System Implementation
|
|
- Marylou Silvia Joseph
- 5 years ago
- Views:
Transcription
1 MIT- 534 Systems Analysis and Design Software Quality Assurance Quality assurance Software Engineering Lecture 8 System Implementation ดร. สล ล บ ญพราหมณ ส าน กว ชาสารสนเทศศาสตร Software Engineering Institute (SEI) Capability Maturity Model (CMM) Capability Maturity Model Integration (CMMI) Process improvement CMMI tracks an organization's processes, using five maturity layers Gary B. Shelly, Thomas J. Cashman, and Harry J. Rosenblatt Systems Analysis and Design. 7th Ed. Course Technology. 1 2 Overview of Application Development to translate the logical design into program and code modules that will function properly Creation of the System Design The tasks involved in system design produced an overall design and a plan for physical implementation Application Development Steps Module Start by reviewing documentation from prior SDLC phases and creating a set of program designs After the design is created, coding can begin 3 4
2 การเข ยนโปรแกรม Project Management Even a modest-sized project might have hundreds or even thousands of modules Important to set realistic schedules, meet project deadlines, control costs, and maintain quality เป นการแปลง logic ท ออกแบบโดยใช Diagram ต างๆเพ อเข ยนโดยใช ภาษาส งงาน (Programming language) โดยท วไปการเข ยนควรใช format มาตรฐานเพ อท า ให การด แลโปรแกรมท าได ง าย Should use project management tools and techniques 5 6 Structured Application Development Top-down approach Partitioning Modular design Must proceed carefully, with constant input from programmers and IT management to achieve a sound, well-integrated structure Must ensure that integration capability is built into each design and thoroughly tested Structure Charts Structure charts show the program modules and the relationships among them Control module Subordinate modules 7 8
3 Module Library module Data Couple Control Couple Flag A module uses a flag to signal a specific condition or action to another module Structure Charts Condition A condition line indicates that a control module determines which subordinate modules will be invoked, depending on a specific condition Loop A loop indicates that one or more modules are repeated 9 10 Cohesion and Coupling If you need to make a module more cohesive, you can split it into separate units, each of which performs a single function Loosely coupled Tightly coupled Status flag 11 12
4 Structure Chart Examples Drawing a Structure Chart Step 1: Review the DFDs Step 2: Identify Modules and Relationships Step 3: Add Couples, Loops, and Conditions Step 4: Analyze the Structure Chart and the Data Dictionary Other Structured Development Tools Program Flowcharts Pseudocode 15 16
5 Coding Programming Environments Each IT department has its own programming environment and standards Integrated development environments (IDEs) Generating Code Testing Syntax errors Desk checking Logic errors Structured walkthrough, or code review Design walkthrough Can generate editable program code directly from macros, keystrokes, or mouse actions Unit Testing Test data Programmers must test programs that interact with other programs and files individually Stub testing Regardless of who creates the test plan, the project manager or a designated analyst also reviews the final test results Integration Testing Integration testing, or link testing Testing the programs independently does not guarantee that the data passed between them is correct A testing sequence should not move to the integration stage unless it has performed properly in all unit tests 19 20
6 Testing the System Major objectives: Perform a final test of all programs Demonstrate that users can interact with the system successfully Verify that the system will handle all input data properly, both valid and invalid Ensure that the IT staff has the documentation and instructions needed to operate the system properly and that backup and restart capabilities of the system are adequate Verify that all system components are integrated properly and that actual processing situations will be handled correctly Confirm that the information system can handle predicted volumes of data in a timely and efficient manner Documentation System Testing Acceptance tests You should regard thorough testing as a costeffective means of providing a quality product If conflicting views exist, management will decide whether or not to install the system after a full discussion of the options Program Documentation System Documentation Operations Documentation User Documentation Online documentation 23 24
7 Management Approval After system testing is complete, you present the results to management If system testing produced no technical, economical, or operational problems, management determines a schedule for system installation and evaluation System Installation and Evaluation Remaining steps in systems implementation: Prepare a separate operational and test environment Provide training for users, managers, and IT staff Perform data conversion and system changeover Carry out post-implementation evaluation of the system Present a final report to management
8 Operational and Test Environments The environment for the actual system operation is called the operational environment or production environment The environment that analysts and programmers use to develop and maintain programs is called the test environment A separate test environment is necessary to maintain system security and integrity and protect the operational environment Training Training Plan The first step is to identify who should receive training and what training is needed The three main groups for training are users, managers, and IT staff You must determine how the company will provide training 31 32
9 Train people in groups, with separate training programs for distinct groups Select the most effective place to conduct the training Provide for learning by hearing, seeing, and doing Prepare effective training materials, including interactive tutorials Tutorial Vendor Training If the system includes the purchase of software or hardware, then vendor-supplied training is one of the features you should include in the RFPs (requests for proposal) and RFQs (requests for quotation) that you send to potential vendors Often gives the best return on your training dollars Outside Training Resources Many training consultants, institutes, and firms are available that provide either standardized or customized training packages You can contact a training provider and obtain references from clients Center for the Application of Information Technologies (CAIT) In-House Training The IT staff and user departments often share responsibility When developing a training program, you should keep the following guidelines in mind: Rely on previous trainees Train-the-trainer strategy When Training is complete, many organizations conduct a full-scale test, or simulation 35 36
10 Data Conversion Data Conversion Strategies The old system might be capable of exporting data in an acceptable format for the new system or in a standard format such as ASCII or ODBC If a standard format is not available, you must develop a program to extract the data and convert it Often requires additional data items, which might require manual entry Data Conversion Security and Controls You must ensure that all system control measures are in place and operational to protect data from unauthorized access and to help prevent erroneous input Some errors will occur It is essential that the new system be loaded with accurate, error-free data System Changeover Direct Cutover Involves more risk than other changeover methods Companies often choose the direct cutover method for implementing commercial software packages Cyclical information systems usually are converted using the direct cutover method at the beginning of a quarter, calendar year, or fiscal year 39 Parallel Operation Easier to verify that the new system is working properly under parallel operation than under direct cutover Running both systems might place a burden on the operating environment and cause processing delay Is not practical if the old and new systems are incompatible technically Also is inappropriate when the two systems perform different functions 40
11 Direct and Parallel installation Pilot Operation The group that uses the new system first is called the pilot site The old system continues to operate for the entire organization After the system proves successful at the pilot site, it is implemented in the rest of the organization, usually using the direct cutover method 41 Is a combination of parallel operation and direct cutover methods 42 Phased Operation You give a part of the system to all users The risk of errors or failures is limited to the implemented module only Is less expensive than full parallel operation Is not possible, however, if the system cannot be separated easily into logical modules or segments 43 44
12 Post-Implementation Tasks Post-Implementation Evaluation Includes feedback for the following areas: Accuracy, completeness, and timeliness of information system output User satisfaction System reliability and maintainability Adequacy of system controls and security measures Hardware efficiency and platform performance Effectiveness of database implementation Performance of the IT team Post-Implementation Tasks Completeness and quality of documentation Quality and effectiveness of training Accuracy of cost-benefit estimates and development schedules Post-Implementation Evaluation When evaluating a system, you should: Interview members of management and key users Observe users and computer operations personnel actually working with the new information system Read all documentation and training materials Examine all source documents, output reports, and screen displays 47 48
13 Use questionnaires to gather information and opinions form a large number of users Analyze maintenance and help desk logs Post-Implementation Evaluation Users can forget details of the developmental effort if too much time elapses Pressure to finish the project sooner usually results in an earlier evaluation in order to allow the IT department to move on to other tasks Ideally, conducting a post-implementation evaluation should be standard practice for all information systems projects Final Report to Management Your report should include the following: Final versions of all system documentation Planned modifications and enhancements to the system that have been identified Recap of all systems development costs and schedules A comparison of actual costs and schedules to the original estimates Post-implementation evaluation, if it has been performed Marks the end of systems development work 51
System development, design & implementation
System development, design & implementation Design of software The following are the principle for any software design : Modularity and partitioning : Top down methods are used through out the analysis
More informationManaging the development and purchase of information systems (Part 2)
Managing the development and purchase of information systems (Part 2) (Week 14, Thursday 4/12/2007) BUS3500 - Abdou Illia, Spring 2007 1 LEARNING GOALS Describe alternative systems development methodologies
More informationAuditing in an Automated Environment: Appendix E: System Design, Development, and Maintenance
Accountability Modules Auditing in an Automated Environment: Agency Prepared By Initials Date Reviewed By Audit Program - System Design, Development, and Maintenance W/P Ref Page 1 of 1 Procedures Initials
More informationStructured Analysis and Design
1 st Cut - Creating... 14:10 A Actors... 2:11 Additional Notations... 11:17 Alternative Names for the System... 13:15 Analysis - Overview... 1:9 Analysis and Design - Goals... 1:6 Analysis and Design -
More informationChapter 8: SDLC Reviews and Audit Learning objectives Introduction Role of IS Auditor in SDLC
Chapter 8: SDLC Reviews and Audit... 2 8.1 Learning objectives... 2 8.1 Introduction... 2 8.2 Role of IS Auditor in SDLC... 2 8.2.1 IS Auditor as Team member... 2 8.2.2 Mid-project reviews... 3 8.2.3 Post
More informationSystems Analysis and Design in a Changing World, Fourth Edition
Systems Analysis and Design in a Changing World, Fourth Edition Systems Analysis and Design in a Changing World, 4th Edition Learning Objectives Explain the purpose and various phases of the systems development
More informationIdentify the guidelines for system development. Discuss the purpose of the activities performed in the analysis phase
Discovering Computers 2010 Living in a Digital World Objectives Overview Define system development and list the system development phases Identify the guidelines for system development Discuss the importance
More informationModern Systems Analysis and Design. Third Edition. Jeffrey A. Hoffer Joey F. George Joseph S. Valacich. Chapter 17 System Implementation
Modern Systems Analysis and Design Third Edition Jeffrey A. Hoffer Joey F. George Joseph S. Valacich Chapter 17 System Implementation 17.1 Copyright 2002 Prentice-Hall, Inc. Learning Objectives Describe
More informationThe Development of Information Systems
Instructor: Kevin Robertson The Development of Information Systems Lecture Outline 12-1 Principles and Learning Objectives Understand the process used by organizations to manage the development of information
More informationTASKS IN THE SYSTEMS DEVELOPMENT LIFE CYCLE
SUMMARY AND REFERENCE ACTG 313 TASKS IN THE SYSTEMS DEVELOPMENT LIFE CYCLE PREPARATION PHASE 1. Identification of the Need for a new Information System 2. Initial Feasibility Study (always flawed because
More informationC H A P T E R SYSTEM DESIGN
C H A P T E R SYSTEM DESIGN Chapter Twelve Systems Design Describe the design phase in terms of your information building blocks. Identify and differentiate between several systems design strategies. Describe
More informationFour Essential Steps for Removing Risk and Downtime from Your POWER9 Migration
Four Essential Steps for Removing Risk and Downtime from Your POWER9 Migration Syncsort Four Essential Steps for Removing Risk and Downtime from Your POWER9 Migration With the introduction of IBM s POWER9
More information*ANSWERS * **********************************
CS/183/17/SS07 UNIVERSITY OF SURREY BSc Programmes in Computing Level 1 Examination CS183: Systems Analysis and Design Time allowed: 2 hours Spring Semester 2007 Answer ALL questions in Section A and TWO
More informationAnswer: D. Answer: B. Answer: B
1. Management information systems (MIS) A. create and share documents that support day-today office activities C. capture and reproduce the knowledge of an expert problem solver B. process business transactions
More informationChapter 8. Database Design. Database Systems: Design, Implementation, and Management, Sixth Edition, Rob and Coronel
Chapter 8 Database Design Database Systems: Design, Implementation, and Management, Sixth Edition, Rob and Coronel 1 In this chapter, you will learn: That successful database design must reflect the information
More informationIntroduction to Computer Programming/Handout 01 Page 1 of 13
Introduction to Computer Programming/Handout 01 Page 1 of 13 Table of Contents Table of Contents... 1 Learning Objectives... 2 Program... 2 Programmer... 2 Programming Language... 2 Types of Languages...
More informationCHAPTER 4 Data and Process Modeling (Phase 2: Systems Analysis)
CHAPTER 4 Data and Process Modeling (Phase 2: Systems Analysis) Jakrapop Maisen DATA FLOW DIAGRAMS A data flow diagram (DFD) shows how data moves through an information system but does not show program
