Textbook Notes (362,988)
Canada (158,130)
Chapter 11


5 Pages
Unlock Document

Western University
Computer Science
Computer Science 1032A/B
Diane Goldstein

CHAPTER 11 Q1. How Can IS beAcquired? - We can identify four basic methods for acquiring software applications; 1. buy it and use it 2. buy it and customize it 3. rent or lease it 4. build it yourself - Organizations use all these methods for acquisition; however option 2 is the most common method for acquiring larger software applications -Acquiring software applications is not equal to acquiring IS Q2. WhatAre IT Projects and WhyAre They Risky? - Projects often begin with a scope or an objective - Objective of the project is to accomplish something new so projects represent change - IT projects always include some impact on data, people and procedures - CHAOS Report created the Standish Group in 1994 suggested that only 16% of IT projects wre delivered on time, on budget, and on scope, whereas more than 30% of IT projects were cancelled before delivering any benefits - IT projects face significant risks. - Lack of good scale model becomes an important risk - Good estimates for IT projects are difficult to develop because technology is changing - System requirements change as the system is developed and the bigger the system and the longer the project, the more the requirements change - IT project rink are consisted of three things - IT project performance has to be evaluated on not only whether the project was on budget and on time (Project Process Performance), but also whether expected benefits from the project were realized (Project Product Performance) - The forces of evil involve structural risk, volatility risk and project process performance - When structural risk is high it means that the project is either large or technically complex - The forces of good involve knowledge resources, organizational support, project management practices and both process and product performance Q3. What Is Information Technology Project Management - Information Technology Project Management (ITPM) is the collection of techniques and methods that project managers use to plan, coordinate and complete IT projects - Most important skill for a successful project manager is communication - ITPM is central to the skills needed for organizations to adapt appropriately to an increasingly complex business environment Q4. What Is Analysis and Design and the SDLC - SystemsAnalysis and Design is the process of creating and maintaining IS - Do not suppose that systems development is exclusively a technical task undertaken by programmers and hardware specialists - The single most important criterion for IS success is for users to take ownership of systems - Many development methods exist, Rapid Application Development (RAD), Object-Oriented Systems Development (OOD), and Extreme Programming (XP) - Different methodologies are appropriate for different types of systems The Systems Development Life Cycle (SDLC) - Systems Development Life Cycle (SDLC) is the classical process used to acquire IS. - Basic tasks that need to be performed to successfully acquire and maintain IS are combined into five phases; 1. System definition 2. Requirement analysis 3. Component Design 4. Implementation 5. System Maintenance - Acquisition begins when business planning process identifies a need for a new system - Developers in the first SDLC phase, system definition, use management’s statement of the system needs in order to begin to define the new system - The resulting project plan is the input to the second phase, requirements analysis - Developers identify particular features and functions of the new system - Output of that phase is a set of approved user requirements which become the primary input used to design system components - In phase 4, developers implement, test and install the new system. - The description of fixes and new requirements is input to a system maintenance phase Step 1: System Definition Define System Goals and Scope - The first step is to define the goals and scope of the new IS - At this step, development team defines the goal and purpose of the new system in terms of facilitating an organization’s competitive strategy -Another task is to define the project’s scope Assess Feasibility - This step answers the question, “Does this project make sense?” - Feasibility has four dimensions: cost, schedule, technical & organizational >> The purpose is to eliminate any obviously infeasible ideasASAP - Schedule feasibility is difficult to determine because it is difficult to estimate the time it will take to acquire the system >> Purpose is to rule out any obviously unacceptable projects - Technical feasibility refers to whether existing IT is likely to be able to meet the needs of the new system >> Can you do something useful with that data? - Organizational feasibility concerns whether the new system fits within the organization’s customs, culture, charger or legal requirements Step 2: RequirementsAnalysis - If the defined project is feasible, the next step is to form the project team and develop requirements - When developing requirements, the team normally consists of IT personnel and user representatives. They are active throughout systems development process - System Analysts are IT professionals who understand both business and technology - The team composition changes over time. - User involvement is critical throughout the system development process - The important point is for users to have active involvement and to take ownership of the project throughout the entire development process Q5. What Is the User’s Role in Requirements Development? - The primary purpose of the requirements analysis phase is to determine and document the specific features and functions of the new system - This phase requires interviewing users and documenting potentially hundreds of requirements - Requirements definition is expensive Determine Requirements - Determining the system’s requirements is the most important phase in the systems development process - Typically, systems analysts interview users and record results - Seasoned and experienced systems analysts know how to conduct interview so as to bring such requirements to light - If the new system involves a new database or su
More Less

Related notes for Computer Science 1032A/B

Log In


Don't have an account?

Join OneClass

Access over 10 million pages of study
documents for 1.3 million courses.

Sign up

Join to view


By registering, I agree to the Terms and Privacy Policies
Already have an account?
Just a few more details

So we can recommend you notes for your school.

Reset Password

Please enter below the email address you registered with and we will send you a link to reset your password.

Add your courses

Get notes from the top students in your class.