Software System Implementation Process Coursework

Exclusively available on IvyPanda Available only on IvyPanda

The consultant will ensure system implementation strategy covering organizational business requirement for a HR system integrated in a single application. A project plan will consist of tasks, resource requirements, project schedule, and the project budget. The implementation plan will cover software testing activities, software installation activities, and training considerations.

We will write a custom essay on your topic a custom Coursework on Software System Implementation Process
808 writers online

System behavior

Testing system behavior will answer questions about human resource recruitment indicated on the flow charts. The expected outcome, on entering data about detailed job description and submitting the data for processing with the options of temporary or regular hire, will be to identify suitable candidates.

Applicants whose resumes meet the set criteria are further booked for an interview. After interview questions have been formulated and administered, candidates who qualify for the job are selected and appropriate compensation offered. If the candidate accepts the pay, an employment offer is made upon which the candidate is hired if the offer is accepted (Chillarege, n.d).

Software testing activities

Software testing will provide a system validation and verification document detailing system compliance to technical, business, and operational objectives. Tests on data integrity, system recovery in the event of system failure, system up time and backups, and consistent system availability in the HR organization are documented.

Other testing activities will cover application functionalities to provide a clear perspective of product quality. In addition to that, these activities will include reviewing and inspecting the application to provide information about system entry and exit strategies in view of the entered data. Multiplatform compatibility tests and automated tests are done as a cost benefit strategy (Chillarege, n.d).

Another activity will be user oriented testing, covering all business system features, which will reflect organizational usage and software reliability. A test document is created to capture user scenario methods and to determine software quality (Chillarege, n.d).

Another test activity is application usability. This will detail application user experience, product behavior in addition to user interaction on human Computer Interface (HRI) and system robustness. Stress and mutation test are also done.

1 hour!
The minimum time our certified writers need to deliver a 100% original paper

Software Installation Activities

Software installation activities will cover software release activities, application assembly activities, and resource requirements for organizational deployment and use. Executable components of the application will be installed and activated before adapting the application to the HR environment which is then updated to HR organizational requirements. The consultant must integrate version tracking capabilities to ensure continuous system updates without any potential risk to the organization.

To successfully install the software and integrate this to the HR system to support the organization’s objectives, the consultant will identify pre-installation activities, installation activities, and post installation activities.

The consultant will design installation activities consisting of identifying server needs and requirements in the context of the organization’s HR system requirements, verifying the application, verifying disk space and disk partitions, server backup strategies, and ensuring media is clean up is done if an existing system is to be replaced.

Pre-Installation Strategy

A pre-installation plan will cover all server preparation requirements, software agreements, server configuration agreements, and server configuration settings will be saved. Hardware requirements will be documented at this stage.

The installation process

The installation strategy will either be attended or automatic. The installation process will cover the hardware, the operating system, the licensed application, image capturing strategies, and database installation strategies. The document will cover installation strategies of the licensed software, and the loading of the application with user test data (Chillarege, n.d). The test data will be the job description details.

Post installation activities

Post installation activities will cover system customization activities, installation of other service applications and saving server configuration.

The installation plan will document all software installation devices including optical devices for software distribution media, virtual optical devices covering application validation devices, and installation and recovery devices.

Remember! This is just a sample
You can get your custom paper by one of our expert writers

The installation plan will detail strategies for creating adequate address spaces, creating resource class to ensure authorization checking mechanisms and structures are consistent with data structures and requirements. These resource classes will be uniquely identified with system commands, client server specifications, and connection privileges on the database server. The Authorization library is also added.

The server will be configured with due regard to the physical environment, secure server cabling, server manipulation strategies, and system configurations through the control panel. The database architecture, database administration, commitment control, performance optimization, database information finder are documented in the process for training purposes and for future use.

Training Considerations

Training will be pegged on the training policies of the HR organization. The policies incorporate trainings on security policies which define access privileges for users, making users aware of potential threats from the internet, hacking, sources of malware programs, dangerous Email attachments, Email viruses and SPAM, Hoaxes such as phishing, passwords policies and password authentication and verification mechanisms, and firewalls.

Others include asset control policies, application implementation policies, and system lockdown policies. Security policies will secure balanced and fair access to system resources, minimize potential security risks, and will cover procedures, consequences of failure, and levels where such policies apply.

The policy document will also cover the scope, organizational policy enforcement and auditing. This document will also cover organizational approaches to comprehensive information systems security enforcements.

Training Methodologies

An organizational plan detailing training objectives and methodologies will be developed. Effective training methodologies will lead to improved productivity and minimal training time depending on software complexities. End user needs are identified in the process and user skills are identified in the training plan. Training will either be focused step-by-step method for beginners or advanced training for well skilled users (Murdick & Ross 1975).

To ensure end user satisfaction, training methodologies will span instructional methodologies, system logs, behavior modeling, hands-on training, and knowledge transfer methods. The training will be objectively based on system security and user problems (Shinder 2006).

Audience to be trained

The training plan will be user audience specific. Information systems are used by organizations at the strategic, tactical, and operational levels Murdick & Ross 1975). Each of these level’s training needs will be identified and training done respectively.

We will write
a custom essay
specifically for you
Get your first paper with
15% OFF

The Project Plan

TaskWk-week
Schedule
ResourcesBudget ($)
Testing
Designing the test plan
Collecting test data
Testing data for consistency
Entering test data
Running the test
Documenting the results.
Checking for errors
I wk
1 wk
2 days
2 days
2 wks
3 days
1 wk
Forms, test data tools, error debugging tools2354
Installation
Creating installation plan
Acquire Hardware and Software
Read Manual
Hire Technicians
Install Hardware
Run software executable components
System and database configuration
Test database
1 wk
1 wk
2 days
2 day
1 wk
2 wks
2 wks
2 days
Hardware
Manual
Technicians
Management personnel
Database administrator
3555
Training
Create training plan
Design training document
Identify training methodologies
Identifying Audience
Documentation
Follow-ups
Human resource personnel
Information technology personnel
System users
1213

Reference List

Chillarege, R. (n.d). Software Testing Best Practices. Retrieved from

Murdick, R.G., & Ross, J.E. (1975). Information Systems for Modem Management. Englewood Cliffs, NJ: Prentice-Hall.

Shinder, D. (2006). Plan your end-user training strategy before software roll-out. Web.

Print
Need an custom research paper on Software System Implementation Process written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2022, April 11). Software System Implementation Process. https://ivypanda.com/essays/software-testing-activities-coursework/

Work Cited

"Software System Implementation Process." IvyPanda, 11 Apr. 2022, ivypanda.com/essays/software-testing-activities-coursework/.

References

IvyPanda. (2022) 'Software System Implementation Process'. 11 April.

References

IvyPanda. 2022. "Software System Implementation Process." April 11, 2022. https://ivypanda.com/essays/software-testing-activities-coursework/.

1. IvyPanda. "Software System Implementation Process." April 11, 2022. https://ivypanda.com/essays/software-testing-activities-coursework/.


Bibliography


IvyPanda. "Software System Implementation Process." April 11, 2022. https://ivypanda.com/essays/software-testing-activities-coursework/.

Powered by CiteTotal, automatic citation creator
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1