Alternative approaches for acquiring software, Basic Computer Science

Assignment Help:

Alternative approaches for acquiring software:

There are some alternative approaches for acquiring software. They are: 

i)  'off the shelf' software package 

ii)  'turnkey' package (both hardware and software) 

iii)  write your own package 

iv)  have customised programs written for you. 

Each of these approaches has its own advantages and disadvantages. Standard packages are by far the most common way of acquiring software. They offer simple and relatively cheap option, with the advantage of a large group of users of common package.

Turnkey systems, with all components of hardware, software and communications provided by the vendor (supplier) are simpler for their users as every aspect is looked after by the supplier. This is a common method pursued by some larger libraries. It is desirable that the package acquired is an integrated one - that is to say it can carry out a number of functions within a common framework. 

Examples could be library automation packages, incorporating acquisitions, cataloguing, circulation etc. There is one possible drawback associated with fully integrated packages, apart from not being flexible; some elements of integrated packages might be inferior to a program dedicated for the same purpose. For example, if database applications are particularly important, it could be a mistake to rely on the database component of a standard package. The 'customised' approaches provide flexibility and a product geared precisely to your specific needs. Though popular, software specially written for information services is too expensive and difficult to maintain and modify for it to be a realistic option in many cases. Some ability to modify software is desirable and standard packages offer the chance to modify such aspects as output formats, and help message. Also, some larger systems are available in modular form, with distinct pieces of software carrying out specific functions. Modules for particular purposes can be acquired and then combined as required, giving a fair degree of flexibility in the look of a software system. The obvious example is the library house keeping package with separate modules for acquisitions, cataloguing, circulation, etc..  


Related Discussions:- Alternative approaches for acquiring software

Explain the working of bus connection, Question 1 Explain the working of B...

Question 1 Explain the working of Bus connection Question 2 Write a note on: Robotics and Voice Recognition Question 3 Describe the construction of CD-ROM Question 4

Artificial intelligence-search in problem solving, Search in Problem Solvin...

Search in Problem Solving If Artificial Intelligence can notify the extra sciences about something, it is about trouble solving and, in exacting, how to search for solutions to

Database reports, The first report, Report #1, is to be an ordered list of ...

The first report, Report #1, is to be an ordered list of the contents of the database, sorted in ascending order by a major field. Report #1 is to include all of the fields and rec

Computer, hitory and genration of computer

hitory and genration of computer

Deadlock , My question on the following link: http://www.3n33.com/upload/d...

My question on the following link: http://www.3n33.com/upload/download.php?img=1410

Internet searching algorithm, Internet searching algorithm: Searching: Wh...

Internet searching algorithm: Searching: When a user enters a query into a search engine, the engine examines its index and provides a listing of best-matching web pages accordin

Telecommunication protocols, TELECOMMUNICATION PROTOCOLS: The two majo...

TELECOMMUNICATION PROTOCOLS: The two major components relating to a WAN are the Protocol and the Media. The media are the actual path ways that the protocol travels on. The ne

Data output, DATA OUTPUT : Whatever, data or information that you feed int...

DATA OUTPUT : Whatever, data or information that you feed into a computer will be the data output from a computer system and will be a data file sent from the computer to a periph

What is the importance of using digital certificates, QUESTION a) Crypt...

QUESTION a) Cryptography is a set of techniques and mathematical algorithms. Describe four important areas where cryptography must be applied b) What is the importance of us

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd