SlideShare a Scribd company logo
1 of 12
1
CHAPTER THREE
METHODOLOGY
3.1 Introduction
This chapter illustrates the procedures that would be used to achieve the objectives of this
project. It contains the following sections; Data Collection Methods and Tools, Data Analysis,
System Analysis and Design, System Implementation, System Testing and Validation.
3.1.1 Project Development Approach
I will use Iterative and Incremental Development model (IID) for my project development. This
development approach is also referred to as Iterative Waterfall Development approach. Iterative
and Incremental Development is a software development process developed in response to the
more traditional waterfall model.
2
Figure 3.1: Iterative and Incremental Life Cycle
The basic idea behind iterative enhancement is to develop a software system incrementally,
allowing the developer to take advantage of what was being learned during the development of
earlier, incremental, deliverable versions of the system. Learning comes from both the
development and use of the system, where possible. Key steps in the process will be to start with
a simple implementation of a subset of the software requirements and iteratively enhance the
evolving sequence of versions until the full system is implemented.
At each iteration, the procedure itself will consist of the Initialization step, the Iteration step, and
the Project Control List. The initialization step creates a base version of the system. The goal for
this initial implementation is to create a product to which the user can react. It should offer a
sampling of the key aspects of the problem and provide a solution that is simple enough to
understand and implement easily. To guide the iteration process, a project control list is created
that contains a record of all tasks that need to be performed. It includes such items as new
features to be implemented and areas of redesign of the existing solution. The control list is
constantly being revised as a result of the analysis phase.
The iteration involves the redesign and implementation of a task from project control list, and the
analysis of the current version of the system. The goal for the design and implementation of any
iteration is to be simple, straightforward, and modular, supporting redesign at that stage or as a
task added to the project control list. The code can, in some cases, represent the major source of
documentation of the system. The analysis of iteration is based upon user feedback, and the
program analysis facilities available. It involves analysis of the structure, modularity, usability,
reliability, efficiency, and achievement of goals. The project control list is modified in light of
the analysis results.
During the implementation of the project by this approach, a step called V&V i.e. Verification
and Validation will be carried out at certain intervals.
3
 Verification: “Am I building the product right?”
 Validation: “Am I building the right product?”
3.2 Data Collection Techniques
Data would be collected through the use of questionnaires, interviews and in-depth literature
review with the aim of collecting reliable and complete data that can provide concrete
conclusions and recommendations for the project.
3.2.1 Questionnaires
Neuman, (2003) asserts, “Questionnaires are set of open or closed ended questions administered
to respondents to gather information on a research phenomenon.” Questionnaires are categorised
into three; Qualitative, Quantitative and Mixed Questionnaires (Johnson and Turner, 2003). In
qualitative questionnaires the type of questions are unstructured, exploratory, and in-depth open-
ended, while those in quantitative questionnaires are closed ended, respondents answer by
selecting from a set of possible responses. On the other hand, mixed questionnaires are a self-
report instrument filled out by respondents and contain a mixture of completely open and closed-
ended questions (Johnson and Turner, 2003).
4
I will use mixed questionnaires because of its appropriateness in measuring attitudes of
participants and in gathering extra information that could miss out in a closed ended question
(Johnson and Turner, 2003). Besides, I will prefer to use questionnaire method because the
sample size will be large. The questionnaire development will consist of introduction, reason for
the study project.
3.2.2 Interviews
An interview is a data collection method where a researcher asks a respondent a set of questions
and records his/her answers (Neuman, 2003). I will use interviews to establish grounds for
accessing the acceptability and feasibility of my proposed solution and to understand the
business environment with its associated needs. Face-to-face interviews will be carried out with
the interest of getting data about the current mode of System and exploring the entire school
environment at the nearby school. This is vital in probing for the theory to get respondent’s
opinions about the appropriateness of the intended solution and the challenges in the current
system.
3.2.3 In-depth literature review
Neuman, (2003) explains, “In-depth literature review is the analyzing of existing documentation
on a given subject.” I will express interest in using this technique to identify different methods
used by different institutions and business enterprises in accepting payments from their clients,
exploring the challenges faced and the associated benefits with using such platforms, usage of
manual system in many businesses and the level of their penetration into the economy to back
our project idea.
3.3 Data Analysis
5
After the data collection exercise, I will carry out data analysis of the administered
questionnaires using SPSS and a post interview follow-up on the interviews will be conducted to
eliminate inconsistencies.
3.4 System Analysis
System analysis and design will be achieved using Data flow diagrams (DFD), Entity
relationship diagrams (ERD).The system would be implemented using C#, MySQL database
server.
System testing and validation would be done through testing of components/modules, integration
testing, and finally, system testing.
1.5 Feasibility Study
A feasibility study was carried out to find out the viability of the system. The feasibility
attempted to check whether the idea will work and whether it will be cost effective. The
following are the areas where feasibility study covered.
3.3.1 Economic Feasibility
This test involves checking whether the system is affordable to build and maintain. The
analysis indicated that the system is affordable by organization using itdue to the fact that the
system was build and uses open source software.
It was also discovered that the systems benefit outweigh the cost of building and running the
system.
3.3.2 Technological feasibility
Technological feasibility investigates whether the project being undertaken meets the current
technological advances. In this new era, use of the internet is common hence the decision to
design a web based system is feasible since most people nowadays have the knowledge of the
internet. This project is technically feasible since it uses mobile technology which is modern
technology in the information and technology age.
6
This study also involves checking the systems interaction with other systems and availability of
the hardware, software and personnel for building and running the system. Expertise and
resources required for the development of the system were readily available.
3.3.3 Operational Feasibility
It was necessary to change the current method of accessing apartments from tenants from
manual to web based .Most people prefer not to travel come and view or book houses but
would rather access it from anywhere they are. Thus introduction of web based system through
which they can make access to information remotely is exclusively acceptable.
3.3.4 Schedule Feasibility
The time allocated for the development of the system was 32 weeks. This was enough time
given my expertise and enough knowledge gained through the course work.
