SlideShare a Scribd company logo
Introdaction to Python
Dr. Mohammed Kassim Page 7
Systems analysis
Information System Components
Network Resources
Telecommunications networks like the Internet, intranets, and extranets have
become essential to the successful operations of all types of organizations and their
computer-based information systems. Telecommunications networks consist of
computers, communications processors, and other devices interconnected by
communications media and controlled by communications software. The concept
of Network Resources emphasizes that communications networks are a
fundamental resource component of all information systems.
Network resources include:
• Communications media: such as twisted pair wire, coaxial cable, fiber-
optic cable, microwave systems, wireless signal and communication
satellite systems.
• Network support: This generic category includes all of the people,
Introdaction to Python
Dr. Mohammed Kassim Page 8
Systems analysis
hardware, software, and data resources that directly support the operation
and use of a communications network. Examples include communications
control software such as network operating systems and Internet packages.
Figure 1.4. Components Information Systems in process
Introdaction to Python
Dr. Mohammed Kassim Page 9
Systems analysis
Systems analysis
Systems analysis is the dissection of a system into its component pieces for
purposes of studying how those component pieces interact and work. Structured
analysis was one the first formal strategies developed for systems analysis of
information systems and computer applications. The models are structured pictures
that illustrate the processes, inputs, outputs, and files required to respond to events.
Structured analysis introduced an overall strategy that has been adopted by many
of the other techniques – model-driven development. A model is a representation
of reality. Just as ‘a picture is worth a thousand words,’ most models use pictures
to represent reality. Model-driven development techniques emphasize the drawing
of models to define requirements and system designs. The model becomes the
design blueprint for constructing the final system.
Figure 2.1. Systems model
Introdaction to Python
Dr. Mohammed Kassim Page 10
Systems analysis
System Analyst
System Analyst is a specialist who studies the problems and needs of an
organization to determine how people, data, processes, and information
technology can best accomplish improvements for the business.
System analyst understand both business and computing. They study both
business problems and opportunities and then transform business and information
requirements into specification for information systems that will be implemented
by various technical specialists including computer programmers.
System analyst initiates changes within an organization. Every new system
changes the business.
Introdaction to Python
Dr. Mohammed Kassim Page 11
Systems analysis
System analyst is basically a problem solver. Problems may be either real or
anticipated that require corrective action.
Skills to be possessed by System Analyst
An analyst must possess various skills to effectively carry out the job. They may
be divided into 2 categories — interpersonal and technical skills. Interpersonal
skills deal with relationship and the interface of the analyst with people in
business. They are useful in establishing trust and resolving conflicts. Technical
skills focus on procedures and techniques for operation analysis, system analysis
and computer science.

More Related Content

What's hot

Management information system data processing and functions
Management information system data processing and functionsManagement information system data processing and functions
Management information system data processing and functions
Milan Padariya
 
Mis classification By Ram K Paliwal
Mis classification By Ram K PaliwalMis classification By Ram K Paliwal
Mis classification By Ram K Paliwal
Ram Paliwal
 
Syandes quiz 3
Syandes quiz 3Syandes quiz 3
Syandes quiz 3
kimberbano
 
Management information-system-computer-information-system-need of information...
Management information-system-computer-information-system-need of information...Management information-system-computer-information-system-need of information...
Management information-system-computer-information-system-need of information...
Milan Padariya
 
SA Chapter 7
SA Chapter 7SA Chapter 7
SA Chapter 7
Nuth Otanasap
 
computer based information system
computer based information systemcomputer based information system
computer based information system
jandian
 
Information systems and its components 1
Information systems and its components 1Information systems and its components 1
Information systems and its components 1
Ashish Desai
 
Concepts and components of information system
Concepts  and components of information systemConcepts  and components of information system
Concepts and components of information systemRohit Kumar
 
Elements of systems design
Elements of systems designElements of systems design
Elements of systems designChandan Arora
 
Knowledge Work System
Knowledge Work SystemKnowledge Work System
Knowledge Work System
Piyush Tripathi
 
Information system
Information systemInformation system
Information system
Aashima Wadhwa
 
IT class II - ICAB PS-KL
IT class II - ICAB PS-KL IT class II - ICAB PS-KL
IT class II - ICAB PS-KL
Sazzad Hossain, ITP, MBA, CSCA™
 
Computer based information system
Computer based information systemComputer based information system
Computer based information system
pooja singhal
 
Data Processing
Data ProcessingData Processing
Information Systems and Technology: Basic Concepts
Information Systems and Technology:  Basic ConceptsInformation Systems and Technology:  Basic Concepts
Information Systems and Technology: Basic Concepts
MikeCrea
 
Introduction to Information System
Introduction to Information SystemIntroduction to Information System
Introduction to Information System
shaylor_swift
 

What's hot (20)

Management information system data processing and functions
Management information system data processing and functionsManagement information system data processing and functions
Management information system data processing and functions
 
Mis classification By Ram K Paliwal
Mis classification By Ram K PaliwalMis classification By Ram K Paliwal
Mis classification By Ram K Paliwal
 
Syandes quiz 3
Syandes quiz 3Syandes quiz 3
Syandes quiz 3
 
Management information-system-computer-information-system-need of information...
Management information-system-computer-information-system-need of information...Management information-system-computer-information-system-need of information...
Management information-system-computer-information-system-need of information...
 
Information system
Information systemInformation system
Information system
 
SA Chapter 7
SA Chapter 7SA Chapter 7
SA Chapter 7
 
computer based information system
computer based information systemcomputer based information system
computer based information system
 
Information systems and its components 1
Information systems and its components 1Information systems and its components 1
Information systems and its components 1
 
Data Information
Data InformationData Information
Data Information
 
Ch01a
Ch01aCh01a
Ch01a
 
Concepts and components of information system
Concepts  and components of information systemConcepts  and components of information system
Concepts and components of information system
 
DESIGN OF A COMPUTER SYSTEM FOR AN INFORMATION SYSTEM
DESIGN OF A COMPUTER SYSTEM FOR AN INFORMATION SYSTEMDESIGN OF A COMPUTER SYSTEM FOR AN INFORMATION SYSTEM
DESIGN OF A COMPUTER SYSTEM FOR AN INFORMATION SYSTEM
 
Elements of systems design
Elements of systems designElements of systems design
Elements of systems design
 
Knowledge Work System
Knowledge Work SystemKnowledge Work System
Knowledge Work System
 
Information system
Information systemInformation system
Information system
 
IT class II - ICAB PS-KL
IT class II - ICAB PS-KL IT class II - ICAB PS-KL
IT class II - ICAB PS-KL
 
Computer based information system
Computer based information systemComputer based information system
Computer based information system
 
Data Processing
Data ProcessingData Processing
Data Processing
 
Information Systems and Technology: Basic Concepts
Information Systems and Technology:  Basic ConceptsInformation Systems and Technology:  Basic Concepts
Information Systems and Technology: Basic Concepts
 
Introduction to Information System
Introduction to Information SystemIntroduction to Information System
Introduction to Information System
 

Viewers also liked

6 Physical Security
6 Physical Security6 Physical Security
6 Physical Security
Alfred Ouyang
 
(Physical security) ألامن المادي
(Physical security) ألامن المادي(Physical security) ألامن المادي
(Physical security) ألامن المادي
DrMohammed Qassim
 
Physical Security Presentation
Physical Security PresentationPhysical Security Presentation
Physical Security PresentationWajahat Rajab
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
Faheem Ul Hasan
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security Assessments
Tom Eston
 
Word اسئلة امتحان
Word اسئلة امتحانWord اسئلة امتحان
Word اسئلة امتحانMahmoud Soliman
 
