Professional Documents
Culture Documents
Sad
Sad
1
Chapter 3: The system development life cycle
The goal of the traditional system life cycle is to keep the project under control and
assure that the information system produced satisfies the requirements. The
traditional system life cycle divides the project into a series of steps, each of which
has distinct deliverables. There are different phases included under the traditional
SDLC. However, you may find slight differences with regard to the phases
provided by various scholars. The following phases are among the provided
components by Yeates and Wakefield, 2004.a
Project initiation
Feasibility study
Investigation
Requirements definition
Proposals and selection
Design
Development
Testing
Implementation
Audit review
Maintenance
The traditional approach does not mandate the involvement of the system’s users
to any great degree. Users only have to be involved when they are presented with
2
the system specification to review and approve. The most obvious advantage of the
traditional approach is, of course, that it is quite familiar to analysts and that the
general methods of working are well understood.
Prototype Approach
It is not always possible to obtain all the information analysts need to create a
complete logical model just by conducting interviews with the concerned body and
study the existing system. Some processes by their nature are difficult to explain.
In such cases, prototyping is a powerful alternative or supplement to logical
modeling.
3
functioning system, but it is incomplete model of the information system using
rapid application development tools. Prototypes typically evolve in to the final
version of the system or application. The concept behind prototyping is building a
small working mode of the users’ requirements or a proposed design for an
information system, which is usually applied earlier in the systems development
life cycle to perform fact-finding and information requirement analysis.
Yes No Yes
Acceptable Ready Release
No
Define
requirement
s
Design
System
Develop
system
4
When organizations develop their new information system or modify the existing
information system, they have to follow the following basic approaches. These
approaches are not mutually exclusive and firms generally employ certain aspects
of each approach.
5
Bottom-up approach: Bottom-up approach focuses on the basic transaction
processing requirements of the firm and implements systems to meet these needs
or requirements. The approach tries to identify the basic transaction of the
organizations, such as payroll, order entry and processing. This approach is
important because as management information requirement becomes more
complex, it integrates the stand-alone TPS and to deal with DSS and ESS. It is a
dominating system development strategy because the system development can be
made in a logical revolutionary or step-by-step manner.
6
Generic activities in all software processes are:
7
Chapter 4: system selection and planning
1. End Users: End users initiate most information system projects. Because
they are closer to the activities of the business and know the basic problems
of their firm. Therefore, they initiate a new project in order to solve the
problem they face every day.
8
2. Analysts: system analysts propose most system development projects.
Because they understand both business and computing. They study business
problems and opportunities and then transform business and information
requirements into the computer based information systems that are
implemented by various technical specialists, such as computer
programmers, system designers and, system builders. A system analyst
studies the problems and needs of an organization to determine how people,
data, processes, communications, and information technology can best
accomplish improvements for the business.
3. Many projects are identified by an intensive information systems planning
activities called Information Resource Management (IRM). Using IRM
methods experienced analysts and non-computing managers chart an
information system direction that mirrors corporate plans. We have said that
system owners and users initiate most projects. However, the impetus for
most projects is some combination of problems, opportunities, and
directives.
End users communicate the need for systems project for top managers for
implementation. Because they do not have the necessary knowledge and skills to
9
undertake the system study. To communicate the intention, and convince
management of the firm, the initiator (end user) needs to put his/her idea in
writing. Such a report is known as system study project request proposal. The
proposal should include the following:
System analysts, unlike end-users, have the necessary knowledge and skill to
undertake the study. Therefore, they have to convince officials that those who
propose the new system are capable and able to do the job. If preliminary
10
investigation is undertaken, the proposal should include its results, otherwise task
of the preliminary investigation should be included
11
benefits has to be indicated in such a manner that will arouse the interest of
the management to consider the proposal.
7. The study team: The brief description of each individual involved in the
study.
8. The project schedule: This Part focuses on identifying the major activities,
time estimates of the activities, and the whole project, personnel
requirements and other specific issues of the project. In order to
communicate well, analysts can use tools like Gantt chart, Network
diagrams (CPM and PERT).
9. Cost of the project: The cost of the project should also be indicated in detail
decomposition form not in the aggregate form.
In addition to the users and knowledge workers, projects can also originate from
formal organizational plan. This requires intensive information and the
involvement of the top managers.
12
management phases, i.e., until the feasibility report. This is because the
continuation of the project is dependent of the feasibility study result.
The feasibility study report has to address, at least, three levels of feasibility:
After all the necessary analysis and study, the analyst or knowledge worker should
produce a document, which serves as a reference point for further analysis and
evaluation of the system proposed. This document in known as the feasibility
study report. This report may include the following components:
1. Introduction
2. Terms of reference
3. Outline of existing system
4. Outline of the proposed system
5. Likely benefits from the new system
6. Suggested hardware and software as well as vendors
7. Cost of the proposed system
8. Staff and training requirements
9. Suggested implementation time table
10. Information about other organizations who might be using the new proposed
system
11. Ongoing costs
13
1.4. Baseline project plan
A Baseline Project Plan is the Project Management Plan that is created by the
Project Manager and is approved by the Project Sponsor and the Senior
Management. The Approved/baseline plan outlines how the project will be handled
from start to finish and is like the bible for the project.
14
Chapter 5: System analysis: determining system requirement
The most commonly used methods of determining system requirement are many in
number. However, some of the traditional methods include interviewing,
questionnaires, observation, searching records and document analysis.
5.1.1. Interview
15
Good manners are essential; introduce yourself, be punctual and pay
attention to what the user says.
Do not use jargon words, explain technical words.
Avoid yes/no answers; try to get both quantitative and qualitative
information.
Do not prolong the interview
Summarized the information gathered by you during the interview and
verifying with the user.
16
5.1.2. Administering questionnaires
The systems analyst is constantly observing, and observations often provide clues
about why the current system is not functioning properly. Observations of the local
environment during visits to the client site, as well as very small and unexpected
17
incidents, can all be significant in later analysis, and it is important that they are
recorded at the time.
Observation checklist
18
When investigating the data flowing through a system another useful technique is
to collect documents that show how this information is organized. Such documents
might include reports, forms, organization charts or formal lists. In order to fully
understand the purpose of a document and its importance to the business, the
analyst must ask questions about how, where, why and when it is used. This is
called document analysis, and is another fact-finding technique available.
Main idea behind joint application design (JAD) is to bring together the key users,
managers and systems analysts involved in the analysis of the current system
(similar to group interview). But JAD follows a particular structure of roles and
agenda, which enables to collect systems requirements from all the key people
simultaneously. Typical participants:
- JAD session leader – sets and supervises agenda and is neutral
- users – key users of the system, who know the most about it
19
- managers – they provide insight into new organizational directions, motivations
for the system
- sponsor – someone at a relatively high level of the company who pays
- system analysts – they are there to learn from users and managers, and not to
dominate the process
- scribe – a person who takes notes
- IS staff – other staff like programmers, or database analysts (they know some
technical limitations or ideas)
JAD sessions are usually held in special rooms with special equipment. Upper
CASE tools can be used during JAD (diagramming tools, display and report
generation tools) in order to give graphic form to system requirements, show it to
users and make changes based on their reactions.
Also prototyping tools are good for presenting users with graphic illustrations of
what the alternative systems will look like. Prototyping allows to quickly convert
basic requirements (obtained during i.e. interviews) into a working, though limited
version of the desired information system. The prototype will then be viewed and
tested by the user and changes will be introduced. And this will be repeated until
all concrete specifications for the ultimate system are developed. Prototyping is
mostly useful when:
- user requirements are not clear or well understood
- one or a few users are involved
- possible designs are complex and must be concrete
- there are communication problems
- tools for prototyping are available
20
Disadvantages of prototyping: tendency to avoid creating documentation of system
requirements, prototypes may be too specific (based on a certain user’s taste),
prototypes ignore issues of sharing data with other systems (stand-alone systems),
and some important requirements may be missed.
Also group support systems may be used to support JAD sessions (because there
are some typical group meeting problems). Instead of giving everyone a few
minutes to talk all members of the group type their comments into computers and
may see what everyone else has been typing, but the comments are anonymous so
bosses can also be criticized. Pros: everyone has a chance to “say” something,
important ideas are less likely to be missed, and poor ideas more likely to be
criticized. Cons: leader has lower ability to resolve conflicts and the session may
become less structured. One advantageous approach to reduce the limitation of
group support system is using “Nemawashi” approach whereby prior informal
consultation will be held with individual participants about the meeting issue/s.
21
Chapter 6: System analysis: structuring system requirement
Data flow diagram graphically shows the flow of the data through a system, that is
the essential processes of a system, along with inputs, outputs, and files. In
analyzing the current system and preparing dataflow diagrams, the system analyst
must also prepare a data dictionary, which is used and expanded during all
remaining phases of the systems development life cycle. A data dictionary defines
all the elements of data that makes up the data flow. The dictionary records what
each data elements is by name, how long it is (how many characters), where it is
22
used (files in which it will be found), as well as any numerical values assigned to
it.
Therefore, DFD serves as an interface between what is happening in the real world
of day-to-day business and how these day-to-day activities can be converted into
suitable software.
The following are commonly used standardized data flow diagram notations or
symbols (there are 2 types of notations for DFD; Yourdon/Demacro and
Sarson/Gane notations).
1. Data flows: - The data flow symbol shows the movement of data (inputs and
outputs) from its source to its destination. It is represented by a bold line with an
arrow head indicating the direction of the flow. It must have a label that explains
the data.
2. Process: - This is the only part of DFD, which portray things actually
happening. It is represented by a rectangle.
(Gane) (Demacro)
(Gane) (Demacro)
23
departments within the organization etc. It is indicated by an ellipse, the entity
description entered within the ellipse together with entity reference.
(Gane) (Demacro)
1. Make a list of activities and determine the entities, processes, data flow, and
data stores.
2. Create the context diagram where there is only one process, and no data store. It
is the highest level in DFD.
3. Develop level 0 diagram or parent diagram that shows more detailed process
and explodes the context diagram. In this level the inputs and out puts remain
constant.
4. Create a child diagram or level 1 diagram that show more detailed process than
parent diagram.
5. The last level of DFD is called primitive data flow diagram.
There are no hard rules as to when to stop or end decomposition of the DFD.
However, the most commonly agreed up on criteria is when;
24
Each data store represents data about one entity
One child diagram will have one parent diagram but one parent
diagram may have more than one child diagram.
3 to 9 processes are allowed
Customer
Customer order Food order
Receipt
Report
Customer
Receipt
25
Goods sold data Inventorydata
After the parent diagram is drawn the next step is to decompose the diagram in to
further process. However, this decomposition should continue until all processes
have reached in a single decision or calculation, the user of the system does not
need further decomposition, and each data store represents data about one entity.
As with Data Flow Diagrams, Logical Data Structure diagrams (LDS) are not able
to carry all the information that analysts need to record about a system.A logical
data model (LDM) consists of decision tables and structured English.
Structured English
26
This tool is used to specify a program structure using a limited subset of the main
language to specify what the program should do. It strips the description down to
its base essential and removes ambiguity, redundancy and inconsistency. This tool
is based on logical construction of sequence, selection and iteration.
Sequence: - is a list of one or more actions or events that follow one another
without interruption. One or more imperative statements represent it. For example,
multiply price by quantity sold giving net price; multiply net price by 0.15 giving
VAT; add VAT to net price giving gross price. This can be written as:
Selection: - a selection construct (also called decision construct) occurs when there
are a number of alternative policies which can apply depending up on the results of
some conditions and only one policy is selected. Selection includes the If-else
statement terminated by End-If.
IF dimensions not ok
Reject Product
IF mechanical test ok
IF electrical test ok
27
Pass product
Repair products
END IF
If electrical test ok
Repair Product
Reject product
END IF
END IF
END IF
In the structured English description the conditions are checked one after another.
For each question the part after then states the action to be carried out if the answer
to the question is "yes" or "ok", the part after else state the action to be carried out
if the answer to the question is "no" or "not ok". At the end, the if is paired with
end if which indicates the end of the if statement. Indentation is used to aid the
reader see the correct grouping of answers. This style is closer to the way
28
programmers are written in a programming language. In order to understand this
concept in a more detail have look at on the following statement.
Then
else
then
else
No discount
end if
else
No discount
29
end if
end if
Iteration
Example:
REPEAT
30
Decision tables
Decision tables are used for highly structured and clearly understood process and
when a combination of decision has to be made in order to establish a result. They
are made up of four quadrants.