CHAPTER THREE
METHODOLOGY
3.1 Introduction
This chapter illustrates the procedures that would be used to achieve the objectives of this
project. It contains the following sections; Data Collection Methods and Tools, Data Analysis,
System Analysis and Design, System Implementation, System Testing and Validation.
3.1.1 Project Development Approach
I will use Iterative and Incremental Development model (IID) for my project development. This
development approach is also referred to as Iterative Waterfall Development approach. Iterative
7
and Incremental Development is a software development process developed in response to the
more traditional waterfall model.
Figure 3.1: Iterative and Incremental Life Cycle
The basic idea behind iterative enhancement is to develop a software system incrementally,
allowing the developer to take advantage of what was being learned during the development of
earlier, incremental, deliverable versions of the system. Learning comes from both the
development and use of the system, where possible. Key steps in the process will be to start with
a simple implementation of a subset of the software requirements and iteratively enhance the
evolving sequence of versions until the full system is implemented.
At each iteration, the procedure itself will consist of the Initialization step, the Iteration step, and
the Project Control List. The initialization step creates a base version of the system. The goal for
this initial implementation is to create a product to which the user can react. It should offer a
sampling of the key aspects of the problem and provide a solution that is simple enough to
8
understand and implement easily. To guide the iteration process, a project control list is created
that contains a record of all tasks that need to be performed. It includes such items as new
features to be implemented and areas of redesign of the existing solution. The control list is
constantly being revised as a result of the analysis phase.
The iteration involves the redesign and implementation of a task from project control list, and the
analysis of the current version of the system. The goal for the design and implementation of any
iteration is to be simple, straightforward, and modular, supporting redesign at that stage or as a
task added to the project control list. The code can, in some cases, represent the major source of
documentation of the system. The analysis of iteration is based upon user feedback, and the
program analysis facilities available. It involves analysis of the structure, modularity, usability,
reliability, efficiency, and achievement of goals. The project control list is modified in light of
the analysis results.
During the implementation of the project by this approach, a step called V&V i.e. Verification
and Validation will be carried out at certain intervals.
 Verification: “Am I building the product right?”
 Validation: “Am I building the right product?”
3.2 Data Collection Techniques
Data would be collected through the use of questionnaires, interviews and in-depth literature
review with the aim of collecting reliable and complete data that can provide concrete
conclusions and recommendations for the project.
3.2.1 Questionnaires
Neuman, (2003) asserts, “Questionnaires are set of open or closed ended questions administered
to respondents to gather information on a research phenomenon.” Questionnaires are categorised
into three; Qualitative, Quantitative and Mixed Questionnaires (Johnson and Turner, 2003). In
9
qualitative questionnaires the type of questions are unstructured, exploratory, and in-depth open-
ended, while those in quantitative questionnaires are closed ended, respondents answer by
selecting from a set of possible responses. On the other hand, mixed questionnaires are a self-
report instrument filled out by respondents and contain a mixture of completely open and closed-
ended questions (Johnson and Turner, 2003).
10
I will use mixed questionnaires because of its appropriateness in measuring attitudes of
participants and in gathering extra information that could miss out in a closed ended question
(Johnson and Turner, 2003). Besides, I will prefer to use questionnaire method because the
sample size will be large. The questionnaire development will consist of introduction, reason for
the study project.
3.2.2 Interviews
An interview is a data collection method where a researcher asks a respondent a set of questions
and records his/her answers (Neuman, 2003). I will use interviews to establish grounds for
accessing the acceptability and feasibility of my proposed solution and to understand the
business environment with its associated needs. Face-to-face interviews will be carried out with
the interest of getting data about the current mode of System and exploring the entire school
environment at the nearby school. This is vital in probing for the theory to get respondent’s
opinions about the appropriateness of the intended solution and the challenges in the current
system.
3.2.3 In-depth literature review
Neuman, (2003) explains, “In-depth literature review is the analyzing of existing documentation
on a given subject.” I will express interest in using this technique to identify different methods
used by different institutions and business enterprises in accepting payments from their clients,
exploring the challenges faced and the associated benefits with using such platforms, usage of
manual system in many businesses and the level of their penetration into the economy to back
our project idea.
3.3 Data Analysis
11
After the data collection exercise, I will carry out data analysis of the administered
questionnaires using SPSS and a post interview follow-up on the interviews will be conducted to
eliminate inconsistencies.
3.4 System Analysis
System analysis and design will be achieved using Data flow diagrams (DFD), Entity
relationship diagrams (ERD).The system would be implemented using C#, MySQL database
server.
System testing and validation would be done through testing of components/modules, integration
testing, and finally, system testing.
1.6 Feasibility Study
A feasibility study was carried out to find out the viability of the system. The feasibility
attempted to check whether the idea will work and whether it will be cost effective. The
following are the areas where feasibility study covered.
3.3.1 Economic Feasibility
This test involves checking whether the system is affordable to build and maintain. The
analysis indicated that the system is affordable by organization using itdue to the fact that the
system was build and uses open source software.
It was also discovered that the systems benefit outweigh the cost of building and running the
system.
3.3.2 Technological feasibility
Technological feasibility investigates whether the project being undertaken meets the current
technological advances. In this new era, use of the internet is common hence the decision to
design a web based system is feasible since most people nowadays have the knowledge of the
internet. This project is technically feasible since it uses mobile technology which is modern
technology in the information and technology age.
12
This study also involves checking the systems interaction with other systems and availability of
the hardware, software and personnel for building and running the system. Expertise and
resources required for the development of the system were readily available.
3.3.3 Operational Feasibility
It was necessary to change the current method of accessing apartments from tenants from
manual to web based .Most people prefer not to travel come and view or book houses but
would rather access it from anywhere they are. Thus introduction of web based system through
which they can make access to information remotely is exclusively acceptable.
3.3.4 Schedule Feasibility
The time allocated for the development of the system was 32 weeks. This was enough time
given my expertise and enough knowledge gained through the course work.