كتاب الحاسب الالى للصف الثانى التجارى
كتاب الحاسب الالى للصف الثانى التجارىكتاب الحاسب الالى للصف الثانى التجارى
كتاب الحاسب الالى للصف الثانى التجارى
hoda_ata
 
التضمين السعوي وفك التضمين السعوي _ AM modulation and demodulation
 التضمين السعوي وفك التضمين السعوي _ AM modulation and demodulation   التضمين السعوي وفك التضمين السعوي _ AM modulation and demodulation
التضمين السعوي وفك التضمين السعوي _ AM modulation and demodulation
AhmedAhdash
 
التجويد
التجويدالتجويد
التجويد
wayislam
 
الفصل الثامن- الاتصالات والشبكات- د. خالد بكرو Communications and Networks -...
الفصل الثامن-  الاتصالات والشبكات- د. خالد بكرو Communications and Networks -...الفصل الثامن-  الاتصالات والشبكات- د. خالد بكرو Communications and Networks -...
الفصل الثامن- الاتصالات والشبكات- د. خالد بكرو Communications and Networks -...
Dr. Khaled Bakro
 
Frequency Modulation for a voice signal by using matlab
Frequency Modulation for a voice signal by using matlabFrequency Modulation for a voice signal by using matlab
Frequency Modulation for a voice signal by using matlab
AhmedAhdash
 
الأكسيل Excel
الأكسيل  Excelالأكسيل  Excel
الأكسيل Excel
doaa 2012
 
A Study in LTE system(in Arabic).
A Study in LTE system(in Arabic).A Study in LTE system(in Arabic).
A Study in LTE system(in Arabic).
Aous Alsheikh
 
Learning word 2010 in arabic تعليم وورد 2010 بطريقة مبسطة
Learning word 2010 in arabic تعليم وورد 2010 بطريقة مبسطة Learning word 2010 in arabic تعليم وورد 2010 بطريقة مبسطة
Learning word 2010 in arabic تعليم وورد 2010 بطريقة مبسطة Kamal Naser
 
مخارج وصفات
مخارج وصفاتمخارج وصفات
مخارج وصفات
Safa Alyousif
 
(Networks) مقدمة في الشبكات
(Networks) مقدمة في الشبكات (Networks) مقدمة في الشبكات
(Networks) مقدمة في الشبكات
DrMohammed Qassim
 
قواعد تصميم العروض
قواعد تصميم العروضقواعد تصميم العروض
قواعد تصميم العروض
حاسنة فلمبان
 
Computer Components مكونات الحاسب الآلي
Computer Components مكونات الحاسب الآليComputer Components مكونات الحاسب الآلي
Computer Components مكونات الحاسب الآلي
IT.Amna Khdoum
 
إدارة المخاطر و تأثيرها على تنفيذ المشروع الإلكتروني
إدارة المخاطر و تأثيرها على تنفيذ المشروع الإلكترونيإدارة المخاطر و تأثيرها على تنفيذ المشروع الإلكتروني
إدارة المخاطر و تأثيرها على تنفيذ المشروع الإلكتروني
nourah_alshedi
 
جميع اختصارات لوحة المفاتيح 92 اختصار
جميع اختصارات لوحة المفاتيح 92 اختصارجميع اختصارات لوحة المفاتيح 92 اختصار
جميع اختصارات لوحة المفاتيح 92 اختصارislamtics default
 

Viewers also liked (20)

6 Physical Security
6 Physical Security6 Physical Security
6 Physical Security
 
(Physical security) ألامن المادي
(Physical security) ألامن المادي(Physical security) ألامن المادي
(Physical security) ألامن المادي
 
Physical Security Presentation
Physical Security PresentationPhysical Security Presentation
Physical Security Presentation
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security Assessments
 
Word اسئلة امتحان
Word اسئلة امتحانWord اسئلة امتحان
Word اسئلة امتحان
 
كتاب الحاسب الالى للصف الثانى التجارى
كتاب الحاسب الالى للصف الثانى التجارىكتاب الحاسب الالى للصف الثانى التجارى
كتاب الحاسب الالى للصف الثانى التجارى
 
التضمين السعوي وفك التضمين السعوي _ AM modulation and demodulation
 التضمين السعوي وفك التضمين السعوي _ AM modulation and demodulation   التضمين السعوي وفك التضمين السعوي _ AM modulation and demodulation
التضمين السعوي وفك التضمين السعوي _ AM modulation and demodulation
 
التجويد
التجويدالتجويد
التجويد
 
الفصل الثامن- الاتصالات والشبكات- د. خالد بكرو Communications and Networks -...
الفصل الثامن-  الاتصالات والشبكات- د. خالد بكرو Communications and Networks -...الفصل الثامن-  الاتصالات والشبكات- د. خالد بكرو Communications and Networks -...
الفصل الثامن- الاتصالات والشبكات- د. خالد بكرو Communications and Networks -...
 
Frequency Modulation for a voice signal by using matlab
Frequency Modulation for a voice signal by using matlabFrequency Modulation for a voice signal by using matlab
Frequency Modulation for a voice signal by using matlab
 
الأكسيل Excel
الأكسيل  Excelالأكسيل  Excel
الأكسيل Excel
 
A Study in LTE system(in Arabic).
A Study in LTE system(in Arabic).A Study in LTE system(in Arabic).
A Study in LTE system(in Arabic).
 
Learning word 2010 in arabic تعليم وورد 2010 بطريقة مبسطة
Learning word 2010 in arabic تعليم وورد 2010 بطريقة مبسطة Learning word 2010 in arabic تعليم وورد 2010 بطريقة مبسطة
Learning word 2010 in arabic تعليم وورد 2010 بطريقة مبسطة
 
مخارج وصفات
مخارج وصفاتمخارج وصفات
مخارج وصفات
 
(Networks) مقدمة في الشبكات
(Networks) مقدمة في الشبكات (Networks) مقدمة في الشبكات
(Networks) مقدمة في الشبكات
 
قواعد تصميم العروض
قواعد تصميم العروضقواعد تصميم العروض
قواعد تصميم العروض
 
Computer Components مكونات الحاسب الآلي
Computer Components مكونات الحاسب الآليComputer Components مكونات الحاسب الآلي
Computer Components مكونات الحاسب الآلي
 
إدارة المخاطر و تأثيرها على تنفيذ المشروع الإلكتروني
إدارة المخاطر و تأثيرها على تنفيذ المشروع الإلكترونيإدارة المخاطر و تأثيرها على تنفيذ المشروع الإلكتروني
إدارة المخاطر و تأثيرها على تنفيذ المشروع الإلكتروني
 
جميع اختصارات لوحة المفاتيح 92 اختصار
جميع اختصارات لوحة المفاتيح 92 اختصارجميع اختصارات لوحة المفاتيح 92 اختصار
جميع اختصارات لوحة المفاتيح 92 اختصار
 

Similar to System analysis part2

Systems analysis and design lecture 1
Systems analysis and design lecture 1Systems analysis and design lecture 1
Systems analysis and design lecture 1
Nova Divine Dela Peña
 
Introduction to System analysis part1
Introduction to System analysis part1Introduction to System analysis part1
Introduction to System analysis part1
DrMohammed Qassim
 
Foundations Of Information Systems In Business(97 2003)
Foundations Of Information Systems In Business(97 2003)Foundations Of Information Systems In Business(97 2003)
Foundations Of Information Systems In Business(97 2003)
Chandan Kumar
 
Notes on Current trends in IT (1) (1).pdf
Notes on Current trends in IT (1) (1).pdfNotes on Current trends in IT (1) (1).pdf
Notes on Current trends in IT (1) (1).pdf
Karishma Chaudhary
 
Chapter 9 The People in Information Systems Learning Ob.docx
Chapter 9 The People in Information Systems Learning Ob.docxChapter 9 The People in Information Systems Learning Ob.docx
Chapter 9 The People in Information Systems Learning Ob.docx
spoonerneddy
 
Chapter 9 The People in Information Systems Learning Ob.docx
Chapter 9 The People in Information Systems Learning Ob.docxChapter 9 The People in Information Systems Learning Ob.docx
Chapter 9 The People in Information Systems Learning Ob.docx
tiffanyd4
 
software engineering
software engineeringsoftware engineering
software engineeringparamalways
 
Chapter 1 software analysis and design in software development
Chapter 1 software analysis and design in software developmentChapter 1 software analysis and design in software development
Chapter 1 software analysis and design in software development
WebMentalist
 
Components of an information system
Components of an information systemComponents of an information system
Components of an information system
NareshBabu285920
 
Instant message
Instant  messageInstant  message
Instant message
kplshrm222
 
MIS
MISMIS
MIS
s115rz
 
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
INTERNAL Assign no   207( JAIPUR NATIONAL UNI)INTERNAL Assign no   207( JAIPUR NATIONAL UNI)
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
Partha_bappa
 
Foundations of Information System in Business - Mark John Lado
Foundations of Information System in Business - Mark John LadoFoundations of Information System in Business - Mark John Lado
Foundations of Information System in Business - Mark John Lado
Mark John Lado, MIT
 
Analyzing Systems Using Data Flow Diagrams
Analyzing Systems Using Data Flow DiagramsAnalyzing Systems Using Data Flow Diagrams
Analyzing Systems Using Data Flow Diagrams
Christina Valadez
 
DEVELOPMENT OF A MULTIAGENT BASED METHODOLOGY FOR COMPLEX SYSTEMS
DEVELOPMENT OF A MULTIAGENT BASED METHODOLOGY FOR COMPLEX SYSTEMSDEVELOPMENT OF A MULTIAGENT BASED METHODOLOGY FOR COMPLEX SYSTEMS
DEVELOPMENT OF A MULTIAGENT BASED METHODOLOGY FOR COMPLEX SYSTEMS
International Journal of Technical Research & Application
 
computer Unit 8
computer Unit 8computer Unit 8
computer Unit 8
Aqeel Rehman
 

Similar to System analysis part2 (20)

Systems analysis and design lecture 1
Systems analysis and design lecture 1Systems analysis and design lecture 1
Systems analysis and design lecture 1
 
Introduction to System analysis part1
Introduction to System analysis part1Introduction to System analysis part1
Introduction to System analysis part1
 
Foundations Of Information Systems In Business(97 2003)
Foundations Of Information Systems In Business(97 2003)Foundations Of Information Systems In Business(97 2003)
Foundations Of Information Systems In Business(97 2003)
 
Notes on Current trends in IT (1) (1).pdf
Notes on Current trends in IT (1) (1).pdfNotes on Current trends in IT (1) (1).pdf
Notes on Current trends in IT (1) (1).pdf
 
Careers in it
Careers in itCareers in it
Careers in it
 
Chapter 9 The People in Information Systems Learning Ob.docx
Chapter 9 The People in Information Systems Learning Ob.docxChapter 9 The People in Information Systems Learning Ob.docx
Chapter 9 The People in Information Systems Learning Ob.docx
 
Chapter 9 The People in Information Systems Learning Ob.docx
Chapter 9 The People in Information Systems Learning Ob.docxChapter 9 The People in Information Systems Learning Ob.docx
Chapter 9 The People in Information Systems Learning Ob.docx
 
software engineering
software engineeringsoftware engineering
software engineering
 
Mis
MisMis
Mis
 
Mis lecture 3
Mis lecture 3Mis lecture 3
Mis lecture 3
 
Multiview Methodology
Multiview MethodologyMultiview Methodology
Multiview Methodology
 
Chapter 1 software analysis and design in software development
Chapter 1 software analysis and design in software developmentChapter 1 software analysis and design in software development
Chapter 1 software analysis and design in software development
 
Components of an information system
Components of an information systemComponents of an information system
Components of an information system
 
Instant message
Instant  messageInstant  message
Instant message
 
MIS
MISMIS
MIS
 
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
INTERNAL Assign no   207( JAIPUR NATIONAL UNI)INTERNAL Assign no   207( JAIPUR NATIONAL UNI)
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
 
Foundations of Information System in Business - Mark John Lado
Foundations of Information System in Business - Mark John LadoFoundations of Information System in Business - Mark John Lado
Foundations of Information System in Business - Mark John Lado
 
Analyzing Systems Using Data Flow Diagrams
Analyzing Systems Using Data Flow DiagramsAnalyzing Systems Using Data Flow Diagrams
Analyzing Systems Using Data Flow Diagrams
 
DEVELOPMENT OF A MULTIAGENT BASED METHODOLOGY FOR COMPLEX SYSTEMS
DEVELOPMENT OF A MULTIAGENT BASED METHODOLOGY FOR COMPLEX SYSTEMSDEVELOPMENT OF A MULTIAGENT BASED METHODOLOGY FOR COMPLEX SYSTEMS
DEVELOPMENT OF A MULTIAGENT BASED METHODOLOGY FOR COMPLEX SYSTEMS
 
computer Unit 8
computer Unit 8computer Unit 8
computer Unit 8
 

More from DrMohammed Qassim

Repatino code - hamming code (7,4) - chapter four
Repatino code - hamming code (7,4) - chapter fourRepatino code - hamming code (7,4) - chapter four
Repatino code - hamming code (7,4) - chapter four
DrMohammed Qassim
 
Shannon code & shannon fano & huffman method - chapter three
Shannon code  & shannon fano & huffman method  - chapter threeShannon code  & shannon fano & huffman method  - chapter three
Shannon code & shannon fano & huffman method - chapter three
DrMohammed Qassim
 
ٍSource Entropy - binary symmetric channe - chapter one - two
ٍSource Entropy - binary symmetric channe - chapter one - twoٍSource Entropy - binary symmetric channe - chapter one - two
ٍSource Entropy - binary symmetric channe - chapter one - two
DrMohammed Qassim
 
(Win7) مقدمة في نظام التشغيل
(Win7) مقدمة في نظام التشغيل  (Win7) مقدمة في نظام التشغيل
(Win7) مقدمة في نظام التشغيل
DrMohammed Qassim
 
مقدمة في برمجة و تصميم الشبكات
مقدمة في برمجة و تصميم الشبكاتمقدمة في برمجة و تصميم الشبكات
مقدمة في برمجة و تصميم الشبكات
DrMohammed Qassim
 
مقدمة حول الشبكات
مقدمة حول الشبكاتمقدمة حول الشبكات
مقدمة حول الشبكات
DrMohammed Qassim
 
منهاج تحليل و تصميم نظم المعلومات
منهاج تحليل و تصميم نظم المعلوماتمنهاج تحليل و تصميم نظم المعلومات
منهاج تحليل و تصميم نظم المعلومات
DrMohammed Qassim
 
منهاج بناء و تصميم مواقع الانترنيت
منهاج بناء و تصميم مواقع الانترنيتمنهاج بناء و تصميم مواقع الانترنيت
منهاج بناء و تصميم مواقع الانترنيت
DrMohammed Qassim
 
مقدمة في قواعد البيانات
مقدمة في قواعد البياناتمقدمة في قواعد البيانات
مقدمة في قواعد البيانات
DrMohammed Qassim
 
Example for ER diagram part11
Example for ER diagram part11Example for ER diagram part11
Example for ER diagram part11
DrMohammed Qassim
 
Primary Key & Foreign Key part10
Primary Key & Foreign Key part10Primary Key & Foreign Key part10
Primary Key & Foreign Key part10
DrMohammed Qassim
 
Entity Relationship Diagram part9
Entity Relationship Diagram part9Entity Relationship Diagram part9
Entity Relationship Diagram part9
DrMohammed Qassim
 
Activity Diagram part8
Activity Diagram part8Activity Diagram part8
Activity Diagram part8
DrMohammed Qassim
 
Use Case Context Diagram part5
Use Case Context Diagram part5Use Case Context Diagram part5
Use Case Context Diagram part5
DrMohammed Qassim
 
Use Case Diagrams part4
Use Case Diagrams part4Use Case Diagrams part4
Use Case Diagrams part4
DrMohammed Qassim
 
System Development Life Cycle part3
System Development Life Cycle part3System Development Life Cycle part3
System Development Life Cycle part3
DrMohammed Qassim
 
Introduction to Python
Introduction to PythonIntroduction to Python
Introduction to Python
DrMohammed Qassim
 
(Protracted your system) حماية نظامك من الدخلاء
(Protracted your system) حماية نظامك من الدخلاء(Protracted your system) حماية نظامك من الدخلاء
(Protracted your system) حماية نظامك من الدخلاء
DrMohammed Qassim
 
(Internet privacy) حماية الخصوصية
(Internet privacy) حماية الخصوصية (Internet privacy) حماية الخصوصية
(Internet privacy) حماية الخصوصية
DrMohammed Qassim
 
(Information security) مقدمة في أمن المعلومات
(Information security) مقدمة في أمن المعلومات(Information security) مقدمة في أمن المعلومات
(Information security) مقدمة في أمن المعلومات
DrMohammed Qassim
 

More from DrMohammed Qassim (20)

Repatino code - hamming code (7,4) - chapter four
Repatino code - hamming code (7,4) - chapter fourRepatino code - hamming code (7,4) - chapter four
Repatino code - hamming code (7,4) - chapter four
 
Shannon code & shannon fano & huffman method - chapter three
Shannon code  & shannon fano & huffman method  - chapter threeShannon code  & shannon fano & huffman method  - chapter three
Shannon code & shannon fano & huffman method - chapter three
 
ٍSource Entropy - binary symmetric channe - chapter one - two
ٍSource Entropy - binary symmetric channe - chapter one - twoٍSource Entropy - binary symmetric channe - chapter one - two
ٍSource Entropy - binary symmetric channe - chapter one - two
 
(Win7) مقدمة في نظام التشغيل
(Win7) مقدمة في نظام التشغيل  (Win7) مقدمة في نظام التشغيل
(Win7) مقدمة في نظام التشغيل
 
مقدمة في برمجة و تصميم الشبكات
مقدمة في برمجة و تصميم الشبكاتمقدمة في برمجة و تصميم الشبكات
مقدمة في برمجة و تصميم الشبكات
 
مقدمة حول الشبكات
مقدمة حول الشبكاتمقدمة حول الشبكات
مقدمة حول الشبكات
 
منهاج تحليل و تصميم نظم المعلومات
منهاج تحليل و تصميم نظم المعلوماتمنهاج تحليل و تصميم نظم المعلومات
منهاج تحليل و تصميم نظم المعلومات
 
منهاج بناء و تصميم مواقع الانترنيت
منهاج بناء و تصميم مواقع الانترنيتمنهاج بناء و تصميم مواقع الانترنيت
منهاج بناء و تصميم مواقع الانترنيت
 
مقدمة في قواعد البيانات
مقدمة في قواعد البياناتمقدمة في قواعد البيانات
مقدمة في قواعد البيانات
 
Example for ER diagram part11
Example for ER diagram part11Example for ER diagram part11
Example for ER diagram part11
 
Primary Key & Foreign Key part10
Primary Key & Foreign Key part10Primary Key & Foreign Key part10
Primary Key & Foreign Key part10
 
Entity Relationship Diagram part9
Entity Relationship Diagram part9Entity Relationship Diagram part9
Entity Relationship Diagram part9
 
