Assignment 1-Software Development Life Cycle 1631
Assignment 1-Software Development Life Cycle 1631
Unit number and title Unit 09: Software Development Life Cycle
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that making a
false declaration is a form of malpractice.
Grading grid
P1 P2 P3 P4 M1 M2 D1 D2
1
❒ Summative Feedback: ❒ Resubmission Feedback:
2
Table of Contents
I/ SDLC MODEL ( P1 – P2 – M1 – D1 )........................................................................................................................................................ 7
1. What is the Systems Development Life Cycle (SDLC).......................................................................................................................... 7
2. SDLC models (P1)................................................................................................................................................................................ 8
2.1 Sequential life cycle model............................................................................................................................................................... 8
2.2 Iterative Model................................................................................................................................................................................ 11
3 The suitable SDLC modal for this project and explaint (M1)................................................................................................................ 15
3.1 The significance of selecting a model for a development project................................................................................................... 15
3.2 The suitable SDLC modal for this project....................................................................................................................................... 16
4. Discuss the merits of applying the waterfall model to a large software development project. (D1).....................................................17
5. Identify some risks and discuss an approach to manage them (P2)................................................................................................... 19
5.1 What is Risk Management process................................................................................................................................................ 19
5.2 Five Steps of the Risk Management Process................................................................................................................................ 21
5.3 Risk Management Matrix................................................................................................................................................................ 22
5.4 Risk management table of Tune Source project............................................................................................................................ 23
II/ FEASIBILITY STUDY ( P3 – P4 – M2 – D2 )......................................................................................................................................... 24
1. What is a feasibility study?.................................................................................................................................................................. 24
2. The purpose of conducting a feasibility study for the project............................................................................................................... 25
3. Discuss how the three feasibility criteria (technical, economic, organizational) are applied to the project. Discuss whether the project
is feasible................................................................................................................................................................................................. 26
4
3.1 Technical feasibility........................................................................................................................................................................ 26
3.2 Organizational Feasibility............................................................................................................................................................... 28
5
Table of Figures
Figure 1: Definition of Systems Development Life Cycle (SDLC)................................................................................................................. 7
Figure 2: SDLC models................................................................................................................................................................................ 8
Figure 3: Sequential life cycle model............................................................................................................................................................ 9
Figure 4: Iterative Model............................................................................................................................................................................. 11
Figure 5: Spiral model................................................................................................................................................................................. 16
Figure 6: Waterfall model............................................................................................................................................................................ 17
Figure 7: Risk Management process.......................................................................................................................................................... 20
Figure 8: Feasibility study........................................................................................................................................................................... 24
Figure 9: Technical feasibility..................................................................................................................................................................... 26
Figure 10: Organizational Feasibility.......................................................................................................................................................... 28
Figure 11: Economic feasibility................................................................................................................................................................... 29
Figure 12: Structure of the Feasibility Study............................................................................................................................................... 34
6
I/ SDLC MODEL ( P1 – P2 – M1 – D1 )
1. What is the Systems Development Life Cycle (SDLC)
Every hardware or software system must go through a development process, which may be thought of as a multi-step iterative process.
The SDLC provides a formal structure and framework for defining the phases and steps required in system development.
7
Synchronous Data Link Control and software development life cycle are frequently abbreviated as SDLC. The software development
life cycle is quite similar to the systems development life cycle, except it is only focused on the software development life cycle.
8
Figure 3: Sequential life cycle model
a. Waterfall model
Waterfall model: Developers define the requirements, assess them, decide on a solution, and design a software architecture, interface
representation, and algorithmic details. They then write the code, test it, deploy the program, and maintain it. While the waterfall
technique is simple to grasp and provides requirement constancy, it may give the impression that little client input is provided. The
fundamental issue with this paradigm is that the need to fix faults should be understood from the start. Otherwise, the entire process
may proceed in the incorrect direction, significantly impacting manufacturing costs.
Advantages
Disadvantages
9
Process that is extremely tight and stringent
Cannot go on to the next phase until the prior one is done, which normally extends the schedule.
Methodology is not highly adaptable or cost-effective.
b. V Shaped model
The waterfall model is modified in the V shape. It stresses product verification and validation. All deliverables may be tested, and
progress is measured using milestones. Testing occurs along with the development process.
Advantages:
Disadvantages:
10
When the project is modest to medium in size and has well-defined needs.
