SlideShare a Scribd company logo
Your Interactive Guide
to the Digital World
Discovering
Computers 2012
Objectives Overview
Define system development
and list the system
development phases
Identify the guidelines for
system development
Discuss the importance of
project management,
feasibility assessment,
documentation, and data
and information gathering
techniques
Explain the activities
performed in the planning
phase
Discuss the purpose of the
activities performed in the
analysis phase
Describe the various tools
used in process modeling
Discovering Computers 2012: Chapter 12 2See Page 619
for Detailed Objectives
Objectives Overview
Describe the various
tools used in object
modeling
Explain the activities
performed in the
design phase
Recognize the develop
programs activity is
part of system
development
Discuss the activities
performed in the
implementation phase
Discuss the purpose of
the activities
performed in the
operation, support, and
security phase
Discovering Computers 2012: Chapter 12 3See Page 619
for Detailed Objectives
What is System Development?
System development is a set of activities
used to build an information system
A system is a set of
components that
interact to achieve a
common goal
An information
system (IS) is a
collection of
hardware, software,
data, people, and
procedures that work
together to produce
quality information
System development
activities are grouped
into phases,
collectively called the
system development
life cycle (SDLC)
Discovering Computers 2012: Chapter 12 4Page 620
What is System Development?
Discovering Computers 2012: Chapter 12 5Pages 620 – 621
Figure 12-1
What is System Development?
• System development should follow three general
guidelines:
Discovering Computers 2012: Chapter 12 6Page 621
Group activities or tasks into phases
Involve users
Define standards
What is System Development?
• System development should involve representatives from each
department in which the proposed system will be used
Discovering Computers 2012: Chapter 12 7Page 622
Figure 12-2
What is System Development?
• Project management is the process of planning,
scheduling, and then controlling the activities during
system development
• To plan and schedule a project efficiently, the project
leader identifies:
Discovering Computers 2012: Chapter 12 8Page 623
Project scope
Required
activities
Time estimates
for each activity
Cost estimates
for each activity
Order of
activities
Activities that
can take place at
the same time
What is System Development?
Discovering Computers 2012: Chapter 12 9Page 623
Figure 12-3a
A popular tool
used to plan
and schedule
the time
relationships
among project
activities is a
Gantt chart
What is System Development?
Discovering Computers 2012: Chapter 12 10Page 624
Figure 12-3b
A PERT chart
also can be
used for
planning and
scheduling time
What is System Development?
• Feasibility is a measure of how suitable the
development of a system will be to the
organization
Discovering Computers 2012: Chapter 12 11Pages 624 - 625
Operational
feasibility
Schedule
feasibility
Technical
feasibility
Economic
feasibility
What is System Development?
• Documentation is the collection and
summarization of data and information
– A project notebook contains all documentation for a
single project
• Users and IT professionals refer to existing
documentation when working with and modifying
current systems
Discovering Computers 2012: Chapter 12 12Page 625
What is System Development?
• During system development, members of the project
team gather data and information using several
techniques
Discovering Computers 2012: Chapter 12 13Pages 625 – 626
Figure 12-4
Review
documentation
Observe Survey
Interview JAD Sessions Research
Who Initiates a System
Development Project?
A user may request a new or modified system
Organizations may want to improve hardware, software, or other
technology
Situations beyond an organization’s control might require a change
Management might mandate a change
A user may request a new or modified information system using a request
for system services or a project request
Discovering Computers 2012: Chapter 12 14Page 626
Who Initiates a System
Development Project?
Discovering Computers 2012: Chapter 12 15Page 627
Figure 12-5
Planning Phase
• The planning phase for a project begins when the
steering committee receives a project request
• Four major activities are performed:
Discovering Computers 2012: Chapter 12 16Page 628
Review and
approve the
project requests
Prioritize the
project requests
Allocate
resources
Form a project
development
team
Analysis Phase
• The analysis phase consists of two major
activities:
Discovering Computers 2012: Chapter 12 17Pages 629 - 631
Conduct a preliminary
investigation
• Determines and
defines the exact
nature of the problem
or improvement
• Interview the user who
submitted the request
Perform detailed
analysis
• Study how the current
system works
• Determine the users’
wants, needs, and
requirements
• Recommend a solution
Analysis Phase
Discovering Computers 2012: Chapter 12 18Page 630
Figure 12-6
Analysis Phase
• Process modeling (structured analysis and design) is an
analysis and design technique that describes processes
that transform inputs into outputs
Discovering Computers 2012: Chapter 12 19Page 631
Entity-
relationship
diagrams
Data flow
diagrams
Project
dictionary
Analysis Phase
• An entity-relationship
diagram (ERD) is a tool
that graphically shows
the connections among
entities in a system
• Entities are objects in
the system that have
data
Discovering Computers 2012: Chapter 12 20Page 632
Figure 12-7
Analysis Phase
• A data flow diagram
(DFD) is a tool that
graphically shows the
flow of data in a system
– Data flows
– Processes
– Data stores
– Sources
Discovering Computers 2012: Chapter 12 21Page 632
Figure 12-8
Analysis Phase
• The project dictionary contains all the
documentation and deliverables of a project
• Structured English is a
style of writing that
describes the steps in
a process
Discovering Computers 2012: Chapter 12 22Page 633
Figure 12-9
Analysis Phase
A decision table is a table that
lists a variety of conditions