More Related Content

What's hot

Christopher N. Bull History-Sensitive Detection of Design Flaws B ...
Christopher N. Bull History-Sensitive Detection of Design Flaws B ...Christopher N. Bull History-Sensitive Detection of Design Flaws B ...
Christopher N. Bull History-Sensitive Detection of Design Flaws B ...butest
 
Software Defect Prediction Using Radial Basis and Probabilistic Neural Networks
Software Defect Prediction Using Radial Basis and Probabilistic Neural NetworksSoftware Defect Prediction Using Radial Basis and Probabilistic Neural Networks
Software Defect Prediction Using Radial Basis and Probabilistic Neural NetworksEditor IJCATR
 
On applications of Soft Computing Assisted Analysis for Software Reliability
On applications of Soft Computing Assisted Analysis for Software ReliabilityOn applications of Soft Computing Assisted Analysis for Software Reliability
On applications of Soft Computing Assisted Analysis for Software ReliabilityAM Publications
 
A Survey of Security of Multimodal Biometric Systems
A Survey of Security of Multimodal Biometric SystemsA Survey of Security of Multimodal Biometric Systems
A Survey of Security of Multimodal Biometric SystemsIJERA Editor
 
A Review on Parameter Estimation Techniques of Software Reliability Growth Mo...
A Review on Parameter Estimation Techniques of Software Reliability Growth Mo...A Review on Parameter Estimation Techniques of Software Reliability Growth Mo...
A Review on Parameter Estimation Techniques of Software Reliability Growth Mo...Editor IJCATR
 
Modified Bully Algorithm Incorporating the Concept of Election Commissio...
Modified  Bully  Algorithm  Incorporating  the  Concept of Election Commissio...Modified  Bully  Algorithm  Incorporating  the  Concept of Election Commissio...
Modified Bully Algorithm Incorporating the Concept of Election Commissio...Conference-Proceedings-CrimsonPublishers
 
June 2010 exam questions and answers
June 2010   exam questions and answersJune 2010   exam questions and answers
June 2010 exam questions and answersDamonTauroa
 