In the event of a complex project, we employ the v-model.
a. Prototype model
Prototype model: During the requirement phase, a prototype is created and reviewed by end users. Developers modify the prototype
based on customer input to meet the needs of the users. While this approach efficiently finalizes requirements, its usage in a production
context may result in quality difficulties, causing the rectification process to continue indefinitely.
Advantages:
11
The design of this model is adaptable.
Errors are easily detected.
We may simply locate missing functionality.
There is room for improvement, which implies that future requirements may be readily met.
It can be utilised by the developer in the future for more complex applications.
It provides improved client pleasure and comfort.
It is perfect for an online system.
It improves both developers' and users' understanding of the system.
Integration needs are clearly defined, and deployment channels are determined early on.
It has the ability to actively include users in the development phase.
Disadvantages:
When the customer is unsure about the requirements, we usually proceed with a prototype model.
If the project is complex, the prototype model clarifies the requirements.
Prototyping ensures that the consumer is continually working with the system and providing feedback on it.
12
b. Spiral model
Spiral model: Combines waterfall and prototype models. It extends the waterfall approach with 4th generation programming languages,
fast application development prototyping, and risk analysis. A preliminary system design is generated once the system requirements
have been designed. A first prototype is created and tested. A second prototype is built based on the examination of test findings.
Following prototypes are built to assure client satisfaction. The system is built on the final prototype. The completed system has been
examined and tested. Though this strategy significantly decreases risk, it may not fulfill the budget and is implemented differently for
each application.
Advantages:
Disadvantages:
13
The project's conclusion may not be known for some time.
It is not appropriate for low-risk projects.
Objective, verifiable milestones may be difficult to establish. A large number of intermediate phases necessitate an abundance
of documentation.
c. Scrum model
Scrum is a project management framework. It adheres to the agile approach and specifies roles, procedures, tools, and processes to
ensure that an efficient and successful project is delivered on schedule via iterative development cycles. According to one survey,
about 70% of software teams utilize scrum or a scrum hybrid.
This technique is mostly used where there is a significant demand for rapid growth and substantial stakeholder participation. The Scrum
technique continuously analyzes software development while the project is being built.
The Scrum Software Development Methodology places a strong emphasis on accountability, cooperation, and iterative progress toward
a well-defined business goal.
Advantages:
14
Disadvantages:
A project with no defined objective and vision is difficult to design, structure, and coordinate.
Frequent modifications in the project cause a delay in the project's delivery schedule.
More resources are used, and stakeholders are involved in every minute detail modification and debate.
When to use scrum model: Anyone who wants to create an end product, such as a website, a software program, or even a building
project, may utilize Scrum. Let's go deeper into the Scrum process, including the many Scrum roles, to discover if this project
management style is a good fit for you.
3 The suitable SDLC modal for this project and explaint (M1)
3.1 The significance of selecting a model for a development project
The lifespan model chosen will affect whether or not the project is successful. Because the model influences how the development
process is carried out, the most appropriate model must be chosen based on the project's size and the complexity of finishing the final
product and achieving the objectives. Different models will provide different methods for completing the product; picking the appropriate
model will guarantee that the project is as efficient as feasible in terms of completion time and product quality.
15
3.2 The suitable SDLC modal for this project
The Spiral model draws its lead from the Iterative model and its repetition; the project travels through four phases (planning, risk analysis,
engineering, and assessment) again and over in a "spiral" until finished, allowing for several rounds of modification.
Spiral models are commonly utilized for huge projects. It allows development teams to create a highly personalised product while also
incorporating consumer feedback early in the process. Risk management is another advantage of this SDLC strategy. Each iteration
begins by anticipating possible hazards and determining how to effectively prevent or manage them.
Example:
16
One of the most intriguing aspects of the SDLC Spiral model is that it was utilized by Microsoft to create early versions of Windows.
The approach was also used to create the Gantt chart software. As a result, it comes as no surprise that Spiral Model is used for large,
high- risk initiatives that are also aimed at a large audience.
Another business that use the Spiral model is game development. As previously stated, the approach enables meticulous and rapid
prototyping. Because the gaming business relies significantly on early game versions, Spiral becomes a viable choice. With the
strategy, game development businesses may quickly receive feedback from their clients and create a playable that can expand into
equally fun games.
17
The waterfall model is connected with a significant amount of money and effort. In such case, it needs the approval of multiple
documents, changes are costly to implement, iterations require a significant amount of time and effort, and concerns are often delayed
until later stages. Few Tune Source studies have been conducted explicitly on the waterfall model, and specific reasons for the waterfall
approach's efficacy have been identified.
During the product development process, the Waterfall approach involves very little consumer engagement. Only when the product has
been completed can it be demonstrated to end users.
Once the product is produced, if a fault happens, the cost of resolving such issues is quite significant since we must update everything
from the documentation to the logic.
Conclusion: This case study analyzes and explores business difficulties connected to waterfall methods used in large-scale software
development. As a result, the most essential requirements and verification challenges in waterfall development are exposed. As a
result, the waterfall model is unsuitable for large-scale development. As a result, Tune Source is forced to use a different model. When
case studies are compared to commercial results, it is evident that the case study has all of the challenges highlighted in the literature.
Case studies, on the other hand, provide corrective explanations for issues while also identifying four new ones, such as who
implements
18
which version of the requirements, high maintenance effort, specialized competence focus and lack of confidence in people, and
localization issues due to communication barriers.
A good risk management program assists a company in considering the complete spectrum of risks it confronts. Risk management also
investigates the link between risks and the cascading effect they may have on an organization's strategic goals.
19
Figure 7: Risk Management process
Because of its emphasis on predicting and understanding risk throughout a company, this holistic approach to risk management is also
referred to as enterprise risk management. Enterprise risk management (ERM) highlights the necessity of managing positive risk in
addition to focusing on internal and external threats. Positive risks are opportunities that, if not accepted, can either improve corporate
value or harm a firm. Indeed, the goal of any risk management program is not to remove all risk, but rather to protect and create value
to the organization by making prudent risk decisions.
20
5.2 Five Steps of the Risk Management Process
Identify the Risk: The first stage in risk management is to identify the hazards that the company faces in its operational
environment. It is critical to identify as many of these risk factors as feasible. In a manual setting, these risks are manually
recorded. If the business is using a risk management solution, all of this information is instantly entered into the system.The
benefit of this strategy is that these risks are now apparent to any stakeholder in the organization who has access to the
system. Instead of being locked away in a report that must be requested via email, anybody who wants to know which risks
have been detected may access the information in the risk management system.
Analyze the Risk: Once a danger has been identified, it must be evaluated. The scope of the danger must be established. It is
also critical to understand the relationship between the risk and other components inside the firm. To assess the risk's degree
and significance, consider how many business operations are affected. There are dangers that, if realized, may bring the entire
firm to a halt, while others will merely cause small hassles in the analysis. This analysis must be performed manually in a manual
risk management system. One of the most critical basic steps in implementing a risk management solution is mapping risks to
various documents, rules, procedures, and business processes. This implies that the system will already have a risk
management framework in place that will analyze hazards and inform you of the long-term consequences of each risk.
Evaluate the Risk or Risk Assessment: The risks must be rated and prioritized. Depending on the magnitude of the risk, most
risk management solutions categorize hazards. Risks that may cause minor discomfort are rated low, whereas risks that may
result in catastrophic loss are rated highest. It is critical to rate risks because it helps the company to acquire a comprehensive
perspective of the organization's risk exposure. The company may be subject to a number of low-level dangers, but they may not
necessitate the intervention of senior management. On the other hand, even one of the highest-rated hazards necessitates rapid
action. Risk assessments are classified into two types: qualitative risk assessments and quantitative risk assessments.
Treat the Risk: Every danger must be reduced or eliminated to the greatest extent practicable. This is accomplished by
contacting specialists in the subject to which the risk pertains. In a manual system, this means calling every stakeholder and
then scheduling meetings so that everyone can talk about and debate the concerns. The difficulty is that the conversation is
fragmented among several email threads, papers and spreadsheets, and phone conversations. All key stakeholders in a risk
management solution may be notified from within the system. Within the system, a conversation about the danger and
alternative solutions might take place. Upper management can also keep an eye on the solutions proposed and the progress
achieved within the system. Instead of contacting each other for updates, everyone may obtain them straight from the risk
management solution.
21
Monitor and Review the Risk: Not all dangers can be removed; certain risks are always there. Market risks and environmental
hazards are only two examples of risks that must always be evaluated. Monitoring takes place by attentive staff in manual
processes. These practitioners must maintain a watchful eye on all risk variables. The risk management system monitors the
complete risk framework of the firm in a digital environment. If any aspect or danger changes, it is immediately accessible to
everyone. Computers are also considerably better than humans at continually monitoring threats. Monitoring hazards also
assists your company to assure continuity. We can show you how to establish a risk management strategy to monitor and
review the risk.
Medium Frequency
22
5.4 Risk management table of Tune Source project
No Risk Impact Frequency Affected factors Solution
1 Conflict Low 90% Affects the progress of the project Calmly resolve all conflicts
and worsens the relationship
2 Data was changed High 10% Directly affecting the company, Enhanced security
causing serious consequences
3 Individuals are not qualified High 20% Affect the quality of work Train employees and have
appropriate recruitment
policies.
4 Timetable and budget were not Medium 20% Impact on project progress and Map out the things that
followed budget need to be done and
manage them accordingly
5 Changes are not persisted Medium 20% Affects project flexibility Offer flexible solutions to
continuously innovate the
project
6 Progress is delayed Medium 15% Impact on the progress of the Put in place appropriate
project sanctions
7 Lost data High 5% Affects the entire company Improve security, hire
experts
23
II/ FEASIBILITY STUDY ( P3 – P4 – M2 – D2 )
1. What is a feasibility study?
- Does our team have the necessary tools or resources to finish this project?
Feasibility studies are essential for initiatives that need large expenditures from your company. Projects that have a significant influence
24
on your market presence may also necessitate a feasibility study.
The five frames of analysis are: the definition frame, the contextual risk frame, the potentiality frame, the parametric frame, and the
frame of dominant and contingency strategies.
Traditional definitions of the four Ps are Plan, Processes, People, and Power. The hazards are classified as external to the project (for
example, weather conditions) and are classified into eight categories: Financial and organizational (e.g., government framework for a
private project); environmental and technological processes; marketing and sociocultural people; and legal and political power. Points
of Vulnerability (POVs) vary from hazards in that they are internal to the project and may be controlled or removed.
A feasibility study investigates the viability of a proposition or concept. The primary purpose of this is to assess whether or not the
project will be continued. Feasibility studies are useful in business for a variety of reasons.
The feasibility report will look at how a certain idea may operate in the long run or withstand potential financial hazards. It is also useful
in identifying prospective cash flow. Another essential function is that it assists planners in focusing on the project and narrowing the
choices. As a result, a feasibility study might identify reasons why a project or idea should not be pursued. In terms of operational
feasibility, the study examines if the plan has the required resources to be implemented. The feasibility assessment will also assist us in
determining whether or not the public will support the future product or service. Furthermore, it gave insight on trends because a
feasibility study examines the current market and investigates the expected growth of your chosen company area.
Feasibility studies are common across all business sectors. Whether it's a hotel, a restaurant, real estate, medical, an office, or an
industrial building. Starting a feasibility study early will save you time and money on the project.
25
3. Discuss how the three feasibility criteria (technical, economic, organizational) are
applied to the project. Discuss whether the project is feasible.
3.1 Technical feasibility
26
The analyst must determine if present technological resources can be enhanced or expanded to meet the request under discussion.
This is where system analysts' knowledge comes in handy, because they can answer the question of technological feasibility using
their own experience and contacts with suppliers.
The following are the main questions that aid in testing a system's operational feasibility:
27
3.2 Organizational Feasibility
The term "resource sufficiency" refers to the nonfinancial resources that a business will require to succeed and is used to determine if
an entrepreneur has a sufficient number of such resources. The organization should critically rank its capabilities in six to twelve
categories of critical nonfinancial resources, such as office space availability, labor pool quality, possibility of obtaining intellectual
property
protections (if applicable), willingness of high-quality employees to join the company, and likelihood of forming favorable strategic
partnerships. If the investigation indicates a shortage of crucial resources, the enterprise may not be feasible as currently envisioned.
28
3.3 Economic feasibility
29
Is the system economical?
Do the advantages exceed the costs?
The expense of doing a complete system analysis
The expense of company employee time
Hardware costs are estimated.
Estimated cost of software/software development
Is the project feasible given the available resources?
What are the savings that will be realized as a result of the system?
Employees' study time costs money.
Price of packaged software/software development
Alternative finance solutions (rent/lease/purchase) must be chosen.
A feasibility study includes a thorough examination of what is required to complete the planned project. A description of the new
product or endeavor, a market study, the technology and labor required, as well as the sources of finance and capital, may all be
included in the report. The report will also include financial predictions, the chance of success, and a yes-or-no judgment.
