Top Banner
72 EVALUATE AND COMMUNICATE BUSINESS REQUIREMENT TRAINERS' GUIDE| VERSION: 2, March 2015 ©WELLS INTERNATIONAL COLLEGE CRICOS PROVIDER CODE: 01856K RTO NO. 90501 Assessment 1 Research (Online) Instructions: This assessment is to be completed individually. In this assessment you will be working through a number of written tasks based on case scenarios or research that relate directly to each element of competency for this cluster. Outlined below is information on how each of the tasks relates the element of competency covered. Duration: Trainer will set the duration of the assessment.
13

NEW-Assessment Task 1 (Online).pdf

Sep 24, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 72 EVALUATE AND COMMUNICATE BUSINESS REQUIREMENT TRAINERS' GUIDE| VERSION: 2, March 2015 WELLS INTERNATIONAL COLLEGE CRICOS PROVIDER CODE: 01856K RTO NO. 90501

    Assessment 1 Research (Online)

    Instructions:

    This assessment is to be completed individually. In this assessment you will be working through a number of written tasks based on case scenarios or research that relate directly to each element of competency for this cluster. Outlined below is information on how each of the tasks relates the element of competency covered.

    Duration:

    Trainer will set the duration of the assessment.

  • VERSION: 2, March 2015 | Assessment 1 Research (Online) WELLS INTERNATIONAL COLLEGE

    CRICOS PROVIDER CODE: 01856K RTO NO. 90501 73

    Task A: Determine support areas

    In this section you will undertake three separate tasks to identify and record information technology used within an organisation. This will include identifying stakeholders of the system, demonstrating an understanding of the organisational structure, culture and politics in relation to its support requirements in order to be able to determine what level of support is required by each organisational unit.

    Task B: Develop support procedures

    In this section you will verify support needs, establish support procedures and write a service level agreement to meet customer expectations.

    Task C: Assign support personnel

    In this section you will identify IT skills required to assist each organisational unit with support activities and assign personnel according to human resource processes. You will also provide support using agreed procedures and obtain regular feedback on the allocated support.

    Task D: Identify key information sources

    In this section you will identify information repositories, review organisational documentation, develop critical questions to elicit information from stakeholders and ensure that quality information gathering techniques are used.

    Task E: Gather data

    In this section you will research on information gathering workshops and interviews, review reports and other data sources for relevant business information, confirm business-critical factors and analyse group and individual responses to define business priorities.

    Task F: Prepare data analysis for review

    In this topic, you will learn how to analyse and evaluate information gathered for accuracy and consistency, and document and communicate purposes of business requirements

  • 74 EVALUATE AND COMMUNICATE BUSINESS REQUIREMENT TRAINERS' GUIDE| VERSION: 2, March 2015 WELLS INTERNATIONAL COLLEGE CRICOS PROVIDER CODE: 01856K RTO NO. 90501

    Task A: Determine support areas

    Read the scenario and answer the questions listed below:

    Business Scenario

    D&K Books Pty Ltd is a bookstore owned by Mr. Dean Kerr. The business occupies two levels of an office building connected by escalators and lifts. D&K Books employs approximately six sales staff, one operation manager, two administrative officers, a bookkeeper and a marketing manager. They have an Ethernet network consisting of ten PCs (Intel I3 Desktop cloned), two switches, a router and three printers. They use the QuickBooks software to manage their entire business, including sales, inventory, ordering, accounts receivable, accounts payable, payroll and employee management. They also have two EFTPOS terminals one on each floor.

    D&K Books has a Linux server that stores all of the data including the QuickBooks database. The server is backed up to tape regularly. They also have a website (hosted on an Australian ISPs server, dynamic and static pages using asp.net) on which customers can browse the product catalogue and view current specials. They also lease a telephone system from Live Telecoms. The PABX (phone system) consists of a main switchboard and five remote phones with three incoming lines and a message-on-hold queue system.

    Task A1: Identify information technology (HW and SW)

    List the technology in use in D&K Books and consider the following:

    What sort of support does the technology require?

