CS-255 1-2 Discuss Systems Development Lifecycle and Collecting Requirements Strategies

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

CS-255

Subject

Computer Science

Date

Dec 6, 2023

Type

docx

Pages

4

Uploaded by Barbarajean88

Report
Introduce yourself (for example, your name, where you're from, interests, family, pets) Hello Class and Dr. Yurik, I am working towards my degree BS in Computer Science in the hopes of having a career as either an Information Security Analyst or Software Developer. I currently live in a picturesque small town in Maine filled with lakes and walking trails. I live here with my partner Anthony, our brand-spanking-new daughter Divani Rose, and two birds Harlie and Joker. Most of Maine is beautiful but if I am being honest, I hate it. It’s too cold for my liking. I have Floridian blood running through my veins. The summers are nice except for this summer that we just had although maybe I should be grateful since I was pregnant. A variety of outdoor activities are of interest to me, including horseback riding, hiking, and jumping off tall things into rivers. As an adrenaline junkie, I love doing things that would scare most people. also enjoy watching anime shows like Hunter x Hunter, One Piece, Demon Slayer, The Black Butler, and the Seven Deadly Sins. I am a huge science fiction fan. However, if I had to choose one thing, it would be learning. I love learning about ancient history, biodiversity, and dinosaurs. I’ve read every book and watched every show by Dan Jones and Sir David Attenborough. It's funny because I didn’t enjoy learning until I became an adult and saw the value in being educated. What has been your favorite course in the computer science program so far? What did you enjoy about it? My favorite course thus far is a draw between CS-210 Programming Languages and CS-250 Software Development Lifecycle. CS-210 offered various programming projects, most notably the Airgead Banking Investment Calculator. As far as CS-250 I loved that course because of the way it was structured. Every week we learned another cycle. With the way the course was designed and the project (Top Five Destinations), it felt like I was participating in the development of a real project. I learn better when courses are designed this way.
What are the major phases of the systems development lifecycle (SDLC)? Describe the key features of each phase in your own words. The Systems Development Lifecycle is a framework that defines tasks performed at each step in the software development process. Organizations utilize the SDLC to design, create, and maintain information systems and software applications. There are various SDLC model variations, however, for the purpose of this course, the Systems Development Life Cycle (SDLC) is comprised of five basic phases (with some sub- phases), namely planning (which involves gathering requirements), analysis, design, implementation, and maintenance. The first phase is planning and there is a lot that happens in this phase. First, they would need to identify the need for a new system or software and define its objectives. Then they would assess the feasibility of the project. These factors help determine if the project is worth pursuing. The project's scope is clearly defined as well as its objectives, deliverables, and project constraints. Finally, it is during this phase that the project's resources such as budget and personnel are allocated. The second phase is Analysis, and the key features of this phase are to collect and document detailed functional and non-functional requirements from stakeholders through interviews, surveys, and research. By creating a high-level system architecture, the team will outline how the system will meet the identified requirements. To illustrate how data will be processed and stored, data flow diagrams and database structures are designed. The final step is to identify and describe use cases to define how users will interact with the system. The third phase is design, the suggested solutions are transformed into logical and physical system requirements. The purpose of this phase is to create detailed technical specifications, including hardware, software, and network requirements. In this phase, the user interface (UI) and user experience (UX) are designed. The team will define the database schema and relationships based on the data model from the analysis phase. Additionally, they will determine how the system's architectural components interact.
The fourth phase is Implementation, and the key feature is the coding of the project. During the implementation phase, the entire framework is developed in a way that meets all project requirements. After the code is finished, testing is carried out (testing, debugging, creation of user manuals), and the application is assessed to ensure it meets the requirements and runs correctly. The project manager gives the client the finished product during the deployment phase. The fifth and final phase is Maintenance, during which program fixes and enhancements are handled. Maintenance includes support and training. The key features of this phase include support for the users and organizations, any issues are addressed, and necessary adjustments are made. Changes may be made based on feedback asking for enhanced features or improvements. Lastly, the system is continuously monitored for performance and optimization. Requirements can be collected in various ways: reading documents, an in-person conversation, joint application design (JAD), etc. Choose one of these methods and describe a strategy you would use to help you collect requirements with this method. As mentioned, there are various methodologies to collect requirements during SDLC. My strategy would depend greatly on the project's nature, so it's difficult to say which I would use. Since the question asks us to describe a strategy, we would use to collect requirements, I have chosen a method that is best suited to me as a person. My favorite way to solve problems is to brainstorm, which is why I chose Joint Application Design for this question. In this method, developers, business analysts, and users collaborate within cross-functional teams. As a group, members explore, discuss, and prioritize requirements during these workshops. As a result of using JAD to gather requirements, I can quickly gain a consensus and accumulate a diverse set of requirements. How has technology changed how people collect requirements? In recent years, technology has significantly changed how individuals collect requirements. As a result of these modifications, requirement collection has become more
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
efficient, accurate, and collaborative. Remote communication is the first thing that comes to mind when considering how technology has changed this process. Remote communication became widespread during the Covid-19 pandemic. With the advent of video conferencing software such as Zoom, Microsoft Teams, and Skype, organizations and individuals could conduct virtual workshops, meetings, and interviews with stakeholders from around the world. As a result, requirements could be gathered more flexibly. In addition, webinars and whiteboards were frequently used to provide virtual workshops. A few other examples are prototyping software, virtual reality, and augmented reality. To illustrate the functionality and design of the system, prototype tools like Adobe XD, Figma, and Sketch help developers create interactive, digital prototypes. VR or augmented reality can be used to create more immersive prototypes for stakeholders. What ethical issues (data collection, bias, and so on) do you think need to be considered when collecting requirements? It is important to consider several ethical considerations when gathering requirements to ensure responsible and equitable practices. As far as I am concerned, data privacy is the most important ethical issue, followed by transparency and potential biases. To maintain data privacy, individuals who provide their data or participate in requirement gathering must understand how their data will be used. When collecting personal and sensitive information about them, it is essential to obtain their explicit consent. Our goal is to collect only the data necessary to fulfill the project's goals to protect individual privacy. Finally, robust data security measures must be implemented that protect the collected data's confidentiality and integrity. References Valacich, J. S., & George, J. F. (2019). Modern Systems Analysis and Design (9th ed.). Pearson Education (US). https://mbsdirect.vitalsource.com/books/9780135172827