30
4. Describe how technical solutions can be compared
Relative Alternative 1: Plugin Score (1- Weighte Alternative 2: Plugin using Score Weighted
Evaluation Criteria
Importance using c# 5)* d Score Javascript (1-5)* Score
Technical issues
Support front-end and back- Current system uses
10 5 50 JS supports fullstack 5 50
end Windows server
Able to run on Windows Current system uses
10 5 50 Current system fully supports JS 5 50
Server Windows server
Microsoft supposts
Support Multimedia libraries 10 what we want 5 50 Easy to find open source library 4 40
Economic issues 0 0
Visual studio +
License costs less than
10 netFramework cost 4 40 Free for commercial use 5 50
$5000
$4500
Server costs less than
10 Reuse current server 5 50 Reuse server 5 50
$10000/year
Organizational issues 0 0
Able to reccruit a senior
10 Very high salary 3 30 Not easy to find 3 30
developer
Able to recruit a experienced
10 Easy to find 5 50 Easy to find 5 50
project man
Able to hire a tester with
charge less than 30 Easy to find 5 150 Easy to find 5 150
$10000/month
Total 100 470 470
31
For each solution and each criteria we compute weighted score by formula: weighted score = relative importance * score
For each solution we compute total score by SUM all weighted score
We compare candidate solution by its total score. Greater is better
4.1 Performance
To compare different technical solutions, we must analyze the performance of the solution utilized to build the project. Here are some of
the performance characteristics that should be compared.
Interaction Speed: The rate at which a user interacts with a website when they use any of its features or carry out any of its activities is
referred to as interaction speed. The more quickly the webpage loads, the better. For example, if a user wishes to purchase and listen
to music, the payment system must complete the transaction fast so that the client has a positive experience while purchasing a song.
As a consequence, we must evaluate technical solutions and choose the one that gives the fastest website interaction speed.
Loading Time: This is equally important; the website's loading time should be as low as possible for visitors from all over the world,
whether they are local or national. If there are too many plugins or features that aren't required, the loading time will increase, which is
terrible for the user experience.
32
4.3 Automation
This is an essential feature for a professional website, such as a payment system that allows the user to instantly conduct a
transaction to purchase music or a public chat box where the user may seek advice from others without the assistance of the
administrator or sponsors.
We must compare which technological solutions provide better tools or technologies and which solutions facilitate the deployment of
these automated features.
The removal of human mistakes is one of the components that promotes efficiency during project execution or development. As a
result, the technical approach with more error optimization is preferred.
33
5. The components of a feasibility report (M2)
5.1 Structure of the Feasibility Study
34
Economic feasibility enables the corporation to do cost-benefit studies, which assists decision-makers in providing a list of prospective
economic benefits to the organization. They need to know the complete cost, including any unexpected charges, so that they may
anticipate any potential monetary issues during the project.
The organizational viability of a proposed plan determines how well it fits into the present business environment and, if created,
whether current purchasers would utilize it. Some of the factors that influence the conclusion of this study include whether
management supports the new system, how purchasers feel about the present system in place, and if the proposed system would
benefit the firm.
The 'economic effect' of a significant event is the total amount of increased spending produced within a certain area as a direct result of
the event's staging. Expenditure by visitors in the local region (particularly on lodging) is the most essential aspect in producing
economic benefit for most events; however, spending by event organizers is also an important issue. Economic impact studies normally
strive to determine the net change in a host economy; that is, cash inflows and outflows are assessed to determine the net
consequence.
36
6.5 Conclusion
A feasibility study is an examination of potential alternative solutions to a problem and a recommendation on the best option. It can
assess if a procedure should be carried out more efficiently by a new system than by the present one.
The feasibility study should focus on three key areas: market difficulties, technological and organizational needs, and a financial
assessment. The findings of this research are utilized to determine whether or not to continue with the project. If it does result in a
project being authorized, it will be used to determine the likelihood of the project's success before the actual work of the planned project
begins.
References
geeksforgeeks.org. [Online]
Available at: https://www.geeksforgeeks.org/advantages-and-disadvantages-of-prototype-model/
[Accessed 02 06 2022].
indeed.com. [Online]
Available at: https://www.indeed.com/career-advice/career-development/feasibility-studies
[Accessed 06 10 2022].
osarome.blogspot.com. [Online]
Available at: https://osarome.blogspot.com/2011/10/1-technical-feasibility-2-operational.html
[Accessed 09 06 2022].
techopedia.com. [Online]
Available at: https://www.techopedia.com/definition/25976/software-development-life-cycle-model-sdlc
[Accessed 02 06 2022].
tryqa.com. [Online]
Available at: http://tryqa.com/what-is-v-model-advantages-disadvantages-and-when-to-use-it/
37
[Accessed 02 06 2022].
38
Thompson, K., n.d. cprime.com. [Online]
Available at: https://www.cprime.com/resources/blog/when-to-use-scrum/
[Accessed 02 06 2022].
39