This note covers the full range of life‑cycle models required by the Cambridge 9618 syllabus, links each model to the five standard PDLC stages, and connects the concepts to the other major syllabus topics (hardware, data representation, communication, security, databases, AI and programming). Use the tables and “link‑back” boxes to see how life‑cycle decisions affect algorithm design, testing, documentation and evaluation (AO1‑AO3).
Projects differ in size, risk, time‑to‑market and stability of requirements. Selecting an appropriate model helps to:
| Model | Key Principles | Benefits (AO2) | Drawbacks (AO3) |
|---|---|---|---|
| Waterfall |
|
|
|
| Iterative |
|
|
|
| Incremental |
|
|
|
| Prototyping |
|
|
|
| Rapid Application Development (RAD) |
|
|
|
| Agile – Scrum |
|
|
|
| Model | How the PDLC stages are applied |
|---|---|
| Waterfall | Analysis → Design → Coding → Testing → Maintenance (each stage completed once before moving on). |
| Iterative | Each iteration repeats all five stages for a subset of functionality; the final product emerges after several cycles. |
| Incremental | Each increment passes through the five stages; later increments build on earlier ones. |
| Prototyping | Rapid analysis → quick design → fast coding (prototype) → informal testing → refinement; the final system may be built from the refined prototype. |
| RAD | Very short analysis & design cycles, heavy use of reusable components during coding, continuous testing, and rapid maintenance updates. |
| Agile (Scrum) | Each sprint performs a mini‑analysis, design, coding, testing, and a brief maintenance/feedback step. |
Link‑back: During the Testing stage, you must verify that numeric calculations give correct results despite floating‑point rounding.
Link‑back: In the Design stage you may choose an algorithm that minimises cache misses for large data sets.
Link‑back: The Coding stage relies on a compiler; the Testing stage often uses a debugger.
Link‑back: When designing a client‑server application, the Analysis stage must specify required network protocols; the Testing stage must include reliability testing over a network.
Link‑back: Security requirements are part of Analysis**; secure coding practices are checked during Testing** (e.g., penetration testing).
Link‑back: The Design stage includes an ER diagram; the Coding stage implements SQL queries; the Testing stage validates data integrity.
Link‑back: An AI component would be prototyped early (Prototyping model) and iteratively refined (Iterative model).
Link‑back: Choice of paradigm influences the Design** (e.g., class diagrams for OOP) and the Testing** strategy (unit tests for recursive functions).
Problem: A university wants an online exam‑submission system that must (a) authenticate students, (b) accept large file uploads, (c) run plagiarism detection, and (d) generate real‑time analytics for staff.
| Level | Question | Key Points for Marking |
|---|---|---|
| AS (AO1) | Define the five stages of the PDLC and give one purpose for each. | Accurate definitions + one correct purpose per stage (5 marks). |
| A (AO2) | Explain why an iterative model would be suitable for developing a mobile game that will be updated with new levels every six months. | Reference to evolving requirements, early delivery, need for repeated testing, and risk reduction (6‑8 marks). |
| A (AO3) | Compare the Waterfall and Agile models in terms of handling changing security requirements for a banking application. | Balanced comparison: Waterfall – good documentation, hard to change; Agile – flexible but needs disciplined security testing; conclude with justified recommendation (8‑10 marks). |
| AS (AO2) | Given a simple pseudo‑code algorithm, identify a possible defect and suggest a test case that would reveal it. | Identify defect (e.g., off‑by‑one error), design appropriate test case, explain why it would fail (6 marks). |
| Criterion | Guiding Questions |
|---|---|
| Project size & complexity | Are there many interacting components or a simple, single‑function system? |
| Stability of requirements | Will requirements change significantly after the analysis phase? |
| Time‑to‑market pressure | Do stakeholders need a usable product quickly? |
| Risk level (safety‑critical, financial, data‑privacy) | Is extensive verification and documentation mandatory? |
| Stakeholder involvement | Can users give regular feedback throughout development? |
| Team expertise & resources | Do we have reusable components, skilled developers, and suitable tools (e.g., CASE, version control)? |
When answering exam questions, use this checklist to justify your model choice and to discuss at least one advantage and one disadvantage.
| Syllabus Area | Notes Included Here | Further Reading / Mini‑Module |
|---|---|---|
| Software Development Life‑Cycle | Sections 1‑4, 7‑9 | Full PDLC description (already covered) |
| Data Representation | Mini‑module 6.1 | Binary, floating‑point, BCD, ASCII/Unicode |
| Computer Architecture & Processor | Mini‑module 6.2 | CPU components, instruction set, cache |
| System Software | Mini‑module 6.3 | OS functions, compilers, debuggers |
| Communication & Networks | Mini‑module 6.4 | TCP/IP, protocols, topologies, error detection |
| Security & Privacy | Mini‑module 6.5 | Encryption, hashing, authentication |
| Databases | Mini‑module 6.6 | Relational model, normalization, SQL |
| Artificial Intelligence | Mini‑module 6.7 | Search algorithms, machine learning basics |
| Programming Paradigms & Recursion | Mini‑module 6.8 | Procedural, OOP, functional, exception handling |
| Evaluation (AO3) | Sections 5, 8, 9 | Checklist, comparative tables, exam‑style evaluation |
Use the map to ensure you have addressed every required topic when revising for the Cambridge AS & A‑Level Computer Science exam.
Create an account or Login to take a Quiz
Log in to suggest improvements to this note.
Your generous donation helps us continue providing free Cambridge IGCSE & A-Level resources, past papers, syllabus notes, revision questions, and high-quality online tutoring to students across Kenya.