1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrew11 [14]
3 years ago
10

System Architecture: Describe the system architecture. Specifically, be sure to address the corporate organization and culture,

enterprise resource planning, total cost of ownership, scalability, integration and interface requirements, and security.
Computers and Technology
1 answer:
alekssr [168]3 years ago
7 0

Answer:

Explanation:

In information technology, architecture plays a major role in the aspects of business modernization, IT transformation, software development, as well as other major initiatives within the enterprise. IT architecture is used to implement an efficient, flexible, and high quality technology solution for a business problem, and is classified into three different categories: enterprise architecture, solution architecture and system architecture. Each of these classifications varies in their implementation and design, depending on the contextual business scope, organization structure, and corporate culture.

Architecture Level

Architecture level represents the scope boundary and granularity of details the architectural activity should take, based on organization hierarchy and communication audience.

  • Enterprise Architecture (Company level) aligns technological strategies and execution plans with business visions and objectives by providing architectural oversight and guidance. Enterprise architecture also drives consolidation, reuse, and economy of scale by addressing company-wide goals in a holistic way across all IT projects.
  • Solution Architecture (Department level) models a solution vision that defines the IT systems, business processes and reusable services for a specific business unit, spanning across business and technology architectures.
  • System Architecture (Team level) defines the structure of an information system in terms of various subsystem components and their relationships with internal and external systems. System architecture focuses on application, data, and technology, and is called software architecture in some organizations.

Before making decision regarding system architecture the designer must consider the following points:

  • Corporate organization and culture: System architecture must study day-to-day functions of business and users in order to understand corporate organization and culture. This will help in focusing on operational feasibility which will help in deciding other checklist items.
  • Enterprise resource planning (ERP): Most of the organization use ERP software these days and it is important for the analyst to understand the compatibility of the ERP which is used to the proposed system.
  • Total cost of ownership (TCO): System analyst must try to get solutions of different questions which helps in finding initial cost and cost which may add up during the development, which is total cost of ownership. This is most important at this will determine total cost and budget of system.
  • Scalability: Determining system ability to expand or downsize according to business requirements.
  • Security: What security system and policy needs to be implemented.
You might be interested in
What is a characteristic of a wan hub-and-spoke topology?
olga nikolaevna [1]

The characteristic of the WAN hub and spoke topology is that it is considered to be a branch site or composed of the branch site in which they are likely to be connected to a site that is central and that is through the point to point links.

8 0
2 years ago
Helen is having a meeting with her colleagues in her company. They are working on the goals and objectives for the coming year.
bekas [8.4K]
<span> Get assistance from </span>colleagues<span> when </span>your <span>relationship with the employee threatens </span>your objectivity. <span>A performance appraisal </span>meeting<span> should be a two way </span>process<span>.</span>
4 0
2 years ago
Read 2 more answers
If we were to replicate Dr. Stanley Milgram's obedience study today, do you think the results would be different?
Montano1993 [528]

Answer:

Explanation:

The results would be exactly the same. We have learned little about authority and when to oppose it.

I'll give you an example. Last night I was in a restaurant like Taco Bell or Subway. Across from me was a girl with an ordinary backpack which was all I could see. It was quite common to see that in the University District where I was. I paid no attention until two policemen came in (both over 200 pounds -- she was tall but could not have been more than 130) and began arrest procedures. She started shouting very foul language but otherwise did not resist. They put handcuffs on her wrists which were behind her back. Again she she  used profane language only screaming that they were hurting her. It took the one police officers a moment to find his key and loosen the cuffs, which he did, but she was still uncomfortable and cursing.  

She was silent as they took her out. Nobody questioned the incident at all. Do you think Dr. Millgram would recognize this as an example of his theory? I'm sure he would. Trust me, this was not staged. There was a 3rd officer who drove the girl and one of the 2 arresting officers away.

7 0
2 years ago
A computer has many resources. A resource can be memory, disk drive, network bandwidth, battery power, or a monitor. It can also
bekas [8.4K]

Answer:

The security principle being referred to here is:

Resource Encapsulation.

Explanation:

Resource Encapsulation is one of the cybersecurity first principles.  It allows access or manipulation of the class data as intended by the designer. The cybersecurity first principles are the basic or foundational propositions that define the qualities of a system that can contribute to cybersecurity.  Other cybersecurity first principles, which are applied during system design, include domain separation, process isolation, modularization, abstraction, least principle, layering, data hiding, simplicity, and minimization.

7 0
3 years ago
In spreadsheet software, use ____ to create meaningful data summaries to analyze worksheets containing large volumes of data.
morpeh [17]
<span>In spreadsheet software, use pivot tables to create meaningful data summaries to analyze worksheets containing large volumes of data.</span>
6 0
3 years ago
Other questions:
  • A word or line of a paragraph at the top of a page hanging indent is called ______
    8·1 answer
  • Given the function definition
    12·1 answer
  • which one of these steps describe saving a newly created file. click on the save icon. minimize the file. name the file. select
    12·2 answers
  • James, a technician, needs to format a new drive on a workstation. He will need to configure read attributes to specific local f
    5·1 answer
  • The most common types of utility programs fall into these categories. accessibility calculation communication data entry enterta
    6·2 answers
  • How do you put a picture when you ask a question?
    6·2 answers
  • Why is computer called information processing maching???​
    6·2 answers
  • 5. Compare the telephone network and the internet. What are the similarities? What are the differences?
    12·1 answer
  • Photographing during the midday can produce which of the following?
    5·2 answers
  • Which graphic file format would you choose if you needed to make an animated graphic for a website?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!