Fundamentals of Information Technology Lecture 6 : Systems Concepts

Size: px
Start display at page:

Download "Fundamentals of Information Technology Lecture 6 : Systems Concepts"

Transcription

1 Fundamentals of Information Technology Lecture 6 : Systems Concepts

2 Session Structure Session Objectives Information Systems Roles Information Systems Definition Designing an Information System Systems Analysis Information Engineering SSADM Client Service Cycle Key Concepts Summary Discussion Questions

3 Session Objectives Understand The concept of an Information System How to analyse an Information System How information is organised & processed in Information Systems Some other key IS Concepts

4 Information Systems Roles Information systems perform three vital roles in business firms. They support: Business processes and operations Business decision making Strategic competitive advantage Major application categories of information systems include: Operations Support Systems Management Support Systems Enterprise Management Systems

5 Information Systems A number of components related to each other in a definable way Components can be created separately then assembled into more complex structures Relationships can be altered depending on how components are arranged or need to interact The definition of processes can be altered depending on the business needs

6 What is an Information System? Control of ofsystem Performance Input of of Data Resources Processing Data Output of of Information Products Storage of ofdata Resources

7 Designing an Information System Define content of each of the 5 elements Data Processing steps Define the relationships between the 5 elements Information flows

8 Systems Analysis Systems analysis is an in-depth study of end user information needs that produces functional requirements. 3 examples of Systems Analysis methodologies: Information Engineering Structured Systems Analysis & Design (SSADM) Client Service Cycle Model

9 Systems Analysis Traditionally involves a detailed study of Information needs of the company & end users Activities, resources, & products of one or more of the present information systems The IS capabilities required to meet information needs of the company, the end users, and all business stakeholders that may use the system

10 Systems Analysis Organizational analysis Study Management structure The people Business activities Environmental systems The current information system

11 Systems Analysis Analysis of the present system Analyze how the present system.. Uses hardware Uses software Is networked Uses people resources to convert data resources into information products. How the IS activities of input, processing, output, storage, and control are accomplished.

12 Systems Analysis Functional requirements analysis What type of information does each business activity require? Format, volume, frequency, response times What are the information processing capabilities required? Input, processing, output, storage, control

13 Systems Analysis Functional requirements analysis (continued) Finally, develop functional requirements End user information requirements that are not tied to the hardware, software, network, data, and people resources Goal identify what should be done identify what should be done, not how to do it.

14 Information Engineering 3 key techniques : Functional Decomposition Show the various functions in the organisation Entity Relationship Models Show the relationship between each user of information Function/Entity Matrix Show the interaction between functions and entities See IPA diagrams - pages 80-82

15 SSADM 3 key techniques : Dataflow diagrams Show the movement of data through an organisation Logical Data Structures Identify the different data stores, and relationships between them (like entity models) Entity Life History Shows activities which impact on an entity See IPA diagrams - pages 83-84

16 Client Service Cycle Concept developed by Karl Albrecht Views organisations as Service Systems Service Management Quality is the #1 driver for success Cycle of Service Continuous chain of events providing service Moments of Truth Interaction points with customers Departmental Hand-Offs Moments in cycle where control passes from 1 dept to another See IPA page 85

17 Key Concepts - Processing Batch Processing Transactions are logged and stored, then processed in batches Example banks logging cheques through the day then processing them all into the system for clearing overnight Older concept now becoming less common, as data is always out of date Online Processing Transactions occur and are processed in realtime at the moment they happen Keeps systems bang up to date

18 Key Concepts - Processing Centralised Processing Data is transferred to a central point, then processed there Puts all processing eggs in 1 basket Distributed Processing Processing can be done at several points geographically spread Data may well be brought together to a central master system later More fault tolerant the idea on which the Internet is based

19 Key Concept - Logical Data Elements Name Field Payroll Record Payroll File Personnel Database

20 Key Concepts File Types Master File Basic information file, updated by input data Transaction File Temporary collections of input records e.g. new orders used to update Master Files. Report Files Temporary outputs from a system, may be produced on paper or screen Backup Files Copies of files kept for security purposes Library Files Collections of computer programs

21 Summary We ve covered The concept of an Information System How to analyse an Information System How information is organised & processed in Information Systems Some other key IS Concepts

22 Discussion Questions Name and describe 3 ways to perform Systems Analysis Explain how data is logically broken down in any IT system What issues should managers understand when thinking about creating a new Information System?