and the actions that
correspond to each condition
A decision tree also shows
conditions and actions, but it
shows them graphically
Discovering Computers 2012: Chapter 12 23Page 633
Analysis Phase
Decision table Decision tree
Discovering Computers 2012: Chapter 12 24Page 633
Figures 12-10 – 12-11
Analysis Phase
• The data dictionary stores the data item’s name,
description, and other details about each data
item
Discovering Computers 2012: Chapter 12 25Page 634
Figure 12-12
Analysis Phase
• Object modeling combines the data with the processes
that act on that data into a single unit, called an object
• UML (Unified Modeling Language) has been adopted as a
standard notation for object modeling and development
– UML includes 13 different diagrams
– Two diagrams include:
Discovering Computers 2012: Chapter 12 26Page 634
Use case
diagram
Class diagram
Analysis Phase
• A use case diagram
graphically shows how
actors (users) interact
with the information
system
• Diagrams are
considered easy to
understand
Discovering Computers 2012: Chapter 12 27Page 634
Figure 12-13
Analysis Phase
• A class diagram
graphically shows
classes and subclasses
in a system
• Each class can have one
or more subclasses
• Subclasses use
inheritance to inherit
methods and attributes
of higher levels
Discovering Computers 2012: Chapter 12 28Page 635
Figure 12-14
Analysis Phase
• The system proposal assesses the feasibility of
each alternative solution
• The steering committee discusses the system
proposal and decides which alternative to pursue
Discovering Computers 2012: Chapter 12 29Pages 635 - 636
Packaged
software
Custom
software
Outsourcing
Design Phase
• The design phase consists of two major activities
Discovering Computers 2012: Chapter 12 30Page 638
Acquire hardware
and software
Develop all of the
details of the new
or modified
information system
Design Phase
• To acquire the necessary hardware and software:
Discovering Computers 2012: Chapter 12 31Pages 638 - 640
•Use research
techniques such as
e-zines
Identify technical
specifications
•RFQ, RFP, or RFI is
sent to potential
vendors or VARs
Solicit vendor
proposals •Various techniques
are used to
determine the best
proposal
Test and evaluate
vendor proposals
•Systems analyst
makes
recommendation to
steering committee
Make a decision
Design Phase
• The next step is to develop detailed design
specifications
– Sometimes called a physical design
Discovering Computers 2012: Chapter 12 32Page 640
Database
design
Input and
output
design
Program
design
Design Phase
• Systems analysts typically develop two types of
designs for each input and output
Discovering Computers 2012: Chapter 12 33Page 641
Figures 12-18 – 12-19
Mockup Layout chart
Design Phase
• A prototype (proof of concept) is a working model
of the proposed system
– Prototypes have inadequate or missing documentation
– Users tend to embrace the prototype as a final system
– Should not eliminate or replace activities
Discovering Computers 2012: Chapter 12 34Pages 641 - 642
Design Phase
• Computer-aided software engineering (CASE)
tools are designed to support one or more
activities of system development
• CASE tools sometimes contain the following tools:
Discovering Computers 2012: Chapter 12 35Page 642
Project
repository
Graphics Prototyping
Quality
assurance
Code
generator
Housekeeping
Design Phase
Discovering Computers 2012: Chapter 12 36Page 642
Figure 12-20
Design Phase
• Many people should review the detailed design
specifications
• An inspection is a formal review of any system
development deliverable
– A team examines the deliverables to identify errors
Discovering Computers 2012: Chapter 12 37Page 642
Implementation Phase
• The purpose of the implementation phase is to
construct the new or modified system and then
deliver it
Discovering Computers 2012: Chapter 12 38Page 643
Develop
programs
Install and
test the new
system
Train users
Convert to
the new
system
Implementation Phase
• The program development life cycle follows these
steps:
Discovering Computers 2012: Chapter 12 39Page 643
1 • Analyze the requirements
2 • Design the solution
3 • Validate the design
4 • Implement the design
5 • Test the solution
6 • Document the solution
Implementation Phase
• Various tests should be performed on the new
system
Discovering Computers 2012: Chapter 12 40Page 644
Unit test
• Verifies that
each
individual
program or
object works
by itself
Systems test
• Verifies that
all programs
in an
application
work
together
properly
Integration
test
• Verifies that
an
application
works with
other
applications
Acceptance
test
• Checks the
new system
to ensure
that it works
with actual
data
Implementation Phase
• Training involves showing users exactly how they
will use the new hardware and software in the
system
– One-on-one sessions
– Classroom-style lectures
– Web-based training
Discovering Computers 2012: Chapter 12 41Page 644
Figure 12-21
Implementation Phase
• One or more of four conversion strategies can be
used to change from the old system to the new
system
Discovering Computers 2012: Chapter 12 42Pages 644 – 645
Figure 12-22
Operation, Support, and Security Phase
• The purpose of the operation, support, and
security phase is to provide ongoing assistance for
an information system and its users after the
system is implemented
Discovering Computers 2012: Chapter 12 43Pages 645 - 646
Perform
maintenance
activities
Monitor
system
performance
Assess system
security
Operation, Support, and Security Phase
• A computer security plan should do the following:
Discovering Computers 2012: Chapter 12 44Page 646
Identify all
information
assets of an
organization
Identify all
security risks
that may cause
an information
asset loss
For each risk,
identify the
safeguards that
exist to detect,
prevent, and
recover from a
loss
Summary
System
development
phases
Guidelines for
system
development
Activities that occur
during system
development
Activities
performed during
each system
development phase
Discovering Computers 2012: Chapter 12 45Page 647
Your Interactive Guide
to the Digital World
Discovering
Computers 2012
Chapter 12 Complete

More Related Content

What's hot

Chap13 Security and Ethical Challenges
Chap13 Security and Ethical ChallengesChap13 Security and Ethical Challenges
Chap13 Security and Ethical Challenges
Aqib Syed
 
Chapter05 identifying and selecting systems development projects
Chapter05 identifying and selecting systems development projectsChapter05 identifying and selecting systems development projects
Chapter05 identifying and selecting systems development projects
Dhani Ahmad
 
analysis and design of information system
analysis and design of information systemanalysis and design of information system
analysis and design of information systemRenu Sharma
 
Enterprise Systems.ppt
Enterprise Systems.pptEnterprise Systems.ppt
Enterprise Systems.ppt
NeenuWilson7
 
System Analysis and Design
System Analysis and DesignSystem Analysis and Design
System Analysis and Design
Joel Briza
 
Gr 1: History of Information Systems and its Importance
Gr 1: History of Information Systems and its ImportanceGr 1: History of Information Systems and its Importance
Gr 1: History of Information Systems and its Importance
university of education,Lahore
 
Transaction processing system
Transaction processing systemTransaction processing system
Transaction processing system
anjana1994
 
Enterprise Systems
Enterprise SystemsEnterprise Systems
Enterprise Systems
Saurabh Goel
 
The system development life cycle (SDLC)
The system development life cycle (SDLC)The system development life cycle (SDLC)
The system development life cycle (SDLC)
gourav kottawar
 
Business information system with explaination
Business information system with explainationBusiness information system with explaination
Business information system with explaination
Alana Abraham
 
Information management
Information managementInformation management
Information managementLorie Lynne
 
Introduction to accounting information system
Introduction to accounting information systemIntroduction to accounting information system
Introduction to accounting information systemAbhishek Ghosh
 
Business Intelligence
Business IntelligenceBusiness Intelligence
Business Intelligence
Mithileysh Sathiyanarayanan
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)Biswajit Bhattacharjee
 
Management Information Systems - Chapter 2
Management Information Systems - Chapter 2Management Information Systems - Chapter 2
Management Information Systems - Chapter 2
Joel Briza
 
System Analysis and Design slides by yared yenealem DTU Ethiopia
System Analysis and Design slides by yared yenealem DTU EthiopiaSystem Analysis and Design slides by yared yenealem DTU Ethiopia
System Analysis and Design slides by yared yenealem DTU Ethiopia
Debre Tabor University
 
Introduction to Information System
Introduction to Information SystemIntroduction to Information System
Introduction to Information System
shaylor_swift
 
Types o f information systems
Types o f information systemsTypes o f information systems
Types o f information systems
Bimbashree K.G
 

What's hot (20)

The role of information system
The role of information system The role of information system
The role of information system
 
Chap13 Security and Ethical Challenges
Chap13 Security and Ethical ChallengesChap13 Security and Ethical Challenges
Chap13 Security and Ethical Challenges
 
Chapter05 identifying and selecting systems development projects
Chapter05 identifying and selecting systems development projectsChapter05 identifying and selecting systems development projects
Chapter05 identifying and selecting systems development projects
 
analysis and design of information system
analysis and design of information systemanalysis and design of information system
analysis and design of information system
 
Enterprise Systems.ppt
Enterprise Systems.pptEnterprise Systems.ppt
Enterprise Systems.ppt
 
System Analysis and Design
System Analysis and DesignSystem Analysis and Design
System Analysis and Design
 
Gr 1: History of Information Systems and its Importance
Gr 1: History of Information Systems and its ImportanceGr 1: History of Information Systems and its Importance
Gr 1: History of Information Systems and its Importance
 
System analysis
System analysisSystem analysis
System analysis
 
Transaction processing system
Transaction processing systemTransaction processing system
Transaction processing system
 
Enterprise Systems
Enterprise SystemsEnterprise Systems
Enterprise Systems
 
The system development life cycle (SDLC)
The system development life cycle (SDLC)The system development life cycle (SDLC)
The system development life cycle (SDLC)
 
Business information system with explaination
Business information system with explainationBusiness information system with explaination
Business information system with explaination
 
Information management
Information managementInformation management
Information management
 
Introduction to accounting information system
Introduction to accounting information systemIntroduction to accounting information system
Introduction to accounting information system
 
Business Intelligence
Business IntelligenceBusiness Intelligence
Business Intelligence
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
 
Management Information Systems - Chapter 2
Management Information Systems - Chapter 2Management Information Systems - Chapter 2
Management Information Systems - Chapter 2
 
System Analysis and Design slides by yared yenealem DTU Ethiopia
System Analysis and Design slides by yared yenealem DTU EthiopiaSystem Analysis and Design slides by yared yenealem DTU Ethiopia
System Analysis and Design slides by yared yenealem DTU Ethiopia
 
Introduction to Information System
Introduction to Information SystemIntroduction to Information System
Introduction to Information System
 
Types o f information systems
Types o f information systemsTypes o f information systems
Types o f information systems
 

Similar to Chapter 12 information system development

Chapter12
Chapter12Chapter12
Chapter12
Izaham
 
Information system development
Information system developmentInformation system development
Information system development
Dhani Ahmad
 
CH12-Exploring Information System Development
CH12-Exploring Information System DevelopmentCH12-Exploring Information System Development
CH12-Exploring Information System Development
Sukanya Ben
 
System analysis and design
System analysis and designSystem analysis and design
System analysis and design
RobinsonObura
 
Lecture 7.pptx
Lecture 7.pptxLecture 7.pptx
Lecture 7.pptx
MohammedMohammed578197
 
01. Developing Business _ IT Solutions 2011.ppt
01. Developing Business _ IT Solutions 2011.ppt01. Developing Business _ IT Solutions 2011.ppt
01. Developing Business _ IT Solutions 2011.ppt
iqbal051663
 
Discovering Computers: Chapter 12
Discovering Computers: Chapter 12Discovering Computers: Chapter 12
Discovering Computers: Chapter 12
Anna Stirling
 
lecture_29.pptx
lecture_29.pptxlecture_29.pptx
lecture_29.pptx
MNumanZafar1
 
Database Design
Database Design Database Design
Database Design
Er. Nawaraj Bhandari
 
James hall ch 14
James hall ch 14James hall ch 14
James hall ch 14
David Julian
 
Database Design
Database DesignDatabase Design
Database Design
Bhandari Nawaraj
 
Requirements engineering in agile
Requirements engineering in agileRequirements engineering in agile
Requirements engineering in agile
Tricode (part of Dept)
 
Ooad lab manual(original)
Ooad lab manual(original)Ooad lab manual(original)
Ooad lab manual(original)
dipenpatelpatel
 
Chapter 1(1) system development life .ppt
Chapter 1(1) system development life .pptChapter 1(1) system development life .ppt
Chapter 1(1) system development life .ppt
DoaaRezk5
 
Team Data Science Process Presentation (TDSP), Aug 29, 2017
Team Data Science Process Presentation (TDSP), Aug 29, 2017Team Data Science Process Presentation (TDSP), Aug 29, 2017
Team Data Science Process Presentation (TDSP), Aug 29, 2017
Debraj GuhaThakurta
 
Development of information system chap 2
Development of information system chap 2Development of information system chap 2
Development of information system chap 2
amanuelayde1
 
PTTKHTTT_part 1.pdf
PTTKHTTT_part 1.pdfPTTKHTTT_part 1.pdf
PTTKHTTT_part 1.pdf
TmTri
 
Mc leod9e ch07 systems development
Mc leod9e ch07 systems developmentMc leod9e ch07 systems development
Mc leod9e ch07 systems development
sellyhood
 
ACCOUNTING INFORMATION SYSTEM_Pertemuan 1_SIAII.pdf
ACCOUNTING INFORMATION SYSTEM_Pertemuan 1_SIAII.pdfACCOUNTING INFORMATION SYSTEM_Pertemuan 1_SIAII.pdf
ACCOUNTING INFORMATION SYSTEM_Pertemuan 1_SIAII.pdf
RiaMennita
 

Similar to Chapter 12 information system development (20)

Chapter12
Chapter12Chapter12
Chapter12
 
Information system development
Information system developmentInformation system development
Information system development
 
CH12-Exploring Information System Development
CH12-Exploring Information System DevelopmentCH12-Exploring Information System Development
CH12-Exploring Information System Development
 
System analysis and design
System analysis and designSystem analysis and design
System analysis and design
 
Lecture 7.pptx
Lecture 7.pptxLecture 7.pptx
Lecture 7.pptx
 
01. Developing Business _ IT Solutions 2011.ppt
01. Developing Business _ IT Solutions 2011.ppt01. Developing Business _ IT Solutions 2011.ppt
01. Developing Business _ IT Solutions 2011.ppt
 
Discovering Computers: Chapter 12
Discovering Computers: Chapter 12Discovering Computers: Chapter 12
Discovering Computers: Chapter 12
 
lecture_29.pptx
lecture_29.pptxlecture_29.pptx
lecture_29.pptx
 
Database Design
Database Design Database Design
Database Design
 
James hall ch 14
James hall ch 14James hall ch 14
James hall ch 14
 
Database Design
Database DesignDatabase Design
Database Design
 
Requirements engineering in agile
Requirements engineering in agileRequirements engineering in agile
Requirements engineering in agile
 
Ooad lab manual(original)
Ooad lab manual(original)Ooad lab manual(original)
Ooad lab manual(original)
 
Chap12
Chap12Chap12
Chap12
 
Chapter 1(1) system development life .ppt
Chapter 1(1) system development life .pptChapter 1(1) system development life .ppt
Chapter 1(1) system development life .ppt
 
Team Data Science Process Presentation (TDSP), Aug 29, 2017
Team Data Science Process Presentation (TDSP), Aug 29, 2017Team Data Science Process Presentation (TDSP), Aug 29, 2017
Team Data Science Process Presentation (TDSP), Aug 29, 2017
 
Development of information system chap 2
Development of information system chap 2Development of information system chap 2
Development of information system chap 2
 
PTTKHTTT_part 1.pdf
PTTKHTTT_part 1.pdfPTTKHTTT_part 1.pdf
PTTKHTTT_part 1.pdf
 
Mc leod9e ch07 systems development
Mc leod9e ch07 systems developmentMc leod9e ch07 systems development
Mc leod9e ch07 systems development
 
ACCOUNTING INFORMATION SYSTEM_Pertemuan 1_SIAII.pdf
ACCOUNTING INFORMATION SYSTEM_Pertemuan 1_SIAII.pdfACCOUNTING INFORMATION SYSTEM_Pertemuan 1_SIAII.pdf
ACCOUNTING INFORMATION SYSTEM_Pertemuan 1_SIAII.pdf
 

More from haider ali

Upwork freelancer guide
Upwork freelancer guideUpwork freelancer guide
Upwork freelancer guide
haider ali
 
Chapter 13 programming languages and program development
Chapter 13   programming languages and program developmentChapter 13   programming languages and program development
Chapter 13 programming languages and program development
haider ali
 
Chapter 11 computer security and safety, ethics, and privacy
Chapter 11   computer security and safety, ethics, and privacyChapter 11   computer security and safety, ethics, and privacy
Chapter 11 computer security and safety, ethics, and privacy
haider ali
 
Chapter 10 database management
Chapter 10   database managementChapter 10   database management
Chapter 10 database management
haider ali
 
Chapter 9 communications and networks
Chapter 9   communications and networksChapter 9   communications and networks
Chapter 9 communications and networks
haider ali
 
Chapter 8 operating systems and utility programs
Chapter 8   operating systems and utility programsChapter 8   operating systems and utility programs
Chapter 8 operating systems and utility programs
haider ali
 
Chapter 6 output
Chapter 6   outputChapter 6   output
Chapter 6 output
haider ali
 
Chapter 5 input
Chapter 5   inputChapter 5   input
Chapter 5 input
haider ali
 
Chapter 4 the components of the system unit
Chapter 4   the components of the system unitChapter 4   the components of the system unit
Chapter 4 the components of the system unit
haider ali
 
Chapter 3 application software
Chapter 3   application softwareChapter 3   application software
Chapter 3 application software
haider ali
 
Modalauxiliaries 1
Modalauxiliaries 1Modalauxiliaries 1
Modalauxiliaries 1
haider ali
 
Teaching tenses
Teaching tensesTeaching tenses
Teaching tenses
haider ali
 
Tenses
TensesTenses
Tenses
haider ali
 
English parts of speech
English parts of speech English parts of speech
English parts of speech
haider ali
 
Parts of speech
Parts of speechParts of speech
Parts of speech
haider ali
 
Fundamentals of information technology
Fundamentals       of          information   technologyFundamentals       of          information   technology
Fundamentals of information technology
haider ali
 
How to configure an operating system
How to configure an operating systemHow to configure an operating system
How to configure an operating system
haider ali
 
Chapter 2 the internet and world wide web
Chapter 2   the internet and world wide webChapter 2   the internet and world wide web
Chapter 2 the internet and world wide web
haider ali
 
Chapter 1 introduction to computers
Chapter 1   introduction to computersChapter 1   introduction to computers
Chapter 1 introduction to computers
haider ali
 
Parts of-speech
Parts of-speech Parts of-speech
Parts of-speech
haider ali
 

More from haider ali (20)

Upwork freelancer guide
Upwork freelancer guideUpwork freelancer guide
Upwork freelancer guide
 
Chapter 13 programming languages and program development
Chapter 13   programming languages and program developmentChapter 13   programming languages and program development
Chapter 13 programming languages and program development
 
Chapter 11 computer security and safety, ethics, and privacy
Chapter 11   computer security and safety, ethics, and privacyChapter 11   computer security and safety, ethics, and privacy
Chapter 11 computer security and safety, ethics, and privacy
 
Chapter 10 database management
Chapter 10   database managementChapter 10   database management
Chapter 10 database management
 
Chapter 9 communications and networks
Chapter 9   communications and networksChapter 9   communications and networks
Chapter 9 communications and networks
 
Chapter 8 operating systems and utility programs
Chapter 8   operating systems and utility programsChapter 8   operating systems and utility programs
Chapter 8 operating systems and utility programs
 
Chapter 6 output
Chapter 6   outputChapter 6   output
Chapter 6 output
 
Chapter 5 input
Chapter 5   inputChapter 5   input
Chapter 5 input
 
Chapter 4 the components of the system unit
Chapter 4   the components of the system unitChapter 4   the components of the system unit
Chapter 4 the components of the system unit
 
Chapter 3 application software
Chapter 3   application softwareChapter 3   application software
Chapter 3 application software
 
Modalauxiliaries 1
Modalauxiliaries 1Modalauxiliaries 1
Modalauxiliaries 1
 
Teaching tenses
Teaching tensesTeaching tenses
Teaching tenses
 
Tenses
TensesTenses
Tenses
 
English parts of speech
English parts of speech English parts of speech
English parts of speech
 
Parts of speech
Parts of speechParts of speech
Parts of speech
 
Fundamentals of information technology
Fundamentals       of          information   technologyFundamentals       of          information   technology
Fundamentals of information technology
 
How to configure an operating system
How to configure an operating systemHow to configure an operating system
How to configure an operating system
 
Chapter 2 the internet and world wide web
Chapter 2   the internet and world wide webChapter 2   the internet and world wide web
Chapter 2 the internet and world wide web
 
Chapter 1 introduction to computers
Chapter 1   introduction to computersChapter 1   introduction to computers
Chapter 1 introduction to computers
 
Parts of-speech
Parts of-speech Parts of-speech
Parts of-speech
 

Recently uploaded

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 

Recently uploaded (20)

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 

Chapter 12 information system development

  • 1. Your Interactive Guide to the Digital World Discovering Computers 2012
  • 2. Objectives Overview Define system development and list the system development phases Identify the guidelines for system development Discuss the importance of project management, feasibility assessment, documentation, and data and information gathering techniques Explain the activities performed in the planning phase Discuss the purpose of the activities performed in the analysis phase Describe the various tools used in process modeling Discovering Computers 2012: Chapter 12 2See Page 619 for Detailed Objectives
  • 3. Objectives Overview Describe the various tools used in object modeling Explain the activities performed in the design phase Recognize the develop programs activity is part of system development Discuss the activities performed in the implementation phase Discuss the purpose of the activities performed in the operation, support, and security phase Discovering Computers 2012: Chapter 12 3See Page 619 for Detailed Objectives
  • 4. What is System Development? System development is a set of activities used to build an information system A system is a set of components that interact to achieve a common goal An information system (IS) is a collection of hardware, software, data, people, and procedures that work together to produce quality information System development activities are grouped into phases, collectively called the system development life cycle (SDLC) Discovering Computers 2012: Chapter 12 4Page 620
  • 5. What is System Development? Discovering Computers 2012: Chapter 12 5Pages 620 – 621 Figure 12-1
  • 6. What is System Development? • System development should follow three general guidelines: Discovering Computers 2012: Chapter 12 6Page 621 Group activities or tasks into phases Involve users Define standards
  • 7. What is System Development? • System development should involve representatives from each department in which the proposed system will be used Discovering Computers 2012: Chapter 12 7Page 622 Figure 12-2
  • 8. What is System Development? • Project management is the process of planning, scheduling, and then controlling the activities during system development • To plan and schedule a project efficiently, the project leader identifies: Discovering Computers 2012: Chapter 12 8Page 623 Project scope Required activities Time estimates for each activity Cost estimates for each activity Order of activities Activities that can take place at the same time
  • 9. What is System Development? Discovering Computers 2012: Chapter 12 9Page 623 Figure 12-3a A popular tool used to plan and schedule the time relationships among project activities is a Gantt chart
  • 10. What is System Development? Discovering Computers 2012: Chapter 12 10Page 624 Figure 12-3b A PERT chart also can be used for planning and scheduling time
  • 11. What is System Development? • Feasibility is a measure of how suitable the development of a system will be to the organization Discovering Computers 2012: Chapter 12 11Pages 624 - 625 Operational feasibility Schedule feasibility Technical feasibility Economic feasibility
  • 12. What is System Development? • Documentation is the collection and summarization of data and information – A project notebook contains all documentation for a single project • Users and IT professionals refer to existing documentation when working with and modifying current systems Discovering Computers 2012: Chapter 12 12Page 625
  • 13. What is System Development? • During system development, members of the project team gather data and information using several techniques Discovering Computers 2012: Chapter 12 13Pages 625 – 626 Figure 12-4 Review documentation Observe Survey Interview JAD Sessions Research
  • 14. Who Initiates a System Development Project? A user may request a new or modified system Organizations may want to improve hardware, software, or other technology Situations beyond an organization’s control might require a change Management might mandate a change A user may request a new or modified information system using a request for system services or a project request Discovering Computers 2012: Chapter 12 14Page 626
  • 15. Who Initiates a System Development Project? Discovering Computers 2012: Chapter 12 15Page 627 Figure 12-5
  • 16. Planning Phase • The planning phase for a project begins when the steering committee receives a project request • Four major activities are performed: Discovering Computers 2012: Chapter 12 16Page 628 Review and approve the project requests Prioritize the project requests Allocate resources Form a project development team
  • 17. Analysis Phase • The analysis phase consists of two major activities: Discovering Computers 2012: Chapter 12 17Pages 629 - 631 Conduct a preliminary investigation • Determines and defines the exact nature of the problem or improvement • Interview the user who submitted the request Perform detailed analysis • Study how the current system works • Determine the users’ wants, needs, and requirements • Recommend a solution
  • 18. Analysis Phase Discovering Computers 2012: Chapter 12 18Page 630 Figure 12-6
  • 19. Analysis Phase • Process modeling (structured analysis and design) is an analysis and design technique that describes processes that transform inputs into outputs Discovering Computers 2012: Chapter 12 19Page 631 Entity- relationship diagrams Data flow diagrams Project dictionary
  • 20. Analysis Phase • An entity-relationship diagram (ERD) is a tool that graphically shows the connections among entities in a system • Entities are objects in the system that have data Discovering Computers 2012: Chapter 12 20Page 632 Figure 12-7
  • 21. Analysis Phase • A data flow diagram (DFD) is a tool that graphically shows the flow of data in a system – Data flows – Processes – Data stores – Sources Discovering Computers 2012: Chapter 12 21Page 632 Figure 12-8
  • 22. Analysis Phase • The project dictionary contains all the documentation and deliverables of a project • Structured English is a style of writing that describes the steps in a process Discovering Computers 2012: Chapter 12 22Page 633 Figure 12-9
