-Featuresthe tools offer that could be beneficial to use in the development
Identificationof specific activities and milestones: the tool can identify thespecific tasks to be completed in the process of project development.The tool also offers specific events that determine the beginning andthe end of different activities.
Determinationof proper sequence of activities: the tool enables the team member todetermine the various stages that the project will pass through byoutlining the sequences through which the project development wouldhappen.
Constructionof network diagram: After determination of the sequence, the toolenables drawing of a flow chart that gives the graphicalrepresentation of the various stages of the project development.
Estimationof time required: the tool also makes it possible for the players todetermine the time required by each task to be completedsuccessfully. – How do you think using them can reducecycle time and increase quality?By using the features namedabove, there would be an efficient matching of each task withappropriate resources like time. At the same time, the features ofthe tool give guidance on the development process so that the teammembers stay on the right track. In doing these, the features wouldreduce the time taken. Additionally, the features of the tool wouldensure that the final product of the project is that of high quality.-Difficulties that the intern might have in trying to developthe information system?The first greatest difficulty that theintern would face is the lack of adequate technical information.There is a lot of technical information required in developing aninformation system. As such, the intern would not be able to developthe system.
Anotherdifficulty would be the lack of previous experience. The process ofdeveloping any system is usually characterized by many setbacks thatcan be addressed by borrowing from previous experience. Due to lackof the previous experience, the intern would not be able to developthe system in the practical setting.
-What basic controls should be included in that system to guaranteethat learners are signed up for the classes theyrequest?AdministrativeControls: these are the policies, standard procedures and guidelineson how to use the system.
Technicalcontrols: These controls include access control mechanisms, securitydevices, configuration of set-up, and password management.
Physicalcontrol: These controls include control of access into the facilityor the various departments. Physical control also entailsenvironmental controls, locking of systems and erecting of perimeterin the facility. The facility in this case is the area where thesystem servers are contained.
-What security should be built-in in the system to check inappropriateuse of it?
Theuse of passwords should be incorporated in the system so as to ensurethat only authorized personnel can have access to the system. Thestudents should be able to create their own passwords which they canuse to access the system. At the same time, the systemsadministrators should have passwords that they can use to access thesystem.
Thesystem will contain personal information of the students. As such,the system should have firewalls that would prevent incidences of thesystem being corrupted. At the same time these firewalls would reduceinstances of hacking that usually leads to data theft. Thesefirewalls should always be up to date so as to continue providingprivacy to the users of the system.
Kim,D., & Solomon, M. G. (2013). Fundamentalsof information systems security.Jones & Bartlett Publishers.
Stair,R., & Reynolds, G. (2013). Principlesof information systems.Cengage Learning.
Ward,J., & Peppard, J. (2016). TheStrategic Management of : Building a DigitalStrategy.John Wiley & Sons.