Condition Condition
Stub Entry
Action Action
Stub Entity
31
3. Determine the number of rules using the formula: 2N, where N is the
number of conditions. In this example, we have identified 3(three)
conditions, so n=3 and the number of rules or policies are 23=8. The
following decision table summarizes this situation.
Decision Rules
Conditions
1 2 3 45 6 7 Condition
entities
8
Correct- Yes YesYesYes No NoNoNo
dimension? Yes Yes No Yes Yes No
Pass mechanical No No
test? Yes No Yes Yes No Yes
Pass electric test? No No
Reject product X XXX Action
entities
Accept product X
Repair product X
X X
32
6.3 Conceptual Data Modeling
All systems contain data- usually lots of data andthese data describe persons,
objects events and other things of interest. For example in a typical order-
processing system the entities could be Customers (who are persons); orders
(which are events) and parts (which are objects). These three entities have a
natural relationship such that a customer places an order which contains parts.
There are various symbolic notations suggested by7 different authors and experts.
Among these the very popular one is the CHEN ERD. The following section
describes the Chen symbols and how to use ERD in modeling the data.
Entity:Represents the data entity, which is anything, real or abstract about which
we want to store data ( ).
A data relationship which is a natural association between entities. All
relationships are further described by words or symbols that indicated the number
of occurrences of one entity that can exist for a Single occurrence of the related
entity; and vice versa ( ). There are three general Possibilities.
33
One-to-one (1:1) - for one occurrence of the first entity there can exist only
one related occurrence of the second entity and vice versa.
One-to many (1: M or M: 1) - for one occurrence of one entity there can
exist many related occurrence of a second entity; it doesn’t matter Which is
first or second.
Many-to-many (M: M) - for one occurrence of the first entity, there can exist
Many related occurrences of the second entity, and for one occurrence of the
Second entity there can exist many occurrences of the first entity.
A data element: data elements are characteristics that are common to a particular
entity. Usually, at least one data element takes on a unique value for the entity.
Such data element (s) is (are) called PRIMARY KEY. The key will identify one
and only one occurrence of the entity ( ).
As an illustration we can take an example of the relationship between employee
and department. As it can be seen from the diagram below, the relationship is
many to many.
M M
Employee Ordered by Department
34
Chapter 7: Design of new systems
The functional specification is the starting point for the designer, who will rely to a
great extent on the accuracy and thoroughness with which the analysts have carried
out their task. The analysts’ understanding of the business, appreciation of the
client’s problems and documentation of requirements provide the foundation on
which the designer will build a working solution.
In order to identify where in the new system the interfaces will occur, a useful
starting point for the analyst or designer is the data flow diagram for the required
system. This is a logical view, which was described in detail in the previous
chapter. The system boundary must be determined in consultation with the users of
the new system, and in the end it is their decision as to which processes are
automated, and which require human judgment or intuition and are therefore best
done by people. In discussing this with the client, there are three questions to be
asked about any process:
Can it be automated?
35
Is it economic to do so? The answer to the first question may be ‘yes’, but
will it be worth the money in terms of the benefit it will bring to the
business?
Is it operationally possible to automate it? In other words will the
environment allow it? There may be resistance to the automation, for
example from vested interests of some kind.
The designer will present options, but the final decision rests with the client.When
the system boundary has been agreed, both the client and the system developer will
be able to see clearly what is in and what is out of the new system.
Output is information delivered to the users through the information system. The
output of information system must be clear, precise and informative. All other
design is performed at the end to have output. Output must be designed based on
the requirements or purpose which are identified in the analysis phase.
36
The quality of systems input determines the quality of systems output. Information
is the function of data and processing. Therefore, in this design phase, the
following issues should be considered:
The design elements are: input form design, design input screens and records,
design methods and procedures for getting the data in to the computer. The
objectives of input design are effectiveness, accuracy, consistency, simplicity, and
attractiveness.
The decision to be made at this point is to use simple batch inputs versus on-line
inputs. In batch processing, transactions are accumulated into batch processing;
transactions are accumulated into batches for periodic processing. The batch inputs
are processed to update databases and produce appropriate outputs.
