• Tidak ada hasil yang ditemukan

PDF Systems Analysis and Design - TRƯỜNG ĐẠI HỌC BÁCH KHOA HÀ NỘI

N/A
N/A
Nguyễn Gia Hào

Academic year: 2023

Membagikan "PDF Systems Analysis and Design - TRƯỜNG ĐẠI HỌC BÁCH KHOA HÀ NỘI"

Copied!
147
0
0

Teks penuh

Input – the data that comes from the environment in which the system will operate. Feedback – an output that is fed back to the system to change the control of the processes.

Fig 1.1 Elements of an Information System
Fig 1.1 Elements of an Information System

THE SYSTEM DEVELOPMENT LIFE CYCLE

Ethical consideration is also given to ensure that the system is legally, commercially and socially acceptable. After acceptance testing, the system is implemented (commissioned) in the intended environment.

Fig 1.3 Traditional Systems Development Life Cycle
Fig 1.3 Traditional Systems Development Life Cycle

SUMMARY

2 SYSTEMS ANALYSIS

  • REQUIREMENTS MODELLING
  • FUNCTIONAL DECOMPOSITION
  • IDENTIFYING FUNCTIONS AND PROCESSES
  • DATAFLOW DIAGRAM NOTATION

Download free ebooks at bookboon.com Click on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read more. The main functional areas or activities will depend on the nature of the organization being studied.

Fig 2.1 Functional decomposition diagram
Fig 2.1 Functional decomposition diagram

MASTER IN MANAGEMENT

DRAWING A PHYSICAL DFD

The university technician checks the availability of the item against an inventory list before issuing the item to the student with a credit receipt. This DFD is interpreted as the student booking form enters the system as an entry to.

Fig 2.8 Vehicle rentals physical Level 1 DFD
Fig 2.8 Vehicle rentals physical Level 1 DFD

DFD ERRORS

Data from an external entity cannot be placed directly into a data store - it must be transferred through a process. Download free ebooks at bookboon.com Click on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read more moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read more.

DRAWING A LOGICAL DFD

The reason for this is that in a new system, the process can be performed automatically by the system. Download free eBooks at bookboon.com. Click on the ad to read more. Click on the ad to read more. Click on the ad to read more. Click on the ad to read more. Click on the ad to read more. Click on the ad to read more. Click on the ad to read more. per ad to read more Click on ad to read more Click on ad to read more Click on ad to read more

Fig 2.10 Enrol member logical level 1 DFD
Fig 2.10 Enrol member logical level 1 DFD

CLICK HERE

  • LEVELLED DATA FLOW DIAGRAMS
  • THE CONTEXT (LEVEL 0) DIAGRAM
  • THE DATA DICTIONARY
  • PROCESS SPECIFICATION
  • DECISION TREES
  • DECISION TABLES
  • STRUCTURED ENGLISH
  • REQUIREMENTS CATALOGUE
  • SUMMARY

It is important that the data flow shown on the lower level DFD matches that shown on the higher level. In and out data flow is identical on the Level 2 diagram to process 1 of the Level 1 diagram.

Fig 2.11 Check rental level 2 logical DFD
Fig 2.11 Check rental level 2 logical DFD

3 OBJECT ORIENTED ANALYSIS

  • OBJECTS AND CLASSES
  • USE CASE MODELLING
  • CLASS DIAGRAM
  • SEQUENCE DIAGRAMS

Download free eBooks at bookboon.com. Click on the ad to read more. Click on the ad to read more. Click on the ad to read more. Click on the ad to read more. Click on the ad to read more. Click on the ad to read more. Click on the ad to read more. per ad to read more Click on ad to read more Click on ad to read more Click on ad to read more Click on ad to read more Click on ad to read more click on ad to read more click on ad to read more click on ad to read more click on ad to read more click on ad to read more The "Book Room" use case would consist of a main success scenario (which is expected to handle most cases) and an extension scenario to handle the exception. Note There may be several extension scenarios depending on the situation).

Fig 3.1 shows an object class
Fig 3.1 shows an object class

EXPERIENCE THE POWER OF FULL ENGAGEMENT…

Download free eBooks at bookboon.com Click the ad to read moreClick the ad to read moreClick the ad to read moreClick the ad to read moreClick the ad to read moreClick the ad to read moreClick click the ad to read moreClick the ad to read moreClick the ad to read moreClick the ad to read moreClick the ad to read moreClick the ad to read moreClick the ad to read moreClick the ad to read moreClick the ad to read moreClick the ad to read moreClick the ad to read moreClick the ad to read moreClick the ad to read moreClick the ad to read moreClick the ad to read moreClick on the ad to read more.

RUN FASTER

STATE MACHINE DIAGRAMS

To understand the various states an object goes through during its existence, a state machine diagram, sometimes referred to as a state transition diagram, can be drawn. The state machine diagram shown below represents a college student and the various stages or states they go through.

ACTIVITY DIAGRAMS

To create an activity diagram, consider the order in which the activities occur and consider any conditions that may arise so that all use case scenarios have been considered. If you have produced a physical DFD, this can help identify the sequence of activities.

BUSINESS PROCESS MODELLING

SETASIGNThis e-book

SUMMARY

The analyst can use UML to analyze the system requirements from an object-oriented perspective. This involves producing a set of diagrams that reflect the user's needs and specify the system's requirements.

