Beruflich Dokumente
Kultur Dokumente
The term system is derived from Greek word system, which means an organized
relationship among functioning units or components. A system exists because it is
designed to achieve one or n objectives.
The study of systems concepts, then, has three basic implications:
I. A system must be designed to achieve a predetermined objective.
2. Interrelationships and interdependence must exist among the components.
3. The objectives of the organization as a whole have •a higher priority than the
objectives of its subsystems. For example, computerizing personnel applications must
conform to the organization’s policy on privacy, confidentiality and security, as well as
making selected data (e.g. pay-roll) available to the accounting division on bequest.
CHARACTERISTICS OF A SYSTEM
1
INTERDEPENDENCE : Interdependence means that parts of the organization or
computer system depend on one another. They are coordinated and linked together
according to a plan. One subsystem depends on the input of another subsystem for proper
functioning, that is, the output of one subsystem is the required input for another sub
system.
CENTRAL OBJECTIVE : The last characteristics of a system are its central objective.
Objectives may be real or stated. Although a stated objective may be the real objective, it
is not uncommon for
• an organization to state one objective and operate to achieve another. The important
point is that users must know the central objective of a computer application early in the
analysis for a successful design and conversion. The political as well as organizational
considerations often could the real objective.
This means ‘that the analyst must work around such obstacles to identify,’ the real
objective of the proposed change
2
ELEMENTS OFA SYSTEM
In most cases, systems analysis operate in a dynamic environment where change is ‘a
way of life. The environment may be a business firm, a business application, or a
computer system. To reconstruct a system, the following key elements must be
considered: -
Environment
CONTROL
FEEDBACK
Boundary
3
PROCESSOR(S) : The processor is the element of a system that involves the actual
transformation of input into output. It is the operational component of a system.
Processors may modify the input totally or partially, depending on the specifications of
the output. This means that as the output specifications change, so does the processing. In
some cases, input is also modified to enable the processor to handle the transformation.
CONTRQL : The control element guides the - system. It is the decision making
subsystem that controls the- pattern of activities governing input, processing, and output.
In an organizational context, management as a decision making body controls the inflow,
handling and outflow of activities that affect the welfare of the business. In a computer
system, the operating system and accompanying software influence the behavior of the
system. Output specifications determine what and how much input is needed to keep the
system in balance.
In systems analysis, knowing the attitudes of the individual who controls the areas for
which a computer is being considered can make a difference between the success and
failure of the installation. Management support is required for securing control and
supporting the objective of the proposed change.
4
informs the analyst about the performance of the new installation. This feedback -often
results in enhancements to meet the user’s requirements.
TYPES OF SYSTEMS
The frame of reference within which one views a system is related to the use of the
systems approach for analysis. Systems have been classified in different ways. Common
classifications are (I) physical or abstract, (2) open or closed and “man-made”
information systems.
5
priority of the information requested changes. Abstract systems are conceptual or
nonphysical entities. They may be as straightforward as formulas of relationships among
sets of variables or models - the abstract conceptualization of physical situations. A
model is a representation of a real or a planned system. The use of models makes it easier
for the analyst to visualize relationships in the system under study.
The objective is to point out the significant elements and the key interrelationships of a
complex system.
6
The chart is a map of positions and their authority relationships, indicated by boxes and
connected by straight lines, it is concerned with the pattern of authority, communication
and work flow. Information is formally disseminated in instructions, memory or reports
from top management to the intended user in the organization. This structure also allows
feedback up the chain of command for follow-up.
7
ROLE OF SYSTEM ANALYST
Definition: Analyst is a person who conducts a methodical study and evaluation of an
activity such as a business to identify its desired objectives in order to determine
procedures by which these objectives can be gained.
8
5. Questioning attitude and inquiring mind-knowing the what, when, why, who and how
a system works.
6. Knowledge of the basics of the computer and the business function.
ROLE OF ANALYST
CHANGE AGENT : In the role of a change agent, the systems analyst may select
various styles to introduce change to the user organization. The styles range from that of
persuader (the mildest form of intervention) to imposer (the most severe intervention) in
between; there are the catalyst and the confronter roles. What the user appears to have a
tolerance for change, the persuader or catalyst (helper) style is appropriate.
9
On the other hand, when drastic changes are required, it may be necessary to adopt the
confronter or even the imposer style. No matter what style is used, however, the goal is
the same; to achieve acceptance of the candidate system with a minimum of restriction.
SALES PERSON : Selling the system actually takes place at each step in the system life
cycle; however, sales skills and persuasiveness, then, are crucial to the success of the
system.
MOTIVATOR : The analyst’s role as a initiator becomes obvious during the first few.
weeks after implementation and during time when turnover results in which people being
trained to work with the candidate system. The amount of dedication it takes to motivate
users often taxes and analyst’s abilities to maintain the pace. What was once viewed as a
challenge can easily become a frustration if the user’s staff continues to resist the system.
10
politician must have the support of his/her constituency, so is the analysts goal to have
the support of the users’ staff. He/she represents their thinking and tries to achieve their
goals through computerization.
Apart from the System Analyst others involve in the system development project are:
* Users
Operational Users: They are clerical, operational and administrative people most likely
to have the most day-to-day contact with the new system. They are human interface to the
system.
Supervisory Users: are one who will typically define the requirements and detailed
business polio that your system must implement. They may be passive members of the
time, fill-time member of team or a project manager.
Executive-level Users: are not directly involved in system developrnent project but they
may. provide the initiative for the project. They are concerned with global view of the
entire system and generally able to work with abstract models of system.
* Management
User Managers: in charge of several people in the operational area where the new
system will be used.
EDP/MIS Managers: the person in charge of the systems development project itself and
concerned with overall management and allocation of resources of all the technical staff
in the system development organization.
General Management: Top level managers who are not directly involved. in the project.
They focus more on the external information and interested in strategic laming system
and decision support systems.
* Auditors, quality assurance people and standard bearers: These are involved at the
very end. They are accustomed with documentation standards and system standards.
* Programmers
They are the people who develop the code according to the standards and procedures laid
down through system study by system analyst.
11
SYSTEMS DEVELOPMENT LIFE CYCLE
Systems development is a process consisting of the two major steps of systems analysis
and design. It starts when management or sometimes systems development personnel
realize that a particular business system needs improvement.
The systems development life cycle (Figure 1.6) is the set of activities analysts,
designers, and users carry out to develop and implement an information system.
The systems development life cycle consists of the following activities:
1. Preliminary investigation
2. Determination of requirements
3. Development of prototype system
4. Design of system
5. Development of software
6. Systems testing and for
7. Implementation analysis.
Preliminary
Investigation
Determination Development
of of prototype
requirements system
12
PRELIMINARY INVESTIGATION
When that request is made the first systems activity, the preliminary investigation,
begins. This activity has three parts request clarification, feasibility study, and request
approval. The result will be to approve the request further attention or reject it as not
feasible for further development.
REQUEST CLARIFICATION
Many requests from employees and users organizations are not clearly stated. Therefore,
before any systems investigation can be considered, the project request must be examined
to determine precisely what the originator wants) A simple telephone clip may suffice if
the requester has a clear idea but does not know how to state it. On the other hand, the
requester may merely be asking help without knowing what is wrong or why there is a
problem. Problem clarification in this case is much more difficult. In either case, before
any further steps can be taken, the project request must be clearly stated.
FEASIBILITY STUDY
13
business or organization that will be involved or affected by the project, and are skilled in
the systems-analysis and design process. Typically people responsible for feasibility
assessments are experienced, not new, analysts or managers.
REQUEST APPROVAL
Not all requested projects are desirable or feasible. (In fact, some organizations receive so
many project requests from employees that only a few of them can be pursued.)
However, those that are both feasible and desirable should be put into a schedule. In
some cases, development can start immediately. But in most cases, systems staff
members are busy on other ongoing projects. When this happens, management decides
which projects are most important and schedules them. Many business organizations
develop information systems plans as carefully as they plan for new products, new
manufacturing programs, or plant expansion. After a project request is approved, its cost,
priority, completion time, and personnel requirements are estimated and used to
determine where to add it on any existing project list.
Later on, when other preceding projects are completed, the proposed application
development can be launched. At this time, the collection of data and determination of
requirements begin.
Determination of Requirements
The heart of systems analysis is aimed at acquiring a detailed understanding of all
important facts of the business area that is under investigation. (For this reason, this
activity is often termed the detailed investigation.) Analysts, working closely with
employees and managers, must study the business process to answer these key questions:
1. What is being done?
2. How is it being done?
3. How frequently does it occur?
4. How great is the volume of transactions or decisions?
5. How well is the task being performed?
6. Does a problem exist?
7. If a problem exists, how serious is it?
14
8. If a problem exists, what is the underlying cause?
To answer these questions, systems analysts will talk to a variety of person to gather
details about the business process and their opinions of why things happen as they do and
ideas about change. Questionnaires are used to collect this information from large groups
of people who cannot be interviewed individually. Detailed investigations also require the
study of manuals and reports, actual observation of work activities, and sometimes
collection of samples of forms and documents to fully understand the process.
As the details are gathered, the analysts study the requirements data to identify features
the new system should have, including other the information the system should produce
and such operational features as processing controls, response times, and input and output
methods.
Development of Prototype System
Design of System
The design of an information system produces. the details .that state how a system will
meet the requirements identified during systems Often systems specialists refer to this
stage as logical design, in contrast to developing program software, which is referred to
as physical design.
Systems analysts start by Identifying reports and other outputs the system will produce.
Then the specific data on each is pinpointed, including its exact location on the paper,
display screen, or other medium. Usually designers sketch the form or display as they
expect it to appear when the system is completed. -
The systems design also describes the data to be input, calculated, or stored. Individual
data items and calculation procedures are written in detail. Designers select file structures
15
and storage devices, such as magnetic disk, magnetic tape, or even paper files. The
procedures they write tell how to process the data and produce the output.
The documents containing design the specific actions use m any different ways to portray
the design-charts, tables and special symbols-some of which you may have used and
others that they be tally new to you. The detailed design information is passed on to the
programming staff so that soft are developrnent can begin.
Designers are responsible for providing program mars with complete and clearly outlined
specifications that state what the software should do, As programming starts, designers
are available to answer questions, clarify fuzzy areas, and handle problems that confront
the programmers when using the design specifications.
