SlideShare a Scribd company logo
Amity School of Business




      Module- V
System Implementation &
       Operation
 (System Management)

                                             1
Topics               Amity School of Business

• Activities in implementing a system
• Testing and types of testing
• Installation Approaches
   • Direct
   • Parallel
   • Single Location
   • Phased
• Training and supporting users
• Types of Training Methods
• Reason of system implementation failures
• Maintenance and types of maintenance
   • Effective Maintenance
   • System Enhancement
   • Quality Assurance
Activities in implementing
              system      Amity School of Business



System implementation and operation is
made up of seven major activities:
• Coding
• Testing
• Installation
• Documentation
• Training
• Support
• Maintenance
                                                     3
Amity School of Business


The purpose of these steps is to convert the
final physical system specifications into
working and reliable software and hardware,
document the work that has been done, and
provide help for current and future users and
caretakers of the system.




                                                          4
3 group of Activities          Amity School of Business




• Activities that lead to the system going into
  operation-
  – coding, testing, and installation.
• Activities that are necessary for successful
  system operation-
  – documenting the system and training and supporting
    users.
• Activities that make system ongoing and needed
  to keep the system working and up-to-date-
  – maintenance
                                                                    5
Testing            Amity School of Business

• Testing is process of executing system with the intent of
  finding errors to ensure that all aspects of newly
  designed system are in working order and meeting user
  requirements.
• Theoretically a newly designed system should have all
  the pieces in working order, but in reality, each piece
  works independently. Now is the time to put all the
  pieces into one system and test it to determine whether it
  meets the user’s requirements.




                                                                     6
Why System Testing?           Amity School of Business




• System testing makes a logical assumption that
  if all the parts of the system are correct, the goal
  will be successfully achieved.
• Cost factor is the driving force behind testing a
  system.
• Inadequate testing or non testing leads to
  errors that may not appear until months later.




                                                                 7
Amity School of Business




• Inadequate testing may lead two problems:
  – The time lag between the cause and the appearance
    of the problem.
  – The effects of system errors on files and records
    within the system.
  – System may not be able to meet user’s all
    requirement.




                                                                 8
What is test case?            Amity School of Business


• It describes an input description and an expected output
  description.
• During testing, conditions are set, required input is given
  to system and observed output is compared with
  expected output to know the outcome of test case.
• If expected and observed outputs are different, then,
  there is a failure and it must be recorded properly to find
  out the reason of failure.
• If both are same then there is no failure and program
  behaved in expected manner.
• A good test case has high probability of finding errors.


                                                                      9
Types of System TestingAmity School of Business




•   Unit testing
•   Integration testing
•   System testing
•   User Acceptance Testing




                                                     10
Unit Testing    Amity School of Business




• It is the process of taking a module and
  running it in isolation from rest of the
  software product by using prepared test
  cases and comparing actual results with
  the predicted results.




                                                    11
Reasons for Unit testing   Amity School of Business




• The size of single module is small enough
  that we can locate the errors fairly easily.
• Confusing interactions of multiple errors in
  widely different parts of the software are
  eliminated.




                                                        12
Integration Testing           Amity School of Business



When independent module of software are linked together
  to form a complete system, integration testing is done to
  determine that the interface between modules is also
  correct.
• One specific target of integration testing is the interface:
  whether the parameters match on both sides as to type,
  permissible ranges, meaning and utilization.
• Each time a new module is added as a part of integration
  testing, the software changes. New data flow paths are
  established, new I/O occur, and new control logic is
  invoked. These changes may cause problems with the
  functions that previously worked flawlessly and to solve
  these problems integration testing is done.
                                                                  13
System Testing      Amity School of Business




• Software is one component of large
  computer      based    system.    Ultimatly
  software is incorporated with other system
  components and thus, a series of special
  tests are to be conducted to ensure whole
  system is working correctly.
• Software should actually be tested on
  many different hardware set-ups, memory,
  processor,     operating    system,    and
  peripheral                                          14
Amity School of Business




• Response time under various loads and
  operating conditions.
• Measurement of main and disk memory
  usage.
• Time and effort needed to recover from
  failure should also be noted and compared
  with specifications.


                                                     15
Amity School of Business




During system testing, number of attributes
of the software are evaluated that are vital to
users:
•Security
•Compatibility
•Dependability
•Documentation


                                                        16
User acceptance Testing    Amity School of Business




 When a software is developed for users,
it’s put under series of tests to enable a
user to validate all requirements. The
discovered errors are then fixed and better
quality software will be delivered to the
customers.




                                                    17
Installation   Amity School of Business


• The process of moving from the current
  information system to the new one is
  called installation.




                                                   18
Approaches to Installation  Amity School of Business




Four approaches of installation are there:
• Direct Installation
• Parallel Installation
• Single Location
• Phased Installation




                                                       19
Direct Installation Amity School of Business




• Abrupt
• “Cold turkey”
                  Advantage
• Low cost
• High interest in making installation a
  success.
• May be the only possible approach if new
  and existing systems cannot coexist in
  some form.                                         20
Direct Installation
                Amity School of Business
Direct Installation-Risks Amity School of Business




• Operational error have direct impact on
  users and organization.
• It may take too long to restore old system,
  if necessary.
• Time-consuming and benefits may be
  delayed until whole system is installed.



                                                       22
Parallel Installation Amity School of Business




• Old and new system coexist.
• Safe
                Advantage
• New system can be checked against old
  systems.
• Impact of operational errors are minimized
  because old system is also processing all
  data.
                                                      23
Parallel Installation
                  Amity School of Business
Parallel-Risks     Amity School of Business




• Not all aspects of new system can be
  compared to old system.
• Very expensive due to duplication of effort
  to run and maintain two systems.
• Can be confusing to users.
• May be delay until benefits result.
• May not be feasible due to costs or
  system size.
                                                      25
Single Location Install
                           Amity School of Business




• Pilot approach.
• Middle-of-the road approach
• May involve series of single location
  installations.
• Each location may be branch office,
  factory or department.



                                                  26
Single Location Installation
                     Amity School of Business
Advantage-Single Location   Amity School of Business




• Learning can occur and problems fixed by
  concentrating on one site.
• Limits potential harm and costs from
  system errors or failure to selected pilot
  sites.
• Can use early success to convince others
  to convert to new system.


                                                      28
Single Location-Risks      Amity School of Business




• Burden on IS staff to maintain old and new
  systems.
• If different sites require data sharing, extra
  programs need to be written to “bridge”
  the two systems.
• Some parts of organization get benefits
  earlier than other parts.


                                                         29
Phased Installation   Amity School of Business




• Staged, incremental, gradual, based on
  system functional components.
• Similar to bringing system out via multiple
  releases.




                                                      30
Phased Installation
                Amity School of Business
Advantage-Phased      Amity School of Business




• Allows for system development also to be
  phased.
• Limits potential harm and costs from
  system error or failure to certain business
  activities/functions.
• Risk spread over time.
• Some benefits can be achieved early.
• Each phase is small and more
  manageable.
                                                      32
Disadvantage-Phased     Amity School of Business




• Old and new systems must be able to
  work together and share data, which likely
  will require extra programming to “bridge”
  the two systems.
• Conversion is constant and may extend
  over a long period, causing frustration and
  confusion for users.


                                                      33
Documentation     Amity School of Business

Two Audiences for the Final
     Documentation




   IS Personnel        Users
System Documentation   Amity School of Business




• Detailed information about a
  system’s design specifications, its
  internal     workings,      and  its
  functionality.
• System Documentation is further
  divided into internal, external.
Internal Documentation    Amity School of Business




• It is a part of program source code.




                                                       36
External Documentation Amity School of Business




• It includes the outcome of all of the
  structured diagramming techniques such
  as DFD, ER Diagram.




                                                   37
User Documentation    Amity School of Business




• Written or visual information about an
  application system, how it works, and
  how to use it.
Amity School of Business




• System Documentation is intended
  primarily for maintenance programmers,
  user documentation is intended mainly for
  users.




                                                     39
Amity School of Business
        What Makes Good
         Documentation?
• Contains an overview, index, getting
  started instructions, I.e. – very
  structured
• Describes functionalities
• Contains task-based documentation
  – “How to’s…”
  – Frequently Asked Questions
  – Messages & their meanings
Training the end-users Amity School of Business




• Training and support help people
  adequately use computer systems to do
  their primary work.
• Without     proper   training and   the
  opportunity to ask questions and gain
  assistance/consultation when needed,
  users will misuse, underuse, or not use
  the information system that has been
  developed.
Training the end-users   Amity School of Business




• The term training refers to the acquisition
  of knowledge, skills, and competencies as
  a result of the teaching of practical skills
  and knowledge that relate to specific
  useful competencies.
• Support is providing ongoing educational
  and problem solving assistance to
  information users.

                                                       42
Training Methodologies   Amity School of Business


• Resident Expert
• Computer based instruction
• Formal courses-several people taught at
  the same time.
• Software help components.
• Tutorials-one person taught at a time.
• Interactive training manuals-combinations
  of tutorials and computer aided instruction
• External sources, such as vendor.
Supporting the End-user        Amity School of Business




•   Automated Issue Tracking
•   Automating support
•   Providing support through a Help Desk
•   Other things to consider:
    – Providing recovery and backup
    – Disaster recovery
    – PC maintenance
Why Implementation sometimes   Amity School of Business


          FAIL?
Two conditions are necessary for a
successful implementation effort:
•Management support of the system
•Involvement of users in the development
process.
Despite the support and active participation
of users and management, information
systems implementation still sometimes
fails.
                                                      45
Insight for Successful
    Implementation process Amity School of Business


• Risk
• Commitment to project
• Commitment to change
• Extension of project definition         and
  planning
• Realistic user expectation




                                                  46
Amity School of Business




Two most common and trusted ways of
determining      system     implementation
success are:
•The extent to which the system is used and
the user’s satisfaction with the system.
•Political Factors should be well addressed.



                                                      47
Amity School of Business


    What is System Maintenance?
• Software maintenance is a very broad activity that
  includes error corrections, enhancements of
  capabilities, deletion of obsolete capabilities, and
  optimization.
• So, any work done to change the software after it is
  operational is considered to be a maintenance work.
• The purpose of maintenance is to preserve the value
  of software over time.

                                                             48
Amity School of Business


• System maintenance is a very important activity of
 software life cycle which may span for more than 20
 years and constitute the highest cost incurred in
 SDLC.


• Maintenance accounts for 50-80% of total system
 development as shown in following figure.



                                                            49
Amity School of Business
                            Code
                             20%
Development
Cost               Design          Test
                    40%            40%




                         Code
                   Design 8% Test
Total life cycle     11%      11%
of software

                      Maintenance
                           70%
                                                                 50
Primary activities of Maintenance         Amity School of Business
   Request for
  system service
                                      1
                    System and
     Request          program
    program &      documentation    Submit test
    system doc                      results for
                                   user approval
     Specify
                    Modification
    required                          Return
                   requirements
   modification                      modified
                                   documentation
  Make required                      to library
   changes to
   programs &                                             Project
                                   Notify user          Completion
    systems                         of project            notice
                                   completion

   Test changes



        1
Types of Maintenance     Amity School of Business


Three types of maintenance are:

• Corrective Maintenance
• Adaptive Maintenance
• Perfective Maintenance




                                                         52
Corrective Maintenance of Business
                             Amity School



•   It means repairing processing or performance
    failures or making changes because of
    previously uncorrected problems or false
    assumptions.
•   Corrective maintenance is initiated by the
    defect in the system.
•   The defect can result from design errors,
    logic errors, coding errors, performance or
    processing failure.
Adaptive Maintenance
                                  Amity School of Business

•   It includes modifying the software to match
    the changes         in the ever changing
    environment.
•   The term environment includes totality of
    all conditions and influences which act from
    outside upon the software, for e.g.,
    business rules, government policies, work
    pattern, software and hardware operating
    platforms.
•   A change in the whole or part of the
    environment will require a corresponding
    modification of the software.
Perfective Maintenance School of Business
                                Amity

