Briefly describe the various types of project feasibility that must be evaluated.

What will be an ideal response?


Technical feasibility examines whether a project is feasible within the current limits of available technology. Determining the technical feasibility is critical when new technology is first being considered for use within an organization, prior to its widespread use. Economic feasibility determines whether the expected benefits associated with a project outweigh the expected costs sufficiently to make the project financially attractive. Legal feasibility determines whether laws or regulations may prevent or limit a systems development project. Legal feasibility involves an analysis of existing and future laws to determine the likelihood of legal action against the systems development project and the possible consequences of such action. Operational feasibility is concerned with how the system will be accepted by people and how well it will meet various system performance expectations. Schedule feasibility determines whether a project can be completed in a reasonable amount of time. This process involves balancing the time and resource requirements of the project with other projects.

Computer Science & Information Technology

You might also like to view...

To open a file for read-write and random access requires

a) The usual definition of an ofstream or ifstream object. b) A call to open ofstream or ifstream object, but there must be a second argument to the open function. c) The stream to be defined using the class fstream. defined in the header file. d) The stream to be connected to the physical file object with first argument a C- string containing the physical file name and a second argument, ios::in | ios::out that specifies that the i/o with the file should be for either reading or writing. e) #include, using std::fstream; and using std::ios;

Computer Science & Information Technology

When a client attempts to access a namespace root or the underlying folders, what type of prioritized list does it receive?

A. root B. referral C. priority D. policy

Computer Science & Information Technology

The formula for computing the current byte address (CBA) for a direct access file with fixed record length is ____.

A. CBA = (RN - 1) * RL B. CBA = RN * RL C. CBA = RN / RL D. CBA = (RN + 1) * RL

Computer Science & Information Technology

When charting data, typically you should not include __________.

a. column headings b. row headings c. totals d. nonadjacent columns

Computer Science & Information Technology