SlideShare a Scribd company logo
Introduction to Information Technology 
Turban, Rainer and Potter 
John Wiley & Sons, Inc. 
Copyright 2005
A Technical View of System 
Analysis and Design
Chapter Outline 
Developing an IT architecture 
Overview the Traditional SDLC 
Alternative methods and tools for systems development 
Component- based development and web services 
“ Copyright 2005 John Wiley & Sons Inc.” TG 6 3
Learning Objectives 
Describe the hierarchy and steps of IT 
architecture. 
Describe the SDLC and its advantages and 
limitations. 
Describe the major alternative methods and 
tools for building information systems. 
Describe the use of component- based 
development and web services. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 6 4
TG6.1 Developing an IT Architecture 
Koontz (2000) suggested a six-step process for 
developing an IT architecture 
 Step1: Business goals and vision. The system analyst 
reviews the relevant business goals and vision. 
 Step 2 : Information architecture. A company analyst 
defines the information necessary to fulfil the 
objectives of step 1. 
 Step 3: Data architecture. What data you have and 
what you want to get form customers, including Web-generated 
data. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 6 5
Step 4: Application architecture. Define the components 
or modules of the applications that will interface with the 
required data. Build the conceptual framework of an 
application, but not the infrastructure that will support it. 
Step 5: Technical architecture. Formally examine the 
specific hardware and software required to support the 
analysis in previous step. 
Step 6: Organizational architecture. An organizational 
architecture deals with the human resources and 
procedure required by steps 1 through 5 
“ Copyright 2005 John Wiley & Sons Inc.” TG 6 6
TG6.2 Overview of SDLC 
 Systems development life cycle (SDLC) is a 
structured framework used for large IT 
projects, that consists of sequential 
processes by which information systems are 
developed. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 6 7
An eight- stage system development life cycle 
(SDLC) 
“ Copyright 2005 John Wiley & Sons Inc.” TG 6 8
Waterfall approach. SDLC approach in which 
tasks in one stage were completed before the 
work proceeded to next stage 
Systems analysts. IS professionals who 
specialize in analyzing and designing 
information systems. 
Programmers. IS professionals who modify 
existing computer programs or write new 
computer programs to satisfy user 
requirements. 
Technical specialist. Experts on a certain type 
of technology, such as databases or 
telecommunications 
“ Copyright 2005 John Wiley & Sons Inc.” TG 6 9
Systems stakeholders 
 All people who are affected by changes in 
information systems 
“ Copyright 2005 John Wiley & Sons Inc.” TG 6 10
S ystems investigation 
Systems investigation begins with the business 
problem (or business opportunity). 
The next task in the systems investigation stage 
is the feasibility study that gauges the probability 
of success of a proposed project and provides 
rough assessment of the project's feasibility. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 6 11
Feasibility study 
Technical feasibility: Assessment of whether 
hardware, software and communications 
components can be developed and /or 
acquired to solve a business problem. 
Economic feasibility: Assessment of whether a 
project is an acceptable financial risk and if the 
organization can afford the expense and time 
needed to complete it. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 6 12
Economic feasibility 
Return on investment. The ratio of the net 
income attributable to a project divided by the 
average assets invested in the project. 
Net present value. The net amount by which 
project benefits exceed project costs of capital 
and the time value of money. 
Breakeven analysis. Method that determines the 
point at which the cumulative cash flow from a 
project equals the investment made in the 
project. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 6 13
F easibility study cont… 
Organizational feasibility . organization’s 
ability to access the proposed project. 
Behavioural feasibility. Assessment of the 
human issues involved in a proposed 
project, including resistance to change 
and skills and training needs. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 6 14
Systems analysis 
 The examination of the business problem that 
the organization plans to solve with an 
information system. This stage defines the 
business problem, identifies its causes, 
specifies the solution and identifies the 
information requirements that the solution 
must satisfy 
“ Copyright 2005 John Wiley & Sons Inc.” TG 6 15
Systems Analysis cont… 
Organization have three basic solutions to 
any business problem relating to an 
information system: 
Do nothing and continue to use the existing 
system unchanged, 
Modify or enhance the existing system, 
Develop a new system. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 6 16
There are problems associated with eliciting 
information requirement, regardless of the method 
used by the analyst. 
The business problem may be poorly defined 
The users may not know exactly what the problem is, 
what they want or what they need. 
Users may disagree with each other about business 
procedures or even about the business problem. 
The problem may not be information related, but may 
require other solutions, such as a change in 
management or additional training. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 6 17
 The system analysis stage produces the 
following information: 
 Strengths and weaknesses of the existing system 
 Functions that the new system must have to 
solve the business problem. 
 User information requirements for the new 
system. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 6 18
Systems design 
System analysis describes what a system must do to solve 
the business problem and systems design describes how 
the system will accomplish this task . The deliverable of the 
systems design phase is the technical design that specifies 
the following : 
System outputs, inputs and user interfaces 
Hardware, software, databases, telecommunications, 
personnel and procedures 
How these components are integrated 
This output represents the set of system specification 
“ Copyright 2005 John Wiley & Sons Inc.” TG 6 19
System design encompasses two major 
aspects of the new system: 
 Logical system design: states what the 
system will do, using abstract specifications. 
 Physical system design: states how the 
system will perform its functions, with actual 
physical specification. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 6 20
Programming 
The translation of a system’s design specification 
into computer code. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 6 21
Testing 
Testing check to see if the computer code will 
produce the expected and desired results under 
certain conditions 
Testing is designed to delete errors (bugs) in the 
computer code. These errors are of two types . 
Syntax errors ( e.g., misspelled word or a 
misplaced comma) and logic errors that permit 
the program to run but result in incorrect output 
“ Copyright 2005 John Wiley & Sons Inc.” TG 6 22
Implementation 
Implementation or deployment is the process of converting 
from the old system to the new system. Organizations use 
four major conversion strategies ; parallel , direct , pilot and 
phased. 
Parallel conversion. Implementation process in which the 
old system and the new system operate simultaneously for a 
period of time. 
Direct conversion. Implementation process in which the old 
system is cut off and the new system turned on at a certain 
point in time. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 6 23
Implementation cont… 
Pilot conversion. Implementation process that 
introduces the new system in one part of the 
organization on a trial basis, when new system is 
working property, it is introduced in other parts of the 
organization. 
Phased conversion. Implementation process that 
introduces components of the new system in stages, 
until the entire new system is operational. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 6 24
Operation and maintenance 
Systems need several types of maintenance. 
Debugging: A process that continues throughout the 
life of the system. 
Updating: updating the system to accommodate 
changes in business conditions. 
Maintenance: that adds new functionally to the 
system –adding new features to the existing system 
without disturbing its operation. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 6 25
TG6.3 Alternative methods and tools for 
systems development 
Prototyping 
Joint application design (JAD) 
Rapid application development (RAD) 
Object- oriented development 
Other methods 
“ Copyright 2005 John Wiley & Sons Inc.” TG 6 26
Alternative methods cont… 
 Prototyping. Approach that defines an initial 
list of user requirements, builds a prototype 
system and then improves the system in 
several iterations based on users’ feedback. 
 Joint application design (JAD). A group – 
based tool for collecting user requirements 
and creating system designs. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 6 27
Alternative methods cont… 
 Rapid application development . A 
development method that uses special tools 
and an iterative approach to rapidly produce a 
high-quality system. 
 Computer-aided software engineering (CASE). 
Development approach that uses specialized 
tools to automate many of the tasks in the 
SDLC; upper CASE tools in SDLC automate 
the early stages of the SDLC, and lower case 
tools automate the later stages. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 6 28
Alternative methods cont… 
 Integrated Computer Assisted software 
Engineering (ICASE) Tools . CASE tools that 
provide links between upper CASE and lower 
CASE tools. 
 Object- oriented development. Begins with 
aspects of the real world that must be 
modelled to perform a task. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 6 29
TG6.4 Component-based development 
(CBD) and web service 
CBD: A method that uses pre-programmed 
components to develop application. 
Web service in system development: Self-contained, 
self-describing business and 
consumer modular applications, delivered over 
the Internet, that users can select and combine 
through almost any device. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 6 30
Web services advantages and 
limitations 
Advantage Disadvantage 
Greater interoperability and lower costs due to 
universal, open, text-based standards 
Standards still being defined 
Enable software running on different platforms to 
communicate with each other 
Require programming skill to implement 
Promote modular programming and reuse of 
existing software. 
Security: applications may be able to 
bypass security barriers 
Operate on existing Infrastructure, so are easy 
and inexpensive to implement. 
Can be implemented incrementally 
“ Copyright 2005 John Wiley & Sons Inc.” TG 6 31
All rights reserved. Reproduction or translation of this 
work beyond that permitted in section 117 of the United 
States Copyright Act without express permission of the 
copyright owner is unlawful. Request for information 
should be addressed to the permission department, John 
Wiley & Sons, Inc. The purchaser may make back-up 
copies for his/her own use only and not for distribution or 
resale. The publisher assumes no responsibility for error, 
omissions, or damages caused by the use of these 
programs or from the use of the information herein. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 6 32

More Related Content

What's hot

Chapter 2
Chapter 2Chapter 2
Chapter 2
MarchGuzl Maishh
 
Chapter01
Chapter01Chapter01
Chapter01
Franco Valdez
 
Begining The Analysys Invetigating System Requirement
Begining The Analysys Invetigating System RequirementBegining The Analysys Invetigating System Requirement
Begining The Analysys Invetigating System Requirement
Henhen Lukmana
 
The Analysyst As A Project Manager
The Analysyst As A Project ManagerThe Analysyst As A Project Manager
The Analysyst As A Project Manager
Henhen Lukmana
 
Evaluating Alternatives for Requirements, Envireonment, and Implemetation
Evaluating Alternatives for Requirements, Envireonment, and ImplemetationEvaluating Alternatives for Requirements, Envireonment, and Implemetation
Evaluating Alternatives for Requirements, Envireonment, and Implemetation
Henhen Lukmana
 
Moving to Design
Moving to DesignMoving to Design
Moving to Design
Henhen Lukmana
 
System development phases
System development phasesSystem development phases
System development phases
PrabinBista05
 
Different Approaches To Sys Bldg
Different Approaches To Sys BldgDifferent Approaches To Sys Bldg
Different Approaches To Sys Bldg
USeP
 
The Object-Oriented Approach to Requirements
The Object-Oriented Approach to RequirementsThe Object-Oriented Approach to Requirements
The Object-Oriented Approach to Requirements
Henhen Lukmana
 
Chap03
Chap03Chap03
Chap03
lolanyunyu
 
The Traditional Approach to Requirement
The Traditional Approach to RequirementThe Traditional Approach to Requirement
The Traditional Approach to Requirement
Henhen Lukmana
 
Ch10-Program Design
Ch10-Program DesignCh10-Program Design
Ch10-Program Design
Fajar Baskoro
 
Projman
ProjmanProjman
Projman
Fajar Baskoro
 
Software Processes
Software ProcessesSoftware Processes
Software Processes
university of education,Lahore
 
System Development Proecess
System Development ProecessSystem Development Proecess
System Development Proecess
university of education,Lahore
 
Transitioning IT Projects to Operations Effectively in Public Sector : A Case...
Transitioning IT Projects to Operations Effectively in Public Sector : A Case...Transitioning IT Projects to Operations Effectively in Public Sector : A Case...
Transitioning IT Projects to Operations Effectively in Public Sector : A Case...
ijmpict
 
System Design and Analysis 1
System Design and Analysis 1System Design and Analysis 1
System Design and Analysis 1
Boeun Tim
 
Chap08
Chap08Chap08
Chap08
lolanyunyu
 
SE18_Lec 02_Software Life Cycle Model
SE18_Lec 02_Software Life Cycle ModelSE18_Lec 02_Software Life Cycle Model
SE18_Lec 02_Software Life Cycle Model
Amr E. Mohamed
 
Asi Chap005
Asi Chap005Asi Chap005
Asi Chap005
Putra Tidore
 

What's hot (20)

Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Chapter01
Chapter01Chapter01
Chapter01
 
Begining The Analysys Invetigating System Requirement
Begining The Analysys Invetigating System RequirementBegining The Analysys Invetigating System Requirement
Begining The Analysys Invetigating System Requirement
 
The Analysyst As A Project Manager
The Analysyst As A Project ManagerThe Analysyst As A Project Manager
The Analysyst As A Project Manager
 
Evaluating Alternatives for Requirements, Envireonment, and Implemetation
Evaluating Alternatives for Requirements, Envireonment, and ImplemetationEvaluating Alternatives for Requirements, Envireonment, and Implemetation
Evaluating Alternatives for Requirements, Envireonment, and Implemetation
 
Moving to Design
Moving to DesignMoving to Design
Moving to Design
 
System development phases
System development phasesSystem development phases
System development phases
 
Different Approaches To Sys Bldg
Different Approaches To Sys BldgDifferent Approaches To Sys Bldg
Different Approaches To Sys Bldg
 
The Object-Oriented Approach to Requirements
The Object-Oriented Approach to RequirementsThe Object-Oriented Approach to Requirements
The Object-Oriented Approach to Requirements
 
Chap03
Chap03Chap03
Chap03
 
The Traditional Approach to Requirement
The Traditional Approach to RequirementThe Traditional Approach to Requirement
The Traditional Approach to Requirement
 
Ch10-Program Design
Ch10-Program DesignCh10-Program Design
Ch10-Program Design
 
Projman
ProjmanProjman
Projman
 
Software Processes
Software ProcessesSoftware Processes
Software Processes
 
System Development Proecess
System Development ProecessSystem Development Proecess
System Development Proecess
 
Transitioning IT Projects to Operations Effectively in Public Sector : A Case...
Transitioning IT Projects to Operations Effectively in Public Sector : A Case...Transitioning IT Projects to Operations Effectively in Public Sector : A Case...
Transitioning IT Projects to Operations Effectively in Public Sector : A Case...
 
System Design and Analysis 1
System Design and Analysis 1System Design and Analysis 1
System Design and Analysis 1
 
Chap08
Chap08Chap08
Chap08
 
SE18_Lec 02_Software Life Cycle Model
SE18_Lec 02_Software Life Cycle ModelSE18_Lec 02_Software Life Cycle Model
SE18_Lec 02_Software Life Cycle Model
 
Asi Chap005
Asi Chap005Asi Chap005
Asi Chap005
 

Viewers also liked

Tg02
Tg02Tg02
Tg02
kelasapa
 
Tg04
Tg04Tg04
Tg04
kelasapa
 
Tg05
Tg05Tg05
Tg05
kelasapa
 
Ch11
Ch11Ch11
Ch11
kelasapa
 
Ch09
Ch09Ch09
Ch09
kelasapa
 
Ch04
Ch04Ch04
Ch04
kelasapa
 
Ch10
Ch10Ch10
Ch10
kelasapa
 
Tg03
Tg03Tg03
Tg03
kelasapa
 
Ch12
Ch12Ch12
Ch12
kelasapa
 
aaaaaa
aaaaaaaaaaaa
aaaaaa
kelasapa
 
Ch08
Ch08Ch08
Ch08
kelasapa
 
Ch01
Ch01Ch01
Ch01
kelasapa
 

Viewers also liked (12)

Tg02
Tg02Tg02
Tg02
 
Tg04
Tg04Tg04
Tg04
 
Tg05
Tg05Tg05
Tg05
 
Ch11
Ch11Ch11
Ch11
 
Ch09
Ch09Ch09
Ch09
 
Ch04
Ch04Ch04
Ch04
 
Ch10
Ch10Ch10
Ch10
 
Tg03
Tg03Tg03
Tg03
 
Ch12
Ch12Ch12
Ch12
 
aaaaaa
aaaaaaaaaaaa
aaaaaa
 
Ch08
Ch08Ch08
Ch08
 
Ch01
Ch01Ch01
Ch01
 

Similar to Tg06

system development life cycle
system development life cyclesystem development life cycle
system development life cycle
SuhleemAhmd
 
Software Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsSoftware Engineering Important Short Question for Exams
Software Engineering Important Short Question for Exams
MuhammadTalha436
 
Gr 6 sdlc models
Gr 6   sdlc modelsGr 6   sdlc models
SAD_UnitII.docx
SAD_UnitII.docxSAD_UnitII.docx
SAD_UnitII.docx
8759000398
 
Software Development Life Cycle & Its Models
Software Development Life Cycle & Its ModelsSoftware Development Life Cycle & Its Models
Software Development Life Cycle & Its Models
Dr.Purushottam Petare
 
Sdlc1
Sdlc1Sdlc1
CHAPTER FOUR.pptx
CHAPTER FOUR.pptxCHAPTER FOUR.pptx
CHAPTER FOUR.pptx
lidiyamekonnen
 
Notifications My CommunityHomeBBA 3551-16P-5A19-S3, Inform.docx
Notifications My CommunityHomeBBA 3551-16P-5A19-S3, Inform.docxNotifications My CommunityHomeBBA 3551-16P-5A19-S3, Inform.docx
Notifications My CommunityHomeBBA 3551-16P-5A19-S3, Inform.docx
picklesvalery
 
Chapter 1 - 5th Edition.pptx
Chapter 1 - 5th Edition.pptxChapter 1 - 5th Edition.pptx
Chapter 1 - 5th Edition.pptx
SitiMardiana10
 
Sdlc
SdlcSdlc
SAD_SDLC.pptx
SAD_SDLC.pptxSAD_SDLC.pptx
SAD_SDLC.pptx
SharmilaMore5
 
System Development Life Cycle ( Sdlc )
System Development Life Cycle ( Sdlc )System Development Life Cycle ( Sdlc )
System Development Life Cycle ( Sdlc )
Jennifer Wright
 
5- What is system development- List and define five phases of System D.docx
5- What is system development- List and define five phases of System D.docx5- What is system development- List and define five phases of System D.docx
5- What is system development- List and define five phases of System D.docx
dannyn2
 
Structure system analysis and design method -SSADM
Structure system analysis and design method -SSADMStructure system analysis and design method -SSADM
Structure system analysis and design method -SSADM
FLYMAN TECHNOLOGY LIMITED
 
System analysis 1
System analysis 1System analysis 1
System analysis 1
Mustafa Saeed
 
CS 414 (IT Project Management)
CS 414 (IT Project Management)CS 414 (IT Project Management)
CS 414 (IT Project Management)
raszky
 
System Development Life Cycle
System Development Life CycleSystem Development Life Cycle
System Development Life Cycle
Doma Ngonie
 
Software Engineering
Software EngineeringSoftware Engineering
Software Engineering
Zahoorali Khan
 
396849 developing-business-it-solutions
396849 developing-business-it-solutions396849 developing-business-it-solutions
396849 developing-business-it-solutions
Md. Mahabub Alam
 
Building information systems
Building information systemsBuilding information systems
Building information systems
Prof. Othman Alsalloum
 

Similar to Tg06 (20)

system development life cycle
system development life cyclesystem development life cycle
system development life cycle
 
Software Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsSoftware Engineering Important Short Question for Exams
Software Engineering Important Short Question for Exams
 
Gr 6 sdlc models
Gr 6   sdlc modelsGr 6   sdlc models
Gr 6 sdlc models
 
SAD_UnitII.docx
SAD_UnitII.docxSAD_UnitII.docx
SAD_UnitII.docx
 
Software Development Life Cycle & Its Models
Software Development Life Cycle & Its ModelsSoftware Development Life Cycle & Its Models
Software Development Life Cycle & Its Models
 
Sdlc1
Sdlc1Sdlc1
Sdlc1
 
CHAPTER FOUR.pptx
CHAPTER FOUR.pptxCHAPTER FOUR.pptx
CHAPTER FOUR.pptx
 
Notifications My CommunityHomeBBA 3551-16P-5A19-S3, Inform.docx
Notifications My CommunityHomeBBA 3551-16P-5A19-S3, Inform.docxNotifications My CommunityHomeBBA 3551-16P-5A19-S3, Inform.docx
Notifications My CommunityHomeBBA 3551-16P-5A19-S3, Inform.docx
 
Chapter 1 - 5th Edition.pptx
Chapter 1 - 5th Edition.pptxChapter 1 - 5th Edition.pptx
Chapter 1 - 5th Edition.pptx
 
Sdlc
SdlcSdlc
Sdlc
 
SAD_SDLC.pptx
SAD_SDLC.pptxSAD_SDLC.pptx
SAD_SDLC.pptx
 
System Development Life Cycle ( Sdlc )
System Development Life Cycle ( Sdlc )System Development Life Cycle ( Sdlc )
System Development Life Cycle ( Sdlc )
 
5- What is system development- List and define five phases of System D.docx
5- What is system development- List and define five phases of System D.docx5- What is system development- List and define five phases of System D.docx
5- What is system development- List and define five phases of System D.docx
 
Structure system analysis and design method -SSADM
Structure system analysis and design method -SSADMStructure system analysis and design method -SSADM
Structure system analysis and design method -SSADM
 
System analysis 1
System analysis 1System analysis 1
System analysis 1
 
CS 414 (IT Project Management)
CS 414 (IT Project Management)CS 414 (IT Project Management)
CS 414 (IT Project Management)
 
System Development Life Cycle
System Development Life CycleSystem Development Life Cycle
System Development Life Cycle
 
Software Engineering
Software EngineeringSoftware Engineering
Software Engineering
 
396849 developing-business-it-solutions
396849 developing-business-it-solutions396849 developing-business-it-solutions
396849 developing-business-it-solutions
 
Building information systems
Building information systemsBuilding information systems
Building information systems
 

More from kelasapa

Tg01
Tg01Tg01
Tg01
kelasapa
 
Ch07
Ch07Ch07
Ch07
kelasapa
 
Ch06
Ch06Ch06
Ch06
kelasapa
 
Ch05
Ch05Ch05
Ch05
kelasapa
 
Ch03
Ch03Ch03
Ch03
kelasapa
 
Ch02
Ch02Ch02
Ch02
kelasapa
 

More from kelasapa (6)

Tg01
Tg01Tg01
Tg01
 
Ch07
Ch07Ch07
Ch07
 
Ch06
Ch06Ch06
Ch06
 
Ch05
Ch05Ch05
Ch05
 
Ch03
Ch03Ch03
Ch03
 
Ch02
Ch02Ch02
Ch02
 

Recently uploaded

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 

Recently uploaded (20)

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 

Tg06

  • 1. Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005
  • 2. A Technical View of System Analysis and Design
  • 3. Chapter Outline Developing an IT architecture Overview the Traditional SDLC Alternative methods and tools for systems development Component- based development and web services “ Copyright 2005 John Wiley & Sons Inc.” TG 6 3
  • 4. Learning Objectives Describe the hierarchy and steps of IT architecture. Describe the SDLC and its advantages and limitations. Describe the major alternative methods and tools for building information systems. Describe the use of component- based development and web services. “ Copyright 2005 John Wiley & Sons Inc.” TG 6 4
  • 5. TG6.1 Developing an IT Architecture Koontz (2000) suggested a six-step process for developing an IT architecture  Step1: Business goals and vision. The system analyst reviews the relevant business goals and vision.  Step 2 : Information architecture. A company analyst defines the information necessary to fulfil the objectives of step 1.  Step 3: Data architecture. What data you have and what you want to get form customers, including Web-generated data. “ Copyright 2005 John Wiley & Sons Inc.” TG 6 5
  • 6. Step 4: Application architecture. Define the components or modules of the applications that will interface with the required data. Build the conceptual framework of an application, but not the infrastructure that will support it. Step 5: Technical architecture. Formally examine the specific hardware and software required to support the analysis in previous step. Step 6: Organizational architecture. An organizational architecture deals with the human resources and procedure required by steps 1 through 5 “ Copyright 2005 John Wiley & Sons Inc.” TG 6 6
  • 7. TG6.2 Overview of SDLC  Systems development life cycle (SDLC) is a structured framework used for large IT projects, that consists of sequential processes by which information systems are developed. “ Copyright 2005 John Wiley & Sons Inc.” TG 6 7
  • 8. An eight- stage system development life cycle (SDLC) “ Copyright 2005 John Wiley & Sons Inc.” TG 6 8
  • 9. Waterfall approach. SDLC approach in which tasks in one stage were completed before the work proceeded to next stage Systems analysts. IS professionals who specialize in analyzing and designing information systems. Programmers. IS professionals who modify existing computer programs or write new computer programs to satisfy user requirements. Technical specialist. Experts on a certain type of technology, such as databases or telecommunications “ Copyright 2005 John Wiley & Sons Inc.” TG 6 9
  • 10. Systems stakeholders  All people who are affected by changes in information systems “ Copyright 2005 John Wiley & Sons Inc.” TG 6 10
  • 11. S ystems investigation Systems investigation begins with the business problem (or business opportunity). The next task in the systems investigation stage is the feasibility study that gauges the probability of success of a proposed project and provides rough assessment of the project's feasibility. “ Copyright 2005 John Wiley & Sons Inc.” TG 6 11
  • 12. Feasibility study Technical feasibility: Assessment of whether hardware, software and communications components can be developed and /or acquired to solve a business problem. Economic feasibility: Assessment of whether a project is an acceptable financial risk and if the organization can afford the expense and time needed to complete it. “ Copyright 2005 John Wiley & Sons Inc.” TG 6 12
  • 13. Economic feasibility Return on investment. The ratio of the net income attributable to a project divided by the average assets invested in the project. Net present value. The net amount by which project benefits exceed project costs of capital and the time value of money. Breakeven analysis. Method that determines the point at which the cumulative cash flow from a project equals the investment made in the project. “ Copyright 2005 John Wiley & Sons Inc.” TG 6 13
  • 14. F easibility study cont… Organizational feasibility . organization’s ability to access the proposed project. Behavioural feasibility. Assessment of the human issues involved in a proposed project, including resistance to change and skills and training needs. “ Copyright 2005 John Wiley & Sons Inc.” TG 6 14
  • 15. Systems analysis  The examination of the business problem that the organization plans to solve with an information system. This stage defines the business problem, identifies its causes, specifies the solution and identifies the information requirements that the solution must satisfy “ Copyright 2005 John Wiley & Sons Inc.” TG 6 15
  • 16. Systems Analysis cont… Organization have three basic solutions to any business problem relating to an information system: Do nothing and continue to use the existing system unchanged, Modify or enhance the existing system, Develop a new system. “ Copyright 2005 John Wiley & Sons Inc.” TG 6 16
  • 17. There are problems associated with eliciting information requirement, regardless of the method used by the analyst. The business problem may be poorly defined The users may not know exactly what the problem is, what they want or what they need. Users may disagree with each other about business procedures or even about the business problem. The problem may not be information related, but may require other solutions, such as a change in management or additional training. “ Copyright 2005 John Wiley & Sons Inc.” TG 6 17
  • 18.  The system analysis stage produces the following information:  Strengths and weaknesses of the existing system  Functions that the new system must have to solve the business problem.  User information requirements for the new system. “ Copyright 2005 John Wiley & Sons Inc.” TG 6 18
  • 19. Systems design System analysis describes what a system must do to solve the business problem and systems design describes how the system will accomplish this task . The deliverable of the systems design phase is the technical design that specifies the following : System outputs, inputs and user interfaces Hardware, software, databases, telecommunications, personnel and procedures How these components are integrated This output represents the set of system specification “ Copyright 2005 John Wiley & Sons Inc.” TG 6 19
  • 20. System design encompasses two major aspects of the new system:  Logical system design: states what the system will do, using abstract specifications.  Physical system design: states how the system will perform its functions, with actual physical specification. “ Copyright 2005 John Wiley & Sons Inc.” TG 6 20
  • 21. Programming The translation of a system’s design specification into computer code. “ Copyright 2005 John Wiley & Sons Inc.” TG 6 21
  • 22. Testing Testing check to see if the computer code will produce the expected and desired results under certain conditions Testing is designed to delete errors (bugs) in the computer code. These errors are of two types . Syntax errors ( e.g., misspelled word or a misplaced comma) and logic errors that permit the program to run but result in incorrect output “ Copyright 2005 John Wiley & Sons Inc.” TG 6 22
  • 23. Implementation Implementation or deployment is the process of converting from the old system to the new system. Organizations use four major conversion strategies ; parallel , direct , pilot and phased. Parallel conversion. Implementation process in which the old system and the new system operate simultaneously for a period of time. Direct conversion. Implementation process in which the old system is cut off and the new system turned on at a certain point in time. “ Copyright 2005 John Wiley & Sons Inc.” TG 6 23
  • 24. Implementation cont… Pilot conversion. Implementation process that introduces the new system in one part of the organization on a trial basis, when new system is working property, it is introduced in other parts of the organization. Phased conversion. Implementation process that introduces components of the new system in stages, until the entire new system is operational. “ Copyright 2005 John Wiley & Sons Inc.” TG 6 24
  • 25. Operation and maintenance Systems need several types of maintenance. Debugging: A process that continues throughout the life of the system. Updating: updating the system to accommodate changes in business conditions. Maintenance: that adds new functionally to the system –adding new features to the existing system without disturbing its operation. “ Copyright 2005 John Wiley & Sons Inc.” TG 6 25
  • 26. TG6.3 Alternative methods and tools for systems development Prototyping Joint application design (JAD) Rapid application development (RAD) Object- oriented development Other methods “ Copyright 2005 John Wiley & Sons Inc.” TG 6 26
  • 27. Alternative methods cont…  Prototyping. Approach that defines an initial list of user requirements, builds a prototype system and then improves the system in several iterations based on users’ feedback.  Joint application design (JAD). A group – based tool for collecting user requirements and creating system designs. “ Copyright 2005 John Wiley & Sons Inc.” TG 6 27
  • 28. Alternative methods cont…  Rapid application development . A development method that uses special tools and an iterative approach to rapidly produce a high-quality system.  Computer-aided software engineering (CASE). Development approach that uses specialized tools to automate many of the tasks in the SDLC; upper CASE tools in SDLC automate the early stages of the SDLC, and lower case tools automate the later stages. “ Copyright 2005 John Wiley & Sons Inc.” TG 6 28
  • 29. Alternative methods cont…  Integrated Computer Assisted software Engineering (ICASE) Tools . CASE tools that provide links between upper CASE and lower CASE tools.  Object- oriented development. Begins with aspects of the real world that must be modelled to perform a task. “ Copyright 2005 John Wiley & Sons Inc.” TG 6 29
  • 30. TG6.4 Component-based development (CBD) and web service CBD: A method that uses pre-programmed components to develop application. Web service in system development: Self-contained, self-describing business and consumer modular applications, delivered over the Internet, that users can select and combine through almost any device. “ Copyright 2005 John Wiley & Sons Inc.” TG 6 30
  • 31. Web services advantages and limitations Advantage Disadvantage Greater interoperability and lower costs due to universal, open, text-based standards Standards still being defined Enable software running on different platforms to communicate with each other Require programming skill to implement Promote modular programming and reuse of existing software. Security: applications may be able to bypass security barriers Operate on existing Infrastructure, so are easy and inexpensive to implement. Can be implemented incrementally “ Copyright 2005 John Wiley & Sons Inc.” TG 6 31
  • 32. All rights reserved. Reproduction or translation of this work beyond that permitted in section 117 of the United States Copyright Act without express permission of the copyright owner is unlawful. Request for information should be addressed to the permission department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The publisher assumes no responsibility for error, omissions, or damages caused by the use of these programs or from the use of the information herein. “ Copyright 2005 John Wiley & Sons Inc.” TG 6 32