SlideShare a Scribd company logo
Chapter 12 Information System Development
Chapter 12 Objectives List the phases in the system development cycle Identify the guidelines for system development Discuss the importance of project management, feasibility assessment, documentation, and data and information gathering techniques Explain the activities performed  in the planning phase Discuss the purpose of the activities  performed in the analysis phase Describe the various tools used in process modeling Describe the various tools used in object modeling Explain the activities performed in the design phase Recognize the develop programs activity is part of the system development cycle Discuss the activities performed in the implementation phase Discuss the purpose of the activities performed in the operation, support, and security phase Next
What is the System Development Cycle? ,[object Object],p. 620 Hardware, software, data, people, and procedures that work together to produce quality information System —Set of components that interact to achieve common goal Businesses use many types of systems Next
The System Development Life Cycle ,[object Object],p. 620 - 621 Fig. 12-1 Phase 1. Planning Phase 2. Analysis Phase 3. Design Phase 4. Implementation Phase 5. Operating, Support, and Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Next
What is the System Development Cycle? ,[object Object],Arrange tasks into phases (groups of activities) p. 621 - 622 Involve  users  (anyone for whom system is being built) Develop clearly defined  standards  (procedures company expects employees to follow) Next
What is the System Development Cycle? ,[object Object],p. 622 Fig. 12-2 Next
What is the System Development Cycle? ,[object Object],p. 622 - 623 Responsible for designing and developing information system Liaison between users and IT professionals Next
What is the System Development Cycle? ,[object Object],p. 623 Consists of users, systems analyst, and other IT professionals Formed to work on project from beginning to end Project leader —one member of the team who  manages and controls project budget and schedule Next
What is the System Development Cycle? ,[object Object],p. 623 ,[object Object],[object Object],Required activities Goal, objectives, and expectations, collectively called scope Time estimates for each activity Cost estimates for each activity Activities that can take place at same time Order of activities Next
What is the System Development Cycle? ,[object Object],p. 623 - 624 Fig. 12-3 ,[object Object],Next Click to view Web  Link, click Chapter 12, Click  Web Link from left  navigation, then click  PERT Charts below Chapter 12
What is the System Development Cycle? ,[object Object],p. 624 Fig. 12-4 ,[object Object],Next
What is the System Development Cycle? ,[object Object],p. 625 Measure of how suitable system development will be to the company Operational feasibility Schedule feasibility Four feasibility tests: Technical feasibility Economic feasibility (also called cost/benefit feasibility) Next
What is the System Development Cycle? ,[object Object],p. 625 Includes reports, diagrams,  programs, and other deliverables Collection and summarization  of data and information Project notebook contains all documentation for single project Next
What is the System Development Cycle? ,[object Object],p. 625 - 626 Fig. 12-5 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Next
What Initiates the System Development Cycle? ,[object Object],p. 626 - 627 Competition can  lead to change To improve  existing system Outside group may  mandate change To correct problem  in existing system Next
What Initiates the System Development Cycle? ,[object Object],p. 627 Fig. 12-6 ,[object Object],[object Object],Next
Planning Phase ,[object Object],p. 629 Begins when steering committee receives project request Steering committee —decision-making body for the company Function of committee: Review and approve project requests Allocate resources Form project development team for each approved project Prioritize project requests Next
Analysis Phase ,[object Object],p. 630 Next Conduct preliminary investigation, also  called feasibility  study Perform detailed analysis
Analysis Phase ,[object Object],p. 630 Fig. 12-8 ,[object Object],[object Object],Next
Analysis Phase ,[object Object],p. 631 Sometimes called logical design 2. Determine user’s wants, needs, and requirements 3. Recommend solution 1. Study how current system works Next
Analysis Phase ,[object Object],p. 632 - 633 Technique that describes processes that transform inputs into outputs Also called structured analysis and design Three tools used for process modeling Entity-relationship diagrams Data flow diagrams Project dictionary Next Click to view Web  Link, click Chapter 12, Click  Web Link from left  navigation, then click  Process Modeling below Chapter 12
Analysis Phase ,[object Object],p. 632 Fig. 12-9 ,[object Object],Next
Analysis Phase ,[object Object],p. 632 - 633 Fig. 12-10 ,[object Object],Next
Analysis Phase ,[object Object],Data dictionary Decision trees Decision tables Structured English p. 633 - 635 Variety of  techniques to  enter items in  project dictionary Helps keep track  of huge amount  of details in  system Contains all  the documentation  and deliverables  of project Next
Analysis Phase ,[object Object],p. 633 Fig. 12-11 ,[object Object],Next
Analysis Phase ,[object Object],p. 634 Fig. 12-12 ,[object Object],Next
Analysis Phase ,[object Object],p. 634 Fig. 12-13 ,[object Object],Next
Analysis Phase ,[object Object],p. 635 Fig. 12-14 ,[object Object],Next
Analysis Phase ,[object Object],p. 635 Combines data with  the processes that act  on data into single  unit called an  object Sometimes called  object-oriented (OO)  analysis and design Uses Unified  Modeling Language  ( UML )—graphical tool  for documenting system Object —an item that can contain both data and procedures that read or manipulate the data Next Click to view Web  Link, click Chapter 12, Click  Web Link from left  navigation, then click  UML below Chapter 12
Analysis Phase ,[object Object],p. 636 Fig. 12-15 ,[object Object],[object Object],[object Object],Next
Analysis Phase ,[object Object],p. 636 Fig. 12-16 ,[object Object],[object Object],Next
Analysis Phase ,[object Object],p. 636 Presented to steering committee, which decides how system will be developed Next Assesses feasibility  of each alternative solution Recommends the most feasible solution for the project
Analysis Phase ,[object Object],p. 637 Buy  packaged software —prewritten software available for purchase Outsource—have outside source develop software Write own  custom software —software developed at user’s request Vertical market software —designed for particular industry Horizontal market software —meets needs of many companies Next
Analysis Phase ,[object Object],p. 637 Fig. 12-17 ,[object Object],[object Object],Click to view Web  Link, click Chapter 12, Click Web Link from left  navigation, then click  Outsourcing below Chapter 12 Next Click to view Web  Link, click Chapter 12, Click  Web Link from left  navigation, then click Internet Solutions Provider below Chapter 12
Design Phase ,[object Object],p. 639 Acquire hardware and software Develop all details of new or modified information system Next
Design Phase Video: A Tour of Lucasfilm Data Center Next CLICK TO START
Design Phase ,[object Object],Test and evaluate vendor proposals p. 639 ,[object Object],Solicit vendor proposals Make a decision Identify technical specifications Next
Design Phase ,[object Object],p. 639 Request for information (RFI) Request for proposal (RFP) Request for quotation (RFQ) Next Less formal method that uses standard form to request information about product or service Vendor quotes price(s) for listed product(s) Vendor selects product(s) that meet(s) your requirements and then quotes price(s) Identifies product(s) you want
Design Phase ,[object Object],p. 639 Fig. 12-18 ,[object Object],[object Object],[object Object],Next Click to view Web  Link, click Chapter 12, Click  Web Link from left  navigation, then click  Value-Added Reseller below Chapter 12
Design Phase ,[object Object],p. 640 Fig. 12-19 ,[object Object],[object Object],[object Object],[object Object],[object Object],Next Click to view Web  Link, click Chapter 12, Click  Web Link from left  navigation, then click  Benchmark Tests below Chapter 12
Design Phase ,[object Object],p. 641  Includes several activities Database  design Input and  output design Program  design Detailed design specifications for components in proposed solution Sometimes called   physical design Next
Design Phase ,[object Object],p. 641 Fig. 12-20 ,[object Object],Next
Design Phase ,[object Object],p. 641 Fig. 12-21 ,[object Object],Next
Design Phase ,[object Object],p. 642 Working model of  proposed system Beginning a prototype too early may lead to problems Next
Design Phase ,[object Object],p. 642 - 643 ,[object Object],Housekeeping—Establishes user accounts and provides backup and recovery functions Quality assurance—Analyzes deliverables for accuracy Graphics—Enables drawing of diagrams Prototyping—Creates models of proposed system Code generators—Create actual computer programs from design specifications Project repository—Stores diagrams, specifications, descriptions, programs, and other deliverables Next Click to view Web  Link, click Chapter 12, Click  Web Link from left  navigation, then click  Case Tools below Chapter 12
Design Phase ,[object Object],p. 642 - 643 Fig. 12-22 ,[object Object],Next
Design Phase ,[object Object],p. 643 Used throughout entire  system development  cycle to review a variety  of deliverables Used to review detailed  design specifications  before they are given  to programming team Identifies any errors  and allows IT personnel  to correct them Formal review by  project team and users  of any system development  cycle deliverable Next
Implementation Phase ,[object Object],Convert to new system p. 643 ,[object Object],Train users Install and test new system Develop programs Next
Implementation Phase ,[object Object],p. 643 ,[object Object],[object Object],Next Document solution Test  solution Implement design Validate design Design solution Analyze requirements
Implementation Phase ,[object Object],p. 644 Verifies application works with other applications Systems test Integration Test Unit Test Verifies each individual program works by itself Verifies all programs in application work together Verifies the new system works with actual data Acceptance Test Next
Implementation Phase ,[object Object],p. 644 Fig. 12-23 ,[object Object],Next
Implementation Phase ,[object Object],p. 644 - 645 Fig. 12-24 ,[object Object],Next
Operation, Support, and Security Phase ,[object Object],p. 646 Conduct   post-implementation system review—meeting to find out if information system is performing according to expectations Perform Maintenance Activities Monitor System Performance Assess System Security ,[object Object],Next
Operation, Support, and Security Phase ,[object Object],p. 646 ,[object Object],For each risk, identify the safeguards    that exist  to detect,  prevent, and  recover from a  loss Identify all security risks that may  cause an  information asset loss Identify all information  assets of an  organization Next Click to view Web  Link, click Chapter 12, Click  Web Link from left  navigation, then click ICSA below Chapter 12 Click to view Web  Link, click Chapter 12,  Click Web Link from left  navigation, then click  Chief Security Officer below Chapter 12
Summary of Information System Development Phases in the system development cycle Guidelines for system development Activities that occur during the  entire system development cycle Chapter 12 Complete

More Related Content

What's hot

Data-Ed: A Framework for no sql and Hadoop
Data-Ed: A Framework for no sql and HadoopData-Ed: A Framework for no sql and Hadoop
Data-Ed: A Framework for no sql and Hadoop
Data Blueprint
 
DataEd Online: Unlock Business Value through Data Governance
DataEd Online: Unlock Business Value through Data GovernanceDataEd Online: Unlock Business Value through Data Governance
DataEd Online: Unlock Business Value through Data GovernanceDATAVERSITY
 
DataEd Slides: Exorcising the Seven Deadly Data Sins
DataEd Slides: Exorcising the Seven Deadly Data SinsDataEd Slides: Exorcising the Seven Deadly Data Sins
DataEd Slides: Exorcising the Seven Deadly Data Sins
DATAVERSITY
 
Essential Metadata Strategies
Essential Metadata StrategiesEssential Metadata Strategies
Essential Metadata Strategies
DATAVERSITY
 
Data Management: Tips & Tools
Data Management: Tips & ToolsData Management: Tips & Tools
Data Management: Tips & Tools
Stephanie Wright
 
Data-Ed Online: Trends in Data Modeling
Data-Ed Online: Trends in Data ModelingData-Ed Online: Trends in Data Modeling
Data-Ed Online: Trends in Data Modeling
DATAVERSITY
 
DataOps - The Foundation for Your Agile Data Architecture
DataOps - The Foundation for Your Agile Data ArchitectureDataOps - The Foundation for Your Agile Data Architecture
DataOps - The Foundation for Your Agile Data Architecture
DATAVERSITY
 
Building a Team for Managing Unstructured Data
Building a Team for Managing Unstructured DataBuilding a Team for Managing Unstructured Data
Building a Team for Managing Unstructured DataDATAVERSITY
 
Data-Ed: Data Architecture Requirements
Data-Ed: Data Architecture Requirements  Data-Ed: Data Architecture Requirements
Data-Ed: Data Architecture Requirements
Data Blueprint
 
Data Management
Data Management Data Management
Data Management
Biswajeet Dasmajumdar
 
How to Get Started with Your MongoDB Pilot Project
How to Get Started with Your MongoDB Pilot ProjectHow to Get Started with Your MongoDB Pilot Project
How to Get Started with Your MongoDB Pilot ProjectDATAVERSITY
 
Data Systems Integration & Business Value Pt. 1: Metadata
Data Systems Integration & Business Value Pt. 1: MetadataData Systems Integration & Business Value Pt. 1: Metadata
Data Systems Integration & Business Value Pt. 1: Metadata
DATAVERSITY
 
Chief Data Officer Agenda Webinar: How CDOs Should Work with Lawyers
Chief Data Officer Agenda Webinar: How CDOs Should Work with LawyersChief Data Officer Agenda Webinar: How CDOs Should Work with Lawyers
Chief Data Officer Agenda Webinar: How CDOs Should Work with Lawyers
DATAVERSITY
 
Real-World Data Governance: Setting Appropriate Business Expectations
Real-World Data Governance: Setting Appropriate Business ExpectationsReal-World Data Governance: Setting Appropriate Business Expectations
Real-World Data Governance: Setting Appropriate Business ExpectationsDATAVERSITY
 
A Modern Approach to DI & MDM
A Modern Approach to DI & MDMA Modern Approach to DI & MDM
A Modern Approach to DI & MDM
DATAVERSITY
 
Why Data Modeling Is Fundamental
Why Data Modeling Is FundamentalWhy Data Modeling Is Fundamental
Why Data Modeling Is Fundamental
DATAVERSITY
 
Data Architecture Process in a BI environment
Data Architecture Process in a BI environmentData Architecture Process in a BI environment
Data Architecture Process in a BI environmentSasha Citino
 
Data-Ed Online: Data Operations Management: Turning Your Challenges Into Success
Data-Ed Online: Data Operations Management: Turning Your Challenges Into SuccessData-Ed Online: Data Operations Management: Turning Your Challenges Into Success
Data-Ed Online: Data Operations Management: Turning Your Challenges Into Success
Data Blueprint
 
Fasten you seatbelt and listen to the Data Steward
Fasten you seatbelt and listen to the Data StewardFasten you seatbelt and listen to the Data Steward
Fasten you seatbelt and listen to the Data Steward
Jean-Pierre Riehl
 
DataEd Online: Unlocking Business Value through Data Modeling and Data Archit...
DataEd Online: Unlocking Business Value through Data Modeling and Data Archit...DataEd Online: Unlocking Business Value through Data Modeling and Data Archit...
DataEd Online: Unlocking Business Value through Data Modeling and Data Archit...DATAVERSITY
 

What's hot (20)

Data-Ed: A Framework for no sql and Hadoop
Data-Ed: A Framework for no sql and HadoopData-Ed: A Framework for no sql and Hadoop
Data-Ed: A Framework for no sql and Hadoop
 
DataEd Online: Unlock Business Value through Data Governance
DataEd Online: Unlock Business Value through Data GovernanceDataEd Online: Unlock Business Value through Data Governance
DataEd Online: Unlock Business Value through Data Governance
 
DataEd Slides: Exorcising the Seven Deadly Data Sins
DataEd Slides: Exorcising the Seven Deadly Data SinsDataEd Slides: Exorcising the Seven Deadly Data Sins
DataEd Slides: Exorcising the Seven Deadly Data Sins
 
Essential Metadata Strategies
Essential Metadata StrategiesEssential Metadata Strategies
Essential Metadata Strategies
 
Data Management: Tips & Tools
Data Management: Tips & ToolsData Management: Tips & Tools
Data Management: Tips & Tools
 
Data-Ed Online: Trends in Data Modeling
Data-Ed Online: Trends in Data ModelingData-Ed Online: Trends in Data Modeling
Data-Ed Online: Trends in Data Modeling
 
DataOps - The Foundation for Your Agile Data Architecture
DataOps - The Foundation for Your Agile Data ArchitectureDataOps - The Foundation for Your Agile Data Architecture
DataOps - The Foundation for Your Agile Data Architecture
 
Building a Team for Managing Unstructured Data
Building a Team for Managing Unstructured DataBuilding a Team for Managing Unstructured Data
Building a Team for Managing Unstructured Data
 
Data-Ed: Data Architecture Requirements
Data-Ed: Data Architecture Requirements  Data-Ed: Data Architecture Requirements
Data-Ed: Data Architecture Requirements
 
Data Management
Data Management Data Management
Data Management
 
How to Get Started with Your MongoDB Pilot Project
How to Get Started with Your MongoDB Pilot ProjectHow to Get Started with Your MongoDB Pilot Project
How to Get Started with Your MongoDB Pilot Project
 
Data Systems Integration & Business Value Pt. 1: Metadata
Data Systems Integration & Business Value Pt. 1: MetadataData Systems Integration & Business Value Pt. 1: Metadata
Data Systems Integration & Business Value Pt. 1: Metadata
 
Chief Data Officer Agenda Webinar: How CDOs Should Work with Lawyers
Chief Data Officer Agenda Webinar: How CDOs Should Work with LawyersChief Data Officer Agenda Webinar: How CDOs Should Work with Lawyers
Chief Data Officer Agenda Webinar: How CDOs Should Work with Lawyers
 
Real-World Data Governance: Setting Appropriate Business Expectations
Real-World Data Governance: Setting Appropriate Business ExpectationsReal-World Data Governance: Setting Appropriate Business Expectations
Real-World Data Governance: Setting Appropriate Business Expectations
 
A Modern Approach to DI & MDM
A Modern Approach to DI & MDMA Modern Approach to DI & MDM
A Modern Approach to DI & MDM
 
Why Data Modeling Is Fundamental
Why Data Modeling Is FundamentalWhy Data Modeling Is Fundamental
Why Data Modeling Is Fundamental
 
Data Architecture Process in a BI environment
Data Architecture Process in a BI environmentData Architecture Process in a BI environment
Data Architecture Process in a BI environment
 
Data-Ed Online: Data Operations Management: Turning Your Challenges Into Success
Data-Ed Online: Data Operations Management: Turning Your Challenges Into SuccessData-Ed Online: Data Operations Management: Turning Your Challenges Into Success
Data-Ed Online: Data Operations Management: Turning Your Challenges Into Success
 
Fasten you seatbelt and listen to the Data Steward
Fasten you seatbelt and listen to the Data StewardFasten you seatbelt and listen to the Data Steward
Fasten you seatbelt and listen to the Data Steward
 
DataEd Online: Unlocking Business Value through Data Modeling and Data Archit...
DataEd Online: Unlocking Business Value through Data Modeling and Data Archit...DataEd Online: Unlocking Business Value through Data Modeling and Data Archit...
DataEd Online: Unlocking Business Value through Data Modeling and Data Archit...
 

Viewers also liked (7)

Investigating The Lever V5 Formatted
Investigating The  Lever V5 FormattedInvestigating The  Lever V5 Formatted
Investigating The Lever V5 Formatted
 
Design cycle
Design cycleDesign cycle
Design cycle
 
Individual sections development exercise # 4
Individual sections development exercise # 4Individual sections development exercise # 4
Individual sections development exercise # 4
 
Design Process Complete
Design  Process CompleteDesign  Process Complete
Design Process Complete
 
The design cycle personal project connection
The design cycle  personal project connectionThe design cycle  personal project connection
The design cycle personal project connection
 
Design Process Formatted
Design  Process FormattedDesign  Process Formatted
Design Process Formatted
 
Presentation By Mr. David: HOD Design And Technology, Pathways Gurgaon
Presentation By Mr. David: HOD Design And Technology, Pathways GurgaonPresentation By Mr. David: HOD Design And Technology, Pathways Gurgaon
Presentation By Mr. David: HOD Design And Technology, Pathways Gurgaon
 

Similar to Chapter12

Information system development
Information system developmentInformation system development
Information system development
Dhani Ahmad
 
Chapter 12 information system development
Chapter 12   information system developmentChapter 12   information system development
Chapter 12 information system development
haider ali
 
James hall ch 14
James hall ch 14James hall ch 14
James hall ch 14
David Julian
 
VTU - MIS Module 4 - SDLC
VTU - MIS Module 4 - SDLCVTU - MIS Module 4 - SDLC
VTU - MIS Module 4 - SDLC
Priya Diana Mercy
 
Chapter 1- INTRODUCTION TO SYSTEM ANALYSIS AND DESIGN by DEEPA (1).pptx
Chapter 1- INTRODUCTION TO SYSTEM ANALYSIS AND DESIGN by DEEPA (1).pptxChapter 1- INTRODUCTION TO SYSTEM ANALYSIS AND DESIGN by DEEPA (1).pptx
Chapter 1- INTRODUCTION TO SYSTEM ANALYSIS AND DESIGN by DEEPA (1).pptx
anumayived
 
System analysis and design
System analysis and designSystem analysis and design
System analysis and design
RobinsonObura
 
Systems Analysis And Design 2
Systems Analysis And Design 2Systems Analysis And Design 2
Systems Analysis And Design 2MISY
 
lecture_29.pptx
lecture_29.pptxlecture_29.pptx
lecture_29.pptx
MNumanZafar1
 
Chap12 Developing Business It Solutions[1]
Chap12 Developing Business It Solutions[1]Chap12 Developing Business It Solutions[1]
Chap12 Developing Business It Solutions[1]sihamy
 
Management Information Systems – Week 7 Lecture 2Developme.docx
Management Information Systems – Week 7 Lecture 2Developme.docxManagement Information Systems – Week 7 Lecture 2Developme.docx
Management Information Systems – Week 7 Lecture 2Developme.docx
croysierkathey
 
Development of information system chap 2
Development of information system chap 2Development of information system chap 2
Development of information system chap 2
amanuelayde1
 
SYSTEMS PRESENTATION to help you in design
SYSTEMS PRESENTATION to help you  in designSYSTEMS PRESENTATION to help you  in design
SYSTEMS PRESENTATION to help you in design
rhesusfactor848
 
Analyzing Systems Using Data Flow Diagrams
Analyzing Systems Using Data Flow DiagramsAnalyzing Systems Using Data Flow Diagrams
Analyzing Systems Using Data Flow Diagrams
Christina Valadez
 
System_Analysis_and_Design_Assignment_New2.ppt
System_Analysis_and_Design_Assignment_New2.pptSystem_Analysis_and_Design_Assignment_New2.ppt
System_Analysis_and_Design_Assignment_New2.ppt
MarissaPedragosa
 
BIS Ch 4.ppt
BIS Ch 4.pptBIS Ch 4.ppt
BIS Ch 4.ppt
biruktesfaye27
 
mis ch2.pptx
mis ch2.pptxmis ch2.pptx
mis ch2.pptx
habte11
 
member is a security software architect in a cloud service provider .docx
member is a security software architect in a cloud service provider .docxmember is a security software architect in a cloud service provider .docx
member is a security software architect in a cloud service provider .docx
wkyra78
 
Managing IT Projects
Managing IT ProjectsManaging IT Projects
Managing IT Projects
Rhys Leong
 
Ch 2-RE-process.pptx
Ch 2-RE-process.pptxCh 2-RE-process.pptx
Ch 2-RE-process.pptx
balewayalew
 

Similar to Chapter12 (20)

Information system development
Information system developmentInformation system development
Information system development
 
Chapter 12 information system development
Chapter 12   information system developmentChapter 12   information system development
Chapter 12 information system development
 
James hall ch 14
James hall ch 14James hall ch 14
James hall ch 14
 
VTU - MIS Module 4 - SDLC
VTU - MIS Module 4 - SDLCVTU - MIS Module 4 - SDLC
VTU - MIS Module 4 - SDLC
 
Chapter 1- INTRODUCTION TO SYSTEM ANALYSIS AND DESIGN by DEEPA (1).pptx
Chapter 1- INTRODUCTION TO SYSTEM ANALYSIS AND DESIGN by DEEPA (1).pptxChapter 1- INTRODUCTION TO SYSTEM ANALYSIS AND DESIGN by DEEPA (1).pptx
Chapter 1- INTRODUCTION TO SYSTEM ANALYSIS AND DESIGN by DEEPA (1).pptx
 
System analysis and design
System analysis and designSystem analysis and design
System analysis and design
 
Systems Analysis And Design 2
Systems Analysis And Design 2Systems Analysis And Design 2
Systems Analysis And Design 2
 
lecture_29.pptx
lecture_29.pptxlecture_29.pptx
lecture_29.pptx
 
Chap12 Developing Business It Solutions[1]
Chap12 Developing Business It Solutions[1]Chap12 Developing Business It Solutions[1]
Chap12 Developing Business It Solutions[1]
 
Management Information Systems – Week 7 Lecture 2Developme.docx
Management Information Systems – Week 7 Lecture 2Developme.docxManagement Information Systems – Week 7 Lecture 2Developme.docx
Management Information Systems – Week 7 Lecture 2Developme.docx
 
Development of information system chap 2
Development of information system chap 2Development of information system chap 2
Development of information system chap 2
 
SYSTEMS PRESENTATION to help you in design
SYSTEMS PRESENTATION to help you  in designSYSTEMS PRESENTATION to help you  in design
SYSTEMS PRESENTATION to help you in design
 
Analyzing Systems Using Data Flow Diagrams
Analyzing Systems Using Data Flow DiagramsAnalyzing Systems Using Data Flow Diagrams
Analyzing Systems Using Data Flow Diagrams
 
System_Analysis_and_Design_Assignment_New2.ppt
System_Analysis_and_Design_Assignment_New2.pptSystem_Analysis_and_Design_Assignment_New2.ppt
System_Analysis_and_Design_Assignment_New2.ppt
 
BIS Ch 4.ppt
BIS Ch 4.pptBIS Ch 4.ppt
BIS Ch 4.ppt
 
mis ch2.pptx
mis ch2.pptxmis ch2.pptx
mis ch2.pptx
 
member is a security software architect in a cloud service provider .docx
member is a security software architect in a cloud service provider .docxmember is a security software architect in a cloud service provider .docx
member is a security software architect in a cloud service provider .docx
 
Final
FinalFinal
Final
 
Managing IT Projects
Managing IT ProjectsManaging IT Projects
Managing IT Projects
 
Ch 2-RE-process.pptx
Ch 2-RE-process.pptxCh 2-RE-process.pptx
Ch 2-RE-process.pptx
 

More from Izaham

Morphology 1
Morphology 1Morphology 1
Morphology 1
Izaham
 
Morphology
MorphologyMorphology
Morphology
Izaham
 
Critical reading
Critical readingCritical reading
Critical reading
Izaham
 
Listening for main idea & supporting details
Listening for main idea & supporting detailsListening for main idea & supporting details
Listening for main idea & supporting details
Izaham
 
Internet and elt
Internet and eltInternet and elt
Internet and elt
Izaham
 
Mulitmedia english v3
Mulitmedia english v3Mulitmedia english v3
Mulitmedia english v3
Izaham
 
Development of call simplified 2015
Development of call simplified 2015Development of call simplified 2015
Development of call simplified 2015
Izaham
 
Ad & dis lect 2 2015
Ad & dis lect 2 2015Ad & dis lect 2 2015
Ad & dis lect 2 2015
Izaham
 
Tsl641 principles for call evaluation v 2
Tsl641   principles for call evaluation v 2Tsl641   principles for call evaluation v 2
Tsl641 principles for call evaluation v 2
Izaham
 
Intro to call cai
Intro to call caiIntro to call cai
Intro to call cai
Izaham
 
E learning design principles
E learning design principlesE learning design principles
E learning design principlesIzaham
 
Visual principles edu711
Visual principles edu711Visual principles edu711
Visual principles edu711Izaham
 
Sample courseware development
Sample courseware developmentSample courseware development
Sample courseware developmentIzaham
 
A development of computer assisted software (a ja-w)
A development of computer assisted software (a ja-w)A development of computer assisted software (a ja-w)
A development of computer assisted software (a ja-w)Izaham
 
Flowchart 2
Flowchart 2Flowchart 2
Flowchart 2Izaham
 
Flowchart
FlowchartFlowchart
FlowchartIzaham
 
Poster Untuk Cetak Banner
Poster Untuk Cetak BannerPoster Untuk Cetak Banner
Poster Untuk Cetak BannerIzaham
 
Poster Untuk Cetak Banner
Poster Untuk Cetak BannerPoster Untuk Cetak Banner
Poster Untuk Cetak BannerIzaham
 
Tsl641 Lecture 1
Tsl641 Lecture 1Tsl641 Lecture 1
Tsl641 Lecture 1Izaham
 
Ad & Dis Lect 2
Ad & Dis Lect 2Ad & Dis Lect 2
Ad & Dis Lect 2Izaham
 

More from Izaham (20)

Morphology 1
Morphology 1Morphology 1
Morphology 1
 
Morphology
MorphologyMorphology
Morphology
 
Critical reading
Critical readingCritical reading
Critical reading
 
Listening for main idea & supporting details
Listening for main idea & supporting detailsListening for main idea & supporting details
Listening for main idea & supporting details
 
Internet and elt
Internet and eltInternet and elt
Internet and elt
 
Mulitmedia english v3
Mulitmedia english v3Mulitmedia english v3
Mulitmedia english v3
 
Development of call simplified 2015
Development of call simplified 2015Development of call simplified 2015
Development of call simplified 2015
 
Ad & dis lect 2 2015
Ad & dis lect 2 2015Ad & dis lect 2 2015
Ad & dis lect 2 2015
 
Tsl641 principles for call evaluation v 2
Tsl641   principles for call evaluation v 2Tsl641   principles for call evaluation v 2
Tsl641 principles for call evaluation v 2
 
Intro to call cai
Intro to call caiIntro to call cai
Intro to call cai
 
E learning design principles
E learning design principlesE learning design principles
E learning design principles
 
Visual principles edu711
Visual principles edu711Visual principles edu711
Visual principles edu711
 
Sample courseware development
Sample courseware developmentSample courseware development
Sample courseware development
 
A development of computer assisted software (a ja-w)
A development of computer assisted software (a ja-w)A development of computer assisted software (a ja-w)
A development of computer assisted software (a ja-w)
 
Flowchart 2
Flowchart 2Flowchart 2
Flowchart 2
 
Flowchart
FlowchartFlowchart
Flowchart
 
Poster Untuk Cetak Banner
Poster Untuk Cetak BannerPoster Untuk Cetak Banner
Poster Untuk Cetak Banner
 
Poster Untuk Cetak Banner
Poster Untuk Cetak BannerPoster Untuk Cetak Banner
Poster Untuk Cetak Banner
 
Tsl641 Lecture 1
Tsl641 Lecture 1Tsl641 Lecture 1
Tsl641 Lecture 1
 
Ad & Dis Lect 2
Ad & Dis Lect 2Ad & Dis Lect 2
Ad & Dis Lect 2
 

Recently uploaded

Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 

Recently uploaded (20)

Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 

Chapter12

  • 1. Chapter 12 Information System Development
  • 2. Chapter 12 Objectives List the phases in the system development cycle Identify the guidelines for system development Discuss the importance of project management, feasibility assessment, documentation, and data and information gathering techniques Explain the activities performed in the planning phase Discuss the purpose of the activities performed in the analysis phase Describe the various tools used in process modeling Describe the various tools used in object modeling Explain the activities performed in the design phase Recognize the develop programs activity is part of the system development cycle Discuss the activities performed in the implementation phase Discuss the purpose of the activities performed in the operation, support, and security phase Next
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36. Design Phase Video: A Tour of Lucasfilm Data Center Next CLICK TO START
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55. Summary of Information System Development Phases in the system development cycle Guidelines for system development Activities that occur during the entire system development cycle Chapter 12 Complete