SlideShare a Scribd company logo
1 of 11
Download to read offline
Feeders: An Online Food
Ordering System
Akhil Patel
California Miramar University
CIS 6190 (MSCIS)- Capsonte
Professor Elizabeth McGuire
Overview
● Project Risk Analysis and Risk Management Plan
● Project Costs
● Staffing & Resources, Dependencies, and Schedule
● Integration of Internal and External Systems
● System Administration, Security, Backup, and Recovery
● Scope Administration and Change Control Procedure
Project Risk Analysis and Risk Management Plan
The analysis stage of the system development life cycle is considered the most crucial step.
Though a project's success depends on multiple factors, capturing the right requirements
at an early stage is arguably the essential element of a project's success. The project
management principles claim that when a project doesn't meet the user's requirements,
the project is considered a failure . However, collecting the requirements timely provides
an ample amount of time to business analysts to create logical models.
Project Risk Analysis and Risk Management Plan
Potential risks for this project
● Loss of documents including code
● Absence of team members
● Failure to meet deadlines
● Poor communication
● Power related risks
Project Risk Analysis and Risk Management Plan
Risk management Plan
● The team used a cloud supported platform - Google Docs- for saving all the documents. The
platform allows the team members to access the saved records anytime.
● Though all team members had discrete responsibilities, they learned all the necessary skills
required to make uninterrupted progress during the project.
● The team used a smart project chart where each member could track the progress of every task.
The calendar also had a reminder system, which helped the members in accomplishing the tasks on
time.
Project Risk Analysis and Risk Management Plan
Risk management Plan
● Weekly review on progress also helped gauge the effectiveness of efforts and come up with the
counter plan. Moreover, these meetings also helped get all team members' ideas and assisted in
finding out tools like smart calendar and GanntPro.com to measure the progress and communicate
in case of conveying ideas.
● Team members worked on Battery-powered laptops. And while working, they made sure that their
devices were fully charged, and the planned meeting places also had power facilities. All team
members also purchased power banks for laptops to cope with any unwanted situation.
Project Costs
Tasks
● Understanding Stakeholders’ requirements
● Research and developing a requirement plan
● Planning
● Training
● Designing
● Development
● Testing and Deployment
● Maintenance until the
handover
Dependencies
As the nature of the business is hybrid for the successful execution of the tasks will be
depended on the previous tasks. For instance, in previous slide the task two depends on the
execution of the task one.
System Administration, Security, Backup, and
Recovery
When you create a backup, you make a duplicate of your data that you can restore if your
main data is lost. These errors may be the consequence of faulty hardware or software,
corrupted data, or a human error like a targeted attack or an unintentional deletion.
However for the given case, it is addressed in the risk management plan.
Scope Administration and Change Control
Procedure
Effective change control methods were crucial in maintaining the accuracy of system
documentation. Much of the documentation contained diagrams, tables, and written text that was
extremely dynamic. The process's sophistication required a robust control management system; team
used GitHub.

More Related Content

Similar to system administration security recovery.pdf

Planning in Software Projects
Planning in Software ProjectsPlanning in Software Projects
Planning in Software Projects
Jayakumar PP
 
JubrilOgunbunmiC2017WF
JubrilOgunbunmiC2017WFJubrilOgunbunmiC2017WF
JubrilOgunbunmiC2017WF
Jus September
 

Similar to system administration security recovery.pdf (20)

An Introduction to Project management(project management tutorials)
An Introduction to Project management(project management tutorials)An Introduction to Project management(project management tutorials)
An Introduction to Project management(project management tutorials)
 
Quality project management
Quality project managementQuality project management
Quality project management
 
New paper delivery system final
New paper delivery system finalNew paper delivery system final
New paper delivery system final
 
Lecture 03 Software Risk Management
Lecture 03 Software Risk ManagementLecture 03 Software Risk Management
Lecture 03 Software Risk Management
 
Agile Software Development
Agile Software DevelopmentAgile Software Development
Agile Software Development
 
Sunetra Banerjee-Sr-QA-Engineer-Project-Lead Resume
Sunetra Banerjee-Sr-QA-Engineer-Project-Lead ResumeSunetra Banerjee-Sr-QA-Engineer-Project-Lead Resume
Sunetra Banerjee-Sr-QA-Engineer-Project-Lead Resume
 
Sunetra Banerjee-Sr-QA-Engineer-Project-Lead Resume
Sunetra Banerjee-Sr-QA-Engineer-Project-Lead ResumeSunetra Banerjee-Sr-QA-Engineer-Project-Lead Resume
Sunetra Banerjee-Sr-QA-Engineer-Project-Lead Resume
 
