Description
Reflect on Modules One through Ten. What were the biggest challenges on the project and how were they overcome? Which of the diagrams did you find most difficult to understand? Which diagrams did you find most helpful?
Review your discussion post from Module One on the role of a systems analyst. How has your understanding changed as we conclude the course? Would you want to be a systems analyst?
Unformatted Attachment Preview
System analyst
1. Initial post
2. 2. Peer 1 response
3. Peer 2 response
Running head: SYSTEM ANALYST
1
Student name
Modulator
Institution
Date
SYSTEM ANALYST
2
Initial post
The utmost responsible and comprehensive role that is taken by a “systems analyst” is
being “an agent of transformation or change.” Whether external or internal to an organization, a
systems analyst acts as a means of transformation every time he/she executes any actions in the
systems progress life cycle and are current and cooperating with the users of the system and the
organization as a whole for a while. An “agent of change” is referred to as an individual who acts
as a facilitator for transformation, creates a strategy for transformation, and works hand in hand
with others in expediting that transformation. As the systems analyst, one must realize that their
presence in that organization is to impart change. Therefore, one should interact with the
management and the system users from the start of the project. With the absence of their assistance,
it is hard to tell what support they need therefore change would not occur. If change appears
necessary after examination, developing a plan for transformation alongside the individuals who
must endorse the transformation is the next step. Once consent is grasped on the transformation to
be made, one should relate with the individuals that are changing. As an “agent of change,” a
system analyst advocates a specific avenue of change relating information systems usage. One also
shows users the change process, since alterations in the information system cannot take place
independently, but relatively root changes in the company as a whole.
SYSTEM ANALYST
3
References
System analyst. (n.d.). Springer Reference. doi:10.1007/springerreference_26250
SYSTEM ANALYST
4
Response for peer 1
I agree with your post. This is because a system analyst changes what needs to be changed
to suit the needs of the company. At some point, a system analyst is needed to modify the
company’s system based on the company’s needs which is the job of a technical architect or system
architect. A system architect interacts with the management and the users to know what hitches
are in the system and what needs to be improved. After knowing the problem, a plan is created to
help with making changes which are then effect5ivelluy implemented to improve or rather modify
the system.
Peer 2 response.
I agree with your post because since a system analyst interacts with as many people as
possible to know the hitches in the system, they must have excellent communication skills to
connect well with every user or manager in an organization. It would be very hard to know the
problem if you can’t connect with the system users. In the process, they act as a link between
programmers as operators. They realize the problem, design the system and train the users in order
to ensure the changes are well implemented from that moment onwards.
Purchase answer to see full attachment
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
You should ...
Completion Status:
100%
Review
Review
Anonymous
This is great! Exactly what I wanted.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
CPT 304 Ashford University Week 5 Operating System Blog Summary
The primary goal of the OS Theory Concept Map is to visually outline and make connections between the concepts of operatin ...
CPT 304 Ashford University Week 5 Operating System Blog Summary
The primary goal of the OS Theory Concept Map is to visually outline and make connections between the concepts of operating systems theory. You will build your concept maps incrementally each week as topics are introduced and discussed. In the final week, you will submit your completed concept maps to Waypoint and write a summary blog post to share what you have learned about operating systems theory during this course.Focus:You will develop an OS Theory Concept Map to answer this focus question: What are the fundamental concepts that underlie operating systems? You will more specifically address the following topics represented in the Course Learning Outcomes (CLO):Features and structure of contemporary operating systemsThreads and process synchronizationMemory managementFile systemsMass storageI/OSecurity and protectionAssignment Prompt:You will use your concept map to resolve this focus question: What are the fundamental concepts that underlie operating systems? Throughout the course, each week will include an assignment to build upon your existing concept map, adding nodes to represent the topics that were covered that week. You will link the related concepts to represent and explain their relationships.To begin your concept map, you willLabel the central node to rename it and start building your concept map from it.Logically arrange the essential concepts about operating systems theory into a hierarchy of nodes that branch from the main idea. Include cross-links where necessary to show relationships in different sections of the concept map.Use connecting nodes to accurately describe each relationship between topics that connect. Every neighboring pair of concepts should be linked by a word or phrase to form a short sentence. For example, to represent the idea that “Topic A causes Topic B, Topic C, and Topic D,” you will use a connecting node for the word “causes” in between Topic A and Topics B, C, and D, as shown in this screenshot.Section 