Designing computer based system-systems life cycle approach, Basic Computer Science

Assignment Help:

 

Systems Life Cycle Approach

Systems Analysis and Design follows a life cycle for development, as shown below. Brief discussion on this approach is given here:

Figure : Systems Life Cycle Approach

1858_system life cycle approach.png

DEFINITION PHASE

In this phase firstly, a feasibility study is conducted to check the viability of the project. This consists of checking of Economic feasibility, Technical feasibility and the Operational feasibility. Once a decision is taken to initiate the project with predefined objectives, then a thorough study of the existing system is made. This involves studying and documenting formal as well as informal flow of information. The documentation is done using standard systems analysis tools like System Flow Chart, Grid Chart, Decision Tables, Data Flow Diagrams, Warnier Diagrams, etc. Besides these, the Systems Analyst has to identify the information needs of various managers. This is generally done using personal interviews.

The comparison between the existing system and managerial requirements will provide deficiencies, weaknesses of the system, if any. Based on this, a conceptual design of the proposed system is generally arrived at, which is submitted to user managers and a feedback is taken.

PHYSICAL DESIGN

The conceptual design accepted by user managers is the starting point of this phase. Here, a detailed design is created with I/O design, data base designs and processing module design. Coding in high-level language is done. At this stage, detailed control procedures, security guidelines and back up procedures are laid down in detail.

The documentation of the designed system is extremely important. The following manuals must be created:

  •     User Manual
  •     Systems Manual

After the completion of this phase, the system is ready to be implemented in practice. 

IMPLEMENTATION

During this phase, actual changeover from the old system to the new system takes place. Either, the two systems are run in parallel for sometime and then the old system is dropped after the new one stabilizes. Alternatively, at a fixed instant the old system is dropped and the new system implemented. Generally, in Indian context, parallel conversion is considered to be the safer one.

Irrespective of the quality of the system implemented, there will always be continual changes in user requirements and also some error might crop up during processing. There is a need for on-going maintenance of the system. It has been found that over the total life cycle of a software package, more than 50% of budget is spent on maintenance.

The last item of system life cycle is Post Audit. In this module, efforts are made to compare the planned versus actuals from the view of gaining valuable insight in software development. All aspects of the system are reviewed and documented. As can be seen from the figure,  there are feedback loops from one phase to another. The whole process is repeated till user satisfaction is achieved. 


Related Discussions:- Designing computer based system-systems life cycle approach

Data mining test, Use the methods of C4.5 to design a decision tree

Use the methods of C4.5 to design a decision tree

Abstraction is a popular way to organize concurrent programs, 1. The proces...

1. The process abstraction is a popular way to organize concurrent programs, but it is not the only choice. An alternative to the process abstraction is to design a single-threaded

471, #que411stion..

#que411stion..

Looping statement, Looping Statement:  The purpose of a loop structure is...

Looping Statement:  The purpose of a loop structure is to repeat certain tasks until some condition is satisfied. Several variations of a loop structure are available in each pro

Ipv4 and ipv6, IPv6 documented in 1994 (RFC 1752) is still a collection...

IPv6 documented in 1994 (RFC 1752) is still a collection of Draft and Proposed standards Several pre-standard implementations exist IPv6 was intended to be a pragmatic up

C, A palindrome is a string that reads the same from both the ends. Given a...

A palindrome is a string that reads the same from both the ends. Given a string S convert it to a palindrome by doing character replacement. Your task is to convert S to palindrome

Write a brief note on firewalls, Question 1 Explain the TCP/IP protocol la...

Question 1 Explain the TCP/IP protocol layers Question 2 Write a note Fiber Distributed Data Interface (FDDI) Question 3 Discuss on File Transfer Protocol (FTP)

Trap doors and Logic Bombs, Trap doors:  This is a way of bypassing normal...

Trap doors:  This is a way of bypassing normal authentication procedure (windows/ operating system user name  and password) to access a system. Once a system is compromised (impac

What isit, what can you do and what and how who can becbgbfbvuidfgvbkjfdhvb...

what can you do and what and how who can becbgbfbvuidfgvbkjfdhvb98dshrnfjkbhqdbnfiubnfdjbhdfiubndfubhfdbhfdiubhdfuibhyfdubhdfbhfbhdf8u

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd