2,042
21
Essay, 3 pages (550 words)

Hmmm

B.

Explain the Purpose of a feasibility study and describe the types of feasibility. A feasibility study is an evaluation of a proposal designed to determine the difficulty in carrying out a designated task. Generally, a feasibility study precedes technical development and project implementation. In other words, a feasibility study is an evaluation or analysis of the potential impact of a proposed project. Types of feasibility study include:* Technology and system feasibility – The assessment is based on an outline design of system requirements in terms of Input, Processes, Output, Fields, Programs, and Procedures.* Economic feasibility – Economic analysis is the most frequently used method for evaluating the effectiveness of a new system.

More commonly known as cost/benefit analysis, the procedure is to determine the benefits and savings that are expected from a candidate system and compare them with costs.* Legal feasibility – Determines whether the proposed system conflicts with legal requirements.* Operational feasibility – Operational feasibility is a measure of how well a proposed system solves the problems, and takes advantage of the opportunities identified during scope definition and how it satisfies the requirements identified in the requirements analysis phase of system development.* Schedule feasibility ??“ Determines whether the development will be set to a reachable logical date. C. Create a project plan for the in your face project and draw a gantt chart to match the project plan.

Identify and describe TWO transmission error-checking methods that could be used to help check for errors in ??? In Your Face Ltd??™s??™ communication links and explain how they work. The in your face could use the following two error check methods: 1)* Checksums ??“ is a modular arithmetic sum of message code words of a fixed word length (e. g. byte values). The sum may be negated by means of a ones-complement prior to transmission to detect errors resulting in all-zero messages. Checksum schemes include parity bits, check digits, and longitudinal redundancy checks.

Some checksum schemes, such as the Luhn algorithm and the Verhoeff algorithm, are specifically designed to detect errors commonly introduced by humans in writing down or remembering identification numbers. 2)* Cyclic redundancy check (CRC) ??“ single burst error detecting cyclic code and non-secure hash function designed to detect accidental changes to digital data in computer networks. It is characterized by specification of a so-called generator polynomial, which is used as the divisor in a polynomial long division over a finite field, taking the input data as the dividend, and where the remainder becomes the result. This would be advantageous for In Your Face LTD as it easily detects burst errors and are particularly easy to implement in hardware. Draw a data flow diagram for this communications system showing any of the main processes. Describe and explain how the technologies listed can be used to support the work of the project team: -Email ??“ Easy communication of huge sums of data instantaneously, also send hard copies of project work to specific individuals or the whole project team. -Web ??“ based file storage retrieval and document sharing ??“ Accessible information for the whole project team in case an individual were to lose a document or an individual from the team wishes to upload a document for the whole team to view or download that way nothing can be left out. -Internet discussion and chat facilities ??“ Live chat to discuss project development in its current state and expected time of completion -Teleconferencing (audio and video) – face to face live chat for the project plan to discuss current occurrences within the project the visual and audio element also allows for better explanation of an individuals point of view, argument or data.

Thank's for Your Vote!
Hmmm. Page 1
Hmmm. Page 2
Hmmm. Page 3
Hmmm. Page 4

This work, titled "Hmmm" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2021) 'Hmmm'. 22 December.

Reference

AssignBuster. (2021, December 22). Hmmm. Retrieved from https://assignbuster.com/hmmm/

References

AssignBuster. 2021. "Hmmm." December 22, 2021. https://assignbuster.com/hmmm/.

1. AssignBuster. "Hmmm." December 22, 2021. https://assignbuster.com/hmmm/.


Bibliography


AssignBuster. "Hmmm." December 22, 2021. https://assignbuster.com/hmmm/.

Work Cited

"Hmmm." AssignBuster, 22 Dec. 2021, assignbuster.com/hmmm/.

Get in Touch

Please, let us know if you have any ideas on improving Hmmm, or our service. We will be happy to hear what you think: [email protected]