1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
icang [17]
3 years ago
13

General Hardware Products Your boss, the IT director, wants you to explain FDDs, BPM, DFDs, and UML to a group of company manage

rs and users who will serve on a systems development team for the new marketing system
1. Explain how an FDD can be used in requirements modeling.
2. Describe BPM and how it can be used.
3. Explain how DFDs can be used in requirements modeling.
4. Describe the UML and how it can be used during systems development.
Computers and Technology
1 answer:
Bas_tet [7]3 years ago
3 0

Answer:

1. FDD is a process and Analysts can use a FDD to create and use business functions and processes. It Requirements models are used when gathering requirements for a new system.

2. BPM is used on an ongoing basis for business process improvement. It is meant to improve order, insight and efficiency of the collective workflows that make up any given business process. BPM is meant to reduce any chaos within those collective workflows that make up a process and eliminate ad hoc workflow management. BPM means Business Process Management.

3. DFDs stands for Data Flow Diagram which will help software developers and designers to understand how they can take their next step to fit into the overall business process. DFDs paly key role for a successful requirements modeling.

4. UML can be used for modeling a system independent of a platform language. UML is a graphical language for visualizing, specifying, constructing, and documenting information about software-intensive systems. UML gives a standard way to write a system model, covering conceptual ideas.

Explanation:

Functional decomposition diagram (FDD) is used to identify functions and define their structure. It is a technique to decompose the complex problem into manageable pieces or individual elements to develop the application or product.

DFDs: It contains a process (shape) that represents the system to model, in this case, the "Food Ordering System". It also shows the participants who will interact with the system, called the external entities. In this example, Supplier, Kitchen, Manager and Customer are the entities who will interact with the system.

Unified Modeling Language (UML): Edraw UML Diagram is the application of choice for many software engineers and designers. The software is fully compatible with 64 and 32-bit Windows platforms from Windows XP to Windows 10.

You might be interested in
________ are typically comprised of a mix of ________ and ________.
zaharov [31]
Your answer is "Mutual funds; stocks; bonds".
8 0
3 years ago
Read 2 more answers
A potential customer wants to find out how blockchain can benefit their company and why they should use Accenture’s Multi-party
grandymaker [24]

Answer:

maybe blockchain can help them in term of security

6 0
3 years ago
__________________________would be involved in projects such as implementing security measures and software to protect systems a
defon

<u>Network Administrator</u><u>/Network Engineer</u> would be involved in projects such as implementing security measures and software to protect systems and information infrastructure, including firewalls and data-encryption programs.

<h3>What does an administrator of a network do?</h3>

The  network administrator is known to be a person who is involved in the day-to-day management of these networks is the responsibility of network and computer system administrators.

They function by helping to plan, set up, and provide maintenance for a company's computer systems, etc., for data communication.

Therefore, <u>Network Administrator</u><u>/Network Engineer</u> would be involved in projects such as implementing security measures and software to protect systems and information infrastructure, including firewalls and data-encryption programs.

Hence, option D is correct.

Learn more about Network Administrator from

brainly.com/question/5860806
#SPJ1

3 0
1 year ago
Consider an airport security system. Determine the system model considering that there are two classes of customers – regular an
kykrilka [37]

The answer & explanation for this question is given in the attachment below.

4 0
3 years ago
Foot pad, starting mark, handle, and hook are all pieces of what tool?
kogti [31]

Answer:

Explanation:

b

3 0
3 years ago
Other questions:
  • How is technology used in the voting process?
    5·1 answer
  • In this chapter, you saw an example of how to write an algorithm that determines whether a number is even or odd. Write a progra
    6·2 answers
  • Add a new row to a table by clicking in the
    10·1 answer
  • What console can be used to enable disable start or stop a service
    6·1 answer
  • Why do Selection Sort and Insertion Sort’s outer loops run 11 iterations if there are 12 elements in the array?
    7·1 answer
  • Jason is working on a Microsoft Excel worksheet and he wants to create a Print Preview shortcut. His teacher asks him to access
    9·1 answer
  • ________ use statistics to anticipate customers withdrawals. ________ use statistic to calculate probable life expectancy to hel
    11·1 answer
  • Overview In this assignment, you will gain more practice with designing a program. Specifically, you will create pseudocode for
    7·1 answer
  • 23. ____________ is a slide that is used as the base design theme for other slides.​
    11·1 answer
  • How many cubic millimeters are present in 0.0923 m3?​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!