Implementation Plans
docx
keyboard_arrow_up
School
Kenyatta University *
*We aren’t endorsed by this school
Course
2022
Subject
Information Systems
Date
Nov 24, 2024
Type
docx
Pages
5
Uploaded by Jmsomuse
1
Plans for Implementation
Plans for Implementation
Trine University
IS---5803-1D1-SU-2021 - Info Studies Capstone
07/24/2022
2
Plans for Implementation
Plans for Implementation
1.
Proposed Documentation Type
Documentation for the program, which is still in progress, offers details about it and
instructions on how to use it for a variety of tasks. Basic themes of product documentation
include requirements, relevant information, characteristics of the system, and guidance
(Ovaskainen et al., 2017). As the last pieces of preparation from the project implementation,
this project will mostly concentrate on generating documentation. The two most common
types of documentation are as follows:
System documentation:
system documentation is a term used to describe documents that
describe a system's elements and the organization as a whole. It includes description papers,
design options, architectural justifications, and frequently asked questions.
User documentation:
The term "user documentation" refers to instructions prepared
predominantly for computer programmers and application users. Recorded material includes,
but is not limited to, professional guides, assembly guides, operating instructions, and
resource manuals.
Users inside the organization will have access to this documentation via electronic means
(Ovaskainen et al., 2017). The project documentation will be created by the program
designers, who will share it with the organization's management as a downloadable PDF file
that can be accessed as soon as users begin installing the application.
2.
Testing Method
For this program to be implemented successfully, program testing is crucial. Through this
procedure, the program is certain to serve its intended purpose and help the organization
reach its desired goals (Ovaskainen et al., 2017). I'd want to suggest five distinct testing
procedures for this application program in order to test it.
3
Plans for Implementation
3.
Adoption Testing
This evaluation determines whether the program has helped users meet their task
objectives in the desired manner (Eickhoff et al., 2017). Acceptance testing will be used in
this project to assess how the application program has helped the security personnel monitor
all the activities in the organisation
Functional Evaluation:
This determines whether the program accomplishes the goal for
which it was created. Does the program record surveillance footage, operate motion sensors,
and send signals to tiggers allarms?
Interactive Examination:
This testing, also known as manual testing, enables the developers
to carry out tests on how the system's users interact with it. This test is essential for looking at
user performance while using the program through actual physical interactions.
Performance Evaluation:
This type of testing looks at five critical steps, including the
software's dependability, bandwidth, expandability, continuity, and memory consumption.
Security Checks:
Security evaluation exposes the system's flaws so that the software system
and application are guaranteed to be risk- and threat-free (Eickhoff et al., 2017). These
assessments aim to find prospective weak spots in programming code that could lead to the
loss of data, revenue, or company image among clients or other third parties.
4.
System Transition Plan
This system's transition plan calls for a direct switchover. The computers are switched
as soon as possible, and the current platform accomplishes the old one right away while still
closing it down. The main benefit of making this switch is that it will save money.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4
Plans for Implementation
5.
Training Method
The tutorials that are included in the documentation will be used primarily as part of the
training for implementing this software. The installation of a computer system must include
tutorials, which are essential in giving the end-user a rather more reachable option (Eickhoff
et al., 2017).
Type of Support and Maintenance
Given that this is an internal software, the internal system developer will offer the suggested
servicing and assistance. The system's users will stay in touch with the creator to offer
assistance as needed (Ovaskainen et al., 2017). Due to the fact that the technical support is
provided for the store as well, this strategy has the advantages of being efficient and
affordable.
5
Plans for Implementation
References
Fox, P. T., Lancaster, J. L., Eickhoff, S. B., Laird, A. R., and Fox, P. M. (2017). GingerALE
Software implementation flaws: a description and suggestions (Pages 7–11 of Vol. 38,
No. 1)
Tikhonov, G., Norberg, A., Guillaume Blanchet, F., Duan, L., Dunson, D., et al (2017). How
can community data be improved? a conceptual framework and its application in the
form of software and models. 20(5), 561-576; Ecology Letters.