Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)
NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.
NB: All your data is kept safe from the public.
The consultant will ensure system implementation strategy covering organizational business requirement for a HR system integrated in a single application. A project plan will consist of tasks, resource requirements, project schedule, and the project budget. The implementation plan will cover software testing activities, software installation activities, and training considerations.
System behavior
Testing system behavior will answer questions about human resource recruitment indicated on the flow charts. The expected outcome, on entering data about detailed job description and submitting the data for processing with the options of temporary or regular hire, will be to identify suitable candidates.
Applicants whose resumes meet the set criteria are further booked for an interview. After interview questions have been formulated and administered, candidates who qualify for the job are selected and appropriate compensation offered. If the candidate accepts the pay, an employment offer is made upon which the candidate is hired if the offer is accepted (Chillarege, n.d).
Software testing activities
Software testing will provide a system validation and verification document detailing system compliance to technical, business, and operational objectives. Tests on data integrity, system recovery in the event of system failure, system up time and backups, and consistent system availability in the HR organization are documented.
Other testing activities will cover application functionalities to provide a clear perspective of product quality. In addition to that, these activities will include reviewing and inspecting the application to provide information about system entry and exit strategies in view of the entered data. Multiplatform compatibility tests and automated tests are done as a cost benefit strategy (Chillarege, n.d).
Another activity will be user oriented testing, covering all business system features, which will reflect organizational usage and software reliability. A test document is created to capture user scenario methods and to determine software quality (Chillarege, n.d).
Another test activity is application usability. This will detail application user experience, product behavior in addition to user interaction on human Computer Interface (HRI) and system robustness. Stress and mutation test are also done.
Software Installation Activities
Software installation activities will cover software release activities, application assembly activities, and resource requirements for organizational deployment and use. Executable components of the application will be installed and activated before adapting the application to the HR environment which is then updated to HR organizational requirements. The consultant must integrate version tracking capabilities to ensure continuous system updates without any potential risk to the organization.
To successfully install the software and integrate this to the HR system to support the organization’s objectives, the consultant will identify pre-installation activities, installation activities, and post installation activities.
The consultant will design installation activities consisting of identifying server needs and requirements in the context of the organization’s HR system requirements, verifying the application, verifying disk space and disk partitions, server backup strategies, and ensuring media is clean up is done if an existing system is to be replaced.
Pre-Installation Strategy
A pre-installation plan will cover all server preparation requirements, software agreements, server configuration agreements, and server configuration settings will be saved. Hardware requirements will be documented at this stage.
The installation process
The installation strategy will either be attended or automatic. The installation process will cover the hardware, the operating system, the licensed application, image capturing strategies, and database installation strategies. The document will cover installation strategies of the licensed software, and the loading of the application with user test data (Chillarege, n.d). The test data will be the job description details.
Post installation activities
Post installation activities will cover system customization activities, installation of other service applications and saving server configuration.
The installation plan will document all software installation devices including optical devices for software distribution media, virtual optical devices covering application validation devices, and installation and recovery devices.
The installation plan will detail strategies for creating adequate address spaces, creating resource class to ensure authorization checking mechanisms and structures are consistent with data structures and requirements. These resource classes will be uniquely identified with system commands, client server specifications, and connection privileges on the database server. The Authorization library is also added.
The server will be configured with due regard to the physical environment, secure server cabling, server manipulation strategies, and system configurations through the control panel. The database architecture, database administration, commitment control, performance optimization, database information finder are documented in the process for training purposes and for future use.
Training Considerations
Training will be pegged on the training policies of the HR organization. The policies incorporate trainings on security policies which define access privileges for users, making users aware of potential threats from the internet, hacking, sources of malware programs, dangerous Email attachments, Email viruses and SPAM, Hoaxes such as phishing, passwords policies and password authentication and verification mechanisms, and firewalls.
Others include asset control policies, application implementation policies, and system lockdown policies. Security policies will secure balanced and fair access to system resources, minimize potential security risks, and will cover procedures, consequences of failure, and levels where such policies apply.
The policy document will also cover the scope, organizational policy enforcement and auditing. This document will also cover organizational approaches to comprehensive information systems security enforcements.
Training Methodologies
An organizational plan detailing training objectives and methodologies will be developed. Effective training methodologies will lead to improved productivity and minimal training time depending on software complexities. End user needs are identified in the process and user skills are identified in the training plan. Training will either be focused step-by-step method for beginners or advanced training for well skilled users (Murdick & Ross 1975).
To ensure end user satisfaction, training methodologies will span instructional methodologies, system logs, behavior modeling, hands-on training, and knowledge transfer methods. The training will be objectively based on system security and user problems (Shinder 2006).
Audience to be trained
The training plan will be user audience specific. Information systems are used by organizations at the strategic, tactical, and operational levels Murdick & Ross 1975). Each of these level’s training needs will be identified and training done respectively.
The Project Plan
Reference List
Chillarege, R. (n.d). Software Testing Best Practices. Retrieved from http://www.chillarege.com/authwork/TestingBestPractice.pdf
Murdick, R.G., & Ross, J.E. (1975). Information Systems for Modem Management. Englewood Cliffs, NJ: Prentice-Hall.
Shinder, D. (2006). Plan your end-user training strategy before software roll-out. Web.
Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)
NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.
NB: All your data is kept safe from the public.