    Who is likely to provide this support?

    Does the support arrangement already exist?

    Present your answer in a table such as the one below.

    Table 1: Information Technology in Use

    Technology Description Support Required Provider Support

    Already

    exists?

  • VERSION: 2, March 2015 | Assessment 1 Research (Online) WELLS INTERNATIONAL COLLEGE

    CRICOS PROVIDER CODE: 01856K RTO NO. 90501 75

    Task A2: Identify stakeholders and project sponsor

    The questions that follow are based on the organisational chart shown below:

    If you were building a website for the organisation represented by the organisational chart provided above, who would you identify as the stakeholders in this project?

    If you were building a website for the organisation represented by the organisational chart provided here, who would you identify as the project sponsor?

    Task A3: Identifying support requirements

    If you were implementing a website for a customer that consisted of a large number of static and dynamic web pages such as an electronic store with a database backend, what possible support functions could you implement?

    Task B: Develop support procedures

    Task B1: Customer support procedures

    a) Describe one positive and one negative experience you have had when seeking assistance from a telecommunications company, an ISP or a computer supplier. Your experience may be via telephone, email or even voice recognition

    b) Using the experiences described above please answer the following questions. What support aspects were professional and/or unprofessional? How long did the support process take? Were the steps logical? Did they solve your problem? Was the call deflected to another area?

    c) Suggest a strategy to deal with the negative service situation that you described

    Task B2: What makes great support?

    Answer the following question in approximately half to one page

    What is positive about the support philosophy of Unwired as described in the information below?

  • 76 EVALUATE AND COMMUNICATE BUSINESS REQUIREMENT TRAINERS' GUIDE| VERSION: 2, March 2015 WELLS INTERNATIONAL COLLEGE CRICOS PROVIDER CODE: 01856K RTO NO. 90501

    Case study of Unwired

    At Unwired, we are committed to providing reliable, high-quality corporate grade services to ensure that your business is always connected.

    Our Unwired Business solution comes with the reassurance of a 99.99% availability Service Level Agreement ('SLA').

    The following SLA outlines the minimum Unwired service level commitment to our customers:

    Up to 1 hour fault response target

    Up to 4 hour fault restoration target * Scheduled outage email notifications

    24 hour 7 day assistance with service related issues all year round

    A direct contact 1300 850 344

    Our dedicated and trained staffs monitor the Service in real time.

    Unwired will take ownership of the problems covered by the SLA and resolve them in the shortest possible time, unless prevented by circumstances beyond its control.

    Please contact our business team on 1300 029 209 or drop us an email to find out how we can help you and your business.

    (Sourced from http://www.unwiredbusiness.com.au/service-level-agreements )

    Task B3: Establishing a service level agreement

    Read through the following article and write a report of not more than 200 words on whether you agree or not with 7 steps in establishing a Service Level Agreement.

    Key Steps in Establishing a Service Level Agreement

    A service level agreement is an excellent tool for helping two parties improve communications, manage expectations, clarify responsibilities and build the foundation for a win-win relationship. However, establishing an agreement is neither a quick nor a simple process. Having worked with numerous organizations internationally on establishing SLAs, I recommend paying particular attention to the following key steps:

    1. Gather background information

    Both the customer and the service provider need to start by gathering information so that each has a solid basis from which to negotiate. Before eliciting commitments from their service provider, customers should carefully review and clarify their service needs and priorities. And before making any commitments to customers, service providers should examine their service history and determine the level of service they can realistically provide. In addition, service providers should assess customer satisfaction so as to clearly understand customer concerns and establish a baseline for assessing service improvements.

    2. Ensure agreement about the agreement

  • VERSION: 2, March 2015 | Assessment 1 Research (Online) WELLS INTERNATIONAL COLLEGE

    CRICOS PROVIDER CODE: 01856K RTO NO. 90501 77

    The two parties to an agreement often have different views about the role of the SLA and what it can realistically accomplish. Both sets of views may be valid, yet sufficiently different as to cause a breakdown in SLA negotiations. Before any SLA development work is done, it is advisable for the two parties to hold an open discussion to ensure that they have a basic level of agreement about the agreement. If they don't and until they do any further SLA effort may prove futile.

    3. Establish ground rules for working together

    In this critical, but often overlooked, step the SLA developers (those assigned to negotiate the SLA) focus not on the agreement, but on the process by which they will work together to create the agreement. Issues to be discussed include the division of responsibility for development tasks, scheduling issues and constraints, and concerns regarding potential impediments. In addition, the developers can benefit greatly by discussing their communication styles and preferences. By identifying similarities and differences right up front, they will be in an excellent position to minimize conflict.

    4. Develop the agreement

    This is but one step in the process of establishing an SLA; it's not the entire process. In this step, the two parties create a structure for the SLA document and then discuss debate, negotiate and, over time, reach agreement about the contents of the agreement. In doing so, they may each solicit assistance, input or feedback from others in their own organization. The duration of this step typically varies from several weeks to several months, depending on the developers' previous experience with SLAs, their familiarity with the key elements of an SLA, the demands of their other responsibilities, and the state of the relationship between the two organizations.

    5. Generate buy-in

    The result of Step 4 is a draft of an agreement, not a completed agreement. Before implementing an SLA, all members of both parties who have a stake in, or responsibility for, the success of the agreement should have an opportunity to review the draft, raise questions, and offer suggestions. Using this feedback, the developers can conduct further negotiations, gain the necessary approvals, and finalize the document. In addition to generating buy-in, this step improves the quality of the final document.

    6. Complete pre-implementation tasks

    This step entails the identification and completion of tasks that must precede SLA implementation. Such tasks might include, for example, developing tracking mechanisms, establishing reporting processes, developing procedures for carrying out stated responsibilities, communicating expectations to staff, providing pertinent training.

    7. Implement and manage the agreement

    An agreement that is not managed dies upon implementation. Management responsibilities include providing a point of contact for problems related to the agreement, maintaining ongoing contact with the other party, conducting service reviews, coordinating and implementing modifications to the SLA, and assessing and reporting on how the two parties can further enhance their working relationship.

  • 78 EVALUATE AND COMMUNICATE BUSINESS REQUIREMENT TRAINERS' GUIDE| VERSION: 2, March 2015 WELLS INTERNATIONAL COLLEGE CRICOS PROVIDER CODE: 01856K RTO NO. 90501

    Article sourced from http://www.nkarten.com/sla.html#key

    Task C: Assign Support Personnel

    Task C1: Skills categories

    Classify the following into soft skills and technical skills. Your answer should take the form of a table shown below.

    A knowledge of Linux

    The ability to work under pressure

    The administration of Windows 2008 Server

    The ability to formulate network and IT policies

    The ability to write network documentation

    The ability to give presentations

    Soft Skills Technical Skills

    Task C2: Review job placement ads

    Log on to an online recruitment site such as https://jobs.nsw.gov.au. Look at how their advertisements are written for IT support roles. Select two or three samples to analyse and compare with the list of skills in Task C1 to answer following questions:

    Are the skills in Task C1 appropriate for an IT support role?

    Did the ads clearly mention about recruitment process and desired availability of the applicant?

    Did the ads specify types of support (e.g. off-site/on-site) the applicant needs to provide?

    Did the ads specify the person to whom the applicant will be reporting?

    Task D: Identify key information sources

    Task D1: Classifying source documents

    Question 1: How would you categorise an interview with the project sponsor? (Choose one)

    1. Quantitative; internal; people 2. Qualitative; internal; people 3. Qualitative; external; people 4. Quantitative; internal; document 5. Qualitative; internal; document

  • VERSION: 2, March 2015 | Assessment 1 Research (Online) WELLS INTERNATIONAL COLLEGE

    CRICOS PROVIDER CODE: 01856K RTO NO. 90501 79

    Question 2: How would you categorize: A memo to the IT department? (Choose one)

    1. Quantitative; internal; people 2. Qualitative; internal; people 3. Qualitative; external; people 4. Quantitative; internal; document 5. Qualitative; internal; document

    Question 3: How would you categorize: A report on the number of errors logged at the helpdesk? (Choose one)

    1. Quantitative; internal; people 2. Qualitative; internal; people 3. Qualitative; external; people 4. Quantitative; internal; document 5. Qualitative; internal; document

    Task D2: Research downloads times

    This task is intended to help you qualify the quality of information sources.

