Essay Questions

Spread the love

1.The objective of a systems design encompasses the building of a system that is reliable, effective as well as maintainable. In this case, the development of a reliable system makes it possible for it to handle, errors, input as well as hardware/human failures. The successful design implies making certain that it is maintainable, flexible, scalable furthermore modular. The effectiveness of a system implies that it can support business requirements and can adapt to requirements of the user. System design establishes a discipline that is integrated engineering plan for the projected design, comprehends the technical risks, examines the trade-offs, and consideration of the estimates for performance in addition to the cost of completion. There are four chief documentation products that normally result from the system design phase and encompass the system design Proposal which involves the establishment of the scope of work, WBS along with the cost estimate for the successful completion of the system design phase (Shelly & Rosenblatt, p 334, 2011).

Systems Engineering Management Plan (SMEP) as the second component describes the managing processes that are going to be employed throughout the innovative instrument development project.  The elements that addressed in the SEMP include the assessment of the staff as well as the organization. There additionally is the establishment of the roles and responsibilities, the assessment of the project workflow, the development of the decision-making process and the formulation of the reporting and documentation requirements.

System Design Manual as the third component of the SMEP establishes the extent of work for the residual design phases moreover describes how the technical along with scientific difficulties of the instrument requirements are addressed. The system design manual encompasses the description of the functional necessities along with relating them to the system requirements. Offers an indication of the chosen design approach, enumerates the architecture, and offers an indication of the technology drivers along with research needs. It addition presents an error budget, offers the comprehensive risk analysis and finally establishes the framework that is employed in the execution of the remaining design phases.  The last component is the system Design Report and offers a summary of the work that is accomplished in the system design phase furthermore presents the initial approximation of performance for the instrument. It additionally offers estimate of the work plan for the opening design phase furthermore an estimation of cost and schedule to completion (Shelly & Rosenblatt, p 334, 2011)

  1. The business case has an immediate impact on the assessment of whether the project is approved or not. The business case is presented for the period of the commencement phase of a project. Devoid of a superior business case, the project may not even be accepted, which an assessment is of how closely related they are. Some the core concepts that are presented in the scale of the project are derived from the business case, with the core elements encompassing the executive summary, scope, costs, stakeholder accountabilities, benefits along with many other sections (Remenyi & Sherwood-Smith, pp 11-13, 2012). The assessment offers an insight into why a poor business case possibly will result in problems during the approval of the project. The key players in the on the issue of the development, as well as presentation of the business case, include the stakeholders, executive summary, assessments, project execution team, cost, and time budget.
  2. The network server is vital in the efforts of the client to connect the different facets of the business, facilitating the development of a shared point of access. Through the development of the network server, the client will be in a position to enjoy the shared storage and consequently manage to run centralized applications such as accessing the customer database without having to move physically to the client server. The designing of the network server is further made in a manner that aids the end users, who encompass the clients to access the diverse resources the business is offering as songs, files, video collection as well as other services that are accessible from the central computer known as the server (Gaspar, Bierman, Kolari, Hise & Smith, p 618, 2005). The only job that the server plays is undertaking just what the name implies, serving the needs of the business and their clients.
  3. ISO entails a non-governmental organization that was established in the year 1947. Its mission is the promotion as well as the development of standardization and related activities in the world with the objective of facilitating the global exchange of goods furthermore services, and to develop cooperation in the spheres of intellectual, technological scientific, moreover economic activity. The intention of ISO is the provision of a model that will be employed in the establishment, implementation, operating, reviewing, supervising, maintaining, along with improving an Information Security Management Systems (Wasson, p 278, 2015). In the case of the system developers, it ensures that they uphold all the internationally accepted principles and codes of conduct to ensure that the systems and products that the developers design pass the international assessment of standard regarding quality, sustainability, and use.
  4. The concept of risk management encompasses the identification of the potential tribulations previous to they occur so that risk-handling activities could be planned and consequently invoked as necessary across the life of the product. It is additionally implemented to assist the project to alleviate unfavorable impacts on attaining the objectives. Risk management encompasses a process that is the continuous and forward-looking process that is an imperative fraction of business along with scientific management processes. Risk management should be able to address issues that might endanger attainment of the significant objectives (Fraser, Simkins & Narvaez, p 247, 2014). A continuous risk management approach is applied to anticipate effectively and mitigate the risks that have a critical effect on the project.

The effective risk management encompasses early moreover aggressive risk recognition through the collaboration along with the participation of relevant stakeholders. The strong management across all pertinent stakeholders is necessary for the establishment of an environment that promotes the free and open revelation and discussion of risk (Fraser, Simkins & Narvaez, p 247, 2014). Success management of risks is dependent on the identification, assessment as well as controlling the risks. The identification of risks, in this case, encompasses the assessment of each project area and work with the sole objective of determining all the risks that are inherent to the project. The assessment of the risk encompasses the examination of the diverse that has been identified to understand the nature of the risk, encompassing the harm that could result from the risk, the severity and the likelihood that it is going to occur (Fraser, Simkins & Narvaez, p, 247, 2014). Risk control as the last component of the risk management concept encompasses the implementation of measures that are going to eliminate the risk and where elimination is not possible; control measures are implemented to ameliorate the impact of the risks.


Fraser, J. Simkins, B. & Narvaez, K.  (2014). Implementing Enterprise Risk Management: Case Studies and Best Practices. John Wiley & Sons.

Gaspar, J., Bierman, L., Kolari, J., Hise, R., L. Smith, M. (2005). Introduction to Business. Cengage Learning.

Remenyi, D. & Sherwood-Smith, M. (2012). IT Investment: Making a Business Case.  Pp 10-12 Routledge

Shelly G. & Rosenblatt, H. (2011).  Systems Analysis and Design. Cengage Learning.

Wasson, C. (2015). System Engineering Analysis, Design, and Development: Concepts, Principles.  John Wiley & Sons.

© 2021:, All Rights Reserved | Innovation Theme by: D5 Creation | Powered by: WordPress
error: Content is protected !!
Whatsapp Us