Question

List the six phases of the System Development Life Cycle (as described in my notes and the book in chapter 10). For eac...

  • List the six phases of the System Development Life Cycle (as described in my notes and the book in chapter 10). For each phase, describe two tasks that are performed in that phase. Bullet points are the recommended approach to answering this question.
  • List the five phases of the Program Development Life Cycle (as described in my notes and the book in chapter 11). For each phase, describe two tasks that are performed in that phase. Bullet points are the recommended approach to answering this question.
  • Describe (do not just name) ten strategies and/or technologies that will protect a company’s computers from security problems.  Bullet points are the recommended approach to answering this question.   You should use chapter 9 to get answers for this question.
  • Define the following database terms: record, table, query, SQL, and primary key.
0 0
Add a comment Improve this question Transcribed image text
Answer #1

Answer 1) Six phases of the System Development Life Cycle :

  1. Planning :--
    -- The first stage is concerned with the feasibility study of the system and its resources,costs, time, benefits and other items.
    -- The purpose of this step is to find out the scope of the problem and determine solutions.
  2. System Analysis and Requirement
    -- This phase consists of analyzing the end user's system needs and requirements, how the end user wants the system to be.
    -- Functional requirements of the project or solution of the system is concerned here.
  3. System design and
    -- This phase is concerned with designing the system's functionalities(features and specifications) with respect to the requirements gathered in the previous stage.
    -- desired features and operations are described in detail.
  4. Development
    -- Development of the modules based on the functional requirements is done here.
    -- Coding is the major part.
  5. Integration and Testing
    -- Involves systems integration and system testing (of programs and procedures)
    -- Each individual module is tested and then they are integrated and again tested for meeting the customer expectations.
  6. Operation and Maintenance
    -- End users can finally use the system and test it
    -- Regular update and maintenance is taken care of here.

Answer 2) : Five phases of the Program Development Life Cycle :

  1. Requirement Analysis
    -- The software requirements are analyzed and Software Requirement Specification(SRS) document is created.
    -- All details regarding who will use the software, how they will use it, what will be the input , what will be the output, etc are documented in the SRS.
  2. Design
    -- The basic model of the software is designed. The various modules it will have and their functions.
    -- How each module will be communicate with each other is planned.
  3. Development
    -- Coding is done based on the design. The whole design comes to realization in this stage.
    -- Coding language is chosen as per the feasibility criteria.
  4. Testing
    -- Verification and validation is done this phase. Whether the software is working as per the SRS.
    -- Each module is unit tested and then whole software is integrated and tested again.
  5. Maintenance
    -- Once when the customers starts using the developed system then the actual problems comes up and needs to be solved from time to time.
    -- This process where the care is taken for the developed product is known as maintenance.

Answer 3) : Ten strategies and/or technologies that will protect a company’s computers from security problems
1)Interoperability - Tighten the collaborative actions amongst different systems based on semantics, technicalities and policies.
2) Authentication - Improve the identification and verification technologies to provide more security, ease of use and administration.
3) Encouraging all organizations, whether public or private, to designate a person to serve as Chief Information Security Officer (CISO) who will be responsible for cybersecurity initiatives
4) Increase your employee skillset: Train the employees regularly so that they are aware of the lates computer threats and how to protect computers.
5) Backup your data: Always backup your data, files and any electronic information that is vital to your business as well as the most recent drafts/iterations of projects your team is working on.
6) Use Cloud Storage: Data back up can use huge storage and run a risk of crashing the system. In such a case Cloud storage is beneficial and secure.
7) Safe Email : Choosing an email provider that places an emphasis on security through anti virus and spam protection is smart and should minimize your risks considerably.
8)Firewall : can be either software or hardware-based and will analyze the incoming data to your network and you can customize the filtering criteria.
9) WEP : Wi-Fi Protected Access (WPA) encryption is considered to be superior to Wireless Encryption Protocol (WEP) because it offers stronger encryption through temporal key integrity protocol.
10) Browser Security : Secure the browser using technologies.

Answer 4) : Define the following database terms: record, table, query, SQL, and primary key.

Record : A record is simply a row in the database table. It is composed of fields, each of which contains information about an entity.
Table : A database table is a collection of row(records) and columns(attributes) that hold data or information about a certain entity.
Query: A query is a request made to the database to extract certain information from it.
SQL : SQL stands for Structured Query Language. It is used to query, update and manage relational databases.
Primary Key: It is a unique key in the relational database management system, which identifies each row in a relation uniquely. A relational database must have only one primary key.

Add a comment
Know the answer?
Add Answer to:
List the six phases of the System Development Life Cycle (as described in my notes and the book in chapter 10). For eac...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • List the six phases of the System Development Life Cycle (SDLC), as described in the course...

    List the six phases of the System Development Life Cycle (SDLC), as described in the course textbook and describe the tasks that may be performed in each step. 12pt Paragraph Β Ι Ο A T2 ...

  • Module 8: Journal Assignment-Explaining Memory to a Child (20 points possible) Chapter 8 in your textbook...

    Module 8: Journal Assignment-Explaining Memory to a Child (20 points possible) Chapter 8 in your textbook starts off with a section on conceptualizing memory. In my PowerPoint lecture notes that I've posted, you will see that I've annotated a figure called the "Atkinson-Shiffrin Memory Model" on Slide #3 from Chapter 8; however, you will not find this figure in your book (assuming you have the 8th edition or higher). In contrast, Figure 8.1 from your textbook (found on page 233...

  • Module 8: Journal Assignment-Explaining Memory to a Child (20 points possible) Chapter 8 in your textbook...

    Module 8: Journal Assignment-Explaining Memory to a Child (20 points possible) Chapter 8 in your textbook starts off with a section on conceptualizing memory. In my PowerPoint lecture notes that I've posted, you will see that I've annotated a figure called the "Atkinson-Shiffrin Memory Model" on Slide #3 from Chapter 8; however, you will not find this figure in your book (assuming you have the 8th edition or higher). In contrast, Figure 8.1 from your textbook (found on page 233...

  • I need help with my very last assignment of this term PLEASE!!, and here are the instructions: After reading Chapter T...

    I need help with my very last assignment of this term PLEASE!!, and here are the instructions: After reading Chapter Two, “Keys to Successful IT Governance,” from Roger Kroft and Guy Scalzi’s book entitled, IT Governance in Hospitals and Health Systems, please refer to the following assignment instructions below. This chapter consists of interviews with executives identifying mistakes that are made when governing healthcare information technology (IT). The chapter is broken down into subheadings listing areas of importance to understand...

  • Select two of the discussion questions and analyze the case study using project management principles. Apply...

    Select two of the discussion questions and analyze the case study using project management principles. Apply your knowledge of project management to the facts presented in the case study to describe how you would proceed. We only need to answer one of the questions. A thorough answer will probably require 300 to 500 words for each question.   Feel free to use text bullets, tables, or graphics to summarize your points. Questions Q1: Make or Buy decision – Describe the make...

  • How can we assess whether a project is a success or a failure? This case presents...

    How can we assess whether a project is a success or a failure? This case presents two phases of a large business transformation project involving the implementation of an ERP system with the aim of creating an integrated company. The case illustrates some of the challenges associated with integration. It also presents the obstacles facing companies that undertake projects involving large information technology projects. Bombardier and Its Environment Joseph-Armand Bombardier was 15 years old when he built his first snowmobile...

  • 10. Write a one-page summary of the attached paper? INTRODUCTION Many problems can develop in activated...

    10. Write a one-page summary of the attached paper? INTRODUCTION Many problems can develop in activated sludge operation that adversely affect effluent quality with origins in the engineering, hydraulic and microbiological components of the process. The real "heart" of the activated sludge system is the development and maintenance of a mixed microbial culture (activated sludge) that treats wastewater and which can be managed. One definition of a wastewater treatment plant operator is a "bug farmer", one who controls the aeration...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT