home


 * Chapter final project questions**

‍**Chapter 1**

 * 1) //Investigate SCR's Internet site and learn about the company's history, purpose, and values. Send Jesse a brief memo with suggestions to expand or improve these sections**. (**// **Jeff Finch)** I found the website to be lacking a clear history, and just a brief company description. Also, there are some obvious grammatical issues such as proper capitalization, No clear difference in size of headings in relation to paragraphs, and an overall lack of completeness. Shelly Cashman's email is on every page and suggests that this company is a "one man show." I would improve on overall contrast of the site by adding clear and distinct headings followed by more in-depth coverage of all topics. I would improve on the grammatical aspects of the site. Finally I would move Shelly Cashman's contact information to the Contact Us Page only.

2. //On the SCR intranet, visit data, forms, and resource libraries and review a sample of the information in each library.//**(Mike Regge)** It contains:
 * Data Library –** The data library is a collection of data produced by the company.
 * A list of SCR’s positions and the people assigned to them
 * A chart of training records from two months from a sample of students
 * Results of a questionnaire for their training programs(includes the companies most popular courses and student ratings on how the classes were carried out.)
 * A summary of some of SCR’s financial statistics. (includes costs for company startup, costs for the first year of operations, and projected revenue.)
 * A map of SCR’s physical network layout
 * An excerpt from a company meeting


 * Forms Library –** The forms library is a collection of all of the company’s business forms. It includes a collection of word and excel document templates of all the forms SCR needs in order to carry out its day to day tasks.


 * Resources Library –** The resources library is a list of SCR’s tools. It contains links to websites of each of SCR’s resources such as search engine websites, and websites for financial information. It also includes websites for SCR’s news sources and websites for each of SCR’s programs such as antivirus software and SQL programs.

3. [|Chapter 1 Organization Chart.vsd] This is Very good 4. (A)IBM Global Business Services helps develop and continue to refine their customer value strategy. They offer business value, strategy and transformation, team analysis and optimization, and application innovation & management for their services. (B) Capgemini has a motto ("people matter, results count.") They are a big IT consulting firm in India and the services they provide include: outsourcing, technology, local professional, application lifecycle, and testing services. (C) Binary Semantics is a group of highly resilient people who absorb all your problems and convert them into meaningful business solutions. Some of their services include: application management, software testing, business intelligence, and website update & management.

This all looks good to me, any one else disagree? Jeff

‍Chapter 2
1.//We need a corporate goal for SCR that refers to our new training activity. Prepare a draft to show Jesse.// SCR will soon be able to offer itsclients the ability to educate themselves easily and expertly through the newTIMS system. TIMS will look to set the standard for comprehensive training and certification. TIMS will provide superior functionaltiy and ease of use.
 * //(//****//Jeff Finch)//**
 * T**he TIMS project offers industry leading training to our customers within six months. TIMS will include, but not be limited to.
 * __Tracking progress that includes students, teachers and instruction__
 * __Accounting of resources__
 * __certification documentation__
 * __Offer On-line registration__
 * __Track specific credits earned towards industry certification__

2. //Jesse wants my opinion on whether or not SCR needs a system review committee. Need to prepare a recommendation and reasons.// **(Mike Regge)** I think a systems review committee would be a great idea for SCR. A systems review committee would allow SCR to focus on more system requests with greater attention than just that of one person. SCR is a rapidly growing company and even if we have gotten by just fine with one person we will eventually need a committee in order to keep SCR’s needs under control, and it would be better to have one sooner rather than later. It could also open up SCR to some outside influences which may be different then someone who is already in the company which could translate into better ideas to improve company productivity.

3. **Project Scope** **–** The new SCR plans to open its own IT training center and will offer a wide variety of computer hardware and software. The new system will be called TIMS (Training Information Management System) this new system must support and meet SCR's requirements the specific constraints include:
 * Keeping track of courses, instructors, students, and grades.
 * Must be able to interface with the accounting system.
 * The system must be ready by the end of 2011.
 * In the near future the system must be able to support online course registrations.
 * Track credits earned towards IT industry certification requirements.