Sunetra Banerjee-Sr-QA-Engineer-Project-Lead Resume
Sunetra Banerjee-Sr-QA-Engineer-Project-Lead ResumeSunetra Banerjee-Sr-QA-Engineer-Project-Lead Resume
Sunetra Banerjee-Sr-QA-Engineer-Project-Lead Resume
 
Project management (A Basic Approach)
Project management (A Basic Approach)Project management (A Basic Approach)
Project management (A Basic Approach)
 
Planning in Software Projects
Planning in Software ProjectsPlanning in Software Projects
Planning in Software Projects
 
Lec1
Lec1Lec1
Lec1
 
Computer current applications
Computer current applicationsComputer current applications
Computer current applications
 
Cs414 lec1 f2014
Cs414 lec1 f2014Cs414 lec1 f2014
Cs414 lec1 f2014
 
sdlc life cycle
sdlc life cyclesdlc life cycle
sdlc life cycle
 
Managing software projects & teams effectively
Managing software projects & teams effectivelyManaging software projects & teams effectively
Managing software projects & teams effectively
 
Jack Holcombe
Jack HolcombeJack Holcombe
Jack Holcombe
 
Scaling Agile - Multiple Team Dynamics
Scaling Agile - Multiple Team DynamicsScaling Agile - Multiple Team Dynamics
Scaling Agile - Multiple Team Dynamics
 
Bai giang-spm-16jan14
Bai giang-spm-16jan14Bai giang-spm-16jan14
Bai giang-spm-16jan14
 
Agile Governance for Hybrid Programs
Agile Governance for Hybrid ProgramsAgile Governance for Hybrid Programs
Agile Governance for Hybrid Programs
 
JubrilOgunbunmiC2017WF
JubrilOgunbunmiC2017WFJubrilOgunbunmiC2017WF
JubrilOgunbunmiC2017WF
 

Recently uploaded

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 

Recently uploaded (20)

(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 

system administration security recovery.pdf

  • 1. Feeders: An Online Food Ordering System Akhil Patel California Miramar University CIS 6190 (MSCIS)- Capsonte Professor Elizabeth McGuire
  • 2. Overview ● Project Risk Analysis and Risk Management Plan ● Project Costs ● Staffing & Resources, Dependencies, and Schedule ● Integration of Internal and External Systems ● System Administration, Security, Backup, and Recovery ● Scope Administration and Change Control Procedure
  • 3. Project Risk Analysis and Risk Management Plan The analysis stage of the system development life cycle is considered the most crucial step. Though a project's success depends on multiple factors, capturing the right requirements at an early stage is arguably the essential element of a project's success. The project management principles claim that when a project doesn't meet the user's requirements, the project is considered a failure . However, collecting the requirements timely provides an ample amount of time to business analysts to create logical models.
  • 4. Project Risk Analysis and Risk Management Plan Potential risks for this project ● Loss of documents including code ● Absence of team members ● Failure to meet deadlines ● Poor communication ● Power related risks
  • 5. Project Risk Analysis and Risk Management Plan Risk management Plan ● The team used a cloud supported platform - Google Docs- for saving all the documents. The platform allows the team members to access the saved records anytime. ● Though all team members had discrete responsibilities, they learned all the necessary skills required to make uninterrupted progress during the project. ● The team used a smart project chart where each member could track the progress of every task. The calendar also had a reminder system, which helped the members in accomplishing the tasks on time.
  • 6. Project Risk Analysis and Risk Management Plan Risk management Plan ● Weekly review on progress also helped gauge the effectiveness of efforts and come up with the counter plan. Moreover, these meetings also helped get all team members' ideas and assisted in finding out tools like smart calendar and GanntPro.com to measure the progress and communicate in case of conveying ideas. ● Team members worked on Battery-powered laptops. And while working, they made sure that their devices were fully charged, and the planned meeting places also had power facilities. All team members also purchased power banks for laptops to cope with any unwanted situation.
  • 8. Tasks ● Understanding Stakeholders’ requirements ● Research and developing a requirement plan ● Planning ● Training ● Designing ● Development ● Testing and Deployment ● Maintenance until the handover
  • 9. Dependencies As the nature of the business is hybrid for the successful execution of the tasks will be depended on the previous tasks. For instance, in previous slide the task two depends on the execution of the task one.
  • 10. System Administration, Security, Backup, and Recovery When you create a backup, you make a duplicate of your data that you can restore if your main data is lost. These errors may be the consequence of faulty hardware or software, corrupted data, or a human error like a targeted attack or an unintentional deletion. However for the given case, it is addressed in the risk management plan.
  • 11. Scope Administration and Change Control Procedure Effective change control methods were crucial in maintaining the accuracy of system documentation. Much of the documentation contained diagrams, tables, and written text that was extremely dynamic. The process's sophistication required a robust control management system; team used GitHub.