• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Introducing a new system using the Systems Life Cycle

Extracts from this document...

Introduction

Introducing a new system using the Systems Life Cycle 1. * The current system may no longer be suitable for its purpose * Technological developments may have made the current system redundant or outdated * The current system may be too inflexible or expensive to maintain 2. Information systems fail for many reasons at any stage of the systems life cycle:- Analysis Not enough time / money spent on analysis Objectives poorly defined Not enough staff / lack on continuity Users not sufficiently involved Analysts have poor communication skills / do not establish what the requirements are Design Users not involved Meets original design but not flexible for minor changes Management not involved Major changes to procedures implemented without consideration on staffing impact Programming Not enough time to complete programming / not enough computing resources Programmers have insufficient skills Not enough staff / lack on continuity Poor documentation - problems with staffing changes Testing No thorough testing plan Lack of user involvement No ...read more.

Middle

If the preliminary survey identifies a problem then the objectives of the system will be defined at this stage. Feasibility Study The existing system is looked at briefly and various alternatives (such as replacing the existing system or upgrading it or extending it) are considered. A formal report is prepared for management identifying the solution the greatest cost benefit. Management can then decide whether or not to proceed to the next stage System Investigation Information about the existing system is collected. Methods used to carry out the system investigation will include looking at existing system documents, questionnaires, interviews and direct observation.. This information will be used to determine the information requirements of the system during the design stage. As part of the system investigation the remaining stages will be described and a time scale determined. Systems Analysis At this stage the information gathered during the system investigation is used to analyse the existing system, determining exactly what functions it performs and what problems need to be overcome. ...read more.

Conclusion

Design will normally be structured to follow a top-down methodology. The overall problem will be broken down in to smaller and smaller sub-problems which will then be solved System Implementation The system is produced. Program code is written so that the design specified in the design stage is turned into a real system. The system is tested, staff trained and old files converted to the new system or new files set up and the existing system is changed over to the new one. Changeover may be direct - the old system is discontinued and the new one takes over or parallel - where the new system is run alongside the existing until it is bedded in. An alternative is to run the new system as a prototype. Review and maintenance The System delivered is measured against the system requirements documentation and its performance monitored. Inevitably some aspects of performance will be unsatisfactory and this will lead back to the first stage of the system life cycle which then repeats over again. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    information systems assignment 2

    4 star(s)

    A database is a structured way of collecting records and data, this Is stored on a computer system.The structure is achieved by organizing the data according to a data model, this is a relational model. Databases are good to use in a supermarket rather than other tools due to many reasons which the other tools cannot do.

  2. Computer systems assignment 1

    an antivirus installation and it tells me to click "Next" to start the installation. In the next window it allows me to choose the installation type whether it is local installation or central installation.

  1. Computing Project

    I will also outline to the user that backups should be made everyday Details of how to carry out backing up of data will be given to the user as well. 8. System Security (access control) To prevent unauthorised access to the system I will provide a security feature which consists of a username and password.

  2. Smart Card System

    The Java Card API also allows applications written for one smart card platform enabled with Java Card technology to run on any other such platform. From this two new technology, Java smart card technology becomes more efficient to be used.

  1. With diagrams compare and contrast the relative advantages and disadvantages of digital transmission over ...

    Every few meters a person at the back of the boat dropped down a plumb-line (a weight at the end of a rope), until it reached the bottom of the harbour. The line had knots tied in it at regular spaces and the person called out the number of knots

  2. Computing Project

    Also the laptop can be connected to a computer in the office via a USB cable meaning that the data could be backed up and if needed archived. IDENTIFICATION OF SUITABLE ALGORITHMS FOR DATA TRANSFER Process to calculate Total number of lessons so far = ([Student Lessons])*([Total])

  1. Propose to research the WTLS or Wireless transport layer security protocol along with the ...

    The program would assume that the hacker does not know the algorithm by which the server places the packet into RAM on the server computer. Because of this, the hacker must variably guess where the server would put the packet in RAM.

  2. Infernowear is a new company run by a self-employed creative designer aiming to producing ...

    This will drastically improve productivity and the speed at which orders are placed, it will also increase reliability, as there is no fileing system at present of order and customer details.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work