What are the software development life cycle phases

Assignment Help Basic Computer Science
Reference no: EM133113744

TCIT2053 System Analysis and Design

In the article given to you on "What are the Software Development Life Cycle Phases?", there are eight Software Process Models such as Waterfall model, V model, Incremental model, RAD model, Agile model, Iterative model, Spiral model and Prototype model.

Question 1: Draw the diagram of each of the 8 software process models. Based on your understanding for each model, create a table having description of the software process phases, the activities and the people involved (name their role) in those activities. Among the people's roles are user, customer, analyst, designer, programmer, tester and trainer.

Question 2: Apply your understanding of the Software Process Models, by creating a table of features comparison of all the above 8 models. Features to be identified and compared in those models are:
(i) Type of model approach
(ii) Model ease of use
(iii) Model flexibility
(iv) When to have Clear Requirements Specification
(v) Risk identification
(vi) SDLC phase with user involvement
(vii) Customer priority
(viii) Project size
(ix) Project complexity
(x) Project time length
(xi) Individual or team effort
(xii) Expertise level
(xiii) Complete software or Prototypes
(xiv) Incorporate changes
(xv) Speed to change
(xvi) Reusable components
(xvii) Overlapping phases
(xviii) Project cost
(xix) Cost control
(xx) Resource control

Question 3. In a table, conclude each model suitability to be applied to software development project.

Attachment:- System Analysis.rar

Reference no: EM133113744

Questions Cloud

Normal principles of diversification : Would the normal principles of diversification have worked for investors during this crisis? Why or why not?
At what amount should the vehicles be recorded : DFE Enterprises purchased a small delivery business for $900,000 (GST exclusive). At what amount should the vehicles be recorded
Calculate the value of the firm onefun : ONEFUN is a so-called all-equity company. This company has invested in only one project called LIVE. This project LIVE has expected 2 million dollar cash flow (
Explain six examples of audit tests : CARMAX has several branches island wide. The company imports and sells motor vehicle parts and accessories to retail customers.
What are the software development life cycle phases : Understanding of the Software Process Models, by creating a table of features comparison of all the above 8 models
Calculate financial leverage and operating leverage : Revenue from the business activities for the company is Rs. 1.50 crores. Calculate financial leverage and operating leverage
Du pont system of financial analysis : Use the Du Pont system of financial analysis and the following information to find return on equity (ROE):
What will total fees be for fund : An institutional investor is comparing management fees for two competing real estate investment funds. Both funds expect to begin operations and are accepting c
Crime control model represents teleologic : The Crime Control model represents teleologic, "ends" based policing. The Due Process model represents deontological, "means" based policing.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is the placeholder that will appear in the document

038236RR- Sandrelle is working in a Word document in which she's going to insert a merge field for a greeting. What is the placeholder that will appear in the document?

  Information governance - metrics

In order to have a successful IG program, one of the eight Information Risk Planning and Management step is to develop metrics and measure results.

  Identify the main sources of revenue

Identify the main sources of revenue for and the largest expenditures made by federal, state, and local governments.

  Favor of reducing taxes on repatiated earnings

Some have argued in favor of reducing taxes on repatiated earnings that companies operating in the US have made in other countries.

  Direct damage or theft victimless crime

Is hacking that does no direct damage or theft a victimless crime? Do you think hiring former hackers to enhance security is good idea.

  Describe the process of ood

Splash Screen. When the program first fires up, have it print a short introductory message about the program and buttons for "Let's Play" and "Exit." The main interface shouldn't appear unless the user selects "Let's Play."

  Preconditions and postconditions

Rewrite the function pentagonal using recursion and add preconditions and postconditions as comments.

  Assignment-business intelligence and data warehouses

Businesses today are extremely reliant on large amounts of data for making intelligent business decisions. Likewise, the data warehouses are often structured in a manner that optimizes processing large amounts of data.

  Consider a dedicated firewall device

Firewalls can be implemented in different ways. Consider a dedicated firewall device. What is its major advantage when the target is throughput and security? Explain.

  Balanced scorecard categories

In which of the following balanced scorecard categories would performance drivers be located if they are used to minimize equipment down time.

  Discuss retaining quality technical staff in organizations

Write a analysis in which you discuss retaining quality technical staff in organizations. Describe the leader's role in both motivation and retention.

  What value is obtained by adding all six of the ss values

The mean (M) and sum of squares (SS) are computed for each cell in the matrix. What value is obtained by adding all six of the SS values?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd