Professional Documents
Culture Documents
C8 - Systems Analysis and Design
C8 - Systems Analysis and Design
Learning Outcomes:
In this chapter you will learn about:
the analysis stage
the design stage:
validation
verification
the development stage
the testing stage
the implementation stage, particularly changeover methods
documentation
user documentation
technical documentation
evaluation
Introduction:
Activity:
Analysis:
Stages 2 to 7 are sometimes referred to as the feasibility study and this can be
further broken down as shown in Figure 8.2.
Let us now consider the first item in the analysis stage – fact finding. There are
four common methods used in fact finding, which have been summarised in Table
8.1 overleaf. The methods are: observation, questionnaires, interviews and looking
at existing paperwork.
Once the analysis has taken place and the systems analyst has some idea of the
scale of the problem and what needs to be done, the next stage is to design the key
parts of the recommended system. A list of tasks is summarised here, but is by no
means exhaustive:
We will now consider in more depth two of these tasks: verification and validation.
8.2.1 Verification
Verification is a way of preventing errors when data is copied from one medium
to another (e.g. from paper to disk/CD). There are two common ways that
verification checks are carried out:
Double entry: in this method, data is entered twice, using two different
people. The computer compares the two entries, either after data entry or
during the data entry process, and identifies any differences.
Visual check: this is the checking for errors by comparing entered data on the
screen with the data in the original document (this is not the same as proof
reading).
8.2.2 Validation
Once the design stage is completed, it is then necessary to create the system
and fully test it. This section considers some of the development stages and testing
strategies which are often adopted by systems analysts.
If the system contains files (e.g. a database) then the file structure needs to be
finalised at this stage (e.g. what type of data is being stored in each field, length of
each field, which field will be the key field, how the data files will be linked, etc.).
Once the file structure has been determined, it is then created and fully tested to make
sure it is robust when the system actually goes live.
Since it is important that the correct data is stored in files, there are certain
techniques that need to be adopted to make sure the data populating the file/s and
database/s is at least of the right type and that it conforms to certain rules. Validation
routines and verification methods (discussed in Section 8.3) are used to ensure this
happens. Again, these routines have to be fully tested to ensure they do trap
unwanted data but also to make sure any data transferred from a paper-based system
to an electronic system has been done accurately.
Any system being developed will have some form of user interface. The types
of hardware were chosen in the design stage. How these are used to interface with the
final system now needs to be identified, for example how the screens (and any other
input devices) will be used to collect the data and the way the output will be
presented. If specialist hardware is needed (e.g. for people with disabilities), then it
will be necessary to finalise how these devices are used with the system when it is
implemented. This will be followed by thorough testing to ensure the user screens are
user friendly and that the correct output is associated with the inputs to the system.
All of this may lead to a need to improve the input and output methods, file
and database structures, validation and verification methods, etc. Then the system
will need to be fully tested again. It is a very time-consuming process but the system
has to be as perfect as possible before it goes live.
Testing will use many different types of data, which will fall into one of three
categories: normal, extreme or abnormal. Let us suppose one of the fields in a
database is the date and this must be in the form dd/mm/yyyy, where each element of
the date must be numeric:
8.4 IMPLEMENTATION
Once the system is fully tested, the next stage is to fully implement it. Some
of the stages in this process are shown in Figure 8.3.
We will now consider changeover to the new system in more depth. As
indicated in Figure 8.3, there are four common methods used for changing over from
the old system to the new system. Each one has advantages and disadvantages, shown
in Table 8.3, which need to be weighed up before the most appropriate method is
chosen for a particular application.
Table 8.4 compares the costs, input requirements and risk of failure for all
four changeover methods.
8.5 DOCUMENTATION
8.6 EVALUATION
Some results from the evaluation may require changes to either hardware or software.
Hardware may need to be updated because:
Application:
References:
IGCSE
Information and Communication Technology
Graham Brown and David Watson
Congratulations! You did a great job for this lesson! You can now proceed to the next
lesson.