Your SlideShare is downloading. ×
Chapter16 and 17
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Chapter16 and 17

323

Published on

Chapter 16 and 17 CPU cases

Chapter 16 and 17 CPU cases

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
323
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Chapter 16 Designing Effective Output
  • 2. E – 2
  • 3. E – 2 Before
  • 4. E – 2 After
  • 5. E – 3
  • 6. E – 3 Before
  • 7. E – 3 After
  • 8. E – 4
  • 9. E – 5
  • 10. E – 6
  • 11. E – 7
  • 12. E – 8
  • 13.
    • Program : UPDATE SOFTWARE RELATIONAL FILE
    • Input : UPDATE SOFTWARE INSTALLATION LIST, document
    • UPDATE INSTALLED SOFTWARE SCREEN, display
    • Output : SOFTWARE RELATIONAL FILE, disk
    • INSTALLED SOFTWARE TRANSACTION, disk
    E – 9 Update Software Relational File Update Software Installation List Update Installed Software Screen Software Relational File Installed Software Transaction
  • 14.
    • Program : PRINT USER NOTIFICATION REPORT
    • Input : INSTALLED SOFTWARE TRANSACTION, disk
    • Output : USER NOTIFICATION REPORT, report
    E – 9 Print User Notification Report User Notification Reports Installed Software Transaction
  • 15. E – 9 Before After
  • 16. E – 10
  • 17.
    • Inventory number : Not entered, not numeric, already on file
    • Date purchased : Invalid date (month = 14, etc.)
    • Network Connection  : Anything other than C, D, F, M, 1, 2, 3, 0
    • CD ROM : Anything other than 0, 2, 4, 6, 8, 10, 12, 16, 20, B, D, V
    • Monitor, Printer, Internet, or Board Codes: try entering data into the field that is not on the list
    E – 11
  • 18. E – 12
  • 19. E – 12
  • 20. E – 12
  • 21. E – 12
  • 22. E – 12
  • 23. E – 12
  • 24.
    • Design test data and predicted results for the ADD TRAINING CLASS program. Use Microsoft Access to test the display and note whether the results conformed to your predictions.
    • Title : Must be entered
    • Course Description : Must be entered
    • Class length : Not entered, not numeric, greater than 20
    • Operating System : Must be entered that is on the list
    E – 13
  • 25.
    • Design test data on paper to test the CHANGE SOFTWARE EXPERT program. Use Microsoft Access to test the display. Note any discrepancies
    • Last name : Must be entered
    • First Name : Must be entered
    • Phone : Not entered, not numeric
    • Room : Must be entered
    • Title : Must be entered
    • Version : Must be entered
    • Expert Teach Course : Must be Yes or No
    • Operating System : Must be entered data on the list
    E – 14
  • 26. Chapter 17 Successfully Implementing The Information System
  • 27. E – 1
  • 28.
    • A network is a collection of data communication hardware, computers, data communication software and data communication media, all connected in a meaningful way to allow users to share information, resources and equipment.
    •  
    • A star network is a network where each machine is connected to a central machine, called a server. The server holds all the software, and the other machines, called nodes, request the software from it.
    • Since the server receives all the requests, it can handle them one by one, and there are no data crashes.
    E – 1
  • 29. E – 1
    • Advantages
      • Easy to install and wire
      • No disruptions to the network when connecting or removing devices
      • Easy to detect faults and to remove parts
    • Disadvantages
      • Requires more cable length than a linear topology
      • If the hub or concentrator fails, nodes attached are disabled
      • More expensive than linear bus topologies because of the cost of the hubs, etc. 
  • 30.
    • Backup will be performed on two levels
    • All transactions entering the system from on-line screens will be placed on log (or journal) transaction files. These are located on a smaller, second hard disk within the server computer. If there is a head crash or other problem on the main hard disk, the backup files would still exist. The format of the log files is
    E – 2 Date Time Computer ID User ID Backup Type Result 2010/04/01 12:00 AM Dot-PC DMatrix Full Completed 2010/04/01 12:00 PM Dot-PC DMatrix Incremental Completed 2010/04/02 12:00 AM Dot-PC DMatrix Incremental Completed 2010/04/02 12:00 PM Dot-PC DMatrix Incremental Failed 2010/04/03 12:00 AM Dot-PC DMatrix Full Completed 2010/04/03 12:00 PM Dot-PC DMatrix Incremental Completed
  • 31. E – 2
      • 2. All database files are copied to media every night. These are removed to one of the other campus locations and stored in a vault.
    • Advantages:
    • Backup of all major files.
    • Faster backup since major files do not have to be backed up before each update.
    • Continual backup using the log files.
    • Disadvantages:
    • Programs must be written to restore database records in a batch mode from the log files.
    • Streamer tape units may be initially expensive.
  • 32. E – 3
      • List security measures that should be taken to prevent unauthorized persons from using the computer system
      • Unique username and password for all users
      • Password must be at least 8 characters long and must include at least one number, one uppercase letter, and one special character (ex: finAlf4nt4$y)
      • Password will expired every 60 days and will need to be changed (notification 12 days before expiration date)
      • Username should be locked after 3 failed attempts
      • System users audit every 3 months to check for valid users of the system and removed users who no longer have access privilege
  • 33. E – 4
      • Team Leader / Decision Maker: Dot Matrix
        • Will determine the condition and stability of campus resources
        • Make High Level Decisions with management team
        • Will Initiate Communications to her team
      • Team:
        • Hy Perteks – Director Information Center –
          • Data Backups
          • Manage Data Recovery Process
          • Routing of Network Resources if needed
        • Mike Rowe – Maintenance Expert - Physical Condition of PC’s
          • Check Condition of PC’s
          • Physical relocation of PCs if needed.
        • Cher Ware – Software Manager - Software Configuration
          • Ensure duplication of critical systems at new location if needed.
          • Ensure that any manual software changes are made (need to change servers)
          • Assist Mike Rowes team as needed.
  • 34. E – 4
    • Other Recommendations:
      • Remote Emergency Location – Satellite Campus
      • Off Site replication should be mirrored at one of the satellite campuses.
        • Already owned Space
        • There should be little effort in backing up data here since they are already on the network.
      • Test Disaster Recovery Twice a year.
  • 35.
    • Question: Explain in a paragraph why a phased conversion would be used to install the computer system
    E – 5 Answer : A phased conversion is the best method since the system has several major subsystems. Hardware records and programs must be installed first because software records reference them. The phased conversion provides data entry personnel time to update records with additional data elements not stored in the old system

×