  • 23. Analysis Phase A decision table is a table that lists a variety of conditions and the actions that correspond to each condition A decision tree also shows conditions and actions, but it shows them graphically Discovering Computers 2012: Chapter 12 23Page 633
  • 24. Analysis Phase Decision table Decision tree Discovering Computers 2012: Chapter 12 24Page 633 Figures 12-10 – 12-11
  • 25. Analysis Phase • The data dictionary stores the data item’s name, description, and other details about each data item Discovering Computers 2012: Chapter 12 25Page 634 Figure 12-12
  • 26. Analysis Phase • Object modeling combines the data with the processes that act on that data into a single unit, called an object • UML (Unified Modeling Language) has been adopted as a standard notation for object modeling and development – UML includes 13 different diagrams – Two diagrams include: Discovering Computers 2012: Chapter 12 26Page 634 Use case diagram Class diagram
  • 27. Analysis Phase • A use case diagram graphically shows how actors (users) interact with the information system • Diagrams are considered easy to understand Discovering Computers 2012: Chapter 12 27Page 634 Figure 12-13
  • 28. Analysis Phase • A class diagram graphically shows classes and subclasses in a system • Each class can have one or more subclasses • Subclasses use inheritance to inherit methods and attributes of higher levels Discovering Computers 2012: Chapter 12 28Page 635 Figure 12-14
  • 29. Analysis Phase • The system proposal assesses the feasibility of each alternative solution • The steering committee discusses the system proposal and decides which alternative to pursue Discovering Computers 2012: Chapter 12 29Pages 635 - 636 Packaged software Custom software Outsourcing
  • 30. Design Phase • The design phase consists of two major activities Discovering Computers 2012: Chapter 12 30Page 638 Acquire hardware and software Develop all of the details of the new or modified information system
  • 31. Design Phase • To acquire the necessary hardware and software: Discovering Computers 2012: Chapter 12 31Pages 638 - 640 •Use research techniques such as e-zines Identify technical specifications •RFQ, RFP, or RFI is sent to potential vendors or VARs Solicit vendor proposals •Various techniques are used to determine the best proposal Test and evaluate vendor proposals •Systems analyst makes recommendation to steering committee Make a decision
  • 32. Design Phase • The next step is to develop detailed design specifications – Sometimes called a physical design Discovering Computers 2012: Chapter 12 32Page 640 Database design Input and output design Program design
  • 33. Design Phase • Systems analysts typically develop two types of designs for each input and output Discovering Computers 2012: Chapter 12 33Page 641 Figures 12-18 – 12-19 Mockup Layout chart
  • 34. Design Phase • A prototype (proof of concept) is a working model of the proposed system – Prototypes have inadequate or missing documentation – Users tend to embrace the prototype as a final system – Should not eliminate or replace activities Discovering Computers 2012: Chapter 12 34Pages 641 - 642
  • 35. Design Phase • Computer-aided software engineering (CASE) tools are designed to support one or more activities of system development • CASE tools sometimes contain the following tools: Discovering Computers 2012: Chapter 12 35Page 642 Project repository Graphics Prototyping Quality assurance Code generator Housekeeping
  • 36. Design Phase Discovering Computers 2012: Chapter 12 36Page 642 Figure 12-20
  • 37. Design Phase • Many people should review the detailed design specifications • An inspection is a formal review of any system development deliverable – A team examines the deliverables to identify errors Discovering Computers 2012: Chapter 12 37Page 642
  • 38. Implementation Phase • The purpose of the implementation phase is to construct the new or modified system and then deliver it Discovering Computers 2012: Chapter 12 38Page 643 Develop programs Install and test the new system Train users Convert to the new system
  • 39. Implementation Phase • The program development life cycle follows these steps: Discovering Computers 2012: Chapter 12 39Page 643 1 • Analyze the requirements 2 • Design the solution 3 • Validate the design 4 • Implement the design 5 • Test the solution 6 • Document the solution
  • 40. Implementation Phase • Various tests should be performed on the new system Discovering Computers 2012: Chapter 12 40Page 644 Unit test • Verifies that each individual program or object works by itself Systems test • Verifies that all programs in an application work together properly Integration test • Verifies that an application works with other applications Acceptance test • Checks the new system to ensure that it works with actual data
  • 41. Implementation Phase • Training involves showing users exactly how they will use the new hardware and software in the system – One-on-one sessions – Classroom-style lectures – Web-based training Discovering Computers 2012: Chapter 12 41Page 644 Figure 12-21
  • 42. Implementation Phase • One or more of four conversion strategies can be used to change from the old system to the new system Discovering Computers 2012: Chapter 12 42Pages 644 – 645 Figure 12-22
  • 43. Operation, Support, and Security Phase • The purpose of the operation, support, and security phase is to provide ongoing assistance for an information system and its users after the system is implemented Discovering Computers 2012: Chapter 12 43Pages 645 - 646 Perform maintenance activities Monitor system performance Assess system security
  • 44. Operation, Support, and Security Phase • A computer security plan should do the following: Discovering Computers 2012: Chapter 12 44Page 646 Identify all information assets of an organization Identify all security risks that may cause an information asset loss For each risk, identify the safeguards that exist to detect, prevent, and recover from a loss
  • 45. Summary System development phases Guidelines for system development Activities that occur during system development Activities performed during each system development phase Discovering Computers 2012: Chapter 12 45Page 647
  • 46. Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 12 Complete