1:You initially completed this section in your Week 1 interactive assignment. Review the instructions here and incorporate your peer and instructor feedback from the Week 1 interactive assignment in your final version of the concept map.In this section, you will begin your concept map by addressing each of the following topics concerning operating system features and structures:Categorize, describe, and give examples of the major functions of operating systems.Illustrate the hierarchy of subsystems, components, or subcomponents of operating systems and explain how they interact with one another.Section 1 about features and structures must have at least two nodes and at least seven connecting nodes.Section 2:You initially completed this section in your Week 2 interactive assignment. Review the instructions here and incorporate your peer and instructor feedback from the Week 2 interactive assignment in your final version of the concept map.In this section, continue building the concept map by addressing the following topics concerning how operating systems enable processes to share and exchange information:Describe process, process state, and process control block.Compare single- and multi-threaded motivations and models.Describe the critical-section problem and explain a software solution that resolves this problem. Section 2 about processes must have at least three nodes and four connecting nodes.Section 3:You initially completed this section in your Week 3 interactive assignment. Review the instructions here and incorporate your peer and instructor feedback from the Week 3 interactive assignment in your final version of the concept map.In this section, continue building the concept map by addressing the following topics concerning controlling and coordinating computer memory:Outline the objectives and functions of memory management in operating systems. (Resource: Leverage Figures 7.1, 7.2, 7.3, and 7.4 from the textbook.)Compare and contrast the physical address space with the virtual address space as they relate to different memory mapping techniques in operating systems.Section 3 about memory management must have at least two nodes and at least four connecting nodes.Section 4:You initially completed this section in your Week 4 interactive assignment. Review the instructions here and incorporate your peer and instructor feedback from the Week 4 interactive assignment in your final version of the concept map.In this section, continue building the concept map by addressing the following topics concerning files, mass storage, and I/O:Outline the objectives and functions of file systems management and the supported operations, including their reliability and performance.Contrast different directory structures and create unique diagrams to illustrate an example of each directory structure (similar to Figures 10.9, 10.10, 10.11, 10.12, and 10.13 in your textbook). Insert these images as nodes of your concept map. To create your diagrams, you can choose to use a graphics editing software (PowerPoint, Paint, PhotoShop, etc.), an online mapping software tool (draw.io), or even upload a photo of a hand-drawn sketch.Describe different types of input/output devices, distinguishing between the hardware and software layers and summarizing the integration across I/O and memory components.Section 4 about files, mass storage, and I/O must have at least three nodes and at least four connecting nodes.Section 5:You initially completed this section in your Week 5 interactive assignment. Review the instructions here and incorporate your peer and instructor feedback from the Week 5 interactive assignment in your final version of the concept map.In this section, continue building the concept map by addressing the following topics concerning mechanisms necessary to control the access of programs, processes, or users:Outline the goals and principles of domain- and language-based protection in a modern computer system, and describe how an access matrix is used to protect specific resources a process can access. (Consider using a matrix representation to illustrate concepts.)Describe how security is used to protect programs, systems, and networks from threats.Section 5 about protection and security must have at least 2 nodes and 3 connecting nodes.Summary Blog Post:This section will build on the work you completed in the Section 5 interactive assignment in Week 5. You must incorporate the peer and instructor feedback you received from your previous submission in Week 5 of your final version of the concept map.For the final section of your project, you will provide a summary blog post to share any new insights you have gained about operating systems theory throughout the course and to resolve this focus question: What are the fundamental concepts that underlie operating systems?Describe features of contemporary operating systems and their structures.Discuss how operating systems enable processes to share and exchange information.Explain how main memory and virtual memory can solve memory management issues.Explain how files, mass storage, and I/O are handled in a modern computer system.Outline the mechanisms necessary to control the access of programs or users to the resources defined by a computer system.Recommend how you will use these concepts about operating systems theory in future courses and/or future jobs.The Summary Blog PostMust be 600 to 900 words in length, (not including title and diagrams) and formatted according to APA style as outlined in the Ashford Writing Center (Links to an external site.).Must use at least five screenshot images to zoom in on sections of the concept map and illustrate your statements.
Program Assignment Assembly Language
Using the console32 framework, write a complete assembly
language program that computes in EAX the value of the expressio ...
