Professional Documents
Culture Documents
Scott Tilley - Systems Analysis and Design-Cengage (2020)
Scott Tilley - Systems Analysis and Design-Cengage (2020)
r..,,...JID)r-..1-.. 4•11_.. • ...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Thi\ i~ an clcctmnic vc,...ion of Lhc print 1cx1book. Due to electronic rights rc,1ricuons,
some third p:u1y conlcnt may be >uppressed. Edilorial review has deemed Lhat any suppressed
content doc> not materially affect the overall learning experience. The publil.her rc>crve~ the right
10 remove contem from thi• title at any time if sub11Cquent rights restriction• require it. For
valuable information on pricing. previou• editions. change• Lo current edilinn<. and al1ema1c
formats. please visit www.ccnu~<: com/bj~hen:d to search by ISBNll. author. 1ille. or keyword for
muccrial\ in your areas of interest.
lmponant oticc: Media contcnl referenced \nthin the produce descripuon or the product
text may not be available in the eBook \er..ion.
Systems Analysls and Design, Twelfth Edition O 2020. 2017 Cengage learning. Inc
Scott Tilley Unless otherwise noted, aH content ls Cl Cengage.
WCN: 02·300
SVP. Higher Educatton Prodlm Management:
Enn Joyner ALL RIGHTS RESEl!VEO. No part of this work CO\lt!red by lhe copyright
herein may be reproduced or d1s111buted on any form or by any means.
VP. Product MaNgement Mike Schenk except as permitted by U.S. copyright law. without the pnor written
Product Otre<tor.1.Auren Murphy pennissi<>n of the copyright owner
Product Team Manager Krosun McNary
Product Manager JaylT'Me Falconi For product informatlOfl and technology asslsta~. contact us a1
Product As5'Stant. Anna Goulart Cengage Customer & Sales Support, 1-IOC>-3S4-9706or
support.cengage.com.
Oire<1or, LHrnong Design Rebecu von Glllern
SenK>r Manager, learning Otsigr• Leigh Hefferon
Learning Designer· Emily Po~
Vice Preslden~ Marketing - Science, Technology,
L For permlss!On to use mateflal from this text or product.
submit all requests onlone at www.cengage.com/permlsslons.
r...,,,.._ a-oc,,.,..~ .u ._~.a "'' ·~ 11ir ......, ~ -~·-· ......,"'".,.. nw~•..-.. ,..."''"_..,....., ,.....""..., tir ~,._._~
__ .....,.__.t__.•.._a..,..
r.....l _ _ .._......,..,_..,.,............_.,.....,..._...,.....,_..,.,,_.,.._..~~a-.e.._..,...,.,,._.
.,..., -<.....,._~~
.......... ,......_... ..........
iii
DEDll CATION
BRIEF CONTENTS
PHASE I: SYSTEMS PLANNING 001
TABLE OF CONTENTS
PHASE I : SYSTEMS PLANNING I.9 The Systems Analyst 28
1.9.1 Role 28
1.9.1 Knowledge. SIUlb. and Ecb::auon 29
l.9J Certification 31
1.9.4 c..reer Opportunities 32
1.9.5 Trends"' lnformabon Technology 33
Introduction to Systems Analysis A Question of Ethics 35
and Design 1.10 Summary 35
Learning Objectives 2 Key Terms 37
I. I Information Technology 3 Exercises 42
I. I.I The Changing Nature of Information Technology 3
1. 1.2 Synems Analysis and Design 4
1.1 .3 What Does a Systems Analyst Doi
1.2 Information System s
"
4
1.2.1 Hardware
1.2.2 Software
5
5
Analyzing the Business Case
1.2.3 Data 6
1.2.4 Processes 7 Learning Objectives 44
1.2.S People 7 2. I Strategic Planning 45
Case In Point I. I. Data B~. che 8 2.1 . 1 Strategic Planning Overview 45
1.3 Internet Business Strategies 8 Case in Point 2.1; Pets for Rent 45
1.3. 1 The lnttrnet Model 8 2.1.2 SWOT Analysis 45
I .J 2 82C (BuS1ncsMo·Consumer) 8 2.1 J The Role of the IT Dep1rtmenc 46
I .J.3 828 (Business·tO· Buslness) 9 2.1 Strategic PlanningTools 47
1.4 Modeling Business Ope rations 9 2.l The Business Case 47
1.5 Busines$ Informa t ion Systems 11 2.4 Systems Requests 49
1.5 I Enterpriu Computing II
l.S.2 Trmuccion Processang II
2.5 Factors Affecting Syst e m s Projects so
2.5. 1 lntern>I Factors 50
I .SJ Business Support 12
2.5.1 Extern>! Factors 52
l.S.4 Knowled&e Mana&e"*" 13
I .S.5 User Producov1ty 14 2.6 Processing Systems Requests 54
I .S 6 D1giul Assistants 15 2.6.1 Sys<ems P.equen forms 54
1.5 .7 Systems lnteinuon 15 2.6.2 Systems Request Tools 54
2.63 Systems Review Committee 54
C..• ~ 1n P. t I 2: Au 1n• '"'° ~ h I • 5
1.6 Organiu.t ional Information Models 16 Case 1n P"'nt 2 1: At '"' y A1r1 " , P.art On~ SS
1.6 I Functions and Organlzadonal l.eve:s 16 2.7 Assessing Request Feasibility 56
1.6.2 Top Man~ers 16 2.7. 1 Feuibtlity Studies 56
1.6.3 Middle Maniiers •nd Know1ed&• Worker> 17 2.7.2 Operauon>l FeaS1bthty 57
1.6.4 Supervisor> and Team Leaders 17 2.7.3 Ecooom<e Feasib1l1ty 57
1.6.5 Operadonal Employees 17 2.7.4 Teclvlical F<!asibillty 58
2.7.5 Schedule Feasfblllty 58
1.7 Syst ems Deve lopment 17
2.8 Setting Priorities S9
1.7. 1 StructuredAnalysls 18
1.7.2 Object-Oriented Analysis 21 2.8.1 Dynamic Priorities 59
2.8.2 F•«ors That Affect Priority 59
1.7.3 Agile Methods 22
1.7.4 Prototyping 24
2.8.3 Discretionary and N ondlscretoonary Projects 60
1.7.5 Tools 24 Case in Point 2.3: Attaway Airline , Part Two 60
1.8 The Information Technology Department 26 2. 9 The Preliminary Investigation 60
1.8.1 Appllcatlon Development 27 2.9.1 Planning the Preliminary lnvesclgadon 61
C;ue in Point 1.3 : Global Hotel~ and Momma's Motels 27 2.9.2 Performing tho Preliminary lnvesdgatlon 61
1.8.2 Systems Support and Security 27 2.9.3 Sumtmn•mg the Preliminary lnvestlg-.tion 68
1.8.3 User Support 28 A Question of Ethics 69
1.8.4 D•toboseAdmlnt>trotJon 28
1.8.5 Network Adminlstrodon 28
2. 10 Summary 69
1.8.6 Web Support 28 Ke:yTerms 70
1.8.7 Qu>l1ty Assuranco (QA) 28 Exercises 72
(....,..... J:gi( . . . . . I_,.. 41 11.,.. ~- )U, Woip-M ._..,.. - ·~•-fllllie<'f •,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. - ~---tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
-
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~
Ta ble o f Contents vii
(....,..... J:gi( . . . . . I_,.. 41 11.,.. ~- )U, Woip-M ._..,.. - ·~•-fllllie<'f •,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. - ~---tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
-
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~
Ta ble o f Contents ix
Case in Point 8.l : Boolean Toys 2'46 Case 1n Point 9.3= Madera Tools 300
8.5 Source Document and Form Design 146 9.8 Data Storage and Access 301
2'47 9 8.1 Tools and Techniques 301
8.6 Printed Output
9.8.2 Logial Venu• Phytical Storage 302
8.6.1 Report ~'II' 2'48
9 8.3 O.ta Cod•ng 303
8.6.2 Report ~lgn Pnndples 248
8.6.3 Tn- of R"'°ru 250 9.9 Data Control 305
Ca.e in Point 8 .3: Luy Eddie 251 A Question or Ethics 306
8.7 Technology Issues 251 9. 10 Summary 306
8.7.1 Output Technology 252 KeyTe,.ms 308
8.7.2 Input TechnolocY 25'4
Exercises 313
8.8 Security and Control Issues 255
8.8. I 0uq>Vt Secumy and Control 255
8.8 2 Input Securtl}' and Control 156
8.9 EmergingTrends 257 Chapter 10
8.9. 1 Modulor Deslsn 257
8.9.2 Re•pon•lve Web Design 158 System Architecture
8.9.3 Prototyp1n1 258
A Question or Ethics 260 Learning Objectives 316
8.10 Summary 260 I 0. 1 A,.chitecture Checklist 317
I0.1.1 Corporat0 Organludon and Culture 317
Key Terms 262 I0.1.2 Enterprise Resource Planning (ERP) 317
Exercises 266 I 0. 1.3 lnltQI Cost and TCO 318
I 0. 1.'4 Sal•b•lity 319
I0. 1.S Web Integration 319
Chapter 9 I 0.1.6
10. 1.7
Legacy Systems
Processing Options
319
320
I 0. 1.8 Security Issues 320
Data Design 10. 1 9 Corporote Portals 320
Case in Point 10.1 ABC Sy.terns 32 1
Learning Objectives 268 I O.l The Evolution of System Architecture 321
9. 1 Data Design Concepts 269 I0.2.1 Mainframe Arch1tec:wre 321
9.1.1 O.ta Scructures 269 IO.l.l Impact of the Ptrsonal Computer 322
9.1.2 Mano and o.,,.ca: Ao.a cnsiin Ex.omple 269 I0.2.3 Network Evoluuon 322
9.1.3 Database Manaaement Systems 271
I 0.3 Client/Server An:hitecture 323
9.1 DBMS Components 272 10.3 I The Client's Role 324
9.2. I lnU!rfaces lor Usen, Database Administrators. and I 0.3.2 OoentJSeM1er Tiers 325
Related Systems 273 I 0.3.3 M1ddleware 326
9.2.2 Schema 2n 10.3.'4 Cost-Benefit luues 326
9.2.3 Physical Data Repository 273 10.3.S Ptrformanco Issues 327
9.3 Web-Based Design 274 I 0.4 The Impact of the Internet 327
275 10.4 .I lntemet·BuedArchiteca.o,. 328
9.4 Data Design Terms
9.'4. 1 Definitions 175 I 0.'4 2 Cloud Computing 328
276 10.4 .3 Web 2.0 329
9.'4.2 Key Field•
9.'4.3 Refttential Integrity 279 I 0.5 E-Commerce Architecture 329
9.5 Entity-Relationship Diagrams 280 I 0.5. 1 In-House Solutions 330
9.5. 1 Drawing an ERO 180 I 0.5.2 Packaged Solu11ons 33 1
180 I0.5.3 Service Providers 33 1
9.5.2 Typos of Refadon•hlps
9.5.3 Cardinality 183 Case in Point I O.l . Small Potatoes 332
Case In Point 9. 1: TopText Publishing 284 I 0.6 Processing Methods 332
9.6 Data N ormalii.ation 284 I0.6. 1 Online Processing 332
9.6. I Saindard N otation Format 285 I0.6.2 Batch Processing 333
9.6.2 First Normal Form 286 I0.6.3 Example 333
9.6.3 Second Normal Form 287 10.7 N etwork Models 334
9.6.'4 Third Normal Form 290 I 0.7. 1 The OSI Model 331
Case In Point 9.2: CyberToys 291 10.7.2 NetworkTopology 335
291 10.7.3 Network Devices 337
9.6.S Two Re>l-World Examples
9.7 Codes 297 I 0.8 W ireless Networks 338
297 I 0.8.1 Stand•rds 338
9.7. 1 Ottrv.-ofCodes
9.7.l Types of Codes 298 I 0.8 2 Topolog1u 339
299 1083 Trends 339
9.1.3 Designing Cod.s
(....,..... J:gi( . . . . . I_,.. 41 11.,.. ~- )U, Woip-M ._..,.. - ·~•-fllllie<'f •,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,.. ..,. - ~---tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
-
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~
Ta b le o f Contents xi
PREFACE
The Shelly C:ishman Series~ offers the finesr rexes in compurer education. \Ve are
proud char our previous editions of Systems Anafysis and Design have been so well
received by insrructors and srudenrs. Systems Analysis and Design, 12th edition
continues with the innovation, qualiry, and reliabiliry you have come to expect.
T he Shelly Cashman Series dcvelopmenr ream carefully reviewed our pedagogy and
analyzed its effectiveness in reaching roday's srudenr. Conremporary srudents read les~
but need to retain more. As rhey develop and perform skills, students must know how co
apply the skills ro different ~errings. Today's students need co be continually engaged and
challenged to rerain whar they're learning. With chis book, we continue our commitment
to focusing on the user and how the)' learn besr.
Facing a c hallenging global markerplace, companies need strong IT resources ro 5ur·
vive and compete effecrivcly. Many of today's students will become the systems analysts,
managers, and lT professionals of tomorrow. This text will help prepare them for rh o e
ro les.
Overview
Systems A nalysis and Design, 12th edition offers a practical, streamlined, and
updated approach to information systems development. Systems analysis and design is a
disciplined process for creating high-qualiry enterprise information systems. An informa-
tion system is an amalgam of people, data, and technology to provide support for busi-
ness furn'tiom
.. •. As technology evolves, so docs systems analysis. The book cmphasi.i:es
the role of the systems ana lyst in a dynamic, business-related environment. A !.ystcms
analyst ii. a valued team member who helps plan, develop, and maintain information
systems. Analysrs must be exccllenr communicators with st rong analytical and crincal
thinking skills. The y must also be business savvy, technically competent, and be cquall)'
comfortable working with managers and programmers. Throughout the book, real-
world examples emphasize critical thinking and l T skills.
I\1any two· and four-year colleges and schools use this book in information systems
and computer science curriculums. The 12th edition includes expanded coverage of
emerging technologies, such as agile methods, cloud computing, and mobile applica-
tions. Thi!> new marcrial complements the updated treatment of traditional approaches
to systems analysis and design.
Using chi~ book, ~tudents learn how to translate business requirements into informa·
tion systems char support a compan y's strategic objectives. Case srudies and assignments
teach analytical reasoning, critical thinking, and p roblem-solving skills. Numerous proj-
ects, assignments, and end-of-chapter exercises are provided, along with detailed instruc-
tor support material.
c..,....lla'c......,........,
a:.a.ww~
A1..,....ai-.en...
~-..,.~·----·~••klk<9i11,..,_0w.~,,...
... ...,,..,.., ..,.......,,,... ........
.. - ... ,...,•_....,.._....,,..._.t._.,doA..,._~•.
.. ., ...cn11.,.__..........,,..-:&-c~..,.--:c--•.,,. .. -~....._.....,.. .... ..,,, ......... ,... ........... ..,._.._
_.._...,~
Preface xv
Ph I
c..., .... .31:8C....,:...._ Al ~ ,,_~,..., •WGfd.~•~• ..... ••,__0.:•*'"-....... -61111,_,,..-_,-.c..........,.._ec ...lllil __.~.t
•......w~~ - ._...., ..,. ...., ........ _ ._ _..........,....,. ....-;11-...~~c-,,....i.__..~w._.._ ........ _ _..,.._.,......,..._..,....._...., ..
xvi Features
FEATURES
CHAPTER LEARNINGTOOLSAND HOWTHEYWILL HELPYOU
Case In Point: Each chapter includes th.rec brief cases thar provide a comextual business
example for students focused on the key issues covered in the chapter.
A Q uesrion of Ethics: A realistic ethical issue is presented at the end of each chapter.
These examples force you to examine your reactions and how you would respond to
common workplace situations.
Chapter Exercises: The chapter exercises are direct!)• related to the learning objectives.
Your answers to the 10 questions will show that you understand the key points. Five
discussion topics and five projects offer opportunities to dig deeper and learn even more.
INSTRUCTOR RESOURCES
We are dedica ted to providing you all the tools yo u need ro make your class a success.
information on all supplementary inaterials can be found on the password-protected
website at logi11.ce11gage.com. If you need help accessing this page, please contact your
(engage representative.
The Instructor Resources include the fo llowing:
• Online Appendix: The Systems Analyst's Toolkit: A 4-parr online appendix reflects
rhc mosr recent changes in today's systems analysis tool .
c..,....lla'c......,........,
a:.a.ww~
A1..,....ai-.en...
~-..,.~·----·~••klk<9i11,..,_0w.~,,...
... ...,,..,.., ..,.......,,,... ........
.. - ... ,...,•_....,.._....,,..._.t._.,doA..,._~•.
.. ., ...cn11.,.__..........,,..-:&-c~..,.--:c--•.,,. .. -~....._.....,.. .... ..,,, ......... ,... ........... ..,._.._
_.._...,~
About The Author x v ii
• Instructor's Manual: Contains lecture notes summarizing the chapter sections, figures
and boxed elemenrs found in ever>' chapter, teacher tips, classroom activities, and
quick quives in ,\ilicrosoft Word files.
• PowerPoint Presentations: A multimedia lecture presentation system provides slides
for each chapter, based on chapter objectives.
• Figure Files: Illustrations for every figure in the text in electronic form.
• Solutions to Exercises: Includes solutions for end-of-chapter exercises.
• Test Bank and Test Engine: Test banks include questions for every chapter, featuring
objective-based and critical thinking question types, page number references, and fig-
ure references when appropriate. Cengage Leanling Testing powered by Cognero is a
flexible, online S)•Stem that allows you to:
• author, edit, and manage test bank content from multiple Cengage Leaming solutions.
• create multiple test versions in an insranr.
• deliver rests £rom your LMS, your classroom, or wherever you want.
ACKNOWLEDGMENTS
A book like Systems Analysis and Design would not be possible without rhc help and
support of a great many people, both past and present. Harry Rosenblarr's contributions
to previous editions of rhe book provided the foll!lldarion for the current edition. His
foresight made updating the material much easieir than it might otherwise have been.
Textbooks these days arc much more than just printed books; they arc educational
platforms that have many moving parts. This means purring together an updated edirion
of a book like this, particularly on an aggressive schedule, is a challenge. I'm pleased to
say that the entire production ream rose to the occasion. Thanks to Jaymie Falconi,
Michele Srulga, Emily Pope, and Maria Garguilo at Cengage for all of their help. Thanks
to John Freitas for providing new screenshors of programs and applications. An>' errors
or omissions in this edition of the text are purely my responsibility.
Finally, sincere thanks to the insrn1ctors and students who offered feedback and com-
ments. We have tried to address your concerns and incorporate your suggestions. As this
field is constantly evolving, we srrongl)' encourage your participation in helping us provide
the freshest, most relevant information possible. We will cenainly continue to listen carefully.
If }'OU have an)' que tions or comments, please contact us through your local representative.
Systems planning is the first of five phases in the systems development life cycle. It's always a
good idea to know whether a project fits the company's overall strategy.A systems project that
does not align with corporate strategies should not be approved. The role of an information
system is to support business goals.
Chapter I focuses on an introduction to systems analysis and design by describing the role
of information technology in today's dynamic business environment.This includes information
systems, lntemet business strategies, modeling business operations, business information
systems, organizational information models, systems development, the information technology
department. and the role of the systems analyst.
Chapter 2 focuses on analyzing the business case, explains how systems projects get started, and
describes how to evaluate a project proposal to determine its feasibility.This includes strategic
planning and strategic planning tools, the business case, systems requests, factors affecting
systems projects, processing systems requests, assessing request feasibility, setting priorities, and
the preliminary investigation.
r..,,...J1DOr-..1-.. 4• 11_.. • ...__. ~....... .,...~ • ........._ . ....._.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... .., .,. ..,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Chapter I Introduction to Systems Analysis and Design
Introduction to
Systems Analysis
and Design
Chapter I is the first of three chapters in the sys- The chapter includes three "Case in Point" dis-
tems planning phase. This chapter explains the role of cussion questions to help contextualize the concepts
information technology In today's dynamic business described in the text. The "Question of Ethics" invites
environment. This chapter describes the development examination of the ACM's code of ethics and those of a
of information systems. systems analysis and design con- developing systems analyst.
cepts. and various systems development methods. This
chapter also summarizes the role of the information
technology department and its people in the enterprise.
r..,,...JmDr-..1-.. 4•11_.. • ...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Phase I Systems Planning
I. I Information Technology 3
I. I INFORMATION TECHNOLOGY
.
Find Jobs •
., ...
Caree< Resource• • Post a Resume C<lmpany Profiles
Information technology & Information systems J obs In Melbourne, Florida (1081 Jobs Found)
FIGURE I · 2 Monscer.com is an example of an online job search w ebsite that IT professionals can use.
Sourc.r. nI en
A system is a set of related components that produces specific results. For exam-
ple, specialized systems route lnternet traffic, manufacture microchips, and control
complex entities like the Hubble telescope, which took the amazing image shown in
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_, .,_.,....,. -~--- tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase I Systems Planning
1.2.1 Hardware
Hardware consists of everything in the physical layer of the
information &ystem. For example, hardware can include
servers, workstarions, networks, telecommunications FIGURE 1-l Consider the amazing technology
equipment, fiber-optic cables, mobile devices, scanners, digital that enabled the Hubble telescope to capture this
capture devices, and other technology-based infrastructure. Image.
Sourcet Co..rt y of it,.. I "'-j,j
A l::irge concentration of networked computers working
together is called a data center. As new technologies emerge, / /
manufacturers race to market the innovations and reap the rewards. . I ~
Hardware purchasers today face a wide array of technology choices and I 1111111 •• • s
decisions. In 1965, Gordon Moore, a cofounder of Intel, predicted that the
number of rransisrors on an inregrared circuir chip would double abour
every 24 months. His concept, called Moore's law, has remained valid for
'
y
l 8ol••
over 50 )'Cars. Fortunately, as hardware became more powerful, it abo
became much less expensive. Large businesses with thousands or millions
[ '
•
s .,...
of sales rranc;actions require company-wide infor mation systems and pow- T
erful servers, which are often now in the cloud, such as those shown in . . 111111 <
E
I
Figure 1-5.
1.2.2 Software
I ..... ~ T
M
I.ii
Soh\\arc refers to the programs rhar control the hardware and produce the FIGURE 1-4 An Information
desired information or resulrs. Somvare consists of S)'Stem sofrware and system needs these components.
application software.
System software manages the hardware components, which can include
a single computer or a global network with many tho usands of c(jents. Either the
hardware manufacturer supplies the system software or a company purchases it
from a vendor. Examples of sysrem software include the operating system, security
software rhat protects the computer from intrusion, device drivers that communicate
with hardware such as printers, and utility programs that handle specific tasks such
as dara backup and disk management. System software also controls the flow of darn,
provides darn security, and manages network operations. In today's inrerconnected
busines!> world, network sofrware is virally importanr.
Application software consists of programs that support day-to-day busines~
functions and provide users with the information they need. Example!> of company-wide
applications, called l.'llterpri\e application~. include order proces!>ing !>y!>tems, payroll
systems, and company conununications networks. On a smaller scale, individual users
can boost productivity with tools such as spreadsheets, presentation software, and
databa~e management systems.
FIG URE 1-S Cloud compudng provides the enormous storage and speed that modern IT systems need.
( ry ~ I/I "°'- <Orr"
Applic:nion software includes horizontal and vertical systems. A hori1ontal sy~ tem
is a sysrem, such as an inventory or payroll application, that can be adapted for use in
many differenr rypes of companies. A verrical system is designed to meer rhe unique
requiremencs of a specific business or industry, such as an online rerailer, a medical
practice, or an au to dealership.
~l ost companies use a mix of software that is acquired at various rimes. When
planning an information system, a compan)' must consider how a new system
will interface with older systems, which are called legacy systems. For example, a
new human resources sysrem might n eed to exchange data with a legacy payroll
application.
1.2.3 Data
Data is the raw material that an in.formation system transforms into useful informa-
tion. For exa mple, an information system using a relational database can store data
in various locations, called rabies. By linking the tables, the system can display the
specific information that the user needs-no more and no less. Figure 1-6 shows a
payroll system that stores data in foLJr separate tables. Notice that the linked rabies
work together to supply 19 different data items. A user c:.in display any or all darn
items and filter the data ro fit defined limits. In this example, the user requested a list
of employees who live in a certain city and worked more rhan 40 hours in the last
pay period. Jane Doe's n:.ime was the first ro display.
The growth of big data has given rise to new ways of scoring, sea rching,
:ind managing data. Tradirional relational models are srill used, but so-called
NoSQI databa~cs are gaining in popularity due to their ability ro scale to extremely
large and unstrucrured datasets.
(....,..... J:gi( . . . . . I_,.. 41 11.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase I Systems Planning
FIGURE I ·6 In a typial payroll system using a relational model, daa is st0ttd on separate ables that are hnked to
fonn an overall daabase.
1.2.4 Processes
Processes de cribe the tasks and business functions that users, managers, and IT sraff
members perform LO achieve specific results. Processes are the building blocks of an
ioforn1ation system because they represent actual day·to-day business operations. To
build a successful information system, analysts muse understand business processes
and document them carefully.
1.2.5 People
People who have an interest in an information system are called stakeholders. Stake-
holders include che management group responsible for the system, the users (some-
times called end users) inside and outside the company who will interact with rhe
system, and IT sea ff members, such as systems analysts, programmers, and network
administrators, who develop and support the syscem.
Each stakeholder group has a viral interest in the information system, bur
most experienced IT professionals agree that chc success or failure of a system
usually depends on whether it meets the needs of irs users. For that reason, it is
essential to understand user requiremenrs and expectations rhroughout the devel-
opment process.
A data breach occurs when a hacker gains illegal access to a system and steals personal data.
such as credit card numbers or home addresses. With more of our information stored in
the cloud. data breaches are becoming increasingly common. Research recent news articles
about large-scale data breaches. summarize why they occurred, and suggest how they might be
prevented in the fuwre.
r..,,...JID)r-..1-.. 4•11_.. •...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Phase I Systems Planning
Sysrems analysts U!.C modeling to represent company operations and informatton needs.
Modeling produces a graphical rcpresenration of a concept or process that systems
developers can analyze, cest, and modify. A S)'Stems analyst can describe and sunpltfy an
information syscem by using a set of business, data, object, network, and process models.
A business profile is an overview of a company's mission, functions, organizanon,
products, services, customers, suppliers, competicors, constraints, and future direction.
Although much of this informarion is readily available, a systems analyst usually
needs co do additional research and fact-finding co fill our missing or incomplete
infonnation. A business profile is the starting point for the modeling process, and
a systems analyst can describe and simplify an infonnation syscem by using a set of
business models and business process models.
A business model describes the information that a system must provide. Analysts
also create models to represent data, objects, oenvorks, and other system components.
Although the models might appear to overlap, they actually work together to describe
the same environment from different poincs of view.
Business process modeling involves a business profile and a set of models that
document business operation~. Model-based systems engineering (MBSE) is one of
the leading methods used by systems analysts co develop informacion systems.
A bu~ines\ process is a specific set of rransactions, events, and result<i that can be
described and documented. A business process model (BPM) graphically displays one
or more business processes, such as handling an airline reservation, filling a producr
order, or updating a customer account. The sales order example in Figure 1-7 shows a
simple model that includes an evenc, rbree processes, and a result.
Ched< Customer
Status
P1ocess
Verily Customer
Veriy Customer
Credit
Cred~
Process
Enter Customer Enter Customer j
Order Data Order Data
_____ ... _
-- ..
........__
=====================··
· - - g Q. ~- · - ·
_.... -·- 0
·- - •
•
0000
0 0 00 .,_
0000
oooa __ _
-·-
Cl
V0(9@ .._..
001
I
(
... ..
. -· 0
'
OciCJO
00011
11==
.... C=i
o.i:.c:..o
0000 ~
•
QoO•
fcoOo
0 -A><>
..
;: . . .
FIGURE I · 9 Lucidchart allows you to drag and drop various symbols and connect them to model a business process.
·- -·-·
Sowc.« Lu.. ,iJ s.... .,..,_
(....,..... J:gi( . . . . . I_,.. 41 11.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f •,... 0w.,,,.._.._,..."-,.._..,.,_, .,_.,....,. -~--- t fta111&....-.~~ ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,...... .,..~ __.~~ c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase I Systems Planning
What is ERP?
ERP stands for Enterprise Resource Planning
What is the simplest ERP definition? Think about all the core processes needed to run a company:
finance, HR, manufactur ing, supply chain, services, procurement, and others. At its most basic level,
ERP integrates these processes into a single system . But new ERP systems are anything but basic.
They provide intelligence, visibility, analytics, and efficiency across every aspect of a business. Using
the latest technologies, ERP systems facilitate the flow of real-time information across departments
and ecosystems, so businesses can make data-driven decisions and manage performance - live.
F IGU RE 1-1 0 SAP is a leading vendor of ERP solutions that can boost productivity.
s...r...
~\
Check Adjust
Credit Inventory process the rest of the transaction.
Status Levels
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 4111.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase I Systems Planning
The earliest business computer systems replaced manual tasks, such as payroll
processing. Companies soon realized that computers also could produce valu-
able information. The new systems we re called manageme nt info rma tion 'Y~ tem s
( ~US) because managers were the primary users. Today, emplO)'ees at all levels
need informanon to perform their jobs, and they rely on informanon system~ for
that support.
A business support system can work hand in hand with a TP sy tern. For exam-
ple, when a cornpan)• sells merchandise to a cusromer, a TP system records the sale,
updates the customer's balance, and makes a deduction from inventOf)'. A related busi-
ness support system highlights slow-
or fast-moving items, customers
with past-due balances, and inven-
tory levels that need adjustment.
To compete effectively, firms
must collect production, sales,
and shipping data and update the
compan>r-wide business suppo rt
system immediately. Auto ma ted
data acquisition is possible using
technology such as radio frequency
identificatio n (RFJD), which uses
high-frequency radio waves to track
physical objects, such as the shirt
shown in Figure 1- 12. Major retail-
ers such as Walmart, which requires
its suppliers co add RFlD rags to
all item , have fueled RFlD's dra-
matic growth by tracking produces
throughout the retail process. FIGURE 1- 1l With an RFID tag. items can be tracked and monitored throughout
An imporrant feature of a the retail process.
b~mess supporr system is decision ~
• WolframAlpha - -
•I
_..,_
Matte• a:1 ••
1...
Sdnn & '!echnclagy •
s -
Sodo!y & Culluze • ~Ult
1
--
--
.!:! - · -
• .,.,...,._ .a • -·-
-
t.:
1
. . """"
. •:. L._..'*'t m O.tnll.Tima v
>: 1 -
rt' ........ ._.. ~ .,_, \v; ..,...,~, IMPo"lllWWIW
~ ..,,,,, !C.""1CM
.. \
11111
~1'9"1i.tll•.. •'Hll'll
,._,,~..
~
"':!JI( f•1o''*POtUt1Clrl
•• .....
Poll*'lfAOtrt""J'
:.:..i · -
• ....T.clfly tWllll1d
-------- -·--
·-··-·" - _ ............---
----...---
- -
.....,.
---
----
..-·----·-··-·-
Imagine you work for a large automotive company. Your manager asks you to look into integrat-
ing a digital as.sistant into a new vehicle for the next production year. How would understanding
your company·s business profile help you complete chis task?
r..,,...JID)r-..1-.. 4•11_.. •...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Chapter I Introduction to Systems Analysis and Design
Top
Managers
Middle Managers
and
Know edge
Workers
Operabonal Efr4>toyees
FIGURE 1-1 6 A typical organizational model identifies business functions and organiutional levels.
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 4111.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase I Systems Planning
I. 7 SYSTEMS DEVELOPMENT
Many options exist for developing information systems, bur the most popular
a lternative~ are !itructurcd analysis, which is a traditiona l method that scill is widely
used, object-oriented (0-0) analysis, which is a more recent approach thac many
analysts prefer, and agile methods, which incl ude t he laresc trends in software devel-
opment. Figure 1-17 provide~ an overview of the th ree methods, which are discussed
in the following !.Cccions.
Although most projects utilize one approach, it i!> not unusual for systems devel-
opers to mix and match methods to gain a better perspective. [n addition tO rhese
three main development methods, some organiza1tions choose to develop their own
in-house approache!> or use techniques offered br software suppliers, cool vendors, or
consultants. Manr alternatives exist, and IT experts agree that no single development
method is bei.c in all cases. An approach that works well for one project might have
disadvantages or risks in another situation. The imponant thing is to understand the
various methods and the srrengths and weaknesses of each approach.
18 I. 7 Systems Development
Description Represents !he system in terms Views the system in terms Scresses intense team-based
al daa and !he processes !hat of objects that combine effort. Breaks development
act upon that data.System data and processes. The into cycles. or iterations,
de< elcpment IS organized objects represent actual that add functionality. Each
into phases. with deMrables people, things, transactions. cycle 1s designed. built. and
and milestones to measure and events. Compared to tested in an ongoing process.
pi ogi ess.The watemll model structural analysis, 0-0 Attempts to reduce ma1or
typically consists al five phases tend to be more risks by incremental steps In
phases: requil el IM!l ltS. desipl. interactive. Can use the short time intervals.
ConstruCOOl'I. testing. and waterfall model or a model
mamtenanee & e\IOlution. Iteration that stresses greater
is possible among !he phases. iteration.
Mode ling Data flow diagrams (DFDs) and Various object-oriented Tools that enhance
Tools process descriptions, which are diagrams depict system communication, such as
described In Chapter S. Also, actors, methods, and collaborative software,
business process modeling. messages, which are brainstorming. and
described in Chapter 6. whiteborads. Business
Also, business process process modeling works well
modeling. with agile methods.
Pros Traditional method that has Integrates easily Very flexible and efficient in
been very popular over time. with object-oriented dealing with change. Stresses
Relies heavily on written programming languages. team lnteraroon and reflects
documentation. Frequent phase Code is modular and a set of community-based
iteration can provide flexibility reusable, which can reduce values. Frequent deliverables
comparable to other methods. cost and development consandy v.ahdate the
Well-suited to traditional time. Easy to maintain project and reduce risk.
project management tools and and expand because new
techniques. objects can be created using
inherited properties.
Regardless of rhe devclopmenr stra tegy, people, tasks, rimerables, and cosrs must
be managed effectively. Complex projects can involve dozens of people, hundreds of
ra~ks, and many thousands of dollars. Project management is the process of planning,
scheduling, monitoring, controlling, a nd reporring upon the devclopmcnr of an infor-
marion system. Chapcer 3 describes projecc management rools and rcchniques in derail.
I. 7. I Structured AnaJysis
Srrucrured anal)•sis is a traditional systems developmenr rechniquc rhac is rime
rested and easy co undersrand. Srrucrured analysis uses a series of phases, called rhe
('...,...., Jlt.'lit(ftllllpl. . . . . " ' It............. \I _,- "'"""«iflN ~- .............. .... ,,......_ ........ _ ... ,..y... .., . . ...,.....,.4 .._ ........ -··~~
............w. .................................. ......., . . . . . ....-i .......~. c:...a.-..---•"'• · ............... - ..... - 4 ............... ~ ..... .
Phase I Systems Planning
~ys tems develo pment life cycle (SDLC), co plan, analyze, design, implement, and
support an information system. Although structured analysis evolved many years
ago, it remains a popular systems development method. Structured analysis is based
on an overall plnn, similar to a blueprint for constructing a building, so it is called n
predictive nppro:ich.
rrucrured :innl)•sis use a sec of process models co describe a system graphically.
Because it focu~e~ on processes that transform data into useful mformarion,
structured anal)'sis 1s called a process-centered technique. In addition ro modeling
the processes, srrucrured analysis also addresses data organization and structure,
rel:uional database design, and user interface issues.
A process model shows rhe data that flows in and our of system processes. Inside
each process, input data is transformed by business rules that generate the output.
Figure 1-18 shows a process model that was ere-aced with the Visible Analyst CASE
tool. The model, which represents a school registration system, is a called a data flow
diagram (DFD) because it uses various symbols and shapes to represent data flow,
processing, and storage. DFDs are discussed in more detail in Chapter 5.
x
41 V•,.blt 4n4'y11 · IRfGIST RATION PROCESS MODEU>FD)
li F~t
CJC!J:.l
[d< Vo<w °"''°"' Rq>OMt"')' 0..gftm Tools W.ndow - " Help
W .J1' ~ '1.a ia l • 4 ~ o""'a "' .. ,"\ ..,, , T
[J
-" .
1~ vj •4 14, I .J • ol I
Sl\JDENTS OUTPUT
C'Ol'RS£S
< >
I~ ISOiOOL REGlS-
F IG URE 1- 18 This Visible Analyst sc:reen shows a process model for a sc:hool registration system.The REGISTER STUDENTS process
accepts Input data from two sources and transforms it into output data.
Source:: V" ! ,,. t"" ("'Pl~ 11(~1
Structured analysis uses the SDLC to plan and manage the systems development
process. The SDLC describes activities and functions that all systems developers per-
form, regardless of which approach they use. In the waterfall model, the result of each
phase is called a deliverable, which flows into the next phase.
Some analysts see a disadvanrage in rhe built-in structure of rhe SDLC because
the waterfall model does not emphasize interacriviry among the phases. This criticism
can be valid if the SDLC phases are followed too rigidly. However, adjacent phases
can and do interact, as shown by the circular arrows in Figure 1-19, and interaction
among several phases is nor uncommon. Used in chis manner, the traditional model is
not as different from agile methods as ir might appear ro be.
SYSTEMS ANALYSIS: The purpose of the systems analysis phase is to build a logical
model of the new system. T he first step is requirements engineering, where the a nalyst
invc~tigates business processes a nd dlocuments what the new system must do to sat-
isfy users. Requirements engineering continues the investigation that began during the
system~ planning phase. To understa nd rhe system, fact-finding using techniques such
as interviews, surveys, document rev iew, ob:.ervacion, and sampling is performed. The
fact-finding results a re used to build business models, data and process models, and
object models.
The deliverable for the systems analysis phase is the ~>~tern req uirements
document. The system requiremencs document describes management and user
requirements, costs, and benefits and outlines alternative development strategies.
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 4111.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- t fta111&....-.~~ ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase I Systems Planning
SYSTEMS DESIGN: The purpose of the systems design phase is to create a physical
model thar will satisfy all documented requiremenrs for the system. At this srage, che user
interface is desii,'lled, and necessary outputs, inpucs, and processes are idenrified. In addi-
rion, internal and external controls are designed, including computer-based and manual
features, to guarantee that the system will be reliable, accurate, maintainable, and -;ecure.
During the systems design pbase, the applicarion a rchirecrure is also determined, which
programmers will use ro cransform the logicaJ design into program modules and code.
The deliverable for this phase is the system de5ign specifica tion, which is presented
to management and users for review and approval. Management and user involve-
ment are critical to avoid any misunderstanding about what the new system will do,
how it will do 1r, and what it will cost.
SYSTEMS SUPPORT AND SECURITY: During che systems ~ uppo rt and security
phase, the IT staff maintains, enhances, and proteccs the system. M aintenance
changes correct errors and adapt to changes in the environment, such as new rax
races. Enhancements provide new features and benefits. The objective du ri ng this
phase is to maximize return on the IT investment. Security controls safeguard the
system from both external and internal threats. A well-designed system must be
secure, reliable, maintarna ble, and scalable. A scalable design can expand to meet
new business requirements and volumes. lnfom1ation systems development is always
a work in progress. Business processes change rapidly, and most information systems
need to be updated significantly or replaced after several years of operation. For
example, a web-based sysrem may need more servers added to cope with increased
workJoad.
I. 7 .2 Object-Oriented Analysis
Whereas structured a nalysis rreats processes and data as separate componenrs,
object-oriented analysis combines data and the processes that act on the data as
objects. Systems analysts use 0-0 to mode l rea l-world business processes and opera-
tio ns. The result is a set of softwa re objects that represent actual people, things, rrans-
actions, and events. Usi ng an 0 -0 programming la nguage, a programmer then writes
the code rhat creates the objects.
An object is a member of a class, which is a collection of similar objects. Objects
possess characteristics called properties, which the object inherits from its class or
possesses on its own. As shown in Figure 1-20, the class called PERSON includes
I STRUCTOR and STUDENT. Because the PERSON class bas a property called
Address, a STUDENT inherirs the Address propeny. A STUDE1'.'T also has a property
called Nla1or thar is nor shared by ocher members of the PERSON class.
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- t fta111&....-.~~ ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase I Systems Planning
...., ____ Q
lQ Scrum.org
EVENTS
Scot.So~
- 1. 2018 9 Edncugn
Don t miss ScNm org CEO Dave West as he is a keynote speaker fO< lhlS
....,•nl
FIG URE I 022 Scrum.org is a popular website supporting the agile community.
s~.l ~,.,,.,, 1
Agile merhods typically use a ~piral model, which represents a series of itcrarions,
or revisions, based on user feedback. As the process continues, the final product grad-
ually evolves. An agile approach requires intense interacrivity between developers
and individual users and does not begin with an overall objective. Instead, the agile
process determines the end result. Proponents of the spiral model believe that this
approach reduces risks and speeds up software development.
1.7.S Tools
All systems development methods must be supported by tools to en:.ible the systems
analyst to develop, manage, and maintain large-scale information systems. These tools
go by various names, including a pplication lifecycle management (ALM), a lso called
prod uct li fccycle management (PLM ); integrated development environments (IDE);
::ind computer-a ided systems enginee ring (CASE), also called computer-a ided software
engineering. CASE tools provide an overall framework for systems development and
support a wide variety of design methodologies, including structured analysis and
objcct-orienred analysis.
(....,..... J:gi( . . . . . I_,.. 4111.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- t fta111&....-.~~ ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase I Systems Planning
D D D
--·- - ·- -
Visual Studio IDE
-- - -·-
I' ..---
..
···-
t - ,,,,,_.' - ,..
- - - -· ·
Fully-featurtd 1ntt.'9rak-d o.:vdoprrn:t l t:riwonment
(IOE) -
··-
··-
··-
•
•
-- .......... =----............................--..
t ' , 7111 I • .._
··-
.- --
fo< Android. 10S. rnacOS, web, and doud
··- ·--- I"------··
--
·-:==:... ·--
·-·
·-·
·-
•
I -·-
.-.... ~ ........
-~
··-===::....
··-
·-
r". -·oo=
-- -·-
~=~-
Download Vo~ual Studio for Mac .!.
. -- -••
••
- •
-
-~ J
- -
FIGURE I · 2 4 Microsoft Visual Studio is a fully-feawred integrated development environment (IDE).
Sour<e: """ •o • tt Co• p• .. 1
No Magic
.• c.........,_ ... ~
'••CNdl --..--.....-·..........
I ......a..,-°""*'~,....Wld~"'feoolsto . . . . tne*.lftel~.al---bOI
a d cx....Srr'IMlmidelSD...,.,lllt••••w•••...................
... -<v
......
• Trn. . . .....-n~b-.ntl
..... ---·---~
FIGURE I ·25 Cameo Systems Modeler is a cross-platform collaborative Model-Based Systems Engineering
(MBSE) environment.
SOYrc:•: " ' ""ltt ·( n:
all computer support activities and services, whereas a large corporation might
require many people with peciali1ed skills co provide information systems support.
Figure 1-26 shows a typical IT organization in a company char has networked PCs,
enterprise-wide databa~es, centralized processing, and web-based operations.
IT Departme nt
Otrector
lnlonnation Technology
I
Apphcauoo
Development
l
I_
Syslems Support
and Secunty
I
User
Support
I
Database
AdminlstrallOn
~'- _ I_
Network
Administration
Web
Support
I
Ouahty
Assurance (QA)
FIGURE 1-26 Depending on its size, an IT department might have separate organization units for these
functions. or they might be combined Into a smaller number o f ceams.
Suppose you work in the IT department of Global Hotels. a multinational hotel cham. Global
Hotels runs several specialized business support systems. induding a guest reservations system
that was developed in-house to meet the requirements of a large company with worldwide
operations. Guests can make one-stop online reservations by visiting Globals website, which has
links to all major vavel industry sites.
Global Hotels fust acqu ired Mom ma's, a regional chain of 20 motels. Momma 's uses
a vertical reservations package suitable for small- to medium-sized businesses and a
generic accounting and finance package. Should Momma's use Global Hotels' information
systems or continue with its ownl In your answer, consider issues such as business
profiles, business processes, system interactivity, and e-commerce.What addit ional
informat ion would be helpful to you in making a recommendation?
r..,,...JID)r-..1-.. 4•11_.. •...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Chapter I Introduction to Systems Analysis and Design
A systems analyse invest igates, analyzes, designs, develops, insralls, evalua tes, and
maintains a company's information s ystems. To perform chose tasks, a sysrcms ana-
lys t constan tl y interacts with users ai!ld managers within and o utside rhe compan y.
The fo llowing sections describe a systems analyst's ro le, knowledge, skills, ed ucation,
certifications, a nd career opportunities.
1.9. 1 Role
A systems analyst helps d evelop IT systems rha r s upport business requirements. To
succeed, ana lysts often mus t ace as translato rs. For exam ple, when chey descri be
business processes to programmers, t hey muse speak a language thar programmers
will undersrand clearly. Typically, the analyse build s a series of models, diagrams,
and decision rabies and uses other descriptive cools and technique . Similarly, w hen
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- t fta111&....-.~~ ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase I Systems Planning
communicating with managers, the analyst often must cranslate complex technical
issues into words and images thar nontechnical people can grasp. To do this, the ana-
lyst uses various presentation s kills, models, and communication methods.
Analyse arc often che company's best line of defense against an IT disaster-a <tystcm
that is rcchnically sound bur fail s because it does not meet the needs of u<;e~ and manag-
ers. \Xlhen thil> occur<;, poor communication i usually to blame. For an analyst, the most
valuable skill i<t the ability to listen. An effective analyse will involve users in every <ttcp of
the development process and listen carefully ro what they have to say. As the process con-
tinue , the analyse will seek feedback and comments from the users. This mput can pro-
vide a valuable early wammg system for projecrs chat might otherwise go off the crack.
I E
~ -~-- ~ , -
. -- -
r
. '
FIGURE 1-27 INCOSE Is one of the leading organizations offering systems analysts a w~lth of lnfonnation.
news. training. communities, and more.
on-site and online. Nerworking with colleagues is another way to keep up with new
developments, and membership in professional associations also is important.
BUSINESS SKILLS: A systems analyst works closely with managers, supervisors, and
operational employees. To be effective, be or she must understand business operations
and processes, communicate clearly, and translate business needs into requirements
that can be understood by programmers and systems developers. A successful analyst
is business-oriented, curious, comfortable with financial cools, and able ro sec the big
picture. Chapter 2 describes some basic concepts, including strategic planning, SWOT
analysis, and feasibility tests.
CRITICAL THINKING SKILLS: Most educators agree that critical thinking skills
include Lhe abi lity co compare, classify, evaluate, recognize patcerns, an3 lyt.e cause and
effect, and apply logic. Critical thinkers often use a what-if approach, and they have
rhe ability to evaluate rheir own thinking and reasoning.
Critical thinking skills are valuable in the IT industry, where employers seek
job candidates who can demonstrate these skills and bring them to the workplace.
Figure 1-28 shows the website for Critical Thinking Community, a nonprofit
organization rhat provides encouragement and resources for critical thinkers.
FIGURE 1-28 The Critical Thinking Community Is a nonprofit organlzadon that provides encouragement and
resources for critical thinkers.
Soun:. 0 ..r ,~,..."'
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~---tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase I Systems Planning
1.9.3 Certification
~1any hardware and software companies offer certification for IT professionals.
Certification 'erifies that an individual demonstrated a certain level of knowledge and
skill on a standardized test. Certification is an excellent way for IT professionals to
learn new skills and gain recognition for their efforts. Although certification does not
guarantee competence or abtliry, many companies regard certification as an import·
ant credential for hiring or promotion. Certification is discussed in more detail in
Chapter 12.
In addition to traditional hardware and software certifications, some firms :.ire
exploring ways to assess critica l thinking skills, as shown in Figure 1-29. These ski lls
include perception, organization, analysis, problem solving, and decision making.
Whether or not form:.i l certification is involved, these skills are extremely valuable ro
IT professiona ls and the employers who hire thetin.
THINK Watson
----
------- -·
.- =-- -.._________ _
.--------
- ..==-----====---·--=:.--
------ ==----
~"'"'=='--
:::-::::::::..~
-..._~==--
--· _, --
':···~ii!!'
-----·--- --:::-----~--
- ...----::---..---
=---::.
- W .:-.:---a.:;::_:::
·-
- - r
........
efW.tliDr't-GIM« ............ ..
ret'WI\
l*'fca WWW l (at!W ,,...,, U'IC9 ~
F I GURE 1- 29 Employers lllce co hire people who can think logically and effectively.
Sourc.,. lu
JOB TITLES: Firsr, do nor rely on job rides alone. Some positions are called sys rems
analysts bur involve only programming or rechnical support. In ocher cases, sysrcms
analyst responsibilirics a re found in positions rirled computer specialist, programmer,
programmer/analyse, sysrems designer, software engineer, and variou~ ochers. Be sure
rhc responsibi lities of the job are stated clearly when considering a position.
COMPANY ORGANIZATION: Find our everything about the company and where
the IT department fits in the organizarion chart: Where are IT functions performed,
and by whom? A firm n1igbr have a central IT group bur decentralize the systems
development function. This situation sometimes occurs in large conglomerates, where
rhe parcnc company consolidates information char actually is developed and managed
at the subsidiary level.
COMPANY SIZE: A smaller firm migbr provide more variety. However, a larger com-
pany wirh scare-of-the-arr sysrems provides opportuniti~ for speciah.mrion. Alrhough
there mighr be more responsibiliry in a smaller company, rhe promorional opporruni-
nes and financial rewards could be grearer in larger companies. Working as an inde-
pendent consulraor is also an option. l\1aoy consuJring firms have been successful in
offering rheir services ro smaller business enterprises that do nor have the experrise co
handle systems development on their own.
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- t fta111&....-.~~ ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase I Systems Planning
~ · f~ LlMHMC*•
Trust
_,..,,,,......_,.,.. ........
~ ..................."
.....,.,. . _°"'ONN
OJ<,t~r Sore@S.~
.....
0...---... ...-
~.,,,~.,.,
lnnOlr.ltlOll
,_.,. _..,,.. .,_DNA
0wr weiw....,, w p I ... __
... ......... .. .,..
Equo ty
~·,,.,.·-~·
--·-
Oii. :pl ,.. . . . . . .ra- ,,...,,.,.,., to_.... MON ..... w' t' I Cl llNll worid
............ .. ......
FIGURE 1-30 A corporate culture like Salesforce is likely to attract. retain. and motivate the best and
brightest people.
,_..,
that buying capaciry on demand from a thriving vendor marketplace can reduce the
capital co ts needed for in-house computing infrastructure. It also present<> addi tional
securiry needs to address.
If cloud computing represencs the computational aspect of processing, data ~ciencc
represents the data aspect. The world is producing more and more data at an
incredible rate. New cools and techniques are being developed to manage these large
datasets. Areas such as machine learning and predictive analyncs are expericncmg
tremendous growth as companies try to apply artificial intelligence techniques ro the
problem of big darn. As depicted in Figure L-3 I, many of the developments related
co big data arc driving trends in information technology-trends rhe S)'5tems analyst
must follow to stay current.
FIG U RE 1-3 1 Big data is driving many new developments 1n information ttthnology.
I ('< ~
Mobile devices and the app ecosystem that goe!> with them are a revolurionary
development in information technology. The shift of computing capabilities ro "the
edge" of rhe network has put unprecedented power in the hands of end users. Smart-
phones are rhe most common computing device on the planet, and ~ystems analysts
will need to know about the role of apps and the effect of the bring your own device
(BYOD) movement in the enterprise.
Traditionally, IT companies were identified as product-oriented or service-
oriented. Prod uct-o riented firms manufactured computers, routers, or microchips,
while service-oriented companies included consultants, vendors, software devel-
opers, and service providers. Today, those distinctions are gone. Most successful
IT companies offer a mix of products, services, and support. Value-added services
such as consulting, software, and technical support often are more profitable than
hardware sales.
Social media rides on some of the trends mentioned earlier, such as cloud
computing, darn science, mobile devices, and service orientation. 1lowever, social
media has had arguably the most profound influence on sociery. \'Vitness the popularity
of Facebook, with over 2 billion users worldwide. Companies tap into the power of
social media, coupled with location-aware apps, to create truly innovative solutions
that arc chnnging the face of information technology.
(....,..... J:gi( . . . . . I_,.. 41 11.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- t fta111&....-.~~ ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase I Systems Planning
I. I0 Summa ry 35
You are enjoying your job as a summer intern in the IT department of a local company.
At lunch yesterday, several people were discussing ethical issues. You learned that some of
them belong to IT organizations that have ethical codes to guide members and set profes-
sional standards. For example. your supervisor belongs to the Association for Computing
Machinery (ACM), which has over 100,000 members from more than 100 countries and a
website at ocm.org.Your supervisor said that the ACM code of ethics is important to her
and would definitely influence her views. On the other hand, one of the senior program-
mers believes that his own personal standards would be sufficient to guide him if ethical
questions were to arise.
Because you are excited about your career as an IT professional, you decide to
visitACM's website to examine the code of ethics and make up your own mind.After
you do so, would you tend to agree more with your supervisor or with the senior
programmer!
I.I 0 SUMMARY
Information technolog)' (IT) refers to the combina tion of ha rdware, software, and
services rhat people use to manage, communicate, and share informarion. Technology
is changing rapidly, and IT professionals must prepare for the future. IT suppor~
business operations, improves productivitr, and helps managers make decisions.
Systems analysis and de 1gn is the process of developing information systems that
rransform data into useful information, and systems analysts are IT team member
who help plan, develop, and maintain information systems.
The essenrial components of an informarion system are hardware, software, data,
processes, and people. Hardware consists of everythi ng in the physical layer of the
informanon system. Sofrware consists of system software, which manages the hard-
ware components, and application software, which supports day-to-day business
operations. Data is rhe raw material chat an information system transforms into use-
ful information. Processes describe the tasks and functions char users, managers, and
IT staff members perform. People who interact with a system include users, from both
within and outside the company.
M ost s ucces~ful companies offer a mix of produces, technical and financia l
services, consulting, and customer support. A rapidly growing business category
is the Internet-dependent fi rm, which relies solely on Internet- based operations.
E-commerce includes business-to-consumer (B2C) sales, and business-to-busi ness
(B2B) transactions that use Internet-based digital marketplaces or private electro nic
data inte rchange (EDI) systems.
A systems analyst starts with a business profile, which is an overview of company
fu nctions, and then he or she creates a series of busi ness models that rep resent busi-
ness processes, which describe specific tra nsactions, events, tasks, and results. Ana-
lysts use business process modeling rools to document complex operarions. Systems
analysts u e modeling, prototyping, and computer-aided systems engineering (CASE)
tools. Modeling produces a graphical representatio n of a concept or process, whereas
prototyping involves the creation of an early working model of the information or its
components.
r..,,...JID)r-..1-.. 4•11_.. • ...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Chapter I Introduction to Systems Analysis and Design
36 I. I0 Summary
Based on their functions and features, business information systems are identified
as enterprise computing systems, transaction processing systems, business support
systems, knowledge management systems, user productivity systems, digital a5sistants,
or systems integration. In most companies, significant overlap and integration exists
among the various types of information systems.
A typical organization structure includes top managers, middle manager5 and
knowledge workers, supervisors and team leaders, and operanonal employees. Top
managers develop strategic plans, which define an overall mission and goals. Middle
managers provide direction, resources, and feedback to supervisors and team leaders.
Knowledge workers include various professionals who function as support staff.
Supervisors and ceam leaders oversee operational employees. Each organi1arional
level has a different set of responsibi Ii ties a nd information needs.
Three popular system development approaches are structured analysis, which is a
tradi tional method that still is widely used, object-oriented analysis (0-0), which is a
more recent approach chat many analysts prefer, and agile methods, which include the
latest trends in software development.
Structured a nalysis uses a series of phases, called the systems development lLfe
cycle (SDLC) that usually is shown as a waterfall model. Structured a nal ysis uses a n
overall plan, similar to a blueprint for construc ting a building, so it is called a predic-
ti ve approach. This method uses a set of process models co describe a system graphi-
cally and also addresses data o rganization and structure, relational database design,
and user inrerfacc issues.
Objecr-orienred anal ysis combines data and the processes that act on the data inro
things called objects chat represent people, things, transactions, and events. Objects
have characccrisrics, called properties, and built-in processes, called methods, and can
send information to ocher objects by using messages. Using an 0-0 programming
language, a programmer then writes the code that creates the objects. Object-oriented
methods usual!)' follow a series of analysis and design phases similar co the SDLC,
but the phases arc more interactive.
Agile methods are the newest development approach and anempt co develop a
system incrementally by building a series of prototypes and con5ranrly adjusting them
to user requirements. Agile methods typically use a spiral model, which reprcsenn, a
!>ertes of iteration , or revisions, based on user feedback. The repeated 1terauons pro-
duce a series of prototypes, which evolve into the finished system.
Regardless of the development stra tegy, people, tasks, timetables, and costs must
be managed effectively using project management tools and techniques, which are
described in derail in Chapter 3.
The IT department develops, mai11tains, and operates a company's information
systems. IT staff members provide technical support, including application develop-
ment, systems suppo rt, user support, database administra tion, network administra-
tio n, web support, and quality assurance. These functions overlap considerably and
often have different names in different companies.
In addition to technical knowledge, a systcn1s analyst must understand rhc busi-
ness, chink critically, and commUI\icace effectively. Valuable credentials such as certi-
fications arc available to systems analysts. A systems analyst's responsibilities depend
on a company's o rganization, size, and culture. Systems analysts need to consider sal-
ary, location, a nd future growth potential when making a career decision.
Some of the key trends in information technology include agile methods, artificial
cloud computing, data science, mobile devices, service orientation, and social media
networks.
(....,..... J:gi( . . . . . I_,.. 4111.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase I Systems Planning
Key Terms 37
Ke y Te rms
agile method\ Sy\ttms de' clopmcnr methods char arrempr 10 de,·elop a sys1em incrementally by build·
ing a senc> of prOIOt) pes and cons13Jltly ad1usliog them to user requiremems. Rela1ed to ad.iptin•
methods.
app A soff\, are appltc.mon th.it runs on a mobtle dence. such as a smartphone or tablet.
applocat10n hftC)dt mana11cmcnt (ALM) Acrivitie\ 1ha1 co,·cr rhe entire SDLC, indudmg requ1remen1>,
dc"11n, de,•dnpmcnr, tc,nn11, and dcplopncnr and management of ~nftware appli~non\.
apphcaunn ,oftwarc Sofn.arc program\, such as email, word proc~'o", .,prcad,hecr-. and graphic'
packages. u..ed hy emplo)'ce<. in rypica I office o;cenarios.
artificial intelligence The atrempr co recreate narural inreUigence through software in machines.
B2B (busincss·to bu1ineu) A commercial exchange (e.g., producrs or services) bcn,een businesses, typi·
cally enabled by tlw lmernet or electronic means.
B2C (bu•it11.'\ \·to-co111umcr) A commercial exchange (e.g., produces or service,) between bu\inc\\eS and
con•umeri. conducted over the Internet.
hi11 d:ll,\ F.xircmcly laq.\c datnsct\ (c.11., pctahytcs) requiring no ntraditiona l ~ppruache, to deal wi th
them. Snmcrime\ chnracrcri1.cd hy three term<: volume, variety, and velocity.
bring your own de, ice (B\'Ol>) An equipmenr managemenr model where employees arc in charge of
their devices (e.g .. computers, 1ablets, smartphones) ac work, noc 1he lT deparrmcm. Tlus includes
device selecuon Jnd Sl'lup. progum installation and updating. and network connecti' ity (indudmg
security).
busineu model A graphica l representauou of business functions that consist of busin~s processes, such
.1s s.iles, .1ccoun11ng, and purch.1S1ng.
hu'1nC\\ prncc" A dC'lc,.iprion of •pecific event<, ra<ks, and dc<ircd rc<ult<.
bu,inc" pr!ICC\\ model RPM ) A graphical reprco;enratiun of one or more bu<inc" procc,'>C<.
businC'ls proce<< modeling no1a11on (BPM:-:) A srandard sec of shapes and symhols used to repr~nt
e\ enrs. processes. and work flows m computer-based modeling cools.
business profile A definition of a company's overall functions, processes, organiunon, product>, ser-
vic~. customer.. >upphtrs, compernon., constramt>, .md furure drrecuoo.
bu,ine<,\ rule\ How a » •tcm handle> data and produces U5Cful informauon. Busincs;, rule\, al;o ~allcd
hu>incs' logic, rcflcct the operational requirements of the busincs>. Fxamplc, 1ndudc adding the
proper amount of <ale< tax m invoices, calculating customer balances and finance charge<, and dc1cr·
mining whether a c:usmmcr is eligihlc for a ,·olume-ba\Cd discounr.
bu\ine-.\ \upport \Y\IClll\ Provide job-related informarion support co user< at all lt'vel\ of a company.
CASE 1ools Powerful software used in computer-aided S)'Stems engineering (CASE) ro help systems ana·
l)'St> develop Jnd mamrn in information S)''tetus.
certificauon A credenii.11 Jn individual earns by demonstrating a certam level of knowll'dge .ind skill on
a sta11dard1ted tcsr.
das~ A term u\cd 111 object-oriented modeling to indicate a collection of ~iniilar objc"'·
computcr-a1dcd \Oftwarc cngmccring (CASE) A technique that use< powerful program< ca lled CA ~r.
tool< co provide an overal l framework for systems development. T he tools ~upport a wide varicry of
design methodologie,, including srrucnired analysis and objecr-orienced analysis. Also referred to a'
compmcr-aidcd ;y;1e1m engineering.
computer-.udcd >>Stem; cn111neet1nR 1CM.£) See compmer-aided software engmeermg (<..A~E).
wrporatc culture A >et of beliefs, rul~. 1radmons, \alues. and attitude~ that define J cornpau) and mflu·
em:e 1r< wa) of doing business.
38 Key Terms
critical Lhinl.mg ~I.ill> The abilif} to compare, dassif), evaluJte, rccognne panem>. anal) Lt cause and
effect, and apply logic. Such skills are valued m the IT mdusrry.
dat.t The ra\\ m.11erial or basic facts used by informauon S) stem>.
d.ua center A !Jrgc ton~cntrarion of ncrworkcd computer' working together.
data no\\ d1a11ram (Df D) Graphical rcprC\cnlation of the \)>Lem, \hem mg II \tore\, prnu:"e', and tran>-
form' Jara mm u-cful information.
data ~ocnce lnrerd1~1pltnary field rhar blends computer science, math and stausucs, and bu~iness merh-
ods 10 anal)'Zc large darasers. Involves artificial imelligcnce. machinc learning .ind prcdicn"c analytics,
and v1sualitation techniques.
Jell\ crabl~ A polished, fu1al product, suitable for its intended use. £nd product> or del1verJbles often
cornc1de wnh the complenon of each SDLC phase.
e·commcf(C tclccironic conuncrcc) Transactions (e.g., buying anti ,cllinµ of l\(X>U\ and onfnrmaunn) that
c><:cur on the Internet. Includes both businc~-to-consuoncr and bu,ine.-· to· l)l1'inc,s.
clcc1ronic dnra inrcrchanJle (FDT) A process that involve' computer-co-computer transfer of darn
bcrwccn companies.
cmpo"ermcnt A business prnccice chac places more responsibility and ,1ccoumuhiht) rhrougbour all lev-
els of .Ill org.mizaliou.
enterprise applic.mons Comp.tn)·wide applications, such as order processwg systems. pJyroll systems,
Jnd compJn) communicanons networks.
c:nterpri\c rnmpurini: Information 'YMcms char >t1pport lompany-w1Je data ma11a11emcnt requirement\,
,uch a• airline rc<;crvanon' or credit card billing sy.tcms.
cntcrpri\e re\our'c planning (FRP A process that cstablishc, an cnccrpri-c-w1Je \trnrei:y for IT
rc,ourccs. FRP defines a <pecific archirccrure, including ''andard< for data, procc,,ini;. network, and
u-er imcrfol-C d<'\1gn.
fcasibilm study An mmal in\'esrig;uion to clearly identify the n.uure and scope of the business opporrn-
mr) or problem. Also called preluninary 1.Dvestigauon.
groupn.ire J>r~ams thar run on a necwork chat enable users to share data, collaborate on pro1«ts, and
work m teams. Also called workgroup sohware.
hardnarc The phy<ical layer of rhc information system, to include computer\, network\, communica-
tion< equopmenr, and orher rcchnolo&>y·hased infrastructure.
help dc\k A cenrrali1cd resource miffed by TT professionals that provide' U\Cr' with che \upporr rhey
need to do 1he1r job>. A help de>k h,.,., three main objel"tivc~: to ~how people: how to U\c ~y,ccm
re.uur~C> more dfc:ctivcly. to provide an~wcn. to 1,-chnical or opcrarion,11 quc.,1 io11~, and to make
user\ more productive by reaching rhcm how to mcer their own mformation need<.
horiiontal sy\Ccm A basic sysrcm, such as an inventory or payroll packap,e, that 1s commonly used by a
vnricry of companies.
inference rule' lnsrructions that direct a knowledge management sys1em ro idcmify data pat1crns and
rdanonsh1ps.
information Dnm rhar has been changed inro n useful form of outpur.
informauon S)\lcon A combination of infom1arion 1cdinology. people, and data co '>upport bminc~s
requirements. Ilic five key components a~e hardware. software, data, proccs.es, and people.
1nforma11on tcchnoloiiy (IT ) A combination of hardware, software, and telecommun1c.111on< S)>lem'i
that support business operations, improve producuvitl, and help manager\ make decisions.
intCjlr.ued dc\Clopmcnr environments (IDE) An application for hu1lding orhcr \Oft" .ire appli~tions.
T)·picall> includes a visual code editor, an integrated compiler, a debugger. a configuration manage-
me111 ~)Mem, and a rest framework.
Key Terms 39
i1aa1ht: An ;idapme method I) pictll) use,, a spiral de,·elopmenr model, which builds on J series of
ncrauoru..
I.no\\ ledge b.i\c A popular ws1cm\ dn·elopmem 1echnique that uses a group of ~r.. man.igcr~. and IT
profc:,~1onal\ who work t<>gc1hcr to gather mformanon, <l~u~ bu~mess need>, and define the new
\y~rcm rcqu1rcment'\.
lcitaq. '}"tern An older 'l)'\tcm rhat is rypically less rechnologically advanced than currcnrly available 'Y'rcm\.
machine learning An application of compurer science and anifkial intelligence thar uses automattd
approaches 10 pattern recognition and predictive analytics based on large darJsets.
management informauon ~)>tern (MlS) A computer-based information system used in business plJnnmg,
control, decision making, and problem solvmg.
mi"ion-criuul \)'\lcm An information 'Y'tcm rhar i> vital to a company'~ upt:rauons.
mc>dt:l-ha,cd 'Y'lcm' c1111incc1 ing (MBSE) An approach to ,,.ystcm' engineering that relit' on doma111
models, rather than rrnd inona l documcn r., to dc<ii;n la rg:e·,calc <rtcm' and convey information
hctwccn cnginee rs.
modeling J\ process th,11 produces a graphical representacion of a concept or process tbtlt systems devel-
opers can analy tc, test. a nd modify.
Moore's l.i" A prediction 1h,11 compuring power would double every 18 to 24 months due 10 wcreJsed
nuui.1rurw11011 of elecrron1c components.
NoSQl. dataha\c) Da1.1ba"' 'y>tcrn' that use a flat, nonrabular (nonrdarional) \lrULlur" 10 'tore :ind
procc" largc-..calc da ra,cr\.
objc.:t In obJl-Ct-oricntcd analy<;i• or programming, an object rcprcscnr- a real pcrwn, place, event, or
rra0\act1on.
objcct-oritntcd 0-0J ;inal~s1s The act of understanding an information S)Stem b) rdenufymg things
c.tlled ob1m~. An ob1ec1 represents a real person, place, event. or transaction. Obiecr-onemed analysis
~ .i popul.u .1ppro.1ch 1h.1r ;ees .i S)>tem Crom the viewpoint of the obiect> tbetrueh cs .I) the> funcuon
and interact wuh the sysrem.
personal d1g11al assistant A progr.im rhat responds rouser requesrs through a natural interface, such as
regular speech, to provide assmancc to general-purpose queries. Often embedded m devices such JS
lmemet<Onnl'Cted )peaJ..ers and smarrphones.
prdiminal} imc\Ugaunn 1\n cnirial analy)is ro de:trly idenri fy the narure and scope of the hu,ine,~
opponumty or problem. /\l'o called fca>ibility >tUd).
procl~\ PrQ\cuore or ta'k 1ha1 user>, managers, and IT sraff member) perform. Al;o, the logkal rules
of a 'Y'tcm that arc applied m rran5fonn dara mro meaningfu l infom1anon. ln data Aow diagram5, a
pmce'~ receives input darn and produces nurput tha r has a d ifferent content, form, o r hoch.
produc1 lifccycle management (Pl .M) See application lifocycle management (A LM.).
product oriented Comp,mie~ that manu facture computers, routecs, or microchips.
projccc management The proccs5 of planning, scheduling, mo ni roring, conrrolling, a nd reporting upon
the development of nn informarion sys1cm .
propcrtic' In oh1t.'Ct·o riemcd (0·0) analysis, characteristics rha t objects inherit from their da>S or po~
>css on their own.
prototH>C An c.1rly, rJp1dl) constructed workmg version of the proposed uuorm.ition >y>tcm.
radio frequency idcnt1fic.111on (RI Ill) Technology rh.~r uses high-frequency radio waves to tr.1ck physical
ob1c•·ts.
requirement\ en11mccring Used m the systems planning phase of the SDLC. It invoh·cs using various
focr-finding techniques, such as interviews, 5urvers, observation, and samplmg, ro d~nt>c the current
system and ident1f) the requ1rcmcni> for the new sysrem.
40 Key Terms
SL-.alablc Ille abihry of a S)»tem to expand ro meer new business requirements and 'olumes.
;en ice-oriented A comp:my that primarilr offers information or o,erviu:·~ or .,.,11, i;0<xh produced b}
other\.
\ofc"arc A proi;ram run h)· computer. for a >pec1Fic functmn or ta.>k.
>p1r.tl modd A developmem modd wub a series of iterations. or rev1s1oos. ba.cd on user feedback.
s1akcholdu An)·one who 1s affected by cbe companr's performance, sud1 as customers. emplO)'ttS, sup-
pliers. srockholdcrs. and members of the comrnuruty.
\tratt111c plan' The loni;-rani;c plans thar define t he corporate mis,ion and goal\. Typically defined by
top manni;cmcnt, with inpuc from all le,·els.
\trucmrcd anal)~;, A trndirional sysrems developmenr cechnique that U'>e'> phase; ro plan, analpc,
de,ii;n, 1mplemenr, and \ uppon on information sysrem. Proces•es and cla1a Jrc treated a' scpara1t
component•.
supply cb.un A rradm on,11 systems developmenr ceduuque th.ir uses phases to pl.111, analyze, design,
implenienr. and supporr ;rn information sysrem. Processes and data .ire treated as scp.iratc
componcn1s.
suppl> chain management (SCM! The coordination. integracion, and man,1gemenr of ma terials, infor·
ma11on. and finances as they move from suppliers to customers, both w1dun and between com-
parues. In a rornlly 1megr.1ted supply chain, J. customer order could CJ use J production planrung
system to schedule a work order, which in rum could mgger a call for certam pJrtS from one or
more suppliers.
\)'tern \ o;et of related componcnrs thac produces specific re~uJt.,.
')\tern dc-.1gn 'fl"ofic:uion A document that preo;encs the complece design for the new information'>"'-
tem, along with derailed ccMs, ~mffing, and scheduling for completing chc next SDL.C pha\c, \)\tern<.
implemcm.atson. Also called the technical d~'h'" \pc<:1fo:at1un ur the dct:ulcd de,1i;n 'pcc1fica11on.
>)>tCm requirement> document A docwnent !hat conram> the reqwremelll> for the new S) >tern. describes
the .iltern.im ts th.ii were considered, and makes a specific r«ommend.mon to mana~ement. It 1s the
end product of the systems aoal)·s1s phase.
S}Stcm softwa re Programs that control the comp uter, including chc opcranng sysrcm. de' ice drive~ that
commumca1e \~uh hardware, and lo"·level utilities.
anal)\I\ and dcsii;n The process of developing information sy\rems that eff1.-crively uo;e hard-
\)>IClll\
ware, wftware, data. proces~cs, and people to support the cumpany'; bussn""' obje... uvc,.
');tcm\ anal)\i\ pha\c The >ewnd SDLC phase. The purpose of this ph.i;e I> to build a log"a l model of
rhc new sr,rcm.
systems anal) st A person who pla ns, analyzes, and implemcnrs mformanon systems. T hey 111.1y work
im crnall y within a compan) 's IT department o r be hired b) a company as an independent consultant.
~>SICm\ design pha~c The third SDLC phase. Thie purpose of syotems design is to creme a bl ueprint for
the new S)'\tem that will sacisfy all documented requirements, whether the syMem is being developed
in-how.e or purchased os a package.
~)>lcm; Jc•cloprncnt life C)dc (SDI C) Activiti~ and fum:rions that ;ystcm> developers t)pically per·
form, rci;a rdlc's of how t ho•c acnvirics a nd foncrions fit mro a partku lar mcthodolofly. The SD I C
model include~ five phaws: ( I) sysccms planning, (2) systems analysis, Pl sy\tcms dcsifln, (4) sy,tcms
implementation, and (5) systems support and securiry.
')\!Cm' implcmcntauon phase The fourth phase of the SDLC. During this pha;c, the ne'~ &)Stem is con·
sm1ctcd-pr~rams arc wmtcn, tested, and documented, and the ;ystcm is ms1,1llcd.
Key Terms 41
S}Stcms pbnntng pha~c lhc first phase of the SDLC. During this phase, che S)>tems prOJl'Ct get> starred.
rhc proic.:t propo•.il is C\,ilu.ued to determine its fea.ibility. lhe project managemem pl.in 1s formu-
1.itcd, w11h the help of <...ASL rooh where appropnatc.
~}~tcm• requc\t A form~! rcquc\t to the IT department that describe~ problem' or dc\ircd .:hangc\ tn an
information \)'\tcm or bu\inc\s process. It might propose enhancements for an cxi~nng >)'Stem, the
correctmn of problem,, or the development of an entirely new S)"'item.
\}~ICm\ \uppon and ~Cl'Urit) pha,c During the sysrems support and !>CCUriry pha..e of the SDLC, the rr
\laff maintain\, cnhan.:o:\, and protect' the .,y;rcm.
techni,aJ support Tcchmcal supporr is neces>ar)' ro supporr che wide \Jtiet) of 11 S)Stellli .ind u>ers. lt
mdudes six mam funcuons: applicanon developmenr, systems support, user support, d.11JbJse .1dmtn-
is1ra11on, nttwork admin1strarion, and web support. These functions ovcrl.ip cons1dr.rably and often
have diffcrrnr names 111 different companies.
transaction proccssiog !Tl') S)'Stcnt~ Operational systems used co process day-10-day recurnng business
cransacuons, such as cusromer billing.
u.,..,r produl!i' ity '}'lcnh Applkation' 1hm provide employet:s of :ill levch n wide array of tool, to
improve jnh performance. Fxamplc' indudc email, word prcx:c,;in11, graphic~, nnd comp.111y inrrnncc-.
met\ 'irakcholdcr- in,idc and out~idc the company who wil I mrc:ract with the 'YMcm.
vertical S}SlCUI A S)'Srem designed to meet the unique requirements of a spectf1c busmess or mdustry,
such as a wtb-based retailer or nuro-supplr srore.
warcrfall model The tradmonal model of soft\vare de,·elopmenr. A graph that depicts the result of each
5DLC phase £lowing do,~o mto the nei.r phase.
42 Exercises
Exercises
Questions
1. Whac is information rechnology, and why is it imporranr co socicry?
2. What are the five main components of an information S)'Stem?
3. Explain how ndcsharing services such as Uber and Lyft are disrupting rradir1onal raxicab business
models.
4. Describe the busine~s profile of a home improvemenr srore like Home Depot or Lowe's and how it i~
used.
5. What are the seven types of information systems used in business?
6. What cypes of informacion do the four organizational levels common ro many businesses need?
7. Compare three sysrems dcvelopmenr merhods.
8. Name rhe too ls rhar enable che sysccms analyst to deve lop, manage, and maintain large-sca le informa·
tion systems.
9. Sumrn:irizc the seven main functions of rhe IT department.
I 0. Whar arc the ro les and respons ibilities of a sysrems analysr in a modern business?
Discussion Topics
1. Some experts believe rhar rhc growrh in e-commerce will cause states and local governments ro lose
rax revenue, unless lmcrner transactions are subject ro sales rax. Whar is one argument rhar supports
this view and one rhar opposes ir?
2. When team memberl> .ire geographically dispersed, communication bccomcl> more challenging.
Explain how groupware can increase user producrivicy in chis contexc.
3. Under whac circumsrances should a systems analyse recommend an agile merhodology over Struccurcd
devclopmenr or ob1ecr-orienced analysis?
4. Should che IT dirccror reporc co che company presidenc or somewhere else? Does it marrer?
5. Rapid advancements in areas such as machine learning and predictive analycics in dara science are
affecting the daily operarions of many IT deparnnenrs. What should a syscems analyst do ro stay
currenr?
Project s
1. Contact three people ac your school who use informacion systems. Lise cheir positions, the mformacion
they need, the sysrems they use, and the business functions they perform.
2. Visir rhree websites ro learn more about agile system deve lopment. Prepare a lisr of the sires you vis-
ited and a ~ummary of the results.
3. Model-based systems engineering (MBSE) is one of che leading methods used by systems ana lyses to
develop informarion systems. Cameo Systems Modeler is one of the leading cools supporting MBSE.
Research magazine articles and the web ro learn more about th is tool's capabi lities. Identify three of
its srrengrhs in terms of improving rhe qualiry of the finished product.
4. Explore the Critical Thinking Community website ac criticalthinki11g.org. Identify three importanr
topic~ currencly being di~cussed and describe your findings.
5. Compare the corporate culrure of three leading IT companies and show how rheir ~tarement of values
could atcracr (or repel ) sysrems analysts from joining their organization.
r..,,...JID)r-..1-.. 4•11_.. • ...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
~ JIJ»C....... ~ Al RlilfD l,eocl\olld.,...,. _WOlfi'l'l.~• ......-W.Mdk«iil,_._DIK•dtc--.: ......,_ . . . ,_.,~-.lit .......... .._.,._.__..,~•\
~ ... _ . . . _ . .... ..., ~...,.._,_..,..., J\&."9 ... --.11 ......... ~ C'dptl"~~d.tt ...... - ............ - ..... - .......... -.-.....w--...-.11
Chapter 2 Analyzing the Business Case
Analyzing the
Business Case
Chapter 2 explains how to analyze a business case.This The chapter includes three "Case in Point"
chapter also explains why it is Important to understand discussion questions to help contextualize the concepts
business operations and requirements, how IT projects described in the text. The "Question of Ethics" asks the
support a company's overall strategic plan, how systems systems analyst to consider the Implications of granting
projects get started, and how systems analysts conduct preferential treatment to a system enhancement
a feasibility study and perform preliminary investiga- request when the request originates with a friend of the
tions, which concludes with a report to management. project's manager.
Fact-finding techniques that begin at this point and carry
over into later development phases are also described.
r..,,...JID)r-..1-.. 4•11_.. • ...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,...... 111>_... ........ _ .. ~ ........................._ .... ._
Phase I Systems Planning
2 I STRATEGIC PLANNING
Pets for Rent is an innovative company that brings puppies to corporate meetings.
The company's CEO says that having puppies in a room with employees in an informal setting
helps break down communication barriers and fosters. a greater sense of teamwork and com-
radery. Since this is a new company, the CEO has asked you if a mission statement is necessary.
After you review the chapter material, write a brief memo with your views. Be sure to include
good (and not-so-good) examples of actual mission statements that you find on the web.
r..,,...JID)r-..1-.. 4•11_.. •...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Chapter 2 Analyzing the Business Case
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 4111.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase I Systems Planning
Irrespective of the development strategy used, many organizations still rely on the IT
group to provide guidance when it comes to selecting tools to support strategic plan-
ning activities. Some analyses srick to tradicional text-based methods, using tvl icrosofc
\'(lord rabies, to pro,•ide srrucrure and clarity. Ochers prefer a spreadsheet, such as
t..1icrosoft Excel, because it is easy to display prioriries and the relative importance of
planning assumptions.
A more sophisticated approach is co use a CASE tool to define and document the
overall environment. Such tools can integrate various statements, entities, data ele-
mencs, and graphical models into an overall structure. The result is more consistency,
better quality, and much less effort for the system analyst. Figure 2-3 shows a cloud-
based road mapping software product from Aha! chat provides inccgraced support for
product scracegy visioning and strategy develop1nent.
There arc other strategic planning "cools" that are not CASE tools, bur more tech-
niques that ore sometimes supported by software programs. For example, mind maps,
balanced scorecards, and gap analysis are all valuable techniques thac can be parr of stra-
tegic planning in an organizarion. An imporrant role for the systems ana lyst is to know
when each of these rools and cechniques can best be used in particular project conwxcs.
During the systems planning phase, the IT ream reviews a request co determine if
it presents a strong businesc; case. The term business case refers co the reasons, or
Ahal - - _, -
- -0
_,, .....
- . ._..,_,
_.,.
,_ ............
.......... .,_, ..
~
-..
...,., -"«.,...
--
c.....
.,............,..........
FIGURE 2-l Aha! provides Integrated support for product strategy visioning.
·~• .&.1\. 1 ,_
jusrificarion, for a proposal. To perform rhe review, the analysr muse consider rhe
company's overall mission, objectives, and IT needs.
A business case shouJd be comprehensive yet easy to understand. It should
describe rhe project clearly, provide the juscificarioa to proceed, and estimate the proj-
ect's financial impact. SpecificaUy, che business case should answer questions such as
the following:
• Why are we doing this project?
• What is the project about?
• How docs this solution address key business issues?
• I low much will it cost and how long will it rake?
• Will we suffer a productivity loss during the transition?
• What is the return OJl investment and payback period?
• What arc the risks of doing rhe project? What are the risks of nor doing the
projccr?
• How will we measure success?
• What alternatives exist?
Examples of business cases, borh good and bad, can be found on line. Just search
for "sample business case" and examine the structure and content of some of rhe sam-
ples available. It is particularly instructive to compare and contrast business cases for
different areas, such as chose for go\•emmenr contracts versus private enterprises.
(....,..... J:gi( . . . . . I_,.. 4111.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- t fta111&....-.~~ ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase I Systems Planning
BETTER PERFORMANCE: The current system mjght not meec performance require-
mencs. For example, ic n1ighc respond slowly co data inquiries at certain times, or it
mighc be unable co support company growth. Performance limicarions also result
when a system that was designed for a specific hardware configuration becomes
obsolete when new hardware is introduced.
IMPROVED SERVICE: Systems requests often are aimed ac improving service ro cus-
tomers or users within the company. For instance, allowing mutual fund investors ro
check their acco unt balances on a website, storing data on rental car customer prefer-
ences, or creating an online college registration system arc all examples of providing
valuable services and increased cusromer satisfaction.
MORE SUPPORT FOR NEW PRODUCTS AND SERVICES: New products and
services often require new types or levels of IT supporc. For example, a sofrware
vendor might offer an a utomacic upgrade service for subscribers; or a package deliv-
ery company might add a special service for RFID-tagged shipment!>. In situations like
rhe!>e, it is most likely that addjtional IT support will be required. At the other end of
the speetrum, product obsolescence can also be an important factor in IT planning. As
new products enter the marketplace, vendors often announce that they will no longer
provide support for older versions. A lack of vendor support would be an important
consideracion in deciding whether or not to upgrade.
internal and external factors affecc every business decision that a company makes,
and IT projects are no exception. Figure 2-6 shows internal and external factors that
shape corporate IT choices.
STRATEGIC PLAN: A company's srrategic plan sets the overall direction for the
firm and has an importa nt impact on IT projects. Company goals and objectives rhat
need IT support will generate sysrems requests and influence IT priorities. A strategic
plan that stresses technology rends to create a favorable climate for IT projects that
extends throughout the organization.
TOP MANAGERS: Because significant resources arc required, top management usu-
ally initiates large-scale projects. Those decisions often result from strategic business
goals that require new IT systems, more information for decision making processes,
or better supporr for mission-critical information systems.
(....,..... J:gi( . . . . . I_,.. 41 11.,.. ~- )U, Woip-M ._..,.. - ·~•-fllllie<'f •,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,.. ..,. - ~---tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
-
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~
Phase I Systems Planning
------
FIGURE 2·6 Internal and CKternal factors that affect IT projecrs.
Competitors JL- - - - - -
EXISTING SYSTEMS AND DATA: Errors or problems in existing systems can trigger
requests for sysrcms projects. When dealing with older systems, analyses sometimes
spend coo much rime reacting ro day-to·day problems without looking at underlying
causes. This approach can curn an iniormarion system into a patchwork of correc-
tions and changes that cannot support the company's overa ll business needs. This
problem typically occurs with legacy systems, which are older systems rhat are less
technologically advanced. When migrating ro a new system, IT pl:inners must plan
the conversion of existing data, which is described in detai l in Chapter I I.
SUPPLIERS: With the growth of clcctroaic data interchange (EDI), relationships with
suppliers arc crirically importanr. For example, an automobile company might require
t hat suppliers code their parts in a certain manner to march rhc auto company's inven-
tor)' conrrol system. EDI also enables just-in-time UIT ) inventory ystems that rely on
computer-to-computer data exchange to minimize unneces ary inventory. The purpose
of a JIT system is to provide the right products at the right place at rhc right rime.
Blockchain technology is a promising mechanism for managing upply chains more
powerfully rhan before. Blockchain provides a distributed ledger ysrem that is effi-
cient, secure, transparent. Large companies such as 181\ll are already using blockchain
to improve operarions for their customers, such as the Food Trust product shown in
Figure 2-8 rhar \'<'almart uses for tracking food safety from grower to consumer.
......
,....~.....nc:rwe,..;
-..............
__...._,.,._...,..,.
----~----- _........
,.._..___,.
......._.___..........
...
..__ .......
._.. ...__
---
--
----..... ......
.....--------.
_,..._
---·-- ._ . ..............
....-......."..__
FIGURE 2·8 IBM 81ockcha1n.
Sourt• »1(
-
.-
(....,..... J:gi ( . . . . .
r..a...w...,..._...., ..
I_,.. 4111.,.. .................,.t11ru
~- )U,
..,...,...... .,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~ c.....,..~
0w.,,,.._.._,..."-,.._..,.,_, .,_.,....,. -~--- t fta111&....-.~~ ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase I Systems Planning
CUSTOMERS: Customers are virally important 1to any business. Information S)'Stcm
that interact with customers usually receive top prioriry. Many companies implement
customer relationship management (C RM ) systems char integrate all customer-related
event<; and transactions, including marketing, sales, and customer service acnvines.
Vendor-oriented CRNI systems often interconnect with supply chain management
(SCM) systems, which were discu sed in Chapter 1. CR;\it components can provide
automated responses to sales inquiries, online order processing, and inventory track-
ing. Some suppliers use robots for order fulfillment, such as the Kiva robots shown in
Figure 2-9 rhar Amazon.com uses in their warehouses.
In most organizacions, che IT deparcment receives more systems requests than it can hancUe.
Many organizations assign responsibility for evaluating systems requests to a group of
key managers and users. tvlany companies call this group a systems rC\ iew com mince
or a computer resources committee. RegardJess of che name, che objective 1s to use the
combined judgn1ent and experience of severaJ analysts co evaluate project requests.
(....,..... J:gl( . . . . . I_,.. 41 11.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- t fta111&....-.~~ ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase I Systems Planning
A rypical committee consists of C . ··• •' "' .... c • • • • '·' p ::::. GM11o.rno
the IT director and several manag-
ers or representarives from other Service Request Management
departmencs. The IT dirccror usu-
all)' serve:. as a technical consultant
co ensure that committee members
are aware of crucial issues, prob- -·----_...................
~ ...........
.... .............. ......
&"!ilil• ~ ---·-----~---- .... · - -
---
lems, and opportunities. ...,.._,___...,
.. ............. ........ -.........................
....
__ , . . . - .. . ~ '
-- ---- -
You are the IT director at Attaway Airlines, a small regional air carrier.You chair the
company's systems review committee. and you currently are dealing with strong
disagreements about two key projeets. The marketing manager says it is vital to have a new
computerized reservation system that can provide better customer service and reduce oper-
ational costs.The vice president of finance is equally adamant that a new accounting system
is needed immediately because it will be very expensive to adjust the current system to new
federal reporting requirements.The VP outranks the marketing manager. and the VP is your
boss.The next meeting, which promises to be a real showdown, is set for 9:00 a.m. tomor-
row. How will you prepare for the meeting! What questions and issues should be discussed!
r..,,...JID)r-..1-.. 4•11_.. • ...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Chapter 2 Analyzing the Business Case
As described in Chapter 1, a sysrerns request must pass several tests to see whether
it is worthwhile to proceed further. The first step is to identify and weed out sys-
tems requests that arc not feasible. For example, a request would not be feasible if it
required hardware or software that the company al ready had rejected.
Even if the request is feasible, it might not be necessary. For example, a request
for multiple versions of a report could require considerable design and programming
effort. A bencr alternarive might be to download the server dara ro a personal compurer-
based sofnvare package and show users how to produce their own reports. In this
case, rraming users would be a bener investment than producing reports for them.
Somerimes assessing request feasibility is quite simple and can be done in a few
hours. If rhc request involves a new system or a major change, however, extensive
fact-finding and investigation in rhe form of feasibility studies are reqwred.
• Is the proposal technically feasible? Are the necessary technical resources and
people available for the project?
• Is rhe proposal economically desirable?
What are the projected saving~ and costs?
0pe1"8tlonal
Are ocher intangible factors involved, such
• WiH If be easy to
team and vse?
as customer satisfocrion or company image?
ls the problem worrh solving, and will
the request result in a sound business
investment?
• Can the proposal be accomplished
Schedule Economic within an acceptable rime frame?
• Can we do 11in
time?
Fualble? =:=a • Will b enefits
e'Kceed costs? To obtain mo re information about a
systems request, ini tial fact-finding migh t
be accomplished by stud ying o rganization
charts, performing interviews, reviewing
current d ocumentation, observing oper-
ations, and surveying users. Sometimes,
Technlcel
developing prototypes can provide addi-
• Do we have the
tech resources? tional insight into the feasibility of the
request. If the systems request is approved,
FIGURE l -1l A feasibility study examines operational, technical, economic, more intensive face-finding will continue
and schedule factors. during the systems analysis phase.
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- t fta111&....-.~~ ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase I Systems Planning
Tangible benefi ts are benefits that can be measured in dollars. Tangible benefits
result from a decrease in expenses, an increase in revenues, or both. Examples of tan-
gible benefits include the following:
• A new scheduling l>ysrem that reduces overtime
• An online package tracking system that improves service and decreases the
need for clerical staff
• A sophisticated inventory control system that curs excess inventory and elimi-
nates production delays
lniangible benefits are advantages tbat are difficult to measure in dollars but are
important to the company. Examples of intangible benefits include rhe following:
• A user-friendly system that improves employee job satisfaction
• A sales tracking system that supplies berter information for marketing decisions
• A new website that enhances the company's image
The development timetable must also be considered, because some benefits mighr
occur as soon as rhe system is operational, but others might not rake place until later.
2. 7 .S Schedule Feasibility
Schedule feasibility means rhar a project can be implemented in an acceptable rime
frame. \'V'hen assessing schedule feasibility, a systems analyst must consider the inter·
action between time and costs. For example, speeding up a project schedule might
make a project feasible, but much more expensive.
(....,..... J:gi( . . . . . I_,.. 4111.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- t fta111&....-.~~ ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase I Systems Planning
After rejecting systems requests that are not feasible, the systems review committee
must establish priorities for the remaining items. lf tools are used as part of the review
process, the requests may already be in a partially or fully sorted order. The highest
priority goes to project requests that provide the greatest benefit, at the lowest cost, in
the shortest period of rime. Many faccors, however, influence project evaluation.
substantially but require che purchase or lease of additional hardware. Some systems
might be very desirable but require several years of development before producing
significant benefits.
\'<lhenever possible, the analyst should use tangible costs and benefits that can be
measured in dollars. However, the proposal might invoh·e intangible benefits, such as
enhancing the organization's image, raising employee morale, or improving customer
service. These examples are harder to measu re but should aJ50 be considered.
Back at Ar.u.way Airlines, the morning meeting ended with no agreement between the VP
of finance and the marketing manager. In fact, a new issue arose.The VP now says that the
new accounting system is entided to the highest priority because the federal government
soon will require the reporting of certain types of company-paid health insurance premi-
ums. Because the current system will not handle this report. the VP insists that the entire
accounting system is a nondiscretionary project. As you might expect. the marketing
manager Is upset. Can pare of a project be nondiscretionary? What issues need co be
discussed/ The committee meets again tomorrow. and the members will look to you. as the
IT director, for guidance.
r..,,...JID)r-..1-.. 4•11_.. •...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Phase I Systems Planning
•
Step I: Understand t he Problem or O pportunity
lf the systems request mvolves a new informacion system Undersland the problem or opponun11y
or a substantial change 111 an existing syscem, sysre1ns
analysts might need co develop a business profile chat
descnbes current business processes and funcrioos, as
explained in Chapter I. Even where the request involves
relatively minor changes or enhancements, how chose
• Dehne fhe pro1ect sc;ope and consframts
Perform lact-fond1ng
_J
modifications will affect business operations and ocher
information systems must be understood. Often a change
in one system has an unexpected ripple effect on another
system. When a systems request is analyzed, which
departmen ts, users, and business processes are involved
• • Analyze organlzauon charts
• Review documentauon
• Observe operaflons
• Conducf a user survey
must be determined.
Jn many cases, the systems request does not reveal
0 Study usablhty, cost, benefit. and schedule data
·-
fl! •• ~- - •• , •• _....... ·--·- :.
---~-- ....
-
•
--
-
...
FIGURE l - 1S A fishbone diagram displays the causes of a problem.Typically, you must dig deeper to identify
anual causes rather than just symptoms
(....,..... J:gi( . . . . . I_,.. 41 11.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase I Systems Planning
that shows the systems, people, and business processes that will be affected is some-
times useful. The scope of the project also establishes the boundaries of the prelim-
inary investigation itself. A systems analyst should limit the focus to the problem at
hand and avoid unnecessary expendirure of time and money.
Along with defining the scope of the project, any constraincs on the '>)'Stem must
be identified. A con~traint is a requirement or condition that the system must .,arisfy
or an outcome that the system must achieve. A constraint can im·olve hardware,
software, rime, policy, law, or cosr. System constraints also define project cope. For
example, if the system must operate with cxisring hardware, that is a constraint that
affects porential solutions. Other examples of consrraincs are:
• The order entry sy!.rem must accept input from 15 remote site .
• The human resources information system must produce statistics on hiring
practices.
• The new website must be operational by March 1.
When examining constraints, their characteristics should be identified, as follows.
Present Future
I • Mandatory constraint
•
£ • Desirable constraint
Internal
ANALYZE ORGANIZATIO N CHARTS: An analyst will not alway~ know the organi-
.tational structure of departments involved in the study. Organization charts should be
obtained to understand the functions and identify people to interview.
If organization charts are not available, or are out-of-date, the necessary infor-
mation should be obtained from department personnel and construct the charts, as
shown in Figure 2-17.
Even when c harts are available, their accuracy should be ve rified. Keep in mind
t hat an organization chart shows formal reporting relationships but nor the informal
alignment of a group, which also is important.
-
3. Develop interview questions.
4. Prepare for the interview.
~ 5. Conduct the interview.
FIGURE 2- 17 Specialo:z.ed tools such as MlcrosoftVisoo an be used to draw 6. Document the interview.
organizational charu. but general purpose presentation tools such as Microsoft
PowerPoint shown here can also be used. 7. Evaluate rhe interview.
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase I Systems Planning
These seven steps arc discussed in derail in Chapter 4, which describes fact-finding
techniques that occur during the systems analysis phase of the SDLC.
Rememher that the purpose of the interview, and of che preliminary mvestiga-
non itself, is co uncover facts, nor ro convince others char che project is justified. The
analyst's primary role in an interview is co ask effective questions and listen carefully.
If several people will be asked about the same topic, a standard set of questions for all
the interviews should be prepared. Also be sure to include open-ended que ttons, such
as " \Xlhat else do you think I should know about the system?" or .. Is there any other
relevant information that we have not discussed?"'
\'(!hen conducting interviews during the preliminary investigation, interview man-
agers and supervisors who have a broad knowledge of the system and can provide an
overview of the business processes involved. Depending on the situation, talking to
operational personnel to learn how the system functions on a day-to-day basis may
also be helpful.
__ .. .• .
...
.
............... --..._ 0-. .... _
..
...........
