other major automotive companies. Since these companies require that all returnable containers be cleaned, Frank’s instituted the purge as part of its practice for all customers. Ajax Rivet, however, depends primarily on Flex as its major customer. No such policy has ever been required of them.and requested that a container maintenancepolicy be drafted which would apply to all theirsuppliers. He also asked that a machinemodification be developed to sense for thepresence of rivets. Hopefully, this would error-roof the process.5-WHY PROBLEM SOLVING PROCESS 5-Why Cause InvestigationReference No. _______________ (Spill, PR/R…) Date: ____________________Lessons Learned: 1. Make supplier part of APQP activities. 2. Make PFMEA’s comprehensive of entire systemPage 115-WHY PROBLEM SOLVING PROCESSDelphi 5-Why Template to be used for all 5-Why Investigations5-Why AnalysisReference No. __________ (Spill, PR/R…) Date: ____________________Page 125-WHY PROBLEM SOLVING PROCESSFLEX INDUSTRIES WORKSHEETGRASP THE SITUATION Activity (Step) Identify the problem What did they know? What did they do?Clarify the problemBreak down the problemLocate point of cause (geographic location) Grasp tendency of the problem (What questions are you asking?)Page 135-WHY PROBLEM SOLVING PROCESSCAUSE INVESTIGATION Activity (Step) Identify/confirm the direct cause Ask 5 Why’s to identify the specific root cause associated with the problem Ask 5 Why’s for why the problem was not detected and reached the Customer Ask 5 Why’s for why the “System” allowed it to happen Implement temporary measures to protect the Customer Implement corrective actions to prevent the problem from recurring Follow-up and check results What did they know? What did they do?Page 14。

学术论文指导 04讲 二手数据研究方法(物流班)

学术论文指导 04讲 二手数据研究方法(物流班)

---------------------------------------------------------------------------------------------------------------------
常见的二手数据类型
---------------------------------------------------------------------------------------------------------------------
•因此,总体而言,二手数据不是适合所有研究的实证方 式,需要作者根据研究问题、研究情境酌情使用。
-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
•全国29个省市自治区(除西藏重庆)的上述数据
•上述三组数据在《中国统计年鉴》中全部有呈现,都是 国家统计局逐年统计发布的数据,此外,统计年鉴还会 公布许多别的统计项目,非常齐全,感兴趣的同学可以 到学院图书馆查阅。可以做出非常有趣的研究出来。
-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

MILESTONE 8 – THE SYSTEM PROPOSAL
Synopsis
T
he purpose of the Decision Analysis Phase is to identify candidate solutions, analyze those
candidate solutions, and recommend a target system that will be designed and implemented.
Alternative solutions to be considered should be those that address the business requirements of
the information system.
In this milestone you will complete a Candidate Matrix. This matrix will include three alternative candidate solutions that you have determined will meet the business requirements for the Customer Response System. Some of the solutions you will consider may have been posed from the design ideas and opinions from the system owners and users. Others may come from various sources including: systems analysts, system designers, technical consultants, and other IS professionals. Some technical choices may be limited by a predefined, approved technology architecture provided by system managers. When completing the matrix, it is not your intent to evaluate the candidates at this point, only to identify and define them.
Objectives
After completing this milestone, you should be able to:
Identify candidate solutions that meet the requirements of the information system and document those solutions in a candidate matrix.
Prerequisites
Before starting this milestone the following topics should be covered:
1.Systems Analysis – Chapter 5
2.The System Proposal - Chapter 10
Assignment
Given the business requirements established in the Requirements Analysis Phase of systems analysis, you can now identify alternative candidate solutions.
Activities
plete a Candidate Matrix based on the standard workstation and server configuration defined in
the Case Study Introduction. Identify and document at least three solutions that could meet the
business requirements. Try to consider at least one “buy” candidate solution. Search the Internet for key words related to the system. You should be able to find a prepackaged system that supports some functions of the proposed system. Assume that Coastline Systems Consulting has the hardware listed in the Case Study Introduction. Make other assumptions where necessary.
Deliverable format and software to be used are according to your instructor’s specifications. Deliverables should be neatly packaged in a binder, separated with a tab divider labeled “Milestone 8” and accompanied with a Milestone Evaluation Sheet.
References:
All previous Milestones and Solutions
Provided by your instructor.
Templates
See on-line learning center website for the textbook.
Deliverables:
Candidate Matrix: Due: __/__/__
Time:_______
Milestone’s Point Value:_______。

相关文档
最新文档