List the sections of a system design specification, and describe the contents.

What will be an ideal response?


• The system design specification consists of the following:
• Executive (or Management) Summary: Provides a brief overview of the project for company managers and executives. Outlines the development efforts to date, current status report, summary of project costs to date and remaining costs, review of the overall benefits of the new system, presents the systems development phase schedule, and highlights any issues that management will need to address.
• System Components: Contains the complete design for the new system, including user interface, outputs, inputs, files, databases, and network specifications. Also should include source documents, report and screen layouts, DFDs, O-O diagrams, and all other relevant documentation.
• System Environment: Describes the constraints, or conditions, affecting the system, including any requirements that involve operations, hardware, systems software, or security.
• Implementation Requirements: Specifies start-up processing, initial data entry or acquisition, user training requirements, and software test plans.
• Time and Cost Estimates: Detailed schedules, cost estimates, and staffing requirements for the systems development phase and revised projections for the remainder of the SDLC.
• Appendices: Supplemental material, such as copies of documents from the first three phases, can be included if they would provide easy reference for readers.

Computer Science & Information Technology

You might also like to view...

(Unpacking Characters from Unsigned Integers) Using the right-shift operator, the bitwise AND operator and a mask, write function unpackCharacters that takes the unsigned integer from Exercise 22.11 and unpacks it into two characters. To unpack two characters from an unsigned two- byte integer, combine the unsigned integer with the mask 65280 (11111111 00000000) and right- shift the result 8

bits. Assign the resulting value to a char variable. Then, combine the unsigned in- teger with the mask 255 (00000000 11111111). Assign the result to another char variable. The pro- gram should print the unsigned integer in bits before it’s unpacked, then print the characters in bits to confirm that they were unpacked correctly. What will be an ideal response?

Computer Science & Information Technology

When combined together, accumulated patches are called _______________.

A. a Windows update B. hotfixes C. a service packs D. updates

Computer Science & Information Technology

To guard against data loss, it is good practice to have the same record in more than one table.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Case 2You have started to create a new video. You are working in Adobe Premiere Elements. Answer the following questions about working with Adobe Premiere. You want to trim a section from the middle of a clip. How do you do that?

A. Click the Split Clip button, then use the In point and Out point handles to trim the unwanted area B. Click the area on the Timeline where you want to trim, then use the In point and  Out point handles to trim the unwanted area C. Highlight the area you want to trim on the Timeline, then click the Undo button D. Drag the playhead on the mini-timeline to the frame you want to trim, then click the scissors icon

Computer Science & Information Technology