    Answer the following questions and submit your answers to your teacher:

    How long will users wait for web pages to download?

    What is the URL for the source you quoted?

    Can you trust the source you quoted? Why/Why not?

    (Hint: consider the search parameters "download speed" + "research")

    Task D3: Advantages and disadvantages of surveys

    Before you answer the questions below, read pages 15 -26 of the article Statistics - A powerful edge! from-http://www.abs.gov.au/AUSSTATS/[email protected]/DetailsPage/1331.01996

    Now, fill in the missing word

    1. One advantage of a is accuracy.

    2. is a disadvantage of a census.

    3. Speed is an advantage of a sample .

    Task D4: Interview structures

    This task is intended to help you identify different interviewing techniques.

    To do this, search the Internet to answer the following questions and submit your answers to your trainer:

    1. What are structured and unstructured interviews? (Hint: use the key words structured+unstructured+interview in your search parameters)

    2. What are pyramid, funnel and diamond interview techniques? (Hint: use the key words pyramid+funnel+diamond+interview techniques in your search parameters)

  • 80 EVALUATE AND COMMUNICATE BUSINESS REQUIREMENT TRAINERS' GUIDE| VERSION: 2, March 2015 WELLS INTERNATIONAL COLLEGE CRICOS PROVIDER CODE: 01856K RTO NO. 90501

    Task D5: Joint application design

    Question 1: A reason that may cause JAD to be ineffective is? (Choose one)

    3. Employees at the lower end of the organisational ladder are involved 4. The JAD team consists of mainly senior management with decision authority 5. Users and IT specialists should be brought together in a 3-to-1 ratio 6. Objectives of the workshop have been defined before the workshop commences

    Question 2: According to the article author, "Usually JAD Workshops last for ___________ with several sessions, and require several key participants to be present"? (Choose one)

    1. 1-2 days 2. 3-5 days 3. 6-7 days 4. 7-9 days

    Task D6: Data gathering technique evaluation

    This task is intended to assist you in evaluating different data-gathering techniques. The results of this research should impact on the techniques deployed, given a specified goal and a defined budget. This activity is used to assess this resource in a holistic manner.

    You are required to search the Internet or research textbooks for relevant and reliable information sources that enable you to identify the advantages and disadvantages of data-gathering techniques.

    Use your research to complete the Technique Evaluation Template given below.

    You will need to submit appropriate references for your sources. You must reference at least FOUR different sources within your total submission. The sources may be online and/or paper-based (such as textbooks).

    Each information gathering technique should be completed within its own section of the Technique Evaluation Template. The information gathering techniques are:

    Textual research - reviewing documents

    Interviews

    Questionnaires

    Workshops - JAD

    Technique Evaluation Template

    Name of the Information Gathering Techniques

    Advantages Disadvantages

    1

    1

    2

    2

  • VERSION: 2, March 2015 | Assessment 1 Research (Online) WELLS INTERNATIONAL COLLEGE

    CRICOS PROVIDER CODE: 01856K RTO NO. 90501 81

    3

    3

    References

    WWW References

    URL Page Title Access Date

    (by student)

    1

    2

    3

    Paper-based References

    Author (s) Year published Page no. Publication title Publisher

    1

    2

    3

    Task E: Gather data

    Task E1: Problem statements

    Consider that you have been given the task of interviewing a member of an organisation in order to identify the business problem or opportunity.

    You have reviewed the information given to you, and you have found there is not enough information to complete the Business Requirements Report for your client Windsor Institute.

    You have requested an interview with the Finance Officer and have asked several questions.

