Requirements of information system life cycle

Explain the requirements of information system life cycle?

E

Expert

Verified

To start with, a life cycle can be easily described as a methodology to illustrate growing system procedure. According to Canning (1956), this particular information system life cycle includes a succession of stages, starting with required examination and ending with realization. The four stages of information system life cycle are namely; launch, spreading, maturity and lastly, decline. The sections below bring to light a detailed description of the distinct four stages.

First stage:

Launch includes identification of techniques as well as common requirements. Additionally, innovative elucidations and techniques are also put forward in this stage. According to O’Brien (2004), the entire argumentation is grounded on technological, operational, managerial and cost-effective suppositions. This particular part also includes building or improvement that relates to the long-established information system development procedure. It recognizes stratagems and encourages potential supporters of the techniques. It involves efficient identification of the requirements and lays emphasis on the execution of the technique instead of marginal items. Further, it also focuses on expenditure and all its extents, such as reserves, upholding expenses or guidance, excellence and implementation time.

Second stage:

Spreading implies initiating desired spreading of the technique, due to a satisfactory execution. It involves superior facilities and continuation and in this stage expenses continue to be high.

Third stage:

Maturity to some extent envelopes maintenance. In maturity stage, it is quite essential to maintain the applications, assist the people using it, and examine the system. Moreover, the existence of regulations in order to regulate this procedure normally plays a part in improving the functioning of the technique and individuals who make use of it.

Fourth stage:

In decline the structure is altered in a legacy method. It involves figuring out applications, know-how, software as well as hardware that tag along well with the techniques applied by the company.

Moving ahead, this particular section takes into account the organization whose staff members have been making use of punch cards for the purpose of time entry ever since the organization was initiated. Moreover, this has resulted in several concerns like lost cards, inexact hours, and recruits punching in other recruits. In order to handle such situation the organization is thinking about some computerized time entry system. In the continuing paragraph the situation has been linked with the distinct four stages of information system life cycle.

Firstly, the launch stage wherein the needs of the organization are identified i.e. an efficient computerized system that can help to deal with all the issues like lost cards, inexact hours etc. The company can choose techniques like fingerprint scanning and iris scanning taking into account all the aspects such as funds, upholding expenses or training, superiority and implementation time. Secondly, the spreading stage wherein advantageous spreading of the technique chosen by the organization begins. Thirdly, maturity stage includes proper and efficient maintenance of the technique, assisting the employees, and assessment of the technique by the organization. Lastly, the decline stage in which system is altered into a heritage arrangement and the organization will edify and instruct the employees to the modification. The organization will also recognize applications, software etc. that go quite well with the techniques employed.

   Related Questions in Science

  • Q : Locks in Joomla Normal 0 false false

    Normal 0 false false

  • Q : Advantages of asynchronous architectures

    Advantages of asynchronous architectures: Asynchronous architectures decouple senders & receivers. It brings about performance advantages for both the sender & the receiver. The sender is capable to even out his communication traffic over the

  • Q : Collapse of communism in Poland

    Describe the collapse of communism in Poland.

  • Q : What is Heuristic Search Heuristic

    Heuristic Search: Heuristic search exploits the information known about the system under analysis in order to accelerate the search process. The basic idea of heuristic search is that rather than trying all the possible search paths, the model checker

  • Q : Aerospace engineer as a carrer

    Elucidate what made you prefer aerospace engineer line as your profession?

  • Q : Describe the battle of Midway Describe

    Describe the battle of Midway: Yamamoto turned immediately to the central Pacific where Japanese supply lines were more secure. His object was the American naval and air base on the island of Midway, about 1000 miles northwest of Hawaii. Between June

  • Q : Author of LINUX operation system Normal

    Normal 0 false false

  • Q : Difference between profit center and

    Difference between profit center accounting and Profitability analysis: Profit center accounting is principally done for internal controlling aims. It lets you find out the profit and loss

  • Q : Problems associated with genetic

    Explain the problems we may face while utilizing this genetic engineering tools.

  • Q : Promela primitives implementing C code

    Promela primitives implementing C code: Several Promela primitives can be used to connect a verification model to implementation-level C code: c_decl introduces the types and names of ext

©TutorsGlobe All rights reserved 2022-2023.