Beruflich Dokumente
Kultur Dokumente
Bimodal IT refers to a two-tiered information technology operations model that allows not only IT systems to
be predictable, fast, and agile but to be stable as well. Gartner Inc. is the IT Consultancy that made Bimodal IT
came to success back in 2014. The two tiers include the Mode 1 which is sequential and traditional that put an
emphasis on accuracy and safety while Mode 2 emphasizes on speed and agility thus it is nonlinear and
exploratory.
2. In IT/IS, a context diagram is used to display the way technological systems relates to its particular
environment. It is the highest level in a data flow such that in the entire system only one process is represented
but when split, it gives greater detail of each system. Not only all major data flow to and fro are shown on the
context diagram but all external entities. There is no data storage in a context diagram. There is also what is
termed as diagram 0 where the single process in the context-level diagram represents the entire system.
3. A Data Flow Diagram (DFD) is an IT within a system that its information is represented in a traditional way.
Graphically, a clear and neat DFD often depicts the good amount of the system requirements. DFD0 can be
automated, manual or a combination of the two. In addition, DFD0 shows how information in the system enters
and leaves as well as where the information is stored and changed. In this regards, DFD0 has the purpose to
show both the boundaries and the scope of a system as a whole. It also plays a role in redesigning a system thus
important in the communication process.
4. Use case diagram refers to a type of behavioral UML diagram that is frequently used in various systems
analyses. Here, an IS/IT user will visualize different role in a particular system and how those sets of roles
interact within and within the system. In this regards, a use case system represents an action or a function within
a given IT system, a reason why it is always drawn in an oval way and named with the function.
5. Logical/Physical data models are models in information technology that sets the relationships between data
elements in a structure. It adds information into the conceptual model elements. To form a physical model base,
the model has a primary advantage of providing a generic foundation that normalizes the system processes. This
is why the Database Management System (DBMS) is designed and developed independently.
6. Database schema refers to a process where an IT database is organized and structured. Database schema
contains schema objects which include columns, tables, views, data types, and relationships, foreign and
primary keys. It can also be represented in a visual diagram showing the relationship between different database
objects.
7. A type of flowchart showing how entities such as objects, people or concepts relate to each other within the
IS/IT system is termed as an Entity Relationship (ER) Diagram. Their use in most cases is to debug, sketch, and
design relational database in software engineering fields, education, business information systems, and even in
research. By defining the entities, showing their relationships as well as their attributes, an ER diagram also
shows the databases logical structure.
8. There are one or more columns in the primary key whose data are contained within and are used to identify
each row in the table. Some think of the primary key as an address. Rows can be unique in the primary key
when the key is composed of multiple columns. This is why there are several conditions that the primary key
must hold true. First, no columns value can be NULL or blank and secondly the columns itself must be unique.
9. In a database, normalization refers to the process of organizing data in an efficient manner. Normalization
process has got two primary objectives; to eliminate redundant data and to there is a sense in all data
dependencies. As a result, the two are essential as they are there to ensure that data is logically stored and the
amount of space a database consumes are reduced. Larger tables are divided into smaller through normalization
process, and then they are linked using relationships.
10. Usability as far as the IT/IS is concerned refers to learnability and the ease to use a human-made object such as
a device like a computer or a tool. In software engineering, the degree to which particular software can be used
to achieve objectives with efficiency, effectiveness, memorability, errors, and satisfaction in a quantified
manner is what makes up usability. Other attributes that makeup usability includes a utility that primarily refers
to functionality to the design. When the two are combined, they determine something very useful in information
technology and systems as well. IT features should also be easy and pleasant when they are in use to best
explain usability.
11. A rich client application refers to an application that has got many desktop application software
characteristics. A rich client application is typically delivered by way of a browser plug-in, site-specific
browser, virtual machine, and through the use of JavaScript. Rich web applications use the current standard
termed as HTML5 to allow a user to make use of IT interactive features such as WYSIWYG editing, drag, and
drop, and background menu.
12. A rich Internet application (RIA) refers to web applications that are associated with the desktop applications
designed to deliver the same function and the same features. RIA locates the user interface by relating the
client’s capability and activity as well as operation and manipulation on the application server side. RIA in most
cases runs inside a web browser and on the client's side to work, it doesn't require installation of software.
13. Relation: Relation, as used in, IS refers to the relationships created and existing in relational database tables
primarily to store and split data in different tables.
14. Functional dependency: A functional dependency as relational database theory puts it is a constraint that often
appears between attributes of two sets in a relation from a database. Therefore, attributes in a relation are what
is referred to as functional dependency.
15. Foreign key: A foreign key as used in the contextual relational databases refers to a field that identifies a row
of the same table or another table in one table and in a unique way. In short, it is the second table though it can
also refer to a unique key or the primary key in the first table.
16. Referential integrity: Referential integrity is defined as a valid data property in the relationship databases
context based on its references. It implies that in the relational database, references and its value must exist.
17. Field: Field, as used in computer science, refers to subdivided parts of data basically referred to as records. It is
in each record that we have several fields that end up forming the columns.
18. Data type: Data type in computer programming and computer science refers to data attribute that helps notify
the interpreter or the compiler of how data is supposed or intended to be used by a programmer.
19. Null value: A missing value in a database context is what refers to as a null value. It appears blank but it is
quite different from the field that contains spaces in it.
20. Denormalization: Denormalization refers to a strategy that is used on a database that has been in use and
normalized previously primarily to increase the overall database performance. It is all about trying to add
redundant data copies or simply grouping data together.
21. File organization: The act of storing database files and keeping them in a logical manner is what is termed as a
file organization. These files which have been stored and kept together gives logical relationships among
various file records and it is a gate pass that users easily use to access the files at any specific time.
22. Index: In the database, the index refers to database performance optimization which is always arrived at by
ensuring that access to disks is minimized more so when the processing of a query is going on. It is all about
data structuring greatly helping in locating and accessing the data in a database table.
23. Secondary key: A secondary key refers to a field that allows a user to work on searches in a faster manner, a
reason why there should be more than one secondary key in a table for a secondary key to be functional.
Therefore, it is for faster searching when compared to the primary key.
24. Internet Development: Internet development refers to the systematic evolution of a wide area networking to
allow data sharing and connection from one computer to others and from user to users.
25. Medium & platform choices: Medium and platform choices refer to the systems through which data are
transferred from one source to another.
26. Big data and provide an example: Big data is a term used to refer to large, unstructured, and structured
volumes of data described in a business setting based on the day-to-day basis and operation. All in all, what
matters is not the large volumes of data but how organizations utilize and use that particular data. Good
examples of big data include structured, semi-structured, and unstructured data.
27. Blockchain: Blockchain is the most recent and trending technology that carries out economic or financial
transactions in an incorruptible digital ledger and cannot only record the transactions, but it can virtually
program it as well.
28. Virtualization: Virtualization, as used in computing, refers to rather than creating actual versions of something,
virtual versions such as computer network resources, hardware platforms, and virtual storage devices.
29. Cloud: Cloud, as used in computing or computer systems, refers to sharing computing resources compared to
when personal devices or local servers could have been left to handle applications. Its primary role is to take
cloud services outside the firewall of an organization and store them so that it can be accessed via the Web.
30. Digital Twin: Digital twin refers to not only physical assets replica, but a replica of the systems, people,
processes, places, and devices primarily used in various technological reasons or purposes.
Short Answered Questions
In what ways are the priorities of CIOs are changing regarding systems development? Briefly discuss
two such aspects.
The first way that CIOs are changing as far as systems development is on its concern on optimizing Business
Process Management (BPM) to help make an enterprise more efficient and effective. Priorities of CIOs are also
changing regarding systems development as they play a very important role in making the right decisions that
are long-term in IT and IS applications. As a result, organizational design and management have been made
easy and possible for the business to achieve its ultimate goals in systems development. In this regards, business
value and strategic planning in business growth have ensured CIOs have fully integrated information systems in
their businesses.
What characterizes today’s IS development environment? Name a few and briefly explain each.
Today's IS development environment is characterized by three concepts or three-server tiers namely;
development server, staging server, and production server.
Development server tier characteristic: Here tests codes and checks are tested by the developer to check whether
all applications are successfully running with that particular code. After development server tier has proved to
be working, it goes to the second characteristic, the staging server tier.
Staging server tier characteristic: In the staging server tier characteristic, the environment is made to look
exactly like that that characterizes the production server environment. Staging server sees application being
tested and confirmed if it is ready to be deployed on a production server. This characteristic indicates that the
application needs to be approved.
Production server tier characteristic: After approval is done, the server now takes in the application thus
becoming its part.
Discuss two technologies significantly impacting how systems are developed.
The two technologies that are significantly impacting how systems are developed include the Internet of Things
(IoT) and the Blockchain. To begin with the Internet of Things, a lot of sensors have been connected and
continues to be connected to the internet. Business has been transformed and resources have been effectively
managed as a result of the IoT. Information is shared through the connected connectors. For instance, there are
now self-driving vehicles as a result of this new technology thus preventing accidents by the greatest
percentage. On the other hand, the blockchain technology is now becoming part and parcel of us in today's
world. In the blockchain, transactions are done digitally through the use of virtual currencies termed as
cryptocurrencies. One of the good examples of cryptocurrency is bitcoin. Besides, the process is highly secured
and there are no central banks or intermediaries in the course of transactions.
Your client looked at a proposal and asked the difference between DFD0s and use case diagrams.
Explain a few differences highlighting some pros and cons of each.
Differences between the DFD0s and the Use Case Diagram
1. Whereas the use case diagram specifies all externally visible system behavior, DFD0s Iis a system where
information is represented.
2. DFD0s is usually complex thus showing every information in details while a use case diagram is usually
simple and does not show in detail all the user cases.
3. A use case diagram summarizes the relationship between actors, use cases, and systems while the DFD0s
depicts the good amount of the system requirements in full details.
4. DFD0s is concrete as it can create a specific scenario in showing how information enters and leaves a system
while a use case diagram may either be a concrete use case or an abstract use case.
There are various data-related managerial issues for end-users and CIOs. First, there is a new security
threat. There must be extra vigilance among the CIOs when it comes to both the training and detection against
these threats. For instance, companies have to introduce AI-based protection systems in this new-gen tech so
that any such attacks can be contained. The second issue is multi-cloud security. Across multiple platforms,
CIOs need to ask about security when exploring new cloud-based services. The aspect will become fundamental
in ensuring completeness and consistency of securing all the company-wide assets. The third issue is digital and
innovation transformation. Many CIOs and companies have to speed up their digital transformation so that they
cannot face losing their businesses to their competitors. The fourth issue is the lack of agility. Most companies
or organizations are failing to incorporate agile methods such that they end up limping in their business’s
operations and processes. Other issues include; outsourcing risks, rebuilding trust, finding new streams of
revenues, skills gap, and data protection.
What are the general guidelines for usability of forms and reports?
There are several general guidelines for usability of forms and reports. They include;
a. Keep it short- Usability of forms and reports should be short by eliminating unnecessary fields.
b. Use logical sequencing- In fields, forms and reports, stick to standard sequence.
c. Distinguish required and optional fields- This is a guideline that is highly recommended, and it is done by
eliminating as many optional fields as possible.
d. Explaining any formatting and input requirements- In this guideline, stating the exact instructions is highly
prioritized.
e. Avoid clear and reset buttons- It is a guideline that helps a lot in avoiding accidental clicks, for instance, in
the financial information field.
f. Provide highly specific-error and visible messages- In usability and through a variety of cues, errors should be
signaled. This will ensure that users do not only overlook critical information but will put a heavier font on
specific errors associated with usability.
1. Clear navigation- A user needs to identify a clearly marked system and be able to easily look at your
homepage. Users must not be told where to navigate because this should be clearly defined.
2. Design without thought- Keeping the user behind your back when designing your landing page or a website
is of great importance. Don't make your users feel overwhelmed by designing something that is complicated and
complex thus, make it simple.
3. Well written content- Content is important for usability more so when it is made concise and clear for the
user to understand what a specific site provides.
a. The database designer role on small projects possibly in addition to other roles may be performed by a senior
developer.
b. The database designer role on large projects may have a team of database specialists assigned to him or her.
c. The database designer role in some organizations may be assigned to administration group or a central
database management member that supports multiple projects.
d. By finer-grained roles, it is the duty of an organization to choose to replace these roles such as logical data
modeling role left to a data analyst.
e. Database designer’s role should ideally be involved in the project requirements reviews, analyze its relevant
system features, and set out to work on work in systems development.
1. They control the company's database development to ensure that authorized users access only vital data
information.
2. In regard to corporate needs, they customize database solutions more so when they work closely with the IS
managers.
3. Database administrators also oversee any database administration technical aspect such as upgrading software
and debugging code.
5. They secure organizational data to ensure that they are error-free and efficient functioning.
8. Database administrators create new user permissions and conduct performance tuning support.
MS Access is considered a personal database system whereas MS SQL Server is a backend database
system for enterprise applications. In what ways are they different in terms of architecture and
functions?
2. Differences between MS Access and MS SQL Server in terms of functions and architecture include:
1. In the technical side, MS Access has much lower specifications than MS SQL Server. For instance, whereas
there is a maximum size of 2 gigabytes in Access databases, there are maximum sizes of 524,272 terabytes in
SQL Server databases with 16 terabytes as the maximum data file size.
2. A maximum limit of 32,767 concurrent users’ connections in SQL Server while just a maximum of a limit of
255 simultaneous users in an Access 2016 database.
3. It is easy for non-technical users to use MS Access in performing various tasks such as in its wizards, its
forms, and in its macros than complexity it is to perform the same tasks in MS SQL Servers.
4. For those whose time, inclination or money to use an enterprise level RDBMS is limited, MS Access will
work best and is ideal for them.
5. Building a database as well as creating an interface in Access primarily to run reports and enter data is easy in
Access even to non-technical persons but with SQL Server, there must be a need to have another technology
and even new skills to make it in the process.
6. There are more advanced features in SQL Server such as more granular security features that are not
available in MS Access.
7. MS Access has poor scalability than MS SQL Server with a much better of scalability.
a. In data entry screens, fields contain default values to show the field length and appropriate structure of the
data.
b. The interface should be compatible when a task involves source documents e.g. paper form with its
characteristics.
d. The entries desired are clearly explained by the field labels on forms.
e. The right length for the expected answer is contained in the text boxes on forms.
f. On the forms, there is a clear distinction between optimal and required fields.
g. The same form works for both registration and logging in as with the case with Amazon
h. If external information is required, forms pre-warn the user for its completion.
i. Group headings must be based on how questions on the forms are logically grouped.
j. The expected output is demonstrated by the fields on forms containing examples, hints, or model answers.
k. Questions must be clearly stated in a simple language based on the field labels on forms.
l. Radio buttons, pull-down menus, and checkboxes are used on forms but in text entry fields preferences.
m. Where the input is needed alongside data entry screens, place the cursor.
n. Data formats are clearly indicated for output such as units of values and inputs such as dates.
p. In the form field, a user can just change default values anytime.
1. Delayed input- Often, this occurs when data entry has caught users off-guard or during busy scheduled or
periods. Or it can be caused when a lot of time was taken to put data first into the paperwork before transferring
it into the system. Here, essential information such as acronyms can be easily forgotten by the time they come
to be entered.
2. Poorly designed forms- The quality of data entry depends on the way forms have been designed irrespective
of whether digital or paper. Therefore, inconsistent and unclear field descriptions in most cases lead to poorly
designed forms.
3. Information in the wrong field- This is a human-related error also arising when a user is in a hurry feeding the
data entry, the accidentally enter data in a wrong field. If it goes unnoticed, the final data will not be consistent
and accurate. Hence, users must engage in user-error messages to help them reduce this risk since they can be
warned when they are entering unintended data in a particular field.
