Your SlideShare is downloading. ×
0
Strategic plan
Strategic plan
Strategic plan
Strategic plan
Strategic plan
Strategic plan
Strategic plan
Strategic plan
Strategic plan
Strategic plan
Strategic plan
Strategic plan
Strategic plan
Strategic plan
Strategic plan
Strategic plan
Strategic plan
Strategic plan
Strategic plan
Strategic plan
Strategic plan
Strategic plan
Strategic plan
Strategic plan
Strategic plan
Strategic plan
Strategic plan
Strategic plan
Strategic plan
Strategic plan
Strategic plan
Strategic plan
Strategic plan
Strategic plan
Strategic plan
Strategic plan
Strategic plan
Strategic plan
Strategic plan
Strategic plan
Strategic plan
Strategic plan
Strategic plan
Strategic plan
Strategic plan
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Strategic plan

388

Published on

This is my presentation about what I learned in the Analysis Systems Design

This is my presentation about what I learned in the Analysis Systems Design

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
388
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
7
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Strategic Plan<br /> Goals and Plans For My Careers Choice<br />By Daniel Sarpe<br />ITP 251-200<br />Professor Anita Sutton<br />
  • 2. Network Security Specialist<br />Network and Internet Security Specialists can look forward to lucrative careers in some of the following areas: network security and network design, sales, marketing, system administration, Internet security, and basic programming<br />The average salary for a security specialist or security manager in 2008, was between $85,000 and $112,000<br />A student in a Network and Internet Security program can expect to encounter include:<br />Introduction to LANs<br />Introduction to WANs<br />Network and Internet Security<br />Programming<br />Voice and Data Networks<br />
  • 3. Network Security Specialist(Cont)<br />For attaining this career I planned to get first an AAS in Network Security from Germanna Community College which is transferable to University of Mary Washington<br />My plan for the near future is to be admitted to Mary Washington and get a Bachelor Degree in Information Assurance<br />For doing this I need to achieve some qualifications and certificates from CISCO <br />One of the requirements was to make ITP-251 which will teach me about systems analysis and design<br />In ITP251 class I learned about systems planning, systems analysis, systems design and systems implementation.<br />
  • 4. Systems Analysis and Design<br /><ul><li>Phase 1 - Systems Planning</li></ul>Chapter 1 , Chapter 2, Chapter 3<br /><ul><li>Phase 2 - Systems Analysis</li></ul>Chapter 4, Chapter 5, Chapter 6, Chapter 7<br /><ul><li>Phase 3 - Systems Design</li></ul>Chapter 8, Chapter 9, Chapter 10<br /><ul><li>Phase 4 - System Implementation)</li></ul>Chapter 11<br />
  • 5. Systems Planning<br />An Information System has five main components:<br />People<br />Hardware<br />Software<br />Data<br />Processes<br />In the right side we have a specification of Information Systems<br />People are the stakeholders, the hardware consists of servers, workstations, computers, scanners, optic cables, etcetera.<br />The data is the raw material that an information system transform into useful information.<br />
  • 6. Software refers to the programs that control the hardware and produce the desired information.<br />A process describe the tasks and business functions that users, managers and IT staff members perform to achieve specific results.<br />In chapter 1 I also learned about Object Oriented analysis which combines data and processes that act on the data into things called objects. An object is a member of a class, which is a collection of similar objects. <br />I implemented this objects in my project in MDD activity<br />Bellow I will show you an example of relationships between objects and object model diagram that we used in our project of Inspiring a Smile Today , and their attributes and methods.<br />
  • 7. Object Model Elements<br />
  • 8. Chapter 2<br />In chapter 2 I have learned how to do a Preliminary Investigation Report for our project and about operational, technical, economical and schedule feasibility.<br />Operational feasibility means that if a proposed system can be used effectively after it was developed.<br />Technical feasibility refers to the technical resources needed to develop or operate a system<br />Economic feasibility means that the projects need to create some benefits after all the maintenance costs, acquisition, people, users, hardware, etcetera.<br />Schedule feasibility means that a project can be implemented in an acceptable frame time.<br />
  • 9. Project Feasibility<br />Operational Feasibility<br />Enlisting the support of both Germanna Student Services and the Security Office<br />No formal training is required<br />Technical Feasibility<br />Labor intensive, but no training required<br />Graphics are easily created<br />Economic Feasibility<br />Very low cost ($0.05 per flyer)<br />Donated labor<br />Donated printing<br />Schedule Feasibility<br />Kickoff day – Oct 5, 2010<br />4 days prior to Germanna Fest on Oct 9, 2010<br />
  • 10. Chapter 3<br />In chapter three I learned about project scheduling, Gantt and PERT/CPM charts<br />A Gantt chart is a horizontal bar chart that represents a series of tasks. <br />A PERT/CPM chart is used for very complex projects and is called a bottom-up technique.<br />I used in my class project the Gant chart to show the overview of the project status. <br />
  • 11.
  • 12. Phase II – Systems Analysis<br />Systems Analysis starts in Chapter 4 where I learned about Agile methods and Data Flow Diagrams<br />I used in my project DFDs (Data Flow Diagrams) to show how the system stores, process and transform data.<br />An Agile method develops a system incrementally, by building a series of prototypes that are send to the users for feedback after removing all the risks involved in the development <br />
  • 13. Example of Data Flow DiagramDFD used in my project Inspire A Smile Today<br />Work Orders<br />Closed Work Orders<br />Cost Summary<br />Work Data<br />Costs<br />1<br />3<br />2<br />Work Summary<br />Produce Reports<br />Manage Work<br />Manage Costs<br />Current Vehicle Data<br />Completed Work Report<br />Completed Work Orders<br />Maintenance Task List<br />Work Orders<br />Weekly Work Schedule<br />Cost Data<br />Supervisor<br />Employees<br />Manual<br />Accounting<br />
  • 14. Program Design Map<br />
  • 15. I also learned about Scalability and TCO (Total Cost of Ownership) which represents costs in addition to the direct costs involved in a system development and is extremely important in the development team.<br />Scalability refers to a system ability to handle the volume of the business and the transactions from the future.<br />Bellow I will attach a TCO table which shows our total cost for the class project.<br />
  • 16. Initial and Total Cost of Ownership<br />
  • 17. Relationships between Objects and Classes<br />Relationships enable objects to communicate and interact as they perform business functions and transactions required by the system<br />After we identify an object, classes, and relationships between them we are ready to prepare a diagram that shows the relationships among them<br />This diagram shows the relationship among the objects and classes that we identified during our investigation report in our project class.<br />The strongest relationship is called inheritance which enables an object called a child to derive one or more of its attributes from another object, called a parent.<br />
  • 18. Object Relationship Diagram<br />
  • 19. Later in the chapter 7 I learned how to perform Cost Benefit analysis, Outsourcing Fees and In House financing<br /> Instead of outsourcing which means that you have to buy from external resources, you can opt out for In-House financing which means that you can create your own source of income to invest in the development<br /> For the project class I had to make an analyze of the Cost-Benefit with In-House financing option. <br />Bellow I am going to show you how for this particular project, we analyzed the Cost-Benefits and differences between Outsource financing and In-House financing <br />
  • 20. Payback Analysis<br />
  • 21. Return On Investment<br />
  • 22. Cost and Benefits<br />
  • 23. Outsourced Vs In-House Financing<br />
  • 24. Phase III – Systems Design<br />In this phase of the course we learned about the design of a system using inputs and outputs or user interface design.<br />I learned how to use the inputs that I identified in the planning and investigation process, to create an output so the recipients can give us a positive feedback for our system output<br />The outputs can be internet-based information delivery, blogs, instant messaging, wireless devices, images, videos.<br />I learned for this phase how to create the output for my project which was a printed report that contains three zones that are easy to read and understand and follows the security and privacy rules of GCC <br />
  • 25. Input Data<br />Data entry is the process of manually entering data into the information system, usually in the form of keystrokes or mouse clicks<br />Batch inputs (data usually entered on a specified time schedule), online inputs (immediate availability of data)<br />To avoid unnecessary costs the volume of data needs to be reduced, so the number of errors will be reduced<br />For input errors we have to check the validity of the data, the type of data so we can improve input quality by testing the data and rejecting any entry that fails to meet specified conditions.<br />
  • 26. Input Design<br />Section 1<br />Section 2<br />Section 3<br />
  • 27. Output Design<br />
  • 28. Data Design<br />To construct the physical model of the information system, a system analyst can select a design approach and begin to construct the system<br />The model can be a web-based database design using HTML for creating a web page<br />In this chapter I have learned about Entity Relationships Diagrams<br />The relationships among the entities in a system can be one-to-one, one-to-many, many-to-many.<br />Next slide it is going to show an example of a entity relationships diagram that I used in my class project and it shows the relationships between the objects and external entities specific to my project<br />
  • 29. Entity Relationship Diagrams<br />
  • 30. Normalization<br />Normalization – is the process of creating table designs but assigning specific fields or attributes to each table in the database. Include four stages:<br />Unnormalized design, first normal form, second normal form and third normal form<br />The next slides will going to show you the first, the second, and the third normal form that represented the best design for my class project<br />
  • 31. 1NF Data Structure<br />Combination Primary Key<br />
  • 32. 2NF Data Structure<br />
  • 33. 3NF Data Structure<br />
  • 34. System Architecture<br />System architecture translates the logical design of an information system into a physical blueprint, or architecture<br />Initial Cost and TCO – for the final design we have to choose between in-house financing or outsource financing<br />In this chapter I learned how to implement an initial and total cost of ownership for my particular project and I will show you a table with initial costs and TCO<br />
  • 35. Initial and Total Cost of Ownership<br />
  • 36. Return Of Investment<br />
  • 37. In chapter 10 I learned about the network models, TCP/IP and the network protocols, routers, servers and the topology of a network<br />The OSI model (Open Systems Interconnection) describes how data moves from an application on one computer to an application on another networked computer.<br />The OSI model contains seven layers :<br />Application layer<br />Presentation<br />Session<br />Transport<br />Network<br />Data Link<br />Physical layer<br />
  • 38. Phase IV – Systems Implementation<br />In this chapter that describes the systems implementation phase of the SDLC, I learned about the application development, installation and evaluation<br />For this particular case I studied the Agile method and XP (Extreme Programming) method<br />The Agile method is about establishing a interconnection an communication between the IT teams and the users or customers.<br />Agile methods use a variety of models including the Spiral Model which responds much quicker to clients and provides repetition in development<br /> Risksare explicitly assessed and resolved throughout the process.<br />
  • 39. Example of a Spiral Model<br />A agile method that represents a series of revisions based on user feedback.<br />
  • 40. Extreme Programming is based on the feedback from the users and iteration of the processes.<br />The user tells stories that goes than to the planning and goes back and front into a repetitive cycle, until all the risks are eliminated so the final application gets the approval from the customers.<br />System developers use also multipurpose tools for development such as entity relationships diagrams, flowcharts, pseudocode, decision tables and decision trees. <br />
  • 41. Extreme Programming (XP)Started in 1990s when Kent Black tried to find a better way of doing software development when he was handling a project at DaimlerChrysler.<br />A deliberate and disciplined approach to software development<br />Extreme Programming works by bringing the whole team together<br />Difficulty coordinating larger teams<br />Can result in a never-ending project if not managed properly<br />Tendency to not document thoroughly<br />
  • 42. Extreme Programming (XP)<br />One of the newest agile methods that emphasizes team work.<br />http://www.extremeprogramming.org/rules/userstories.html<br />
  • 43. Multipurpose Tools<br />Pseudocode – a technique for representing program logic, actually translates a text into a logic program that can be used with C++, C#, or HTML codes<br />The next slide it’s going to show an example of pseudocode<br />
  • 44. Multipurpose (cont.)Pseudocode – A technique for representing program logic.<br />Germanna students that earn a minimum of 60 of credits are entitled to get an Associates Degree.<br />Germanna students that do not earn a minimum of 60 credits do not receive their Associates Degree but may be eligible for Career Studies Certificate.<br />If student is enrolled at Germanna, and<br /> If students earns a minimum of 60 credits then<br /> Eligible to receive Associates Degree.<br /> ELSE<br /> Student will not receive Associates Degree<br />ELSE<br /> Student may be eligible for Career Studies Certificate <br />
  • 45. Strategic Plan<br />By Daniel Sarpe<br />ITP 251-200<br />

×