Applications of systems development models

Assignment Help Computer Network Security
Reference no: EM131021047

Question:

There are four sources for this Module''s Case. The first article relates to the classic SDLC methodology. The second one gives you a description of the applications of systems development models from a practitioner''s perspective. You will see various different paradigms used in practice:

Hoffer, J. F., George,J. A., & Valacich, J, S. (2010). Systems development environment. Modern Systems Analysis and Design. [PPT presentation - Chapter 1] https://wps.prenhall.com/bp_hoffer_msad_4/22/5876/1504457.cw/index.html

Centers for Medicare and Medicaid Services (2008). Selecting a development approach. https://www.cms.gov/Research-Statistics-Data-and-Systems/CMS-Information-Technology/XLC/Downloads/SelectingDevelopmentApproach.pdf

BigLever Software Inc. (2010) The systems and software product line lifecycle framework. Retrieved from https://www.biglever.com/extras/PLE_LifecycleFramework.pdf

The last source is a website that quite thoroughly describes the software development life cycle. You are not responsible for reading all this in its entirety. Rather, look it over, become familiar with the concepts it outlines, and use it for reference in preparing your paper:

Stewart, B. (2011) Systems engineering and software development life cycle framework. OpenSDLC.org. Retrieved from https://opensdlc.org/mediawiki/index.php?title=Systems_Engineering_and_Software_Development_Life_Cycle_Framework

The Portland Pattern Repository (hosted by Cunningham and Cunningham, Inc.) is a Wiki forum specializing in software development. It is a most interesting resource for creative thoughts about computing, systems development, and organizational implications of the information environment. We will be drawing on it at several points in this course. Their introduction and links to key descriptions of what''s going on can be found here.

The Wiki is useful, but it is not a repository of "truth" except perhaps in the large aggregate. Its value lies in the diversity of opinions expresses and the prodigious amounts of experience and talent on view there. Those opinions can help you evaluate other sources of information.

You might want to get a feel for the Wiki first before you begin to use it for detail work. You could start with their section on SoftwareDevelopment (https://c2.com/cgi/wiki?SoftwareDevelopment) and/or on AgileProcesses (https://c2.com/cgi/wiki?AgileProcesses). Within the first one, links will take you to places like ProblemDomain (https://c2.com/cgi/wiki?ProblemDomain), AnalysingTheProblemDomain (https://c2.com/cgi/wiki?AnalysingTheProblemDomain), and ElicitingRequirements (https://c2.com/cgi/wiki?ElicitingRequirements). Essentially, there is no end to how far and where you can go with this. When you get started in earnest, you''ll need a good Search Strategy and careful documentation of where you''ve been; this isn''t random surfing.

Case Assignment

Read the assigned readings, supplemented if you wish with material from the optional readings and perhaps the supplementary background as well, and even other outside reading you might find by yourself to be useful. Then write a short paper stating your position on the question:

"The Systems Development Life Cycle methodology is [OR is not] excessively formal and rigid and should be [OR should not be] more flexible and unstructured?"

Your paper should be short (5-6 pages, not including cover sheet and references) and to the point. It is to be structured as a point/counterpoint argument, in the following manner.

You are expected to:

Begin this paper by stating your position on this question clearly and concisely -- take one or the other position (either for or against formality), but not both!

Citing appropriate sources, present the reasons why you take this position. Be sure to make the most effective case you can.

Then present the best evidence you can, again citing appropriate sources, against your position -- that is, establish what counterarguments can be made in response to your original position.

Finally, review your original position in light of the counterarguments, showing how they are inadequate to rebut your original statement.

By the end of your paper, you should be able to unequivocally re-affirm your original position.

Assignment Expectations

Your assignment will be evaluated based on the Rubric.

You will be particularly assessed on:

Your ability to see what the module is all about and to structure your paper accordingly.

Your informed commentary and analysis -- simply repeating what your sources say does not constitute an adequate paper.

Your ability to apply the professional language and terminology of systems design and analysis correctly and in context; you are expected to be familiar with this language and use it appropriately.

Your effective and appropriate use of in-text citations to the assigned readings and other source material to support your arguments. Refer to the TUI Course Guidelines and or the Purdue University APA formatting and style guide (see optional readings for Module 1) for the proper formats. General Case and SLP Paper Writing Guidelines

Verified Expert

The solution file contains 1700 words and it is discussed about the system development life cycle methodology is excessively formal and rigid and it should be more flexible and unstructured. It is also explained the weakness of the SDLC and stages in the SDLC. The references are included in the APA format

Reference no: EM131021047

Questions Cloud

What function does this story serve : What is a story that your family tells, to others or to itself? What function does this story serve?
The harvest of rice from decreasing : Which of the following is the best way that biotechnology can keep the harvest of rice from decreasing
Was the ipo an example of direct finance or indirect finance : Were the shares of stock issued as a result of Facebook's initial public offering (IPO) sold in a primary market or a secondary market? Was the IPO an example of direct finance or indirect finance?
How many bones are in the body : How many bones are in the body? Please explain in full detail.
Applications of systems development models : The Systems Development Life Cycle methodology is excessively formal and rigid and should be more flexible and unstructured? - review your original position in light of the counterarguments, showing how they are inadequate to rebut your original st..
What''s the biggest bone in the body : What's the biggest bone in the body? Please draw a picture of its location and what it is connected to.
How much money do you have today : Twenty years ago, you deposited $800 into an account. You earned 6% APR compounded annually for the first 15 years, and then 6% compounded monthly for the last 5 years. How much money do you have in your account today? How much money do you have toda..
What are the stages of photosynthesis : What are the stages of photosynthesis? please explain fully
What are the steps of photosynthesis : What are the steps of photosynthesis? Please explain in full detail.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd