What need to be done to support the upgrade

Assignment Help Computer Engineering
Reference no: EM132730313

Assignment: Purpose: This discussion activity gives you the opportunity to solve a real world scenario. In doing so, you will learn the concepts of a software development cycle.

Directions: Part I: Complete Your Original Response to the Main Topic

You are a software developer for a Retail Point of Sale System Company. A client has made a request to upgrade the current system from command line interface to a graphic user interface. The client concerns on an effect to the current system with the change. The client does not want to lose any current data on the system. Provide recommendations and the change plan including the below requirements to the customer.

Requirements:

• Create a requirement plan (what need to be done to support this upgrade)

• Create a development plan (how to implement this upgrade with programming details explanation including technical details on this document)

• Create testing plan (how to ensure that the new upgrade works without affecting current system and no data lost.)

Posting your recommendations and the change plan

Once you have completed your recommendations and plan. Post it in the discussion forum by clicking the Reply link below.

• In the first line of your post, your should add your plan title and name.

• Your posting must include recommendations, a requirement plan, a development plan, and a testing plan.

Reference no: EM132730313

Questions Cloud

Describe what each of the given components are : Schoenfield lists several components of a successful security architecture practice, such as broad support across the organization, recruitment and training.
Review the material on routers : It is sometimes said that information extracted from a router or switch does not necessarily provide specific evidence of a particular crime.
How has the term hacking changed meaning over the years : With all the stories about millions and millions of bytes of personal data having been exposed, why is their still any faith at all in the Internet?
Post the source code in the discussion board for analysis : The requirement of this activity for this module is for every student to solve one programming problem from the book, and post the source code in the discussion
What need to be done to support the upgrade : You are a software developer for a Retail Point of Sale System Company. A client has made a request to upgrade the current system from command line interface.
Explain the definitions of maturity stages : Review the section on the definitions of maturity stages and dimension variables in the CEO Technology Best Practices Arc. Define each of the maturity stages.
What are baseline security requirements : What are baseline security requirements that should be applied to the design and implementation of applications, databases, systems, network infrastructure.
Why is intellectual property entitled to legal protection : Why is intellectual property entitled to legal protection? Why did copyright laws become stricter and more punishing in the late 20th century?
Why relationship exists between the two variables you chose : Why did you think a relationship exists between the two variables you chose? State what type of relationship exists: Negative, positive, or none.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd