Sad Comprehensive Notes
Sad Comprehensive Notes
THEORY
CONTENT
Meaning of terms:
System
Information
This is the processed data that is meaningful to the user. It can be stored, as well as can
be communicated
information system
information technology
This is a term that encompasses all forms of technology used to create, store, exchange
and utilize information in its various forms ie.
KisPo Page | 1
Business data
Motion pictures
Multimedia presentations etc
Data:
These are the raw facts which do not have any form of meaning in terms of alphanumeric
(letter, and numbers) ,text and figures, special characters etc to the user.
Analysis:
This is the detailed assessment/study of the components of the existing systems and its
requirements.
System Analysis:
Involves evaluation of the current system components and its requirements using
gathered facts or information. One needs to evaluate whether the current and projected
user needs are being met, if not he/she should give a recommendation of what ought to
be done.
People: use the systems to fulfil their informational need. They include end users and
operations personnel such as computer operators, system analyst, programmers, data
administrators etc.
Computer hardware: these are the physical computer equipment and devices, which
provide for five major functions namely:
KisPo Page | 2
Functions of a TPS
TPS are ultimately little more than simple data processing systems.
KisPo Page | 3
Validation
Sorting Lists
Transactions Listing Detail reports
Events Merging Action reports
Updating Summary reports?
Calculation
o Payroll systems
o Order processing systems
o Reservation systems
o Stock control systems
o Systems for payments and funds transfers
For historical reasons, many of the different types of Information Systems found in
commercial organizations are referred to as "Management Information Systems".
However, within our pyramid model, Management Information Systems are
management-level systems that are used by middle managers to help ensure the smooth
running of the organization in the short to medium term. The highly structured
information provided by these systems allows managers to evaluate an organization's
performance by comparing current with previous outputs.
Functions of a MIS
KisPo Page | 4
A Decision Support System can be seen as a knowledge based system, used by senior
managers, which facilitates the creation of knowledge and allow its integration into the
organization. These systems are often used to analyze existing structured information
and allow managers to project the potential effects of their decisions into the future. Such
systems are usually interactive and are used to solve ill structured problems. They offer
access to databases, analytical tools, allow "what if" simulations, and may support the
exchange of information within the organization.
Functions of a DSS
DSS manipulate and build upon the information from a MIS and/or TPS to generate
insights and new information.
Modelling
Internal Transactions Summary reports
Simulation
Internal Files Forecasts
Analysis
External Information? Graphs / Plots
Summarizing
KisPo Page | 5
o Spreadsheet Models?
Expert systems
Perhaps the most popular software package that can fit the definition of OAS
(and to the office suite ) is Microsoft Office in all its versions. This software,
part of the company Microsoft , officially operates under the operating
systems Microsoft Windows and Apple Mac OS , although it does in Linux
when using emulators.
There are other office suites available for any user to be distributed freely,
some of which are:
Today, with the emergence of the philosophy of Web 2.0 office suite are
proliferating online , which are nothing more than applications that perform
the same functions as the OAS classic desktop, but available for use in any
portal Internet . These suites have the advantage that a user can work with
your own documents from any computer connected to the Internet, also in
these systems is usually very easy to share documents, facilitating
collaborative work.
Others
What is an EIS?
KisPo Page | 6
Executive Information Systems are strategic-level information systems that are found at
the top of the Pyramid. They help executives and senior managers analyze the
environment in which the organization operates, to identify long-term trends, and to
plan appropriate courses of action. The information in such systems is often weakly
structured and comes from both internal and external sources. Executive Information
System are designed to be operated directly by executives without the need for
intermediaries and easily tailored to the preferences of the individual using them.
Functions of an EIS
EIS organizes and presents data and information from both external data sources and
internal MIS or TPS in order to support and extend the inherent capabilities of senior
executives.
Executive Information Systems tend to be highly individualized and are often custom
made for a particular client group; however, a number of off-the-shelf EIS packages do
exist and many enterprise level systems offer a customizable EIS module.
systems owners
Ar
eusual
lyt
hei
ndi
vidual
swi
thbudget
arycont
rolovert
hesyst
[Link]
sper
son
shoul
dbeabl
etoaut
hor
izepur
chasesofsof
twar
eand/orhar
dwar
erequi
redt
o
mee
tpol
icy r
equi
rement
s,and / orhave t
he aut
hor
ityt
o decommi
ssi
on t
he
syst
em.
KisPo Page | 7
The system owners own the systems because they have invested in the assets. They
are responsible for them and recognize their potential. They keep your customers happy
and impact your bottom line. Of course you want to maximize their value. To do that, you
need to monitor performance efficiency and maintenance events. You need to track and
manage your assets to realize total compliance and positive investment outcomes.
The end users of the system refer to the people who use computers to perform
their jobs, like desktop operators. Further, end users can be divided into various
categories.
Very first users are the hands-on users, who actually interact with the system.
They are the people who feed in the input data and get output data.
Other users are the indirect end users who do not interact with the systems
hardware and software. However, these users benefit from the results of these systems.
These types of users can be managers of organization using that system.
There are third types of users who have management responsibilities for
application systems. They oversee investment in the development or use of the system.
Fourth types of users are senior managers. They are responsible for evaluating
organization's exposure to risk from the systems failure.
System Analysts
KisPo Page | 8
Because they collaborate with professionals across the entire SLDC, systems analysts
often serve as information brokers. The documentation prepared by systems analysts
often become the final word on what a system is or does.
Systems analysts document IT systems to understand, change, improve, and help build
these systems. Broadly, they document what is happening in current systems. But they
also document what can be expected in systems that haven’t been built yet. This work is
often done in collaboration with technical writers, systems designers, and systems
architects. Typical things that systems analysts document include:
User scenarios
Functional activities
Classes
Data flows
Interfaces between systems
Requirements documents
Feasibility studies
Design specifications
Software development kits (SDKs)
Flowcharts and diagrams
Training documents
Testing documents
Disaster recovery plans (DRPs)
Information overload occasionally happens to each of us. This is where systems analysts
come in handy. They transform a seemingly incomprehensible avalanche of information
into something useful and anything that will translate business goals into technical
solutions. Here are some examples of questions that systems analysts can ask during the
requirements phase of a project:
Objectives
KisPo Page | 9
Problems
Changes
There are many types of requirements that a systems analyst will collect and analyze. Three of the
main ones are:
Clearly, not all software is custom-built. There are thousands of applications that are
prepackaged. These kinds of programs can be customized by setting various preferences,
yet they can’t be as individualized as custom-programmed software.
Systems analysts often play a crucial role in both picking and configuring software. Here
are some examples of tasks that systems analysts do in conjunction with system
architects and system designers:
Software Selection
Software Configuration
KisPo Page | 10
To get the job done, systems analysts have to work with a large variety of people, on top
of the IT professionals they always collaborate with. Here are a few of them:
Sponsors are the people who want a system to be built so they can make money
from it. In business speak: systems analysts work with sponsors to assess whether the
financial investment in a system will be recouped by gains in efficiency and
effectiveness..
Systems analysts often work with programmers who write code to modify
existing systems and/or build new ones.
Systems analysts work with technical writers to draft user guides, technical
overviews, instruction manuals, and frequently asked questions (FAQs).
Systems analysts work with Quality Assurance (QA) analysts to test systems
to ensure that critical requirements are met.
systems designers: are the people concerned with the design of systems and
includes the following:
o Database Administrators
o Network Architects
o Web Architects
o Graphics Artists
o Security Experts
o Technology specialists
Systems developers:
These are the people who create and write computer programs. Some develop the
applications programs that allow people to do specific tasks on a computer or other
device. Others develop the underlying systems that run the devices or control networks
Other
Computer programmers
Computer programmers write code to create software programs. They turn the program
designs created by software developers and engineers into instructions that a computer
can follow.
System Builders
KisPo Page | 11
Design and build data communication networks, including local area networks (LANs),
wide area networks (WANs), and intranets. These networks range from a small
connection between two offices to a multinational series of globally distributed
communications systems.
Provide help and advice to people and organizations using computer software or
equipment. Some, called computer network support specialists, support information
technology (IT) employees within their organization. Others, called computer user
support specialists, assist non-IT users who are having computer problems.
Use specialized software to store and organize data, such as financial information and
customer shipping records. They make sure that data are available to users and are
secure from unauthorized access.
Computer networks:
Are critical parts of almost every organization. Network and computer systems
administrators are responsible for the day-to-day operation of these networks.
Web developers: These are the people who design and create websites
They are responsible for the look of the site. They are also responsible for the site’s
technical aspects, such as performance and capacity, which are measures of a website’s
speed and how much traffic the site can handle. They also may create content for the site.
THEORY
KisPo Page | 12
CONTENT
Systems theory/concept.
Problem
A problem can be a question looking for an answer, a situation (such as
an existing information system) that isn't working properly and needs
KisPo Page | 13
KisPo Page | 14
control. If some aspect of the internal environment is causing some difficulty for
the system, that aspect can be altered. For example, a particular information
system operates in a particular office environment. If a requirement of the
information system is that its users must collect data that hasn't been collected
previously, this new activity can be asked of them.
External Environment
A system's external environment is that part of its environment over which it has
no control, but it still affects the requirements of the system. For example, in a
payroll system, the revenue authority tax laws, the NHIF laws affect the
procedures in the system. The tax laws must be reflected in the system, and if the
laws change, the system must change to accommodate those changes. So an
analyst must be aware of the requirements of both the internal and external
environments in which an information system will work.
Subsystem
A system is usually composed of self-contained but interrelated systems that are
called subsystems. It is important to be able to recognise these subsystems,
because understanding this interdependence is vital to developing
a complete system.
Supersystem
A system composed of two or more systems may be called a supersystem of those
systems.
System Boundary
A system boundary may be thought of as the point at which data flows (perhaps as
output) from one system to another (perhaps as input). The degree to which data
is free to flow from one system to another is known as the permeability of the
boundary. A permeable boundary allows data to flow freely, resulting in an open
system. An impermeable boundary is one which strictly controls (or even restricts)
the acceptance or dispensing of data, resulting in a closed system.
Interdependence
One of the most important concepts in Systems Theory is the notion of
interdependence between systems (or subsystems). Systems rarely exist in
isolation. For example, a payroll system has to access and update a personnel
KisPo Page | 15
input
Input is anything we wish to embed in a system for some type of use. A variety of
sources are used to input: keyboard, scanner, microphone, mouse, even another
computer. What we input has a purpose - but until it is processed and generated in some
form of output, it doesn't do us much good.
processing
Processing takes place in the internal parts of the computer. It is the act of taking
inputted data and converting it to something usable. What we typically see on the screen
in today's computer world (known as what you see is what you get or WYSIWYG) is
the result of our input being processed by some program so we can have usable output:
Output
Storage is the term used to indicate we will be saving data for a period of time. We
store for many reasons: for future reference; to prevent full loss of data; But, storage is
vital. There are several mediums on which we can keep output and processed data: a
hard disk, a USB drive, a CD.
Feedback
To be effective and efficient a system needs a feedback mechanism that can ascertain
whether the outputs of the system are what they should be. If not. a system should have
the ability to adjust its inputs or processes to improve the outputs. An ideal system is
self-regulating. The feedback mechanism in an information system may be automated or
may be manual.
Types of systems
KisPo Page | 16
Most of these systems include computers today, indeed many could not survive without
computers. However it is equally important to point out that such systems existed before
there were computers, some of these systems are still completely non-computerised and
may remain that way for many years to come. As a system analyst you will naturally
assume that every system that you come in contact with should be computerised, and the
customer or the user ( the owner of the system) whom you interact with will generally
assume that you have such bias.
Why should some information systems not be automated?, there may be many reasons,
but here are some of the more common ones:
Cost: it may be cheaper to continue carrying out the system functions and storing
the systems information manually.
Convenience: an automated system may take up too much room, make too much
noise, generate too much heat, or consume too much electricity etc.
Security: if the information system is maintaining sensitive, confidential data, the
user may not feel that an automated system is sufficiently secure. The user may
want the ability to keep the information physically protected and locked up.
Maintainability: the user might argue that a computerized information system
would be cost-effective except that there is nobody on the staff that can maintain
the computer hardware and software, nobody would repair the system if its
broken down.
Automated System
KisPo Page | 17
Automated systems are actually man made systems that interact with or are controlled by
one or more computers.. no doubt you have seen many different examples of automated
systems in your day to day life. It seems that every aspect of our modern society is
computerized. As a result we can distinguish many different kinds of automated systems.
Even though there are many different kinds of automated system, they all tend to have
common components. And these components include:
On-line systems
Real time systems
Decision support systems
Knowledge based systems.
Classification of systems
open Vs closed
An open system is one that interacts with its environment and thus exchanges information,
material, or energy with the environment, including random and undefined inputs. Open systems
are adaptive in nature as they tend to react with the environment in such a way organizing', in the
sense that they change their continued existence. Such systems are ‘self organizing’, because they
change their organization in response to changing conditions.
A closed system is one, which doesn’t interact with its environment. Such systems, in business
world, are rare. Thus the systems that are relatively isolated from the environment but not
completely closed are termed closed systems.
adaptive
A system is said to be adaptive if it modifies itself with the changes in its environment.
KisPo Page | 18
A deterministic system is one in which the occurrence of all events is known with certainty. If the
description of the system state at a particular point of time of its operation is given, the next state
can be perfectly predicted.
Probabilistic
A probabilistic system is one in which the occurrence of events cannot be perfectly predicted.
Though the behavior of such a system can be described in terms of probability, a certain degree of
error is always attached to the prediction of the behavior of the system.
Classification of properties
HARD PROPERTIES
Most business or organisational problems can be defined in terms of
information with both hard and soft properties. Whatever sector we work in,
some of the issues we face can be precisely measured, for example the cost of
an item, the strength of a particular piece of material, or the number of
employees in our organisation – and the answer is not conditioned by the
measurer’s sense of value. This data is said to have hard properties.
Soft Properties
On the other hand, some issues are not capable of such precise measurement,
and the assessment contains at least an element of judgement or is subjective
in some way. Information such as whether a material looks attractive, whether
we should recruit a particular person or what the average rate of price inflation
will be over the next 10 years is subjective and we say that it has soft
properties.
Needless to say these definitions can get blurred. For example, when we are
measuring absences from the workplace, whether someone is absent or not would
KisPo Page | 19
THEORY
CONTENT
Meaning of SDLC
SDLC stages
problem definition
feasibility study
systems analysis
systems design and development
implementation
maintenance and review
KisPo Page | 20
TheSyst
emsDevel
opmentCycl
e:
Thesyst
emsappr
oachcanbeappl
iedt
othesol
uti
onofmanyt
ypesofpr
obl
ems.
Whent
hisi
nvol
vest
hedev
elopmentofi
nfor
mat
ionsyst
em sol
uti
onst
obusi
ness
pr
obl
ems, i
tis cal
led i
nfor
mat
ion syst
ems devel
opment or appl
icat
ion
devel
opment
. Most comput
er-
based i
nfor
mat
ion syst
ems ar
e concei
ved,
desi
gned,andi
mpl
ement
edusi
ngsomef
orm ofsyst
emat
icdevel
opmentpr
ocess.
I
nthi
s pr
ocess, end user
s and i
nfor
mat
ion speci
ali
sts desi
gn i
nfor
mat
ion
syst
ems based on an anal
ysi
s of t
he i
nfor
mat
ion r
equi
rement
s of an
or
gani
zat
ion. Thus,amaj
orpar
toft
hispr
ocessi
sknown assyst
emsanal
ysi
s
anddesi
gn.
Whent
hesyst
emsappr
oachi
sappl
iedt
othedevel
opmentofi
nfor
mat
ionsyst
em
sol
uti
ons,a mul
ti
step pr
ocessorcycl
eemer
ges. Thi
sisf
requent
lycal
led t
he
i
nfor
mat
ionsyst
emsdevel
opmentcycl
e,al
soknownast
hesyst
emsdevel
opment
l
if
ecycl
e(SDLC)
.
St
eps i
nvol
ved and pr
oduct
s pr
oduced i
nthe t
radi
ti
onali
nfor
mat
ion syst
ems
devel
opmentcycl
e:
[Link]
emsi
nvest
igat
ion-Pr
oduct
:Feasi
bil
itySt
udy
[Link]
emsanal
ysi
s-Pr
oduct
:Funct
ionalRequi
rement
s
[Link]
emsdesi
gn-Pr
oduct
:Syst
emsSpeci
ficat
ions
[Link]
emsi
mpl
ement
ati
on-Pr
oduct
:Oper
ati
onalSyst
em
[Link]
emsmai
ntenance-Pr
oduct
:Impr
ovedSyst
em
1. Al
ltheact
ivi
ti
esi
nvol
vedar
ehi
ghl
yrel
atedandi
nter
dependent
.
2. Sever
aldevel
opment
alact
ivi
ti
escanoccuratt
hesamet
ime.
3. Di
ffer
ent par
ts ofa devel
opment pr
oject can be at di
ffer
ent st
ages oft
he
devel
opmentcycl
e.
4. Anal
yst
smayr
ecycl
eback atanyt
imet
orepeatpr
evi
ousact
ivi
ti
esi
n or
dert
o
modi
fyandi
mpr
oveasyst
em bei
ngdev
eloped.
5. Devel
opment
ssuch ascomput
er-
aided syst
emsand end userdevel
opmentar
e
aut
omat
ing and changi
ng some of t
he act
ivi
ti
es of i
nfor
mat
ion syst
ems
devel
opment
. These devel
opment
s ar
eimpr
ovi
ng t
he qual
ity of syst
ems
devel
opmentandmaki
ngi
teasi
erf
orI
S pr
ofessi
onal
s,whi
leenabl
ingmor
eend
user
stodevel
opt
hei
rownsyst
ems.
KisPo Page | 21
St
art
ingt
heSyst
emsDevel
opmentPr
ocess:
Thefir
stst
ep i
nthesyst
emsdevel
opmentpr
ocessi
sthesyst
emsi
nvest
igat
ion
st
age. Thi
s st
ep may i
nvol
ve consi
der
ati
on ofpr
oposal
s gener
ated by an
i
nfor
mat
ionsyst
emspl
anni
ngpr
[Link]
nves
tigat
ionst
ageal
soi
ncl
udest
he
pr
eli
minar
y st
udy of pr
oposed i
nfor
mat
ion syst
em sol
uti
ons t
o end user
busi
nesspr
obl
ems.
Thet
hree st
epsoft
hesyst
emsi
nvest
igat
ionst
agei
nvol
ve:
1. Det
ermi
newhet
herabusi
nesspr
obl
em oroppor
tuni
tyexi
sts.
Pr
obl
emsdefini
tionandOppor
tuni
ties:
Tosol
veapr
obl
em orpur
sueanoppor
tuni
tyr
equi
resat
hor
oughunder
standi
ng
oft
hesi
tuat
ion athand. Thi
srequi
ressepar
ati
ng pr
obl
emsf
rom sympt
oms,
de
ter
mini
ng obj
ect
ives and const
rai
nts, and, mor
eimpor
tant
, vi
ewi
ng t
he
pr
obl
em oroppor
tuni
tyi
nasyst
emscont
ext
.
Pr
obl
em:-i
sabasi
ccondi
ti
ont
hati
scausi
ngundesi
rabl
eresul
ts.
Oppor
tuni
ty:-i
s a basi
c condi
ti
on t
hatpr
esent
sthe pot
ent
ialf
ordesi
rabl
e
r
esul
ts.
Sympt
oms:-ar
emer
elysi
gnal
sofanunder
lyi
ngcauseorpr
obl
em.
[Link]
easi
bil
ityst
udyt
ode
ter
minewhe
theranew ori
mpr
ovedi
nfor
mat
ion
syst
em i
saf
easi
blesol
uti
on
3. Devel
op a pr
oject management pl
an and obt
ain management
appr
oval
.
Feasi
bil
itySt
udi
es
Becauset
hepr
ocessofdevel
opi
ngamaj
ori
nfor
mat
ionsyst
em canbecost
ly,t
he
syst
ems i
nvest
igat
ion st
age f
requent
lyr
equi
res a pr
eli
minar
y st
udy cal
led a
f
easi
bil
ityst
udy
. Af
easi
bil
ityst
udyi
sapr
eli
minar
yst
udywhi
ch i
nves
tigat
es
t
he i
nfor
mat
ion needs of pr
ospect
ive user
s and de
ter
mine t
he r
esour
ce
r
equi
rement
s,cost
,benefit
s,andf
easi
bil
ityofapr
oposedpr
oject
.
St
epsofaf
easi
bil
ityst
udy:
1. Gat
heri
nfor
mat
ion/dat
aforaf
easi
bil
ityst
udy
.
2. For
mal
izeawr
itt
en r
epor
tincl
udi
ngt
hepr
eli
minar
yspeci
ficat
ionsand a
devel
opment
alpl
anf
ort
hepr
oposedsyst
em.
3. Submi
tther
epor
tmanagementf
orappr
oval
.
KisPo Page | 22
4. Begi
n syst
em anal
ysi
s(i
fmanagementappr
ovest
her
ecommendat
ionsof
t
hef
easi
bil
ityst
udy)
.
Thegoaloff
easi
bil
ityst
udi
esi
sto:
[Link]
uat
eal
ter
nat
ivesyst
ems
[Link]
oposet
hemostf
easi
bleanddesi
rabl
esyst
emsf
ordevel
opment
.
Feasi
bil
ityofasyst
em canbeeval
uat
edi
nter
msoff
ourmaj
orcat
egor
ies:
1. Or
gani
zat
ionalFeasi
bil
ity-f
ocuseson how we
llapr
oposedi
nfor
mat
ion syst
em
suppor
tst
heobj
ect
ivesoft
heor
gani
zat
ionandi
tsst
rat
egi
cpl
anf
ori
nfor
mat
ion
syst
ems.
2. Economi
cFeasi
bil
ity-f
ocusesonwhe
thert
het
angi
blecost
sandbenefit
soft
he
pr
oposedsyst
em wi
llexceedt
hecost
sofdevel
opi
ngandoper
ati
ngi
t.
3. Techni
calFeasi
bil
ity-f
ocuseson t
her
eli
abl
e/capabi
li
ti
esoft
hehar
dwar
eand
sof
twar
etomee
ttheneedsoft
hepr
oposed syst
em,and whe
thert
heycan be
acqui
redordevel
opedi
nther
equi
redt
ime.
4. Oper
ati
on Feasi
bil
ity -f
ocuses on t
he wi
ll
ingness and abi
li
ty oft
he
management
,empl
oyees,cust
omer
s,suppl
ier
s,andot
her
stooper
ate,use,and
suppor
tthepr
oposedsyst
em.
Cost
/BenefitAnal
ysi
s
Ever
ylegi
ti
mat
e sol
uti
on wi
llhave some advant
ages or benefit
s,and some
di
sadvant
ages or cost
s. These advant
ages and di
sadvant
ages ar
eident
ified
when each al
ter
nat
ive sol
uti
on i
s eval
uat
ed. Thi
s pr
ocess i
stypi
cal
ly cal
led
cost
/benefitanal
ysi
s.
Tangi
ble Cost
s -ar
e cost
s and benefit
sthatcan be quant
ified (
e.g.
,costof
har
dwar
eand sof
twar
e,empl
oyeesal
ari
es,and ot
herquant
ifiabl
ecost
sneeded
t
odev
elopandi
mpl
ementasol
uti
on)
.
I
ntangi
ble Cost
s -cost
s and benefit
sthatcannotbe quant
ified (
e.g.
,loss of
cust
omergoodwi
llorempl
oyeemor
alecausedbyer
ror
sanddi
srupt
ionsar
isi
ng
f
rom t
hei
nst
all
ati
onofanew syst
em)
.
Tangi
bleBenefit
s-ar
efavour
abl
eresul
ts(
e.g.
,decr
easei
n payr
ollcost
scaused
byar
educt
ioni
nper
sonneloradecr
easei
ninvent
orycar
ryi
ngcost
scausedby
ar
educt
ioni
ninvent
ory)
KisPo Page | 23
I
ntangi
bleBenefit
s-ar
ehar
dtoes
timat
e(e.
g.,be
ttercust
omerser
viceorf
ast
er
andmor
eaccur
atei
nfor
mat
ionf
ormanagement
).
Syst
em Anal
ysi
s
Syst
ems anal
ysi
sis an i
n-dept
h st
udy ofend useri
nfor
mat
ion needs whi
ch
pr
oducesf
unct
ionalr
equi
rement
sthatar
eusedast
hebasi
sfort
hedesi
gn ofa
new i
nfor
mat
ionsyst
em. Syst
em anal
ysi
str
adi
ti
onal
lyi
nvol
vesade
tai
ledst
udy
of
:
[Link]
nfor
mat
ionneedsoft
heor
gani
zat
ionandt
heenduser
s.
[Link]
ivi
ti
es,r
esour
ces,andpr
oduct
sofanypr
esenti
nfor
mat
ionsyst
ems
3. Thei
nfor
mat
ionsyst
emscapabi
li
ti
esr
equi
redt
omee
tthei
nfor
mat
ionneeds
ofenduser
s.
Or
gani
zat
ionalAnal
ysi
s
Or
gani
zat
ional anal
ysi
s i
nvol
ves eval
uat
ing t
he or
gani
zat
ional and
envi
ronment
alsyst
ems and subsyst
ems i
nvol
ved i
n any si
tuat
ion. Syst
ems
anal
ysi
str
adi
ti
onal
lyi
nvol
vesadet
ail
edst
udyoft
heor
gani
zat
ions:
1. Envi
ronment
2. Managements
truct
ure
3. Peopl
e
4. Busi
nessact
ivi
ti
es
5. Envi
ronment
alsyst
emsi
tdeal
swi
th
6. Cur
renti
nfor
mat
ionsyst
ems
Anal
ysi
soft
hePr
esentSyst
em
Bef
ore desi
gni
ng a new syst
em,a de
tai
led anal
ysi
s oft
he cur
rent syst
em
(
manualoraut
omat
ed)mus
tbecompl
eted. An anal
ysi
soft
hepr
esentsyst
em
i
nvol
ves anal
ysi
ng act
ivi
ti
es,r
esour
ces,and t
he pr
oduct
s. You mustanal
yse
how t
hepr
esentsyst
em uses:
1. Har
dwar
e,sof
twar
e,peopl
eresour
cest
oconver
tdat
aresour
cesi
ntoi
nfor
mat
ion
pr
oduct
s,suchasr
epor
tsanddi
spl
ays.
2. Documenthow t
hei
nfor
mat
ion act
ivi
ti
esi
finput
,pr
ocessi
ng,out
put
,st
orage,
andcont
rolar
ebei
ngaccompl
ished.
Funct
ionalRequi
rement
sAnal
ysi
s
Thi
sst
epoft
hesyst
emsanal
ysi
sisoneoft
hemostdi
fficul
[Link]
epsi
nvol
ve:
KisPo Page | 24
1. De
ter
mini
ngspeci
fici
nfor
mat
ionneeds
2. De
ter
mini
ng t
he i
nfor
mat
ion pr
ocessi
ng capabi
li
ti
es r
equi
red f
oreach syst
em
act
ivi
ty(
input
,pr
ocessi
ng,out
put
,st
orage,and cont
rol
)to mee
tthe needs.
Goali
stoi
dent
ifyWhatshoul
dbedoneNOThow t
odoi
t.
3. Devel
op f
unct
ionalr
equi
rement
s(i
nfor
mat
ion r
equi
rement
sthatar
enot
t
ied t
othehar
dwar
e,sof
twar
e,and peopl
eresour
cest
hatend user
spr
esent
ly
useormi
ghtusei
nthenew syst
em)
.
Syst
emsDesi
gn
Syst
em anal
ysi
s descr
ibes whata syst
em shoul
d do t
o mee
tthe i
nfor
mat
ion
needsofuser
s. Syst
em desi
gn speci
fieshow t
hesys
tem wi
llaccompl
ish t
his
obj
ect
ive. Syst
emsdesi
gn consi
stsofdesi
gn act
ivi
ti
es,whi
ch pr
oducesyst
ems
speci
ficat
ionssat
isf
yingt
hef
unct
ionalr
equi
rement
sdevel
oped i
nthesyst
ems
anal
ysi
sst
[Link]
ficat
ionsar
eusedast
hebasi
sfor
:
[Link]
twar
edevel
opment
[Link]
dwar
eacqui
sit
ion
[Link]
em t
est
ing
[Link]
heract
ivi
ti
esoft
hei
mpl
ement
ati
onst
age.
UserI
nter
face,Dat
a,andPr
ocessDesi
gn
The syst
ems desi
gn conceptf
ocuses on t
hree maj
orpr
oduct
s ordel
iver
abl
es,
t
hatshoul
dresul
tfr
om t
he desi
gn st
age. Syst
em desi
gn consi
sts oft
hree
act
ivi
ti
es:
[Link]
nter
faceDesi
gn
[Link]
aDesi
gn
[Link]
ocessDesi
gn
UserI
nter
faceDesi
gn:
Useri
nter
facedesi
gnf
ocuseson suppor
tingt
hei
nter
act
ionsbe
tween enduser
s
andt
hei
rcomput
er-
basedappl
icat
ions. Desi
gner
sconcent
rat
eon:
Thedesi
gnofat
tract
iveandeffici
entf
ormsofuseri
nputandout
put
,such
aseasy-
to-
useI
nter
netori
ntr
ane
twebpages
Desi
gni
ngme
thodsofconver
tinghuman-
readabl
edocument
stomachi
ne-
r
eadabl
einput
,suchasopt
icalscanni
ngofbusi
nessf
orms.
Desi
gnt
ipst
okeepi
nmi
nd:
KisPo Page | 25
o Keepi
tsi
mpl
e
o Keepi
tcl
ean
o Or
gani
zel
ogi
cal
ly
Useri
nter
facedesi
gni
sfr
equent
lyapr
otot
ypi
ngpr
ocess,wher
ewor
kingmodel
s
or pr
otot
ypes of user i
nter
face me
thods ar
e desi
gned and modi
fied wi
th
f
eedbackf
rom enduser
[Link]
nter
facedesi
gnpr
oducesde
tai
ledspeci
ficat
ions
f
ori
nfor
mat
ionpr
oduct
ssuchas:
[Link]
spl
ayscr
eens
2.I
nter
act
iveuser
/comput
erdi
alogues
[Link]
oresponses
[Link]
ms
[Link]
s
[Link]
ts.
Dat
aDesi
gn
Thedat
adesi
gnact
ivi
tyf
ocusesont
hedesi
gnoft
hes
truct
ureofdat
abasesand
fil
es t
o be used by a pr
oposed i
nfor
mat
ion syst
em. Dat
a desi
gn f
requent
ly
pr
oducesadat
adi
cti
onar
y,whi
chcat
aloguesdet
ail
eddescr
ipt
ionsoft
he:
1. At
tri
but
esorchar
act
eri
sti
csoft
heent
iti
es(
obj
ect
s,peopl
e,pl
aces,event
s)about
whi
cht
hepr
oposedi
nfor
mat
ionsyst
em needst
omai
ntai
ninf
ormat
ion.
2. Rel
ati
onshi
pst
heseent
iti
eshavet
oeachot
her
.
3. Speci
ficdat
ael
ement
s(dat
abases,fil
es,r
ecor
ds,e
tc.
)thatneedt
obemai
ntai
ned
f
oreachent
ityt
rackedbyt
hei
nfor
mat
ionsyst
em
4. I
ntegr
ityr
ulest
hatgover
n how each dat
ael
ementi
sspeci
fied and used i
nthe
i
nfor
mat
ionsyst
em.
Pr
ocessDesi
gn
Thepr
ocessdesi
gnact
ivi
tyf
ocuseson t
hedesi
gn ofsof
twar
eresour
ces,t
hati
s,
comput
er pr
ogr
ams and ofpr
ocedur
es needed by t
he pr
oposed i
nfor
mat
ion
syst
em. I
tconcent
rat
eson devel
opi
ng de
tai
led speci
ficat
ionsf
ort
hepr
ogr
am
modul
est
hatwi
llhavet
obepur
chased assof
twar
epackagesordevel
oped by
cust
om pr
ogr
ammi
[Link]
ocessdesi
gnpr
oduces:
1. De
tai
led pr
ogr
am speci
ficat
ionsand pr
ocedur
esneeded t
omee
ttheuser
i
nter
faceanddat
adesi
gnspeci
ficat
ionst
hatar
edevel
oped.
KisPo Page | 26
2. Pr
oducesspeci
ficat
ionst
hatmee
tthef
unct
ionalcont
rolandper
for
mance
r
equi
rement
sdevel
opedi
ntheanal
ysi
sst
age.
Syst
em Speci
ficat
ions
Syst
em speci
ficat
ion f
ocuseson defini
ngt
hesyst
emsspeci
ficat
ionsr
equi
redf
or
t
hepr
oposedi
nfor
mat
ionsyst
[Link]
cal
ly,i
tspeci
fies:
1. Har
dwar
eresour
ces(
machi
nesandmedi
a)
2. Sof
twar
eresour
ces(
progr
amsandpr
ocedur
es)
3. Ne
twor
kresour
ces(
communi
cat
ionsmedi
aandne
twor
ks)
3. Peopl
eresour
ces(
enduser
s& i
nfor
mat
ionsyst
emsst
aff)
.
4. How r
esour
ceswi
llbeused t
oconver
tdat
aresour
ces(
stor
ed i
n fil
esand
dat
abasest
heydesi
gn)i
ntoi
nfor
mat
ion pr
oduct
s(di
spl
ays,r
esponses,r
epor
ts,
anddocument
s).
Syst
em Devel
opment
-Impl
ement
ingaNew I
nfor
mat
ionSyst
em:
Once a pr
oposed i
nfor
mat
ion syst
em has been desi
gned, i
t mus
t be
i
mpl
ement
[Link]
emsi
mpl
ement
ati
onst
agei
nvol
ves:
1. Har
dwar
eandsof
twar
eacqui
sit
ion
2. Sof
twar
edevel
opment
3. Test
ingofpr
ogr
amsandpr
ocedur
es
4. Devel
opmentofdocument
ati
on
5. I
nst
all
ati
onac
tivi
ti
es
6. Educat
ion andt
rai
ningofenduser
sandspeci
ali
stswhowi
lloper
atet
he
new syst
em.
7. Conver
tingf
rom t
heuseoft
hepr
esentsyst
em t
otheoper
ati
onofanew or
i
mpr
ovedsyst
em.
Conver
tingt
oanew syst
em mayi
nvol
ve:
Par
all
elSyst
em -Oper
ati
ngbot
h anew syst
em and an ol
d syst
em att
he
samet
imef
orat
rialper
iod.
Pi
lotSyst
em -Oper
ateapi
lotsyst
em onat
rialbasi
satonel
ocat
ion.
Phasi
ng-Phasi
ngi
nthenew syst
em oneappl
icat
ionorl
ocat
ionatat
ime.
Pl
unge(
Cut
over
)-Conver
tingi
mmedi
ate
lyt
othenew syst
em.
Mai
ntenanceofI
nfor
mat
ionSyst
ems
KisPo Page | 27
Syst
emsmai
ntenance i
sthefinalst
age oft
hesyst
emsdevel
opmentcycl
e. I
t
i
nvol
ves t
he moni
tor
ing, eval
uat
ing, and modi
fyi
ng of a syst
em t
o make
desi
rabl
eornecessar
yimpr
ovement
[Link]
smayi
ncl
ude:
1. Posti
mpl
ement
ati
on r
evi
ew pr
ocesst
oensur
ethatt
henew syst
em mee
ts
t
heobj
ect
ivesest
abl
ishedf
ori
t.
2. Er
rorde
tect
edi
nthedev
elopmentoruseoft
hesyst
em ar
ecor
rect
ed.
3. Lat
er modi
ficat
ions t
o a syst
em may al
so become necessar
y due t
o
changeswi
thi
nthebusi
nessort
hebusi
nessenvi
ronment
.
KisPo Page | 28
THEORY
CONTENT
Problem Indicators
Cont
ent
sofA Ter
msofRef
erence(
TOR)
A ToR i
saf
ormaldocument
,buti
tist
ypi
cal
lynotver
ylong.I
tcan beusedt
o
descr
ibea pr
ojectbef
orea f
ullpr
ojectchar
ter(
orpr
ojecti
nit
iat
i )i
on document s
pr
oduced.I
tis mor
etypi
cal
ly used t
o se
toutt
he t
erms ofr
efer
ence f
or a
par
ticul
arwor
kst
ream orsub-
proj
ect
,and i
swr
itt
en by t
hepr
ojectmanager
wi
thi
nputf
rom t
hef
unct
ionall
ead whoi
smanagi
ngt
hatsect
ion oft
hewor
k.
You coul
d al
sopr
oduceonef
ora phaseoft
hepr
oject
,forexampl
e,t
hei
nit
ial
scopi
ngphase.I
nshor
t,aToR cancovermanyt
hingsbutgener
all
yse
tsoutt
he
scope of what needs t
o be done on a par
ticul
ar pi
ece of wor
k.
TheToR documenti
ncl
udes:
Backgr
ound
KisPo Page | 29
Thecont
extf
ort
hewor
k,t
heover
allai
msoft
hewor
k and any r
efer
encest
o
ot
herpi
ecesofwor
kthatt
het
eam shoul
dtakei
ntoaccountwhen commenci
ng
t
hewor
k.
Obj
ect
ives
Whati
sthi
spi
eceofwor
k goi
ngt
oachi
eve
?Whatpr
obl
em i
sitgoi
ngt
osol
ve?
Theseshoul
dbese
touti
nawayt
hatever
yonecanunder
stand,avoi
dingj
argon.
Scope
Thi
ssect
ion br
ieflycover
swhati
sin scopeand outofscopeoft
hewor
k.I
tis
easi
estt
oli
stt
hisi
nbul
letpoi
ntf
ormat
,asi
fmor
ede
tai
lisr
equi
redt
hiscanbe
pr
oducedi
n af
ullr
equi
rement
sdocument
.Bul
letpoi
ntsi
nthi
ssect
ion shoul
d
coverar
easl
ike:
Thet
echni
calsyst
emsi
nvol
vedort
hatar
erequi
red
Thebusi
nesspr
ocessest
hatwi
llbeaffect
edbyt
hiswor
k
Whathar
dwar
eandsof
twar
eisr
equi
red(
orspeci
fical
lyoutofscope)
Wher
ethepr
ojectwi
llt
akepl
ace,whatl
ocat
ionsar
eaffect
ed and what
l
ocat
ionswi
llbeoutofscopef
ort
hepur
poseoft
hiswor
k
Whatt
hir
dpar
tieswi
llbei
nvol
ved
Whowi
llbeaffect
ed,and whi
ch t
eamsori
ndi
vidual
swi
llspeci
fical
lybe
outofscope.
You wi
llpr
obabl
ythi
nkofot
hert
hingst
oincl
udei
nthescope.A goodt
ipi
sto
br
ingt
het
eam t
oge
ther(
ifyoudon’
thaveaf
ullt
eam t
oge
theratt
hispoi
ntbr
ing
t
oge
thersomecol
leagues)
.
Const
rai
nts
Thi
sshor
tsect
ion document
sanypr
ojectconst
rai
nts,such ast
imescal
es,t
he
avai
labl
e budge
t,t
he r
esour
ces avai
labl
e or any l
egi
slat
ive or r
egul
ator
y
f
ramewor
kst
hathavet
obeconsi
der
ed.
KisPo Page | 30
Assumpt
ions
I
ncl
udeanyassumpt
ionsi
[Link]
ethi
ngt
hatyoudon’
tye
tknow f
or
cer
tai
n butt
hatwi
llhavean i
mpacton t
hepi
eceofwor
klat
eron.I
fyou ar
e
updat
ingyourToR l
ateryou can updat
ethi
ssect
ion asyou maywel
lhavebeen
abl
etor
ati
fyyourassumpt
ionsbyt
hen.
Rol
esandr
esponsi
bil
iti
es
Whoi
sont
het
eam?I
nthi
ssect
iondocumentt
henamesandr
olesoft
hepeopl
e
whowi
llbecar
ryi
ngoutt
hewor
[Link] can al
soi
ncl
udet
hei
ravai
labi
li
ty,such
asi
ftheyar
eonl
yavai
labl
etowor
kont
hepr
ojec
[Link]
soi
ncl
ude
de
tai
ls ofwho i
s sponsor
ing t
he wor
k.I
fiti
sa f
ullpr
oject
,thi
s wi
llbe t
he
pr
ojectsponsor
.Ifi
tisawor
kst
ream orpar
tofanexi
sti
ngpr
oject
,theper
sont
o
whom t
hewor
kst
ream l
ead r
epor
ts(
probabl
yyou,t
hepr
ojectmanager
)ist
he
r
ightper
sont
oment
ionher
e.
Del
iver
abl
es
Whati
sthewor
kgoi
ngt
odel
iver
?Makeal
ist–i
tdoesn’
thavet
obet
oode
tai
led
att
hispoi
ntasal
lyou r
eal
lyneed i
sahi
gh l
eve
ldescr
ipt
ion oft
heout
put
sof
t
hewor
[Link] coul
dincl
udeascr
eenshotoft
hehi
gh l
evelmi
lest
onesf
rom your
pr
ojectpl
anher
etoo.
For
mat
I
deal
ly,you shoul
d ai
mtoge
tyourToR on acoupl
[Link]
eisnoneed
f
oraf
ancycoverpageorappendi
[Link]
oot
eron t
hedocument
and ge
tst
art
ed!You can al
waysi
ncl
udever
sion cont
roli
nfor
mat
ion i
n ashor
t
t
abl
eatt
hebegi
nni
ngorend.
Ot
herusesf
oraToR
Youcanal
sose
toutaToR f
ormee
tings,soyourPr
ojectBoar
dorSt
eer
ingGr
oup
mayhavea ToR t
hatexpl
ainswhatt
heyar
ether
etodoand how t
heywi
llgo
KisPo Page | 31
aboutconduct
ingt
hebusi
nessofgover
nanceorover
sighton t
hepr
oject
.You
coul
dal
sohaveonef
orot
hert
ypesofmee
tings,suchasat
ermsofr
efer
encef
or
r
iskmanagementmee
[Link]
ongast
heToR cl
ear
lyse
tsoutt
hescopeofan
act
ivi
tyandexpl
ainswhati
sal
sooutofscope,t
heni
twi
lldoi
tsj
ob.
THEORY
CONTENT
I
ntr
oduct
ion
The pr
ocess ofanal
yzi
ng whe
ther t
he pr
oposali
sfeasi
ble or not i
s cal
led
f
easi
bil
ityanal
ysi
s.i
fiti
snotf
easi
ble,weneedt
olook af
terot
heral
ter
nat
ives.
Feasi
bil
ityst
udymai
nlyf
ocuseson t
hedemand oft
hesyst
em t
hataffect
sthe
over
alldevel
opmentoft
hei
nfor
mat
ionsyst
em.
I
tis an assessmentoft
he pr
act
ical
ity ofa pr
oposed pl
an orme
[Link]
ch
hel
pst
ofindt
hest
rengt
hsandweaknessesofan exi
sti
ngbusi
nessorpr
oposed
vent
ure,oppor
tuni
ti
esand t
hreat
spr
esenti
ntheenvi
ronment
,ther
esour
ces
r
equi
redt
ocar
ryt
hrough,andul
ti
mat
elyt
hepr
ospect
sforsuccess.
Feasi
bil
ityst
udyi
susedf
or:
KisPo Page | 32
[Link] de
ter
mine whe
thert
he obj
ect
ives st
ated i
nthe assi
gnmentbr
iefar
e
r
easonabl
y at
tai
nabl
e wi
thi
nthe l
imi
tat
ion and financi
al const
rai
nts
per
iod.
[Link]
orpr
obl
em ar
eas,sot
hatt
hesyst
em anal
ystcan pl
an t
he
st
rat
egyf
ort
hefiel
dinv
est
igat
ion.
[Link] ar
easwher
epot
ent
ialexi
stsf
ormaki
ngsavi
ngi
n money
,ti
meor
effor
t.
[Link]
ter
minet
heappr
oxi
mat
eti
mer
equi
redf
ort
hef
ulli
nvest
igat
ion and
cost
.
[Link]
scovert
hear
easwher
esomespeci
ali
stknowl
edgeneededf
ort
hef
ull
i
nvest
igat
ion.
Ther
ear
edi
ffer
entt
ypesoff
easi
bil
ityst
udy
...whi
char
eincl
udes:
,
Techni
calf
easi
bil
ity
Economi
calf
easi
bil
ity
Oper
ati
onalf
easi
bil
ity
Schedul
efeasi
bil
ity
Techni
calf
easi
bil
ity
I
tmeasur
eoft
heavai
labi
li
ty oft
echni
calr
esour
ces(
har
dwar
ecomponent
sor
t
echni
calequi
pment
).I
tal
sost
udi
est
heavai
labi
li
tyoft
het
echni
calmanpower
f
ort
hepr
oject
.[i
fthewor
k per
for
mancesoft
het
echni
calmanpowerar
enot
exper
ienced,t
heent
iresyst
em wi
llbecer
tai
nlyi
nsuffici
ent
.]
Economi
calf
easi
bil
ity
Economi
calf
easi
bil
itymeasur
eswhe
therfinances(
invest
ment
s)ar
eavai
labl
efor
pr
oposedsol
uti
on,i
.e.i
tlooksatt
hefinanci
alaspect
s(cost
/effect
iveness)oft
he
pr
oject
.Thi
sisof
tencal
ledacost
-benefitanal
ysi
s.
Oper
ati
onalf
easi
bil
ity
I
tisa measur
eofhow wel
lthesol
uti
on ofpr
obl
emsora speci
fical
ter
nat
ive
sol
uti
on wi
llwor
kint
he or
gani
zat
ion.I
tis al
so measur
e ofhow peopl
efeel
aboutt
hesyst
em.I
fthesyst
em i
snoteasyt
ooper
ate,t
han oper
ati
onalpr
ocess
KisPo Page | 33
woul
d bedi
fficul
[Link]
atoroft
hesyst
em shoul
d begi
ven pr
opert
rai
ning.
Thesyst
em shoul
dbemadesucht
hatt
heusercani
nter
facet
hesyst
em wi
thout
anypr
obl
em.
Schedul
efeasi
bil
ity
I
fa deadl
ine(
ti
me-
li
mit
)isest
abl
ished,i
tiscal
led schedul
efeasi
bil
ity
,i.
ethe
deadl
ineoft
hepr
ojecti
sst
udi
edundert
heschedul
edf
easi
bil
ity
.Theschedul
ed
f
easi
bil
ityi
sal
sodependsupon avai
labl
emanpowerand economi
calcondi
ti
on
aswe
ll.
Legal
/Et
hicalFeasi
bil
ity -Whatar
ethel
egali
mpl
icat
ionsoft
hepr
oject
?
Whatsor
tofe
thi
calconsi
der
ati
onsar
ether
e?You need t
omakesur
ethatany
pr
ojectunder
takenwi
llmee
tal
llegalande
thi
calr
equi
rement
sbef
oret
hepr
oject
i
sont
het
abl
e.
Resour
ceFeasi
bil
ity -Doyou haveenough r
esour
ces,whatr
esour
ceswi
ll
ber
equi
red,whatf
aci
li
ti
eswi
llber
equi
redf
ort
hepr
oject
,et
c.
This involves collection of information about the existing system on which to base
analysis in order to determine whether users current needs are being met.
Fact gathering
KisPo Page | 34
Fact recording
Fact evaluation
The widely used methods for data collection include the following:
a) Questionnaires
b) Interviews
c) Observations
d) Records inspection/ document reviews
e) Sampling
A. Questionnaires
Questionnaire is a special document that allows the analyst to ask a number of standard
prepared questions set to be asked to a large number people in order to gather
information from them.
Suitability:
The system analyst is located at a considerable long distance from the respondents
There is a large number of respondents such that interviewing them will be limited by
time
The questions to be asked are simple and straight forward and require direct answers
Limited information is required from a large number of people
Used as a means to verify facts found using other methods
I. They provide a cheap means of gathering information from a large number of people.
II. They encourage individual to provide response without fear, intimidation or
victimization
III. The respondents can complete the questionnaires at their own convenient time with
minimal interruption from their work
IV. Questionnaires are presented consistently to all participating without bias.
Disadvantages
KisPo Page | 35
I. Response is often too slow since the respondents complete and return the forms at their
own convenience
II. They don’t provide an opportunity for respondents to obtain clarification of questions
which may appear vague or ambiguous
III. The design of questionnaires require an expert who may charge expensively and may not
be economical when administered to a small group of respondents
IV. All forms may not be returned and not all questions may be answered which leads to
incomplete data for analysis
This is a face to face conversation between the analyst ( the interviewer) and the users
( interviewee). The analysts will obtain answers to questions he asks the interviewee.
The interviewee will give suggestions and recommendations that may assist during the
design of the proposed system.
i. They act as a method of fact finding to gather information or responses about the existing
system
ii. Used for verifying facts gathered through other methods
iii. Used to get the user involved in the development of the new system
KisPo Page | 36
Advantages of interviews
Disadvantages
i. They are costly and time consuming when large groups are involved
ii. Success depends highly on the analysts competence, human relations skills and
experience
iii. The respondents may feel that they are being grilled
C. Observations
This is the most effective fact finding technique but requires the analyst to participate in
performing some activities carried out by the user. The analyst may choose to watch
users as they perform their activities and gather the facts intended
Advantages
Data gathered is highly reliable thus the method can be used to verify facts collected
through other methods
There is an opportunity for the analyst to see what happens exactly including the tasks
which are hard to explain clearly in words.
In accurately described tasks can easily be identified
Relatively cheap compared to other methods
KisPo Page | 37
Disadvantages
People always feel uncomfortable when being observed and may behave abnormally thus
influencing the analyst conclusion.
The exercise may take place at odd times thus inconveniencing those involved
The analyst may observe exceptional activities leaving some critical areas.
KisPo Page | 38
1. The determination of information needs of the organization and the end users.
2. The analyst will be able to identify activities, resources, and products of any present /
current information systems
3. The analysis will reveal information systems capabilities required to meet the
information needs of end users.
Model –driven: there are mainly four approaches used in model driven namely:
A system design technique that decomposes the system’s processes into manageable
components.
KisPo Page | 39
o Prototyping
Has an Iterative process involving a close working relationship between the designer and
the users.
Key Benefits:
• Endorses philosophy that end-users won’t know what they want until they
see it.
KisPo Page | 40
o Object-oriented Analysis
Objected oriented analysis mainly uses USE cases and CASE diagrams. Use cases are a
different way to model the business functionality of a business process that facilitates the
development of information systems to support that process. Although common in object
oriented systems analysis and design, use case modeling can also be used with more
traditional methods for business process.
USE Case: A USE Case shows the behavior or functionality of a system. It consists of a set
of possible sequences of interactions between a system and a user in a particular
environment, possible sequences that are related to a particular goal. A use case
KisPo Page | 41
describes the behavior of a system under various conditions as the system responds to
request from principal actors
A principal actor initiates a request of the system, related to a goal, and the system
responds. A use case can be stated as a present-tense verb phrase ( what the system is
supposed to do) and the object of the verb ( what the system is to act on ). For example,
use case names would include Enter Sales Data, Compute Commission, Generate
quarterly Reports
A use case model consists of actors and use cases. An actor is an external entity that
interacts with the system. It is someone or something that exchanges information with
the system.
Bill Student
Instructor
Bursar’s Office
Object oriented analysis and design (OOAD ) is a development approach whose concern
is to model the real world objects into a software. An object is a thing whose
characteristics can be described. In the object oriented paradigm all living things and non
living things are considered objects. And as such when a programmer is developing a s/w
for an organization, he/she must consider all objects of interest to the organization and
capture them in the software. Some of the objects may have real tangible existence such
as employees’ vehicles, chairs, tables etc. The goal of OOAD is to make systems elements
KisPo Page | 42
more reusable, thus improving system quality and the productivity of systems analysis
and design.
However some of the objects may have an abstract existence and therefore not visible or
tangible, but the programmer must include them in the software as they are of interest to
the organization.
Object oriented support the basic concept of a true OOP language namely:
Flow charts
FLOWCHARTS.
It is a chart that demonstrates the logical sequence of events that must be performed to solve a
problem.
KisPo Page | 43
Types of Flowcharts.
A System flowchart is a graphical model that illustrates each basic step of a data processing system.
It illustrates (in summary) the sequence of events in a system, showing the department or function
responsible for each event.
This is a diagram that describes, in sequence, all the operations required to process data in a
computer program.
A Flowchart is constructed using a set of special shapes (or symbols) that have specific meaning. Symbols
are used to represent operations, or data flow on a flowchart.
Each symbol contains information (short text) that describes what must be done at that point.
The symbols are joined by arrows to obtain a complete Flowchart. The arrows show the order in which
the instruction must be executed.
Below is a standard set of symbols used to draw program flowcharts as created by American National
Standard Institute (ANSI).
1. Terminal symbol.
It is used to indicate the point at which a flowchart, a process or an algorithm begins & ends.
√ All Flowcharts must have a START & STOP symbol. The START/BEGIN symbol is the first symbol of a
flowchart, & identifies the point at which the analysis of the flowchart should begin. The
STOP/END symbol is the last symbol of a flowchart, & indicates the end of the flowchart.
KisPo Page | 44
√ The words Begin & End (or Start & Stop) should be inserted in the Terminal symbol.
(Parallelogram)
For example;
Note. The words mostly associated with I/O operations are READ & PRINT. READ describes the entry
of computer data, while PRINT relates to the printed output of information.
3. Process symbol.
(Rectangle)
- Process symbol is used to indicate that a processing or data transformation is taking place.
The information placed within the process symbol may be an algebraic formula or a sentence to
describe processing.
4. Decision symbol.
NO (Rhombus)
YES
KisPo Page | 45
(i). A question asked within the Decision symbol, that indicates the comparison / logical operation.
(ii). The results of the comparison (which are given in terms of YES or NO).
The arrows labeled YES or NO lead to the required action corresponding to the answer to the
question.
5. Flow lines.
Flow lines with arrowheads are used to indicate the direction of processing of the program logic, i.e.,
they show the order in which the instructions are to be executed.
The normal flow of a flowchart is from Top to Bottom, and Lef to Right.
6. Connector symbol.
Sometimes, a flowchart becomes too long to fit in a single page, such that the flow lines start
crisscrossing at many places causing confusion & also making the flowchart difficult to understand.
The Connector symbol is used as a connecting point for arrows coming from different directions.
A Connector symbol is represented by a Circle, and a letter or digit is placed within the circle to
indicate the link.
Note. Connectors do not represent any operation. They are used to connect two parts of a
flowchart, indicating that the flow of data is not broken.
1. A flowchart should have only one entry/starting point and one exit point (i.e., ensure that the
flowchart has a logical start and finish).
2. The flowchart should be clear, neat and easy to follow.
3. Use the correct symbol at each stage in the flowchart.
KisPo Page | 46
Connectors are helpful when a flowchart is several pages long, and where several loops are needed in
the logic of the flowchart.
Example 1:
Draw a flowchart for a program that can be used to prompt the user to enter two numbers, find the sum
and average of the two numbers and then display the output on the screen.
Start
X
,
Y
Sum = X + Y
Average = Sum/2
PRINT
Sum,
Average
Stop
Example 2:
Design a flowchart for a program that can be used to classify people according to age. If a person is more
than 20 years; output “Adult” else output “Young person”.
Start
A
g
e
A
Downloaded by Sylvance Otieno (syloti@[Link])
ul lOMoARcPSD|4907642
tStop
No
Yes
KisPo Page | 48
Modules
Flowcharting symbols can be applied to manual processes – how a person completes a
task – or to a computerized function – as a precursor to writing the program. The analyst
must often add information to make a process comprehensible to humans or to
machines. For example, the idea of gathering data or materials before beginning a
process may not be obvious at first. In this example, a person is calculating the average of
student scores on a quiz. Imagine yourself doing the task. In this first iteration, the main
functions are identified:
1. Write down the score for each student’s quiz
2. Add the score to the running total
3. Count the number of assignments
4. Divide the running total by the number of assignments
So far, so good. But a computer needs to be told much more:
1. Start the process of averaging student scores
2. Are the quizzes available?
a. If not, get them
b. If so, process
3. Running score = 0
4. Number of quizzes processed = 0;
5. while there are quizzes to process
a. get the score from this quiz
b. add the score to Running score
c. add 1 to the number of quizzes processed
6. Divide the Running score by the Number of quizzes processed
7. Store the answer
8. End the process
Since flowcharts are a graphic representation of the steps, the sequence is indicated by
arrows.
Note, though, that if there are many off-page connectors, the flowchart is probably too
big. In this case, reconsider the modularization: can you identify redundant processes or
processes whose level of granularity is inconsistent with others on the chart? In this
situation, you may prefer a different charting technique.
DATA FLOW DIAGRAMS (DFDS)
KisPo Page | 49
Data flow diagrams are used to represent the system being analysed. The
diagrams/symbols used for basic elements are:
Process
This is used to represent external entities or things which exist outside the system and
which send or receive messages from the system. This may be users or other systems and
they represent the source and destination( Sink) of the information flow that is being
modelled.
Data Store.
This corresponds to master file of data whether they are manual, computerized or a
database or any unit of stored data.
Data Flow
KisPo Page | 50
To construct a DFD we use the top-down approach which starts with the most high level
function and the major data flows in and out of this.
Note: we are still at the analysis stage of the systems development. And so we are
concerned with what we require of the system, how this will be achieved is left for the
design stage.
Step 1:
Start by identifying all the source and destination entities of the system to be modelled.
This is most likely a sub system of the total system which will have been partitioned into
management parts.
The nouns and noun phrases in the given scenario description will give a guide to
identify the Entities and Data Stores.
Step 2:
Step 3:
Refine the context diagram by identifying all the processes within the main systems
processes. The VERBs (action doing words) in the scenario description will help
identify these processes.
Step 4:
Begin at source and decide which process is to receive that input, then decide where the
output of that process is to go.
Repeat all these exercises for all the inputs and output processes. This will produce a full
data flow chain in a level 1 dfd.
Step 5:
From step 4, take each process in turn and repeat step 4 for each, drawing a separate
DFD for each process. These are the level 2 dfds.
KisPo Page | 51
Data dictionary
A data dictionary describes the data items found in data flow diagrams and entity
relationship diagrams. It provides a starting point for developing screen layouts, printed
reports and programming logic. It provides an opportunity to detect design errors. It is
maintained and expanded throughout the entire systems analysis and design process.
Example of Data Dictionary
completedEnrolmentForm = studentId
+ studentName
+ studentDateOfBirth
+ courseCode
+ courseEndDate
studentId = integer(6)
The first two digits represent the year of enrolment e.g. 07 for 2007. The remaining
four digits uniquely identify the student
studentNam = studentFirstName
+studentSurname
studentFirstName = char(15)
up to 15 characters are allowed
surname = char(15)
or family name. Up to 15 characters are allowed
courseCode = char(5)
up to five characters e.g. A0371 = Access to Computing course
Every courseCode has associated with it a courseTitle
KisPo Page | 52
checkedEnrolmentForm = enrolmentForm
+ lecturerName
+ dateLecturerSigned
lecturerName = initials
+ surname
initials = char(3)
up to three characters allowed
CourseFile = { courseRecord }
CourseFile contains zero, one or many courseRecords
courseRecord = courseTitle
+ courseCode
courseTitle = char(25)
up to 25 characters e.g. BTEC Nat Dip Comp Studies
Entity Life Histories (ELH) model the system from the viewpoint of how the
entities/information in a system evolves over time. What the ELHs show is the full set of
changes that can possibly occur to the entities/information within the system, together
with the context of each change.
Initially, each entity within a system is examined in isolation as this is a manageable unit
of information to model. It is the stimuli of the changes that are modelled rather than
the entity, a composite picture is formed, eventually specifying the full set of changes that
will occur within the system.
KisPo Page | 53
An ELH is a diagrammatic representation of the life of a single entity, from its creation to
its deletion. The life is expressed as the permitted sequence of events that can cause the
entity to change. An event may be thought of as whatever brings a process into action to
change entities, so although it is a process that changes the entity, it is the event that is
the cause of the change.
The events which affect one or more of the system entities during their lifetime in the
system.
A basic notation for describing graphically the chronological sequence in which the
events and event sub structures may occur.
The general form of an ELH follows certain conventions and has the appearance shown
in the figure below.
ENTITY
NAM E
ITERATION*
OFE VENTS
KisPo Page | 54
The general structure of an ELH as shown in figure one shows that there exist three
fundamental event types:
Birth Events
Death Events
The corresponding effects of these are that they cause an occurrence of the entity to be:
Thus the initial questions to ask when attempting to identify life history events are:
In figure one Birth event, Iteration of events and Death event are all leaf nodes, Middle
life events is an intermediate node. The root of the tree gives the name of the entity
whose life we wish to analyse. An ELH diagram is constructed for each entity in the ER
diagram.
The passage of time is assumed to be a uniform flow from left to right of the diagram. At
time zero in the life of an entity the system gets to know about it by virtue of the arrival of
one (or generally one of a set) of system events resulting in the creation of an occurrence
of the entity in the system. The middle life, the period between birth and death, is
typically a set of recurring or iterating events causing changes to the entity. This period
represents the majority of the life of the entity in the system, as such this part of the
KisPo Page | 55
diagram can get quite complex. Eventually, the life is terminated by the arrival of a
'death' event causing that entity occurrence to be deleted and removed from the system.
ELH Notation
The basic notation of life histories is used after event identification to record graphically
the sequence in which events and event sub-structures may legally occur. The number of
distinct symbols for initial ELH work is limited to only three, which together with the
convention for representing the passage of time, complete the notation. The symbols are:
Control Structures
1. Event Sequence
2. Event Selection
3. Event Iteration
KisPo Page | 56
E
NT
IT
YX
A B C D
The box labelled A will always be the first to occur, followed by B which in turn is
followed by C then D. This is the only possible sequence. Although the sequence
may be thought of as a progression through time, there is no indication of the time
intervals between the boxes within a sequence. These could span minutes, hours, days, or
years.
Event Selection
A selection defines a number of effects or nodes that are alternatives to one another at a
particular point in the ELH. Note that one, and only one, of two or more possible events
will occur at a particular time in a sequence. A selection is represented by a set of boxes
with circles in the top right corners as shown in figure three.
E
NTIT
Y X
A B C D
E F G
As node A is at the beginning of the ELH, this diagram shows that an occurrence of entity
X must be created by only one of three events: E, F or G.
Event Iteration
KisPo Page | 57
An iteration is where an effect or node may be repeated any number of times at the same
point within an ELH. A restriction upon the iteration is that each occurrence of the
iteration must be complete before the next begins. This is most relevant where a node is
being repeated. An iteration is represented by an asterisk in the top right-hand corner of
a box as shown in figure four.
E
NTIT
Y X
A B C D
*
E F G H
After entity X has been created by E, F or G, the event H may affect the entity any
number of times. Here it is important to note that 'any number of times' includes none,
so an iteration is another way of showing that something may or may not occur.
An ELH structure can extend to several levels of detail where each level is represented by
a horizontal bar, immediately above which will be a group heading and below it the
'details' which collectively describe the construct of the heading.
KisPo Page | 58
Imagine that Maurice has decided to open a bank account at Cash & Grabbs Bank. When
Maurice has persuaded Mr Cash, the manager, that he would be suitable as a customer,
Mr Cash turns to his computer terminal and records Maurice's new bank account code in
the system. The ER diagram of the bank computer system contains an entity called Bank
Account. The event occurrence that creates the Maurice occurrence of the entity Bank
Account is the opening of the account by Mr Cash.
Jonnes is another customer at the bank, the event occurrences that affect his bank
account are:
Other accounts may behave in similar ways, none of which are precisely the same.
However, it is possible to build up a general picture that will fit all occurrences of Bank
Accounts at the Cash & Grabbs Bank. Basically, all accounts are opened, and several
deposits and several withdrawals may be made. The way that these events affect the
entity Bank Account is shown in figure five.
KisPo Page | 59
Bank
Account
*
Transaction
Figure Five ELH for Bank Account (Cash & Grabb Bank)
This ELH shows that the first event to affect the entity Bank Account will be Account
Opened for all occurrences. Next, the account has a life which is a series of transactions.
Each Transaction is one of: a Pay Deposit, a Direct Deposit, or a Cheque Cashed. After an
undefined number of Transactions have taken place, the Account will be closed and
finally deleted.
KisPo Page | 60
THEORY
108 By the end of this topic, the trainee should be able to:
b) explain qualities
CONTENT
KisPo Page | 61
KisPo Page | 62
maintained.
The degree to which a system or component facilitates the
establishment of test criteria and the performance of tests to
Testability
determine whether those criteria have been met.
A conceptual data model identifies the highest-level relationships between the different
entities. Features of conceptual data model include:
Includes the important entities and the relationships among them.
No attribute is specified.
No primary key is specified.
The figure below is an example of a conceptual data model.
KisPo Page | 63
From the figure above, we can see that the only information shown via the conceptual
data model is the entities that describe the data and the relationships between those
entities. No other information is shown through the conceptual data model.
LOGICAL MODEL
A logical data model describes the data in as much detail as possible, without regard to
how they will be physical implemented in the database. Features of a logical data model
include:
Includes all entities and relationships among them.
All attributes for each entity are specified.
The primary key for each entity is specified.
Foreign keys (keys identifying the relationship between different entities) are
specified.
Normalization occurs at this level.
The steps for designing the logical data model are as follows:
1. Specify primary keys for all entities.
2. Find the relationships between different entities.
3. Find all attributes for each entity.
4. Resolve many-to-many relationships.
5. Normalization.
The figure below is an example of a logical data model.
KisPo Page | 64
Comparing the logical data model shown above with the conceptual data model diagram,
we see the main differences between the two:
In a logical data model, primary keys are present, whereas in a conceptual data
model, no primary key is present.
In a logical data model, all attributes are specified within an entity. No attributes
are specified in a conceptual data model.
Relationships between entities are specified using primary keys and foreign keys
in a logical data model. In a conceptual data model, the relationships are simply stated,
not specified, so we simply know that two entities are related, but we do not specify what
attributes are used for this relationship.
Physical data model represents how the model will be built in the database.
Logical Design-Summary
A logical design is a conceptual, abstract design. You do not deal with the physical
implementation details yet; you deal only with defining the types of information that you
need.
KisPo Page | 65
The process of logical design involves arranging data into a series of logical relationships
called entities and attributes. An entity represents a chunk of information. In relational
databases, an entity often maps to a table. An attribute is a component of an entity and
helps define the uniqueness of the entity. In relational databases, an attribute maps to a
column.
KisPo Page | 66
Comparing the physical data model shown above with the logical data model diagram, we
see the main differences between the two:
At this moment in time, the business requirements are already defined, the scope of
application has been agreed upon, and you have a conceptual design. So now you need to
translate your requirements into a system deliverable. In this step, you create the logical
and physical design for the data warehouse and, in the process, define the specific data
content, relationships within and between groups of data, the system environment
supporting your data warehouse, the data transformations required, and the frequency
with which data is refreshed.
In the logical design, you look at the logical relationships among the objects.
KisPo Page | 67
In the physical design, you look at the most effective way of storing and retrieving the
objects.
Your design should be oriented toward the needs of the end users. End users typically
want to perform analysis and look at aggregated/overall data, rather than at individual
transactions. Your design is driven primarily by end-user utility, but the end users may
not know what they need until they see it. A well-planned design allows for growth and
changes as the needs of users change and evolve.
Beginning with the logical design, you mainly focus on the information requirements
without getting bogged down immediately with implementation detail.
Input
Users deserve quality output. The quality of system input determines the quality of
system output. It is vital that input forms, displays, and interactive Web documents be
designed with this critical relationship in mind. Well-designed input forms, displays, and
interactive Web fill-in forms should meet the objectives of effectiveness, accuracy, ease of
use, consistency, simplicity, and attractiveness. All these objectives are attainable
through the use of basic design principles, the knowledge of what is needed as input for
the system, and an understanding of how users respond to different elements of forms
and displays.
Effectiveness means that input forms, input displays, and fill-in forms on the Web all
serve specific purposes for users of the information system, whereas accuracy refers to
design that ensures proper completion. Ease of use means that forms and displays are
straightforward and require no extra time for users to decipher. Consistency means that
all input forms, whether they are input displays or fill-in forms on the Web, group data
similarly from one application to the next, whereas simplicity refers to keeping those
same designs uncluttered in a manner that focuses the user’s attention. Attractiveness
implies that users will enjoy using input forms because of their appealing design
KisPo Page | 68
Process Design
The process design activity focuses on the design of software resources, that is, computer
programs and of procedures needed by the proposed information system. It
concentrates on developing detailed specifications for the program modules that will
have to be purchased as software packages or developed by custom programming.
Process design produces:
1. Detailed program specifications and procedures needed to meet the user interface
and data design specifications that are developed.
2. Produces specifications that meet the functional control and performance
requirements developed in the analysis stage.
Reports
Primarily used to convey large portions of data in the database. Output can be specially
formatted for a variety of purposes such as printing mailing labels.
Code design
The system design needs to be implemented to make it a workable system. This demands
the coding of design into computer understandable language, i.e., programming
language. This is also called the programming phase in which the programmer converts
the program specifications into computer instructions, which we refer to as programs. It
is an important stage where the defined procedures are transformed into control
specifications by the help of a computer language. The programs coordinate the data
movements and control the entire process in a system. It is generally felt that the
programs must be modular in nature. This helps in fast development, maintenance and
future changes, if required.
Database design
If you are making a database then you need to include an E-R Diagram. You should show
the diagram and explain what each of the relationships mean. For example:
KisPo Page | 69
If you are making a database you need to write about the SQL that you use to SELECT,
INSERT, UPDATE and DELETE things from your tables. In some cases you might
also be writing the code behind making the individual tables, the data definition
language. In fact those headings are exactly what you need to use.
Reserved words
When you are querying your database you might get some unexpected errors, where a
query fails to run when it doesn't appear to have any problem with it. This may be due to
using a reserved word in your query. SQL has a lot of reserved words, words that have
special meanings, and if you use one of these in a query it won't treat it as a field name.
For example:
This might bring up an error as Password is a reserved word in SQL. To get by this
problem you might want to change your fieldnames to something a little more sensible or
put the fieldname in square brackets:
Note: If you are not using a SQL server (for example, using MySQL with PHP) you may
need to use `backticks` instead of square bracket notation.
SELECT
This section should list all the SQL you have written that returns selections of records.
You should describe in plain English where the SQL is used and what it does and then
include the SQL with any annotations that you need. For example:
KisPo Page | 70
English Description:
This SQL statement selects the details (ID, Name, Price, Description) of a product which
has been selected by the user. So that the user can view the product detail on the preview
screen before buying the product
SQL:
INSERT
This section should list all the SQL you have written that inserts new records into your
database. You should describe in plain English where the SQL is used and what it does
and then include the SQL with any annotations that you need. For example:
English Description:
This SQL statement adds a new high score along with the date the score was achieved for
a users account.
SQL:
UPDATE
This section should list all the SQL you have written that updates an old record with new
details. You should describe in plain English where the SQL is used and what it does and
then include the SQL with any annotations that you need. For example:
English Description:
This SQL statement updates the date of birth of a user, after they have updated the form
that launches when they first log into the program.
SQL:
UPDATE USER
KisPo Page | 71
SET DoB=?
WHERE ID=?
If you have designed your database tables using a program such as Open ModelSphere
you can then define the code behind making your tables which you can then feed into
MySQL or MSSQL to create your database. Get some credit for this and list your DDL.
For example, the command to create a table named employees with a few sample
columns would be:
File design
Decision tables
A decision table is created by listing all the relevant variables (sometimes known as
conditions or inputs) and all the relevant actions on the left side of the table; note that
the variables and actions have been conveniently separated by a heavy horizontal line. In
this example, each variable is a logical variable, meaning that it can take on the value of
true or false.
In many applications, it is easy (and preferable) to express the variables as binary (true-
false) variables, but decision tables can also be built from multivalued variables; for
KisPo Page | 72
example, one could build a decision table with a variable called “customer-age” whose
relevant values are “less than 10,” “between 10 and 30,” and “greater than 30.”
Next, every possible combination of values of the variables is listed in a separate column;
each column is typically called a rule. A rule describes the action (or actions) that should
be carried out for a specific combination of values of the variables. At least one action
needs to be specified for each rule (i.e., for each vertical column in the decision table), or
the behavior of the system for that situation will be unspecified.
If there are N variables with binary (true-false) values, then there will be 2 N distinct rules;
thus, if there are 3 conditions, there will be 8 rules.
You must discuss each rule with the user to ensure that you have identified the correct
action, or actions, for each combination of variables. It is quite common, when doing
this, to find that the user has never thought about certain combinations of variables or
that they have never occurred in his or her experience.
Advantages of DT
1. The advantage of the decision table approach is that you can concentrate on one rule at
a time.
KisPo Page | 73
2. It does not imply any particular form of implementation. That is, when the systems
analyst delivers the decision table (along with the DFDs, etc.) to the
designer/programmer, there is a tremendous freedom of choice in terms of
implementation strategy: the decision table can be programmed with nested IF
statements, with a CASE construct or a GO TO DEPENDING ON construct in
COBOL; in the extreme case, a decision table code generator can automatically generate
code from the decision table. Thus, decision tables are often referred to as a
nonprocedural system modeling tool, for they do not require any specific procedural
algorithm to carry out the required actions.
To summarize, we must go through the following steps to create a decision table for a
process specification:
1. Identify all the conditions, or variables, in the specification. Identify all the values
that each variable can take on.
2. Calculate the number of combinations of conditions. If all the conditions are
binary, then there are 2N combinations of N variables.
3. Identify each possible action that is called for in the specification.
4. Create an “empty” decision table by listing all the conditions and actions along the
left side and numbering the combinations of conditions along the top of the table.
5. List all the combinations of conditions, one for each vertical column in the table.
6. Examine each vertical column (known as a rule) and identify the appropriate
action(s) to be taken.
7. Identify any omissions, contradictions, or ambiguities in the specification (e.g.,
rules in the decision table for which the specification does not indicate that actions
should be taken).
8. Discuss the omissions, contradictions, and ambiguities with the user.
Structured English
Decision Structure
Only IF a condition is true
Complete the following
Statements; otherwise, jump to the next statement
ELSE
Example code
IF code A is true
THEN implement action A
KisPo Page | 74
An ERD is a model that identifies the concepts or entities that exist in a system and the
relationships between those entities. An ERD is often used as a way to visualize a
relational database: each entity represents a database table, and the relationship lines
represent the keys in one table that point to specific records in related tables. ERDs may
also be more abstract, not necessarily capturing every table needed within a database,
but serving to diagram the major concepts and relationships.
KisPo Page | 75
Entities
Entities are concepts within the data model. Each entity is represented by a box within
the ERD. Entities are abstract concepts, each representing one or more instances of the
concept in question. An entity might be considered a container that holds all of the
instances of a particular thing in a system. Entities are equivalent to database tables in a
relational database, with each row of the table representing an instance of that entity.
Remember that each entity represents a container for instances of the thing in
question. The diagram below has an entity for “student” and another for “school.” This
indicates that the system being modelled may contain one or more students and one or
more schools.
STUDENT SCHOOL
Relationships
STUDENT SCHOOL
The diagram above now indicates that students may have some relationship with
schools. More specifically, there may be a relationship between a particular student (an
instance of the student entity) and a particular school (an instance of the school entity).
KisPo Page | 76
attends/
STUDENT SCHOOL
enrolls
Read the first relationship definition, “attends,” when tracing the relationship left to right
or top to bottom. Read the second definition, “enrols,” when tracing the relationship
right to left or bottom to top.
Symbols at the ends of the relationship lines indicate the optionality and the
cardinality of each relationship. “Optionality” expresses whether the relationship is
optional or mandatory. “Cardinality” expresses the maximum number of relationships.
As a relationship line is followed from an entity to another, near the related entity two
symbols will appear. The first of those is the optionality indicator. A circle ( )
indicates that the relationship is optional—the minimum number of relationships
between each instance of the first entity and instances of the related entity is zero. One
can think of the circle as a zero, or a letter O for “optional.” A stroke ( | ) indicates that
the relationship is mandatory—the minimum number of relationships between each
instance of the first entity and instances of the related entity is one.
The second symbol indicates cardinality. A stroke ( | ) indicates that the maximum
number of relationships is one. A “crows-foot” ( ) indicates that many such
relationships between instances of the related entities might exist.
KisPo Page | 77
In our model, we wish to indicate that each school may enrol many students, or may not
enrol any students at all. We also wish to indicate that each student attends exactly one
school. The following diagram indicates this optionality and cardinality:
STUDENT
Each school enrolls Each student attends
students school
SCHOOL
Bridge Entities
KisPo Page | 78
provides/
SUPPLIER PRODUCT
offered by
While this relationship model is perfectly valid, it cannot be translated directly into a
relational database design. In a relational database, relationships are expressed by keys
in a table column that point to the correct instance in the related table. A many-to-many
relationship does not allow this relationship expression, because each record in each
table might have to point to multiple records in the other table.
PROVIDES/
SUPPLIER PRODUCT
OFFERED BY
This diagram expresses the same relationship as the diagram above. Each instance of
the “provides” bridge entity indicates that a certain supplier can provide a certain
product.
KisPo Page | 79
supplier who sells it. Similarly, a supplier may not have a uniform delivery time; delivery
times may vary in relation to the product being delivered. Any attributes that are
dependent on the relationship would be associated with the relationship’s bridge entity.
Recursive Relationships
Instances of entities may have relationships with other instances of the same entity.
These relationships may be drawn with relationship lines that begin and end connected
to the same entity. Common occurrences of these recursive relationships include
parent/child relationships:
PERSON
father of/
child of
The diagram above indicates that a person may be the father of zero or many persons,
and that a person may have zero or one father. (Not every person’s father will be
recorded in the system, so the relationship is modeled as optional).
An entity may have multiple relationships with another entity. These are depicted in
the ERD with multiple relationship lines connecting the two entities
salesperson
EMPLOYEE CLIENT
The diagram above indicates that an employee may be the salesperson assigned to
zero or many clients, and an employee may be the customer service representative for
zero or many clients. Each client has exactly one salesperson and exactly one customer
service representative. Each client’s salesperson may or may not be the same employee
KisPo Page | 80
Entity Subtypes
There are times when it is convenient to depict relationships that apply to an entire
class of things, as well as depict relationships that apply only to certain types of the larger
class. Entity subtypes accommodate these relationship depictions. In the ERD, entity
subtypes may be depicted by entity boxes shown within larger entity boxes. The large
entity represents the class, and the smaller boxes depict the subtypes
INVENTORY
VEHICLE MODEL
MFG.
LOCATION
PART
The example above depicts an “inventory” entity, with the subtypes of “vehicle” and
“part.” A vehicle has one or many parts, and every part is associated with one and only
one kind of vehicle (according to this diagram, there are no interchangeable
components). All items in inventory, whether they are vehicles or parts, have a
manufacturing location, but only vehicles are of a particular model.
Structured charts
Usi
ngSt
ruct
ureChar
tst
oDesi
gnModul
arSyst
ems
Once the top-down design approach is taken, the modular approach is useful in
programming. This approach involves breaking the programming into logical,
manageable portions, or modules. This kind of programming works well with top-down
design because it emphasizes the interfaces between modules and does not neglect
them until later in systems development. Ideally, each individual module should be
functionally cohesive so that it is charged with accomplishing only one function.
KisPo Page | 81
1. Modules are easier to write and debug because they are virtually self-contained.
Tracing an error in a module is less complicated, because a problem in one module
should not cause problems in others.
2. Modules are easier to maintain. Modifications usually will be limited to a few modules
and will not be spread over an entire program. A third advantage of modular design is
that modules are easier to grasp, because they are self contained subsystems. Hence, a
reader can pick up a code listing of a module and understand its function.
1. Keep each module to a manageable size (ideally including only one function).
2. Pay particular attention to the critical interfaces (the data and control variables that are
passed to other modules).
3. Minimize the number of modules the user must modify when making changes.
4. Maintain the hierarchical relationships set up in the top-down phases.
The recommended tool for designing a modular, top-down system is called a structure
chart. A structure chart is simply a diagram consisting of rectangular boxes, which
represent the modules, and connecting arrows.
Figure illustrated below is a set of modules used to change a customer record, shows
seven modules that are labeled 000, 100, 110, 120, and so on. Higher-level modules are
numbered by 100s, and lower-level modules are numbered by 10s. This numbering
allows programmers to insert modules using a number between the adjacent module
numbers. For example, a module inserted between modules 110 and 120 would receive
number 115.
KisPo Page | 82
Ideally, the analyst should keep this coupling to a minimum. The fewer data couples and
control flags one has in the system, the easier it is to change the system. When these
modules are actually programmed, it is important to pass the least number of data
couples between modules.
Even more important is that numerous control flags should be avoided. Control is
designed to be passed from lower-level modules to those higher in the structure. On rare
occasions, however, it will be necessary to pass control downward in the structure. When
control is passed downward, a low-level module is allowed to make a decision, and the
result is a module that performs two different tasks. This result violates the ideal of a
functional module: It should perform only one task.
Even when a structure chart accomplishes all the purposes for which it was drawn, the
structure chart cannot stand alone as the sole design and documentation technique.
First, it doesn’t show the order in which the modules should be executed (a data flow
diagram will accomplish that). Second, it doesn’t show enough detail (Structured English
will accomplish that)
KisPo Page | 83
Other
There are several approaches or methodologies that can be used. Among them include:
structured
The aim of the structured approach is to build a new and better system and not just
improve the old system. It is essentially a team approach and therefore applicable to
large project. The approach make use of data flow diagrams and structure charts with
accompanying documentation to define a logical method of what is required, leaving the
how implementation until later.
b ) together with any new requirements, produce a logical model of the full specification.
This model specifies what is required.
NOTE:
The specifications done in a structured approach needs to be concise, easy to amend and
capable of top-down development. That is, we start with a whole problem and identify
within it, component parts and then parts of the parts etc. This builds a hierarchy of
details down to the most basic level. In order to identify the parts, we use a data flow
diagrams and from this we derive structure charts, then individual modules or
component of the structure charts can be written up in design language called PSEUDO
codes or Structured English.
Traditional method/approach
KisPo Page | 84
Prototyping
The prototype is a working version of an information system or part of the system but it
is meant to be only a preliminary model. Once operational the prototype will be further
refined until it conforms precisely to users requirements. Once the design has been
finalized the prototype can be converted to a polished production system.
The process of building a preliminary design, trying it out, refining it and trying it again
has been called an iterative process of systems development because the steps required to
build the system can be repeated over and over again and it actively promotes system
design changes. It has been said that prototyping replaces unplanned rework with
planned iteration with each version more accurately reflecting users requirements.
KisPo Page | 85
No
Step 1 Identify the users basic requirements. The system designer (usually an information
systems specialist) works with the user only long enough to capture their basic needs.
Step 2 Develop an initial prototype. The system designer creates a working prototype quickly
using 4th generation software, interactive multimedia or computer aided software
engineering (CASE) tools.
Step 3 Use the prototype. The user is encouraged to work with the system in order to determine
how well the prototype meets their needs and to make suggestions for improving the
prototype.
Step 4 Revise and enhance the prototype. The system builder notes all the changes the user
requests and refines the prototype accordingly. After the prototype has been revised the
cycle returns to step 3 and steps 3 and 4 are repeated until the user is satisfied.
KisPo Page | 86
From the technical point of view there are three major stages in Jackson System
Development, each divided into steps and sub-steps:
In the modeling stage the developers make a description of the aspects of the business or
organization that the system will be concerned with. To make this a description they
must analyze their business, choosing what is relevant and ignoring what is not. They
have to consider the organization as it will be, not as it is now.
The model description is written very precisely. This precision forces the developer to ask
detailed questions. It encourages good communication and understanding between
developers, users, and everyone else involved with the new system.
KisPo Page | 87
The model description consists of actions, entities and related information. An action is
an event, usually in the external reality, that is relevant to the system and whose
occurrence the system must record. In implementation terms, actions might cause
database updates. We start Jackson System Development by making a list of actions with
definitions and associated attributes. Diagrams describe ordering relationships between
actions. The diagrams describe the entities, people or, things that the system is
concerned with.
The data that is to be stored for each entity is then defined. In effect we are choosing
what is to be remembered by each entity about the actions that affect it. The full
definition of this data includes an elaboration of the entity diagram to show in detail the
update rules.
The result of the modeling stage is a set of tables, definitions and diagrams that describe:
in user terms exactly what happens in the organization and what has to be
recorded about what happens, and
in implementation terms, the contents of the database, the integrity constraints
and the update rules.
In the network stage we build up a precise description of what the system has to do,
including the outputs that are to be produced and the way the system is to appear to the
user. This description is in terms of a network of programs. We start this network by
making one program for each of the entities that was defined during the modeling stage.
The network is then built up incrementally by adding new programs and connecting
them up to the existing network. New programs are added for the following reasons:
To collect inputs for actions, check them for errors, and pass them to the entity
programs. In this way entity programs are kept up-to-date with what's happening
outside;
To generate inputs for actions that do not correspond to external events. Such
actions are substitutes for real world events, perhaps because those events cannot be
detected;
To calculate and produce outputs.
KisPo Page | 88
There are two means of connecting programs in the network. These are by data streams
(represented on our network diagram of circles) and by state vector inspection
(represented on our network diagrams by diamonds). Whatever kind of connection is
appropriate, the entity programs play a pivotal role in the construction of the network.
Most of the new programs can be connected directly to the entity programs.
We draw a whole set of network diagrams to describe the system. Different networks
usually only have entity programs in common. The complete system is represented by the
overlay of all the diagrams.
The diagrams are supported by textual information describing the contents of the data
streams and state vector connections. The new programs that are added to the network
are defined using the same diagrammatic notation used to describe the ordering of
actions. These new programs are designed using the JSP (Jackson Structured
Programming) method, which is now a subset of JSD.
The result of the implementation stage is the final system. This stage is the only one
directly concerned with the machine and the associated software on which the system is
to run. Therefore, as well as producing and testing code, the implementation stage covers
physical design issues. In particular it covers:
Physical data design is about the design of files or databases. The details of database
design depend on the particular DBMS being used. However, the necessary information
about the application is all available from the network stage. The most important is the
data defined for each entity and the high volume accessing of that data as defined by the
frequently used state vector connections.
The result of the network stage is a highly distributed network of programs. Often, for
convenience or efficiency, we convert programs into subroutines, in effect combining
several programs into one, so that a fragment of the network is implemented as a single
KisPo Page | 89
program. The network is reconfigured from a form appropriate for specification into a
form appropriate for implementation.
SSADM is one of the most mature and widely used methods. However it requires a
significant investment in training and learning.
This rather simplistic example illustrates the need to specify requirements before the
construction of a house (or system) is started. Although it may seem that the
requirements are very straight forward constraints may be missed or interdependencies
overlooked during development. A problem is far cheaper to put right early in the
process that leaving it until the final day before implementation. The systems analyst
takes a similar role to that of the architect – a communicator between the client and the
builder. Some of the underlying principles of systems analysis, which are also principles
of SSADM, help make sure that the user requirements are fully specified.
User involvement –It is a basic principle of SSADM that the users have involvement
in and commitment to the development of their system from a very early stage. By
ensuring the specification and design match the users requirements at each stage of the
analysis and design the risks of producing the “wrong” system are very much reduced
and possible problems can be sorted out before they become unmanageable.
Quality assurance –In SSADM formal quality assurance reviews are held at the end
of each stage where the user is asked to “sign off” the design so far. The end products for
the stage are scrutinized for quality, completeness, consistency and applicability by the
users, developers and by experienced systems staff external to the project.
Separation between logical and physical specifications –SSADM separates
logical design from physical design. A hardware/software independent logical design is
produced which can easily be translated into an initial physical design. This helps the
developers to address one problem at a time and prevents needless constraints at too
early a stage in the development. This also helps communication with the users who may
not be computer literate but are perfectly able to validate a logical specification or design
of their systems.
Why use a structured method?
Structured method share the following characteristics
They structure a project into small well-defined activities and specify the sequence
and interaction of these activities.
KisPo Page | 90
They use diagrammatic and other modeling techniques to give a more precise
(structured) definition that is understandable by both users and developers.
KisPo Page | 91
the customer visualize the final building the architect drew several different
representations – a cross sectional view, artists impression etc. This probably helped the
architect to validate the plans as he made sure that each view was consistent with the
others. In SSADM three different views of the system are developed in analysis. These
views are closely related to each other and are crosschecked extensively for consistency
and completeness. The equal weight given to these three techniques and the prescriptive
procedures for checking them against one another is a great strength of the SSADM
approach. The three views are,
Underlying structure of the systems data (Logical data structure)
How data flows in and out of the system and is transformed within the system
(data flow diagrams)
How the system data are changed by events over time (entity life histories).
The structured techniques of SSADM fit into a framework of steps and stages each with
defined inputs and outputs. Also there are a number of forms and documents that are
specified which add information to that held within the diagrams. Thus SSADM consists
of three important features
Structures - define frameworks of steps and stages and their inputs and outputs.
Techniques – define how the steps and tasks are performed.
Documentation – defines how the products of the steps are presented.
KisPo Page | 92
Each module is designed to be self contained with the idea that projects might choose to
use SSADM for one module and not for others. SSADM is divided into 5 modules and
each of these are divided into stages. Each stage is divided into steps.
Requirements Analysis
Stage 1 – Investigation of current environment.
The analysts learn the terminology and function of the users environment
The old system may form the basis of the new system
The data required by the system can be investigated
It provides the users with a good introduction to the techniques
The boundaries of the investigation can be clearly set.
The current system view built in stage 1 is redrawn to extract what the system does
without any indication of how it is achieved. The resulting picture is the logical view of
the current system. This allows the analyst to concentrate on what functions are
performed in the current system and to make decisions about what must be included in
the new system.
They reflect different ways (options) in which the system might be organised to meet the
requirements. A decision is made by the users as to which option or combination of
options best meets their needs.
Requirements Specification
Stage 3 – Definition of requirements
Based upon the selected Business Systems option, a detailed specification of the required
system is built up and checked extensively. In order that the new system will not be
constrained by the current implementation there are a number of steps within this stage
to lead the analysts gradually away from the current system towards a fresh view of the
requirements.
KisPo Page | 93
This stage builds up the data design so that all the required data will be included. Is
applies a relational analysis technique to groups of data items in the system to act as a
cross check on the data definitions.
At this stage the development team have enough information to compile the different
implementation options for the system. Each option is costed out and the benefits
weighed out against the costs to give the user some help in choosing the final solution.
This might form the basis for selecting the final system hardware.
The specification developed in stage 3 is expanded to a very high level of detail so that the
constructor can be given all the detail necessary to build the system
Physical design
The complete logical design – both data and processing – is converted into a design that
will run on the target environment. The initial physical design is tuned before
implementation so that it will meet the requirements of the system.
Functional decomposition
KisPo Page | 94
THEORY
CONTENT
Systems implementation is the construction of the new system and the delivery of that
system into production (that is, the day-to-day business or organization operation).
builds and tests a functional system that fulfils business or organizational design
requirements, and
implements the interface between the new system and the existing production system.
The project team must construct the database, application programs, user and system
interfaces, and networks. Some of these elements may already exist in your project or be
subject to enhancement.
KisPo Page | 95
The implementation of the new system occurs when the old system is replaced by the
new one.
There are mainly four types of implementation techniques applied in systems
1 Direct Changeover
The old system is stopped completely, and the new system is started. All of the data
that used to be input into the old system, now goes into the new one.
Advantages...
Disadvantages...
If the new system fails, there is no back-up system, so data can be lost
2 Parallel Running
The new system is started, but the old system is kept running in parallel (side-by-
side) for a while. All of the data that is input into the old system, is also input into the
KisPo Page | 96
new one.
Eventually, the old system will be stopped, but only when the new system has been
proven to work.
Advantages...
If anything goes wrong with the new system, the old system will act as a back-
up.
The outputs from the old and new systems can be compared to check that the
new system is running correctly
Disadvantages...
Entering data into two systems, and running two systems together, takes a lot of
extra time and effort
3 Phased Implementation
The new system is introduced in phases (stages, or steps), gradually replacing parts of
the old system until eventually, the new system has taken over.
KisPo Page | 97
Advantages...
Disadvantages...
If a part of the new system fails, there is no back-up system, so data can be lost
4 Pilot Running
The new system is first of all piloted (trialled) in one part of the business /
organisation (e.g. in just one office, or in just one department).
Once the pilot system is running successfully, the new system is introduced to all of
the business / organisation.
Advantages...
Disadvantages...
For the office / department doing the pilot, there is no back-up system if things go
wrong
System testing is the type of testing to check the behaviour of a complete and fully
integrated software product based on the software requirements specification (SRS)
KisPo Page | 98
document. The main focus of this testing is to evaluate Business / Functional / End-user
requirements.
This is black box type of testing where external working of the software is evaluated with
the help of requirement documents & it is totally based on Users point of view. For this
type of testing do not required knowledge of internal design or structure or code.
a) In Software Development Life Cycle the System Testing is perform as the first level of
testing where the System is tested as a whole.
c) System Testing enables you to test, validate and verify both the Application
Architecture and Business requirements.