Activity Diagram part8
Activity Diagram part8Activity Diagram part8
Activity Diagram part8
 
Use Case Context Diagram part5
Use Case Context Diagram part5Use Case Context Diagram part5
Use Case Context Diagram part5
 
Use Case Diagrams part4
Use Case Diagrams part4Use Case Diagrams part4
Use Case Diagrams part4
 
System Development Life Cycle part3
System Development Life Cycle part3System Development Life Cycle part3
System Development Life Cycle part3
 
Introduction to Python
Introduction to PythonIntroduction to Python
Introduction to Python
 
(Protracted your system) حماية نظامك من الدخلاء
(Protracted your system) حماية نظامك من الدخلاء(Protracted your system) حماية نظامك من الدخلاء
(Protracted your system) حماية نظامك من الدخلاء
 
(Internet privacy) حماية الخصوصية
(Internet privacy) حماية الخصوصية (Internet privacy) حماية الخصوصية
(Internet privacy) حماية الخصوصية
 
(Information security) مقدمة في أمن المعلومات
(Information security) مقدمة في أمن المعلومات(Information security) مقدمة في أمن المعلومات
(Information security) مقدمة في أمن المعلومات
 

Recently uploaded

Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 

Recently uploaded (20)

Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 

System analysis part2

  • 1. Introdaction to Python Dr. Mohammed Kassim Page 7 Systems analysis Information System Components Network Resources Telecommunications networks like the Internet, intranets, and extranets have become essential to the successful operations of all types of organizations and their computer-based information systems. Telecommunications networks consist of computers, communications processors, and other devices interconnected by communications media and controlled by communications software. The concept of Network Resources emphasizes that communications networks are a fundamental resource component of all information systems. Network resources include: • Communications media: such as twisted pair wire, coaxial cable, fiber- optic cable, microwave systems, wireless signal and communication satellite systems. • Network support: This generic category includes all of the people,
  • 2. Introdaction to Python Dr. Mohammed Kassim Page 8 Systems analysis hardware, software, and data resources that directly support the operation and use of a communications network. Examples include communications control software such as network operating systems and Internet packages. Figure 1.4. Components Information Systems in process
  • 3. Introdaction to Python Dr. Mohammed Kassim Page 9 Systems analysis Systems analysis Systems analysis is the dissection of a system into its component pieces for purposes of studying how those component pieces interact and work. Structured analysis was one the first formal strategies developed for systems analysis of information systems and computer applications. The models are structured pictures that illustrate the processes, inputs, outputs, and files required to respond to events. Structured analysis introduced an overall strategy that has been adopted by many of the other techniques – model-driven development. A model is a representation of reality. Just as ‘a picture is worth a thousand words,’ most models use pictures to represent reality. Model-driven development techniques emphasize the drawing of models to define requirements and system designs. The model becomes the design blueprint for constructing the final system. Figure 2.1. Systems model
  • 4. Introdaction to Python Dr. Mohammed Kassim Page 10 Systems analysis System Analyst System Analyst is a specialist who studies the problems and needs of an organization to determine how people, data, processes, and information technology can best accomplish improvements for the business. System analyst understand both business and computing. They study both business problems and opportunities and then transform business and information requirements into specification for information systems that will be implemented by various technical specialists including computer programmers. System analyst initiates changes within an organization. Every new system changes the business.
  • 5. Introdaction to Python Dr. Mohammed Kassim Page 11 Systems analysis System analyst is basically a problem solver. Problems may be either real or anticipated that require corrective action. Skills to be possessed by System Analyst An analyst must possess various skills to effectively carry out the job. They may be divided into 2 categories — interpersonal and technical skills. Interpersonal skills deal with relationship and the interface of the analyst with people in business. They are useful in establishing trust and resolving conflicts. Technical skills focus on procedures and techniques for operation analysis, system analysis and computer science.