• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

software development

Extracts from this document...

Introduction

Software Development Introduction: A software development is a set of activities that results in software products. Software development may include new development, modification, reuse, re-engineering, maintenance, or any other activities that result in software products. A description of the planned tasks and activities to be used by the developer to implement the required development programme. This description includes organizational responsibilities, resources, methods, depth of effort, and combination with other programme engineering and management activities and related systems. Methods: * Prototypes: prototyping is the framework of activities during software development of creating prototypes. Basic principles of prototyping are: * Complete development methodology, but rather an approach to handling selected portions of a larger, more traditional development methodology (i.e. Spiral or Rapid Application Development (RAD)). * Attempts to reduce project risk by breaking a project into smaller segments and providing more ease-of-change during the development process. * While most prototypes are developed with the expectation that they will be discarded, it is possible in some cases to evolve from prototype to working system. * A basic understanding of the fundamental business problem is necessary to avoid solving the wrong problem. ...read more.

Middle

* Testing tools: Since (OSS) projects undergo frequent integration, tools that help automate testing during system integration are used. An example of such tool is Tinderbox. Tinderbox enables participants in an (OSS) project to detect errors during system integration. * Code and Fix: In software development, a small coding error can result in a critical vulnerability that ends up compromising the security of an entire system or network. Many times, security vulnerability is not caused by a single error, however, but rather by errors that occur during the course of the development cycle. A coding error is introduced, it goes undetected during the testing phases, and available defence mechanisms do not stop a successful attack. Choice of language: Effective usage of a general purpose modelling language in software engineering poses a need for language customization- adjustment of the language for a specific purpose. The following points are some examples of a choice of language: Visual Basic (VB): Visual Basic was derived from BASIC and enables the rapid application development (RAD) of graphical user interface (GUI) applications, access to databases using DAO, RDO, or ADO, and creation of ActiveX controls and objects. ...read more.

Conclusion

The beauty of bespoke systems is that they are tailored to the exact requirements of the company allowing the software to fully integrate. The cost of bespoke software can be much higher than off-the-shelf solutions. Individually software often needs teams comprising of dozens of people each bringing particular skills such as analysts, programmers, hardware and software specialists and technical writers. The process of software and systems development is a difficult one involving highly skilled people and consuming a great deal of time and resources. However, off-the-shelf systems can be limited in terms of performance, and businesses often find themselves working around the software instead of the software working round them. The real challenge that lies ahead is how to combine the two to take the advantage of the strengths of each whilst eliminating the weaknesses. Customers are increasingly demanding 'smart' solutions, and more companies need to respond by offering them. Conclusion: Celebration Car Hire is considering having some software developed specifically for the company and therefore I have produced a simple guide to explain the basic concepts of software development. I have done a report on the methods for the software development which will guide and explain the basic concept. I tried to make it as simple as possible in terms they will understand. ?? ?? ?? ?? 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Management & Manipulation of Information section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Management & Manipulation of Information essays

  1. Marked by a teacher

    Hardware and Network issues in e-commerce

    5 star(s)

    in built security features such as a firewall.and VPN support facilities (Shultz, 2001). Cost Another issue associated with broadband is cost. This refers to both set up costs for the consumer and the provider. For the general consumer, before considering to get broadband, they have to consider two main costs.

  2. Marked by a teacher

    STELLA Science Simulation Software.

    A pendulum swings with a specific period which depends (mainly) on its length. When given an initial push, it will swing back and forth at constant amplitude.

  1. Analysis of market, environmental forces, competitors, marketing mix and consumer implementation.

    At present the strategies, which companies such as Sony and Nintendo have adopted, are to enhance and update their current hardware giving them a new name and to release new software titles compatible to the new hardware. However the way the industry will be moving in the future will be

  2. Designing a booking system for an Estate Agent.

    There are times when negotiators make a note of visiting times and dates on the diary but however they do not take a note of which negotiators are already visiting a property and what time. The way they confirm this is by having a conversation with fellow negotiators about which time they are booked for.

  1. Database Design

    This is what comes up when I click Next It gives me the option of choosing between giving the button a picture or a name. Once I have selected it, I click Next and it takes me to the next window asking me to give the button a name I named it 'Find Record' then clicked on Finish.

  2. ICT Security Report

    They could also only use special delivery so that they are sure it goes to the correct address and the person specially signs that it whom it is to. EXTERNAL THREATS A business can also face many potential external threats that may try to retrieve or pilfer customer data.

  1. Business Systems

    write down each order. Now with EDI it is a lot faster and easier to plan and control multiple orders. A drawback to this is if the delivery service does not deliver the item ordered in time then the customer will not be happy.

  2. hardware and software

    correct it, but in Microsoft Excel it's easier to correct any mistake. In the other hand there is a good point using Microsoft Access which's that records can be updated as you command them which could save you a huge amount of time.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work