Generally, a separate and dedicated team is responsible for system testing. And,
System Testing is performed on staging server which is similar to production server. So
this means you are testing software application as good as production environment.
As with almost any technical process, software testing has a prescribed order in which
things should be done. Different levels of testing are used in the testing process; each
level of testing aims to test different aspects of the system. The following is lists of
software testing categories arranged in sequentially organize.
Unit testing – Testing is done in the development process while developer completes
the unit development. The objective of this testing is to verify correctness of the module.
The purpose of unit testing is to check that as individual parts are functioning as
expected. Basically Unit testing is typically carried out by the developer.
KisPo Page | 99
is focuses to check that after integrating modules Is two modules are communicating
with each other or not. It is critical to test every module’s effect on the entire program
model. Most of the issues are observed in this type of testing.
System testing – This is the first time end to end testing of application on the complete
and fully integrated software product before it is launch to the market.
Acceptance testing
User Acceptance testing is the software testing process where the system is tested
for acceptability. Such type of testing executed by client in separate environment
(similar to production environment) & confirm whether the system meets the
requirements as per requirement specification or not.
UAT is performed after System Testing is done and all or most of the major defects have
been fixed. This testing is to be conducted in the final stage of Software Development Life
Cycle (SDLC) prior to system being delivered to a live environment
The Acceptance testing is “black box” tests, means UAT users are not aware of
internal structure of the code, they just specify the input to the system & check whether
systems respond with correct result.
The CAT or UAT are the final confirmation from the client before the system is ready for
production. The business customers are the primary owners of these UAT tests. It is a
collaboration between business customers, business analysts, testers and developers. It
consists of test suites which involve multiple test cases & each test case contains input
data (if required) as well as the expected output. The result of test case is either a pass or
fail.
A] Alpha Testing
B] Beta Testing
Most if times we have the sense of hearing term “Beta release/version”, so it is linked to
Beta Testing.
Basically the beta testing is to be carried out without any help of developers at the end
user’s site by the end users &, so it is performed under uncontrolled environment. Beta
testing is also known as Field testing. This is used to get feedback from the market.
This testing is conducted by limited users & all issues found during this testing are
reported on continuous basis which helps to improve the system. Developers are taking
actions on all issues reported in beta testing after bug triage & then the software
application is ready for the final release. The version release after beta testing is called
“Beta Release“.
This is last stage of the testing where product is sent outside the company or for trial
offer to download.
Based on the Requirements definition stage use cases the Test cases are created.
Also the Test cases are created considering the real world scenarios for the
application.
The actual testing is to be carried out in environments that copy of the production
environment. So in the type of testing is concentrating on the exact real world use of
application.
Test cases are designed such that all area of application is covered during testing
to ensure that an effective User Acceptance Testing.
The completion of User Acceptance Testing is the significant milestone for traditional
testing method. The following key deliverable of User Acceptance Testing phase:
So you’ve made the decision, selected your software, implementation is underway and
you are shortly due to go live. So much to organise and yet often the crucial process of
incorporating an end-user strategy is forgotten – arguably the most important. Unless
your staff are trained on using your new software, you cannot expect to reap the full
benefits of the investment.
In addition to this there is often the challenge of staff being resistant to change. By
explaining the reasons behind a new system to create an understanding, outlining the
benefits and providing training, you will be on the road to staff embracing these changes.
The key to planning the end-user strategy is reviewing the practicalities – How many
people need to use and understand the new system? How quickly do you want the rollout
to all staff?
Once you have an idea of the above, you can decide on the most appropriate delivery of
training. You may select hands-on computer training with an instructor, seminar style
with a presenter, manual based training or maybe even virtual learning. you may also
need to consider to conduct the training individually or in group focussed sessions.
The number of staff being trained and the timescale of delivery – this will
determine whether you train as a group or individually
How your staff are geographically spread – finding the best location to conduct
the training and consider virtual learning
The processes involved in the new software that staff need to grasp, for example
maybe practical training through the activity will speed up the learning process as
opposed to a presentation on how to use.
What resources are required for the training – Uploading software or using the
internet, manual production?
The level of Interactivity required eg. – will role play be necessary, would group
activity increase understanding and raise motivation levels?
Who is best to facilitate and deliver training – do the software company
recommend or provide training for staff or will you require an external/internal
facilitator?
Creating the correct training environment is another consideration. One aspect of this is
bridging the gap between staff skill sets, not all staff might need the same level of
training, it could be more effective learning and time-wise to deliver tiered-skill level
training to separate groups.
Following this, the physical learning environment chosen will impact learning. Staff must
be comfortable, relaxed, have the necessary tools and no distractions in order to listen,
interpret and actively engage in the information being passed on to them. So often, IT
and technical issues can get in the way of learning; the smooth delivery of training is key
to those receiving and eliminates frustration of those delivering. By getting this right, you
will save time and money in unnecessary errors being made. To maintain the benefits of
your new system, it is equally important to educate new starters, possibly consider
incorporating it into Induction plans and for those fully trained, updates and refresher
training should be scheduled.
THEORY
CONTENT
THEORY
112 By the end of this topic, the trainee should be able to:
CONTENT
In computer hardware and software product development, documentation refers to: The
information that describes the product to its users. It consists of the product
technical manuals. The term is also sometimes used to mean the source information
about the product contained in design documents, detailed code comments, etc
The term is derived from the idea that engineers and programmers "document" their
products in formal writing. The earliest computer users were sometimes simply handed
the engineers' or programmers' "documentation." As the product audience grew, it
became necessary to add professional technical writers and editors to the process. In this
task-oriented view, product information can be divided into and sometimes physically
organized into these task categories: evaluating, planning for, setting up or installing,
customizing, administering, using, and maintaining the product. Documentation is now
often built directly into the product as part of the user interface and in help pages.
Functional specification
Definition
The functional specification is a kind of guideline and continuing reference point as the
developers write the programming code. Typically, the functional specification for an
application program with a series of interactive windows and dialogs with a user would
show the visual appearance of the user interface and describe each of the possible user
input actions and the program response actions. A functional specification may also
contain formal descriptions of user tasks, dependencies on other products, and usability
criteria.
For a sense of where the functional specification fits into the development process, here
are a typical series of steps in developing a software product:
The cycle is then repeated for the next version of the product, beginning with a new
Requirements statement, which ideally uses feedback from customers about the current
product to determine what customers need or want next.
Most software makers adhere to a formal development process similar to the one
described above.
It helps to provide the clear description of the work done so far. It is essential that the
documents prepared must be updated on regular basis this will help to trace the progress
of work easily. With appropriate and good documentation it is very easy to understand
the how aspects of the system will work for the company where the system is to installed.
It also help to understand the type of data which will be inputted in the system and how
the output can be produced.
After the system is installed, and if in case the system is not working properly it will be
very easy for the administrator to understand the flow of data in the system with
documentation which will help him/ her to correct the flaws and get the system working
in no time.
Uses of Documentation
This doesn’t mean you should write documentation in situations where organizing a
system or environment is more practical and efficient, or that standardizing a process
with a script or program doesn’t have it’s place. However, for complex problems where
users interact with your interfaces or processes, documentation is often the answer. Take
pride in documentation, treat it seriously, and the return will be great.
Process:
documentations are used to manage the development process for example planning,
scheduling and cost tracking, standards among others.
Product documentations:
Describe the main deliverable (software product) and some of the documents in this
category form part of deliverables. These include;
Requirements Specification,
Design documents,
Commented Source Code,
Test Plans including test cases,
Validation and Verification plan and results
solve problems like trouble shooting, evaluation process, and quantify the financial
ramifications/footprint of the system.
THEORY
CONTENT
any other companies. When does it make more sense to buy the applications?
arises. In the past anything that has been deemed strategic has been built in-
house but the trend to outsource and buy more systems has grown. Below are
applications.
cost effective and time saving strategy compared with in-house development.
The business adaptation process obliges that the organization could also
customizations within the processes that have been modified and changed.
even one business process. Note that when selecting a vendor package,
features of the current and future needs are included in the package. Buying
makes sense if an organization plan to keep something for a long time, but
technology typically becomes outdates every two to three years. The reason
the business is all about cutting-edge technology, buying can make good
ADVANTAGES DISADVANTAGES
Lease option can result in substantial cost and time savings compared
may not always exactly include all the required features. Also, regarding a
software in-house. Leasing can help you decrease the total cost of ownership
leasing means that a business is looking at the bigger picture, planning for
future upgrades and evolving needs. When controlling cash flow is critical and
you don't have time to worry about your equipment, leasing can be a great
When you enter into a lease, the ability to progress from one generation
of obsolete equipment is far easier and far smoother, because of the way a
3.
ADVANTAGES DISADVANTAGES
This option works well for the organization that has the resources and time to
consuming and somehow costly, but the company may have a system that
was the freedom to create a system that would closely fit the company’s
First, building the application from the scratch is one of the approaches to
packages (i.e. Java, Visual Basic, C++) or using available packaged software
flexibility, cost and time saving rather than building the software from the
base.
summarized in Table 4.
ADVANTAGES DISADVANTAGES
This strategy does not have to the expertise and it is less costly to buy the
expertise than build it. Perhaps it does not have time of pull off a project.
However, it can take advantage of the economy of scale that the provider has
and which the purchasing company does not. As a matter of fact, the
organization turns to outsourcing to save money. Decisions as what to and
whether to outsource should be tied to an identification and understanding of
an organization’s core competencies and its critical success factors. If a task
is a both a core competency and a critical success factor, it should not be
considered outsourcing. Such projects are at the heart of the company.
Success or failure of such functions is directly tied to success or failure of the
company as a whole. In general, such functions are critical to an
organization’s day-to-day operations, ability to competitively differentiate
itself, ability to deliver value to customers and partners, and ability to
innovate.
focus on its core business and reduce its workload. Some limitations of
this strategy include the risk of loosing the organizational core competencies,
reduction in the quality of service received by a client, and also some risk of
ADVANTAGES DISADVANTAGES
· Subcontracting of workload
THEORY
114 By the end of this topic, the trainee should be able to:
CONTENT
scope,
time,
cost,
quality, and
risk
Scope defines what work is or is not included in a project. For example, the
scope of project for a new order processing system might be to include new
modules for inputting orders and transmitting them to production and
accounting but not any changes to related accounts receivable,
manufacturing, distribution, or inventory control systems. Project
management defines all the work required to complete a project successfully,
and should ensure that the scope of a project does not expand beyond what
was originally intended.
down into activities and tasks. Project management tries to determine the
time required to complete each task and establish a schedule for completing
the work.
Quality is an indicator of how well the end result of a project satisfies the
objectives specified by management. The quality of information systems
projects usually boils down to improved organizational performance and
decision making. Quality also considers the accuracy and timeliness of
information produced by the new system and ease of use.
Project managers should choose a project management tool that best suits
their management style. No one tool addresses all project management
needs.
Program Evaluation Review Technique (PERT) and Gantt Charts are two of the
most commonly used project management tools. Both of these project
PERT is a planning and control tool used for defining and controlling the tasks
necessary to complete a project. PERT charts and Critical Path Method (CPM)
charts are often used interchangeably; the only difference is how task times
are computed. Both charts display the total project with all scheduled tasks
shown in sequence. The displayed tasks show which ones are in parallel,
those tasks that can be performed at the same time. A graphic representation
called a "Project Network" or "CPM Diagram" is used to portray graphically the
interrelationships of the elements of a project and to show the order in which
the activities must be performed.
1. Identify the specific activities and milestones. The activities are the
tasks of the project. The milestones are the events that mark the
beginning and the end of one or more activities.
2. Determine the proper sequence of activities. This step may be
combined with #1 above since the activity sequence is evident for
some tasks. Other tasks may require some analysis to determine the
exact order in which they should be performed.
3. Construct a network diagram. Using the activity sequence information,
a network diagram can be drawn showing the sequence of the
successive and parallel activities. Arrowed lines represent the activities
and circles or "bubbles" represent milestones.
4. Estimate the time required for each activity. Weeks are a commonly
used unit of time for activity completion, but any consistent unit of time
can be used. A distinguishing feature of PERT is it's ability to deal with
uncertainty in activity completion times. For each activity, the model
usually includes three time estimates:
o Optimistic time - the shortest time in which the activity can be
completed.
From this, the expected time for each activity can be calculated using
the following weighted average:
These times are calculated using the expected time for the relevant
activities. The earliest start and finish times of each activity are
determined by working forward (forward pass ) through the network
and determining the earliest time at which an activity can start and
finish considering its predecessor activities.
The latest start and finish times are the latest times that an activity can start and
finish without delaying the project. LS and LF are found by working backward
(backward pass) through the network. The difference in the latest and earliest
finish of each activity is that activity's slack. The critical path then is the path
through the network in which none of the activities have slack.
Figure A
Symptom Solution
stop the project, replace the project manager, make the necessary
adjustments, and start again. The departing manager should be given
the option to provide his/her version of the story, though, before
moving on.
Poor testing: A big culprit on any project is having either too little
testing or, in many cases—if a test team is involved—testing too late in
the process. Both testing and quality assurance need to be built into the
project from the day the project is launched.
Try and assess what the reasons were for the project failing in the first
place. It’s no use simply blaming people. If the failure was due to bad
estimation or planning, then efforts need to be put into place to correct
any future projects following the same path.
Should you cancel a bad project or try and bring it back on track?
Organizations faced with bad projects should first try and salvage their
poor performers rather than cancelling them.
THEORY
CONTENT
ASSIGNMENT
Question 1.
Question 2
c) Explain how organizations cope with the challenges of emerging trends in Systems
Analysis and Design