4. I have been asked to conduct interviews and come up with some questions to learn mre about our new training activity. Interview: Question:
 * The users who were trained on this course.
 * New users that would make honest opinion
 * IT staff who can help with ideas
 * Other companies who have used this course
 * 1) Have you taken course training for IT before? If so, where and when?
 * 2) Is our program easy to navigate?
 * 3) It is user friendly? If not, how can we make it better?
 * 4) What area of this course has the most interest to you?
 * 5) Which area of this course does not interest you at all?
 * 6) Was SCR's training program referred to you? If not, how did you find us?
 * 7) Is there anything we can do with this program to make it more convienent to you?

‍Chapter 3
1. Open Workbench is a tool well suited to SCR needs for this particlar project. The cons of this program are limited to compatiblity issues with Microsoft Project( the software can load MS project items, but MIcrosoft project can not be used edit items in open workbech) and the project must be large enough to be worth learning the software. The pros far out way the negatives, listed below are the pros of Open Workbench and some screen shots.
 * Track human, equipment, materials and expenseresources,
 * View Gantt Charts
 * Integrate with the Clarity System
 * Define Projects and create work breakdownstructures
 * Associate guidelines with tasks
 * Schedule tasks automatically
 * Create inter-project dependencies
 * Assign resources to tasks
 * Define and create project base-lines
 * Schedule to either general or individual calendars

As you can see Workbench is a very capable program with many features at no cost. I think this is an excellent oppotunity for us to cut cost on this project.

2. (**Michael Regge)** [|Chapter 3 Spreadsheet.xlsx] Elizabeth, I think you should copy the formula from the book and include your work. Spice it some, It looks a little simplified in its current state. Jeff

3.

4. Jesse has asked me to prepare a brief hand-out of some Do's and Don'ts regarding project management.

__**Do's-**__
 * **Make sure project is completed on time.**
 * **Keep and maintain the project within its required budget.**
 * **Deliver product that satisfies users and meets the requirements given.**
 * **Have and complete a check-list of the projects tasks listed from most important to least important.**
 * **The project tasks should each have a start and end time.**


 * __Don'ts-__**
 * **Don't go over the projects budget.**
 * **Do not take advantage of or slack on projects due time.**
 * **Do not deliver a product with no satisfactory to its users.**
 * **Do not panic is something goes wrong, just develop a new game plan.**
 * **If you have to cut of a task, make sure you cut one that is least important or not needed as much.**

1. Group managers said it was OK for their people to attend a three-day JAD session next week. Send a message to the JAD team members, with a brief explanation of JAD methods and a proposed agenda**.(Jeff Finch)** [SCR_Inbox_4-1]
 * Chapter 4 **


 * Date:**5/25/11
 * To:**Finch6999@rcc1862.net
 * From:**jefffinc@scrassociates.com
 * Subject:** JADsession

Greetings teammates, I have been asked to set up a JAD session for next week. The JAD technique is a user-orientated technique that is used for fact finding requirements modeling. Because it is not linked to aspecific development methodology it should be useful to in attain large amounts of input from the assembled team.High interaction will be required during this session.

The new JADteam will consist of Jill Martin, SandyWise, Amy Hawkins, Mark Martin, DaveSpencer, Meg Harris, Roy Brown, and myself. Listed below will be the agenda.


 * Project Leader || * Introduce all JAD members
 * Discuss ground rules, goals, and objectives
 * Explain methods of documentation and use of CASE tools, if any ||
 * Sandy Wise || * Explain the reason for the project and express top management authorization and support. ||
 * project leader || * Provide overview of the current system and proposed projects scope and constraints
 * Present outline of specific topics and issues to be investigated. ||
 * Open discussion session, moderated by project leader || * Review the main business processes, tasks, user roles, input, and output
 * Identity specific areas of agreement or disagreement
 * Break team into smaller groups to study specific issues and assign group leaders ||
 * Small group sessions || * Discuss and document all systems requirements
 * Develop models and prototypes ||
 * Group leaders || * Report on results and assigned tasks and topics
 * Present issues that should be addressed by the overall team ||
 * Open discussion session || * Review reports from small group sessions
 * Reach consensus on main issues
 * Document all topics ||
 * Project leader || * Present overall recap of the JAD session
 * Prepare report that will be sent to JAD team members ||

2. Questionnare (**Michael Regge)** _ __2. What new classes would you like to see offered at SCR in the future?__ _ _ _
 * 1) What field are you in?

3. Please rate each statement with a 1 – 5, 1 being very bad and 5 being excellent. Relevance of the course taken __Instructor__ Overall clarity of the course taken __Up to date content__ 4. What improvements would you suggest for your instructor?

5. What improvements would you suggest for any courses you have taken?

_ 6. Other Comments: _ _ _

1.Jesse wants to see an ERD, a context diagram, and a diagram 0 DFD for TIMS**.(jeff finch)**
 * 3. [[file:list of system requirements.docx]]**
 * 4. [[image:fdd_chart.png width="945" height="508"]]**
 * Chapter 5**
 * ERD﻿**
 * DIAGRAM 0**


 * CONTEXT DIAGRAM**

2.Need to review JAD session again! Try to identitfy four main TIMS functions and draw a lower-level DFD for each process.


 * Class Scheduling**
 * Payment Output**
 * [[image:Payment_Output.png width="800" height="500"]]**
 * Class Registration**
 * Classes Conducted**


 * 3.**
 * Date: 06/25/11**
 * To:** jesse_baker@scrassociates.com
 * From:** elizabeth_tamayo@scrassociates.com
 * Subject:** CASE tools

Hi Jesse,

Two additional CASE tools that we might want to examine are SIS Prealpha by IPrada and OpenRQ Planning by Abarreras.

SIS Prealpha by IPrada is a CASE tool that is designed to assist in tracking,testing,production,metrics,management,estimation, and development this software was just released in 2010 version 1.0. OpenRQ Planning by Abarreras is an open-source software requirements management CASE tool it features are bug tracking,patch tracking,support request and feature request this tool can be used to help create and better meet our project 2.0 is the most recent update version. Unfortunately none of these CASE tools have free demos available.

Sincerely, Elizabeth Tamayo


 * 4.**


 * || 1 || 2 || 3 || 4 || 5 || 6 || 7 || 8 ||
 * Employed by SCR || Y || Y || Y || N || N || N || Y || N ||
 * Second Enrollment || Y || N || Y || N || Y || N || N || Y ||
 * Waiver || Y || Y || N || N || N || Y || N || Y ||
 * Accept || X || X || X ||  ||   ||   ||   || X ||
 * Reject ||  ||   ||   || X || X || X || X ||   ||
 * || 1 || 2 || 3 || 4 || 5 || 6 || 7 || 8 ||
 * Employed by SCR || Y || Y || Y || N || N || N || Y || N ||
 * Second Enrollment || Y || N || Y || N || Y || N || N || Y ||
 * Waiver || - || - || - || N || - || Y || - || - ||
 * Accept || X || X || X ||  || X ||   || X || X ||
 * Reject ||  ||   ||   || X ||   || X ||   ||   ||


 * || 1 || 2 || 3 || 4 || 5 ||
 * Employed by SCR || Y || Y || N || N || N ||
 * Second Enrollment || Y || N || Y || N || N ||
 * Waiver || - || - || - || Y || N ||
 * Accept || X || X || X ||  ||   ||
 * Reject ||  ||   ||   || X || X ||

Y Discount Approved Employed by SCR Discount Approved N Y Y Discount Approved Second Enrollment N Waiver N No Discount