4. Lazy estimates- Rather than calculating an accurate figure, users tend to make an estimate instead. The results
will not only be significantly skewed but it will affect the accuracy more so when estimates are used sparingly.
The first trend is that IS development project must meet business agile. This means that several industries
including finance, marketing, and construction must adopt agile development framework to improve overall higher
return on investment (ROI), improves communication, and makes teams even more adaptive to technological
changes. By meeting business agile, the IS project management must adhere to some of these key principles;
customer satisfaction, changing environments, close collaboration of developers and stakeholders, continuous and
rapid IS delivery and simplicity element of the project. These principles must be ensured for the overall success of
the current IS development projects. (Stair & Reynolds, 2017).
The second key trend is focusing on rapid IT service or simply a change in IT culture more so in the
system-oriented approach and context. This particular trend is significant in enhancing collaboration between IS
development teams and operations (Rocha, Adeli, Reis, & Costanzo, 2018). Equally important, the trend utilizes
technological implementations as it put a lot of emphasis on people and culture thus, leveraging an increasingly
dynamic and programmable infrastructure from the IS life cycle perspective. When the teams have that self-
organization, there are high chances of the best designs and architecture to be developed which in return will help a
lot in meeting the requirements of the current IS development projects. Besides and to improve efficiency, teams use
regular intervals through fine-tuning their behaviors to best fit the needs of the projects.
The third key trend is associated with information system cultural war that continues to rock the world of
IT and IS. The market implications as respondents to Gartner’s survey indicates shows that this trend is so
interesting in that diversity initiatives is absent among many business IT and marketing sectors. Irrespective of the
cultural war between various IS development projects, many industries are now using the systems that they are
flexible with when developing not only the products but services too. The overall methodology during the process
employs a more efficient and highly collaborative nature of the methodology. As a result, this particular trend is
trickling in from the political and business community climate.
Fourth, the combination of artificial intelligence (AI) and the Internet of Things (IoT) trend is shaping the
current IS development projects. Today, this trend combines into a powerhouse of actionable information thus
having an ability to change how the project management is effectuated. In this regards, some of the IS development
projects activities that artificial intelligence are designed for include planning, speech recognition, problem-solving,
and lastly the learning process. This is why it is becoming simple today to work on any IS project because of the
help of IoT and artificial intelligence primarily in these four key areas. (Stair & Reynolds, 2017).
Apart from this trend bringing about lots of dramatic changes in IS development projects, the last trend- the
new face of millennial continues to rock the current technology evolution by replacing the traditional project
management systems and programs. These millennial who are between the age bracket of 14 and 36 years old in
2018 are not only innovative but transformative in the information systems development projects (Stair & Reynolds,
2017).
How do you propose agile approach and scrum board on general a process of this development
project?
To propose a scrum board and agile approach of this development project, I'll have to handle the project in
short iterations to allow for engineering and business flexibility. This is because the primary idea of the two
is to continuously deliver value to customers, a reason why scrum is mostly used and applied for complex
projects that are long-term and requires this kind of flexibility.
Describe steps/phases with what you would specifically do?
Regarding the steps or phases that I would specifically do in connection with this development
project, the following steps are applicable;
Step 1: Set workshops with stakeholders to form product vision and product backlog.
Step 2: Invite the involved stakeholders to organized scrum meetings.
Step 3: Avoid breaking the existing teams.
Step 4: Avoid at all costs neglecting team building.
Step 5: Literally, I’ll try as much as possible to practice stand-ups.
Step 6: When working with remote areas, I will have to set communication guidelines in order.
The detailed user-system interaction for purchase in 7-10 steps in words?
Step 1: Identify the system's stakeholder classes or individual stakeholders before making a purchase.
Step2: Elicit stakeholder's needs, expectations, and perceived constrained of the new system life-cycle.
Step 3: Analyze the system's operation in its intended environment using scenarios.
Step 4: Identify and analyze the context of the use of the system before making a purchase.
Step 5: Identify the interaction between the purchased system and the users.
Step 6: Express the stakeholder's requirements correctly once the purchase of the user-system has been
made.
Step 7: Each function should be defined to check its performance and how well the system, as well as its
operators, is needed to perform that particular function.
Step 8: Technical and quality in use should be defined and measured to enable technical achievement and
assessment.
What are the key differences in using MS Access and SQL Server at firm?
Structured Query Language (SQL) was created in the 1970s as a computer programming language working
with relational databases. Besides, SQL provides a lot of heavy-duty work infrastructure, thus expensive
and in most cases is a rival for high-end databases such as Oracle Database Server. It's difficult to learn but
once mastered it can ease many of the firm's operations. SQL also uses Transact-SQL and its maximum
database is 4GB.
On the other hand, Microsoft Access is a relatively cheap and small database system. It has a database
engine that is lousy but optimized to handle many things. Besides, it can create excellent reports and
applications based on the fact that it has an excellent set of tools. The only challenge is that it cannot handle
anything heavy such as engaging simultaneous users at once. MS Access is simple and easy to learn and
easy to build in. MS Access uses Jet SQL with a maximum file size of 2GB.
The two have similarities too. First, both are written by Microsoft and both are relational DMS (Database
Management Systems).
Hands-on experience on the differences between MS Access and SQL Server and what is different
between them?
Choosing between SQL and the MS Access is should be directly proportional to the database to save data
as well as fetch certain records. In hands-on experience, there are some very good reasons as to why you
should not use MS Access in some cases since, with the fact that they are suitable for desktop use, only
small number of users can simultaneously access it. One only chooses it primarily for sharing or
compatibility. On the contrary, MS SQL Server is a more bigger and robust database management system
that is designed to accommodate thousands of users at once and at any point in time. SQL Server is
therefore perfect and suited for database driven websites hosting.
What are managerial implications and provide example?
In terms of the user system, the actions and results are summarized by managerial implications. It compares
the user results to the action standards and indicates both non-action and action of what should be taken in
response. In addition, managerial implications should put the focus on the provided evidence in the report
rather than just putting weight on how results should be implemented. For example, the managerial
implication may identify the timeliness and quality of the data.
What are business database designs?
Business database designs are defined as the process through which businesses use database models to
organize all its data. In the process, the database designer determines how the data, as well as its elements,
can be stored and interrelated. Having such important information at hand, the business database designers
then classify and identify interrelationships through the process termed as ontology (theoretical
representation of business database design).
What are current designs challenges regarding user interface and usability?
The challenge of user-interface design and usability is when it comes to construction of the natural dialog
sequence allowing the computer and the user in a particular task exchange the messages. Another challenge
comes when there is a variation from user to user and from system to system in the user interfaces. This
makes understandability and usability of the software application difficult to be used among the users.
Other challenges include;
- The inability of the UI designers to ensure that products usability, pretty, and accessibility are in order.
- Connection or site breakages.
- The necessity and usage of the two (usability and user interface) sometimes are blown out of proportion.
- Tedious and dead-boring task shifting the focus from one user to another.
- Communication clash between the database designers and users or clients.
What are the business outcomes the customer is trying to accomplish, and by when?
The customer is trying to accomplish a target architecture business that was created some few years ago so
that they can stop guessing the future. Doing so will not distract them from their original goal of trying to
implement the system, a reason why these business outcomes are scheduled to take a minimum of two
years. As a result, customers will put their efforts in not only promising projects but by investing in
winning teams.
How quickly will new functionality need to be released?
The new functionality needs to be released when collaboration and editing have been finalized so that team
members cannot only discuss projects but share the files as well. Besides, once the forms housing a website
and delivering data directly to a database has been built, then the new functionality needs to be released.
This is why most of the platforms associated with the online database software have with them the
advanced reporting capabilities.
What level of availability and other operational requirements are required at the start?
The level of availability and other operational requirements are required at the start when all associated
requirements, essential capabilities, and performance measures have been identified. Here, the series or the
process of actions to be carried out in making the results effective must address the mission area deficiencies of
the new database or emerging technologies. Other operational requirements are system cost improvements and
evolving threats and applications.
____________________________________________