More informationSOFTWARE ENGINEERING : A MCQ BOOK CODE : RBMCQ0602. Second Edition
SOFTWARE ENGINEERING : A MCQ BOOK CODE : RBMCQ0602 Second Edition S/W Engg. Fundamental 1) Which phase of the SDLC are information needs identified? A. preliminary investigation B. system analysis C. system
More informationChapter 8: General Controls and Application Controls
Accounting Information Systems: Essential Concepts and Applications Fourth Edition by Wilkinson, Cerullo, Raval, and Wong-On-Wing Chapter 8: General Controls and Application Controls Slides Authored by
More informationTesters vs Writers: Pen tests Quality in Assurance Projects. 10 November Defcamp7
Testers vs Writers: Pen tests Quality in Assurance Projects 10 November 2016 @ Defcamp7 Contents INTRODUCTION CONTEXT WHAT ABOUT AUDITING STANDARDS WHAT ABOUT INDEPENDENCE PEN TEST BETWEEN REGULATORY AND
More informationSUGGESTED SOLUTION IPCC MAY 2017EXAM. Test Code - I M J
SUGGESTED SOLUTION IPCC MAY 2017EXAM INFORMATION TECHNOLOGY Test Code - I M J 7 1 2 1 BRANCH - (MULTIPLE) (Date : 20.11.2016) Head Office : Shraddha, 3 rd Floor, Near Chinai College, Andheri (E), Mumbai
More informationAuditing IT General Controls
Auditing IT General Controls Amanthi Pendegraft and Nadine Yassine September 27, 2017 Agenda Introduction and Objectives IT Audit Fundamentals IT General Controls Overview Access to Programs and Data Program
More informationLangara College Spring archived
1 of 7 10/23/07 2:09 PM COMPUTING SCIENCE AND INFORMATION SYSTEMS DEPARTMENT COMPUTING SCIENCE AND INFORMATION SYSTEMS 1300 Systems Analysis & Design (3.0 credits) COURSE OUTLINE Spring 2008 Section 088
More informationFundamentals of Web Design
Fundamentals of Web Design Purpose of Web Design Inform/Educate Persuade Influences on Web Design Technology Used by Both Target Audience and Designer Nature of the Content Economy (Budget, Time, and Scale
More informationLangara College Spring archived
1 of 7 11/23/2006 1:29 PM COMPUTING SCIENCE AND INFORMATION SYSTEMS DEPARTMENT COMPUTING SCIENCE AND INFORMATION SYSTEMS 1300 Systems Analysis & Design (3.0 credits) COURSE OUTLINE Spring 2007 Section
More informationObjectives. Connecting with Computer Science 2
Objectives Learn how software engineering is used to create applications Learn some of the different software engineering process models Understand what a design document is and how it should be used during
More informationSTRUCTURED SYSTEM ANALYSIS AND DESIGN. System Concept and Environment
STRUCTURED SYSTEM ANALYSIS AND DESIGN Definition: - System Concept and Environment A system is an orderly grouping of independent components linked together according to plan to achieve a specific objective.
More informationMultiple Choice Questions
Chapter 15 System Implementation 331 Chapter 15 System Implementation Multiple Choice Questions 1. After maintenance, which of the following is the most expensive and most time consuming phase of the entire
More informationBusiness Analysis for Practitioners - Requirements Elicitation and Analysis (Domain 3)
Business Analysis for Practitioners - Requirements Elicitation and Analysis (Domain 3) COURSE STRUCTURE Introduction to Business Analysis Module 1 Needs Assessment Module 2 Business Analysis Planning Module
More informationDEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CS SOFTWARE ENGINEERING
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CS 6403 - SOFTWARE ENGINEERING QUESTION BANK TWO MARKS UNIT I SOFTWARE PROCESS AND PROJECT MANAGEMENT 1. What is software engineering? Software engineering
More information2016 HSC Information and Digital Technology Networking and hardware Marking Guidelines
2016 HSC Information and Digital Technology Networking and hardware Marking Guidelines Section I Multiple-choice Answer Key Question Answer 1 B 2 B 3 A 4 D 5 A 6 D 7 B 8 A 9 B 10 C 11 B 12 C 13 A 14 C
More informationIntroduction to System Analysis and Design
Introduction to System Analysis and Design - Dr. Mahmoud Abu-Arra - Mr. Ahmad Al-Ghoul Learning Objectives Explain systems development tools, including modeling, prototyping, and CASE tools Discuss and
More informationChapter 12. Systems Design. McGraw-Hill/Irwin. Copyright 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 12 Systems Design McGraw-Hill/Irwin Copyright 2007 by The McGraw-Hill Companies, Inc. All rights reserved. Objectives Describe the design phase in terms of your information building blocks. Identify
More informationSimply Java Programming: An Application Driven, Tutorial
Simply Java Programming: An Application Driven, Tutorial st Approach, 1 Edition 2004 Georgia Competency-Based Curriculum Frameworks, Career & Technical Education, Information Technology, Programming and
More informationINTRODUCTORY INFORMATION TECHNOLOGY CREATING ENTERPRISE APPLICATIONS. Faramarz Hendessi
INTRODUCTORY INFORMATION TECHNOLOGY CREATING ENTERPRISE APPLICATIONS Faramarz Hendessi INTRODUCTORY INFORMATION TECHNOLOGY Lecture 10 Fall 2010 Isfahan University of technology Dr. Faramarz Hendessi 2
More informationProject Management Pre-Implementation Project status reporting Post Implementation Assessment Phase Solidify Project Scope
Project Management 321 days 10/22/01 01/30/03 Pre-Implementation 14 days 10/22/01 11/08/01 Detailed Scope / Deliverable definition 5 days 10/22/01 10/26/01 Complete Work Breakdown Structure 1 day 10/22/01
More information2013 HSC Software Design and Development Marking Guidelines
0 HSC Software Design and Development Marking Guidelines Section I Multiple-choice Answer Key Question Answer C D B 4 B 5 C 6 A 7 A 8 D 9 A 0 C B D B 4 A 5 B 6 D 7 B 8 A 9 C 0 C Section II Question Describes
More information-archiving. project roadmap CHAPTER 1. archiving Planning, policies and product selection
INSIDE email archiving Planning, policies and product selection CHAPTER 1 Ready to dive into email archiving? Try this four-phased approach to get your project up and running Email-archiving project roadmap
More informationSOFTWARE ENGINEERING. Lecture 6. By: Latifa ALrashed. Networks and Communication Department
1 SOFTWARE ENGINEERING Networks and Communication Department Lecture 6 By: Latifa ALrashed Outline q q q q q q q q Define the concept of the software life cycle in software engineering. Identify the system
More informationROI. ROI: Economics of Certification May 9, 2002 Peter T Barry. Benefits of 3rd Party Transaction Certification
ROI: Economics of Certification May 9, 2002 Peter T Barry ROI Benefits of 3rd Party Transaction Certification Costs of 3rd Party Transaction Certification Copyright 2002 Peter T 1Barry Testing Alternatives
More informationHow Cisco Deploys Video Conferencing for Employee Collaboration
How Cisco Deploys Video Conferencing for Employee Collaboration Cisco Unified Video Advantage brings video telephony to Cisco Unified IP phones. Cisco IT Case Study / Video / : This case study describes
More informationUNIT 1-SOFTWARE PROCESS AND PROJECT MANAGEMENT
PART A (2 MARKS) UNIT 1-SOFTWARE PROCESS AND PROJECT MANAGEMENT 1. What is software engineering? Software engineering is a discipline in which theories, methods and tools are applied to develop professional
More informationKM COLUMN. How to evaluate a content management system. Ask yourself: what are your business goals and needs? JANUARY What this article isn t
KM COLUMN JANUARY 2002 How to evaluate a content management system Selecting and implementing a content management system (CMS) will be one of the largest IT projects tackled by many organisations. With
More informationA Blaise Editing System at Westat. Rick Dulaney, Westat Boris Allan, Westat
A Blaise Editing System at Westat Rick Dulaney, Westat Boris Allan, Westat Introduction Editing and delivering survey data pose challenges often quite separate from developing Blaise applications for data
More informationSystems Development Life Cycle SDLC Planning Analysis Detailed systems design Implementation Maintenance 7 8 SDLC - Planning SDLC - Analysis Planning
Objectives Computer Science 202 Database Systems: Database Design To learn what an information system is. To learn what a Database Life Cycle (DBLC) is. To learn what a Systems Development Life Cycle (SDLC)
More informationB.V. Patel Institute of Business Management, Computer & Information Technology, UkaTarsadia University : Software Engineering
Unit 1 1 Mark Questions 1. Write the categories of classification of a system? Ans: physical system, open and closed system, deterministic and probabilistic system, man-made information system 2. Which
More informationHALF-YEARLY EXAMINATIONS FEBRUARY
HALF-YEARLY EXAMINATIONS FEBRUARY 2016 Subject: Computing Form: 4 Time: 1½ hrs MARKING SCHEME Computing Form 4 Half Yearly Exams 2016 Page 1 Section A Answer ALL questions. Each questions carries 5 marks.
More informationSCO Monitoring Process Overview Revised December No narration, music playing. Course Number:
No narration, music playing. 1 This webcast includes spoken narration. To adjust the volume, use the controls at the bottom of the screen. While viewing this webcast, there is a pause and reverse button
More informationCS6403 SOFTWARE ENGINEERING Year / Sem : II / IV Sub. Code &Subject : CS6403 SOFTWARE ENGINEERING QUESTION BANKWITH ANSWERS
CS6403 SOFTWARE ENGINEERING Year / Sem : II / IV Sub. Code &Subject : CS6403 SOFTWARE ENGINEERING QUESTION BANKWITH ANSWERS UNIT 1-SOFTWARE PROCESS AND PROJECT MANAGEMENT 1. What is software engineering?
More informationChapter 12 Developing Business/IT Solutions
Chapter 12 Developing Business/IT Solutions James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA: McGraw-Hill, Inc., 2007. ISBN: 13 9780073323091
More informationThe Systems Life Cycle
[1] The Systems Life Cycle Introduction Systems analysis is, as the name states, the analysis of systems! The systems that we are talking about are the systems within organizations and businesses - systems
More informationContents. Process flow diagrams and other documentation
Process flow diagrams and other documentation Contents 1. Audit lessons 2. Process flows 3. Flowcharts 4. Information produced by entity (IPE) 5. Documentation Topic 1: Audit lessons Audit lessons Teams
More informationOperating Systems: MS DOS, WINDOWS 3.1, 95, 98, WINDOWS 2000, WINDOWS NT & XP, UNIX various server platforms.
IBRAHIM ABE GARBA 5993 Brookmont Dr, Columbus, Ohio 43026 Web Site: www.abeitconsulting.com Cell: 614 562 8471 E Mail: iagarba@gmail.com EDUCATION Master of Science in Information Resource Management,
More informationPeopleSoft Finance Access and Security Audit
PeopleSoft Finance Access and Security Audit City of Minneapolis Internal Audit Department September 20, 2016 1 Contents Page Background... 3 Objective, Scope and Approach... 3 Audit Results and Recommendations...
More informationCS504-Softwere Engineering -1 Solved Objective Midterm Papers For Preparation of Midterm Exam
CS504-Softwere Engineering -1 Solved Objective Midterm Papers For Preparation of Midterm Exam MIDTERM EXAMINATION 2010 Question No: 1 ( Marks: 1 ) - Please choose one By following modern system engineering
More informationRethinking VDI: The Role of Client-Hosted Virtual Desktops. White Paper Virtual Computer, Inc. All Rights Reserved.
Rethinking VDI: The Role of Client-Hosted Virtual Desktops White Paper 2011 Virtual Computer, Inc. All Rights Reserved. www.virtualcomputer.com The Evolving Corporate Desktop Personal computers are now
More informationREQUEST FOR PROPOSALS ZONING ORDINANCE
REQUEST FOR PROPOSALS ZONING ORDINANCE City of Allegan Allegan County, Michigan A. Background. The City of Allegan is hereby requesting proposals from qualified, multidisciplinary professionals in the
More informationQUICKBOOKS TO ACCOUNTEDGE CONVERSION GUIDE
QUICKBOOKS TO ACCOUNTEDGE CONVERSION GUIDE Our goal is to save you as much time as possible while you transition your business accounting software. While accounting is accounting, AccountEdge takes a very
More informationInformation Systems. Software Engineering. MCQ - Part 2
Information Systems & Software Engineering MCQ - Part 2 Information Systems & Software Engineering MCQ - Part 2 Changes made to the system to reduce the future system failure chances is called Preventive
More informationPDA Trainer Certification Process V 1.0
PDA Trainer Certification Process V 1.0 ~ 1 ~ Index Introduction to the Certification Process... 3 Certification Process Steps... 4 Description of the Certification Process Steps... 5 A - PDA Trainer Profile...
More informationEE/CpE322 Lecture 3. Bruce McNair Based on Engineering Design: A Project-Based Introduction (the 3 rd ed.), by C.L. Dym and P.
EE/CpE322 Lecture 3 Bruce McNair Based on Engineering Design: A Project-Based Introduction (the 3 rd ed.), by C.L. Dym and P. Little A Model of the Design Process Stage 1: Problem Definition Input: Client
More informationVETRI VINAYAHA COLLEGE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
VETRI VINAYAHA COLLEGE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CS6403 SOFTWARE ENGINEERING II year/ IV sem CSE (Regulation 2013) UNIT 1- SOFTWARE PROCESS AND PROJECT
More informationITC213: STRUCTURED PROGRAMMING. Bhaskar Shrestha National College of Computer Studies Tribhuvan University
ITC213: STRUCTURED PROGRAMMING Bhaskar Shrestha National College of Computer Studies Tribhuvan University Lecture 03: Program Development Life Cycle Readings: Not Covered in Textbook Program Development
More information/Internet Random Moment Sampling (RMS)
E-mail/Internet Random Moment Sampling (RMS) State of Indiana First Steps RMS Training May 2009 SequoiaRMS 1 Objectives 1. Understand the purpose of RMS 2. Guidance on accurate and timely completion of
More informationDeveloping a Workflow for the Integration of Patient Education Materials into EPIC
Developing a Workflow for the Integration of Patient Education Materials into EPIC Muhammad-Sharif Moustafa Mentors: Kristine Petre and Linda Schwartz Library Services Abstract The purpose of this project
More information2016 HSC Information and Digital Technology Web and software applications Marking Guidelines
2016 HSC Information and Digital Technology Web and software applications Marking Guidelines Section I Multiple-choice Answer Key Question Answer 1 B 2 B 3 A 4 D 5 A 6 D 7 B 8 A 9 B 10 C 11 C 12 D 13 C
More informationDataworks Development, Inc. P.O. Box 174 Mountlake Terrace, WA (425) fax (425)
Dataworks Development, Inc. P.O. Box 174 Mountlake Terrace, WA 98043 (425) 673-1974 fax (425) 673-2506 The Freezerworks Validation Verification Package Dataworks Development, Inc. has over 20 years of
More informationOverview of Today s Lecture. Analytical Evaluation / Usability Testing. ex: find a book at Amazon.ca via search
Overview of Today s Lecture Analytical Evaluation / Usability Testing November 17, 2017 Analytical Evaluation Inspections Recapping cognitive walkthrough Heuristic evaluation Performance modelling 1 2
More information"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary
Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business
More informationDetermining Best Fit for ITIL Implementation
Determining Best Fit for ITIL Implementation Presentation to the DC SPIN October 4, 2006 www.davidconsultinggroup.com Agenda Introduction to ITIL Preparing for ITIL Best Fit Analysis Relationship of ITIL
More informationAuditing in an Automated Environment: Appendix B: Application Controls
Accountability Modules Auditing in an Automated Environment: Initials Date Agency Prepared By Reviewed By Audit Program - Application W/P Ref Page 1 of 1 The SAO follows control objectives established
More informationIntroduction to Business continuity Planning
Week - 06 Introduction to Business continuity Planning 1 Introduction The purpose of this lecture is to give an overview of what is Business Continuity Planning and provide some guidance and resources
More informationQM Chapter 1 Database Fundamentals Version 10 th Ed. Prepared by Dr Kamel Rouibah / Dept QM & IS
QM 433 - Chapter 1 Database Fundamentals Version 10 th Ed Prepared by Dr Kamel Rouibah / Dept QM & IS www.cba.edu.kw/krouibah Dr K. Rouibah / dept QM & IS Chapter 1 (433) Database fundamentals 1 Objectives
More informationDarshan Institute of Engineering & Technology for Diploma Studies
REQUIREMENTS GATHERING AND ANALYSIS The analyst starts requirement gathering activity by collecting all information that could be useful to develop system. In practice it is very difficult to gather all
More informationNWA Quality Analyst Version 6.2 Update Notes from Version 6.1 or earlier December 2010
NWA Quality Analyst Version 6.2 Update Notes from Version 6.1 or earlier December 2010 NWA Quality Analyst Version 6.2 represents a significant new release of Quality Analyst, with several new features
More informationS/W Programming & Languages
S/W Programming & Languages Overview Programming five steps Five generations High-level programming Object-oriented programming Internet programming 2 Programming What are the five steps of the programdevelopment
More informationSOFTWARE ENGINEERING DECEMBER. Q2a. What are the key challenges being faced by software engineering?
Q2a. What are the key challenges being faced by software engineering? Ans 2a. The key challenges facing software engineering are: 1. Coping with legacy systems, coping with increasing diversity and coping
More informationChapter 4 Objectives
Chapter 4 Objectives Eliciting requirements from the customers Modeling requirements Reviewing requirements to ensure their quality Documenting requirements for use by the design and test teams 4.1 The
More informationWIntroduction. Motion Control Architectures. Chuck Lewin, Founder of Performance Motion Devices
Motion Control Architectures Chuck Lewin, Founder of Performance Motion Devices WIntroduction hen engineers think of advances in motion control technology, they usually think of faster motors, improved
More informationSoftware Testing Interview Question and Answer
Software Testing Interview Question and Answer What is Software Testing? A process of analyzing a software item to detect the differences between existing and required conditions (i.e., defects) and to
More informationTHE BCS PROFESSIONAL EXAMINATION BCS Level 6 Professional Graduate Diploma in IT September 2017 EXAMINERS REPORT. Software Engineering 2
General Comments THE BCS PROFESSIONAL EXAMINATION BCS Level 6 Professional Graduate Diploma in IT September 2017 EXAMINERS REPORT Software Engineering 2 The pass rate was 40% representing the lowest mark
More informationFunction Modules Objective The following section is intended to explain: What function modules are Components of function modules
Function Modules Objective The following section is intended to explain: What function modules are Components of function modules Testing and releasing of function modules Function Modules Function modules
More informationTrainer Portal Web Guide
Trainer Portal Web Guide 2 Trainer Portal Web Guide Trainer Portal Web Guide 3 1 Dashboard... 4 2 Schedule... 5 3 Managing... Classes 6 Recording Attendance... 7 Recording Signatures... 9 Endorsing Attendance...
More informationSECTION 10 CONTRACTING FOR PROFESSIONAL SERVICES CONSULTANT COMPETITIVE NEGOTIATION ACT (CCNA)
SECTION 10 CONTRACTING FOR PROFESSIONAL SERVICES CONSULTANT COMPETITIVE NEGOTIATION ACT (CCNA) 10.0 INTRODUCTION The purpose of this procedure is to provide guidance for hiring professional firms for architectural,
More informationBusiness Continuity Planning
Information Systems Audit and Control Association www.isaca.org Business Continuity Planning AUDIT PROGRAM & INTERNAL CONTROL QUESTIONNAIRE The Information Systems Audit and Control Association With more
More informationWireless# Guide to Wireless Communications. Objectives
Wireless# Guide to Wireless Communications Chapter 12 Wireless Communications in Business Objectives List the advantages of wireless communications for businesses Discuss the challenges of wireless communications
More informationProtecting Information Assets - Week 11 - Application Development Security. MIS 5206 Protecting Information Assets
Protecting Information Assets - Week 11 - Application Development Security MIS5206 Week 11 Team Presentations Application Development Security Test Taking Tip Quiz Application Development Security As applications
More information: What are the features of a communications-driven DSS?
by Daniel J. Power Editor, DSSResources.COM Questions about the features and characteristics of the five types of DSS (Power, 2002) are common in my email. This Ask Dan column examines communications-driven
More informationNORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers
Identify Protect Detect Respond Recover Identify: Risk Assessments & Management 1. Risk assessments are conducted frequently (e.g. annually, quarterly). 2. Cybersecurity is included in the risk assessment.
More informationSeptember Commonwealth of Pennsylvania Office of Developmental Programs. Provider Cost Report Follow-up Training
September 2009 Commonwealth of Pennsylvania Office of Developmental Programs Provider Cost Report Follow-up Training Agenda Overview of Cost Report Submission Process Logging on to the Cost Report Website
More informationPART 5: INFORMATION TECHNOLOGY RECORDS
PART 5: INFORMATION TECHNOLOGY RECORDS SECTION 5 1: RECORDS OF AUTOMATED APPLICATIONS GR5800 01 AUDIT TRAIL RECORDS Files needed for electronic data audits such as files or reports showing transactions
More informationConnecting with Computer Science Chapter 13 Review: Chapter Summary:
Connecting with Computer Science Chapter 13 Review: Chapter Summary: Software engineering involves many different steps to create an application that meets end user s needs. The process of building an
More informationSERVICE TRANSITION ITIL INTERMEDIATE TRAINING & CERTIFICATION
SERVICE TRANSITION ITIL INTERMEDIATE TRAINING & CERTIFICATION WHAT IS ITIL ST? The intermediate level of ITIL offers a role based hands-on experience and in-depth coverage of the contents. Successful implementation
More informationApril Appendix 3. IA System Security. Sida 1 (8)
IA System Security Sida 1 (8) Table of Contents 1 Introduction... 3 2 Regulatory documents... 3 3 Organisation... 3 4 Personnel security... 3 5 Asset management... 4 6 Access control... 4 6.1 Within AFA
More informationA Beginner s Guide to Programming Logic, Introductory. Chapter 2 Working with Data, Creating Modules, and Designing High-Quality Programs
A Beginner s Guide to Programming Logic, Introductory Chapter 2 Working with Data, Creating Modules, and Designing High-Quality Programs Objectives In this chapter, you will learn about: Declaring and
More informationAPPLYING YOUR TESTING SKILLS
APPLYING YOUR TESTING SKILLS CONTENTS I. Configuration Testing 1. An Overview of Configuration Testing: 2. Isolating Configuration Bugs 3. Sizing up the Job 4. Approaching the Task: 5. Decide the Types
More informationSystems Analysis & Design
Systems Analysis & Design Dr. Ahmed Lawgali Ahmed.lawgali@uob.edu.ly Slide 1 Systems Analysis & Design Course Textbook: Systems Analysis and Design With UML 2.0 An Object-Oriented Approach, Second Edition
More informationACL Interpretive Visual Remediation
January 2016 ACL Interpretive Visual Remediation Innovation in Internal Control Management SOLUTIONPERSPECTIVE Governance, Risk Management & Compliance Insight 2015 GRC 20/20 Research, LLC. All Rights
More informationQuality Assurance & Standards
Quality Assurance & Standards PSD3 Nov 2013 1 Overview Quality Assurance (QA)» checking what we are producing QA standards» checking the checking 2 Further Reading Sommerville» 9 th Edition, Chap. 24»
More informationExamination Questions Time allowed: 1 hour 15 minutes
Swedish Software Testing Board (SSTB) International Software Testing Qualifications Board (ISTQB) Foundation Certificate in Software Testing Practice Exam Examination Questions 2011-10-10 Time allowed:
More information