Free

IT425-1403A-01 : Systems Analysis, Design and Integration - Assignment Example

Comments (0) Cite this document
Summary
System Development Life Cycle (SDLC) is the development and implantation of an information system in a multi-step process involving phases from initiation through analysis, designing & implementation to maintenance and disposal phases. SDLC models constitute series of phases and…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER96.5% of users find it useful
IT425-1403A-01 : Systems Analysis, Design and Integration
Read TextPreview

Extract of sample "IT425-1403A-01 : Systems Analysis, Design and Integration"

Running Head: Systems Analysis, Design and Integration. College System Development Life Cycle (SDLC) is the development and implantation of an information system in a multi-step process involving phases from initiation through analysis, designing & implementation to maintenance and disposal phases. SDLC models constitute series of phases and integrate security of information to guarantee high integrity any information to be transmitted, processed or stored on the system. By including management of risks during the development of systems, institutions can balance the need for protecting important assets and information with costs associated to security control and mitigation plans as the system is developed (Goldman, 2012).
The very first phase in SDLC models is initiation. Initiation involves he expression of a need for the system and documentation of the specific purpose as well as high level specifications for the system. Development or acquisition is the next phase- it comprises designing, purchase, programming and development of the system. Sub-phases here include system development and acquisition cycles. Implementation or assessment is the 3rd phase involving installation and it follows initial tests of the systems performance. The fourth phase involves the system performing the intended purpose and thus is referred to as operations or maintenance. The sunset phase involves the disposal of the system on completion of its transition to a new computer system (Radack, 2009).
SDLC models are ultimately cost effective as it is possible to identify and mitigate security issues early. Risk management is applied in a timely fashion thus facilitating informed executive decisions. Crucial decisions concerning security of the system are made throughout development and are used to inform management’s considerations on security. Through SDLC models, improved integration and interoperability of the system is attained which would have been difficult if security was considered separately.
Rapid Application Development on the other hand is the process in which the entire cycle of developing a system is expedited. It therefore makes possible to fast develop quality system hence saves on resource use. RAD makes use of techniques and tools which are automated hence restructuring the entire process of constructing information systems. It effectively replaces coding and hand design which largely depend on skills by different persons with automated processes of design that are extremely stable. RAD is fast and less error prone, therefore more capable. As compared to traditional cycles such as SDLC, RAD is less rigid thus meets the dynamic needs of modern business. Crucial ingredients in RAD are the methodology, the people, management & tools. It combines the best techniques, uses prototypes that are evolutionary, makes use of workshops, implements time bound development processes and offers guide to success while outlining pitfalls to be avoided. The phases include planning of requirements, user design, construction and implementation of the system (Rouse, 2007).
Joint Application Development (JAD) is an interactive concept of system design development involving workshops to discuss and compile system information. It brings together developers, system users and other opinion in an environment of creativity. Phases include definition of the project, brainstorming on requirements by the user, preparing for JAD sessions, caring out as well as facilitating the sessions and coming up with a comprehensive document incorporating all decisions reached. It is less time intensive, improves the quality of the final system, reduces costs, enhances education for users hence cultivating ownership and also reduces functional creep. Constant communication between developers, final users and the business ensures the system developed is easily understood, accepted and implemented (Yatco, 199).
Basing on my research on system development models I settle on a hybrid of models for my class work. This because of the many advantages and weaknesses inherent in the different specific models and as such combining them is more appealing to me. With a combination of models I will be able to take advantage of the strengths of the models and minimize the weaknesses hence come up with a more stable, versatile, secure, user-friendly and acceptable project.
References.
1. Blanchard, B. S., & Fabrycky, W. J.(2006). Systems Engineering and Ajnalysis (4th ed.) New Jersey: Prentice Hall. p.31
2. Eric H. Goldman. (2012). The Effect of Acquisition Decision Making on Security Posture. Information Management & Computer Security, Vol. 20 (5), pp.350 – 363
3. Marakas, James A. O’Brien, George M. (2010). Management Information Systems (10th ed. ed.). New York: McGraw-Hill/Irwin. pp. 485–489. ISBN 0073376817.
4. Margaret Rouse. (2007). Rapid Application Development (RAD).
5. Mei C. Yatco. (1999). Joint Application Design/Application. University of Missouri-St Louis. Retrieved at http://www.umsl.edu/~sauterv/analysis/JAD.html
6. Peter Crock. (2008). Best Practices for Softwre Projects-JAD Sessions. Evaltech Research Group. Retreived at http://www.evaltech.com/pm/JAD_session.pdf
7. Sherley Radack. (2009). The System Development Life Cycle (SDLC). National Institute of Standards and Technology. Available at http://csrc.nist.gov/publications/nistbul/april2009_system-development-life-cycle.pdf
8. Tommy Olsson, and Paul O’Brien. (2008). The Ultimate CSS Reference. Site Point Pty Ltd. Available at ftp://91.193.236.10/pub/docs/linux- support/programming/HTML-CSS/%5BSitePoint%5D%20- %20Ultimate%20CSS%20Reference%20-%20%5BOlsson,%20O%60Brien%5D.pdf Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“IT425-1403A-01 : Systems Analysis, Design and Integration Assignment”, n.d.)
Retrieved from https://studentshare.org/information-technology/1653088-it425-1403a-01-systems-analysis-design-and-integration
(IT425-1403A-01 : Systems Analysis, Design and Integration Assignment)
https://studentshare.org/information-technology/1653088-it425-1403a-01-systems-analysis-design-and-integration.
“IT425-1403A-01 : Systems Analysis, Design and Integration Assignment”, n.d. https://studentshare.org/information-technology/1653088-it425-1403a-01-systems-analysis-design-and-integration.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF IT425-1403A-01 : Systems Analysis, Design and Integration

Systems Analysis and Design

...?Running Head: Systems Analysis and Design Systems Analysis and Design Systems Analysis and Design Introduction to Systems Analysis and Design The creation of a computer-based information system (CBIS) involves a phase of systems analysis. Systems analysis produces or improves the organisation specific data models that help to create and/or enhance the organisation’s database. (Shelly, Cashman and Rosenblatt, 2008) Designing a...
6 Pages(1500 words)Essay

Database systems analysis & design

...System Database Design Report Table of Contents Introduction 3 System Context 3 Stakeholders 3 Requirement Analysis 4 Requirements 4 2.Business Objects (Entities) 4 Database Design 5 1.ERA Diagram 5 1.1.Entity-Relationship Model (ER Model) 6 1.2.Entity-Attribute Model (EA Model) 7 1.3.Entity-Relationship-Attribute Diagram (ERA Diagram) 8 2.Normalization 9 2.1.Un-normalised Form 9 2.2.First Normal Form (1NF) 10 2.3.Second Normal Form (2NF) 11 2.4.Third Normal Form (3NF) 11 Testing 14 Sample Test Data 14 Test Cases 15 Conclusion 18 Introduction This document demonstrates the concept of normalization while designing the conceptual data...
12 Pages(3000 words)Assignment

IceCool Company

2 Pages(500 words)Essay

IT425-1403A-01 : Systems Analysis, Design and Integration

...An Ordering System for Pizza Restaurants Table of Contents References 8 An Ordering System for Pizza Restaurants Week System or Application Overview Introduction The proposed ordering system will be primarily designed to effectively help pizza restaurants to improve the efficiency, save manpower related catering costs and reduce time wastage in the ordering process. According to Dahl (2004), one of the major problems facing many pizza restaurants is the inefficient ordering process which often results in longer customer waiting times. In addition, with the current high labor rates, the ordering system will help reduce the need for many...
2 Pages(500 words)Assignment

IT425-1403A-01 : Systems Analysis, Design and Integration

...Systems Analysis, Design, and Integration Number Systems Analysis, Design, and Integration Unified modeling language (UML) The Unified Modeling Language or UML has been created as documentation for programming designing by Grady Booch, James Rumbaugh and Ivar Jacobsen of Rational Corp. Three specialists each one had distributed article turned strategies and there were determinedly separated feelings amongst OO experts as to which system was best. To evade these wars heightening the three amigos got together (over a period) and created a documentation, which enveloped the...
4 Pages(1000 words)Assignment

IT425-1403A-01 : Systems Analysis, Design and Integration

...Systems Analysis, Design and Integration Systems Analysis, Design and Integration The overall layout of the system analysis process is correct. It starts well with the scope definition where the project plan is communicated, and the baseline scope negotiated. Problem analysis is then done to help understand the problem domain and analyze business processes involved in the system. The project then proceeds to requirement analysis where the system requirements are identified and expressed. The logical design is then made by the composition of the dataflow diagrams and use case diagrams. The system is then tested and evaluated for approval by both the sponsors and the customers to ensure acceptability (INTEGRATION AND TEST PHASE... :...
2 Pages(500 words)Assignment

IT425-1403A-01 Phase 5 System Integration & Deployment (DB)

...Phase 5 System Integration & Deployment Antony Vazquez Colorado Technical Phase 5 System Integration & Deployment Introduction System deployment is a critical process in software development life cycle as it outlines the necessary procedures aimed at making sure that the system runs according to the design standards (Ambler, 2014). Deployment involves all activities that are aimed at handing over the complete system to the customer. There are many activities involved in the deployment and thus there is a need to have an elaborate integration plan to institute a smooth transition (Kay, 2002). The main aim of this paper is to produce an integration and deployment plan for the Ordering System for Pizza Restaurants. Focus... for the required...
3 Pages(750 words)Assignment

Systems Analysis and Design

...System Design and Analysis The logical model is the interaction between the resources, processes, their input and output which is used by people to automate, modulate, manage and optimize the information systems. While developing a logical model for registration ­­­­­system at school/college level top-down approach is preferred. Resources are easily organized for individual managed application by distributing work load in different steps. First step is having a main control, which resides with the admin department having clear view of demands and statements. Each phase implements a deeper, more mature implementation of the management solution that is...
1 Pages(250 words)Essay

Systems Analysis and Design

...Systems Analysis and Design If I were a systems analyst building a detailed test plan, I would use the Software Testing Approach as my main testing strategy. The Software Testing Approach is acquired largely from the Business Requirement Specification record (Shelly and Rosenblatt 502). This strategy is a static record implying that systems do not update it frequently. I would use simulated data in my test plan because it is suitable for testing limited situations within the plan or organization. The data values I use can simulate live information and additionally test limited situations. The most crucial security issues facing organizations today are...
1 Pages(250 words)Essay

Systems Analysis and Design

...System analysis and design: Contemplative media case study Case 13 Q1. Investigate data migration from Microsoft Access to SQL Server. What tools are available to assist in or perform the migration? The Jet database engine that is employed as the Access database engine is an easy-to-use, flexible solution for management of data. Nonetheless, as databases get larger and extra mission critical, most users find that they need security, greater performance or availability. For the applications that need a robust data platform, move the fundamental databases to SQL Server. The Access SQL Server Migration Assistant (SSMA) can find Access databases. It is possible to export metadata regarding...
2 Pages(500 words)Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Assignment on topic IT425-1403A-01 : Systems Analysis, Design and Integration for FREE!

Contact Us