Chapter 16 Designing Effective Output
E – 2
E – 2 Before
E – 2 After
E – 3
E – 3 Before
E – 3 After
E – 4
E – 5
E – 6
E – 7
E – 8
<ul><li>Program :  UPDATE SOFTWARE RELATIONAL FILE </li></ul><ul><li>Input :  UPDATE SOFTWARE INSTALLATION LIST, document ...
<ul><li>Program : PRINT USER NOTIFICATION REPORT </li></ul><ul><li>Input : INSTALLED SOFTWARE TRANSACTION, disk </li></ul>...
E – 9 Before After
E – 10
<ul><li>Inventory number : Not entered, not numeric, already on file </li></ul><ul><li>Date purchased : Invalid date (mont...
E – 12
E – 12
E – 12
E – 12
E – 12
E – 12
<ul><li>Design test data and predicted results for the ADD TRAINING CLASS program. Use Microsoft Access to test the displa...
<ul><li>Design test data on paper to test the CHANGE SOFTWARE EXPERT program. Use Microsoft Access to test the display. No...
Chapter 17 Successfully Implementing The Information System
E – 1
<ul><li>A network is a collection of data communication hardware, computers, data communication software and data communic...
E – 1 <ul><li>Advantages </li></ul><ul><ul><li>Easy to install and wire </li></ul></ul><ul><ul><li>No disruptions to the n...
<ul><li>Backup will be performed on two levels </li></ul><ul><li>All transactions entering the system from on-line screens...
E – 2 <ul><ul><li>2. All database files are copied to media every night. These are removed to one of the other campus loca...
E – 3 <ul><ul><li>List security measures that should be taken to prevent unauthorized persons from using the computer syst...
E – 4 <ul><ul><li>Team Leader / Decision Maker: Dot Matrix  </li></ul></ul><ul><ul><ul><li>Will determine the condition an...
E – 4 <ul><li>Other Recommendations: </li></ul><ul><ul><li>Remote Emergency Location – Satellite Campus  </li></ul></ul><u...
<ul><li>Question: Explain in a paragraph why a phased conversion would be used to install the computer system </li></ul>E ...
Upcoming SlideShare
Loading in...5
×

Chapter16and17

377

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
377
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Chapter16and17