GROUP FUZZY TOPSIS METHODOLOGY IN COMPUTER SECURITY SOFTWARE SELECTION
GROUP FUZZY TOPSIS METHODOLOGY IN COMPUTER SECURITY SOFTWARE SELECTIONGROUP FUZZY TOPSIS METHODOLOGY IN COMPUTER SECURITY SOFTWARE SELECTION
GROUP FUZZY TOPSIS METHODOLOGY IN COMPUTER SECURITY SOFTWARE SELECTIONijfls
 
Comparative Performance Analysis of Machine Learning Techniques for Software ...
Comparative Performance Analysis of Machine Learning Techniques for Software ...Comparative Performance Analysis of Machine Learning Techniques for Software ...
Comparative Performance Analysis of Machine Learning Techniques for Software ...csandit
 
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGES
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGESSTATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGES
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGESIJCSES Journal
 
IMPLEMENTATION OF DYNAMIC COUPLING MEASUREMENT OF DISTRIBUTED OBJECT ORIENTED...
IMPLEMENTATION OF DYNAMIC COUPLING MEASUREMENT OF DISTRIBUTED OBJECT ORIENTED...IMPLEMENTATION OF DYNAMIC COUPLING MEASUREMENT OF DISTRIBUTED OBJECT ORIENTED...
IMPLEMENTATION OF DYNAMIC COUPLING MEASUREMENT OF DISTRIBUTED OBJECT ORIENTED...IJCSEA Journal
 
Practical Guidelines to Improve Defect Prediction Model – A Review
Practical Guidelines to Improve Defect Prediction Model – A ReviewPractical Guidelines to Improve Defect Prediction Model – A Review
Practical Guidelines to Improve Defect Prediction Model – A Reviewinventionjournals
 
USING CATEGORICAL FEATURES IN MINING BUG TRACKING SYSTEMS TO ASSIGN BUG REPORTS
USING CATEGORICAL FEATURES IN MINING BUG TRACKING SYSTEMS TO ASSIGN BUG REPORTSUSING CATEGORICAL FEATURES IN MINING BUG TRACKING SYSTEMS TO ASSIGN BUG REPORTS
USING CATEGORICAL FEATURES IN MINING BUG TRACKING SYSTEMS TO ASSIGN BUG REPORTSijseajournal
 

What's hot (18)

STUDY OF AGENT ASSISTED METHODOLOGIES FOR DEVELOPMENT OF A SYSTEM
STUDY OF AGENT ASSISTED METHODOLOGIES FOR DEVELOPMENT OF A SYSTEMSTUDY OF AGENT ASSISTED METHODOLOGIES FOR DEVELOPMENT OF A SYSTEM
STUDY OF AGENT ASSISTED METHODOLOGIES FOR DEVELOPMENT OF A SYSTEM
 
Christopher N. Bull History-Sensitive Detection of Design Flaws B ...
Christopher N. Bull History-Sensitive Detection of Design Flaws B ...Christopher N. Bull History-Sensitive Detection of Design Flaws B ...
Christopher N. Bull History-Sensitive Detection of Design Flaws B ...
 
Software Defect Prediction Using Radial Basis and Probabilistic Neural Networks
Software Defect Prediction Using Radial Basis and Probabilistic Neural NetworksSoftware Defect Prediction Using Radial Basis and Probabilistic Neural Networks
Software Defect Prediction Using Radial Basis and Probabilistic Neural Networks
 
Mis
MisMis
Mis
 
On applications of Soft Computing Assisted Analysis for Software Reliability
On applications of Soft Computing Assisted Analysis for Software ReliabilityOn applications of Soft Computing Assisted Analysis for Software Reliability
On applications of Soft Computing Assisted Analysis for Software Reliability
 
Lesson how to create sad
Lesson how to create sadLesson how to create sad
Lesson how to create sad
 
A Survey of Security of Multimodal Biometric Systems
A Survey of Security of Multimodal Biometric SystemsA Survey of Security of Multimodal Biometric Systems
A Survey of Security of Multimodal Biometric Systems
 
A Review on Parameter Estimation Techniques of Software Reliability Growth Mo...
A Review on Parameter Estimation Techniques of Software Reliability Growth Mo...A Review on Parameter Estimation Techniques of Software Reliability Growth Mo...
A Review on Parameter Estimation Techniques of Software Reliability Growth Mo...
 
Modified Bully Algorithm Incorporating the Concept of Election Commissio...
Modified  Bully  Algorithm  Incorporating  the  Concept of Election Commissio...Modified  Bully  Algorithm  Incorporating  the  Concept of Election Commissio...
Modified Bully Algorithm Incorporating the Concept of Election Commissio...
 
