Alternative approaches for acquiring software, Basic Computer Science

Assignment Help:

Alternative approaches for acquiring software:

There are some alternative approaches for acquiring software. They are: 

i)  'off the shelf' software package 

ii)  'turnkey' package (both hardware and software) 

iii)  write your own package 

iv)  have customised programs written for you. 

Each of these approaches has its own advantages and disadvantages. Standard packages are by far the most common way of acquiring software. They offer simple and relatively cheap option, with the advantage of a large group of users of common package.

Turnkey systems, with all components of hardware, software and communications provided by the vendor (supplier) are simpler for their users as every aspect is looked after by the supplier. This is a common method pursued by some larger libraries. It is desirable that the package acquired is an integrated one - that is to say it can carry out a number of functions within a common framework. 

Examples could be library automation packages, incorporating acquisitions, cataloguing, circulation etc. There is one possible drawback associated with fully integrated packages, apart from not being flexible; some elements of integrated packages might be inferior to a program dedicated for the same purpose. For example, if database applications are particularly important, it could be a mistake to rely on the database component of a standard package. The 'customised' approaches provide flexibility and a product geared precisely to your specific needs. Though popular, software specially written for information services is too expensive and difficult to maintain and modify for it to be a realistic option in many cases. Some ability to modify software is desirable and standard packages offer the chance to modify such aspects as output formats, and help message. Also, some larger systems are available in modular form, with distinct pieces of software carrying out specific functions. Modules for particular purposes can be acquired and then combined as required, giving a fair degree of flexibility in the look of a software system. The obvious example is the library house keeping package with separate modules for acquisitions, cataloguing, circulation, etc..  


Related Discussions:- Alternative approaches for acquiring software

Immediate addressing, These addressing modes are: With immediate addressing...

These addressing modes are: With immediate addressing, no lookup of data is essentially required. The data is located in the operands of the instruction itself, not in a different

Designing computer based information systems-background, DESIGNING COMPUTER...

DESIGNING COMPUTER BASED INFORMATION SYSTEMS Background The role of Management Information Systems (MIS) in an organization can be considered as providing

IF.ELSE Statement of python , Conditional constructs are used to integrate ...

Conditional constructs are used to integrate decision making into programs. The outcome of this decision making determines the series in which a program will execute instructions.

Describe the common modeling techniques in uml, Question 1 Explain with an...

Question 1 Explain with an example the three kinds of relationships that are most important in object oriented modeling Question 2 Describe the Common Modeling techniques in

Classify computer system according to capacity, classify computer system ac...

classify computer system according to capacity. how they are different from computer according to the classification of technology.provide the comparative study also.

Types of computer, types of computer on the basis of shape, size & resource...

types of computer on the basis of shape, size & resources

Coal Computer organization and assembly language, Code for Program to find ...

Code for Program to find the second highest number from a given array in Assembly Language by using NASM

Security threats on internet, Security threats on internet:  The Inter...

Security threats on internet:  The Internet has many advantages; however, it also opens up security threat. In this section we just want to highlight some of the threats that

Dfd, best example of dfd?

best example of dfd?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd