SlideShare a Scribd company logo
1 of 12
Software Engineering: 16
Systems Concepts in Software
Design
Prof Neeraj Bhargava
Vaibhav Khanna
Department of Computer Science
School of Engineering and Systems Sciences
Maharshi Dayanand Saraswati University Ajmer
What is a system?
• A system is a collection of entities or things (animate
or inanimate) which receives certain inputs and is
constrained to act upon them to produce certain
outputs, with the objective of maximizing some
functions of inputs and outputs.
• Others define system as a complexity of elements in
mutual interaction in such a way as to constrain action
toward the accomplishment of the purposes for which
the system exists.
• Simply stated, a system is a set of interrelated
elements that functions as a unit for a specific purpose.
•
Input Process Output View
• Within a system are inputs, process outputs.
• Inputs are the human, materials, financial, or
information resources used to produce a product or a
service.
• Through technology and administrative functions the
inputs undergo a transformation process.
• For Example :In school, the interaction between the
students and teachers is part of the transformation or
learning process by which students become educated
citizens.
• Process is what transforms input into output. It is also
called throughput.
Outputs and Feedback
• Outputs include the organization’s products and services.
Graduates as educated citizens are examples of outputs.
• In the interrelationship between the input and output, feedback
plays a very important function.
• Feedback is the information concerning the outputs or the process
of the organization may lead to changes both in the process and the
future outputs.
• Feedback is like a reaction a performer gets from the audience.
• Similarly, the school system gents information from the
environment or society as to how it has performed / Feedback tells
whether a certain plan should be continued or not. For this reason,
all educational development plans are made on a rolling basis,
meaning, they are subject to modifications, revision, or changes
depending on the feedback after some time of operation.
Subsystem
• In the study of a system, we can come across with the
terms subsystem, and suprasystem
• Subsystem is a small system within the big system.
• It has its own purpose and is there for the purpose of
the system.
• It has its own parts and components which are
determined by the overall purpose of the system for
which it is a part.
• The components of a subsystem work in an integrated
or interrelated manner.
• Subsystem is also called microsystem.
Supra System
• Supra system is the largest system that
includes both the system and its subsystem.
• The supra system has its subsystem such as
the political system, educational system,
cultural system and economic system.
• Supra system is also called macro system.
System Boundaries
• When we analyze a specific system, we have to
consider what we call System Boundaries.
• System Boundaries determine what is to be included
or excluded from the system.
• For example, the educational system may be defined
by levels, that is, elementary, secondary, and tertiary
level.
• Any kind of system is always situated in a environment.
Environment is what surrounds the organization which
includes the social, political, and economic factors that
impinge on the organization.
Integrated Solution for Students,
Parents, Teachers and Management
Online Fee Administration
Online Fee Collection
• Key Features of Online Fee Module
– Very Secure Double Authorization Accounting
– Online Fee Collection using payment gateway
– Offline Fee Collection is also available
– Complete Fee Management
– Partial Payment and Auto Calculation of Amount
Outstanding.
– Cheque Bounce charges management
– Several other unique fee management features
Other … (Fee Waivers) Management
• RTE / Staff Ward fee Waivers management
• Fine Collection / Fine Waiver
• Fee defaulter management
• Transport fee customization
• Automated defaulter tracking
• Automated alert to parents for non receipt of fee
• It will help parents by saving both time and cost
of travelling to school for payment.
• The school management gains by having a regular
and on time payment of fees
Assignment
• Explain the systems concept and its usage in
Software Development and Design
• Thank You

More Related Content

Similar to Software engineering 16 systems concepts in software design

Unit 2 Concepts of system bca sem 5 unix comnecpr
Unit 2 Concepts of system bca sem 5 unix comnecprUnit 2 Concepts of system bca sem 5 unix comnecpr
Unit 2 Concepts of system bca sem 5 unix comnecprdharmikmangukiya2
 
System Analysis and Design, (Assignment)
System Analysis and Design, (Assignment)System Analysis and Design, (Assignment)
System Analysis and Design, (Assignment)finagep363
 
System approach.pptx
System approach.pptxSystem approach.pptx
System approach.pptxPoojaWalia6
 
Management information systems
Management information systemsManagement information systems
Management information systemsPeterson Zhou
 
MS Lecture 9 information technology
MS Lecture 9 information technologyMS Lecture 9 information technology
MS Lecture 9 information technologyEst
 
Evolution of the computer in the organization
Evolution of the computer in the organizationEvolution of the computer in the organization
Evolution of the computer in the organizationviviana50396
 
Payroll software
Payroll softwarePayroll software
Payroll softwareHR Spot
 
system modal CONCEPTUAL FRAMEWORK IN RESEARCH .ppt
system modal CONCEPTUAL FRAMEWORK IN RESEARCH .pptsystem modal CONCEPTUAL FRAMEWORK IN RESEARCH .ppt
system modal CONCEPTUAL FRAMEWORK IN RESEARCH .pptReena Yadav
 
Developing A Facilities Vision - Savings Summit 2013
Developing A Facilities Vision - Savings Summit 2013Developing A Facilities Vision - Savings Summit 2013
Developing A Facilities Vision - Savings Summit 2013SchoolDude
 
System concepts- System Analysis and design
System concepts- System Analysis and designSystem concepts- System Analysis and design
System concepts- System Analysis and designProf.Nilesh Magar
 
School Management System
School Management SystemSchool Management System
School Management SystemHATIM Bhagat
 
System engineering analysis and design
System engineering analysis and designSystem engineering analysis and design
System engineering analysis and designDr. Vardhan choubey
 

Similar to Software engineering 16 systems concepts in software design (20)

System approach
System approachSystem approach
System approach
 
Unit 2 Concepts of system bca sem 5 unix comnecpr
Unit 2 Concepts of system bca sem 5 unix comnecprUnit 2 Concepts of system bca sem 5 unix comnecpr
Unit 2 Concepts of system bca sem 5 unix comnecpr
 
Sad
SadSad
Sad
 
System Analysis and Design, (Assignment)
System Analysis and Design, (Assignment)System Analysis and Design, (Assignment)
System Analysis and Design, (Assignment)
 
System approach.pptx
System approach.pptxSystem approach.pptx
System approach.pptx
 
Management information systems
Management information systemsManagement information systems
Management information systems
 
system approach.pptx
system approach.pptxsystem approach.pptx
system approach.pptx
 
MS Lecture 9 information technology
MS Lecture 9 information technologyMS Lecture 9 information technology
MS Lecture 9 information technology
 
Evolution of the computer in the organization
Evolution of the computer in the organizationEvolution of the computer in the organization
Evolution of the computer in the organization
 
Appch+mbo
Appch+mboAppch+mbo
Appch+mbo
 
Digital Porfolio
Digital PorfolioDigital Porfolio
Digital Porfolio
 
Payroll software
Payroll softwarePayroll software
Payroll software
 
Sumer traning
Sumer traningSumer traning
Sumer traning
 
system modal CONCEPTUAL FRAMEWORK IN RESEARCH .ppt
system modal CONCEPTUAL FRAMEWORK IN RESEARCH .pptsystem modal CONCEPTUAL FRAMEWORK IN RESEARCH .ppt
system modal CONCEPTUAL FRAMEWORK IN RESEARCH .ppt
 
SDLC
SDLCSDLC
SDLC
 
Developing A Facilities Vision - Savings Summit 2013
Developing A Facilities Vision - Savings Summit 2013Developing A Facilities Vision - Savings Summit 2013
Developing A Facilities Vision - Savings Summit 2013
 
System concepts- System Analysis and design
System concepts- System Analysis and designSystem concepts- System Analysis and design
System concepts- System Analysis and design
 
Prespectives of Management
Prespectives of ManagementPrespectives of Management
Prespectives of Management
 
School Management System
School Management SystemSchool Management System
School Management System
 
System engineering analysis and design
System engineering analysis and designSystem engineering analysis and design
System engineering analysis and design
 

More from Vaibhav Khanna

Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applicationsVaibhav Khanna
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmVaibhav Khanna
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standardVaibhav Khanna
 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesVaibhav Khanna
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signaturesVaibhav Khanna
 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeInformation and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeVaibhav Khanna
 
Information and network security 41 message authentication code
Information and network security 41 message authentication codeInformation and network security 41 message authentication code
Information and network security 41 message authentication codeVaibhav Khanna
 
Information and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmInformation and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmVaibhav Khanna
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmInformation and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmVaibhav Khanna
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Vaibhav Khanna
 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationInformation and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationVaibhav Khanna
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremVaibhav Khanna
 
Information and network security 34 primality
Information and network security 34 primalityInformation and network security 34 primality
Information and network security 34 primalityVaibhav Khanna
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithmVaibhav Khanna
 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsVaibhav Khanna
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptographyVaibhav Khanna
 
Information and network security 30 random numbers
Information and network security 30 random numbersInformation and network security 30 random numbers
Information and network security 30 random numbersVaibhav Khanna
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmVaibhav Khanna
 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfishVaibhav Khanna
 
Information and network security 27 triple des
Information and network security 27 triple desInformation and network security 27 triple des
Information and network security 27 triple desVaibhav Khanna
 

More from Vaibhav Khanna (20)

Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applications
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithm
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standard
 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signatures
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signatures
 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeInformation and network security 42 security of message authentication code
Information and network security 42 security of message authentication code
 
Information and network security 41 message authentication code
Information and network security 41 message authentication codeInformation and network security 41 message authentication code
Information and network security 41 message authentication code
 
Information and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmInformation and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithm
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmInformation and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithm
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...
 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationInformation and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authentication
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theorem
 
Information and network security 34 primality
Information and network security 34 primalityInformation and network security 34 primality
Information and network security 34 primality
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystems
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
 
Information and network security 30 random numbers
Information and network security 30 random numbersInformation and network security 30 random numbers
Information and network security 30 random numbers
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithm
 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfish
 
Information and network security 27 triple des
Information and network security 27 triple desInformation and network security 27 triple des
Information and network security 27 triple des
 

Recently uploaded

Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 

Recently uploaded (20)

Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 

Software engineering 16 systems concepts in software design

  • 1. Software Engineering: 16 Systems Concepts in Software Design Prof Neeraj Bhargava Vaibhav Khanna Department of Computer Science School of Engineering and Systems Sciences Maharshi Dayanand Saraswati University Ajmer
  • 2. What is a system? • A system is a collection of entities or things (animate or inanimate) which receives certain inputs and is constrained to act upon them to produce certain outputs, with the objective of maximizing some functions of inputs and outputs. • Others define system as a complexity of elements in mutual interaction in such a way as to constrain action toward the accomplishment of the purposes for which the system exists. • Simply stated, a system is a set of interrelated elements that functions as a unit for a specific purpose. •
  • 3. Input Process Output View • Within a system are inputs, process outputs. • Inputs are the human, materials, financial, or information resources used to produce a product or a service. • Through technology and administrative functions the inputs undergo a transformation process. • For Example :In school, the interaction between the students and teachers is part of the transformation or learning process by which students become educated citizens. • Process is what transforms input into output. It is also called throughput.
  • 4. Outputs and Feedback • Outputs include the organization’s products and services. Graduates as educated citizens are examples of outputs. • In the interrelationship between the input and output, feedback plays a very important function. • Feedback is the information concerning the outputs or the process of the organization may lead to changes both in the process and the future outputs. • Feedback is like a reaction a performer gets from the audience. • Similarly, the school system gents information from the environment or society as to how it has performed / Feedback tells whether a certain plan should be continued or not. For this reason, all educational development plans are made on a rolling basis, meaning, they are subject to modifications, revision, or changes depending on the feedback after some time of operation.
  • 5. Subsystem • In the study of a system, we can come across with the terms subsystem, and suprasystem • Subsystem is a small system within the big system. • It has its own purpose and is there for the purpose of the system. • It has its own parts and components which are determined by the overall purpose of the system for which it is a part. • The components of a subsystem work in an integrated or interrelated manner. • Subsystem is also called microsystem.
  • 6. Supra System • Supra system is the largest system that includes both the system and its subsystem. • The supra system has its subsystem such as the political system, educational system, cultural system and economic system. • Supra system is also called macro system.
  • 7. System Boundaries • When we analyze a specific system, we have to consider what we call System Boundaries. • System Boundaries determine what is to be included or excluded from the system. • For example, the educational system may be defined by levels, that is, elementary, secondary, and tertiary level. • Any kind of system is always situated in a environment. Environment is what surrounds the organization which includes the social, political, and economic factors that impinge on the organization.
  • 8. Integrated Solution for Students, Parents, Teachers and Management
  • 10. Online Fee Collection • Key Features of Online Fee Module – Very Secure Double Authorization Accounting – Online Fee Collection using payment gateway – Offline Fee Collection is also available – Complete Fee Management – Partial Payment and Auto Calculation of Amount Outstanding. – Cheque Bounce charges management – Several other unique fee management features
  • 11. Other … (Fee Waivers) Management • RTE / Staff Ward fee Waivers management • Fine Collection / Fine Waiver • Fee defaulter management • Transport fee customization • Automated defaulter tracking • Automated alert to parents for non receipt of fee • It will help parents by saving both time and cost of travelling to school for payment. • The school management gains by having a regular and on time payment of fees
  • 12. Assignment • Explain the systems concept and its usage in Software Development and Design • Thank You