  • 82 EVALUATE AND COMMUNICATE BUSINESS REQUIREMENT TRAINERS' GUIDE| VERSION: 2, March 2015 WELLS INTERNATIONAL COLLEGE CRICOS PROVIDER CODE: 01856K RTO NO. 90501

    Interview Transcript We have been given some information; however, we need to clarify some issues in order to develop a Business Requirements Report.

    Legend:

    Bold Italicised text =Your questions or statements

    Standard text = Finance Officer's answers

    To clarify the issue, what do you see as the main problem that you need to resolve?

    I can't record the purchase price of PCs and where they are presently located.

    Can we explore this further? Is it the current value of the system or the purchase price that you want to retain?

    We want a system so we can record PCs at their original purchase price and the date of the asset purchase. A method of depreciation and the current depreciated price might be good to keep, but lets look at this in an enhancement to the system.

    How do you want us to identify the location of the PC?

    The system must identify PC locations by room number and campus.

    Where do you get PC values from, and how do you know that they are correct?

    The PC values are recorded on supplier orders and supplier invoices. The new system must source PC prices from supplier invoices. It would be nice if the new system could reconcile differences in pricing between orders and invoices

    Review the interview transcript above and answer the following question:

    Question: What do you think the problem statement would be?

    Task E2: Open and closed questions

    In this task you need to classify following questions as either open or closed questions.

    Question 1: What size is your PC monitor?

    1. Open ended question 2. Closed question

    Question 2: Are you well today?

    1. Open ended question 2. Closed question

  • VERSION: 2, March 2015 | Assessment 1 Research (Online) WELLS INTERNATIONAL COLLEGE

    CRICOS PROVIDER CODE: 01856K RTO NO. 90501 83

    Question 3: Why do you use this form?

    1. Open ended question 2. Closed question

    Question 4: What would you do with the new information you collect?

    1. Open ended question 2. Closed question

    Question 5: Why?

    1. Open ended question 2. Closed question

    Question 6: How do you rate your satisfaction with the system?

    1. Open ended question 2. Closed question

    Task E3: Questioning sensitivity

    This selfcheck question is intended to help you understand questioning sensitivity and context.

    The wording in a question may unduly influence responses. In the following questions political sensitivity influences the results:

    Do you think the US was right or wrong in sending American troops to stop the Communist Invasion of South Korea ? (Opinion Research Centre, January 1951)

    Wrong 36%

    Right 55%

    Dont Know 9%

    Do you think the US made a mistake in deciding to defend Korea, or not? (Gallup, January 1951)

    Mistake 49%

    Not a Mistake 38%

    Dont Know 13%

    Which two words in the first question influenced political sensitivity and produced a higher affirmative result?

  • 84 EVALUATE AND COMMUNICATE BUSINESS REQUIREMENT TRAINERS' GUIDE| VERSION: 2, March 2015 WELLS INTERNATIONAL COLLEGE CRICOS PROVIDER CODE: 01856K RTO NO. 90501

    Task F: Prepare data analysis for review

    Task F1: Analyse data

    You have been asked by your manager to collect data from a survey about your companys intranet. You and your manager feel that the site needs an upgrade, but you need evidence to support this view.

    Select a method that shows the results of the survey, which are listed below:

    78% use the site regularly.

    65% find it easy to navigate.

    36% believe it should be upgraded.

    40% believe it needs more multimedia.

    55% have had technically problems with the site over the last 12 months.

    74% stated that the intranet is crucial to their daily business.

    31% stated that the colours used in the site were poor.

    15% stated that they still use paper manuals and avoid the site.

    Your task is to analyse the data and present the findings in a clear format to support your view while answering following questions:

    What data would you highlight?

    What data would you possibly omit?

    How would you present the data in your report and/or your presentation?

    Task F2: Functional requirements

    1. What is the purpose of the Requirements Report?

    a) to communicate the requirements

    b) to confirm the requirements

    c) to gain agreement from the client

    d) all of the above

    e) none of the above

    2. Fill in the missing word:

    Non-functional requirements define any within which the current system

    operates.

    3. Answer true or false:

    The functional requirements define the services that the system provides.