Describe different software development lifecycles

Assignment Help Software Engineering
Reference no: EM133209762

Unit 9 Software Development Lifecycles - Higher National Diploma in Computing

Learning Outcome 1: Describe different software development lifecycles.

Learning Outcome 2: Explain the importance of a feasibility study

Assignment Brief: You have just been recruited into a software development company BKSoftware. There is a lot of professional discussion going on about optimal development methodology, lifecycle models. Some employees prefer new methods, some employees favor different methods for different projects. As a new hire, considered argument neutral, it is your responsibility to prepare a presentation on:

1. Software development life cycle overview, showing 7 stages of SDLC.

2. Create a presentation describing two iterative software lifecycle models and two sequential software lifecycle models. Go on to show how to manage risk in each of these models.

3. The waterfall model is highly appreciated by many of your colleagues, evaluating its application to a large-scale development project.

4. Then to ensure that this is all clear produce a discussion, illustrated by an example, as to why a particular lifecycle model might be chosen for a particular development environment. Make both sides of the discussion clear and detailed.

For the second part of this, there has been much discussion over the quality of some specifications put to the company for development and the issue of feasibility has come to the fore.
Your next task is therefore to explain the importance feasibility studies can have on the whole development process. To this end you will have to produce a document that includes all of the following:

1. An assessment of the impact different feasibility criteria has on a software investigation.

2. A straightforward explanation of the purpose of doing a feasibility report on a potential software development.

3. A discussion of the different components that make up a feasibility report.

4. A description of how alternative technical solutions can be compared effectively.

Reference no: EM133209762

Questions Cloud

Provide a history of the strategies - community policing : Provide a history of how each of following strategies were used: community policing, proactive policing, and effective police deployment of departmental assets
Development on Soviet Union and world : Discuss the impact of this development on the Soviet Union and the world. What is the main shift in the Soviet Union you are presenting to the class?
Discuss the element of taking and the element of force : Define robbery. Discuss the element of taking and the element of force or threat of force that are required for the crime of robbery
Emphasize the contribution of art and archaeology : Which are designed to emphasize the contribution of art and archaeology to different areas of the study of the world of the Ancient Near East.
Describe different software development lifecycles : Unit 9 Software Development Lifecycles - Higher National Diploma in Computing and Describe different software development lifecycles
Discuss events that took place in Colosseum : Discuss the events that took place in the Colosseum. Why would the Romans accept the events that took place there?
Identify all possible moral dilemmas for each party involved : Identify all possible moral dilemmas for each party involved. Decide what is the most immediate moral or ethical issue facing the individual
Economy-Material Life and Race-ethnicity and nationalism : Write a critical essay about the disparity and stratification happening in Bangladesh.
Determine witness assistance programs in the state : Determine victim/witness assistance programs in the state. Students can interview victims of crime known to them to determine

Reviews

Write a Review

Software Engineering Questions & Answers

  Can capabilities protect against all trojan horses

A company develops a new security product using the extreme programming software development methodology. Programmers code, then test, the en add more code, then test, and continue this iteration.

  What information-gathering methods are most appropriate

what information-gathering methods are most appropriate to learn about requirements from reliable's own management staff and other employees? from client health-care organizations? from suppliers?

  Embedded system development spring

Embedded System Development Spring, Multiply the Number 0x 00000DBF by Decimal 9 using shift instruction consider the result Minuend. Divide 0x00000CD8 by Decimal 4 by shift instruction and consider the result Subtrahend.

  Find out by searching the web

What do you know about focused Linux distributions? If nothing, what can you find out by searching the Web? By "focused" we mean distributions that exist primarily for a specific purpose or set of tasks (e.g. security, penetration testing, backup,..

  Describe two major erp systems

Create a 7-to10-slide presentation comparing and contrasting two major ERP systems from different ERP software providers. You may use various sources including the companies' websites

  Create a domain model class diagram for rmo csms marketing

Using Microsoft Visio or an open source alternative such as Dia, create a domain model class diagram for the RMO CSMS marketing subsystem.

  Research the concepts and technology of data etl

Discuss the various tools that SSIS provides and relate them to the phases within ETL. You should also provide suitable examples from case studies (such as AdventureWorks & AdventureWorksDW) to reinforce your discussions.

  Draw a physical data flow diagram

Prepare a table of entities and activities. - Draw a context diagram. - Prepare an annotated table of entities and activities. Indicate on this table the groupings, bubble numbers, and bubble titles to be used in preparing a level 0 logical DFD.

  Recognize the laws which would be effective to convict

you have been hired as the chief security officer for a local university. for this role you will be responsible for

  Explanations on fixing c++ code errors

This technique takes an array of ints as a parameter and returns an array of Booleans. For each element in the parameter array whose value is 0,

  A student enrolls into a programme and the student may

bounix is a higher learning institution that runs several academic programmes. each programme comprises a set of units.

  What are the systems development phases steps and purposes

What are the systems development phases, steps, purposes, and tasks?- What are the essential elements of good project management?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd