Alternative approaches for acquiring software, Basic Computer Science

Alternative approaches for acquiring software:

There are some alternative approaches for acquiring software. They are: 

i)  'off the shelf' software package 

ii)  'turnkey' package (both hardware and software) 

iii)  write your own package 

iv)  have customised programs written for you. 

Each of these approaches has its own advantages and disadvantages. Standard packages are by far the most common way of acquiring software. They offer simple and relatively cheap option, with the advantage of a large group of users of common package.

Turnkey systems, with all components of hardware, software and communications provided by the vendor (supplier) are simpler for their users as every aspect is looked after by the supplier. This is a common method pursued by some larger libraries. It is desirable that the package acquired is an integrated one - that is to say it can carry out a number of functions within a common framework. 

Examples could be library automation packages, incorporating acquisitions, cataloguing, circulation etc. There is one possible drawback associated with fully integrated packages, apart from not being flexible; some elements of integrated packages might be inferior to a program dedicated for the same purpose. For example, if database applications are particularly important, it could be a mistake to rely on the database component of a standard package. The 'customised' approaches provide flexibility and a product geared precisely to your specific needs. Though popular, software specially written for information services is too expensive and difficult to maintain and modify for it to be a realistic option in many cases. Some ability to modify software is desirable and standard packages offer the chance to modify such aspects as output formats, and help message. Also, some larger systems are available in modular form, with distinct pieces of software carrying out specific functions. Modules for particular purposes can be acquired and then combined as required, giving a fair degree of flexibility in the look of a software system. The obvious example is the library house keeping package with separate modules for acquisitions, cataloguing, circulation, etc..  

Posted Date: 10/24/2012 4:49:06 AM | Location : United States







Related Discussions:- Alternative approaches for acquiring software, Assignment Help, Ask Question on Alternative approaches for acquiring software, Get Answer, Expert's Help, Alternative approaches for acquiring software Discussions

Write discussion on Alternative approaches for acquiring software
Your posts are moderated
Related Questions
Database Management Software: For storage of large amounts of varied data, and rapid retrieval and interpretations of data, the database is the ideal tool. It is most useful for s

Why is it called out of band protocol? A1) FTP uses port 20 and port 21; port 20 is used for data connection, whereas port 21 is used for control connection. FTP is known as out-of

Question 1 What is a desktop? Explain the Windows XP desktop? Question 2 How does a flash drive work? Question 3 Write the procedure for creating Macro Question 4 E

Frequency and Bandwidth: Let us try to understand a little about how information is transmitted. The information may be in the form of sound (human voice, music) or it may be

Mike sells on the average 15 newspapers per week (Monday – Friday). Find the probability that 2.1 In a given week he will sell all the newspapers

what is a dry running of flow chart?

In this program, you are going to write a program for playing the game of Hangman. In this game, the computer will pick a word and display a sequence of blanks to be filled in; one

Question 1: (a) How would you describe human reasoning? (b) Describe the different types of human reasoning? Question 2: (a) What are the computational factors affec

Briefly explain who a hacker is and what the activities of a hacker are?k question #Minimum 100 words accepted#

One time a program is in memory it has to be executed. To do this, each instruction must be appeared at, decoded and acted upon in turn until the program is finished. This is accom