  1. 1. Chapter 16 Designing Effective Output
  2. 2. E – 2
  3. 3. E – 2 Before
  4. 4. E – 2 After
  5. 5. E – 3
  6. 6. E – 3 Before
  7. 7. E – 3 After
  8. 8. E – 4
  9. 9. E – 5
  10. 10. E – 6
  11. 11. E – 7
  12. 12. E – 8
  13. 13. <ul><li>Program : UPDATE SOFTWARE RELATIONAL FILE </li></ul><ul><li>Input : UPDATE SOFTWARE INSTALLATION LIST, document </li></ul><ul><li>UPDATE INSTALLED SOFTWARE SCREEN, display </li></ul><ul><li>Output : SOFTWARE RELATIONAL FILE, disk </li></ul><ul><li>INSTALLED SOFTWARE TRANSACTION, disk </li></ul>E – 9 Update Software Relational File Update Software Installation List Update Installed Software Screen Software Relational File Installed Software Transaction
  14. 14. <ul><li>Program : PRINT USER NOTIFICATION REPORT </li></ul><ul><li>Input : INSTALLED SOFTWARE TRANSACTION, disk </li></ul><ul><li>Output : USER NOTIFICATION REPORT, report </li></ul>E – 9 Print User Notification Report User Notification Reports Installed Software Transaction
  15. 15. E – 9 Before After
  16. 16. E – 10
  17. 17. <ul><li>Inventory number : Not entered, not numeric, already on file </li></ul><ul><li>Date purchased : Invalid date (month = 14, etc.) </li></ul><ul><li>Network Connection  : Anything other than C, D, F, M, 1, 2, 3, 0 </li></ul><ul><li>CD ROM : Anything other than 0, 2, 4, 6, 8, 10, 12, 16, 20, B, D, V </li></ul><ul><li>Monitor, Printer, Internet, or Board Codes: try entering data into the field that is not on the list </li></ul>E – 11
  18. 18. E – 12
  19. 19. E – 12
  20. 20. E – 12
  21. 21. E – 12
  22. 22. E – 12
  23. 23. E – 12
  24. 24. <ul><li>Design test data and predicted results for the ADD TRAINING CLASS program. Use Microsoft Access to test the display and note whether the results conformed to your predictions. </li></ul><ul><li>Title : Must be entered </li></ul><ul><li>Course Description : Must be entered </li></ul><ul><li>Class length : Not entered, not numeric, greater than 20 </li></ul><ul><li>Operating System : Must be entered that is on the list </li></ul>E – 13
  25. 25. <ul><li>Design test data on paper to test the CHANGE SOFTWARE EXPERT program. Use Microsoft Access to test the display. Note any discrepancies </li></ul><ul><li>Last name : Must be entered </li></ul><ul><li>First Name : Must be entered </li></ul><ul><li>Phone : Not entered, not numeric </li></ul><ul><li>Room : Must be entered </li></ul><ul><li>Title : Must be entered </li></ul><ul><li>Version : Must be entered </li></ul><ul><li>Expert Teach Course : Must be Yes or No </li></ul><ul><li>Operating System : Must be entered data on the list </li></ul>E – 14
  26. 26. Chapter 17 Successfully Implementing The Information System
  27. 27. E – 1
  28. 28. <ul><li>A network is a collection of data communication hardware, computers, data communication software and data communication media, all connected in a meaningful way to allow users to share information, resources and equipment. </li></ul><ul><li>  </li></ul><ul><li>A star network is a network where each machine is connected to a central machine, called a server. The server holds all the software, and the other machines, called nodes, request the software from it. </li></ul><ul><li>Since the server receives all the requests, it can handle them one by one, and there are no data crashes. </li></ul>E – 1
  29. 29. E – 1 <ul><li>Advantages </li></ul><ul><ul><li>Easy to install and wire </li></ul></ul><ul><ul><li>No disruptions to the network when connecting or removing devices </li></ul></ul><ul><ul><li>Easy to detect faults and to remove parts </li></ul></ul><ul><li>Disadvantages </li></ul><ul><ul><li>Requires more cable length than a linear topology </li></ul></ul><ul><ul><li>If the hub or concentrator fails, nodes attached are disabled </li></ul></ul><ul><ul><li>More expensive than linear bus topologies because of the cost of the hubs, etc.  </li></ul></ul>
  30. 30. <ul><li>Backup will be performed on two levels </li></ul><ul><li>All transactions entering the system from on-line screens will be placed on log (or journal) transaction files. These are located on a smaller, second hard disk within the server computer. If there is a head crash or other problem on the main hard disk, the backup files would still exist. The format of the log files is </li></ul>E – 2 Date Time Computer ID User ID Backup Type Result 2010/04/01 12:00 AM Dot-PC DMatrix Full Completed 2010/04/01 12:00 PM Dot-PC DMatrix Incremental Completed 2010/04/02 12:00 AM Dot-PC DMatrix Incremental Completed 2010/04/02 12:00 PM Dot-PC DMatrix Incremental Failed 2010/04/03 12:00 AM Dot-PC DMatrix Full Completed 2010/04/03 12:00 PM Dot-PC DMatrix Incremental Completed
  31. 31. E – 2 <ul><ul><li>2. All database files are copied to media every night. These are removed to one of the other campus locations and stored in a vault. </li></ul></ul><ul><li>Advantages: </li></ul><ul><li>Backup of all major files. </li></ul><ul><li>Faster backup since major files do not have to be backed up before each update. </li></ul><ul><li>Continual backup using the log files. </li></ul><ul><li>Disadvantages: </li></ul><ul><li>Programs must be written to restore database records in a batch mode from the log files. </li></ul><ul><li>Streamer tape units may be initially expensive. </li></ul>
  32. 32. E – 3 <ul><ul><li>List security measures that should be taken to prevent unauthorized persons from using the computer system </li></ul></ul><ul><ul><li>Unique username and password for all users </li></ul></ul><ul><ul><li>Password must be at least 8 characters long and must include at least one number, one uppercase letter, and one special character (ex: finAlf4nt4$y) </li></ul></ul><ul><ul><li>Password will expired every 60 days and will need to be changed (notification 12 days before expiration date) </li></ul></ul><ul><ul><li>Username should be locked after 3 failed attempts </li></ul></ul><ul><ul><li>System users audit every 3 months to check for valid users of the system and removed users who no longer have access privilege </li></ul></ul>
  33. 33. E – 4 <ul><ul><li>Team Leader / Decision Maker: Dot Matrix </li></ul></ul><ul><ul><ul><li>Will determine the condition and stability of campus resources </li></ul></ul></ul><ul><ul><ul><li>Make High Level Decisions with management team </li></ul></ul></ul><ul><ul><ul><li>Will Initiate Communications to her team </li></ul></ul></ul><ul><ul><li>Team: </li></ul></ul><ul><ul><ul><li>Hy Perteks – Director Information Center – </li></ul></ul></ul><ul><ul><ul><ul><li>Data Backups </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Manage Data Recovery Process </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Routing of Network Resources if needed </li></ul></ul></ul></ul><ul><ul><ul><li>Mike Rowe – Maintenance Expert - Physical Condition of PC’s </li></ul></ul></ul><ul><ul><ul><ul><li>Check Condition of PC’s </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Physical relocation of PCs if needed. </li></ul></ul></ul></ul><ul><ul><ul><li>Cher Ware – Software Manager - Software Configuration </li></ul></ul></ul><ul><ul><ul><ul><li>Ensure duplication of critical systems at new location if needed. </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Ensure that any manual software changes are made (need to change servers) </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Assist Mike Rowes team as needed. </li></ul></ul></ul></ul>
  34. 34. E – 4 <ul><li>Other Recommendations: </li></ul><ul><ul><li>Remote Emergency Location – Satellite Campus </li></ul></ul><ul><ul><li>Off Site replication should be mirrored at one of the satellite campuses. </li></ul></ul><ul><ul><ul><li>Already owned Space </li></ul></ul></ul><ul><ul><ul><li>There should be little effort in backing up data here since they are already on the network. </li></ul></ul></ul><ul><ul><li>Test Disaster Recovery Twice a year. </li></ul></ul>
  35. 35. <ul><li>Question: Explain in a paragraph why a phased conversion would be used to install the computer system </li></ul>E – 5 Answer : A phased conversion is the best method since the system has several major subsystems. Hardware records and programs must be installed first because software records reference them. The phased conversion provides data entry personnel time to update records with additional data elements not stored in the old system
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×