Stages of information system life cycle
Explain the four Stages of information system life cycle in brief ?
Expert
To start with, a life cycle can be easily described as a methodology to illustrate growing system procedure. According to Canning (1956), this particular information system life cycle includes a succession of stages, starting with required examination and ending with realization. The four stages of information system life cycle are namely; launch, spreading, maturity and lastly, decline. The sections below bring to light a detailed description of the distinct four stages.
• First stage: Launch includes identification of techniques as well as common requirements. Additionally, innovative elucidations and techniques are also put forward in this stage. According to O’Brien (2004), the entire argumentation is grounded on technological, operational, managerial and cost-effective suppositions. This particular part also includes building or improvement that relates to the long-established information system development procedure. It recognizes stratagems and encourages potential supporters of the techniques. It involves efficient identification of the requirements and lays emphasis on the execution of the technique instead of marginal items. Further, it also focuses on expenditure and all its extents, such as reserves, upholding expenses or guidance, excellence and implementation time.• Second stage: Spreading implies initiating desired spreading of the technique, due to a satisfactory execution. It involves superior facilities and continuation and in this stage expenses continue to be high. • Third stage: Maturity to some extent envelopes maintenance. In maturity stage, it is quite essential to maintain the applications, assist the people using it, and examine the system. Moreover, the existence of regulations in order to regulate this procedure normally plays a part in improving the functioning of the technique and individuals who make use of it. • Fourth stage: In decline the structure is altered in a legacy method. It involves figuring out applications, know-how, software as well as hardware that tag along well with the techniques applied by the company. Moving ahead, this particular section takes into account the organization whose staff members have been making use of punch cards for the purpose of time entry ever since the organization was initiated. Moreover, this has resulted in several concerns like lost cards, inexact hours, and recruits punching in other recruits. In order to handle such situation the organization is thinking about some computerized time entry system. In the continuing paragraph the situation has been linked with the distinct four stages of information system life cycle.
Firstly, the launch stage wherein the needs of the organization are identified i.e. an efficient computerized system that can help to deal with all the issues like lost cards, inexact hours etc. The company can choose techniques like fingerprint scanning and iris scanning taking into account all the aspects such as funds, upholding expenses or training, superiority and implementation time. Secondly, the spreading stage wherein advantageous spreading of the technique chosen by the organization begins. Thirdly, maturity stage includes proper and efficient maintenance of the technique, assisting the employees, and assessment of the technique by the organization. Lastly, the decline stage in which system is altered into a heritage arrangement and the organization will edify and instruct the employees to the modification. The organization will also recognize applications, software etc. that go quite well with the techniques employed.
Normal 0 false false
Explain Internet Corporation for Assigned Names and Numbers and their sources.
Brief Overview of SAFM: The Shuttle Abort Flight Management system (SAFM) was developed by NASA Johnson Space Center and General Dynamics Decision Systems as part of the Shuttle Cockpit Avionics Upgrade (CAU). SAFM is a single-threaded application wri
Which are the main interspecific ecological interactions?
MUTEX: The mutual exclusion object, or MUTEX, is an object formed for use in computer programs. The necessary function of MUTEX is to make it feasible for a multiple program thread to make utilization of a single resource. Usually, the functionality o
18,76,764
1925057 Asked
3,689
Active Tutors
1436614
Questions Answered
Start Excelling in your courses, Ask an Expert and get answers for your homework and assignments!!