
Explanation of Solution
Origin of SDLC:
System Development Life Cycle (SDLC) is used to develop information systems and applications.
During 1970’s the IT industry tried many projects on the basic tasks that need to be performed to successfully build and maintain Information Systems (IS), so they build System Development Life Cycle (SDLC) in which the basic tasks were combined into phases of systems development.
SDLC came to prominence when the US department of defence required it on government contracts.
Five Basic System Development Activities:
The five basic system development activities are:
- Define the system.
It includes defining system goals and scope, accessing cost feasibility, technical feasibility, schedule feasibility and organizational feasibility.
- Determine the requirements of the project
It includes mentioning the sources of requirement, finding out the role of a prototype and approving requirements by user.
- Define system components:
It includes determine hardware specifications and
program specifications. - System Implementation:
It includes testing the system, system conversion and conduct unit test.
- Maintain system:
It includes the work done to fix or improve the system or adapt it to changes in requirement.
The tasks required for definition, requirements and design steps:
- Tasks required for Definition:
- Define system goals and scope: the first step of definition is to define the system goals and scope.
- Access feasibility: After defining the projects scope and goals, one need to access the feasibility which has four dimensions:
- cost feasibility
- technical feasibility
- schedule feasibility
- organizational feasibility
- Form a team for completion of project.
- Define requirements:
- Find all the sources of requirements.
- Conduct user interviews.
- Evaluate the existing pattern
- Determine the newly generated forms or queries.
- Identify new features and applications.
- Consider security and data model.
- Component Design:
- Determine specifications for hardware.
- Determine program specifications.
- Design the
database , procedures and create job definition.
The task required to implement a system:
In order to implement the system, the following tasks are used:
- Testing- only after each component is tested separately the entire system is tested as an integrated whole.
- System conversion- After testing the organization installs new system and System conversion is the process to convert business activity from old system to new system...
Want to see the full answer?
Check out a sample textbook solution
Chapter 12 Solutions
Using MIS (9th Edition)
- Consider the set of process: Process ID Arrival Time Burst Time P1 0 5 P2 0 10 P3 + 15 P4 18 10 P5 22 20 a) Draw the GANTT chart for the Round Robin time quantum -5) scheduling algorithm. Use the same implementation you used for the programming assignmenti.e. the processes should always run in PID order. Assume there is no context-switch overhead. Show your work for partial credit. b) Write your answer to the following performance metrics given your above CANTT charts. Show your work for partial credit. Average Response time: Average Wating time: Average Turnaround time:arrow_forwardConsider a file currently consisting of 10 blocks. Assume that the file control block and the new block information to be added are already in memory. Calculate how many disk I/O operations are required for the linked allocation strategy, if, for one block, the following conditions hold: HINTS: 1) ignore disk I/O associated with the file control block. 2) each read and each write is an explicit disk I/O. 3) assume a pointer to the end of the list for linked allocation a. The block is added at the beginning. b. The block is added in the middle. c. The block is added at the end. d. The block is removed from the beginning. e. The block is removed from the middle. f. The block is removed from the end.arrow_forwardSegment Base (original) Length Base (after compaction) 0 100 300 1 1400 600 2 450 100 3 3200 80 4 2200 500 5 3300 33 1. Given the original base addresses, what are the physical addresses for the following logical addresses? If it's an invalid address, just write "invalid". Note that (X, Y) => segment X, offset Y a) (0,350) b) (1,599) c) (2,50) d) (3,81) e) (4,300) f) (5.0) g) (5,34)arrow_forward
- Process Allocation A Max BCDABC D A Available B C PO 3 0 2 1 4 2 4 2 1 0 0 P1 0 1 0 1 0 2 2 2 P2 1 2 0 0 3 2 1 0 P3 0 1 1 2 1 1 1 2 P4 0 0 1 1 1 - 0 2 1 a) What is the content of the matrix Need? Process PO P1 P2 P3 P4 A Need BC D D ° b) Is the system in a safe state? If yes, give a safe sequence of processes. If not, explain why the system is not in a safe state. c) If a request from process P4 arrives for (1,0,0,0), can the request be granted immediately? Please state the reason.arrow_forwardConsider N processes sharing the CPU in a round-robin fashion (N>=2). Assume that each context switch takes S ms and that each time quantum is Q ms. For simplicity, assume that processes never block on any event and simply switch between the CPU and the ready queue. Also, assume that a process is still in the ready queue while a context switch is happening. a) What happens if Q is much smaller than S? What happens when Q→→ ∞, i.e. is much larger than the maximum turnaround time of all the processes? Be brief (1-2 sentences max) in your answer. b) If you use RR for scheduling, which of the three performance metrics (waiting, response, turnaround time) is more likely to be improved? Why (1-2 sentences max)?arrow_forwardCompute the jackknife estimate of bias and standard error for the correlation statistics from the law82 data using r languagearrow_forward
- Question D.1: Effective Access Time A computer keeps its page tables in memory. Memory access time is 100 nanoseconds (ns). Answer the following questions about the performance of this setup. Show your work. a) What is the effective access time (i.e. reading a word in memory) with no caching and a two-level page table? b) Consider the above scenario but with a TLB having a cache hit rate of 98%. If the TLB takes 20 ns to access, what is the effective access time of this setup when considering this TLB?arrow_forwardThe data law82 in bootstrap library contains LSAT and GPA for 82 law schools. 1. Write you own R code to estimate the correlation between LSAT and GPA scores, and compute the bootstrap estimate of the standard error and bias of the sample correlation. 2. Use the boot function in boot library to compute the bootstrap estimate of the standard error and bias of the sample correlation. Compare your results in 1 with the function output. using r languagearrow_forwardi would like to get help to resolve the following casearrow_forward
- Challenge: Assume that the assigned network addresses are correct. Can you deduce (guess) what the network subnet masks are? Explain while providing subnet mask bits for each subnet mask. [Hint: Look at the addresses in binary and consider the host ids]arrow_forwardWhat is the main difference between Static routing and Dynamic routing (OSPF)? in terms of either wildcard mask or subnet mask, or especially for increasing the number of networks, explaining the reason while providing a specific example like what command they use in CLIarrow_forwardAdd a new class Checking Account that inherits from the BankAccount class, and has a double instance variable overdraftLimit in addition to the variables inherited from the superclass. Create a constructor for the Checking Account class that takes in the account number, account holder name, initial balance, account type and overdraft limit as input, and uses the super keyword to call the constructor of the superclass, passing in the account number, account holder name and initial balance, account type. Re-write the withdraw() method in the CheckingAccount class so that it first checks if the withdrawal amount is less than the current balance plus the overdraft limit. If it is, the withdrawal is allowed and the balance is updated. If not, the method should return an error message "Insufficient funds". Create a new method displayOverdraft Limit() that returns the overdraft limit of the Checking Account. In the BankAccountTest class, create a new object of type Checking Account with…arrow_forward
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education





