

However, the weaknesses lie on the limited input capacity, wasted time and assets, being rigid and estimating cost and overrun projects are stressful though.Īnd to top it off, the difference in focus of information systems analysis from that of information systems design lies on the basis that analysis comes before the design of the SLDC, and that the analysis is more important due to that it holds the significance that it gives the necessary output for the design to be created, thus focusing on the information and requirement it takes from the source. Its strength lies on control, detailed steps, evaluate cost and completion targets, documentation, well defined input, easy maintenance, development and high design standards and it stops the changes in MIS staffing. However, Testing and Maintenance is very important in the formation of the SDLC in order to see the by product, to assure that it had no flaws and all, since it also had strength and weaknesses also. A plan must be polished enough to assure to have acceptable results in the future, and to do that, one needs to gather and analyze the necessary requirements and information for the building of the design and coding of the SDLC. To start, knowing the most important phases are required to achieve the goal and that is, every system can be done through initiating a plan. It was also referred as a life cycle due to that it resembles the life cycle of an insect that follows the stages of life. Systems Development Life Cycle is commonly used in the process of creating a steady flow of information for the companies that do business. SDLC “The phases and its importance in the software itself” So to say, technology itself is very much like humans, having strengths and weaknesses alike, but everything can be alright, for knowing technology itself can be beneficial in this modern age era, where computers roam like the leaves of a cherry blossom in the park of the Shinto temple. But the problem rose in the rise of viruses and internet bugs that harm the computers itself because of the program’s lack of security codes or very easy configuration of the security itself. Hackers also knew about the weakness that the program had and they always took advantage of it. The weakness lies on the program it had, the parts that composes the machine or the software that was installed in the machine in the first place. To understand this, one must know how technology worked. But technology itself is a wandering thing, and it had flaws too, just like a human.
