Implementation Plans

docx

School

Kenyatta University *

*We aren’t endorsed by this school

Course

2022

Subject

Information Systems

Date

Nov 24, 2024

Type

docx

Pages

5

Uploaded by Jmsomuse

Report
1 Plans for Implementation Plans for Implementation Trine University IS---5803-1D1-SU-2021 - Info Studies Capstone 07/24/2022
2 Plans for Implementation Plans for Implementation 1. Proposed Documentation Type Documentation for the program, which is still in progress, offers details about it and instructions on how to use it for a variety of tasks. Basic themes of product documentation include requirements, relevant information, characteristics of the system, and guidance (Ovaskainen et al., 2017). As the last pieces of preparation from the project implementation, this project will mostly concentrate on generating documentation. The two most common types of documentation are as follows: System documentation: system documentation is a term used to describe documents that describe a system's elements and the organization as a whole. It includes description papers, design options, architectural justifications, and frequently asked questions. User documentation: The term "user documentation" refers to instructions prepared predominantly for computer programmers and application users. Recorded material includes, but is not limited to, professional guides, assembly guides, operating instructions, and resource manuals. Users inside the organization will have access to this documentation via electronic means (Ovaskainen et al., 2017). The project documentation will be created by the program designers, who will share it with the organization's management as a downloadable PDF file that can be accessed as soon as users begin installing the application. 2. Testing Method For this program to be implemented successfully, program testing is crucial. Through this procedure, the program is certain to serve its intended purpose and help the organization reach its desired goals (Ovaskainen et al., 2017). I'd want to suggest five distinct testing procedures for this application program in order to test it.
3 Plans for Implementation 3. Adoption Testing This evaluation determines whether the program has helped users meet their task objectives in the desired manner (Eickhoff et al., 2017). Acceptance testing will be used in this project to assess how the application program has helped the security personnel monitor all the activities in the organisation Functional Evaluation: This determines whether the program accomplishes the goal for which it was created. Does the program record surveillance footage, operate motion sensors, and send signals to tiggers allarms? Interactive Examination: This testing, also known as manual testing, enables the developers to carry out tests on how the system's users interact with it. This test is essential for looking at user performance while using the program through actual physical interactions. Performance Evaluation: This type of testing looks at five critical steps, including the software's dependability, bandwidth, expandability, continuity, and memory consumption. Security Checks: Security evaluation exposes the system's flaws so that the software system and application are guaranteed to be risk- and threat-free (Eickhoff et al., 2017). These assessments aim to find prospective weak spots in programming code that could lead to the loss of data, revenue, or company image among clients or other third parties. 4. System Transition Plan This system's transition plan calls for a direct switchover. The computers are switched as soon as possible, and the current platform accomplishes the old one right away while still closing it down. The main benefit of making this switch is that it will save money.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4 Plans for Implementation 5. Training Method The tutorials that are included in the documentation will be used primarily as part of the training for implementing this software. The installation of a computer system must include tutorials, which are essential in giving the end-user a rather more reachable option (Eickhoff et al., 2017). Type of Support and Maintenance Given that this is an internal software, the internal system developer will offer the suggested servicing and assistance. The system's users will stay in touch with the creator to offer assistance as needed (Ovaskainen et al., 2017). Due to the fact that the technical support is provided for the store as well, this strategy has the advantages of being efficient and affordable.
5 Plans for Implementation References Fox, P. T., Lancaster, J. L., Eickhoff, S. B., Laird, A. R., and Fox, P. M. (2017). GingerALE Software implementation flaws: a description and suggestions (Pages 7–11 of Vol. 38, No. 1) Tikhonov, G., Norberg, A., Guillaume Blanchet, F., Duan, L., Dunson, D., et al (2017). How can community data be improved? a conceptual framework and its application in the form of software and models. 20(5), 561-576; Ecology Letters.