- .... • .. •
- ·- -
~-
• II
I
-
p
'
•
·-
.A
- - •
- •
~
.. .
••
..
..
•• • •
--- • • • --
• p
••
I
.. ..
•.....
-1 ...
..
"
•
• • • •
- - .. ... r - -~· ..
(....,..... J:gi ( . . . . . I_,.. 41 11.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_, .,_.,....,. -~--- t fta111&....-.~~ ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,...... .,..~ __.~~ c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase I Systems Planning
between the delays and the number of users, so the analyst would look elsewhere for
the source of the problem. However, if the data resembles the second XY sample, it
indicates a strong relationship between the number of users and the longer response
rimes. Thar informanon would be extremely valuable in the problem-solving process.
• What informa tion must be obta ined, and how will it be gathered and analyzed?
• Who will conduct the interviews? How many people will be interviewed, and
how much time will be needed to meet with the people and i.umnrnrize their
responses?
• \'(fill a survey be conducted? Who will be involved? How much time will it cake
people to complete it? How much rime will it take to tabulate the results?
• How much will it cost to :rnalyze che information and prepare a report with
findings and recommendations?
ECONOMIC FEASIBILITY: Using che fact-findi ng data, financia l ana lysis tools can
be applied to :i~sess feas ihiliry. The cost-benefit da ra will be an important factor fo r
management co consider. Also, a cost estimate for the project development ream wi ll
be built into the project management plan.
TECHN ICAL FEASIBILITY: The fact-finding data should identify the hardware, soft-
ware, and network resources needed co develop, install, and operate the system. \~ith this
data, a checklist can be developed that will highlight technical costs and concerns, if any.
SCHEDULE FEASIBILITY: The fact-finding data should include stakeholder expec-
tations regarding acceptable timing and completion dares. As mentioned previously,
often a trade-off exisrs berween a project's schedule and its cosrs. For example,
compressing a projecr schedule mighr be possible, but only if the budget is increased
accordingly co add ext ra personnel. The schedule data will be incorporated into the
pro1cct plan in che form of task durations and milestones.
At rhis stage of the preliminary investigation, there are several alrernarives. It
might be rhat no action is necessary or thar some other srrateg)', such as addirional
training, is needed. To solve a minor problem, a simple solurion might be chosen
wirhour performing further analysis. In other situations, it will be recommended that
rhe project proceed to the next phase, which is systems analysis.
(....,..... J:gi( . . . . . I_,.. 41 11.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase I Systems Planning
2. 10 Summa ry 69
As a new systems analyst at Premier Financial Services. you are getting quite an education.
You report to the IT manager, who also chairs the systems review committee. Several
months ago. the committee rejected a request from the finance director for an expensive
new accounts payable system because the benefits did not appear to outweigh the costs.
Yesterday. the IT manager's boss asked the IT manager to reconsider the finance direc-
tor's request. and to persuade the other members to approve it. The IT manager wanted
to discuss the merits of the request, but the discuss ion was cut off rather abruptly. It turns
out the IT manager's boss and the finance director are longtime friends.
The IT manager is now very uncomfortable meeting with her boss. She believes the
directive to reconsider the finance director's request would undermine the integrity of the
systems review process. She feels it would be unethical to grant preferred treatment just
because a friendship is involved. She is thinking of submitting a request to step down as
review committee chair, even though that might harm her career at the company.
Is this an ethical question, or just a matter of office politics? What would you do if you
were the IT manager!
2. I 0 SUMMARY
Systems plann ing is rhe firsr phase of rhe systems development life cycle. Effective
information systems help an organization support irs business processes, carry out its
mission, and serve its stakeholders. During strategic planning, a company examines
its purpose, vision, and values and develops a mission scacement, which leads to goals,
objecttve!>, day-to-day operauons, and business resulcs that affect compan)' stake-
holders. SWOT analysis exammes strengths, weaknesses, opponumries, and threats.
S\XIOT analysis can be u ed at the enterprise level and for mdividual pro1ect~.
During the }'Stems planning phase, an analyse reviews the busines~ case, which is
the basis, or reason, for a proposed system. A business case should de cribe the proj-
ect clearly, provide the jusrificarion to proceed, and estimate rhe project's financial
impact.
Sy~tem~ projects are initiaced co improve performance, provide more information,
reduce costs, strengthen controls, or provide bener service. Various internal and exter-
nal factors affect syscems projects, such as user requests, top management directives,
existing sy~tems, the IT depa rtment, software and hardware vendors, technology, cu~
tomers, competitors, the economy, and government.
Duri ng the preliminary investigation, the analyst evaluates the systems request and
determine~ whether the project is feasible from an o perational, technical, economic,
and schedule standpoi nt. Analysts evaluate systems requests on the basis of their
expected costs and benefits, both tangible and intangible.
The steps in the preliminary in vestigation are to understand the problem or oppor-
tunity; define the project scope and constraints; perform fact-finding; analyze project
usability, cost, benefit, and schedule dara; evaluate feasibility; and present results and
recommendations to management. During the preliminary investigation, analysts
often use investigative rools such as fishbone diagrams, Pareto charts, and XY charts.
The last cask in a preliminary invescigarion is to prepare a report to management. The
report must include an estimate of time, staffing requirements, cosrs, benefits, and
expected results for the next phase of the SDLC.
r..,,...JID)r-..1-.. 4•11_.. • ...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Chapter 2 Analyzing the Business Case
70 Key Terms
Ke y Te rms
biomclric de' kes A mech3ntSm used co uniquely identify a per~n by J rcuna scan or b> mJpping J
fa"al panern.
blod..-h.un A distributed ledger srstem. The technology underl}1ng B11corn.
bu'"''"'' ""'" Refer' to the rca>On>, or ju.cification, for a propo"11.
ca\c: for a•"l1on A part of the prd1m111ary 1n\'e>t1gat1on report to mdna11c:ment that \ummar11e> pro1c.t
rcque\r. and make> ,pcxific recommendation,.
computer resources commim~e A group oi key managers and users responsible for cvaluanng systems
requests. Inc rcrm "systems review commircee ~ is also used.
constraint A requirement or a condirion rhar rhe sysrem must satisf>' or an ourcomc chat 1he system muse
achieve.
critical \Uccc" focwrs Viral objectives that mu>t be achieved for rhe entcrpri>e m fulfill ir' mi,,,ion.
cu,ttuncr rdatiomhip nurna11ement (CRM) l\fany companie; implement 'Y'len1' to mtci;rotc all
cU\lomer·rdarcd event> and tran,action'> including mnrkcrin11, >ale,, and ""l<>mer wrvicc activitics.
discrc1i0Mry projects Where managemenr has a cboice in implementing a pro1ect, rhey arc c;11ied d1scre-
rionJry. l·or example, cre:iring a new reporr for a user is .111 example of .1 discreuonary pro1ccr.
economic fcas1b1lit)' Achieved if the projecred benefits of rhe proposed system ou1we1gh rhc csrirnarcd
cosrs involved in acquiring, installing, and operating ir.
clcccrnnic darn interchange !EDT) The exchange of busine's document\ hctwccn compute" ll'ing a scan·
Jard clcctronk format.
dcuronic produu ~ode (EPCJ Technology char U!>l"> RFID la);) co idcntit) and monicor chc movement of
each 1nd1ndual product, from rhc factory Aoor ro the retail chc~kolll counter.
dcctron1c proof of dcli''l'f} (U'OO) A supplier uses RHD t.igs 011 e.ich cr.ite. case, or shipping unu ro
crearc J d1giral shipping hsr ro verify receipt oi goods.
cncrypuon A process where data is coded (oonverted into unrc.idable char.1cters) so char only those wnh
the required authorization can access the da1a.
fi,hhonc diagram \n analy-;is rool rhar represenrs rhe pos'>ible cau<e<> of a problem a< a graphical nm·
line. ""'.:ailed an bhikawa <liah'l"am.
intang1hlc hencfih Po\1ll•c ouKomcs that a~ difficult to mea~ure 1n dollars. Howc\'cr, intangible hcne·
fib can he very important m che calculation of economic fca>1b1hry. An c'<amplc of an intan111blc hen·
cfir m1ghr he a new wch<ite rhar improve-; a company'' ima11e.
intangible co-.s lrems that are difficulr ro measure in dollar remlS, such a~ employee d1~sa11~focnon.
ln1emc1 of Thing~ (IOT) Devices connected to one anorhcr over a computer nerwork.
j1M m·rimc (]TT) The exchange or dclh·ery of informanon when and where It i< needed. For c-camplc,
just·m·rimc 11wcntory sysrcms rely on compmer-co-compurer darn exchange rn minimize unncccs"3ry
111ven1ory.
111i,)io11 ~1a1c111cnt 1\ documcnr or >ratcmenr rbar <lc;c1·ibes 1hr.: company for Ill• stakeholder; and bricny
' rare' the company's overall purpose, produces, services, and value,.
nond1scrctionary pro1ccts Where managemem has no choice in 1mplemcnt111g a pro1ccr, they ore called
nond1screrionar)'· For example, adding a report required by a new fedcrJI law.
operational fca~ib1lit)' A •y,rcm char that will be used effecth•cly afrcr i1 has hccn developed.
Parero chart \vertical har graph named for a nineceench century economist. The bar<, which rcpre<cm
'arn>u., cau~e~ of a problem, are arranged in descending order, o;o rhe reJm can focu< on rhc mmr
11nport.1nt cau>e>.
prd1minal"} 10\C\llga11on An mmal :malysIS to clearly 1dennfy the namre and scope of the business
opportumry or problem. Al,o called a feasibilicy study.
Key Terms 71
pro1cct cr•-ep !"he procco~ b> which projects with ,.et) general scope definirions exp.ind gradual!)." 11h·
out ~pcc1ftc .1u1horua11on.
proi«t \.:ope A ~pc..1fic dctcrmmanon of a pro1en's boundaries or extent.
\c.ttter diagram A tool u\cd hy 'Y'lem anal)\"' co graphicall) show the corrd;mon between two vari-
abl~. Al'-<> c..1llcd an XY chart.
Exercises
Questions
1. Why should a S)'Stems analyst be interested in strategic planmng?
2. Lisr the four factors invoked in a S\'V'OT analysis.
3. Describe how CASE rools can support strategic planning.
4. List five que~tions rhe business case should answer.
5. What arc the six main reasons for sysrems requests?
6. Explain the two main factors affecting systems requescs.
7. Describe the role of rhc sy~rems review committee in processing systems requests.
8. Define operational, economic, technical, and schedule feasibility.
9. List seven questions the sysrcms analyst should consider when assessing project priorities.
10. What are rhe five seeps of :i prel iminary investigation?
Discussion Topics
1. One of your coworkers says, "Mission statements are nice, but rhey really don'r change things down
here where rhc work gets done." How would you reply?
2. Discuss how a company's financial status can affect systems projects.
3. The vice prc~idenr of accounting ~ays to you, the IT direcror, "This request procedure takes too long.
My people know what they are doing, and their systems requests are necessary and important." She
~uggcsts char the IT deparrmenr bypass rhe initial seeps and immediately get ro work on her requesrs.
What would you say ro her?
4. When setting prioriries for system requests, the highest priority goes to projects that provide rhe great·
e~t benefit, at the lowest cost, in rhe shortest period of time. H ow would you reconcile projects thar
can produce good results in che shorr rerm versus projects rbac can produce excellent resulcs in rhe
long term?
5. The final cask 1n rhe preliminar)' invesngation is to summan1e chc r~ults and recommendations in a
report and/o r 1n a presenrarion. Which form of communicarion, wrirren or oral, do you chink is rhe
most effci.-ri'e for come)·ing your findings co managemenc?
Projects
1. Use rhe lnrcrncr rn find rluec examples of corporare mission stacemcncs.
2. Prepare a SWOT anal)·sis of your school or your employer.
3. A mind map is a diagram used ro visua ll y organize information. ldencify a tool rhat supports the crc-
acion of mind maps and explain how they can be a valuable part of srraregic planning.
4. Visit che website for an IT magazine and find an article chac discusses business cases. Summarize rhe
article and what you learned from it.
5. Think of a problem you have experienced ar school or at work and draw a sample fishbone diagram
with at lease two levels.
r..,,...JID)r-..1-.. 4•11_.. • ...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
~ JIJ»C....... ~ Al RlilfD l,eocl\olld.,...,. _WOlfi'l'l.~• ......-W.Mdk«iil,_._DIK•dtc--.: ......,_ . . . ,_.,~-.lit .......... .._.,._.__..,~•\
~ ... _ . . . _ . .... ..., ~...,.._,_..,..., J\&."9 ... --.11 ......... ~ C'dptl"~~d.tt ...... - ............ - ..... - .......... -.-.....w--...-.11
Chapter 3 Managing Systems Projects
Managing
Systems Projects
Chapte r 3 is the final chapter in the systems planning The chapter includes three "Case in Point" discussion
phase of the SDLC. This chapter describes project q,uestions to help contextualize the concepts described
management and explains how to plan, schedule, in the teXt. The "Question or Ethics" considers the
monitor, and report on IT projects. implications of raising awareness of a project going astray
even when the project manager Is reluctant to do so.
r..,,...JID)r-..1-.. 4•11_.. • ...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Phase I Systems Planning
Many professionals manage business and personal projects every day bur do nor
always give it much thought. The management process for developing an information
system or working on a construction project is much the same. The only difference is
the nature of the project. To manage a large-scale IT project, specific tools and tech-
niques arc needed. A project manager is also needed, someone who is responsible for
overseeing all relevant tasks. Project management for IT professionals includes plan-
ning, scheduling, monitoring and controlling, and reporting on information S)'Stcm
development.
A project manager will break rhe project dow11 into individual tasks, determine the
order in which the tasks need to be performed, and figure out how long each task will
take. \Xlith this informarion, Gantt charts or PERT/CPM charts can be used to sched-
ule and manage the work. Microsoft Project is a popular project management roof
that can help create and then monitor the project plan, report progress, and u~e risk
management to make rhc whole process easier for everyone.
\~hi chever
side is fixed is probably crirical co rhe projecr's success. The leg where the
problem re ides must also be identified: cost, scope, or rime.
A work breakdown structure (WBS) involves breaking a project down into a series
of smaller tasks. Before creating WBSs, the two primary chart types should be under-
stood: Gantt charts and PERT/CPM charts.
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 4111.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- t fta111&....-.~~ ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase I Systems Planning
from a fixed starting point or as actual calendar dates. A Gantt chart also can sim-
plify a complex project by combining several acriviries into a wsk gro up that contains
subsidiary tasks. This allows a complex project to be viewed as a set of integrated
modules.
.- - --·- ·-- --
.
..,
.... -
. ..... ·- -
- ... .._ - --
c-•-- ... - --
-----~'"'
-- ..
-
.'·-·-
-·
~
--·
i.ao-.... ::. --=-~
--· - --- - --
m........... "'-;-'
--· --·
. -· .....
- ,_..,.. .._....,....._ •
.-•.
FIGURE 3-3 In this Gantc chart. note the yellow bars that show the percentage of task completion.
A Gantt chart can show task starus by adding a contrasting color to the horizontal
bars. For example, a vertical red arrow marks the current date in Figure 3-3. With a
fixed reference point, it is easy to see that Task I is way behind schedule; Task 2 is
on ly about 80% done and is running behind schedule; Task 3 should have started,
bur no work has been done; Task 4 actuall y is running ahead of schedule; and Task )
will begin in several weeks.
Gantt charts can present an overview of the project's status, but they do not pro-
vide enough detailed information, which is necessary when managing a complex proj-
ect. Some project managers ma> find char PERT/CPM charts, which are discussed in
che followmg section, are better cools for managing large projects.
- .. - . . .... -
w ~--- - --- Although a Gantt charr offers a
.. ... ·-· - ... - ~- ...·---- .
... - -- - --- =--.
- - L.:
valuable snapshor view of the proj-
ecr, PERT charts are more useful for
_ ,c.... .. _
Ii . ....__..._ _ _ ---- -scheduling, moniroring, and controlling
- a
• '-+ •
1 happening wirh what is raking place
and react accordingly. Also, a PERT
chart displays complex task patterns
...... -
and relationships. This in formarion is
valuable to a manager who is trying ro
address high priority issues. PERT and
'""' S kNI out lntorvlow t<hedulo
Gaorr charts are not mutually exclusive
Stut Tuo 9/3/19 10 5
fon11h Tue t/S/19 Dut I d• v recltniques, and project managers often
Ars use both methods.
FigLtre 3 -4 shows both chart types.
FIGURE 3-4 The top screen shows a Gantt chart with six tasks.The PERT
chart in the bottom screen dlsplnys an easy-to-follow task pattern for the same T he top screen is a Gantt chart with six
project. When the user mouses over the summary box for Task 5, the derails t asks. T he PERT chart below it shows
become visible. rhe same project, using a separate box
for each rask instead of a horizon-
tal bar. Alrhough rhey borh show rhc rask pancrns and flow, rhc PERT chart boxes
can provide more information, such as task duration, start dare, finish date, and the
names of resources assigned co cbe cask. The PERT chart in Figure 3-4 would be too
small ro view the acrual derails, which are shown in the expanded rexr box ac che bot-
tom of che figure. How co create PERT charts is explained in a later section.
(....,..... J:gi ( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,...... .,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f •,...
__.~~ c.....,..~
0w.,,,.._.._,..."-,.._..,.,_, .,_.,....,. -~--- t fta111&....-.~~ ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase I Systems Planning
All
Start work oo
ques110no8"•
e Evoot or Milestone
. . Task
FIGURE l -S Using a questionnaire requires a series of ta.sks and eventS to crack the progress.The 1ilustration
shows the relationship between the tasks and the eventS, or milestones, which mark the beginning and end of
each task.
LISTING THE TASKS: While this step so unds simple, it can be c hallenging because
the rasks might be embedded in a document, such as d1e one shown in the first
version of Figure 3-6. One crick is ro srarr by highlighting the
individual casks, as !>hown in the second version. Adding bullets
makes the tal>k~ stand our more clearly, as shown in the rbird
version. The next step is to number rhe casks and create a cable, First, reserve the meeting room Then order
similar to the one shown in Figure 3-7, with columns for cask the marketing materials and brief the
managers After the bne~ngs. send out
number, description, duration, and p redecessor ca sks, which customer emails and upload program to the
muse be compleced before anocher rask can scan. app store When lhe emails are sent and lhe
program is available on the app store ready,
load the new software. When the mar!(ebng
ESTIMATING TASK DURATION: Task duration can be hours, materiats have emved and the software is ready,
days, or wceks--dependmg on the project. Because che following do a dress rehearsal.
example uses days, the units of measurement arc called person-days.
A pcrson-da) represents the work char one person can complete in
one day. This approach, howe\re~ can present some problems. For Firs1. rr; ve t mr
o.... Then orcJer
example, if it will cake one person 20 days to perform a particular t> ,.,. '"'9 ,..,
and b · I the
manat "' After lhe bnefings, nd out
cask, it might not be t rue that two people couJd complete chc same cus:onn r m s and ''' IOad progrNn to It>"
task in 10 days or that I0 people could perform tbe task in two app store. When the emails are soot and the
days. Some tasks can be divided evenly so it is possible to use dif- program is available on the a.pp store ready,
ioad tt>e ne,. ul!wa,,. When the marketing
ferent combinations of time and people--up to a point-bur not erials have amved and the software 1s ready.
all. in most sysrems analysis rasks, rime and people are not inter· a dr'"' rthearsal.
changeable. If one ana lyst needs two hours to interview a user, two -----
analysrs a lso will need two hours co do the same interview.
Project managers often use a weighted formula for estimating • First, reserve tho mooting room.
the durarion of each cask. T he project manager fixst ma kes three • Then order rhe mar~ellflg materi&/$ and brief
the manage1S.
time esrimatcl> for each cask: an optimisric, or bes t-case e~ timatc
• Aller the briefings, sand out customer omalls
(B), a prob ablc-ca\c e~ timate (P), and a pessimisric, or wo rse-case and upload program to the app store.
e~ timatc (W ). T he manager rhen assigns a weight, which is an • When the emails are sent and the program is
importance value, to each estimate. The weight can vary, bur a available on the opp store ready, load !he
common approach i'i to use a ratio of B = 1, P = 4, and W = J. now solrware.
Tbe expected task duration is calculated as follows: • When the mart<ehng materials have arrived
and the software Is ready, do a dre~s rohearsal.
•
Description Duration Predecessor
(Days) Tasks
Reserve the meeting room
2 O rder the marketing materials
3 Brief the managers
4 Send out customer emails
5 Upload program to the app store ......._ _ ___.._ _ _ __.....
6 Load the new software
7 Do a dress rehearsal
FIG URE 3-7 In this table, columns hM! been addl!d for wk number,descripuon.
duration. and predecessor casks, which mun be completed before another task can start.
For example, a projecr manager mighr estimare rhar a file-conversion task could be
completed in as few as 20 days or could take as many as 34 days, bur most likely will
require 24 days. Using the form ula, the expected task dura rion is 25 days, calculated
as follows:
A lively discussion is under way at Sunrise Software, where you are a project manager.
The main question is whether the person-days concept has limitations. In other words.
if a task will require I00 person-days. does it matter whethe r two people in SO days,
five peo ple in 20 days, ten people in I 0 days, or some other combination that adds up
to I 00 performs the work?
Two programmers on the project seem to think it doesn't matter. O n the other hand,
o ne of the project's systems analysts says it is ridiculous to think that any combination
would work.To support his point, this extreme example was offered: Could 100 people
accomplish a task estimated at 100 person-days in one day?
Is the systems analyst correct? If so. what are the limits in the "people versus days"
equat ion?Taking the concept a step further. is there an optimum numbe r of people to be
assigned to a task! If so, how would that number be determined? You need to offer some
guidance at the next project team meeting.What will you say!
r..,,...JID)r-..1-.. 4•11_.. •...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Phase I Systems Planning
To develop accurate esrimaces, a project manager must identify all project tasks, from
initial fact-finding to system implementation. Regardless of the systems development
methodology used, the project manager must determine how much time will be needed
to perform each task. In de,·eloping an estimate, che project manager must allow rime
for meetings, project re\'iews, craining, and any ocher factors (e.g., scheduled vacations or
unscheduled medical leave) that could affect che productivity of the development team.
EXPERIENCE WITH SIMILAR PROJECTS: A project manager can develop rime and
cost estimates based on the resources used for si1nilar, previously developed informa-
tion systems. The experience merhod works besc for small- or medium-sized projeccs
where the two systems are similar in size, basic content, and operating environment.
In large systems with more variables, the estimates are less reliable.
CONSTRAINTS: Chapter 2 explained chat constraints are defined during the prelim-
inary investigation. A constraint is a condition, restriction, or requirement chat the sys-
tem must sarisfy. For example, a constraint might involve maximums for one or more
resources, such as time, dollars, or people. A project manager must define system require-
ments that can be achieved realistically within the required constraints. In the absence of
constraints, the project manager simply calculates the resources needed. 1lowever, if con-
straints arc presenr, the project manager must adjust other resources or change the scope
of the project. TI1is approach is similar to the what-if analysis described in Chapter 12.
Gantt chart, to simplify the list. Nore rhat the WBS shown in Figure 3-8 is still
incomplete: It does nor show fields such as Starr Date, End Dare, Tas k ame,
Duration, and Predecessors-fields thar can be ke)' for project managers. \Vith
~1icrosoft Project, the \VBS (i ncluding some of these missing fields) might resem-
ble Figure 3-9.
....
.. --·. -
·--- ·-·-
.
--
. ---·-- -
·- ·- . .. _____ . .. .
....
- - - :=,.::..--- ... ·-
......
....... .... .,_ ,_ _
-... .. "'\
::--- ::. B , ::
_
.. e.. •
..................... .... ........
ct:= "-:- #,_,.,'-
_.._____
I
...
.....
I
-
t ~ • · ~.I -
;
• o • ....,_
- :J .....
...,_
--:::~
I
I
.....
...................
...............
............... ·-
·-
·-
..... ...
.... ...
•
.
.
- ,,_...... .......,........,
FIGURE 3-9 This Microsoft Project screen displays the same WBS, including task number. task name, duration.
•
.....
•
TASK NAME: The task name should be brief and descriptive, bur it
docs not ha ve to be uJlique in the project. For example, a cask named
Conducr Interviews might occur in several phases of the project.
TASK BOX FORMAT
TASK ID: The task ID can be a number or code that provides unique
Task Name id en ti ficati<>n.
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,...... .,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~ c.....,..~
0w.,,,.._.._,..."-,.._..,.,_, .,_.,....,. -~--- t fta111&....-.~~ ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase I Systems Planning
START DAY/DATE: The stan day/date is the time that a rask is scheduled to begin. For
example, suppose that a simple project has cwo tasks: Task 1 and Task 2. Also suppose
that Task 2 cannot begin until Task 1 is finished. An analogy might be that a program
cannot run until che compurer is turned on. If Task 1 begins on Day 1 and has duration of
three days, it will finish on Day 3. Because Task 2 cannot begin until Task I is completed,
the start rime for Ta~k 2 is Day 4, which is the day after Task 1 is finished.
FINISH DAY/DATE: The finish day/date is the time that a task is scheduled for com-
pletion. To calculate the finish day or date, add tbe duration to the start day or date.
\Vhen doing this, be very careful not to add too many days. For example, if a task
starts on Day I 0 and has duration of five days, then the finish date would be on Day
14-not Day 15.
MULTIPLE PREDECESSOR TASKS: Suppose Develop Plan ,J4 S1ar1: Day 31 ID: 2
t hat a task requires two o r more prior tasks to Finish· Day 60 Dur30
be completed before it can start. Figure 3- 14 Slart Day 1 ID: 1
shows that example because Task 3 cannot begin
Finish: Day 30 Dur 30
until Tasks 1 and 2 arc both completed. Since ~ Design Survey
the rwo tasks might not finish at the same time,
the longest (larcsr) predecessor rask becomes the Start Day 31 ID 3
controlling factor. Note char rhe srarr for Task 3 Finish Dey 40 Dur 10
is Day 16, nor Day 6. \'V'hy is chis so? Because
Task 3 depends on two predecessor tasks, Tasks 1 FIGURE 3- 1l This example of multiple successor wlc.s shows that me
and 2, Task 3 cannot begin until the later of those finish ame for Task I detennines the Start ome lo<' both Tasks 2 and 3.
EXAMPLE OF MJLTIPLE PREDECESSOFl TASi<S tasks is complete. Therefore, the start time for a
successor rask must be the latest {largest} finish
aic.ri Authonullon time for any of its preceding rasks. In the example
shown, Task I ends on Da)' 15, while Task 2 ends
Start Day 1 10 1 on Day 5, so Task 1 control~ the srarr time for
[\
Fi111Sh; Day 15 °"' 15
Conduct 1i ......... Task 3.
Task pattern type~ are idenufied by looking care-
Cnlale Job Oeecripl!On
Start Day 16 ID 3 fully at the wording of the task sratemcnt. Words
~ Anlsh: Day 45 Our30 like then, when, or and are action words that
Slllrt Day 1 10 2
signal a sequence of events. Here are three simple
examples:
Aoish Oay5 0urs
• Do Task 1, then do Task 2 describes dependent
FIGURE 3· 14 This example of multiple predecessor tasks shows tasks char must be completed one after rhe
that the start umc for a successor cask must be the latest (largest)
finish dme for any of lcs preceding tasks. In the example shown, Task I
ocher.
ends on Day IS. while Task 2 ends on Day S, so Task I controls the • When Task 2 is finished, start rwo tasks: Task
start time for Task 3. 3 and Task 4 describe multiple successor tasks
that can both start as soon as Task 2 is finished.
• W/Jen Tasks 5 and 6 are done, starr Task 7 indicates that Task 7 is a multiple
predecessor task bec3use ir ca11't srarr until rwo or more previous tasks all are
completed.
1 2
1 I ·I 2
4
FIGURE 3 - 1S Dependent tasks. FIGURE 3 - 16 Dependent tasks and multlple successor tasks.
1 2
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- t fta111&....-.~~ ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase I Systems Planning
The project management team at Parallel Services is having a debate about how to define casks
In the WBS.The project manager wants to break wks down into the smallest possible units. For
example, she objected to a broad task statement called "Develop a training schedule.'' Instead,
she suggested three subwks: (I) "Determine availability of training room," (2) "Determine avail-
ability of attendees," and (3) "Select specific dates and training times.''
Another project team member disagrees. He feels that the broader task statement
is better because It allows more flexibility and will produce the same result. He says
that if you break tasks Into pieces that are too small, you r isk overmanaglng the work
and spending more t ime on mon itoring than actually performing the tasks. As a mem-
ber of the team, wh ich approach do you agree with more? What are the pros and cons
of each?
Task patterns determine rhe order in which rhe casks are performed. Once rhe rask
sequence has been defined, a project manager can schedule the rasks and calculate rhe
critical path. A critical path is a series of tasks chat, if delayed, would affect the com-
pletion dare of the overall projecr. If any cask on rhe critical path faUs behind sched-
ule, the entire projecr will be delayed.
For example, suppose that Joan and Jim are invited to someone's home for din-
ner. Joan arrives on time, bur Jim arrives 30 minures !are. Jim's arrival is part of the
critical path because the host does not wane to start without him, so the meal will be
served 30 minutes later than originally planned.
Project managers always muse be aware of che critical parh, so they can respond
qu ickly co keep the project on track. Microsoft Project and other project management
software can highlight the series of tasks that forn1 the critical path.
r..,,...JID)r-..1-.. 4•11_.. •...__. ~....... .,...~ • ........._ . ....._.,.,.. o-... ..,._.,,.,.. _ ..,.~ ,........., ................. .._... .., .,. ..,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Chapter 3 Managing Systems Projects
Plan Training
~
ID: 3
)" Dur : 5
Obtain Authorization Hire Analysl Announce Training
\. ID: 4 V'
Dur: 25
FIGURE 3 - 18 Example of a PERT/CPM chart with five tasks.Task 2 is a dependent task that has multiple successor tasks.Task S has
multiple predecessor tasks. In this figure, the analyst has arranged the casks and entered task names, IDs. and durations.
The next step is ro derermine srart and finish dates, which will determine the crir-
ical path for rhe project. The following explanation outlines a step-by-srep process.
The result is shown in Figure 3-19.
• Task I starts on Day 1 and has duration of 10 days, so the finish date is Day 10.
• Task 2, which is dependent 011Task1, can start 011 Day 11-the day afcer Ta~k
I ends. Wirh duration of 30 days, Task 2 will end on Day 40.
• Tasks 3 and 4 are multiple successor tasks that can start after Task 2 is done.
Task 2 ends on Day 40, so Tasks 3 and 4 both can stare on Day 41. Task 3 has
duration of five days and wiU end 011 Day 45. Task 4 has duration of 25 days
and will nor end until Day 65.
• Task 5 depends on Tasks 3 and 4, which are multiple predecessors. Because
Task 5 depends on both tasks, it cannot srart until the later of the two tasks is
complete. In this example, Task 3 ends earlier, but Task 4 will not be completed
until Day 65, so Task 5 cannot srarr until Day 66.
Plan Training
)" Start: ~
Day 41 ID: 3
Finish: Day 45 Dur: 5
Obtain Authorization Hire Analyst Announce Training
FIGURE 3- 19 Now the analyst has entered the start and finish times, using the rules explained in this section. Note that the overall
project has duration of 95 days.
Recall char the critical path is a series of tasks chat, if delayed, would affccr rhc final
complcrion dace of rhe overall project. In this exan1plc, Tasks 1 and 2 arc the first casks
on rhc crirical path. Now look ar Task 5, which cannot start until borh Tasks 3 and 4
arc done. In chis case, Task 4 is the controlling factor because Task 4 finishes on Day 65,
which is 20 days larer than Task 3, which is completed on Day 45. Therefore, rhe start
dare for Task 5 is determined by the finish date for Task 4.
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 4111.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase I Systems Planning
3.6 Reporting 87
In contrast, Task 3 has slack rime and could be delayed up to 20 days wirhour
affecting Task 5. Slack rime is the amount of rime rhar the rask could be late without
pushing back the completion dare of the entire project. Tasks 1, 2, 4, and 5 repre ent
the critical path, which i highlighted with red arrows in Figure 3-19.
Regardless of whether the project was planned and scheduled wirh projccr management
software or in some other manner, the project manager mUSt keep track of rhe casks and
progress of ream members, compare acrual progress with the project plan, verify the com-
pletion of project milestones, and set standards and ensure thar they are followed.
3.6 REPORTING
Members of the project team regularly report their progress ro che project manager,
who in rurn reports ro management and users. The project manager collcccs, verifies,
organizes, and evaluates the information he or she receh·es from the ream. Then the
manager decides which information needs to be passed along, prepares a summary
88 3.6 Reporting
that can be undersrood easily, adds comments and explanations if needed, and s ub-
mits it to management and users.
FIGURE 3·20 Project managers schedule regular meetings to update the project team and discuss
project staws. Issues. problems. and opportunities.
t ~.... llf~
(....,..... J:gi( . . . . . I_,.. 41 11.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase I Systems Planning
By the rime management learns of the problem, linle time might remain in which to
react or devise a solution.
A project manager's best course of action lies somewhere berwcen the rwo extremes
but is probably closer co the first. If the con.sequences are unclear, the analy t hould err
on the ide of caution and warn management about the possibility of a problem.
\Xlhen the s1ruarion 1 reported, explain what is being done to handle and monitor
the problem. If the siruarion is beyond the analyst's control, suggest possible acnons that
management can rake to resolve the siruarion. Most managers recognii.e that problems do
occur on mo t project ; 1t is berrer to alen management sooner rather than later.
Project managers use sofrware applications to help plan, schedule, monitor, and
report on a project. Most programs offer features such as PERT/CPM, Gann charts,
resource scheduling, project calendars, a nd cost tracking. As shown in Figure 3-2 1,
M icrosoft Pro ject is a full -featured program that holds the domi nant share of the
market. Ir is available as a software product for W indows and as an add-on on line
service as parr of i\llicrosoft's Office 365.
-- -·- - -- ,_ __
°"'......,
....
Project
Project management
....... .__
..
,;
Sprint
,....,.
Spr1m 1 (IA11 _ , s..1... Epoc Ettlf'l'lll~ 0
I ,,,... .......
---Ito-.
lkJ9 02doft
I Hew I g 01-,.
-
u.,.
FIGURE 3-22 Monday is a project management tool that is tailored toward Mac users.
Sour«< ...,
............ _
• a
,_
Don'•--~
n
-
... U t ............ ~CNdft!A
,,.,,...n.n orH'*9 1 filil "°"1 • Ofll.
• tt• fD Ill
~
,_., o..g. a
-
_____
~r '*•••
- "'
•
,
-
FIGURE 3. 23 Trello is a project management tool that is tailored toward agile development.
(....,..... J:gi( . . . . . I_,.. 41 11.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f •,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase I Systems Planning
The websites for all of rhese cools have more information about their capabilmes,
including demos, trial versions (where applicable), and rraining material.
Lrrespective of which projecr management tool used, a seep-by-seep process is
followed co develop a WBS, work wirh cask patterns, and aoal)'ze cbe critical path.
Tbe main difference is thar the sofrware does most of cbe work automatically, which
enables much more effective managemenr.
The followmg secnons explain how ~licrosofr Project could be used to handle
the sample cask summary for a preliminary investigation shown in Figure 3-24. This
example illusrrares that project management is dynamic and challenging. One signifi-
cant advamagc of intcgraced project 1nanagement software is that it allows the proiecc
manager to adjust schedules, estimates, and resource assignments rapidly in response
to real-world evenrs.
GANTT CHART: As casks arc entered, the progcam automatically performs the
c::ilculations, detect~ the task patterns, and creates a Gann chart. The charr consists
of horizontal bars, connected with arrows that indicate task dependencies. If a typ-
ical workweek is selected, casks wi ll not be scheduled on Saturdays and Sundays.
However, for a mission-critica l project, a 24/7 calendar might be created. Whatever
is specified, the program will handle che tasks accordingly. Microsoft Project offers
numerous choice~ of display senings, formats, and calculation methods.
NETWORK DIAGRAM: After the Gann chart is completed, rhe darn can he viewed
in the form of a tvlicrosoft Project network diagram, which is simil::ir to a PERT
chart. When rhe Network Diagram option is selected, the project tasks, dependencies,
and stare and finish dares for each task are shown. A network diagram displays the
same information as the Gantt chart, including cask dependencies, but use task boxes
to include much more derail. Using Microsoft Projecr, each cask can be assigned to
one or more people, budgets can be assigned targets, progress reports produced, and
schedules and deadlines readjusted as necessary.
CALENDAR VIEW: Calendar view is a good way to manage da y-to-da)' activity. This
view !.hows the tasks, simila r to a PERT charr, as an overlay on the actual calendar.
Because the criucal path is highlighted in red, it is easy for a project manager to deter-
mine priorities at any poim in rime.
Suppose the project manager wants to view the preliminary investigation in
Figure 3-24 as a Gantt chart, a PERT chan, and a day-to-day calendar. All three views are
shown in Figure 3-25. Each view sbo\vs the tasks, tbe riming, the dependencies, and the
critical parh. Note rhat of the four tasks scheduled for September 25, onl)1 the user surve)'
is on rhe critical path, therefore that should be rbe project manager's primary concen1.
• .,.-.-_....,...
u ....
.,..,.....
•9\"
~·
-
I ...........,.._.....
....,......
...·-... '''
i
----
-·-
~.-.........
---
PERT Chart View
..............
-···· .
- .. --
--·
- ..._
......... u
••
h_..,, ...
-·--
-•ft• •• _
-
.. --
....... ...,_
........ ·~-
~
~
.. .-.......
......."" . ....
• •.
-
.... ~
.... fl'Wl1
.........
., •
-......·
'+
...
,._,., WV.• .... I...,.
C11lendarVlew
l1 ~_ _ _ _ _ _ _ 2t.
,----~-----'-'
FIGU RE 3-2S Note how each view displays tile project and highlights tile crttial patll If you were the
project manager on September 25, your primary concern should be conduct1ng tile user survey.
(....,..... J:gi ( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,...... .,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~ c.....,..~
0w.,,,.._.._,..."-,.._..,.,_, .,_.,....,. -~--- t fta111&....-.~~ ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase I Systems Planning
Every IT project involves risks that systems analysts and project managers must
address. A risk is an event char could affect the project negati\·ely. Risk management
is the process of identifying, analrzing, anriciparing, and monitoring risks to minimize
their impact on the projecr.
Although project management experts differ \vith regard to the number of seeps or
phases, a basic list of risk management casks would include rhe following:
• Develop a risk ma11ageme11t plan. A risk management plan includes a review
of the project's scope, stakeholders, budget, schedule, and any other internal
or external factors t hat might affect the project. The plan should define project
roles and responsibilities, risk management methods and procedures, categories
of risks, and contingency plans.
• fdenti(y tl1e risks. Ri\k identification lists each risk and as~esses the likelihood
that it could affect the project. The derails ·w ould depend on the specific proj-
Cl't, but most lists would include a mean~ of identification, and a brief descrip-
tion of the risk, what might cause it to occur, who would be responsible for
responding, and t he potential impact of the ris k.
• Analyze the risks. This typically is a rwo-step process: Qua litative risk analysis
and quantitative risk analysis. Qualitative risk analysis evaluates each risk by
estimating the probability that it will occur and the degree of impact. Project
managers can u~e a formula to weigh risk and impact values, or they can dis-
play the result~ in a two-axis grid. For example, a Microsoft Excel XY chart
can be used ro display rhc marrix, as shown in Figure 3-26. In rhe chart, norc
the various combinarions of risk and impact racings for the five sample values.
This tool can help a project manager focus on the most critical areas, where
risk probability and porenrial impact are high.
10..->o~---~-------~~~~~~~
Medium impact
9 Medium probabt~ty
8 •
7
t;
"' 8
~ 5 Low Impact
-" High probability
.!! 4
a:
3
2
1
0 *-~~~~~~~~~~~~~..;..-~~~~--!
.--~'"-----. 2 3 4 5 6 7 8 9 10
Low Impact
Low probabiltty Risk Probability
•
4 4 t • ~· .:. ~ ------ •
FIGURE 3-2 6 You can use a Microsoft Excel XY chart cype to display a nsk rmtr1x
that shows risk probability and potential impact.
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 4111.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase I Systems Planning
You are a systems analyst at Just-In-Time Software. a company that specializes in short delivery
cycles for itS products.The current project is running ~hind schedule, and the project manager
wantS to bring a few extra programmers onboard co help with the work.
You are familiar with Brook's Law. How can you best explain co the project manager
that adding more people co che project at this late stage may make things worse1 You
don 't want co be seen as a negative team player. but you're convinced that If you don't
speak up. the project's schedule will slip even more.
r..,,...JID)r-..1-.. 4•11_.. •...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Chapter 3 Managing Systems Projects
96 3.10 Summary
"Better blow the whistle," says your friend and project teammate at work."The project
is out of control, and you know it!" " Maybe so," you respond, "But that's not my call- I'm
not the project manager." What you don't say is that the project manager feels like her
career is on the line. and she is reluctant to bring bad news to management at this time.
She honestly believes t hat the project can catch up and says that a bad report on a major
project could resu lt in bad publicity for the firm and frighten potential customers.
To be fair. the next management progress report is scheduled in three weeks. It is
possible that the team could catch up. but you doubt it. You wonder if there is an ethical
question here: Even though the report isn't due yet. should a significant problem be
reported to management as soon as possible I You are concerned about the issue, and you
decide to discuss it with Stephanie. What will you say to her1
3 IQ SUMMARY
r..,,...JID)r-..1-.. 4•11_.. •...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Phase I Systems Planning
3.10 Summary 97
idenrify each task and include an estimated duration. A rask, or activity, is any work
that has a beginning and an end and requires the use of company resources such as
people, rime, or mone)•. Time and cost esrimares for rasks usually are made m person-
da)'s. A person-day represents the work rhac one person can accomphsh in one day.
Esnmaring the rime for project activities is more difficult with larger systems. Project
managers musr consider rhe project size and scope, IT resources, prior experience
with similar pro1eccs or systems, and applicable constraints. In addition to tasks, every
project has cvenrs, or mile!>tones. An event, or a milestone, is a recognizable reference
point rhat can be used ro monitor progress.
Task patterns establish the sequence of work in a project. Task patterns involve
dependent casks, mulriple successor tasks, and multiple predecessor tasks. In larger
projects, rhese patterns can be very complex.
A critical path is a series of casks that, if delayed, would affect the completion dare
of rhe overall project. If any task on the critical path falls behind schedule, the entire
project will be delayed. Tasks on the critical path cannot have slack time. To identify
the critical path, calculate the start and finish date for each cask, which will determine
the critical path for the project.
In project schedu ling, rhc project manager de\•elops a specific rime for each rask,
based on available resources and whether or not -cbe task is dependent on ocher pre-
decessor tasks. The manager can use graphical rools such as Gantt charts and PERT
charts ro assist in rhe scheduling process.
A Gann chart is a horizontal bar c hart that represents the project schedule with
rime on the horizontal axis and tasks arranged vertically. ft shows individual tasks
and rask groups, which include several casks. In a Gantt chart, the Ieng-ch of the bar
indicarcs rhc durarion of the rasks. A Gann chart can display progress bur docs nor
show rask dependency derails or re ource assign ment unless the charr was created
with a project management program that suppon:s dependency linking and rhe entry
of other information.
A PERT/C P~I charr shows the project as a nerwork diagram with tasks connected
by arrows. Using a prescribed calculation method, the project manager uses a PERT
chart to determine the overall duration of the project and provide specific informa-
tion for each task, including the rask IDs, their durarions, start and finish rimes, and
the order in which they must be performed. \Xlirh this information, the manager can
determine the critical path, which is the sequence of tasks that has no slack time and
must be performed on schedule in o rder to meet the overall project deadline.
Mose project managers use software applications such as Microsoft Project co
plan, schedule, and monitor projects. Project managers are responsible for risk man-
agement, which is rhe process of identifying, analyzing, a nticipating, and monitoring
risks 10 minimize their impact on the project.
In ihe end, project management involves the same skills as any o ther management.
The project manager must be perceptive, analytical, well organized, and a good com-
municator. If the project manager senses that the project is off-track, he or she muse
take immediate steps to diagnose and solve the proble1n. lf the project manager fai ls
to plan, staff, organize, supervise, communicate, motivate, evaluate, direct, and con-
trol properly, then the project is certain to fail. Even when factors outside his or her
control contribute to the failure, the project manager is responsible for recognizing
the early warning signs and handling them effectively.
98 Key Terms
Ke y Te rms
actJ\11)- Any work rhar ha~ a beginning and an end and require> the use ol compan) rc<.oorce' including
people, tmte, :rnd/or mone). Example$ indu<le conducung a >erto of 1nten 1cw,, de-1gnmg a report,
\clet.:ung ,ofrware, waifing for the delivery of equipment, and 1ra1nmg u..er~. <iu 11/su l.t\L..
best-ca~ c<itimatc The mosr opcirnisric outcome.
bonom-up technique A method for analyung a large, complex protect as a serii-s of mdl\·idual tasks,
called project tasks.
Brool..s' la" hedenck Brooks, an IB~l engineer, observed that adding more rnanpO\\Cr 10 a !are soft·
\I ar~ proiect 01il) mak~ 11 later.
nufc,tnnc \ reference point that mark. a major occurrence. U«:d to monitor pmgre" and manage a
projccr. See also event.
ncmnrk d1agr:im A PF.RT chan al~o is referred to as a network diagram.
open source Sofrware thac is supported b) a large group of users and developer•. The source code is
mJde free!) available.
pcrson-dav I he amoum of work that one person can comple1e in one d.1y.
l'l:.R f /Cl'M lbe l'rogr.im Ev•lua11011 Review Tecbmque (Pl:.RT) "a> developed by 1he U.S. Navy 10
man.tgc very complex projects, such as rhe construction of nuclear submarines. At appro,imarcly rhe
same 11me, the Cnrical Pach Method (CPM) was de, eloped by pnvare indusrr) to rnccr ~1m1lar project
management needs. The tmporranr disrincrions berween the two methods hal'e disappeared over rime,
and rot.lay 1he rechmque is cillled either PERl~ CPM, or l'ERT/Cl'M.
prc<lccc"or ta\k A <mglc prior task upon wl1 ich two or more concurrent 1.1sk\ depend.
probablc·<:a\c c\limarc The most likely outcome is called a probable-ca~c c\timatc.
Prol\ram [·.valuation Re\ i~ Technique (PERT} See l'ERT/CPM.
project coordin;11or The person who handles administrative responsihilitie< for the development team
and negoriate' wirh u~ers who might have conAicring requirement~ or wane changes that would
rc4uirc .11Jditional time or c..:pcnse.
pro1c't lc:ldcr The perwn chJrgcd with leading a project from a rechnical per~pc,rivc.
pro1c.:1 m.inJgcment The process of planning, schedtilm!(, mon11onng, controlltng, .1ntl reportutg upon
che dcl'elopmen1 of an information system.
pro1c.:r manager The pcrwn charged ,,;th maaagiag a projccc from an admm1stranve pcr<ipective.
Key Terms 99
pro1cct monitonng Gu1dmg, supervising. and coordin:iriog chc project 1eam's worlJoad.
project planninl( ldcnufymg prOJC\:t IJ>b and estimating completion ume Jnd cosb.
projcc1 rcporunit Pro,1dmg regular progress reports 10 managemen1. users, .md the pro1ecr 1eam nsclf.
pro1cx1 "'hrdulin11 The vca11on of a ">pc<:ific umcrable ro faciliratc complcuon ot J pro1a:1. Al'o m'ol'c'
<electing and ;,1;iffing rhc pro1ccr ream and a'\~1gnmg specific tasks to team mcmh<:.-.
pro1cct 1nan11k The thr« ma1or component~ of a project: co<t, scope, and nmc. A projc~'t manager rric\
to find the optimal balance among the\C facrors.
qualuati'c mk anal}"' Fvaluaring ri\k by escimaring che probability rhar ir will occur and the dcgrc-e of
impact.
quantitauvc ri~k anal) m cvaluaung mk m rerms of rhe acmal impact m terms of dollars, tune, pro1ccr
scope, or qualiry.
ri~k An C\'ent th.tr could affccr the pro1ccr negatively.
ri~k identification Lming each risk and assessing the likelihood thar it could affect a pro1ccr.
ri'\k manai;cmcnt The procc'' of idcnrifying, evaluati ng. cracking, and controll ing ri'h to minimize rhcir
impact.
ri,I.. management plan lnducJc, n rcvi<.·w of the prujt:t.'t's scope, sr:akeholtle,.,., hud11tt, •chet.lulc, and any
other internal or c'rcrnal factor' chat might affect the project. The plan <hould define projc~1 role\ and
rC"pomihi liric<, ri'k m,inagcmcnr mcrhod< and procedures, categoric< of ri<h, and contini;cncy plan<.
risl.. response plan A proaciive cffon to .inricipare a risk and describe an action plan rode.ii with ii. An
effecche rt>!. respon.)t p!Jn can reduce che o~erall llllpacr by criggenng a timely and appropri.ue acuon.
~I.tel. urnc !be amount of ume b) which an e\'enr can be !are without delaymg the pro1ecr. lbc differ-
ence bet~ttn btest compleuon ume (LC!) and earliest completion titne (l:.Cf).
start day/dare lhc dJ) or date when a rask 1s scheduled to begin.
\tructurcd "alk-through \ rc,·1ew of a project ream member's work h}' other member\ of the ream.
Generali)', 'l'rcm' analy•r• review the work of orher S)"St:ems analym, and programmer\ renew rhc
worl.. of other programmer-, a' a form of peer re,·iew. Should take place throughout chi: SOI.( and
ar1: called rcqu1n:mcnt r.-vicw•, dc\lgn review<, code rC\;ews, or tc:>tmg n:v1cw•, dcp1:nd1ng on the
pha\C in "h11:h thcr occur.
\UCCC\\nr ta'k F.ach nf the cnncurrcnr ra•k' of a prcdeccswr cask.
ca'k An} worl.. that ha<i a beginn ing and an end and requires the use of company resources 111clud111g
people, time, ,111d/or money. Examples include conducting a series of inter\'iews. designing .1 report,
~elect111g buff\\ are, waiting for the deJi,ery of equipment, and training users. See .:1/su a1..1 .. it>-
ta>k bu" A i:o111ponc111 of a PF.RT/CPM charr that contains imporranr scheduling and duration informa -
tion abour J tJ>k. Fnch ra>k in a pruic1..-i is represented by its own task box in the PF.RT/CPM 1..hart.
ta>k group A ta'k thnt rcprc~cnr~ ~C\'eral activ11ics.
task ID A number or code thn1 uniquely identifies a task.
task name A brief dcscrip11ve name for a task, which does not have to be unique in the pro1ecr. Fc>r
example, a task 11.1med Conduct l111erv1ews might appear in several phases of the proiecr.
tasl.. paucrn A log"al •~quence of ra~ks ma WBS. Can involve sequential tJsk>, muluple >U"e;;or tasks,
and muluple predecessor tasks.
tcmng rc•icw See '\tructured \\all..-through.
\\eight An important mulupher th,1r managers facror inro esnmares so the) c.in he an3lyzed.
\\Ork brcal..do" n uructurc (WBS) A pro1ect broken down imo a series of smaller task\. Su also Gantt
chan; PERT/CPM chan.
wo~t -ca'c C\t1111.1tc The most pcss1m1sric outcome.
100 Exercises
Exercises
Quest ions
I. Draw a pro1ect rriangle that shows rhe relationship among project cost, scope, and time.
2. \Vrite the S(.Tipt for a one-minute explanation of basic project management concepts.
3. Explain the differences bcrwecn a Gann charr and a PERT/CP~I chart.
4. \Vhat are the three main task parrerns t)'Pes? Provide an example of each.
5. Why is the critical path important?
6. What is a srrucrured walk-through?
7. What arc the rwo main ways project starus is reported to management?
8. What i~ a significanr advanrnge of project management sofrware?
9. List the basic tasks in a risk management plan.
1 O. Explain Brooks' law.
Discussion Topics
I . When using a project rriangle to illustrate conflicti-ng priorities, Microsoft suggests rhar if rhe problem
is in the fixed leg, work on rhe other rwo legs. For example, if rhe project must nor exceed rhe budger
and it is starting to run over, adjust rhe schedule, or the scope, or hoth. However, if the problem is nor
related ro rhe fixed leg, rhe adju~rmenr mighr have to be in the remaining leg. So, when faced wirh an
inflexible budget (fixed leg) and the schedule is slipping (problem leg), rhe project's ~cope (remaining
leg) mighr have robe adjusred. Why is explaining this siruarion ro management sometime~ a very diffi-
culc cask for chc sysccms analyst?
2. lf you are managing a large project, would you prefer Gantt charts or PERT/CPM charts ro represent
project status? Explain why.
3. Consider a scenario where a cask is dependent on another task being started bur nor necessarily com-
pleted. for example, a prOJect may depend oa a cask being started and one-fourrh compleced before
the group could start 1heir porrion of the project. Do you think this situation occurs frequently in sys-
tems pro1ects? Wh>• or why not?
4. Some project management applications can be quire expensive. As a manager, how would you justify
the purchase of this sofrware?
5. Risk analysis is rypically a two-step process: qualitative risk analysis and quantitative risk analysis.
As a systems analyst, for which sores of project management decision!. would you use the results from
qualitative risk analysis? 1-rom the quantitative risk analysis?
Projects
1. Think of all the tasks chat you perform when you p urchase a car. Include any research, decisions,
or financial issues that re lare ro the purchase. Crea re a \X'BS that shows all the rnsks, their estimated
duration, and an)' predecessor rasks.
2. Figure 3-27 shows a \XfBS with l Ltasks. Note tbat each rask has an ID, a description, durarion, and
a reference to predecessor tasks, if any, which must be completed before the task can begin. Also note
that dependent casks can have one predecessor task or several. Construct a PERT/CPM chart from
rhese tasks. Reca ll that rhis is done as a rwo-step process: (l) display the casks and task patterns, and
(2) enter start and finish rime.
r..,,...JID)r-..1-.. 4• 11_.. • ...__. ~... .... .,... ~ • ........._ ......_.,.,.. o-... ..,._ .,,.,.. _..,. ~ ,...... ..., ................. .._... ..,.,...,.~"
........... ........ ..., .................... . . .... -.., .n..-. ....-i k-s c~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Phase I Systems Planning
Exercises I0I
3. Many of roday's projects involve team members scanercd across different time zones and in different
phy~ical locations. Moreover, the projects may have adopted an agile mechodology, which reduces
cycle time dramarically. Wrire a brief report rhat summarizes some of the key differences a manager
would face managing chi~ rypc of projecr, as opposed to a traditional pro1ecc.
4. Go to the websites for project management rools (besides Microsoft Project), such as Apptivo (www
.apptit'O.com ), GanttPro1ecr (www.ganttprojed.biz), Ganner (wwmga11Ner.com), smarrshcet (u11uw
.s111arts/Jeel.comlprod11d-to11r/gm1N-charts), }vlonday (U11t•w.mo11day.com), and Trello (www.trello.com).
I:xplorc each program's fearures and describe what you like and don't like.
5. Perform an Internet research co learn more about project risk management and write a summary
of the resulrs. Be sure to search for cbe classic book titled Waltzing with Bears: Managing Risk 0 11
So(tw<1re Projects, by Tom Demarco and Timothy Lister.
r..,,...JID)r-..1-.. 4•11_.. •...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
~ JIJ»C....... ~ Al RlilfD l,eocl\olld.,...,. _WOlfi'l'l.~• ......-W.Mdk«iil,_._DIK•dtc--.: ......,_ . . . ,_.,~-.lit .......... .._.,._.__..,~•\
~ ... _ . . . _ . .... ..., ~...,.._,_..,..., J\&."9 ... --.11 ......... ~ C'dptl"~~d.tt ...... - ............ - ..... - .......... -.-.....w--...-.11
PHASE
Systems analysis is the second of five phases in the systems development life cycle. In the
previous phase, systems planning, a preliminary investigation was conducted to determine the
project's feasibility.The output of that phase, the preliminary investigation report. is used as input
to the systems analysis phase, where a system requirements document is created that captures
the needs of the all stakeholders.
A successful project manager must determine the requirements before starting the design
process. not the other way around. It may be tempting to "just do something" to give the
appearance of productivity, but a systems project that does not satisfy business requirements
serves no useful purpose.
Chapter 4 focuses on the requirements engineering process. This includes system requirements,
team-based techniques, gathering requirements through interviews and other methods,
gathering requirements in agile projects, representing requirements. validating and verifying
requirements, and requirements tools.
Chapter 5 focuses on data and process modeling techniques that analysts use to show how
the system transforms data into useful information. This includes logical versus physical models,
data flow diagrams and symbols, drawing data flow diagrams. drawing context diagrams, drawing
diagram 0 DFDs, drawing lower-level OF Os, data dictionaries, and process descriptions.
Chapter 6 focuses on object modeling techniques that analysts use to create a logical
model. This includes object-oriented analysis, objects, attributes, methods, messages, classes,
relationships among objects and classes, the Unified Modeling Language (UML), and tools.
Chapter 7 focuses on development strategies for the new system and plans for the transition
to the systems design phase.This includes traditional versus web-based systems development,
evolving trends, in-house software development options, outsourcing, offshoring. Software
as a Service (SaaS). selecting a development strategy, the software acquisition process, and
completion of systems analysis casks.
103
r..,,...JID)r-..1-.. 4•11_.. •...__. ~....... .,...~ • ........._ . ....._.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... .., .,. ..,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Chapter 4 Requirements Engineering
Requirements
•
• ••• • ••
•
•••• ••••••••••• Engineering
...... - ·····
······----····
·····---··-··
---· --
•••••
••••• • ••
•
Chapter 4 is the first of the four chapters m the The chapter includes three "Case In Point"
systems analysis phase. This chapter describes the discussion questions to help contextualize the concepts
requirements engineering process: gathering facts described in the text. The "Question of Ethics" raises
about a systems project. creating models that will be the issue of considering a request by a supervisor to
used to design and develop the system, and verifying identify departments that reported the lowest ratings in
and validating that the models are correct before a survey that was supposed to be kept anonymous.
proceeding to the next phase of the SDLC.
4. I SYSTEM REQUIREMENTS
During the first part of the srstems analysis phase of the SDLC, systems analysts must
idenrify and describe all system requirements. A system requirement is a characteristic or
feature that must be included in an informarion system to satisfy business requirements
and be acceprable to users. System requirements serve as benchmarks to measure the
overall acceprabiliry of the finished system.
Because system requirements arc the focus of t he start of the systems analrs1s phase,
it's important to get rhcm correct, right at rhc start of the process. Any problems with
the requirements will have a ripple effect that could negacively affect subsequent phases
of the DLC. In facr, poor requirements engineering is a leading cause of failed projects.
Requirements engineering is composed of three main activities:
1. Gathering requirements: 1111derstanding the problem
2. Representing requirements: describing the problem
3. Validating and verifying requirements: agreeing upon the problem
Each of these activities is described in more decailt in this chapter. The output of
requirements engineeri ng are requirements docun1enrs that capture the essence of
what the system should do. These documents are the input to the next step in the
SDLC, data and process modeling, which is described in Chapter 5.
IMPRECISION: Requirements arc often imprecise because rhcy are usuall y repre-
scnccd using natural language, such as the examples shown in Secrion 4.1.1. Natural
language is expressive, bur it is prone to misintcrprerarion. Ir is not uncommon for
vnrious i.rakeholde rs to completely dlisagrec as to the mea ning of a simple req uire-
ment. It is for chis reason chat other techniques are used to represent requirements, as
described in Secrion 4. 7.
A req uirement may be a high-level abstract statement of a service or of a system
constra int, bur it can a lso be a derailed mathematical specifica tion. T his is because
requirement~ often berve rwo functions: as a basis for a bid for a contract, a nd as the
basis for rhe cotitract itself.
If rhe requirements are the basis for the contract bid, it muse be open to interpreta-
tion. Bur if the requirements are the basis for rhe contract itself, it must be defined in
detail. These rwo constraints are difficult to satisfy.
CREEP: There are many social and organizational factors that influence sysrem
requirements. For example, business changes inevitably lead to ch:mging require-
ments-usually more of them ;ts the project progresses. T his is particularl y true for
long-lived projects where the personnel involved change over rime. This phenomenon
is known as "feature creep."
Rapidly c hangi ng requirements can cause numerous problems for systems analysts
and other ream members. T his is particularly true for project!. that follow a tradi-
tional waterfall model of the SDLC. It is partly for th is reason rhar agile methods are
popular: They explicitly address changing requirements as part of rhe project's man-
agemen t structure.
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- t fta111&....-.~~ ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
I'
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 4111.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
I'
JAD PARTICIPANTS AND ROLES: A JAD team usually meets over a period of days
or weeks in a special conference room or at an off-sire location. Either way, JAD
participanci. should be insulated from rhe distraction of day-co-day operations. The
objecti,·e is to analyze the existing system, obtain user input and expectations, and
document user requirements for the new system.
The JAD group usually has a project leader, who needs strong interpersonal
and organizational skills, and one or more members who document and record the
results and decisions. Figure 4-2 describes typical JAD participants and their roles.
IT staff members often serve as JAD project leaders, but that is not always the case.
Top manageme nt Provides enterprise-level authorization and support for the project
Syscems analysts on rhe JAD ream participate in discussions, ask questions, rake
note , and provide support to rhe team. If CASE tools are available, analysts can
develop models and enter document ation from the JAD session directly into the
CASF tool.
A typical JAD session agenda is s hown in Figure 4-3. The JAD process involves
intensive effort by all ream members. Because of the wide range of input and constant
interaction among the participants, many companies believe th:u a JAD group pro-
duces the best possible definition of tbe new system.
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
I'
North Hills College has decided to implement a new registration system that will allow
students to register online as well as in person. As IT manager, you decide to set up a JAO
session to help define the requirements for the new system.The North Hills organizaoon
is fairly typical, with administrative staff that includes a registrar. a student support and
services team, a business office, an IT group, and a number of academic departments. Using
this information, you start work on a plan to carry out the JAD session. Who would you
invite to the session, and why! What would be your agenda for the session, and what would
take place at each stage of the session!
RAD PHASES AND ACTIVITIES: The RAD model consists of four phases: require-
1
ments planning, user design, construction, and cucover, as shown in Figure 4-4. ote
the continuous inreract ion between the user design and construction phases.
Require me nts planning. The requirements planning phase combines element~ of the
systems planning and l>ystems analysis phases of t he SDLC. Users, managers, and IT
staff members discuss and agree on business need s, project scope, constraints, and
sy~tem requirements. The requirements planning phase ends when the team agrees on
the key issues and obtains management authorization to continue.
User design. During the user design pha~e, users interact with systems analysts
and develop models and prototypes chat represent a ll system p rocesses, outputs, and
inputs. T he RAD group or subgroups typically use a combinatio n of J AD techniques
and CASF, roo ls co transla te user need s into wor kin g models. User design is a con-
ti nuous, interactive p rocess that allows users to u ndersta nd, modify, a nd eventua ll y
approve a working model of the system tha t meecs cheic needs.
Constructio n. The constru ction phase focuses on program and application develop-
ment tasks similar to the SDLC. In RAD, however, users continue co participate and
still can suggest changes or improvements as acrual screens or reports are developed.
Cutove r. The curovcr phase resembles the final tasks in the SDLC implementation
phase, including data conversion, resting, changeover to the new system, and user
training. Compared with traditional methods, the entire process is compressed. As a
result, the new S)'Stem is built, delivered, and placed in operation much sooner.
r..,,...JID)r-..1-.. 4•11_.. •...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Chapter 4 Requirements Engineering
Construction Tasks
User Design Tasks
• Program and
• Interact with users User application
• Build models and Design development
prototypes
• Coding
• Conduct intensive • Unit, Integration,
JAD-type sessions
and system testing
CutoverTasks
• Data conversion
Cutover • Full-scale testing
• System changeover
• User training
FIGURE 4·4 Tho fo11r ph11s~ of tile R.AD rno<!el ;i,~ ~quire111entt planning, user design, connruction, arid
cucover. Note the continuous lnceractlon between the user design and construction phases.
RAD OBJECTIVES: The main objective of all RAD approaches is co cue developmenr
rime and expense by involving users in every phase of sysrems development. Because
iris a conrinuous process, RAD allows rhe developmenr ream ro make necessary mod-
ificarions quickly, as the design evolves. In times of right corporare hudgers, iris espe-
cially imporranc co limit che cost of changes chat typically occur in a long, drawn-our
development schedule.
In addition to user involvement, a successful RAD team muse have IT resources,
skills, and management support. Because ic is a dynamic, user-driven process, RAD
is especially v::iluahle when a company needs an information :.yMem to support a
new business function. By obtaining user input from the beginning, RAD also helps a
development ream design a system that requ ires a highly interactive or complex user
interface.
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
- Woip-M ._..,..
..
- ·~•-fllllie<'f •,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,.. ..,. - ~---tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
I'
-
i
-- -~
•
,. -
-
a- •
••
--
I I
•
• -
- 1
-,... -- • ,,::: I
FIGURE 4-5 Reinforcing the agile stntegy: simple, rapid.flexible. and user oriented.
S..., ~d..,. 'I IO l<n 'Vt'f1 lfTI
Scrum is anod1er agile approach. The name cornes from the rugby term scr11111, where
team members lunge ar each other to achieve their objectives, as shown in Figure 4-6.
ll1e systems development version of Scrum involves the same intense interaction, though
it is more mental than physical. ln a Scrwn session, agile ream members play specific
roles, including colorful designations such as pigs or chickens. These roles arc based on
the old joke about the pig and chicken who discuss a restaurant where ham and eggs
would be served. I lowever, rhe pig declines, because that role would require a total
c01nmirmenr, while for rhe chicken, ir would only be a contribution.
Jn the agile world, rhe pigs include the product owner, the facilitator, and the
development team, while rhe chickens include users, ocher stakeholders, and manag-
ers. Scrum sessions have specific guidelines that emphasize time blocks, interaction,
and team-based activities thar result in deliverable software. An agile ream uses a
series of scrums to pause the action and allow the players to reset the game plan,
which remains in effect until the next scru m.
FIGURE 4-6 In a rugby scrum. team members prepare to lunge at each other to achieve their objectives.
.... ~~ tlCf h~~ ""'
Gathering requirements is the fi rst step in the requirements engineering process. This
step is also known as requirements elicitation or fact- finding (collecting information).
Whether working solo or as a me1nber of a team, during requirements gathering, the
systems a nal yst will use various teclu1jques, including interviews, document review,
observation, surveys and questionnaires, sampling, a nd research.
Although software can help gather and analyze requirements, no program actuall y
gathers them a uto matically. First, the information needed must be identified. Typi-
cally, t his activity begins by asking a series of questions, such as the following:
• \'<i'hat bu'>iness functions are su pported by the current system?
• What strategic objectives and business requirements must be supported by the
new sysrem?
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
I'
Who does It! Why does this person do ltl Who should do itl
What Is donel Why Is it donel What should be donel
Where is it donel Why is it done there! Where should It be done!
When Is It donel Why Is It done then! When should It be donel
How is it donel Why Is It done this way! How should It be donel
FIGURE 4-7 Sample quesaons during requirements elicitation as the focus shifts from the current system co
the proposed system.
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
I'
an organizarion charr. The analysr's knowledge of rhe company's formal and informal
srrucrures helps derermine rhe people ro inrervie'v during the systems analysis phase.
Should several people be interviewed at the same time? Group interviews can
ave time and provide an opporrunicy to observe interacrion among the participant<;.
Group interviews also can present problems. One person might dominate the convcr-
ation, even when questions are addressed specifically to others. Organization level
also can present a problem because the presence of senior managers in an interview
might prevent lower-level employees from expressing themselves candidly.
Also, an open-ended question can be used ro probe further by asking: ls rhcre any-
thing else you can rell me abour rhis ropic?
STEP 4: PREPARE FOR THE INTERVIEW: After setting the objccti\'eS and develop-
ing the quesrions, preparing for rhe incerview is next. Careful preparation is essenrial
because an interview is an important meeting and nor just a casual char. \Xfhen the
interview is scheduled, suggest a specific day and time and let the interviewee know
how long the meeting is expecced ro last. Ir is also a good idea to send an email o r
place a reminder call rhe day before the interview.
Remember rhat rhc interview is an inrerruprion of the other per~on 's routine,
so rhc interview should be limited re> no more than one hour. If business pressures
force a postponement of the meeting, schedule another appoinrment as soon as ic
is convenient. Remember co keep de partment managers informed of meetings with
cheir srnff members. Sending a message to each department manager listing planned
appointments is a good way co keep them informed. Figure 4·9 is an example of such
a message.
A list of topics should be se11c to an interviewee several days before rhe mcecing,
especially when detailed in£ormatioo is needed, so the person can prepare for the
interview and minimize the need for a follow-up meeting. Figure 4- J 0 shows a sample
message chat lists specif ic questions and confirms the date, time, location, purpose,
and anticipated duration of the interview.
If there are questions about documents, ask the interviewee to have samples avaiJ-
able at the meeting. The ad vance memo should include a list of the documents co
discuss (if it is known what they are). Also, a general request for documents can be
made, as the a nalyst did in the email shown in Figure 4· 10.
(....,..... J:gi ( . . . . . I_,.. 4111.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_, .,_.,....,. -~--- t fta111&....-.~~ ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,...... .,..~ __.~~ c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
I'
•••
d •• I) 0 B
°"""'-·
-
-
From: Soon Tiiiy - t• f ~.. . .
I em~ M U..Mw,.....,. ,....a~..,_.. I ....o .......... fWe .-.out uw""" •••a. Miii I wetM ..._ • ""9l!t _ . . tie¥Wlll
~ ol,,...... ..rr '°
~ tN 1'11.W IYlhl'ft. ,._.. iM. me io.w 6 O'lt ,.....,.. 9CNdlolle • OK:
•ff _ _ .... , _
· - i - . . - 1 1 .. , .-
. _ ..........- : u ..1·-
1 ... ,.. k1'0W, I MM to,,,.. ..... .,.,, ottw.,..... WI ,...., ••• tl•*'lll..,. r. ~w ~It netCS4f I Nft ta~..... tfllt ....leml
.,......., .,,.... ..... tM end ti the~ ... rt ........... copy"' ct. ayllCm . . .~ dow"*" .. toon . . ~ ......ble u.,.... M¥t ·~
~. ...... · - ~ Tt\tnld,
•••
d •• I) 0 8
Cc:
llcc
-
TM-....,..,_"'¥~""'°'.,.., \fl ....,.~•
..... ..,.
If"""
TM"b
h9W! "'" ~-..,.....,,..or-..... O\IC dOni '*" thl:
,_yew~
GM"IWft s...-em. P'MM No-.. UIOl9 ....._.._•I wn rnicw ""-"".._,.we nllefll
.......
Scott Tii ey
Two schools of thought exist about the best location for an interview. Some
analysts believe that interviews should take place in the interviewee's office, whereas
other analysts feel that a neutral location such as a conference room is better.
Supporters of interviews in the interviewee's office believe that is the best locntion
bccnu~e it m:.ikel> the interviewee feel comfortable during the meeting. A second
argument in favor of che interviewee's office is that the office is where he or she has
the easiesr access co supporting material that might be needed during the di cussion.
If a complete list of copies is provided in advance, however, che interviewee can bring
the necessary items co a conference room or other location.
Supporters of neutral locations srress the importance of keeping interruptions to a
minimum so both people can concentrate fully. In addition, an interview that is free of
interruptions takes less rime. If the meeting does take place in the interviewee's office,
tactfull y suggest that all calls be held until the conclusion of the interview.
STEPS: CONDUCT THE INTERVIEW: After detennining the people to interview,
setting che objectives, and preparing the questions, a specific plan for the meet-
ing should be developed. When cond ucting an interview, begin with introductions,
describe the project, and explain tbe interview objectives.
During the interview, ask questions in the order in which they were prepared and
give the interviewee sufficient time to provide thoughtful answers. Some answers will
lead co additional questions, which should be asked in a logical order. Establishing a
good rapport with rhc interviewee is important, especia lly if this is the first meecing. If
the other person feels comfortable and at ease, they will probably provide more com-
plete and candid a nswers. T he analyst's primary responsibility during a n interview is
co listen carefull y to the answers. Analyses sometimes hear only what they expect co
hear. Concentrate o n what is said and notice an)' non ve rbal communication that takes
place. This process i called engaged Hstening.
After asking a question, allow the person enough time to think about the question
and arrive ar an answer. Studies have shown rhar the maximum pause during a con-
versation i ~ usually rhree to five seconds. After that interval, one person will begin
talking. An analyst needs co be patient and practice his or her skills in many acrnal
interview !>iruarions to be successful.
When all the q uestions have been asked, summarize the main points covered in
the interview and explain t he next course of action. For example, mention that a
follow-up memo will be sent or that the interviewee should send certain requested
information after the meeting. When the interview has concluded, thank the person
and encourage him or her to reach out with any questions or additional comments.
Also, when the interview ends, it is a good idea to ask the interviewee whether he or
she can suggest any additional topics that should be discussed.
After an interview, sumuiarize the session and seek a confirmation from the other
person. By stating the interviewer's understanding of the discussion, the interviewee can
respond and provide corrections, if necessary. One approach is to rephrase the inter-
viewee's answers. For example, the analyse could say, "If I understand you correctly,
you arc saying rhat ...."and then reiterate rhe information given by the inrcrviewcc.
(....,..... J:gi( . . . . . I_,.. 41 11.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
I'
interviewee. Assure the interviewee rhar rhe recording will be erased after its contents
are transcribed into note form and t hat rhe inrerview can be stopped ar any time ar
the inrer\'iewee's request. If sensitive questions are asked, or the interviewee wants ro
answer a question without being recorded, explain that the recorder can be turned off
for a period of rime during che incerview.
Instead of u~ing a traditional recorder that calls anenrion to its presence, an incer-
viewer can use built-in audio (or even video) recording features on a notebook or
mobile device. Also, as pointed our in Section 4.9, an interviewer can use powerful
informarion management software, such as Microsoft OneNote, co record the meeting,
store rhe resulrs, and create a searchable file for easy access. lrrespecrive of che mecha-
nism used co record che meeting, all participants should be aware that what they say is
being recorded.
Wherher or not rhe meeting is recorded, listen carefully to the interviewee's
responses so good follow-up questions can be asked. Otherwise, a second visir
might be needed to ask the questions missed the firsr rime. Also, remember that each
recorded interview takes twice the amount of ri1111e, because the analyst must listen to
or view the recorded meeting again after conducting the interview itself.
After the meeting, a memo should be sent to the interviewee, expressing appreci-
ation for his or her time and cooperation. In the memo, note the dare, rime, location,
purpose of rhe interview, and rhe main points discussed, so the interviewee has a writ-
ten summary and can offer additions or corrections.
4.5.2 Observation
The observation of current operating procedures is another fact-finding technique.
Seeing the system in action provides additional perspective and a better understand-
ing of system procedures. Personal observation also allows the analyst ro verify state-
ments made in interviews and deterounc whether procedures really operate as they
arc described. Through observacion, it might be discovered that neither the system
documentation nor rhe interview statements are accurate.
Personal observation also can pro vide important advantages as the development
process continues. For example, recommendations often arc better accepted when
they arc based on personal observation of actual operations. Observation also can
provide the know ledge needed to rest or install future changes and can help build
relationships with the users who will work wirh the new system.
Plan observations in advance by preparing a checklist of specific casks to observe
and qucscions co ask. Consider the following issues when preparing che lisc:
• Ask sufficient questions co ensure a complete understanding of rhe present sys-
tem operation. A primary goal is to idenrify the methods of handling sicuarions
that arc not covered by standard operating procedures. For example, what
happens in a payroll system if an employee loses a rime card? \Vhar is rhe pro-
cedure if an employee starts a shift 10 minutes late but then works 20 minutes
overtime? Often, rhe rules for exceptions such as these arc nor written or for-
malized; therefore, try ro document any procedures for handling exceptions.
• Observe all rhe steps in a transaccion a nd note the docu1nents, inputs, oucpurs,
and processes involved.
• Examine each form, record, and report. Determine the purpose each item of
information serves.
• Consider each user who works with the system and the following questions:
What informa tion does tbat person receive from other people? Wh:ir informa-
tion does this person generate? How is the information communicated? How
often do interruptions occur? How much downtime occur)? I low much sup-
port does the user require, and who provides it?
• Talk ro the people who receive current reports to sec whether the reporrs arc
complete, timely, accurate, and in a useful form. Ask whether information can
be eliminated or improved and whether people would like to receive additional
information.
As people are observed at work, as s hown in Figure 4-11, consider a factor called
the Hawthorne Effect. The name comes from a well-known study performed in the
Hawthorne plane of rhe Western Electric Company in the 1920s. The purpose of the
study was co determine how various changes in the work environment would affect
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 4 111.,.. .................,.t11ru
~- )U,
..,...,.......,..~
- Woip-M ._..,..
..
- ·~• -fllllie<'f •,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,.. ..,. - ~-- - t fta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-.. • ~-" .....- ""'*"....,.._...,.. ..
I'
employee productivity. The surprising result was that productivity improved during
observation whether the conditions were made better or worse. Researchers con-
cluded that producriviry seemed to improve whenever the workers knew they were
being obsen·ed.
FIGURE 4-1 1 The Hawthorne swdy suggested !hat worker productivity improves during observaaon. Always
consider the Hawthorne Effect when observing the operation of an existing synem.
.....
Although some recent srudies have raised questions about the original findings, be
aware that observation can and does have an effect on normal operations. With this
in mind, always give advance notice ro the supervisor in that area. In some situations,
it might be helpful to explain the purpose of the visit to the people being observed.
--··-·--
,,_
I_ . . . . . . . . . . . .,.., . . . . _ . . . . . . . . _ _
·-
how to return the form.
What about the is ue of anonymity? Should people
be asked to sign the questionnaire, or is tr bener to allow
anonymous responses? The answer depend~ on two ques-
.....
a.0.,. ............ - -.........l
tions. First, does an analyst really need ro know who the
respondents arc in order to march or correlate informa-
--·
... ..
•••,.
tio n? For example, it might be important to know what
percentage of users need a certain software feature, but
··-
--- specific usernames might not be relevant. Second, docs
---
. . . . . . . . . . ,.. . . _ _ _ .....,..l
---
the questionnaire include any sensitive or controversial
---
..............................,......
.. ..,,.. lUOOltT'IOMI
topics? Many people do not want to be identified when
answering a question s uch as " H ow well has yo ur super-
visor explained the system to you?" In such cases, a nony-
mous res ponses might provide better information.
Wben designing a questionnaire, the most import-
--
a. ......................... .,...,............, _ _ _ _ _ ,..
--
_....,,, __ .._IN............. ant rule of all is to make sure that the questions collect
rhe right data in a form that can be used to further the
fact-finding effort. Herc arc some additional ideas to keep
in mind ·when designing the questionnaire:
-
FIGURE '4-12 Online version of a sample questionnaire.
• Keep the questioonaLre brief and uscr-fricndlr.
• Provide clear instructions chat will answer all antici-
Does it follow the suggested guidelines! pated questions.
• Arrange the questions in a logical order, going from
simple to more complex topics.
• Phrase questions to avoid misunderstandings; use simple terms and wording.
• Try not to lead the response or use questions that give clues to expected
answers.
• Limir the use of open-ended questions that are difficulr to tabulate.
• Limit the use of questions that can raise concern~ about job security or other
negative issues.
• Include a secrion at the end of the questionnaire for general comments.
• Test the questionnaire whenever possible on a small test group before fina lizing
ir and distributing ro a large grou p.
A questionnaire can be a traditional paper form, or it can be created in a fill-in form ,
and the data can be collected on the internet or a company intrnnct. Before publish-
ing the form, protect ir so users can fill it in but cannot change the layou t or design.
O nline survey websites, such as SurveyMonkey and Google Forms, ca n also be used
to create and manage questionnaires .
(....,..... J:gl( . . . . . I_,.. 41 11.,.. ~- )U, Woip-M ._..,.. - ·~• -fllllie<'f •,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,.. ..,. - ~---t fta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-.. • ~-".....-""'*"....,.._...,.. ..
-
r..a...w...,..._...., .. ..,...,.......,..~.................,.t11ru .. __.~~c.....,..~
I'
4.5.5 Brainstorming
Another popular method of obtaining input is called brainstorming, which refers to
a small group disCu$s1on of a specific problem, opporruniry, or issue. Thi'! technique
encourages new ideas, allows team parricipation, and enables participants to build
on each other's inputs and thoughts. Brainstorming can be structured or unstruc-
tured. In struccured brain\torming, each participant speaks when it is his or her turn
or passes. In un \ tructured brainstorming, anyone can speak ac any rime. At some
point, the resulrs are recorded and made pare of che fact-finding documenratton
process.
4.5.6 Sampling
When studying an information system, examples of actual documents should be col-
lected using a process called sampling. The samples might include records, reports,
operational logs, data entry documents, complaint summaries, wo rk requests, and
various types of forms. Sampling techniques include systematic sampling, stratified
sampling, and random sampling.
Suppose there is a list of 200 cusromers who complained abour errors in their
statements, and a representative sample of 20 customers will be reviewed. A
systematic !>ample would select every cench customer for review. To ensure that the
sample is balanced geographically, however, a stratified sample could be used to select
five customers from each of the four postal codes. Anocher example of stratified
sampling is to select a certain percencage of rransaccions from each postal code, rather
than a fixed number. Finally, a random sample selects any 20 customers.
The main objective of a sample is co ensure that ir represents the overall popu-
larion accurately. If inventory transactions are being analy7ed, for example, select
a sample of tran actions char is typical of actual inventory operations and docs not
include unusual or unrelated examples. For insrance, if a company performs special
processing on the last business day of rhe month, char day is not a good time to sam-
ple typical daily operations. To be useful, a sample must be large enough to provide a
fair reprcsenrarion of the overall data.
Sampling should also be considered when using interviews or questionnaires.
Rather than interviewing everyone or sending a quesrionna1re to the entire group, a
sample of participants can be used. Sound sampling techniques muse be used to reflect
the overall population and obtain a n accurate picture.
4.S.7 Research
Research is another important fact-finding technique. Research can include the Inter-
net, IT magazines, and books to obtain background information, technical material,
and news about industry trends and developments. In addition, attending professional
meetings, seminars, and discussions with other IT professionals can be very helpful in
problem solving.
The Internet is rin extremely valuable resource. Using the Internet, the analyst can
access information from federal and state governments as well as from publishers,
universities, and libraries around the world. Online forums and newsgroups arc good
resources for exchanging information with other professionals, seeking answers co
questions, and monitoring discussions that are of mutual interest.
All major hardware and software vendors maintain websites with informa-
tion abour product<> and services offered by the company. There arc also websites
mainrained by publishers and independent firms that provide links co hundreds of
hardware and software vendors. Examples of popular websites for IT professionals
include Ars Technica, CNET, Info World, TechCrunch, and the Wlal/ Street journal's
Technology pages (shown in Figure 4-13).
-~--- . . - . .. ..
--·
_,.
'VSJ lICll
- ·---
- -- "" ...................... .,_,. w.•• .......... _._ -a.
_
---
......_...._
..... ~...._ .........<-. -
---
......... __ - "'
.....,._...,._
,._
---
~-·
.,,..._.
--~
........
__.
_.,._ •-
1- - 1
__
r...J.....~c:.ar...
-- -
..
.......... ... --·· -·-· . ...
,....._.,_,...........
.
~ ..,............. ,_._
.......__........,_ .......................
------·~
!-··!
.......
_...,...
......
...,_~
__.....·-_--........ ....·---
_.................
..._._
---
.......___
-----·........
-.......
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_, .,_.,....,. -~---tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
I'
Research also can involve a visir ro a physical location, called a site \tsit, where the
objective is to observe a system in use at another location. For example, if a firm's
human resources information system is the subject of study, it might be beneficial co
see how another company's system works. Site visirs also are important when con-
sidering the purchase of a sofrware package. If the sofrware vendor suggests possible
sites to vi~it, be aware that such sires might constirute a biased sample. A single site
visit seldom provides crue picrures, so try co visit more than one installation.
Before a site visir, prepare just as for an interview. Contact rhe appropriate man-
ager and explain rhe purpose of the visir. Decide what questions will be asked and
what processes will be observed. During the visir, observe how rhe S)'Stem works and
note any problems or limiracions. Also learn about the support provided by the ven-
dor, the quality of the system documentation, and so on.
Lf agile methodi. are used for requi rements gathering, a variation on interviews
that focuses on features, user ~tories, scenarios, a nd storyboards is used. A feature
(sometime~ called an epic) is a simple, bigh-level statement of a requirement. A
feature has a descriptive name, an estimate of its size in terms of derived requi remenrs
or user stories, and a priority. Featu res are typically provided by the stakeholders
through initial interviews with rhe systems analyst.
User stories represent more fine-grai ned requirements. Taken together, a set of user
stories forms a fearure. A user story also has a descriptive name, along with a i.im-
ple sentence of the form "As a Iuser role], I want [action] so that [goal I." User roles,
actions, and goals arc terms that represent a category of stakeholder, a particular
effect, and an outcome, respectively. User stories also include an optional condition
of satisfaction, wh ich can be used as a guide to determine whether or not the require-
ment was satisfied by the produce. A user story is: 1neanr to be succinct and is often
drawn on a 3" x 5" index card (or the software equivalent).
A scenario is a real-world example of how users will interact with the system. A
scenario describes a parricular ser of seeps raken or events that wiU occur while the
r..,,...JID)r-..1-.. 4•11_.. •...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Chapter 4 Requirements Engineering
system is used for a specific function. Ir is used to refine rhe system requirements ro
better reflect actual usage of the sysrem.
A storyboard is a simple graphic organi7..er rhar helps systems analysts visuali7..C rhe
srarus of a project. A sror)•board can be as rudimentary as a wall with <;rick)' norcs.
There arc also many software roots that enhance storyboards while still maintaining
their essential feel.
Because agile methods are iterative in nature, requirements are gathered and suc-
cessively refined. They begin as features, which are then spllC mro smaller user stories,
which in rurn are refined inro scenarios. Agile methods are particularly well suited ro
pro1ccrs where rhe requirements are expected to change frequently.
4. 7 REPRESENTING REQUIREMENTS
Once requirements have been gathered, they must be recorded. Keeping accurate
records of inrerviews, faces, ideas, and observations is essential to s uccessful systems
development. As information is garhered, the importance of a sing le item can be
overlooked or complex system derails can be forgotten. The abili ty ro manage infor-
1narion is rhe mark of a successful systems analyst and an important skill for all .IT
professionals. The basic rule is to write it down. Analysts shou ld document their work
according to the following principles:
• Record information as soon as it is obtained.
• Use the simple'lt recording method possible.
• Record findings in such a way rhat someone else can understand them.
• Organize documenrarion so related material is located easily.
There arc several techniques used to do this, ranging from an unordered collection of
sentences to a structured database of formal models. Whatever representation is cho-
sen, proper!)' managing the requirements over rhe lifetime of a project is a key to irs
success.
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- t fta111&....-.~~ ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
I'
You are the lead systems analyst on a large project.A big part of your responsibilities is to han-
dle the system requirements. Extensive interviews have taken place, and you have written down
your notes using a digital pen system.This system recognizes letters and words while you write
on paper and srores them in digital format on your computer. In this way. the requirements are
written in unstructured nawral language but stored digitally, which means they can be searched
and processed. Do you think it would be worthwhile to edit the transcription and insert tigs to
delineate key terms in the requirements, so that a CASE tool could better analyze them/There's
a lot of effort required to do the manual tagging. but the rewards could be better requirements.
How would you perform the tradeoff analysis!
4.7.2 Diagrams
~lany people are more visual rhan texrual. For them, diagrams are an excellent choice
co repre!.en r system requirements. Diagrams help users, managers, and IT profession-
als understand the design of a system. Diagramming involves graphical methods and
nontechnical language that represent the system at various stages of development.
During requiremen ts engineering, the analyst can use various cools co describe busi-
ness processes, requirements, and user interaction with the system.
Systems analysts use diagram1ning and fact-finding interactively-first they build
fact-finding resu lts into diagra ms, then they study the diagrams to determine whether
additiona l face-finding is needed. To help chem understa nd system requirements,
ana lysts use fu nctional decomposition diagrams, business process diagrams, a nd dara
flow diagrams. Any of these diagrams can be created wi th CASE cools or sta nd-alone
drawi ng tools if desired.
r..,,...JID)r-..1-.. 4•11_.. •...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Chapter 4 Requirements Engineering
FIGURE 4- 15 This Visible Analyse FDD shows a library system with five top-level functJons. The Library
Operadons function includes cwo additional levels of processes and sub-processes.
-..
E ..
a Pfoce11 Order - t Prepare 81111no H Create Sh1.
Oata
pp1ng busi11ess processes, such as handling an
-..
ti;
c
~
~
airline reservation, filling a product order,
or updating a customer account. During
-..
;;;
Q.
w
!!
requirements engineering, analysts ofren
create diagrams that use a standard
syntax called business process modeling
~
a si ' Obtain Crtidil I-+ " Validate Credit H
Assign
Customer notation (BJ>MN). BPMN includes
I
3 '- 011• S tatus Number
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
I'
DATA FLOW DIAGRAMS: \Xforking from an FDD, analysts can creace daca now
diagrams (DFOs) co show how che syscem scores, processes, and cransforms daca.
The DFD in Figure 4- 17 describes adding and removing books, which is a function
shown in the Librar)' Managemenc diagram in Figure 4-15. ore char the cwo boxes
in che DFD repre'lenc processes, each with various inpucs and outputs. Additional
le,·els of informacion and decail are depicted in o rher, related DFDs. Daca and process
modeling is deM:rihed in derail in Chapter 5 .
.. Add----
Boob
---2..!.. -
Bool<Tllo
~
Ir'"':' - -
.
.
AWlOl's
A61'S"'
~ Boob Updaled AIA!"Ol'S
,.
Doob
' .
'. Boolcs
••
"
FIGURE 4-1 7 This Visible Amlyst DFD shows how books are added and
removed 1n a library system.
'
4 .7 .3 M odels
Models provide a more formal representation of system requirements. They arc o ften
depicted as graphical in nature, so they share some of the cbaractcriscics of rhc tech-
niques described in Secrion 4.7.2. But models have an additional feature: The under-
lying language has semantics, which means the diagram has a significance that can be
aucomatically analyzed by a CASE rool.
The Unified Modeling Language (UML) is perhaps rhe most widely used model-
ing technique for visual izing and documenting software sysrems design. UML uses
object-oriented design concepts, but it is independent of any specific programming
language and can be used ro describe business processes and requirements generally.
SysML is a dialecr of UML and has become the sitandard for Model-Based Sysrems
Engineering (M BSE) applications.
UJ\ll L provides various graphical cools, such as use case diagrams and sequence
diagrams. During requirements engineering, a systems analyse can utilize the
UJ\ll L co represcnc the informacion syscem from a user's viewpoinr. Use case dia-
!,'Tams, sequence diagrams, and other U~1L concepcs are discussed in mo re derail in
C haprer 6, along with other object-orienced analysis conceprs. A brief description of
each technique follows.
Actor: Customer
Description: Describes the credit card validation process
Successful Completion: I. Custo mer clicks the input selector and
enters credit card number and e)(piration date
2. System verifies card
3. System sends autho rization message
Alternative: I. Customer clicks the input selector and
enters credit card number and e)(piration date
2. System rejects card
3. System sends rejection message
Precondition: Customer has selected at least one item and
has proceeded to checko ut area
Postcondition: Credit card information has been validated
Customer can continue with order
Assumptio ns: None
FIGURE 4- 19 This table documents the credit card validaaon use case shown in Figure 4-18.
Registration
System
Student
Advisor
Record
Grades
Registrar
lnstruttor
FIG URE 4-20 This Vislble Analyst use case diagram shows a student records system.
Sou~: •r• I ~ 1 ....1tk pC'f'Tn1 "' 1•om\l'~I~ !)~CoiporatlO'\-
I
I
Enter Card Number I
Authortlation
4.9 TOOLS
All requirements engineering activities can be helped through rhc judicious use of
tools. For example, many softwa re programs a re available co help record and doc-
ument information elicited during the requirements gathering process. This type of
productivity software includes automation, word processing, spreadsheet, database
management, presentation grap hics, and collaboration software programs. Although
Microsoft Office is the best-known set of productivity software programs, ocher ven-
dors offer produces in each of these categories.
A pcr5onal information manager (PIM), such as Microsoft Outlook, includes a
personal calendar, a to-do list with priorities and the capabi lity co check off com-
pleted items, and powerful contact management features. Outlook can manage email
and appointments and supports collaboration and team projects.
Although a PL\il such as Microsoft Outlook can handle day-to-day activities,
tasks, and schedules, it is nor the best wa)' co capture and organize large amounrs of
(....,..... J:gi( . . . . . I_,.. 4111.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
I'
4 Evemote - · . , Ll_;__...J
FIGURE 4-ll Evernole offers a free version of its popular infonnation managemenl software for mon
computing platforms. Including smartphones and on the web.
Sowcc
Using word processing sofrware such as rvlicrosoft Word, the analyst can create
repons, summaries, tables, and forms. In addicion ro standard document prepararion,
the program can help o rga nize a presentation wirb templates, bookmarks, annota-
tions, revision control, and an index. Fill-in forms can also be creared ro conduct sur-
veys and quesrionnaires, as described earlier in this chaprer.
Spreadsheet software, s uch as Microsoft Excel, can help track and manage
numeric dara or financial informarion. fn fact, Excel is one of the most popular ways
of representing requirements in an informal manmer. Graphs and charrs can also be
generarcd thar display rhe darn and show possible parrerns. The statistical functions
in a spreadsheer can be used to tabulate and analyze quesrionnaire data. A graphica l
formar often is used in qua liry conrrol analysis because it highlights problems and
their po s ible causes, and iris effective when presenting results to management. A
common tool for showing rhe disrribution of questionnaire or sampl ing results is a
vertical bar cha re called a histogram. Most spreadsheet programs can create histo-
grams and other charts chac can display the daca collected. Figure 4-23 displays a typ-
ical histogram char might have resulted from rhe questionnaire shown in figure 4- 12.
Database management software allows the analyst co document and organite
fact-finding results such as events, observations, and daca samples. A database pro-
grarn such as Microsoft Access can be used to manage the details of a complex proj-
ect, create queries to retrieve specific informarion, and generate custom reports.
A B c D E (j
1 Question 2:
2 What percenblge of your time do you spend processing niqulsltlon•?
3
4 C•l!QO'Y Number
Question 2 results le
s < 20% 11
6 20-3t% 21 40 -
1 .o.tit% 36 35
8 60-7t% 2A 30 + - - - - - --1> Jl - - - - ---1
9 80% or mora !I 25 'l l---:::::----1
10 20 +-------a. . ~-'
11 15 .__ _-f.; :1--1 ,,1 --1 .1 - - ---1
12 10 -'--'....,._ _,, ..._ ... . . _ ...
13
14
5 .....
0 ~-.._.-
; --n-~
·
............- .....................- ..
1!> <20% 20- 40- 60- 80% or
16 39% 59% 79% more
11
18
19 4
,. • •1 SheetJ St (11.-u ID •~-======::=======================~·
____. _ __,'
FIGURE 4·ll This histogram displays the results fro m Question 2 In the questionnaire shown
In Figure '4-12.
.,...
•
-- - .._ - --
When it comes co creating diagrams char
represent requirements, Microsoft Visio is a
popular graphic modeling cool char can pro-
duce a wide range of charts and diagrams .
Visio includes a library of templates, stencils,
and shapes. An analyst can use Visio co create
I "
many types of visual models, including business
....
Ii..
'..•
~
processes, flowcharts, network diagrams, orga-
- •I•1 •••
nization charts, and ma ny more. For example,
in Figure 4-24, the :inalyst used drag-and-d rop
shapes to represen r a business process .
For more forma l models of rcqui rcmcnrs,
'1l
e special-purpose tools such as IBM Rational
fJ
.. c: •.]l DOORS are used. These cools faci litate the use
:l·
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 4 111.,.. .................,.t11ru
~- )U,
..,...,.......,..~
- Woip-M ._..,..
..
- ·~• -fllllie<'f •,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,.. ..,. - ~-- - t fta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-.. • ~-" .....- ""'*"....,.._...,.. ..
I'
4.10 Summary 13 7
FIGURE 4-25 IBM DOORS Is a to0I for capturing. analyzing, an d tr.icing system requirements.
ISM C. P r&
Your supervisor manages the corporate office where you work as a systems analyst. Sev-
eral weeks ago, after hearing rumors of employee dissatisfaction, he asked you to create a
survey for all IT employees.After the responses were returned and tabulated. he was dis-
appointed to team that many employees assigned low ratings to morale and management
policies.
This morning he called you into his office and asked whether you could identify the
departments that submitted the lowest ratings. No names were used on the individual
survey forms. However, with a little analysis, you probably could identify the departments
because several questions were department related_
Now you are not sure how to respond.The expectation was that the survey would be
anonymous. Even though no individuals would be identified, would it be ethical to reveal
which departments sent in the low ratings/ Would your supervisor's motives for wanting
this information matter1
4.1 0 SUMMARY
r..,,...JID)r-..1-.. 4•11_.. • ...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Chapter 4 Requirements Engineering
(....,..... J:gi( . . . . . I_,.. 4111.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- t fta111&....-.~~ ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
I'
Key Terms
aaor An external enm> wirh a ~pt.'Cific role. ln a use case model, a<.<ors are u>ed !O model mierac.:tion
w11h 1hc >)\lem.
agile method• ~)>leim deH~lopmem methods !ha1 anempt to de,elop a system incrememally h) build-
mg a series of protOt) pes and constantly adiusang them rouser reqwremeots. Also calltd adapuvt
method>.
brain~tomung A fact-finding technique for gaining information rhrough the use of a small group d1scu~
sion of a specific problem, opporrunir), or issue.
bu\ine<>\ pr<~.,., model (BPMJ A b'l"aphical representation of one or more husine>> prnce~e>.
bu.,inc\\ prcx:c\\ modeling notation ( BP~) A standard set: of >hape> and 'ymbol> used to rtpre~cnc
evcnL,, proc.e"~• and workOow> in compucer-ha,\ed modding cool>.
clo;cd-endcd qucsuoos Queries thm Imm or restrict che range of responses. Used 10 the 1men 1ew pro-
cess when sp«1fic mform.irion or facr verificanon ts desired.
cons1rue1ion phase A ph.1se rhnt focuses on progr,un and applkanon development tasks s1mil.1r to rhe
SDLC.
cuun·cr pha'c A pha\C chat resemble' rhc final ca~ks in che 501 C implementation pha,c, including dam
converoion, te,ring, chnnflcovcr m rhe new •ysrem, and tL~er rraining.
data Oow diagram (DFD) Diaflram rh:u ,how~ how che syscem scores, proces,e•,, and tran,form' data
into u,cful information.
document re•icw A review of b.iselme docurnemauon. A useful fact-finding techuique tllJt helps ,rn .111.1-
lyst underst.ind how the current system rs supposed co work.
eng.igcd lmcmng lne ab1lary ro reall} concenrrare on whar someone as saying and .tvo1d the temptauon
to he.ir "h.1t is e'l.pteted. Alw includes noricmg nonverbal communicanon.
epic In an awlc rro1ccr, a •imple, h1gh-lcvel •caccmcnt of a requirement. Sec feature.
fact-finding The procc•s of pthcring rcquircmenr•. Sec requirement\ elicitation.
feature lo an agile pro1cc1, a sample, high-level staremem of a requirement. See epic.
fill ·in form A template used 10 collect data on the lmemet or a compan) intranet
functional dccornpo\ltion diagram (FOO) A top-down representation of husine'' function\ and pro·
ce..>;e<.. '"'"called a 'truccure chart.
functional requirement A 'taiement of rhe -;en ice, a ..ysrem providei..
H;m 1home Ufcc1 A phenomenon where emptor~ who know chey arc bemg obsef\ ed .ire more
producttvc.
histogram A ~ommon tool for showing rhe d1str1burion of quesrionna1re or sampling results. It take• 1he
form of a vcmcal bar charr.
informal \lructurc An organi73rion based on interpersonal relationships, w hich can develop from prcvi
ou~ work n~~ignmcnr~, physica l rruximiry, unofficial procedures, or per~ona l rclation~hip>.
intcr"icw J\ planned meeting during which i11formario11 is obrnined from onorhcr pcr,011.
join1 applica1io11 dcvclopmcni UAD) A systems development tecb.aique !h.ir uses a rask force of users,
manager>. and IT profc>>tonal~ who work rogether to gather information, dii;cu~> bu;in~> n~cd>, and
define the new S)'Stcm requirements.
lcadtng qucsuons Queries th.11 suggcsr or fovor a particular reply.
non-fun<11onal requirement\ A sratemt'nt of operational sysrcm con~tramt~.
ob~cnauon A facr-fmd1n~ technique where an analrsr sees a system in dctton. Obsen·auon allow' th<'
veraficanon of statements made in interviews.
oix:n·cnded quc\lion~ Quenc> that allow for a range of answers. The)' encourage spontaneous and
umtru~1ured respon!>e> and are u..eful in under..canding a larger proces>.
pcl"Jonal information manager (PIM ) A cool chac helps manage rnsks and schedules. Many handheld
devices also indude tlus luncuon.
pool Tiie merall d1a11ram 1n BPMN.
produ,,,, II) .,.,r''""" Applic:mons wc:h as word proce\~inµ, .,pread_~heec, dat.iba..., manaitemtnt, and
preo,cnranon 11raphic., program'>.
quahf) annbur~ Su non-functional requiremems.
quescionna1rc A document conrainmg a number of srandard questions that can be scnr co many individ-
uals. Also called a survey.
random ,ample A ~elecrion rnken in a random, unplanned manner. For example, a random \ample mighc
be n >ample char 'ele•"ts nny 20 cusromers.
rn1111.:-ur-re,pon'c quc\UOn> Closed-ended quescions that a>k the p<!r,un to evaluate >omctliing hy pm-
' id11111 limited an\wtr> to specific re,ponses or 011 a numeric >ca lc.
rapid .1pphca11on de,·clopment (RAD) A ream-based technique that speeds up mformA non sysrems devel-
opmcn1 .ind produces a funcrioniug information system. RAD is simil.1r in concept co JAL) buc goes
furrher by including all phases of che SDLC.
requirement~ definition~ A description of che sysrem requirements from the user's poinc of view.
scalab1l11~ A characrerisnc of a system, 101plying chat the S)'Slem can be expanded, modified, or down-
sized cas1l) to mecr the rapidly changing needs of a business enrerpnse.
<ccnario< In an agile project, a real-world example of how users w1ll 10tcr.1ct wnh the system.
~rum ;\ popubr rechniquc for agile projecr managemcnr. Derived from a rugby rerm. In Scrum, rc~m
memhe~ play specific roles nnd interact in intense •es•ions.
\Cqucncc dia11rnm /\ UML diagram th3t 'hnws the riming of transaction~ between ohjccn, a' rhey occur
durin!I ~y~tcm execution.
~itc vis11 A mp 10 a physical location to observe a system Ln use at :1nocber location.
~1ra11ficJ ~ample A set memc 1s collected across fwJCtional ure:i>. l-ur example ••1 ct'rr.1111 pcrccnrjge of
trnn~acrion< from every work shift, or five cusromers from cuch of four zip code~. could be a 'tr<uified
'ample.
'toryboard In an agile project, a simple graphic organi1er rhar helps system< ;in.ily~ts vi~ua l iu rhe •mtu'
of a project.
\tru~turcd br.iin\lorming A group discussion where each parricipant speab "hen it i> his or her tum or
pas~'·
~unc) A dcxument conra1n10g a number of standard questioll!i rhat t:J.11 b.: .ent to mJny 111J1v1<lual>.
Also called a que~11onMirc.
swim lane> In .i bu•ine'; pr<><.e<>\ diagram, che overall diagram is called a pool and the des1gna1ed C:U>
tomer area> are c:alled >w1m !:inn.
S)s.\11 A dialect of U/\iL 2, used for representing requiremerus (and other thing;). pmn.inl) m .\IBSL
applications.
system rcqu1Ccment A charac1ens1ic or fe;irure that musr be included in an mformauon S) stem to sans!)
bu~ine~\ requirements and he accc-prable ro users.
'Y\lcma11c \ample A \ample char occur~ ac a predeccrmincd pcriodiciry. For example, every tenth cu<-
comcr record mighr he sclccred a~ a sy~emaric sample for review.
wtal co-r of o"ncnh1p (TCO) A numhcr used in assessing cosrs, which include' ongoini; 'upporc and
mamcenance co\t' ,1, well 3> acquisinon cosr•.
uaceabi!Jty ·1be Jbtht)' co follow a reqtmemellt backward to JtS ongms and forw.1rd through the SDLC
to link design documcnrs, code fragments, .rnd 1esr artifacrs.
Unified Modeling l anguagc (UM I ) A widely used method of visualizing and documenunp. softw,1rc sys-
tems design. UML uses objccc-oricntcd design concepts. bur iris iudcpcndcnr of any specific program-
ming language and c.in be used 10 describe business processes and requiremcms generally.
un\lructurcd brain,turmini: A i:mup di~ussion where any parricipanr can speak at any time.
u_\e ca\c diagram A vi,ual repre~enrntion chac represenrs the inreracrion between u'er~ and the informa-
ti<>n 'Ystem in lJM L.
user d~ign ph.ise In tht> phase, users inter.1c1 with systems 3Jl:tlyscs and develop models and protott~
thdt represent all S)srtm processes, ourpurs, and inputs.
user stories In Jn agile pro1ecr, a ser of more refined requtremenrs derived from features.
142 Exercises
Exercises
Questions
I. \'(lhar is a srstem requiremenr and what are the three challenges it presents co the
S) stems analyst?
2. Is the requirement "The system shall respond within 2 seconds" a functional or
non-functional requirement?
3. What is scrum?
4. \'(lhar five questions typically are used in fact-finding?
5. Provide rhree examples each of closed-ended, open-ended, and range-of-response
questions.
6. Explain how the observation fact-finding technique works, including the
I la wthorne Effect.
7. Wh:it is rhe rel:irionship berween user stories and fcarures in :igi le projecrs?
8. What is an FDD and why would you use o ne?
9. What is the d ifference between validation and verificat ion of sysrem
requirement~?
10. Why is rraceabiliry important in tool support for requirements engineering?
Discussion Topics
I. JAD requires strong interpersonal and communicacion skills on the part of the
sysrems analyst. Are those skills different from che ones that an analy~r needs
when conducting one-to-one inten•iews? Explain your answer.
2. Agile methods use rapid development cycles to iteratively produce running ver-
sions of the system. How would these shorrer cycles affect the abiliry of the ana-
lyst ro manage sysrem requirements?
3. A group meeting sometimes is suggesred as a useful compromise bcrwccn mrer-
views and questionnaires. In a group meeting, a systems analysr meets with a
number of users at one time. Discuss the advantages and disadvantages of group
mccrin~.
4. Research the Internet, magazines, or textbooks co find examples of visual aids,
including a bar chart, pie chan, line chart, table, diagram, and bulleted lisr. How
effective was each example? Find at least one example char you could improve.
Explain your choice.
5. Traceability is an important requirements atcribute. lt'!> one of the things that
should be checked when performing V&V of the syMem requi rements. Describe
how you would manually check traceability for an existing system and list a few
features of a CASE tool rhat you think wou ld help you with the task.
Projects
I. Use the requiremcncs gathering techniques of document review, observ:ition,
brainstorming, sampling, and research co capture the requirements of a typical
elevator control system. Use narura l language and the UML to represent the siru-
auon where people on different floors push the ''Up" button at the same time.
2. Prepare a presentation summarizing JAD and RAD. Explain how t hey differ
from traditional facr-finding merhods. What arc the m:iin advantages of team-
based methods?
r..,,...JID)r-..1-.. 4•11_.. • ...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
I'
Exercises 143
r..,,...JID)r-..1-.. 4• 11_.. • ...__. ~....... .,...~ • ........._ . ....._.,.,.. o-... ..,._.,,.,.. _ ..,.~ ,........., ................. .._... .., .,. ..,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Chapter S Data and Process Modeling
Chapter S is the second of four chapters in the sys- The chapter includes three "Case in Point" dis-
tems analysis phase of the SDLC. This chapter discusses cussion questions to help contextualize the concepts
data and process modeling techniques that analysts use described in the text. The "Question of Ethics" raises
to show how the system transforms data into useful the issue of how to respond to subtle but insistent
information. Data and process modeling involves three requests by an IT manager In a systems analyst's new
main items: data flow diagrams, a data dictionary, and organization for proprietary information related to
process descriptions.The deliverable, or end produce, the business processes used by the analyst's previous
of data and process modeling Is a logical model that will employer. which is a competitor of the analyst's current
support business operations and meet user needs. company.
r..,,...JID)r-..1-.. 4•11_.. •...__. ~....... .,...~ • ........._ . ....._.,.,.. o-... ..,._.,,.,.. _ ..,.~ ,........., ................. .._... .., .,. ..,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Phase 2 Systems Analysis
Chaprer 6 (Object Modeli ng), and enriry-relationship diagrams, which arc described
in Chapter 9 (Dara Design).
During the sysrems analysis phase of che SDLC, the systems anal)'St creates a
visual model of the information system using a set of O FDs. In his seminal book The
Visual Display of Quantitative 111(ormatio11, aurhor and renowned academic Edward
Tufte provides guidance on crearing effecrive diagrams to concisely convey com-
plex 111formation. A DFD is an example of this rype of visual e'<planation of system
behavior.
A DFD shows how data moves th rough an inforrnanon system but does not show
program logic o r processing steps. A ser of DFDs provides a logical model that shows
what the system does, nor how ir does it. T hac discinction is important because focus-
ing on implementation issues at this point would restrict the search for the most effec-
tive system design.
DFDs use fou r basic symbols tha t represent processes, da ta flows, data stores, a nd
entities. Several different versions o f DFD symbols exist, but they a ll serve t he same
pu rpose. DFD examples in this rexr use the Gane and Sarson symbol set. Another
popu lar symbol set is the Yourdon sym bol set. Figure 5- 1 shows examples of both
version'>. In this text, symbols are referenced using all capital letters for the symbol
name.
APPLY
Process
APPLY PAYMENT
PAYMENT
FIGURE S- 1 Data flow diagram symbols, symbol names, and examples of the Gane and
Sarson and Yourdon symbol sets.
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- t fta111&....-.~~ ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
I'
FIGURE 5·2 A router acts like a block box for network data. Cables
carry data In and out, but internal operations are hidden inside the case.
""' .. I'
flow could consist of a single dara item (such as a student ID number), or it could
include a set of data (such as a class roster with student ID numbers, names, and
registration dates for a specific class). Although che DFD does not show the detailed
contents of a data flow, that information is included in the darn dictionary, which is
de'ICribcd later in this chapter.
The symbol for a data flow is a line with a single or double arrowhead. The data
flow name appears above, below, or alongside the line. A data flow name consists
of a singular noun and an adjective, if needed. Examples of dara flow names are
DEPOSIT, INVOICE PAYMENT, STUDENT GRADE, ORDER, and COMMIS-
SION. Exceptions co the singular name rule are data flow names, such as GRADING
PARAMETERS, where a singular name could mislead the analyst into thinking a sin-
gle parameter or single icem of daca exists.
Figure 5-3 shows correct examples of data flow and process symbol
connections. Because a process changes rbe data's content or form, ar least one
data flow must enter and one data flow must exit each process symbol, as they
do in the CREATE rNVO ICE process. A process symbol can have more than one
outgoing data flow, as shown 111 t be GRADE STUDENT WORK process, or more
than one incomi ng data flow, as shown in the CALCULATE GROSS PAY process.
A process also can connect to any o t he r symbol, including another process
symbo l, as shown by the connection benveen VERIFY ORDER and ASSEMBLE
ORDER in Figure 5-3. A data flow, therefore, must have a process symbol on at
least one end.
GRADED WORK
SUBMITIED WORK GRADE
STUDENT
WORK STUDENT GRADE
l-
o
w
a:
a:
0 HOURS WORKED
0 CALCULATE GROSS PAY
GROSS
PAY RATE PAY
ACCEPTED INVENTORY
ORDER VERIFY ORDER ASSEMBLE CHANGE
ORDER ORDER
FIGURE S-3 Examples of correct combinations or data flow and process symbols.
(....,..... J:gi( . . . . . I_,.. 4111.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
I'
Figure 5-4 shows three data Aow and process combinations that must be avoided:
• Spontaneous generatio n. The APPLY INSURANCE PREMIUM process, for
instance, produces output but has no input data flow. Because it has no input,
the proce s is called a spontaneous generation process.
• Black hole. CALCULATE GROSS PAY IS called a black hole process, which is a
proce&s that has input bur produces no output.
• Gray hole. A gray hole is a process that has ar least one input and one ourpur,
but the input obviously is insufficient to generate rhe output shown. For exam-
ple, a date of birth input is nor sufficient ro produce a final grade output in the
CALCULATE GRADE process.
Spontaneous generation, black holes, a nd gray holes are impossible logically in a
DFD because a process must act on input, shown by an incoming data flow, and pro-
duce output, represented by an outgoing data flow.
A data store must be connected to a process with a data flow. Figure 5-5 illust rates
typical examples of data stores. Since data scores represent data storage for use by
another process in the furure, in each case, che data store has ac least one incoming
and one outgoing data flow and is connected to a process symbol wich a data flow.
FIGU RE 5-S Examples of correct use of dat:a ttore symbols in a dat:a flow diairam.
Violations of the rule that a data store must have at least one mcoming and one
outgoing data flow are shown in Figure 5-6. In che first example, rwo dara stores are
connected mcorrectly because no process 1s between them. Also, COURSES has no
incoming data flow and STUDENTS has no outgoing data flow. In the second and
rhird examples, rhe da ta stores lack either an outgoing or incoming data flow.
POST BOOK
1- PAYMENT FLIGHT
COURSES
u I
w
a:
a:
0 CLASS CUSTOMER FLIGHT
u LIST PAYMENT REOU EST
z
DAILY
STUDENTS PASSENGERS
I
PAYMENTS I I
FIGU RE S-6 Examples of incorrect use of data store symbols in a data flow diagram.Two data
stores cannot be connected by a data flow without an intervening process. and each data store
should have an ouigoing and incoming data flow.
(....,..... J:gi( . . . . . I_,.. 41 11.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- t fta111&....-.~~ ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
I'
There is an exception to the requirement that a data store must have at least one
incoming and one outgoing data Aow. In some siruarions, a data store has no input
data Aow because it contains fixed reference data that is nor updated b)• the system.
For example, consider a data store called TAX TABLE, which contains withholding
ta-.: data that a company downloads from the Internal Re\•enue Service. When the com-
pany runs its payroll, the CALCULATE \XflTH HOLDI G process accesses data from
this data store. On a DFD, this would be represented as a one-way outgomg data Aow
from rhe TAX TABLE data score into the CALCULAT E WITHHOLD Ii G process.
LJ LJ Process to Process
./
(....,..... J:gi( . . . . . I_,.. 41 11.,.. ~- )U, -Woip-M ._..,.. - ·~•-fllllie<'f •,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. - ~---tfta111&....-.~~ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
I'
When drawing a context diagram and other DFDs, these guidelines should be
followed:
• Draw the context diagram so it firs on one page.
• Use the name of the infonnarion system as the process name in the context dia-
gram. For example, the process name in Figure 5-10 1s GRAD! G YSTEM.
, ore that rhe process name is the same as t he system name. This is because
the conte>.t diagram shows rhe entire information system as if it were a single
proce!.s. For processes in lower-level DFDs, use a verb followed by a de criptl\e
noun, such as ESTABLISH GRADEBOOK, ASSIG FINAL GRADE, or PRO-
DUCE GRADE REPORT.
• Use unique names within each ser of symbols. For instance, the diagram in
Figure 5-10 shows on ly one enrity named STUDENT and only one data flow
named FINAL GRADE. Whenever the entity STUDENT appears on any other
DFD in the grading S)'Stem, ir indicares that it is the same entity. Whenever the
FINAL GRADE data Aow appea rs, it indicates that ir is rhc same dara flow.
The naming convention also applies to data stores.
• Do not cross lines. One way to achieve that goal is to rest rict t he number of
symbols in any DFD. On lower-level diagrams with multiple processes, there
should not be more than nine process symbols. Including more than nine sym-
bols usually is a signa l that rhe diagram is too complex and that the ana lysis
should be reconsidered. Another way to avoid crossing lines is to duplicate an
entity or a data store. When duplicating a symbol on a diagram, make sure
to document rhc duplicarion to avoid possible confusion. A special notation,
such as an asterisk, nexr to rhe symbol name and inside rhe duplicated symbols
signifies that they are duplicared on the diagram.
FINAL SUBMITTED
GRADE WORK
STUDENT
RECORDS STUDENT
SYSTEM
o...
CLASS ...... GRADED
ROSTER ~ WORK
GRADING
process o
represents lhe .
SYSTEM
' unique reference
number for
entire gred1ng sys1em
each process
GRADING '
PARAMETERS GRADE REPORT
INSTRUCTOR
• Provide a unique name and reference nlLmber for each process. Because it is the
highesr-levcl DFD, the contexr diagram concains process 0, which repre encs
the entire infonnacion sysrem, bur does not show the incernal workings. To
de~cribe the next level of detail ins ide process 0, create a DFD named diagram 0,
which will reveal additional processes thar must be named and numbered. As
lower-level DFDs are created, assign unique names and reference numbers to
all processes, until che logical model is completed.
• Obtain as much user input and feedback as possible. TI1e main objective is to ensure
that the model is accurate, is easy co understand, and meets the needs of its users.
The first srep in constructing a set of DFDs is co draw a context diagram. A context
diagram is a rop-level view of an information system that shows the sysrem's boundaries
and scope. To draw a context diagram, stare by placing a single process symbol in rhe
center of the page. Tbe symbol repres·ents the entire information system, and ir is identi-
fied as process 0 (the numeral zero, and nor tbe letter 0). Then place the S)•Stcm entiries
around the perimeter of the page and use data flows to connect the enriries to the cen-
tral process. Data stores are not shown in the concext diagram because they arc con-
tained within the system and remain hidden until more detailed diagrams are created.
To determine which entities and data flows to place in the context diagram, begin
by reviewing the system requirements to identify a U external data sources and desti·
nations. During that process, identify the entities, the name and content of rhe data
flows, and the direcrion of the data flows. If that is done carefully, and rhe job of
fact-finding was done well in the previous stage, drawing the context diagram should
be relatively easy. !'\ow review the following context diagram examples.
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
I'
ORDER
CUSTOMER WAREHOUSE
-
ORDER
PICKING
UST
REJECT
NOTICE
INVOICE 0
COMPLETED
PAYMENT ORDER
ORDER
SYSTEM
CASH
BANK RECEIPTS
COMMISSION DEPOSIT ENTRY
SALES ACCOUNTING
BANK
REP
The context diagram for the order system appears more complex than the grading
sy~cem becau1.e tt has two more entities and three more data flows. What makes one
~y~tcm more complex than another is the number of components, the number of levels,
and the degree of interaction among irs processes, entities, data stores, and data flows.
In the previous step, it was explained how a context diagram provides the most
general view of an information S)'Stem and contains a single process symbol, which is
like a black box. To show rhe derail inside the black box, a DFD diagram 0 is created.
Diagram 0 (the numeral zero, and not che letter 0 ) provides an overview of all the
components tha t interact to form the overall system. lt zooms in on the system and
shows major internal processes, dara flows, and data scores. Diagram 0 also repeats
the entities and data flows rhar appear in the context diagram. When the context dia-
gram is expanded into DFD diagram 0, all the connections that flow into and out of
process 0 must he retained.
FINAL SUBMITTED
STUDENT G RADE WORK
RECORDS STUDENT
SYSTEM
0
CLASS GRADED
ROSTER WORK
GRADING
SYSTEM
GRADING • GRADE
PARAMETERS REPORT
INSTRUCTOR
2 3
STUDENT
STUDENT
ASSIGN GRADE GRADE
RECORDS
FINAL STUDENT
SYSTEM
GRADE WORK
FINAL
CLASS GRADE GRADING
SUBMITTED GRAOED
ROSTER DETAIL
WORK WORK
1
CLASS
GRADEBOOK STUDENT
ESTABLISH 01 GRADEBOOK
GRADEBOOK I
CLASS
GRADING DETAIL
PARAMETERS
4
GRADE PRODUCE
REPORT GRADE
INSTRUCTOR
REPORT
(....,..... J:gi( . . . . . I_,.. 41 11.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f •,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~---tfta111&....-.~~ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
I'
EXAMPLE: DIAGRAM 0 DFD FORAN ORDER SYSTEM: Figure 5-13 is the diagram
0 for an order system. Process 0 o n the order system's context diagram is exploded to
reveal three processes (FILL ORDER, CREATE INVOICE, and APPLY PAYMENT},
one data store (ACCOUNTS RECEIVABLE), two additional data flows (INVOICE
DETAIL and PAYMENT DETAIL), a nd one diverging data Aow (lNVOICE).
The following walk-through explains the DFD shown in Figure 5- 13:
L A CUSTOMER submits an ORDER. Depending on the processing logic, che
FILL ORDER process either sends an ORDER REJECT NOTlCE back to rhc
customer or sends a PICKING LIST to the WAREHOUSE.
1
ORDER PICKING
UST
FILL
ORDER
ORDER
REJECT
NOTICE
CUSTOMER
WAREHOUSE
2
COMPLETED
ORDER
CREATE
INVOICE
INVOICE
DI ACCOUNTS
PAYMENT
RECEIVABLE
DETAIL
INVOICE
DETAIL 3
PAYMENT
APPLY
PAYMENT
SALES ACCOUNTING
BANK
DEPT
This set of lower-level DFDs is based on the order system. To creace lower-level diagrams,
leveling and balancing techniques must be used. Leveling is rhe process of drawing a
series of increasingly detailed diagrams, until all functional primicives are identified.
(....,..... J:gi( . . . . . I_,.. 41 11.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
I'
Balancing mainrains consistency among a set of DFDs by ensuring that input and output
dam flows align properly. Leveling and balancing are described in more derail in the fol-
lowing sections.
CUSTOMER
ORDER
ORDER REJECT
NOTICE
1.1 I2
CREDIT
PREPARE HISTORY
VERIFY REJECT
ORDER REJECTED NOTICE
PRODUCT ORDER
DETAIL CREDIT
STATUS
I
ACCEPTED
ORDER D2 CUSTOMERS
I
1.3
PICKING PICKING
DETAIL LIST
D3 PRODUCTS ASSEMBLE WAREHOUSE
ORDER
INVENTORY
CHANGE
FIGURE S- 14 Diigram I OFD shows details of the FILL ORDER process in the order system.
As Figure 5-14 shows, all processes are numbered using a decimal notation
consisting of the parent's reference number, a decimal point, and a sequence number
within the new diagram. In Figure 5-14, the parent process of diagram I 1 process I, so
the proces cs in diagram 1 have reference numbers of 1.1, 1.2, and I. 3. If process 1.3,
ASSE~I BLE ORDER, is decomposed further, then it would appear in diagram 1.3 and
the processe!> in diagram 1.3 would be numbered as 1.3.1, 1.3.2, I. 3.3, and so on.
This numbering technique makes it easy to integrate and idenrify all DFDs.
\'Qhen Figure 5- 13 and Figure 5-14 are compared, it is apparent that Figure 5-14
(the exploded FILL ORDER process) shows two data stores (CUSTOMER and
PRODUCTS) that do nor appear on Figure 5-13, which is rhe parent DFD. Why not?
Tiie answer is based on a simple rule: When drawing DFDs, a data store is shown
on ly when rwo or more processes use that data store. The CUSTOMER and PROD-
UCTS data stores were internal to rbe FILL ORDER process, so the analyst did not
show chem on diagram 0, which is the parent. When the FILL ORDER process is
exploded into a diagram 1 DFD, however, three processes ( l. J, 1.2, and 1.3) interact-
ing with the two data stores are now shown.
Now compare Figure 5-14 and Figure 5-15. Note that Figure 5-15 shows the same
data flows as Figure 5-14 but does not sbow tbe CUSTOMER a nd WAREH OUSE
entities. Analysts often use this technique to simplify a DFD and reduce unnecessary
cluner. Because the missing symbols appear on the parent DFD, that diagram can be
used to identify rhc source or destination of rhe data flows.
•
ORDER
ORDER
REJECT
NOTICE
1 1 1.2
CREDIT
PREPARE
HISTORY
VERIFY REJECT
ORDER REJECTED NOTICE
ORDER
PRODUCT
DETAIL CREDIT
STATUS
I
ACCEPTED
ORDER D2 CUSTOMERS
I
1.3
PICKING PICKING
DETAIL UST
D3 PRODUCTS ASSEMBLE
ORDER
INVENTORY
CHANGE
FIGURE 5- 15 This diagram does not show the symbols that connect to data flows entering or leaving
FILL ORDER on the context diagram.
BALANCING EXAMPLES: Balancing ensures that the input and output data flows
of the parent DFD are maintained on the chjld DFD. For example, Figure 5- 16 shows
two 0 1- D : The order S)•stem diagram 0 is shown at the cop of che figure, and the
exploded diagram 3 DFD is shown ac the bottom.
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
I'
The rwo DFDs arc balanced because the child diagram at the bottom has the
same input and output Aows as rhe parent process 3 shown ar the top. To verify rhe
2
COMPLETED
CREATE
ORDER I
INVOCE
INVOICE
II D1 ACCOUNTS
-
ll"YMENT
--
RECEIVABLE DETAIL
INVOICEf
3 ""
DETAIL
.
. I
PAYMENT
-- APF'\.Y
I
PAYMENT I
•
' - -i!!AN!!' '
COMMISSION CASH
RECEIPTS
DEPOSIT ENTRY
SAlES !IANJ(
DEPT
ACCOUl"1"NO
1NllOICE
Order System Diagram 3 DFD
ID' I
,--
I 31
t -' I
DEll'&.
I
PAYMENT
ACCOU'<TS
RECEIVAlll.E I
OET.tJL
I I
CVSTOMER POST
PAYMENT I PAYUENT I
- - - - - - - - ,, - - - - - .. - - - ...
I \
I CUSTOt.IER
PAYMENT
I "'I
I
1 tw1.Y OOMMISS ION I
I AAl'MENTS EARNED I
DAILY
I PAYMENT ACCOUNT1NG I
PAYMENT
I I
I 32 33 H
I
I PREPAA£ I
DEPOSIT ACCOUNTING PAY
I PAYMENT ENTRY COMMISSION I
I
.. - 1BANK - ---- -
DEPOSIT
~ <.'Xst-1'"
RECEIPTS ENTRY
-- - - - i ~:ss~ON -I
ACCOIJNf,NG SALES
BAM< REP
FIGURE S- 16 The order system diagram 0 is shown at the top of the figure. and the exploded diagram 3 DFD
(for the APPLY PAYMENT process) is shown at the boaom.The two DFDs are balanced because the child diagram
at the bottom has the same Input and output flows as the p;arent process 3 shown at top.
balancing, note that the parent process 3, APPLY PAYMENT, has one incoming dara
flow from an external enriry and three outgoing data flows to external entities. Fxam-
ine the child DFD, which is diagram 3. Ignore the internal data flows and count the
data flows co and from external entities. From the diagram, it is evident chat the three
processes maintain the same one incoming and three outgoing data flows as the par-
ent process.
Another example of balancing is shown in Figures 5-17 and 5-18. l11e DFDs in
the e figures we re created using the Visible Analyst CASE tool.
Figure 5-17 shows a sample concext diagram. The process 0 symbol has cwo input
flows and two output flows. Note char process 0 can be considered as a black box
EXTERNAL
-----.
INPUT DATA OUTPUT DATA EXTERNAL
ENTITY A FLOW1 FLOW 1 ENTITY C
1
I I
I
INPUT DATA I PROCESSO I OUTPUT DATA
FLOW2 I .I FLOW2
• •
EXTERNAL EXTERNAL
ENTITY B ENTITY D
I ------- ---------, 1 3
EXTERNAL
I INPUT DATA
• FLOW I - UT OATA I
FLOW I I EXTERNAL
ENTITY A PROCESS 1 PROCESS3 ENTITYC
I
'
I I
I
I INTERNAL INTERNAL
DATA DATA
I I
. FLOW1 FLOW2
I
I 1041 DATA STORE 1 los DATA STORE 2 I
I I
INTERNAL INTERNAL
I DATA DATA I
FLOW3 FLOW4 I
I
I 2 I
INPUT DATA OUTPUT DATA
I FLOW 2 FLOW 2 I
EXTERNAL EXTERNAL
ENTITY 8 I PROCESS2 • ENTITY 0
I I
I
' ----------~-----
FIGURE 5- 18 In the next level of detail. the process 0 black box reveals three processes, tw0 <ba scores, and
four internal data ffows---gll of which are shown inside the dashed line.
(....,..... J:gl( . . . . . I_,.. 41 11.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
I'
with no inrernal derail shown. In Figure 5-18, process 0 (che parent DFO) is exploded
inro rhe nexr level of detail. Now rhree processes, rwo dara scores, and four inrernal
dara Aows are visible. Note that the derails of process 0 are shown inside a dashed
line, 1ust as if the inside of the process was visible.
The DFDs in Figures 5- 17 and 5-18 are balanced because rhe four data flows into
and out of process 0 are maintained on the child DFD. The DFDs also are leveled
because each internal process 1s numbered co show that it is a child of the parent
process.
You are the IT director at Big Ten University.As part of a training program, you decide to draw
a DFD that includes some obvious mistakes to see whether your newly hired junior analysts
can find them.You came up with the diagram 0 DFD shown in Figure 5-19. Based on the rules
explained in this chapter, how many problems should the analysts find?
1 2 3
STUDENT ID TENTATIVE
MEET CHECK
N UMBER SCHEDULE
ASSIGN WITH OPEN
AO\llSOR AOlllSOR CLASSES
FINAL
CLASS
SCHEDULE
05 CLASS ROSTER
CLASS
INSTRUCTOR ROSTER
STUDENTS
ATTENDING
STUDENT ID FINAL
NUMBER CALCULATE GRADE
STUDENT GRADE 04 GRADES
r..,,...JID)r-..1-.. 4•11_.. • ...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Chapter S Data and Process Modeling
A set of DFDs produces a logical model of the system, but the details within those
DFDs are documented separarely in a data dictionary, which is the second component
of stn1crurcd analysis.
A data dictionary, or data repository, is a ccnrral storehouse of information about
the system's data. An analyst uses rhe data dictionary to collect, document, and
organi1c specific facts about the system, including the contents of data flows, data
stores, entities, and processes. The data d ictionary also defines and describes all data
elements and meaningful combinarions of dara elements. A data clcmcnr, also called
a data item or field, is che smallest piece of dara that has meaning within an informa-
tion system. Examples of data elements are student grade, salary, Social ccurity num-
ber, account balance, and company name. Dara e lements are combined into records,
also called daLa structures. A record is a meaningful combination of related data ele-
ments t hat is included in a data flow or ret:iined in a data score. For example, an auto
parts store inventory record might irnclude part number, description, su pplier code,
minimum and maximum stock levels, cost, a nd list price.
Significant relationships exist among the items in a data diction~iry. For example,
darn stores a nd data flows are based on data structures, which in rurn are composed
of data c lements. Data flows are connected to data s tores, entiLies, and processes.
Accurately documenting these relationships is essential so the data dictionary is con-
sistent with the DFDs. The more complex the system, the more d ifficult it is co main-
tain fu ll and accurate documentation. Fortunately, modern CASE tools simplify the
task by flowing documentation automatically from the modeling diagrams into the
central repository, along with information entered by the user.
A CASE reposi tory ensures data consistency, which is especially imporranc where
multiple srsrems require the same data. In a large company, for example, the sales,
accounting, and shipping systems all might use a data element called CUSTOMER
NU.tvl BER. Once the CUSTOMER NUMBER element has been defined in the repos-
itory, other processes can access it, data flows, and data stores. The result is that all
sysrems across the enterprise can share data that is up to date and consistent.
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- t fta111&....-.~~ ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
I'
specified range of values. Also indicare if a value for the data element 1s optional.
Some data clements have additional validity rules. For example, an emplo)'cc's
salary musr he within the range defined for rhe employee's job classification.
• Source. The specification for the origination point for the data element's values.
The source could be a specific form, a depam11ent or an outside organization,
another information system, or rhe result of a calculation.
• Security. Identification for the individual or department that has access or
update privileges for each data clement. For example, only a credit manager
has the aurhority to change a credit limit, while sales reps are au thorized co
access dara in a read-only mode.
• Responsible 11ser(s). Identification of the user(s} responsible for entering and
cha nging values for the data c lement.
• Description and comments. This part of the documentation permits che entry
of addirional norcs.
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 4111.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~---tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
I'
and so on.
2. These data flows 1 '1--1+- ·• ·
will be described "9cMc rr,,. .,._, .._. ~ .. Cltttlll UAl\l!o MfJO! "1 OflM
~ 0...-4.lf.t.._ UCllD<mll:~ M.CllflOOlllllll
spcclflcally else-
where in the data
diccionary.
-[
--
,___, -..
--Qp
....
t- ...
·-·
A ""8111tor'f~-- oP'I . . te ' - l.a C!Wlet". . . . . . . . W'9 h
VERIFY ORDER.
....... .
,,,,
......
Attrlbults: ....glh .....
ill CUSTOMllt MJMll!l Ch•
lftJ !JI CUSlOMlll STATUS Ch"
-
the objecrs, rather than as separate components.
VERIFY VERIFY
VERIFY
PRODUCT STOCK
PRICE
5.9.2 Modula r Design CODE LEVEL
TABLES WITH ONE CONDITION: If a process has a single condition, there only are
rwo possibilirie-;-yes or no. Either the condition is present or it is not, so there are only
two rules. For example, to trigger an overtime calculation, the process condition mighr
be: Are the hours greater than 40? If so, the calculation is made. Otherwise, it is not.
TABLES WITH TWO CONDITIONS: Suppose there is a need to create a decision rable
based on rhe VERIFY ORDER business process shown in Figure 5-28. When documcnr-
ing a process, it is importanr ro ensure char every possibility is listed. In chis example, rhc
process description contain~ two conditions: product srock sratus and cuscomer credit
srarus. If both conditions arc mer, rhc order is accepted. Otherwise che order 1s rejecred.
After all the conditions and outcomes have been identified, rhe nexr step i~ to create a
decision tnhle simil:ir co the one shown in Figure 5-29. Nore that each condition has rwo
possible v:ilues, so the number of rules doub les each time another condition is added.
For example, one condition creates two rules, two ,conditions create four rules, three
conditions create eight ru les, and so on. In rhe two-condition example in Figure 5-29,
four pos~ibilities exist, bur Ruic I is the only combination that will accept :in order.
TABLES WITH THREE CONDITIONS: Suppose the company now decides rhar rhc
credit manager can waive the customer credit requirement, as shown in Figure 5-30.
Th:.ir creates a third condition, so there will be eight possible rules. The new decision
cable might resemble rhc one shown in Figure 5-31.
First, the Y-N patterns must be filled in, as shown in Figure 5-3 1. The best way
to assure that a ll combinations appear is rouse parterns like these. The first con-
dition uses a pattern of Y-Y-Y-Y followed by -N-N-N, the second condition uses
a repeating Y-Y-1 -N pattern, and rhe pattern in the third condition is a series of
Y-N~.
The nexr seep is very important, regardless of the number of condirions. Each
numbered column, or ru le, represents a different set of conditions. The logic muse be
carefully analyzed and che outcome f or each r ule shown. Before going further, srudy
the cable in Figure 5-31 co be sure the logical outcome for each of the eight rules is
understood.
\Vhen all the ourcomes have beeo determined, the next step is ro simplify rhe rable.
ln a multi-condition cable, some rules might be duplicates, redundant, or unrealistic.
To simplify the table, follow rhese steps:
I. Stud> each combination of conditions and outcomes. \Xlhen there are rules with
three conditions, only one or two of chem may control the outcome, and the
ocher conditions simply do not matter.
2. If there are conditions that do not affect the outcome, mark them with dashes
(-) as shown in the first table in Figure 5-32.
3. Now combine and renumber the rules, as shown in the second table in
Figure 5-32.
Afrer following these steps, Rules 1 and 2 can be combined, because credit status
is OK in both ru les, so the waiver would not matter. Rules 3, 4, 7, and 8 also can be
combined because chc product is not in stock, so other conditions do noc matter. The
resulr is rhar instead of eight possibilities, only four logical rules concrol rhe Verify
Order process.
VERIFY ORDER Process with Credit Waiver (with rules marked for
combination)
I . Because the
I 2 3 .C 5 6 7 8 product is not in
y y stock. the other
Credit status 1s OK N N conditions do not
Produet 1s in stock y y N N y y N N matter.
Waiver from credit manager y N 2. Because the
Jt
other conditions
Accept order x are met.the
Re1ect order x x x x x waiver does not
matter.
VERIFY ORDER Process with C redit Waiver (after rule combination and
simplification)
I 2 3 .C
(COMBI NES (COMSINES
PREVIOUS 1, l) (PREVIO US S) (PREVIOUS 6) PREVIOUS J, 4, 7,1)
C redit staws Is O K y N N
Produet is in stock y y y N
Waiver from credit manager y N
Accept order x x
Reject o rder x x
FIGURE S-3 2 In the first decision table.dashes have been added to indicate that a condition is not relevant. In
the second version of the decision table. rules have been combined following the steps shown below. Note that in
the final version. only four rules remain.These rules document the logic and will be transformed into program code
when the system is developed.
FIGURE S-33 A sales promotion policy with three conditions. Note that the first statement contains tw0
separate conditions: one for the 5% discount and another for the additional discount.
Preferred customer y y y y N N N N
O rdered S 1,000 or more y y N N y y N N
Used our charge card y N y N y N y N
5% d iscount x x
Additional 5% discount x
$25 bonus coupon x x
$5 bonus coupon x x x x
FIGURE S-34 This decision table 1s based on the sales promot ion policy in figure S-33.This 1s the 1n1t1al
version of the table before simplification.
As explained in rhe preceding section, most rabies can be simplified, and this one is no
exception. After studying rhe condirions and outcomes, the following becomes apparent:
• In Ruic I, all three condirions are mer, so both 5% discounts apply.
• In Ruic 2, a preferred customer orders $ 1,000 or more bur does not use our
charge card, so only one 5% discount applies.
• Rules 3 and 4 can be combined into a single rule. \Vhy? If preferred customers
do nor order $ 1,000 or more, it does not matter whether they use our charge
card-either way, they earn onJy a S25 bonus coupon. Therefore, Rules 3 and 4
really arc a single rule.
• Rules 5, 6, 7, and 8 also can be combined into a ~ingle rulc-hecause if rhe per-
son is not a preferred customer, he or she can only receive a $5 hon us coupon,
and the other conditions simply do not matter. A da~h is inserted if a condition
is irrelevant, as shown in figUie 5-35.
If das hes are added for rules that are not relevant, the table should resemble the
one shown in Figu re 5-35. When the results are combined and simplified, only four
ru les rema in: Rule 1, Rule 2, Rule 3 (a combination of initial Rules 3 and 4), and
Ruic 4 (a combination of initial Ru les 5, 6, 7, and 8).
Decision tables ofren are rhe best way ro describe a complex set of conditions.
Many analysts use decision rabies because they are easy ro construct and unde rstand,
and programmers fi nd it easy to work from a decision table when developing code.
The marketing director at Rock Solid Outfitters, a medium-sized supplier of outdoor climbing and
camping gear; has asked the IT manager to develop a special web-based promotion. Rock Solid will
provide free shipping for any customer who either completes an online survey form or signs up
for the Rock Solid online newsletter.Additionally. if a customer completes the survey and signs up
for the newsletter, Rock Solid will provide a $ 10 merchandise credit for orders of $ I00 or more.
The IT manager has asked you co develop a decision table that will reflect the promotional rules
that a programmer will use.She wantS you ro show all possibilities, and then to simplify the results
to eliminate any combinations that would be unrealistic or redundant. How will you proceed!
r..,,...JID)r-..1-.. 4•11_.. •...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
I'
Used our
y
--- 5% discount and
an additional 5%
charge card? discount
Ordered
Y
,---------<
$1 ,000 o r
y more?
- - - 5% dlacount
N
Preferred
customer?
' - - - - - - - - - - - - $25 bonus coupon
N
N'--------------------~ S5bonuscoupon
FIGURE 5-36 This decision tree example is based on the same Sales Promotion Policy shown 1n the decision
ables in Figures S-34 and S-35. Uke a decision table. a decision tree shows all combinations of conditions and
outcomes.The main difference is the graphical format. which some viewers may find easier to interpret.
The IT manager at Rock Solid Outfitters thinks you did a good job on the decision table task
she assigned to you. Now she wants you to use the same data to develop a decision tree that
will show all the possibilities for the web-based promotion described in Part I of the case. She
also wants you to discuss the pros and cons of decision tables versus decision trees. How shall
you proceed this time!
r..,,...JID)r-..1-.. 4•11_.. •...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Chapter S Data and Process Modeling
This is your first week in your new job at Safety Zone , a leading producer of IT modeling
software.Your prio r experience with a. smaller competitor gave you an edge in landing the
job, and you are excited about jo ining a larger company in the same field.
So far, all is going well, and you are getting used to the new routine. However. you are
concerned abo ut o ne issue. In your initial meeting with the IT manager. she seemed very
interested in the details of your prior position, and some of her questions made you a little
uncomfortable. She did not actually ask you to reveal any proprietary information, but she
made it clear that Safety Zone likes to know as much as possible abo ut its competitors.
Thinking about it some more, you try to draw a line between information that is OK to
discuss and topics such as software specifics or strategy that should be co nsidered private.
This is the first time you have ever been in a situation like this. How will you handle !ti
S. I 0 SUMMARY
Structured analysis tools can be used to develop a logical model during one systems
analysis phase and a physical model during the systems design phase. Many analyses
use a four-model approach, which involves a physical model of the current system, a
logical model of the current system, a logical model of the new system, and a physical
model of the new system.
During data and process modeling, a systems analyst develops graphical models
to show how the system transforms data into useful information. The end product of
data and process modeling is a logical model that wilJ support business operations
and meet user needs. Dara and process modeling involves three main tools: DFDs, a
data dictionary, and process descriptions.
DFDs graphically show the movement and rransformarion of data in the informa-
tion sy rem. DFDs use four symbols: The process symbol transform data, the data
flow symbol shows data movement, che data store symbol shows dara ar resr, and the
external entity S)'mbol represents someone or something connected ro the information
system. Various rules and techniques are used to name, number, arrange, and annotate
the ~et of DFDs to make them consistent and understandable.
A set of DFDs is like a pyramid \Vith the context diagram at the top. The context
diagram represents the information system's scope and its external connections bur not
its inremal workings. Diagram 0 displays the information syscem's major processes,
darn stores, and dam flows and is the exploded version of the context diagram's pro-
cess symbol, which represents the entire information system. Lower-level DFDs show
additiona l detail of t he information s,ystem through t he leveling technique of number-
ing :1nd partitioning. Leveling continues until the functional primitive processes arc
reached, which are nor decomposed further and are documented with process descrip-
tions. All diagrams must be balanced to ensure their consistency and accuracy.
l11c data dictionary is the central documentation tool for structured analysis. All data
elements, data flows, data stores, processes, entities, and records are docwnentcd in the data
dictionary. Consolidating documentation in one location allows the analyst to verify the infor-
mation sysrcm's accuracy and consistency more easily and generate a variety of useful reporcs.
Each functional primitive process is documented using structured English, decision
tables, and decision trees. Structured English uses a subset of standard English that
defines each process with combinacions of the basic building blocks of sequence, sclec-
non, and iteration. Using decision tables or decision trees can also document the logic.
r..,,...JID)r-..1-.. 4•11_.. • ...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
I'
Key Terms
alias A term used m various Jara d1cttonaries 10 indicate an altemare name, or J name other than rhe
;,randard Jar.1 dcmem name, rhar 1s used co de.cribe the same data element.
balanunit A pr<><.c:-.\ u>ed to mam1.1m .:on~1scency among an enrire seri~ of dfagram•., mdudin11 mpu1
and output data Omn, Jara definmon, and pr0<.-e-;s dc::>cripuon~.
blad. ho' t\ metaphor for a proce>\ or an acrion that produces rc~ult~ an a non-rran\parcnt or non-
oh-crvahle manner. In OFO~. a proce<.~ appears as a black box where che inpul', output\, and general
function of the prcx:C\~ arc known, bur rhe underlying demi ls are not ~hown.
black hole A process rhar has no output.
business logK Rules 10 derermme how a system handles data and produces useful informauon, rcflecnng
the operanonal rcqu1remenrs of rhe bustness. E..xamples include adding the proper amo•tnt of sales tJll.
to invoices, calcul.111ng customer balances and fmance charges, and deternunmg wherher a customer
is eligible for ,1 volum~-bascd discount. Also called business rules.
bu"n''" rule, Sec hminc\\ lo111c.
child diagrnm The lower-level diagram in an exploded DFD.
context diagram A rop-lcvcl view of an informarion system that shows the bound<lrics ond ~cope.
conrrol ~trucrurc ~crvc as bui lding blocks for a process. Conrrol structures have one entry ond cxir
point. '1 be) may be completed m sequential order, as the resulr of a rest or condmon, or repe.ncd until
J >pec1fic condmon ch.111ges. Also c.alled logic.ii structure.
dcl:i,ion rrcc A graphical rcprc;,c111,11ion of rhc cond itions, actions, and rule> found in ;1 dcci,ion 1:1blc.
decompo~in11 Anorher w:1y of conveying a process or >ysrem char has been broken down from .1 genera l,
top-level view 10 more dct.1i l. 1 he rerms exploded and part1tio11ed also can be used.
dia11mm 0 A diagr.1111 dcpic1111g rhc fir~r level of derail below the mirial conrext diagram. Diagram 0
(lcroJ 7.ooms rn on rhe context diagram and shows rna1or processes. darn flows, and d(l(a \tores, as
well as repeating che external enricies and data flows thac appear in the context diJgram.
di•crgmg dara flow A darn flow in which che same dam rra\"els co rwo or more different locarions.
domain The set ot value<; pcrmmcd for a d:na elemenc.
enut• A person, a pla1.:e, J rhmg, or an evem for which dara is collecred and m.110t;11ned. !'or example. an
ouhne >JI~ >»tcm mJ) mdude enm1~ n:tmed CUST0~1ER. ORDER, PRODUCT. .ind SUPPLIER.
explodtnit A J1agr;im 1s s.~td to be exploded 1i 11 "drills down" ro a more derailed or expanded view
field A ~mgle char.1crens11c or fact abour an enriry. A field, or anribuce, 1s 1hc ~m.iUest pie.:c of d.11a th:u
h.i; mumng wuhm an rnformation system. For example. a Social S«ut1t} numlx:r or company name
could!)( e~amples of a field. The rerms data eleme11t, data item, .ind field are used m1crchangeably.
four-moJd approach A ph)">ical model of the currenr system, a logu:al moJd of thc L-UITtnt \)\!em, a
loi;1cal model of rhe new S)-.rem, and a physical model of rhe new >y>tcm are all developed.
funuional pnm1tl\e A >mgle function char 1s nor exploded furrher. The logi~ for fun~t1onal prumrive' is
J0<;umcntcJ m a J~ta dictionary proct'.Ss description.
Gane and Sarson A popular symbol sec used in DFDs. Processes, data flows, dat.l scores, and exrernal
enrmcs all have a unique symbol.
gr:iy hole A process with an lllput obviously insufficient to geuerare the shown output.
i1cr.11ioo The complenon of a process step chat is repeated unttl a spectfic condiuon changes.
lcvdin11 The prt>ec" of drawinµ a scrie- of increasingly detailed diai:ram~ to rcai:h 1hc dc,ircJ IL-vd of detail.
logical model Shows what a S)n;rcm mu>r do, regardle's of how it will be implemented phy,ically.
logica l s1ruccure See cooirol scruccure.
looping Refers ro a process step that is repeated until a specific condition ch.1nges. !·or example. a
process that continues ro prmr paychecks unul 11 reaches the end of the payroll file 1s loopin11. Also
known .is rcpem1on.
modular design A design that can be broken do\\n inro logical blocks. Also known as partitioning or
1op·dow11 design.
p.arcnt Jiai.:ram The hi11hcr or more !Op-kvd dia11ram in an exploded DFD.
panitionini: The brcakini: down of overall objective• into •uh..y•rcm' and mudulc•.
ph) ~ical model A model chat describes how a system will be consrructed.
proccS> Procedure or ta.k that users, managers, md JT scaff members perfom1. Aho, the logic.11 rules of
.i S)Stcm chat are .ipplted ro rrmsform data mto mea.rungful utform.iuon. ln l)l l)s, a process receives
tnput d.11a and produces ourput that bas a ctiHerenr content. form, or both.
proccs~ 0 In a DfD, process 0 (zero) represenrs the entire infom1.ition sy:;rcm but does nm sho" the
internal workings.
pnK~" d~~-rtption A dcxumenrarion of a functional prnn1rivc':; detail;, whkh repre\Cnh a '>pc:~1fic.: sec of
prt><:c:<>,mg >rep\ and bu.,mcss logic.
p'cudocodc A rechnique for rcpreseming program logic.
record A set of related fields that describes one instance, or member of an entif), such a~ one customer,
one order, or one product. A record mighr ha'e one or do£ens of field~. depending on \\h3c mforma-
non is needed. Also called a tuple.
~eleccion A control strucrure 111 modular design, it is rhe complenon of two or more proce~~ steps based
on rhc re~ults of :i test or condicion.
,cqucncc The completion of sreps in sequential order, one 3.fter :lllother.
\inl.. An cx tcrn,d entity chat receives daca from an informarion syMcm.
\nurcc An external cnriry rhat supplies data roan information system.
~pontancou~ generation An unexplained generation of data or information. With re~pccr ro DrDs,
proccs;es c:mnor spomaaeouslr generace data flows-they must have an inpur m have an oucput.
)trui;1ured [nglt>h A subser of standard English char describe> logical proccsse; dearly and JCCur3rel).
tcrmmalUr A D~D >ymbol that mdtcares a dara ongrn or final dc;rmarion. Al>o called an C'(tcrnal emit).
•altdtr) rule~ Chech thar are applied ro dara elemems when data is entered to ensure thar rhc value
entered is valid. For e..;ample, a validiry rule mighr require thar an employee·~ ~ala') numl>cr l>c wirnin
rhe cmplo)cr's predefined range for rhar position.
)ourdon A type of srmbol ser rhar 1s used in DFDs. Proccsse>, data flows, data stores, .ind exrcmal
cnriucs each have a unique symbol in rhe Yourdon srmbol set.
Exercises 179
Exercises
Questions
I. \Xlhar is rhe relationship bcrwccn logical and physical models ?
1. What is the function of a DFD in the SDLC?
3. Draw examples of rhe four basic DFD symbols.
4. \Xlhar are the six guidelines to follow when drawing DFDs?
5. What is rhe difference bcrween a conte"''t diagram and diagram O?
6. \Xlh1ch symbol is not used in a coarext dfagram?
7. I low would you level a DFD?
8. How would you balance a DFD?
9. What is a dat:i clement?
I 0. What is rhe purpose of a decision rab le?
Discussion Topics
I. How would you convince management char following a four-model approach is wise?
1. \'V'hen might it be :ippropriare co violate the "no crossed lines" guideline in DFDs?
3. \'<'hat is the relationship berween system requirements and context diagrams?
4. How might CASE cools be used to document rhe design of a data dicrion:iry?
5. Some systems analysts find it berrer to start with a decision table, and then construct a decision tree.
Others believe it is easier to do ir in the reverse order. Which do you prefer? Why?
Projects
1. The data flow symbols shown in Figure 5-1 were designed by Ed Yourdon, who was a well-known IT
author, lecrurer, and consulcant. t.1an)' IT professionals consider him to be among the most influenrial
men and women in rhe software field. Learn more about ~1r. Yourdon by visiting online resources and
write a brief re\•iew of his work.
2. Explore rhree CASE tools that provide the ability to dra\\ the four basic DFD symbols and describe
what you liked and disliked about each tool.
3. Draw :i context diagram and a diagram 0 D FD char represents the information system at a rypical
library.
4. Create a decision rable with three conditions. You can make one up or use a scenario from everyday
life. Eirher way, be sure co show all possible ourcomes.
5. Explore the use of Structured English to describe processes in fields other rhan systems analysis.
r..,,...JID)r-..1-.. 4• 11_.. • ...__. ~... . ... .,...~ • ........._ . ....._.,.,.. o-... ..,._.,,.,.. _ ..,.~ ,........., ................. .._... .., .,. ..,.~"
................... ..., ...................... .... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Chapter 6 Object Modeling
Object Modeling
Chapter 6 is the third of the four chapters in the The chapter includes three "Case in Point"
systems analysis phase of the SDLC. This chapter discussion questions to help contextuali1e the concepts
discusses object modeling techniques that analysts use to described in the text. A "Question of Ethics" considers
create a logical model. In addition to structured analysis, the situation where an employee wants to skip a course
object-oriented analysis is another way to represent and and just sit the exam and requests a copy of the training
design an information system. materials from someone else who took the course.
r..,,...JID)r-..1-.. 4•11_.. • ...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
I'
As seated in Chapter I, rhe mosr popular systems development options are structured
analysis, object-oriented (0-0) anal)·sis, and agile methods. The table in Figure 1-17
shows rhe three alrernati,·es and describes some pros and cons for each approach. As
tbe rable indicares, 0-0 methodology is popular because it inregrares easily wirh 0-0
programming languages such as C++, Ja,·a, and Python. Programmers also ltke 0-0
code because it is modular, reusable, and easy to m aintain.
Object-oriented (0 -0 ) analy~is describes an information system by idenrifying
things called objects. An object represents a real person, place, event, or rransacrion.
For example, when a patient makes an appointment to sec a doctor, the patient is an
object, the doctor is an object, and the appoinanent itself is an object.
0-0 analysis is a popular approach that sees a system from the viewpoint of the objects
themselves as they function and interact. The end product of 0-0 analysis is an object
model, which represents the information system in rerms of objects and 0 -0 concepts.
Chapter 4 stated that the Unified Modeling Language (UML) is a widely used
method of vi~ua l izi n g and documenti ng an information system. ln this chapter, the
UML is used to develop object models. The first s tep is ro unde rstand basic 0 -0
terms, incl uding objects, attributes, methods, mes.sages, and classe~ . Th is chapter
shows how systems ana lysts use those te rms ro describe an information system.
TravelBiz is a nationwide travel agency that speciali1.es in business traVel. It has decided to
expand into the vacation travel market by launching a new business division calledTravelFun. The
IT director assigned tw0 systems analysts to create a flexible and an efficient information system
for the new division. One analyst wants to use traditional analysis and modeling techniques for
the project, while the other analyst wants to use an 0-0 methodology. Which approach would
you suggest and why?
6.2 OBJECTS
r..,,...JID)r-..1-.. 4•11_.. •...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Chapter 6 Object Modeling
Instances of
PARENT Object the PARENT Object
Mary Smith
Age25
Cllaracter.stlCS Attributes Female
that describe tile Name Red
PARENT object Age
Sex
Hair color Ahmec:IAll
Age34
Male
•a Brown
Task.s tllat the
PARENT objoct
can perform
...........
a1111112m ui.-.
"ill
AnthonyGrMna
Age 42
Mate
Brown
FIGURE 6 - 1 The PA RENT object has four attributes and two methods. Mary Smith, Ahmed All, and
Anthony Greene are Instances or the PAREN T •object.
Continuing with the fami ly example, che CHJLD object in Figure 6-2 posse ses che
same artrilrntes as the PARENT object and an additional arrribute thac shows the num-
ber of siblings. A CHllD object performs certain methods, such as picking up roys, eat·
ing dinner, playing, cooperating, and getting ready for bed. To signal the CHILD object
to perform those casks, a parent can send certain messages that rhe CHILD objecr will
undcrsrand. For example, rhe DINNER'S READY message cells a CHILD obiect to
come to the rable, while rhe SHARE \XfJTH YOUR BROTHER/SISTER message tells a
Cl ll LD object co cooperate wich other CHILD objects.
Instances of
CHILD Object the CHILD Object
.........
,
Female
D Ji I Blonde
FIGURE 6 -2 The CHILD object has rive attributes and five methods. James Smith. Amelia A li. and
Mosty Greene are Instances or the CHILD object.
6.3 ATTRIBUTES
An object has certain attributes, which are characteristics that describe the object. If
objects are similar to nouns, attributes are similar co adjectives that describe the char-
acteristics of an object. For example, a car has attributes such as make, model, and
color. Some ob1ects might have a few attributes; ochers might have doz.ens.
Systems analysts define an object's attributes during the systems design proce~s. ln
an 0-0 system, ob1ecrs can inherit, or acquire, cercain attribuces from other objects.
Objects can have a specific attribute called a state. The state of an object i an
adjective that describes rhe object's current status. For example, depending on the
stare, a student can he a future srudenc, a current srudenr, or a past student. Similarly,
a bank account can be acrive, inactive, closed, or frozen.
6.4 METHODS
An object also has methods, which are rasks or functions that the object performs
when it receives a message, or command, to do so. For example, a car performs a
method called OPERATE WIPERS when it is sent a
message with the wiper conrrol, and it can APPLY
Method: Steps:
BRAKES when it is sent a message by pressing the
MORE FRIES t Heat oll
brake pedal. A method defines specific tasks that
:in object can perform. Ju~r ::is objects are similar co 2. All fry basket with frozen
potato strips
nouns ::ind ::irrribuces are similar to adjecrives, meThods
resemble verbs rhar describe what and how an object 3. Lowe< basket Into hot oil
does something. 4. Check for readiness
Consider a server who prepares fries in a fasc- 5. When ready, raise basket
food re!.taurant. A systems analyst might describe the and let drain
operation as a method called r.10RE FRIES, as shown 6. Pour fries Into warming
in Figure 6-3. The t.10 RE FRIES method includes the lfllY
steps required to heat the oil, fill the fry basket with 7. Add salt
frozen potato strips, lower it into the hot oil, check for
readines!>, remove che basket when ready and drain the FIGURE 6-l The MORE FRIES method requires the
oil, pour the fries into a warming tray, and add salt. server to perform scvcn specific steps.
6.5 MESSAGES
bcdrime story, but the same message to rhe CHILD object signals it to get ready for bed.
If the family also had a DOG object, the same message would tell the dog to leep.
An object can be viewed as a black box, because a message to the object triggers
changes within the object without specifying how the changes must be carried our.
A gas pump is an example of a black box. \Vhen the economy grade 1s selected at a
pump, it is not neces ary to think about how the pump determines the correct price
and selects the righ t fuel, as long as ir does so properly.
The black box concept is an example of encapsulation, which means that all
daca and methods are self-contained. A black box docs not want or need outside
interference. By limiting access to internal processes, an ob1ccr prevents its internal
code from being altered by another object or process. Encapsularion allows objects
to be used as modular components anywhere in the system, because objects send and
receive messages but do not alter the internal methods of other objects.
0-0 designs typically arc implemented with 0-0 programming languages. A major
advantage of 0-0 designs is that systems analysts can save time and avoid errors by
using modular objects, and programmers can translate the designs into code, work-
ing with reusable program modules t ha t have been tested and verified. For example,
in Figure 6-5, an INSTRUCTOR object sends an ENTER GRADE message roan
instance of the STUDENT RECORD
Message: class. Note that the INSTRUCTOR
ENTER GRADE object and STUDENT RECORD class
STUDENT
INSTRUCTOR could be reused, with minor modifi-
RECORD
cations, in ocher school information
systems where many of the attributes
FIGURE 6-5 In a school Information system. an INSTRUCTOR object sends an
ENTER GRADE message to an instance ol the STUDENT RECORD class. and mcrhocls would be similar.
6.6 C LASSES
An objecr belongs to a group or category called a class. For example, Ford Fiestas
belong ro a class called CAR. An instance is a specific member of a class. A Toyota
Camry, for example, is an instance of the CAR class. Ar an auto dealership, many
insranccs of rhc CAR class may be observed: rhe TRUCK class, the ~11NIVAN class,
and the SPO RT lITlLITY VEHICLE class, among others.
All objccrs within a class share common attributes and methods, so a class is like
a blueprint or template for all tbe objects within tbe class. Objects within a class can
be grouped into subclasses, which arc more specific categories within a class. For
example, TRUCK objects represent a subclass within rhe VEHICLE class, along wirh
other subclasses called CA R, M INTVAN, and SCHOOL BUS, as shown in Figure 6-6.
Nore that a ll four subclasses share common traits of the VEHICLE class, such as
make, model, year, weight, and color. Each subclass also ca n possess traits that are
uncommon, such as a load lim it for the TRUCK or an emergency exit location for the
SCHOOL BUS.
A class can belong to a more general category called a supcrcla~s . For example, a
NOVEL class belongs co a s uperclass called BOOK, because all novels are books in
this example. T he NOVEL class can have subclasses called HARDCOVER, PAPER-
BACK, and DIGITAL.
Similarly, consider a fitness cenrer illusrrared in Figure 6-7 char might have
students, inst ructors, class schedules, and a regisrration process. As shown in
Figure 6-8, the EMPLOYEE class belongs to the PERSON superclass, because every
emplO)'Ce is a person, and the rNSTRUCTOR class is a subclass of EMPLOYEE.
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
I'
Class Subclass
Vlllat E
Attributes Attributes
Make
Common Model
allnbulH Yur
Weight
Color lmlYAN
Common
methOds
....-. Attributes
SCHOOL BUS
Attributes
Uncommon Emergeoncy e•il location
allttbutes
FIGURE 6-4 The VEHICLE dass includes common attributes and methods.
CAR. TRUCK. MINIVAN. and SCHOOL BUS are instances of the VEHICLE class.
Superclass
Supeictass
PERIOH
name Class
Attributes
Name
Common --:r Date of birth
Class
........
attnbu1os
name
Attributes Subclass
Social Security number
r:Com:::::mo=n'---,:A.111
•11 .. Uncommon
attributes
Telephone number
Subelass
WllRUCIOR
Hire date
methods ... name
Title
Attributes
Pay rate
lnatructor type
Uncommon Avatlabillty
attrlbutos
llJltiodl
Uncommon ...
Giit....
7 0
methods 0
• Uncommon
methods
FIGURE 6-8 At the fitness center, the PERSON subclass includes common attributes and methods.
EMPLOYEE is a dass within the PERSON superclass. INSTRUCTOR is a subclass within the EMPLOYEE class.
Inheritance
•llWCIOR
Attributes Attributes
So<:lal Security number Type ol lnslNCtor
Telephone number So<:lal Security number
Hire date ~:.,.._--h Telephone number
Title
Hlredate _ J
Pay rate Tiiie
Pay rate
....•••llOlllt
1lt LS
CIAO 7 'ct 111'
After objects, classes, and relationships have been identified, an object relation,
ship diagram can be prepared to provide an overview of the sy~tem. Thac model
is used as a guide to continue co develop additional diagrams and documenracion.
Figure 6, J 0 s hows an object relationship diagram for a fitne~s cencer. Note rhac che
model shows che objects and how they interact to perform business functions and
transactions.
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
- Woip-M ._..,..
..
- ·~•-fllllie<'f •,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,.. ..,. - ~---tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
I'
EMPLOYEE
Isa
Indicates
avallabillty RTNESS-CLASS
FITNESS-CLASS
SCHEDULE Takes
roster
ST\JDENT
FIGURE 6- 13 The ADD NEW STUDENT use case description documents the process used to add a current
student into an existing dass at the fimess center.
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 4111.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
I'
\'V'hen use cases arc idcnrified, al l rhe relaced cransacrions should be grouped inro a
single use case. For example, when a horcl customer reserves a room, rhe rescrvarion
S)'Srem blocks a room, updares rhe occupancy forecasr, and sends rhe cusromer a
confirmarion. Those cvcnrs are all part of a single use case called RE ERVE R00~'1,
and the specific acrions are ~tep-by-srep casks within the use case.
FIGURE 6- 1'4 A cyplal auto service department might involve custome". service
.
write" who prepare work orde" and invoices. and mechanics who perform the wo/1(.
"
\'<'hen a use case diagram is crearcd, the first step is co ide11cify the sysrcm
boundary, which is represented by a recrangle. T he system boundary shows whar is
included in rhe system (inside che recrangle) and whar is nor included in rhe system
(outside the rectangle). After the system boundary is identified, use cases are placed
on the diagram, the actors arc added, and the relationships shown.
r..,,...JID)r-..1-.. 4•11_.. •...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Chapter 6 Object Modeling
Requests Writes
service
Update
Customer Service
Writer
Update
Work
Schedule
Performs
work
Mechanic
Prepare
Invoice
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
- Woip-M ._..,..
..
- ·~•-fllllie<'f •,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,.. ..,. - ~---tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
I'
FIGURE 6· 16 Examples of UML notations that Indicate the narnre o f che relationship betwee n instances of one class
and instances of another class.
Manages
1
S11h!s Manager
Attributes
Methods Methods
1 1
Manages Assigned
o..•
Attributes
Methods Methods
Includes
Items Ordered
1..-
Attributes Attributes
Methods Methods
FIGURE 6-17 Class diagram for a sales order· use case (attributes and
methods omitted for clarity).
Train the Tralner develops seminars and workshops for corporate training managers, who in tum
train their employees. Your job at Train the Trainer is to put together the actual training materials.
Right now, you are up against a deadline. The new object modeling seminar has a chapter on
cardinality. and the client wants you to come up with at least three more examples for each of
the four cardinality categories listed in Figure 6-1 6. The four categories are zero or many. zero or
one. one and on"t one. and one or many. Even though you are under pressure, you are detennined
to use examples that are realistic and familiar to the students. What examples will you submit/
r..,,...JID)r-..1-.. 4•11_.. •...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Chapter 6 Object Modeling
a,,112
Life line
I ~ Lifeline
Message 1
I
I
Focus Focus I
I
Message 2 I
I
I *
FIGURE 6 -18 A sequence diagram with two cla.nes. Notice the X that
indicates the end or the Cl.ASS 2 lifeline. Also noace that each message is
represented by a line with a label that describes the me=ge, and that each
class has a focus that shows che penod when messages are sent or received.
C LASSES: A class is idcnrified by a rectangle with the name inside. Classes char send
or receive messages arc shown ar the top of the sequence diagram.
LIFELINES: A lifeline is identified by a dashed line. The lifeline represents the time
during which the object above iris able ro interact with the other objects in the use
case. An X marks the end of rhe lifcljne.
MESSAGES: A message is identified by a line showing direction that runs between
two objecrs. The label shows the name of the message and can include additional
information abour the contencs.
FOCUSES: A focus is identified by a narrow vertical shape that covers the lifeline.
The focus indicates when au object sends or receives a message.
Figure 6-19 shows a sequence diagram for the ADD NEW STUDENT use case in
the fitness center example. Note that the vertical position of each message indicates
the riming of the message.
(....,..... J:gi ( . . . . .
r..a...w...,..._...., ..
I_,.. 4111.,.. .................,.t11ru
~- )U,
..,...,...... .,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~ c.....,..~
0w.,,,.._.._,..."-,.._..,.,_, .,_.,....,. -~--- t fta111&....-.~~ ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
I'
Request I I
fitness-class Check I
I I I
I Notify
Focus I I I
I Pay I I
I Register I
I
I
I
*
FIGURE 6- 19 The sequence diagram for the ADD NEW STUDENT use case.The use case
dcscripdon for ADD NEW STUDENT Is shown in Figure 6-13.
Assets Frozen
attached
ln a state transition diagram, the states appear as rounded rectangles with the
stare names inside. The small circle ro rhe left is rhe initial stare or rhe point where
the object first interacts with rhe system. Reading from left ro right, the lines show
direction and describe the action or event that causes a transition from one state to
another. The circle at the right with a hollow border is the final state.
Card is PIN ts
Customer accepted Custom41r accepted Customer
Inserts enters PIN requests
ATM card ~sh
ATM ATM
ltd Justs provides
balance cash
ATM
notifies
customer
FIGURE 6-2 1 An activity diagram $howing the a.ction$ and evcnrs Involved In wlLhdrawlng cash from an ATM.
~ Tl·-·
l'M•WflftN
Ollcv.on 0••.
Nt .. , . . .
•
...........
u-- -i ,,__
,_
r ..a;. .
~__,.i o--
.....
.... 1--M')
•
• ...
~
.... ' _ ,.. 111.
....
1oc• . -.......... .
IYOu9" • • Of c•••
..
- ....
.....,_ c .,,..nc. c.. 1----"
.,__
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
- Woip-M ._..,..
..
- ·~• -fllllie<'f •,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,.. ..,. - ~---t fta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-.. • ~-".....-""'*"....,.._...,.. ..
I'
6.9 TOOLS
Object modeling requires many types of diagrams to represent the proposed
system. Creating the diagrams by hand is time consuming and tedious, so systems
analysts rely on tools to speed up the process and provide an overall framework for
documenting the system components. In addition, cools ensure consistenq' and pro-
vide common links so that once objects are described and used in one pare of the
design, they can be reused mulriple times without further effort.
There arc many CASE tools tailored to UML. Tools such as Visio are popular for
drawing UM L diagrams, but they lack semanrics: T hey are useful for creating visually
pleasing figu re , but they have no knowledge of the underlying artifacts. This means a
system~ analyst can create diagrams tha t appear co be correct but are in fact incorrect
when it comes to rhe rules of the UM L.
To overcome this shortcoming, proper systems modeling tools, such as Cameo
Systems Modeler or IBM's Rational product fami ly, are typically used. These rool
underlttand t he meaning of the diagrams they hel!P create, wh ich suggests it's diffi-
cult to create a UM L diagrnm that is syntactically incorrect. These tools al!.o provide
traceability, an importa nt feature in the SDLC tha t links design a rtifacts backward ro
requirements a nd fo rward to development a nd testing.
Your company sent several staff members for UML training by an outside vendor.
Everyone who attended the training received a copy of the instructor s materials. which
included study guides and sample exam questions and solutions.
After completing the training course, you are eligible to sit a certification exam. If you
pass the exam, you will be credentialed as a "UML Expert" by an independent agency. You
can parlay these credentials into a higher salary and boost your career.
A coworker who did not attend the training asks for a copy of the training materials.
He wants to take the exam without "wasting his time in class." Should you give him a
copy of the training materials1 If you do, how might this diminish your accomplishments?
If you don't. would you be hurting the team by not helping another member become more
knowledgeable about the UMU
6.10 SUMMARY
r..,,...JID)r-..1-.. 4• 11_.. • ...__. ~... . ... .,...~ • ........._ . ....._.,.,.. o-... ..,._.,,.,.. _ ..,.~ ,........., ................. .._... .., .,. ..,.~"
................... ..., ...................... .... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Chapter 6 Object Modeling
(....,..... J:gi( . . . . . I_,.. 41 11.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
I'
Key Terms
acti\lt) J1<lgram A diai,-ram rh<lr re-.emble!> a borizonral flowcbarr chat •how~ the acnon; and eveni- 3\
the) occur. Act,.lt) diagram; sho" the order in which acno11> rake place and idennf) the out~ome.
actor An external emit) wnh a spectfic role. In a use case model. actors are used to model mtcran1on
with the system.
aunbutc A sm1dc char.icrensnc or fact about an ennty. An annbuce, or field, 1s the smallest p1«e of d.ua
that has meaning wnhm an informanon srstcm. For example, a Social Security number or company
o.ime could be examples of an anribute. In 0-0 analysis, ao attribure is parr of a d.t~s diagram that
describes the -.haractensuc, of ob1ccts in the class. Also kno" n as a data element.
black box A metaphor for a proces' or an action thar produces resulr; in a nun-tramparent or
non-ob,ervablc manner. In daca flow diagram,, a proces~ appears as a black bo" where chc input,,
output,, and 11cncral fonction of the procc\S arc known, but the undcrlyini; dcta1b arc nor ,hown.
cardinal1C) A concept that dc•cribe< how m<tancc• of one entity rdarc to imtancc< of nnuthcr cnmy.
De,eribcd in cntiry· rcl arion~hip dinwams by notation chm indicates comhination~ that include 1ero or
onc· to· mnny, onc·lo-onc, and many-ro·mnny.
child ln i.11herit.1nce, J child is 1he object thar derives one or more arrribuces from another object, called
tbe parem.
cl.ISS A cerm used 111 ob1ecc-or1e11red modelmg ro indic.1te a collection of snrul.ir ob1ec1s.
da,., dia11ra111 A detailed view of a ,inglc U'>c ca•c, ,howing rhc da,~ char parcicipatc in the U'>c ca'>C,
.md dc,.:umcnrini; rhc rclatinn•hip among rhc da<<es.
cncap,ulatoon The idea that all data and methods arc self-contained, as in a black bo"<.
focus In a sequence diagram, a focus md1carcs when an objecr sends or rec(wes a message. It 1s indicated
b) a narrow vertical rcctJngle thJt co,ers the lifeline.
iobcric.tncc At) pe of object relationslup. Inheritance enables an object to derive one or more of its
.i.tmbute~ from another objecc (t.g., an INSTRUCTOR object may lllhecit man) traus £rom che
L/\11'LOYll ob1ecr, such as hire dare).
in.,~n.:c A ,pcc1fic member of a da>s.
lifeline In a \cqucn"c diagram, a lifeline 1s u..cd ro represent the time during which rhc ob1c<t above it i~
able to mrcract with rhc orhcr objccrs in rb<" u..c ca<e. An X marks rhc end of a hfchnc.
message An 0 -0 command thac cells an ob1ec:t ro perform a certain method.
mcchod Defines sp«1fic casks chac an object must perform. Describes what and how an obiccr does
something.
object RepreM:nt\ a real person, place, C\'ent. or transaction.
objecc model Dc~crihe~ oh1ecr~, which combine darn and processes. Object models are chc cnJ produce
of O·O ana lybb.
objecc-orienced (0 -0 ) anJly~i; Describes an lnformarion system by idenrifymg things called objects.
An ob1ect reprc,cnt~ a real per<oon, place, evenr, or cransacnon. 0-0 :tnalysis is .1 popular appro,tch
that sees a ~ystem from the viewpoinr of rhc objecrs themselves ,1s they function and interact w1rh 1he
system.
parent Ill i11herirnncc, n parent i~ the objecr from which the other object, the child, derives one or more
Jttnbucc>.
polymorphm11 The con~cpt chat a me...age gives different meanings ro diffcrcm ob1cc1s (e.g., a GOOD
NIGi IT message m1ghr produce different rcsulrs depending if it 1s received by a child or the family
dog).
rclatiomhip<> Enable objccr' to communicate and inreract a~ rhey perfonn rhe btmncs' funcnoM and
transaction; required by a syo;tcm. Relationships describe wbar objects need to kno\\ abouc each other,
how ob1ec1s r~pond to changes in orher objecrs, and 1he effccrs of mcmbcnh1p m classes, super-
dasscs. Jnd subclasses.
~cqucncc diagram A diagram rhat sho\\ s tht> timing of transactions bcrwcen ob1ccrs as 1he) occur.
\late An aJ1e~ri•e that de...:ribe; an oh1ecc's current scaru; (e.g., a ;rudmt could be a CURRENT,
rlITURF, or PAST ~1udenr).
•talc tr;m\ltmn J1a11ram !>how' how an oh1cct cbani:"-' from one \tat.: to another, depending on 1he
cvcnc- that affe<:t the object.
subclas\ A funhcr d1v1s1on of oh1ecrs m a class. Subclasses are more ~pccific categories w1rh1n a class.
superclass A more gener.1liicd category ro which objects may belong (e.g., a NOVEL cl.1ss might belong
10 J superclass called BOOK).
W\lcm boundary Shows wha1 is included and excluded from a >yMem. Depicted by n ,haded rccrangle
in u...: ca'c diagram>.
Unified M0Jdm1o: Lm11o:ua)lc (UML) A wicldy used method of vi,uali1.ing and documen1ini; >of1wnrc:
'Y'tcm' dc,ii;11. UM I u'c' 0-0 design concepts, but it;, independen t of ony 'Jl«cific rrui.1ra111mini;
lnni;nngc ond can he u~ccl m describe business processes and requirement' f;cncr:tlly.
use case Represents che s1eps in a specific business function or process in UML.
use c:t~c dc~criprion A dcscnprion in UML char documems the name of the use cJsc, 1he .1ctor, a
dcscrip1ion of the use case, a s1ep-by-srep lisc of the tJsks required for successful completion, and
01her key descnpnons and assumptions.
uw c;hc diai;r.:tm A vi,ual repre..enrarion chat illusrrare-. the interacuon between U'>e" anJ rhe
i11format1on 'l'rcm in UM!..
Exercises 199
Exercises
Questions
I. Whar 1s 0-0 analysis?
1. Define an ob1ect in an information system and provide rhree examples.
3. Define an attribute and provide rhrcc examples.
4. Define a method and provide rhree examples.
5. Define e11caps11/atio11 and explain how ir is used in 0-0 analysis.
6. Define a class, subclass, and superclass and provide rhree examples of each.
7. Explain rhe concept of inherirance in object relationships.
8. Draw an object relationshi p diagram for a rypical library system.
9. Define a use case and a use case diagram and prepare a sample of each.
I 0. Why is ir imporranr co use a modeling rool a nd nor just a diagramming rool
during 0-0 analysi~?
Discussion Topics
I. You arc an IT consulranr, and you arc asked co create a new sysrem for a small
real esrarc brokerage firm. You have no experience with 0-0 approach, and you
decide co rry ir. How will you begin? How will the tasks differ from ~rrucrurcd
analysis?
1. Some professionals believe char ir is harder for experienced analy~rs ro learn
object-modeling rechniques, because the analysts are accustomed to thinking
abour data and processes as separate entities. Ochers believe that ~olid analytical
skills are easily transferable and do not see a problem in crossing over ro the
newer approach. Whar do you chink, and why?
3. The concept that rhe same message gives different meanings ro different ob1ects
is called polymorphism. Can you chink of examples where this behavior may
provide une'<pected results?
4. You arc crearing a sysrcm for a bowling alley to manage information about its
leagues. During rhe modeling process, you create a scare transition diagram for
an objecr called League Bowlers. \Xl'har are rhe possible scares of a league bowler,
and what happens to a bowler who quits rhe league and rejoins the following
season?
5. The UML is a large and complex modeling language. How can an IT profc~sional
tell when a UML diagram is correct and nor just visually plea~ing?
Projects
l. Contact the IT htaff ar your school or ar a local business to learn if they use 0-0
programming languages. lf so, determine what languages and versions are used,
how long they have been in use, and why they were selected.
2. Create a prcscnrnrion explaining 0-0 analysis, including definitions of basic
terms, including objects, attributes, methods, messages, and classes.
3. Draw an acriviry diagram showing rhe actions and evenrs involved in depositing
a check to a bank accounr using a mobile app.
4. Investigate business process modeling languages, such as BPEL.
5. Prepare a report on at lease three cools char provide UML support. Use the
tools' capah1liries for crearing class diagrams and sequence diagrams as a key
requ1remenr.
r..,,...JID)r-..1-.. 4•11_.. • ...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Chapter 7 Development Strategies
Development
Strategies
Cha pt e r 7 is the final chapter in the systems and pre.s entation of the system requirementS
analysis phase of the SDLC. The main objective of document to management. The chapter also explains
the systems analysis phase is to build a logical model the transition to systems design.
of the new information system. Chapters 4, S, and 6 The chapter includes three "Case in Point"
explained requirements modeling. data and process discussion questions to help contextualize the concepts
modeling. and object modeling. Chapter 7 describes described in the text. The "Question of Ethics" concerns
the remaining activities In the systems analysis phase, how truthful an answer should be when submitting a
which include evaluation of alternative solutions, response to an RFP. Is a slight exaggeration acceptable if
preparation of the system requlremenu document, it means the company will win the contract!
r..,,...JID)r-..1-.. 4• 11_.. • ...__. ~....... .,...~ • ........._ . ....._.,.,.. o-... ..,._.,,.,.. _ ..,.~ ,........., ................. .._... .., .,. ..,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Phase 2 Systems Analysis
]use a few years ago, a rypical company either developed software itself, purchased
a software package (which might need some modification), or hired consulcants or
outside resources to perform the work. Today, a company has many more choices for
software acquisition, including application service providers, web-hosted software
options, and firms that offer a variety of enterprise-\vide software solucions. This pro-
liferarion of choices is due in part due to the enormous changes in business methods
and operarions made possible by the Internet.
A systems analyst must consider whether development will cake place in a rra·
ditional environment or in a web-centric framework. There are similarities and dif-
ferences with both approaches. For example, in an Internet-based sy~tem, the web
become~ an inregral parr of the application, rather than jusr a communication chan-
nel, and systems analysts need new applicarion development tools and &olutions tO
handle the new systems.
Two represenrarive web-based development environmenrs are M icrosoft's .NET
and rhe open source MERN stack. Microsoft describes .NET as a developer plat-
form for building and running a variety of applica tion types written in C# and
Visual Basic, including web-based, mobile, and traditional deskrop applications.
The acronym M ERN srands for MongoDB, Express, React, and Node. MERN
is used to develop universal applications in JavaScript. MongoDB is a darabase,
and Express, React, and Node arc libraries or frameworks used for full -srack web
development.
Although cherc is a major trend toward web-based architecture, many firms rely
on traditional systems, either because they arc using legacy applications that arc not
easily replaced, or because they do not require a web component to satisl) user needs.
To choose berween traditional and web-based development. consider some key differ-
ences between them. Building the application in a web-based environment can offer
greater benefits (and sometimes greater risks) when compared to a traditional envi-
ronment. The following sections list some characteristics of traditional versus web-
based development.
In the consrantly changing world of IT, no area is more dynamic than lnrerner rech-
nology. Three examples of evolving trends arc Web 2.0, cloud compuring, and mobile
devices. Sysrems analysts shouJd be aware of these trends and consider them as they
plan large-scale sysrems.
Many IT professionals use the term \''cb 2.0 ro describe
NIST Cloud Computing Program - NCCP a second generation of the web rhat enables people ro
collaborate, interact, and share information much more
DESCRIPTION effectively. This new environment is based on conrinuously
.. available user applications rather than Static HTJ\-1 L wcb-
---.-_
a.....,...i......
.......................
........___,..,........ ...
,
""""""....,..n..,...,••. pages, wirhour limitations regarding rhe number of users o r
how they access, modify, and exchange data. The Web 2.0
.. ......
~,.......,.
---
~,...~
fltolt• Wwt.f~
llltl'Klloa. TNldeuf
Program As shown in Figure 7- 1, the Nationa l Institute of Stan-
. . . ~.,"" ....... ~ . . . . . . . Will l#IW• ...... l(Q1l."""*' dards and Technology (NIST) defines cloud computing as
18M(f ........... "'*"" ....... .......Cf. . . . .
~ CS...S~ C..."*'"
~,_
••• """9(P'HSi,a-. ...~
~~ .. .
•• ...... tM-S ......
"a model f or enabling ubiquitous, convenient, o n-demand
................... ~ .... hlkm.tlJl!rtiN .... ~ ........ network access ro a shared pool of configurable computing
....,.,.. -....111• ...... .........,ta ........... ........,. ....... ........_ ... ca
._,...,.nm..,.......... ......_.~ resources (e.g., networks, servers, storage, applications, and
llirClilwf~ . . . . ~"'~- ................................ ... services) chat can be rapidly provisioned and relea ed with
....._ •• __............. _......,.,._......,. ... w,,....,..,.
...............-.c...--................................ Ml'W" minimal management effort or service provider interacrion."
............................................ _,a... Cloud computing is often represented by a cloud symbol
.........
..,.._. ..............
~.._. .......... WI*" • • kll .... ,.,...... . . . . . . .
that indicates a network or the Internet. Cloud computing
FIGURE 7- 1 NIST definition of cloud computing. can be viewed as an onlioe SaaS and data environment sup-
5-«< "' ported by powerful computers that makes Web 2.0 possible.
r..a...w...,..._...., .. .................
..,...,.......,..~
• ._..,..
(....,..... J:gl( . . . . . , _ , . . 41 11.,.. ~-""'_..,.Olp" 0w.,,,.._._,..." ....... ,_,.,..,....,. -~,__.., ,,.......... ~~ij
-·~·-"*<'f•,...
t11ru . . __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
I'
Mobile device~ have become ubiquitous. Smartphones and tablets are now found
in personal use and across the enterprise in most organizations. Today's mobile
devices have enough computing power to provide processing "at the edge," which
means at the end of a network, in rhe user's hands. Developing apps for mobile
devices requires many new platforms, although many of today's development tools
support web-based and mobile application development at the same time.
A compan)' can choose to develop its own systems or purchase (and possibly cus-
tomize) a sofrw:ire package. These development alternatives arc shown in Figure 7-2.
Although many factors influence this decision, rhe mosr important consideration is
rhe total cost of ownership (TCO), which was explained in Chapter 4. In addition to
rhcse options, comp:inies also develop user applications designed around commer-
cial sofrw:ire packages, such as Microsoft Office, ro improve user productivity and
efficiency.
In-house syslem
software
Commercial
soltware
padtage
FIGURE 7-l Instead of outsourcing.a company can choose co develop a system in-house or
purchase and possibly aJstomize a commercial package..
with special system requirements include colleges, banks, hospitals, insurance com-
panies, construction companies, real estate firms, and airlines. Figure 7-3 shows a
typical restaurant point of sale (POS) system running on various devices. The organi-
7ations may need verrical applications to handle their unique business requirements
bur often use horizontal applications for basic business needs, such as payroll proce s-
ing and accounts payable.
FIGURE 7-3 Restaurants use vertical applications like point of sale (POS)
systems to support their unique business requirements.
Sour<e; .- •
FIGURE 7-4 Companies consider various factors when comparing in-house development with the purchase of a
software package.
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 4111.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_, .,_.,....,. -~--- tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
I'
less rime to implement a sysrem, proven reliabiliry and performance benchmarks, less
technical development staff, future upgrades chat are provided by the vendor, and
the ability to obrain input from other companies who already have implemented the
software.
LOWER COSTS: Because many companies use software packages, software vendors
spread the development costs over many customers. Compared with software
developed in-house, a software package almost always is less expensive, parricularly
in terms of initial i11vesnnent. However, even though the initial cost is less, purchased
software can involve expenses caused by business disruption, changing business
processes, and retraining employees.
(....,..... J:gi( . . . . . I_,.. 41 11.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- t fta111&....-.~~ ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
I'
standard applicarion will nor sarisfy all customers. A human resources infor-
marion sysrem is a rypical example, because each compan)' handles employee
compensation and benefics differently.
• 1 cgotiatc directly with rhe software vendor to make enhanccmcntS to meet the
project's needs by paying for the changes.
• Purchase the package and make project-specific modifications, if this is permis-
sible under the rerms of the sofrware license. A disadvantage of this approach is
that srsrems analysrs and programmers might be unfamiliar with rhe sofnvarc
and will need time to learn the package and make the modifications correctly.
Addirionally, some advanrages of purchasing a standard package disappear if
the product must be cusromized. If the vendor does the customizing, the modified
package probably will cosr more and rake longer ro obrain. Another issue is fururc
support: Although vendors regularly upgrade their standard software packages, rhey
might not upgrade a customized version. In addition, if the modifications are done by
the company purchasing the sofrwarc, when a new release of the package becomes
available, the company might have to modify the new version on it~ own, because the
vendor will not support modifications installed by the customer.
deparnnenr is responsible for providing user support. The service desk offers services
such as hotline assistance, training, and guidance to users who need technical help.
Users typically requ ire spreadsheets, dacabase management programs, and other
software packages to meet t heir information needs. If user applications access corpo-
rate data, appropriate controls must be provided to ensure data security and integrity.
For example, some files should be hidden totally from view; other-; should have read-
only properties, so users can view, bur nor change, the data.
7 .4 OUTSOURCING
r..,,...JID)r-..1-.. 4•11_.. •...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
I'
INTERNET BUSINESS SERVICES: Some firms offer Internet business ~er\ ices (lBSs),
which provide powerful web-based support for transactions such a~ order proce sing,
billing, and customer relationship managemenr. Another term for IBS is managed
hosting, because the outside firm (host) manages system operations.
An IBS solunon is attracrive to customers because it offers online data center sup-
port, mainframe computing power for mission-critical functions, and universal access
via the Internet. Many firms, such as Rackspace, compete in the managed cloud ser-
vices marker, as shown in Figure 7-5.
o,.."'.,.. , .. •
.._.. . ..,_ ........ -· -- -- --- ..
---- --.......
---
--~----,..
__..... __... .
...., .._.
_.
-- -
·- -
FIGURE 7-S Rackspace managed cloud services.
--
Sourc.1~ .o;,
7 .5 0FFSHORING
(....,..... J:gi( . . . . . I_,.. 4111.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
I'
Tumkey Services is an ASP that offers payroll and tax preparation services for hundreds
of businesses in the Midwest. The finn is considering a major expansion into accounting
and financial services and is looking into the possibility of supporting this move by hiring IT
subcontractors in several foreign countries. Turnkey's president has asked you to help him reach
a decist0n. Specifically. he wants you to cite the pros and cons of offshoring. He wants you to
present your views at a meeting of Turnkey managers next week. How will you proceed!
7 .6 SOFTWARE AS A SERVICE
In rhe tradirional model, sofrware vendors develop and sell application packages ro
customers. Typically, customers purchase licenses chat give t hem the righr to use the
software under the terms o f the license agreement. Although this model still acco unts
for a large percentage of software acq uisition, a new model, called Software as a
Ser vice (SaaS), is changing rhe picture dramaticallly.
SaaS is a model of software deploymenr in which an applicarion is hosred as a
service provided to customers over rhe lnrerner. SaaS reduces the customer's need for
software maintenance, operation, and support. ln effect, SaaS provides the funcrion-
aliry the customer needs, bur without the associated development, infrasrructure, and
maintenance costs.
In a highly compentive marketplace, major vendors constantly srrive co deliver
new and bercer ltolutions. For example, J\1icrosoft claims rhat irs SaaS plarform offers
the best solution and business value. One of their more popular consumer SaaS offer-
ing!> is Office 365, shown in Figure 7-6. This is a full-Aedged version of the tvl icro~ofr
Office smce char runs in a browser window.
Wood hul
Documents
Reunt
FIGURE 7-6 Microsoft Office 365 provides web-based access to the complete Office suite.
-
SOU'rc~ l"'l tn tC' itp01·14•,,
Selecting the besr development scrategy is an imporraot decision thac requires com-
panies co consider multiple factors. The syscems analyst has an imporcant role co
play in this decision-making process. In particular, anal)'zing the coses and benefics of
each development alcernative is a key co providing objective dara co managemenc. A
cosc-benefic checklisc can help guide chis analysis.
r..,,...JID)r-..1-.. 4•11_.. •...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Chapter 7 Development Strategies
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- t fta111&....-.~~ ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
I'
An accurate forccasr ofTCO is critical, because nearly 80o/o of roral cosrs occur
after rhe purchase of rhc hardware and software, according to Carmer, Inc. An IT
departmenr can develop irs own TCO escimares or use TCO calculation rools offered
by vendor . For example, as hown in Figure 7-7, HP Enterprise offer-; several free
TCO calcularors ro dererrnine rhe ROI of various development straregies and migra-
tion options.
......-.....,.,._..........
n_,._...,..,......._..,,.......,.~.,,"_._... ....... ..,-"...,
............
........ ............
~
~ ...........
..
~.,.,...,_--.,. c..~(TCD)
·~ --~
... .. ,,...,
"" ...................... C*:JO ................................................ ~ .....
._..,...., .. .,...._~--.,.,. .... w
................_._..
~~--_..-
..........
.. ___ __ ..... __..______
...........-... --...,..,,..__.....,
WhyS ','nd ..... TCOwtaot•: 1eM1
-
~.-.... ......_____
UM Ow R-. Mo O' l a rlun TCO - ROI~°''
Although each situation is different, the following section describes a rypical example
of the issues and tasks involved in software acq uisition.
ESTIMATE VOLUME AND FUTURE GROWTH: The analyse needs to know the
current volume of transactions and forecast futu re growth. Figure 7-8 shows volume
estimates for an ()rder processing system. In addition to current level~ , the figure
displays cwo forecasts; one based on the existing order processing procedures and
::inother char assumes a new website is operational.
A comp::irison of rhe two forecasts s hows chat the website will genera re more new
customers, process almost 80o/o more orders, and substantially reduces the need for
sa les rep~ and support staff. If in-house development is being considered, make sure
that the software and hardware can handle future transaction volumes and data
!.forage requirements. Conversely, if outsourcing is being considered, volume and
usage data is es~ential co analyze ASP fee structures and develop coi.t estimates for
outsourcing options.
r..,,...JID)r-..1-.. 4•11_.. •...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
I'
Online Order Processing System Estimated Activity During Next 12-Month Period
FUTURE GROW TH FUTURE GROWTH
(based on ex1sung (assuming new website IS
CURRENT LEVEL procedures) operational)
Customers 36,500 40,1 50 63,875
Daily Orders l,·435 1,579 2,8 11
Daily Order Lines 7,715 7,893 12.556
Sales Reps 29 32 12
O rder Processing 2 4 3
Support Staff
Producu 600 650 900
FIGURE 7-8 Volume estimates for an order processing system showing current activity levels and two forecasts: one based on
the existing order processing procedures and another that assumes a new website is operational.
Price 6 s 9
Completion Date 2 s 8
Layout/Design 8 8 5
References 10 6 3
TOTAL POINTS 26 24 25
WEIGHT
FACTOR VENDOR A VENDOR B VENDOR C
FIGURE 7 -9 The three vef\dors have che same initial raungs, but the two evaluauon models produce different
results. In the unweighted model at the top of the figure, vendor A has the highest toal points. However. after
applying we1ghong factors., vendor C is the winner. as shown in the model at the bottom of the figure.
o standard method exists for assigning the weight factors. Each firm will have
its own approach, which might be tailored to fit a specific situation. An analyse usu·
ally obtains as much input as possible and then circulates proposed values for further
comment and, hopefully, a consensus.
Evaluation models are valuable cools that can be used throughout the SDLC. A
spreadsheet program can be used to build an evaluation model, experiment with dif-
ferent weighting factors, and graph the results.
A request for quotation (RFQ) is more specific than an RFP. When an RFQ is
used, the speci fie product or service desired is already known; only price quotations
or bids a rc needed. RFQs can involve outright purchase or a variety of leasing options
and can include maintenance or tech.nical support terms. Some vendors even provide
convenient RFP o r RFQ forms on their websites. RFPs and RFQs have the same
objective: to obtain vendor replies that are clear, comparable, and responsive, so that
a well-informed selection decision can be made.
If vercical applications for specific industries need ro be locared, industry rrade jour-
nals or websites can be used to find reviews for industry-specific sofrware. Industry trade
groups can often provide referrals to companies that offer specific software solutions.
Another approach 1 to work with a consulting firm. Many IT consulranrs offer
specialized services chat help companies select somvare packages. A major advantage
of using a consultant is that rhe analyst can tap into broad experience that is difficult
for any one company to acquire. Consultants can be located by contacting profcs-
ional organizations or industry sources or simply b)' searching the Internet. Using a
consulranr involves additional expense but can prevent even more costly misrakes.
No matter what rhe topics of interest are, there are sure to be one or more on line
forum s where people gather to meet, offer support, and exchange ideas. Forums can
be hosted by private or public entities, or reside in larger communities such as Google
Groups or Reddit, which allow users to join existiug groups or start their own. A
web search can locate forums of interest, or the websites of specific companies, such
as Microsoft, and can provide a valuable source of information for IT professionals,
including biogs, forums, webcasts, and other resources, as shown in Figure 7-10.
·~I '--- -
-=
--
0
-
,~
- - DJ 0
- CJ.
-
-- ~
--- e ---
-- e
co -- ..
L>
-·-
FIGURE 7- 10 Microsoft Community is a valuable resource for IT professionals.
Sovt<tet ~ .. ,. ""
EXISTING USERS: Existing users can be contacted to obtain feedback and learn
abour their experiences. For large-scale software packages, ASPs and vendors typically
supply user references. User references are important because it must be known
whether the software package has worked well for similar companies. Be aware that
some vendors limit their reference lists to satisfied clients, so mostl y positive feedback
should be expected from those firms.
TPC
--
·-·-·-·
--- ·--··-
·--
- ----· ~
Gctxwl (1
- AHO::i , 1(1,1f1,
'" CISCO e
.If- FUJITSU
-~
IBlt IOSpur
-
- - - TTA i...,_,m
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
I'
Finally, each package should be marched against the RFP features and rank the
choices. If some features are more important rhan others, give them a higher weight
using an evaluation model similar to rhe one shown in Figure 7- 11.
To complete the systems analysis phase, the a nal)'St muse finalize the system require-
ments document, present their findings co management, a nd begin the transition ro
systems design.
performance, accuracy, and completeness of the finished system before entering the
systems design phase.
The system requirements document is like a contract that identifies what the sys-
tem developer mu t deliver co users. Recall chat system requirements are identified
during the fact-finding process, and a system requirements checklist is c reated at char
nme. Various examples of system requiremenrs are listed in C hapter 4. The i.ystem
requirements document should be written in language that users can underscand so
they can offer input, suggest improvements, and approve the final version.
Because the system requirements document can be lengthy, they should be format-
ted and organized, so it is easy co read and use. The system requirements document
should include a cover page and a detailed cable of contents. An index and a glossary
of terms can be added to make the document easier to use. The content of the sys-
tem requirements document will depend on the company and the complexiry of the
system.
(....,..... J:gi( . . . . . I_,.. 41 11.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
I'
the analyst migh t return ro fact-finding if it was discovered that an important issue
was overlooked, if users had significant new needs, or if legal or governmental
requirements c hanged.
A junior analyst at a medium-sized IT consulting firm has been asked by her manager to
draft a response to an RFP from a large company that is seeking IT consulting services in
connection with a new accounting system.
As the analyst worked on the RFP. she noticed a specific question about her firm 's
recent experience on this type of system. To the best of her knowledge. the firm has only
worked on one other accounting project in the past three years. When the manager saw
the analyst's draft response, he was upset about the way she answered the question."You
don't have to be quite that candid," he said. " Even though we only had one formal project,
we do have several people who worked on accounting systems before they came here."
"Yes," the analyst replied," But that isn't what the question is asking." As he left her
office, the manager's final comment was, "If we wan t that job, we' ll have to come up with a
better answer." Thinking about it, the analyst isn't comfortable with anyth ing but a straight
answer. Is th is an ethical question? What are her options!
7. I 0 SUMMARY
This chapter described system development strategies and the preparation and presen-
tation of the system requirements document.
Traditional systems must function in various hardware and software environ-
ments, be compatible with legacy systems, and operate within the constraints of com-
pany nerworks and desktop computing capability. Such systems utilize Internet links
and resources as enhancements. In contrast, Internet-based systems treat the web as
the platform, rather than just a communication channel. Many large companies use
web-based systems co handle enterprise-wide applications. Compared to traditional
systems, web-based systems are more scalable, less dependent on specific hardware
and software, and more adaptable to outsourcing the operation and support of a soft-
ware application.
Systems analysts must consider •veb-based development environments such as
.NET, M ERN, and various outsourcing options, including ASPs and IBSs. ASPs charge
subscriprion fees for providing application sofrware packages. IBSs offer powerful
web-based servers, software hosti ng,, a nd IT support services ro customers.
The web generation called Web 2.0 is fueling the expansion of information shar-
ing, user collaborarion, and social networking applications such a~ Twiner, Linkedfn,
and Faccbook. Another development, called cloud computing because of the com-
monly used cloud symbol for the Internet, describes an overall online software and
data environment, powered by supercomputer technology that i the ultimate form of
SaaS.
If a company chooses to handle ics own software development needs, it can create
in-house systems or purchase (and possibly customize) commercially available soft-
ware packages from a software vendor or VAR.
r..,,...JID)r-..1-.. 4•11_.. • ...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
I'
Ke y Te rms
applicauon \Ct\ ice pro' idtl (ASP) A finn chm delivers a wfrware applicauon, or aC(c.,s IO an appltca-
rion, h) chargoni; a u-.ai:c or 'ub..cnpnon fee.
h.,nchmark A mea\urc<. of rhe rime a package rak~ ro procc<s a certain numhcr of tram.1c11on,,
hu1ld or buy A choice between developmg 10-house sofrware and pur.:hasmg software, often called a
but Id or bu)', or make or buy, decision.
bu<ine<< procc<~ our<ourcing !BPOl The oucsourcing of a basic busin~s process. See a/50 outsourcing.
cloud computing An online <;<>ftware and da-i:a em~ronmenc in which applicanon' and 'crvice' arc
Jcce<.-cd and used ch rough an lncerner connection rather than on a local rnmpucer; refer> co the cloud
.,ymhol for the Internet.
evaluation .ind 'ck-.:tion team A group of people involved in ~deurni: h.irdwa rc and >Oft ware:. The group
111dudc' \)"tcm~ analy>t\ and users. A team a pproac:h cmurc' 1ha1 cnrical fnctor' arc nor overlooked
and that a sound choice is made.
evaluation model A technique rba r uses a common yardstick to mci1sure and comp.ire vendor ratings.
fixed fee model A service model thar charges a sec fee based on a specified level of service and user
supp0rt.
forum An on line di,cu,,ion on a parcicular copic, where people mecl, offer >upport, and e>echani;e idea,,
glob.ii out.,ourdni: The pracrke of ohifting IT development, >upport, and operation' w other countries.
boruon1al application A software pJckage char can be used by man) d1ffercm types of organwmons.
in-bouic >Oft\\ arc An mfonnation cenrer or help desk wubin the 11 dep.rnmem resp0ns1ble for provid-
mg user supporr and offering sen-ices such as hodme ass1sr.111ce, tr.lllltng, and gu1d.1ncc ro users who
need teduuc.il belp.
Internet hu'1nC\\ \cn;cc\ (IBS' Scn•iccs rhar provide powerful wcb-bao,cd \upport for iran•action• •uch
a• order pmce<smg, billing, and customer relariomhip management.
l~icaldc,ign The definition of an information system's fun~-rions and feature-., and rhc relanon,hip<
among ir, componenn..
maintcnam:e agr.'Cmeot A >pecification of the condiuons, ch.uge;, .ind tune fr.une for u>efi to com.1ct
the vendor for assistance when che)' have system problems or quesuons.
mal..c or bu~ The choice between de,eloping in-house sofcware and purchasmg soft\\Jre often 1s called a
make or buy, or bm ld or buy, deos1on.
man.1gcd ho,t1ng 1\n opcrarion 1< managed by the oursidc firm, or hem. t\nothcr term for me;.,
middlcware Software rhat connects dissimilar applications and enables them to commun1cacc and
e-ichangc data. For exnrnple, rniddleware can link a deparnnentnl darnba'e to a wch server rhn r can
be aClC>~ed by tlienr computers via the Tnrcmet or a company intranct.
mobile dc,·icc )nrnrtphones, cablers, and orb.er computing devices t bar Jre nor permanenrly terhered ro a
desk. T hey connect to 1he ncrwork wirelessly.
nc1 present l'alue (Nl'V} The rocal va lue of rhe beneffrs minus the tota l v.1lue of the coqs, w ith both the
cost~ and benefits being adjusted to reAecr the poinr in tome .it which t hey occur.
off~horc outmurcini: The practice of shifting IT development, su pport, and operation~ m orhcr
coumrie~.
226 Exercises
Exercises
Questions
I. List three characreristics each of rraditional and web-based development.
2. How does cloud computing support Web 2.0 applications?
3. Why would a company choose in-house sofrware de,·elopment?
4. \Vhat 1s outsourcing?
5. List two reasons offshoring may be risky.
6. What is SaaS?
7. What i!> the primary objeetive of the evaluation and selection team in ~electing a development
strategy?
8. What are the five steps in rhe sofcware acquisition process?
9. What is an RFP, and how does it differ from an RFQ?
10. Explain the relationship between logical and physical design.
Discussion Topics
I. How has the prolifcrarion of mobile devices affected IT professionals?
2. A~ more companies outsource systems development, will there be less need for in-house system~ ana-
lysts? Why or why not?
3. Select a financial SaaS applicarion, and describe its main features.
4. Suppose you rned to explain the concept of weighted evaluation models to a manager, and she
responded by asking, "So, how do you set the weight factors? ls it just a subjecti\'e guess?" I low
would you reply?
5. What decisions might managemenr reach at rhe end of the systems analysis phase, and what would be
the next step in each case?
Projects
I. lnvestigate the ROI of cloud-based software development environments.
2. t-.1any financial cools :ire developed using t-.1icrosoft E.xcel. ldeotlfy three applications builr usmg
Excel, and describe how the)' are used in an organization.
3. Visit the IT deparnnem ar your school or at a local company, and dercrmine wherhcr the sysrcms were
developed in-house or purchased. If packages were acquired, find our whar customizing was done, if
any. Write a brief memo describing the results.
4. Profile three companies rhat provide offshore sofcware development services.
5. Various firms and organizations offer IT benchmarking. Locate an example on the Internet, and
describe its ~crv i ces.
r..,,...JID)r-..1-.. 4•11_.. • ...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
PHASE SYSTEMS DESIGN
Systems design Is the third of five phases in the systems development life cycle. In the previous
phase, systems analysis, a logical model of the new system was developed. The output of that
phase, the system requirements document, is used as input to the systems design phase, where a
physical design is created that satisfies the system requirements.
The components of a system are interdependent; therefore, the design phase Is not a series of
clearly defined steps. Although work may start in one area, it is possible to be working with several
different elements at the same time. For example, a decision to change a report format might
require changes in data design or input screens. The design checklist will Include the user interface,
input and output procedures, data design, and system architecture. At the end of this phase, the
analyst prepares a systems design specification and delivers a presentation to management.
The goal of systems design is to build a system that is effective, reliable, and maintainable:
• A system is effective if it supports business requirements and meets user needs.
• A system is reliable if it handles input errors, processing errors, hardware failures, or
human mistakes. A good design will anticipate errors. detect them as early as possible,
make it easy to correct them, and prevent them from damaging the system itself. Other
characteristics of a reliable system include it being available nearly all of the time and
proper backups maintained in case of system failure.
• A system is maintainable if it is flexible, scalable, and easily modified. Changes might be needed
to correct problems, adapt to user requirements, or take advantage of new technology.
Chapter 8 focuses on user interface design. This includes human-computer interaction, seven
habits of successful interface designers, guidelines for user interface design, source document and
form design, printed output, technology issues, security and control issues. and emerging trends.
Chapter 9 focuses on the data design skills that are necessary for a systems analyst to construct
the physical model of the information system. This includes DBMS components, web-based
design. data design terms, entity-relationship diagrams, data normalization, codes, data storage
and access. and data control.
Chapter I 0 focuses on system architecture, which translates the logical design of an Information
system into a physical blueprint. This includes an architecture checklist. the evolution of system
architecture, client/server architecture, the impact of the Internet, e-commerce architecture,
processing methods, network models, wireless networks, and systems design completion.
227
r..,,...JID)r-..1-.. 4•11_.. •...__. ~....... .,...~ • ........._ . ....._.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... .., .,. ..,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Chapter 8 User Interface Design
User Interface
•
• ••• • ••
•
•••• ••••••••••• Design
...... - ·····
······----····
·····---··-··
---· --
•••••
••••• • ••
•
Chapte r 8 is the first of three chapters in the sys- The chapter includes three "Case in Point" dis-
tems design phase of the SDLC. User Interface design cussion questions to help con textualize the concepts
is the first task in this phase. Designing the interface is described in the text. The "Question of Ethics" consid-
extremely important because everyone wants a system ers the ethical (and possibly legal) constraints on how
that is easy to learn and use. This chapter explains how far the creative work of others can be used without
to design an effective user Interface and how to handle crediting the source. for example, In the design of a
data security and control issues. The chapter stresses company's website.
the importance of user feedback and involvement in all
design decisions.
r..,,...JID)r-..1-.. 4•11_.. •...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Phase l Systems Design
- - - -
Down.,,.d,
FIGURE 8 - 1 Apple has long been a. leader in creating elegant user Interlaces for Its
products.
SOUi"(~ ~ .\- In<
(....,..... J:gi( . . . . . I_,.. 4111.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase l Systems Design
FIGURE 8-2 HCI Is essential to employee product.ivicy. whether the work Is done In a
traditional office setting or on a construetion site like the one shown In this figure.
:--..·- -
-=--I.:..:.- ..-
... = ..............,,............. o.. ....... . . .... : ·•di.·•• . ~J.~ --~
,....OWl.tll~aMtir---....-
......... .,.., .. ~
..c coWiiJrw e -. j&SOCl'"'I
- .c "
:[::(~-11=---· :-~~,t
.,.,.....,.,......,a"'49 ... ~till- ....... .... otlon ·''
Olllr~ .. to ftilt
111•~·~- ...
prodllC'bMI ..,_... .,..,............. .,..._
l•chillilo:OC*:oew ..... HuMM~ - - ' • ' -·,-..Iii 1 • .. Cl)
_ ______ ' !
' I !/j
ill'Wtlt'............... ,.,,., . . ~...._,. .. ,. . . . . . . ...... .
.. _
...
............l'ld ..........."" ........... . ltd ................. '" ....
..... Ny
_,
. ...
..,...,.....,..,..........., .,..
. o.,.. ......................... ~ .. -~
AtH011wad••••... ....,..,~ .. .....,..._... . .,....,,.. . ........ td....._ •.,..,.,..
....,...,.,,_....,... ..... ,.,.,.,._..wMClw..,. ....et1n.,..ez• eacot..O•CHLM.1££t'VlS..,...C$CW ill
................."*,........... ~ ................
FIGURE 8-3 IBM's research division is a leAder in exploring human-computer
interaction (H CI).
Sowc•
Because I ICI has a major impact on user productivity, it get!. lots of anention-
espccially where multimillion-dollar issues are concerned. For example, in the article
"Human-Computer lnceraccion in EJeccronic Medical Records: From the Perspect ives
of Physicians and Dara ciencisrs" by E. Bologva er al. from Procedta Computer
Saence 100 (Elsevier, 2016), che authors describe how software usability has a major
impact on rhe medical profession, a nd noc everyone is happy about it-par ticularly
phy)icians who often struggle with electron ic health records ( !:'. HR\ ) systems that
are poorly designed. In her article, 1'1s. Ga rdner points out that physicians often
multirask, answering a question about one patient while writing a prescnpnon for
another, and EHR sofrware was nor designed around char rypc of workflow.
Casual Observer Software's main product is a program that monitors and analyzes user key-
strokes and mouse clicks to learn more about the way employees use their computer systems.
The problem Is that some users feel this is an unwarranted intrusion into their privacy. and
they prefer not to be observed. Some even fear that the data would be used for other reasons,
including performance appraisal. You are a consultant who has been hired by a client firm that is
trying to decide whether or not to use this software.
Before you advise the client, remember the Hawthorne effect, which suggests that
employees might behave differently when they know they are being observed. Finally,
think about the ethical issues that might be involved in this situation. What will you
advise your client, and why?
Although IT professionals have different views about interface design, most would
agree rhar good design depends on seven basic principles. Successful interface designers
use these basic principles as a matter of course-they become habits. These desirable
habits are described in the following sections.
r..,,...JID)r-..1-.. 4•11_.. •...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Phase 3 Systems Design
muhiple windows on a single screen and transfer data between programs. If the inter-
face supports data entry, it must follow the guidelines for data entry screen design
that are discussed farer in this chapter.
The user interface should include all tasks, commands, - Pnnt Grade
-
I
and communications berween users and the information
system. The opening screen should show the main options
Register
SludenlS I Repof1S
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f •,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase l Systems Design
Main Menu
FIGURE 8-6 This menu hierarchy shows casks. commands. and functions organized into
logical groups and sequences. The structure resembles a functional decomposition diagram
(FOO). which is a model of business functions and processes.
2. Create alphabetical menu hsrs or place che selectioas used frequently at the
top of the menu list. No universally accepted approach co menu item place-
ment exists. The best strategy is co design a prototype and obtain feedback
from users. Some applicacioas even allow menus to show recently used com-
mands first. Some users like char feature, but ochers find it distracting. The best
approach is to offer a choice and lee users decide.
3. Provide shorrcurs for experienced users so they can avoid multiple menu levels.
Shortcuts can be created using hot keys that allow a user to press rhe Ale key +
the underlined lener of a command.
4. Use default values if the majority of values in a field are the same. For example,
if 90% of the firm's customers live in Albuquerque, use Albuquerque as the
default va lue in the City field.
5. Use a dup licate vnluc function that enables users co insert the value from the
same field in the previous record, bur allow users to turn this feature on or off
as they prefer.
6. Provide a fast-find feature chat displays a list of possible values a11 soon as users
enter the first few letters.
7. Lf available, consider a natural language feature chat allows users to type
commands or rcquesrs in normal text phrases. For example, many applica-
t1ons allow users to request Help by typing a question into a dialog box. The
software chen uses natural language technology to retrieve a list of topics that
Help Topics
Register Studeflts
Enter Grades
3. Provide a direct route for users co return co the point from where help was
requeMed. Title every help screen co jdentify the topic, and keep help cext sim-
ple and concise. lnserr blank lines between paragraphs to make Help easier ro
read, and provide examples where appropriate.
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f •,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~---tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase l Systems Design
___...._............
... __.... .
8.4.6 Enhance the Interface
__
__
....
_,.,,.,..
-
.............
...,..,. A designer can include many features, such as menu bars,
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 4111.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- t fta111&....-.~~ ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase l Systems Design
screen. The addition of che picrure showing cax professionals ready co help
provides a en e of calm and confidence co che user-someching parricularly
imporcanc for users who are likely co be confused and/or nervous when begin-
ning the cax prepararion process.
2. Use a conunand buHon co initiace an action such as printing a form or request-
ing help. For example, when a user clicks the Find Student command button in
Figure 8-9, a dialog box opens wich instructions.
• - 0 x
- ..
STUDENT REGISTRATION SYSTEM Cont.ct IT Help at Ext. 2236
for user support
-..1cv...
r 2019-2020
-- ,_-
Courses
Pref · • Nutnbel • SKtJon • Find Student -r-ltudtnU
MAT lU 2
"'~""'
-by•h«llrit U., ol
OS l Print Record
-· IUS
HELP
Fond~ a x
• P!Nse ent~ a SocYl Security Numbe<.
use the format w u ·UU.
FIGURE 8-9 A dar.a enrry screen for a student registration system.This screen uses several design reacures
that are described in the text. When a user dicks the Find Student command button. a dialog box ls displayed
with instructions.
7. Use liq boxe~ rhar display rhe ava ilable choices. If rhe lisr docs n ot fir in rhe
box, a scro ll bar allows the user ro move through the available choices. Also, be
sure ro provide another way ro enter data rhat does not align with a specific lisr
choice.
8. Use an option b utton, or radio bunon, to control user choices. For exa1nple,
if the user can select only one option, display a smtable message (Choose one
item), but if chere is no restriction, display a d ifferent message (Choose all that
apply). Use a black dot to show selected options.
9. If check b oxes are used to select one or more choices from a group, show the
choices with a checkmark or an X.
10. \Xlhen dares must be entered, use a calendar control that allows the user to
select a dare that rhe system will use as a field value.
4 I I --- -. o --
...
--
a--
- -
----·-----
--
. -.....
-- ,_
FIGURE 8-10 In this data entry screen for creating ewints. the system generates start and end
dates and times automatically, but these can be changed by the user at any time.A red asterisk, as
shown beside Event Title, indicates required fields. Gray text within the data entry field leis the user
know what information to provide.This text is replaced with user input.
,......,
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 4111.,.. .................,.t11ru
~- )U,
..,...,...... .,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~ c.....,..~
0w.,,,.._.._,..."-,.._..,.,_, .,_.,....,. -~--- t fta111&....-.~~ ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase l Systems Design
3. Provide a way ro leave rhe data enrry screen ar any time without entering the
current record, such as a "Cancel" burron. Since che application shown in
Figure 8- I 0 is web based, chis can be accomplished by selecting the" Back"
bunon of rhe browser (not shown).
4. Provide a descriptive caption for every field, and show the user where co enter
the data and che required or maximum field size. Typically, wluce boxes show
the location and length of each field. Other methods used to indicate field loca-
tions are video highlighting, underscores, special symbols, or a combination of
these features.
5. Provide a means for users co move among fields on the form in a standard
order or 111 any o rde r the) choose. In a GUI, the user can override the standard
field order and select field locations using the mouse or arrow keys.
6. Allow users co add, change, delete, and vie'v records. Messages such as Apply
these changes? (YIN) o r Delete this record?. (YIN) should requfrc users co
confirm the accions. Highlighting che letter N as a defaulc response will avoid
problems if the user presses the Enter key by mistake.
7. Design rhe screen form layout ro march the layout of the source document. If
the i.ource dc>cumenr fie lds srarr at the mp of the form and run down in a col-
umn, the input screen shou ld use the same design.
8. Display a sample format if a user must enter values in a field in a specific for-
mat. For example, provide an on-screen instruction ro let users know that rhe
dare format is MMDDYY, and provide an example if rhe user must enter sepa-
rators, such as slashes.
9. In addition to rhe sample format in che preceding rule, it might be better to
use an mput mas!-, which is a template or pattern that reMricts data entry
and prevents errors. Microsofr Access provides standard input masks for
fields such as dates, telephone numbers, postal codes, and Social Securit)'
numbers. In adduion, custom inpur masks can be c reated, as shown in
Figure 8-1 1. Note char a mask can have a specific format. For example, if a
user enters cext in lowercase letters, che input mask will capitalize the first
letter auromarically.
10. Require an ending keystroke for every field. Pressing the Enter key or che Tab
key should signify the end of a field entry. Avoid a design char moves auromar-
ically 10 rhe next irem when rhe field is full. The latter approach requires an
ending keystroke only when the data entered is less rhan the maximum field
length. It is confusing rouse two different dara entry procedures.
11. Do not require users to type leading zeroes. for numeric fields. For example,
if a three-digit projecr number is 045, rhe operator should be able to type 45
instead of 045 before pressing the Enter key. An exception to that ru le might
occur when entering a date, where a leading zero is needed to identify single-
digit monchs or days, such as 06-04-2013.
12. Do not require users to type trailing zeroes for numbers that include decimals.
For example, when a user rypes a value of 98, the system should interpret che
value as 98.00 if the field has been formatted to include numbers with rwo
decimal places. The decimal point is needed only ro indicate nonzero decunal
places, such as 98.76.
13. Display default values so operators can press the Enter key to accept the sug-
gested value. If the default value is not appropriate, the operator can change ir.
. .
Hllp
-
..l_..... ............ p
__---.------
...........
... ............. -
......,..__ ...........
--
---
-- --
-·--
.,__ ,............__ .......... .,..,,..
.........................................
---
-
Q:li. \lt- tti.l
- . .__
__
..,.- - - - - - . .. . . .c -.. - • • •
....c- ... _.,.....__ ... ......,....._ ....
._, ..-
--~---__,.
________-.---
- -... ...................... ......,....,.. ................
•
. .
Htlp
... p
• uw..._.. ....... .i . . .
t u... ................
'----·-
llW•-·--
.. * ................
.. ....- ..........
..._ __ ........ _.. .,...
' ~---·-
14. Use a default value when a field value will be constant for successive records or
throughout rhe data entry session. For example, if records are input in order by
dace, the dare used in che first transaction should be used as the default date until
a new date is entered, at which time the new date becomes the default value.
15. Display a list of acceptable values for fields, and provide meaningful error
messages if the user enters an unacceptable v:ilue. An even better method, which
was described under Rule 5: Enhance the Imerface, is co provide :i drop-down list
box containing acceptable values that allows the user co select a value by clicking.
16. Provide users with an opportunity to confirm the accuracy of input data before
entering it by displaying a message such as, Add this record? (YIN). A positive
response (Y) adds the record, clears the entry fields, and position~ rhe insertion
point in the first field so the user can input another record. If rhe response is
negative (N), the current record is nor added and the user can correct the errors.
(....,..... J:gi( . . . . . I_,.. 41 11.,.. ~- )U, Woip-M ._..,.. - ·~•-fllllie<'f •,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. - ~---tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
-
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~
Phase l Systems Design
Dara enrry screens should also anricipare furure needs. Consider a parts invenror}'
database rhar contains a one-character field for category, such as elecrrical, mechan-
ical, or hydraulic. The design works well, bur whar if rhe compan)' decides ro break
these overall groups down inro more specific segmenrs? A bener design would antic-
ipate pos~ible expansion ro two or more characters. For example, in 1999, there was
widespread concern about whar was called rhe Y2K issue because many older pro-
grams used only rwo characters co store the year and might not recogni1e the start of
a new century.
• p
.......
--
~-------
... --___
...,,
•
.. ...____
..... _....
,...,._
.....
-·- ....-----.-.---
_____ --.__.....,.
...-... ..._.. _._._
.....____..,
--~
• •
. ---.........
-·•mtiau
..•
- ..........
............. -_...51111 . __._ ,....,_
s... ........................ _............
-~ ..... .._,
____ ,,,,. _ _ _ _
.......,......
~
I. A sequence check can be used when the data must be in some predetermined
sequence. If the user musr enter work orders in numerical sequence, for example,
then an our-of-sequence order number indicates an error, or if rhe user must
enter transactions chronologically, then a transaction with an out-of-sequence
dare indicates an error.
2. An existence check can apply to mandatory data items. For example, if an
employee record requires a Social SecUiity number, an existence check would
not a llow the user to save the record until he o r she enters a suitable value in
the Social Security number field.
3. A da ra I ) pc check can rest to ensure that a data item fits the required data
type. For example, a numeric field must have on ly numbers or numeric sym-
bols, and an alphabetic field can contain only the characters A through Z (or a
through z).
4. A ra nge check can be used to verify that data items fall between a specified
minimum and 1naximum value. The daily hours worked by an employee, for
example, must fall within the range of 0 to 24. When the validation check
involves a minimum or a maximum value, but nor both, it is called a limit
check. Checking t hat a payment amount is greater than zero, but not specifying
a maximum value, is an example of a limit check.
5. A reasonableness check identi fies values that are questionable bur not neces-
sarily wrong. For example, input payment values of $0.05 and $5,000,000.00
both pass a simple limit check for a payment value greater than zero, and yet
both values could be errors. Similarly, a daily-hours-worked value of 24 passes
a 0 to 24 range check; however, the v:tlue seems unusual, ,1nd the system should
verify it using a reasonableness check.
6. A validi ty check can be used for data items that muse have cerrain values. For
example, if an invenrory system has 20 valid item classes, then any input item
that docs nor march one of the valid classes will fail rhe check. Verifying that
a cusromer number on an order marches a customer number m rhc customer
file is another rypc of validity check. Because the value entered musr refer ro
another value, tha t type of check also is called referential integrity, which is
explained in Chaprcr 9, Dara Design. Another validity check might verify thar a
new cusromer number does nor march a number already stored in the customer
master file.
7. A combina tion check is performed on rwo or more fields to ensure that they
arc consistent or reasonable \Vben considered together. Even though all rhe
fields involved in a combination check might pass their individual validarion
checks, rhe combination of the field values might be inconsistent or unreason-
able. For example, if an order input for 30 units of a particula r item has an
input discount rate applicable on ly for purchases of I 00 or mo re units, then
the combination is inval id; either the input order quantity or the input discount
rare i~ incorrect.
8. Barch controls are totals used to verify batch input. Batch controls might check
data items such as record counts and numeric field torals. For example, before
entering a batch of orders, a user might calculate the total number of orders
and rhe sum of all the order q uantities. When the batch of orders is entered,
the order system also calculates the same two totals. lf the system corals do
(....,..... J:gi( . . . . . I_,.. 41 11.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- t fta111&....-.~~ ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase l Systems Design
nor match the input totals, then a data entry error has occurred. Unlike rhe
other validation checks, batch controls do nor idenrify specific errors. For
example, if the sum of all the order quantities does not march rhe batch control
total, the only thing known is that one or more orders in that batch were
entered incorrecrly or nor input. The batch control totals often are called ha ~h
total ~ because they are nor meaningful numbers themselves but are useful for
comparison purpo~es.
Suppose you are a systems analyst swdying the order processing system at Boolean Toys. a
fast-growing developer of software for preschool children. You know that many data entry
users have complained about the input screens. Some users would prefer to rearrange the
order of the fields. others would like to change the background color on their screens. and still
others want shortcuts that would allow them to avoid a series of introductory screens.
What if Boolean's users could customize their own data entry screens without assis-
tance from the IT staff by using a menu-driven utility program? What wou ld be the pros
and cons of such an approach1When should a systems analyst decide a design issue, and
when should users be allowed to select what works best for them?
No marrer how data enters a n information system, the quality of the output is
only as good as the quality of the input. The term garbage in, garbage out (G IGO)
is fami liar to IT professionals, who know that the best time to avoid problems
is when the data is entered. The main objective is to ensure the quality, accuracy,
and timeliness of input data. Unfortunately, the dream of a "paperless office" has
never been realized. Even with RFlD technology and automated data capture, we
still enter data on source documents and fo rms, and instead of a human-computer
interface, systems analysts muse deal with the challenge of a human-paper
interface.
A ~ource document collects inpur dara, rriggers or authorizes an input acrion,
and provides a record of the original transaction. During the input design stage, the
analyst develops source documents that are easy to complete and u e for dara entry.
Source documents generally are paper based but also can be pro,ided online. Eicher
wa)', the design considerarions are che same.
Consider a rime when it was a srruggle to complete a poorly designed form. There
mighc have been insufficient space, confusing instructions, or poor organ1.l.3non-all
symptoms of incorrect fonn layout.
Good form la)'OUt makes the form easy to complete and provides enough space,
both vercically and horizonrally, for users to enter the data. A form should indicate
data entry positions clearly using bla nk lines or boxes and descriptive captions. Also
consider using check boxes whenever possible, so users can select choices easily. How-
ever, be sure to include an option for any input that does not match a specific check
box.
The placement of information 011 a form a lso is important. Source documents
typically incl ude most of the zones shown in Figure 8-13. The heading zone
usua lly contains the company name or logo and the title and number of the
form. The control zone contains codes, identification information, numbers, and
dates rhat are used for storing completed forms. The instruction zone contains
instructions for completing rbe form. The main part of the form, called rhe body
zone, usually cakes up at least half of the space on the form and contains captions
and areas for entering variable data. If rota ls are included on the form, they
appear in the totals zone. Finally, the authorization zone contatns any required
signatures.
r..,,...JID)r-..1-.. 4•11_.. •...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Phase l Systems Design
Heading Control
Zone Zone
lnstructioo Zone
Body
Zone
Totals
Zone
Authorization Zone
lnformanon shou ld flow on a form from left co right and top to bottom to match
the way users read documents naturally. That layout makes the form easy to use for
the individual who completes the form and for users who enter daca into the system
using the completed form.
The same user-friendly design principles also apply to printed forms such a~
invoices and monthly statement , except that heading information usuall)' 1s pre-
printed. Column headmgs should be short but descriptive, avoiding non!>tandard
abbre\lat1on!>, wtch reasonable spacing becween columns for bener readability.
The order and placement of printed fields should be logical, and totals should be
identified clearly. When de~igning a preprinted form, contact the form's vendor for
advice on paper sizes, rype styles and sizes, paper and ink colors, field placement, and
other important form derails. The goal is to design a form that is anractive, readable,
and effective.
Layout and design a lso are important on web-based forms. TI1ere arc many
resources that will help with designing efficient, user-friendly forms. These include
websites that muse conform to the U.S. Federal Government's accessibi lity guidelines,
which can be found o nline ar http://www.section508.gov.
• When and how will the information be delivered, and how ofren must it be
updated?
• Do security or confidentialiry issues exist? How will they be managed?
The design process should not begin until these questions have been answe red.
ome information probably was gathered during the systems analysis phase. To gain
more understanding, the analyst should meet with users to find out exactly what kind
of output they are requesting. Prototypes and mock-ups can be u~ed to obtain feed -
back throughout the design process.
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- t fta111&....-.~~ ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase l Systems Design
REPORT HEADER.S AND FOOTERS: Every report should have a report header and
a report footer. The report header, which appears at the beginning of the report, iden-
tifies the report and contains the report title, date, and other necessary information.
The report footer, which appears ac che end of rhe report, can include grand totals for
numeric fields and ocher end-of-report information. as shown in Figure 8-14.
PAGE HEADERS AND FOOTERS: Every page should include a page header, which
appears at the rop of rhe page and includes the column headings that identify the
Store
Number
Emp loyee
Name Position
Regular
Hours
Overtime
Hours
Total
Hours } page header
Number field
FI GU RE 8 - 14 The Employee Hours report is a detailed report with concrol breaks, subtotals, and grand totals. N ote that a report
header identifies the report. a p~ge header contains column headings, a group footer contains subtotals for each score. a report
footer contains grand totals, and a page footer identifies the page number.
data. The head ings s hould be shorr but descriptive. Avoid abbreviations unless the
users will unde rstand them clearly. Either a page header or a page footer, which
appears ar rhe borrom of the page, is used ro display rhe report title and the page
number.
Database programs such as Microsoft Access make it easy ro create groups and
!>ubgroup~ based on particular fields. The report can also calculate and display torn Ii.,
average~, record counts, and orher data for any group or subgroup. For example, a
large company might want to see total sales and number of sales broken down by
product within each of the 50 stares. The information shown in Figure 8-15 is part
of Acct!l>!>' on line help that refers co a step-by-step process for creating multilevel
group mg.
lnlonna1lon IS often - ID undlnland when~ IS - inlO groupL For_,_., . report lhet groups
- by NglOn can hlgllloghl tnnds tNll ,,._,.. moghl go u11110Ciced In lddi1'0t\ ~ tOCllll c.ICh a
...... or a>•~ ot lhl tnl ol wh graup., your repor1 can replKe a lol ol menuel ln!inclO'l ,..th 1
ClbAa!or
.-.:c.a mel;ee worldng "'"" giouped teports 911SY. 'lb.I Cll1 . . . . . . bulc grouped report by ...ng lhl
~ Wlzald. )IOU can edd ~ng and son.>g to an OXlltJng t9pOtl. or )IOU can - grouping and
IOt""O Oll(IOnt tnet have en.ly been dellned.
Not•: Tl* -
pUllll9l1 Ol'lllne
_ , , llllPll' "'----tho kind"' d i ! _ you deolgn- - .,.,
In this article
C..ata a quick grouped or sorted report
CONSISTENT DESIGN: Look and feel are important to users, so reports should
be uniform and consiscenr. When a system produces multiple reports, each reporr
should share common design elements. For example, the date and page numbers
should print in the same place on each report page. Abbreviations used in reporcs also
should be consistent. For example, when indicating a ntuneric value, it is confusing
for one reporc to use#, anorher NO, and a chi.rd NUM. ltems in a report also should
be consistent. ff one report displays the inventor)' location as a shelf number column
followed by a bin number column, that same layout should be used on all inventory
location reports.
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase l Systems Design
DETAIL REPORTS: A derail report produces one or more lines of ourpur for each
record processed. Because it contains one or more lines for each record, a derail
report can be quite lengthy. Consider, for example, a large auto parts bu5iness. If the
firm stocks 3,000 parts, then rhe derail report would include 3,000 derail lines on
approximately 50 printed pages. A user who wants to locate any part in short supply
has ro examine 3,000 derail lines ro find the critical items. A better alternative might
be an exceprion reporr.
EXCEPTION REPORTS: An exception report displays only those records that meet
a specific condinon or conditions. Exception reports are useful when the user wanrs
information only on records char might require action bur does not need to know the
derails. For example, a credit manager might use an exception report ro identify only
those customers with pasr-duc accounts, or a customer service n1anager might want a
report on all packages tha t were not delivered wi-rhin a specified time period.
Lazy Eddie is a furniture chain specializing in recliners. Their management has asked you to
review the large number of printed reports that are distributed to Lazy Eddie's 35 store
managers. Management is not sure that the managers actually read or use the reports,
even though the store managers say they want them. Store visits have shown many of the
reports end up sucked on top of filing cabinets. seemingly untouched.
To determine if store managers really use the p rinted reports. management has asked
you to create a procedure that requires users to review and justify their information
needs. You could design a form that asks if the information still is required, and why. You
could try to get users co decide if a report is worth che cost of producing it. How do you
proceed!
8. 7 TECHNOLOGY Issues
Unlike early innovations such as the mouse and the inkjet printer, most tech nology
advances today affect both output and input. In a very real sense, output and input
have become interdependent, as rhey are in a user interface, and it is difficult to cite
examples of changes in one that wo uld acn cause, or at least encourage, changes in
the other. For example, new touch-screen input technology generates output that
must be properly designed and sized for a panicllllar device, which might be a smarc-
phone, a tablcr, or a 23-inch desktop monitor.
The following sections discuss outpur and input technology separately, bur inter-
face designers should always be al ere to the possible opportunities, or potential prob-
lems, of input/output linkage.
r..,,...JID)r-..1-.. 4•11_.. •...__. ~....... .,...~ • ........._ . ....._.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... .., .,. ..,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Chapter 8 User Interface Design
8.7.1 OutputTechnology
Alrhough business information systems srill provide mosr output as screen di~plays
and printed matter, technology is having an enormous impact on how people com-
municate and obtain information. This rrend is especial!)' important ro firms char
use informarion technology to lower their costS, improve employee producriv1ry, and
communicate effectively with their customers.
In addirion to screen output and printed matter, output can be delivered m many
wa)'S. The system requirementS document probably identified user output needs.
Now, in the systems design phase, rhe analyst creates the actual forms, reports, doc-
uments, and orher rypes of output that might be accessed from workstarions, note-
books, tablets, smarrphones, and other devices. How the information will be used,
stored, and retrieved must also be considered. The following subsections explain va ri-
ous output types and technologies.
BLOGS: \Xleb-based logs, called biogs, are anorher form of web-based output.
Because biogs are journals written from a particular point o f view, rhey nor only
deliver facts to web readers bur also provide opinjons. Biogs are useful for po~ting
news, reviewing currenr events, and promoting products.
(....,..... J:gi( . . . . . I_,.. 4111.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase l Systems Design
DIGITAL AUDIO, IMAGES, AND V I DEO: Sounds, images, and video clips can be cap-
tured, srored in d1g1ral format, and cransmirred as output to users who can reproduce
the content.
Audio or video ourput can be attached to an email message or inserred as a clip in
a Nlicrosofr \Xlord document. Businesses also use automated systems to handle voice
transactions and provide information ro customers. For example, using a telephone
keypad, a cusromer can confirm an airline seat assignment, check a credir card bal-
ance, or derermine rhe current price of a mutual fund.
If a picture i!> worrh a rhousand words, then digital images and video clips cer-
tainly are high-value ourpur types char offer a whole new dimension. For example, an
insurance adjuster with a digita l camera phone can take a picture, submit the image
via a wireless device, and receive immediate authorization to pay a claim on the bpOt.
1f unages are a valuable form of output, video clips are even better in some situations.
for example, video clips provide online virtual tours that allow realtors to show off
the best features of homes they are marketing. The user can zoom in or out and rota re
the iJnage in any direction.
PODCASTS: A podcast is a specially formaned digital audio file that can be down-
loaded by internet users from a variety of content providers. Many firms use podcasts
as sales and marketing cools and to communicate witb their own employees. Using
software such as iTunes, users can receive a podcast, launch the file on tbeir computer,
and store it on their porrable player. Podcasrs can include images, sounds, and video.
COMPUTER OUTPUT TO DIGITAL MEDIA: This process is used when many paper
docun1ents muse be sc::inned, stored in digital format, and retrieved quickly. For exam-
ple, if an insurance company stores rhousands of paper applic::ition forms, special
software can treat the documents as data and extract inforn1ation from a particular
column or area on rhe form. Digita l storage media can include n1agnetic tape, CDs,
DVDs, and high-density laser disks.
• Auromaric relier machines (AT Ms) that can process bank transacrions and
print deposir and withdrawal slips
• Special-purpose printers rhat can produce labels, employee ID cards, driver's
licenses, gasoline pump receipts, and, in some states, lottery rickets
• Plotters that can produce high-quality images such as blueprints, maps, and
electronic circuit diagrams
• Electronic detection of dara einbedded in credir cards, bank cards, and
employee identification cards
8.7.2 lnputTechnology
Input rechnology has changed dramarically in recent years. ln addition ro traditional
devices and methods, there has been a rapid expansion of new hardware and ways to
capture and enter data into a system, some of which are shown in Figure 8-16. Busi-
nesses are using the new rechnology to speed up the input process, reduce cosrs, and
capture daca in new forms, such as digital signatures.
INPUT TECHNOLOGY
FIGURE 8- 16 Input devtees can be very traditional or based on the latest technology.
BATCH INPUT: Using batch input, data entry usually is performed on a specified
rime schedule, such as dai ly, weekly, monthly, or longer. For example, batch input
occurs when a payroll department collcctS rime cards at the end of the week and
enters the data as a barch. Anorher example is a school that enters all grades for the
academic term in a batch.
ONLINE INPUT: Although batch input is used in specific situations, most busi-
ness activity requires o nline data en t ry. The online method offers major advantages,
including the immediate validation and availability of data. A popular online input
method is ~o u rce da ta a uto mation, which combines online dara entry and automated
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 4111.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~---tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase l Systems Design
data capture using input devices such as radio frequency idenrificario n(RFID) tags,
magnetic data srrips, or even smarrphones. Source data automation is fast and accu-
rate and minimizes human invokement in the translation process.
~1any large companies use a combination of source daca automation and a pow-
erful communication network to manage global operations insranrl)'· Some common
examples of source data automation are as follows:
• Businesses that use point-of-sale (POS) terminals equipped with bar code scan-
ners and magnetic swipe scanners ro input credit card data
• Automatic teller machine (ATMs) that read data srrip on bank cards
• Factory employees who use magnetic ID cards to clock on and off specific jobs
so the company can track production coSts accurately
• Hospitals that imprint bar codes on patient identification bracelets and use
portable scanners when gathering data on patient treatment and medic:ition
• Retail stores that use porrablc bar code scanners to log new shipments a nd
update inventory dara
• Libraries that use hand held scanners co read optical strips on books
TRADE-OFFS: Although on line input offers man y advantages, it does have some dis-
advanrages. For example, unless source data automation is used, manual data entry
is slower and more expensive than batch input because it is performed at the rime the
transaction occur5 and often done when computer demand is at its highest.
The decision to use batch or online input depends on business requirements. For
example, hotel reservations must be entered and processed immediately, bur hotels
can enter their monthly performance figures in a batch. ln fact, some input occurs
naturally in batches. A cable TV provider, for example, receives customer paymenrs an
batches when the mail arrives.
tasks must be performed. First, limit the number of printed copies and use a tracking
procedure to account for each copy. \'(Then printed ourput is distributed from a central
location, !>pecific procedures should be used ro ensure th3t the output is delivered to
3Uthonzed recipienrs only. Thar is especially true when reports contam sensirive infor-
m3non, such 3S payroll data. All sensitive reporrs should be stored in secure 3re3s. All
p3ges of confidential reports should be labeled appropriately.
As shown 111 Figure 8-17, it is important to shred sensitive reporcs, our-of-date
reporrs, and output from aborted print runs. Blank check forms must be stored in a
secure loc3tion and be inventoried regularly to verify that no forms 3re missing. If sig-
narure scamps 3re used, they must be stored in a secure locanon away from the forms
storage location.
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase l Systems Design
Every piece of informarion should be craceabJe back ro the inpur dara rhar
produced ir. Thar means rhe analysr muse provide an audir rrail rhat records rhc
source of each dara ircm and when ir enrered the sysrem. In addirion ro recording
the original source, an audi r rrail must show how and when data 1s accessed or
changed, and by whom. All those actions must be logged in an audic rrail file and
monirored carefull}.
A company must have procedures for handling source documents co ensure char
data is nor lost before ic cnrers che system. All source documents char origmare from
outside rhe organi1.acion should be logged when they are received. Whenever source
documents pass between dcparnnenrs, che transfer should be recorded.
Data securit)' policies and procedures protect dara from loss or damage, which is a
viral goal in every organization. If the safeguards are nor 100% effective, dara recov-
ery utilities should be able co restore lost or damaged data. Once data is entered, che
company should srore source documents in a safe locacion for some specified length
of time. The company should have a records rerention policy that meets all legal
requirements and business needs.
Audit trail files and reports should be stored a nd saved. Then, if a data file is
damaged, the information can be used to reconstruct the lost data. Dara security
also involves protecting data from unauthorized access. System sign-on procedures
should prevent unauchorized individuals from enttering rhe sysrem, and users should
change their passwords regularly. Having several levels of access also is advisable. For
example, a data enrry person mighr be allowed co view a credit Limit but nor change
ic. Sensitive data can be encrypted, or coded, in a process called encryption, so only
users wich decoding software can read ir.
8. 9 EMERGING TRENDS
The user interface conri nues ro evolve. The widespread use of mobile devices such
as the iPad and other tablcrs, coupled with the ubiquiry of the iPhone and ocher
smarcphones, has greacly influenced user inrerface design. lndeed, key user experience
lessons from chese devices have been rcflecced back into the user interface for main-
scream operaring sy~rems such as Mac OS X and Microsoft Windows.
le is d1fficulc ro predict the future, but the introducrion of che Apple \Xlacch, G<x>-
glc's Wear OS, Ficbit's fimess crackers, and other wearable devices promises ro furrher
shake up user incerface design principles. Advanced technology will supporr rhe evo-
lurion, but rhe real driving force will be user empowerment, which re~u lts in customer
:.atisfacrion, increased producrivity, and bottom-Line savings.
8.9.3 Prototyping
Prototyping produces an early, rapid ly conscructed working version o f the proposed
information system, called a procotype. Prototyping, which involves a reperirive
sequence of analysis, design, modeling, and testing, is a common technique rhac can
be used co design a nything from a ne w home co a computer network. For example,
engineers use a prororype co evaluate an aircraft design before production begins, as
shown in rhe wind runnel testing in Figure 8- 18.
User inpur and feedback is essenrial ar every srage of the systems devclopmcnr
process. Prororyping allows users co examine a model rhar accurately represenrs
sysrem o urpurs, inpurs, inrerfaces, and processes. Users can " tesr-drivc" rhc model in
a risk-free environmenr a nd eirher approve ir or request changes. In some siruarions,
the protorype evolves inro the final version of rhe information system. In orher
cases, rhc prororype is inrended o nly ro validate user requirements and is disca rded
afterward.
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase l Systems Design
Perhaps the most intense form of prororyping occurs when agile methods are u~cd.
As described in Chapter I, agile methods build a sysrem by creating a series of pro-
totypes and constanrly adjusting them to user requirements. As the agile process con-
tinues, developers revise, extend, and merge earlier versions into the final product. An
agile approach empha~i1es continuous feedback, and each incremental step •~affected
by what was learned in the prior steps.
Systems analysts generally use two protoryping methods: system protoryping and
design protoryping.
Planning
Implement
the system
• S>•Stcms analysts can use a prototype ro develop resring and training procedures
before rhe finished sysrem is available.
• Prototyping reduces the risk and potential financial exposure char occur when
a finished system fails co support business needs.
Alrhough most systems analysts believe rhar rhe advantages of prororypmg far out-
weigh any disadvantages, the following porenrial problems should be considered:
• The rapid pace of development can creare quality problems, which are nor dis-
covered until the finished system is operarionaJ.
• Other sysrem requiremenrs, such as reliability and mamtainabiliry, cannot be
rested adequately using a prororype.
• In very complex systems, the prototype can become unwieldy and difficult ro
manage.
• A client or user might wanr to adopt the prototype with few to no changes,
mistakenl y thinking that the prororype will meet their needs though it may
need further customization, leading to increased maintenance costs later in che
SDLC.
One of the systems analysts on the project team thought that he dad a good job of design-
ing the company's tech support webpage, but his supervisor isn't so sure. His supervisor is
concerned that the design is very similar to a page used by the company's major compet-
itor, and she asked him whether he had used any HTML code from that site in his design.
Although the analyst didn't copy any of the code. he did examine it in his web browser to
see how they handled some design issues.
The supervisor asked the analyst to investigate webpage copyright issues and report
back to her. In his research, the analyst learned that outright copying would be a copyright
violation, but merely viewing other sites to get design ideas would be permissible. What
is not so clear is the gray area in the middle. The analyst asked you, as a friend, for your
opinion on this question: Even if no acrual copying is involved, are there ethical constraints
on how far you should go in using the creative work of others! How would you answer!
8. I 0 SUMMARY
The chaprer began with a discussion of user inrerface design and HCI concepts. A
GUI uses visu::tl objects and techniques tha r allow users to communicate effecrively
with the system. User-centered design principles include understanding rhe business,
maximizing graphic effectiveness, thinking like a user, using models and prororypes,
focusing on usabiliry, inviting feedback, and documenting everything.
When designing rhe user inrerface, it should be transparent; create an inrerface
that is easy to learn and use; enhance user productivity; make ir easy ro obtain help or
correct errors; minimize inpur dara problems; provide feedback; create an attractive
layout and design; and use famjliar terms and images. Control features, such as menu
r..,,...JID)r-..1-.. 4• 11_.. • ...__. ~... . ... .,...~ • ........._ . ....._.,.,.. o-... ..,._.,,.,.. _ ..,.~ ,........., ................. .._... .., .,. ..,.~"
................... ..., ...................... .... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Phase l Systems Design
8.10 Summary 26 1
bars, toolbars, drop-down lisr boxes, dialog boxes, toggle burrons, list boxes, oprion
burrons, check boxes, and command burrons can also be added. Controls are placed
on a main swirchhoard, which is like a graphical version of a main menu.
The discussion of input design began with a description of source documents and
the various 1.ones in a document, including the heading zone, the control zone, rhe
instruction zone, the body 1one, the totals zone, and the authorization 1one. The dis-
cussion of darn enrry screen design explained the use of input masks and vahdauon
rules to reduce data errors. Input masks are like templates rhar only permit certain
combinations of characters, and data validation rules can provide checks ro ensure
that inappropriate data is prevented from enreri11g the system. These checks can
include dara sequence, existence, range and limit, reasonableness, and validity, among
others.
The chapter described various rypes of printed reports, including detail, exception,
and summary reports. The features and sections of reports, including control fields,
control breaks, report headers and footers, page headers and footers, and group head-
ers and footers were explained. Other types of output, such as web-based information
delivery, audio output, instant messagi.ng, podcasts, email, and other specialized forms
of output were also discussed.
Batch and on line input methods were also described, as were input media and pro-
cedures, and input volume. Input methods include data capture and data entry. Dara
capture, which may be automated, involves identifying and recording source dara.
Dara entry involves converting source data into a computer-readable form and enter-
ing it inro rhe system. New technology offers optical and voice recognition systems,
biological feedback devices, morion sensors, and a variery of graphical input devices.
Securiry and conrrol were discussed. Ourpur control includes physical protection
of data and reporrs and control of unauthorized ports or devices that can extract data
from rhc system. Input conrrols include audir trails, encryption, password security,
data security, and rhe creation of access levels ro limit persons authorized to view or
use data.
Finally, che emerging trends of modular design, responsive web design, and proto-
typing were discussed.
Ke y Te rms
audit cra1I A re.:ord of the ;ource of each daca item and when 11 l!ncercd a >y>tem. In add111on IO record-
ing the cmgmal 'ource, an audu trail mu_\~ sho\\ how and when tbt.1 '' 3l"<:C\\Cd or changed, and hy
"horn. \II the'>e action> mu>t he logged in an audit trail file and monitored carefullr.
authori1,;uion zone Part of a form that contajns any required \lgnaturc'>.
automated f.ix A system rhar allows a cusromer ro request a fax using cmJil, the company website. or
a telephone. The response is cransmirrcd i:n a matter of seconds back to cbe user"s fax ma,hme. See
fall back.
batch A group of dara, usually mpurted mto an mfoananon system at the same mne.
b.uch uintrol A 1n1al u,ed to verify batch input. Batch control> might check data item\ wch 3'> r..-cord
count~ and numeric field totals. For example, before cnterin11 a hatch of order,, a lt'>tr mi11ht .:.1ku-
latc the roral number of order; and rhe <um of all rhc order quantiric~. When the hatch of order< i'>
enrcrcd, rhc order i.ystem al'>o ca lculates rhe same cwo IOtak If the ;y~tcm meals do not match the
111put torn I,, rhcn a tbt:t entry error has t>ecurred.
batch input A proces' where d:ua enrry is performed on a ~pecified cime ~chcdu lc:, ~uch O'> daily, weekly.
monrhl)', or longer. For example, hatch input occur~ when a payroll dq>arm1c11t collect' mne c.1rd' at
the end of the week and enters the data as a batch.
blog An onlme journJl. The rerm is a conrraction of "web log."
calendar control A calendar control allows che user to select a dJtc that the system will d1spla> and store
JS .1 field value.
d1\klc\\ \\Orl.\lauon A nc1work 1crminal 1ha1 <upportS a full-foarurcd user mtcrfaL"C hu1 limit\ 1he prinl·
ing or cop)·mg of data, c"<ct'pt to certain network r~urccs chac can be monitored and conrrolled
more ea;il).
electronic hcahh record EHR An electronic record of a patienc's bealch information gencrJtcd as the
paacm encounters various health-care prondcrs and shared among muluplc facwncs Jnd a@.enc1~.
cncr)pllon A proce;; where data 1s coded (converted into unreadable characters) ;o that only tho;e wuh
cbe required au1hor1z.tnon can access the data (usuallr via decoding software ).
cucpllon rcpor1 A d1xumcn1 di,playing only 1ho"' rc.:ords chat meet a \p«1lic cunditmn or L·ondit11111\.
Fxccption rcpom arc u\eful when the u<;er wane• information on ly on records that might require
aL"tllln hut doc.; nor need m know rhe derail~.
exi\tcnce check A cype of d:im validation check chat is used for mandmory darn item\. For cx:imple, if
an employc:c record rc4uirc' a Social Securiry number, an exisrence check would no1 allow the ui.er to
,.we 1hc record u111il he or \he enter., a .,uitable value in the SSN field.
faxback See .1urom.11cd fox .
Conn fillins A very effcc1ivc method of online data enrry where a blank form thJt duplicates or resem·
hies the source document i~ completed on the screen. The user enters rhe da!l1 and rhen movcs to the
11ext field.
form layoul The phr•ical appearance and placemem of data on a form. Form layout make~ the form
ca') m complete and provide' enough ~pace, horh vertically and horizomally, for U\t!f\ m enter the
data.
garb;age m, g.irb.li;c ou1 (GIGO! The concept that rhe quality of rhe ourpur" only"' good'" rhe qual1ry
of the in put.
graphical user interface (GUI) Inc usc of graphical objects and techniques allowing user~ 10 commum·
cate with a s~·srem. A well-designed GUI can help users learn a new S)Stem rapidl) and work with rhe
sys1cm effecuvcl).
bash totals !\ot meaningful numbers 1hentieh es but are u.>eful for comparison purposes. Also knO\\ n as
batch control 101.ils.
human-cnmpu1er 1n1craL"linn (I ICH A d~cnpnon of the n:lanon~hip between computer~ and the people
who u>e them to perform hu~inc<i~·rclarcd ra5ks. HO concepts appl)' to cvcry-rhing from a PC' de~krop
to the marn menu for a glohal network.
inpul comrol The ntxc''"'1 me:hure• ro ensure rhar input d ata is correct, complete, and \ecurc. 1\ '>Y•·
tern~ anal)M mu\I focu'> on rnput conrrol during every p h ase of input design, srnmng wi1h \ourcc doc·
umcms 1h:t1 promote d:ua a''uraq and quality.
mput mas!. femplare or pattern char makes 1r easier for users to enter data. Often used 111 automated
forms to guide an unfamiliar user.
limi1 check Occurs when a va lidmion check involl'~ a minimum or a maximum value, hut nor both.
Checking 1hat a payment amount is greater than zero, bur nor specifying a maxim um value. i; an
example of n lunic check.
1;,, box An output mcchani>m that di>plays a liM of choices rhar the user can >elcLl.
menu b.1r A >Ct of user->clcLtable •ofrware applicariun uptiom, usually locarcu acro~s 1hc rop of Lhc
>erccn.
mocl.·up When dc;,igmng a report, a 'ample report is prepared, which 1s a mcxk·up, or pro101ypc, for
users 10re\1cw. rhc s.1mple should include ryp1cal field va lues and com.tin enough records to ~how all
the de~ign fcamrc\.
modular dc,1gn A deMgn that can be broken down into logical block» Abo known a; partirionmg, or
top-down deMgn.
module Rel:ued program code or:ganaed into small uruts that Jn~ eaS) to undent.rnd and m.umam. A
complex program could have hundreds or even chousands of modules.
n~tural l~n11ua11c A \<Jftwarc feature that allows u~~ to l)'J>C command, or re<1u"'t' m normal En11l"h
(or other lan1,'llai;c) phra'>CS.
onl1nc dat;i cnin A data enrry method used for most hu~ine'~ activ11)'. The onlinc mcrhod offer. major
advanca~es. mduding che immediate \•alidation and arnilability of data.
opuon button Radio bunons that represenc groups of options. The user can select only one option at a
ume; a ~ele-:ted op11011 contains a black dot. Se!' also radio button.
outpu1 control Methods to mrumam ourpur mregrity and secunry. l'or cx.1mple, C\ery report should
include an appropriate title, repon number or code. primmg dare, and tune period covered. Reporn
should ha\'C pages that arc numbered consecutively, 1dcnn6cd as 1'.1gc X'X of xx, .ind the end of rhc
rcpor1 should be labeled clearly.
output i.ccuri1y Ourpur security prorects privacy rights and bhield~ the nri;ani1ario11·~ propricrnry darn
from 1hch or unnuchorizcd accc,~s.
pa11c footer Appears at rhc hotcom of rhe page and is used to display the name of chc report and 1hc
pa11c numhcr.
pjgc header Appears .u the top of the page and mdudes the coh1lllll he.1dmgs tl1Jt 1denrif) rhe dara.
podcast A wcb-b.1scd broadcast that allows J user ro receive .1udio or 111ulumcd1,1 file5 using music
pla)Cr sofrware such as iTunes, and listen to them on a PC or download them ro a portable MP3
pla}er or smart phone.
protol)pt An e.~rl)', rapidly con<rrucced working ver;ion of rhe propo-.cd mformarion ~y<tcm.
promr) pini; The merhod br which a prorocype is developed. Jc inH>lve- a repc:riri\c ~equcnt:c of an:ilr~i<,
de\l)ln, modclm11, and te;ung. It 1~ a common technique chat can be u-.cd m de\1i;n an) th11111 from a
new home ma computer nerwork.
radio button 8unons rhar represent groups of options. The user can select onl) one opuon ;u .1 ume; a
selected opuon contains a black dor. See also option button.
radio frcqucn() idenrific:iuon RFID) tag An input de,ice used in source data au1oma11on.
range check A type of dara ,·alidation check chac tests data icems ro "enfy chat they fall l'Crwcen a spec-
ified minimum and maximum \'alue. The daily hours worked b) an employee, for e\amplc, mu<c fall
\\ 11h111 1hc rani;e of 0 IO 24.
rca,onahlcnev, check A t) pc ot data validation check tha1 idcmific> v;ilue> 1ha1 arc <1uc,tionablc but not
necc<sanly wrong. For c"Xamplc, input payment va lues of $0.05 and $5,000,000.00 borh pass a sim·
pie limit check for a payment value greater than 1ero, and yet both va lue' could he error,,
record~ retention policy Rules designed co meet all legal requirements and busm~s needs for keeping records.
rcpnr1 fonrer Appears at the end of the report, can include grand ror.1ls for numeric fields Jnd ocher end-
of-rcporr information.
report header Appears oc the beginning of a report and identifies 1hc report a\ well a• the report title,
d.1rt, and o ther nc,c.sar)' information.
,croll bar In ll>Cr imcrface design, a scroll b:tr allows the user IO movt' through 1hc av11i lablc choice; for
Jn input field.
(Cqucm:c chccl A t) pe of daia validation check rha1 is used when the data musl be Ill ~omc
predetermined ,equence. If rhc user must enrcr work orders in numerical sequence, for example,
then Jn out-of-,equence order number indicate. an error. lf the user must corer rr:tnSJuions
1.hronolog1c.ill). then a rra~acnon with an out-of-s'<!ueu'c dare 111tLcatts .m error.
soun:e d;ua auromation A popular onhne inpur method char combines oaline data enrrv and auromarcd
data upturc u<,ing input de"'""' 5Ulh ~ magnenc data scrip> or .wipe ..:aaacri..
source documcm A form used to request and coUect input data, trigger or authorue .in mput .llllon• .inJ
provide a record of the original rransacnoa. During che input design stage. you deYelop source docu-
ments that arc caS} ro complcrc and inexpensive.
noryhoard Skt>tchc~ u~ during promtypmg ro ~how rhe general screen layour and d~1gn.
'ummal) rcpon A reporr 11-.cd h)' indi,idual' at higher lcvch in the organi7ation that indudc' le'~ dct.1il
than report• u-.cd b) lower· le,·el employees.
"'itchboard The U\C of 'ommand burrnns in a u-;er inrerfoce to enable users ro navigate a 'Y'tem and
-eled from 11rou1h of related ta\k-.
sy~tcm prototyping l'roducmg a full-featured, working model of the inform.ttiou sy;tem being
developed.
throwaway protot)pin11 See dc~ign prorocypin11.
tu!(!\lchutton A GUl clcmcnr used tn rcprc'Cnt on or nff statu•. Clicking the COffillc button >Witchc' tu
the other >rntu•.
wnlhar A Gln clement that contain• icom or button~ that represent •hnrtcurs for executing common
command~.
t0tals zone If ,1 form h.1s dat.1 totals, they will appear in this secrion of rhe form.
1tan}pJrent intcrfocc A user mterfoce thar users don't reaUy notice-a user-friendly interface that does
not dmr.ict rhr usrr .ind c.alls no arrencion to uself.
turnaround dt><.-umcnt Output doc.:umcnt that 1;, later entered back into the ~amc or another 1nforma·
tion 'Y'tcm. A telephone or utility hill, for example, might be a turnaround document printed by the
company·, hilhng ,Y'tcm. When the bill 1' returned with pa)ment, it i' <canned into the company''
account\ rcceivahlc '>)"'>tem m record the payment accuraTely.
u.\ahilu> In u\cr 1ntcrfo1.:c de-1i11n. include< u...:r satisfaction, support for busin"'' funcuon,, and '>'tern
etie~tivenC\\.
u~abilit~ mcuic~ D.tta that u11erface designers can obratn by usmg sofrware chat C.lll re.:ord and measure
user mteracuo11> with the s~srem.
"'er-centered A term that 1nd1carcs the pnmaf)' focus 1s upon rhe user. ln a user-centered system, the d1'·
fincrion blurs between input, output, and the interface irselI.
u'cr interface (Ul) The mechanism rhrough which the user interact' with the system. The interface can
be graphical, textual, aura l, or a combinarion of differenr mode~ of interaction.
\•alidity d1e1.:k A rypc ol darn "alidation check that is used for dara icem' rhat mu~t have certain val-
ues. f'or example, if an 111\'cntory ;,y,tcm has 20 ,·alid llcm da~~c;,, thcn any input nem that doc' no1
mJtch one of the va lid dass<'s will foi l the check.
wcbc.1st A onc·WJ) tr.111sm1s~ion of information or training materi.1ls, such as a Wcbinar session, .ivail-
ablc on demand or for a specific period co online participants.
266 Exercises
Exercises
Question s
I. Explain Apple's view of user imerfoce design, especially for apps.
2. What is l-ICI?
3. \Xfhy 1s a transparent interface desirable?
4. What are the SC\'en habits of successful interface designers?
5. How would you rank the I 0 guidelines for user interface design in order of importance? Explain your
answer.
6. What are the main principles of source document design?
7. What is che difference berween a derail report, a summary report, and an exception report?
8. How has input technology changed in recent years?
9. What is output security?
10. What are three emerging trends in user interface design?
Discussion Topics
I . Some sy~tem~ analysts argue, "Give users what they ask for. If they want lot~ of report& and reams
of data, then chat is what you should provide. Otherwise, they will feel that you are crying co cell
them how to do their job~." Others say, "Systems analysts should let users know what information
can be obtained from the system. If you Listen to users, you'll never get anywhere because rhey really
don't know wh::u they want and don't understand information systems." What do }'OU think of these
arguments?
2. Some systems analysts maintain chat source documents are unnecessary. They say that all input can be
entered directly into the system, without wasting rime in an intermediate step. Do you agree? Can you
think of an)' situations where source documents are essential?
3. Suppose your network support company employs 75 technicians who travel constancl) and work ar
customer sires. Your task is co design an informarion system chat provides techmcal data and infor-
manon to the field team. \Vhat rrpes of output aod mformarion delivery would you suggest for the
system?
4. A user interface can be quite restrictive. For example, rhe interface design might nor allow a user to
exit co a Window!t desktop or co log on co rhe Internee. Should a user interface include such restric-
tions? Why or why nor?
5. How is che increased use of smarrphones and tablets, with their smaller screen site, affecting user
inLerface design practices?
Projects
I. Yihit rhc administrative office at your school or a local company. Ask co sec examples of input
screens. Analyze che design and appearance of each screen and try to identify at least one possible
improvement.
2. Search the web co find an especial ly good example of a user interface that includes guidelines in chis
chapter. Document your research and discuss it with your class.
3. Re' iew Seccion 8.2 and the comments abouc EHR usability. Research the currenc status of EHR
usability and de!tcnbe all noteworthy developments.
4. Suggest at lea~r two good examples and rwo bad examples of source document design.
5. Explore the cmergmg area of wearable computing, such as the Apple \Vatch, and comment on the
impact of thehe dences on user interface design.
r..,,...JID)r-..1-.. 4•11_.. • ...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
~ JIJ»C....... ~ Al RlilfD l,eocl\olld.,...,. _WOlfi'l'l.~• ......-W.Mdk«iil,_._DIK•dtc--.: ......,_ . . . ,_.,~-.lit .......... .._.,._.__..,~•\
~ ... _ . . . _ . .... ..., ~...,.._,_..,..., J\&."9 ... --.11 ......... ~ C'dptl"~~d.tt ...... - ............ - ..... - .......... -.-.....w--...-.11
Chapter 9 Data Design
Data Design
Chapte r 9 is the second of three chapters in the necessary for a systems analyst to construct the physical
systems design phase of the SOLC. During the systems model of the information system.
analysis phase, a logical model of the system was The chapter includes three "Case in Point"
created. Now, it must be decided how data will be discussion questions to help contextualize the concepts
organized, stored, and managed. These are important described in the text. The "Question of Ethics" raises
issues that affect data quality and consistency. This the important and timely issue of sharing customer data
chapter focuses on the data design skills that are w ithout their explicit consent.
r..,,...JID)r-..1-.. 4•11_.. •...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Phase l Systems Design
9. 1. I Data Structures
A data \trucrure is a framework for organizing, storing, and managing data. Dara
structure'> consist of files or rabies char inreracr in various ways. Each file or rable
contains dara about people, places, things, or events. For example, one file or rable
might conrain darn about customers, and other files or cables might store data about
products, orders, suppliers, or employees.
Many older legacy systems urilized file processjng because it worked well with
mainframe hardware and batch input. Some companies still use this merhod to handle
large volumes of srructured data on a regular basis because can be cost-effective in
certain situations. For example, consider a credit card company that posts thous::inds
of daily transactions from a TRANSACTIONS fille to account b::i lances stored in ::i
CUSTOMERS file, as shown in Figure 9-1. For that relatively simple process, file
processing might be an option.
CUSTOMERS
r;w______.. ~lliiM
~ 53914 U ·ll-2019 86.S2
FIGURE 9- 1 A credit card company that posts thousands of daily transactions might consider a file processing
option.
Over time, the modern relational darabase became a standard model for systems
developers. The following example of an auto service shop will compare the rwo
concepts.
MECHANIC SYSTEM
-No
-
MECHANIC
,.,,_
""°"'
5UIUS
......,....,.
!:i! MIOW« a
Mecham< N, • Name . Pay Rate . HtreOate . ~lotus . ''™"•nee .
112 Le•ir, Robert $15.00 4/17/'lfJlO PMt time No
11 Jones, Jim $15.70 1/15/1998 full ti""' y.,.
13 r ~
~
JOB
JOB SYSTEM
JobNo
Worl: Coclf
Houn
Dolt
r..wchan.cNo
~
Poy Rlt•
,!:ll IOll
lob No ·· Wot~ Cod. . Hoon . 0.•~ . M«hanlc No . N""'"
. P.y AAte •
TUN £ l .2 U/6/l019 U l Pilf. Rotwr' s1~.oo
i'"'
1110 l\IW<CS ... 0 U/)/201q 11 J.,.,...,fm SllSO
1.14 ALIGN .J.O 12/6/lOJS 2J $20.00
"""'"' \\ .. y
... '
FIGURE 9-3 Mario's shop uses cwo separate systems, so certain data must be entered twice. This
redundancy Is Inefficient and can produce erron.
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 4111.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_, .,_.,....,. -~---tfta111&....-.~~ ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase l Systems Design
SHOP
OPERATIONS
SYSTEM
._
.......
... .....
...,._,..
,.,Mt
..,..,..
......
....... .., • ..... • fYr Miit • · - Ollllt • . . . . • ......... • - ... • WQril, c.- • ...,,,, . 0.. •
t:1 ,., .._,. lti C10 '411'7Df0 ,..,._.. No tt1 0.N )' •l'IJnOpt
ti .......... l lSl'CI tJt:'Jtl'Jlllf ...... V• 1IO (iqN(l.S fl l~n
H .... .-i_ '10111 1 ti-1n:r.-- Y• lM M.-oN :SO IZWl!H9
t.1ario's file-oriented systems show rwo different pay rares for Jim Jones, most
likely because of a darn enrry error in one of chem . Thar type of error could nor occur
in Danica's relational database, because an employee's
pay rate is srorcd in only one place. However, DBMSs are
nor immune ro dara entry problems, which are discussed
in derail lacer m chis chapter.
(....,..... J:gi( . . . . . I_,.. 41 11.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- t fta111&....-.~~ ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase l Systems Design
USERS: Users typically work with predefined queries and switchboard commands
but also use query languages to access stored data. A query language allows a user
co specify a task without specifying how the task will be accomplished. Some query
languages use narural language com1nands chat resemble ordjnary English sentences.
\Xlith a quer y by example (QBE) language, che user provides an example of the data
requested. Many database programs also use Strucrured Query Lang uage (SQL),
·which is a language that a llows client workstations to co1nrnurucate with servers and
mainframe computers. Figure 9-7 shows a QBE request for all Lime Squeeze or Blue
Candy 2019 Ford Fusions with a power moonroof. The QBE request generates the
SQL commands shown a t the bottom of Figure 9-7.
--·- --
----
DATABASE ADMINISTRATORS: A DBA is
responsible for DBMS management and supporr- -- -
OBAs are concerned with dam security and inregriry,
____...... - --- --
preventing unauthorized access, providjng backup and
recovery, audit trails, maintaining the database, and
supporting user need:•. Mo~r DBMSs provide uriliry
programs ro assist the DBA in creanng and updating
.._
-- __
-= ~--
•
• --
-... --• ..-
II ll
QBE
) request
FIGURE 9-7 Using QBE.a user can display all 2019 Ford
RELATED INFORMATION SYSTEMS: A DBMS
Fusions that have a power moonroof and are either Ume
can support several related information systems that Squeeze or Blue Candy color.
provide input to, and require specific data from, che
DBMS. Unlike a user interface, no human intervention is required for rwo-way
communication between the DBMS and the related systems.
9.2.2 Schema
The complete definition of a database, including descriptions of all fields, tables,
and relationships, is called a schema. One or more subschemas can a lso be defined.
A subschema is a view of the database used by one or more systems or users. A
subschema defines only chose portions of the database tbar a particular system or user
needs or is allowed ro access. For example, ro protect indjvidua l privacy, rhe project
management system should nor be permitted to retrieve employee pay rares. In that
case, che project management system subschema would nor include the pay rare field.
Database designers also use subschemas co restrict the level of access permitted. For
example, specific users, sysrems, or locations mjgfhr be permirred ro create, retrieve,
update, or delete data, depending on rheir needs and the company's security policies.
dictionary is transformed into a physical data repository, which also contains the
schema and subschemas. The physical repository might be centrnli1ed, or it might
be distributed at several locations. In addition, the smred data might be managed by
a single DBMS, or several systems. To resolve potential database connectivity and
access problems, companies use OD BC-compliant software that enables communica-
tion among various systems and DB:VISs. Open database connecti,it) (O OBC) is an
industry-standard protocol that makes it possible for software from different vendors
to interact and exchange dara. ODBC uses SQL statements that the DBMS under-
stands and can execute, similar ro the ones shown in Figure 9-7. Another common
standard is called java database connecti,;ty (JDBC). J DBC enables J:iv:i :ipplicarions
to exchange data with any database that uses SQL statements and is JD BC-compliant.
Physical design issues are described in Chapter I0, which discusses system :irchitccture,
and in Chapter 11 , which discusses system implementation and data conversion.
CHARACTERISTIC EXPLANATION
Global access The Internet enables worldwide access, using existing infrastructure
and standard telecommunications protocols.
Ease of use Web browsers provide a familiar interface that 1s user-friendly and
easily learned.
Multiple platforms Web-based design is not dependent on a specific combination of
hardware or software. All that is required is a browser and an
Internet connection.
Cost effectiveness Initial investment is relatively low because the Internet serves as the
communication network. Users require only a browser. and web-
based systems do not require powerful workstations. Flexibility is
high because numerous outsourcing options exist for development,
hosting. maintenance. and system support.
Security issues Security is a universal issue, but Internet connectivity raises special
concerns. These can be addressed with a combination of good design,
software that can protect the system and detect intrusion, stringent
rules for passwords and user identification, and vigilant users and
managers.
Adaptability Issues The Internet offers many advantages in terms of access, connectivity.
and flexibility. Migrating a traditional database design to the web,
however, can require design modification, additional software, and
some added expense.
FIGURE 9-8 Web-based design characteristics include global access, ease of use. multiple platforms. cost-effectiveness,
security iuues. and adapability issues. In a web-Wed design. the Internet serves as the front end. or interlace. to die
cbcab;lse management system. Access to die database requires only a web browser and an lnU!met conneeuon.
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 4111.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- t fta111&....-.~~ ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase l Systems Design
To access data in a web-based system, the database must be connected to the Internet
or inrranet. The daraba e and the Internet speak rwo different languages, howc\·cr.
Databases are created and managed by using \'arious languages and commands that
ha,·e nothing to do with HT~I L, which is the language of the web. The objecti\e is ro
connect the database to the web and enable data to be viewed and updated.
To bridge the gap, it is necessary to use middleware, which is a software that
integrates different applications and allows them to exchange data. ~liddleware can
interpret client requests in HT~1L form and translate the requescs into commands
that the database can execute. When the database responds to the commands,
m1ddleware translates the results into HT~tl pages that can be displayed by the
user's browser, as shown in Figure 9-9. Nore char the four steps in the process can
take place using the Internee or a company intranet as the communications channel.
Middleware is discussed in more detail in Chapter 10.
lw•-
.......,_,
IOM-
)--
-·--
-
4bul0-
FIGURE 9-9 When a client worl<staaon requests a web page ( 1), the web server uses middleware to
generate a data query t0 the database server (2). The database server responds (3). and the mtddleware
translates the retrieved data into an HTML page tN.t can be sent by the web server and displayed by rhe
user's browser (4).
Web-based data must be secure, yet easily accessible co authorized users. To achieve
thjs goal, well-designed systems provide security atr three levels: the database itself, che
web server, and the telecommunication links that connect the components of che system.
Dara security is discu~sed in more derail in Section 9.9 and in Chapter 12.
9.4. 1 Definitions
Data design terms include cnrity, table, file, field, record, tuple, and key field. These
terms arc explained in the following sections.
TABLE OR FILE: Data is organhed into tables or files. A table, or file, contains a set
of related records that store data about a specific entity. Tables and files are shown
as two-dimensional structures tbat consist of vertical columns and horizontal rows.
Each column represents a field, or characteristic of the entity, and each row represents
a record, which is an individual instance, or occurrence of the entity. For example, if
a company has 10,000 customers, the CUSTOMER table will include J0,000 records,
each representing a specific customer.
Although they can have different meanings in a specific context, the rerms table
and file often can be used interchangeably.
RECORD: A record, also called a tu ple (rh)'mes with couple), is a set of related fields
that describes one instance, or occurrence, of an entity, s uch a~ one customer, one
order, or one product. A record might have one or dozens of Cields, depending on
what information is needed.
PRIMARY KEY: A primary key is a field or combinarion of fields that uniquely and
minimally identifies a particular member of an entity. For example, in a customer
rnble, the customer number is a unique primary key because no rwo customers can
have the same customer number. That key also is minimal because ir contains no
information beyond what is needed to identify the customer. In a CUSTOMER table,
a Customer ID might be used as a unique primary key. Customer ID is an example of
a primary key based on a single field!.
A primary key a lso can be composed of t\VO or more fields. For example, if a
student registers for three courses, his or her student number will nppear in three
records in the registration system. If one of those courses has 20 srudenrs, 20 separate
records will exist for that course number-<>ne record for each student who registered.
In the registration file, neither the student number nor the cou rse ID is unique, so
neither field can be a primary key. To identify a specific student in a specific cou rse,
the primary key must be a combination of student number a nd course ID. In that
case, the primary key is called a combination key. A combination key a lso can be
called a composite key, concatena ted key, or multivalued key.
Figure 9-10 shows four different tables: STUDENT, ADVISOR, COURSE, and
GRADE. Three of these tables have single-field primary ke ys. Note thar in the
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- t fta111&....-.~~ ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase l Systems Design
GRADE rable, however, the primary key is a combination of rwo fields: STUDENT
NUMBER and COURSE 'UMBER.
3397 SamCerr 9 3. 75 49
~====~+======~}k•~~~~---11~~ 1
STUDENT II COURSE I GRADE
NUMBER NUMBER I
FIGURE 9- 10 Examples of common fields, primary keys. candidate keys. foreign keys, and seconcbry keys.
FOREIGN KEY: Recall that a common field exists in more than one table and
can be u~ed to form a relationship, or link, between the tables. For example, in
Figure 9- 10, the ADVJSOR NUMBE R fie ld appea rs in both the STUDENT table and
the ADVISOR table a nd joins t he tables together. Note that ADVISOR NUMBER is
a primaqr key in the ADVJSO R table, where it uniq uely identifies each advisor, and
is a foreign key in the STUDENT table. A foreig n key is a field in one table that must
match a primnry key value in another table in order to establish the relationship
between the two rabies.
Unlike a primary key, a foreign key need not be unique. For example, Carlton
Smith has advi~or number 49. T he value 49 must be a unique vnlue in the ADVISOR
table because it is the primary key, but 49 can appear any number of rime!. in the
STUDENT ca hie, where the advisor number serve5 as a foreign key.
Figure 9-10 also shows how rwo foreign keys can serve as n composite primary
key in another rable. Consider the GRADE table at the bottom of the figure. The two
fields that form the primary key for the GRADE table are both foreign keys: the STU-
DE IT NUMBER field, which must match a student number in the STUDE1'1T cable,
and the COURSE NU.t\IBER field, which must march one of the course IDs in the
COURSE cable.
How can these rwo foreign keys serve as a primary key in the GRADE table? Nore
rhat srudenr numbers and course IDs can appear any number of times in the table, bur
rhe combi11atio11 of a specific student and a specific course occurs onl>• once. For exam-
ple, srudent 1035 appears four rimes and course CSC 151 appears rhree rimes-but
there is only one combined instance of student l 035 and course CSC 151. Because the
combinarion of the specific student (1035) and the specific course (CSC 151 ) is unique,
it ensures rhat rhe grade (B) will be assigned to the proper student in the proper course.
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 4111.,.. .................,.t11ru
~- )U,
..,...,...... .,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_, .,_.,....,. -~--- t fta111&....-.~~ ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase l Systems Design
In Figure 9-10, student name and advisor names are idenrified as secondary keys,
but other fields also could be used. For example, to find all students who have a par-
ticular advisor, the ADVISOR NUMBER field in the STUDENT table could be used
as a secondary key.
JOB
lOONo
Woft.Codir
Houn
-
MlCHAN:C
°"''
-·
Patble
Httt O•tt
status
IM<NIN<No
P ly RM>
0~§!..c:r~t'f!_"!L~!!l~ti
CCCildo ~ ll<l&:.d Fields
c..c.do ~ l!da:.d ~ds
FIGURE 9· I I Microsoft Access allows a user to specify that referential integrity rules will ~
enforced In a relational database design.
Recall rhar an entiry is a person, a place, a thing, or an event for which dara is
collected and mainrained. For example, entities might be cuscomers, sales regions,
produces, or o rders. An information system muse recognize the relationships a mo ng
encities. For example, a CUSTONlER entiry can have several instances of an ORDER
cnriry, and an E~ I PLOYEE enriry can have one instance, or none, of a SPOUSE entity.
An entity-relationship diagram (ERD) is a model char shows the logical rclarion-
ships and interaction among syscem entities. An ERD provides an overall view of rhe
syscem and a blueprint for creating rhe physical data st ructures.
PATIENT
9.5.2 Types of Relationships
T hree rypes of relationships can exist between entities: one-co-one,
FIGURE 9 - 12 In an enuty-relaaonship one-to-many, and many-to-many.
diagram, entities are labeled with singular
nouns and relationships are labeled with
A one-to-one relationship, abbreviated 1: l , exists when exactly
verbs. The rebuonship is interpreted as one of the second entity occurs for each instance of rhe first entity.
a Slmple Enghsh sentence Figure 9-13 shows examples of several l: l relationships. A number
I is placed alongside e ach of the two connecting lines ro indicate the
I: I relationship.
A one-to-man)' relationship,
abbreviated l :M, exists when one occur-
OFFICE 1 1 rence of the first entity can relate to many
HEADS OFFICE
MANAGER insrances of the second enriry, bur each
instance of rhe second entity can associate
wirh only one insrance of rhe first enri1y.
VEHICLE ID 1 1 For example, rhc re lationship herween
ASSIGNED VEHICLE
NUMBER TO DEPARTMENT a nd EM PLOYEE is
one-to-ma ny: One depa rrmen t can have
many employees, but each employee
SOCIAL 1 1 works in only one deparcmenr at a time.
SECURITY ASSIGNED PERSON Figure 9-14 shows several l:M rela-
TO
tionships. T he line connccring the many
entity is labeled with the Jeerer M, and
1 1 the number l labels the other connect-
DEPARTMENT CHAIRS DEPARTMENT ing line. How many is many? The first
HEAD
I :NI relationship shown in Figure 9-14
shows the entities IN DIVIDUAL and
FIGURE 9- 13 Examples of one-to-one ( 1:1) relationships.
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase l Systems Design
M N
STUDENT ENROLLS CLASS
IN
REGISTRATION
M N
PASSENGER RESERVES FLIGHT
SEATON
M N
ORDER LISTS PRODUCT
ORDER LINE
FIGURE 9-15 Examples of many-co-many (M:N) ~lationships. Notice that the event or transaction that llnlu the
cwo entitles Is an associative entry with its own sec -of attributes and characteristics.
Note that an M:N relationship is different from 1:1 o r l:M relationships because
the event or transacrion that links the two entities is acrually a third entity, called an
a \sociati ve entity, that has irs own characteristics. In the first example in Figure 9-15,
the ENROLL IN symbol represents a REGISTRATIO encity chat records each
instance of a specific student enrolling in a specific course. Similar!)·, the RF-SERVES
SEAT ON symbol represents a RESERVATION entity that records each instance of a
specific passenger reserving a sear on a specific flight. In che ch1rd example, the LISTS
symbol represents an ORDER LINE entity that records each instance of a specific
product listed in a specific customer order.
Figure 9-16 shows an ERD for a sales system. Note the various entities and rela-
tionships shown in the figure, including the associative entity named ORDER LINE.
The detailed nature of these relationships is called cardinality. An analyst must
understand cardinality in order to create a data design that accurately reflects all
relationships among system entities.
SALES REP
SERVES
M
CUSTOMER PLACES ORDER WAREHOUSE
assocla11ve
enllty
/ N M
PRODUCT
FIGURE 9- 16 An entity-relationship diagram for SALES REP. CUSTOMER. ORDER. PRODUCT. and
WAREHOUSE. Notice that the ORDER and PRODUCT entities arc joined by an associative entity named
ORDER LINE.
(....,..... J:gi( . . . . . I_,.. 41 11.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- t fta111&....-.~~ ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase l Systems Design
p1
entities and shows how instances of one
I
entity relate to instances of another entity. Oneorm•ny 1.:
For example, consider the relationship
between two entities: CUSTOMER and
ORDER. One customer can have one
order, many orders, or none, but each
order must have one and only one cus-
tomer. An analyst can model this inter-
action by adding cardinality notation, I po Zero, or one,
or m•ny
o.:
I
the relationship.
A common method of cardina lity
notation is called crow'~ foot notation
because of the shapes, which include
I I 0 Zero, or one 0 ..1
circles, bars, and symbols that indicate FIGURE 9- 17 Crow's foot notation Is a common method of indicating
various possibilities. A single bar indicates cardinality. The four examples show how various symbols can be used to
describe che relationships between entitles.
one, a double bar indicates one and only
one, a circle indicates zero, and a crow's
foot indicates many. Figure 9- 17 shows EXAMPLES OF CARDINALITY NOTATION
various cardinality symbols, their mean-
ings, and the UML representations of rhe
relationships. As described 111 Chapter 4, CUSTOMER PLACES ORDER
the Unified Modeling Language (UML) is
a widely used method of visualizing and One and only one CUSTOMER can place anywhere from zero 10 many of !he
documenting software ~ystems design. ORDER entity.
In Figure 9-18, four examples of car-
dinality notation are shown. In the first INCLUDES
ITEM
ORDER ORDERED
example, one and only one CUSTOMER
can place anywhere from zero to many
of the ORDER entity. In the second One and only one ORDER can Include one ITEM ORDERED or many.
example, one and only one ORDER can
include one ITEM ORDERED or many. EMPLOYEE HAS SPOUSE
In the third example, one and only one
EMPLOYEE can have one SPOUSE
or none. Jn rhe fourth example, one One and only one EMPLOYEE can have one SPOUSE or NONE.
EMPLOYEE, or many employees, or
none, can be assigned to one PROJECT, ASSIGNED
EMPLOYEE PROJECT
or many projects, or none. TO
Most CASE products support the
drawing of ERDs from entities in the One EMPLOYEE, or many employees, or none, can be asS<gned lo one
data repository. Figure 9- 19 shows part PROJECT, or many projec1s. or none.
of a library system ERD drawn using FI GURE 9- 18 In the first example of cardinality notation.one and only one
the Visible Analyst CASE cool. Nore that CUSTOMER an place anywhere from zero to many of the ORDER entity. In the
second example. one and only one ORDER can include one ITEM ORDERED or
crow's foot notation i~ used to show the many. In the third example, one ~d only one EMPLOYEE an tl3Ye one SPOUSE
nature of the relarionship~. which are or none. In the fourth eicample. one EMPLOYEE.or many employees.or none.
described in both directions. can be assigned ro one PROJECT. or many projecu. or none.
USER
BOOK
ADO NEW
BOOK
AUTHOR
FI GURE 9. 19 An ERO for a library synem drawn with V1S1bleAnalyst. Nott<:e that crow·s foot
notation has been used and relationships are descnbed m both d1rect10M.
Normalizatio n is the process of c reating table designs by assign ing specific fields
or attributes to each table in t he da tabase. A ta ble design specifics the fields a nd
identifies the primary key in a particular table or file . Working with a set of initial
table designs, normalization is used to develop an overall database design tha t is
simple, Acxiblc, and free of data redundancy. Normalization involves applying a
set of ru les chat can help identify and correct inherent problems and complexities
in table designs. The concept of normalization is based on the work of Edgar Codd,
a British computer scientist, who for mulated the basic principles of relational
database design.
r..,,...JID)r-..1-.. 4•11_.. •...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Phase l Systems Design
FIGURE 9·20 In the ORDER table design. cwo orders have repeating groups that contain several products.
ORDER is the primary key for the ORDER cable. and PRODUCT N UMBER serves as a primary key for the
repeating group. Becaun it contains repeating groups. the ORDER table is unnormalized.
(....,..... J:gi( . . . . . I_,.. 41 11.,.. ~- )U, Woip-M ._..,.. - ·~•-fllllie<'f •,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,.. ..,. - ~---tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
-
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~
Phase l Systems Design
ORDER lnlNF
t
1n 1NF
t
• There are no repeating groups
• The pnmary key Is a unique combination of lWo foretgn key values:
ORDER and PRODUCT NUMBER
• All fields depend on lhe pnmary key, bul some fields do not depend on
1he whole key - only part of it
FIGURE 9·2 1 The ORDER cable as 11 appears in INF.The repeadng groups have been ehminated. Notke that
the repeating group for order 86223 has become three sepante records, and the repeating group for order
86390 has become two sepante records. The I NF primary key is a combination of ORDER and PRODUCT
NUMBER. which uniquely Identifies each record.
a part of rhe primary key. Similarly, the DESCRIPTION field depends on the prod-
uct number, which also is only a part of rhe primary key. Because some fields are nor
dependenr on rhe entire primary key, rhe design is nor in 2NF.
A standard process exists for converting a cable from 1NF to 2NF. The objective is
to break the original table into two or more new tables and rea'iStgn the fields so that
each nonkey field will depend on rhe enrire primary key in its table. To accomplish
this, the following steps should be followed:
I. Create and name a scparare cable for each field in rhe existing primarr kcr.
For example, in Figure 9-21, rhe ORDER rable's primary key has two fields,
ORDER and PRODUCT NUMBER, so rwo rabies muse be created. The ellipsis
(... ) indicates thar fields will be assigned lacer. The result is:
ORDER (ORDER, ... )
PRODUCT (PRODUCT NUMBER, ... )
2. Create ::i new table for each possible combination of the origina l primary key
fields. In rhe Figure 9-21 example, a new table would be created wirh a combi-
nation primary key of ORDER and PRODUCT NUMBER. This rable describes
individual lines in an order, so it is named ORDER LINE, as shown:
ORDER LINE (ORDER, PRODUCT NUMBER)
3. Study rhe three rabies and place each field wirh irs appropriate primary key,
which is the m111imal key on which ir fw1crionally depends. When all rhe fields
have been placed, remove any cable that did nor have any additional fields
assigned co it. The remaining tables are the 2NF version of rhe original cable.
The chree rabies can be shown as:
ORDER (ORDER, DATE)
PRODUCT (PRODUCT NUMBER, DESCRIPTION, SUPPLIER
1UMBER, SUPPLIER 1AME, ISO)
(....,..... J:gi( . . . . . I_,.. 41 11.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~---tfta111&....-.~~ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase l Systems Design
OllOEll PilOOUCT
NUMll£11
86225 504 7
86225 635 1
86225 68' 4
116390 !!04 3
16467 304 144
•
on 2NF the primary key of ORDER LINE IS a
un combonat1on of two foreign keys
FIGURE 9-l l ORDER. PRODUCT. and ORDER LINE tables in 2NF. All fields are functionally dependent on
die pnrmry key
c ustomer has ordered che product? A dummy order numbe r could be used and
later replaced with a real order number when the product is ordered ro solve
the pro blem, bur char solution also creates difficulties.
4. Deleting a produce is a problem. If all the related records are deleted once an
order is filled and paid for, whar happens if the only record that contains prod-
uct number 633 is deleted? The information about that product number and its
description is lost.
I las the 2 f design eliminated all potential problems? To change a product
description, now just one PRODUCT record needs to be changed. Multiple, inconsis-
tent values for the product description are impossible because the description appears
in only one location. To add a new product, a new PRODUCT record is created,
instead of creating a dummy order record. When the last ORDER LINE record for a
particular product number is removed, that product number and its description is not
lost because the PRODUCT record still exists. The four potential problems are elimi-
nated, and the three 2NF designs are superior ro both the original unnormalized rable
and the INF design.
•••
PRODUCT In 2NF ••
~~~~~~~~
..•
•
.
'
PRODUCT
NUMBER
IDESCRIPTION SUPPLIER : SUPPLIER
NUMBER ; NAME
•
I ISO
'
PRODUCT
NUMBER
DESCRIPTION
'''
ISUPPLIER
NUMBER
'
SUPPLIER
NUMBER
ISUPPLIER 11so
NAME
128 Steel widget A-602 A-602 Acme Yes
FIGURE 9-23 Wilen tile PRODUCT table Is transformed from 2NF to JNF, tile result Is cwo separate
tables: PRODUCT and SUPPLIER. Note mat In JNF, all fields depend on tile key alone.
The PRODUCT cable is in J NF because ic has no repeacing group~. T he c:i ble a lso
is in 2NF bcc:iusc the primary key is a single fi eld. But the table still has four po tcn-
cial problems:
I. To cha nge a supplier na me, every record in which tha t na me a ppears must be
cha nged. With hundreds, o r even thousands o f record s, the process would be
slow, expensive, and subject to input erro rs.
2. T he 2NF d esign a llows a supplier co ha ve a different name or ISO sta rus in
different recor ds.
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 4111.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase l Systems Design
3. Because the supplier name is included in che O RDER cable, a dummy ORDER
record muse be created co add a new supplier who has not yec been received
any orders.
4. If all the orders for a supplier are deleted, that supplier's number and name will
be lost.
Those potential problems are caused because the design is not in 3NF. A cable
design is m thi rd nom1al fonn (3NF) if it is in 2NF and if no nonkey field is depen-
dent on another nonkey field. Remember that a nonkey field is a field that is not a
candidate ke)' for the primary key.
T he PRODUCT table at the top of Figure 9-23 is not in 3NF because two nonkey
fields, SUPPLI ER NAME and ISO, both depend on another nonkey field, SUPPLIER
NUMBER.
To converr the rable to 3NF, all fields from the 2NF table that depend on another
nonkey field must be removed and placed in a new table that uses the nonkey field as a
primary key. In the PRODUCT example, SUPPLIER NAME and ISO must be removed
and placed into a new table that uses SUPPUER NUMBER as the primary key. As
shown in Figure 9-23, 3NF divides the 2NF version into two scp<uace 3NF tables:
PRODUCT (PRODUCT NU MBER, DESCRIPTION, SUPPLIER NUMBER)
SUPPLI ER (SUPPLIER NUMBER, SUPPLIER NAME, ISO)
You handle administrative support for CyberToys, a small chain that sells computer hardware and
software and specializes in personal service. The company has four stores located at malls and is
planning more. Each store has a manager. a technician, and between one and four sales reps.
The owners want to create a personnel records database, and they asked you co
review a cable chat they had designed. They suggested fields for score number. location,
score telephone, manager name, and manager home telephone. They also wane fields for
technician name and technician home telephone and fields for up co four sales rep names
and sales rep home telephones.
Draw their suggested design and analyze it using the normali"Zation concepts you
learned in the chapter. What do you think o f their design and why/ W hat would you
propose?
r..,,...JID)r-..1-.. 4•11_.. •...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Chapter 9 Data Design
STUDENT(Umom...lnd)
STUDENT I STUDENT TOTAL I GPA I ADVISOR I ADVISOll I OFRCE '1 COUllSE I CREOIT I GllAOE
NUMIEll NAME CREDITS NUMBEll ! NAME NUMIEll HOURS
101) Unda 41 l.fiO 49 Smith 82.12 CSCUl 4 a
MKT212 3 A
ENGlOl 3 a
CHM112 4 A
BUS105 2 A
CHMlU 4 c
ENG101 3 c
BUS1~ 2 c
FIGURE 9-26 The STUDENT table is unnormalized because It contains ;a repeating group that represents the
course each student has taken.
(....,..... J:gi( . . . . . I_,.. 41 11.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f •,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- t fta111&....-.~~ ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase l Systems Design
Figure 9-27 shows the 1NF version of rhe sample STUDENT data. Do any of the
fields in the l F STUDENT table depend on only a portion of the primary key? The
student name, total credits, GPA, advisor number, and advisor name all relate only
to the student number and have no relationship to che course number. The course
description depend~ on che course number but not on the srudent number. Onl)' che
GRADE field depends on the entire primary key.
STUDENT In lNF
4(J7Q kelty
29
14 2.90
"'
23 Jones 033 CSClSl 4 8
<IOJO Kelly 14 2.90 23 Jones C333 CHM Ill 4 c
<IO'IO Kelly 14 2.90 23 JO<> es Clll ENGIOl 3 c
Kelly 14 2.90 Jones 013 c
"°'° 23 lkJSUIS 2
rn 1NF.
• There are no repeating groups
• The prmary key Is a unique combtnahon of two foretgn key values: STUDENT NUMBER
and COURSE NUMBER
• All field$ depend on Ille primary key. but some fields do not depend on the whole key - only
part of ii
FIGURE 9-27 The student cable in I NF. Notice that the primary key has been expanded to include STUDENT
NUMBER and COURSE NUMBER.
Following the I NF-2 F conversion process described earlier, a new table would
be created for each field and combination o f fields in rhe primary key, and rhe other
fields would be placed with their appropriate key. The result is:
STUDENT (STUDENT NUMBER, STUDENT NAME, TOTAL CRED ITS, GPA,
ADVISOR NUMBER, ADVISOR NAME, OFFICE)
COURSE (COURSE NUMBER, CREDIT HOURS)
GRADE (STUDENT NUMBER, COURSE NUMBER, GRADE)
The original I F STUD ENT rable has now been convened into three tables, all in
2NF. In each table, every nonkcy field depends on che entire primary key.
Figure 9-28 shows the 2NF STUDENT, COURSE, and GRADE designs and
sample data. Are all three tables STUDENT in 3NF? The COURSE and GRADE
rabies arc in 3NF. STUDENT is not in 3 F, however, because rhe ADVISOR NAME
and OFFICF fields depend on the ADV1SOR 1UN1BER field, which 1s nor part of che
STUDFNT primary key. To convert STUDENT co 3NF, the ADVI OR NAME and
OFFICE fields are removed from che STUDE. T cable and placed into a cable with
ADVISOR NUtvl BER as che primary key.
STUDENT I STUDENT
NUMBEll , NAME
lOlS '' llr>da
ITOTAL I GPA
CREDITS
47 3.60
ADVISOR
NUMBER
49
ADVISOR
NAME
Smith
OFFICE
B2U
'
COUllSE
NUMBER
BUSlOS
I'
CREDIT
HOURS
2
ENG101 3
MKTlU 3
GRADElnZNF
STUDENT
' ' ' +! COURSE
' ' ' I GRADE
NUMBER NUMBER
I
I
1035 CSCJ.51 B
1035 MKT212 A
103S ENGlOl a
1n2NF
• All fields now depend lOlS CHMU2 A
on the whole pnmary
key, but some fields lOlS BUSlOS A
aleo might depend on
other fields lhat are nol 3397 ENG101 A
pan of the pnrnary key c.........
• The pnrnary key of 3397 MICT2U c
GRADE ls a unique
combination of two 3397 CSCUl a
foreign key values.
STUDENT NUMBER 4070 CSCUl a
and COURSE NUMBER
4070 OiMlU c
4070 ENG101 c
4070 BUSlOS c
FIGURE 9-28 The STUDENT, COURSE, and GRADE tables In 2NF. Notice that all fields are functionally
dependent on the entire primary key of their o-espective tables.
Figure 9-29 shows the 3NF versions of rhe sample data for ST UDENT, ADVISOR,
COURSE, and GRADE. The final 3.NF design is:
ST UDENT (STUDENT NUMBER, STUDE1''T NAME, TOTAL CREDITS, GPA,
ADVISOR NUNIBER)
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
- Woip-M ._..,..
..
- ·~• -fllllie<'f •,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,.. ..,. - ~---tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase l Sys tems Design
STUDENT In ZNF
STUDENT
NUMBER
I STUDENT
NAME
I TOTAL
CREDITS
IGPA I ADVISOR
NUMBER
. ADVISOR
: NAME
I OFFICE
....•............
47
GPA
3.60
'''
INUMBER
ADVISOR
'
ADVISOR
NUMBER
49
I ADVISOR I OFFICE
NAME
Smith B2U
4070 14 2.90 23
FIG URE 9-29 STUDENT. ADVISOR. COURSE. and GRADE tables in lNF. When the STUDENT table 1s
transformed from lNF to lNF, che result is tw0 tables: STUDENT and ADVISOR.
FIGURE 9 °30 The entity-relationship diagram for STUDENT. ADVISOR. and COURSE after
l assoc1atm
enllty
-,..._
- . To creare 3NF designs, the nanire of first, second, and
-- \• -- -----
,. ....... rhird normal forms must be understood. A S)' rems ana-
- . .--- ....I -
lyst will encounter designs that are much more complex
·- T- • than the examples in this chapter.
--
-
·- \.. -- • EXAMPLE 2: Magic J\i\ aintenance: .Nlagic Maintenance
·------ I
• ~
provides on-sire service for eleccronic equipment. Figure 9-31
- -
-- shows the overall database design drnr such a finn might use.
The 6guce contains examples of many concepts described
earlier. The database consists of seven separate rabies, all
joined by common 6elds, so they form an integral data
FIGURE 9-31 A relational database design for a
computer service company uses common fields co link scructure.
the cables and form an overall daca structure. Notice the Figure 9-32 shows even more derail, including sample
one-to-many notation symbols and the primary keys. dara, primary keys, and common fields. Nore rhat rhe
which are indicated with gold-colored key symbols. eariries include customers, technicians, service calls,
---
s." CA
. 0 SMOO
•
•
6121
ll7<iO
· 1848
a.111
SAruono
thly
,....
JIC~le
101 MJlti Slfoet
'""•bt"V c.....
3;JlSm!1hUM
.....Jat1nto
..,
H\.ldlOn
"'A
Fl
~ SOMCf <ALl\ x
:::J SUMCl 1.-'- OOAll'
.
x
. CAU·N~JM . CUST·NUM .
T
OATf . T[(H·NUM .
CAU· NUM • lABOR-CODE lABOR·HOURS
• 10796 14)6 U/U/2019 04
-
'10796
107'6
" cA LS
2.0
• 10797 2136 U/13/2019 17
• 10791 11/13/201' 04
10791 B s.o • 10799 1456 12/l.S/2019 21
10799 c LS - 10800 6J21 U/16/201' 21
10799 D 1.S I • 10801 14)6 1211"'2019 09
10801 A 2.5
I i1] PARTS \ x
'
PART· NUM . PART·DESC . Tcosr. PRICE . QTY-ON·HANO .
• AB-6784 MffiR $98.50 $125.00 33
• 00-9192 DISC SL30 $1.69 220
• SS-1024 COVER $16.00 $19.7'9 71 Primary Keys
• SS-1099 EMBLEM
JUMPER
S38.00 S50.00 41 •' Common fields
I • 5$-lUI
• XC·llll CABLE
SU.SO
<:6 75
SlS.00 3
<=7.9!1 77
FIGURE 9-ll Sample data, promary keys, and common fields for the database shown in Figure 9-31 .
The design is in )NF. Notice that all nonkey fields functionally depend on a primary key alone.
9.7 Codes 29 7
and parts. Orher tahles srore dara abour labor and pans char are used on specific
service calls. Also nore that all rabies use a single field as a primary key, except the
SERVICE-L.ABOR-DFTAIL and SERVICE-PARTS-DETAIL rabies, where the primary
key requires a combinarion of rwo fields to uniquely identify each record.
9.7 CODES
A code is a ser of letters or numbers thar represents a data item. Codes can be used to
simplify outpur, inpur, and data formars.
3 29 01 6975
ATL
--- ORO__ u-IR ....HNO
------ LAX sold: GN for gardening supplies,
HW for hardware, and EL for
electronics.
oFW FRA aDG -·--- AMS ···-
OEN b. AbbreYiation codes are alphabetic
abbreviations. For example, standard
state codes include NY for New York,
PHX
--- LAS--- MAD IAH
-.-... . ._ . HKG
- .................
~....... ...
ME for ~l aine, and MN for Minne-
sota. Some abbreviation codes arc
MSP o1W-·-- aKK SFO MIA .....
.. _.__ .... _,........ ..
called mnemonic codes because they
use a specific combination of lcncrs
that arc easy to remember. Many
JFK
-·- -- LGW
--- EWR SIN - NRT
_, _____. ..... ..... .......
three-character airport codes such
as those pictured in Figure 9-34 arc
mnemonic codes, such as ATL for
PEK
------ seA - sTL
-·---- MCO VY! _._ ----·~
......... ..-... ....
............. Atlanta and MIA for Miami. I Iowcver,
some airport codes arc not mnemonic,
FIG UR E 9-3 4 Abbreviations for some of the world's busiest airports. such as ORD (Chicago O'Hare) or
' " MCO (Orlando).
4. Significant digit codes distinguish items by using a series of subgroups of digits.
Postal codes, for example, are significant digit codes. Ocher such codes include
inventory location codes that consist of a rwo-digit warehouse code, followed
by a one-digir floor number code, a two-digit section code, a one-digit aisle
number, and a two-digit bin number code. Figure 9-35 illustrates the invenrory
locarion code l 1205327. \~bat looks like a large eight-digit number is actually
five separarc numbers, each of which has significance.
(....,..... J:gi( . . . . . I_,.. 41 11.,.. ~- )U, Woip-M ._..,.. - ·~•-fllllie<'f •,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. - ~---tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
-
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~
Phase l Systems Design
Section code
Warehouse location code Bin number
'
11 2
'
05 3
'
27
A
Floor number - - - - - - - number
~------ Aisle
FIGURE 9.35 »mple o( a code that uses signifle3nt digits to pinpoint the loation of an inventory item.
• Make codes unique. Codes used for idencification purposes must be unique co
have meaning. If che code H\V can indicace hardware or houscware, che code is
nor ver)' usefu I.
• Use sortable codes. If products with three-digic codes in the I OOs or the 300s
are of one type, while produces with codes in the 200s are a different type, a
simple sort will nor group all t he products of one type together. In addition,
be careful rhar single-digit character codes will sort properly with double-digit
codes-in some cases a leading zero must be added (0 1, 02, 03, ere.) to ensure
char codes sorr correcrly.
• Use a simple structure. Do noc code some part numbers wich two letters, a
hyphen, and one digit, and ot hers with one letter, a h)•phen, and two digits.
Avoid allowing both letters and numbers to occupy the same positions wichin a
code because some of those are easily confused. This situation mighc be a good
place co u~e an inpuc mask to assure that the correct data type b entered.
• Avoid co11f11sio11. It is easy ro confuse the number zero (0) and the uppercase
letter 0, o r the num ber o ne (1 ) with the lowercase lette r L (I) or uppercase
lcrrer I. For example, rhe five-character code 5Z08 l easi ly can be misread as
5Z08I, o r 52081.
• Make codes meaningful. Codes should be easy to remember, user-friend ly,
convenient, and easy to interpret. Using S\Xl as a code for the southwest sa les
region, for example, has far more mea ning than t he code 14. Using ENG as t he
code for t he English department is easier to interpret and remember than eicher
XVA or 132.
• Use a code for a single purpose. Do not use a code co classify unrelaced attri-
butes. For example, if a single code is used to identify the combination of an
employee's depa rtment and t he employee's insurance plan C)'pe, users will have
difficulty idenrifying all the subscribers of a particular plan, or all the workers
1n a particular depa rtment, or both. A separare code for each separate charac-
teristic makes much more sense.
• Keep codes consistent. Foe example, if the payroll system al ready is using two-
digir codes for departments, do not create a new, different coding scheme for
rhe personnel sysrcm. lf the two systems already arc using differen t coding
schemes, cry to esrablish a consistent coding scheme.
r..,,...JID)r-..1-.. 4•11_.. • ...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Phase l Systems Design
Regard less of rhe overall approach, storing large quanriries of dara is like building
a house-ir doesn'r jusr happen. A well-constructed dara warehouse needs an archi-
recrure rhar includes derailed planning and specifications.
DATA MINING: Da ta mining software looks for meaningful data patterns and rela-
tionships. For example, dara mining sofrware could help a consumer products firm
identify porenrial customers based on their prior purchases. lnformalion about cus-
tomer behavior is valuable, but data mining also raises serious ethical and privacy
issues, such as the example in the Question of Ethics feature in rhis chapter.
The enormous growrh in e-commerce has focused attention on dara mining as a
marketing tool. In an article called "Data Mining on the Web" that appeared in the
January 2000 issue of New Architect, a web-based magazine, Dan R. Greening noted
thar web hosrs rypically possess a lot of information about visito rs, bur most of it is
of lirrle value. His article mentions tbar smart marketers and business analysts are
using data mining techniq ues, which he describes as "machine learning algorirhms
thar find buried parrerns in databases, and report or act on those findings." He con-
cludes by saying tha r "the great advan tage of web marketing is thar you can measure
visiror interactions more effectively rhan in brick-and-morrar srores or direct mail.
Dara mining works best when you have clear, meas urab le goals." Some of rhc goals he
suggesrs are :is follows:
• Increase the number of pages viewed per session.
• Increase the number of referred customers.
• Reduce clicks to d ose, which means average page views to accomplish a pur-
chase or obtain desired information.
• Increase checkouts per visit.
• Increase average profit per cbeckour.
This t)'pe of darn garhering is sometimes called clickstteam storage. Armed with
this inform:ition, a skillful web designer could build a profile of typical new cusromers,
returning customers, :ind customers who browse but do not buy. Although this inform:i-
rion would be very valua ble to rhe retailer, clicksrream storage could raise serious legal
:ind privacy issues if an unscrupulous firm sought to link :i customer's web behavior to
:i specific n:ime or email address and then sell or otherwise misuse the informarion.
Because ir can derect parrerns and trends in large amounts of data, dara mining is
a valu:ible rool for m:inagers. There is a well-known story about a chain of superm:ir-
kers that performed a derailed affiniry analysis of purchases and found chat beer and
diapers were often purchased rogetber. Ir is unclear whether or not this story is true,
but without actempting to explain this correlation, the obvious tactic for a retailer
would be to display these irems in the same area of the store. This data mining tech-
nique relies on associariou r u.le learning and is often called mar ket basker a nalysis.
(....,..... J:gi( . . . . . I_,.. 4111.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase 3 Systems Design
Logical storage consists of alphaberic and numeric characters, such as rhe letter A
or the number 9. As de cribed earlier in rhis chapter, a sec of related characters forms
a field, which dc~cribes a single characteristic, or anribure, of a person, a place, a
thing, or an event. A field also is called a data element or a data item.
When designing fields, space should be provided for che largesr values char can be
ancicipared, wichour allocaring unnecessarily large storage capacities char will nor be
used. For example, suppose a cuscomer order enrry sysrem is being designed for a firm
with 800 cusromers. Ir would be a mistake co lim ic the customer numher field to chrce
or even four characters. Instead, a five-character field wirh leading zeros thar could
store cusromer numbers from 00001 ro 99999 should be considered.
A mix of alphabetic and numeric characters can also be considered, which many
people find easier co view and use. Alphabetic characcers expand the storage capacity
because there arc 26 possible values for each character position. Mose airlines now
use six alphabetic characters as a record locator, which has over 300 million possible
value!>.
A logicaJ record is a set of field values that describes a single person, place, thing,
or event. For example, a logical customer record contains specific field values for a
single customer, including the customer ntunber, name, address, telephone number,
credit limit, and so on. Application programs see a logical record as a group of related
fields, regardless of how or where t he data is stored physically.
The term record usually refers ro a logical record. Whenever an application pro-
gran1 issues a read or write command, the operating system supplies one logical
record to the program or acceprs one logical record from the program. The physical
data might be stored on one or more servers, in the same building or thousands of
miles away, bur all rhc applicarion program sees is rhe logical rccord-rhe physical
srorage locacion is irrelevant.
UNICODE: Unicode is a more recent coding srandard rhar uses two byres per
character, rather than one. This expanded scheme enables Unicode co represent more
than 65,000 unique, mu ltilingual characters. Why is this important? Consider rhe
challenge of running a multinational information system or developing a program
that will be sold in Asia, Europe, and North America. Because it supports \irtually all
languages, Unicode has become a global standard.
Traditionally, domestic software firms developed a product in English and rhen
tran lated t he program inro one or more languages. This process was e\.pcnsive,
slow, and error-prone. In contrast, Unicode creates translatable content right from
the srart. Today, most popular operating systems support Unicode, and the Unicode
Consornum maintains standa rds and support, as shown in Figure 9-38.
---- .
,.Q
n.c •••
•
• n.--
OuktlUr>b
C:-0-
UTC_,.._
a.Oii
- ...
n.u............ ..
... _
.............. (C\.OllQ ..
--
QJTC
.
"1t• I w.-O. •
_
......... o... 7 ..
CW-11-
-.
UTC~ ........
.
•
- .. ........
• -- ~~.Jd!Llf!JA&Ht0soctrQl.llll t''
wr--110 . . pp1t• l'll.._~
't W l:lV'IVGil
-·~
l!lll.Lll!lllllll.Jj--.il!C- ,_., ...,
FIGURE 9-38 Unicode Is an international coding format that represents charaeters as Integers, using 16 bits (two bytes)
per character. The Unicode Consortium maintains standards and support for Unicode.
SouK.t ""' ,,,... "'
STORING DATES: What is the best wa)' to store dares? ·me answer depends on how
the dates will be displayed and wbether rhey will be used in calculations.
At the beginning of the twenty-first century, man)' firms that used only two digits
to represent t he yea r were faced wirh a major problem called the Y2K issue. Based
on rhar experience, most date formats now are based on the model established b)' the
International Organization for Standardization (ISO), which requires a format of four
digits for rhe year, rwo for the month, and two for the day (YYYYMMDD). A dare
stored in rha r format can be soned easily and used in comparisons. If a dare in lSO
form is larger rhan another date in the san1e form, then the first date is later. For exam-
ple, 20150504 (May 4, 20 15) is later than 2013092 7 (September 27, 20 L3 ).
But wbat if dates must be used in calculations? For
example, if a manufacturing order placed on June 23 takes
- ..
DI
•
• 1 M
• c
• .!. •
0 t
three weeks co complete, when will the order be ready? If a
payment due o n August 13 is nor paid until April 27 of the
, following year, exactl y how late is the payment a nd how
2'
much inteTesr is owed? In these s ituatio ns, it is easier rouse
1 absolu te daces.
•s An absolute date is the total number of da ys from some
'I, specific base date. To calculate the number of days berween
rwo absolute daces, one dare is suhtracccd from rhc other.
•
-·
t(21fU
10 For example, if the base date is January I, 1900, then May
,,11 UIS 4, 2015, bas an absolute date of 42 128. Similar!)', Seprember
27, 20 13, has an absolute date value of 41 544. If rhe earlier
FIGURE 9.39 Microsoft Excel uses absolute dates In
calculations. In this example. May 4, 2019, ls displayed as dace value is subtracted from the later one, che re ult is 584
43589.and September 27. 2015.ls displayed as 42274. days. A spreadsheet can be used ro determine and displa)
The difference between the dates Is 13 I5 days. a bsolute daces easily, as shown in hgure 9-39.
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 4111.,.. .................,.t11ru
..,...,...... .,..~
~- )U,
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~ c.....,..~
0w.,,,.._.._,..."-,.._..,.,_, .,_.,....,. -~--- t fta111&....-.~~ ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase l Systems Design
FIGURE 9_.0 In addition to network monitoring, system securicy includes access codes, data
encryption, pa,sswords. and audit crails.
A well-de 1gned DBM must provide built-in control and secunty features, includ-
ing subschemas, passwords, encryption, audit rrajl files, and backup and recovery
procedures to maintain data. The analyst's main responsibility is to ensure that the
DBMS features are used properly.
Earlier in this chapcer, it was explained that a subschema can be u ed ro provide a
limited view of the database to a specific user or level of users. Limiting accei.s to files
and database& is the most common way of procecting stored data. Users must furnish
a proper ui.er ID and password co access a file or database. Different privileges, also
called permi~si on~, can he associated wid1 differenc users, so some employees can be
limited ro read-only access, while ocher users might be allowed ro update or delere
data. For highly sensitive data, additional access codes can be established thar restrict
i.pecific records or fields within records. Stored data also can be encrypted to pre·
vent unauthorized access. Encr yption is the process of converting readable data into
unreadable charnccers to prevent unauthorized access to the data.
All system fi les and databases must be backed up regularly and a series of
backup copies must be retained for a specified period of time. In the event of a file
catastrophe, recovery procedures can be used to restore the file or database to its
current state at the time of the last backup. Audfr log fil es, which record details
of all accesses and changes to the file or database, can be used to recover changes
made since the last backup. Audit fields, which are special fields within data
records to provide additional control or security information, can also be included.
Typical audit fields include the date the record \Vas created or modified, the name
of the user who performed the action, and the number of times the record has been
accessed.
Tip Top Toys is a relatively small division ofWorldwide Enterprises. Worldwide has nine
other divisio ns, which include insurance, health-care products. and financial planning
services, to name a few.
The cor porate marketing director for Worldwide has requested Tip Top's customer
shopping data to target people who might be likely to purchase items o r ser vices from
other Worldwide divisions. The database manager is not totally comfortable wich chis and
pointed out Tip Top's web privacy policy, which states "Tip Top Toys. a division of World-
wide Enterprises, will not share personal data with other companies without a customer's
consent."
The marketing director replied that the statement only applies to outside companies-
noc other Worldwide divisions. He said he checked with the corporate legal department.
and they agreed. The database manager replied, "Even if it is legally OK, it's not the right
thing co do. Many people take our statement co mean that their data does not leave Tip
Top. At the very least, we should give customers a choice, and share the data only with
their consent."
Do you agree with the marketing director? Why or why not?
9. I 0 SUMMARY
This chaprer conrinued the scudy of the systen1s design phase of rhe SDLC. Ir was
explained rhar files and tables contain data abour people, places, things, or evenrs that
affect the information system. File-oriented systems, also called file processing sys-
tems, manage data stored in separate.
A database consisrs of linked tables that form an overall data St ructure. A DB~1S
is a collection of tools, features, and inrerfaces that enable users to add, update, man-
age, access, and analrze dara in a dat abase.
DBMS designs are more powerful and flexible than crad1tional file-oriented srs-
tems. A database environment offers scalabiliry, support for organization-wide access,
economy of scale, data sharing among user groups, balancing of conflicring user
requirements, enforcement of standards, controlled redundancy, effective security,
flexibility, better programmer productivity, and data independence. Large-scale data-
bases are complex and require extensive security and backup/recovery features.
DBMS components include interfaces for users, DBAs, and related systems; a
DM L; a schema; and a physical data repository. Other data management techniques
include data warehousing, which stores data in an easily accessible form for user
access, and da ta mini ng, which looks for meaningful patterns and relationships
among d:ira. Dara mining also includes clickstrearn storage, which records how users
interact with :i site, :ind marker baskec analysis, which c:in iJentify pro<luct relacion-
ships :ind consumer buying patterns.
In a web-based design, the Internet serves as the front end, or interface, for che
DBMS. Access to the database requires only a web browser client and an Internee
conne<..-cion. Middleware can interpret client requests in HTML form :ind cranslate
r..,,...JID)r-..1-.. 4•11_.. • ...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Phase l Systems Design
the requesrs into commands rhar rhe database can execute. \'Veb-based dara must he
secure, yet easily accessible ro authorized users. To achieve this goal, well-designed
systems provide security ar rhree levels: rhe database itself, the web server, and the
telecommunication links that connect rhe componencs of the system
In an information system, an entity is a person, a place, a thing, or an event for
which dara is collected and maintained. A field, or attribute, is a single characteristic
of an entity. A record, or tuple, is a set of related fields that describes one msrance of
an entity. Dara 1s 5torcd in files (in a file-oriented system) and cables (in a database
environment).
A primary key is the field or field combination that uniquely and mimmally identi-
fies a specific record; a candidare kc)' is any field rhat could serve as a primary key. A
foreign key is a field or field combination that muse match rhe primary key of another
file or table. A secondary key is a field or field combination used as the basis for sort-
ing or retrieving records.
An ERD is a graphic representation of all system entities and the relationships
among them. The ERD is based o n entities and data stores in DFDs prepared during
rhe systems analysis phase. The three basic relationships represented in an ERD are
one-to-one ( l: 1 ), one-co-many ( J :M), and many-to-many (M:N). In a M:N relation-
ship, the two entities arc linked by an associative entity.
The relationship between cwo entities also is referred to as cardinality. A common
form of cardinality notation is called crow's foot norarion, which uses various sym-
bols co describe rhe characteristics of the relationship.
Normalization is a process for avoiding problems in data design. A I NF record
has no repeating groups. A record is in 2NF if it is in I NF and all nonkcy fields
depend on chc cncirc primary key. A record is in 3NF if it is in 2NF and if no field
depends on a non key field.
Dara design tasks include creating an initial ERD; assigning data elements ro an
entity; normalizing all table designs; and completing the data dictionary entries for
files, records, and data clements.
A code is a set of letters or numbers used to represenr data 111 a system. Using
codes can speed up data entry, reduce data storage space, and reduce transmission
time. Codes also can be used to reveal or to conceal informacion. The main types
of codes are ~equence codes, block sequence codes, classification codes, alphaberic
codes (e.g., caregory codes, abbreviation codes, and mnemonic codes), sig111ficanr digit
code5, dcnvarion code~, cipher codes, and action codes.
Logical storage is information seen through a user's eyes, regardless of how or
where rhat information actually is organized or stored. Physical srorage 1s hardware
related and involves reading and writing binary data to physical media. A logical
record is a related set of field values that describes a single person, place, thing, or
event. Dara storage formats include EBCDIC, ASCH, binary, and Unicode. Dares can
be siored in several formats, including ISO and absolute forma t.
File and database control measures include limiting access to the data, data
encryption, backup/recovery procedures, audit trail files, and internal audit fields.
Key Terms
I: I .\ type of en!lt) rcl:111onsh1p. A one-ro-one relarionship, abbreviated I: I, e'1srs when exactl) one of
the ~ond enm) occurs for e-.ich instance of the first eouty.
I :M A rype ol cnnn rc'3rion)h1p. A one-to-man>• refanomhip, abbre,·iatctl I :M, cx1>t> when one <><:cur·
rcm.e of the finr cnt1ry .:an be related ro many 0<:currcncc\ of the '-"LOntl cnnty, hut each ou:urrcncc
of the -.ccontl enriry can be associated with only one occurrence of the fil'or cnnl)'.
ahhrc~iat;on cock Alphal>etic ahhreviarion. For example, ~randartl \t,lle codt..., include '"Y for '-:ew
York, ME for ~faine, 3nd MN for Minnesot:L
abwlute date lbe total number oi days from some specific bnse date. fo calcufotc the number of da)'S
between two .1bsolute dat.-s, subtract one date from the other. For example, usmg a bJse date of Janu·
Jr) 1, 1900, September 27, 2012, has an absolute date "alue of 4117!1 Jnd Jul) JJ, 2011, has an abso-
lute dare of 40737. If rhc earlier dar<' value is subrracted from the IJtcr one, the result is 442 d,1rs.
acuon code Indicates whJt ,1crion is robe taken with an associJted Item. For exJmple, a student records
progrnm might prompt a user ro enter or click an action code such as D (to d1spla> the student's
record}, A (ro add a record), and X (co exit the program).
alphabetic rntlc Use' alphab"c leacr~ to tlisringuish one item from another ha\Cd on a catci:ory, an
Jbhrcvint1011, C>r an ea,y·tC>-remcmber value, ca lled a mnemonic code.
A~Cll ScanJ, for American Standa rd C.<Jde for Information lntcrchani:c, a lLita 'mrasc coding method
u'ed on mo~t pcrmna I computers and workstation<.
a~~ociath·ecnriry An enriry thar hns its own set of .irrributes .rnd ch,uacrcnstics. AssoctJt1\·e enrirics are
used to link between many-to-many (M:N) relationships.
attribute A srngle chJractenstic or fact abottt an entiry. An arrnbute. or field. 1s the smallest piece of dJta
th.u h.is meanmg within ao information system. For example • .t 5oc1JJ ~urtC) number or company
n.1me could l>e examples of an armbure. Ln ob1ect-oneored .m.ilys1s, an atmbute as pan of J class d1a·
gram th.it describes the characrenstics of objects in the class. Also kno\\n as J data elemeot.
3.udu field\ <;pccial fields ,~;rhin data records ro provide additional control or '>«Uri!)' informarion.
T)•pical audu fields include rhe dare the record was created or modified, the name of the user who
performed rhe action, and the number oi rimes che record hJ'> been an:.,.,.,.,J.
:audit IO)I file\ Roxord detail~ of all accesses and change> co a file or tl.naha\C and can he u'>Ctl to nx:o•cr
changes made since the last backup.
bad.up fhe process of saving a series of file or data copies to be retJtned for a specified period of mne.
Data can he hacked up conunuously, or ar prescribed intervals.
binary qora~e format A formar that offers efficient storage of numeric data . For t.'xample, when numeric
data t) pes are specified using Microsoft Access, there are a variety of sroragc formats choices, includ·
mg mteger and long mteger, among others.
bit The 'niallc.i unit of darn is one bin:try digit.
block ;cqucncc code Cipher that u;e; blocks of numberb for different cla;~ification'>.
by1e A group of e1ghr bus is called a byre, or a character. A ser of byres forms .1 field, which is an ind1v1tl·
u.11 f.1ct about a person, a pl.ace, a thi11g, or an event.
candidate key ~omctim~ iris po<sible ro have a choice of field~ or field comhinauon~ to use as the pri·
mary key. Anr field thac could serve as a primary key is called a candid.ire kc).
cardinaliC) i\ concept rhar de<cribes how instances of one cnnl)· relate to instance< of another cnriry.
Described in FRDs br norarion rhar indicates combinarions rhat include 1cro or one·rn·many, one-co·
one, anti many-to-man}.
c.ud1naht) notation Code rhat shows relationships between emmes.
o;'jtci;ory cod.~ Cipher;. that identify a group of related 1tem>. !'or e.,a.mplc, j lo..al tlepJrtmcnr >tore ma>
use a l'•o·charactcr category code ro identify the deparrmenr 1n whKh a produll "sold.
char.1c1cr A i:roup of c111h1 hot> i~ .:ailed a characrer, or a brre. A ..et of brr~ fonm a field, which i, an
1nd1V1dual f.11.t ahouc a pcr\on, a place, a rhing, or an cvenr.
cipher cod<:'> Use of a kcrword 10 encode a number. A reratl srore, for example, may use a I 0-lctter
word, \uch as Cl\Ml'GROU:-<D, ro code wholes.ile prices, where chc lcncr C reprcscnr~ I, A rep·
rescncs 2, and so on. Thus, the code, GRA:>.D, would indicate char the store paid $562.90 for che
uecn.
clich 10 close fhe average number of page views 10 accomplish a purchase or obtam des1ted
mformJt1on.
did..,trcam \10ra11c R<-<;ordini; wch Vl\itor hchav10r and traffic trend, for later dara m1n1ni:. U\c.
cudc A -.er of lcrter\ or numhef\ chat represents a data item. Codes can be used to ,;mplify output, input,
and darn formats.
combination key A type of dara validation check d1at is performed on rwo or more fields 10 ensure that
they arc consistenr or reasonable when considered rogecher. Even diough all the fields involved in J
combutauon check might pass th~ir ind iHdual validation checks, the combi11,11io11 of the field v.1lue>
nught be inconsasccnr or unreasonable.
common field An attnburc rhar appears in more rhan one euriry. Common fields can be used ro link
entities in vacious types of relarionships.
compmire key Somcrime< it i< nccc<<ary for a primary ker m comi\I of a combination of field,. In that
case, the primary key i< called a comhinarion key, composite key, concatenated key, or multivalued key.
conca1e11atcd key Sec ;:on•P<hllc kc) .
cro" ·, £001 oot.iuon A type of cardinaLit) notation. Ir is called crow·s foot 1101atio11 because o( rhe shapes,
wruch uiclude c1tdes, bars, and S)'mbols. that mdtcate vanous poss1btlmes. A sangle bar uid1c.11es one, a
double b.lr and1c.11es one and onl) one, a cU'cle mdicares zero. and a crow's foot mdicates m.iny.
data clement A single char.1ctcrm1c or fact about an enriry. Adara element, field, or .mnbute cs the
smallest pac~ce of data that bas meanmg within an information system. for ex.implc, a Social Sccurit)
number or comp.in) name could be ei..amples of a data l'lemenr. The rean d.J/J item is also used.
data 11cm Sec Jara clement.
data manipulation h1n11uai.:c (0\.fl) A DML controls database operations. including ~torini:. rctncving,
up<latini;, and dclc11n11 data. Mo<e commercial DBMSs, such as Oracle and IBM\ DBl, use J DMI..
data lllMI A spe<1ahled d.u.1base designed 10 serve the needs of a spectfic department, such JS sales,
m.irkeung, or finance. Each data marr includes only rhe dara rhat users m rhac dep.irtment require to
perform their 1obs.
daca mining Lookmg for meaningful patterns and relationships among dt\ca. For example, data mm
ing software could help a consumer products firm identify potential cw.tomers based on their prior
purchases.
data 'tructurc A mcaninf;fu l combination of related daca clements that is indudcd in a data flow or
retained in a d<1ra >tore. A framcwork for organizi ng and storing data.
data woirchnu~c An inrcgrarcd collccrion of darn that can Sltpporr managemcnr analysi~ and dcci~ion
making.
dntaba~c odmoniHr.itM (OBA! Someone who manages a DBMS. The DBA assesses overall requirement~
and ma1or.11ns the darabai.c for the benefit of the entire organuacion rather than a smgle deparrmenr
or user.
Jatab.i>e mJna11cmcn1 >) ;ccm (OBMS i A rnllecnon of cools, features, .ind interface> that enable> u>er> co
add, update, manage, acce~~. and analpe dara in a darabase.
dcnv01tion code Comhonmg dara from different item attributes, or charactcrisnc~, ro build rhc code.
Mo\t magazine sulxcnpnon codes are dcrivarron codes.
3 10 Key Terms
f BCOIC Stands for E..'l.tended Bina!") Coded Decimal lntercbaoge Code, a cod mg method used on mam-
frame .:ompmers and M>me high-capacity secvers.
cwnonl\ of ,~.de The inhcrenr cfficienc)' of high-volume proces>ing on larger <omputer>. Databa>e
de"gn allmY'> better uulizanon of hardware. If a company maintain\ an enrerpri,e-w1dc databa...,, pro-
cc<>\lng i~ le<>\ ex~n'i"e using a po\vcrful mainframe server instead of u~ing <.C\'eral \mailer compmers.
cncrn>tinn A proce-;~ where data i~ coded (convened into unreadable char.1cter•) '>O rhar only tho~ wirh
the required nurhori1ation can access rhe data (usuallr via de<oding ,oftware)
entity A person, a place, a thing, or an e'·enr for which dara is coUcacd and mamtJ1ned. ~or example, an
onlme sales S)Stem may inc.:lude entities named CUSTOM..l:.R, ORDJ:.R. l'RODUCf, and SUPl'UER.
cnllt)·-rclauon>lup diagram (ERO) A grapluca1 model of the mformation system that depicts the rela-
nonslups among system enri11es.
fidd A 'inglc ~harnctcrl<,tic or fact about an cntiry. A field, or attribute, i' the 'mallc~t piece of data that
ha' meaning with in an infnnnation ')'stem. For example, a Social Sccurit)' numhcr or company name
cou ld he examples of a field. The terms data element, data item, and field are u'cd intcrchani;cably.
file Each file or rahlc comnins dam a hour people, p laces, things, or evenLs that intera..-1 w ith the informa-
tion 'Yl>lcm.
iile-oricnicd sy~tcm A ftle-onented system, also called a file processlllg system, stores .ind manages d.ita
Ill one or more separare files.
first normal form ( LNI') A record is said to be in lNF 1£ 1t does not contain a repe.mng group (,1 set of
data items that can occur any number of times in a single record).
forci~n key A field in one table that must match a primary key \"aluc: in another table in order ro esrab-
ll\h rhc rcl;uion'>hip between the two tables.
fun•'tionall) dcp<ndent Funnional dependence is an imponant concept for under\tanding the 2l-.'F. The
field X "'aid to be fun,·wm.11ly dependent on rhe fidd Y 1f the \·aluc of X depend, on the \·alue of Y.
For example, an order date is dependent on an order number. for a pamwlar order numhcr, rherc 1s
only one \'alue for rhe order dare. Jn conrra<r, rhe product de-;cription os not dependent on the order
number. For a panicular order number, there might be ~veral product dc><:ription\, one tor each item
ordered.
lntemauonal OrganiLation for 5tandardiLation (150) A networL. of nauon.il ~tand.irds 1m111u1es lrom
over a hundred counmes working in pannership wub 1mcrnanon.il orgaml.lnons, govcmmenrs,
industncs, and bus111css and consumer representanves. The ISO acts as a hndgc llCtween public and
private seetors.
ja\a databa\c conncctivit) UDBC) A >tandar d that enables Java application~ to cxch;mge data with any
darJbase th.It uses SQL statements and is ODBC-compliant.
key field\ Ui,ed during the ~)''terns design phase ro organi1e, accc>>, and mainrnon data \tructure,, The
four typt·~ of key fields arc primary keys, candidate key>, foreign keys, and ~crnndary key~.
lo11ica l record A lo11ical record concain< field values that describe a ~inglc pcr>on, place, thin11, or event.
Applicncion program< see a logica l record as a set of field<, rcgard lcs'> of how or where the data is
'torcd phy<1cally.
logical \tOraAc Refer& to informa tion as seen th rough a user's eyes, regardlcs~ of how or where that
information 1; organiLed or srored.
M:l\ A rype of encity relationship. A man}·to-m.1.n} relauouslup, abbrevi.ued M:N, exist> when one
instance of the firq enrity can be related ro many instance<> of the second enmy, and one 1n~t.incc of
the ~ond cnm) can he related 10 many instances of the first ent1t).
man}-to-man) rdatiomhip See \{:N.
markrt h.1d.:et analy<i< A rype of analysis rhat can derecr pattern~ and trend~ in large amounts of data.
m1ddlc\\arc 5oft\\arc that conne.:t~ d1\>1m1br apphcanons and enables them to communicate and
c'\,hange data. For c\amplc, m1ddlcwarc can lmk a dcpa rtmcntal databa..c to a \\ cb \cn·cr 1ha1 can
be accessed by client computers via rhe lnrcmcc or a company inrranet.
mnemonic code Cipher~ u~ing a ~p«1fic combanarion of lerrers that arc easr co rcmembcr. Man)'
thrce<haractcr J1rpon codes are mnemonic codes. For example, LAX represents Lo> Angeles.
mulcivalued kc~ Someumes Jt 1s necessary for a primary key co consist of a comb111Jrion of fields. In that
case, the prill1Jry key 1; ~ailed a combuiauon ke), composite key, concatenated key, or mulm alued key.
nookcy field Any field that i'> nor a primar) kc)' or a candidate key;,, called a nonkey field.
nor1nal1uuon A pr<"'"" hv which analy'll• 1dent1fy and corn-ct inherent problems and complc\illc' m
their record dc,ign,.
one·to-man) rclat1on~h1p See J :M.
one-to-one rclauon\hip Sel' I: I.
open databa>c connectivity (ODBC) An inclusrry-standard protocol that make' it po~'ihlc for ;oftwa1·c
from different vendors ro inrcrncr nnd exchange dnrn.
orphan An unassociared or unrelared record or field. An orphan could be created if J cusromer order
was emercd in an order table where rhar cuscomer did nor already exist in che cuscomer tJble. Refer·
cntial integrity would prevent rhc creation of thi~ orphan.
permissions Uscr-spcc1f1c pnv1ley.es th.Jr derermme the rype of access a user has to a dacabJsc, file, or
dtrectory. Also called user nghrs.
phrical 'tl'f1111t Information 'ttorai;c mcd1ani'rn that is <tri~Tly hardwari; related, ~"t;rnw it invuh·c-- the
process of rcadmg Jnd writing binaf) data to physical me<lia. such .is a h•ud dri\e, fl.ish drive. or DVD.
primal) t..,") \ field or comhm:mon of fields rhar uniquely and minimally identifie' a particular member
of an cnut). For example, 111 a c.:u,t0mer mhle the cu~tomer number is a umquc pnmal') kc) hct:au-.e
no mo c.:u>tomcr' .:an have the !hlmc ~-u>tomer number. That kc) aho i~ m1n11nal bccau-.e n contain.,
no mfnrmannn bcrond what " needed ro identify rhc cusromcr.
query b) c~ampk QRf 1 A language allow~ the user co pro,;dc an example of the data reque,ted.
quef) lanRuagc Allows a user ro ~rcc1f)· a task wirhour spccif)'ing how the task wtll be accomplished.
Some query languagrs use natural language commands that resemble ordinaf) English senrencrs
record A set of related fields that describes one instance, or member of an emit), ;uch as one customer,
one order, or one produu. A record m1gl11 have one or doreus of fields, depeudmg ou "hat mforma-
uon 1s needed. Al~o called a ruple.
rcco,cry procedure Pmce" for resrorin11 data and rcsrarrin~ a ~ys1cm after an interruption. Recovery
procedure' can be UM"d m rc<rorc a file or database ro its current state at the time of rhc la~r backup.
referential integrity A rypc of validity check. Referential inregriry i< a sec of rule<> thar avoid< dara incon
'i~tcncy and quality problem\.
rela1iooal databa~c A darahnse in which rnhles are related by common fields, creating a unified d.1C,1
strucrnre th.11 provides improved data qua licy and access.
relational model A model u;ed in relational databases. The relattonal model was mtroduced du rang the
1970; and be'ame popular bec.1usc n was fleXtble and powerful.
rcpca111111 group A >CC of one or more field; char can occur any number of rime; in a single rc<:ord, wuh
each occurrence having d1ffcrenr values.
scalabtlit) A characrcri~ric implying rhc system can be expanded, modified, or dowmi1cd easily m meet
che raptdl> changing need~ of a business enterprise.
~cbema The complete definmon of a database, indudmg descriptions of all fields, records, and
relaoon;lups.
313
Exercises
Questions
I. \Xlhar is a dam srrucrurc?
1. Brief!)' describe the componenrs of a DB.\ILS.
3. Lisr the major characrerisrics of web-based design.
4. l:.xpl;un primary key, candidate key, secondary key, and foreign key.
5. What arc ERDs and how are they used?
6. How do you convert an unnormalized design to lNF? Lo your answer, refer ro specific pages and
figures in rh1s chapter.
7. How arc codes used in data design?
8. Whar is data warehousing and dara mining?
9. How would a specific date, such as March 15, 2019, be represented as an absolute date?
I 0. How arc permissions used ro control access ro data?
Discussion Topics
I. Jn the auto shop examples in Section 9.1.2, what arc some problems thar might arise in Mario's
system? \Xlhy won 'r Danica run into the same problems? Provide ~pecific C'Camples in your answer.
2. Many large organizations have had tbeir database system hacked and customer dara srolen. How
should rhe secunry for rhe database be differenr than security for the resr of rhe system? Does ir make
a difference for web-based dara designs? lf so, how?
3. Suggesr rhree rypical business siruacions where referenrial integnry avoids data problems.
4. \Xie use tors of codes m our personal and business live!>. How many can you name?
5. Are there erhical issues ro consider when planning a database? For example, should sensitive personal
dara (such as medical information) be stored in the same DBMS rhar manages employee salary and
benefirs data? \Vhy or why nor?
Projects
I. Consider an automobile dealership with chree locations. Dara fields exist for srock number, vehicle
identificarion number, make, model, year, color, and invoice cost. Identify rhe possible candidate keys,
the likely primary key, a probable foreign key, and porenrial secondary keys.
2. Vis1r the bookstore ar your school or in your area. Interview the manager or store employees ro learn
more about the business and the entiries rbar are involved m book~tore operations. Remember that
an cmiry is a person, a place, a thing, or an event that affects an information system. Draw an ERD,
including cardinality, which describes the bookstore's operarions.
3. Cludadwy Chairs sells a parented sear rhar spectarors can take ro youth soccer games. The scat folds
so it is small enough ro fir in rhc glove box of most vehicles. The company opcr:ites a facrory in Kan-
sas and also contr:icts irs manufacturing projects ro small firms in Canada and Mexico.
An unusual problem has occurred for this small multinationa l company: People are gemng con-
fused about dares in internal memos, purchase orders, and email. When the company's database was
originally designed, the designer was nor aware that the format for dares in Canada and Mex~ico
was different from the format used in the Unired Stares. For example, in Canada and Nlexico, the
notation 7/ 1/19 indicates January 7, 2019, whereas in the Uni red Stares the same norarion indicates
July l, 2019. Although ir seems like a small point, the date confusion has resulted in several order
cancellations.
Cludadw) Chairs has asked for your advice. You could suggest writing a simple program ro convert
the dares automaticall)' or design a switchboard command thar would allow users ro select a date
r..,,...JID)r-..1-.. 4• 11_.. • ...__. ~... . ... .,...~ • ........._ . ....._.,.,.. o-... ..,._.,,.,.. _ ..,.~ ,........., ................. .._... .., .,. ..,.~"
................... ..., ...................... .... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Chapter 9 Data Design
314 Exercises
formar as d:na is cnrcrcd. You reali1e, however, rhac Cludadwy Chairs mighr wanr ro do business in
orhcr councrics in rhe fururc. \Xlhar would be che besc course of accion? Should rhc compan)' adapr ro
rhc ~randard of each counrry, or should ic mainrain a single international formar? \Xlhar arc che argu-
menrs for each opnon?
4. Use ~11crosofc Access or sinular dacabase software co create a DBMS for the imaginar)' company
called TopTexc Publishing, which is dt'scribed in Cast' in Poinr 9.1. Add several sample records co each
rable and report 10 the class on your progress.
5. Search rhe internet to find information about date formats. Determine whether rhe date formar used
in chc Unired Stares is rhe most common formac.
r..,,...JID)r-..1-.. 4•11_.. • ...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
~ JIJ»C....... ~ Al RlilfD l,eocl\olld.,...,. _WOlfi'l'l.~• ......-W.Mdk«iil,_._DIK•dtc--.: ......,_ . . . ,_.,~-.lit .......... .._.,._.__..,~•\
~ ... _ . . . _ . .... ..., ~...,.._,_..,..., J\&."9 ... --.11 ......... ~ C'dptl"~~d.tt ...... - ............ - ..... - .......... -.-.....w--...-.11
Chapter I 0 System Architecture
System
Architecture
Chapter I 0 is the final chapter in the systems design The chapter includes three "Case in Point"
phase of the SDLC. This chapter describes system discussion questions to help contextualize the concepts
architecture. which translates the logical design of an described in the text. The "Question of Ethics" explores
information system into a physical blueprint. Designing the trade-offs between the potential benefits of Installing
the system architecture requires consideration of servers. tracking software on users' computers to Improve the
clients, processing methods, networks, and related issues. system's response to common usage patterns versus the
ethical issues related to invasion of privacy by constant
monitoring of employees' online activity.
r..,,...JID)r-..1-.. 4•11_.. • ...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Phase l Systems Design
Many companies are extending internal ERP systems to their suppliers and cus-
tomers, using a concept called supply chain management ( CM). For example, in a
totally integrated supply chain system, a customer order could cau~c a manufacturing
system to schedule a work o rder, which in n1m rriggers a call for more parts from one
or more suppliers. In a dynamic, highl)' competitive economy, CM can help compa-
nies achieve faster res ponse, bener customer service, and lower operating costs.
Oracle 1s an example of a company offering ERP solutions. A~ shown in Figure 10-1,
Oracle's ERP products are cloud-based services that support emplO)'ec collaboration,
provide access to information from mobile devices, and deliver data analytics capabili-
ties co gain insight into business processes.
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase l Systems Design
• Have any significanr rechnical developments occurred char could affect rhe pro-
posed project?
• I lave any major assumprions changed since the compan)' made the build versus
buy decision?
• Are chere an)' merger or acquisirion issues ro consider, whereby rhe company
might require comparibiliry wirh a specific environment?
• Have any new crends occurred in the markerplace? Are new products or tech-
nologies on rhe verge of being introduced?
• Have rhe original TCO estimates been updaced? If so, are there any significanr
differences?
The answers ro rhese questions mighr affecr the initial cost and TCO for the proposed
system. The system requirements and alternarivcs should be reviewed now, before
proceeding ro design rhc sysrem architecture.
I 0. 1.4 Scalability
A nerwork is composed of individual nodes. A node represents a physical device,
wired or wireless, rhar can send, receive, or manage network data. For example,
nodes can be servers, compurers, shared printers, mass storage devices, wireless access
points, or tablets.
Scalability, somerimes also called exrensibiliry, refers co a system's ability co
expand, change, or downsize co meet the changing needs of a business enterprise.
Scalability is especially important in implementing systems char are volume relared,
such as rrans::iction processing S)'Stems. A scalable system il> necessary to suppon a
dynamic, growing business. For example, a scalable nerwork could handle anywhere
from a few dozen nodes co thousands of nodes, and a scalable DB!vlS could supporr
the ::icquisition of an enrire new sales division. When invesring large amounts of
money in a projecr, management is especially concerned about scalability issues rhar
could ::iffecr the system's life expectancy.
I 0.1.S W eb Integration
An mformation system includes applications, which are programs that handle rhe
input, manage the processing logic, and provide the required ourpur. The systems
analyst must know if a new application will be pan of an e-commerce strategy and
the degree of integration with ocher web-based components. As mentioned earlier, a
web-centric architecture follows internee design protocols and enables a company co
integrate the new application into its e-commerce strategy. Even where e-commerce is
not i1wolved, a web-centric application can run on the luterner or a company inrraner
or cxrrancr. A web-based application avoids many of the connectivity and compatibil-
ity problems rhar typically arise when different hardware envirornncnrs arc involved.
In a web-based environment, a firm's external business partners can use standard web
browsers to import and export data.
Interfacing a new system wirh a legacy system involves analysis of data formats
and compatibility. In some cases, a company will need co convert legacy fil e data,
which can be an expensive and rime-consuming process. ~1iddleware, which is
di cussed later in this c hapter, might be needed to pass dara between new systems
and legacy systems. Finally, to select the best architecture, rhe analyst mu~t know
if the new application eventually will replace the legacy system or will coexist
With it.
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase l Systems Design
You are a systems analyst at ABC Systems, a fast-growing IT consulting finn, that provides a wide
range of services to companies that wane co establish e-commerce operations. During the past
18 months, ABC acquired two smaller finns and sec up a new division that specializes 1n SCM.
AligningABC's intemal systems was quite a challenge, and top management was not especially
happy With the integration cost or the timetable. To avoid furure problems, you have decided
to suggest an ERP strategy, and you plan to present your views at the staff meeting tomorrow.
ABC's management team is very informal and prefers a loose, flexible style of management.
How will you persuade them that ERP is the Wirf to go?
r..,,...JID)r-..1-.. 4•11_.. •...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Chapter I 0 System Architecture
····-
LAN
resolved the problems of stand-alone computing
by joining clients into a local area ncl\\Ork
Client (LAN) that allows haring of data and hardware
I 'Q
resources, as shown in figure 10-4. One or
more LANs, in turn, can connect to a centralized
server. further adv;:inces in technology made it
possible to creote powerful nerworks that could
use satelUte li11ks, high-speed fiber-optic lines, or
AllUllil Client
Client the Internet to share data.
A wide area network (WAN) spans long
FIGURE I 0-4 A LAN allows sharing of data and hardware, such as
printers and scanners.
distances and can connect LANs rhat are con-
tinents apart, as shown in Figure 10·5. \Xlhen
a user accesses data on a LAN or WAN, the network is transparent because users see
the data as if it were stored on t heir own workstation. Company-wide systems that
connect one or more LANs or WANs are called distributed systems. The capabilities
of a distributed system depend on the power and capacity of the underlying data
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
- Woip-M ._..,..
..
- ·~•-fllllie<'f •,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. - ~---tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase l Systems Design
'- ToronlO
I I.AN
London
WAN
I
~:Jv
LAN
Brisbane
FIGURE I 0-6 In a client/server design.data is stored and usually processed on the 5enlel".
Figure I 0-7 lists some major differences between clienc/server and traditional main-
frame systems. M any early client/server systems did nor produce expected savings
because few clear standards existed, and development costs often were higher than
anticipated. Implementation was expensive because clients needed powerful hardware
and software to handle shared processing tasks. In addition, many companies had an
installed base of data, called legacy data, which was difficult to access and transport
to a client/server environment.
(....,..... J:gi ( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,...... .,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~ c.....,..~
0w.,,,.._.._,..."-,.._..,.,_, .,_.,....,. -~--- t fta111&....-.~~ ij
........ .,..,. .. ._.,.,.,.......c:-..•~- " .....- ""'*" ....,.._...,.. ..
Phase l Systems Design
most of the application processing logic at the client. A chin client design locaccs all or
most of the processing logic at rhe sen •er.
In the late 1990s, un Microsystems (now part of Oracle) was a strong advocate
of thin-client computing, which was also referred to as net-centric computing. The
thin client was a Java-powered terminal, which communicated using standard
Internet protocol~ with powerful servers. Thin cliencs were expected co provide lower
T CO, since maintenance was centralized. However, many users rebelled at the hmtted
funcnonaliry provided by thin clients (e.g., no Microsoft Office) and the latency
problems mherenr in network access to remote applications and dara. In the end, far
clients (e.g., regular PCs) remained popular, even with all their management issues
and higher T CO.
Today's l:iptop computers, cablets, and smarrphones a re so powerful rhat the allure
of thin clients has mostly passed, with the exception of access to the cloud for large
datasets and specialized processing needs. The app ecosystem has also changed the
TCO equation in favor of powerful computing for clients at the edge of the system
architecture.
Two-tier Server
..,.. ____ _ _____ ,.. Cllenl
Three-tier
-- -- -
Application
serwr -- --
- Client
The advantage of the application logic layer is thac a three-tier design may enhance
overall performance by reducing rhe data server's workload. The separate application
logic la)'er also relieves clients of complex processing tasks. Because it can run on a
sen·cr that is much more powerful than the typical client work'itarions, the middle
layer i'> more efficient and cost-effective in large-scale sy~ems. Figure I 0-9 hows
where the data, the application logic, and the user interface a re located on various
architectures. In a diem/server system, the tiers communicate using software called
middleware, as described in the following section.
Apphcat1on User
Architecture Data Logic Interlace
Sland·alone Sel'ller 1
client x x x
l\.vo·tier
Client
Sel'ller x x ---,
cllenVserver Client x x I
Three-tier
Data server x I
cllenVserver Application server x I
,.Client
•
x I
FIGURE I 0-9 The location ol the data. the application logic, and the user Interlace
depend on the type of architecwre .
I 0.3.3 Middleware
In a multitier system, special software called middlev.'aJ'C enables the tiers to communicace
and pass data back and forth. Middle·.vare is sometimes called glueware because it i'i
used co connecr two or more software components in a federated system archirccrure.
Middleware plays an important role in integrating legacy systems and web-based and/
or cloud-based applicarjons. !vtiddleware can also be seen a<: representing the slash in che
term clie11tlser11er.
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase l Systems Design
Finally, client/server systems can influence nerwork load and improve response
times. For example, consider a user at a company headquarrers who wants informa-
tion about total sales figures. In a client/server system, che server locates the data, per-
forms the necessary processing, and responds immediately co the client's request. The
data retrieval and proces~ing functions are transparent to the client because they are
done on the server, not the client.
The internet has had an enormous impact on system archirecrure. The internee has
become more than a communication channel-many IT observers see it as a funda-
mentally different environment for system development.
c
,/\ Web server
provides scaling on demand,
which marches resources to
needs at any given time. For
example, during peak loads,
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~---tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase l Systems Design
method where software is nor purchased bur is paid for as a service, much like one
pays for electricity or cable TV each month. In rhis a rchitecn1re, service providers can
easily make updates and changes ro services without involving the users.
Even though cloud computing has tremendous advantages, some concerns exist.
First, cloud computing may require more bandwidth (the amount of data that can
be transferred in a fixed rime period) than traditional clienrl erver networks. Second,
because cloud compurmg is Internet-based, if a user's Internee connecnon becomes
unavailable, the user will be unable to access any cloud-based services. In addition,
there are security concerns associated with sending large amouncs of data over the
Internet, as well as concerns about scoring it securely. Finally, there 1s the issue of
control. Becau e a service provider hosts the resources and manages data storage
and access, rhe provider has complete control of the system. Many firms are wary of
handing over control of mission-critical data and systems to a third-parry provider.
This is particularly true when the cloud provider's servers arc physically located in
another jurisdkrion or country.
Future technology advances will make cloud computing even more feasible, desir-
able, and secure. As the IT industry moves coward a web-based architecture, cloud
computing is being marketed aggressively and growing rapidly. Ir has become a cor-
nerstone of enterprise system a rchitecture and will continue to be for the foreseeab le
future.
I 0.4.l W eb 2.0
The shifc to Internee-based collaboration has been so powerful and compelling that it
has been named \Xleb 2.0. \Xleb 2.0 is not a reference to a more technically advanced
version of the current web. Rather., Web 2.0 envisions a second generation of the web
that will enable people co collaborate, interact, and share information more dynam-
ical!)'· Some view Web 2.0 as a stepping stone toward the semantic web, called \Xleb
3.0 b)• !>Orne, where the documents shared on the Internee have semantics (meaning)
and not just syntax (I IT.ML markup).
Social networking sires, such as Facebook, T\viner., and Linkedln, are seeing explo-
sive growth in the Web 2.0 environment. Another form of social collaboration is
called a wiki. A wiki is a web-based repository of information char anyone can access,
contribute to, or modify. In a sense, a wikj representS the collective knowledge of a
group of people. One of the best-known wikis is \Vikipedia.org, bur smaller-scale
wikis arc growing rapidly at businesses, schools, and other organizations thar want to
compile and share informarion.
One of rhe goals of Web 2.0 is to enhance creativity, interaction, and shared ideas.
In rhis regard, the \Xleb 2.0 concept resembles the agile development proces~ and
the open-source software movement. Web 2.0 communities and services are based
on a body of dat~1 created by users. As users collaborate, new layers of informarion
are added in an overa ll environment known as the Internet operating system. These
layers can contain text, audio, images, and video clips rhat are shared with the user
community.
The huge expansion of online commerce is reshaping the IT landscape. Internet busi-
ness solutions must be efficient, reliable, and cost-effective. When planning an e-com-
merce architecture, analysts can examine in-house development, packaged solutions,
and service providers. The following sections discuss these options.
Obtain lnpu1 from users who understand lhe business and technology
Issues involved in the projecL Plan for future growth, but alm lor ease of
use.
Oe1ermme whether the rT staff has the necessary skills and experience to
lmplomenl the project. Consider tra1n1ng, additional resources, and the
use or consultants 1r necessary
Develop the project in modular form so users can lest and approve the
funchonal elements as )IOU go along
For s ma ller companies, the decision about in-house web development is even mo re
critical, because this approach will require fina ncial resources a nd management atten-
tio n tha t many small companies might be unable or unwilling to commi t. An in-house
strategy, ho weve r, can pro vide valua ble benefits, including the fo llowing:
• A unique website, with a look and feel consistenr with the compa ny's orher
ma rketing effo rts
• Complete control over the orga nization o f the site, the num ber of pages, a nd
the size of the fil es
• A scala ble structure to handle increases in sales a nd producr offerings in rhe
fu ru re
• More flex ibi lity to modify a nd manage the site as the company changes
• T he opp<irrun iry to integrate rbe fi rm's web-based business systems with its
o ther informa rion systems, c reating rhe po tential for more savings a nd berrer
customer service
(....,..... J:gi ( . . . . . I_,.. 41 11.,.. ~- )U, Woip-M ._..,.. - ·~•-fllllie<'f •,... 0w.,,,.._.._,..."-,.._..,.,_, .,_.,....,. - ~--- t fta111&....-.~~ ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
-
r..a...w...,..._...., .. .................,.t11ru ..
..,...,...... .,..~ __.~~ c.....,..~
Phase 3 Systems Design
Whether a firm uses an in-house or a packaged design, the decision abour web host-
ing is a separare issue. Alrhough inremal hosring has some advanrages, such as grearcr
control and security, the expense would be much greater, especially for a small- ro
medium-s11ed firm.
IBM
- ---
Small Potatoes is a family-operated seed business that has grown rapidly. It specializes in supply-
ing home gardeners with the finest seeds and gardening supplies. Until now, the finn has done all
i ts business by placing ads in gardening and health magazines and taking orders using a toll-free
telephone number.
Now, the family has decided to establish a website and sell online. but there 1s some
disagreement about the best way to proceed. Some say it would be better to develop the
site on their own, and one of the employees, who is a recent computer science graduate,
believes she can handle the task. Others feel it wou ld be better to outsource the site and
focus on the business itself. Suppose t he family asked for your opinion. What would you
say? What addit ional questions would you ask?
r..,,...JID)r-..1-.. 4•11_.. •...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Phase 3 Systems Design
I 0.6.3 Example
The diagram in Figure I 0- 14 shows how a point-of-sale (POS) terminal, such as that
used in a supermarket, migh t trigger a series of onJinc and batch processing events.
Note rhat chc sysrcm uses onlinc processing to handle data entry and inventory
updates, while reports a nd accou nring entries are performed in a batch. A company
would choose a mix of onlinc and batch processi111g when it makes good business
sense. Consider t he following scenario in a typical retai l store:
• During business hours, a salesperson enters a sale on a POS terminal, which is
part of an on line system that handles daily sales transactions and maintains an
up-co-date invencory file.
• \Vhen the salesperson enters the transaction, online processing occurs. The
sy~tem performs calcularions, updates the inventory file, and produces output
on the POS rerminal in the form of a screen display and a printed receipt. At the
same time, each sales transaction creates input data for day-end hatch processing.
• When rhe ~core closes, rhe system uses the sales transactions to produce che
daily 5ales report, perform the relaced accounting enrries, and ::maly1e rhe data
to idencify slow- or fasr-moving irems, sales crends, and related issue -such as
store discounrs for rhe next day.
t t
Accounllng
Inventory Files
FIGURE 10- 14 Many retailel"l use a combination of online and batch processing.When a salesperlon enters the sale
on the POS terminal, the online system retrieves data from the item file, updates the quantity in stock, and produces a
sales transaction record. At the end of the day. a batch processing program produces a daily sales report and updates the
accounting system.
Online or barch processing are totally different bur can work well together. In this
scenario, an online system bandies POS processing, wbich must be done as it occurs,
while a batch mechod provides routine, overnight processing and marketing analysis.
Online processing allows tbe daca to be entered and validated immediately, so the
informarion always is up ro date. However, a heavy volume of online transaction~ can
be expensive for smaller firms, and data backup and recover)' also add to IT costs. In
contrast, when used properly, bacch processing can be cost-effective and less vulnera-
ble to system disruption.
I 0. 7 NETWORK MODELS
A network allows rhe sharing of hardware, software, and data resources in order
co reduce expenses and provide more capability co users. When planning a network
design, chc sysccms analyst must consider network terms and concepts, including the
OSI model, network modeling tools, network topology, network protocols, and wire-
less networks, which arc covered in rhis secrion. Other imporranc issues, such as ncc-
work performance and security, arc covered in Chapter 12.
(....,..... J:gi( . . . . . I_,.. 41 11.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- t fta111&....-.~~ ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase 3 Systems Design
10.7.2 Ne tworkTopology
The way a necwork is configured is called the net\>.'ork copology. Topology can
refer co a physical or a logical view of che network. For example, phy~ical copology
describes che actual network cabling and connections, while logical copology
describes che way the components inceract. le is importanc to understand the
disnncrion, because a specific physical topology might be able co support more than
one logical topology. For example, it is noc uncommon to run cabling in a certain
pauern because of physical installation and cosc issues but to use a different partern
for the log1cal topology.
Compucers may be physically arranged in a circular shape, but that mighc or might
not reflect che network topology. The examples shown in Figures 10-15 to 10-19
represent a logical copology, as seen by network users, who may not know or care
about che physical cabling panern.
LAN and WAN networks cypically arc arranged in four patterns: hierarchical, bus,
ring, and star. The concepts are the same regardless of the size of the network, but the
physical implementation is different for a large-scale WAN that spans an entire busi-
ness enterprise compared wi th a sma ll LAN in a single department. These four com-
mon topologies arc described in the following sections.
--
FIGURE 10- 15 A hierarchical network with a single server that controls the network.
g
less common today.
~B>--~~-- ~
and peripheral devices. [nformation is transmirted
in either direction between networked devices, and
all messages travel over the same central bus. Bus
Termnals U PC networks require less cabling than ocher topologies,
s because only a single cable is used. Devices can also be
PC
g PC
RING NETWORK: Although ring networks arc
st ill around, they are somewhat outdated. rBM
was a leader in ring network technology when they
introduced their token ring LAN, and large companies
who use [BNl mainframe equipment sti ll deploy the
ring network design. A rinA network, as shown in
Figure L0- 17 , resembles a circle where the data flows
Oepartmon1a11etver in only one direction from one device to the nexr. In
function, a ring network can be thought of as a bus
FIGURE I 0 - 17 A ring network with a set of computers that network with rhe ends connected. One di~advanrnge
sends and receives data flowing In one d1rect1on.
of a ring network is that if a network device (e.g.,
a PC or a server) fails, the devices downstream from the foiled device cannot
communicate with the network.
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase 3 Systems Design
Nerworks such as LANs or W'ANs can be intercon- FIGURE I 0- 19 A mesh network is used In situations where a
nected using devices called rourers. A router is a high degree of redundancy is needed. such as military applications.
device thar connects network segmen rs, determines The redundant design provides alternate data paths but is
expensive to Install and maintain.
the most efficienr data path, and guides the flow of
data.
Using a router, any network topology can connect to a larger, dissimilar network,
uch as the Internet. This connection is called a gateway. The example in Figure 10-20
show a star topology, where a switch connecrs nodes in rhe LAN and the router links
the network to the Internet. A device called a proxy server provides Internet connec-
tivit}' for internal LAN users. The vast majoriry of business nerworks use routers to
integrate che overall network archirecmre.
Departmental
server
1i1,~ I ~ Router
1i1 ~ ,,_ ~
~ "'~'
Internet
Proxy server
1i1 /
0 PC
Q PC
FIGURE I 0·20 Routers can be used to create g:iteways between different network topologies and large. dissimilar networks such as che
Internet.
I0.8. 1 Standards
Wireless networks a re based on various standards and protocols that still arc evolving.
The mosr popular of these is called IEEE 802.11, which is a family of standards developed
by the Institute of Electrical and Electronics Engi11ccrs (IEEE) for wireless LANs.
Current wireless networks are based on variations of the origina l 802. 11 standard.
Severa l versions, or amendments, were intended to improve bandwidth, range, a nd
security. The IEEE 802. 11 set of standards changes very rapidly, in large pare due to
pressure from consumer groups and industry leaders moving toward ever-fasrer wire-
less nerworks. Wireless network speed is measured in megabi ts per second (M bps) or
gigabits per second (Gbps).
For example, when the 80 2.llb standard was introduced in 1999, rhe average
speed was I I I bps. Larer versions, such as 802 .1 l g and 802. 11 n, increased band-
width to 54 Mbps and 450 Mbps, respeccively, and were widely accepted by rhe
(....,..... J:gi( . . . . . I_,.. 4111.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase 3 Systems Design
IT industry. Current standards, such as 802.1 l ac, can theoretically reach speeds of
nearly 7 Gbps. The increased speed is accomplished using multiple inp ut/multiple
o utpu t (MIMO ) technology to boost performance. MIMO relies on mulciple data
paths, also called mul tipath design, to increase bandwidth and range.
If wirelesc; capacity continuec; to expand and security issues can be overcome,
\'VLANs could replace wired networks in man)' situations. \'Vireless security is dis-
cussed in detail m Chapter 12.
I 0.8.2 Topologies
Like wired networks, wireless networks also can be arranged in differenc topologies.
The rwo most common network topologies available for IEEE 802. I I WLANs are
the Basic Service Set and the Extended Service Sec. Figure J0-21 shows simplified
models of these topologies.
The Basic Service Set (BSS), also called the infrastructure mode, is shown at the
top of Figure 10-2 1. In this configuration, a central wireless device, called an access
poiJlt or wireless access point (WAP), is used to serve all wireless clients. The access
point is similar to a hub in the LAN star topology, except it provides network services
to wireless clients instead of wired clients. Because access points use a single commu-
nications medium, the a ir, they broadcast all traffic to all clients, just as a hub would
do in a wired network. Typically, the access point itself is connected to a wired net-
work, so wireless clients can access the wired ae~vork.
The second wireless topology is the Extended Service Set (ESS), as shown at the
bottom of Figure I 0-21. An ESS is made up of two or more BSS networks. Thus,
using an ESS topology, wireless access can be expanded over a larger area. Each access
point provides wireless services over a limited range. As a client moves :iway from one
access poinr :ind closer to another, a process called roaming automatically allows rhe
client to associate wich the srronger access point, allowing for undisrupted ser vice.
I 0.8.3 Trends
\Vireless cechnolog y has broughr explosive change co the IT industry and will con-
cinue co affect businesses, individuals, and societ)·. Even in the ever-changing world of
IT, it would be difficulr ro find a more dynamic area than wireless technology.
With the growing popularit)' of 802.1 1, many firms offer networking products,
services, and information. One of the most significant groups is the \Vi-Fi Alliance,
which maintains a website at www.wi-fi.org. According to che site, the Alliance is a
nonprofit international associ:ition formed in 1999 to certify interoperability of wire-
less network produces based on IEEE 802. I J specifications. Products that meet the
requirements arc certified as wireless fidelity (Wi-Fi) compatible. The stated goal of
the Wi-Fi Alliance is to enhance the user experience through product interoperability.
Even though they have many advantages, wireless networks also have limitations
and disadvantages. For example, devices that use the 2.4 GHz band can pick up inter-
ference from appliances such as microwave ovens and cordless telephones that use the
same band. More imporranr, wireless nerworks pose major security concerns because
wireless transmissions arc much more susceptible to interception and intrusion than
wired networks. These issues are discussed in detail in Chapter 12.
ln addition co \Xii-Fi, another form of wireless transmission called Bluetooth is very
popular for short-distance wireless communication that does not require high power.
Examples of Bluerooth devices include wireless keyboards, mice, printers, cell phone
headsets, and digital cameras, among others. People with Bluetooth-equipped phones
or tablets can even beam information ro each other and exchange digital notes.
..
i:J ..._
-
·---
-~ .............
··~- ~ --· - :. - -
....
n
...
• -
...
n -
~·> - (Cc~
FIGURE I 0-2 1 The user in the upper sc:reen has moved out of the BSS
c:overage area and cannot communicate. In the lower sc:reen, the user roams Into
another ESS coverage area and the transition is seamless.
Spider IT Services specializes in cuscom network design and installation. Firms hire Spider to
do an overall analysis of their network needs, including a detailed cost-benefit scudy. Recendy,
a problem arose. One of Spider's clients complained that the relatively new network was too
slow and lacked sufficient capacity. Reviewing the case, Spider's top management realized that
the rapidly growing client had simply outgrown the network much earlier than anticipated. How
could this problem have been avoided?
r..,,...JID)r-..1-.. 4• 11_.. • ...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... .., .,. ..,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Phase l Systems Design
System architecture marks the end of the systems design phase of the SDLC. Recall
that in the systems analysis phase, all functional primitives were identified and doc-
umented with process descriptions. The objective then was to identify the system's
functions and determine what each logical module would do, without actempring to
determine how that function would be carried our. ~1oving from analysis to design
tasks, the development process continued wirh consideration of output and user
interface design, dara design, and sysrem architecrure issues. Now, based on a clear
definition of system requirements and design, software applications can be developed,
documented, and reseed as parr of the systems implementation phase of the SDLC,
which is described in Chapter 11.
Developers must also consider system management and support cools that can
monitor system performance, deal with fau lt management, handle backup, and pro-
vide for disaster recovery. These topics are covered in detail in Chapter 12.
The fina l activities in the sysrems design phase are preparing a system design speci-
fication, obtaining ui.er approval, a nd delivering a presentation to mnnagement.
I 0.9.3 Presentations
Usually, the systems analyst will give severaJ presentations ar the end of the systems
design phase. The presentations offer an opportunity to explain the system, answer
question~, consider comments, and secure final approval.
The first presencation is to the other systems analysts, programmers, and rechni·
cal support staff members who will be involved in future project phases or opera-
tional support for the system. Because of the audience, the presenration is rechnicall>•
oriented.
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase 3 Systems Design
The new accounting system is operational, but feedback from users has been negative.
The most common complaint is chat the system is not user-friendly. Some people in the
IT department think that more user training would solve the problem. However, the IT
manager is opposed to a fresh round of training. "Let's just set up the network to monitor
the users' keystrokes and mouse clicks, and see what the patterns are," he suggested. "We
can analyze the data and come up with tips and suggestions that would make the system
easier to use."
Your initial reaction is chat the IT manager is wrong for two reasons. First, you believe
that monitoring would not be an effective method to learn what users really want. In your
view, that should have been done in the system requirements phase. Second. you are both-
ered by an ethical question: Even though the proposed monitoring would involve company
business, the company network, and company time, you feel chat many users would resent
the unannounced monitoring and might feel that their performance or other computing
activities were being appraised without their knowledge.
The IT manager has asked to you to write up a recommendation.What will you say
about the ethical question chat troubles you!
I 0.10 SUMMARY
r..,,...JID)r-..1-.. 4•11_.. • ...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Chapter I 0 System Architecture
Before selecting a system archirecrure, rhe analyst must consider FRP, initial cosr
and TCO, scalabiliry, web integration, legacy interface requirements, processing
options, sccuriry issues, and corporate portals.
ERP c tablishes an enterprise-wide strategy for IT resources and specific
srandards for dara, processing, network, and user interface design. Companies can
extend ERP sy terns to suppliers and customers in a process called SCM. A systems
analyst must assess initial cost and TCO and ensure that the design is scalable.
Scalability means that a system can be expanded, modified, or downsi1ed easily
to meet business needs. The analyst also musr consider 1f the system will be web-
centric and follow Internet design protocols and if ir musr interface with existing
S)'Stcms, called legacy systems. Sysrem security is an imporranr concern throughout
the design process, especially for e-commerce applications that involve credit card
and personal data. Processing options affect system design and resources required.
The planned architecture can include a corporate portal that is an entrance to
a multifunction website. Corporate portals can provide access for customers,
employees, suppliers, and others.
A system architecture requires servers and clients. Servers arc computers that
suppl y data, processing services, or other support to one or more computers called
clients. In mainframe architecture, the server performs all processing, and terminals
communicate with the centralized sysrem. Clients can be connected in distributed sys-
tems to form LANs or WANs.
Client/server architecture divides processing berween one or more clients and a
central server. In a typical cliear/servcr system, the client handles the entire user inter-
face, including data entry, data query, and screen prescnrarion logic. The server stores
chc dara and provides dara access and database managemcnc funccions. Applicacion
logic is divided in some manner between che server and rhe clients. In a rypical client/
server inreracrion, che client submits a request for informarion from the server, which
carries our the operation and responds to the client. Compared to file server designs,
clienr/~erver systems are more scalable and flexible.
A fat, or thick, client design places all or most of the application processing
logic at the client. A thin client design places all or most of the processing logic at
the server. Compared with mainraining a cenrral server, TCO for fa1 clients can be
higher than for thin clients because of initial hardware and sofcware requirements
and the ongoing expense of mainraining and updating remote client computers.
However, the foe clienl design may be simpler to develop, because the architecture
resembles rradi1ional file server designs where all processing is performed at the
client.
Client/server designs can be rwo-tier or three-tier (also called 11-tier). In a two-
1ier design, the user interface resides on the client, all data resides on the server,
and the application logic can run eit11er on the server or on rhe client or be divided
between the client and the server. In a three-tier design, the user interface runs on the
cl ient and rhe data is stored on the server, just as with a two-tier design. A three-tier
design also has a middle layer between the client and server char processes the client
requests and translates them into data access commands that can be understood and
carried out by the server. T he middle layer is called an application server, because
it provides the application logic or business logic. Middleware is software that
connects dissimilar applications and! enables them ro communicate and pass data.
In planning the system design, a systems analyst also must consider cost-benefit and
performance issues.
(....,..... J:gi( . . . . . I_,.. 41 11.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~---tfta111&....-.~~ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase l Systems Design
Key Te rms
traffic; the sysrem 1s sc.1lable, so new dara s11es can be added without reworking the system design;
and with dat.1 stored in \'Jrtous locanons, the system is less likely to experience a car.1Stroph1c failure.
A potcnnal d1sad"amage of d1smbutcd data storage in"olves data security. Lt can be more difficult to
m.llnwm ~omrob and M.mdards "hen data is stored in various loc.uioos.
dLStnbutcd system C.ompan)'"" 1de S)Stcms th,tt are connecred by one or more LANs or \\IA..'-s. lbe
capab1L1th of a d1smbu1cd system depend on the power and capacity of the underl)mg data commu-
nicatton network.
cntcrpriw rc\ource plannin11 (ERP) \ proces~ that establishes an emerprio;e-wide ~tratq,')' for IT
re-.our~c\. ERP defines a 'pet:ific ar.:hitecrure, including scandard.' for data, proces>mg, network, and
U\er 111tcdac:e dc'>l)\11.
[xtendcd Service \cl (E.\S) A wircle" nc1work configuration made up of rwo or more BSS nc1worh,
which nlluw' wircle" client• to roam from RSS to BSS.
c"tcn,ibil11y Refer\ mo ')'Mcm'• nbility m expand, change, <>r downsize ea~ily to meet the chnnging
need' of a bu~inc'' cmcrpri,c. Also known as 'calability.
for diem A network design drn1 locMes all or most of the application processing logic at the client. Also
c.1lled a truck client design.
gatewa) ( 1) lo business process mg modeling notation, a fork in the process. allo" mg the flow to go one
w.t) or .rnother. (2) A router or other nerwork device used to connect to a larger, d1ssin11lar rypc of
network. such .is the lntcruet.
gigab1ts per second tGbps) A bandwidth or throughput measurement.
glueware Su middlew:irc.
hicrarcharnl nctnork A network Jc,ign where one compurer <rrpicallr a m:tinframe) control; the entire
nemor~. 'ia1cll1tc computer\ or 'ervcn, control lower levels of procc~ml\ and network devic:c,.
HlTP/2 The \CCOnd ma1or \'Cl'\ion or the network protocol used by the web. Rdca,cd '1\ :I 'tandarJ 1n
2015.
hub The center of a star network. Switches in modern nerworks ba\e large!> replaced hubs.
infrJstructurc mode A wireless network configuration in which a central wireless dencc called Jn access
polllt is used to sen e all wrrele~s clients; al>o called BSS.
lruutute or Lle•trical and tlectronics Engineers (1.£IT} A profess1on.1l Of!rauuatton that ~1abhshes sran-
dard, for tcle<:ommunic:arion•.
Internet npcr:llanjl 'Y'ICm Parr of the Web 2.0 model, an on line compunng environment created by
onlinc communitie• and services, bao;cd on layer• of shared inforn1arion that can contain rcxc, 'mmd
hrte!>, image-., and video clap•.
knee ur 1hc L'Ur\c t\ t)crformance char.1cccriscic of a clienc/~rver computing environme111. Clicnlf~cr•cr
rc,pon~c time' 1cnd IO incrcao;e gradually and then rise dramatically a> the system nears 1r' capacity.
The point where response rimes increase dramatically.
legacy da1a The d<1ra associated with an older, less technologically advanced legacy sysrem.
lcgaC) ~y~tcm Term used to describe older systems that are rypically less technologically advanced than
currently Jvailable s)>rems.
local area ocl\,otk (LAN ) A ncrwork design chat allows the sharing of data and hardware, ~uch n; print-
ers .111d ;•anner;,. Advan,es 1n dJt:t commumcanon 1eclmology ba\e made ar po;;1ble to create power-
ful nerworks 1h.11 u~ ~tell1te link~, high-speed fiber-opric lines, or the lntemer to ~hare data .
logical topolORY I\ view ol .1 nc1Work rhac describes rhe way rhe components inreract. rather than the
actual nerwork cabling and connecrions.
mainframe archatc•ture A system Jc.ago where chc server performs all rhe proces;ing.
m~abll\ per ~ccond ( \lbp, A band\-.Jtb or throughput mcasllremcnt.
mc\h nemork A ne"•ork design in "hich each node connects m c•ery ocher node. \X'hilc this design is
\Cl) rcltable.111s abo expensl\e to install and main!allL
m1ddk,•Me Softw.tre 1h.tt connects d1ss1m1lar appltcaaoos and enables them to communicate and
exchange dara. l'or example, middleware can link a depamncntal database to a Web server thar can
be accessed by client computers ~;a rhe lnrcmet or a company mrranct. Su also glucwarc.
multipath dc,ign A ne"''ork design char relies on multiple data paths to increase bandwidth Jnd range,
u~mg ~UMO technology.
multiple 1nput/mul11plc ourput (MlMO) A wireles; ncru•urkmg c...<hnolojt) 1n~uqwrated in the IEEE
802. 11n and 802.1 lac \tandard' that u>e' multiple data \trcam\ and multiple antenna' ro achieve
higher tran,mi"ion 'peed~ and substantially increase wirelc~> range over earlier <iandard,.
nct ·ccnnic computing A di~rributcd environment where appl ication' and data arc down load~d from
\Crver' :ind e..:changcd wirh peer\ acros$ a ne"vork on an :L\·nt:eded ha\i\.
ncmork wpolog} The W:l)' a nerwork i> configured. LAN and \VAN networb cypically nre nrrnnged in
one of four common parccrns: hierarchical, bub, star, :ind ring.
node A ph)'s1cal device, wired or wireless, rhar can send, receive. or 111Jn.1ge network d,11,1.
11-11cr dc~ign A mulnlcvel design or archirecrure. For example, rhree·uer design~ also .trc called n·ricr
designs, to u1dic:11c char some designs use more 1hao one incermediare IJycr.
onlinc sysccm 11.mdling cr.msactioos when and where they occur and providing ourpur directly ro users.
Bc.:au'c it i, inrerntrive, on line proce~bing avoids tldavb and al lo\\., a conbt.1nt dialog bccwten the
u'cr and the ')''tcm.
Open <;~,tern' Interconnection (OST) model Describes how data actually move-. from an application on
one computer roan application on another necworkcd compmcr. The OSI con'i'r~ of ~ven layers,
and c.-ach layer perform' a 'pecific function.
ph) \leaf topolog, The Lonnet.-rion 'rrucrure c>f an acrual network\ cablmi;.
pbrfonn A specific lwrdware and software coofiguraaon char supports l r bus111ess goals such .ts hard·
"are connecunry and easy tnregraciou 0£ furure applicauons. Also called an e nvironment.
po1nt·of·sale {PO!>) Ilic part of an information system that handles datl) sales transaction' and ma111·
tains the onltne mvemory file.
portal An tntrancc ro a multifunction website. After encenng a portal, a user can navig;tce ro a desrina·
rion, using' .trious tools and features pro,ided by the portal desig11er.
pro~y \cncr A ne1work111g device that provides lncerner connccrivtty for 1111ernal I AN u'er..
rin11 nct\\orl. A network re>cmbling a i;ircle of computers rhal communu:ate with each other. A ring net·
work often '' u<cd when proccss111111s performed at local site• rather than ar a ccnrral location.
roamin11 A proce~< rhac allows wireless clicnrs to move from one acccs< point to anorher, auromnricnlly
as<oci:iting wirh rhe srronger acce<~ poinr· and allo\\~ng for uninterrupted ~crvicc.
router A device that connects ne~ork segments, determines the most efficient 1.1.lra pnrh. and guides the
flow ot dJra.
sc.11.lbiltt) A characteristic implying rhe sysrem can be exp;rnded, modiCied, or downsized to meer rhe
r.1 p1dl) cha nging need< of a business enrerprisc.
~c.1ling on demand The abiliry co macch network resources to needs at any given umc; a feature of cloud
computing. For example, during peak loads, additional cloud ~erver• migh1 come on line aurom.ui·
ca lly to wpporr mcrcabed workloads.
\cm.imk \\Cb An evolunun of rhe web where the d0<;umen1• •hared on the Internet have .emannc•
(meaning) and not just >ynrax (1-ITML tn."lrkup). Sometimes called Weh 3.0.
~cr"\cr Compurer m a chent/scr"\'Cr destttn rhat suppbcs data, procc~mg, and ser"\1ccs ro chcnr
"ork~tanon<.
stand-~lonc When personal computers first appeared large numbers ID the 1990, users found that rhey
ID
could run rhe1r own word processing, sprcadsheer, and database apphcarions. without assistance from
tht' IT group, an a mode called stand-alone computing.
~tar nL"t"ork A ncrwork de,ign ,~,th a central device and one or more workstation'> connected w 1r in a
way that torm' a 'it.lr panern.
'uppl~ cham mana11cmen1 (SCM ) The i:oordinacion, incegrarion, and management of material'>, mfor-
mation, and finance' a\ they m(l\e from 'upplier~ to customers, both\\ 1thin and between umipamc,.
In a totally mtcgrarcd \Upply cham, a cu.,"tomcr order could cause a produL"tlon plannm11 'Y'tcm ro
..chcdulc a work order, which in rum could trigger a call for certain pan.. from one: or more 'upplier\.
switch Cenrral networking device an ,, srar nerwork, which manages the network and acts as a conduit
for all network traffic
system architecture A rransl.111011of1be logical design of an information sysrem into ~1 physical structure
that iududes h.irdw.ue. sofrware, network support, and processing methods.
'>'tern dc,i11n \pccifti:ation A document tl1:1t r1·c,c1H~ rhe complete dco,ii;n for rhe new 111for111n1ion 'Y~·
tcm, along wirh dcta1lcd cmr., 'taffing, and 'chcduling for completing the nc"X"t SOLC pha,c, 'Y'tcm•
implementation. Al•o cnlled the technical design •pecification or the detailed dc•ign specification.
thick client A ')'•tcm Jc,ign thnr locate• mo•r or all of the application proce,,ing logic at chc client. Al•o
called a lat dienc Je,i!,'11.
th.in diem A sysrem design that locates most or JIJ of the processing logic ar the server.
thr~e-tier d•~igo In J chrtt·tier design. the user 1merface runs on che cl.tent aud the d.ua lS stored on the
sener, 1ust as in a rwo-ner des1y,11. A three-nee design also has a nuddle byer between the client Jnd
server rhat processes the chcnr requests and transl.ares rhem into data access commands th.11 c.in be
unde~tood and earned out h) the server.
tramparcnt A network ;, rran,parcnr i( a uo;er •ee• the daca as if it were stored on hi' or her own
work\tariun.
mo-uer de-.1gn A network de"gn where rhe u,er 1ncerface resides on the client, all data n:,iJ.,., on the
'>Ctver, and the apph.:atton loi;k .:an run either on the ,,.-rvcr or on the client or be divided between the
client <1nd the -.cn·cr.
"cb-ceotnc A strategy or approach that emphasizes a high degree of inregrauon wnh other web-based
component,. A web-cenrric archnecrurc follows Internet desjgn protocols and cnabks a company to
integrate rhe ne\\ applicanon inro its e-commerce strategy.
wide area oemork ( \\AN ) A network sp.mning long dmances chat can link user> who art commenrs
.ipan.
~r,.11 Alli.1ncc A nonprofit international a>,ociation formed in 1999 to c:crri(y i111eroperJbil1ry of wire·
lc's network product~ ha~cd on IF.FE 802.11 ~pccificarions.
wiki A wch- ha~cd repository of information [har anyone can access, contribute to, or mudif)'.
\'\'i-1\1:" ll· EE 802.16 speci(ic.11io11~. wh ich .ire expected co enable wireless mulrimcd1.1 npplic.mo11~ w1rh
a range of up to 30 male,.
wirclcs; occc;; pomt (WAPI A cenrral wireless device thar provides network services ro wircles~ clients.
Alsu called Jn Jcce;s point.
\\irclc" ftdclit> (\'l.'i-Fi) F.11111ly of popular IEEE LAN wireless nerworking standard;, abo known as
802. l I, mdudmg 802.1 Ia, b, g, and n. 802.11 n is the most rt.'Ccnt Manda rd. 802.11 ac and !!02. I I ad
arc proposed new standard~.
wirclc" local area ncmorl.. ( \'I. LAN) A wircle\s ncrwork that is rclanvdy mexpcns"·e to tn~tall .md i<
well ~mtcd to workgroup' and users who are nor anchored to .i spcciftc desk or locatton.
JSO Exercises
Exercises
Que stions
I. If )'OU had to rank rhc items in the archirecrure checklist, from most important to least important,
what would )OUr liM look like?
2. Whar are the rhree functions rhat every business iniormation srstem must carry our, irrespective of
system architecrure?
3. Whar ts client/server arch1recture?
4. What has been the impact of rhe Internet on system architecture?
5. What are the differences between in-house e-commerce development with packaged solurion~ and
service providers?
6. What are the advantages of on line and batch processing, respectively?
7. Explain the five main network models.
8. What functions do routers, gateways, and proxy servers serve in a nerwork?
9. What rol e do sra ndards play in wireless networking?
10. List the sections of a system design specification and describe the contents.
Discussion Topics
I. How i~ the proliferation of mobile devices that are locally powerful, use app) in)tead of full-
fledged Jpplications, and rely on wireless network connectivity changing sy)tcm architecture design
considerations?
2. E-commerce has seen explosive growth in recent years. \Vhat are the most important reasons for this
trend? \Vi ii it continue? \'Vhy or why not?
3. ls batch processing )rtll relevant? Why or why not?
4. What are the main differences bcn,1een the BSS and ESS wireless topologies?
5. One manager scares, "\'Vhen a new S)'Stem is proposed, I want a wrinen report, not an oral presenta-
tion, which is like a sales pirch. I only want to see the facts abouc coses, bcnefirs, and schedules.~ Do
you agree w1rh thar poinr of view?
P rojects
1. Visit the IT department at your school or a local company ro learn about the network they use.
Describe the network and draw a sketch of the configuration.
2. Prepare a 10-minutc ralk explaining Web 2.0 and cloud computing to a college class. Using the text
and your own Internet research, briefly describe the five most important point~ you will include in
your presentation.
3. Perform research on the Internet to identify a service provider that offer~ web- ba~ed busincs5 solu-
tions, and wrire a reporr describing rhe firm and its services.
4. Perform research on the Tnterner to learn about emerging trends in wireless networking and typical
costs involved in the install::irion of a wireless LAN.
5. Examine the role wireless networks arc having in the developing world. Wh y are some pl::ices bypass-
ing LANs and physical cabling altogether and moving ro a wireless S)'Stem archirecrure? What are the
advantages and di sadvantages of this?
r..,,...JID)r-..1-.. 4•11_.. • ...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
PHASE SYSTEMS IMPtEMENTA~ION
Systems implementation is the fourth of five phases in the systems development life cycle. In
the previous phase, systems design, a physical model of the system was developed. The output
of that phase. the systems design specification, is used as input to the systems implementation
phase. where a completely functioning information system is created.
Successful systems implementation requires considerable effort. After all, without a working
system delivered to the customer, all other phases of the SDLC have little meaning. In
software engineering. the construction phase is often jokingly referred to as "a small matter of
programming"- but of course it's no small matter at all.
Chapter 11 focuses on managing systems implementation throughout the useful life of the
system. This includes quality assurance, application development (structured. object-oriented,
and agile). coding. testing, documentation, and system installation.
351
r..,,...J1DOr-..1-.. 4•11_.. •...__. ~....... .,...~ • ........._ . ....._.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... .., .,. ..,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Managing Systems
Implementation
Chapter I I descnbes the systems implementation phase and existing data must be converted. After the new
of the SDLC. Managing systems Implementation involves system is operational. a formal evaluation of the results
paying constant attention to quality assurance throughout takes place as part of a final report to management.
the activities of application development. coding, testing, The chapter includes three "Case In Point"
documentation, and installation. The system design discussion questions to help contextualize the concepts
specification serves as a blueprint for constructing the described in the text. The "Question of Ethics"
new system. The initial task Is application development. concerns with an issue that all testers have to deal:
which requires systems analysts and programmers to when to stop testing. In the example, there is an ethical
work together to construct the necessary programs and question raised about whether or not a 90% pass rate
code modules. Before a changeover, the system must be is sufficient to ship the product, assuming the remaining
tested and documented carefully. users must be trained, bugs will be fixed once the system Is operational.
c T
Whe11 you fi11ish this d1apter, you sho11 /d be able I I. I Qualiry Assurance
to: I 1.2 Application Developmcnr
I 1.3 Structured Development
1. Explain quality assurnnce and three techniques
I 1.4 Objecr-Orienred Development
co help improve Lhe finished product
I 1.5 Agile Development
2. Ourline application developmenc I 1.6 Coding
3. Appl)' structured development I 1.7 Testing
4. Apply object-oriented development Case in Point 11.1: Your Move, Inc.
5. Apply agile development 11.8 Documentation
11.9 lnsralla ti on
6. Explain coding
Case in Poinr I 1.2: Globa 1 Cooling
7. Explain unir, integration, and system resting Case in Po inr 11 .3: Yorktown lndusrries
8. Diffcrenti:ue between program, system, opera- A Question of Ethics
tions, and u&er documentation 11.10 Summary
9. Explain the role of online documentation Key Terms
Exercises
I 0. Describe rhe five tasks involved in sysrem
installation
r..,,...JID)r-..1-.. 4• 11_.. • ...__. ~... . ... .,...~ • ........._ . ....._.,.,.. o-... ..,._.,,.,.. _ ..,.~ ,........., .... ............. .._... .., .,...,. ~"
................... ..., .................... . . .... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ... . ....................._ .... ._
if' uuo 4 y.st:o1ns; rnp1o:n
f f 1 ll I ITV -.
In toda)''S competitive business environment, companies are intensely concerned
with the quality of their products and services. A successful organization must
improve quality in every area, including its information systems. Top management
must provide rhe leadership, encouragement, and support needed for high-quality
IT resources.
No marrer how carefully a system is designed and implemented, problems can
occur. Rigorous testing can detect errors during implementation, bur it is much less
expensive ro correct mistakes earlier in che development process. The main objccrive
of quality assurance (QA) is co avoid problems or co identify chem as oon as possi-
ble. Poor qualiry can result from maccurace requirements, design problems, coding
errors, faulry documentation, and ineffecrive cesring.
To improve rhe finished produce, sofrware systems developers should consider best
practices in sofrware engineering, systems engineering, and incernarionally recognized
quality sr:1ndards.
(.ar---llrlJ..nlal\rnih
~~ln<toMP
FIGURE 11 -1 The Software Engineering Institute at Carnegie Mellon University has had profound
Influence on software engineering research and pracoce.
~ c." ... "
Level 1
Essentially uncontrolled
Initial
FIGURE 11· 2 The C MM has five maturity levels. from Level I (1nldal), which is
essentially uncontrolled development. to Level S (opamiz1ng). In which process
Improvement strategies are defined and used.
~~ c;c.,, ...,
(....,..... J:gi( . . . . . I_,.. 41 11.,.. ~- )U, -Woip-M ._..,.. - ·~•-fllllie<'f •,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. - ~---tfta111&....-.~~ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
if' uuo 4 y.st:o1ns; rnp1o:n
I ~
(....,..... J:gi( . . . . . I_,.. 41 11.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
if' uuo 4 y.st:o1ns; rnp1o:n
DEVELOP - +f ~ Test
Document
~ .__M_od_uJ_es__, .__Mod
__u_le-:s~,,
•
Integration
Te.sting
•
System
Tesung
•
Ooa.unentahon )
When program modules arc created using suucrured or 0-0 methods, the
process starts by reviewing requirements documentation from prior SDLC phases
and creating a set of program designs. Lf a documentation file was built early in
the development process and updated regular!}', there is a valuable repository of
information. The documentation centerpiece is the system design specification,
accompanied by diagrams, source documents, screen layouts, report designs, dara
dictionary entries, and user comments. If a CASE tool was used during rhe systems
analysis and design process, the analyst's job will be much easier. At this point, coding
and resting taskl> begin. Although programmers typically perform the actual coding,
IT managers usuall y assign systems analysts co work with them as a team.
sequence, and transition state diagrams; and agile methods rend ro use spiral or orher
iterative models such as the example shown in Figure 11-6.
System developers also can use multipurpose rools to help them tr:mslatc rhe sys-
tem logic into properly functioning program modules. These generic tools include
ERDs, flowchnrrs, pseudocode, decision table , and decision trees.
Test
.scenarios
New Customer
r:::=-1 Preparation Release version Acceptance approval r:==1
·~
~ planning .. test •
Next
iteration
FIGURE I 1-6 Simplified model of an XP project. Note the empt.a.sis on lte~tlon and testing.
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
if' uuo 4 y.st:o1ns; rnp1o:n
I 1.3 St ructure d Development 359
FIGURE 11 ·7 Sample of a sales promotion policy with logical rules (top) and a pse udocode version o f the
same policy (bottom). Note the alignment and indentation of the logic statements in the pseudocode.
Used our
y
--- 5% discount and
an addltlonal 5%
charge card? discount
Ordered
more than
y $1,000?
5% discount
N
Preferred
customer?
"'-~~~~~~~~~~~- S25bonuscoupon
N
SS bonus coupon
N
FIGURE 11 ·8 Sample decision tree char refleas che sales promotion policy 1n Figure 11-7. Like a decision
table. a decision tree shows che aa1on co be taken based on certain properties.
DATA COUPLE: An arrow wich an empty circle represents a data couple. A daca
couple shows dara tha t one module passes to another. In rhe dnra couple example
shown in Figure 11 -10, rhe Look Up Cuscomer Name module exchanges data with
rhe Mainta in Customer Daca module.
Library
IIModde 1.311} Module
Subordinate
Module
FIGURE 11 - 10 Anexampleof
a structure cha.r t data couple.
Control
Couple
Check Update
Customer Status Customer File
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 4111.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
if' uuo 4 y.st:o1ns; rnp1o:n
I 1.3 St ructured Development 361
FIGURE I 1- 12 The diagram shoW$ a control module that triggers three subordin~te
modules.
LOOP: A curved arrow represents a loop. A loop indicates that one or more mod-
ules are repeated. In the example shown in Figure 11-13, the Get Student Grades and
Calculate GPA modules are repeated.
FIGURE 11- 13 The diagram shows a structure chan; loop with two repeating modules.
If a module must perform mulriple tasks, more complex coding is required and
the module will be more difficulr to create and mainrain. To make a module more
cohesive, split it into separate units, each with a single function. For example, by
splirtmg the module Check Customer Number and Credit Limit in Figure 1 1-14 into
two separate modules, Check Customer 'umber and Check C ustomer Credit Limit,
cohesion is greatly improved.
More
Cohesive
FIGURE I 1- 14 Two examples of cohesion. Note that the single module on the left is less cohesive than the
two modules on the right.
(....,..... J:gi( . . . . . I_,.. 4111.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
if' uuo 4 y.st:o1ns; rnp1o:n
~
..
t? ~~1
f5
-
.8
E 8
-..
I ] ::>
!
()
ff
~
z
j.,,
zl
a §- ~
-
.8
R ::>
()
0
Loonly
Coupled
i1
l .- ' z
E
::>
~ I
'l
.s
~
~
j
i
z
z ~ .$
'lJ"'
~
;:;
Tl ghUy
()
8
..
.,
Coupled
rJ !;
~ ili
Ji!
0 I
,j
z
FIGURE 11- 15 An example of clghdy coupled and loosely cou,pled structure charu.
STEP I . REVIEW THE DFDS: The first step is co review all DFDs for accuracy and
complereness, especially if changes have occurred since the sysrems analysis phase. If
objecr models also were developed, rhey should be analyzed co identify the objecrs,
the methods that each ob1ecr musr perform, and rhe relationships among the objects.
A method is similar ro a functional primirive and requires code co implement the
necessary acrions.
STEP 3. ADD COUPLES, LOOPS, AND CONDITIONS: Next, couples, loops, and
conditions arc added ro rhe scrucrure chart. If DFDs are being used, rhc data flows
and the data dictionary can he reviewed co identify the dara elements rhac pass from
one module to anorhcr. In addirion madding che data couples, control couples arc
added where a module is sending a control parameter, or flag, ro another module.
Loop:. and condirion lines char indicate repetitive or alremative processing seeps arc
also added, as shown in Figure 11- 16. If an object model w:is developed, the class
diagrams :ind object relationship diagrams can be reviewed co be sure char the incer-
action among the objeccs is fully undersrood.
Order System
ModuleO
Relalea to context
diagram
Relates to diagram
ODFD
Relalea to diagram
1 DFD
Prepare Reject
VenfyOrder Assemble Order
Nolice
Module 1.1 Modu:e 1.3
Module 1.2
FIGURE 11 - 16 A structure chart based on the order system DFDs in Chapter S.The three-level structure
chart relates to the three DFD levels.
At this point, the structure cbart is ready for careful analysis. Each process, data
element, or object method should be checked ro ensure that the chart reflects all pre-
vious documentation and that rJ1e logic is correct. All modules should be srrongly
cohesive and loosely coupled. Often, several versions of the chart must be drawn.
Some CASE tools can help analyze the chart and identify problem areas.
I I
" •-=,.,-.
0 -0 methods we re described in Chapter 6. 0-0 analysis makes it easier to translate
an object model directly into an 0-0 programming language. This process is called
object-oriented development (OOD). Although many structured design concepts also
apply to 0 -0 methodology, there are some diffe rences.
(....,..... J:gi( . . . . . I_,.. 41 11.,.. ~- )U, Woip-M ._..,.. - ·~• -fllllie<'f •,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,.. ..,. - ~---tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
-
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~
if' uuo 4 y.st:o1ns; rnp1o:n
Customer
Attributes
Number
Name
Address
...
Methods
Place order
Mod1ly order
Pay invoice
...
1
Places
o..•
Order Item
Allflbutes Allnbutes
Number Number
Customer Description
Date o.. • Includes 1 ~.•
Price
.. ...
Methods Methods
Verify credil stalus Change stock level
Verify Item status Change min-max
Apply discount Reorder
... ...
FIGURE 11 - 17 A simplified class diagram for a customer order
processing system.
EMPLOYEE
ts a
Determines
A TNESS·CLASS
SCHEDULE Takos
rostor
Adds
STUDENT
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 4111.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
if' uuo 4 y.st:o1ns; rnp1o:n
methods) and highly cohesive (perform closely related actions). By following the e
principles, classes and object arc easier ro understand and edit. 0-0 programmer
who ignore cohesion and coupling concepts may end up creating a web of code that
is difficult to maintain. \'(then code is scattered in various places, editing becomes
complicated and expensive.
Programmers can use popular agile-friendly lai1guages such as Python, Ruby, and
Perl. However, agile methods do not require a specific progra1nming language, and
programmers a lso use various 0-0 languages such as Java, C++, C#, and others.
As with traditional methodologies, agile developmen t has both positive and negative
characteristics. Today, agile methodology is very popular for software projects. Its
supporters boast that it speeds up software development and delivers precisely what the
customer wants, when the customer wanes it, while fostering teamwork and empowering
employees. However, rhcre arc drawbacks ro this adaptive rather than predicrivc
method. C ritics of agile development often claim chat because it focuses on quick
iterations and fasr releases, ir lacks discipline and produces systems of que rionablc
quality. In addition, agile methodology generally does not work as well for larger
projects becau e of rheir complexity and chc lack of focus on a well-defined end product.
~ = ~ :J
............... ..
,._ ,
The Values of Extreme Programming
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
if' uuo 4 y.st:o1ns; rnp1o:n
Coding is the process of rurning program logic into specific instructions char the
computer system can exccure. Working from a specific design, a programmer uses a
programming language co transform program logic inro code statements. An individ-
ual programmer might creare a small program, while larger programs typically arc
divided into modules char several individuals or groups can work on 5imultaneously.
After coding, a programmer must rest each program co make sure it functions cor-
rectly. Lacer, programs are reseed in groups, and finally che developmenc ream must
test the entire sysrem. T he first step is co compile the program using a CASE. rool or
a language compiler. This process detects syntax errors, which arc language grammar
errors. The programmer corrects the errors unril the program executes properly.
Next, rhe programmer desk checks the program. Desk checking is rhc process of
reviewing the program code co spot logic errors, which produce incorrect results.
This proccs can be performed by the person who wrore the program or by other
programmers. Many organizations require a more formal type of desk checkmg called
a ~tructurcd walk-through, or code review.
Typically, a group of three ro five IT staff members participares in code review.
The group usually consists of project team member~ and might include other pro-
grammers nnd analysts who did not wo rk on the project. The objective is ro have a
peer group identify errors, a pply quality standards, and verify that rhe program meets
the requirements of the system design specification. Errors found during a structured
walk-through are easier co fix while coding is still in the developmental stages.
In addition to analyzing logic and program code, the proje~-r team usually holds a
session with users called a design walk-through, to review the interface with a cross
sectio n of people who will work wi th the new system and ensure that all necessary
features have been included. T his is a continuation of the modeling a nd prototyping
effort that began early in the systems development process.
The next step Ln application devel opment is co initiate a sequence of unit testing,
integration resting, a nd system testing, as shown in Figure 11-2 1.
(....,..... J:gi( . . . . . I_,.. 41 11.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- t fta111&....-.~~ ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
if' uuo 4 yst:o1ns; rnp1o:n
11.7 Testing 37 1
system test
Unit Test
Program 1
Unit Test
Program 2
-
UM Test
Program 3
Integration test
Unit Test
Program 4
-
UnttTest
Program 5
UnitTest )
Program 6
integration test
FIGURE 11-2 1 The ftrn step in testing is unit testing. followed by integration testing and
then system tesung.
Test data should contain both correct data and erroneous data and should test
all possible situations that could occur. For example, for a field that allows a range
of numeric values, the test data should contain minimum values, maximum values,
values outside the acceptable range, and alphanumeric characters. During resting,
programmers can use software tools to determine the location and potential causes of
program errors.
During unit resting, programmers must test programs that interact with other
programs and files individually, before they are inregrared into the system. This
requires a technique called stub resting. In stub testing, rhe programmer sin1Ulares
each program outcome or result a nd displays a message to indicate whether or nor
the program executed successfully. Each stub represents an entry or exit point that
will be linked later to another program or data file.
To obtain an independent analysis, someone other than the programmer who
wrote rhc program usually creates the test data and reviews the results. Systems
analysts frequently create tcsr data during rhe sysrems design phase as part of an
overall rest plan. A tc\t plan consists of derailed procedures that specify how and
when rhe resting will be performed, who will participate, and what rest data will be
used. A comprchen ive rest plan should include scenarios for every possible siruarion
the program could encounter.
Regardless of who creates the tesr plan, the project manager or a designated
analyst also reviews the final test results. Some organi1..ations also require u~r~ ro
approve final unit resr resulcs.
(....,..... J:gi( . . . . . I_,.. 41 11.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- t fta111&....-.~~ ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
1'111110 ~y.stonu; !ilf!IOOl
How much testing is necessary depends on rhe situation and requires good
judgment and input from o t her IT staff members, users, and management.
Unfortunate!), IT projccr managers often are pressured ro finish resting quickly and
hand the system over to users. Common reasons for premature or rushed tesnng
are demands from u~er~, righr systems development budgers, and demands from top
management to finish projects early. Those pressures hinder the resring process and
often have detrimental effects on rhe final product's quality.
Tesring can be a cost-effective means of providing a quality product. Every error
caught durmg resting eliminates porenrial expenses and operational problems. No
system, however, is I OOo/o error-free. Often, errors go undetected until the system
becomes operational. Errors that affect the integriry or accuracy of data must be cor-
rected immediately. Minor errors, such as typographical errors in the user interface,
can be corrected later.
Some users want a system that is a completely finished product, whi le others
realize that minor changes can be treated as maintenance items after the system
is operational. ln the fi nal analysis, a decision m ust be made whether or nor to
postpone system installation il problems are discovered. If conflicting views exist,
management will decide whether o r no t to install! t he system after a fu ll discussio n
of the options.
You work at You r Move, Inc., a large retailer specializing in games of all kinds. The company is in
the final stages of developing a new inventory management system. and the IT manager wants
you to handle the testing.
"Be sure you put lots of errors into the test data." she said. "Users are bound to
make mistakes, and we need to design built-in safeguards that will catch the mistakes, and
either fix them automatically or alert the user to the problem."
Of course. this comment makes a lot of sense, but you've never done this before. and
you wonder how to proceed. Should you try to invent every possible data error1 How will
you know that you've thought of every siwation that could occur1 Consider the problem,
develop an approach, and write up your plan in a brief memo.
Docu1ne11tation describes a n info rmation system and helps t he users, managers, and
IT staff who must interact with it. Accurate documenta tion can reduce system down-
time, cut costs, and speed up maintena nce tasks. Figure 11-22 shows an example of
the Rigi research environment tha t can auto mate the documenta tion process and help
software devel oper~ generate accurate, comprehensive reference ma terial through
derailed source code analysis.
Documentation is essential for successful syste m operation and maintenance. In
addition co supporting a system's users, accurate .documentation is essential fo r IT
staff members who must modify t he system, add a new feature, or perform main-
tenance. Documentation includes program documenta tion, system documentation,
operations documentation, and user documentation.
r..,,...JID)r-..1--. 4•111.-.•.._..... ,~.n . . . ..,...~ • ........._ ......__..,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
374 11 .8 Documentation
- . . , , , _ . . . . ,_ _ 7'1lGIO)W.JID
FI GURE 11·ll Rigl Is a research environment that uses reverse engineering technology to
provide software redocumentation capabilities to support program understanding.
Sow-<• •:O 'l.. ·If"'
(....,..... J:gi( . . . . . I_,.. 41 11.,.. ~- )U, Woip-M ._..,.. - ·~• -fllllie<'f •,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,.. ..,. - ~---t fta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-.. • ~-".....-""'*"....,.._...,.. ..
-
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~
if' uuo 4 y.st:o1ns; rnp1o:n
LeamCode.academy
56 1169 ..iblcnbefs
Fl GU RE I 1·ll LearnCode.academy Is a popular You Tube channel offering free web development tutorials, website design
tutorials. and more.
5ourc~ 1- n I"" ""
"'
c ... Cisco eommun.ty
·- --
-·- .__
- -·-
--•-
--
·-•
FIGURE 11-24 The Cisco Support Community invites users co contribute valuable experience and documentation using
soc:ial media.
the completion of the project includes providing user documentation, this issue needs
to be addre~ed from the very beginning of the project. Determining what the user
documentation requirements are and ascertaining who will complete the documents
are critical co a time!)' release of the project.
eglecring user documentation issues until after all the program i complete often
lead to one of two things: (1) t he documenrarion will be thrown rogether quickly jusr
ro gcr it our the door on rime, and ir more than likely will be inadequate; or (2) ir will
be done correctly, and rhe product release will be delayed con~iderably.
User training typically is scheduled when rhe system is installed. The training
<;essions offer an ideal opportunity ro distribute the user manual and explain rhe
procedure~ for updaring it in rhe future. Training for users, manager~, and IT sraff is
described l:1rer in this chapter.
I I 0 I ~ 1 :Ttn
After system resting is complete, the resulrs are presented to nrnnagement. The test
results should be described, the sratus of all required documentation updated, and input
from users who participated in syste1n testing su1nmarized. Oemiled time schedules,
cost estimates, and staffing requirements for making the system fully operational
should a lso be provided. If system resting produced no technical, economical, or
operational problems, ma nagement determines a schedule for system insralhnio n.
T he following syste1n installa tion tasks a re performed for every information sys-
tems project, whether the applicarioll is developed in-house or purchased as a com-
mercial package:
• Prepare a separate operationa l and test environment
• Perform system changeover
• Perform daca conversion
• Provide training for users, managers, and IT staff
• Carry our posr-implemenrarion rasks
(....,..... J:gi( . . . . . I_,.. 41 11.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
if' uuo 4 y.st:o1ns; rnp1o:n
innocent change invariably ends up causing some unexpected and unwanted changes
to the program. After any modification, rhe same accepcance tests that were run when
the system was developed should be repeated. By rescricring access to the operational
area and performing all tests in a separate environment, the system can be protected
and problems that could damage data or interrupt operations avoided.
IT Staff
Test Environment Users
Authorized
Changes
Procedures
Programs
Programs
FIGURE 11 -lS The teSl environment versus the operational environment. Note that access
co the test environment is limited to IT staff. while the operational environment is restricted co
users.
DIRECT CUTOVER: The direct curover approach causes the changeover from the
old system to the new sysrem to occur immediately when che new system becomes
operational. Direct cutover usually is the leasr expensive changeover method because
the IT group has ro operate and maintain only one system at a rime.
OldSJ I tr
DIRECT CUTOVER
Old9)111R
Ntlw &ylfen I
PARALLEL OPERATION
PILOT OPERATION
Oldew••••
PHASED OPERATION
FIGURE 11 -26 The lour system changeover methods.
Direct cutover, however, involves more risk than other changeover methods.
Regardless of how thoroughly and carefully testing and traming is conducted, some
difficulties can a rise when the system goes into operation. Problems can result from
data situations that were not rested or anticipated or from errors caused b)• user<; or
operators. A system also can encoun ter difficulties because live data typically occurs
in much larger volumes than test data.
Although mitial implementation problems arc a concern with all four
changeover methods, they are mosr significant when the direct cutover approach
is used. Detecting minor errors also is more difficult with direct cutover because
users cannot verif)' current output by comparing it to output from the old system.
~lajor errors can cause a system process to terminate abnormally, and with the
direct cutover method, reverting to the old system as a backup option is not
possible.
Compa nies often choose rbe direct cutover method for implementing commer-
cial software packages because they feel tbat commercial packages involve less risk
of total system failure. Commercial software is certainly not risk-free, but the soft-
ware ve ndo r usually ma intains an extensive knowledge base a nd can supply reliable,
prompt fixes for most problems.
For systems developed in-house, most o rga nizations use direct curover only for
no ncritical situations. Direct cutover might be the only choice, however, if the operat-
ing environmenr cannot support both the o ld and new systems o r if the old and new
sys rem~ arc incomparible.
Timing is ve ry impo rtant when using a direct cutover strategy. Most systems operate
on weekly, monthly, quarterly, a nd yearly cycles. For example, consider a payroll system
that produces output on a weekly basis. Some employees are paid twice a month,
however, so the system also operates semimonth ly. !vlonthly, quarterly, and annual
reports also require the system to produce output at the end of every month, quarter,
(....,..... J:gi( . . . . . I_,.. 4111.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
if' uuo 4 y.st:o1ns; rnp1o:n
and year. When a C)'clical information system is implemenced in che middle of any cycle,
complete processing for the full cycle requires information from both the old and rhe
new !.ysrems. To minimize rhe need ro require information from rwo different systems,
C)•clical information sy terns usually are converted using rhe direct cutover method at
the beginning of a quarter, calendar year, or fiscal year.
PHASED OPERATION: The phased operation changeover method allows rhe new
sysrem to be implemented in srages, or modules. f or example, instead of implement-
ing a new manufacturing system all a t once, the materials management subsy~tem
is installed first, then rhe production control subsystem, then the job cost subsys-
tem, and so on. Each subsysrem can be implemented by using any of the other three
changeover methods.
Analysts sometimes confuse phased and piloc operation methods. Both methods
combine dtrecc cutover and parallel operation to reduce risks and costs. With phased
operation, however, only a part of the system is given to all users, while pilot opera-
rion provides the enrire system burro only some users.
One advantage of a phased approach is that the risk of errors or failures is limited
co the implemented module only. For instance, if a new producnon control subS)'Stem
fail5 to operate properly, thar failure might not affect the new purcha5ing subS)'Stem
or the ex1sring shop floor conrrol subsystem.
Phased operation is less expensive than full parallel operation because the analyst
has to work with only one part of the system at a time. A phased approach is not pos-
sible, however, if the system cannot be separated easily into logical modules or seg-
ments. In addition, 1f the system involves a large number of separate phases, phased
operation can cost more than a pilot approach.
Figure 11-27 shows that each changeover method has risk and cost factors. A
systems analyst must weigh the advantages and disadvantages of each method and
recommend rhe best choice in a given situation. The final changeover decision will be
based on input from the IT staff, users, and management-and che choice must reflect
the nature of the business and the degree of acceptable risk.
High I
Direct
cutover
,__
-
R
I
Medium
s
K PiIOI Phased
operation operabon
. - -
Parahel
operabon
Low •
low Med1Um High
You are a systems analyst at Global Cooling. a leading manufacturer of air conditioning units.
You are leading a team that i.s developing a new production scheduling system. The project is
now in the application development stage. You are in the final stages of integration testing. Your
supervisor is eager to implement the new application ahead of schedule and asked if you could
trim system testing from two weeks to three days and use a direct cutover method instead
of the parallel changeover method that originally was planned. Write a brief memo expressing
your views.
r..,,...J1DOr-..1-.. 4•11_.. •...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
if' uuo 4 y.st:o1ns; rnp1o:n
complete. A data conversion plan should be developed as early as possible, and rhe
conversion process should be resred when rhe resr environment is developed.
When a new system replaces an existing sysrem, rhe data con\'ersion process
hould be automated, if possible. The old sysrem might be capable of exporting data
in an acceptable format for che new system or in a srandard format, such as A Cll
or ODBC. Open database connecri\ iry (ODBC) is an industry-standard protocol
that allows DB~lSs from various vendors ro interact and exchange data. Nlost data-
base vendors provide ODBC dri,·ers, which are a form of middleware. As discussed
in Chapter 10, middleware connects dissimilar applications and enables chem to
communicate.
If a srandard format is nor available, a program co extract the data and convert
it to an acceprable format must be developed. Data conversion is more difficult
when the new system replaces a manual systetn, because all data must be entered
manually unless it can be scanned. Even when the data conversion is automated,
a new system often requires additional dara items, wbich might require manual
entry.
Strict input controls should be maintained during the conversion process,
when data is extremely vulnerable. System control measures should be in place
and operational to protect data from unauthorized access and to help prevent
erroneous input.
Even with careful data conversion and input controls, some errors will occur. For
example, duplicate customer records or inconsistent pan numbers mighr have been
tolerated by rhe old system but will cause the new system to crash. Mosr organizations
require that users verify all data, correct all errors, and supply every missing data item
during conversion. Alrhough rhe process can be time consuming and expensive, ic is
essenrial rhar rhe new system be loaded with accurate, error-free dara.
11.9.4 Training
No S)'Stem can be successful without proper training, whether ir in,•olves software,
hardware, or manufacturing. A successful informarion system requires training for users,
manager;, and IT staff members. The entire systems development effort can depend on
whether or noc people undersrand the system and know how ro use it effecrivel)•.
System overview
Key terms
Gotect origin
Cost-benefi t analyslS
Start·up and shut down Support for business goals
Main menu and submenus Key IT contact people
Icons and shortcut keys Handt ng system charges
Ma)Or system functions Major reports and displays
Onkne and external Help Requesting enhancements
Frequent y asked questions User training
Troubleshooting guide
Hand ing emergencies
USERS MANAGERS
TRAINING
IT STAFF
FIGURE 11-28 Examples of tr.lining topics for three different groups. Users. man~ers. and IT saff members
have different training needs.
Afrcr the ohjccrives arc idenrified, how t he company will provide rraining must be
determined. T he main choices are to obtain training from vendors, outside t raining
firms, or use IT sraff a nd other in-house resources.
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
- Woip-M ._..,..
..
- ·~•-fllllie<'f •,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,.. ..,. - ~---tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
if' uuo 4 y.st:o1ns; rnp1o:n
.__
...
-- -.. ..
...-.
l'ht,..,.,.,..,..... ........ .,
..... ....
c.... ...... llCIO.l9_,......,.
...._,...........,
<OWf'Mt.
TRAININ G TIPS: The IT sea ff and user departments often share re pon~ibiliry for
developing and conclucring rraining programs for internally developed software. If rhe
organi1ation has a service desk, their staff might be able to handle user training.
Multimedia is an effective training method. Presentation software, such as
Microsoft PowerPoint or Apple Keynote, can be used to design training ses ions that
combine slides, animation, and sound. Programs that capture actual keystrokes and
mouse action,, such as Camtasia and Panopto (shown in Figure 11 -30), can be used
to replay rhe screens as a demonstration for users. If a media or graphic arrs group
is available, they can help prepare training aids such as videos, charts, and orher
insrrucnonal materials.
• . . . . . . . . . . c-.t
Panopto
'°'....... f'O'ldl«.e!O\ lllncuas ~ -
• LM . . . . . . W.."""°' ..,.._ ~ ..
.......... ~
,.._.~•--••"'1.,.:1
............ ......,_...~ ................
.................. ,...... . . . . . . . . . . . . llll'llla,,.., ! ~.,
.....................
..........
~ (.... ~
~_....,
.....-.;
·--
....
..,.,.......
....... _.................
...... _......___.09 ........,....,....,.......
~..,
__.................
.... = •
,.,...,..
.,.~
FIGURE 11 -30 Panopto is a screen capture and video presentation program that can be used to prepare
webcasu and online l~ming materials.
~tc:• J'~~ CO'"'
(....,..... J:gi( . . . . . I_,.. 41 11.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_, .,_.,....,. -~---tfta111&....-.~~ ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,...... .,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
if' uuo 4 y.st:o1ns; rnp1o:n
11.9.S Post-lmplementationTasks
Once the new system is installed and operational, two additional tasks must be per-
formed: (J) prepare a post-implementation evaluation, and (2) deliver a final report
to management.
- - -(5)
o.....i.w Trenscrlpt View Oflllne El<Ofdse Fllft
-
au•astiowlOUM~llOC.- •rq;.s.,_.,.._......,.~
TM CW (Orrililfl N ~al N lllnQl.-oe Jyl'W Md 1M09. 11 . . . . . IO I aid,._,_
'ih''
__·-·· -...
wct\•.,...oa•:&::4.,.,•.......... LWf'....,JtoMatlld~n.....,•-...:
"""''° ... ~ ,...... ~ Udant..end ,.,.., "'°"' ...............
-"', -""" ..""""'- 'l&''P.'
..... "·-
.. - '11111--0!L ~-----
..Ol...
FIGURE 11 -31 A sample lesson on learning Python in an onhne tutorial from lynda.corn.
Sout"CS " "f1 • •• ~
-
POST-IMPLEMENTATION EVALUATION: A post-implemencauon evaluarion
assesses rhe overall qua li ty of rhe information systen1. The evaluation verifies rhar the
new &ysrcm meets specified requirements, complies wid1 user objectives, and produces
the anticipated benefirs. In addition, by providing feedback to the development ream,
the evaluation also helps improve IT development practices for future projects.
A posr-implemenration evaluation should examine all aspects of the development
effort and the e nd product-the developed in.formation system. A typica l evaluation
includes feedback for the following a reas:
• Accuracy, completeness, and timeliness of information system output
• User satisfaction
• System reliability and maincainabiliry
• Adequacy of system controls and securit)' measures
• Hardware efficiency a nd platform performance
• Effectiveness of database implementation
• Performance of the IT team
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_, .,_.,....,. -~---tfta111&....-.~~ ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
if' uuo 4 y.st:o1ns; rnp1o:n
. ................. oc
--
iili ~._,,_ Cl x
,.._a-'"- ........
" ••
................. ,., • (!)
t!:I
Q POI DOCUMI NI lJBRARY.
~
U..,tv.......... ,...M
,.,,_ ..
"""tit.,....._
, ,~
_
,... _,.,. ._,. .... __ jo.t·
..._..._ ..........
-
ttlf ~,,._ r
,..,......,yow .~
.
~...... o1111.tm111Kiof!
• . -.......-
l l.e«olv.e
I
l
2
2
l
J
•
s
s
s •
.._
l J
'
___ ,
USll INfUtfACI
..
> 0.l'ffyol._Ntt..... l • s •
~lty ...... _
2 l • > I
•
I ( ;ne ~-- -
,
2 l •• >
s •
°' mttallf'l
•10 " twnlO\ol
(\lrlJy tttOf
I
I z J
J
• s '
6
lrlPIA tnOr• l • s •
INK>ltMAllON lfCHHOlOG't' STAFF
U toop.,r.11on
·- - - -' , ,
J • 5 •6
" _...ky
t l ~· -
2
I J
•• '
$ 6
I• ~Jnt of Pl()flN ••
•'
2 J $
_
S'i ~IQl\·,.t.Jlt J s
,.._lllG
,".. """"""-
11 ""iOlltWffti!'9
__ , I 2
I
l
J
J
•
•
•
s
5
5
••
'
'
FIGURE 11 -32 Sample user evaluation form.The numerical scale allows easy tabulation
e1f resulu. FolloWing this section. the form provides space fe1r open-ended comments and
suggestions.
_
....-................. ..__ __.... ...................
("..,_...,llll!O( ...... . . - - . .\) ....... ~
.......,..""_..
"->-"'Allf'W ~- ................,.. o-....._ ...... _ ... ,..,...,...,~..,._.. ........... ... ~..
~~·~---- ··----~~-.,.-"~ --......
...........
390 I I .9 Installation
\'(lhc ncvcr possible, people who \·v ere not directly involved in developing the sys-
tem should conduct the post-implementation evaluation. IT sraff and users usually
perform the evalua tion, a lthough some firms use an internal audit group or indepen-
dent auditors to ensure the accuracy and completeness of the evaluation.
\'(then to perform a post-implementation evaluation for a new system is nor always
clear. Users can forget details of the developmental effort if too much time clap cs
before the evaluation. Afcer several months or a year, for instance, users might not
remember whether they learned a procedure through training, from user documenta-
tion, or by experimenting with the system on their own.
Users a lso might forget their impressions of IT team members over nme.
An important purpose of the post-implementation evaluation is to improve the
quality of IT department functions, including interaction with users, rraining, and
documentation. Consequently, the evaluation team should perform the assessment
while users arc able to recall specific incidents, successes, and problems so they can
offer suggestions for improvement.
On the o ther hand, if the evaluation is done too soon, the users may not be a ble to
provide sufficient feedback d ue to la.ck of experience with tbe new system. Post-im-
plementatio n evaluation is primarily concerned with assessing the quality of che new
system. If the ream performs the evaluation too soon after implementation, users will
not have enough time to learn the ne w system and appreciate its streng ths a nd weak-
nesses. Although many IT professio nals recommend conducting the evaluatio n after
at le3st six mo nths of system o peratio n, pressure to fin ish the project sooner usually
results in a n ea rl ier evaluatio n in o rder to a llo w the IT department to move on co
other tasks.
Idea lly, conducting a posr-implemenrarion evaluation should be srandard practice
for all information systems projects. Sometimes, evaluations are skipped because
users are eager co work with the new sysrem or because IT staff members have more
pressing priorities. In some organizat ions, management might nor recognize the
imporrance and benefirs of a post-implementation evaluation. The evaluations are
extremely important, however, because they en3ble the development ceam and the
IT department to learn what worked and what did not work. Otherwise, developers
might commit the same errors in a no ther system.
(....,..... J:gi( . . . . . I_,.. 41 11.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
1'111110 ~y.stonu; !ilf!IOOl
11 . 10 Summary 39 1
You like your new job as lead systems analyse at Yorktown Industries. You were pleased that
your development team completed the new human resources system ahead of schedule and
under budget. You looked forward to receiving the post-implementation evaluation because you
were confident that both the system and the development team would receive high marks from
users and managers.
After the system operated for one month, you received a call from your supervisor.
who told you that you would have to handle the evaluation-even though you headed
the development effort. You told your supervisor that you did not feel comfortable
evaluating your own team's work. You explained that someone who was not involved in
its development should do an independent evaluation. Your supervisor responded that
he had full confidence in your ability to be objective. He explained that no one else was
available and he needed the evaluation quickly so he could move forward with the next
stage in the corporate development plan.
You are troubled about the situation. What should you do, and why?
A team member is handling the testing for the new accounting system, and right now she
is very upset about the most recent results. "It seems like every time we fix one problem.
another pops up! After ten days of testing and adjusting, we are meeting over 90% of the
goals and benchmarks. If we're looking for perfection, we'll never make the implementa-
tion deadline for the new system, and the users will be all over us. Not to mention top
management's reaction to a delay. I'm sure we can resolve some of these issues after the
system becomes operational."
How would you respond to this statement? Are ethical issues involved? What are your
respons1b11ities, as an employee, as an IT professional, and as a coworker?
'I 10 u,.....
The systems implcmencarion phase consists o f a pp licatio n development, resting,
installatio n, and evalua tion of the new system. During a pplicatio n development,
ana lysts dete rmine the overa ll design stra tegy a nd wo rk with programmers ro
complete design, coding, resting, and docu mentation. QA is essenti:.il dur ing rhc
implemencation phase. .tvlany companies utilize software engineering concepts and
quality srandards esrablished by the ISO.
Each systems development approach has its ow n set of tools. For example,
structured development relies heavily on DFDs and structure charts. A ~tructure chart
consists of symbols that repre ent program modu les, data couples, control couples,
conditions, and loops. 0-0 methods use a variety of U.tvlL diagrams, 111clud111g
r..,,...JID)r-..1-.. 4•11_.. • ...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
392 11.10 Summary
use case, class, sequence, and rransirion srare diagrams. Agile methods tend ro u~e
iterative and incremental models.
System developers also can use more generic tools ro help them translate the sys-
tem logic inco properly functioning program modules. These tools include FRDs,
nowcharcs, p~eudocode, decision tables, and decision trees.
Cohesion measure a module's scope and processing characterisncs. A module that
performs a single function or cask has a high degree of cohesion, which is desirable.
Coupling measures relationships and interdependence among modules. Modules
that are relanvely independent are loosely coupled, which is desirable. Cohesion and
coupling concepts are nor only used in structured development but also applicable to
000.
Typically, three steps are followed when creating a structure chart. DFDs and
object models arc reviewed to identify the processes and methods, identify the pro-
gram modules and determine concrol-subordinace relationships, and :idd symbols for
couples and loops. The structure chart is chen analyzed co ensure char it is consistent
with the system doc umentation.
If an agile development approach is used, then the customer creates user stories
char describe required feat ures and priority levels. In agile methodology, new system
releases arc made after many iterations and each is test-driven carefully by rhe
customer.
Programmers perform desk checking, code review, and unit testing rasks during
application development. Systems analysts design the initial rest plans, which include
rest steps and rest data for integration resting and system resting. Integration testing i ~
necessary for programs char interact. T he final step is system resting for the completed
sysrcm. System resting includes users in the resting process.
In addition co system documentation, analysts and technical wricers al~o prepare
operations documentation and user documentation. Operations documenration pro-
vide<> instructions and information co che IT operations group. User documenrarion
consists of instructions and information for users who interact with the ~ystem and
includes user manuals, help screens, and tutorials.
During the installation process, an operational, or production, environment is
established for the new information system char is completely separate from the test
environment. The operational environment concains live data and is accessible only
by authorited users. All future changes co the system must be verified in the rest
env1ronmenc before they are applied co the operationa l environment.
System changeover is the process of putting che new system into operation. Four
changeover methods exist: direct cutover, parallel operation, pilot operation, and
phased operation. With direct curover, the old system scops and the new system
:.tarts simultaneously; direct cutover is the least expensive but the riskiest changeover
method. With p:irallel operation, users operate both the old and new information
systems for some period of time; parallel operation is the most expensive and least
risky of rhe changeover methods. Pilot operation and phased operacion represent
compromises bccween direct cutover and parallel operation; both methods arc less
risky than direct cu rover and less costly than parallel operation. With pilot operarion,
a specified gro up within the organization uses the new system for a period of time,
while the old system continues to operate for the rest of the users. After the system
proves successful at the pilot sire, it is implemented throughout the organization. With
phased operation, the system is implemented in the entire organization, bur only one
module at a rime, until the entire system is operational.
Dara conversion often is necessary when installing a new informarion system.
\'Qhcn a new system replaces a compute ri zed system, rhe dara conversion process
~hould be automated if possible. The old system might be capable of exporting data
(....,..... J:gi( . . . . . I_,.. 41 11.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~---tfta111&....-.~~ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
if' uuo 4 y.st:o1ns; rnp1o:n
in a forma t rhar the new system can use, or the data might have to be extracted and
converted to an acceptable format. Dara conversion from a manual system often
requires labor-intensi,·e data entry or scanning. Even when data con,·ersion can he
automated, a new ystem often requires additional data items, which might require
manual entry. Strict mpur controls are important during the conversion process ro
protect data integrity and qualiry. Typically, data is verified, corrected, and updated
durmg the conversion process.
Everyone who interacts with the new information system should receive training
appropriate co his or her role and skills. The IT department usually 1s respo nsible for
training. Software or hardware vendors or professional training organizanons also
can provide training. When a training program is developed, remember the following
guidelines: train people in groups; utilize people already trained to help train others;
develop separate programs for distinct employee groups; and provide for learning by
using discussions, demonstrations, documentation, training manuals, tutorials, webi-
nars, and podcasts. Users learn better with interacrive, sell-paced training methods.
A post-implementation evaluation assesses and reports on rhe quality of the new
system and the work done by rhe projecr ream. Although it is best if people who
were not involved in rhe systems developmenr effort perform the evaluation, that is
not always possible. The evaluation shou ld be conducted early so users have a fresh
recollection of the development effort bur nor before users have experience using the
new S)'Stem.
The final report to management includes the final system documentation, describes
any furnre system enhance ments that already have been identified, and details the
project coses. The report represents the end of the development effort and the begin-
ning of the new system's operational life.
Key Terms
dcccptancc tc>t lesnng involves the ennre information syscem. mdudtng JU typic.il pro.:essmg suuanons.
During .m acceptance cesr. users emer data. indudmg samples 0£ actual or lne datJ, perform queries,
and produce report< ro simulace acrual operating condmons. All proce~~mg options and ourpuc~ arc
'enfied by users and the IT project de,·elopmem ream ro ensun• rh.11 chc S)Scem funetion~ correetl).
~metunc> known as ii syscem 1e.1.
apphcarion dc1 clopmcnr The pro.:ess of construeting the programs and code module> thJt are the
building blocks of dn mformarion syscem. Application devdopmelll 1s b.1ndled by an apphcanon
development group w1thtn a traditional IT deparrmem thac 1s composed 0£ systems analyses and pro-
grammers who h.indle information system design, dc1·clopmcnr, and 11nplc111cm.11ion.
aurihutc A <ingle characreri<ric or face ahout an entity. An anrihuce, or field, 1' rhe 'mallesc piece
of darn chat hn' meanini; wi chin an information system. For example, n Social Sei.;uncy number
or company name could he examples of an attribute. In 0-0 ana ly'i', an a11ribu1c ;, pan uf
a da" dinµram rhat dc~cribe< the characteri\tic' of objnr' in the da''· Al'o known a' a Jara
element.
hui: tmcking ,oftwarc System developers use defect tracking ,oftware, 'omctimc' en lied huµ tr;ick·
inµ >11ftwarc, ro document and crack program defects, code chanµc~, and replacement code, c:illed
p.Hchc,,
Capabtliry Marurtty Model (Ci\L\.1)• A model developed by ~El th.u in1egra1es software nnd sysrems
developmem into a process 101provemenr framework.
Cdpahility Maturity Model lntq;ration (Cl\1 \11)" An SF.1-dcvdopc:d procc" to improve quality, reduce
development time, and cm co~t<. A C:0-1\.1 track~ an organi1.•11inn·, ,.,ftware development goal• .ind
pracuces, using f1,e maturity levels, from Level 1 (relarively urutJble, inefrectwc software) 10 Level 5
(S-Ofl\\.ire rh.u 1s refined, efficient. and reliable).
code rc\lcw A rcv1c\\ ot 3 projcu ream member'~ work by other member\ of rhe team 10 'POI logic
error<. Generali)', ~yHem• analV'lts review the work of other ')'tern' anal)'"'• and proJ,'Tam·
mer> re,·iew the work of other prO!!rammers, as a form of peer rc,1ew. 'itrucrured walk-rhrough•
'hould rake place rhroughour the SDLC and are called requirement\ review,, de•ii;n rcl'icw<>, code
re1 IC\\,, or te>ring re\ie\\ ,, depending on che phase in which they 1ic.:ur. 1\1\0 known :I\ 3 ,crucrun:d
walk-1hrouµh.
codini: The procc'' of turning program logic into specific in~truction> thar a compurer \)\!Cm can
cxccure.
,ohcs1on A measure of a module's scope and processing characreris11c~. A module 1ha1 performs a ~mgle
funcnon or task ha~ a high degree of cohesion, which is desirable.
conduion A specified action or state in a structure chart.
control couple Tn a ~rrucrure chart, a concrol couple shows a message, al'o called a flag, which one mod·
ule stnds to an11thcr.
control module In a >1ruc1urc chart, a control module is a hi17her-lcvcl module rhar dirc•t~ lower-level
modulc•., called •ubordinate modules.
coupling Mea~urcs rebrionships and imerdependence among modules. The opposue of cohesion.
cu~romcr Primary u~er of a system, service, or product.
clat.1 c<1nvcl"\1nn Fx1sring data i~ loaded into the new system, transformed as needed. Depcndin~ on the
~y~ccm, dara convcr,ion can be done before, during, or after the opcranonJI environment is complcre.
dacn couple In a structure chart, a daca couple show' data that one module pas'c' to another.
defect rrad.in~ soft\\arc Sysrem dc,·elopers use defect tracking software, sometime; called hug track·
ing software, ro document and crack program defects, code change>, and replacemenr code, called
p3t<hC>.
dc>igo ".ilk-through A scss.1on wuh users to rev1e" the mtexface "1th a cross secnou of people who will
work with 1hc new system. This is a connnuanon of the modelmg and protorypmg cffon that ~an
eMl) m the S)Stems de,·clopmcnr proccss.
dc'ik chccl.11111 The pr11<:c\\ of rc,;cwing the program code tel spot logic error<, which produce mcorrcct
raults.
dir"ct cut0,cr The dircu cumver approach cau\C'l the changeover from the old •y,tem to the new\) 'item
w oc~ur 1mmediatd) "hen the new 'Y'tcm hec:omo operational.
docurnen1.11Jon M.11enJl 1h.11 explJll> a •y>1em, helps peopll' intl'ract with it, and mdude. progrJm doc-
umemauon, system documencarion, operations documenranon. and user documenta11on.
Oowchar1 A diagram used to describe program logic that represems logic-JJ rules and iutcracuon graph-
ically u'mg a <enc~ of srmhols connected by arrows. flowcharrs can be useful m v1sualmng modular
progr.un designs.
integrated dc,clopmcnt en\ irunmcnt (IDE) A suire uf inrq,'f.nted mols co make it eaoier w plan, con-
\trt11:t, and maintain l 'flCcific ,ofcware produce. An fDE is designed to allow the easy mtewation of
>Y\tcm componcnl' with le.- 1i111e hcing >pent on developing code for lnreractive module,.
1nlL)lrat1on to,ung The tc,ting of two or more prowams that depend on em:h other.
JSO \1000-3:2014 A se1 of gu1delmes esta blished and updated by the ISO ro provide a QA £r.11neworl..
for de, eloping and m.1itUJmu1g software.
iteration <:>de An Jg1le development cycle tha1 includes planning, designing. coding. and tes11ng one or
more features based on user stories.
i1eration planning mcctmg In agile developmenc, a meeting held ar rhe beginning of each iteration qdc
to break down u'>C:r \toric<> into '>pe-:1fk t:isks that are a~ig:ned co ream membc:".
l1hra11 module In ;i \tructurc chart, a l1bral) module 1> a module that" re~hlc and can be invoked
from more than one p<"nt in the chart.
logic error M1s1akes m the undcrlring logic that produce incorrect results.
loop lo ;i s1ructure chart, a loop md1cates that one or more modules are repeJted.
loo.,cl) rnuplcd \lodulc• that arc rclath·dv independent. loosely coupled module> arc easier 10 maintain
and modify, h«au•e the logic in one module d<>e!i not affect ocher modules.
method., In a clas' diagram, methods repre<;enr program logic.
modular design A de,ign thai can be broken down into logical blocks. Also known as parnnonang, or
top-down design.
module A module cons1srs of related program code organized mro small urnts thar are eJS)' to under-
stand and 111a111t;11n. A complex program could have hundreds or even rhousauds of module~.
obic<l-urion1cd dc,tlo1>mcn1 (OOD) The proce;s of translating an object modd di reedy mio an 0 -0
r rogramming lani;ungc.
onlinc dornmcntation Provides immediate help when u•crs have questions or encounter problem,.
open da1.1ba•c connec1ivi1y (ODUC) An ind115try-srnndard prococol that make' it po,5ihlr for ~oftwarc
from different ~endors to inrer.1c1 and eAcbange data.
opcrotiooal cnvirunmcnt The environmenr for rbe actual sysrem operation. It includes hardware and
softw.ue wnf1gurnrion~. S]Stcm urilicies, and communications resoutces. Also ~.tiled the produ<tmn
en\ Lronment .
opcrauon~ documcntauon Contains all the mformarion needed for processing and d1smbut1n1t onlmc
and printed output.
pair pro11rammmiz A practice 111 XP in which rwo programmers work on che same ca•k on the 5ame
computer; one drive., (program5) while rhe other navigates (warchcs).
parallel opcra1io11 The parallel operauon changeo"ec method reqwres th.it bo1h the old and 1he new
mforma11on srsrems opera~ fully for a specified period. Data ts mpur mto both systems, and ourpur
gcncrarcd by rhc new srsrcm is compared with rhe equ1\'alenr ourput from the old system.
part111on1ni; The hreakmg down of ovaall ohjecti"e> inro subsyMem~ and module,.
p.itch Replacement code th:11 1s applied co fix bugs or i.e.:urn:y bolo in ~oft ware.
phased opcrnuon r he phased operarion method allows a new system to be tmplemenred m srages, or
modules.
pilot opcr.uioo fllc pilot operation changeover method involves implemen11ng rhe complete new sysrem
at J selC'Cted location of the company.
pilor me In a pilot operauon. the group chat uses the new sysrem first ts cJlled the p1lo1 sne.
podca•t A wch·ha,ccl hroadca>i that allows a u'cr co r1.-.:civc audio or mu ltimedia files U\in)l mu\ic
player software, <uch a• iTune<, and listen co chem on a PC or download them to a portable MP ~
pbycr or •man phone.
pm1-1mplcment;uion evaluation An assessnu:m of chc overa ll qualiry o f the information •}Stem. The
cva lunrion vcrific~ that t he new system meet;; 'pccificd rcc1uircmcnr,, compl ic• w11h u<cr ohjcctivc,,
and achieve' rhc anticipawd benefits. In addition, by providinJl feedback to rhc development team, chc
evaluntinn nl"' help' im prove IT development practice.\ for future project\,
procch improvement The framework used t o integrate software and systems development by a new Sf.I
model, CM.i\11.
produccion cmoronmcnt fhe envttonmenr for the actual system oper.iuon. Ir mcludes hudwarc .rnd
wfrwarc configurations, S)Stcm uulitics, and communications resources. Also cJllcd rhc operauonal
enHronmcnr.
program documen1.mon Preparation of program documenrauon StJrtS Ul the systems .1nalys1s phase
and con11nues durmg systems unplemenration. Systems arul)sts prepare overJll documentanon, such
as process dc<;enpuons ;ind report la}·outs, earl)' in the SDLC. Programmers pro' 1de documcnrauon
b} construcnng modules that are well supported b)' internal and external comments and descnprions
thJt can be under~rood and m.iimamed easily.
p'cudt><:odc A techmquc for rcprcscnnnll program IOf,'1C on !K"mi-~rrucrured pro\c.
qu:ahl) a\\urnncc (QA) A proce~~ or procedure for mimmmng error< and cn,unng quality in product'I.
Poor qualil)' can result from inaccurace requirements, design problem~. coding error~, faulcy docu-
mcnra11on, and ineffecrive ce~ring. A QA ceam reviews and res~ a ll .1pphcat10n~ and ')'rem' chanse'>
co vcrof) >pccifi~ation' and ;,oftware qua lity Mandard!>.
release plan ln agile development, a plan chat specifies when user stones will be 11nplemc111ed and the
riming of the release~. ReleJses arc relanvcl)' freq uent, and each rclc.isc is treated .1s a system proro-
C)'PC rhor can be rested and modified as needed.
>1mul.11ion A dress rehear.al for users and IT supporr staff. Org.111i.t.a11ons typ1c.tlly mclude all proce-
dures, such .ts those thar rhey execuce only ar the end of a month, quarter, or ye.1r, 111 their simulations.
~ofr".1rc engineering A software dc'"elopmem process rhar scrcsscs solid design, effcc1ivc structure, occu-
rnrc docu mcnr.trion, and careful testing.
\l.ttu1 Oa11 In >trucrured opplicnrion development, an indicator thac nllows one modu le 10 send a mes·
>.lgc IO .rnothcr modu le.
strunurc chart A top-down representation o f business fu nctions and proc:cs~n. Also ca lled an FDD.
~tructurcd "alk-through A re1·iew of a project ream member's work b) other memher> of the ream. Gen-
erally, \ysrcms ona lyi.rs review che wock of other systems analysts, and programmer<; review the work
of other programmers, as a form of peer review. Strucmred wall-through> ;,bould tJke pla<e through-
out the SDL(. and .ire called rcqu1remenrs reviews, design reviews, code renews, or resnng re1·1ews,
dcpcndini; on rhc phase in which they occur.
>tub te>ring A form of tc,ring where the programmer simulates each program outcome or re; ult and d1> ·
pla)> a m.:1>>agc to 1ndKate whether or not the program executed >OCC~>full). Ea,h ,tub rcprc>cnh an
enrry or c,11 point that will be linked later to another program or data file.
subordinate module A lower-leHI modul<' ma structure chan.
S)nt.i" error l'rogramnung languag<' grammar error.
\y\lcm d1angc0>cr The pro<.e" of punin11 the new information S)'Stcm onlinc and re11nni: the old '>''"
tern. ('hangcovcr can he r:ipid or 'low, depending on rhc method.
~)>tern documcntarion A de\Criprion of a <;y~rem\ functions. and how thcr are implemented. The analy't
prepare' mo\t of the ~)'\tern documentation dunng the sy><ems :rnaly.,1s and '>)'\tern'> de.,ign pha'e'.
Sy;,tcm do1.u111cnrarion indude;, d:1ta dictionary enrries, DFD>, object model;, i.<:recn la)·our-, ,uur<.c
document,, and the 'Y'tcms rcquc't that i111tiatcd the pro1cct.
system tcsuug A form of tesnng mvolving .rn enrtre informariou system and t0cludcs aU typ1c.tl process-
ing sirnat1ons. During a system rest, u~crs cnrcr dara, inch1ding samples of acrnal or live darn, perform
queries, and produce reports to simu late acrnaJ opcraring conditions. Al l processing oprions and
outputs :ire verified by users .md the rr project development team ro ensure rhat the system funcnons
correctly.
1est data The dJtJ used tn un1r resting. Tesr dara should conrain both correct data and erroneous d.Ha
and should test all possible sm1arion.s that could occur.
tc\1-dri>cn dc,clnpment (mO) i\n XP concept that unit rests arc dc,igncd before code i' written, fucm·
inf: on end rc,ulr; and prc,·cnring programmers from 'rmyini.; from their goak
te..I cm ironmcnr The cmironmcnr that :maly<ts and programmers uo;e rn develop and maintain
program,.
t~I plan A plan designed b> a S)Stems .tnalrsr that includes test steps and test dat.1for1megrauon test·
mg .ind S)Stem tesnng.
u11htly coupled If modules are nghd) coupled, one module refers to internal logic contained in another
module.
top-dm• n approach \ dc<il,'ll approach, alw called modular dc<ign, where the <)"'Item< analrr define<
the overall ohicctivc, of rhe <)"<tern and rhen hreaks them down into <ubsyscem\ and module\. This
brc:akmg-down procC\~ al ..o "c:illc:d paninoning.
training plan A .. uc1.c\\ful information '>"cm requires training for users., manager,, and n ;tall
mcmhcr.,. ll1c cnnrc: <y<rcm< dcvclopmcnr effort can depend on wherhc:r or nor people undcr\tand
the 'l'~tcm and know how m u<c ir effecri,·dy. The training plan is a document that derail' tht\C
requirement~.
train-the-trainer A strategy where one group of users has been rrained and can assist others. Users ofrcn
le:1m more qutGkly from coworkers who share common experience and job respo11s1b1li11es.
tutorial A serie; of onhne imeracuve les;ons that present material Jnd provide a di:1log with user;.
unit tc\ling The 1c,ting of an indi vidu:il program or module. The objective i> to idc111ify :1 nd eli minate
c-ccc:ution error~ that could ca u'c: rhc program ro tcm1inate abnormally ,111d logic errors that could
have been mi5,cd during desk checking.
mer dncumcntat1on l n<trucnon~ and information ro users who will interact with the sy~tem. I nclude~
u\Cr manual ~, help ~rcen<, :ind rurorials.
user stOf} In agile de"elopmcnt, a \horr, simple requirements definition provided b) the (u.,tomer. Pro
grammers u;,e uoer storieo t0 detem1ine a project's requirements, prioriue>, and scope.
"ebca>l A one-wa) rr:imm1ss1on of mformarion or rraining materials, such as a webmar i.es;ion, J\J1l-
able on dcru;rnd or for a opec1fic period to onlme pan1apants.
"cb1oar An lntcmct·bJ;,ed rra1mng '~>Ion that provides an mteracuvc experience. The word u•tbmilr
combines the words web and semmilr.
Exercises
Questions
I. Whar i~ QA?
2. Whar is appl1carion dcvclopmenr?
3. Explain how srrucrure charts are used in application developmenr.
4. Should classes be rightly coupled or loosely coupled in 000? Explain why.
5. Whar is pair programming?
6. What role do IDEs play in coding?
7. Describe three main rypes of rcsring and the order in which they arc performed.
8. Whar are the differences be1ween program, system, operations, and u~er documentation?
9. Whar is rhe role of onlinc documentation?
10. What is the difference be1wcen :rn operational environment and a test environmenc?
Discussion Topics
I. Di~cuss the three technique~ u~ed m improve QA.
2. What arc rhc mosr significant differences among structured, 0-0, and agile merhods? Whar do rhey
have in common?
3. Experienced programmers sometimes eschew IDEs for handcrafted mols, ofren connected in a pipeline
to facilitate complex work flows. What advantages and disadvantages would this approach have over
sophisricared IDF..s?
4. Your supervisor said," lnregrarion testing is a waste of rime. If each program is tested adequately,
integrarion res ring 1sn 'r needed. Instead, we should move on to system testing as soon as possible. If
modules don't interact proper!)', we'll handle it then.~ Do you agree or disagree with this commenr?
E.xplain your answer.
5. Suppose rhar you designed a rurorial ro rrain a person in chc use of specific sofrware or hardware,
such as a web browser. \'<'har specific informacion would you want co know about the rcc1p1enr of che
training? How would rhat information affecr che design of che training material?
Projects
1. Using rhe marerial in chis chapter and your own Internet research, prepare a presemation on rhe pros
and cons of agile development methods.
2. In this chapter, yo u learned abour rhe importance of testing. Design a generic rcsr plan char describes
rhe testing for an imaginary sysrem.
3. Which sysrcm changeover mcrhod would you recommend for an air traffic conrrol system upgrade?
Explain your answer.
4. Design a generic posr-implemen tation evaluation form. The form should consist of questions char you
could use co eva luate any information system. The form should evaluate the training received and any
problems associarcd wirh rhe program.
5. C reate an online training module using one of the systems discussed in this chaprer, such as Udemy or
lynda.com, on the topic of managing systems implemenrarions.
r..,,... JID) r-.. 1- . . 4•11_.. • ...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-s c~ c....,a..-.,.,....,. .. ... 111>_... ........ _ .. ~ ........................._ .... ._
PHASE
Systems support and security is the final phase in the systems development life cycle. In the
previous phase, systems implementation. a functioning system was delivered. The system now
moves Into the support phase, where the analyst maintains the system, handles security issues,
protects the integrity of the system and its data, and is alert to any signs of obsolescence.
Security concerns have become a matter of national importance. Major security breaches at
large corporations are unfortunately quite commonplace. Sadly, system security Is rarely solved
by a simple app--it requires a disciplined approach that affects virtually all wks in the SDLC.
Chapter 12 focuses on managing systems support and security throughout the useful life of the
system. This includes user support, maintenance tasks. maintenance management. performance
management. security levels, backup and recovery, system retirement. and future challenges and
opportunities.
399
r..,,...JID)r-..1-.. 4•11_.. •...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Chapter 12 Managing Systems Support and Security
Managing
Systems Support
and Security
Chapter 12 describes systems support and security main concerns: user expectations, system performance,
wks that continue throughout the useful life of the and security requirements.
system. The systems support and security phase begins The chapter includes three "Case In Point"
when a system becomes operational and continues until discussion questions to help contextualize the concepts
the system reaches the end of its useful life. Throughout described in the text. There are cwo "Question of
the development process, the objective has been to Ethics" scenarios in this chapter. The first scenario
create an Information system that is efficient, easy to concerns known security vulnerabilities In a system and
use, and affordable. After delivering the system, the what should be done about them. The second scenario
IT team focuses on support and maintenance tasks. is about divulging personal information, social media, and
Managing systems support and security involves three free speech.
r..,,...JID)r-..1-.. 4•11_.. • ...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Phase 5 Systems Support and Security
~~\\\\\\llllUIQ~~ ~~\\\\IUU/11.1,,
:s
or
~
IS ~
~ ~
"-
~ 0 0 fl:!
~ ~
N '
'11111 11\\\ •
FIGU RE 12- 1 Remote access software, such as GoToMyPC shown here. lets users access their PCs from anywhere-even with their
smartphones or tablets.
s~ru: r.otorntot. ('Q'TI
In addition to functioning as a valuable LLnk between IT staff and users, the help
desk is a central contact point for all IT maintenance activities. The help desk is
where users reporr system problems, ask for maintenance, or submit new systems
requesrs. A help desk can utilize many types of automated support, just as outside
vendors do, including email responses, on-demand fax capability, an online knowl-
edge base, frequently asked questions (FAQs), discussion groups, bullerin boards,
and automated voice mail. Many vendors now provide a live chat feature for online
VISltOrs.
(....,..... J:gi( . . . . . I_,.. 4111.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~---tfta111&....-.~~ ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase 5 Systems Support and Security
TOTAL
($)
maintenance
expenses
operalional
costs
FIGURE 12-2 The total cost of operating an information system includes operational and maintenance costs.
Operational costs (green) are relatively constant. while maintenance costs (purple) vary over t,ime.
Correcnve
Maintenance High Low Low Htgh
AdaplMI
Maintenance
None Medium Mecium
(Minor
Enhancements)
Adaphve
Maintenance
None None Medium to High Medium to High
(Ma1or
Enhancements)
Preventive
Low Medium Medium Low
Maintenance
FIGURE 12-4 Information systems maintenance costs depend on the type o f maintenance and the age
of the system.
The wor~r-case siruarion is a sysrem failu re. If an emergencr occurs, rhe main re·
nance ream bypa ses the initial steps a nd cries to correct rhe problem immediately.
This often requires a parch, which is a specially 'vrin en sofrware module chat pro-
vides temporary repm rs so operations can resume. ~1eanwhile, a wrirren systems
request t~ prepared by a user or a member of the IT department and added to the
maintenance log. When rhe system is operational again, rhe maintenance ream deter-
mines the cause, analyzes rhe problem, and designs a permanenr solution. The IT
response ream updates rhe rest data fi les, thoroughly tesrs rhe sysrem, and prepares
fu ll documentation. Regardless of how the priorit ies are sec, a standard ran king
method can be helpful. For example, Figure 12-5 shows a three-level framework for
IT supporc potential impact.
PRIORITY IMPACT
FIGURE 12-5 This three-level ranking framework for IT support considers potential impact and response
urgency.
The process of managing sysrem support is described in more detail in Section 12.3,
including an overview of maintenance tasks and a procedural flowchart.
(....,..... J:gi( . . . . . I_,.. 4111.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- t fta111&....-.~~ ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase S Systems Support and Security
Programs rhar need a large number of mainrenance changes usually arc good
candidares for rcengineering. The more a program changes, rhe more likely iris ro
become inefficienr and difficulr ro maintain. Detailed records of maintenance work
can idenrify systems wirh a hi rory of frequent corrective, adaptive, or perfecr1ve
maintenance.
FIGURE 12-6 Technicians use a motorized Ii~ to get into position by the
ATLAS particle detector at CERN. Regardless of the type o f system. tr;ioned
professionals must perform high-quality mainte nance.
Soi.lrc:e: Al iA r 11 ~ N
You are a systems analyst at Outback Outsourcing, a firm that handles payroll processing for
many large companies. Outback Outsourcing uses a combination of payroll package programs
and in-house developed software to deliver custom-made payroll solutions for its clients. Lately,
users have flooded you with requests for more new features and web-based capability to meet
customer expectations. Your boss, the IT manager, comes to you with a question. She wants to
know when to stop trying to enhance the old software and develop a totally new version better
suited to the new marketplace. How would you answer her?
r..,,...JID)r-..1-.. 4•11_.. •...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Chapter 12 Managing Systems Support and Security
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 4111.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- t fta111&....-.~~ ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase 5 Systems Support and Security
Unfortunately, many analysts feel that maintenance is less interesting and less cre-
ative than developing new systems. In addition, an analyst might find it challenging
to troubleshoot and support someone else's work that might have been poorly docu-
mented and organi1cd.
Some organi1ation5 that have separate maintenance and new systems groups
rotate people from one assignment to the other. \Xfhen analysts learn different skills,
the organization is more versatile, and people can shift to meet changing business
needs. For instance, S)'Stcms analysts working on maintenance projeccs learn why it is
important to design ea5ily maintainable systems. Similarly, analyses working on new
systems get a better appreciation of the development process and the design compro-
mises necessary co meet business objectives.
One disadvantage of rotation is chat it increases overhead because rime is lost
when people move from one job co another. When systems analysts constantly shift
between maintenance and new development, they have less opporruniry to become
highJy ski!Jed at any one job.
Newly hired and recently promoted IT sraff members often are assigned to maintenance
projects because their managers believe that tl1e opportunity ro study existing systems and
documentation is a valuable experience. ln addition, tl1e rnini-SDLC used in many adaptive
maintenance projects is good training for the full-scale systems development life cycle. For
a new systems analyst, however, maintenance work might be more difficult than systems
development, and it might make sense to assign a new person to a development ream
where experienced analysts arc available ro provide training and guidance.
Start
Yes Yes
No
System administrator
assigns maintenance Yes
tasks and monuOfS
Che wO<I<
System admn1strator
adv ses systems revoew
comm.nee and al'ected
users of Che staws and
outc0me
End
FIGURE 12· 7 Although the procedure varies from company to c;ompany. the chart shows a typical
process for handling maintenance requests.
USER NOTIFICATION: Users who initiate main tenance requests expect a prompt
response, especially if the situation rurectly affects their work. Even when corrective
action cannt1t occur immediately, users appreciate feedback from the ~ystem adminis-
trator and should be kept informed of any decisions or actions that could affect chem.
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 4111.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- t fta111&....-.~~ ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase 5 Systems Support and Security
considered mgethcr, and the most important project gets top priority, whether it is
maintenance or new development.
Some IT managers believe that evaluating all projects together leads to the best
possible dec1s1ons because maintenance and new development require similar IT
department resources. In IT departments where maintenance and new development
are nor integrated, it might be bener to evaluate requesrs separate!>'· Another
advantage of a c;eparate approach is that maintenance is more likely to receive a
propornonal share of IT department resources.
The most important objective is to have a procedure that balances new
development and necessary maintenance work to provide the best support for
business requirements and priorities.
Standard Details
lhll ~~-the mlnlmwn reqv•••~ iu for proc.ues ror
Conflslntaon ~ment(CM} in sysiems and softw•r• ·~·na. The
-.>pUCltion or tNs sund¥d applies to 11f1 form. ci.u. or type of soflw•re or
syst..,,. Th.s rwlSiOn of the sunclatd tl<Plnds the plWIOOJS _...,n to ticpllln
CM. indud11& ldMIJl)'vl& and Kq<Wlng confliurltJOn lltmS. conuolinc chqn.
rtpOfllng the sutUS of conllgur•non Items. os -11 u sollYwe builds and
• Wort<1111 Group
ffiuse enganH<lna. Its ptedecesso< defined only the contentS or• soflw•re
configurallon rnanagtmtnl plan. This stllldard ..xlruMS wNI CM l(IJVltlff are
10 be don._ wtwn thty are to~ In the ure cycle. and wh.11 plllnnlnc end
mouras are roqu~. It Blso descrlba the content areas ror •CM Plan. The
SUlnd•rd 5UppolU ISOllEC/IEEE 12207'.20081nd ISOllEC/IEEE 1528&:2008and
adheres to the terminology In ISO/IEC/IEEE Std 2•765 Ind the 1nrormatlon Item
requlrtrnents of 1£EE Std ~5939TM
FIGURE 12· 8 IEEE Standard 828-2012 for configuration management in systems and software engineering.
Soul'C« r
Ctvl is especially imporranc if a system has mulciple versions that run in different
hardware and software environments. C?vf also helps to organize and handle docu-
mentation. An operational system has extensive documentation that covers develop·
ment, modification, and maintenance for all versions of the installed system. Most
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~---tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase 5 Systems Support and Security
,..
~--
:]
A-pod<Clllil•----..,.~--
- - - - . . - -. . ~ ... ot ~Oftlht _ _ _
......... -
t«~ Mld ,..bu.,.. lmptc nlWJ'll.Md fl4IPO". b MWt)'pa ot Jwdwwt....,.......,..
rc-i ~
- 1. . . .__
fhe it<Oll Wl•odlld '1tftd H1ol.a0""1f I009'- ~ W(h l'I 'Mf'lk• p«ks II to tum or. "1t
u "" lo<Wl-l.l, Wl_& ....
10. t.ipdten M
• """"""connec:llOn. lttm 1NWW llbo.C. ~ W"""'°"" tO \IP to
ly ,..,. _ _ _ _...
'"'°"""l<Aftt d0w1 °m lldld """*"' ,.,.,. \ltlf'lt
FIGU RE 12-9 A Microsoft service pack provides access to updated drivers. tools. security patches, and customer-
requested product changes.
Source: I It
.....
·----
About Documeni.tlon
...... ,,.
,._,. a "°"~
°"----
--
~
. ...-
t>ownload• Community
CUlcL.-1'et111r.. W..,, rdrM..
"' "'""" ......................
o..-..i· ..............
•nd--
.
12.3. 7 Baselines
A baseline is a formal reference point that measures system characrenstics at a
specific time. Systems analysrs use baselines as yardsticks to document features and
performance during che systems development process. The three type~ of baselines are
functional, allocated, and produce.
The functional baseline is the configuration of the system documented at the
beginning of the project. It consists of all rhe necessary system requirements and
design constraints.
The allocated baseline documents the system at the end of the design phase and
identifies any changes since the functional baseline. The allocated baseline includes
resting and verification of all system requirements and featu res.
The product baseline describes the system at the beginning of system operation.
The product baseline incorporates any changes made since the allocated baseline and
includes the results of performance and acceptance tests for the operationa 1 system.
Years ago, when most firms used a central computer for processing data, ir was rel-
atively simple to manage a system and measure its efficiency. Today, companies use
complex networks, client/server systems, and cloud computing environments to sup-
port business needs. A user ar a client workstation often interacts with an informacio n
system that depends on ocher clients, servers, networks, and data located throughout
the company. Rather than a single computer, it is the integration of all those compo-
nents thac determines the system's capability and performance.
To ensure satisfactory suppon for business operations, chc IT department muse
manage system faults and intern1ptions, measure system performance and workload,
and anticipate furure needs. In many situations, IT managers use automated software
and CASE tools to help wich these tasks. Automated tools can provide valuable assis-
tance during the o peration and supp-Ort phases. ~!any CASE tools mclude system
evaluation and maintenance features, such as the followmg:
• Performance monitors that provide data on program execution times
• Program analyzers chat scan source code, provide data element cross-reference
information, and help evaluate the impact of a program change
• Interactive debugging analyzers char locate the source of a programming error
• Reengineering rools
• Automated documentation capabilities
• Network activity monitors
• Workload forecasting tools
In addirion w CASE tools, spreadsheet and presentation software ca n be used to
calcularc trend~, perform what-if analyses, and create attrac ti ve charts and graphs ro
display the results. Information technology planning is an essential part of the busi-
ness planning process and often part of the presentations made co management.
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase 5 Systems Support and Security
administraror muse derecr and resolve operational problems as quickly as possible. That
cask, often called fault management, includes monitoring the system for signs of trouble,
logging all S)'Stem failures, diagnosing the problem, and applying corrective action.
The more complex the system, the more difficult ir can be ro anal)'Ze S)'mptoms
and isolare a cause. In addition ro addressing the immediate problem, it i~ import-
ant ro evaluate performance patterns and trends. For example, the Acrivicy ~1onitor
applicarion shown in Figure 12-11 runs on Apple's :\1ac OS X to display CPU, mem-
ory, energy, disk, and network accivicy of all running applicarions in real time. Similar
programs, such as the Resource Monitor, are available on \Vindows. Faulr man-
agemenr software can help identify underlying causes, speed up response rime, and
reduce service outages.
_...,.a
UMft'411\Aigtnt ')Ml
no u
.,, "'
..2 " '
12,21•
s,11<1
12,228
1, 111
''
n• -
'°°'
" .... .......
-
'11 l(ll . _. . . . . .. . . 7,21(1 1117 .....,
2toU JI !Cl 2i1 J2 H16& , ...,..,
-
22,Ka 2eM1 4.:S7-S M-,Ne 45111 JW'**"i
12KI t45U 105 1•1 M1>4 ltllbfr
121(8 ,.,_ 397 6 u -
70.. 10.. 1H 1H 1111 -
UQ M1Q "'4 7tl 20«....,
11 ICI 210 227 111 11 ...
... 1(1- 111 Q u ,... 1121 ....,
11Q ,.... .. - --
... -
15~ ,_,... 171 1,J:l• 20J1....,
---
.... -!Ca .. '70 1M< -
•21<• .... u .. 1171 -
na aoca 11 n 1--
•G.
--
1JD 14 tt llM .-.Y
7q 00 U l1 1110-
----
- ow
IQ '7D
"'' ,. 21 no• ....,____
......... IQ U 21 DI...,,., _
·--
.. -
"'"' 4Q
•u
IOICB
,, ic:a
10
12
•2 tMO....,
, . l0201 ,...,.
.. --
0 llCtliio ...... .... ,... .. 11 .... -
SQ Maby\ell 11 11 1817 .....,
10 ID I 12 171~
..... ...
~-··
'() ~.
10
1U
7U
>OU
SS1
It
1a tOOt
11
1Ulley
111 toec
........
...... JCftd
_,.
--
,,..,,..
0.....
20-
o-
0-
•
2
0
7
a
0
'°-
20•• -
11 -
-- 0- 0
"---~~~~~~......;.~~~-'-~~~~~~~~
0 o.,,.. ... - ~~~~
- WI 40' 011.261
""'-.... Ha.711.,.
PtJCMt• llf\i'MO;
....,.,....,... 2.7•2
FIGURE 12· I I The Activicy Monitor application on Apple·s Mac OS X displays CPU,
memory, energy. disk. and network activity of all running applications in real time.
Soi.Ire.•: •1 I
Although sysrem adminisrrarors must deal wicb system faults and interruptions as
they arise, the besr strategy is to prevent problems b}' monitoring system performance
and workload.
RESPONSE TIME: Response time is the overall ti1ne between a request for system
activity and the delive ry of the response. In the typical online environment, response
time is measu red from the instant the user presses rhe Enter key or clicks a mouse
burron until the requested screen disjplay appears or printed output is ready. Response
rime is a ffected by the system design, capabilities, and processing methods. If the
request involves network or Internet access, response rime is affected by data commu·
n ica ri on factor~.
Online users expect an immediate response, and they are fru~rrared by any appar·
cnr lag or delay. Of all performance m eas urements, response time is the one that users
notice and com plain about most.
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase 5 Systems Support and Security
• Service time: The rime ic rakes to process a given rask once ir reaches rhe front
of che queue.
• Think nme: The rime it takes an application user to issue another requesr.
• Urili1arion: How much of a gh•en resource was required to complete a task.
• Wait time: The time that requests must wait for a resource to become available.
., . . .
.. . . ._ ..... ..l....... '"'"'.. u..t.a ~ ... _ lw.·~ • -~.... """'-"
.. •
.. I ( 0 f •
CAPAOTY PlANNING ANALYSIS
DATA:
• Proc~..nc lirlw lsteonds) per Web si11!' ore!«: 22.S
> M.J•imum WPb b.i"'!d ordl'fs 11tr day
.--
3.MO
•
1
I
9
10
11
_
fclul
-.~
MU
... .....
gs-
?
"
t
't
ll
,.
u
IS
_,
It
11
"••
1 CAPAcnv PLANNING ANALYSIS
DATA:
•
--
"4ill i • .._.. .n Cd IS
'
10
tOWlillaMM--..
ICCO
II , . . . . . . . . t,.GCIC
ll
u I Co I
"'
I)
16
17
...
-·
II
FIG URE 12- 12 In this Goal Seek example, the user wants to know the effect on processing time if the number of
daily transactions Increases from 3.840 to 9,000.
queries; and the number, t ype, and size of all generated reports. If rhe system
invo lves a LAN, network traffic levels must be estimated to determine whether or
not the existing hardware and software can hand le the load. If the system uses a
client/server design, performance and connectivity specifications must be exam-
ined for each platform.
Mosr important, an accurate forecast of future business activities is needed. If
new business functions or requirements arc predicted, contingency plans should be
developed based on input from users and management. The main objective is to ensure
that rhc system meets all future demands and provides effective support for business
opcrarions. Some firms handle their own capacity planning, while others purchase
software such as ldcra's Uptime ln&astructure Monitor, shown in Figure 12-13.
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- t fta111&....-.~~ ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase 5 Systems Support and Security
I D ........
:::: • Ra.ii.
A - ,_t_ - - ··..•__.:.. ..,._ •
--- --
- <'>
-Iii
-- Start for FREE
c-c...--l'OU' -~llul·----·:t-
•-N"8QT._
~ f9'DO"llnO • *C*'ein
Mr:.iwor QIW1 JO,.! dOeP. ~.,_,COL C' 1;
.,.......--y- -
*es ft
_..,,....,_,.....,...
.
Cll*!llt_,.,.....__._ -
al._.,,
--
...,,~
.--pjlnnlng
,. . . . -...,io--.
... )IOU~ ..........
.. ~--...- ._,..,11--· · --
_ond_)IOU_llel1g!W-
... _
~"""
-y,,,.,.._,. ..,_-
...,_ ... . . . . . . .
-H"U..NovvOQ. Yi111111W.....
"'"... collOdlW""" """"'"'........ --
~ _.
\J!JllPlelnloonu<V•---
-~--·"""'-
~ Uk!XINX.
-111<141b1 . _ -
C.,.Cft)t ~and PtotetM ........."",.
__ _,,<O"""'Y____ -.--·--..
• ~/ lod$ JM ptebl1m• tMlar9 i1'~ twcJpert trw f'IOe dltlceraf
boet ~ I
_ _ ...,"""'O~ CP\A
------~-
Qf'..,,.
.... ·..
't4Wt.;ei 9"AOiilNrG ~ larlQdng.....,, hltlf'l
ond llQ . _ ................ -
~---- ...................
- - 1 a y 0 u - . . g o < - ... _ . . . , . , . , _ _ . _ . .. -
an 01iCAI
FIGURE 12· I 3 ldera's Uptime lnfristru«u~ Mo'1itor i$ ~11 ~pl~ of taPit;ity planning software ;ind
services.
S.WC« .Js;lrl. ....._.
Hardware and software failures Router stops functioning. or software causes the
application server to crash.
Trespau and espionage Employee enters unlocked server room and views the
payroll data on a forbidden system.
FIGURE 12- 16 System threats can be grouped into several broad categories.
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 4111.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase 5 Systems Support and Security
hardware, software, data, networks, people, or procedures. For each asser, a risk
manager rares rhe impacr of an arrack and analyzes possible rhrears. A threat is an
internal or exrernal entiry rhar could endanger an assec. For example, rhrear carego-
nes might include narural disasters, software attacks, or theft, as shown in Figure
12-16.
Next, the risk manager identifies vulnerabilities and how they might be
exploited. A 'ulncrabilit) is a security weakness or soft spot, and an exploit 1s an
arrack t har takes advantage of a vulne rability. To identify vulnerabilities, a risk
manager might ask questions like these: Could hackers break through the /)roxy
server? Could em/)loyees retrieve sensitwe files without pro/)er a11thorizat1011?
Could people enter the computer room and sabotage our servers? Each vulnerabil-
ity is rated and assigned a value. The ourput of risk identification is a list of assets,
vulnerabilities, and ratings.
RISK CO NTROL: Afte r risks are identified and :issessed, they mus t be controlled.
Control me:isure might include rhe following examples: We could place" firewall
on the proxy server. \Ve could assign permissions to sensitive files. \Ve could
install biometric devices to guard the computer room. TypicaU)', management
choo es o ne of four risk control straregies: avoidance, mirigation, transference,
or :icceprnnce. A"o1dance eliminates the risk by adding protective s:ifegu:irds. For
example, to pre\ent unauthorized access to LAN computers, a secure firew:ill
might be insr:illed. ~1i1igarion reduces the impact of a risk by careful plannmg
and preparntion. For example, a company can prep are a disas ter recover y plan
in case a natural disaster occurs. Transference shifts the risk to another asse t or
party, such as an insurance company. Acceptance means that nothing is done.
Companies usu:illy accept a risk only when the prorection clearly is no r worrh rhe
expense.
The risk managemenr process is ireracive-risks arc constantly identified, assessed,
and controlled. To be effective, risk managers need a combination of business knowl-
edge, IT skills, :ind experience with securiry roots and rechniques.
FIGURE 12-17 IT security professionals have names for various types of attackers.
Dumpster diving Attacker scours the trash for valuable 1nformatt0n that can be
used to compromise the system.
Malicious code Attacker sends infected email to the target system. Attackers may
use viruses, worms, Tro1an horses. keystroke loggers. spyware, or
scripts to destroy data. bog down systems. spy on users, or assume
control of infected systems.
Man in the middle The attacker intercepts traffic and poses as the recipient, sending
the data to the legitimate recipient but only after reading the
traffic or modifying it.
Phish ing F<llse DNS (Domain Name Server) information steers the user to
the attacker's website. Attackers trick users into thinking they are
visiting a legitimate site, such as a bank site. then attempt to obtain
bank account numbers. usernames. and passwords.
Privilege escalation Employee tricks a computer into raising his or her account to the
administrator leYel.
(continues)
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f •,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~---tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase 5 Systems Support and Security
ATTACK EXAMPLES
FIGURE 12- 18 Attacks can take many forms. as this table shows. IT security managers must be able to detect
these attacks and respond with suitable countermeasures.
Security Levels
12.6 SECURITY LEVELS
Physical
To provide i.ystem security, six separate but intenrelated levels must
be considered: physicn l security, network security, application secu· Network
rity, fi le security, user security, and procedural security. Like the
chain shown in Figure 12- 19, system security is only as strong as Application
the weakest link. The following sections describe these secltrity lev·
els, and the issues that must be addressed. Top management often File
makes the final strategic and budget decisions regarding security,
but systems analysts should understand the overall picture in order Procedural
to make informed recommendations.
User
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- t fta111&....-.~~ ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase 5 Systems Support and Security
•
sy1item.
,\itany notebook computers have a Universal Security
Slot (USS) that can be fastened co a cable lock or laprop
••
-·
alarm. Again, while these precautions migbt nor deter pro-
fessional rhieves, they might discourage and deter casual
thieves.
• Back up a ll viral data before using the notebook computer
outside the office. Save and rranspon highly sensitive
data on remo' able media, such as a flash memory device,
insread of the compurer's hard drive.
• Use tracking sofrware char directs the laptop to periodi-
cally contact a ecuriry cracking center. if the notebook is
Find My iPhone
stolen, the call-in identifies the compurer and its ph)•sical - ApplelO a~
location. Armed with this information, the security track-
ing center can alert law enforcement agencies and commu-
nications providers.
• Apple, Google, a nd Microsoft offer services to locate lost
customer sma rtphones. The services also permit remo te
data wi pe a nd factory reset of the devices. For example,
Apple's Find My iPhone a pp is shown in Figure 12-21.
Apple a lso provides a similar cloud-based service.
• While traveling, try co be alert to pocential high-risk situ-
ations, where a thief, or thieves, mighr create a disc:racrion
and attempt to snatch the compure r. These situations often
occur in crowded, noisy places like airport baggage claim
areas, rental car counters, and security check points. Also, FIGURE 12-2 1 Apple's Find My 1Phone app
when travelmg by car, score rhe computer in a trunk or helps customers locate lost devices and perform
remote data wipes and factory resets if needed.
lockable compartment where 1t will nor be visible. ~.. ....
Outer Banks County is a 200-square-mile area in coastal North Carolina. and you are the
IT manager. The county has about a hundred office employees who perform clerical tasks in
various departments. A recent budget crisis has resulted in a wage and hiring freeze. and morale
has declined. The county manager has asked you to install some type of keystr0ke logger to
monitor employees and determine whether they are fully productive. After your conversation,
you wonder whether there might be some potential privacy and security issues involved.
For example, does an employer have a duty to notify its employees that it is monitor·
ing them/ Should the employer notify them even if not required to do so/ From a human
resources viewpoint, what would be th e best way to approach this issue/ Also, does a
potential security Issue exist/ If an unauthorized person gained possession of the key-
stroke log, he or she might be able to uncover passwords and other sensitive data.
What are your conclusions? Are these issues important, and how would you respond
to the county manager's recommenda-tion/ Before you answer. you should go on the
Internet and learn more about keystroke loggers generally. and specific products that
currently are available.
r..,,...JID)r-..1-.. 4•11_.. •...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Phase 5 Systems Support and Security
VIRTUAL PRIVATE NETWORKS: Privare nenvorks work well with a limited num·
ber of computers, but if a company wanrs to esca blish secure connections for a larger
group, it can create a \•irrual private network. A virtual private network (VPN) uses a
public network, ~uch as rhe lncerner or a company inrranet, to connect remote users
securely. Instead of using a dedicated connection, a VP1 allows remote clients to use
a special key exch::inge that must be authenticated by the VPN. Once authentication
i~ complete, a secure nerwork connecrion, called a runnel, is established berween che
client and the access point of the local incranet. All craffic is encrypted through the
VPN tunnel, which provides an additional level of encr)•prion and ~ecurity. As more
companies allow employees to work from home, a VP can provide acceptable levels
of security and reliability.
indicate that a mail server is running. Port scans can be used to draw an
accurate map of a nerwork, and pinpoint possible weaknesses.
• Denial of service. A denial of service (DoS) attack occurs when an attacking com-
puter makes repeated requests co a service or services running on certain pores.
Because the target computer has to respond to each requesc. it can become bogged
down and fail co respond to legitimate requests. A much more devastating attack
based on this method is called a distributed denial of service (00oS) attack. This
attack involves multiple attacking computers that can synchronize DOS attacks
and immobilize a server, as shovm in Figure 12-22. A DDoS attack is an example
of the type of serious cyberanacks that United States Computer Emergency Readi-
ness Team (US-CERT), shown in Figure 12-23, was created to address.
Attacker
Bornet
Target
FIGURE 12-22 In a DoS attack. an attacker s;ends numerous authentication requests with false recum
addresses.The server tries unsuccessfully to send ovt authentication approval and IS evenruatly disabled by the
Roor of requests. More sophisticated DoS attacks are distributed (DDoS).as shown In rh1s figure. Instead of a
sangte computer, the atacker uses an army of botnets (computers unknowingly infected wirh malware that are
difficult to trace) to attack the argeL
US- CERT...
.....Ml & .. >lr'!l.. (A"f • • \ f'~,K4'<W\ ... , • • ,~.,,_ •t1•'l 0
>•t'I..•,,••• ••
FIGURE 12-23 The US-CERT is a key player in the battle against cybersecurlty threats.
Sol.ire« JL ~
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 41 11.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~---tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase 5 Systems Support and Security
FIGU RE 12-24 Exampll!S of rull!S !hat detenn1ne whether U,., firewall will allow traffic to pass.
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 4111.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase 5 Systems Support and Security
and should be used only if changes can readily be undone if unexpected results or
problems develop.
USER GROUPS: Individual users who need to collaborate and share files often
reque~c a higher level of permissions char would enable any of chem co change file
content. A better approach, from a system adminisrracor's viewpoint, might be to
create a user group, add pecific users, and assign file permissions to the group,
rather than to the individuals. M any firms use chis approach because it allows a
user's rights to be determined by his or her work responsibilities, rather than by
job title o r rank. If a person is transferred, he or she leaves certain groups and joins
others that reflect c urrent job duties.
SOCIAL ENGINEERING: Even if users are protecting and securing their pass-
words, an intruder might anempt to gain unauthorized access to a system using a
tactic called ~ocial engineering. In a social engineering attack, an int ruder uses social
(....,..... J:gi( . . . . . I_,.. 4111.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase 5 Systems Support and Security
interaction ro gain access ro a computer system. For example, the intruder might pre-
tend robe a new employee, an outside technician, or a journalist. Through a serie of
questions, rhe intruder tries to obtain the information chat he or she needs to compro-
mise the system. A common ploy i~ for the attacker to contact several people in the
same organi1ation and use some information from one source ro gain credibility and
entry to another source.
An mrruder also might contact the help desk and say, " Hi. This is Anna Dressler
from accounting. I seem to have forgotten my password. Could you give me a new
one?" Although this request might be legitimate, it also might be an attacker trying to
access the system. A password never should be given based solely on th is telephone
call. The user should be required to provide further informatio n to validate his or her
identity, such as a unique employee TD, a telephone extension, and a company ema ii
address.
One highly publicized form of social engineering is called pretexting, which is a
method of obtaining personal information under false pretenses. Pretexting is com-
monly used as part of identit y theft, wherein personal information or online creden-
tials are stolen and used for illegal purposes. The Federal Trade Com1nission's division
of Privacy, Identity & Online Security has a section dedicated to helping consum-
ers battle identify theft. The best way to combat social engineering attacks is with
employee education, more training, and a high level of awareness during day-ro-day
operations.
USER RESISTANCE: Many users, including some senio r managers, dislike tight secu-
rity measures because rbe measures can be inconvenient and time consuming. Sysrems
analyst11 should remind users chac rhe company owes the best possible securiry co its
customer~, who have entrusted personal information to che firm; ro its employees,
who also have personal information stored in company fi les; and ro its shareholders,
who e"<pecr the company co have a uitable, effective, and comprehensive security
program char will safeguard company assets and resources. \Vhen users understand
this overall commirmenr ro security and feel that rbey are pan of ic, they are more
likely ro choose hener passwords, be more alen co security issues, and contribute ro
che overall success of the company's security program.
inrrudcr uses rhc rer m password in a search, the program mighr be able ro find pass-
word reminders char are srored anY'vhere on che computer. To increase privacy for
multiuser compurers, each user shou Id have a separate accounr, wirh individual u er-
namcs and passwords.
Business and personal users also should use caurion when they consider cloud-
based srorage and services. In this environment, where rhe rechnology changes
rapidly, rhe besr ber may be ro work wirh well-established vendors, who can provide
significant cloud securiry experience and safeguards.
Chain Link Consulting is an IT consulting firm that specializes in system security issues. The com-
pany's president has asked you to help her put together a presentation to a group of potential
clients at a trade show meeting next month. First, she wants you to review system security issues,
considering all six security levels. Then she wants you to come up with a list of WWi'fS that Chain
Link could test a client's security practices, in order to get a real-world assessment of vulnerability.
To make matters more interesting, she told you It was OK to be creative in your recom-
mendations, but not to propose any action that would be illegal or unethical. For example.
it would be OK to pose as a job applicant with false references to see if they were being
checked, but it would not be appropriate to pick a lock and enter the computer room.
Your report is due tomorrow. What will you suggest?
r..,,...JID)r-..1-.. 4•11_.. •...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Phase 5 Systems Support and Security
Every sysrem musr provide for data backup and recovery. Backup refers ro copying
data at prescribed intervals, or continuously. Recovery in,·olves restoring the data and
restarting the system after an interruption. An overall backup and recovery plan that
prepares for a potential disaster is called a disaster recovery plan .
12.7. 1 GlobaJTerrorism
The tragic events of eptember 11 , 200 1, and increased concern about global terror-
ism, have led man)' companies to upgrade their backup and disaster recovery plans.
Heightened focu!. on di~asrer recovery has spawned a whole new industry, which
includes new cools and srrategies. Many rT professionals fee l that terrorism concerns
have raised security awareness throughout che corporate world. Although they are
separate topics, backup and disaster recovery issues usually are intertwined.
BACKUP MEDIA: Backup media can include rape, bard drives, optical storage, and
onlinc storage. Physical backups must be carefully identified and stored in a secure
location. Offsiting refers to the practice of storing backup media away from the main
business location, in order ro mitigate the risk of a cacastrophic disaster such as a
flood, a fire, or an earthquake. Even if the operating system includes a backup utility,
many system administrators prefer to use specialized third-part)' software that offers
more options and ben cr controls for large-scale operations.
In addition to on ire data storage, cloud-based storage is growing rapidly. Many
companies use onlinc backup and ret rieval services offered b)• leading vendors. For a
small- or mcdium-si1ed firm , this option can be cost effective and reliable.
not disable the system. Compared co one large drive, a RAID design offers better
performance, greater capacity, and improved reliability. \X/hen installed on a server,
a RAIO array of multiple d rives appears co rhe computer as a single logical drive.
Figure 12-26 shows a comparison of various backup methods.
Differential Only backs up files that Faster than a full backup and Weekly or daily.
are new or changed requires less storage space.
since the last full All data can be restored in
backup. just two steps by using the
last full backup and the last
differential backup.
Incremental Only backs up files that Fastest backup and requires Daily or more
are new o r changed the least storage space often.
since the last backup of because it only saves files
any kind. that have never been backed
up. However. requires many
restore steps-<>ne for each
incremental backup.
RETENTION PERIODS: Backups are scored for a specific retention period after
which they are cicher destroyed or cbe backup media is reused. Retention periods can
be a specific number of months o r years, depending on legal requirements nnd com-
pany policy. Stored media must be secured, protected, a nd in ventoried periodically.
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 4111.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~---tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase 5 Systems Support and Security
After personnel arc safe, damage to compan y assets should be mitigated. The plan
might require shutting down systems to prevent further daca loss or moving physical
assets to a secure location. Afterward, the plan should focus on resuming business
operations, including the salvaging or replacement of equipment and the reco,·ery
of backup data. The main objecti ve of a disaster recovery plan is ro restore busmess
operations to pre-disaster levels.
Disaster recovery plans are often part of a larger business contin uity pla n (SCP),
which goes beyond a recovery plan, and defines how critical business functions can
continue m the event of a major disruption. Some BCPs specify the use of a hot sire.
A hot site is an alternate IT location, anywhere in rhe world, that can support critical
systems in the event of a power outage, system c rash, or physical catastrophe. A hoc
site requires data replication, which means that any transaction on the primary sys-
tem must be mirrored on the hot site. If the primary system becomes unavailable, the
hot site will have the latest data and can function seamlessly, with no downtime.
Although ho t sites are a ttractive backup solutions, they are very expensive. I low-
ever, a hot site provides the best insurance against major business interruptions. In
addition to hot sires, business insurance can be important in a worst-case scenario.
Although expensive, business insura nce can offset the financial impact of system fail-
ure and business interruptio n.
At some point, every system becomes obsolete and is ripe for retirement. For example,
in the 1960s, punched cards represented the cutting edge of data management. Dara
was stored by punching holes at va rious positions and was retrieved by machmcs char
could sense the presence or absence of a punched hole. Mose full -size cards stored
only 80 characters, or byres, so more than 12,000 cards would be needed ro store a
megabyte. Punched cards were even used as checks and utility bills. Today, this tech-
nology is obsolete.
Con~rantl)' changing technology means char every srsrem has a limited economic
life span. Analysts and managers can anticipate system obsolescence in several ways
and ir never should come as a complete surprise.
A system becomes obsolete when it no longer supports user needs, or when the
platform become!. outmoded. The most common reason for di~conrinuing a sy!.tem is
that it has reached the end of irs economically useful life, as indicated by the follow-
ing signs:
• The system's maintenance history indicates that adaptive and corrective main-
tenance are increasing steadily.
• Operational cosrs o r execution times are increasing rapidly, and rou tine perfec-
tive maintenance docs not reverse or slow ·che trend.
• A sofnvnre package is availa ble that provides che same o r additio nal services
faster, better, and less ex pensively than the current system.
• ew technology offers :.t way to perform the same or :.idditional functions more
efficiently.
• ~lainrenance changes or additio ns are difficult and expensive ro perform.
• Users request significant new fearures to support business requirements.
Systems operation and support continue until a replacement system is installed.
Toward the end of a system's operational life, users are unlikely ro submit new
requests for adaptive maincenance because they are looking forward to the new
release. Similarly, the IT staff usually does nor perform much perfective or preventive
maintenance because rhe system will nor be around long enough to justify rhe cost.
A system in it final stages requires corrective maintenance only to keep the system
operational.
User sati~faction typically determines the life span of a system. The critical success
factor for any system is whether or not it helps users achieve their operanonal and
business goals. All negative feedback should be investigated and documented, because
it can be the first signal of system obsolescence.
Ar some point in a system's operational life, maintenance costs stare to increase,
users begin to ask for more features and capability, new systems requests arc
submitted, and the SDLC begins again.
T here is an o ld saying that rhe only constant in life is change. The same is true for
information technology-except thait the rate of change in IT seems to increase every
year. Rapid change can present nume rous challenges to organizations and individuals,
but it can also offer exciting new oppornmicies. The secret to success is to be ready
for the changes that are bou nd ro occur and be proactive, nor reactive.
No prudent professional would Starr a complex journey without a map and a plan.
To navigate the futu re of information technology, companies require ~rrategic plans,
which were discussed in Chapter 2. An individual also needs a plan co reach to a spe-
cific goal or desrinarion. This section discusses rrends and predictions rhar will affect
all IT professionals. To prepare for the challenges ahead, individuals will need to plan
and develop their knowledge, skills, and credentials.
(....,..... J:gi( . . . . . I_,.. 4111.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~---tfta111&....-.~~ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase 5 Systems Support and Security
Technology Powered by an enormous New tec.hnology will drive ma1or The systems analyst will need
Int egratio n mcrease in computing changes in how persona.I and a. mix of business s~ and
power. new IT models will business services are provided. technical skills. He or she will have
include networks with smart. Firms will compete in a global a unique opporwnity to work
interconnected deVJces such marketplace that will reward at the Intersection of business
as communication systems. Innovation. creativity, and positive operations and IT. Synergy
automobiles, entertainment, soc.ietal outcomes. between technology growth and
transportation lnfrastrucwre, globalization will create jobs and
and "smart" power grids. opportunities for people with the
right skills.
Service A business model of computing Service orientation is a paradigm Systems analysts will need to
Orie ntation where processing capabilities shift. It represents a matunng Increase their business acumen to
and data storage are leased of the field. where end users no wort< effectively in a service-oriented
(rented) instead of bought longer care about technical details IT enwonment. Technical slolls wtl
(owned). Computing capabilities as much as business functionality. still be needed. but services are
are seen as servtees used IT systems will be built using SOA about fulfilling business requirements.
on-demand. hke electricity or (service-oriented architecture)
water, rather than as managed to enable current and new
programs. functionality to be delivered as
services to customers.
Cloud Cloud computing is a new The full potential of cloud Like any new technology. systems
C o mputing model for delivering business computing will be realized by development for cloud-based
and IT services. It will have a firms that can integrate cloud· applications will be a challenge
profound impact on business based infrastructure. services. for some and an opportunity
strategies, including product servers. data access, and a secure for others. Regardless of the
innovation, markeong. customer environment. Creativity and development method or platform.
relationships. and social media. innovation will be rewarded. and an analyst will need business savvy
Cloud computing provides the competition will be intense. Cloud and technical know-how to help an
IT infrastructure that enables computing will lower TCO by organization take full advantage of
service orientation. reducing capital expenditures. the cloud.
The Wortcplace In the face of worldwide Successful IT workers must be able Students prepanng for the
competition and enormous to innovate. analyze. communicate workplace of tom0rrow will
technology change, finns will effectively, and "think outside the need a strong skill set. Systems
stress innovaoon. vision, and box." The winners will be those analysts will be expected to bnng
the ability to adapt rapidly. The who can adapt to change and convnunlcations, modeling. problem·
abihty to think critically will be embrace new technology and new solvtng. decision malung. and critical
Vita). ways of doing business. thinking skills to the workplace -
and to be aware of ethical issues that
might afect them.
FIGURE 12-27 Major trends and their impact on IT in general and o n future systems analysts.
• lnsourcing (the moving of jobs from off-shore location~ back home) will
increase, due to economic factors such as higher wages in emerging markers,
improved automation through che use of sophisticated manufacturing robots,
~ecurit)' concerns from outsourced components (hardware and software) devel-
o ped overseas, and political pressure co pre erve johs.
It is entirely possible that large enterprises would require suppliers to certify their
security c redentials and sourcing policies. Another issue might re late to the growth of
cloud computing and large-scale data centers such as the one shown in Figure 12-28.
Access controls and issues related co international law concerning ownership and
surveillance of network acriviry between the data centers and c usromers around the
world will become progressively mo re imporrant as the digital life of companies and
individuals are placed online.
FIGURE 12-28 The rapid growth of data centers and cloud computing has increased security
and privacy concerns.
Oleo y ... I'\ •tod ...,
It's a lso possible that large enterprises will require suppliers to certify their green
credentials and sourcing policies. One issue might relate ro the explosion of data
sLorage and server farms, such as tbe one shown in Figure 12-28. These server farms
can use massive amounts of electricity, for normal operation and for cooling, which
affects the environment and the corporate bottom line.
(....,..... J:gi( . . . . . I_,.. 41 11.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase 5 Systems Support and Security
~B
-S--.'-'flo.._ _ _ ...
Cortollcatlont l1nefit.1 Resources
Certifications
•
Whether you test software most of your day or just part of your day, software
• --hoall.\J
testin& certifications build your path to jobs and promotions.
c .....- • T • Anolpt(ISTQIJ
FIGURE 1l-29 ASTQB has created a very successful scheme for certifying software testers.
S~tte:Arr t 1r1S. tt·..1111 ._( .di .d '"• • :rn
crcdcnrialcd ccrrificarcs, such as che ACM and the IEEE, as do IT industry leaders
such as tvl icrosoft, Cisco, and Oracle.
12.9.5 Cyberethics
As computers permeate more and more of our lives, the decisions made by IT profes-
sionals can have serious implications. Situations may arise involving ethical consider-
ations that arc not easy to resolve. Nevertheless, ethical, socia l, and legal aspects of IT
arc ropics that today's systems anaJyst should be prepared ro address.
In the rwo scenarios presented in the following "Question of Ethics" section, ask
you rself what would you do? Where would you draw the line? I low much would
you be willing co risk doing what yo u thought was the right thing? The decisions you
ma ke could well affect your job and future employment (Scenario I ), bur rhcrc arc
other situations where rhe implications can be even more severe (Scenario 2).
(....,..... J:gi( . . . . .
r..a...w...,..._...., ..
I_,.. 4111.,.. .................,.t11ru
~- )U,
..,...,.......,..~
-Woip-M ._..,..
..
-·~•-fllllie<'f•,...
__.~~c.....,..~
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase S Systems Support and Security
SCENARIO I : You have just completed a routine security audit on the company's
information systems, and you found several areas of vulnerability. For example, file permis-
sions have not been updated in some time, no comprehensive password policy exists, and
network traffic is not fully encrypted. You noted these areas, among others. in a repo rt to
your supervisor. The report included specific recommendations to fix the problems.
Your supervisor responded by saying that budgets are tight right now. and she could
not approve your requests to resolve these issues. As an IT professional. you are very
uncomfortable with the risk level. but you have been unable to sway your supervisor.
When you discussed the situation with a colleague, he said, "Why worry about itl If it's
good enough for her. it should be good enough for you."
What do you think of your colleague's advice, an.d why! Is this an ethical question I If
you are stiff is uncomfortable, what are your options/
SCENARIO 2: You work for a large IT company. The company is presented with a legal
directive from the federal government to divulge personal data regarding some of the
company's customers who are suspected of wrongdoing.
You feel that this Is a violation of the customers' privacy and you are reluctant to com-
ply with the request. Your boss tells you the company has no choice; it must follow the
law. You are told you can always resign from the company if you feel so strongly about the
situation.
Instead of complying or resigning, you go public. You use the media to advocate your
point of view for freedom and privacy, even while knowing that your actions will have
far-reaching consequences. Instead of just losing your job, you risk losing your freedom
and your future .
Did you do the right thing! Are you a hero of free speech or a criminal (and possibly
even a traitor)1What other options were available to you1What should the company have
done when you went public! What should the government do1
12.10 SUMMARY
Systems support and security cover rhe period from the implementation of an
information system until the system no longer is used. A systems ana lyst's pri-
mary involvement with an operational system is to manage and solve user support
reque&ts.
Corrective maintenance includes changes to correct errors. Adaptive mainte-
nance satisfies new systems requ irements, and per fective maintenance makes t he
system more efficient. Adaptive and perfective maintenance changes often are called
enhancements. Preventive main tenance is performed to avoid fut ure problems.
The typical maintenance process resembles a rniniarure version of the systems
development life cycle. A system request for maintenance work is submined and
evaluated. lf it is accepted, the request is prioritized a nd scheduled for the IT group.
T he maintenance team then follows a logical progression of investigation, analysis,
design, development, testing, and implementation .
r..,,...JID)r-..1-.. 4•11_.. •...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... .., .,. ..,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
Chapter 12 Managing Systems Support and Security
(....,..... J:gi( . . . . . I_,.. 41 11.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase 5 Systems Support and Security
Dara backup and recovery issues include backup media, backup schedules, and
rerenrion periods, as well as backup designs such as RAID and cloud-based backups.
All informarion systems evenrually become obsolere. The end of a system's eco-
nomic life usuall y ts signaled by rapidly increasing maintenance or operating cosrc;,
the ava1lahility of new software or hardware, or new requirements that cannot he
achieved easily by the existing S)Stem. When a certain point is reached, an informa-
tion system must be replaced, and the enrire sysrems development life cycle begmc;
again.
Many IT experts predict intense competition in the future, along with economic,
polincal, and social uncertainty. Facing these challenges, top IT priorines will be the
safety and security of corporarc operations, environmental concerns, and borrom-hne
TCO.
An IT professiona 1should have a strategic career plan that includes long-term
goals and intermediate milestones. An important clement of a personal strategic plan
is the acquisition of IT credentials and certifications that document specific knowl-
edge and skills. Many IT industry leaders offer cerrification. Ln addition to technical
ability, other skills, such as critical thinking skills, also are extremely valuable.
Ke y Te rms
acccpt.a ncc Ont of four risk control strategies. ln accep1ancc. the nsk is accepted and no1hmg is done.
Ri>L. 1> u>uall)• .iccepted only ti protection from ri>k 1s de.ul} noc worth the expenst.
aJapu-e m:untcnancc AJJs new capabili[)• and enhancements co an exi>lln~ '>)'>lcm.
aJmml\lrator account An :ic.:ount that allows e.-senrtally unrc.,cm.te<l a~.,;e,., to the application.
allo.:atcJ ba.,dine Docwneuts the system ar che end of the de..1gn phase and 1den11fies an> changes since
che funcuonal baseline. The allocared baselme mcludes restmg and Hnf1ca11on of all sysrcm require-
ments and fca1urcs.
applications programmer A person who wocks on new systems development and maintenance.
archi'cd The srorage of pre\•ious ,·ersion of a system when a new ver-ion i' in.,mlle<l.
a"ct Hardware, •mftware, daca, nerworks, people, or procedure\ that provide tani:ihle or imangihle hen-
di1 co an organi7.ariun.
attack A hos1ile ac1 1ha1 cargecs an information system, or an organii.ation itself.
automa iic update service Enables an application 10 conrnct the vendor's server ;rnd check for .t needed
p.trch.
a' ailahili1y One of 1hc 1hrcc main element' <>f sy,cem scciirity: cunfidcnciality, intc:gri1y, and .tvailahil-
icy (ClA ). t\vai lah1licy ensure• chat anthorfacd user' have timely anJ rclinhlc ni;c:c" tu nt-cc"ary
in formarion.
a\Oid:rncc One of four ri<k conrrnl <rracegies. In avoidance, adding prmocci•c <af~uard< eliminate' the ri<k.
bJckup The process of saving a series of file or data copies robe retained for a specified period of time.
l).u.1 CJn be bJcked up eonnnuoudy, or at presenbcd mrer~lls.
b.idup meJ1.1 l.ht.i storage options. including tape. hard drl\e>. opw;Jl stor.ige ••ind onlllle storage.
b.uJ.. up poliC\ Detailed in;m1crion., and procedures for all bad.up>.
b:mJMJlh The amounl of data that the: 1-)'stc:m can hanJlc ma fi'(e<l 11mc pcnod. Band\\ 1dth rcquire-
mem< arc cxprc:<;scd in bits pc:r second (bps).
baseline A formal reference pomr rhar measures sysrem charactemllcs at a sp«1fic 11me. !))Siems
analysts use baselines as )'ardsncks co document features and performance during the S)"Stems
developmem process.
b<:ndunark tl!itmg A form of tesung used by companies to measure s»cem performance.
biometric ..canning S) 'tems Mapping an individual's facial tearure~. han<lpnnt, or eye .:haracrerisrio. for
1dc1111fii:at1on purpo...:s.
BIO~-lncl pa\\\\ ord A pa>>word thac must be entered before I he: computer can be Maned. It prevent\ an
unaurhori7cd person from boortng a computer by usmg a secondary device. Also callc.-d a powrr-on
possword or a hom-levcl password.
boo1 lc1·cl password Sec BI O~-lc»cl password.
businc'' continuity plan (BCP) A plan chat defiaes how critical business func1ion~ can continue in cbc
evcnc of a ma1or disruption.
co1p.1ci1> planning A process rhar monitors current activity and performance level~ ••mm:iparc<. furure
Jcllvity, and forcca~t> the resources needed to provide dcsm:d level~ of >crvicc.
ccr1ifica11on A credential an mJ1vidual cams by demonsrra11ng a certain level of knowledge and skill on
a STandardi1cd 1csr.
chanjlc control (CC) A process for controlling changes 111 S)'Stem requirements during software dc\Cl-
npmcm; Jim an important tool for managing sy>tem chJnges and .:o•t<. after a s)stCm becomes
oper.:irional.
CIA mangle The three main elements of S)">tem secur1cy: confidenna.1.icy, 1ntegm). and availab1IU).
con6dcnuaht) One of the three main elements of S)'Stem securirr: con.6denrialiry, 111tegnt), and av;11bb1I·
11") (ClA ,. Conf1den11aht) prote.:1> inform.moo from uoauthonzed discloser and IHlfeguards pnv.u:y.
confii:urauon manaitemcnt C.\1 ) A prcxe,s ior conrrolling changes in sy;tem rcqu1remen~ during the
development pha'>C\ or the 'IOLC. CM al'<> is an important tool for managing ')"tern ~hani;e' ;ind
coo;r, after a ')''tern hccomc' opcranonal.
continuou\ backup t\ rcal·rimc 'rreaming backup method chat records all \)'\tern acnv1ty a~ it occur\.
corrccti\c maintenance Changes ro rhe srscem ro fix errors.
credential' Formal qualificarions that include degrees, diplomas, or certificates granted by lcammg msti·
ruuons to •how that a cert.110 le, el of education has been achie,ed.
criucal ri\k When ri~k' nrc categori1.cd and prioriti1..ed, crirical risks (d1o;e with the highe>t 'ulncrabiliry
and impact rauni:sJ he.HJ the li.,t.
cri1ical thinl..ini; ,kilh The ahilot) to compare, da>>ify, evaluate, recogni1.e pancrn;,, analy1c cau'c and
effect, and appl)' logic. Such 'kil l~ arc va lued in the IT indu,try.
data replication In normJl opcraring condirions, any rransaction that occurs on the primary system must
auromt1tic,1lly prop~gace to the hot sire.
datab.i~c programmer A person wh o focuses on creating and sopporring large·scJle datab,1sc sys1ems.
denial of '>en ice (DOS) An onlinc ;mack that occur' when an attacking computer make~ repeated
rc:quc't' to a >crvic:e or \crvke< running on cermin portS.
differential backup A backup that indudc;, only the file;, chat have changed •mcc the la,t lull hack up.
disaster rcco\ery pl.in A documented procedure consisung of an overlil bJckup and recovery plJn.
distributed drnlJI of ~cn1ce (OOOS) A seC\ice arr.tel. invoh•ing multiple anJcktng computers that can
synchromzc DOS arr.1cks on a su\tr.
dump,tcr dMng R:udmg dc'k' or rra,h hm• For \•aluable informanon.
cn<r)pllon \ prt1<:c<s where data i< coded (convened into unreadable charal'tcr~) w that only tho...: w11h
the required authori1anon c.~n acce-1< the dara (usually via decoding wftwan:).
enhancement A new feature or capabi11ry.
c,pJ011 An arrack that takes advantage oi a system vulnerabiliry, often due to a comb111.mon of one or
more IDlproperly configured seC\ ices.
fault mana111:mcnt The timely detection and rc;,olucion of operarionnl problems. Fault management
include' mon11orini; a\) \!Cm for \l!;n< or trouble, logging :tll sysrcm failun:s, diagno;ini; the problem,
and ~pplyini; n1rrc<t1vc action.
fault 1okran1 A ')"tcm or applicnrion i< <aid robe fault tolerant if rhc failure of one compnncnt doc< not
di•ahlc the rest of rhc ')'<rem or application.
rircwall The main line of defense herwecn a local network, or intrnnet, and the lmcrnet.
full backup t\ complcrc backup of every file on the system.
functional ha,clinc The configurnrion of rhc S)"Stem documented ar the beginning or the project. It con
,ist\ o( .111 the necC>\ary 'l">fCm rcquiremems and design consrrain~.
gigabit> per \ccond (Gbp>) A bandwidth o r throughput measurement.
hardenin11 Making a S)'MCm more ;ecure by removmg unnecessary accouor>, oerv1ces, Jnd features.
help dc\k A ccntralit.cd resource staffed br IT professionals th:tt pro•1des user> w11h the ;upport they
need to do their 1obo. A help dcok ha> three main objectives: to sho" people how 10 use\) >1cm
resource~ more cffccuvcly, ro provide an..wcrs co technical or opcranonal questions, and to make
u>er~ more producti\'c b) teaching chem how to meet their own mformation needs. All><> called scrvke
desk or mformauon umrer.
hot \ttc A sepa rate 11 locarion, ''hicb migbr be in anocher state or C\CD another counrr>, dut c.in suppon
crmc.il bu;ma; '>)•tern> lll che evenc of a power outage. S)>tem crJ>b, or ph)>K.11 cata;trophe.
1dcnut1 manallemcnt Concrols and procedures nece,sary to idenul) legmmate U'>Cf\ and >)>tcm
componcnr..
idcntit\ thcfc The \tcalmg of personally idcntil)·ing information nnlinc.
11'1 L ll02. I 11 A <ecumy standard for Wi-Fi wrreless networks chat uses the \VPAl prmocol, currcnrlr
rhc mosr secure encryption method for Wi-Fi nerworks.
incremental backup Sa"1ng a copy oi only the files chat have changed since the last full backup.
mtLf;rit) One of the three main elements of !iyscem secu rity: confidenrialiry, intci;riry, and avai lability
(CIA). lmcwiry prevent\ unaud1urized asers from creating, mod ifying, or deleting information.
Khp; (kilobit; per •econd) A bandwidth o r chroui,-hput measurement.
kcy;irokc logger A dc" ice that can be iuserred berween a keyboard and a c0Ulp1Her 10 record ke)'Slrokes.
log Record typ1call)' kepr by o peratin g systems and a pplic.mons rh ar documems .111 evenrs, incl udmg
dJres, 11mes, and 01her s pecific information. Logs can be im portant 111 lutdersra nding pJst a ttacks and
prevcnring furure inrrus1ons.
m·:untt·nancc acri,~iric\ Chungi ng pr<>gra n1o;;, prc>ccdurcs, <lr d<x:un1entati<>n t<> c.:n,urc C<>rrcc."t system
performance. Adapting rhe '>ysrem ro c hanging requiremenrs, and makini; rhc \)'~rem operate more
dlodcndy. Tho,e need' are mer by correcrive, adapO\'e, perfecuve, and pre\entive maintenance.
mainu:nance ""P"ll't' Cost:' thar vary sii,'llificanrly during the t.y,tem\ operation.ii lite and include
\pcnc.hng to •upport mamttnancc ai;t1vit1C>.
ma101cnancc release A formal release of a new system version that cont.uns a number of changes.
maintenance release methodology A system of numbered releases used bi org.101z.111ons (especially soft-
" arc ~endors) that helps organize mainre:nance clunges and updates.
ma1nren.tnce team One or more 'i)-•rems analyses and programmers workinll on product maintenance
1••ue<> together.
mal\\arc Maliciou\ ;oltware char mighr jeopardize the system\ -.ernriC) or privaq.
megabits per second (.\1bps ) A bandwidch or througbpuc measurement.
metric~ Workload measurements, also called metrics, include the number of line> prinred, rhe number of
records accessed, and the number of cransacnons processed Ill a 1.vven tllll<' period.
n111114ation One uf four ri~k c.:ontrul \trarc:gies. Mir1ga1iun reduce; the: 1mpac1 of a mk b) careful pl.1n-
n11111 and preparanon. For example, a company can prepare a di~a~ter rc<ovcry plan to miri11ate rhc
effecrs of~ narural disaster should one occu r.
network Two or more devices rhat a rc connected for the p urpme of o;endtng, rc:cciving, nnd sharing dara.
net\\ Ork intcrfoce A combination of hardware and software rhnt allows th<' compu ter to inrc r.1ct with
the network.
ncc\\orl. intrusion dc1cction ;ystem (NlDS) Software that monitors nerwork traffic to detect •trre mp ted
111trus1011> o r su.picmus nerwork traffic p:a treros and sends a lerr~ to network .1d nllm>rr.11ors. Can be
helpful m docu menting rhe efforrs o f arrackers a nd analyzing network performance.
offsit1n14 The practice of srormg backup media away from the mai n bu~mc<> lo..:atmn, in c>rder ro mm -
gare rhc risk of a carasrrophic disaster such as a Aood, fire, or earthquake.
opcnrnnnal co•rs fypcnses char are incurred after a sysrem is implemented and connnue while the sys
rem is in U\e. E>.amples include sysrem maintenance, supplies, equipment rent.11, and annual ><>ftware
hccn!>C recs.
opcr;s11on,1l ,c<urit) Concerned \\Ith 111.1nage ria1 policia and coatrol; th.11 en~urc .e..urc op<ranon;.
Al~o called procedural sccuriry.
patch Replacement code that 1s applied to fLx bugs or security boles in software.
!><'rfC~U\e ma1ntcnam.:c Changt."> to a S)'\tem to impr<l\'e efficiency.
permi~~ion\ U.cr-~pe,;1fi. pm 1leg(1, char determine the cype of acco~ a user h~ to a datab.i-.e, hie, or
d1rectol')« Al-.<> called u...:r ni;hl\.
plain tut Data that 1s nor cncryp1ed.
port A posmve 1111e11er rha1 1s med for rouang mcoming traffic to the correct appucaaon on .i computer.
port \c::tn An ancmpl to dct•-.:t 1he '>erncc~ runmni: on a computer by trying 10 conn<'Ct to variou\ port\
and recording the port\ on which a connection wa< accepted.
J><>wCr-un pa\\word 'iu RIOS-lc\cl pa\\word.
prctc,cing Obt.unmg personal inform.uion under false pretenses.
prc,·cnti\c maintenance Change~ to a <ysrem to reduce the possibiliry of fururc f.ulure.
private key cncrypuon A common encryption rcchnoloi;y called PKF.. The private key;., one of a pnir of
key~, and it dcaypt'- data rhnt has heen encrypted wirh the second part of the pair, the puhli<: key.
•·inuJI pmate ncmorl.. \P'I U'cs a public network co connect remote users secure)). Allow) a remote
client to u~ .1 ;pt.-ctJI ke) exchange that mu;r be authenticated b) the VP1'.
vulocrab1ltt) A '>C\:urit) weakness or soft 'por.
what-if aiul) \I\ A feature of hu"ne'' \upporr sy>rems char allows analy'1~ to define and a''ount for a
wide varier)' of i\\ue' (indudmg i'>>Uc:<. nor completely defined).
\\"1-h Protected Acee~' (WPA) A common merhod used ro secure a wireless network. l b1s approach
rcqui~ each wireless client be configured manually to use a special, pre-shared kc), rather than kc)
pairs. rhe most recent .ind more secure version is \XfPAl.
\\ired lquh alcn1 Privacy (\\LP) One of the e-.irliest methods used 10 secure a wireless network. ;upcr-
seded by WPA .111d WJ'A2.
~' l'A2
A wirdc" >cumty >tandard ba,ed on 802. 11 i char providt'l' a s1.inific;i11r increa>e 111 pro1cc11on
mer \WP '1nd WPA.
452 Exercises
Exe rcises
Questions
I. In what form5 can companies provide user support?
2. De~cribe four rypes of syMem maintenance.
3. \Vhat is CM and why is it important?
4. Define the following terms: response time, bandwidth, throughput, and t11r11aro1111d t1111e. I low are rhe
terms related?
5. What is the CIA triangle?
6. Explain the concept of risk management, including risk identification, assessment, and control.
7. What are the six security levels? Provide examples of threat categories, attacker profiles, and types of
attack~.
8. What arc some key issues that you must address when considering data backup and recovery?
9. Provide an example of technical obsolescence and explain how it can be a threat roan information
system.
10. Why is slratcgic planning important for IT professionals?
Discussion Topics
I. The four types of IT sy5tcm mainrcnance also apply to other industries. Suppose you were in charge
of aircraft maintenance for a small airline. Whac would be a specific example of each type of
maintenance?
2. Assume that your company uses a release methodology for its sales system. The currenr version is 5.5.
Decide whether each of the following changes would justify a version 6.0 release or be included in a
version 5.6 update: (a) Add a new reporr, (b) add a web interface, (c) add data validation checks, (d )
add an interface to the marketing S}'Stem, and (e) change the user interface.
3. How could you use a spreadsheet in capacity planning?
4. \X'hat are the most important IT security issues facing companies today? I lave these changed m the
last five years, and will they continue to change? H ow should companies prepare themselves for secu-
rity threats and problems in the futu re?
5. ~1any people don't back up rheir dara uncil ir's roo late. Once they go through a carnsrrophic loss of
all their work, they tend ro change their habits. \XThac arc some of the better ways ro perform personal
backups, such as cloud-based services?
Projects
I. Develop a process for managing change requests and design a form to handle a generic change
request. The process should include a contingency plan for changes that muse be resolved immediately.
2. Visit the IT department at your sc hool or at a local company and find out whether performance
measurements arc used. Write a brief report describing your findings.
3. Security breaches arc in the news all the time. Document a recent hack involving the theft of employee
information or cusromer data. Suggest ways the arcack could have been avoided.
4. Using the Lnterner, locate a software package desig:ned to automate version control. Lbt the key
feature~ and describe your findings in a brief memo.
5. How do you decide if a car should be repaired or replaced? Develop an assessment framework to aid
this decision proces~. Is the framework also applicable ro softwa re systems?
r..,,...JID)r-..1-.. 4•11_.. • ...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _ .. ~ ........................._ .... ._
GLOSSARY
I: I A type of enmy rdu1on"11p. A one-ro-one rclanonship, ilbbrcvi· a«or An external mrtl) w11h • •pccific role. In • u<e case model.
Jlcd I: I. nt>I> "hen e,l,tly ont ol 1hc k\:Ond enril) oc<:Un> for e.\ch acron MC used to model 1111era<t1on wuh the ')>rtm.
1n;uJ1<:c of 1he ftl">t enuty. adiiptift ~ntan;ance Add> "'"' cap.h1l11) and mh2n..:c:mcnt< man
l: M A l)pc of ennri rrlo11on>h1p. A one to man} rebt1onship. abbre- existing ~y'Stcm.
'iatcd I :~I, C•1>b "hen ooc O<.lurrcll<.e ol 1he hr;t enUI) can be administneor account An account that allo"' e.~mally unrc-
relarcd to many occurttnccs of the <crond enmy. but each occurrence •Ulcted acce.• to iM •pphcJtl<lll.
ol 1he ~ood ct1111) ~n be as>0<1arcd wuh onlt one occurttnce of the
f1r.1 en111y. agile methods ~ysrems <k-\clopment m<rhod> th•t attempt to tk•dop
a system mcremcnr.11) h) hmldmg a 'et'I<'• of prorol)·pc, and con·
801. 11 A famtl' ol w1rc:b<o network tpte1hcatlons d"' eloped by the suntl) ad1usnng them to user requirement~. Also called adapt"e
l[l:L
method,.
101.1 1ac An llJ.l wirrle" network >pecifica11on, apprm·cd 111 2014,
aJiu A term U\cd 111 v.tnou~ dat.i dtc.uonan~ to 1nd1e.:Jtr 0111 alternate
d1ar uses e\pandcd MIMO rcchnology to achieve chcorctical speeds of
ncJrly 7 GbP> w htle mtr<J\lnJ; thew trek» range and ts backward name, or a name other than the st.rndard d•ta clement name, thJt is
companblc wnh 802.11 J, b, g, and n. u;ed tet d<><.rihc the ;3n1e data element.
801.1 lb An IEE£ wirelc" network >pl'Cilica11on introduced m 1999 allocated baseline Do..um<nt• th< >YM<m .u th<" end of the de>1gn
ba;ed " " a fre<1uen•y of 2.4 (,111 and maxunum bandwidth of 11 pha<c and idennf1e< nny <hangc' •in<e 1hc funwonJI ha<chne. The
Mbp>. Replaced hy 802.1 lg. alloc<1ted baseline include> rc;ung ond verif1ca11on of all system
requ1ren1enu. and fe.uurc,,
802.1 lg An IEEF wireless nt'1work spocificntion introduced in 2003
ba;cd o n J frcqucn<)' of 2.4 C. 111 nnd ma<imum handwiclth etf 54 alphabetic code U>e> nlphahe1 lmcr> to dmini;1mh one ttrm from
Mbps: cetmpJclblc with and rcplnccd 802.1 lb •nd h•s been superseded •nochcr based on a cJtcgory, "" ahl>rcvfo11011, or on co>r·tO·rcmembcr
by the 802. 11 n 'tJndJrd. value. c•lled • mnemonic .ode.
802.1 In An IFFI. wirek" network ~petif1cat1on •dopccd m 2009 rhac app t\ software applic.111on that run< on• mobile device, >uch •s J
uses MIMO te.hnolo1t) to ach1e>e 'peeds of 200+ Mbps while increos· smart phone or tablet.
Uljt tltc "1relc'' r•ngc and 1; ha< kw.ml rnmpat1blt woth 802.1 IJ, b, application !>art of the mforma11on •rucm, on applk•tton handles the
Jndg. input. manages the pro<.es;ini: logic, ,md provid~ the required ourput.
abbreviation code AlphobctK ohbrevution. For example, standard application dttelopment rh< pr<x.C>> of <0n\fru<1inj: the pro(tr>lll>
'tJte Cf>ele. ui.111'1r NY for New York, I\!~ for \13111e, •nd Mt\ for and code modul~ that >re the huildmJI hln.l• ot an 1nforma11on sys-
Minnesota. rem. Apphcanon development 1s handlrd h) an apphcanon
absolute date Tho roral numhtr of t!Jys from some specific base dace. dcvelopntCOf jtl'OUp Wllhm a 1uJ1t1ona( rf drp.lrtmcnt rhat IS COm·
To calculate the numhtr of d•ys between two absolurr dares, subtract posed of 'Y'tcm< an•I) m and pr"l1rammcr\ who handle mfonnanon
one d•te from the Other. For e'lmple. usmg a b:»e due of January I. s-.tem de.1gn. de• elormcnt. and irnpkmenta11on.
l'JOO. '>eptemhtr 27, 2012, h." •n oi.-.olu1e date value of 41179 and application lifecycle man.a1•~nt (ALM) Actt\lri"' 1h.n cover the
Juh 13. 2011, h.u •n •l>solure date of 407r. If the eatlier dare v3lue ctlt1tt ~DL(., nt<ludmg ttqu1n:mcnts. dC\ll!J1, dndopmcnt, r<Stlng. and
"•ubtrac1cd from the bter one, the rl'\uh "442 da)'>. dcplo) mcnt and management nf softwan: appl1<>11on•.
acceptance One of four nsk control nrat<g•"'· In acceptance, the nsk appliation lock The undrrlpni: bu"""~' nil~ or logic for an apph·
1s ac<'Cptcd and nothmg 1; done. Rbk " u;uallv accepted only if protec·
°'
lion from ml dearf) not \\OMh 1he CXJ'<'n>e.
c.31100.
application server A \.<>n1putcr .ic.UnA .l\ ""m1JJl~mc-n • ~'ten cu, ..
acceptance te-st Tt\t1ng nt\OI,·~ the cnritt 1nform.Jrion S)''\rt:m,
tomcr; and .an orgamr.anon'• datal>a<e<i and apphcanon~. Oftrn u<ed to
mdudn'lJl all !) p1<al pnx:e»1nR ;m1a11ons. Durmi: an aettp1aoce rest,
user> cntrr dat•, 1ndudmg <.>mpl"' ol actual or h\e dalJ, perform quc· focilir.ate complex hu.,ncss rransacnons.
nes. •nd produce report> 10 >1mubtc actual operanng condmnns. All appli~tlon servke provider (ASP) A firtn rhat dell\ rr> 2 wfm are
proce>\ln!I opll011' and output> are 'erificd hy user~ and rhe IT pro1ect aprlica11on, or acet<>> to an •pphca11on, t>y chJrgrng a usoge or suh-
development team ro en~un: rhar che srsrem funcnons correcrly. Some- scription fee.
nmes kno" n a> a »•tnn ttlot. application software Software pn.~ram>, ;u,h n> email, word proces-
ac:c:es1 point A ccnLral \vtrC'lcss dt\'ICC' that prov1dC's ncrn•ork serv1as sors. spr<ad>heet>, 3nd j;J'.1ph11.' pa.bj.\C-, U>ed by employee\ in typic:il
w wirelc;s clients. office \Ccnar1os.
action code lndkaccs what ornon t> to be tJken "ith an a;sociattd applications programmer A person "ho works on new systems
ucm. for cx•mplr, a .i11dcn1 rccorJ> program migh1 prompt a u<er 10 devclop1ncnt .Jnd mnintcn~tnce.
enter or click an acii<>n code •uch os I) (rn display rhe student's record),
A (to add J re<=ord), and X (10 c•il the progr.11n).
ur
archived The StofJjl< of previou> V<r>io11 a ')'>tcm when J new
vcr"ion I" in\tallC"d.
activity /\ny work rh.11 has J hcginnmg ond on end and requires rhc artificial Int elligence l11e .mempt t0 recre3le natural 1ntell1gencc
ui..e of c.:ouipan) rt.~ourt·c, lnc.ludinH people, thnc, :ind/or moaey. Exam-
ple\ 111t:ludt t:ondut:UllK J ~erie~ of interviews, des1gr11ng a report, through sofiware in mad1ine>.
seleermg ~ofiwore, woinn11 for rhc deli\ cry of equipment, and training ASCII S1'111ili for A111criGt11 St.111d,1rJ Code for lnformnuon Inter·
users. Su ,1/su tn>k change, a d.tta "orngr <odmi: mrthnJ u<ed 011 mO\I pcr,onnl
activity diagram 1\ d1•11ram thar rc<emhlcs n hcmzomal flowchart computers and worl.<.t•tton>.
that >ho"> the •cuon> and c•cnt• »they occur. t\cuvity diagrams asset Hardware. ;ofrware, d,ttJ, network~. people, or prOledures that
•how tbe order in -.h1<h •wons tale pla<e ond idennly the ourcome. provide rang1hle or tntan111ble hentfu roan ori;.in11a1111n.
453
associative entity An cnmy that has ti> own set oi annburos and batch A group of dara, usuolly mpum:d mto an mlormotton system••
characrcmll•-S. ~'><X1Juve cn1111c< arc u">td to lank ~h\Cen many·to- the same trmc.
man> (M:N) rclauo"'hips. batch control A total used to verify hal(h mpur. Bat<h conrroh might
attack A h~nlt act du.t targf't.) an 1nfomuu<1n \))tern., nr n.n orgaru· check dna ircms such a; rc<ord ..:ounh Jnd nunl<n.; field total>. For
uuon itself. example. before cnrcrin11 • bat•h of or.lcr.. J u;cr might •akulate the
attribute \ '1nglc: ch~r.lctC'rt,11c or fa~r ahout an cnnt)\ An anr1hu1c, roral number ol orders and th.. •um of •II the order qu•nt111cs. \~'hen
or field. 1s the smalkst p1cct of data that has meaning wnhin an infor- rhe barch of order$ as tmtercd, rhe order S}Stem •I~ calcu!JrM the same
mation S\Sltm. For example. a Soc1•I !.c.:unt) number or cornp•n} two r0<als. If the system tocal• do not mat<h the mpu1 totals, then a
name could he c•.implt"i of an atrnhurc. In oh1m-onented analrsi<, an dar:::i entr) error rua. 0<:.urrcJ.
attnbute is pan of a dass diagram that d~n~ the charactcrisncs of bnch input A pnxe'> \\Ocre Jat3 entr) 1> p<rformcJ on a •pe.1ficJ
ob1«tS rn d1e class. Aho \.nown as• data elcnlt"nt. nme o;chcdulc, •uch •> d.i1ly, weekly, monthly, or longer. l·or c•.tmplc.
audit fields Sp.•ual hdd' within data r<'\.01J, (() rnMde aJdmonal batch input occurs when a pa)'roll dcpanmenr ..:ollcch ume cuds ar
control or =unry mformannn. l)'r1<.1I .1udn field~ mduJr the dare the the end of the week and cnrcn the data as a bat<h.
record was created or modified. rhe name of rhc user who performed benchmark A llR'la.ure> of the umc a pachA• taka to proca> acer-
the Jlllun, and the number of um<> 1hc 1c,orJ h"' lieen .1,ce-..ed. tain number of 1ransacttons.
audit 101 files Rr<ord derail. ol nil accc'""' nnd <hangcs ro .1 file or benchm;ork tMting A form of re;ung u>CJ by compomc' ro measure
database and can be used ro rc<ovtr ch3ngr< made ~mcc r:he last S)'Stem pcrfonn•ncc.
backup.
best-case estimate Tiic most opc11n1NU~ ouh.:Onlc.
audit trail A r<-..ord of the wur<c of cadt d:na item :ind "hen 1t
cncered 3 syste1n. In Addition tu 1·c,ord1n~ 1he orig1nnl ~ource, ;1n audj1 big data Exrrcmel)' large darasc1; (e.g., pc1ahy1cs) rcquanng 110111rad1-
trail mu<t show how ond when dara 1< acce.-ecl or chaogcd, and hy tion;tl approaches to deal wnh them. ~ometim.- chnrncccri1ed by three
whom. AUthese action> mu;r be loi:gcd in an audit r:r.111 file and mom- rerms: '"'lu111e, varie1y, .ind vclo<.:.Hy.
rore<I carefully. binary storage form;ot A form.II r hat uffc" df1cic111 >to1·agc uf
authorization zone Puri of ti for111 thJt conra111i any required 'igna- nu11ieric dnta. For e'<.1n1ple, \vhrn nu1n!'rit ttu.1 type!\ nl"'t ~peci(icd
tures. using :VUcrosolt Access, rhere are• vnricry of ~torai:c formn rs choice<,
in(ludin.g integt.>r and Joni.; u1tt~t_)t, anio1t~ other),
autom:lted fax A sySttm thM allow• a cu~romcr to request a fox
using email, the rnmpJny wtb>11e. 1H .1 tcleph<1ne. The r«po1L•e is biometric devices A mei.:h~111~111 u!!ioe<l to unique!) 1Jcntl(y J ~r,on
transmmcd m • mJtrrt of sc.onds ba1.k to the u<er's fax machine. by a rc:tmJ S<:an or hy 111.1 PP'"ll " f,m.1 I p.ltltrn.
See fa"back. biometric scanning systems /'.lapping .111 1tldl\ 11luul\ foc1al feanircs,
:lutomatlc update service Enable¥ •n appl1canon 10 contact the 'en· handprinr. or ere charnctcmtrcs for 1den11ficunon purpoo;cs.
dor'> scr;cr and chet:k for a nrcdcd pJtth. BIOS-level password A password tha1 mu11 he cnrercd before the
anil..t>ility One of the thr.-., m.nn dcmcnr- of <)>rem securu): confi· computer can be stancJ. It pre-ems an unaurhonuJ P<'rson from
drnnalal}\ mrcgnl}·. and ava1l.1h1hf} ((.I \). Ava1lah1lny cn<urc< that boormg a computer bl' using~ sccond•ry J.-i<<. Alw called• power-
authori.u.-J users h»c umelv •nd rdtJble acct'> to ne<e>>af) tnfoml3- on password or a boot-le•cl f'.l>S"ord.
uun. bit llie smallr<t unn of data 1; one lllnaf} d1gu.
;ovoid;once One of four ra>~ control <trJtcg1r<. In avoadanc<. add mg black box A mel3phor for a prexes; or an .1<t1on rhat produa' re.uh>
prorecn•c safeguard< chmanJctl> rhe n~k. in a noo"{l'ansparem or noo-observ•blc manner. In d.na flow d1Jgrams.
B2 B (business·to-buslnHs) A commercial c>:chani;e (e.g .. producrs a process appcus a; a bla•k bo' "here th.. input>. output>, Jnd i:en-
or"°" r<.e>) b.:twcrn bu>Ull'>""~· I) pa<Jll) r1ublcJ b) the Internet oc cra I funcnon ol rhc P""""'" •re known, bur the underlying ck131f, Me
t"lcctron1c means. nor ,..ho,vn.
82C (business-to-consumer) A commrmal rxchangc (e.g., produas bla.ck hole A proce-s thar hu no output.
or M'.n ich~ bc.-t"·ccn bu.>ult.~~ 3nJ c.on)utncr) c.:<)nducted O\'er the block sequence code Cipher thJt u""' hlocks of number< for differ·
Internet. enr cla~~ifl'---ations.
backup The 1mx:e.- <>f <avmf! • <crrc< of file or darn cop1e< ro 1"' blockchain A dr>tnbuttd ledger >y>tent. The re<hnologl' under!) mg
rctamcd for a sp«1f1cd period of ttmc:. Dara c•n l>c backed up connnu- B1tco1n.
ously, or at prL">crrlx-d mtcrvals.
blog An onlmc 1oun1;1I. The term ts a con1r.1won of"''°" Ing."
backup media Dara storage options. mdudini: ••pr, hard drhes, opri-
ca1 sroragc, and on line i»torotgc. Bluetooth A fonn nf wircl"' 1r.n,nm<ion very 1x•pul.r for 'hon-
disrancc wirclc" communrc.ttaon thar docs nor require high power.
backup policy Octaded m<rrurnon< .ind procedures for all hackups.
bOC>t•level password Sec BIOS·levcl pamHard.
balancing A proccs< U>Cd tO 111amra1n com1<tc11cy among an entire
series of diagrams, indud1ni: input and ourpur darn nows, d31:t ddini- bottom-4.tp technique A method for analiting u lnrgc, complex proj
tion. and proccs:'.) dc~crirn1on~. ecr us a series of mdividual 1n,k>, called proj•"<t t<l'k>.
bandwidth I he nmount of .lnin tlMt thc ,y<rem <a 11 hnndk 1n ,, fixc<i brainstorming A fact-finding tcduuquc for ga111in11111formnuon
rime period. ll;Jndwidth rcquireme1m nre e~pre<<ed in b1t1 per second through rht use of a small group dl\CU><ion of a 'l''"'f" problem,
(bps). opporrunity, or issue.
baseline A Formal rc(t"rcncc po1nl t har 1ne~\lJft"S S)'btt'm ch:irattcrisria. bring your own device (BYOD) An c-qurpmcn1 m.rn,1gcmcnt model
•<
ar .1 <1:><cafic trme. ~y<tcm< anal} \N u•c h.l<cl1n01 yardsttck< to docu· wh.ere employees a.re in chMge of their devices (e.11., computers, rablecs,
mcnt foar:urcs and pcrforman<C durmg rhc S)·•tcm< dewlopmem smartphone>) ar work. nor the IT depanment. This 1nduJes dcvi.e
pr<><."t'SS. selecnon and serup. program ln\t;.U.111110 and upda11ng, and nerwork
Basic Suvice Set (BSS) A w1rcl<\> network wnfigurJt1on m wh1,h • connecrivtf} !including sccunt)").
central mrcl011 dn1cc c.1llcd .in accc<1 point IS used to serve all wire- Brooks' law Frederick Brook .. nn IBM tng1nccr. ol><crved that addini;
less cUenrs: also called mfrastru<turc mode. more manpower to J lat~ wft"•rc pro1<"<t only make> 11 later.
bug tracklna soltware ~t•«m JC\ <lop<"n use Jcf«-r 1r.1dung soh- cardinality A concept 1ha1 des<:ro"-'< how instance. of one cnnry relate
worc, somctomc' cdllcd bug rrackong software, ro document and rraclc 10 instances of another en tu). ~rohed 1n enrol) -rdauonshop
program ddc-.u. rndc ch.log<>. and ropbctmrot code, called patches. chagran1> bv 001.1000 !hat ondocJte> <ombonanons th.i ondu<l• uro
<X onr-ce>-man)-. onc-t<>-<>lle'~ 3.nd nun)'·ro-n1any.
build or buy A tho1<c bt-c"'"'" JC'\doponjt on-hou'>C >oftwatt and pur·
chasing 'Ofl\\are. often Llllrd • huold or bu), or rndkc or bui. decision. cardinality notation C.ode th.11 \ho"' rrbroon\hop< bet"ecn en1111es.
bus network A cnmputrr network where a single cnmmumcanon a.se for action ~ p.irl o( the prl'hm1n.iry 1n\:c~n1eanon r<"pon m man-
path tonn~h me maontramc mmputer. '>Cne~ \\Orlsrauons, ~d agement that summJ.nzcs pfO!<-.:t requem and nukt< speofic
peripheral ck\lte>. lnformatoon o< tnn<moned on cnher do=-roon from recommcndJuons.
any worhtanon IO another worhtauon, and any mt>"3gc can be CASE tools Pm-.rlul \oftw;trt u..ed on rnmputer-aodcd '),rem> engi·
dlrt'CtN to a >peclfK dc\lce. nernng (CASE! tn help S)Sten" an.1lim de,·elop and ma1nt.11n
bu>iness case Rdcr• m the r<a>0n>. or 1us11f1<anon, for a proposli. mfomutioo srstenu.
bu1ineu continuity plan (BCP) A plan that ckfincs how cn11cal buso- category codes Cophe..,. thJr 1dtn11f) a group of related irem>. For
n~s. function~ can conunuc 1n thr C\ent of a ma1or disrupnon. cxanlrlr, a loc.:JI dcp~nnlcnt ~tore n1ay uq- .1 l\\<H.:turatt<'r cat~orl
businus loci< Rule> ro derrrminc how a S)Srcm handles data ~d code ro 1den11fy the dcpJrtmcnt on \\hi<h a product os sold.
producn u"'ful onformanun. rdl~nnll the Op<"ratmnal rcquoromcnt:> of certification A credential an ind" odual earns by dcmonsrrJring acer·
the busone<<. f.'<ample< include addong rhe proper amounr of sales rilx ta in le\ d of koowl<Jgc JnJ •I.ill on '' •W1dJrd11cJ tt>t.
to 111\'00<cs, ca kulaunll cu>tomrr balances and fina11cc charges, and change control (CC) A pl"O\.e~' for wmrollong chang~ in system
drtermonin11 wh"1her a customer i< elogohle for a \Olume·hased dos· rcquoremen.-. during 'IOftware dcvdopmenr: al<o •n omportanr rool for
count. Also .:alled business rules. managing system chan{:c; and tn>ti after a Sy\lcm bceomes operational.
business model A graphical rcpre•en1J1ion of bu>onc"'• funtrion>
char:tcter A jlroup of '11\ht bots 1s called a chaucter, or a byte. A set
rhat con~1~l of bu,1nci.\ prcxC\!tlt.'\, )Ut...h ai; sa lc~t ,1ccounring. and of b}te' forms .1 l1dJ, whoch ;, an md1v1tlu.1l fO(:r :1hou1 a pe"on, a
purcha•dng.
place. a thong, 01· an c'cni.
business process A de.cripuon of 'pccofic event§, tasks, and desired
rt-~ult~.
cha.r acter-based report A report created usong a s111glc mono-spaced
character !tCr.
business proc:eu model (BPM) i\ 11roph1c.1l rq)rc.c111.111on of one- or
check box U.seJ 10 >elect one or onor< choke> from .1 group. A chc.k
1norc hus1nc~, proce'~~.
mork, or on X, rcprc~em' >elccm.I op111>11'.
business process modellna notation (BPMN) A srnndard >Ct of
'hJp<'> aml >)lllOOls u<ed 10 repre<eno tvenos. proceS>e<, and worlcllows child di31ram The lower-level d1.1grom on on cwlodcd DFD.
tn rnmputcr·ba;cd rnodclong rool<. child ln onhcrotance, • child '' the ohJt" that derive< one or more
business process outsourdns (BPO) The our<ourcong of a basic arcributes from anorhrr obtrct. called rhe p.tttnt.
busonc>> pl"O\.c». Su ulsu outwurcing. C IA trungle The three m~lll dconenh uf l)'ltm ..c..unly: ;confidmii3l-
busin.ss profile A Jdonouon ol a 1.ompan)'> o.er.111 funcnon;, pr<>- 1ry, mregroty, •nd a-.olabolot>-
=5"s. org;in11..a11nn, product<, <en•=· customers. suppliers. cipher codu USt of a kc> word to encode a number. A retail Storr. for
~owpetiton, t..:on~tr.11nt), and furure J1rC\.-i1on. example. mat U5" a 10-lettcr word. •ucb a• C..\l\.IPGROUND, ro code
busln.ss rvlM Ho" a \y,tem handl~ data and produces useful infor- wbole>.1lc pna.. where the lcucr C rcprC'Cnh I, A rcpre>ents 2, .ind"°
mallon. Bu""°'' ruks. al«> called bu<onc>• logic, refl<et che opcranonal on. Thus. the code, GRAND, would 1ndi.:a1c th.11 the store paod
roquiremcn" of the bu,mcss. f,Jmple. ondudc adding the proper S56l.90 for the item.
,;amount o( ~In ta->-. to 10\ t>Kn., uh.:ul3t1n~ ru'tomer b.ilanch and class A term m<'ll m ob1c'\.t·oncnt<.J modeling 10 indicate• coUeruon
finance charges, and cktt'Tmonong "hcthcr a cu<romtt is chgiblc for a o( >1m1lar ob1rc1s.
\Olume·bascd d1~oum. dau di;agram A d01a1led \ICW ol • <mglc u'iC C35", showing the da<se5
businus rules s..~ bu1incs> loi;1c. that partlCop.tte on me""" ~;c. and documennng the relanomhop
bu5ineu 1upport systems Prn"d" 1ub·related onformauon >upporr tu among me das'>C>.
users at all leHls of• comp•n). dkkl to do•• The avtragc number of P~I\• Vte\n 10 le<Ompli.Ji.
byte A group of coght bor< 1\ c.illcd a byre. or a character. A set of purchase or obtam doored mformannn.
bytes foron> a foclJ, "111,h "an inJoviJuJI fact about a per.on, a pla ce. c:llckltream storage Rcxordm{: \\Ch v1-.1or hehavoor and traffic
a 1h1ng. or an r\·cnt. trends for later dara mrnonjt. use.
calendar control A <Jkndar control a lkm' rhe user to sckct a dace dient Work~tatJOll thJt UiCf'S. interac.:t within a l licnt/M-n er de~1gn.
that the >y>1em will d1>pl•y and -.ore°' a field value. lOr-!te work.sto1t1on,, or conipurcr<r., J re 'upplir<l <l:u.1, procclis1ng ser-
candidate key ~0111<11me• 11 i, p<>»1ble to ha' c J choice of fielcl> or vices, or other •uprort from other computer•, called server•.
focld cmnh1na11on' ro u<r •~the pronrnry key. Anr focld rhat could scn-c client/server architecture Generally refer> tO systems that divide
JS a primary key os tailed a .:andidace key. processing berween one or more nctworJ..cJ docnt• and J central server.
Capability Maturity Model (CHM) A model developed by SE! rbat In a rypical dient/ ,ervct\y<1e111, 1hc dm11 handles rho cnurr u<cr inter·
uHcgrJtc~ ~Oh\YJrt ;.uuJ ')''t<'nl1t dC'\•clopn1r-nt u1ro :.t prexes~ i111provc- focc, including J ato emry, Jara tiucry. and ~recn prescn1a11on logic.
mc11r framework. The server stores the data and provide> dJIJ "'"""and database man-
Capability Maturity Model lntesratlon (CMM I) An SEI-<lcvdopcd agen1ent funf.:UOn~. Applu.~.itlon loAu. 1fi d1' 1ded nl 'orne n13nner
pr<Xt.)~ lt> tUlptO\'t qu~hr,.•. rtdu(t develc>pn1enr nme, nnd t.:uc CO!>CS-. A
between the server and the clicnr'-
CMM trJcJ..~ an org.11111.111on\ ,oft" arc dc•tlopmeou goals atid prac- dosed·ended questions Quwe<, rhao limu or re~tnct the range o(
tices, usoni: fivt marurocy level!, from Level l (relaci\'ely unstJble, r~pon~. U~ 10 the llllCr\>IC'W pt(.K:C~) \\<hen 'pt'\lfiC 1nformat1on or
oneffccme sofnvattl to Level.~ (wfmarc that i~ refined, efhcicnt, and f.ict \.'Cr1ficdUOn 1oe: dr:)1rcd.
rdoalile). cloud computlns An online ;oltwarc and data en' oronment on which
capacity plannina A pro;:e<;, thot mon11ors current acto\'it) and per- apploc.iJ1on• and senoces are otet<sed and used throujth an Internet
forrnant.t lt":\tl.), ;anL11..1p.i1e> future a.._11VU) • .ind foret.:.:ts..u che: resourt:es ~onuc.:11on rJther th.on on .l l0<.ll w111pu1cr; rdc" 10 the douJ •)mbol
n~dcd 10 provide dt<Jtcd le..rh of .en oce. for rhe Internet.
code A set of lcncr> or numbers 1ha1 reprrscnr.. .i d;ua ucm. C.odcs continuous backup A rral-umc >lf<Jmtn)I b.ickup method that
can be used 10 s1mphf) output, mput, and data fonnats. records all system acnmy •s 11 occu".
code reYiew A re"c" of a pro1~-r team memhcr'> work by other 'ontrol bnak A control bruk u~uall) c•u~ 'pcc1fk acnons 10 occ-ur,
members o( the etam 10 >pol lo~ erron. Gcncull). S) stcllb an.1ly>t> such a. prm1tng >t1b101al> for a group of n.-..ord>
review the '' ork of other \)"".item~ anJl)'\:t,. ttnd rrogr.1n1mC'l""'\ rc\:itw control b~ "'port A dcwl rcpori 1h.11 lnc.u""" nn control brcal\.
the \\Ork of other programmers ••,• form of prcr "'""· Strueturcd
"alk-throuith- >hould ul.c pb<e thruuithou1 the SDLC •ml 3re called control couple In• .iructurc chan. a control couple mow' a mt'Ssagc.
also called a flag, wluch one moJuk M'llds ru another.
rcqu1rl"01C"nt'\ rc'·tC"\\ ~. dn1tui ~ .C"~· t,;.clJ<- rc,~tew\, cw rc'+nng f<'\' K'"'
depending on the pha~ m which they occur. Al'° known as a Struc- control field order In a cootrol break rt!X>fl, the r«ord~ are arranged
tured "all.-thruui:Ji. S<>e mvc1urcd wall.-1hrough. or sortt<I m the same order a> 1hc <-Ontrol held>.
coding The proc.c» of 1urn11111pro11r.tm10111• 0010 'l""1f1c 1m1ruccions control module In a \tn1cture <h~n. • con1rol module" a h1gher-le•·cl
that a computer ~)'\:tern can cxrcurr. module that din'Ct> lowcr le•d moJuk-;. called 'uhordmaie modulh.
cohesion A 1nta>ure of a module\ ;cope and prc>eess1ng •haractcri>- con trol structu"' Scn·e as buildmi: bl0<.k• tor a pr0<.t'Ss. Control
rics. A module 1hat perform> a 100111• funu ion or task has a high degree srructurr:s hJvc one cn•ry t1nd c~11 pn1n1.1liC') "'·'Y be complt"tcd 1n
of cohesion, which "desirable. scquennal order, as the result of a tc" or cond111on. or repca1cd unhl J
combination check A t)pc of dall •ahd.111on <heck that 1s performed spe-c1fic rondition change>. Aho called lottical >1rue1ure.
on two or more fields fQ ensure 1ha1 they are consis1enr or rea<0na ble corporate culture A >et of bd1ef,, rules, ir.1d11 ion>, v•lun, and am -
when co1md<rcd tOJt<ther. hcn 1huu~h all the l1tlds involved on a cocn- tud es mar define a company and mAuence 11< way of domg hu<tne«.
honarion check m111ht P""
their mdi\'1dual vahdarion checks, rhc corporate portal A website 1hnt provide> ••ariOu'> tool• .111d foaiurt'S
comhinarion of the field value' m1gh1 be mcon•i\!Cnt or unreasonable. fo r a n organization·~ custu1ncr~, cntplO)'CC~. ~upplacr\, and the public.
combination key A type of dn tn vnl1darion check chJ1 i> performed 'orrective maintenance Change> 10 ihe ')'<l<m to f" errors.
C>n two or n1ore fields to cn~u rc chac they arc cor1, i.;;rtnr or r~~t1n.1blc
cou pling Mrasurcs rclatmn,hi1" •nd 1ntcrdepcndcnce nmong mod-
when com1dcrcd mgcrhcr. llve11 1hough .1ll 1he field~ involved 111 n com· ules. The opposite of cohesion.
bma1ion chct k nui:hr pa~;, their i11J iv1J ua l vahd;itinn checks, the
c.:on'lh1nauon of the: field value' n11Kht be 11u.·011'1~1<"11t or unrt:a~onahlt. credentials Fonn,tl quJlific.11ions 1har i11d udc degree,. diplomas, nr
ccrttfi<a1es granted by lrarn1ng 111>11 iu11011\ to \ hnw ilrnl a ,crrn111 level
command button On~rten hutton th11t tn1tiJres nn ,tenon '> uch as
of cducacion has been achieved.
prmung a form or requesting I lclp.
crl~ical path A series of event> and ac11v111cs wuh no ''••k 11me. If an)
common field An n1tnbu1e rhJI nppear. in more than one enciry. Com- activiry along the cnuc.tl p•th f.tll, behind «hedule, 1hc enurc project
1non fields c~u1 be usc<l 10 hnk cnuut' 1n v.1nou' t )'pes of relauonsh1ps. sdtedulc is similarly delayed. As the name tntpht'S, a cntical p•th
composite key ~mrumcs n 15 nt'..:t~\;try for a pnn1ary kc:y to con\isr indudes all acttvicies that are ,·tt•I to the pco1cc1 ~chedule.
of a ~omhmation of foe Id~. In that~•~. the pr11n>I)' key 1~ "ailed~
Critical Path Method (CPM) Sho"' s J pro1«• "' • net\• ork dtJ)l,r.tm.
combwot1on key. compo>1te l cy, cmi.:.11en~ttd l l!y, or mulm·alued kl!t. The aCU\lltlC"t are ~hown J.\ \let:tor''t J.ntl the c\·cnl\ art J1,pla~eJ l!t'dph·
eomp<rter "'sourc" committH A ttroup of le) 111ana~cn. and u~rs ically as oodts. Although CPM dc•elopcd ><:par•1cly from 1hc Program
rcspom1hk for c-.lu.11111Jt <y<trm< rcqu~rs. The trrm "sy<;1rms rc•~cw Evaluauon Re\le\\ Technt4u• (PJ.:Rn. the'"" mc1hod> art C-.\Cfluallv
comnuntt• is also used. identical. See also l'IC.RT/Cl'M.
compute...aided •oftware en1lneerln1 (CASE) A t.xhnoque that u"" critical ri•k When mks arc ca1cgomcd and pnonnud. crmcal n<ks
powerful rrogr.1ms •~lied (.A\! 1tlOI' to rrov1dr an meull framework (rbose "irh the lu~s1 'ulncrab~ll) Jnd 1mpac1 rannJIS head the list.
for srsrem• dn-,,lopITTC11t. The 1001• •uppon a wide vanny of design critical success f.llcton Vii.I oht«U\ o thJI mu>1 bt Jch1e• ed for 1he
methodolll!l1e., mdud111g >1ru.:111r<'<I anal)'" 1nd ob1<'-"t-<>rien1ed enterprise to folr.Jl us mission.
anal>"''· Al«> rdcrrcd to a< rn111pu1tr-.,dcd <) <trm< cng1nttring.
critical thinkine •kills ~ ah1hry to comp.ire, dJ«1fy, C\'Jluatc,
compute~aided systems en1lneerin1 (CASE) Ser computrl"J1dcd
rec<>gnUe pancms. anal)U' CJU>C and dfc.1. Jnd •pply logic. Such
softw.tre engine<'tlng !CASE). skills arc valued rn 1ht IT ind1l\I').
concatenated by Su composi1e key. crow's foot notation A t)pc of cardm•lny 1101'11(>11. It "c.1lled crow's
concurrent task A task 1ha1can be comple1ed ar 1he S>me nme as foot not.1cion because or the shape>. wh1c.h mcludc circl~. bus. and
(tn parallel wuhl another 1.1<k. S)mbols, that ond1caic VJ nous ro>'1b1l111c:>. A "nglc hM md1C>tc> one, a
condition A specified acro<>n or srnrr 1n a <rrucrure charr. double ba r md1cau:s one and only one, a circle 1 nd1Car~ zero, and a
C-C()\\ 's foor: 1nd1C:lU~S ffi:lO)'·
confidendality One of 1hc tlircc main tlemenis of sy,tcm security:
confidenualuy. int1'i;tit), .ind ava1lnh1hry (CIA). Confidtni ialu y pro- customer Prunar)' mer ot a ~yi.ten1, M:rvite, or prodtu.:t.
tc-ct< 1nform.1tion fronl unauthortitd d14lc.: lo~rr nnd ~1fc-guard., p1i vacy. customer ,..,Jationship management (CRM) Many comp• 111rs
configuration management (CM) A 11rocr<s for con1rolhng ch.111gc< 1mplcrncnr sysrems to 1111egr.11c ,111 cu<tomrr-rclarcd event'! and rransnc·
in system rcqulr<mcni; •luring the development phaS('S of the SDLC. rio11s includjng marketing, sales. :.i nd customer ~ervicc aetivit1cs.
CM al;o 1s .111 imp<i11 a111 tool for 111.111n11i11g ' Y" <lll <h.111grs n11d cosrs cutover phase A ph.1;c 1hn1 rcsc111blc, the fn1.1l rn;k; lit the SDLC
J frcr a '>)'\ tclll h-ccornc< opcrt\ donnI. inlplen1entation pha.;c, in4.:luding J at.t C<lnYCl"'tOll. cc~ting, ch,1ng~1ver
constraint A rcquircmcm or a cond11ion 1ha11hc sysicm musr satisfy co the new system. and user cr.1ining.
or an outcon1c thnr chc sy~te1n 111us1ach1c\ t. data The raw m,11crtal or ba>ic foct> u;cd b) 111format1011 >}•lcms.
connruction phase A ph;sc 1hn1 focu"'' on proi;rarn and applicntinn data center A large con<cnir.111011 ol networked compurer> work1n11
de>clopment ta>ks \imdJr to the !.DI(... together.
context diagram 1\ iop·lcvrl >icw of an 1nformanon sys1en1 rhar data convenion Ex1s11ng datJ 1• loaded rnto the new ~)11cm, trans-
>hows the bound.tries anJ s.;opc. formed as needed. Depending on the •ys1cm. data conversion can be
conte_x t-sensltive A ftatu~ char a-1 ~nSltl\l" to th<'. " urrrn1 conditions done before. durang, or after thC' opcr.u1011.al c11¥1r<lnment 11t cornplttc.
"hen it" invoked. ~or ""'nrlr, conte,r-scnmne heir offers ass1s- dab couple In a •tructurc ch.in,,, dJ1,1 •Ouplc show, data that one
t:lllCC for a 1ask tn progreJ>. module passe5 to another.
data dictionary A ccnrul srorchousr of inlorma11on abour a sysrcm·s decision c..ble /\ tJblc that >hO\\S a l<>11ocal >1rucrurc. \\llh all possible
dara. combmanons of conditions •nd ttsulnng acnons.
d"'ta el&ment A .. nglc durJ•lcmuc or fa.r •bom .m mmy. A data decision tree A graphic•I rcpr~n1a11on of the conditions. actions.
clement. field. nr armhure 1< t~ <mall~t p1ett of dara rhar has m<an- and rul<-< found 111 a de.:i>mn ul>Je.
'"11 \\lthm an mformauon >ysrem. For •~ample, a Social Secuntv
numi,.,r or comp.m) nam< rnuld I'<' <umplts of a data clcm<nt. Also
decomposins Another \\J) of con'c)mg a P'"'""' or s'"'m that has
been broken 00\\11 from a gC'llcul. IOp-levcl >it\\ m more detail. The
calll'<I data ncm. term' cxpln.ld and ('Jrt1tmn~J al'iO ••n i,., u\Cd
d..ta n- A path lor WIJ 10 mO\C from on• pan of rhe mformarioo default nlue A v•lue !hat a sy,t<m d1spbi-, automancally.
'}>rem to anothrr.
defect tra.ckinc softw..,.. S1·,tem de1elopers usc defc.1 tucking soft-
data flow d~ (DFD) C.raph1cal representation of th• system. ware, somcttmes cJllcd bug rud..1n11'1lft"\\Jr<,10 dorumcnt •nd track
.howmg n sro..-, prtx<"'>\C;, and rran,form> Jara u1to u.tful information. program ddccts, code d1angC\, 3nd rcplaccmmt code, c.iUed patch<'>.
data frames 1 ralfi< on a computrr network. deliverable A poh>hcd, fmal produ•t, 'u11Jhlc for'" mrended """·
data Item ~u data clement. F..nd rroduc" or dehvcrahlr< often coincide w11h the complenon of
data manipulation lancuap (DML) A D~R controls database oper- e3ch SDLC phase.
dl1ons, 1ndud111g •tonnit, ttlnc\ 1n11, upd.mng, and dclenng data. M<1<t denial of service (DOS) An onlmc auack lh.lt <><•ur> when an
commercial DBMS;. >U<h 3$ Orad< and IBM's 082, use a D~U.. attacking con1putcr mJkc\ rcpcdfcd rcquc~f\ to ;i ~Cr'\'1C<' or scn,ccs
data m..n A •fl<.'<lahzed J31ab:1"' dc"i:,"'ed co serve rhe needs of a ru11n1ng on ctrtain ports.
'pcc1fic dqlartmen1, such"' \ale<1, markenng, nr financr. E.acb dara dependent auk A ta>k " ,.;J to he Jepcndcnt when it ha< 10 be mm·
ma n include> only 1he data rhnc users 111 char dcpamnenr require t0 pleted ma i.cri.11,equerKe.
1wrform thrir 101,., derivation code Combining dam from different item attributes, or
data mlnln1 Lookmg for mc;rnmgful pnuerns and rclar1onships c:.harac[eri,t1c\, to hu1IJ tht: codi:.1v1tJ\f nlJl-!·''111e ,uh,cripuon code~
among darn. For example, dnto mining •or"' nre could help a con>umer arc dcrivtition codes.
prnduct' f1rni 1Jrnu(y potc-ntinl ~u~ron1crs ha,cd on their prior pur- design prototyping Crca11ng a protocypc of u-er rcqmremcnt>, after
chnscs. wluch the pruwtypc i' d1>eartlcd Jnd 11nplcrnenm1on continues. Also
data proceuln1 center A ~entrJI location where physical darn was called throwaw,1y prolot)p1ng.
dcli\ercJ ~r trJn~1111tttd 1n 'Onle nlJnner Jnd entered into the sys:ten1. design review Sc~ strucrured \\alk-through.
Users in rhc organ1za11on had no input or <>urpur c-Jpab1hty, except for
prnHed report' thJI were d°'rrihurcd i>y J corporarc IT department. dcsi1n w:olk-throu1h A ;,c,;io11 with U'Ct\ (()review the ancerface with
a ere><< scctaon of people who wall work wuh the lie\\ l)\lem. Thi< i< a
data replication In norm•I npcranni: condmons. any rmnsaccion t har cominu;itinn of the modehn11 and protot)pmg effort char began e•rly
occ\lrs on the pt1mary >)M•m must aucomatic.1lly propagace co 1be ho1 to the S)">telll> dcvclopmcm pr0<.<».
Site.
desk checkins The prn<c" of rc>1c\\ mg the program co.le ro <pot
d"'t" repository A <) mbol u-cd m DFIX to repr~nt a s1ruattoa in logic errors. which produce mcOrtt<.1' resuhi.
~ h1ch .& ')''tcnl mu~t rcu1n Jara ~au--e one or more prOt.:.ehe!i. ntt<l
to USC rh•t .iorcd dar.t ·" a I.err nmc. u,ro 1ntrrch•ngcably wnh the dewl report A drt.lil n:port produ•C> one or more hn<> of output for
term data store. c•ch record proccso,cd.
data science lmerd1;.;1plmary f1dd rhat bknd> .-omputrr SCICllCC, dj.,gram 0 A diagram deptetmg rhc first level of drta1I below the int-
math and ~1amn<s, •nd bu<inr.~ methods to analyu large dataS<tS. nal context J13i;um. D••IU'•m 0 {zero) toom• 111 on the .:ontnt
Im oh<> :aruf1<.1.il 1nttlhg~11<c. ma<hme le:arnmg and predt<tt\C aoaly1- diagr•m and <ho"~ ma1or pm.;e\SCS, dJra llo\\ ~. and data stor~ as
1C", and ,...ual11..inon tC\Ch111qucs well as repeauu~ the C>.tcrnal <nllll<> :md J.ara flo"> 1h:11 appe:u m rh<
contc't d1agra1n.
dau security Prntccnon of cl.at• from loss nr d.1magc and reco,·crs
dara \\ l><n It " 10>1 or damaged. dialog box Allo"' a ui.cr to cnt<r mfnrma11on about a task rhat a
>y>tem will perform.
data nore Su dara rq>o;1t0<)
differential backup A hJ,kup 1hJ1 1ndutk<. only th< file, thar h;He
data structure \ meanmgful comb1nannn of rclared dara clements
th.II att mcludt:d 1n a dara flow or n:mned m • d:iu store. A framc- changed since the lasr full bJl kup.
wor~ for organ11mi; and \lnrmg dar.t. direct cutover The direct •Uto\<t approach .:au>t"> the changeover
from the old >t>l<lll to rhc new 't>rcm 10 txcur 1mmedurely when rhe
data type check A t) pc of da1.1 \'alidat1on check mar is used to ensure
tlur a darn ll<m fu; the l't'quired tfata t) pe. For example, a numeric new •ysrcm becomes orcrataonal.
field musr have only numbers or numeric .ymhol<, and an alphabetic disaster recovery plan A documented procedure cons1>nng of uo
field can conto111 only 1hc chara.rcrs A rhruugh Z or rhe cbora<:i~rs a overall h•ckup and l't'<C>Very pl.in.
rhrough 1. discretionary projects Whcr< 111.111.111cmen1 has a chc>1cr an
data valldatlon rule A mcchnm'm 111 improve inpur qualiry by tcsring unplemcnMg a projl"CI, they arc called d1'<Crrtlonary. For cxnmplc,
th< dam and re1eu i11~ any enrry that foils to meet specified conditio ns. CJ't"ating a new tcpor1 rur :1 u~cr i~ ·'" c:xrunpl(' of 3 t.h\Creuonary project.
data wa"'house An 111re11r•1cd collccnon of dara that can support diskless workstation A racrwork 1crm111al that support< a full-fcarured
1ntinagcnlcnf {tnn ly~is ond d«t~1on 1n11king. user interface bur lim its che pr1111inJ; or copying of darn, ex:cepc ro cerrnin
datab:ue administrator (OBA) Someone who manages• DBMS. network rc>oun:c' rh.lt c.111 be monuorcd and co111rollcd murc easily.
1 he OBA a-<c'"' ovcr.111 rcquire111e111' and n1amtn1ns rhc daraha<c for distributed datab:ue mana1ement system (DOBMS) A <ystem for
the bcndu of the cnurc organatanon rather than a single department munaging dum stored nt more thnn one locanon. Using a ODBMS
or user. offers se,era1 .tdv.1t1t~f.tc\: l)Jt.1 \HJrecJ llo-,cr to u"'er~ can reduce
datab:ue manacement system (DBMS) /\ cnllccnon of rools, f<a- network traffic: the syscem 1s sc~lahlc, '"new data sue• can be added
rures. nnd imerfacC\ char enJhles u~rs to add, update, nunage. access, "11hou1 rcworkmg the •f'tcm design; •nd wuh J,11J >torcd in variou;
and analylc data an a database. loc.1nons. the sprcm "lcs' hkcl) to c~p<n<ncc a carnnroph1c failure.
A potenual d1>.1dvanwgc ol d1smbuced d.lrn smrage 111\olv-. dlta
database prosrammer .\ p<r.on \\ho focuscs on creanng and sup- security. h can be more d1tf1cul1 111 m31111.11n comroJ, anJ standarJs
porung brge-..:alc databaM" >y>tem>. when datd " stored in ••nous l0<:at1ons.
distributed denial of service (ODOS) A "rvicc arrack uwolving tecturc. ondudmi: >1and.ud; for Jara. pto<c.>1n11. network, and U><"r
muluple an•ckang computer'> that CJn 'ynchrornte DOS attacks on• mrcrf.icc design.
server. entity A person. a place. a thing, or a.n e\cn1 for which Jara is col-
distributed system Comp.in) w1Jc 'Y'tem> that art conneued by one lected anJ ma1nt3tned. I-or eun1plt, ;i.n onl1ne Yh:~ "t).,itm nt.ly
or moro LA:-0:> or WA\:\ I he <•r.1h1ht1c> of• Jo>trihuted S)>tetn include cn1111cs named C\JSTOMFR. ORl)I R, PRODUCT, and
depend on the power dnd c;'lp•c1ry of the underlying d3r.t commumca· SUPPLIER.
non ncnvork. entity-reladonshlp dlaaram (ERO) A ~r•phi<al moJd of the inlor-
Diverging cbta Row A data llu" m whkh the >Jmc data cr.uels to manon system th.it dcp~ the rcl~uon(hJP' .amon~ \>strm cnt1ncs.
f\vo or more different locauons. epic In an agile pro1cct. a "mplc, high· lc\CI qJremcnr of a rcqu>re·
document review A ,., 1c" of ha«hnc documemanon. A u<cful fact- mcru. Su feature.
finding 1e<hnique that help' an unal)>t understand how the cum:m evaluation and selection team A i;roup of r ..oplc lll\OheJ "'sde.1·
\)')ten\ i~ ~upro!tcd to ,,·orl. iot> hardware and software. The group mdud«> 'l"cm\ analy<rs and
documentation t>latcrldl 1lm <'pl>1n• • 'Y't<n>, hrlp> people mtera<t u>ers. A team approach cn>urt> that <r>uul fauor> 3re not o• crlookcd
\\'ith it, ~uid nKludes pmgr;un dc'k:unlCntJ.uon, >) srenl documenrarion. and th:tr a sound cho1ct •~ n1ade.
opcrJ.taons dOlu1nentJuo1t. and u&ocr documcnrat1on. evaluation model A technique that U'M a common yard<nck 10 mea-
domain The'"' of value> pcn111ncJ for a data element. sure and com~>are vendor ratings.
dumpster dMna R.l1d111K de>k• or tn••h b111> lo1 •ahuble 1nlormarion. event A rtferencc point thnt m;a.rks 0 1n3jor (X:Curr.:nce. u~d tu moni·
ior progress and mnnage a proJe<t. ~re al>o milestone.
duration The ;unount o( t111\e JI \v1ll La"e tc• co1npJcte a r:isk.
exception report A document d><playmg <)nly those 1·ecord> that
EBCDIC 5tJnds for l'xtendeJ llinary Coded l)eC"im•l lntcrchangc n1e.et a spe\:i fic condition or c<>nt.lilions. Ex1.cpuon rcpc.)rt'! .irt u>eful
Code, a coding method u:.cd on mamfrnmc " nnputcrs ~nd some high- v1hcn the user \Y;tnts 111forn1ac1011 only on reeord' that nu~ht r~uire
cdpa<:1ty ~ervt'n.. acnon bur docs not need to know the derails.
e.commerc:e (electronic commerce) 1'"r1•11,ac110114\ (t".H., lluy111g and ex>.stence eheclc A I) pe o f d ar,1 valid.u1o n <heck rhar is used for man-
selling of goods and 111format1o n ) that o.:cur cm the lnterner. Includes datori dara items. For example, if an employee rernrd r•<iuorcs a Sona I
both bu~inl"S!'t·to-consun1cr and buo.incs"~to·bus1nc~'· Securit)' numh<:r, an c><;l<tcncc c heck wnuld nor nllow rhe user m save
economic feaslblllty Achieved ii the prujrcrcd bellefils of the pro- the cccord until he or she enters a suotablr value in rhe SSN fidd.
po;,al ~)\\tern nul\YC1gh the ~'11111a1cd 4.:0'it' involvell 111 :u.;t1u1ring, exploding A Joagram 1> >.ml 111 b" exploded of >t •Jroll, down" m n
tnstalling, and opcrJting it. more detailed or c'pandcd v1c\\
economy of sa.le The inherent efficiency of h1gh ·\"Olume processing exploit An arrack that r.1kcs •dvant.1gc of ,1 <y11rm •·ulnerab1hl)',
on l.r11er computer> D.11Jb.1>< J<'ogn Jilow' better utilu.111011 of hard- ohen due t0 J combination of one or more improperly ton figured
\\ are. If a 'omrJny mJ111tam\ an emerpn'lt·w1de d.11aba~. proc~sing ~rviccs.
,,, le!.~ e.x~1\·c l»tng .i pc>\\Crful ma1nfrJn1c )Cr\t.'r u&ccad of u.s1ng
Extended Service Set (ESS) A w1rclcs; network conf1gura11on made
.c•cral >mailer wmputcr..
up of cwo or more BS5 net\\ork>. \\ hich allow> w1reln' d1c1m 10 roam
electronic dat.o int~hanae (EDI) 1hr elCchange of bu<rne\S docu· from BSS to BSS.
mcn1> "'""Cett computers """It
a standard elrctro111c forma t. ertensibility Refers to a>) stem\ ab1hl) 10 c'r.1nd, change, or down·
electronic health ~cord (EHR) An electronic record of a p.1nenr·s sue ~soly 10 mett the chani:rng need> of~ hu>tn~ cmcrpme. Al><>
htahb mformauon gcneurcJ a> the paucm enrnunten. \3nom health· known as '>Cal.ib1l1l).
care pro,1der' anJ •h•red Jrnong mul11rk fa<1l111cs and ~genc1es.
fa~ct·linding The proce•s of g;ithcrmg rtquircmcntJ. \tt rcqurrcmcnts
electronic product code (EPC) lechnolngl th.n u<e< RI ID rag< to elicitation.
•denttfy and mon11or the mo• cmcm of e3<h 111d1ndual produce. from
fat dient A nccwork de;,1~ thut locues all or mo>• of the apphcauon
the factUI) floor to thr n-t.111 <hedou1 <ountcr.
processing 10J\IC at the client. Al>o ullcJ a th1tk docnt Je>i~n.
electronic proof of delivery (EPOD) A <urphrr """'R MI)••!;' on
fau lt man..gement 1nc timely dcrcctmn and rcsolunnn of operanonal
each crate, CJse. or sh1pponi: umr m cre•rc a digical shipping Im to ver·
ti} rl'CC•pt of i:oo<h.
problems. Fault management includ"5 mon11orrn11 • si·stem for of
troublc, lCJAA>OI\ JU S)Stcm faolurh, Jo.lgno\lng th• pmhlrm, .md aprly-
"II"'
empowe.rme.nt A bu~1~~~ pr.te.;1u.:.C'.' that place~ rnure respon.s.1bihry ing corrective action.
and accounr,1h1hty t hroui:hout all lcvols of an organi1an on.
fault tolerant A sys1em or applkanon i< ,.,d ltl be foult tolerant 1f the
encapsulation Tlie idea that all data nnJ method~ arc ~elf-contained, failure of one component doe\ n ot dosahlc tl1e ,.,, or
rhc sy>rem ur
as in a blatk box. •pp11ca11011.
encryption A proCC$Ci whert darn 1c; ..:o<lcc.1 (4.:onverred inco unreadable faxback See automated fax.
c har.1cters) so that only those" uh the required a u1horiw11on c u11 feasibility study An imtiol invest111anon 10 clt>rly identify the nature
occess the d arn. (usuJlly via dccod1n1t ~ofr:wa rc) and SCC)pe of tht· husillt» 01lportunil)' o r prohkm. Aho called p rel imi-
engaaed Ustenlna T he nb1liry to really conccnrutc on what • <lmcone nary invesriga rion.
i"I soty111g ,tn<l .tvou.J 1hc tc1np1.111on 10 hc.1r \Vh;u i, expccrcJ . Al~o feature ln an agllc pru1oc1, a >implr. hii;h· levcl >rJtCmcm of a rc<1uire·
1ncludc5 not1c1ng nonvcrha1co1n niun1cntion. n1e nt. .Set epic.
enhancement A nc\\ feature o r cap.1hihty. field A s111gle cha o·aCLcri"ic or fa<t ahou1 Ml cn11ry. A field, or attn·
enterprise applications Comp.111y·wide urplicarions, such OS o rder hutc. i> the smallest piece of darn thnt hos meaning wuhin an
ptocC'~1ng \}'!!.1Cm~. l'>~l)'roll ,)-,tctn"i, Jn~J con,p.&n ) l:Um11,un1,at1f.>n~ iofonnauon sysrem. Fur example. ,1 Suct,11 ~e<unty number or com-
networks. pany name could h<: example' of n field. l'hc term~ Od/11 drmml. dat.i
enterprise computlna lnforma11on ;y\lcm< thnt .upport company- item, and ftdd arc used interchani:eably.
'' 1dc datao:wna~cmcnt rC\jutrt"rnenl.). si1i1.h 3":. ..\1tl1nc re~rv:i1ions or file E3ch file or cable •OlllJtm dJt,1 Jbuut pwple. pbu~s, th1n11s. or
crcxht card boll mg 'Y"ems. c\o·cnts that interact \\'1th the 1nform01non '>·~•cm.
enterprise resoun:e planninc (ERP) I\ ptO<'cS> that e<>tahhshcs an fife.oriented system A folc·Otl(ntcJ '>'tern. al>11 ••lied a folc proce,s-
emerpnse-w1de >tr~tei:i for rr rcsoum''· ERP defines a <pecific nrchi· ing •}Stent, store. and nwugh Jara in one or more ><:parate hi....
fill··in form A 1cmpla1c u...J 10 coll= Jau 011 the ln1emc1 or a corn- pteWlly (I) In bu;mcs. procernng modcl1n11 nooauon, a fork m the
p3n)' rnoranrt. process. allowmg the now to go one WJ} or another. (2) A rourcr or
finish day/date The dai• or d•1t when J ta<k "scheduled robe fin· ocher network dtvi« u!.cd 10 conn"'' tO a lar11cr. d1ssurular type of
bhed. OCC\\o'ork, such a~ rht Jntcmct.
firewall Theo nmn line ol ddcfbC ~ccn • Joal net" ork. or oncnnct. gipbits per second (Gbps) A t>andMdoh or 1hrn11ghput mcasurc-
3ncJ th• l111crnr1. mm1.
first nonnal fonn (I NF) A ttcord ''Yid to l>c m I !\F of n doc< noc globlll outsourcin& The prJClk:C ol \htfttng IT dntlopment. support.
conr.un • rtpt'.•nng group (• .ct of data items th.it can ex-cur any nwn- and OJIC'rauon> 10 ocher countn~.
b.:r ol nm"' m • >tn~lco rr.;orJI. glueware Su m1ddlcware.
fishbone diaaram An .1nal)m 1<>ol 1h.11r•P"""""1hc pos;1hle c•usn gnphical user interface (GUI) The use of 1tuph1ol ob1«LS and
of. prohlem .1<. vaph1c•I ou1hnc. Alm Cdlled an l•h1kaw• diagram. l("<.:hn1quc!.- allu"'"K Uo,c'r\ 10 ~cHl1n1un1tt.JtC' wuh J ~)'tcrt1. \ v..cll-
fU<ed fee model A <en1'< model tha1 charges a set ftt b'1scd on a
desq;ned GUI can help u<e" lram • new system r.1r1dly and work with
me sysrtm ·ff~tild).
specified lt\el ol s<rv1ce one.I user suppon.
gray hole A proceu Mth Jn mru1 ob'1ou'I) 11bulf1ctent to gencraoe
nowchart \ diagram u«d to dc<cnhc program logic rhor represencs 1hc <hown ourpur.
IOjti<.al rule> one.I mt<rJct1011 gr.1plm.Jlly u;ing a series of symbols con-
necoed by .1rro"''· l lowd1.r1< c•n he u.efol 111 vi~u•hLmg modular iroupware Program; th.11 run on ll network thJI enable""'" to .hare
progrnm designs. darn. collaborate on pro1«.1', and work 111 t<.1111>. Al>o <.tllec.l worl·
group <ofowJrc.
focus In • 'equencc diagram. a focu; rnd1c.acs wh..-n an ob1cct sends
or receive> .1 mes>n11e. lo 1s 111d1cn1cd bi a narrow venical recrangle cl101 hardenlni: Making a ;y,tcm more \Ccurc by removing unn<'Ccss:try
accounts, s.erv1ce:i.. and fe~l1urc".
covers 1hc lifel1nc.
hardware The ph) <1c.1l bycr of 1hr 1nfom1Jnon >y"cm, to mdudt
foreign key A field 111 one table th.11 must match a primary key val ue computers, network<. co111mu11tca1ioM equipment. nnd other rcchnol·
m anoohcr 1:1blc 111 order to csrnbli>h the relntiomh1p between the two ogy-baseJ infrasrruuur<.
tJblrs.
hash totals Nm 111can111gful number> 1bem>clvc; bu1 are u>cful for
form filllna A Hf) cffe.;t"e m<1hod of nnhnc da1> cn1ry where a companson purpo<c<. Also known a< hatch conrrol tota ls.
Mank form rhar dupl1ca1r, or rc-.mble< rhe •ource dncumcnr is com-
pleted on the ~rccn. The u>cr enters the data and then moves ro the Hawthorne Effect A phenomenon whl•rc cmplO)l'<'> who know they
are being ub)lerve<l .irt 1nort produ,ta\.c,
llC\I hdJ.
help desk A ce111rall7ed ttmu,.-e ,.,ffed hi Ir profe~1onals that rro·
fonn layout Inc phy'lc.11appearance and placemenr of dat.1 on a vides user>" 1th 1he suppon the) need to do their 1ob>. A help desk has
form. Form layout make• the form easy to complett and promlcs thrtt ina1n oh1f\.11\e-.: to 'how ~orl~ how Ct) u~r ')'tc1n rt."M>Ur~e~
enoujlh >pJ~. both 1cru{~lly and boruont:tll)'. for us.en to enter che mott dfrai,ely, tn pro'1dr >n\\\er< 10 te<hn1c.1I or opera1tonal qucs-
c.1 ....
uo~ and w make U>er> more produ,u'c b) tea,hmi: lhrm ho" 10
fonrm An onlmc J1«.u\\1011 on• ramcubr rnpic, whett ~pie men, mttr 1hc1t own 1nfnrmat1on need-. Al..o ulled .cn ice de,J,, nr infomu·
offer suppon. •nd t'l<changc idea•. uon center~
fouMnodel .,,proach A phy;i.-al model of the curren1 S) strni. a l<>gi- hierlll'Chklll networlc A ncrn ork de.1gn "'here one computer t) pt·
al model of the •urrrnr S) Siem. a IOjllcJI model of me De\\ srsrem, and calli a mainframe) <onrrol' the enurr n<IM>rl. \atclluc <ompu1ers or
a ph) sial model of 1he Ile\\ "'"m •re all de1clopcd. servers control lo" er Ind< of pro..e;smg and nriwork de'1ces.
full backup \ 'omrlc1e badrnp of nery hie on the sy"cm. histogram A common mot for sho" mg thr d1stnbo11on of question·
functional baseline ~ ronf1gurauon of die S)Sltm documented 31 D3trc Of >Jmphnjl rc:,uJI,. h tJJ..c, tht form o( ~ \CMlcaJ b.tr<han .
rhc bq;inmng of the pro1<..:t. lo cons1s1> of all rhe neccs..ar)· sysrem horizontal application A snff\v•re p.id,.;1gc that c•n he used by m.an)'
rrqu1rcme-nr" and ~1gn ..:on\tr.;ur1~. differenr orpes of orgami.aoon,.
functional decomposition dlaaram (FOO) A top-down rcprc.c:nta- horizontal system A b3'ic >);l<m. •U<h "'on lO\CntOf) or PJ>roU
ttOn or hu'1nc>• functtOn' and prol<.-C»CS. Al;o called a structure chart. p3cii.ag.e, 1hat ., -.:<>mn1r•nl¥ u'\.ed h> a ,.1ru:1y <>f l.C>nlpan1c-..
functional primitive A •mglc function rhat l< nor exploded funher. hot site A separate rr locauon, whl<:h might l>c tll another SIJIC or
The logic for fu11<.11on•I prim1uves " documented m a da1a diaionary t:\cn 3nother i..:ounrf), that \:JO .'J,Upport t.:riu~.11 bu>nlc>.; ~)~term in th~
prn«ss dc"'rtpnon. C\COt o( ~ pnwer outage, ~y,tcm cra,h, or ph)'\K.al t.lta\ttt>phe.
functional requir.,ment A \ tattmcn1 of the sen1«>s a system pro· HTTP/2 The second ma1or vcrnon ol 1hc network protocol used b)
v1dcs. the web. Rel.,,t<t'<l •> n >1andard 111 20 IS.
functionally dependent Func"trona l dependence 1s an imponant con- hub The ce111cr uf a >tar 11<1wurk. ~w11~h•> in 111odtrn network> ha'e
ap1 fur umlcr>1andmf; oltc 2NI'. Thc f1dJ X 1s said to bt fun<.-tionally largely replaced huh>.
dependent on 1he field Y 1f the Y.lluc of X depend~ on the value of Y. human-computer interaction (HCI) A dc<cription of the relarion-
For example, an order dare i~ dependent on nn ordrr number; for a sh1p berw«n computer. and the people who u>• them to perform
por11cular order numbcr. 1hcre i> only one value for the order dare. In bu,111ess·rclatcd ta<k<. 1ICI concept< apply I<) c,·crythmg from a PC
conu·as1, tht• produc.:1 de,r1p1tnn 111. nn1 dcpenden1on Lhe order nuni· desktop 10 1hc ma in menu for a globJl ncm·ork.
bcr. For n pamcular order numh<r, there might he several prndua identity manai:ement Conrrol; •nc.l prox:cJurc> nece.snry 10 idenciJ)
de.criptte>n'· one for each 1tcm ordered. leguinlatc u\Cri. and ~y~tr1n 1o;;<n11ponenc,,
Gane •nd Sllrson A populJr •imbol ;t1 u>ed rn DFDs. Processes, da1a identity theft The <teahng of pcr<nn•ll) tdenufymg 111for111acion
now,, cJa13 >IOfC\, ,llld e>tr1nal C11UllC> Jll hdVC ,t unique symhnl. c>nhne.
Gantt chart A homo111.1l l>ar <hart th.111llusrrar<'> a <ehedulc. Dcnl- IEEE 802. 111 A >«um) ''anJ.ucJ for Wi· F1 w1rrl<>> ne1works that
opcd many ) tar> Jgo hy I lenri L Gantt as a prnducnon control uses 1he WPA2 protocol, rnrrcntl> 1hc m<»t <ccurc cncriptton method
techmque. Sull arc 111 common use IWa). for Wi-F1 n<rworh.
garbap in, garbaa• out (GIGO) lbc wn<.cp1 tha1 the qualuy of the incremental backup ~.. mg a cop) ol only thc filo th.1 ha'e changed
ourpu1 "only,., i;nod a< the quahry of 1he mpur. sm« the la51 full backup.
inference n.oles lnsrru•'tmns rha1 direct a knowledge manJgl'menr b:i4ie.d on la ye.rs t>f )hared inform;auon th~t ~Jn conr31n rexr~ \{)UnJ
»••=to 1Jcnufy dJ1.1 pancm> JnJ rcla11on;h1p>. byres. tmagcs, and ''dco dips.
Informal nructure An ori;;anotJllQn b•sc:J on 1111trper>0nal relarioo- inurview A planned mecroni: during" hKh rnforma11on is ol>t3mtd
sh1ps. which can dcvrlop from rrcnnu• work a«ognment<. physical from anochu person.
proxonut). unofficoal procedures, or pcNlf!al rela1ionships. ISO 9000.3:2014 A >et of gwdd1no t-.rablr>hcd •nd updat<.J by the ISO
information D.ca thJI lu; bttn <hanged 11110 • u.eful ionn of ootpui. to proude a QA fr;uncwork for dc'dnpmg and m.11111a1n111g soft" are.
information 1yst0tm A rnmb111Juon ol 111fonnJ11on 1echnologi. pro- iteration cycle An agile de-·elopmcnr qdc chat mdud~ planning.
plc, and dar• 10 surpon business rtquircmmi.. The five key des.going. codang, and tbong ooc or more fcarurc. "3,,..J on user >lone!..
componenr> are harJ" .ire. wft"arc, J313, pr<><,.,,;e,, Jnd (><.~pie.
Iteration plannlna meetln& In agile de• elopmcnr, a mtttmg hrld at
information technol<>sr (IT) A rnmhln• iion of hJrdwarc. "°ft ware. the beginning of ealh tterauon C)ll~ co ~r<"Ak Jo\\ n U\.Ct stories into
and crlecommw11ca11ons >V'ICm> 1ha1 <uppon bu me<• opcrJl><>ru, <p<'Ctfic ta'k' that arc ""gncd 10 tC•m mcml>cr<
improve producu\lly, Jnd help m3n;agcr. nuke deci;ion~.
Iteration The complc11on of a process \lep 1ha1 " repeated un11I •
infrastructure mode A w11ele\~ ntcw<>rL. C.:<lnfiJturatton in '''hu.:h a specific condition changes.
ccniral w1relcs< dr\ oce c•llcd an acce<s point os used to serve all wire·
less client>; also called BSS. iterative An ad.Jpuve uml1od typk.tlly u-c• a ;p1r.1I Jc,dopmem
model, which build• on a '<rics of 11cra11011<.
inhentance A l)pc: of ob1c.1 rda1ion>h1p. l11hcrorance enable. an
oh1cc1 to dmvc one or mote nf ot• aror1bU1l" from another obj<et (e.g .• java database connectivity OOBC) A <iandnrd 1ha1 enohlc< j'1va
an INSTRUCl'O R oh1cct may inhcri1 man) rraors from rhe apphcauons to exchange dar.1 wnh any databas• that uses .'>QI. srare-
E.\IPLOYrE ob1cc1, su<h .1> hore date). meni; and" ODBC-complmnt.
in .. house software An 1n(orn1auon c.:cnn.·r or help dr..;k "'irh1n rhc rr joint application development OAO) A 'Y>l<m' dcvrln1>111cnt 1.ch-
department responsible for providing u<er •upporr and offering ser· niq uc tlm use~ J ra<k fo"e of"'•"· 111a11.1ger<, and Ir profewnn•I~
v1ct:.) ~uch ai, horhnc o~'l'tJll\:C', tr.uninM, Jnll gu1dnnt;( ro u..c'rs \vho who work rogethcr to gather information, disc11;s bu.i nc;; need>. and
need tccl1111c,1 I hr lp. define the new S)'>lcm requ1rcmc1us.
Input control The nccc»ary mca;ure> 10 cn>urc thnt inpur darn is just·in·time OIT) The exch:m11c or delivery of mformancm when 011d
corte...:t. co111plcte, and ~t·•.:u1 c. A ,y,rer1'' 01'u1ly\t n1u\t focu\ on inpu t where 1c 1< needed. for exampl<.1u<r·m·timc mvenrory system• rely on
control during ev<r) phase of mpur clc~1g11, ~1Jrnng with <011rcc docu- computtr-to<ompute.r d.tt:i cx~hJngc 10 1n1nlm1lC unncc<."»nry 1nvC'ntor).
ments char promore da1a .iccur~cy nnd qualtry. Kbps (kilobits p<1r second) A b.intlwodrh or throus;hpu1 n1easureme111.
input ma.sk Ternplart or pJ.tti.·rn 1h~lr ninl.ei; it ea-.1er for use~ co enter key fields U..,d cfurin)I t h< syMCm< design ph3SC 10 or11on1ZC, ,JC<CS>,
da1a. Ofren used 111 Ju1om.11cd form' 10 guide .tn unfJmihar us.er. and maintain data structures. r hc four rypcs of key fields arc primary
instance A specific member of a ci.,,, ke>'<· candidate keys, forccgn keis. and s."<:ondJry key>.
Institute of Electrical and Electronics Enalneers (IEEE) A profes- keystroke lou"r ,\ d.-1cc rhJt can be inserted bct\<ecn a ke>l>oord
>10tUI otg3Jlll~tton char <St> bit.hrs .iandards for tde<ommunkauons. aod a computer ro rttorJ keysrrokc;.
intanzible benefits Po.itJ>·c ourcom<" 1har arc d1ffoc11h ro mca•urc m knee ofthe curve A pcrfunnan~.., chauuemlr< of a d1cnr/<eo er
dollars. Howc,·er. mra1wble bc:ndirs can be •ery important in the cal- compuung cnvtroruncnr. Chenr/.c.-·cr re>pnnl<' llm<" rend to m.:rcasc
cul.ltton of c.onom1< f.a,,b1l11y. An nample of an m1an111blc bc:ncfir gradualli and then nsc dranuttally a> the >)>tern near> 1rs capaCtt).
might be .i new web•n< thar 1mprovrs 3 comp.lny's image. The pomt "here re>ponsc um<" lll<:tU>< drama11ullv.
lntanclble cosu Imm thar arc d1ffKul1 to mea>urc m dollar rcnm. knowledge ~ A rorular \) '1'111' dc.elopmrnt lnhnrque that U'>CS
>uch >i miplo) ec dM:amfawon. a group of users, man•Jler<, and ff profe<\lonal~ who work rog•chcr to
integrated denlopment environment (IOE) A sune of mtcgrated gathtr information. di><uss business need>, and define 1he nc" .,·seem
tools to nu.kt n c.u1cr ro plan. conmuu, Jnd mamum a >pcci£1c soft. rcqu1ttmmts.
"are produ<t. An IDl " de.1gnt.J w allow 1he e•>l' uuq;rauon of leading questions Qll<'ncs 1ha1 'UAA<"'I or fa\C1r • panrculJr reply.