Development of Software
Software developers’ m ay install or modify and then install purchased corn metrical
software, or they may write new, custom-designed programs. The decision about which
to’ do depends on the cost of each option, time available to write software, and
availability of programmers. Type in larger organizations, corn putter program mars (or
corn inaction analyst—program mars) are part of the permanent professional staff. In
smaller firms, where permanent programmers have, not been hired, outside programming
services may be retained on a contract basis. As we see in later chapters, there are several
approaches to developing the software,
Programmers are also responsible for documenting the program, including comments that
explain both how and why a certain procedure was coded in a ‘specific way.
Documentation is essential to test the program and carry on maintenance once the
application has been installed.
Systems Testing
During testing system is used experimentally to ensure that the software does not fail, i.e.
• that it will run according to its specifications and in the way users expect it to. Special
16
test data is input for processing, and the results are ‘examined to locate unexpected
results. A limited number of users’ may also be allowed to use the system so analysts can
see whether they try to use it in unexpected ways it is preferable to find these surprises
before the organization implements the system and depends on it.
In many organizations, testing is performed by persons other than those who wrote the
original programs. Using persons who do not know how certain parts were designed or
programmed ensures more complete and unbiased testing and more reliable software.
Implementation
When systems personnel check out and put new equipment into use, train user personnel,
install the new application, and construct, any files of data needed use it, we say it is
implemented.
Depending on the size of the organization that will be involved in using the application
and the risk associated with its use, systems developers may choose only to pilot (test) the
operation in one area of the firm, say in one department or with just one or two persons.
Sometimes they will run both the old and new systems together to compare the results of
both. In still other situations, developers will stop use of the old system one day and
begin use of the new one the next. As we will be seeing, each implementation strategy
has its merits, depending on the business situation in, which it is considered. Regardless
of the implementation strategy used, developers strive to ensure that the system’s initial
use is trouble-free.
Once installed, applications are often used, for many years. However, both the
organization and, the users will change. And the environment will be different over
weeks and months too. Therefore, the application will undoubtedly” be maintained. That
is, modifications and changes will be made to the software, files, or procedures to meet
emerging user requirements. Organization systems and the business environment are in
continual change. The inform action systems should keep pace. In this sense,
implementation is an ongoing process.
17
WHAT IS REQUIREMENT ANALYSIS:
Analysis is the process of identifying what a system does. Requirement Analysis is the
process of identifying what the requirements of a system are and how they are being
catered to currently? The activities involved in this process have been exhibited in the
flow diagram of the following figure.
Project initiation is the first step which includes the preliminary investigations and a
formal approval to begin the project. Facts are then gathered in detail to identify the
business processes’ and data exchange. These facts are documented using standard tools
and notations. These documented facts are then analyzed and a set of alternative solutions
is suggested with the corresponding pros and cons. A formal approval of the cover each
of these steps is sufficient depth from a manager’s perspective. However, we shall here
omit a detailed study of the tools of systems analysis and design.
The outputs of requirements analysis are:
• Feasibility report
System requirements specifications.
FEASIBILITY STUDY:
A feasibility study must be carried out to analyze the cost benefit of the project. The
following aspects of feasibility should be studied,
Technical feasibility: rat is important to analyze whether the hardware and software
solution recommended by the user and the IT professional is technically perfect to fit the
scenario. The technical queries must be handled, e.g. is the technology to be used current
18
and the latest? Is it compatible with the already existing technology base in the
organization? Is it compatible with the technical skills of the organization?
Economic Feasibility: This includes the study of all the expected costs and benefits of
the proposed software project. This is the most important part of the feasibility study
from a business perspective.
But since most of the benefits of IS are intangible, it is’ not quire straight forward to
study this aspect.
A list of tangible benefits is included in the table below:
TANGIBLE BENEFITS:
Increased productivity Low operating cost.
Reduced workforce
Lower outside vendor costs
Reduced expense growth rate.
INTANGIBLE BENEFITS:
Improved asset utilization
• Improved resource control
• Improved organizational planning
• More timely information.
• Increased flexibility
• Enhanced goodwill
• Increased job satisfaction
Improved decision-making
Better image
Improved operation.
For tangible cost-benefit analysis, various capital budgeting models like the Net Present
Value, Internal Rate of Return etc. can be applied.
19
For intangible benefits analysis, Portfolio analysis and scoring models are useful models
Portfolio contains a profile of the risks and benefits of an IS to a firm The risks can be
related to time or cost over-runs, low performance level, incompatibility of hardware and
software platform etc. For information intensive companies, a High-risk - High benefit
combination can also be accepted but, in non-information intensive companies, a Low-
risk - High benefit situation is preferred Scoring Model allocates a single score based on
the extent to which various alternatives meet the set objectives All the solution
alternatives are judged on the basis of certain set criteria, e g per cent user needs met,
initial purchase cost, chances of success etc the following steps are generally followed to
generate the scores and evaluate the feasibility of a proposal
• Identify alternative solutions to the problem
• Identify the criteria for decision-making
• Assign weights to each criterion
• Give the user judgment on a scale of 5 - 0 for low merit and 5 for high merit calculate
the weighted averages and compare to find out the most preferred solution alternative
Legal Feasibility: It must be made sure that the propose system abides by all the laws of
the land and business
Operational Feasibility: Many good software’s remain unused forever because they do
not get any effective users. Thus; it is imperative to study the system for operational
feasibility to find out if the proposed system can be used by the employees-or not? Does
it fit into the organization culture? Is it easy to use?
Schedule Feasibility: It is wise to verify that the project can be finished well before the
actual requirement of its usage. If a solution is provided after the significance of the
problem is reduced or lost, it is worthless to have the solution
20
model of a system together with a strongly stated set of objectives for that system and
producing the specifications of a physical system that will meet those objectives.
Initially, a logical design is produced by modifying the already defined system models
then the physical implementation details are added to it which include the machine and
the interface parts
WHAT IS TO BE DESIGNED?
The exercise of design should generate a blue print of the new system. This includes
content requirements of the following system components
• Outputs, i.e., the reports, on-line displays. This is a sensitive issue as the ultimate
success of any software depends on the quality of the outputs it generates
• Inputs, i.e. the forms, screens Design of input is vital as it defines the quality of data
being entered into the machine. Unless correct data is entered, no useful output can be
generated.
• Procedures, i.e. structures of procedures to collect, transform and output data.
• Data base interactions, i.e. identifying the requirements of data storage and
management.
• Controls, i.e. the requirements for data integrity, security and procedures for recovery.
Sound logical design is important for the long-term effectiveness of the system. On an
average of the lifetime software cost of a system goes into maintenance consequently, it
is vital that the designer translates the requirements of the users into a physical design
which fulfills the system requirement, but in a way that imposes the least possible
maintenance burden.
WHAT IS IMPLEMENTATION?
Implementation refers to all of the or activities working towards the adoption, manage
mental and reutilization of an innovation It is the process of converting from an old to a
new system This new system can be a replacement of a manual system or a major
21
modification to an already existing Computer Based IS There are three major approaches
to the implementation process:
Actor’ Role: This approach believes that organizations should select actors with
appropriate social characteristics and systematically develop organizational roles, such as
product champions, bureaucratic entrepreneurs, gatekeepers in Order to innovate
successful this approach focuses on early adoption and management of innovations.
Strategic Approach A second school of thought focuses of strategies of
innovation the two extremes are:
Top-down Innovation For the success of a system the senior management support is
important as no innovation, leadership, encouragement and resources can flow down
unless the top facilitates them.
Grassroots innovations Without strong grass-roots and end-user participation, IS
projects may be doomed to failure.
For the success of any system, all the levels, specially the top and lower levels should be
wholly participative at every stage of systems development.
22
FACT GATHERING
To solve any systems problem, it must be studies in detail to understand the information
Requirements in detail the system should be studied and facts be gathered for the
following aspects
• Business processes
• Data used or produced
• Limits of time and volume of work
• Performance controls suet
Different fact finding techniques can be used for this as
Observation it covers all the points missed by the above methods sometimes, sitting and
observing the daily dealings may bring out many undocumented facts which add to the
practicality of the solution.
This is not a specific technique which can be taught but is rather a subjective assessment
of those factors likely to pro of importance. Observation implies formally observing an
activity to identify problems, skill characteristics, time requirements, environmental
conditions, arrival of information etc. The key to successful observation is to take a
purely passive and patient role, not interfering in any way with the process itself which
must be allowed to take place as it normally would.
Interview: This technique is used to gather the unstructured facts, generally from the top
people in the organizational hierarchy. ‘It is. better to plan the structure of the interview
and the questions to be asked, before meeting the person to make sure that all the
important points are well addressed.
Interviews are by far the most common and most satisfactory way of obtaining
information, particularly to obtain information about objectives, constraints, allocation of
duties, problems and failures in the existing system.
Whom to interview this depends. On who has the required information? It may be
advisable, even though time consuming to go down through a hierarchy to arrive at the
person.
23
When to interview there may be a most desirable sequence based on the kinds of
information to be collected, so that one interview can build on information already
collected. No attempt should be made to dictate when the interview to be conducted.
Interview should take place at a time so that it causes the least disturbance to the work
and the personal arrangement of the person to be interviewed.
What to ask to make the best of the available time, it is important to obtain prior
knowledge of the duties and responsibilities from which a check list can be drawn up. . It
is an important to ask questions at the right level.
Where to hold the interview often the only available place is the normal work place of the
person. This an be an added advantage, since the interviewer will be more at home and
Additional information can be obtained from observation. Interruptions may tell a lot
more about the problem than the interview itself.
Before an interview
- Make an appointment
- Be prepared
- State the reason for the interview
During the interview
- Observe good manners
- Don’t interrupt
- Avoid Yes/No questions
- Don’t express your opinion
- Compliment when possible
- Distinguish between fact and opinion
- Distinguish between need and desire
- Don’t be asked to leave
After’ the interview
- Check information obtained.
- ‘Confirm results of discussion.
24
interview. A questionnaire contains a well knit set of questions that cover the entire range
of business processes. It is normally used to gather data from the middle and lower levels
of management. This technique has the advantage that the user can fill it in one’s own
time, in the absence of the systems analyst also. However a lengthy and vague
questionnaire may affect the responses of the users.
This form of investigation must be used with great caution. Considerable skill and field
testing are required to avoid confusion, ill-will and misinformation. This method of
investigation will be most suitable method where -
- Staff are located over a widely spread geographical area
- A large number of staff is required -to furnish data .
- Verification of data collected, by other methods of investigation.
- 100 percent of coverage is not essential.
One of the major problems in questionnaires design is that it is difficult to frame
questions which are certain to obtain the exact data required. Also it is a feature of bulk
questionnaire surveys that not all forms will be returned, One advantage to be gained
when a questionnaire is planned to precede an interview is that the respondent is given
time to assemble the required information Thus saving his time and that of the system
analyst at the actual tweeting. The important considerations to bear in mind when
designing a questionnaire are
- It purpose (what specific information it is intended to gather)
- Its recipients (their level of understanding, intelligence and interest)
- Its timing
The questionnaire should normally b in three sections
- Heading section which will provide brief information about the questionnaire and will
allow the respondent to fill in data, name and title
- Classification section which will include data to be used for analyzing replies e g sex,
age, location etc
- Subject section which will contain the specific questions forming the main body of the
questionnaire
25
Record Review: Some of the facts remain untracked because the analyst cannot
anticipate all the factors and the user may also forget to bring out some points without an
analyst’s participation record review, e g studying a cash register gives an insight into the
actual working system of the organization.
Special purpose records Sometime the existing records do not supply the information
required and the only way of obtaining reel able information’ may be install special
purpose for a limited period The missing information is likely to 1e quantitative,
concerned with volumes, frequencies, trends or ratios or it may relate to management
information requirements The kind of information that one might wish to gather in this
way would include
- The time at which the documents arrive at the department
- The number of times flies have to be consulted
- The volume frequency of the telephone conversions
- The type of inquiry from the management
- The number of queries to the management
Maintenance of special purpose records v be in addition to the normal work, thus
increasing the workload, however slightly Special purpose records hence must be
installed only for a specific duration of time The records collected during this time will
provide with a representative sample of what is required to be known
26
Random sampling techniques Whether there is a high volume of documents or a
number of recurring activities it may not be necessary to practical to measure the total
number The economical way may be to take a sample: Random sampling techniques
consists of selecting a portion (sample) of the total (population) and based on the
assumption that the sample is representative of the population drawing inferences about
the whole
A document is a written description of the processes, data and system needs Documents
are
• To keep the notations standard across all the software projects; so that any one can
understand the system at any point of time.
To communicate across the teams related to the same project.
• To get verification and acknowledgement from the user about functionality and
requirements.
• To act as a written evidence of the limits of the contract.
27
THE CLASSICAL SOFTWARE DEVELOPMENT LIFE CYCLE APPROACH
It is the oldest and most widely used paradigm of software engineering. Sometimes called
the Waterfall Model, the life cycle model demands a systematic, sequential approach to
software development that begins at the systems level and progresses through analysis,
design, coding, testing and maintenance. The life cycle comprises of the following stages
(See figure):
Preliminary
Investigation
Requirement
Analysis
Systems
Design
Coding
Testing
Maintenance
Preliminary Investigation: The work begins by establishing requirements for all system
elements and taking an integrated view of the whole system and its subsystems. The
integrated (systems) view is essential to understanding the interface of the organization,
technology, people and databases. A feasibility study is carried out and presented in the
form of a feasibility report.
Requirements Analysis: Once the scope of the study has been identified in an overall
perspective, a detailed investigation is undertaken to understand the operations of the
current system and identify the domain of the information requirements. A requirement
specification document is prepared for a record of the customer expectations.
28
System Design: It is a multifaceted process which gives an on-paper design, focusing on
the data- structure, software architecture, procedures and interface. Design is document
for use by the development team.
Coding: This stage translates the designs into a machine compatible from using suitable
programming tools. If the design has been achieved with quality and engineering, coding
can be achieved mechanically.
Testing: Once the code has been written, it needs testing against a set of real-data to
ensure that the input produces results as per expectations. Testing is done at isolated level
for individual programs or at an integrated level for the whole set of programs to lidate
their mutual interaction.
29
THE PROTOTYPE MODEL
Sometimes, a ‘user has clarity about the objectives of the software but has not decided
upon how it should actually function, or the developer is not sure about the efficiency of
the tools or algorithms used for problem solving. In all such cases of uncertainty, the
prototyping approach offers a better solution.
- Prototyping is a process that enables the developer to create a model of the software that
must be built. The model can be of any one of the following forms:
A PC based model to give the user an idea of the man-machine interface. -
A working model implementing a subset of the required functionality.
An existing program that has some features as per requirements but cannot exactly fit into
the requirement.
This model also follows a sequence of events as in SDLC (See Figure below)
Stop
Engineer Refining Customer
Product Prototype Evaluation
Like all other approaches, prototyping also begins with requirements gathering. The
developer and the customer meet and define the overall objectives of the software,
identify whatever requirements are known .and where further definition is necessary. A
quick design is then prepared. The quick design generally focuses on the modi4es which
will be visible to the user, i.e., in the prototype the. main emphasis is given to the user
interface for input and output. This quick design is called the prototype. This prototype is
evaluated by the user and is used to refine further the requirements for the software to be
30
developed. The process of quick design and evaluation is iterated again till the user gets a
sufficiently working system.
Ideally, the prototyping model acts as a means to developing information requirements. It
c is a more secure way of establishing requirements and getting acknowledgment from
the user at small intervals than to keep holding till the complete life cycle is completed as
per the classical model. However, there are some limitations also attached to this
approach.
In most cases, the earl working models are thrown away as the new system is established.
Thus, the prototyping model results in an expensive solution.
The developer generally does not use efficient code or algorithms while preparing quick
designs, keeping the performance factors to be taken care of later in the project. As
prototypes are developed, he may forget to rewrite the inefficient algorithms in some
parts of the system.
The user may get impatient and request the developer to put some final patches in some
working version of the software, thus, forcing the developer to give half backed,
inefficient code.
Although problems can occur, prototyping is an effective paradigm for systems
development. The major style is to develop the rules of the game. The user and the
developer, both should agree that the prototype will be discarded later and the final
system should be built keeping quality and maintainability in view.
31
THE SPIRAL MODEL
• This model encompasses the best features of both the classical life cycle as well as the
prototyping model with an added on feature of risk analysis. The model represented by a
spiral See the following figure) defines four major quadrants representing four activities
of the model:
32
If risks are too high , the project is terminated It enables the user to react to risks at each
evolutionary step. It uses prototyping as a risk reduction mechanism. However, it allows
the use of prototyping at any stage of development. The spiral model demands a high risk
analysis expertise, which may not be available in every team. Moreover, the movement
around the spirals may become uncontrollable, for which proper controls must be
established.
The spiral has many cycles .The radial dimension represents the cumulative cost incurred
in accomplishing the steps done so far, and the angular dimension represents the progress
made in completing each cycle of the spiral The model is shown in Figure 1.7.
Each cycle in the spiral begins with the identification of objectives for that cycle, the
different alternatives that are possible for achieving the objectives, and the imposed
constraints. The next step in the cycle is to evaluate these different alternatives based on
•the objectives and constraints. This will also involve identifying uncertainties and risks
involved. The next step is to develop strategies that resolve the uncertainties and risks.
This step may involve activities such as benchmarking, simulation, and prototyping Next,
the software is developed, keeping in mind the risks Finally the next stage is planned
The next step is determined by the remaining risks. For exarnple, if performance or user
—interface risks are considered more important than the program development risks, the
next step may be an evolutionary development that involves developing a more detailed
prototype for resolving the risks. On the other hand, if the program development risks
dominate and the previous prototypes have resolved all the user—interface and
performance risks, the next step will follow the basic waterfall approach.
The risk driven nature of the spiral model allows it to accommodate any mixture of
specification—oriented, prototype-oriented ,simulation-oriented ,or some other approach
An important feature of the model is that each cycle of the spiral is completed by a
review which covers all the products developed during that cycle,
• including plans for the next cycle. The spiral model works ‘for development as well as
enhancement projects
In a typical application of the spiral model, one might start with an extra round zero, in
which the feasibility of the basic project objectives is studied. These project objectives
may or may not lead to a development/enhancement project. Such “high—level”
33
objectives include increasing the efficiency of code generation of a compiler, producing a
new full screen text editor, and developing an environment for improving productivity
The alternatives considered in this round are also typically very high-level, such as,
should the organization go for in-house development, or should they contract
development, or should they buy an existing product In round one, a concept of operation
might be developed. The objectives are stated more precisely and quantitatively and the
cost and other constraints are defined precisely The risks here are typically whether or not
the goals can be met within the constraints The plan for the next phase will be developed
which will involve
FOURTH GENERATION TECHNIQUES (4 GT)
This technique encompasses an array of software development tools that enable the
developer to specify some characteristics of the software at a high level. The tool then
automatically generates the code for the specifications. The emphasis in this paradigm is
to use a specification technique that is closer to ‘natural language. The four step 4 GT is
shown in the following figure. Like all other paradigm, it begins with requirements
gathering. If the project is of small size, the specifications are directly implemented using
a 4GL. If the project is large, the design specifications may. be prepared before switching
on to the implementations.
This approach provides a very quick, way to develop s But its success is limited by the
capacity of the available 4GLs, The current $G tools are not sophisticated enough to
incorporate complex logic and truly natural languages. This approach has proved more
useful for small and medium sized projects. For large projects, the 4GT tools available do
not provide a very reliable solution.
Requirements
Gathering
Design
Strategy
Implementation
using 4GL
Testing
34
This paradigms discussed so far are used as supplementary rather than complementary
approaches to software development. In some cases, however, these paradigms need to be
and can be, combined to get the strengths of each one into a single project. Any one of
the paradigms can serve as the base into which others are integrated. The following figure
exhibits how these can be combined.
In every case, the work begins with preliminary requirements gathering. From this point,
any path can be followed as in the figure. If the uncertainty is low and the requirements
can be specified at the beginning, the classical model can be applied. Otherwise,
prototypes can be evolved. For testing, again the life cycle approach can be followed.
4GT can also be used to get the prototype models or to work in conjunction with the
spiral model. The guiding note is that no single approach to Systems development can
ensure the success of the project. The nature of the application, can define the required
mix of all the approaches.
35
STRUCTURED ANALYSIS AND DESIGN METHODS AND SOFTWARE
ENGINEERING TECHNIQUES, TOOLS AND METHODOLOGIES IN SYSTEM
DEVELOPMENT
Entity relationship diagram depict data at rest, data being stored They also do not imply
how data is implemented, created, modified, used or deleted Data relationship is called a
relationship - is a association between entities All relationship are further described by
words or symbols that indicate the number of occurrences of one entity that can exist for
a single occurrence of the related entity and vice versa
There are three general possibilities
* ONE-TO-ONE (1:1) - for one occurrence of the first entity there can exist only one
related occurrence of the second entity and vice-versa
* ONE-TO-MANY (1: M) - for one occurrence of one entity there can exist many
related occurrence of a second entity it doesn’t matter which is first or second
* MANY-TO-MANY (M: M) - for one occurrence of the first entity there can exist
many related occurrence of the second entity and for one occurrence of the second entity
there can exist many occurrence of the first entity.
Symbols used
36
HOW TO PERFORM DATA MODELLING WITH ENTITY RELATIONSHIP
DIAGRAM
- Identify entities
- Identify or define keys for each entity
- Draw a rough draft of the entity relationship data model
- Identify data elements
Map data elements to entities
- Normalize Data
- Redraw ERD
e.g. In order processing system the entities are customer, order and item. The ERD is as
follows
Customer Order
places
for
Item
37
Product Customer
M 1
Compromis
Place
e
1 M
Order
Is Is
M M
Consigned Posted
to to
1 1
Shipper Receivable
38
DATA FLOW DIAGRAM (DFD):
Logical Model
Thus, two fundamental forms of the model are suggested. The first gives a logical view
of the company’s information needs in independent of the physical operation. The second
is an actual implementation of those requirements against the new hardware, software
and the people.
39
DFDs show the passage of data through a system irrespective of the current departmental
and administrative structure.
40
LEVELING THE DFD
A good modeling technique should have an easy to use hierarchy. The DFD also needs
such a hierarchy The data flow diagram has a simple and consistent way of representing
different levels Each process is exploded into a lower level DFD until the specifications
of the process can be presented on an A sized sheet. Thus, it is possible to present a series
of DFDs representing increasing levels of detail. These may be used with different levels
of user staff. The high level overview charts are the focus of discussions with appropriate
line managers. The convention of calling the highest level diagram level 0 has been
adopted with the subsequent levels being designated as lever, etc. Normally, DFDs are
exploded upto level or. The numbering system of each level of the model is done in such
a manner that it is easy to refer back to its parent process in the upper level of the model.
Thus, the processes 2.1, 2.2, 2.3 etc. refer to the explosions of the process 2 at the higher
level. Processes 2.1.1, 2.1.2 etc. refer to the details of the process 2.1 in the upper level of
the model.
It is important to check that all the flows and stores accessed by the process in the higher
level box are actually used in the lower level decomposition. DFDs should be balanced so
that data flows in and out of a process must appear in the explosions of that process also.
If any discrepancies exist, reasons for that must be closely studies.
Identify the sources and sinks of data. Sources are the external entities which originate
the data. Sinks are the external entities which receive the final output. This identification
will provide a boundary to the work and also give a set of flows.
Identify the processes as the activities of the system under study.
Join the processes and sources / sinks via data flows. If you need to store the data
permanently, or for later use, make a data store.
Most of the processes would be joined through data stores.
41
• generate the first rough draft, modify its data flows to design a concise and neat diagram
without any crossing of arrows. If the crossing cannot be avoided, represent one of the
flows with a curb. See the following figures (a) and (b).
Process 1 Process 2
Process 1 Process 2
Process 3
Process 3
Figure (a) Data flows crossing each other Figure (b) Data flows crossing resolved
A set of guidelines and rules should be followed to ensure the consistency and accuracy
of the model. These rules are listed below:
42
subsequent design stages. Thus, it is generally supplemented by a supporting tool such as
a decision table, decision tree, or structured English.
ADVANTAGES OF DFD
CONTEXT DIAGRAM
Top level Data flow diagram is often called a context diagram. It contains a single
process. Context diagram define the system that will be studied in the sense it determine
the boundaries.
43
A sample DFD for a student admission system is shown in the figure below
44
`
45
DESCRIBING DATA STRUCTURES
46
Data structures are built on four relationships of components that may be either data
items or other data structures.
* Sequence relationship: includes a definite set of components
E.g. NAME = FIRST + MIDDLE + LAST
* Iteration Relationship: means that data elements composing the structure are repeated.
E.g. ITEM OCCURS 10 TIMES.
* Optional Relationship: some data elements may be optional. Rather than showing them
as a special case of iteration, that is, zero or one iterations of a component, it is more
effective to indicate that these elements may or may not be included.
Data structures are described by connecting individual data items with (+), [ ] for
iteration, { / } for either/or relationship, and () for optional.
e.g. ORDER DATA = ORDER NO + ORDER DATE + CUSTOMER NO + [ DESC,
QTY, RATE] + (CST / MST}+ (EXCISE)
Object oriented modeling is designing software as. a collection of discrete objects that
incorporate both data structure and behaviour. The characteristics are
IDENTIFY: Data is quantized into distinguishable entities called object.
CLASSIFICATION: Objects with the same data structure (attributes) and behaviour
(operations) are grouped into a class.
47
In OBJECT-ORIENTED MODELING TECHNIQUES (OMT) the stages are
OBJECT MODEL: which describes the static structure of the object in a system. A
object diagram is a graph whose nodes are object class and arcs are relationship among
classes.
STATE: A state is an abstraction of the attribute values and links of an object. A state
specifies the response of the object to input event. A state corresponds to the interval
between two, events. A state corresponds to the interval between two events received by
an object.
- The state has duration.
- The state often associated with the value of an object satisfy some conditions.
- The state has a suggestive name and natural-language description of its purpose.
THE STATE TRANSITION DIAGRAM is relates events and states. The change of
state caused by an event is called transition. It is a graph whose nodes are states and arcs
are transitions. State diagrams can represent one-shot life cycle or’ continuous loops.
Conditions can be used as guards on transitions. A guarded transition fires when an event
occurs, but only if the guard condition is true. An action is an instantaneous operation.
48
TEMPORAL MODELING: STATE TRANSITION DIAGRAM
STATE: A state is an abstraction of the attribute values and links of an object. A state
specifies the response of the object to input event. A state corresponds to the interval
between two events. A state corresponds to the interval between two events received by
an object.
- The state has duration.
- The state is often associated with the value of an object satisfying some conditions.
- The state has a suggestive name and natural description of its purpose.
THE STATE TRANSITION DIAGRAM relates events and states. The changes of state
caused by an event are called transition. It is a graph whose nodes are states and arcs are
transitions. State diagrams can represent one-shot life cycle or continuous loops.
Conditions can be used as guards on transitions. A guarded transition fires when an event
occurs, but only if the guard condition is true. An action is an instantaneous operation.
STATE 1
Condition
Action
STATE 2
49
which is assigned the name of the corresponding entity set, or relationship set Each table
has a number of corresponding entity set, or relationship set Each table has a number of
columns which, again, have unique names We shall present these concepts by
considering a tabular representation of the E-R diagram of the following figure:
Social security
number Account balanc
number e
Customer
city
Name street
date
Account
Balance
Number
259 1000
630 2000
50
401 1500
700 1500
199 500
467 900
115 1200
183 1300
118 2000
225 2500
210 2200
NORMALIZATION:
The normalization was defined by E.F.Codd as a mathematical basis for deriving tables
( rows and columns of data ) using relational calculus and a set of transformations that
could be applied to data structures to ensure that they met the requirements for a
relational DBMS.
The five normalization rules are
1NF: Each row or column must have a single value with no repeating values.
2NF: Every nonkey column must depend on the primary, key.
3NF: No nonkey column can depend on another nonkey column.
51
4NF: An entity cannot have a 1:N relationship between primary key columns and nonkey
columns.
5NF : Break all tables into the smallest possible pieces to eliminate all redundancy within
a table.
We will restrict out discussion upto 3NF. -
Codd identified three primary levels or forms of normalization that could be applied to
data structures to help eliminate possible anomalies when they are implemented as• a
physical database.
STUDENT TABLE
Roll Number
Name
year
College code
college Name
course number 1
course name 1
52
marks l
course number2
course name2
marks2
course number n
course name n
marks n
The course number is repeating group of attributes thus it is separated out to have first
Normal Form.
53
The attribute College Name is dependent only upon college code, so it is removed to a
separate College table to reach third normal form,
DENORMALIZATION
When migrating ‘a normalized data model to a physical database structure, the DBA
takes into account various design tradeoffs to support the functionality of the application
in the most efficient manner possible. Implementation consideration leads 10 design
tradeoffs that can help or hinder the performance of the application when it is finished.
Once a set of database structures or tables has been normalized in analysis, a process of
denormalization usually occurs in design.. Denormalization is the process of structuring
the set of tables so that its performance is most efficient in the production environment, a
normalized set of tables is in the most efficient configuration logically, while a
denormalized set of tables is in the most efficient form .physically. There’ are several
performance considerations that affect database design. These include table access or
update frequency, table size, index requirements, and security requirements.
PROCESS CHART
54
A system consists of many different activities of process. It contains independent but
interactive Modules. Process hierarchy chart shows hierarchy or levels of process in the
system. Any activity that generates modifies or uses information should be included in
process chart.
Bicycle
Assembly
Bolt Bolt
Front Wheel Rear Wheel
55
Following figure shows functional decomposition of the system
3.0
Print Check
3.1 3.2
Print Print
Remittance Check Stub
Advice
56
Process
Card
Termination
Predefined
Document links
Input
/
Connector
Paper Tape Outp
ut
Decisio
n Off page
Hard Disk Connector
Sort
Online
Storage Magnetic
Tape
Manual
Operation
s
Manual Input
57
3. WHAT are the inputs & outputs? (Asked when reviewing the code for testing or
maintenance) A Hipo description for a system consisted of the Visual Table of content
and the Functional
1.0
Order
Processing
System
3.0
2.0 4.0
Monthly
Transaction Report
Invoice
Entry preparation
process
3.1.3 3.14
3.1.1 3.1.2
Credit Debit
Purchase Payment
Adjustment Adjustment
Transaction Transaction
58
PROGRAM STRUCTURE CHARTS
Well structured designs improve the maintainability of a system. A structured system is
one that is developed from the top down and modular, that is, broken down into
manageable components, The modules should be designed so that they have minimal
effect on other modules in the system. The connections between modules are limited and
the interaction of data is minimal. Such design objectives are intended to improve system
quality while easing maintenance tasks.
Structure charts show the relation of processing modules in computer software.
Calling Module
59
the logic is specified in a top-down fashion. The first consideration in a process or
decision is the top element. The second in sequence is the next one shown, and so forth.
Similarly, there is a single exit from the process. Each process is named. The structure
chart reads from top to bottom and left to right. Each activity is nested within the iteration
and alternative process of which it is part. In addition, each condition is clearly shown.
DECISION MAK1NG
CONDITION ACTIONS
Possible states of an entity Alternatives, steps, activities or procedures
Person, place, thing, event that can be taken when a specific decision is made.
60
DECISION TABLE:
It is usçd for more complex circumstances where several criteria (conditions)
determine an action. Let us consider a discount policy for customers with the following
details:
If a customer places an worth Rs. 20,000 or more, the company offers him a discount of
15% on the purchase amount. However, if the customer is old to the company, the lower
limit of purchase amount is reduced to Rs. 10,000. In all other cases, a 10% discount is
offered for any purchase of Rs. 10,000 or more.
This statement involves complex decision-making, which can become even more
complex as more clauses are added for discount provisions. DFD is not a suitable tool for
such a level of detail. A decision table or decision tree is particularly used for such
decision rules.
A decision table is a matrix of rows and columns. The table is divided into 4 parts as
shown in the following figure. The left hand parts denote possible conditions and actions.
The right hand parts define the rules. Condition is a possible state of an entity. As
conditions vary, they are also called decision variables. An alternative step or procedure
that an individual takes or follows when confronted with a condition is called an action.
A rule defines an action to be, taken corresponding to a defined combination of
conditions.
Decision table for the above stated discount policy statement is given in the following
figure:
Action
Action Entries
Statements
61
• Identify all the conditions and the actions.
• Identify the possible entries for each condition statement.
• Workout the total number of decision rules by multiplying the number of
possibilities.
• Create the conditions and actions stub.
• Fill up all the condition entries to ensure that all possible combinations of
conditions have been filled up.
• Identify the actions corresponding to each combination of the conditions.
• Check the rule table to remove contradictory rules, if any.
• Remove redundant rules, if any.
Applying these rules, the decision table for the discount policy can be created as in
figure below. The rules have been given serial numbers 1 to 8. Rules 1 and 5 have been
marked with C to indicate contradictions as the purchase amounts cannot be in the two
ranges simultaneously. To further refine this table, rule 4 and 8 can be combined, as the
action is determined irrespective of the entry values of old customer condition. In this
case, we call the rule as indifferent to the condition and show it with the symbol of
indifference (-). The modified table is shown in the following figure.
1 2 3 4 5 6 7 8
Old Customer Y Y Y Y N N N N
Purchases > = 2000 Y Y N N Y Y N N
Purchases between
10000 - 20000 Y N Y N Y N Y N
15% Discount X X X
10% Discount X
No Discount X X
62
The table represented above contains only limited values of condition values, i.e.
Y and N indicating Yes and No situations. X in the action entry stub indicates the
corresponding action to be taken. Such a table is called Limited Entry Form. Another
form of the table, widely used, is the Extended Entity Form, which allows the descriptive
values in the condition or action entry stubs, e.g. the above figure could have a decision
variable as ‘ Purchase amount’ and the entry values as “ > = 20000, ‘ between 10000 and
20000’ and Less that 10000’. Similarly, action entries could have complete descriptions
rather than the symbol ‘ X’.
1 2 3 4 5
Old Customer Y Y - N N
Purchases > = 2000 Y N N Y N
Purchases between
10000 - 20000 Y Y N N Y
15% Discount X X X
10% Discount X
No Discount X
63
The difference between this type of a table and a limited entry table is that the stub part of
the table are not complete in themselves It is necessary to consider together both the stub
and the entry parts to determine whether a condition or action is relevant to a specific rule
DECISION TREE
A decision tree is a diagram that presents conditions and actions sequentially and thus,
shows which conditions to consider first, which second and so on. It resembles the
branches of a tree and hence the name. A decision tree corresponding to the decision
policy mentioned in the previous section is given m the following figure:
action
condition
action
condition
action
condition
action
root
condition action
action
condition
action
condition
action
64
The nodes of the tree represents condition and indicates that a determination must be
made about which condition exists before the path to be chosen The right side indicates
actions to be taken
A decision tree gives a clear picture and a pathway to reach from a set of decision
variables represented as branches of a tree and traces down to the ultimate point of action,
also called the leaf or node of the tree. This representation becomes clumsy and unwieldy
as conditions increase in number.
Old
Purchases 15%
customer
Purchases < 20000
>=10000
New
10%
customer
Start
Purchases
> = 20000 15%
Purchases
< 10000 Nil
STRUCTURED ENGLISH
Structured English is another tool to deal with the ambiguity of language It states the
decision rather than showing them It is quite close to the natural English language with
some standard conventions to eliminate vague expressions and enhance the clarity of
documentation It is used to express the complete logic of the process, which includes the
representations given by the DFD and decision models However, the DFD and Decision
models give a comprehensive pictorial view of their own specified areas and thus,
structured English should not be confused as an alternative to these
65
A sample notation of structured English is shown in the following figure explaining the
generic order processing system
CONVENTIONS:
PROCESS ORDER
DO ACCEPT-ORDER-DETAILS
DO CHECK-INVENTORY
DO COMPUTE-ORDER-TOTAL
DO .COMPUTE-DISCOUNT
DO PLAN-DISPATCH
ACCEPT-ORDER-DETAILS
REPEAT ORDER-LINE-ENTRY UNTIL ALL ITEMS DONE.
ORDER-LINE-ENTRY
REPEAT INPUT UNTIL ALL ITEMS DONE
CHECK -INVENTORY
REPEAT CHECK-ITEM-INVENTORY UNTIL ALL ITEMS DONE.
IF ALL ORDER-ITEM ARE VALID THEN
66
INVENTORY STATUS IS OK
CHECK-ITEM-INVENTORY
IF QTY-IN-HAND IS LT ITEM-OTY THEN
DO REJECT ORDER
ELSE
ORDER-ITEM IS VALID
COMUTE-ORDER-TOTAL.
MULTIPLY WITH ITEM-PRICE TO GIVE ITEM-TOTAL
ADD ALL ITEM-TOTAL TO GIVE ORDER-TOTAL
COMPUTE-DISCOUJNT
IF ORDER-TOTAL IS -GE 20000 THEN
DISCOUNT IS 15%
ELSE
IF ORDER-TOTAL IS GE 10000 THEN
IF CUSTOMER IS OLD THEN
DISCOUNT 1S I5%
ELSE
DISCOUNT IS 10%
. ELSE
DISCOUNT IS NIL
PLAN-DISPATCH
IF INVENTORY-STATUS IS OK THEN
DISPATCH IS ALLOWED
ELSE
ORDER IS PENDING.
67
USER INTERFACE DESIGN
OUTPUT DESIGN
The output of a computer system is primary contact between the system and most
users. The quality of this output and its usefulness determines whether the system will be
used or note.
OUTPUT CONSIDERATIONS:
2) GENERAL CONSIDERATIONS:
a) Clarify in format and heading for output
b) User clear descriptive titles for different fields on the report
c) Avoid the use of obscure or little known codes
d) Use foot-note where necessary
e) Output only as much as is required.
f) Saving of historical data.
TYPES OF OUTPUTS:
68
1) EXTERNAL outputs whose destination is outside the organization and which require
special attention because they project the image of the organization.
2) INTERNAL outputs whose destination is within the organization and which require
careful design because they are the users main interface with the computer.
3) OPERATIONAL outputs whose use is purely with the computer department.
4) INTERACTIVE outputs which involve the user in communicating directly with the
computer.
5) TURNAROUND outputs re-entract documents to which data will be added before
they are returned to the computer for further processing.
TYPES OF REPORTS:
1) QUERY REPORTS: allows user to get immediate answers to their questions, served
primarily on terminals.
2) DETAIL REPORT: gives all the pertinent facts about situation. Such reports create
handy information file for manual reference.
3) SUMMARY REPORT: tabulated overall results, thus facilitating historical review or
comparison of current to past activity.
4) EXCEPTION REPORT: allows a user to specify criteria for isolating a certain set of
data.
5) PERIOD REPORT: gives users data at regular time interval.
OUTPUT DEFINITIONS:
The outputs should be defined in terms of
- type of output
- content (heading, total etc.)
- format (hardcopy, screen etc.) -
- location (local, remote, transmitted etc.)
- frequency ( daily, weekly, monthly, half yearly etc)
- response (immediate within a period)
69
- volume ( no. of documents, growth)
- sequence
- action required (in case of errors etc.)
OUTPUT MEDIA:
The choice of output media will be affected by the following considerations.
I ) The suitability of the device to the particular application.
2) The need for hard copy (number of copies required).
3) The response time required
4) The location of the user
5) The software / hardware available
OUTPUT SPECIFICATION:
Once the system analyst reaches to an understanding of the user requirements an outline
of the outputs can be prepared. These outlines will help the analyst in
-- To interpret and communicate the result of the computer part of a system to users in a
form which they can understand and which meet their requirements.
70
- To communicate the output design specifications to programmers in a way which is
unambiguous, comprehensive and capable of being translated into a programming
language.
Multiple Copies: Many outputs are required simultaneously by more than one user. This
can be facilitated by using multi-part stationery. Printing stationery is available in carbon
parts and carbon less parts variety.
Design Layout: Develop the output layout as shown in the following figure The layout
should have the following:
• A heading and date
• Data and details
• Breakups and sub-totals
• Summaries
• Page title, number and date
• Conventions for-highlighting important events.
• Column headings and data type. For numeric, use N(n) and for alphas, use X(n), n
specifying the length of the column value.
71
• Sort criteria.
XYZ & CO.
SALES ANALYSIS REPORT FOR THE MONTH…………………..
Total pages: Print Date:
Design Layout
INPUT DESIGN:
Though, outputs are the main determinant of any system performance, the quality
of output is determined by the input made to the system. Thus, it is important for the
designer to take care of the input design. A trash input will result in trash. Carefully
accepted data will give accurate and purposeful analysis.
1) Reduce the input to the minimum for cost and error purposes
72
2) Ensure that the input is acceptable to and understand by the user staff
3) Simplify input clerical procedures
4) Natural order of the data should be maintained.
5) Reduce the number of step between data generation and data capture.
BATCH INPUT: Suffers from rigidity since the information is required in a particular
format. There is also a lack of immediate feed back on errors. It is however very
economical and several advantages in backup and in processing error control.
ONLINE INPUT:
a) Data entry process is usually faster owing to dialogues with the computer
b) Frequently fewer data have to be entered sine the computer can supply some of the
data from its access to files
c) Incorrect keying can be detected on and often corrected immediately this online
checking contributes greatly to improve accuracy and reliability of data
d) Existing staff can be used to input the data.
INPUT STAGES:
- Data recording i.e. collection of data at its source
- Data transcription i.e. transfer of data to an input form
- Data conversion i.e. conversion of the input data to a computer acceptable media
- Data verification (checking the conversion)
- Data control (checking the accuracy and controlling and transporting the data to the
computer)
- Data validation (checking the input data by program when it enters the computer
system)
- Data correction ( correcting the errors that are found at any early stage).
INPUT TYPES:
1) EXTERNAL to the organization e.g. purchase invoice etc.
2) INTERNAL which are user communications with the system e.g. file amendments,
73
adjustments.
3) OPERATIONAL computer departments communication with the system e.g. job
control parameters
4) COMPUTERISED which are inputs in computer media coming from other
internal system or external systems
5) INTERACTIVE inputs entered during a dialogue with the computer.
INPUT MEDIA:
I) Source document conversion devices and key to tape, key to disk and key to diskette
2) By product data capture devices billing machine, accounting machines, cash registers
3) Direct data capture devices optical mark reader, optical character reader, magnetic ink
character reader, these devices are directly linked, to a computer and receive the
source document directly without any, conversion or verification process.
4) On-line data entry devices, teletypewriters, terminals, audio response terminals, light
pens, optical wands which collect data directly from source document into the
computer one transaction at a time.
The in form should be carefully designed, giving proper space for each of the data
to be entered. The input form design should contain the following:
• The heading and date of data entry
• The data columns: heading and value
• The data type and length of each data column.
• The initials of the data entry operator.
74
INPUT VALIDATION:
A proper scheme needs to be devised for the validation of input. There are many
ways to validate the data at various check points. The following text contains some of
those procedures:
Check the Transaction Data: The user may commit errors while typing data. Thus, each
data value must be checked for correctness as soon as they are entered. The following
major tests can be performed on each data value entered:
Existence Test: This test checks the data entered for null value entry, e.g. if customer
code is not entered in a new order data entry form, then this data value should be rejected
in the existence test as the complete order entry without a known customer is futile.
Limit or Range Test: Each data value should be checked for the range of valid inputs. For
example, a date value with the month 13” should be trapped as it is out of the permitted
limit of values for a month. The limits and range are defined for every data field at the
time of data base design.
Combination test: Sometimes, a data value is valid when tested in isolation but becomes
invalid when tested in combination with some other fields. For example, a date entry of
31 is a valid entry as it can have any value in the range between 1 to 31, but it becomes
invalid as soon as the month is entered as 2 i.e. February.
75
INPUT CODIFICATION SCHEME
Since the main objectives of any input design are to speed up the process and
avoid errors, it is preferred to use codes rather than lengthy names for data entry, e.g.
entering a 5 digit customer code is far preferable to entering the complete name and
address of the customer while entering routine’ orders. These codes need to be easy to u
interpret and memorize.
A code is an ordered collection of symbols designed to provide unique identification of
an entity or attribute. The function of a code is to make it possible to identify, or retrieve
the coded item as efficiently as possible. The need for designing a major code tends to
arise when
1) a new system is superimposed in an organization
2) when an existing code is got grown and cannot be sensibly extended
3) When two organizations with different coding systems merge and a single code is
needed for both.
76
Non Significant Codes: is one in which the individual values are meaningless. There is
no defined relationship between the code value and the attribute being coded. It is
designed only to provide a unique identification.
Block Codes: Block codes are special type of’ sequential codes in which the sequences
are grouped within sections or blocks. Block codes are often used where the code
numbers are issued at several different locations and first digit indicates the location of
issue.
Random Codes: The random code is drawn from a number list which is not detectable in
order or sequence. The code is produced by using random, number tables.
Significant Codes: is one which apart from providing unique identification is designed to
furnish additional meaning which can yield logical collating or mnemonic significance.
Significant Digit-Subset Codes: This scheme divides the complete code into various
subsets, each one of them signifying some separate meaning, e.g. the phone number
0575-622 137 is a code where 0575 indicates the code of the city, .62 identifies the local
exchange within the city and 2137 is. the sequence code within that exchange.
Logical Code: in a logical code the individual values are derived ‘in conjunction with a
Consistent well defined logical rule or procedure e.g. MATRIX and SELF CHECKING
code.
Matrix Code: is useful in coding two component relationships. The code values can be
formed by assigning sequence numbers.
77
Self Checking Code: When an additional character is appended to a base code to check
its consistency the character is called as a check character. The check character is derived
by using some mathematical algorithm. ‘The check character feature provides the
capability of detecting most random or clerical errors. Generally the modulus method is
used to generate the check character.
Collating Code: are the most frequently used codes. The collating structure is designed
so that when sorted by the code numbers the items are placed in predetermined order e.g.
is alphabetic, hierarchical, classification, chronological codes.
Alphabetic Code: assigning alphabetical code the items are placed in the alphabetical
sequence then the items are assigned a code of ever increasing value. Normally spaces
are left between each item for future expansion.
78
Hierarchical Code: a collating code which ranks entities or attributes by relative levels.
Faceted Codes: This kind of code represents the different facets of the coded items.
Chronological Code: is assigned in order of events so that each code has a higher value
than the last code assigned.
Abbreviation Codes: This method uses the abbreviation of the name of. the entity or
attribute. There are two types of abbreviation.
Acronyms: is a particular type of mnemonic representation formed from the first letter or
letters of several words: The acronyms often form a world in itself. e.g. RADAR -
RADIO Detecting and Ranging.
79
1) UNIQUENESS: The code structure must ensure that only one value of the code with a
single meaning may be applied to a given entity or attribute although the attribute or
entity may be described in various ways i.e. there should be one to one correspondence
between the codes and
entities. .
2) EXPANDABILITY: The code structure must allow for growth of its set of entities or
attributes.
3) CONCISENESS: The code should require the fewest possible number of positions to
include and define each item.
5) SIMPLICITY: The code must be simple to apply and easily understood by each user
particularly workers with little experience.
10) OPERATABILITY: The code should be adequate for present and anticipated data
processing both for machine and human use.
80
PROCEDURE DESIGN:
PROCEDURE DOCUMENTATION:
A well designed procedure is clear, unambiguous, complete and concise. This means
that the vocabulary to describe the procedures should be simple. Generally, structured
English is used to express the procedures. These documents may be kept in the form of a
printed manual or on the screen. The procedures manual should have:
• A table of contents for easy reference to specific pages of procedures,
illustrations etc.
• An explanation of the purpose of each procedure.
• Step by step directions for each task.
• A description of expected results of each procedure and who will benefit. Quality
standards for each procedure.
81
• What action to take up if a procedure is not followed and recovery is required. A
procedure for feedback of users.
DATABASE DESIGN:
A data base is an orderly arrangement of all the records related to each other. It is
important to design a database with care, to ensure Optimum performance, storage and
fast retrieval of data. If the database design is not efficient, the input and output quality
can remain poor. The following needs to be done for data base design:
• Identify all the tables or record types.
• Identify the columns or fields for each table.
• Identify the relations between various tables.
• Identify the data type and length for each field of the tables.
• Identify the key fields for each table.
• Normalize the database to ensure simples, smaller, consistent data structures
without redundancy.
• Document the database dictionary.
DESIGN DOCUMENTATION:
82
• brief introduction to the system.
• design factors
• design constraints
• list of programs list of data files
• list of input forms
• list of outputs
• manual procedures
• program specifications
• input / output specifications
• system test conditions
• cross reference between the design and the requirement specifications document,
indicating the solution for .the requirement specifies in the requirement
specification.
User Manual:
It is written so that the users of the system have a comprehensive text to refer to.
The manual should contain all the information the user needs to use a system, The
manual should be simple, easy to read without any technical jargon that the users cannot
understand. It should contain:
• an overview of the system in terms of a flow chart
• clear formats and instructions to fill in the input form
• the outputs of the system with report and screen layouts and also with the
procedures to retrieve them.
• anticipated exceptions that are to be handled by the users.
• the role of various users within the same or different departments.
Operations Manual:
It is written for the computer operators. It contains the descriptions and
instructions operators need to operate the system. It should contain:
• a scheme of execution of programs
83
• an overview of the system from the operator’s point of view. This should specify
the start, stop and restart sequences.
• a scheme for system maintenance.
• various procedures to ensure the security, privacy and integrity of data.
Implementation planning include
1) Selection plan for qualified personnel
2) System test plan
3) Personnel Training plan
4) Equipment Installation plan
The training maybe organized internally or by an outside agent, generally parallel to the
process of system development.
84
TRAINING: User manager must be informed of the whole system work, its objectives,
new documentation files and procedures. User staff must be instructed to how to perform
their new tasks.
Training sessions must aim to teach user staff the specific skills required in their
new jobs. Thus they should contain large elements of practical activity (people learn far
more by doing that by watching or listening). Ideally they should consist of short and
regular sessions rather than a long, once off period, and they should be conducted with
small groups rather than a full number of staff, this facilitates learning from peers.
The training will be most successful if conducted by the supervisor with the
systems analyst in attendance to sort out any queries; view methods will gain acceptance
more quickly in this way. This also applies to user manuals; if the users write their own
manuals they will be more intelligible and
more acceptable. ..
Plenty of job aids should be provided to assist in the 1éarthng process these will
include visual presentation of procedures (e.g. flow form) , on machines, wall charts (e.g.
time scales) and use of different colours. Above all the training sessions should be
tailored to the learning process, allowing assimilation over a period before more new
information is fed in; and providing feedback on progress.
85
CLERICAL PROCEDURE TESTING:
1) the procedures are fully understood or not
2) whenever error occur correct action is taken or not
3) timings are realistic
4) volume of work predicted can be handled or not
5) maximum possible peak load
CONVERSION PROCEDURES:
This is the actual phase of putting all the data from the old to the new system
format and starting the actual usage of the system. The conversion should be well
managed under the control of a conversion manager. The conversion manager should
prepare a plan for conversion keeping the following factors in view:
• Describe all the activities to be converted, e.g. the modules of order acceptance,
dispatch, sales analysis etc.
• identify persons responsible for each activity. They should be the people
responsible for providing necessary inputs to start up the new system and control
the related progress.
• Schedule activities: A Gantt Chart can be prepared to indicate the predecessor
and successor activities.
• anticipate problems in the hardware, software, data or organization and plan for
their solutions.
• prepare the site for installing the required equipment.
• prepare all the data and files to be entered before the system usage can take place.
e.g. establishing all the master data records.
• keep a count of all the records to be entered.
• handle all situations involving data transmission.
86
FILE CONVERSION
File conversion normally, develops into the following sequence of events.
1) Record of the old file data on specially designed input documents by clerical efforts
2) Transcribe, the completed documents to suitable media and verify.
3) use a tailor made program to read transcribe data and then output the required files in
the format needed by the user program.
87
Direct Conversion Approach:
This approach applies to systems, which require a large set of resources for their
operations and it is not feasible to run the old and the new in parallel. A fixed date is
allotted for the start of the new system and change-over from the old system on the same
date and time. This approach brings the new system immediately in to use. But for this,
the system must have been thoroughly tested before change-over. If the system fails after
the change-over, there can be huge losses to the organization.
This implies the introduction of a completely new system without any reference to any
previous similar system which may exists. (used only when there is insufficient similarity
between OLD and NEW system.
Pilot Approach:
This approach advocates the implementation of the new system on a pilot basis,
e.g. introducing a reservation system at one of the reservation counters and after ensuring
its success, introducing it to all the others. This way, the risk of failure at every location
simultaneously is reduced. Moreover, if the system succeeds at one location, the word
spreads across all locations in favour of the system. This brings about a change of
attitudes also. However, the reverse is a very costly affair, as the failure at one location
may elicit a negative response from other places also.
The new system is run using input data from previous period so that the results
are known and can be checked. Then now system is running taking current data.
Phase-In Approach:
This approach suggests breaking down the complete system into various sub-
parts, which can be arranged in sequence according to priorities and allocates time slots
for its implementation accordingly. For example, if the complete information system is to
be implemented in an organization, it may be divided according to various functions such
as finance and marketing in the first phase; inventory and purchase in the second phase;
production, planning etc. in the third phase and so on. This approach is beneficial as the
88
independent parts of the system can be tested and implemented successfully one after the
other. This makes the implementation manageable.
This is a method in which the new system is introduced in a piecemeal fashion by
phasing in different areas of work gradually. This makes personnel transfer easier.
SYSTEM CONTROLS
The general considerations may be identified as follows :-
i) control should be exercised as soon as possible
ii) controls must be defined
iii) Adequacy of control
ERROR STATISTICS : Any major system should include provision for statistics of
errors to be maintained. This will enable the effectiveness of each control to be
ascertained & allowed analysis to show which errors could have been identified &
corrected earlier in the system. Not only this will enable sequent improvements to be
made to the system but will also enable more effective controls to be incorporated in
other system.
1. CONTROL TOTALS: - The principal of control totals is that the value of a particular
data is summed as a separate clerical process & when the input documents containing the
same data elements are processed by computer a machine-generated total is created &
reconciled to the control total. This system is mainly used to control input for batch
process system.
2. HASH TOTAL: - Hash totals are basically the same as control totals except that the
total itself has no intrinsic value. This the total of the data element ‘Gross Pay’ on a batch
of input document for a wage application should be a control total.
SYSTEM SECURITY
89
Considerable publicity has been given in recent years to damages to computer
equipment and computer related crimes and therefore this had made organizations more
conscious of the need to make the computer systems secure. A. computer based system is
a combination of many assets such as hardware, software, data, combination of many
assets such as hardware, software, data etc.
The computer systems must be made secure against all of this. The possible reasons for
damages are:
1) Fire, flood, riots and dust etc.
2) usage by unauthorized persons. -
3) Incorrect usage by authorized persons
4) Intentional damages by employee etc.
5) System fault (hardware)
6) software faults
7) Human errors/omissions.
Because of these reasons if the damage is done to the computer system the result of the
same maybe:
1) loss of availability
2) loss of accuracy
3) disclosure of information
4) Loss of money
5) loss of time.
To avoid above mentioned losses, the system analyst must take maximum possible care
to avoid the occurrence of such events. While designing the computer based systems he
should consider the following points: -
I) distribution of responsibilities
2) fire alarm system
3) restricted ehtry
4) dust free and air conditioned room
90
5) keeping equipments under lock and key
6) designing menu driven computer systems
7) using password security
8) using system control / system lock files
9) backup procedures
10) prevention of access to other area such as software/programs/utilities, data files etc.
11) controlling job operations by writing macros.
12) user training
13) user documentation
14) assigning terminal oriented jobs.
By taking help of above prevention measures the system analyst, can reduce the
possibilities of the damages that would be there though he cannot stop them completely.
Just after system is installed we should review the tangible and intangible benefits
of the system. The system performance or realization of objectives set is experienced or
not is evaluated.
SYSTEM PERFORMANCE :-
To do system audit check
- whether user is satisfied with the performance of system.
- whether outputs are Accurate/timely whether it contain insufficient or unwanted
information.
- operational aspects: whether procedures are causing problems
- effectiveness in terms of error / inaccurate data / turnaround / response time / reliability
- changes in volume of data information and paper handling and clerical and computer
timings.
- data volume and growth rate
- staffing level
91
- error rate
Cost and benefits: Here actual cost/benefits are compared with those planned. The
deviation in cost occurs due to
- unplanned pay increases
- extra staffing / retention of initial staff
- changed methods of computer charging
- inaccurate estimation of data volume timing
- authorized / unauthorized changes to procedures and documents.
Deviation may be there due to environmental arising from operational, trading and
statutory changes.
- pay method, accounting policy, new equipment or techniques
- staffing policy.
SYSTEM MAINTENANCE
Direct amendment many course damages to the system links. Unless each amendment
well documented and analyzed is not done.
Before doing amendment consider following points -
- effect of amendment on objectives of system
- effect on present state of system development / operations
- cost of amendments .
- timescale for the change
92
This is important for the success of a system. It refers to the proper, periodic
feedback system of the users in order to measure the success of a system. This is not an
easy parameter to measure. Different people with different styles of decision-making and
problem solving, will have different responses to the same system. Nevertheless, a formal
set of measures has been identified. The most important of these success measures are as
below:
High levels of system use as measured by polling users, employing questionnaires, or
monitoring parameters such as the volume of on-line transactions.
User satisfaction as measured by questionnaires or interviews. This might include users’
opinion on the accuracy, timelines, relevance and quality of information. The enhanced
job performance, employee satisfaction can also be asked for.
Achieved objectives the e to which the system meets its specified goals; as reflected by
improved organizational performance and decision-making resulting from use of the
system.
The following problems are considered typical of each stage of the development
cycle for poorly managed implementation, which often leads to failure:
Analysis:
• Time, money and resources have not been properly allocated to researching the
problem. The problem is poorly defined. Thus, objectives of the implementation
will be vague and ambiguous.
93
• Little time is spent in preliminary planning. No standards have been used in the
time and cost estimation.
• The project team is not properly staffed. User groups are not involved and
technical people are included on the basis of availability, not skills.
• The development team promises results which are not achievable.
• Analysts lack good communication skills. They cannot ask users the right
questions..
• Requirements are derived from an inadequate systems study or documentation of
the existing system.
• Requirement specifications are poorly documented.
Design:
• Users are not involved in the design. Thus, the technical team makes the design
with their own biases, It does not mesh well with the real structures, work and
culture of the- staff.
• The system is rigid and caters to current needs only.
• Drastic changes in the roles and procedures are made.
• Documentation are poorly done.
Coding:
94
Testing:
Conversion:
95
USING SYSTEM BOUNDARY BOXES TO INDICATE RELEASES
SEQUENCE DIAGRAM
96
CASE: COMPUTER ASSISTED SOFTWARE (SYSTEM) ENGINEERING
97
CASE products are built around the concept of a project dictionary (or encyclopedia) that
stores all facts of the system specifications. The dictionary is complemented by a host of
facilities that support various methodologies and techniques.
These facilities typically include.
• GRAPHICS TOOLS for various structured and classic techniques for example,
data flow diagram, flowcharts, data models, structure charts, state-transition
diagram and the likewise.
• DICTIONARY TOOLS to record, maintain and report on system details — for
example, Contents of files, inputs, and output, properties of data elements, and
logic rule for process.
• PROTOTYPING TOOLS for external designs of inputs, screens, forms, and
outputs. Some CASE tools can be interfaced to fourth-generation languages and
applications generators.
• AUTOMATIC QUALITY CHECKING for graphics and dictionary
specifications. The Computer can proof models and applications for consistency
errors.
• CODE GENERATORS to eliminate or reduce programming efforts required to
transform the specifications into working systems.
• COST-BENEFIT ANALYSIS TOOL and interfaces to spreadsheet.
• PROJECT MANAGEMENT TOOLS for planning and controlling the activities
of the System development life cycle.
• DOCUMENTATION TOOL assemblers to combine various specifications into
reports for various audiences, technical and non-technical. This facility
frequently interfaces to popular word processors.
CASE Components
98
Diagramming Tools
Interface Generators
System interfaces are the means by which users interact with an application, both to enter
information and data or to receive information, Interface generators provide the capability
99
to prepare mockups and prototypes of user interfaces Typically, they support the rapid
creation of demonstration system menus, presentations screens, and report layouts.
Interface generators are an important element for applications prototyping,
although they are useful with all development methods
Code Generators
Management Tools
CASE systems also assist project managers in maintaining efficiency and effectiveness
throughout the application development process. This CASE component assists
development managers in the scheduling of analysis and design activities and the
allocation of resources to different project activities For example, some CASE systems
support the monitoring of project development schedules against actual progress, as well
as the assignment of specific tasks to individuals. Schedules and reports can be prepared
using details stored in the data dictionary.
100
Data Dictionary:
101
CUSTOMER DETAILS RECORD
Customer
Customer No. ELEMENT N 4
Number
PROTOTYPING :
102
- query and retrieval languages
- report generators
- application generators
- screen generators.
103
Prototypes often suffer from slower performance than their third generation language
counterparts.
Productivity tools such as 4GL’s and CASE offer analyst, user, programmer, and
management an attractive alternative .to the traditional life cycle approach to systems
analysis, design and development.
104
- Less efficient use of hardware with 4GLs versus 3GLs.
Reverse Engineering is the process in which the operational system is deduced for
system’s database design and data element. It also examines which pr use specific data
elements. The advantages of reverse engineering on existing software are found in
maintenance. The reverse engineering facility is available in many of the CASE tools.