Majority of systems have slowly evolved from batch processing to on-line or real-
time processing. On-line inputs and outputs provide for a more conversational
dialogue between the user and computer applications. They also provide near
immediate feedback in response to transactions, problems, and inquiries. In today’s
fast-paced economy, most business transactions and inquiries are best processed as
37
soon as possible. Errors are identified and corrected more quickly because there is
no time lapse between data entry and input. Furthermore, on-line methods permit
greater human interaction in decision-making.
Because inputs originate with system users, human factors play a significant role in
input design. Inputs should be as simple as possible and designed to reduce the
possibility of incorrect data being entered. The needs of system users must be
considered. With this in mind, several human factors should be evaluated.
The volume of data to be input should be minimized. The more data that is input,
the greater the potential number of input errors and the longer it takes to input that
data. Thus, numerous considerations should be given to the data that is captured for
input. These general principles should be followed for input design:
1. Capture only variable data. Do not enter constant data. Permanent or semi-
permanent data like description of a product ordered should be stored in the
database.
38
2. Do not capture data that can be calculated or stored in computer programs.
For example, if you input quantity ordered and price, you don’t need to input
extended price, which is equal to quantity times price.
3. Use codes for appropriate attributes codes were in
If source documents are used to capture data they should be essay for system users
to complete and subsequently enter into the system. The following suggestions
may help:
(1) How the data is initially captured, entered, and processed and
(2) The methods and technology used to capture and enter the data.
39
a) Data capture- is the identification and acquisition of new data. It is
always best to capture data as soon as possible after it originates. For
this purpose source documents may be used. Source documents are
forms used to record business transactions in terms of data that
describes those transactions.
b) Data entry – Is the process of translating the source data or document
in to a computer readable format.
Entered data must subsequently be processed. The process may be batch or on-line.
In batch processing, the entered data is collected into files called batches. Each file
is processed as a batch of many transactions. In on-line processing, the captured
data is processed immediately.
Different inputs devices can be used to enter data some of these are:
1. Keyboard – Keyboard data entry remains the most common form of input.
2. Mouse – is a pointing device used in conjunction with graphical user
interfaces (GUI)
3. Touch screen
4. Point-of-sale
5. Sound and speech
6. Magnetic ink
7. Smart cards
40
Control should be designed for every other element of the building blocks of the
information system. Control ensures that the system is protected against accidental
and intentional errors and use including fraud.
Types of control
41
4. Training all staffs properly
5. Supervising staffs and monitoring their performance
6. Establishing good working conditions and appropriate equipment
7. Preparing schedules for all work and monitoring that
8. Providing adequate security
9. Protecting confidential information
Output controls
Input control
Input control has to ensure the accuracy of data input to the system. Following are
some guidelines
42
Completeness check: ensures whether all required fields on the input have
actually been entered
Limit and range checks: determines whether the input data for each field
falls within the legitimate set or range of values defined for that field
Combination checks: determine whether a known relationship between two
fields is valid
Self-checking are techniques for determining data entry errors on primary
Keys which is a number or character that is appended to a primary key field
Picture Check: compare data entered against the known picture defined; irds
a general rule, the data elements that comprise any entity should describe
only that Entity for finds the forms, file printouts, reports and so on whose
data.
Process controls
All puts and outputs are scheduled and logged: a run book states where
programs run informs the computer operator of any necessary setup...
Procedures describe how input errors should be distributed to end-users and
whether processing can proceed before these errors are corrected.
Procedures require batch control totals to be checked against the historical
report generated for transaction processing
Procedures describe how scheduled outputs are to be collected, duplicated and
distributed
43
Procedures specify when and how master and transaction files are backed up
Procedures specify how files will be recovered in the event that they are lost or
destroyed
File/Database Control
Controls are designed into files to ensure the integrity and security of the data in
those files. Some of control issues in files include the following
44
2. Hard Disk: capacity, type, access time
3. Memory: capacity, access time, upgrade ability
4. Cache: size, speed
5. Floppy Disk Drives: number
6. CD-ROM Drive: speed
7. Bus Type: type
8. Expansion Slots: number
9. BIOS: security password, flexibility
10.Monitor: Size, Dot Pitch, refresh rate
11.Video Card: resolution, video ram
12.Operating system: type, diskettes, manuals
13.Others: Multimedia Kits, Modem (speed, type), Keyboard. mouse,
mouse pad
14.Non-technical factors: delivery period, warranty, previous experience
15.Price
45
46