User Focus IB Computer Science.

Slides:



Advertisements
Similar presentations
Requirements gathering
Advertisements

Soft. Eng. II, Spr. 2002Dr Driss Kettani, from I. Sommerville1 CSC-3325: Chapter 1 (cont ’d) Title : Client requirements (Review) Mandatory reading: I.
Documentation 1. User Documentation 2. Technical Documentation 3. Program Documentation.
CORE 1: PROJECT MANAGEMENT Overview TECHNIQUES FOR MANAGING A PROJECT Communication Skills Active Listening Mirroring Paraphrasing Summarizing Clarifying.
Term 2, 2011 Week 3. CONTENTS The physical design of a network Network diagrams People who develop and support networks Developing a network Supporting.
11 SECURITY TEMPLATES AND PLANNING Chapter 7. Chapter 7: SECURITY TEMPLATES AND PLANNING2 OVERVIEW  Understand the uses of security templates  Explain.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 4 1 Chapter 4: Basics of Preventive Maintenance and Troubleshooting IT.
Adaptive Processes © Adaptive Processes Simpler, Faster, Better Software Requirements.
CSE9020 Schedule, / 1 The Suggested Schedule Week Content/Deliverable 1. 4/3Unit Overview, Project Description, Meetings, Group Formation 2. 11/3Project.
1 BTEC HNC Systems Support Castle College 2007/8 Systems Analysis Lecture 13 Post-Implementation Training.
 To help you understand and describe a range of methods for installing a new computer-based system; › Parallel › Phased › Direct › Pilot  Also, to help.
By: DaneileMatheson T opics  Who is a Computer Technician?  Skills a Computer Technician Possesses  Type of Personality best suited for a Computer.
Table of Contents and Introductions ITSW 1410, Presentation Media Software Instructor: Glenda H. Easter.
1 Determining a client’s peripheral requirements  Determine current business practices  Determine peripheral requirements  Analyse and document existing.
Computer Organisation
Chapter 6 : User interface design
Provide instruction.
Computational Thinking, Problem-solving and Programming: General Principals IB Computer Science.
Overview Software Maintenance and Evolution Definitions
Planning & System installation
System Design Basics IB Computer Science.
6 Technology, Digital Media, and Curriculum Integration
Resource Management IB Computer Science.
Planning & System installation
Planning & System installation
Resource Management IB Computer Science.
Control Systems IB Computer Science.
Planning & System Installation
Planning & System installation
Training Trainers and Educators Unit 8 – How to Evaluate
Presentation on Software Requirements Submitted by
Client-Server & Peer-to-Peer Networks
Planning & System installation
Computer Organisation
Computational Thinking, Problem-solving and Programming: General Principals IB Computer Science.
System Backup IB Computer Science.
Computational Thinking, Problem-solving and Programming: General Principals IB Computer Science.
Acceptance and Delivery
Planning & System Installation
Software Quality Assurance Software Quality Factor
Chapter 2 Introduction to Computer User Support
Planning & System Installation
Objects as a programming concept
Planning & System Installation
System Design Basics IB Computer Science.
Computer Organisation
Planning & System installation
Planning & System Installation
FEASIBILITY STUDY Feasibility study is a means to check whether the proposed system is correct or not. The results of this study arte used to make decision.
Planning & System Installation
System Design Basics IB Computer Science.
Malwarebytes Installation Issues Number Facing error with Malwarebytes software is not something unusual as most of the users use to face.
Training Trainers and Educators Unit 8 – How to Evaluate
Chapter 12 Implementing Business/IT Solutions.
An Introduction to Software Engineering
Modern Systems Analysis and Design Third Edition
LO2 - Be Able to Design IT Systems to Meet Business Needs
Providing Advice To Clients
1.2 System Design Basics.
Modern Systems Analysis and Design Third Edition
Chapter 11 Selecting the Best Alternative Design Strategy
Chapter 7 Selecting the Best Alternative Design Strategy
Computer Science The 6 Programming Steps.
DEPLOYING SECURITY CONFIGURATION
3.3.5: Implementing computer-based information systems
Chapter 5 Architectural Design.
System Fundamentals IB - Group 4 - Computer Science
Modern Systems Analysis and Design Third Edition
Chapter 11 Selecting the Best Alternative Design Strategy
Modern Systems Analysis and Design Third Edition
Presentation transcript:

User Focus IB Computer Science

HL Topics 1-7, D1-4 1: System design 2: Computer Organisation 3: Networks 4: Computational thinking 5: Abstract data structures 6: Resource management 7: Control D: OOP

5: Abstract data structures HL & SL 1.1 Overview 1: System design 2: Computer Organisation Planning and system installation 1.1.1 Identify the context for which a new system is planned. 1.1.2 Describe the need for change management 1.1.3 Outline compatibility issues resulting from situations including legacy systems or business mergers. 1.1.4 Compare the implementation of systems using a client’s hardware with hosting systems remotely 1.1.5 Evaluate alternative installation processes 1.1.6 Discuss problems that may arise as a part of data migration 1.1.7 Suggest various types of testing User focus 1.1.8 Describe the importance of user documentation 1.1.9 Evaluate different methods of providing user documentation 1.1.10 Evaluate different methods of delivering user training System backup 1.1.11 Identify a range of causes of data loss 1.1.12 Outline the consequences of data loss in a specified situation 1.1.13 Describe a range of methods that can be used to prevent data loss Software deployment 1.1.14 Describe strategies for managing releases and updates 3: Networks 4: Computational thinking 5: Abstract data structures 6: Resource management 7: Control D: OOP

Topic 1.1.10 Evaluate different methods of delivering user training

Methods of delivering user training Self-instruction Formal classes Remote/Online training Training staff in using a new system is very important as productivity greatly depend on how familiar users are with a system. Therefore good user training is an essential part of introducing a new system.

Self instruction Self-instruction: users reading a manual or watchig a tutorial, or randomly doing something in the system to figure out how it works. This type of training is only suitable for experienced computer users as they are more confident to start using an unfamiliar system alone to figure out how it works.

Formal classes Formal classes: users sitting in a classroom listening to an instructor who shows and explains how to use the system. This type of training is useful to train large amounts of staff as it is effective and relatively cheap, but if the size of the classes is too big, there is little time to deal with individual problems and questions.

Remote/online training Remote/online/personal training: an instructor training a single user either by being in the same room or by some kind of remote connection (Skype, chat). This is the most effective way of training as training can be suited to user's needs and abilities, but is very expensive compared to other types of training.