Program Assignment Assembly Language
Using the console32 framework, write a complete assembly
language program that computes in EAX the value of the expression 2(-a + b - 1)
+ c for doublewords in memory at a, b and c. Choose your area code for a, the
first three digits of your local phone number for b and the last four digits of
your local phone number for c, and predict the result before building the
program and executing it under control of the debugger.Extra Credit - 10 pointsUsing the windows32
framework, create another program that does the same thing as the program above
with the following modifications: 1. Use the input macro to prompt for and input values for a,
b and c 2. Use the output macro to display an appropriate label and
he value of the expression 3. Also, use the data conversion macros from io.h as
appropriate.
3 pages
Cloud Computing Future In Business
In the future, cloud computing is bound to revolutionize my business niche, as it will foster the introduction of self-ser ...
Cloud Computing Future In Business
In the future, cloud computing is bound to revolutionize my business niche, as it will foster the introduction of self-service platforms, where ...
Senior Management Presentation, computer science homework help
You now have all of the information needed to develop the slide presentation that John requested for senior management. Th ...
Senior Management Presentation, computer science homework help
You now have all of the information needed to develop the slide presentation that John requested for senior management. The presentation should clearly explain current known weaknesses in organization’s security (to include people, technology, and policy) that could result in successful exploitation of known vulnerabilities and/or threats.Develop a narrated slide presentation of 16-20 slides that concludes with the recommended way forward (e.g., continue to accept risks, accept some risks (identify them), mitigate some risks (identify them), mitigate all risks, etc.).Submit your presentation for review when complete. Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them in your work.5.2: Examine architectural methodologies used in the design and development of information systems.6.2: Create an information security program and strategy, and maintain alignment of the two.7.2: Evaluate international cybersecurity policy.7.3: Evaluate enterprise cybersecurity policy.8.2: Evaluate specific cybersecurity threats and the combination of technologies and policies that can counter them.
Strayer University Configuring Access Control Lists on the ASA Firewall Discussion
Creative Breweries sends you to a training on how to configure access control lists on the ASA firewall. You learn that se ...
Strayer University Configuring Access Control Lists on the ASA Firewall Discussion
Creative Breweries sends you to a training on how to configure access control lists on the ASA firewall. You learn that setting up access lists within security zones provides a more simplified approach to standard and extended lists in which hundreds of entries are made and modified on the firewall. There are a myriad of access lists on the ASA, and you decide to replace them with access lists within zones, which will result in fewer entries and easier management of the lists in a secure network architecture.Analyze the above scenario and briefly explain the advantages of access lists within security zonesDescribe your approach to implement the changes needed in the scenario.
discussion board
1.Choose a firewall that is currently on the market and write a technical "sales pitch" to your classmates on why they sho ...
discussion board
1.Choose a firewall that is currently on the market and write a technical "sales pitch" to your classmates on why they should choose the firewall you are selling. 2.What are some of the rules you should follow with packet filtering firewalls? i need discussion for above contentreference and citations needed
Similar Content
System Reference Guide - Diagramming
For this week's assignment, create several
software architecture diagrams for your company's online sales website.
The...
Northwestern Polytechnic University New Technology That Affects Policy Process HW
Select one of the developments and describe how that development can influence policy to solve a specific problem.Develpom...
NAC Kali Linux Vm in A Virtual Box Environment Question
Use Kali Linux VM in a virtual box environment.1. Open the command prompt, and install pre-requisites: emu-kvm, libvirtYou...
TU Different Types of Cybersecurity Attacks Discussion
Identify and discuss different types of cybersecurity ...
Computer Science Question
You are a network administrator at XYZ, a large, publicly traded health care organization. Sean, your manager, has a new t...
One Page Discussion Board Post, IT Policies, computer science homework help
Pick one of the items below for your Main Post in this week's discussion forum:IT Policies have a definitive life cyc...
Innovation.edited 2
In the entrepreneurship world, there is a constant demand for new and better goods. This brings about the need for innovat...
Microsoft Active Directory Domain.edited
The active directory domain group policy contains various features that the network administrator can use to enforce and e...
4effectiveuseofbigdataanalyticsincropplanningtoincrease
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/329830355 Ef...
Related Tags
Book Guides
Cat on a Hot Tin Roof
by Tennessee Williams
The Metamorphosis
by Franz Kafka
Dr Jekyll And Mr Hyde
by Robert Louis Stevenson
The Da Vinci Code
by Dan Brown
Team of Vipers
by Cliff Sims
Big Little Lies
by Liane Moriarty
Flowers For Algernon
by Alice Walker
The Sun Is Also a Star
by Nicola Yoon
My Brilliant Friend
by Elena Ferrante
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
CPT 304 Ashford University Week 5 Operating System Blog Summary
The primary goal of the OS Theory Concept Map is to visually outline and make connections between the concepts of operatin ...
CPT 304 Ashford University Week 5 Operating System Blog Summary
The primary goal of the OS Theory Concept Map is to visually outline and make connections between the concepts of operating systems theory. You will build your concept maps incrementally each week as topics are introduced and discussed. In the final week, you will submit your completed concept maps to Waypoint and write a summary blog post to share what you have learned about operating systems theory during this course.Focus:You will develop an OS Theory Concept Map to answer this focus question: What are the fundamental concepts that underlie operating systems? You will more specifically address the following topics represented in the Course Learning Outcomes (CLO):Features and structure of contemporary operating systemsThreads and process synchronizationMemory managementFile systemsMass storageI/OSecurity and protectionAssignment Prompt:You will use your concept map to resolve this focus question: What are the fundamental concepts that underlie operating systems? Throughout the course, each week will include an assignment to build upon your existing concept map, adding nodes to represent the topics that were covered that week. You will link the related concepts to represent and explain their relationships.To begin your concept map, you willLabel the central node to rename it and start building your concept map from it.Logically arrange the essential concepts about operating systems theory into a hierarchy of nodes that branch from the main idea. Include cross-links where necessary to show relationships in different sections of the concept map.Use connecting nodes to accurately describe each relationship between topics that connect. Every neighboring pair of concepts should be linked by a word or phrase to form a short sentence. For example, to represent the idea that “Topic A causes Topic B, Topic C, and Topic D,” you will use a connecting node for the word “causes” in between Topic A and Topics B, C, and D, as shown in this screenshot.Section 1:You initially completed this section in your Week 1 interactive assignment. Review the instructions here and incorporate your peer and instructor feedback from the Week 1 interactive assignment in your final version of the concept map.In this section, you will begin your concept map by addressing each of the following topics concerning operating system features and structures:Categorize, describe, and give examples of the major functions of operating systems.Illustrate the hierarchy of subsystems, components, or subcomponents of operating systems and explain how they interact with one another.Section 1 about features and structures must have at least two nodes and at least seven connecting nodes.Section 2:You initially completed this section in your Week 2 interactive assignment. Review the instructions here and incorporate your peer and instructor feedback from the Week 2 interactive assignment in your final version of the concept map.In this section, continue building the concept map by addressing the following topics concerning how operating systems enable processes to share and exchange information:Describe process, process state, and process control block.Compare single- and multi-threaded motivations and models.Describe the critical-section problem and explain a software solution that resolves this problem. Section 2 about processes must have at least three nodes and four connecting nodes.Section 3:You initially completed this section in your Week 3 interactive assignment. Review the instructions here and incorporate your peer and instructor feedback from the Week 3 interactive assignment in your final version of the concept map.In this section, continue building the concept map by addressing the following topics concerning controlling and coordinating computer memory:Outline the objectives and functions of memory management in operating systems. (Resource: Leverage Figures 7.1, 7.2, 7.3, and 7.4 from the textbook.)Compare and contrast the physical address space with the virtual address space as they relate to different memory mapping techniques in operating systems.Section 3 about memory management must have at least two nodes and at least four connecting nodes.Section 4:You initially completed this section in your Week 4 interactive assignment. Review the instructions here and incorporate your peer and instructor feedback from the Week 4 interactive assignment in your final version of the concept map.In this section, continue building the concept map by addressing the following topics concerning files, mass storage, and I/O:Outline the objectives and functions of file systems management and the supported operations, including their reliability and performance.Contrast different directory structures and create unique diagrams to illustrate an example of each directory structure (similar to Figures 10.9, 10.10, 10.11, 10.12, and 10.13 in your textbook). Insert these images as nodes of your concept map. To create your diagrams, you can choose to use a graphics editing software (PowerPoint, Paint, PhotoShop, etc.), an online mapping software tool (draw.io), or even upload a photo of a hand-drawn sketch.Describe different types of input/output devices, distinguishing between the hardware and software layers and summarizing the integration across I/O and memory components.Section 4 about files, mass storage, and I/O must have at least three nodes and at least four connecting nodes.Section 5:You initially completed this section in your Week 5 interactive assignment. Review the instructions here and incorporate your peer and instructor feedback from the Week 5 interactive assignment in your final version of the concept map.In this section, continue building the concept map by addressing the following topics concerning mechanisms necessary to control the access of programs, processes, or users:Outline the goals and principles of domain- and language-based protection in a modern computer system, and describe how an access matrix is used to protect specific resources a process can access. (Consider using a matrix representation to illustrate concepts.)Describe how security is used to protect programs, systems, and networks from threats.Section 5 about protection and security must have at least 2 nodes and 3 connecting nodes.Summary Blog Post:This section will build on the work you completed in the Section 5 interactive assignment in Week 5. You must incorporate the peer and instructor feedback you received from your previous submission in Week 5 of your final version of the concept map.For the final section of your project, you will provide a summary blog post to share any new insights you have gained about operating systems theory throughout the course and to resolve this focus question: What are the fundamental concepts that underlie operating systems?Describe features of contemporary operating systems and their structures.Discuss how operating systems enable processes to share and exchange information.Explain how main memory and virtual memory can solve memory management issues.Explain how files, mass storage, and I/O are handled in a modern computer system.Outline the mechanisms necessary to control the access of programs or users to the resources defined by a computer system.Recommend how you will use these concepts about operating systems theory in future courses and/or future jobs.The Summary Blog PostMust be 600 to 900 words in length, (not including title and diagrams) and formatted according to APA style as outlined in the Ashford Writing Center (Links to an external site.).Must use at least five screenshot images to zoom in on sections of the concept map and illustrate your statements.
Program Assignment Assembly Language
Using the console32 framework, write a complete assembly
language program that computes in EAX the value of the expressio ...
Program Assignment Assembly Language
Using the console32 framework, write a complete assembly
language program that computes in EAX the value of the expression 2(-a + b - 1)
+ c for doublewords in memory at a, b and c. Choose your area code for a, the
first three digits of your local phone number for b and the last four digits of
your local phone number for c, and predict the result before building the
program and executing it under control of the debugger.Extra Credit - 10 pointsUsing the windows32
framework, create another program that does the same thing as the program above
with the following modifications: 1. Use the input macro to prompt for and input values for a,
b and c 2. Use the output macro to display an appropriate label and
he value of the expression 3. Also, use the data conversion macros from io.h as
appropriate.
3 pages
Cloud Computing Future In Business
In the future, cloud computing is bound to revolutionize my business niche, as it will foster the introduction of self-ser ...
Cloud Computing Future In Business
In the future, cloud computing is bound to revolutionize my business niche, as it will foster the introduction of self-service platforms, where ...
Senior Management Presentation, computer science homework help
You now have all of the information needed to develop the slide presentation that John requested for senior management. Th ...
Senior Management Presentation, computer science homework help
You now have all of the information needed to develop the slide presentation that John requested for senior management. The presentation should clearly explain current known weaknesses in organization’s security (to include people, technology, and policy) that could result in successful exploitation of known vulnerabilities and/or threats.Develop a narrated slide presentation of 16-20 slides that concludes with the recommended way forward (e.g., continue to accept risks, accept some risks (identify them), mitigate some risks (identify them), mitigate all risks, etc.).Submit your presentation for review when complete. Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them in your work.5.2: Examine architectural methodologies used in the design and development of information systems.6.2: Create an information security program and strategy, and maintain alignment of the two.7.2: Evaluate international cybersecurity policy.7.3: Evaluate enterprise cybersecurity policy.8.2: Evaluate specific cybersecurity threats and the combination of technologies and policies that can counter them.
Strayer University Configuring Access Control Lists on the ASA Firewall Discussion
Creative Breweries sends you to a training on how to configure access control lists on the ASA firewall. You learn that se ...
Strayer University Configuring Access Control Lists on the ASA Firewall Discussion
Creative Breweries sends you to a training on how to configure access control lists on the ASA firewall. You learn that setting up access lists within security zones provides a more simplified approach to standard and extended lists in which hundreds of entries are made and modified on the firewall. There are a myriad of access lists on the ASA, and you decide to replace them with access lists within zones, which will result in fewer entries and easier management of the lists in a secure network architecture.Analyze the above scenario and briefly explain the advantages of access lists within security zonesDescribe your approach to implement the changes needed in the scenario.
discussion board
1.Choose a firewall that is currently on the market and write a technical "sales pitch" to your classmates on why they sho ...
discussion board
1.Choose a firewall that is currently on the market and write a technical "sales pitch" to your classmates on why they should choose the firewall you are selling. 2.What are some of the rules you should follow with packet filtering firewalls? i need discussion for above contentreference and citations needed
Earn money selling
your Study Documents