S)"tem componcnr• wnh '"'' tJm< btmg 'pent on dcHlop1ng code for tepcy d;ota The 11.ita a<..oc1atcd "1th An oldcr, le<s rcchnnlogocally
inrcracu'c modull.,,.
ad' a need leg;rc)' S) stem.
intecrated development envlronmenu (IOE) An opplicanon for
bu1ld111g other whwarc applttauom. l >r•cally 111cludcs • '1sual code lepcy system An older system tha1 " typ1alli less te~hnologically
advan~ed 1h3n ~"Urrtntly ava11:.thle \Y\.te1n•...
ed1tor:. an tntegraced comp1lcr. ~ dcbuAAcr, a configurar1on ma11agement
'Y~te1n, and a h~\I (rJmC'\YtJtk. leveling The proc'""' of drawing o 'croe' of m<rcJ<ingly dccn1lc<I dia-
integration testlne 1he1c>iin11 of'" o or mort progra m< tha1 dcpcnd gram_< ro reach the desired level of dcrntl.
on each 01her. libr ary module In a structure cho n. a hbrnry module t< J module rhat
integrity One of 1he three main demenr> of S) stem >ecurirr: confiden- is reu~able and Cln bt- invoked front nlorc lh:.tn one pc.uni in thi: ,hart.
tiality. mtcg.-it)', and ava1l.i bil1 ry ((;IA). lnrcp,rary prevent< unau1horized life.line In a sequence diagram, a lifdtnc 1s u;txl tu « 1>rc'<nl rhc 111nr
users from crcatin&, modifying, or deleting informarion. during which 1hc objccr •bn\'C it 1s •hie 10 internee wnh rhe other
lntematlonal Oraanlutlon for Standardization (ISO) A network obj ccrs in rhc u•e <n>c. An X n1.trks rhc end ol a lifchn~.
of nnt1011al ~1a11<l:1 r<l') in\;t1t11te\ (ron1 over a huniJred C(llHllrlt!) \Yt>rking limit check Occurs. \Yhta n \•alidntion \'. hl-ck invol\'f.") :a m1nin1u1n or .l
1n pnrtncrsh1p \V1rh 1ntcrna11on;1I urgnn1z01t1ont.~ govern1nents, indus· n1a ximun1 value, but not hoth. Checking ch.u ~1 pay1ncnt n nl<)Ulll i\'.
tries. and bu..,11101s ._1 n1.I t..:Ol11'Un1er rrpr~:.cnrnri' f"), Tite ISO ncr!t as a gre ater than 7cro. hut nor <10p«ify1ng .i m:.tx1n1um value. is an cxnn1plc
bridge between public Jnd privarc ~ccrors. of a limit cbcck.
lntemet business services (I BSs) ~r\IC~> rhat provide powerful list box An ourpuc me<hamsm that displays a list of <ho1ce. rhat the
\\cb-"'1.ed ;uppon for tunsac11ons •uch n< order prl)(Li»ing, biUing, user can ~ele~t.
and 1,;.u\to1ncr rcl.u10111th1p 1n:in.1gen1..:111.
local area network (LAN) A ncrwor~ ""'II" rhar allow< 1hc •hanng
The lntemet-of·Thlnas (IOT) Oc\ICt<> connected to one annrher o•er of data and hardware, ~uch as prrnrcr> and 1<.anncr.. Ad•3nccs m data
a computer U<.'l\\'Otk. communicauon ttdtnology bJ\C made ir r<»"blc 10 ..-rc•I< pow<rlul
lntemet oper.atina system PJrt of rhe \Veb 2.0 modd, an onlrnc nerworks rhar we 5.l!dhrc lmk•, h1gh·spccd f1bcr-Oplt< Im<", or the
computing c-nv1ronmcnt crratcJ h)• onhnc commun1ncs and ~n·icc~:\1 Internee to share dar.t.
log Record l)pi<•ll) k..pr hy opcr.umg >y>t<ms and applianons th..,r market b;asket •~lysi1 A t)pc: of anal~,,. rh.11 can d<t«t panems
docum<nrs .ill t\·tnr<, including dares, nmes, and other Sp<C16c mfor- and trtnds in large amounts of data .
mnuon. L~~ '-Jn be 1mponJtU 1n unJt:r,r:and1np, p;)j,t ~rracb and m~ per second (Mbps) A b.1nd\\ idrh or throughput measumnem.
ptt\·ent1ng furu~ 1ntru\100'-.
menu bar A scr of uscMelntJble -.oft war< appli,Jt1on opnons. \ISu-
lock enw M&.1.kc- m tht unJ..'rl) mg k>glC tholr prodUtt mcomlCt results. all) locared a<ro-s 1be lOf' of thr '<teen.
loaial desJan Tht defm111on of an mlomunon '>"em'> hmcnons and mesh networic A ncrworl Jl'>lgll m "hi<h <a<h node connccrs ro
fc..atu~,, and the rcl.Juun~h11"~ tlmnnA 1t~ componrnr~. e\tt) other node. Whal< th" do111n" •crt reliable, II is al..o expc:n'"e
loaic&I model ~how• what • ·~°'rem muq do, reg;irdle<s of how ir ";II ro install and mo11nta.1n.
be rmplemenr<J ph) >1.:alh message An 0 -0 .:ommand thar tell, an ob1e..1 ro pt'rfonn a cenJio
logica.I rteord A l<>g1<JI rn:ord ronmns f1dd ulut"S that dt"scnbt a method.
smgle pt'l'Wn. plaet. 1h1ng. or C\Cnr• ..\pphcation programs see a logic<'! method Defines •pn:1fic t.td.~ rh.r an ob1m mu'' pe1'form. D«;cnbt•
re.cord 3\ •I.Cl of f1dd;, rqi;irdl.,..,; of how or \\here tht data" >tored what and bow •n ob1l..:I Joe, ><>mc1hmi;.
phy,icall).
methods In a du\ dui:ram. nmhnd• r<f>tt>ent program logic
locic"I norqe Refer; ro mformanon •• seen through a user's eyes.
rts-trdl<» of how or whtrt 1ha1 mforma11on 1> organu.<d or •tored. metriu Workload 1nc"urcmcnh, al•o called mrtroc•, include the
number of Imes printed, the number of rc..:ord> acccosed, and the num-
loaica.I structure Ser romrol siruciure. ber of tttll\!iH.1C1101l~ prOlC'SSCJ Ill J JC,l\i~O U01(' JXrtOd.
logic.al topolou A \'l<W of a nrrwork rhar d=nbes the way the compo- middlcwarc '>oftwarc that connc:crs dm1m1lar apphcanon• and
nen~ 1ntero1C1, rather 1h;.an che .1crual nef\\'Otlc ohhnA :ind connections. enables them ro cornmu111cotc and .-change darn. For e~amplc,
loop In a 'tru,tu« lh.1r1, a loor 1nd1c•re' 1hat one or more niodules middleware 'a11 l111k a departmcnt.11 dntah."c to a Wrh <crvcr that can
arc repeated. be accessed by client computer> vin rhc Internet o r a compan y imrancr.
loopin& Refer> to a t>rou:s' >lCp thnt ;, repcaicd umil • >pedllc rnndition See ,1/so Mlueware.
change<. l·or cx:1mplr, a procoss rhat connnucs m prim paychecks until it milestone A reference po1n1 1ha1 ma l'k• a ma1nr occurrence. Ustd to
reaches the end of the p;t) roll file is looping. Also known as repetition. moniror progress and mana11c a pro1c,r. See also event.
loosely coupled J\lodul-. 1hJ1 arc rel.111vdy mdepcn<lent. Loosdy mission statement A dtx:ur11en1 or )f,lt~n1ent that dt"S(;tibcs rhe com-
coupled module< .ire ea~orr m m,unl3m and modify, hecausc che logic pany for 1rs stakeholder< and briefly "ate< the wmpnny's overall
m one module Joe> not affe.i other module>. purpo.M:, pro<lucb. i.crvu•.:t:~. an<l \i31UC\.
M:N A type of enrny rda11on>hip. A many·to· ma.ny reLrnonship, mission..criticaJ syste.m An 1n(or1nJrton sy-.cem th;i1 '' v1r;1I 10 3 com·
aht>rcv1atrd M:N, c\l~t~ when one m•r•ncc of the firsr enmy can f>:my·, op<:rnnon•.
be related 10 many 111stan<r> of th< >ttond cnm). and one UlStance mitiption One of four ml. control >tra1eii1es. M111~.icion reduces <he
of the se<ond enlll) can he related to many onstnnces of the firsr m1p•ct of• ri;k by <.Ueful plJnn11111 ,tnd prcp.uauon. Fur cxampk, a
eornv. •Omp•ny can prcp.ue a dba;tcr n-.:u•c<) pl•n lO m111gart the elfoct> of
ma.chine 1...,.,,in1 An a.ppli,•11on of rnmpur<r "'~and anilicial .i n;uural <ll>a.tcr •hould one 0<.:ur.
mtrll1grnce th.ir u.... JUIOm.ltcd apf>roncht\ ro panem recognmon and mnemonic code C11>her; u"ng ,, \pt<;1fa comhma11on ol letter\ thar
pred1<.m·e anal) ti<:> b.ikd on lari:c doraseb. art easy to remember. Many rhrtt-<oh•racter •irpon codes are mne-
malnfnme architecture A \Y>l<m de\lllfl "hcrc the '<T\ er performs moruc ,oc1.,,..
f or cx•mplr, LAX rcpn:..ent' Lt" Ani;d~.
a.U rhc prt><<'"ng. mobile device Smartphoon. t.iblm. and other compunng <kv1cc.
ma.inte,,.,,,ce activltle• Chang1ng pn~uim. procedures, or Jocu. that are not perm.u>cml) tethered to a de.k. The) connect ro the Oft·
mcn1atKm ttl cn\urc corra.:t \)\tern ptrfonnafkc. Adapung the syscem work wa~lh,1)-
to changing requ1,..,menc,, and making the S)"Sron operate more effi· mock-up When des1gnmg .t repnn. • \•mple rtport 1s prtpared, which
ticorly. Th~ nttO> ar< m<1 h1 rnrrn:tl\c, adapt1>e, perfccmc, and i;a m0<k-up, or protot)'J'<', for u<.<n 10 re-.ew. The umpk should
prc,·enu\e ma1ntcnarx:t. mcludc typical f1dd \·alur> and rnnraon enough record• ro •how all th<
ma.inten:ance a&reement A >J><-cificinon of the conduions, charges., design fcatutts.
and tame tr.1nlt' for U\tr' to 4.:0nl:tt.t 1he \'itndur for 3'\~tst.anct ''hen model-based synems encinMrlna ( MBSE) An approach IQ ;prem.
they h.,·e S) strm problems or qucsnons. cngmeenng thJ1 rtllt' on domam model•, rather than rrad111onal docu
malnten:ance upens.s Cos!\ th.it vary <ignificandy during the system's mems, ro de>i!lll large-;,wile 'YM•m> and con'e) 111formanon between
opc:ranon31 life ond orn:ludc •pending m '"Pl"'" mamt<nance acrivu:ies. rng1nccrs.
ma.lntenance l"<llease A formal rclea~ of a nm> <y.rem \'crs1on that modelinc A proce« th.11 f>r<>duc... a grnphocal reprt\tnranon of J con-
lont.i1n~ a nun1bc1 o( c,;h3nge's. cept or proce;s tha1 \)MCnb developer> can analyte, re>I, and modify.
maintenance l"<lleue methodology A •)>ttrn of numbered rclea$C!S modular design A dcS1gn tlMl <an he l>rnken down 1nro loi:ocal
used by orgoniiauon> (c\pcc1ally \Oftware vendors) that helps Or(l3.rli£C blocks. Also known as 1>aruuonin{: c)r 1op-down dc"g11.
1nainrc11ancr chan~~s and up<.l:ttc). module A module rnns1m of rclnccd 1m>i:rnm code organized into
maJntenance team ()nc or 1norc lirl)·1ottcm' ana ly'r" and pr<,gran1mcrs sn1all u nll '!t that 11rC' "·''Y10 undcr,1.1nd nnd 1n:11nta1n. A con1plc;"X pro-
working on f>rod uct 1nn1nrcnance issues together. gram could have hundreds or e\'Cn rhousands of modules.
make or buy The choice bcrween de>eloping in-house software anti pur- Moore's law A predktion that compu11n11 powtr would double every
dia,mg ,oftw,1rc Clftcn "Lnlled n make or buy, nr bwld or buy, decision. 18 to l4 month, due to 1ncrtn\CJ n11111aturiLation of electron" compo-
malware Mali,iou< <oftw.irc that nught 1eopardi2e the system's secu- nents.
riL) or priv3<). multlpAth desian A nctworL. Jc>i,:n 1l1J1 reh•-. on mulriflle data parh;
managed hostlna An opcrA11on "managed hy th• o ur<ide firm, or co increase bandwidth and range, u<ing f',·llMO technology.
hem. Another term for lllS\. multiple input/multiple ourput {MIMO) A wirclc~s networking tech·
management information •yo<em ( MIS) A computer-b.tS<d tnfor- noloi;> incorporated in rhc 1Lt£ 802.1 1n and 802.11.ic >fandard> that
m.1t1on \)'tcm u-,cd 1n hu'i1nC'\\ p l.1nn1n1t• ..:onrrQI, dfi-i-,1on making, and uses muluple data s<reJms and mul11ple antenna\ to achieve higher
uan.!truJ~!llon ~pt.'Ct.b anJ ,ub-,c;inuJlly 1n..:rta'IC w1rcle):> r..tnRC O't·ttr e:u·
problem >oh mg.
lier standards.
ma.ny-to-many relationship !.u M:1'.
multivalued key ~mcromct ot " nrcc>...-.r)" for ·' primary key to con- online da.ta entry A Jat• entry mcothod u...:d for mrnt busmcss a<m·-
sist of a combmauon or r1dds. In that ca\c, the rrmiary k•> IS called a ory. The onlme mcrhod offers ma1or advanragN, including the
combmanon key. compo>UC k•y. conca1ena1ed kcv. or muluvalued key. immcdme validation and ""ul2b1l1f) or wt•.
natural lanruare A wfrwarc lca111re rhar allows u~ ro 1ype com- online documenQtion Pru"t<lt!i. 11nrnt't.11;i1r heir when U\Cf) h3\ e
mand' or rcquC>I> 10 normal t:ngl1>h (or other l1nguJgel phra\es_ qt1e'5t1ons or encounter pmllkn1\.
net-centric computin& A d1>rnbu1eJ cm ironmrm "here applications onllne •yst~m Handhng rransamons "hen and where rhq• occur and
and data arc downloaded from srrvcn and c><changrd w1rh rccr< prov1d1ng output dtr~tly to user>. &x-;iu~ n 1; 1nccr3\.lt\e, onl1ne pro·
across a network on an a> needed "'1>1>. ccssong amid< delay> and .allo>\< .a con\lant J1alojt hcrween tl>c u<er
and the sptcm.
net pN1sent value (N PV) The total 'aluc of the benefits mmus tbc
101al •aluc of the'""'· woth both the""" and bcnd1r. be1111t adjusted open database connectivity (ODBC) An ondustt) ·\l,rnd.ud rrorocol
10 reflect th• point m llln• al whoch the) 0<eur. that make> u J'O'>iblc for >0frwarc from d1fkrcn1 •end-Ors to interact
and exchange data.
network T"o or mored°' !Cl's th.i arc connc..1ed for rl>c purpo<e of
srnding. re«ovmi:. and sharing daca. open source Software that" supponcd hy a large 1troup of u<ers and
de•elopers. The sour« rode os made freely •"aol.ahlc.
networtc dJa&ram A PERT chart also is refer~ ro as a network diagram.
Open Systems lnt..rconnection (OSI) model L>c<nobc> how data
network Interlace A wmbmallon or hardware nnJ software that acrually moves from an apphcauon on one .;omputer 10 an applicJtinn
allo\\'~ tht> t..01nputer tu 111tcrJ1;.1\\11th1he ntt\\.OrL.. on another networked <0111putcr. The OSI rnn•1>1~ of"'"" la) er;,, and
network Intrusion detection system (N IDS) Softwan: 1ha1 monuors each l.1yct performs a spec1{k fun<11on.
network trJffic 10 detccr 011cmp1cd 1ntruw111s or ,uspicoous ncrwork open·ended que•tions Quero°' that nllow for a range of an..,.•crs.
traffic 1)attcrns and •end> alem tO ncrwork ad1111n1strators. C.111 be The)' encourage sponrancou> and un,trtKtured rc>pon'<!> .md orf u~
helpful in dcx:umentin11 the tf(om of art3ckcrs nnd analyzing oerwork ful in u nderst.1ntLing a l.irger pr~cti.s.
perforn1..incc.
operational costs bxpcn>cs tltJc arc onrnrrcd a fter a sysrcm ts imple-
network topology l hc way• 11c1wor~ "configured. LAN ond WAN mented nnd conrmuc whole the •»·Stem 1~ on u<e. fxamplc< include
networks tyricnlly a re arranged 111 one of four common parrern<: hier- syscem n1ainrenance, supplic). equip1nc11t rent.ii, nnd annual sofrwar~
archicnl, bu~, b~t, and ring. Iicense foes.
node A phy~JlJ_I dcvu:c, "ired or \vi rel-..~, rhat CJn send. recei\•e. or operationaJ environment 1·hc cnvironn1cnt (or the ~ctual *'Y"t<"1n
man.Ji;< ncrwork UJIJ. operacion. It includes hardware ond software configurorion~. sysrcm
nondi.scretion~ry project:I \X'ht•rt- 1nJ.n~~rmcrn has no chose~ in utilitic), and conln•unicJuon"I rt-.)Ollr\o.c). J\130 c.:.tllc:d tht proJuc.:uon
1mplemen11ng J pro1cc1. rhey arr called 11ond1-.;rc11onary. For example. environment.
adding a reporr required hy a new federal law. operational fe;aslbllity A sysrcm tha< that "111 he u;cd cffccnvel1· after
non.functional requirements A ~iai.-mem of operJnonal syn<m ir Dl> been devdo(l(d.
COCbtratOl>.. operational security Cun<erncd wnh m•cu11rroal p<1l1<1c-. and con-
nonkey field Any field 1ha1 1~ not a primMy ~" or a candidate key is trols that ensure secure opcr.mon\. Al'o called pro..cdural >ecunl).
called a nonke) field. operations documentation Conca1ns all 1he mformauon nttded for
normaliution A proct<>s by "h.-h Jnali;ts 1dtnt1f1 and correct inher- processmg :wd dmrtbunng onhnr •nd printed ou1pu1.
ent problems and ~omple'1UCS tn 11>cir record des•Wb· option button R•d10 button> that rcprc\l'.nt lt'°"fl' of upllon\ The
user can <clccr onl)· one or11on at • nme; a ...,le<:ttd npunn contJin' a
N oSQL d~tab;ases Oatabase ~1.irm• 1ha1 ~a llar, nonrabular (non- black dot. Su .,/so radio button.
rrbnon•I) •tructurc ro \!or< and procc-. laf!IC·'<'•k data""".
orphan Ao unassoc1ar<d or unrd•tcd r«:orJ or held. An orphan <ould
n-tier desirn A mulul.,,cl dc~ogn Of ar.hnecture_ for <•ample, three· be ~ared 1f •customer order was entered on an order table whcrr that
ncr design• also arc called 11·t1cr dc<1gn<. ro md1ca1e that some design< cusromer drd nor already e\'.ist on the cusromer table. Referential mreg-
use more than one unermedtalt la) er. nry would prevent tbc creatton or th~ orphan.
object In ob1rtt-Ort<nt•'tl a.nal)>t~ or prow•numni:. an obll"-t repre- out:put control Met.hoc!> 10 mam1•1n uutpm mt<gntl and S«Unt}-
sen1s a rral pcr~f•n, plac:t, t\·tnt~ or cran-.ac.;ut~n. for example, e\'cry rcporr <hould include an appropriate uric, report
object model Dc;<;rtbc' ob1c..1s. whi<h rnmbme datJ and prcxesses. nwnber or code. priming dat<. and umc pcnod <O•cred. Reports
Ob1ccr models arc the end produll of 0 0 analysis. should have p•gc> rhat arc numbered con,<cu11vrl), 1dcnnficd .l< Page
object-oriented (O·O) •nalysls The .1ct nl undersrnndong an mfor· xx of xx. and the end of rhe report should be lat>clcd clearly.
mntion system by 1dent1fi "'II thinit~ called objects. An object represents out put security Ou1pu1 securiry protect'! po l\lC)' ni:hrs and <hields
a real prr!i>un, pla.t:e, evt>nt, or tran~~u.:1u>n. Ohjec;.1..orien1ed :1nal)'St\ i.s a the orga11ll.'111011's pruproo<ary Jara from theft or una11rhun1.cd ac~c".
1>opular .1ppn1.1ch th.u ...,.. J >)'>t<m from chc v1<wpo111r of the nhrccts out sourcing 111e tra n~fcr o( infnrn1a1ion ')'(iltnl' de,rlorn1en1, OJ"Cr~t·
themselves•> chey function nnd inrcr.1c1 with the <ysrem. t101l, or mainrcn~ncc co an ou1s1dc (1rm th3t provide' thc~c ~r,·1cc~, for
object-oriented development (000) The process of tr.111sb11ng an n fee~ on a 1e1npor:iry or long-tetl'U b.1ii.1~.
objel"t model dire..lly imo an O·O prowam111i1111 lnngunge. page footer Appc.m '11 the bo110111 of the page and i> used tc> Jispla)'
observation A f.1~1·fin<lmg 1c.h111l1uc wh<rc nu 'maly>I see. n system in rhc name of rhc report and the p.1gc numhcr.
3'.'fton. Ob~n·ation allo\Y\ 1l1r v\·ri(K..1t1on of 'itJcen't'nts rnade ul lntetv~V'). page header Appears at the mp of rhc p<1ge and ondude< the column
offshore outsourcing The prnuice of <h1hn111 IT dcvclnpmeni, '<•P· beadini:• tbat 1de11t1fy 1he dat.o.
tlOrt. and operation< ro orher counme<. pair programming A pr.1.n<r in XP 111 who•h two proi;r.1111mc" Mtrk
offshorln& Sl>e offshore ouisourcing. on the same rask on the <amc co111p111cr: one drive~ {program~> wlule
tbc other nangates (war~he>).
offsldnC The pr3Cl1Ce or '10rtog batkUp flll'<iia 3\U)' from tbe mam
busoncss loanon. rn order 10 ntitti;>tc the nsk. of a catastrophic di>as- parallel operation The pJtallel opcr•llon chJngeover method
tcr such a~ a A<><xi, fitt', t>r t"arthqu.1k~. requires tbar botb the old and the new tnforrnanon <ynem• opcr.ttc
fully for a s~16cd period. Data IS mpu1 mro horh ~i-ncm~. ~nd output
one-to-many relation•hip \t•r 1:M. generated by the new >y.. rm "wmp•red wuh the cqu1v.llcm output
one-to-one relation•hip \u I: 1 from the old S) stem.
pattnt In 1nhcm•ncc, • parent " the obJ"-' from which the other port A posauve integer 1hat '' u\Cd for rounns 1n1.:om1ng craff1c [O th~
ob1cct, the child, dcme, one or more annbures. correct applu;a11on on a <ompu1cr.
pattnt diavam in., higher or more cop-le,·el di•gram io an exploded port scan An ancmp1 ro dctc-, the <oer.•c•' running nn a computcr by
DH>. lf)IDIJ to connect to •~nous poM> and ra.ordmp; the portion wbkb a
P;areto chart \ •-rn1<:•I bar guph named for a nonncrnrh cenrury conn«:t1on \\'a\ accepted.
econonu\f. The b;ir., w ht<h rep~r •arious causes of a problem. :ire portal An entrance to • mul11funcnon wcb<.11<. After cntcnnit a ponal.
.urangcd in dcsundon11 order. '° 1hc learn c•n focus on the most a mer t"an 1Uv1CJt~ to :a dc>tut3Uon. u.>1ng \3nou~ cool> and f~ture\.
1mponan1 .:ause-. proml.,J h)· th• pon~I dc.,gner.
p:artitionin1 The breaking down of o•<rall objeaiYes inco subs}.,;rems post-lmplement:ation evaluation ,\n •'~smen1 of tht O•erall qual-
and mc1<lule.. ity of the tnfoflll.11100 ~)>ltm. The cvJluanon 1cnfies tha1 rhe new
patch Rcpl•ccmcn1 code that 1s arphcd 10 h'< bugs or secunty holes m sv~1cm mccts spcc1ht'd ttqu1rcmcn1s....-omplt~ \\-Uh U\C:C oh1c:,t1,-o't and
soft.,""'· achine< the .1011c1p.icd bcnefi ... In addmon, h> rro,1dmg fccdhJck m
the devclopmem team. !he C\ alUJllOll JISO help> improve rf develop-
payback analysis A de1crmma11on of ho" loni:: i1 rakes an infomu- nu.·nt practlcC"\ fc>r futurt' rto1rcr~.
11on 'Y'lem 10 l'•l' for mdf 1hrough reduced co.rs and mcT<ased
benefit>. poweM>n password .S.-r BIOS-levd pa.-w-ord.
perfective maintenance U.•n11c' w • 'Y"•m ro improve cffici~. predecessor couk A •mglc rnor ta<k upon which rwo or more con-
current 1as~ dcprnd.
pennisslons Us<Mf't'C1f1c l'riv1lq;cs 1ha1 dercrmme 1he l}'p<' of access
a user has io o darn ha~. file, or d1rccrnr)'. Also called user rights. preliminary investigation An 1r111onl Jnaly>1< 10 de.rly idc1111fy 1he
nature and scope of chc busi11cos npportu111ty or prohlem. Also cJllcd a
penonal digital anlstant A proi::rnm char responds rouser requests feasibility .rudy.
lhrtlU8h .1 n.1rur.1 l 1n1crfJ\.t"1 'U<.'h ;t\ rrgular \j)CC4"h, to pro' 1de ~1ss1s
tJllCC 10 i;cncml-purpo><! qucr1e,, Often embedded en dl-viccs such as pretexting Oht.111111lg per'4.•nn l 1nforn1a11un uudcr fJli;e prcren~ei..
lnrern~t<o11n~1..tcd ~rc.1kcr) and <tni.1r1phrlne\. preventive malntenanc~ Ch.11lgc' 10 a l\)'~u~1n to rrducc: 1he po~:i.ihil
penonal information manaacr (PI H) A tool 1ha1 helps manage iry of fururr failure.
task< and .chcdule~. Many handhelJ dcnccs "Jso include this function. primary key A ficl<l or rnmb111a11011 of field' rh.11 uniquely and mini-
penon-day rhc Jmount of work 1ha1 <me P""on can complete in one mally idenrif1e, a part1t..:ul.,r 1nembtr of :in enciry. l•or cxan1ple, ln n
day. customer table chc customer numhcr '' .1unique prim.1ry key because
PERT/CPH ·1 he Progr,1m E\.1 l11a11on Rene" Techmque (PERT) wa5
no two cus1omcrs <'UR have the >ame cu,tomer number. Th3t key •lso is
developed b~ lhC U.~. N.wy IO manage V<r) <omple>. proJt'Ct>. Such minimal b«au.>e 1t conr;uns no 1nrorn1.\t1011 beyond whar 1s needed to
as chc con\lru<llon ol nudcar <uhnurcn.-. At approx1maiel) the 1denrtfy rhc cu~tomer.
•amc time, the Cntrcal Parh :llethoo (CP.\I) was developed b) pri- priva.te key encryption A 1.'0mmon encrypuon ce.:hnologv call«!
\.alr 111Ju,lr} to tnt'et 'll1tn1t•r projci..l nun:isem~nf ne~J ... The PKE. Tbe pmJ!e L.q "one ul J p•or of kq•, anJ 1t Ja.l)ph data tlut
1mporrant di.ronc11on< bcrwecn the rwo methods ha\'c d1<app<'Jroo has been cncryrccd w11h the \CCond part of the rJir, the pultltc key.
o•cr nmc. and coda) the 1cchmquc L> called ctthcr PERT. CPM. or private network A dedicated rnnne<:non, \lm1br 10 a lea..ed
PERTICPM. rekpbone lmc.
ph;ued operation The rh.1scd nperanon method allows a ll<'W S)'Sl'<rn privilege escalation attac:k An unau1honz.,J ancmr• 10 m.:n:asc
ro ~ unplcmemed on scagcs, or module>. permission kvcJ..
phyilal deslan A plan for 1hc .oc1ual 1mplcmcnuuon of chc sy..tcm. probable-case estimate The mo>I Iii.ti) oui<omc is calltd a
physical model \ model tha1 ck'ICTI.,.._ how • •)'stem be con- ,.,11 probable,,a~ e~tun.alt
srructcd. procedural secunty ( -oncel'llC'J wuh manag•n•I rol1.1C\ •nd conrrol<
physical stora1e lnforma11on SIOrJj;C mt'<:h•nosm tbJt L> smal) bard- rh•t cn<11rc secure oper•llon•. Also nlled orcranonal secunry.
" arc rcla1cd, i....use 11 '"'·oh cs the rl'OC<'Ss of rcadmg and wntmg process Procedure or 13;k 1hat u>cn. manage<'>. •nd IT "aff member,
bmary data 10 physical media, such JS a hard dm·e. Oash drive. or puform. Also, the loi;JCa l ruin of a <~stem tlta1 are apphcd 10 rrans·
DVD. form da1a IOCO mcarungful tnforma11nn. In dat.l no-. diagrams, J
physical topology lllc conn<CTion srrucrure of an acrual ncrwork'< proc:e.s rece.-e> mpu1 dJrn and produce; ou1pu1 1hac ha; a J1ffercm
cablnlJZ. c..."Qntent, forrn, or hoth.
pilot operalion Inc pilot opcro11on choni;cover mec:boJ uwohes process 0 In• l)~I). proccs' 0 (1<rol represent< 1hc cnnre information
1mplcmcn11ng the cnmrlccr new <y,1cm nt a sclccrcod locanon of the svstem bur does nof show the on1cnul workmi:s.
company. process description A Jo.:umcni.mon of a fun1.11onal primiti,,e·,
pilot site In J pilot opcr.1t1on, 1hc group rhot uses rhc new sysrem fuse dcc•il<, which rcprc<cnl\ • <p<'Lif1c 'cl of prtx:c<>1ng <!tp< .ind bu<ine<s
" called the r1lo1 "'<. loi;rc.
plain text Dara that cs nm cncrypccd. process improv4'ment T he fr,unework used ro imep;rarc software and
platform A >pe<ific ha rdware and software configuration char sup- sy.ccms dcvclop111cn1 by• new M:I rnudd. CMMI.
ports I r hu~1n<.·~~ goal, 'uch n~ hard\vare connttuvity and cd~Y product b;uellne l)e<v1hcs rhc •y;icm nr the hcg111111ng of opctalion .
mccgranon of fucure apphcar1ons. Also called on cnVJronmem. The produc1 baseline incorporatl"> nny change; made since the allo-
podcast A web-hnsed hroaJcnsr rhar allows n user to receive audio or tdleU baselme .ind u1dudc, the rc-.oll' of performan<:c onJ a.ceptance
muhi 111cd1a files using music pla)<r >ofrwarc such as iTum:>. and listen ccsts for the operationa l 'Y'lem.
to them on a PC or download 1hem 10 n ponahlc MP3 pla)tr or snun product lifecycle management (PLM) /le. application lifecycle
phone. managcmeo1 (ALM).
polnt-of·sale (POS) The f"'"
of an mfornu11on sy\lcm lh•I hJndLes production environment The tn\.1ronmcn1 tor 1he ac..ru..tl 'Y~rem
d.ul) >a.le> rran..1worh and mamtam> 1hc onlmc in' cnrory file. operauon. h include> hardware and <of1warc confogurauom, system
polymorphism The con.:ep1 1ha1 •message iti'es different meanini:s utihues, and commun1cdlions re>our<:-.. Al'o oiled the operational
to d1flcrcm oh1a:h (c.11 .•• (,0()1) !'\l(,I n mc~sagc 111igh1 produce cnv1ronmenr
diflcrent r~ulti dcpendmg 1f 11 rs rtttl'td by a child or the fanuly dog). productivity softwatt Apploc.11100' <u•h a< word rroccssmg, spread-
pool The o•tr.a.ll J..agram on SP.\11\. sheet. database management, >nd pr~scnmron ~raph1cs programs.
product.o0riented C...ompan1cs thdt n1.1nu(acturr l"01nputc:~. rourrrs, quantita.tive risk analysis LvJlu>llng mk Ill ttrnh of the acruJI
or m1croch•p~. 1mpaet '" tern1s of dollar.. umc, pro1cct ><.ope. or qu.11111.
Pl'Olram documentation Prep;ir.inon of program documt ntatton query by example (QBE) A language allow> the u1<r to provtde Jn
\laru 111 t~ \);tt1rL-. J.n3l);I~ ph.a.;c .1nJ -.;onunuc:~ Jur1ng "")~rems example of the data rrque>l<'<I.
1mplcmcnt•non. S)Sl<nl\ •nal)\I< rrrp>re O•erall documenta11on, such query language Allows a u~r 10 specify • task "tthout spectf) mi;
as process d~nption• :and rep<>n la1·out>, earl) m the SDLC. ho" trn: ta<k \\Ill be accomrh<hed. !>ornc qutr) bnl(UJj:~ U'iC natur31
Programmer'\. pro\ 1dt" dc>Cunttn1.i11on b) ~ans;rru"t•n~ moduk4" th:tt are
language commands that resemble ordinary f.ngh•h •rntcncC".
well supponed b) 1111tmal and c.icmJI commcnh and descnpttons
dut c•n be undcn.tood •nd mJ1nmned ta,il). qu~onnaire A document conmmng • numhc:r of >1ambrd qu<"·
nons that can be -.ettt to """Y 111d1nduJl\. Al"1 <.1lleJ J '""C).
Program Evaluation Review Technique (PERT) Su rERT/CP~I.
radio button Button> th.at rrpk'Cnt grour• of or1Klll' The U\Cr un
Pl"Olrammerlanalyst A dC'\1W1•11on fc>r ros1nnn< that require a com· select only one opoon at a nmc' a selected oruon con1>1ns a black dor.
bmarioo of ~·stems anJl)SIS and prnt;rammmi: skills. See also option button.
project coordinator The pen.on" ho handl,., admitu>tramc r"'pon- radio frequency identification (RFID) T<'<.hnolOjl) thot U>e> h1i:h-
"bdmcs for tbr dt\do1>1nrnt tram and negottale< wi1h u<er< who
might ba"c co11fhc11ng rcqu1rcmcnr> or "ant changes thar would frcquc11cy radK1 wa\c- tu tnt k phr1<JI ohJC<I\.
require •ddumn.d wnc or e~pen.e. radio frequency identification (RFID) ta1 An mput device u<cd 1n
source data autonut•on.
project creep Inc procc.s by whtth pr<>1«is wtth \cry i;encral scope
dcfin1nons e~pand grndually. wirhom <pcc1fic amhori1ation . .-andom sample A sele.non taken ma rando1n, un planned manner.
project leader The per-.<111 charRcd w1rh leading• project from • For example, a random .. mple 1111gh1 he• sample tha 1 <elc.1s any 20
t('('hn1co l p<rspernvc. cusromcrs.
project management rhc pr<>«" of pln1ming, scheduling, mon11or- range check A type of daca validation check that tC•lS dn1n items tc)
ing, controlling, and rcpor1111g upon the development of M verify 1hat rbey fall h<!twccn a sped lied 1111nml11m and maximum va lue.
The daily hours worked by n11 employee, for ex.1mrle, must foll w1thm
infor1naaon ~y~ttn1.
the range of 0 to 24.
project manager ·1he pcrwn charged wuh managing• projoc1 frum
an admini<;:tratlvc pcrc;!'>C"Crivc. range-of·responso questions Clo1ed ended que>iion• that a~k the
perwn ro evalu.11c something by providing ltn111ed """'tr> to sped fie
project monitoring Guiding. supervl\mg, ond coordinanng che proi- respon<es or on a numeric SCJle.
t<:t team\ workloJd.
rapid ;a.pplication development (RAD) A tcJm·hao;cd rcchniquc that
project pl<innina ldcnttlymll pro1«t t."~' onJ c<timating compleuon speeds up mforn1't1on systent> dc•elopmcnt Jnd produce. a funrnon-
time ond ~<>'>ts. ing information S}'Stcm. RAD is sm11lar i11 concept to JAD but goc>
proiect reportin1 Pro\ 1J1ng ri..-g:ular progri..i.'J reporcs ro managt."menr~ funhcr by including all rh.1\C'\ of the ~Ol C..
users. •nd the pro1cct tc•m u<cll. reasonllbleness check A rypc ol data vahcL1tton cht'Ck that 1dcn11fics
project schedulins rhc crc.mon of,, 'peciftc nmct.1blc m fnciltr4rc values that arc quesuooable but not n«.tssanly wron~. For example,
complerion of• project. Also invol··~ ~leering ond sta ffing rhe project mput payment •·alue> of SO.OS .md SS.000,000.00 bo1h pas; a simple
team and ass1w11n11 spcc1li. t•sk; to 1ram member\. lim.1tchtck for a p•)mcnt 'aluc greater than uro. and )<t "nth 'aluK
project scope A si-1hc dcttrrmnauon of a pro1e..,\ houndariC" or could be errors.
extent. record A M't of ttlJted field. tha1 dc ... nhc:; one m>tan,c. or tn4'tnbtt
project trianal• The three ma1or cumponm1> ot • pro1ecr: co.,, of a n cntrt), ~tK:h a" one cu~romcr. one t>rJcr. ()t cMlC' rrcxlu'-1 A Chord
scope. and umc. A pro1cct manai;tr rncs ro fmd the opumal balance might ha,.• one or dozens of fields. depcndmit on what mfornunon ts
among the<e facto~. needed. Also called J tuple.
properties In obicct-oncnted <0 0 1analysi>. characteristics cbat records retention policy Rul"' de>1g11ed to meet Jll lci1-1I require··
ob1crts mhcm from tht1r da" or I'"'''"'
on 1hcir own. mcn1< •nd hu<m"1i< ~' for l~ring m:ord<.
prototype An early, rar1dlt con .. 111x:ted "orking \Cr\1on of rhe pro- recovery The procc<<< of restonng dJta and rc<ramng a syorcm after
p-OS<'<! 1nformauon >y>1cm. an interruption.
prototyping The meihod hy which• prmot}p<• "Je>eloped. It recovery pro«'Clure Pr0<t1>> for re;tonng data and reHamntt a sis-
involve< a rcpcltll\ e srqucncc of an.11~"'• de"!!"• nl(ldeling, and res1111g. tcm :after an 1ntcrrup11on. RttO\'Cf)' ('rtk.cdurc~ c:;an he usrd ro r~torr a
Ir is a common technique rh•r c11n he u1ed to dc11g11 anything from• file or dorahase ro it~ currcm state at the ttme of the 1.-1 l><1<kur.
ne''' ho1nc co a compu1er nctwor~. ,..,dundant """'Y of Independent disks (RAID) A RAID sy<rem may
proxy server A nerwork1 1111 de' tee 1h:11 provide' ln1ernc1 <onnccnvity h<! pon of a11 organtLation'> backup and recovery plan•. A RAID')'"
for internal LAN use.-. rem mirrors the dar. while prcxc'""ll ""'""uc>. RAJD <ys1cms are
pseudocode A tcd1111quc for rcprC>t'llltng progr:im logic in scmi- called fault· rolcranr. because a failure of a11)' on< disk d~< not disable
~Lructurtd pro~. rhe system.
public key encryption (PKE) A common c11cryrtion technique. bch referential Integrity ,\type o f valtd11y check. Refcm11tal mtt)\I iry i; a
user on the network ho <a patr of key" a ruhlic key and a pl'ivare key. set of rules that avoids dat11 """""' tcncy .111d qualtry prohlcm<.
Tbe public key encrypt> data thJt t11n be J <:<rypted wi1h the priv•te relational database A da1•base m which t;ihlc< a re rcl•tcd hy com
key. mon fields, crearjng a unified datJ mucrure that provi<lt• improved
qualitative risk analysis hJ luanni: ri~k by emmnri11g the probability data quallly and•«"''·
that it will occur :ind 1he d<!!l'l.'C ol unpact. rel<itional model A moocl U'>Cd'" rcl.mt:ltlal JniabJ<«. The rrb11onal
quality :anurM1ce (QA) A rr.x:cs' or prn<eJurc for m1mmi2ing errors model was inrroduced during the 1970< and 0«:.1mc porular because 11
•10d ensur<ng quah1y 1n produ•t>- Poor qualuy can re.ult from 1nnccu· w:n flexible and powerful .
rate reqwrrmtnb, de:)1gn problem\, coJ1ng error'-, tnulry relat;onships Enoblc ob1cc1> to co111111um<.t1c •n<l tnlerall .h they
documcn1a11on ••md mcfft:>.hvc tc<11ng. A Qi\ team re"•" s and tests all per-form the business fun<11ons .md ir.m<a<tu">n• rcquir<J by a sy\lem.
npplicrnons and sy>1cms ,hangts to verify <p.'C1ftca110"' and software Relauonsb1ps describe" h3t ob1rtt; oecJ to know about each other.
qu;ilt1) >tandard>. how ob1ccts tt>pond to <h.lDjtt1> 111 other ub)C<b, •nd the clta;ts of
quality attributes Su noo·fonc11on•I rrq111rcmcnis. mcmber\h1p m d.lSsc<. supcrd•"•"'· •nd \uh<:la.~.
(....,..... J:gi( . . . . . I_,.. 41 11.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Glossary 465
"''"'"'" plan In 1111lr dC\·clnrmen1, • rl•n 1"'11 'r<"h"' "hen l1"7 roamin1 .\ rrt,..... ,. th,11 -i11t)\\) \\-1rtln> i..lacnt'\ co 1110\C' lrt>nl tlnc
\tnnn "111 i.., 1mrkmrn1eJ .anJ thr 111111ni; ot tht rd.:.•""· Rd~ art J~\ J'<'lnl tn Jnothtr, JUIOtnJl'IC.lfl)' ~<-"lJllllf: >\llh !ht <rrnni;cr
rd.au\ th trc:qumt, •nd t.k:h rde•,... 1> 1r<'!1td •• • "'rrm protO<YJ'C .11..A.:O-' pnnt .JnJ all''""'"~ h>r un1ntc:rrupt~d "1'\h•.c .
th•I .an ht '"''rJ .anJ mod1hcd ' ntt<lcd. route,. .\ dfo,,..~ ch.it "'"'nc:"l'° nc'"''""l ~cnt,, Ja.:nn1nn chc rJ'kb.I
-l• control JOftw&n Arrlt-•1tOll\ th.lt .u.... n " .. tt to ulc dtk.imt 1bu r•rh. apJ l(UKk> rht tln\\ ol J.11.1.
mrr • u<n\ wod-t•non and rm• i<k "'M"'fl "nJ trnuM«hoonn~ sampl1111 .\ rm..n> \\hc:rr .111 nn.al)sr ~olk.;1' .,.. mrln nl .><:<II.ii d•><>
~I l"O"P \ ~t of~ or mott htkl• lh.11 '"" ocrur •ny number umnth, "'h... h .i1<1ld ""lutk rC\otJ.. rq><>rt'>. or .-.onou• fotn».
ol ton,.. 111 .a ..ngk m:••rd.. "'uh ...,h '""urrm..c h.1•m11 dtt!n-om ,-.u~ scal.lblficy \ 1hJr...irmu1 ot J '~"cm.1mpl)11ia thJ1 thr "'ccm 1Jn
....,Ort rooter .\prc•r. JI •ht md "'the fCJ'<lrt. '"" 1n..luck gr.and i.., C"J'•ndrJ. mud1hcJ, m dnwn.ucd c...1ly in mrcc rhc r.1rc.JI, ,h;ing-
mul\ tor nurncn.: field> Jnd ·~htr cnJ nl rcrnn onformmon. mg,,..., .... (If J bu>lll<..., mrerrrue.
,..port h4!•der Ari'<'•" .11 tht h<it1nntng of• rrr<>rt •nd 1dmniics rhc sat.ab!. The Jfl1lil) of J •)>rem co '"f"'"J 10 1111-.,t nrw bu>lll<"»
f<J'<lrt •• \\ tll J\ lh<: rcJ'<)rt llflc, .lilt', JnJ UCher n«:CS>'lty infomntioo. rrqurrt1nrn1' ;anJ \ttlurut'\.
requet ror pro~ (kFP) A "nncn l1>t uf tcaturcs ;i.od specifiQ- 10Jln1 on d•mand !he .1"1!11~ 10 mJ t<h flcl\\orl ""'"""co nttd<
lltlll\ fi!l\l"n tu r••9'J'n-l1\l" \t"OJtar, ht-torr. '\rn.1fh. rtt.x:ILk.t ()f' pl..:kagr: .ot ;any ~" .,, nmc: a f.,turt ol doud 1omrunnR. for cx.ompl<, dunug
h.- ~ ~l<'Ct<d . r<JI. luJd•, i1Jdll111n.ll .luud ••.'f'<r> lntghl U•llK' On fut<' •UluntJlh.;af!\
to <urron 1n. rt.a....J •rnrlln.aJ.._
requ•.c for quoabon (RFQ) l otd to ol-t••n • rn.t qut>Uooo or hod
un a •!""•l" pr..Ju.. I u< l\l•k.Oi:t satte.- d ..rram \ ruol u-cJ b> systcm .1n.al\\h 10 ~urh""U' '"""
rb,, wrn-buun h<t,.rto '"" •MUbks. ,\l,.1,'allt-d ;1.n l\\ dun.
requ•,..,.,..,tl d4!fi111llon• A Jn..11rnon uf rhc '} -t<'ID rc.iulJTIDetlb
tr1lm 1hr u_\('r\ fl't-JUlt ol \IC". u.....uicK In an •Jill< rn>tn.1 • .a rcat.,.orfd c'Amrlc of ho,. u.cr. "111
requ1rTm4!nt1 4!heitatt0n Th< ,...,,.._, ol 11Jth.:·nflll: rtquircmcnts. Su
mrtra..., the 'Y"tcm.
\\.1th
r•.:di11dtn1t Kh4!dule r.... b11lcy \ rro1«;t .:~n h.c 1mrlc1n<·nrrJ on .111 ""'' pcablc
ttmt' frJmt.
requirements en1lneenn1 U>ed on the''''""" pl.Jnrun.; plusc of !he
.,f)I ( h uwol'e' U\10Jl ,,'""" l••I f111drn11 tnhni~ur.. <u..h •< onrer· Kh•ma The rnonrlr•c Jcl11111111n of. J.11JhJ,<. 111dud11•K Jr-..ripuom
VJrw•. 'urvry,, oh.crv.mon, .rnd <.1mrl1ni;, 111 dc'llnhc the currt"nr of .111 f1clJ<, rr..onl>. Jnd rrl.u1nn•h11"
'Y'lcm all(] 1Jcnnfy 1hc rcquir1'111cn" for 1ht new •)'tern. scroll bar In u<er 1111rrf.11.c tlt<ign, n Stroll liJr •llnw< 1he "'er to move
requlremenct planning ph;uo A 1ih.l'e 1hJ1 "m1hlnc' dtmems of rhe rhr<>u)lh 1hc ,l\ alf~bfe <hOM'\ fo1 ,Ill 111flut f1cfd.
'~Mtlll\ j)l,1111111114 and ~y,lrtll\ .111.it,,, ;, rh•'e' nf thr \Of (.. Scru"' A popul.1r tr.h11h1ur fur .1gll< pro1<•1 1m n11jlernr111. l>criveJ
requlrt'mentt •p4!ciflcatlon1 A Jc.crir11011of1hc •y>1cm require- frnm a ru111>1 11·nn In "'-rum, te.>m mcm!>rr. 11l.1y ''""'""role• .111J
ment\ Imm 1hc ,~n•ly\I "' cnginetnng 1,Jm\ ro1nr of \It\\. Lnter;u.'t 1n lnu:n\.C ~\>Ion~.
~h An imronJnc facr. findm~ 1c.;hn1quc rh.i mdude. die r.-.'icw second nonnal rorm (1NF) \ ra:<>nl JNi:n h 111l~F11ti1> in IM .mJ
ut 111urn•h. rcnoJ ...•I-. •nd r-....i., m uhu1n l-•.l11munJ utlurnunon, d •ll hdch !hJI .orr II<~ r.in of 1ht rom;ary kc) .Ire dcrcnJmt llCI rhc cnbrc
lr<bn1<.Jl nuicrul. Jnd nn-s Jb.JUI mJu\11') rrrnd, md dndopmcnn. pnm;ary l~ It •ny ftcld 111 • I ~F rccorJ Jerrod• on uni) nnc ot tllc irdJs
ID J rnmbm.it•Jll J'f1l'Ury ....... mm""' rt<unl .. noc '" 1:-.1. A 1:-:r m;orJ
retponM I.Im• Tht o><rJll tunt l>ct"•= ~ tt<1unc for •r""•tm ann·t~
\\tth a rt11n.1ry ln rlut,., • • · • hdd "aucom.11.. •lly 111 .!:-.I.
:and rhc ddnrr> n( the rcspon-c. In~ l\~JI onlmr rnnromncnr.
"''"''",,.. unw" mc.t>urrJ trum the 1f\u.uo11hc - · J'lfi'° the EXI1o.R secondary tc.y \ ticlJ or'"'"""'"""" of hrld• thJt <Jn ht uwd to
.l'-74.X~~ or n:tnC"\C' rr..:Ut'di. S«ood.an ln \Jlun .lfC' nnc un•~UC". tor
le) or d,..l,' "'"""' hunnn until the n-.iuc,1cJ "-<«n disrt..i 3ppe&n
or rnnreJ ourrut ,, rcaJ>. (umrk'. t•• .h.. '-('' tt\.1,rJ~ f,.,
onl) chcli(' cu ..romcr'\ 1n .a ..,,nit... rt>~I
code. I~ J'l"IJI wdr held "'uld i.c u...,J J• ~ ""'"'Jal} lei .
recentlon p<tnod S..clUJ)' .ire •rurcJ tor J '!'<"-''"
r•'ttllbon period
RC\lnty HJrd,.•rt. «>ttw.orc, Jnd rroaJur•I cnnm•h th.ti ufcpurd
~h<1 "h1<.h 1hc1 art c11htr &.rro)-nl nr the l>••kup mcdu is reused.
JnJ rr<><t.I J >)'1nll •nd lh dJU from mrcrnal nt r.icrnJl thtc-JI\.
NlUm 011 lnvtitmcnt (fl0f) \ J'CR.Cllf.l/;l" 1'te lhJt IT1<"3\UrtS rrofir•
~h1hn hi cnmr.in111 the tnrJI nrr l-mrf1t• hhc rr<uml mr1.-rd from a M!Wricy hole ( rr.11...J hv .a <umh1n.a11on of 01\C' or more 1n1rm1"'rh
rrvtl'\.I IO 1hc wul (<hC. 1the 111\t\tm<lll Jof the rru,....1. ROI. 110121 .:onhgurcJ "'" k.'l'>.
l>cttchb - toul •m••lfmul """ RC1lrity policy \ rbn rh.ar adJtt>-..t\ rhc rhrtt "'''" tlcm~nr. o( \\»
rem .._utll) 1 u1C1hJcn11Jl11-,. mtq:my.:and .11.11bl-1l11v.
""I n~f....,.... \ nct\<url rncmhlon11 ~ ur.k nl wmru1rr> rh.at corn·
mun...,rt "'"' t.>ch c><htr. ~ nnc n<Nork oftm "u..-d "htn wcurity token \ rhl"""' Jc.... < 1lu1 au1ht111 ... .a1t>. kgt11m•1< "~..
rn...o..n11 "' puturmcJ at lo.:al '"'"" rathtr dun at a crn1nl loc:ttion. <U<=h '"' • ,man <Md e>r hyduon dt>-...c.
rKk An C\tnt th•t u>uld .1tlc.1 the rrottt-i llCJ;.>11\d) . selection A conttt>I 1tru"turc 1n m•,dul.1r dN-1~n. tt t\ tht c<tmplt·
.._...,.,II
riJtc \1ca-urn the hl.d1ho1>.J and •mJ'M.t of mJ.s.
cond1t1on.
mtJf(' rr,Jt.t,.~ 'UCplo b.a\C:J t>ft thC' rnuh, ul .1 (t'\l t}r
1100 Clt t\\tt t•r
............ _........ ..........,.a.w ............... ....-..c.......... ----...... - . .................. --,, ....... ,,.,,...............
• .,,,..,_ l!i:D"......,'--- ,• ._...__. ""' ........,... __.. .•........_ ...... .-.,.....nw...-... ..,..._._.,.., ...... .., .............
_..,~_
._..,...__.."'.....,.~
466 Glossary
sequence diagram A U.\11 d1JgrJm thJt show' t he 11miog of tr<m>ac- rtal<eholder An)Ollt who,. affecrcd hy 1hc <omp•n) \ p<"rfonnJncc,
oons lx-n.ce11 ob1r<:h •<the)' occur during <rtcm exccu11on. such as cusromcrs, employee<, suppl1e<', <tockhnldero, and members of
server Com purer on a chent/<cr»er d~1gn thot <upphe< data, process· the com.munit).
in~, .ind~" icn to i.:l1cnt \\ Ork~t.i1wn41, rtand~ne \'rhen P<'r>Onal <Omputcr. first apl'<'•rtd m l.t'll< num-
senke An •rphu11on th.it monuur•, or h>tms on.• p•mcular pon. hcrs in tM 1990, user.. found 1hat lhl') rnuld run their own ''°rd
processing. spreadsheet, and daiaro;,: •pph<.tllnn>, "'1bou1 assi.untt
service <!Mk A ~cntral11ed rt'><>Ur.c \Uficd hy Ir profes<iorutl• that from the IT group, in >mode CJlled '1Jnd-alonc <Ompuung.
provi<ks u~r< "uh the •uppon the) need to do their 1obs. Also called
help desl.. standard not:ation format A ttpt<\ClllJllOO th.it m.1k~ ~igrur1g 1Jbb
easier a.• it clear!) show~ a taMrs <tructutt, ftdds. and pnm•I) kc~.
service piack A mamttnan<< rcka"" •upph<J by wmmcrual wftware
<upplK'.rs. star network A network design with a central device •nd one or more
worksmions connected to 11 1n a "''> that forms a ;tar pJttern.
servke provider A firm that offer< nut)Our<mg solu11ons. Two popu·
lar out50urctng opnons mvol•·e \5Ps and firn" that offer IBSs. start day/date Thr d3) or Jate when J t>'~ 1s 'lhcdultd to hq:m.
servic.,.orien~ed A <ompan) that prtmarily offer. information or sta.te An ad1ccnve that d"'lenhc; an oh1c<t\ curn-nr >IJtU• (r.g.• a
<er'1ces or .ell< g<l<ids prodm:ed by othct\. srodenr could he• CURR F.:-.T. FUTURf, or rA~T m1den11,
significant digit code (.1phcr that do<ttngrnshc< items hy using a scnes state transition dlaeram Show< how an ob1e'1 <hangcs from one
of subgroups of d1g1t~. U.S. r ostal Servkc tip code>, for cJG1mplc, a rc srncc to another. depending on t he events 1h:rr •ffc..t the ob1eu.
sigmfic;int di11it cod es. status flag In ~tru"rured ..•prlu.:ati<>n de,·tlopnu.!rlt, Jn iu<lu:,ltor that
slmuladon A tire<> rehcar,al for mer. and Ir • uppurt su ff. Organiza· nllows one mod11lc to .;end• mes<.1ge II> '11101hcr module.
11011< typically include all procedure«, 'llch J• thmc tha t they execute storyboard In an agile pro1cct, a simple graph ic ori:ani1cr rhat helps
only ar rhe end of a month, quarier, o r year, 1n their simulations. sysrcnl:s annlysrs vi~ut\liz~ chc 1it:t 1u~ of.\ projcc.:t.
sink An cxrern:il cnnry chnt rcccavcs thua from un 1nfor111Jtion ~yste1n. strategic planning ·1 ht procc~s of 1clrn1ifymg l111111 1cm1 org.rniza·
site visit A trip to .1 phy>i<.1l loc,11io11 w observe (I system 111 use at tional goaJs. .srrarcgic'i~ nnd resource.
another loca tion. rtrateglc plans The long rnngc plans rhat define 1hc corporate mis-
slack time rhc amoum of nine hy which an e1•c111 can f>c lotc without sion and goal<. Typically defined hy 1op 111nnn11en1en1, w11h inpu1 from
all levels.
delaying the pro1ecr. The d ifference bc1wccn lnte>r completion tune
(LCTI anJ earlic\t wmrlcuon 11111e (ECI ). str.atified umple /\ -;c:t mcmc 1~ collected acro1\ functional nrcn1. For
cxao1ple. n certain perct*ntaye o( rranut.Ti<>ni from C\ICty \\<Ork .).hift, or
soc-ial engineering An 1111ruder u\C\ ~<•llll 1ntrt.li.;11un Ct> N.un access
to • com11urcT 'Y'tcm. five cusromer\ from ea<.h or four" '' coJ._, <ClulJ he a .rrat1f1l'<l >ample.
structure chA.rt A top-.do\\'O rcpr~cntou ion of hu\1nr'S'S funct1nn\ Jnd
soft skills Commun1canoM. 11ncrpcr<0na l skills. pcrccpnvc ab1hties.
and crmcal thinkmi: nrc wit •kill._ IT prolc;,1onJls mu>t haw so&
prOO!Sses. Also CJ lied an FDD.
"'111' •• wdl a. 1n.hn1<al ,kill> structured ao•lysis A cradmon•I >) >tcm~ dc1dopmenr tt-..hn1qut that
USC'S pha ..... IO pion, JnJl)"IC, Jc<>1gn, llllJ>ltmcnt, Jnd SUJ'J'Orl •n infor-
software A program run hi rnmpu1r" for a 'p«1f1c fun<uon or 1ask.
mation sysrem. Proccs<es and dJt3 arc rreatcd "' <cpar•t• components.
Softwa,.., as a Service (SaaS) A model of •oftwJrc dcl1~ery m which
structured bralnstormin& A group d1...:u"1on "hen- ca<h p;amcipant
funcrionahl) is dcli1·cred on demand ~> .J nttwork·acccssiblc sen ice,
speaks when n rs hrs or her rum or p3'5es
r:nhcr than as a tradmonal sot"' are apphu11on th.it"' dmrnloadcd
and msralled on rhc cu'tomcr's computer. structured English A sub.ct of \landuJ I nghsh 1hat de"nbc. logical
J'Toce<SC' clCilrly and acrnr.ucly.
software encineerin1 \ )Off\1are Jc• clopmcnt process that srres~
solid design. tffr.:-ri1c 'rruaurt, ae,ut2tc Jocummt~tion, and careful Structured Query Laocuase (SQL) A qutl') langua1<c ch•t allow>
trsnng. PC users to communicate \\·1th stn·trs and n1a1n(ramt' computrrs.
software license J\ lei;al agrtrmcnl that gives use" the rrglu to use structured wal k-throush A "'""'' of a pro1c..1 tcJm memher\ worL.
the software under ccrr.11n rerm~ and condmons. by other memhc..., of the 1eam. C'.en<ralli. 'Y'tcms an.1l)'h rc•icw the
work oi o rher S)"Stems analy.rs, and programmer> rev1<\\ the 11ork of
software pacla1e Software that is pur,h.Jst-d or leased from another
ochre programmtrs, as a (mm ol pttr rrvoew, Stru.111rcd walk·1hroughs
firm. J\ comm<r~ially produ<cd w fl\\ art prod~t. or fanuly of products.
should rake pla"' 1hrolll\hour the SDI C and art CJllcd requirement<
software reengineerin1 U\e< .rnalylllJI te<hm11uei. 10 idennfy poten· revle'' ~,design review~. lode rcv1C\\'.). or tC)Ung review), df:-pt:ndmg on
tial qu•liry .ind (l<'rforninncc 11nprmcmc1m 1n on information sysrcm. 1he pha<e in which 1hey occur.
software vendor Company thnr develop>;,ofrwarc for >ale. stub testing J\ form of rcsnng '''here the pr~r.im1ncr s1n1ul.1rc' c<1ch
source An e•ccrna l ennry 1ha1supplies 1IJt.1 to ;111 informarion syscem . program outcome or result nnd displays n mcss:111c ro 1ndkatc whcrhcr
or nor rhe progr:un executed \Uc:cc,~full}. [ach )lllh rt.!prfi4!n~ Jn entry
source data automation 1\ popu1nr onli11.: input n1c-tho<l that <.:On1-
or exir point t h:u will be linked l.ucr m :inor her progrnm o r d"r.1 file.
h1ncs onhne darl'\ entry and nuron1.ucc.I J,ita c~tprL1rc using input device'
such as magnetic dnh\ ~rrip~ or S\\1 1pc ~c:inncrs. su bclass A further d1vi, ion of oh1ccu in n cl.l«. \uhcln,~c~ .ire more
specific caregorlcs \\r1thin n cln'li.
source document A form u;ed ro rcque.c and collccr input datn, trig·
ger or au1horite .111 input nu ion, nnd provide a raor1I uf the orr1tinal subordinate module A lo\i.rer-level n1otlule u1 a ~trul.ture <.:ha rt.
transaction. l)ur1ng th<" input dc.;ign ~tAKC, rou dcvclor ~ourcr docu- subschema A view cif the dnrnha<r U\cd hy one or more >)Sl<nh or
mc·nts th:lt Jre easy to corn piece nnd lncxpcn~i' c. users. A sullschema defines only thn<c pnrrinn' nl 1hc dntaha<e 1hn1 J
spiral model A development model w i1h a scrie• of iterations. or rcvi· particular >f>ltlll or uocr need, or 1> allowcJ to"""'~ ..
sions, based on u'er fccdbJ<k. subscription model A servict model th.u ,h.,11es J 'Jnablc le<: for an
spontaneous generation An unc,pln1ncd gcncr.111on of dJtn or mfor- apphanon basro o n 1hc numhcr of u<cn or worl.'t>llOn< that have
mauon. Wi1 h respect 10 OfO,, prncts>e' c.111101 ;pontancousl) acce;, to tbc appucauon.
gcneratt dJtn llo\\s-th<) mu\! h•vc an input ro ha.e an output. successor t.ask E:ich of rhc concurrent tJ.<ks of;> rrcdtces>-Or t,1sk.
summary report A reporr u~ hv md1v1duals at higher levels m the system software Pr()jlr.lm> tha1 mnrrol rhe compurcr, mcludmg the
ori:•mzatmn thJt mdud~ le~~ deu1I rhan rcpom used by lowtr-levcl oper.rnng sy<tem. device driver. thM communrcatc w11h hardware. and
c-lnplo) e~. lo\\ -le>el u1dt11e..
supud;us A mnrt jlencrahud •aftgOI') 10 wh>eh obiter< m.lf belong system tMtins A forin of tcurng invoh mg •n cnurc 1nform.111on <) •·
i<.g.. a 1'0V[L d••» n11ghr h.:long to• •u~rcbss called BOOK). rem and UlClud.'S •II t>pical prou:>SIDJl 'flUJllOnS. Dunng • <)>ltm test,
supeNSer account A lc>i:m a<counr thar allo\\ > """'nuall) unre- users cnrcr dara., including s.implts or Jtrual or live d•ra. perform qu<--
•tncted JC"'°'' 10 the a('l('lh•JllOn. ncs, and produce repon< to <imularc actual opcranng condmons. All
procnsmi: Option> :and ourpui. in: -.ril1eJ b) u~" and the IT pro1ttt
supply chaln .\ trJdmonal s~·,tcms dtvclopmcnr !«hniqll<' rh•r uses dtvclopmem ream ro ensure rh~r rhe \)\ltm fun.:11011< cnrrtcrly.
i>lust• 10 plan. •n•I) u:, design. 1mplcmtnt, 111d supporr an infocmanoo
>) >tetn. Pnxcs<e'> and dar~ att trearcd as scpaure components..
systematic sample A ;ample Wt O<CU" at • pttdettTmrned pcnod1c-
11y. For eX;1mplc. e\Cty rcnrh cu>1omcr rc<:orJ 1111!;111 be selected as a
•upply chaln manapment (SCH) The <oorJ1nauon, inlt"jtrauon, ~y\tc:manc ~.tmplc: for fC"\·1cw.
and man.1gemen1 of matcri.11<, inforinanon, and financ" a< thty mon
from suppbc" 10 cu•tomc"· borh '"rhin and bct"CC11.:ompanies. In a system• analysis and dcsi&n The p~S of dcvdopong mforination
corally mrcgr>red <uppl) chain, a customer order <-Ould cause a produc· sy.,cms thar cffccfl•ely u>t hJrJware, ;olrwJrc, d.ra, proce<>>t•, and
tion pl•nning ;y.rcm ro "hedule a "ork ordcr. which m rum could prople to supron the company\ bu""°'' ob1C'<11vc,.
tr1~cr a coall for tcna1n ran~ fron1 ont' or n1orc suppht"rs. systems analysts phase The ""'ond SDLC pha.e. The purpose of th1'
survey A d0<.ument conrarninl\ a number of standard questions char pha<c ;, 10 build J l<>itlCJ I model of rhe new 't'tern.
can be .cnt tn m.111y ind1v1duals. Al"' called a questionnaire. system• an;alyrt A J>C™'" who plan<, analy1c5, and 1mplemcnr< mfor·
swim lanes In a hu<1ncs< prncc'< d1agmm, the m'trall diagram is marion sy,tem>. They mO) work 1nrernJlly within a compan) 's IT
rnlled J pool and 1hc dc>ol(narcd <U>lomer ""'are called >Mm deponmenr or I~ l11rcd hy .1 ct1111r.111y "'an indcpendtnr eon<ul1Jnr.
lane~. systems deslin phase The rhird Sl)I C: pha<e. TI1e purpose of S)•tems
switch C<:nrral nCt\\'<Hkmg device in a''"' net\vork. wh1<.'h manages de>1~n ;, Lo trcalc a blucprim for rhc ne\\ •Y" em rhat will ,ati,fy all
the 1mwork anti°'" a> n •ondui1 for all 11e1work rraffic. documented requirements. wlm hcr rhc sy<rcm i< heing developed in·
switchboard The use of command hurrons m 3 user interface to house or purchased n< n paLkngc.
enable ll><rs ro 11avig.11e a •r•iem anJ ><!l«I from groups of related systems development life cycle (SDLC) Ac11v11ics .md foncuons
casks. that systems developers typically perform, rogardle<s of how those
SW OT analy•is An cxamma11on of a comp•n) 's >crengths (S), \\eak· <1ctmhe> and foncuon' fot mto n parucular metho<loloi:y. The SDLC
ne"c' (W). Of'lf"lrlllll1t1e<> (0). and rhrc:m (T). model mclude• five pha<c<: ( I ) '}"ircm< planning, (2) sy<rems analyst.,
!3) sysrems desil!Jl. (4) •yne1m 1mplcmenrntion, and (5) systems sup-
syntax error Programmmi; l.inguai;c gr.immar error. pon and "'uiriry.
SysH L A dl3lc.;1 of UMI 2, u<cd for representing reqwrcmtnts (and systems implementation phase The fourth ph.1<0 of the SDLC. Dur·
other thmjl>). pnmMtl) 1n ~IBSF .1pphca11on_<. mg thb ph.uc. the nc" •~>Wm r> rnn;tru~c~pr()!lram; are IHltltn.
system A >el ol rclarcd cnmponenrs rhat produces SJXC1fic results. tested, and documented, .md rhc S)StCm 1< onnallcd.
system <>dmonlstrator A pcr<nn who rs r~pom1blc fnr the CM and systems plannlns phase The f1r<1 pha<e of rhc ~l)l C During rhi<
maim<nancr of an oq:an1tat1on's compurer nerworls. ph;ise. the sy.icm~ proj<et i:ct' >1aneJ. The pro1n.t propo>31 is e,·aJu·
system architecture A 1r.10,lat1on of rhe logical do1gn of an mfor· atcd tO dcterinmc ff< fca<1h1llf). The prOJCCI managemmt ('llan IS
mauon >)>rem mto • ph)>ical ,rrunun> 1ha11ndude. h:ud"are• formulated." 1th the help of CASE 1001• "here appropnare.
.oft\\ ue. nec--.orl. 'UPJ><>rl. and pr0<ernng mnhods. systtmS prosrammer A pc™.>n \\ho \:O"'-entrJt~ on oper.1t1ng S)!lo~
system boundary 'ho"< whar i< mduded and .-eluded from a S)'S• rem software and uulmc-,
cem. Depicted by a sludtd ttcranglc in use cast diagrams. systems request A forinal appeal to the IT de('l3rtment that
~ribcs problems ot Jcm.J <h•n11<> man mformauon sy.,rm or
system ch;on1eover The pro.;c;. ol puning rhc new rnfocmarioo ~>
tern onlme and rcunng rht old <)'Stem. Changro\'cr can be rapod or
bus111ess process. h m1gh1 pror<>~ enhanctmen1> lor an e-1mng
;low, depending on the method. sysrem, the correcuoo of problem>. or rhc Jc, dormem of an ennttly
oc-w ~)'"tern.
system deslsn specification AJ0<.umem thar P'""""" the complete
dts1gn for rht new 111forina11on •>·<rcm, along with dcca1lcd costs, staff· systems request A formJI rcqu<>t rn the IT dcp•trtmcnr th3t descnbes
mg, and '><hcduhni: for complermg rh~ next ~OLC pliase. systems problems or des1tcd cbangn m Jn 111lu11na11on sy.rcm or business pro-
1mplcmcnm1un. Also c.1lled the rcchmcal drs1gn spcc1fic.uion or the: ctss. h moght propose enhancement< for an cxis11ng <ystt'm, the
dct•ilcd deMgn ~pcc1f1.:a11on. correction of problems, or the de,clopmcnt ol an cnnrely n"" >ysrem.
system documenutlon A dc"riJ>tton of n 't"em·s funcciom and systems reYiew commjttee A Htuup of ke) nl~n::i~er\ 01nJ u..e~
how rhe) nrc unplcmcntcd. The »na l)sr prepare< mo<t of the system respon<1hle for evaluatm11 <ystem• reque<r<. The rerm compurer
resoltrl;C!, ..:01umjttcc i~ t.01nettnl~ ~11 ...o u~td.
documenrnt ion d11rin11 rhe ~ysrerm ana lysis and systems design phases.
!>y>1cm documemJ11on meludc\ J,11a domona ry entries, DFDs, object systems support and security phase Ouru111 rhe <y<rems support and
models, >erecn la)·ou1', source document;, and rhe sysrems request that securiry phase of the SDLC. 1he IT scoff mn1n1.1in•, enhances, and pro-
iu11inttd the prtJjet.1. 1a:rs the '>'~rem.
system prototyping l'rnduci1111 .i foll-fc•rurcd, working model of •he table l:ich file or rahlc con1,1in• tlar.1 ahour people, pl.ices, rhmg<, or
infotmnrion sy>1cm ~'"II de' eloped. events that incerncr with the 1nformauon 'Y<tcm.
system requirement A char.1<1em11c or feature that mu•t be included table design ~pecifie• the f1elJs anJ 1d<n11flr. th< primary key in a
1n do 1nforni.\ntin ,y.,rcn1 to <iJn'f) ho4iinc""i<i rrqu1rrmcnt'i and be particular t,1hlc or file.
JCcep13blc to U>Ct>. tampe....,,,ident c"'" A cJse dt<igncd to show any ottcmpr to o~n ot
system requirements doc:ument A <locumt-nr that conram.s the unlock the ca~.
rrquircmen1> for rht• new 'Y<fem, dt>Senbt-<i rhe akernahHS that were tangible benefit. P<h1me ou1<<m1C' rhar can he meJ<urtd 111 dollar<.
~ons1drreJ, .ind make>" >p«ifi, ra:ommenJauon to =i;emenr. lt i> They can result from a de.:teasc 1n cxpcn'e" an increase in revt'nues. or
the end rrodu<! of the \)'<ICl11\ ;tn;ll)'"\ pha<e. both.
Qngible costs l:xpcnscs 1hJ1 have .1 'l''"'llL dollar value. E.xampl<S toolbar A GUI tlement that i.:ont..lul~ icon\ or hutron~ char rtprtsenr
mdudc employee s.ilaroes and hardware purchnscs. shom:urs for cxec11nng common command<.
task Any worl 1hat has a bq:onnonit and an C11d and requires che use top-down approach A design approJch. :11!>0 called modular design.
of u1mp.any rcsour.rs mdudon11 pcoplc, ume, amVor monci- f'<amplcs "here the S)~l•rn• arul)St dcl1n<"> ti~ O><r•ll ohjnm<"> ol the ')'tern
include conducting • <cnes of ml1'rv1<""•. designing a rcpon. sdccnng and rhcn breaks 1hcm down mro •uh,J<t<m• and modules. Thi•
sofn,Mc, wamng for the Jch•er} of equipment, ;inJ crain1n11 u~rs. &e breaking-down prOC<>> 3M I> <•llcJ romCIOllm!(.
also actmty. tot:al cost of ownership (TCO) A numhrr used m ••<e••1011 cow•,
task box A <omroncnt of J Pl RT/CP\I chan th.it cootams 1mponao1 which includes ongomg supron and mamcenan<e <O<h, •• well a<
.chcdulmg anJ duuuon 1nlom1anon •bou1 a t•>k. Each task ma proj· acqua..s1non ro~t~.
cct 1s rcpresert1ed h) 11\ <mn '"'ho' 1111hc Pl RTK.1'111 <han. totals zone If a form h.u data totab, chev "111 arpcar m rhi< <ccnon
task croup A IJSl rh.11 rcrrcsent< sc-cral 3W\ 111es. oi the form.
task ID A number or code rhar uniquely 1dcnnfies a rask. traeeability The abwt) co follow a ~quirrm<m b.tck\\ nd to If> on-
gins and forward through rhe 5()1 C to linl dt"1gn documcnr>, c<><k
task name A brief dcKnpri'c nome fo1 o task, "hich docs nor have ro
be unique 111 the pro1«t. for complc, a 1a-k named Conduct Inter· fragments. ond rest arufatrs.
VleWS might appcJr m <cv<ral pha~c< Of the projeCt. training plan .4. .s.ucce~~ful 1ator1n.i11on !1-)'ifem require' rra1n1nJt (or
users, managers, and IT .raff mrmt>cr<. Ille rnurc <r•rem• dr»clopmrm
task pattern A logical sequence of 1.1'1" m a WBS. Cnn imol"e
effon can depend on whether or no• people undeotand rhe •)>tem and
""quenll•I ta>k>, 111uh1plr """'"'"' ,,,..k<, and muluple prcJcce»or know how to use 11 effecnvel)" The 1rainm11 pl.111 "•document 1ha1
tasks. details thc>t> requirements.
technical feasibility When an orgnm~rion ha~ the resour<Xs 10 tra.ln·the·traJncr A 4itr01tt~) where one j.\.roup or u'ef\ h:i1i heen
de,·elop or purcha\et in'!.CJll, .ind opcr;.ue 1he S)''\ten1. trained and can assist others. Use" ofmt lc.1rn more quickly from
technical support Ted1111cal bU(!l>urt "nccc'>sary to sup1><1rt the wide coworkers who share common expcricn..ce and job responsibilities.
varicry of IT i.y.icm; nnd u>Cr\. Ir indudc• <ix main funct.ions: npplica- tra.nsactlon model i\ scn•ice model !11J1 dtn1'!4C>" vnrn1hlc fee for an
uon <levelo11111('11t, ~y\tc1n1i ~urpon, ui,er tturrorr, d.unh.•).e application ba!iOO on rhc volu 111c of tran)l\Ct1on1' or opcrarion' per·
admini~rrruion. nct\vork Jdm1111'\tr:tt1nn, and \veh ~uppon. These func· formed bi the applicauon. Al>o c.1llcd • u'Jl\C model.
tion> overlap cons1<lcrJbly and often hnvc different nnmc.> in d1flercnt
COITI p<1 111t"S.
transaction processing (TP) systemi 011<ra1m11.1I 'Y>IClfh ll~<'<l IO
process da) -m-da) recurring busme<~ tran-.c1111n,, such "' cu<tomer
termina.tor A D~D <ymool rh.tt 111d1cacc< a dar.• ong10 or fi 1u l desri- billin11.
narion. Also called nn c'rernal cnuty.
tran.sferenc.e One ot (our n~k control stra1c~1cs. In (r,1n\tcrcncc:. nsk
test data The dara u~d 111 unit testing. Trst daro should cont:lin both is sh1fred to anorher asset or party, such a• an m•urance compan)'.
correct data and crronr<1u\ dMa .rnd <hnuld IC\I all po•mhlc <1tuat1om
[h;n could occur. transparent A ocrwork is rranspJrcm if J u...,r SttS the dara as 1f 11
Yt'ert 4'tored on h1\ or her O\Yn worL~tJtl<tn.
test-driven development (TDD) An XP rnn<epc thar unir re"s are
dn1gncd before codr 1> wnnrn, focu<ing on C11d ~•ulrs and preventing transparent interface A user mtcrfacc 1hat u>ers don't really no11cc-
ptO!{rammer> from >trayll\I\ from rf\eir !(Oal•. a user-fnt'odlv imecfJcc rhJI Joo no< dmrau the u"'r and calls no
attcnuon to ,;<elf.
test environment The tn•ironrmm rhac anal~"' and program=rs
uSC' 10 dt.. tlor and n1.;i1nta1n prt~rams tunnel A secure network ronnecuon c<.rabhshcd bcrwcm 1ht client
and the access po1m of the lcxJI tmran<1.
test pW> A pbn <k<i1gncd h) • <> 't<m< an~I) ,t thar mdudrs tcsr <Leps
and lt:Sl d:tt.l for uuegr Jtion Ut~un~ JnJ ~)')letn tc~11ng. tuple A tuple (rhyme• with couple>. or rrcord, 1s a <cl of rclarrd fields
rhar de<enbes one msr~occ, or mcmhcr of an ennri. •u~h as one cus
testinc review Stt struC1ur.O "alk-rhrough. romcr, one order, or unr prodU<.I. A ruple m111h1 h3\C one or dm:<.'1•> of
thick dient A ,vs1em dc>1tul 1ha1 ltxJI<> most or all of the arplication fields, depending on what mformauon 1< nttdcd.
proceS<mg loi.1c 01 the chcnt. Al<o called a far chem design. turn..round document Outpul documt-nt tha1 1s later entered back
third normal form (lNF) A record drs1gn 1s 10 3:-\f 1( ir j, m 2:--1' into the same or another 1nfonn01uon S)Siern. A telephone or unl1ry
and 1( no nonley f1dd "dtpcnJ~nt on another nonley field. A nonley bill, for example, m1ghr be a rurnaround documcnr pnnred hy the
field IS a field 1hat "not a cand1datt key for the primary key. compan)"> b1llmg >)Stem When the hill" returned wuh paymeni, 11 1>
scanned u110 the company"< o.cnuim rc.:eivahlr S)<t<m en rt•cnrd rhc
third-party software An apphca11on that i; not de•elopt:d in-house. pa)'mem accura<cly.
threat In mk management. an 11nernJI or tMernal or e><ternal emiry turnaround time i\ mca;ll~ .1ppl1cd 10 (Cnrral11cd haich procr"'mll
th.at could cnda11gcr an a.)~t't.
opert1nons, such 1\'i cu~tomcr h1ll1ng or cr~du Cilrd ~rarcnlcnr flrOCCS'i·
three-tier deiien In a thrcc·ricr <lc<111n, the "'er intcrfocc runs on thr ing, Turnaround time mea•ure"' the time bctw~rn >11bm1mng a request
client and tbe data i> >tored on the .erver, 1ust ns in a rwo-rie.r design. A for informa11on and 1hc fulflll111cn1 of 1he requc<t. T11r11<1round 11me
three-tier dc<111n nl<o h,1< a 1111ddlc lnycr hc1wccn 1hc d 1cnr .ind <ervcr also t-an be used to mea;ure the q11al1r) of IT support or services by
rhar processes rhe client requc'r~ and 1r,in,lnte1 rhem inro dar.1 access n1c:asuring the t1n1c from .1 user rr:quc!lit fC1r ht:lp to the rc\olution of the
commands chat can be under.1ood <llld carried our by rhe sener. problem.
throughput 1\ mC'•''urC"mcnr o( r1t.ru.1I -.y~1c1n pcr(nrn1:1ncc under spe- tutorial A series of onlinc i111era<11ve le;sun< that presem materinl and
cific circumstances ltnd is affected by ncrwork loads and hnrdw<HC provide a dialog with u<rr<.
efficiency. Throuw•pu1, hlc b.mdwidth, 1s <xprt>><d as a Jara rramfrr two-tier design A network dc;1i;n where the 11~r mterfacc re~1des on
rare, •uch •< Khr>•· Mhp,, or (1hP'· lhe client, nU dJta res1JC.!. on the servcr't and che appl1t.:.1rion logic can
throwaway prototypln1 See dc<ign prorotyping. run c11hcr on rhe str\'cr or on the client or h<' d1"1dcd hcrwccn the ch-
tlchtly coupled lf moduk'S are tti;htly rnuplcd, <;ne module refers 10 enr and the ser,.er.
Lnte:rn.aJ l~tc ~ont.uned in Jnc>ther nltKlulc. unencrypted Data that i> not encryprcd.
toggle button A C..UI dcmcno u<ed to rrprc<enr on or off scarus. Unicode A ~i.ri,dy recent coding n~chod rhar rcprc•C11r< characrers
Chckmg tne togglr bun on "'itches ro rho orher •rarus. as integers. Unlike EBCDIC anJ ASCII. "h1ch use c1gh1 h1r. for each
charact<r. Un1wdc rcquirl"S 16 b11, per charactc~ which allows 1t to user-centered A t<rm th.JI md1catc<, the pnmary ftx:u• is upon the
rcpr=nt more than 6~.000 unique ch•ucters. u~r. In a u5Cr·ccntercd sy<tem, the dmincuon blurs between mpur.
ourput. and tbt interfo«' it!>Clf
Unified M~linc Lancuace (UML) A widely used mcrhod of ..-1sual·
LLUl8 and do..umennn1t ;ofmarr '>''<rm design. U\{L u.e" user'> Stll.eholJ..r. ""'de and out>1de the i;ompani "hu "1ll 1nteracr
ob1c.:1-onemcd Jcs11tn wn..ept<. hm u is mdcpcndmt of any spcofic mth the S) <tern
programming language and can h..· u..nl to d~hc busan~ processes validity check A ryp<" of dJt.l validation check that 1s used for data
and rcqwtcnu:nr> gcncralh. 1rems that mU!.t tu\e ..:~man '.t.luc>. l·or eumple.1t an tn\enrory !ty~·
unlnterru.p tlbl• power supply (UPS) &ntery•po\\cred b:idup power rem ha< 10 v•hd 1t•m d""''• then an) input llt:m tlut doc< no< match
wun.:t th;ic en.J.hl("\ <>ptr.1uon~ cu (Onunue dur1n1t shorr ..rcnn p<>\vcr one o f rhe ,-ahd dJssc• will foil rhe check.
outage<, •nd iurgC>. validity rules Check\ that are •pphed ro daD elemenrs when d.1ra 1s
unit tutinc ~ l<'iflng of an ind1ndual program or module.~ <mered to cmure tlut the \'3lue entered 1> valid. for rumple,• »!tdJt)
ob1~thc 1> to 1den11fy and dmunatc e"ccucion error> thar could cause rule might require that Jn emploicc\ ;.1l.ir1 nmnbcr he "uhm the
the pmgram tn tcmunatt •hnornully •nd lo11ic errors that could have emploier< predefined ran~c for that po<inon.
l:><cn mmcd dunng dcik ch«k1ng. value-added "'seller (VAR) A fmn that cnhan<e> a <Ommetttal pack-
U niYersal Security Slot (USS) C.m he fastened t0 a c•blc lock or age hy addm1t cu;rom le•wrrs •nd wnfigur111i:; 11 for a panicular
laptop at.rm. mduscry.
unnormalized A re~.cud th:it t:.onr31n' ;t repeaung group, which means. v..nion control The proc•>S of trnckmi: si·stcm releases.
th.1t a >1ngle record h,,, multiple oc.urrcncc~ of a parncular fidd, w-1th vertial applic.atlon A •<>ftware pJckai;c that hu> been developed to
each o..-.:urrencc ha\•mg difforem v•lue.. bandle mformauon rcqu1rcmc1m for a ;pcc1lic t)pc of bu<ine<S.
unstructured b r ainstorming A group discussion where any partici· vertlal system A sy<tcm dc<igncd to ntret the unique requirements
pant l.lll ~1>e:tk ru Jll) 111nt. o f 3 specific bu;ines> or industry, such ll~ a wcb·based retailer or auro-
usability In mer 11urrfocc dc;ign, include< """r
•ati•facuon, •upport suppl) store.
for businc_, fu1mion~. nnd ~y>tcm cffect1vcncss. vir tual private networl( (VPN) U>e' a pu bl1c network 10 conncc1
usability m<!trlcs Darn thar mrcrfoce dC'lignen cun obrnin by using remote users securely. Allows n rtmme chenr m u<e n spccin l key
M>ft\\<Jtc that CJ.I\ rt."r..ord .ind 1nc3i.urc u..cr 1nreracr1on.s \\'Uh the- .sy!rlotC.-m4 exchange thJ1 mu-;t 1"' authenllcJt«I by the VP!".
usaee model Set• tran>ac1 ion model. vulnerability A ~e<.:urity \\il'JL1u.>~~ or ,oft ~1'>(>1.
use case description A dc-.nption in UMI ch•r documents the name waterfall model !'he tradmon.ll modcl of •oftwarc dc,dopment.11
graph tl1at depicts t he rc;ult of each SO I C pha<c flowing down 1oto
of the u<c '·'"'· 1he .1ctor, .1 dc<erip11on o( the u<e case, a <1cp-by·stcp
Im uf the ta.b requ1tcd for >11..:CC'->ful wmpleuon, •nd other key the next pha"".
docr1puon; •nd a;;urnp11011,. W eb 2.0 A sc.;ond 11enera11on ol the \\cb thJt enJbb people 10 col-
laborate, mtcracr, and •harc mfornuuon much more dynamically,
use ca.se dla1r~m A \l)UJ.I rcpr('\.entarton thdr 1llu')ltd.tCS th~ tnrcrac-
based on conrinuouslv ••~LIJblc u;cr •pphcauoni ucher 1han sraric
tion between uier. and the mformauon •y•rem m UML
HTML web pJJ.ih. lnterJUl>r expcneri.;e "a h.tllmarL of Web 2.0.
use a.se Reprei<nts the nc~ in a •pccific busin~ funcnon or proass
webast A onc-"'*'Y rr.1n,m1ss1on of 1n£orm.;auon or rr.11n1ng marcr1~
ID U)',1L.
such as a Web1nar ~''°"· a,·J1'3hk on dtmlnd or for a spcctftc pcnod
uffr appllatlon l'ro1:um, th•t uuhic StJnd.1rd busin~s software. to onlinc panic1pants
•u...h •; M1Cro..oft Olh~e, "h1ch ha< been configuttd 1n a specific man·
web-centric A ..tr•t<g) or aprroa~h tlut cmrlume< a high dqtrtt of
ocr to enhance u;cr produ.tt\lty.
mtcgranon with other wrl>-h.ivcd ~on1roncnt,. A wrl>-cmrnc arch1t«·
user deslcn phaM In th" pha\C, u...,n interact with si >temS :malis" mre follow• Internet M'11\ll protocol, and enables a compani' ro
md de' dop moJd, and pro1orypes th21 repr~m aU <ysrem procases. 1nlqtralc 1hc nC"w applu;auon uuo It\ t<nntmcn.t' ~fr.Jtqt).
output>, •nd input<
we.binar An lntrmt't·h~\td 1ra1n1ng "tt'.S\1on 1hat rrov1des ;in 1n1tr-.ac·
user documentation ln~rruct10n\ and 1nfonnanon ro users "'ho WJll nvc c~iienmcc. The word u't'bm.ir comlun~ rhe words u1'b and
mteracr '"th the si;tem. Includes u<er manuals. help screens, and sn,uniJr.
cutoriah.
weight An llllporta.nt multtpUe:r that n1.lnajtt" f:h. .tor inro csr1n1;,ire-11; 'o
us<!r interlace (U I) fhe mcch•msm 1hrough "h1ch the u5C'r intcratts thei can be analyzed.
with the 'Y"Cm. The mtcrfocc can 1-e graphical, te•ru31, aun1l, or 3
w hat-if analysis A kJturc of hu<me'< iupporr <yitem' thnr allows
combmntion of different modC'I of 1ntcr:icrion. analy>i> to define anJ J"ount for a wide vancty of 1'SU<> lindudmg
user Interface Jn,Judt" ...:rcen,, C<)n11nands. controls. and features issue' not rnmplctdy drfmcd).
thlt enoble u!>Crs to 1111erJct more cffow .. dy w11h an apphca11on. wide area network (WAN) A network <panning long d1<rancc< rhat
u1<!r productivity syotems Applirn11ons thar l'rovide employees of all can link users who are <ontinenrs aparr.
lo"d< a wide arr.1y of cools m m1provc 1nb performance. fxamples W i·fi A lliance A 11onpro f11 imcrnatlnn:tl .1>so.:1orion formed in J 999
include ctnail, word proi:es'iing, grnph1c~. and ccunpan) intraotb. 10 eenily m1ewpernh1lity of wirclc" 11rrwor~ p roduct< ha<cd on IEEE
user rights U><r·•peufk privilei:es t hot determine che type of acce>s a 802.11 specifirntions.
u<cr hn, to a d ata ha«, file, or dirc<1ory. Al<o Cll lled permission<. W I-Fi P rotected A ccess (WPA) A common method used to secure a
user stories In nn agile pro1oct, a «'I of more rtfincd rcquiremcms wireless network. Tht' .1ppro.1ch re4u1rc~ e.\l..h wircle'" client be con·
dcmcd from fc.iturc;. figured manual!) to use a special, prc·~hnrcd ~ey, rather than kei pairs.
user story In agile development, J ;hon, >imple requiremcnrs ddini· The most recent nnd more secure \tri1on 1s WPA2.
t1on pro\ 1Jcd h) the 4-U\tUrne-r. Pro~r:tmn1et\ U\e u-.er !.tnrlh to wild A web-b.tsetl r<)X»itor) ol 111formn11<>n 1hnt •nyone c.tn n.:c..,,,,,
dctcrm1nc a prOfC'~l·~ rcqu1rcmcnr~. prtor1n~ nnd ~ope. con1r1bute 10, or mod1f1.
user trainfnc packace The m31n oh1cmvc of a u~r training package W i-Max IH~ H02. lfl <r<:<1f1<aflon<, which ore c><p<"Ctro to enable
1s to ;how u~rs ho\\ the s~-stem can help them perfonn their jobs. wireless multtmedia •pphca11on> wuh n r.rni:e of up to 30 miles.
W ired Equivalent PrlVllcy (WEP) Onr of rhe r.orltcst methods used work breakdown structure (WBS) A proJclt hrol en down onto•
to ""'urea wire)..,., nrtwork, >Upcr...,J•d b) WPA and WPA2. sen es of smaller tasks. Su alsn Gantt chart: PERT/CPM chan.
wireless access point (WAP) A central wirelt-> de' re.- that worst-case estimate: The most pess1m1stk outcomr.
pro' 1Ms nctworl.. ;er> ICC> 10 wircie>S chenh. 1\1,0 c•llcd an access WPA2 A "irckss se<:Urit) srand.ud bdscd on 802.1 l 1 th•t pro• ,.le, a
point. significant IOC~.JSC '" rmtccnon O\·cr Wl p and \'(·fl,\.
XY chart A tool used by systrm analy<O to i;rarhicall)· ~how the cnr·
wireless lldellty (Wl·Fl) I Jmil) ul popular I[f.E I.AN w1rcb> net·
rclaoon ~twc<n rwu v>.nablcs. Alw callrd a "-•tl•r diaf,Um.
worlmq,\ standards. aho kno" n J> 802.11, mdudmg 802.1 la, b. g, and
Yl K issue A problem f._.d b1 many form, in the )·cu 2000 heuu"'
n. 802.11 n is the most recent .iandard. 802.1 bc and 802. I bd are
rbeir computer sysr.-ms used only rwo d1gm to rcrrcsenr rhc year: most
proposed new standards. d3res no\\ use a four-d11v1 form,lt for tilt" 1·CJr (YYYY.\1\IDD t.
wireless foul area network (WLAN) A " 1rclr•s network ttiar,. Yovrdon A t}fX' of >ymbol SCI that" used m l)l·l)s. l'roe<<sc<, d•t•
rclan,dy mcxpcr1>1\'e to install and " well suued to workgroops and Row s, da1a store<., and external rnntir< each ha Ye a unique ~ymbol m
u!.er~ who .ire not :.n~hott:d tt• ;i \ipt."<.:tfi(. d~l: or loc:111on. the Yourdun >) mhol ><t.
(....,..... J:gi( . . . . . I_,.. 41 11.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
INDEX
1:1, 280 server, 325
l:~l, 280 software, 5
lNF. See first normal form (I NF) systems architecture, 319
2NF. See second normal form (2NF) application development, 356-359
3NF. See chird normal fonn (3NF) agile, 357, 367-369
4GL. See fourth-generation language (4GL) object-oriented, 364-367
802.J J, 338 structured,356-357,359-364
802.11 ac, 339 system design review, 356
802.1lb,338 tasks, 356-357
802.1 li,427 tools, 357-359
802. J Jn, 338 application lifecyclc management (ALM), 24
application service provider (ASP), 208-209,
331
A applications programmer, 408
abbreviation codes, 298 Apprivo, 89
absolurc date, 304 archived, 4 12
acceptance, 421 Ars Techn ica, 126
acceptance rc~t~, 372 artificial inrelligencc, 15
access poinr, 339 ASCII, 303
action codes, 299 ASP. See application service provider (ASP)
activity, 78. See also task asset, 420
activity diagram, 193- 194 associative entity, 282
actor, 187 ASTQB foundation level certification, 441
adaptive maintenance, 404, 406 ATNl. See automatic teller machine (ATM)
adnurustrator account, 430 attack, 421
agile methods, 17, 18,22-24, 113-114.Seealso attributes, 183, 276, 365
agile mechods audit fields, 305
advantages and disadvantages, 114 audit log files, 305
application developmenr, 357, 367-369 audit trails, 245, 257
auchorization zone, 246
Airbnb, 8
Alexa (Amazon.com), 15 automated fax, 253
automatic teller machine (ATM ), 254, 332
alias, 164
automatic update service, 430
allocated baseline, 4 14
ALM. See application life C)•cle management (Au\.i) availability, 4 J 9
a,roidance, 421
alphabetic codes, 298
Ama1on.com, l 5, 53
Amazon Echo Dot, I 5
app,8 B
Apple, 15, 207, 229-230, 425 B2C (busine~s-ro-consumcr), 8
Apple Keynote, 386 back door a track, 422
Apple's rind My iPhone app, 425 backup,305,435-437
Apple's iOS, 232 backup media, 435
Apple's Mac OS X, 415 backup policy, 435-436
Apple Xco<le, 370 balancing, 159, 160-163
application, 319 bandwidth, 329, 4 16-417
logic, 147,325 baseline,414
~ecuriry, 429-432 Basic Service Ser (SSS), 339
471
(....,..... J:gi( . . . . . I_,.. 4111.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Index 473
(....,..... J:gi( . . . . . I_,.. 4111.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Index 477
J
JAD. See joint application development (jAO)
M
Java, 22, 181, 367
JDBC (Java database conncctivit)'), 274 machine learning, 15
magnetic data strips, 255
(....,..... J:gi( . . . . . I_,.. 4111.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Index 479
(....,..... J:gi( . . . . . I_,.. 41 11.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~---tfta111&....-.~~ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Index 481
(....,..... J:gi( . . . . . I_,.. 41 11.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~---tfta111&....-.~~ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Index 483
(....,..... J:gi( . . . . . I_,.. 4111.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Index 485
(....,..... J:gi( . . . . . I_,.. 4111.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Index 487
(....,..... J:gi( . . . . . I_,.. 41 11.,.. ~- )U, -Woip-M ._..,.. -·~•-fllllie<'f•,... 0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
r..a...w...,..._...., .. .................,.t11ru ..
..,...,.......,..~ __.~~c.....,..~ ........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
c.,,..-•~fftlllll'.._...,
t.M..wl'"_._......,lhll..., A11t1.-RNr-a
~....,...._,..
~ ••'-Nf'911...._.....-..,....WIL""'t..ikor•,.,
. .,......., ...... ~..,-. ....... ,.., •
.,.,...,1.._.....,~ c~~".._.._...._.,,..
.._....,~ ,.W«t.., •
""'°..................
w~...t~.._., ._....._,~,.,
.. __ ..,............ .._ ..., ..........
c.,,..-•~fftlllll'.._...,
t.M..wl'"_._......,lhll..., A11t1.-RNr-a
~....,...._,..
~ ••'-Nf'911...._.....-..,....WIL""'t..ikor•,.,
. .,......., ...... ~..,-. ....... ,.., •
.,.,...,1.._.....,~ c~~".._.._...._.,,..
.._....,~ ,.W«t.., •
""'°..................
w~...t~.._., ._....._,~,.,
.. __ ..,............ .._ ..., ..........
c.,,..-•~fftlllll'.._...,
t.M..wl'"_._......,lhll..., A11t1.-RNr-a
~....,...._,..
~ ••'-Nf'911...._.....-..,....WIL""'t..ikor•,.,
. .,......., ...... ~..,-. ....... ,.., •
.,.,...,1.._.....,~ c~~".._.._...._.,,..
.._....,~ ,.W«t.., •
""'°..................
w~...t~.._., ._....._,~,.,
.. __ ..,............ .._ ..., ..........
c.,,..-•~fftlllll'.._...,
t.M..wl'"_._......,lhll..., A11t1.-RNr-a
~....,...._,..
~ ••'-Nf'911...._.....-..,....WIL""'t..ikor•,.,
. .,......., ...... ~..,-. ....... ,.., •
.,.,...,1.._.....,~ c~~".._.._...._.,,..
.._....,~ ,.W«t.., •
""'°..................
w~...t~.._., ._....._,~,.,
.. __ ..,............ .._ ..., ..........
c.,,..-•~fftlllll'.._...,
t.M..wl'"_._......,lhll..., A11t1.-RNr-a
~....,...._,..
~ ••'-Nf'911...._.....-..,....WIL""'t..ikor•,.,
. .,......., ...... ~..,-. ....... ,.., •
.,.,...,1.._.....,~ c~~".._.._...._.,,..
.._....,~ ,.W«t.., •
""'°..................
w~...t~.._., ._....._,~,.,
.. __ ..,............ .._ ..., ..........
c.,,..-•~fftlllll'.._...,
t.M..wl'"_._......,lhll..., A11t1.-RNr-a
~....,...._,..
~ ••'-Nf'911...._.....-..,....WIL""'t..ikor•,.,
. .,......., ...... ~..,-. ....... ,.., •
.,.,...,1.._.....,~ c~~".._.._...._.,,..
.._....,~ ,.W«t.., •
""'°..................
w~...t~.._., ._....._,~,.,
.. __ ..,............ .._ ..., ..........