1.Determine whether vertical software packages exist for training operationsmanagement. Search the Internet and draft a message describing the results. Assumption: parameters ofvertical software were incomplete //** Vertical Software solutions **// is the leading edgesolutions provider for RIA (Rich Internet Applications), specializing for theareas of multimedia e-learning, product presentations and web basedconferencing. In addition, our company hosts product and service presentationportals for our customer and partner software products Ourservices and products, based on latest RIA and multimedia technologies enablecontent presentation on any consumer machine with modern Internet browser, on //Windows//,//Mac// and //Unix//, in most cases without any installation orconfiguration required from the end-user. All multi-media, chat and otherfunctionality is used directly from web page in a self-explanatory manner. Theonly case when user needs to install anything to his or her PC is when ourcustomer or partner would like to actually run their software on user machine,however even in this case the presentation goals are accomplished withoutrequirement for heavy-weight installation or modification of user registry. Theuse of our technology will give to our customers and partners the followingcompetitive advantages over many of other products in field for multiplereasons:
 * Chap 7**
 * (Jeff Finch)** I found that there are feasible softwarepackages available out there. Many are not clear as to what they can offer, butVertical Software solutions had clear content and expectable results here is a summary of their services. However,implementation of virtual presentation environments is not without challenges.Many companies have hard time adopting Rich Internet Applications for variousreasons such as technology learning curve, previous large investments to legacytechnologies, ability to commit resources to update content to the formatsuitable to be served online or difficulties to introduce feasible solution tosecure digital rights to content, protecting it against unauthorized use.
 * ability to present rich content in efficient and light-weight manner
 * requires no learning curve, minimal technical knowledge and in most cases zero commitment from the consumer (market research shows that many consumers reject any risky computer operations such as installation of specialized plugging)
 * our partners and customers do not need to develop or maintain custom installations on consumer machine, as our solutions use only server software, sandbox web applications and widely known plugins
 * it is safe to the consumer as in almost all cases presentations are performed in browser sand-box, not exposed to computer viruses and malware)
 * it protects our customer and partner content

2. (**Michael Regge)** Outsourcing the TIMS system: Application Service Providers Advantages Disadvantages
 * Uses the internet as a primary delivery channel making it easier for customers to access it worldwide.
 * It rents packages to customers avoiding development costs and takes less time.
 * Subscription fees can sometimes be costly
 * Merging the company could be problematic
 * By outsourcing to an ASP the solution can only be as good as the provider.

Internet Buisiness Services Advantages Disadvantages
 * Provides web based support for transactions
 * Has online data center support
 * Has universal access due to using the internet
 * Mainframe computing power for mission-critical functions
 * Must provide sensitive information to an external service provider
 * Can affect day-to-day operations differently

Overseas Outsourcing Advantages Disadvantages
 * Lower costs
 * Increased employee productivity
 * More space in current company buildings
 * Transportation Issues
 * Slow response time
 * Takes away jobs which could be bad for the economy
 * Quality Issues

//Prototyping// System prototyping shows a featured, working model of the information system, and design prototyping where user requirements are needed. When the sytem requirements are known they can start implementation of the prototype.
 * 3. [[file:TIMS System Chapter 7.docx]]**
 * 4.**

Output includes:
 * The system should report updates on new ideas and specifications from the users.
 * The site should report online statistics of the users, hourly and during peak periods.

Input Includes:
 * All users including students, programmers, employees, and technical support should have an ID number and identification name.
 * Grades must be entered on forms being well organized, to understand the process easier.

Process includes:
 * Records must calculate the current status of the trainee and its course.
 * Signing in and out of the site.

Performance includes:
 * The system should be able to support multiple users at a time.
 * Response time should not be delayed.
 * The system must be operational all year around.

Control includes:
 * Authorization should be asked at the moment of startup.
 * Certain levels of security should be seperated from users and administrators.

1. Create a detail report that will display all SCR courses in alphabetical order, with the course name and the instructor name in a group header; the Social Security number, name, and telephone number of each current student in the detail section; and the student count in a group footer. **(jeff finch)**
 * Chap 8**

2.
 * First the student or instructor would enter there ID and click find.


 * If the ID is a student then it would take them to this screen.
 * From here the student can view each class and its information by entering the course # for the class (only the information in the course # box is editable)
 * The student can also click on the add new course button at the bottom and it would add a new box to enter in another course number


 * If an instructor enters an ID it would take them to this screen
 * Here an Instructor has each of his classes assigned to a button at the top
 * When the Instructor clicks a button it will bring up the information for the corresponding class and they can add a new class by clicking the add class button.
 * The Instructor can enter each student in the boxes on the left and the grades for that student on the right, and can also add a student by clicking the add student button. (information in the student name and grade boxes are editable)