It involves making enhancements to improve
processing performance, interface usability, or to add
desired, but not necessarily required, system features.
It means enhancing the performance or modifying the
programs to respond to the user’s additional or
changing needs. Of these types, more time and money
are spent on perfective than corrective and adaptive
maintenance together.
Perfective maintenance refers to enhancements making
the product better, faster, smaller, better documented,
cleaner structured, with more functions and reports.
Amity School of Business




    Adaptive
      25%             Perfective
                         50%

    Corrective
      25%



Fig: Distribution of Maintenance Efforts
                                                          56
Measuring Maintenance   Amity School of Business


         Effectiveness
• Because maintenance can be costly, it is
  important to measure its effectiveness
  which is measured in terms of following
  factors:
• No. of failures
• Time between failures
• Type of failure


                                                    57
System Maintenance Vs      Amity School of Business


            Enhancement
• If the changes are made in existing
  functionalities of a      system, after it is
  operational ,then these changes are categorized
  as system maintenance.
• However when new functionality is added
  onto a existing system then this activity is
  termed as system enhancement.
Quality Assurance      Amity School of Business



• It is to certify that the program or software
  package is current and confirms to
  standards.
• With a growing trend toward purchasing
  ready to use software, certification has
  become more important.
• A package that is certified goes through a
  team of specialists who test, review, and
  determine how well it meets the vendor’s
  claims.                                               59
Amity School of Business




Thank you




                                   60

More Related Content

What's hot

Chapter13 designing forms and reports
Chapter13 designing forms and reportsChapter13 designing forms and reports
Chapter13 designing forms and reports
Dhani Ahmad
 
Project report on online examination system
Project report on online examination systemProject report on online examination system
Project report on online examination system
Mo Irshad Ansari
 
Software Verification & Validation
Software Verification & ValidationSoftware Verification & Validation
Software Verification & Validation
university of education,Lahore
 
Optical Character Recognition( OCR )
Optical Character Recognition( OCR )Optical Character Recognition( OCR )
Optical Character Recognition( OCR )
Karan Panjwani
 
Attendance management system project report.
Attendance management system project report.Attendance management system project report.
Attendance management system project report.
Manoj Kumar
 
Online attendance management system
Online attendance management systemOnline attendance management system
Online attendance management system
Deepankar Sandhibigraha
 
online examination portal project presentation
online examination portal project presentationonline examination portal project presentation
online examination portal project presentation
Shobhit Jain
 
Data Acquisition
Data AcquisitionData Acquisition
Data Acquisition
primeteacher32
 
Slicing and testing
Slicing and testingSlicing and testing
Slicing and testing
TaegeonLee1
 
Employee Management System
Employee Management SystemEmployee Management System
Employee Management System
Monotheist Sakib
 
Smart attendance system
Smart attendance systemSmart attendance system
Smart attendance system
praful borad
 
Online Exam Portal for Campus
Online Exam Portal for CampusOnline Exam Portal for Campus
Online Exam Portal for Campus
ganeshpaul6
 
Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Raghu Vamsy Sirasala
 
Fraud Detection Using Signature Recognition
Fraud Detection Using Signature RecognitionFraud Detection Using Signature Recognition
Fraud Detection Using Signature Recognition
Tejraj Thakor
 
Lecture 12 requirements modeling - (system analysis)
Lecture 12   requirements modeling - (system analysis)Lecture 12   requirements modeling - (system analysis)
Lecture 12 requirements modeling - (system analysis)
IIUI
 
Data recovery
Data recoveryData recovery
Data recovery
gupta8741
 
Malware forensics
Malware forensicsMalware forensics
Malware forensics
Sameera Amjad
 
Data recovery tools
Data recovery toolsData recovery tools
Data recovery tools
university of Gujrat, pakistan
 
interaction Norman form example 7 stage example
interaction  Norman form example  7 stage exampleinteraction  Norman form example  7 stage example
interaction Norman form example 7 stage example
Muhammad Samiullah
 
computer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software toolscomputer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software tools
N.Jagadish Kumar
 

What's hot (20)

Chapter13 designing forms and reports
Chapter13 designing forms and reportsChapter13 designing forms and reports
Chapter13 designing forms and reports
 
Project report on online examination system
Project report on online examination systemProject report on online examination system
Project report on online examination system
 
Software Verification & Validation
Software Verification & ValidationSoftware Verification & Validation
Software Verification & Validation
 
Optical Character Recognition( OCR )
Optical Character Recognition( OCR )Optical Character Recognition( OCR )
Optical Character Recognition( OCR )
 
Attendance management system project report.
Attendance management system project report.Attendance management system project report.
Attendance management system project report.
 
Online attendance management system
Online attendance management systemOnline attendance management system
Online attendance management system
 
online examination portal project presentation
online examination portal project presentationonline examination portal project presentation
online examination portal project presentation
 
Data Acquisition
Data AcquisitionData Acquisition
Data Acquisition
 
Slicing and testing
Slicing and testingSlicing and testing
Slicing and testing
 
Employee Management System
Employee Management SystemEmployee Management System
Employee Management System
 
Smart attendance system
Smart attendance systemSmart attendance system
Smart attendance system
 
Online Exam Portal for Campus
Online Exam Portal for CampusOnline Exam Portal for Campus
Online Exam Portal for Campus
 
Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2
 
Fraud Detection Using Signature Recognition
Fraud Detection Using Signature RecognitionFraud Detection Using Signature Recognition
Fraud Detection Using Signature Recognition
 
Lecture 12 requirements modeling - (system analysis)
Lecture 12   requirements modeling - (system analysis)Lecture 12   requirements modeling - (system analysis)
Lecture 12 requirements modeling - (system analysis)
 
Data recovery
Data recoveryData recovery
Data recovery
 
Malware forensics
Malware forensicsMalware forensics
Malware forensics
 
Data recovery tools
Data recovery toolsData recovery tools
Data recovery tools
 
interaction Norman form example 7 stage example
interaction  Norman form example  7 stage exampleinteraction  Norman form example  7 stage example
interaction Norman form example 7 stage example
 
computer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software toolscomputer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software tools
 

Viewers also liked

MIS1: Organization Management & Information
MIS1: Organization Management & InformationMIS1: Organization Management & Information
MIS1: Organization Management & InformationJitendra Tomar
 
5. E-Commerce & Business Applications
5. E-Commerce & Business Applications5. E-Commerce & Business Applications
5. E-Commerce & Business ApplicationsJitendra Tomar
 
Management Information System 6
Management Information System 6Management Information System 6
Management Information System 6Jitendra Tomar
 
4. E-Commerce & Payment System
4. E-Commerce & Payment System4. E-Commerce & Payment System
4. E-Commerce & Payment SystemJitendra Tomar
 
Analysis & Design of Business Systems - 1
Analysis & Design of Business Systems - 1Analysis & Design of Business Systems - 1
Analysis & Design of Business Systems - 1
Jitendra Tomar
 
Analysis & Design of Business Systems-2
Analysis & Design of Business Systems-2Analysis & Design of Business Systems-2
Analysis & Design of Business Systems-2Jitendra Tomar
 
Module 6 e business strategy
Module 6 e business strategyModule 6 e business strategy
Module 6 e business strategy
Jitendra Tomar
 
6. Security Threats with E-Commerce
6. Security Threats with E-Commerce6. Security Threats with E-Commerce
6. Security Threats with E-CommerceJitendra Tomar
 
Management Information System 5
Management Information System 5Management Information System 5
Management Information System 5Jitendra Tomar
 
2: Technology - The driving force behind E-Commerce:
2: Technology - The driving force behind E-Commerce:2: Technology - The driving force behind E-Commerce:
2: Technology - The driving force behind E-Commerce:
Jitendra Tomar
 
Management Information System 5
Management Information System 5Management Information System 5
Management Information System 5Jitendra Tomar
 
3. Web Presence: E-Strategies and Tactics
3. Web Presence: E-Strategies and Tactics3. Web Presence: E-Strategies and Tactics
3. Web Presence: E-Strategies and TacticsJitendra Tomar
 
Analysis & Design of Business System - 6
Analysis & Design of Business System - 6Analysis & Design of Business System - 6
Analysis & Design of Business System - 6Jitendra Tomar
 
Management Information System 4
Management Information System 4Management Information System 4
Management Information System 4Jitendra Tomar
 
DBMS - Normalization
DBMS - NormalizationDBMS - Normalization
DBMS - Normalization
Jitendra Tomar
 

Viewers also liked (15)

MIS1: Organization Management & Information
MIS1: Organization Management & InformationMIS1: Organization Management & Information
MIS1: Organization Management & Information
 
5. E-Commerce & Business Applications
5. E-Commerce & Business Applications5. E-Commerce & Business Applications
5. E-Commerce & Business Applications
 
Management Information System 6
Management Information System 6Management Information System 6
Management Information System 6
 
4. E-Commerce & Payment System
4. E-Commerce & Payment System4. E-Commerce & Payment System
4. E-Commerce & Payment System
 
Analysis & Design of Business Systems - 1
Analysis & Design of Business Systems - 1Analysis & Design of Business Systems - 1
Analysis & Design of Business Systems - 1
 
Analysis & Design of Business Systems-2
Analysis & Design of Business Systems-2Analysis & Design of Business Systems-2
Analysis & Design of Business Systems-2
 
Module 6 e business strategy
Module 6 e business strategyModule 6 e business strategy
Module 6 e business strategy
 
6. Security Threats with E-Commerce
6. Security Threats with E-Commerce6. Security Threats with E-Commerce
6. Security Threats with E-Commerce
 
Management Information System 5
Management Information System 5Management Information System 5
Management Information System 5
 
2: Technology - The driving force behind E-Commerce:
2: Technology - The driving force behind E-Commerce:2: Technology - The driving force behind E-Commerce:
2: Technology - The driving force behind E-Commerce:
 
Management Information System 5
Management Information System 5Management Information System 5
Management Information System 5
 
3. Web Presence: E-Strategies and Tactics
3. Web Presence: E-Strategies and Tactics3. Web Presence: E-Strategies and Tactics
3. Web Presence: E-Strategies and Tactics
 
Analysis & Design of Business System - 6
Analysis & Design of Business System - 6Analysis & Design of Business System - 6
Analysis & Design of Business System - 6
 
Management Information System 4
Management Information System 4Management Information System 4
Management Information System 4
 
DBMS - Normalization
DBMS - NormalizationDBMS - Normalization
DBMS - Normalization
 

Similar to Analysis & Design of Business Systems - 5

Different Types Of Testing
Different Types Of TestingDifferent Types Of Testing
Different Types Of Testing
Siddharth Belbase
 
Unit iv-testing-pune-university-sres-coe
Unit iv-testing-pune-university-sres-coeUnit iv-testing-pune-university-sres-coe
Unit iv-testing-pune-university-sres-coe
Hitesh Mohapatra
 
testing strategies and tactics
 testing strategies and tactics testing strategies and tactics
testing strategies and tactics
Preeti Mishra
 
Lesson 9 system develpment life cycle
Lesson 9 system develpment life cycleLesson 9 system develpment life cycle
Lesson 9 system develpment life cycle
Oneil Powers
 
Chapter 13 software testing strategies
Chapter 13 software testing strategiesChapter 13 software testing strategies
Chapter 13 software testing strategies
SHREEHARI WADAWADAGI
 
Continuous Delivery Maturity Model
Continuous Delivery Maturity ModelContinuous Delivery Maturity Model
Continuous Delivery Maturity Model
IBM UrbanCode Products
 
System testing
System testingSystem testing
System testing
Abdullah-Al- Mahmud
 
Softwaretestingstrategies
SoftwaretestingstrategiesSoftwaretestingstrategies
Softwaretestingstrategies
saieswar19
 
Agile Acceptance testing with Fitnesse
Agile Acceptance testing with FitnesseAgile Acceptance testing with Fitnesse
Agile Acceptance testing with Fitnesse
ClareMcLennan
 
What is Load, Stress and Endurance Testing?
What is Load, Stress and Endurance Testing?What is Load, Stress and Endurance Testing?
What is Load, Stress and Endurance Testing?
ONE BCG
 
Testing throughout the software life cycle - Testing & Implementation
Testing throughout the software life cycle - Testing & ImplementationTesting throughout the software life cycle - Testing & Implementation
Testing throughout the software life cycle - Testing & Implementation
yogi syafrialdi
 
Software Testing.pdf
Software Testing.pdfSoftware Testing.pdf
Software Testing.pdf
ManojKumar533913
 
Software Testing Strategies
Software Testing StrategiesSoftware Testing Strategies
Software Testing Strategies
Alpana Bhaskar
 
Module V - Software Testing Strategies.pdf
Module V - Software Testing Strategies.pdfModule V - Software Testing Strategies.pdf
Module V - Software Testing Strategies.pdf
adhithanr
 
Software Engineering (Testing Overview)
Software Engineering (Testing Overview)Software Engineering (Testing Overview)
Software Engineering (Testing Overview)
ShudipPal
 
7 steps to Software test automation success
7 steps to Software test automation success7 steps to Software test automation success
7 steps to Software test automation success
ngowda gowda (Looking For New job in Bangalore
 
Lec25
Lec25Lec25

Similar to Analysis & Design of Business Systems - 5 (20)

Different Types Of Testing
Different Types Of TestingDifferent Types Of Testing
Different Types Of Testing
 
Unit iv-testing-pune-university-sres-coe
Unit iv-testing-pune-university-sres-coeUnit iv-testing-pune-university-sres-coe
Unit iv-testing-pune-university-sres-coe
 
6. oose testing
6. oose testing6. oose testing
6. oose testing
 
testing strategies and tactics
 testing strategies and tactics testing strategies and tactics
testing strategies and tactics
 
Lesson 9 system develpment life cycle
Lesson 9 system develpment life cycleLesson 9 system develpment life cycle
Lesson 9 system develpment life cycle
 
Chapter 13 software testing strategies
Chapter 13 software testing strategiesChapter 13 software testing strategies
Chapter 13 software testing strategies
 
SDLCTesting
SDLCTestingSDLCTesting
SDLCTesting
 
Sw testing
Sw testingSw testing
Sw testing
 
Continuous Delivery Maturity Model
Continuous Delivery Maturity ModelContinuous Delivery Maturity Model
Continuous Delivery Maturity Model
 
System testing
System testingSystem testing
System testing
 
Softwaretestingstrategies
SoftwaretestingstrategiesSoftwaretestingstrategies
Softwaretestingstrategies
 
Agile Acceptance testing with Fitnesse
Agile Acceptance testing with FitnesseAgile Acceptance testing with Fitnesse
Agile Acceptance testing with Fitnesse
 
What is Load, Stress and Endurance Testing?
What is Load, Stress and Endurance Testing?What is Load, Stress and Endurance Testing?
What is Load, Stress and Endurance Testing?
 
Testing throughout the software life cycle - Testing & Implementation
Testing throughout the software life cycle - Testing & ImplementationTesting throughout the software life cycle - Testing & Implementation
Testing throughout the software life cycle - Testing & Implementation
 
Software Testing.pdf
Software Testing.pdfSoftware Testing.pdf
Software Testing.pdf
 
Software Testing Strategies
Software Testing StrategiesSoftware Testing Strategies
Software Testing Strategies
 
Module V - Software Testing Strategies.pdf
Module V - Software Testing Strategies.pdfModule V - Software Testing Strategies.pdf
Module V - Software Testing Strategies.pdf
 
Software Engineering (Testing Overview)
Software Engineering (Testing Overview)Software Engineering (Testing Overview)
Software Engineering (Testing Overview)
 
7 steps to Software test automation success
7 steps to Software test automation success7 steps to Software test automation success
7 steps to Software test automation success
 
Lec25
Lec25Lec25
Lec25
 

More from Jitendra Tomar

Industrial IIOT and Physical Internet
Industrial IIOT and Physical InternetIndustrial IIOT and Physical Internet
Industrial IIOT and Physical Internet
Jitendra Tomar
 
Artificial Intelligence and Internet of Things.pptx
Artificial Intelligence and Internet of Things.pptxArtificial Intelligence and Internet of Things.pptx
Artificial Intelligence and Internet of Things.pptx
Jitendra Tomar
 
AI, Business Intelligence and MIS
AI, Business Intelligence and MISAI, Business Intelligence and MIS
AI, Business Intelligence and MIS
Jitendra Tomar
 
Reshaping Business with Artificial Intelligence
Reshaping Business with Artificial IntelligenceReshaping Business with Artificial Intelligence
Reshaping Business with Artificial Intelligence
Jitendra Tomar
 
Redefining Management using AI
Redefining Management using AIRedefining Management using AI
Redefining Management using AI
Jitendra Tomar
 
AI - Rise of Big Data in Business Planning
AI - Rise of Big Data in Business PlanningAI - Rise of Big Data in Business Planning
AI - Rise of Big Data in Business Planning
Jitendra Tomar
 
AI in economics and business management.
AI in economics and business management.AI in economics and business management.
AI in economics and business management.
Jitendra Tomar
 
4. Internet of Things - Reference Model and Architecture
4. Internet of Things - Reference Model and Architecture4. Internet of Things - Reference Model and Architecture
4. Internet of Things - Reference Model and Architecture
Jitendra Tomar
 
3. M2M and IoT - Technology Fundamentals
3. M2M and IoT - Technology Fundamentals3. M2M and IoT - Technology Fundamentals
3. M2M and IoT - Technology Fundamentals
Jitendra Tomar
 
2. Internet of Things - A Market Perspective
2. Internet of Things - A Market Perspective2. Internet of Things - A Market Perspective
2. Internet of Things - A Market Perspective
Jitendra Tomar
 
1. Internet of Things - M2M to IoT
1. Internet of Things - M2M to IoT1. Internet of Things - M2M to IoT
1. Internet of Things - M2M to IoT
Jitendra Tomar
 
Module 3: Code of Ethics
Module 3: Code of EthicsModule 3: Code of Ethics
Module 3: Code of Ethics
Jitendra Tomar
 
PFE5.2 Research Ethics and Academic Integrity - Publication Ethics
PFE5.2 Research Ethics and Academic Integrity - Publication EthicsPFE5.2 Research Ethics and Academic Integrity - Publication Ethics
PFE5.2 Research Ethics and Academic Integrity - Publication Ethics
Jitendra Tomar
 
PFE5.1 Research Ethics and Academic Integrity - Research Ethics
PFE5.1 Research Ethics and Academic Integrity - Research EthicsPFE5.1 Research Ethics and Academic Integrity - Research Ethics
PFE5.1 Research Ethics and Academic Integrity - Research Ethics
Jitendra Tomar
 
PFE4.4 Global Issues - Sustainable Development Goals
PFE4.4 Global Issues - Sustainable Development GoalsPFE4.4 Global Issues - Sustainable Development Goals
PFE4.4 Global Issues - Sustainable Development Goals
Jitendra Tomar
 
PFE4.3 Global Issues - Environmental Ethics
PFE4.3 Global Issues - Environmental EthicsPFE4.3 Global Issues - Environmental Ethics
PFE4.3 Global Issues - Environmental Ethics
Jitendra Tomar
 
PFE4.2 Global Issues - Business Ethics and Corporate Governance
PFE4.2 Global Issues - Business Ethics and Corporate GovernancePFE4.2 Global Issues - Business Ethics and Corporate Governance
PFE4.2 Global Issues - Business Ethics and Corporate Governance
Jitendra Tomar
 
PFE4.1 Global Issues - Globalization of MNCs
PFE4.1 Global Issues - Globalization of MNCsPFE4.1 Global Issues - Globalization of MNCs
PFE4.1 Global Issues - Globalization of MNCs
Jitendra Tomar
 
PFE3.5 Ethical Considerations - Employee Grievance
PFE3.5 Ethical Considerations - Employee GrievancePFE3.5 Ethical Considerations - Employee Grievance
PFE3.5 Ethical Considerations - Employee Grievance
Jitendra Tomar
 
PFE3.4 Ethical Considerations - Working with Minors
PFE3.4 Ethical Considerations - Working with MinorsPFE3.4 Ethical Considerations - Working with Minors
PFE3.4 Ethical Considerations - Working with Minors
Jitendra Tomar
 

More from Jitendra Tomar (20)

Industrial IIOT and Physical Internet
Industrial IIOT and Physical InternetIndustrial IIOT and Physical Internet
Industrial IIOT and Physical Internet
 
Artificial Intelligence and Internet of Things.pptx
Artificial Intelligence and Internet of Things.pptxArtificial Intelligence and Internet of Things.pptx
Artificial Intelligence and Internet of Things.pptx
 
AI, Business Intelligence and MIS
AI, Business Intelligence and MISAI, Business Intelligence and MIS
AI, Business Intelligence and MIS
 
Reshaping Business with Artificial Intelligence
Reshaping Business with Artificial IntelligenceReshaping Business with Artificial Intelligence
Reshaping Business with Artificial Intelligence
 
Redefining Management using AI
Redefining Management using AIRedefining Management using AI
Redefining Management using AI
 
AI - Rise of Big Data in Business Planning
AI - Rise of Big Data in Business PlanningAI - Rise of Big Data in Business Planning
AI - Rise of Big Data in Business Planning
 
AI in economics and business management.
AI in economics and business management.AI in economics and business management.
AI in economics and business management.
 
4. Internet of Things - Reference Model and Architecture
4. Internet of Things - Reference Model and Architecture4. Internet of Things - Reference Model and Architecture
4. Internet of Things - Reference Model and Architecture
 
3. M2M and IoT - Technology Fundamentals
3. M2M and IoT - Technology Fundamentals3. M2M and IoT - Technology Fundamentals
3. M2M and IoT - Technology Fundamentals
 
2. Internet of Things - A Market Perspective
2. Internet of Things - A Market Perspective2. Internet of Things - A Market Perspective
2. Internet of Things - A Market Perspective
 
1. Internet of Things - M2M to IoT
1. Internet of Things - M2M to IoT1. Internet of Things - M2M to IoT
1. Internet of Things - M2M to IoT
 
Module 3: Code of Ethics
Module 3: Code of EthicsModule 3: Code of Ethics
Module 3: Code of Ethics
 
PFE5.2 Research Ethics and Academic Integrity - Publication Ethics
PFE5.2 Research Ethics and Academic Integrity - Publication EthicsPFE5.2 Research Ethics and Academic Integrity - Publication Ethics
PFE5.2 Research Ethics and Academic Integrity - Publication Ethics
 
PFE5.1 Research Ethics and Academic Integrity - Research Ethics
PFE5.1 Research Ethics and Academic Integrity - Research EthicsPFE5.1 Research Ethics and Academic Integrity - Research Ethics
PFE5.1 Research Ethics and Academic Integrity - Research Ethics
 
PFE4.4 Global Issues - Sustainable Development Goals
PFE4.4 Global Issues - Sustainable Development GoalsPFE4.4 Global Issues - Sustainable Development Goals
PFE4.4 Global Issues - Sustainable Development Goals
 
PFE4.3 Global Issues - Environmental Ethics
PFE4.3 Global Issues - Environmental EthicsPFE4.3 Global Issues - Environmental Ethics
PFE4.3 Global Issues - Environmental Ethics
 
PFE4.2 Global Issues - Business Ethics and Corporate Governance
PFE4.2 Global Issues - Business Ethics and Corporate GovernancePFE4.2 Global Issues - Business Ethics and Corporate Governance
PFE4.2 Global Issues - Business Ethics and Corporate Governance
 
PFE4.1 Global Issues - Globalization of MNCs
PFE4.1 Global Issues - Globalization of MNCsPFE4.1 Global Issues - Globalization of MNCs
PFE4.1 Global Issues - Globalization of MNCs
 
PFE3.5 Ethical Considerations - Employee Grievance
PFE3.5 Ethical Considerations - Employee GrievancePFE3.5 Ethical Considerations - Employee Grievance
PFE3.5 Ethical Considerations - Employee Grievance
 
PFE3.4 Ethical Considerations - Working with Minors
PFE3.4 Ethical Considerations - Working with MinorsPFE3.4 Ethical Considerations - Working with Minors
PFE3.4 Ethical Considerations - Working with Minors
 

Recently uploaded

The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
DhatriParmar
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
JEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questionsJEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questions
ShivajiThube2
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 

Recently uploaded (20)

The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
JEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questionsJEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questions
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 

Analysis & Design of Business Systems - 5

  • 1. Amity School of Business Module- V System Implementation & Operation (System Management) 1
  • 2. Topics Amity School of Business • Activities in implementing a system • Testing and types of testing • Installation Approaches • Direct • Parallel • Single Location • Phased • Training and supporting users • Types of Training Methods • Reason of system implementation failures • Maintenance and types of maintenance • Effective Maintenance • System Enhancement • Quality Assurance
  • 3. Activities in implementing system Amity School of Business System implementation and operation is made up of seven major activities: • Coding • Testing • Installation • Documentation • Training • Support • Maintenance 3
  • 4. Amity School of Business The purpose of these steps is to convert the final physical system specifications into working and reliable software and hardware, document the work that has been done, and provide help for current and future users and caretakers of the system. 4
  • 5. 3 group of Activities Amity School of Business • Activities that lead to the system going into operation- – coding, testing, and installation. • Activities that are necessary for successful system operation- – documenting the system and training and supporting users. • Activities that make system ongoing and needed to keep the system working and up-to-date- – maintenance 5
  • 6. Testing Amity School of Business • Testing is process of executing system with the intent of finding errors to ensure that all aspects of newly designed system are in working order and meeting user requirements. • Theoretically a newly designed system should have all the pieces in working order, but in reality, each piece works independently. Now is the time to put all the pieces into one system and test it to determine whether it meets the user’s requirements. 6
  • 7. Why System Testing? Amity School of Business • System testing makes a logical assumption that if all the parts of the system are correct, the goal will be successfully achieved. • Cost factor is the driving force behind testing a system. • Inadequate testing or non testing leads to errors that may not appear until months later. 7
  • 8. Amity School of Business • Inadequate testing may lead two problems: – The time lag between the cause and the appearance of the problem. – The effects of system errors on files and records within the system. – System may not be able to meet user’s all requirement. 8
  • 9. What is test case? Amity School of Business • It describes an input description and an expected output description. • During testing, conditions are set, required input is given to system and observed output is compared with expected output to know the outcome of test case. • If expected and observed outputs are different, then, there is a failure and it must be recorded properly to find out the reason of failure. • If both are same then there is no failure and program behaved in expected manner. • A good test case has high probability of finding errors. 9
  • 10. Types of System TestingAmity School of Business • Unit testing • Integration testing • System testing • User Acceptance Testing 10
  • 11. Unit Testing Amity School of Business • It is the process of taking a module and running it in isolation from rest of the software product by using prepared test cases and comparing actual results with the predicted results. 11
  • 12. Reasons for Unit testing Amity School of Business • The size of single module is small enough that we can locate the errors fairly easily. • Confusing interactions of multiple errors in widely different parts of the software are eliminated. 12
  • 13. Integration Testing Amity School of Business When independent module of software are linked together to form a complete system, integration testing is done to determine that the interface between modules is also correct. • One specific target of integration testing is the interface: whether the parameters match on both sides as to type, permissible ranges, meaning and utilization. • Each time a new module is added as a part of integration testing, the software changes. New data flow paths are established, new I/O occur, and new control logic is invoked. These changes may cause problems with the functions that previously worked flawlessly and to solve these problems integration testing is done. 13
  • 14. System Testing Amity School of Business • Software is one component of large computer based system. Ultimatly software is incorporated with other system components and thus, a series of special tests are to be conducted to ensure whole system is working correctly. • Software should actually be tested on many different hardware set-ups, memory, processor, operating system, and peripheral 14
  • 15. Amity School of Business • Response time under various loads and operating conditions. • Measurement of main and disk memory usage. • Time and effort needed to recover from failure should also be noted and compared with specifications. 15
  • 16. Amity School of Business During system testing, number of attributes of the software are evaluated that are vital to users: •Security •Compatibility •Dependability •Documentation 16
  • 17. User acceptance Testing Amity School of Business When a software is developed for users, it’s put under series of tests to enable a user to validate all requirements. The discovered errors are then fixed and better quality software will be delivered to the customers. 17
  • 18. Installation Amity School of Business • The process of moving from the current information system to the new one is called installation. 18
  • 19. Approaches to Installation Amity School of Business Four approaches of installation are there: • Direct Installation • Parallel Installation • Single Location • Phased Installation 19
  • 20. Direct Installation Amity School of Business • Abrupt • “Cold turkey” Advantage • Low cost • High interest in making installation a success. • May be the only possible approach if new and existing systems cannot coexist in some form. 20
  • 21. Direct Installation Amity School of Business
  • 22. Direct Installation-Risks Amity School of Business • Operational error have direct impact on users and organization. • It may take too long to restore old system, if necessary. • Time-consuming and benefits may be delayed until whole system is installed. 22
  • 23. Parallel Installation Amity School of Business • Old and new system coexist. • Safe Advantage • New system can be checked against old systems. • Impact of operational errors are minimized because old system is also processing all data. 23
  • 24. Parallel Installation Amity School of Business
  • 25. Parallel-Risks Amity School of Business • Not all aspects of new system can be compared to old system. • Very expensive due to duplication of effort to run and maintain two systems. • Can be confusing to users. • May be delay until benefits result. • May not be feasible due to costs or system size. 25
  • 26. Single Location Install Amity School of Business • Pilot approach. • Middle-of-the road approach • May involve series of single location installations. • Each location may be branch office, factory or department. 26
  • 27. Single Location Installation Amity School of Business
  • 28. Advantage-Single Location Amity School of Business • Learning can occur and problems fixed by concentrating on one site. • Limits potential harm and costs from system errors or failure to selected pilot sites. • Can use early success to convince others to convert to new system. 28
  • 29. Single Location-Risks Amity School of Business • Burden on IS staff to maintain old and new systems. • If different sites require data sharing, extra programs need to be written to “bridge” the two systems. • Some parts of organization get benefits earlier than other parts. 29
  • 30. Phased Installation Amity School of Business • Staged, incremental, gradual, based on system functional components. • Similar to bringing system out via multiple releases. 30
  • 31. Phased Installation Amity School of Business
  • 32. Advantage-Phased Amity School of Business • Allows for system development also to be phased. • Limits potential harm and costs from system error or failure to certain business activities/functions. • Risk spread over time. • Some benefits can be achieved early. • Each phase is small and more manageable. 32
  • 33. Disadvantage-Phased Amity School of Business • Old and new systems must be able to work together and share data, which likely will require extra programming to “bridge” the two systems. • Conversion is constant and may extend over a long period, causing frustration and confusion for users. 33
  • 34. Documentation Amity School of Business Two Audiences for the Final Documentation IS Personnel Users
  • 35. System Documentation Amity School of Business • Detailed information about a system’s design specifications, its internal workings, and its functionality. • System Documentation is further divided into internal, external.
  • 36. Internal Documentation Amity School of Business • It is a part of program source code. 36
  • 37. External Documentation Amity School of Business • It includes the outcome of all of the structured diagramming techniques such as DFD, ER Diagram. 37
  • 38. User Documentation Amity School of Business • Written or visual information about an application system, how it works, and how to use it.
  • 39. Amity School of Business • System Documentation is intended primarily for maintenance programmers, user documentation is intended mainly for users. 39
  • 40. Amity School of Business What Makes Good Documentation? • Contains an overview, index, getting started instructions, I.e. – very structured • Describes functionalities • Contains task-based documentation – “How to’s…” – Frequently Asked Questions – Messages & their meanings
  • 41. Training the end-users Amity School of Business • Training and support help people adequately use computer systems to do their primary work. • Without proper training and the opportunity to ask questions and gain assistance/consultation when needed, users will misuse, underuse, or not use the information system that has been developed.
  • 42. Training the end-users Amity School of Business • The term training refers to the acquisition of knowledge, skills, and competencies as a result of the teaching of practical skills and knowledge that relate to specific useful competencies. • Support is providing ongoing educational and problem solving assistance to information users. 42
  • 43. Training Methodologies Amity School of Business • Resident Expert • Computer based instruction • Formal courses-several people taught at the same time. • Software help components. • Tutorials-one person taught at a time. • Interactive training manuals-combinations of tutorials and computer aided instruction • External sources, such as vendor.
  • 44. Supporting the End-user Amity School of Business • Automated Issue Tracking • Automating support • Providing support through a Help Desk • Other things to consider: – Providing recovery and backup – Disaster recovery – PC maintenance
  • 45. Why Implementation sometimes Amity School of Business FAIL? Two conditions are necessary for a successful implementation effort: •Management support of the system •Involvement of users in the development process. Despite the support and active participation of users and management, information systems implementation still sometimes fails. 45
  • 46. Insight for Successful Implementation process Amity School of Business • Risk • Commitment to project • Commitment to change • Extension of project definition and planning • Realistic user expectation 46
  • 47. Amity School of Business Two most common and trusted ways of determining system implementation success are: •The extent to which the system is used and the user’s satisfaction with the system. •Political Factors should be well addressed. 47
  • 48. Amity School of Business What is System Maintenance? • Software maintenance is a very broad activity that includes error corrections, enhancements of capabilities, deletion of obsolete capabilities, and optimization. • So, any work done to change the software after it is operational is considered to be a maintenance work. • The purpose of maintenance is to preserve the value of software over time. 48
  • 49. Amity School of Business • System maintenance is a very important activity of software life cycle which may span for more than 20 years and constitute the highest cost incurred in SDLC. • Maintenance accounts for 50-80% of total system development as shown in following figure. 49
  • 50. Amity School of Business Code 20% Development Cost Design Test 40% 40% Code Design 8% Test Total life cycle 11% 11% of software Maintenance 70% 50
  • 51. Primary activities of Maintenance Amity School of Business Request for system service 1 System and Request program program & documentation Submit test system doc results for user approval Specify Modification required Return requirements modification modified documentation Make required to library changes to programs & Project Notify user Completion systems of project notice completion Test changes 1
  • 52. Types of Maintenance Amity School of Business Three types of maintenance are: • Corrective Maintenance • Adaptive Maintenance • Perfective Maintenance 52
  • 53. Corrective Maintenance of Business Amity School • It means repairing processing or performance failures or making changes because of previously uncorrected problems or false assumptions. • Corrective maintenance is initiated by the defect in the system. • The defect can result from design errors, logic errors, coding errors, performance or processing failure.
  • 54. Adaptive Maintenance Amity School of Business • It includes modifying the software to match the changes in the ever changing environment. • The term environment includes totality of all conditions and influences which act from outside upon the software, for e.g., business rules, government policies, work pattern, software and hardware operating platforms. • A change in the whole or part of the environment will require a corresponding modification of the software.
  • 55. Perfective Maintenance School of Business Amity It involves making enhancements to improve processing performance, interface usability, or to add desired, but not necessarily required, system features. It means enhancing the performance or modifying the programs to respond to the user’s additional or changing needs. Of these types, more time and money are spent on perfective than corrective and adaptive maintenance together. Perfective maintenance refers to enhancements making the product better, faster, smaller, better documented, cleaner structured, with more functions and reports.
  • 56. Amity School of Business Adaptive 25% Perfective 50% Corrective 25% Fig: Distribution of Maintenance Efforts 56
  • 57. Measuring Maintenance Amity School of Business Effectiveness • Because maintenance can be costly, it is important to measure its effectiveness which is measured in terms of following factors: • No. of failures • Time between failures • Type of failure 57
  • 58. System Maintenance Vs Amity School of Business Enhancement • If the changes are made in existing functionalities of a system, after it is operational ,then these changes are categorized as system maintenance. • However when new functionality is added onto a existing system then this activity is termed as system enhancement.
  • 59. Quality Assurance Amity School of Business • It is to certify that the program or software package is current and confirms to standards. • With a growing trend toward purchasing ready to use software, certification has become more important. • A package that is certified goes through a team of specialists who test, review, and determine how well it meets the vendor’s claims. 59
  • 60. Amity School of Business Thank you 60