Please enable JavaScript.
Coggle requires JavaScript to display documents.
SYSTEM DEVELOPMENT LIFE CYCLE (SDLC) (IMPLEMENTATION (DEVELOP PROGRAM AND…
SYSTEM DEVELOPMENT LIFE CYCLE (SDLC)
PLANNING
.
REVIEW PROJECT REQUEST: the project wiil be received and handled by a group of people called steering committee
PRIOTIZE PROJECT REQUEST: The informationsystem project that receive the heighest priority or being the most important will be given the immediate attention and approval from managment.
ALLOCATE RESOURCES: Project with the highest priority will be allocated with resources such as money,people and equipment.
IDENTIFY PROJECT DEVELOPMENT TEAM: Responsible to determine the specific objectives of the information system and responsible to deliver a system that meets the objectives.
ANALYSIS
PERFORM DETAILED ANALYSIS ACTIVITIES :Develops the proposed solution without regard to any specific hardware or software
3 MAJOR ACTIVITIES
-study how the current system works
-determine the users' wants, needs & requirements.
-recommend a solution. The purpose of the system proposal to assess the feasibility of each alternative modifying or expanding current system.
CONDUCT PREMILINARY INVESTIGATION: To determine the exact nature of the problem or improvement & decide whether it is worth to pursue or not
DESIGN
DESIGN
ACQUIRE HARDWARE AND SOFTWARE IF NECESSARY
identify technical specification, request vendor proposal, test and evaluate vendors proposals , make a decision
DEVELOP DETAILS OF SYSTEM
Database design, Input and output design, Program Design
IMPLEMENTATION
DEVELOP PROGRAM AND APPS
program and apps are developed or modified either by an outside firm or in house
INSTALL AND TEST NEW SYSTEM
-unit test ,system test, integration test, acceptance test
TRAIN USERS
One-on-one session, Classroom style, Web based training
CONVERT TO NEW SYSTEM
Direct conversion, Parallel conversion, phased conversion, Pilot conversion
MAINTANANCE
PERFORM MAINTENANCE ACTIVITIES
Involve modifying or expanding an existing information system
MONITOR SYSTEM PERFORMANCE
determine whether the system is inefficient or unstable at any point
EVALUATE SYSTEM SECURITY
Users be allowed to access data and information for which they are authorized