Skip to main content

System development And Life Cycle- Recognition of need And Feasibility

 System Development And Life Cycle 



An effective System Development Life Cycle (SDLC) should result in a high quality system that meets customer expectations, reaches completion within time and cost evaluations, and works effectively and efficiently in the current and planned Information Technology infrastructure.
  • Recognition of Need 
Key Question: What is the problem or opportunity?
Stage: Preliminary survey / initial investigation
Result: Statement of scope and objectives performance criteria.

• Analyst must know what the problem is before it can be solved.
• The basic for system development is to recognize of need to improve or develop an information system or a procedure.
• This need leads to a preliminary survey or an initial investigation to determine that alternative system can solve the problem.
• It includes looking into duplication of effort, bottlenecks, inefficient existing procedures or weather parts of existing system would be candidates for computerization.
• If  problem is serious management want to have an analyst.
• First task of analyst is to specify the scope and objective of the problem.

  • Feasibility Study
Key Question: What are the user demonstrable needs? Is the problem solving? How can the problem be redefined?
Stage: Evaluation of existing system and procedures, analysis of alternative candidate system, cost estimates.
Result: Technical feasibility, cost / benefit analysis, system scope and objectives, statement of new scope and objectives. 

• Feasibility study is a test of a system proposal according to its workability, impact on the organization, ability to meet user needs, and effective use of resources.
• Focuses on 3 major questions:
  1. What are user's demonstrable needs and how does a candidate system meet them?
  2. What resources are available for given candidate system? Is problem worth solving?
  3. What are the likely impact of the candidate system on the organization? How well does it fit within the organization's master MIS plan?
 Feasibility study is not to solve problem but to acquire sense of its scope.
 In this study aspects of problem to be included in system are determined.
 Cost and benefits are estimated with great accuracy at this stage.
 This is for detailing the nature and scope of the proposed system.
 This is crucial / important point in life cycle.
 Changes in proposal are made in writing, depending on the complexity, size and cost of the project.
 The changes should be verified before committing the project to design.
If you are interested to know more on any other subject in which you are interested or if you have any doubts then tell us in comment about it.  








Comments

Popular posts from this blog

8085 Microprocessor: De-multiplexing of AD0-AD7 Address and Data Lines

  De-multiplexing of AD0-AD7 of 8085 Microprocessor THE ADDRESS AND DATA BUSES: • 8085 Microprocessor have total 16 address lines and 8 data lines. • 8 signal lines A8 – A15 which are unidirectional. • The other 8 address bits are multiplexed with the 8 data bits. So, the bits AD0 – AD7 are bi-directional and serve as A0 – A7 (address bus) and D0 – D7 (data bus) at the same time. • During the execution of the instruction, these lines carry the address bits during the early part, then during the late parts of the execution, they carry the 8 data bits. In order to separate the address from the data, we can use a latch to save the value before the function of the bits changes. THE CONTROL AND STATUS SIGNALS: • There are 4 main control and status signals. 1. ALE (Address Latch Enable): This signal is a pulse that become 1 when the AD0 –AD7 lines have an address on them. It becomes 0 after that. This signal can be used to enable a latch to save the address bits from the AD lines. 2. RD (Rea

Interrupts in 8085 Microprocessor: Vectored-Non Vectored Interrupts And Maskable-Non Maskable Interrupts

Vectored Interrupt: In vectored interrupts, the manufacturer fixes the address of the ISR to which the program control is to be transferred. the processor automatically branches to the specific address in response to an interrupt.  • The TRAP, RST 7.5, RST 6.5 and RST 5.5 are vectored interrupts. Non-Vectored Interrupt:   But in non-vectored interrupts the interrupted device should give the address of the interrupt service routine (ISR).    • The INTR is a non-vectored interrupt. Hence when a device interrupts through INTR, it has to supply the address of ISR after receiving interrupt acknowledge signal. Maskable & Non-Maskable Interrupt: The hardware vectored interrupts are classified into maskable and non-maskable interrupts.  • TRAP is non-maskable interrupt.  • RST 7.5, RST 6.5 and RST 5.5 are maskable interrupt. Masking is preventing the interrupt from disturbing the main program. When an interrupt is masked the processor will not accept the interrupt signal. The interrupts ca

Interrupts in 8085 Microprocessor-Hardware Interrupt And Software Interrupt

What is Interrupt and how it is generated? Interrupt is a signal send by an external device to the processor, to the processor to perform a particular task or work. In the microprocessor based system the interrupts are used for data transfer between the peripheral and the microprocessor. When a peripheral is ready for data transfer, it interrupts the processor by sending an appropriate signal to the interrupt pin of the processor. If the processor accepts the interrupt then the processor suspends its current activity and executes an interrupt service subroutine to complete the data transfer between the peripheral and processor. After executing the interrupt service routine the processor resumes its current activity. This type of data transfer scheme is called interrupt driven data transfer scheme. Types Of Interrupt: The interrupts are classified into software interrupts and hardware interrupts. • The software interrupts are program instructions. While running a program, if a software