3. Data validation checks for data entry screens:
 * Sequence check - This should be used for data that has to be entered in an established sequence otherwise an error can occur.
 * Existence check - This should be used for mandatory data items this type of data will not allow to save a record until a proper value has been entered.
 * Data type check - This should be used to ensure that the data is of the right required type such as the numeric fields must only consist of numbers and alphabetic fields only consist of characters A - Z.
 * Range check - This should be used to test and verify that the data falls between a specific minimum and maximum value.
 * Reasonableness check - This should be used if the value entered seems unusual the system must then use this to verify the problem.
 * Validity check - This should be used when data items must have certain values.
 * Combination check - This should be used on two or more fields to ensure that they are compatible or reasonable.
 * Batch controls - This should be used for calculating this checks for missing records and also checks that totals are correct.

4.

SCR TIMS System Registration Form E625T154029 ID # _____

__Form # 2681 Date:___


 * Fill out all of the questions on the form then sign and date in the required section below.**

First Name: M: Last Name:

Address: __City:__ __Zip:__ _ Telephone # _ Secondary:_

Choose Interview Date: Time:


 * Tell us a little about yourself:**

__Applicants Signature:_____ Date:_______ __Approval:__ Date:_

//List all the entities that interact with the TIMS system. Start by reviewing the data library, previouse-mail messages, DFDs, and other documentation**.(jeff Finch)**// List of entities That interact with the tims system 2. Draw an ERD that shows cardinality relationships among the entities, Send the diagram to Jesse.
 * Chap 9**
 * Instructors
 * Students
 * Corporate clients
 * Course listings
 * Training administrator
 * Interfaces with accounting
 * Discount policies
 * SCR Employees/Students
 * Admistrative support group
 * Web design

3. INSTRUCTORS (__INSTRUCTOR-ID__, LAST-NAME, FIRST-NAME, ADDRESS, PHONE, EXTENSION-NUM) STUDENTS (__STUDENT-ID__, LAST-NAME, FIRST-NAME, ADDRESS, PHONE, E-MAIL,GPA, TOTAL CREDITS) COURSE (__COURSE-ID__, INSTRUCTOR-ID, COURSE NAME, DESCRIPTION, HOURS, PRICE,CREDITS) CORPORATE CLIENT (__CLIENT-ID__, LAST-NAME, FIRST-NAME, ADDRESS, PHONE, EXTENSION-NUM)

4.
 * Instructors Table ||  ||   ||   ||
 * InstructorID || 89 || 23 || 12 ||
 * LastName || Smith || Berry || Jackson ||
 * FirstName || Bill || Sam || Mary ||


 * Students Table ||  ||   ||   ||
 * StudentID || 25 || 48 || 16 ||
 * LastName || Erickson || Compton || Stackhouse ||
 * FirstName || Briana || Steve || Jason ||


 * Course Table ||  ||   ||   ||
 * CourseID || 001 || 008 || 004 ||
 * InstructorID || 12 || 89 || 23 ||
 * CourseName || 110 || 201 || 101 ||


 * Corporate Clients Table ||  ||   ||   ||
 * ClientID || 66 || 45 || 29 ||
 * LastName || Murray || Wesley || Brooks ||
 * FirstName || Todd || Michelle || Carrie ||


 * Chapter 11**

The environment for the actual system operation is called the operational environment. The environment that analysts and programmers use to develop and maintain programs is called test environment. A separate test environment is necessary to maintain system security and integrity and protect the operational environment. Installation process and evaluation tasks are performed for every information system project. Because network capability is critically important in a clients/server environment we must verify connectivity, specifications, and performance before installing any applications. We should check all communications features in the test environment carefully and check it again after loading the applications into the operation environment. The documentation should identify all network specifications and settings, including technical and operational requirements for communications hardware and software. If we have to build or upgrade network resources to support the new system we must test the platform strictly before system installation begins. When we implement the system it is essential to provide the right training for the right people at the right time. First step is identifying who should receive training and what training is needed. We must look carefully at our organization and how the system will support our business operations and who will be involved or affected.
 * 3.**


 * 4.** I am recommending a system changeover. The new system was developed, specialized, and predetermined for TIMS. I think that we should go with the pilot changeover method. I would be safe to test it out in one area, rather than lose all of our information we have already gathered. If it proves to be stable and up to our companies standards during the testing of it, we can then carry on to built it into the entire system of TIMS.

1.Jesse wants a recommendation about creating an SCR help desk. She said that I can find lots of information about help desks on the Internet**.(jeff Finch)****﻿** Jesse, I found that there are many company who provide software and support forhelp desk creation, but access to these features are limited before purchase.It is my feeling that we can create and manage a help desk with limitedinvestment and utilization of current resources. I was able to find a niceguideline to follow.
 * Chap 12**


 * 1) **Develop a Customer Care strategy**
 * 2) **2.Decidewho is your customer**:buyers of your products, your vendors, your suppliers, your employees, etc.
 * 3) **3.Decidehow you will support them**: what is the most common issue they have?
 * 4) **Thinkof possible things that can go wrong with your customer's order or servicefirst, write them down, write how you typically solve the problem**
 * 5) **Startkeeping track of your typical solutions**: start with FAQs and detailed ones as youencounter them
 * 6) **Onceyou have more then a dozen customers - get a Help Desk tracking software**. Start with free ones, like Google based [|helpdesk]. Ifyou have a PC or a web site server - [|download] and install the softwareon it. If you don't - subscribe for hosted access (they host it - you just useit)
 * 7) **KeepCustomers aware of your policies, put it online**
 * 8) **Itsa good idea to tell them how fast you resolve issues**. Go extra mile create Service Level Agreements(SLA).
 * 9) **Don'tbe afraid to send emails telling customers their problem is resolved**
 * 10) **Customeraccess** Must have an online customer care system withcustomer access, where they can register and see their own questions, FAQs, etc.
 * 11) **Acceptemails, chat, allow creating questions and cases online**
 * Gather Feedback and always follow up**
 * 2.** At our meeting Jesse asked me how SCR should manage the TIMS system in the future. I need to search the internet to learn more about, version control, configuration management, and capacity planning, and send her the results of my research.
 * 2.** At our meeting Jesse asked me how SCR should manage the TIMS system in the future. I need to search the internet to learn more about, version control, configuration management, and capacity planning, and send her the results of my research.


 * Version Control** - Version control is basically a way to keep all of the versions of piece of software under control. It’s basically a process of tracking every version that is released. Companies would do this for many reasons. One of which is redundancy; if a company tries out a new version that doesn’t work out they still have a way of rolling back to the old one. Another reason is just to keep tabs on what versions can interface with what particular version of a different program.


 * Configuration Management** – Configuration management is a way of keeping tabs on how the system requirements change during the development of software. This is important in case there are different versions of a piece of software running on one system. It also helps with documentation for software development.


 * Capacity Planning** – Capacity planning monitors current performance levels, and uses that data to estimate the amount of resources needed for future activity. This helps systems ability to adapt to changing environments. This is also useful for future management of the system in case something goes wrong.


 * 3. Six Levels of Security:**

__**Physical Security**__ __**Application Security**__ __** File Security**__ __**User Security**__ __**Procedural Security**__
 * Biometric scanning systems
 * keystroke logger
 * BIOS-level password
 * uninterruptible power supply (UPS)
 * Universal Security Slot (USS)
 * __Network Security__**
 * Private key encryption
 * Public key encryption
 * Wired Equivalent Privacy (WEP)
 * Wi-Fi Protected Access (WPA)
 * Virtual private networks (VPN)
 * Firewalls
 * Network intrusion detection system (NIDS)
 * Hardening
 * Application Permissions
 * Input Validation
 * Patches and Updates
 * Third-party software
 * Automatic update services
 * Software Logs
 * Permissions
 * User groups
 * Identity management
 * Password Protection
 * Social Engineering
 * Security tokens
 * Backups
 * Update Firewall software
 * Paper Shredders to destroy sensitive documentation

4. Jesse has asked me to provide a checklist of ways we can protect obsolescence from occuring at the last minute.


 * Do weekly updates on the system.
 * Provide frequent surveys to the users.
 * Run system checks.
 * Analyze and interrupt the performance statistics regularly.