These CASE t6ols can reverse engineer database and file structures to data models,
design recovery, typically in the form of control flow or module hierarchy. it provide
facility for extracting design information from existing legacy system. This design
recovery will allow organization that have significant investments in 3GL systems
without adequate documentation to capture the architecture, logic and ultimately business
rules and models that are buried within the older system that are outdated and must be
replaced. Once system is analyzed, the software can be modified for new look.
105
application consists of a number of computer runs each of which is designed to
accomplish a defined stage of processing in respect of each transaction.
Applications :-
1) Banking : It is possible to inform bank customers of the status of their
• account in response to an inquiry.
2) Tour Operators: Reservation offices accept telephone inquiries from travel agents
regarding availability of room for a particular day for some person. If available the room
can be booked.
3) Stock Exchange: Terminals located in major stock exchanges throughout the country
& the offices of participating brokerage firms enable speedy processing of share dealings.
4) Stock Control: Terminal located in warehouses provide the means for automatic
reordering of stocks, updating of stocks rè reservations, follow up of outstanding orders.
106
The term “Real Time” refers to the technique of. updating files with transaction
data immediately the even to which it relates occurs. This is in• distinction to “batch
processing” which ‘processes related data in batches at pre-defined periods of time.
A real-time computer system is communications-oriented and provides for random
inquiries from remote locations with instantaneous responses because of this
characteristic this type of operations is referred- to also on line of conversational
processing.
Real time processing is suitable when it is necessary to have the latest possible
information in the following types of business operations (a) Meteorological data (b)
Defence Data (c) Airlines - flight seat availability etc.
QUESTIONS
1. XYZ Telecom Ltd. has launched its mobile services in Ahmednagar. Subscription
Or membership for its services will open for customers from June the following
procedure is proposed by sales dept.:
- There are 3 schemes for subscription.
- AhmednagaR region is divided into 6 area sales office.
- Customer can collect subscription forms at any sales office.
- Customer submits filled form and payment by DD/Cheque at any sales office.
- Forms are verified, subject to realization of payment customer is informed about
Mobile number by a letter.
- Customer pick ups equipment from Sales Office.
107
The Regional Office wants to generate MIS, you are expected to design the following:
(1) Entity Relationship Diagram.
(2) File Design upto 3NF 8.
(3) Routine Reports and Analytical Reports (at least 3).
2. Managing director of ABC Hotels Pvt. Ltd. has decided to open E-Dhaba for the
people of Pune. The actual site for Dhaba is proposed at 20 km on Pune-Murnbai
highway. The site will provide the following information:
- Information of menu card.
- Order booking form.
- Payment process.
Based on above information people can place orders on net which are confirmed with you
using fax or phone. Orders are executed at site or Home delivery as per the request
customer. Bill is prepared based upon order against which customer can make payment
using E-Credit card in advance or by cash.
You are expected to draw level-one Data Flow Diagram.
3. Preet has decided to sale Vegetables/Fruits on net people can place order on Net. Bill is
prepared as soon as order is placed. Customer can pay bill in advance by credit card or by
cash after home delivery.
For the above case:
(1) Draw structure chart.
(2) Draw order booking form.
4. Regional Transport Office (R.T.O) is related with registration of the new vehicle and
insurance of the vehicle. For the new vehicles the registration is done according to the
type of vehicle (2/3/4 wheeler) and also according to (Light/Medium/Heavy).
The registration of vehicle is done according to the following rules:
- if the vehicle type is any one and the weight is light then registration charges are
Rs.100.
- If the vehicle type is 3 wheeler and the weight is medium then the registration charges
are Rs.1 50 and if weight is heavy then the registration charges are Rs,200.
- If the vehicle is .4 wheeler and the weight is medium then the registration charges are
Rs.200 and if weight is heavy the registration charges Rs.300.
Carry out the decision analysis, using Decision Tree and Decision Table.
108
5. Draw a layout of telephone booking form along with required validations. .
9. Kiran Kulkarni, a newly hired system’s Analyst with your system’s group, has come to
you with an idea. that he assures you will save team time, and hence the business you are
cons will save money. Kiran proposes that rather than doing time consuming interviews,
109
or collecting current quantitative and qualitative. Documents;, the team rely primarily on
what it discovers in archival data. They even have their old reports from earlier systems
projects. We don’t have to talk with any one we can access to material all day without
seeing a .soul.
(a) List the merits of what Kiran is proposing.
(b) List the problems with what Kiran is proposing.
(c) Explain tactfully to Kiran why the systems team uses many different approaches for
data gathering.
11. Design a data entry screen for data creation of marks obtained by students in MCM
admission procedure including entrance, group discussion and personal interview marks.
Also write logic to print the merit list of first 60 students.
11. What importance do the following gem systems concepts have for the systems
Analyst who is working on. the development of computer based information system?
Give examples of each as they apply to information systems ?.
(a) System Boundary
(b) System
(c) Feedbacks
(d) Open system
(e) closed system
(/) Sub-system
(g) Performance Standard .
(b) Identify the symbols used in Data Flow Diagrams and explain how each is used.
(c) What is a data dictionary? Why is it important in systems analysis and design?
110
13. A management of a supermarket proposes to computerize its sales & purchase
activities. Customer selects items with required quantity. All such items are collectively
presented to the counter clerk for billing. The clerk records the item code and the He also
enters the unit price of an item selected. The final bill contains item description, unit of
measure, unit rate, quantity and value. The total payable amount is displayed at the foot
of the bill. Necessary taxes are also included in bill. After the payment of the bill the
stocks of various items are updated.
The stocks of items are also updated when the purchases are made from time to time.
Suggest a suitable system design to cover following:
1) Current stock position of an item
2) Item wise total quantity sold.
3) Total sale -by value.
Draw:
1)1st level DFD.
2) Normalized file layouts.
3) Screen layout for bill entry.
14. Design input form layout to collect the information about depositor. The organization
collects deposits from public for the period of 3 years with minimum amount of
Rs. 3000 Maximum amount is Rs. 15,000. The rate of interest is 10% and for senior
citizen it is 1% extra, income tax is recovered wherever necessary at @ 1%.
15. Draw decision tree for the following income tax is calculated and deducted from the
salary of an employee, as follows: .
1) If monthly salary is less than Rs. 10,000 no tax deducted.
2) Salary between Rs. 10,000 & Rs. 15,000 tax @ 0.5% deducted.
3) Salary between Rs. 15,000 & 20,000 tax @ 1.5% deducted.
4) Salary above Rs. 20,000 tax @ 2% deducted.
5) No tax deducted, if employee is physically disabled.
111
6) In addition to the tax above security tax charged as Rs. 100 for salary more than
Rs. 25,000.
16. A city Co-operative bank has computerized its branch activities. The head office
requires certain summary & detailed reports from the branches, Suggest the report
layouts to print
1) Summary of type wise loan disbursed in the month.
2) List of pre-matured deposits.
18. Discuss the purpose of E-R diagram and its use in SDLC.
20. Customer sends the list of items, along with the quantity to the organization The
organization buys the items asked by the customers, packs as-per quantity required and
gets them bundled for dispatch. Before items are bundled, the list is checked fir any
missing items. Based on amount of goods ordered, service charge is added to the invoice.
A service is completed; when paining is received from the customer payment can be
through cash or cherub. The objective of organization is to provide better service to the
customer. As a Systems Analyst you are required to design following.
1) E.R. Diagram
2) File layouts .
3) Report layouts- (minimum 3)
112
1) Maharashtra domicile student should acquire minimum 45 % marks in Basic
graduation..
2) Non-Maharashtra domicile student should acquire minimum 55% marks in Basic
graduation.
3) Concession of 5 % considered, if student has, represented university at national level
in any sports event.
22 Design a suitable form to collect the viewers opinion on various T.V. serials
transmitted by various T.V. channels.
23. Draw the complete menu tree for inventory system of Raw material and Finished
Goods.
24. The police department wants to maintain a database of crimes. Following are the data
structures available in computerized system
1) Crime Type Master 2) Criminal Master
3) Police Station Master
Give data dictionary for above data structures assuming important attributes. Justify
layout of the dictionary.
25. A computer company has distributed numeric pagers to its maintenance engineers.
The pager can receive only ten digits message, but of which 6 digits are used for phone
number of the customer.
The company would like to use additional 4 digits also for sending meaningful
information the pager.
There are around 53 customers who make complaint calls to company frequently. There
arc three types of equipments such as computers, printers, stabilizers, supplied by the
company to the customer.
Whenever the customer lodges the complaint to the company, they ‘convey the nature of
the equipment. When company receives such a complaint call, it in turn decides the Ivel
of urgency and gives page call to the specific engineer.
113
Design the suitable coding structure for 4 digits so that meaningful information / message
codicil he conveyed to the engineer.
26. Draw the complete menu tree for inventory system of Raw material and Finished
Goods.
27. a) Explain Waterfall Model in detail.
b) What is Reverse Engineering?
114
Draw context and jest level physical DFD, ABC auto Ltd. Procures material against a
purchase requisition received from stores. The material is supplied against a purchase
order prepared by purchase department. Received material is recorded in GRN and sent
to inspection dept. for accep1anct report: Based on the report the stocks are updated.
GRN is further sent to purchase dept. For processing supplier bill.
- To record fixed deposit details, design a suitable screen layout with following details
- Name and address of depositor
- Amount of deposit
- Rate and period of deposit
Mode payment -
State various validations and checks to be provided.
31.A garment dealer declares pricing policy. The reduction declared is as under
- Qty. ordered in a single style,
a) Qty. between 50 and 100 — reduction of Rs. 5 per piece
b) Qty, between 101 and 150 — Rs. & per piece
c) Qty. 150 and more .4ff per piece
- Qty. ordered iii unit styles
d) Qty. between 10 and 20 - Rs. 2% per piece.
e) Qty. between 21 and 40 — Rs. 4 per piece.
f) Qty. 41 and more — Rs. 4.5 per piece
If customer is associated, for more than 10 years, he is granted further discount of 10 %
on the total value.
Draw decision tree for the above.
115
d) State transition diagram
33. “The primary goal of Software Engineering is to improve the quality of software”
Elaborate the need of Software Engineering for software projects.
34. Explain the method of estimating software maintenance cost and elaborate types of
maintenance.
35. Explain classical life cycle and prototyping approach to SDLL in detail.
116