4 SYSTEMS DESIGN

  • DATA DESIGN
  • ENTITY MODELLING
  • NORMALISATION
  • IDENTIFYING RELATIONS

The relationships appear as lines with descriptive labels that connect the entity types on the ERD. This is to ensure that all non-key attributes depend on the key and only on the key.

Fig 4.1 Tables with primary and foreign keys
Fig 4.1 Tables with primary and foreign keys

INVOICE

DATA TABLE STRUCTURES

Download free ebooks at bookboon.com Click on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to to read moreClick on the ad to read more on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read more to read Click on the ad to read more Click on the ad to read more Click on the ad to read more Click on the ad to read more Click on the ad to read more Click on the ad to read more Click on the ad to read more readClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read more. The specific data types available and their storage formats will depend on the database management system specified for implementation.

HUMAN-COMPUTER INTERACTION

It is important to get early feedback on user interface design from users, and storyboards can be built to facilitate this; these are sketches that show basic screen layouts. Messages should appear in a consistent place on the screen so users know where to look.

Fig 4.17 System main menu screen produced with QSEE storyboard tool
Fig 4.17 System main menu screen produced with QSEE storyboard tool

SYSTEM ARCHITECTURE

A thin client does very little processing and instead relies on the server to do the processing, which usually results in better performance and lower hardware costs. In a two-tier design, application processing is shared between the server and the client, with all data stored on the server.

NETWORK TOPOLOGY

A disadvantage of a unidirectional ring is that if one node fails, it can prevent the other nodes on the network from working. This central node device connects to all other nodes (devices) on the network and allows the network data to pass through them.

Fig 4.21 Ring network
Fig 4.21 Ring network

DESIGN DOCUMENTATION

Protocols such as Internet Control Message Protocol (ICMP) are used to establish communication with other devices and to select the route between hosts. With the growth of wireless networking technologies, many organizations are also using wireless local area networks (WLANs) as they save on cabling costs and offer flexibility in terms of connected device numbers and location.

SUMMARY

While much of the content, such as screen layouts, has been reviewed and approved by system users during the design process, other stakeholders, such as IT staff, may need to consider and approve the design. Likewise, management will have to be satisfied with the overall design and implementation implications in terms of cost and personnel.

5 SYSTEMS IMPLEMENTATION

  • SOFTWARE DESIGN
  • SOFTWARE DEVELOPMENT AND TESTING
  • DOCUMENTATION AND TRAINING
  • SYSTEM CHANGEOVER
  • SUMMARY

The amount and depth of training will vary depending on the level of system use to be undertaken. A further aim is to reflect on the system and suggest any possible future system improvements.

Fig 5.1 Example structure chart
Fig 5.1 Example structure chart

6 SYSTEMS MAINTENANCE

  • USER SUPPORT AND TRAINING
  • SOFTWARE MAINTENANCE
  • SYSTEM PERFORMANCE
  • SYSTEM SECURITY
  • SYSTEM TERMINATION
  • SUMMARY

Download free ebooks at bookboon.com Click on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read more moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read more. Download free ebooks at bookboon.com Click on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read more moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read more.

7 BIBLIOGRAPHY

Download free eBooks at bookboon.com Click the ad to read moreClick the ad to read moreClick the ad to read moreClick the ad to read moreClick the ad to read moreClick the ad to read moreClick click the ad to read moreClick the ad to read moreClick the ad to read moreClick the ad to read moreClick the ad to read moreClick the ad to read moreClick the ad to read moreClick the ad to read moreClick the ad to read moreClick the ad to read moreClick the ad to read moreClick the ad to read moreClick the ad to read moreClick the ad to read moreClick the ad to read moreClick ad to read moreClick ad to read moreClick ad to read moreClick ad to read moreClick ad to read moreClick ad to read moreClick ad to read moreClick ad to read moreClick ad to read moreClick ad to read more to read moreClick the ad to read moreClick the ad to read moreClick the ad to read moreClick the ad to read moreClick the ad to read moreClick the ad to read moreClick the ad to read more to readClick the ad to read moreClick the ad to read moreClick the ad to read moreClick the ad to read moreClick the ad to read moreClick the ad to read moreClick the ad to read more readClick on the ad to read moreClick on the ad to read more.

8 APPENDICES

APPENDIX A – COST BENEFIT ANALYSIS

Organizations often set a minimum return on investment, which may be based on the rate they could earn by investing money in other ways, such as an investment bank account. The NPV formula involves multiplying each of the income and expenses by an appropriate present value factor based on the year the income/expenses occurred.

APPENDIX B – NORMALISATION TEMPLATE

Present value tables are available to help with present value analysis, showing values ​​at different rates over several years. Internet calculators are also available (Net Present Value, n.d.) and spreadsheet software such as Microsoft® Excel can be used for calculations.

APPENDIX C – PROJECT MANAGEMENT

Therefore, the critical path is path 3, which is 16 days - the longest path through the network. Download free ebooks at bookboon.com Click on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read moreClick on the ad to read more.

Fig 7.2 Example system development Gantt chart
Fig 7.2 Example system development Gantt chart

Gambar

Fig 1.3 Traditional Systems Development Life Cycle
Fig 2.1 Functional decomposition diagram
Fig 2.6 Duplicate symbols
Fig 2.8 Vehicle rentals physical Level 1 DFD
+7

Referensi

Dokumen terkait

Based on MIS analysis, to achieve the goals of company, we can recommend to make any IT investment strategic planning using the BSC approach to know the appropriate IT investment and