Maintenance of a system

Slides:



Advertisements
Similar presentations
Digital inclusion – a CS perspective Alex Poulovassilis ESRC TLRP-TEL Inclusion and Impact conference, June 2010.
Advertisements

NetPay provides best and effective solution for company Managers to maintain their employee scheduling task (including staff in/out details, overtime,
EDEXCEL LEVEL 2 BTEC FIRST DIPLOMA FOR ICT PRACTITIONERS
ECDL Essentials Quiz 1. Which one of the following would most likely be entered to logon securely to a computer system or network?
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Social and Ethical Issues Rights and responsibilities of Software Developers.
Management Information Systems. (MIS)
7.2 System Development Life Cycle (SDLC)
Factors to be taken into account when designing ICT Security Policies
4 types of implementing information systems
11.1 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality,
Create User Documentation
SDLC: Development Phase
System Development Life Cycle
System Development REASONS for SDLC
Protecting ICT Systems
1 Building and Maintaining Information Systems. 2 Opening Case: Yahoo! Store Allows small businesses to create their own online store – No programming.
Computers & Employment By Andrew Attard and Stephen Calleja.
Term 2, 2011 Week 3. CONTENTS The physical design of a network Network diagrams People who develop and support networks Developing a network Supporting.
1 Shawlands Academy Higher Computing Software Development Unit.
Software – Acquisition & Testing. ICT5 How to acquire software There are several options: The software may be written by the end-user; A specialist department.
Advanced CIS NAME: ___________________. OBJECTIVE: Maintaining, Managing, and Troubleshooting Systems Maintenance includes following established procedures.
1 The Software Development Process  Systems analysis  Systems design  Implementation  Testing  Documentation  Evaluation  Maintenance.
A Level ICT Unit Implementing CBIS’s. Support Installing a new system is disruptive and the support program will need to be planned well in advance.
 Once the system has been installed it will be monitored to check whether it is working correctly. Sometimes problems with a system will not be found.
Welcome To Business Summary DiveIn Incorporated is a small company that specializes in the sales of swimming pools supplies to homeowners by mail order.
FLOOR CANDY.
 To help you understand and describe a range of methods for installing a new computer-based system; › Parallel › Phased › Direct › Pilot  Also, to help.
IT job research By Megan McGonigle Sources: - responsibilites-explainedhttp://targetcourses.co.uk/study-areas/computer-science-and-it/it-job-roles-and-
Management Plan Goran Smajlagic S English 2100.
Lesson 1 Operating Systems, Part 1. Objectives Describe and list different operating systems Understand file extensions Manage files and folders.
Developing Business/IT Solutions Chapter 12 McGraw-Hill/IrwinCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Learning Objectives Demonstrate why info systems are vulnerable to destruction, error, abuse, quality control problemsDemonstrate why info systems are.
LESSON 3. Properties of Well-Engineered Software The attributes or properties of a software product are characteristics displayed by the product once.
The Software Development Process
Mr C Johnston ICT Teacher
HNDIT23082 Lecture 06:Software Maintenance. Reasons for changes Errors in the existing system Changes in requirements Technological advances Legislation.
Systems Development The Kingsway School. Systems Development This is carried out when a company is having a problem. They usually employ an ICT Consultant.
Software Development Life Cycle (SDLC)
Objectives Understand Corrective, Perfective and Preventive maintenance Discuss the general concepts of software configuration management.
IS2210: Systems Analysis and Systems Design and Change Twitter:
1 Chapter 13 (Week 13) SYSTEMS MAINTENANCE AND EVALUATION Chapter 13: SYSTEMS MAINTENANCE AND EVALUATION Throughout its life, a system should operate effectively.
Maintenance. Learning Objectives: By the end of this topic you should be able to:
1 The Software Development Process ► Systems analysis ► Systems design ► Implementation ► Testing ► Documentation ► Evaluation ► Maintenance.
GCSE ICT 3 rd Edition The system life cycle 18 The system life cycle is a series of stages that are worked through during the development of a new information.
Irwin/McGraw-Hill Copyright © 2000 The McGraw-Hill Companies. All Rights reserved Whitten Bentley DittmanSYSTEMS ANALYSIS AND DESIGN METHODS5th Edition.
FACTORS AFFECTING THE EFFICIENCY OF DATA PROCESSING SYSTEMS.
 During the life of any system, there may be times when certain maintenance needs to take place.  There are different forms of maintenance and each.
CIS 210 Systems Analysis and Development Week 9 Part I Maintaining Information Systems,
A/S ICT IT Value and Importance of Information.
Starter To complement our notes and learning from last lesson (Topic 10 Introducing Large ICT Systems: Features of Large ICT Systems), fold your piece.
The information systems lifecycle Far more boring than you ever dreamed possible!
Software Design and Development Development Methodoligies Computing Science.
Applications Software. Is a software used to carry out a particular task e.g. a game or word processor.
Tutorial 4 IT323.  Q1. As a software project manager in a company that specializes in the development of software for the offshore oil industry, you.
ICT II Unit 6 Networking.
3.6 Fundamentals of cyber security
Planning & System installation
Design Process.
Legal and Ethical Responsibilities
Higher Information Systems
Understand Core Security Principles
AVG Antivirus is specially designed and developed for Windows and Mac computers to provide a durable protection from various threats. If you are covered.
LO2 - Be Able to Design IT Systems to Meet Business Needs
Lecture 06:Software Maintenance
Advantages of Networking
Software Development Approaches
The Software Development Process
3.3.5: Implementing computer-based information systems
Feasibility Report.
Presentation transcript:

Maintenance of a system

Lesson Objectives To develop an understanding of why we need maintenance To understand the different methods of maintenance in an ICT System

What maintenance issues arise? Identification of errors - bugs because the system has not been fully tested Security issues - being targeted by viruses or hackers Changes in the business environment - downsizing/expansion changing role of the company Changes in legislation - VAT rates Efficiency/dissatisfaction with software - not doing what is required Efficiency/dissatisfaction with hardware - system processing too slowly Upgrading the system - new technology (hardware or software) available

Methods of Maintenance Perfective Corrective Adaptive

Perfective Corrective Adaptive Improving the performance of the software Bugs in the software which were not discovered during testing may need correcting Software may need to be changed owing to the changing needs of the business or organisation

Perfective Maintenance Improving the performance of the software Examples: Configuring the network management software to improve performance such as improving access times to data, speed at which reports are produced, etc. Software may need to be modified to improve the user interface upon feedback from users who are finding it more difficult to use than it needs to be Developing on-line tutorials and more help screens to help new staff learn the software The software provider provides upgrades which will improve the performance of the softwar

Corrective Maintenance Bugs in the software which were not discovered during testing may need correcting Example: A piece of software may crash when being used with another piece of software A piece of software may crash when used with a particular item of hardware Software may present a security risk which needs correcting Problems with reports not being printed out properly

Adaptive Maintenance Software may need to be changed owing to the changing needs of the business or organisation Example: Software may need altering so that it is more flexible in supplying the managers with information which was not envisaged at the time of development Changes to values such as the percentage rate of VAT or changes to income tax rates will result in changes to the software The organisation expands so the software needs to be altered so it is able to cope with an increased number of users Adapting the software to work with newly developed operating systems software or new hardware A new virus threat/hacker threat means that the software will need to be adapted to protect against this

Past Paper Questions Describe two different methods of system maintenance, illustrating each method with an appropriate distinct example. [6] Once the new computer system is up and running, it has to be maintained. Describe two different system maintenance methods and illustrate each method with appropriate examples. [6] A systems analyst is called in to give advice after a new ICT system is implemented. Describe, using examples, four maintenance issues that could have arisen. [8]