June 2010 exam questions and answers
June 2010   exam questions and answersJune 2010   exam questions and answers
June 2010 exam questions and answers
 
GROUP FUZZY TOPSIS METHODOLOGY IN COMPUTER SECURITY SOFTWARE SELECTION
GROUP FUZZY TOPSIS METHODOLOGY IN COMPUTER SECURITY SOFTWARE SELECTIONGROUP FUZZY TOPSIS METHODOLOGY IN COMPUTER SECURITY SOFTWARE SELECTION
GROUP FUZZY TOPSIS METHODOLOGY IN COMPUTER SECURITY SOFTWARE SELECTION
 
Comparative Performance Analysis of Machine Learning Techniques for Software ...
Comparative Performance Analysis of Machine Learning Techniques for Software ...Comparative Performance Analysis of Machine Learning Techniques for Software ...
Comparative Performance Analysis of Machine Learning Techniques for Software ...
 
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGES
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGESSTATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGES
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGES
 
IMPLEMENTATION OF DYNAMIC COUPLING MEASUREMENT OF DISTRIBUTED OBJECT ORIENTED...
IMPLEMENTATION OF DYNAMIC COUPLING MEASUREMENT OF DISTRIBUTED OBJECT ORIENTED...IMPLEMENTATION OF DYNAMIC COUPLING MEASUREMENT OF DISTRIBUTED OBJECT ORIENTED...
IMPLEMENTATION OF DYNAMIC COUPLING MEASUREMENT OF DISTRIBUTED OBJECT ORIENTED...
 
Multiview Methodology
Multiview MethodologyMultiview Methodology
Multiview Methodology
 
Practical Guidelines to Improve Defect Prediction Model – A Review
Practical Guidelines to Improve Defect Prediction Model – A ReviewPractical Guidelines to Improve Defect Prediction Model – A Review
Practical Guidelines to Improve Defect Prediction Model – A Review
 
ONE HIDDEN LAYER ANFIS MODEL FOR OOS DEVELOPMENT EFFORT ESTIMATION
ONE HIDDEN LAYER ANFIS MODEL FOR OOS DEVELOPMENT EFFORT ESTIMATIONONE HIDDEN LAYER ANFIS MODEL FOR OOS DEVELOPMENT EFFORT ESTIMATION
ONE HIDDEN LAYER ANFIS MODEL FOR OOS DEVELOPMENT EFFORT ESTIMATION
 
USING CATEGORICAL FEATURES IN MINING BUG TRACKING SYSTEMS TO ASSIGN BUG REPORTS
USING CATEGORICAL FEATURES IN MINING BUG TRACKING SYSTEMS TO ASSIGN BUG REPORTSUSING CATEGORICAL FEATURES IN MINING BUG TRACKING SYSTEMS TO ASSIGN BUG REPORTS
USING CATEGORICAL FEATURES IN MINING BUG TRACKING SYSTEMS TO ASSIGN BUG REPORTS
 

Similar to Chapter three

Management information system
Management information systemManagement information system
Management information systemRoneet Kumar
 
Online auction system srs riport
Online auction system srs  riportOnline auction system srs  riport
Online auction system srs riportDilip Prajapati
 
Online auction system srs riport
Online auction system srs  riportOnline auction system srs  riport
Online auction system srs riportDilip Prajapati
 
Software testing techniques - www.testersforum.com
Software testing techniques - www.testersforum.comSoftware testing techniques - www.testersforum.com
Software testing techniques - www.testersforum.comwww.testersforum.com
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessIJMER
 
Software Development Life Cycle & Its Models
Software Development Life Cycle & Its ModelsSoftware Development Life Cycle & Its Models
Software Development Life Cycle & Its ModelsDr.Purushottam Petare
 
System development life cycle
System development life cycleSystem development life cycle
System development life cyclerelekarsushant
 
System_Analysis_and_Design_Assignment_New2.ppt
System_Analysis_and_Design_Assignment_New2.pptSystem_Analysis_and_Design_Assignment_New2.ppt
System_Analysis_and_Design_Assignment_New2.pptMarissaPedragosa
 
Software testing and introduction to quality
Software testing and introduction to qualitySoftware testing and introduction to quality
Software testing and introduction to qualityDhanashriAmbre
 
Different Approaches To Sys Bldg
Different Approaches To Sys BldgDifferent Approaches To Sys Bldg
Different Approaches To Sys BldgUSeP
 
Health Informatics- Module 2-Chapter 1.pptx
Health Informatics- Module 2-Chapter 1.pptxHealth Informatics- Module 2-Chapter 1.pptx
Health Informatics- Module 2-Chapter 1.pptxArti Parab Academics
 
Softwarearchitecture in practice unit1 2
Softwarearchitecture in practice unit1 2Softwarearchitecture in practice unit1 2
Softwarearchitecture in practice unit1 2sush-sushma
 
System Design and Analysis 1
System Design and Analysis 1System Design and Analysis 1
System Design and Analysis 1Boeun Tim
 

Similar to Chapter three (20)

Management information system
Management information systemManagement information system
Management information system
 
Online auction system srs riport
Online auction system srs  riportOnline auction system srs  riport
Online auction system srs riport
 
Online auction system srs riport
Online auction system srs  riportOnline auction system srs  riport
Online auction system srs riport
 
Too many files
Too many filesToo many files
Too many files
 
Software testing techniques - www.testersforum.com
Software testing techniques - www.testersforum.comSoftware testing techniques - www.testersforum.com
Software testing techniques - www.testersforum.com
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
 
Sdlc1
Sdlc1Sdlc1
Sdlc1
 
Software Development Life Cycle & Its Models
Software Development Life Cycle & Its ModelsSoftware Development Life Cycle & Its Models
Software Development Life Cycle & Its Models
 
System development life cycle
System development life cycleSystem development life cycle
System development life cycle
 
Gr 6 sdlc models
Gr 6   sdlc modelsGr 6   sdlc models
Gr 6 sdlc models
 
System_Analysis_and_Design_Assignment_New2.ppt
System_Analysis_and_Design_Assignment_New2.pptSystem_Analysis_and_Design_Assignment_New2.ppt
System_Analysis_and_Design_Assignment_New2.ppt
 
Sdlc
SdlcSdlc
Sdlc
 
Software testing and introduction to quality
Software testing and introduction to qualitySoftware testing and introduction to quality
Software testing and introduction to quality
 
Different Approaches To Sys Bldg
Different Approaches To Sys BldgDifferent Approaches To Sys Bldg
Different Approaches To Sys Bldg
 
Health Informatics- Module 2-Chapter 1.pptx
Health Informatics- Module 2-Chapter 1.pptxHealth Informatics- Module 2-Chapter 1.pptx
Health Informatics- Module 2-Chapter 1.pptx
 
Softwarearchitecture in practice unit1 2
Softwarearchitecture in practice unit1 2Softwarearchitecture in practice unit1 2
Softwarearchitecture in practice unit1 2
 
software engineering
software engineering software engineering
software engineering
 
System Design and Analysis 1
System Design and Analysis 1System Design and Analysis 1
System Design and Analysis 1
 
Sdlc
SdlcSdlc
Sdlc
 
Information System (IS) life cycle.pptx
Information System (IS) life cycle.pptxInformation System (IS) life cycle.pptx
Information System (IS) life cycle.pptx
 

Recently uploaded

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 

Recently uploaded (20)

