1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuliya22 [10]
3 years ago
14

Describe the Software Development Life Cycle. Describe for each phase of the SDLC how it can be used to create software for an E

mployee Payroll System that allows employees to log the number of hours completed in a work period and then generate their pay. Use Microsoft Word to complete this part of the assessment. Save your file as LASTNAME FIRSTNAME M08FINAL1 were LASTNAME is your lastname and FIRSTNAME is your first name. Upload your answer to this question; do not submit this assessment until you have completed all questions. This question is worth 25 points.

Computers and Technology
1 answer:
strojnjashka [21]3 years ago
7 0

Answer:

Check the explanation

Explanation:

SDLC

SDLC stands for Software Development Life Cycle

It provides steps for developing a software product

It also checks for the quality and correctness of a software

The main aim of SDLC is to develop a software, which meets a customer requirements

SDLC involves various phases to develop a high-quality product for its end user

Phases of SDLC

           There are seven phases in a software development life cycle as follows,

Requirement Analysis   Feasibility Study   Design    Coding    Testing Deployment      Maintenance

kindly check the attached image below

Requirement analysis

This is the first stage in a SDLC.

In this phase, a detailed and precise requirements are collected from various teams by senior team members

It gives a clear idea of the entire project scope, opportunities and upcoming issues in a project

This phase also involves, planning assurance requirements and analyze risk involved in the project

Here, the timeline to finish the project is finalized

Feasibility Study

In this stage, the SRS document, that is “Software Requirement Specification” document is defined, which includes everything to be designed and developed during the life cycle of a project

Design

In this phase as the name indicates, software and system design documents are prepared, based on the requirement specification document

This enable us to define the whole system architecture

Two types of design documents are prepared in this phase as follows,

High-Level Design

Low-Level Design

Coding

In this phase, the coding of project is done in a selected programming language

Tasks are divided into many units and given to various developers

It is the longest phase in the SDLC

Testing

In this stage, the developed coding is tested by the testing team

The testing team, checks the coding in the user point of view

Installation/Deployment

In this stage, a product is released by the company to the client

Maintenance

Once the product is delivered to the client, the maintenance phase work will start by fixing errors, modifying and enhancing the product.

Employee Payroll System

Requirement analysis

Gather information from various team for requirement

Analyze the number of employees to handle the project

Timeline to finish the project, eg.1 month

Feasibility Study

The system requirements such as how many systems are required

Decide which software to be installed to handle the project.

For example, if we are going to develop the software using C language, then software for that has to be installed

The SRS document has to be prepared

Design

In this the HLD and LLD is prepared, the overall software architecture is prepared

The modules involved in coding are decided

Here the modules can be employee, payroll manager, Employee Log time, account details

The input and output are designed, such as employee name is the input and output is the salary for him, based on working hours

Coding

Here the coding is divided into various sections and given to 2 or more employees

One may code employee detail, one will code working hours of employees and one may code the banking details of employee

Testing

The coding is tested for syntax, declaration, data types and various kinds of error

The testing team will test the coding with various possible values

They may even check with wrong values and analyze the output for that

Installation

Now the software is installed in the client system and the client is calculating the payroll for an employee based on working hours in a month

Maintenance

If any error occurs, the team will clear the issue.

When a new employee joins, then the employee data will added to the database and the database is updated

Also if the client asks for any new features, it will done in this phase.

You might be interested in
The ________ Web, originally envisioned by Tim Berners-Lee, one of the founders of the Internet, is a set of design principles t
shusha [124]

Answer:

The answer is "Semantic".

Explanation:

It can be designed as an enhanced country-wide mobile version and represents a useful way to view the information as a globally connected database.

  • It is the network of information, that can be linked and processed effectively by machines instead of by human workers.
  • It is one of the creation of the Web, which is originally imagined a series of concepts, that allowed machines to better index websites, issues, and subjects.
4 0
3 years ago
11. John wants to share resources and move a large volume of data quickly over the Internet. John should use which of the follow
Anvisha [2.4K]
The correct options are as follows:
11. B
UUCP is a suit of computer programs and protocol, which enables remote execution of commands and transfer of files between computers. One of the command in the suite provides a user interface for requesting file copy operation.
12. C.
HTML document refers to a file that is containing a Hypertext Markup Language. It is usually made up of texts and graphics. HTML is used to create electronic documents which are displayed on the world wide web. Each page usually contains series of connections to other pages which are called hyperlinks. HTML tags are hidden keywords within the web page which defines how the web browser format and display the contents.
13. B.
Long documents can be divided into preliminary pages, main text and the index. The preliminary pages will include all the materials that the author want to add to the book that is different from the main texts, such as copyright section, acknowledgment, etc; while the back matter will make up of all the other materials that can not be added to the main text due to one reason or the other.
14. A
A margin refers to the area between the main context of a page and the page edges. The margin helps to define the point where the text begins and where it ends. The normal paper margin is one inch space. Microsoft word allows one to change paper margin according to one's desire.
15. A.
There are different types of fonts and other formatting tools in the Microsoft word which can be used to design the text that are produce on the software. For the sentence given above, the font used is Roman San serif type and the words are bolded.
16. D
A pica is equivalent to 1/6 of an inch. That is, 1 inch = 6 picas.
Then 5 inches will be equal to: 5 * 6 = 30.
Thus, 5 inches is equivalent to 30 picas.
17. A.
Leading refers to the space between lines of types; it is also called line spacing. Leading is measured in points from one baseline to the other. The leading value include the point size of the typeface and the actual space between the lines.
18. D.
Page column refers to vertical blocks of contents positioned on a page,which is separated by gutters or rules. Columns are usually used to break up large body of text that can not fit into a single block of text on a page.
19. C.
Typography is the procedure of arranging type data in order to make it legible, readable and appealing when it is displayed. It involves the process of formatting the type document using the available formatting tools on the Microsoft word.
20. C
A pica refers to a unit of type size and line length, which is equal to 12 points. A point is equal to 1/12 of a pica and so there are 12 points in a pica. In typography, a point is the smallest unit of measure, it is used for measuring font size, leading and other items on the printed page. 


 


8 0
3 years ago
Convert the binary number into a hexadecimal number.
Anarel [89]

Explanation:

A binary number is converted to hexadecimal number by making a group of 4 bits from the binary number given.Start making the group from Least Significant Bit (LSB) and start making group of 4 to Most Significant (MSB) or move in outward direction.If the there are less than 4 bits in last group then add corresponding zeroes to the front and find the corresponding hexadecimal number according to the 4 bits.For example:-

for this binary number 100111001011011.

100  <u>1110</u> <u>0101</u>  <u>1011</u>

There is one bits less in the last group so add 1 zero(0) to it.

<u>0100</u>  <u>1110</u>  <u>0101</u>  <u>1011</u>

  4        E        5        B

100111001011011 = 4E5B

101011.1010

<u>0010</u>   <u>1011</u>  .   <u>1010</u>

  2          B           A

=2B.A

6 0
3 years ago
In learning information security, it is important to understand that threats to your company's information assets are present 24
coldgirl [10]

1. Acts of human error

<u>Explanation:</u>

Insecurity their are many threats that make a desktop or workstation or laptop.  Normally end users have to update operating systems and virus signature updates by periodic scheduling task moreover to avoid threats end-user also have to do periodic scheduling scanning. And the virus cleaning. Download the third-party malware and spyware and then the cleaning process.

End-users have made sure all required service is activated and running in the organization.

The team has to make sure any software threats are found in PC or workstation or laptop or desktop or LAN and try to remove make system up running without any threats.

8 0
3 years ago
While reviewing the Quick Access toolbar, Sarah notices that the Redo button is not there. This is because the Redo button only
IRISSAK [1]
D is the best answer
I hope it’s work
8 0
3 years ago
Other questions:
  • Disk scheduling algorithms in operating systems consider only seek distances, because Select one: a. modern disks do not disclos
    13·1 answer
  • In this digital age of rapid communications, how can you justify the time it takes to stop and revise a message
    10·1 answer
  • The work principle is not always true<br> T or F
    11·2 answers
  • Suppose that we have a set of activities to schedule among a large number of lecture halls, where any activity can take place in
    8·1 answer
  • In which of the security mechanism does the file containing data of the users/user groups have inbuilt security?
    6·1 answer
  • If a client is found _________ the NAP will attempt to make it _______. Group of answer choices A. non-compliant, compliant B. s
    13·2 answers
  • In Java:
    15·1 answer
  • Neymar machine that Run on electricity
    11·1 answer
  • A customer is looking for a storage archival solution for 1,000 TB of data. The customer requires that the solution be durable a
    9·1 answer
  • Colorful bead bracelet in codehs
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!