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 

Chapter three

  • 1. 1 CHAPTER THREE METHODOLOGY 3.1 Introduction This chapter illustrates the procedures that would be used to achieve the objectives of this project. It contains the following sections; Data Collection Methods and Tools, Data Analysis, System Analysis and Design, System Implementation, System Testing and Validation. 3.1.1 Project Development Approach I will use Iterative and Incremental Development model (IID) for my project development. This development approach is also referred to as Iterative Waterfall Development approach. Iterative and Incremental Development is a software development process developed in response to the more traditional waterfall model.
  • 2. 2 Figure 3.1: Iterative and Incremental Life Cycle The basic idea behind iterative enhancement is to develop a software system incrementally, allowing the developer to take advantage of what was being learned during the development of earlier, incremental, deliverable versions of the system. Learning comes from both the development and use of the system, where possible. Key steps in the process will be to start with a simple implementation of a subset of the software requirements and iteratively enhance the evolving sequence of versions until the full system is implemented. At each iteration, the procedure itself will consist of the Initialization step, the Iteration step, and the Project Control List. The initialization step creates a base version of the system. The goal for this initial implementation is to create a product to which the user can react. It should offer a sampling of the key aspects of the problem and provide a solution that is simple enough to understand and implement easily. To guide the iteration process, a project control list is created that contains a record of all tasks that need to be performed. It includes such items as new features to be implemented and areas of redesign of the existing solution. The control list is constantly being revised as a result of the analysis phase. The iteration involves the redesign and implementation of a task from project control list, and the analysis of the current version of the system. The goal for the design and implementation of any iteration is to be simple, straightforward, and modular, supporting redesign at that stage or as a task added to the project control list. The code can, in some cases, represent the major source of documentation of the system. The analysis of iteration is based upon user feedback, and the program analysis facilities available. It involves analysis of the structure, modularity, usability, reliability, efficiency, and achievement of goals. The project control list is modified in light of the analysis results. During the implementation of the project by this approach, a step called V&V i.e. Verification and Validation will be carried out at certain intervals.
  • 3. 3  Verification: “Am I building the product right?”  Validation: “Am I building the right product?” 3.2 Data Collection Techniques Data would be collected through the use of questionnaires, interviews and in-depth literature review with the aim of collecting reliable and complete data that can provide concrete conclusions and recommendations for the project. 3.2.1 Questionnaires Neuman, (2003) asserts, “Questionnaires are set of open or closed ended questions administered to respondents to gather information on a research phenomenon.” Questionnaires are categorised into three; Qualitative, Quantitative and Mixed Questionnaires (Johnson and Turner, 2003). In qualitative questionnaires the type of questions are unstructured, exploratory, and in-depth open- ended, while those in quantitative questionnaires are closed ended, respondents answer by selecting from a set of possible responses. On the other hand, mixed questionnaires are a self- report instrument filled out by respondents and contain a mixture of completely open and closed- ended questions (Johnson and Turner, 2003).
  • 4. 4 I will use mixed questionnaires because of its appropriateness in measuring attitudes of participants and in gathering extra information that could miss out in a closed ended question (Johnson and Turner, 2003). Besides, I will prefer to use questionnaire method because the sample size will be large. The questionnaire development will consist of introduction, reason for the study project. 3.2.2 Interviews An interview is a data collection method where a researcher asks a respondent a set of questions and records his/her answers (Neuman, 2003). I will use interviews to establish grounds for accessing the acceptability and feasibility of my proposed solution and to understand the business environment with its associated needs. Face-to-face interviews will be carried out with the interest of getting data about the current mode of System and exploring the entire school environment at the nearby school. This is vital in probing for the theory to get respondent’s opinions about the appropriateness of the intended solution and the challenges in the current system. 3.2.3 In-depth literature review Neuman, (2003) explains, “In-depth literature review is the analyzing of existing documentation on a given subject.” I will express interest in using this technique to identify different methods used by different institutions and business enterprises in accepting payments from their clients, exploring the challenges faced and the associated benefits with using such platforms, usage of manual system in many businesses and the level of their penetration into the economy to back our project idea. 3.3 Data Analysis
  • 5. 5 After the data collection exercise, I will carry out data analysis of the administered questionnaires using SPSS and a post interview follow-up on the interviews will be conducted to eliminate inconsistencies. 3.4 System Analysis System analysis and design will be achieved using Data flow diagrams (DFD), Entity relationship diagrams (ERD).The system would be implemented using C#, MySQL database server. System testing and validation would be done through testing of components/modules, integration testing, and finally, system testing. 1.5 Feasibility Study A feasibility study was carried out to find out the viability of the system. The feasibility attempted to check whether the idea will work and whether it will be cost effective. The following are the areas where feasibility study covered. 3.3.1 Economic Feasibility This test involves checking whether the system is affordable to build and maintain. The analysis indicated that the system is affordable by organization using itdue to the fact that the system was build and uses open source software. It was also discovered that the systems benefit outweigh the cost of building and running the system. 3.3.2 Technological feasibility Technological feasibility investigates whether the project being undertaken meets the current technological advances. In this new era, use of the internet is common hence the decision to design a web based system is feasible since most people nowadays have the knowledge of the internet. This project is technically feasible since it uses mobile technology which is modern technology in the information and technology age.
  • 6. 6 This study also involves checking the systems interaction with other systems and availability of the hardware, software and personnel for building and running the system. Expertise and resources required for the development of the system were readily available. 3.3.3 Operational Feasibility It was necessary to change the current method of accessing apartments from tenants from manual to web based .Most people prefer not to travel come and view or book houses but would rather access it from anywhere they are. Thus introduction of web based system through which they can make access to information remotely is exclusively acceptable. 3.3.4 Schedule Feasibility The time allocated for the development of the system was 32 weeks. This was enough time given my expertise and enough knowledge gained through the course work. CHAPTER THREE METHODOLOGY 3.1 Introduction This chapter illustrates the procedures that would be used to achieve the objectives of this project. It contains the following sections; Data Collection Methods and Tools, Data Analysis, System Analysis and Design, System Implementation, System Testing and Validation. 3.1.1 Project Development Approach I will use Iterative and Incremental Development model (IID) for my project development. This development approach is also referred to as Iterative Waterfall Development approach. Iterative
  • 7. 7 and Incremental Development is a software development process developed in response to the more traditional waterfall model. Figure 3.1: Iterative and Incremental Life Cycle The basic idea behind iterative enhancement is to develop a software system incrementally, allowing the developer to take advantage of what was being learned during the development of earlier, incremental, deliverable versions of the system. Learning comes from both the development and use of the system, where possible. Key steps in the process will be to start with a simple implementation of a subset of the software requirements and iteratively enhance the evolving sequence of versions until the full system is implemented. At each iteration, the procedure itself will consist of the Initialization step, the Iteration step, and the Project Control List. The initialization step creates a base version of the system. The goal for this initial implementation is to create a product to which the user can react. It should offer a sampling of the key aspects of the problem and provide a solution that is simple enough to
  • 8. 8 understand and implement easily. To guide the iteration process, a project control list is created that contains a record of all tasks that need to be performed. It includes such items as new features to be implemented and areas of redesign of the existing solution. The control list is constantly being revised as a result of the analysis phase. The iteration involves the redesign and implementation of a task from project control list, and the analysis of the current version of the system. The goal for the design and implementation of any iteration is to be simple, straightforward, and modular, supporting redesign at that stage or as a task added to the project control list. The code can, in some cases, represent the major source of documentation of the system. The analysis of iteration is based upon user feedback, and the program analysis facilities available. It involves analysis of the structure, modularity, usability, reliability, efficiency, and achievement of goals. The project control list is modified in light of the analysis results. During the implementation of the project by this approach, a step called V&V i.e. Verification and Validation will be carried out at certain intervals.  Verification: “Am I building the product right?”  Validation: “Am I building the right product?” 3.2 Data Collection Techniques Data would be collected through the use of questionnaires, interviews and in-depth literature review with the aim of collecting reliable and complete data that can provide concrete conclusions and recommendations for the project. 3.2.1 Questionnaires Neuman, (2003) asserts, “Questionnaires are set of open or closed ended questions administered to respondents to gather information on a research phenomenon.” Questionnaires are categorised into three; Qualitative, Quantitative and Mixed Questionnaires (Johnson and Turner, 2003). In
  • 9. 9 qualitative questionnaires the type of questions are unstructured, exploratory, and in-depth open- ended, while those in quantitative questionnaires are closed ended, respondents answer by selecting from a set of possible responses. On the other hand, mixed questionnaires are a self- report instrument filled out by respondents and contain a mixture of completely open and closed- ended questions (Johnson and Turner, 2003).
  • 10. 10 I will use mixed questionnaires because of its appropriateness in measuring attitudes of participants and in gathering extra information that could miss out in a closed ended question (Johnson and Turner, 2003). Besides, I will prefer to use questionnaire method because the sample size will be large. The questionnaire development will consist of introduction, reason for the study project. 3.2.2 Interviews An interview is a data collection method where a researcher asks a respondent a set of questions and records his/her answers (Neuman, 2003). I will use interviews to establish grounds for accessing the acceptability and feasibility of my proposed solution and to understand the business environment with its associated needs. Face-to-face interviews will be carried out with the interest of getting data about the current mode of System and exploring the entire school environment at the nearby school. This is vital in probing for the theory to get respondent’s opinions about the appropriateness of the intended solution and the challenges in the current system. 3.2.3 In-depth literature review Neuman, (2003) explains, “In-depth literature review is the analyzing of existing documentation on a given subject.” I will express interest in using this technique to identify different methods used by different institutions and business enterprises in accepting payments from their clients, exploring the challenges faced and the associated benefits with using such platforms, usage of manual system in many businesses and the level of their penetration into the economy to back our project idea. 3.3 Data Analysis
  • 11. 11 After the data collection exercise, I will carry out data analysis of the administered questionnaires using SPSS and a post interview follow-up on the interviews will be conducted to eliminate inconsistencies. 3.4 System Analysis System analysis and design will be achieved using Data flow diagrams (DFD), Entity relationship diagrams (ERD).The system would be implemented using C#, MySQL database server. System testing and validation would be done through testing of components/modules, integration testing, and finally, system testing. 1.6 Feasibility Study A feasibility study was carried out to find out the viability of the system. The feasibility attempted to check whether the idea will work and whether it will be cost effective. The following are the areas where feasibility study covered. 3.3.1 Economic Feasibility This test involves checking whether the system is affordable to build and maintain. The analysis indicated that the system is affordable by organization using itdue to the fact that the system was build and uses open source software. It was also discovered that the systems benefit outweigh the cost of building and running the system. 3.3.2 Technological feasibility Technological feasibility investigates whether the project being undertaken meets the current technological advances. In this new era, use of the internet is common hence the decision to design a web based system is feasible since most people nowadays have the knowledge of the internet. This project is technically feasible since it uses mobile technology which is modern technology in the information and technology age.
  • 12. 12 This study also involves checking the systems interaction with other systems and availability of the hardware, software and personnel for building and running the system. Expertise and resources required for the development of the system were readily available. 3.3.3 Operational Feasibility It was necessary to change the current method of accessing apartments from tenants from manual to web based .Most people prefer not to travel come and view or book houses but would rather access it from anywhere they are. Thus introduction of web based system through which they can make access to information remotely is exclusively acceptable. 3.3.4 Schedule Feasibility The time allocated for the development of the system was 32 weeks. This was enough time given my expertise and enough knowledge gained through the course work.