Chapter 6 Architectural Design. Chapter 6 Architectural design

Chapter 6 Architectural Design. Chapter 6 Architectural design Chapter 6 Architectural Design 1 Topics covered Architectural design decisions Architectural views Architectural patterns Application architectures 2 Software architecture The design process for identifying

More information

INFS 328 Systems Analysis and Design

INFS 328 Systems Analysis and Design INFS 328 Systems Analysis and Design Session 13 Systems Analysis and Construction Tools Lecturer: Prof. Ellis Edwin Badu, Dept. of Information Studies Contact Information: eebadu@ug.edu.gh College of Education

More information

Architectural Design

Architectural Design Architectural Design Objectives To introduce architectural design and to discuss its importance To explain the architectural design decisions that have to be made To introduce three complementary architectural

More information

WHY NETWORK FAILOVER PROTECTION IS A BUSINESS NECESSITY

WHY NETWORK FAILOVER PROTECTION IS A BUSINESS NECESSITY WHY NETWORK FAILOVER PROTECTION IS A BUSINESS NECESSITY Since its early days in the 1990s, the Internet has truly transformed the world. It would be difficult, if not impossible, to find an industry that

More information

5/9/2014. Recall the design process. Lecture 1. Establishing the overall structureof a software system. Topics covered

5/9/2014. Recall the design process. Lecture 1. Establishing the overall structureof a software system. Topics covered Topics covered Chapter 6 Architectural Design Architectural design decisions Architectural views Architectural patterns Application architectures Lecture 1 1 2 Software architecture The design process

More information

B. H. Gardi College of Engineering & Technology, RAJKOT Department of Master of Computer Application. MCA Lecturer At GARDI VIDYAPITH RAJKOT.

B. H. Gardi College of Engineering & Technology, RAJKOT Department of Master of Computer Application. MCA Lecturer At GARDI VIDYAPITH RAJKOT. Prepared By :- Mr. Ajay A. Ardeshana MCA Lecturer At GARDI VIDYAPITH RAJKOT. Email :- ajay.24021985@gmail.com Mobile :- + 91 95588 20298 Chap5er - 6 SYSTEM ENGINEERING (SSAD SSAD) Mobile : 9558820298 1

More information

ISO 27001:2013 certification

ISO 27001:2013 certification www.pwc.ch/cybersecurity ISO 27001:2013 certification Building confidence in your digital future Our approach to certification PwC offers a four-phase approach to help with your ISO 27001 project, using

More information

Chapter 2: The Database Development Process

Chapter 2: The Database Development Process : The Database Development Process Modern Database Management 7 th Edition Jeffrey A. Hoffer, Mary B. Prescott, Fred R. McFadden 1 Objectives Definition of terms Describe system development life cycle

More information

Objectives. Architectural Design. Software architecture. Topics covered. Architectural design. Advantages of explicit architecture

Objectives. Architectural Design. Software architecture. Topics covered. Architectural design. Advantages of explicit architecture Objectives Architectural Design To introduce architectural design and to discuss its importance To explain the architectural design decisions that have to be made To introduce three complementary architectural

More information

Risk Based IT Auditing Master Class. Unlocking your World to a Sea of Opportunities

Risk Based IT Auditing Master Class. Unlocking your World to a Sea of Opportunities Risk Based IT Auditing Master Class Unlocking your World to a Sea of Opportunities The Digital World Information Technology has developed into a nerve center of every organisation. It has become an intrinsic

More information

SYSTEM CONCEPTS. Definition of a System

SYSTEM CONCEPTS. Definition of a System 2 SYSTEM CONCEPTS A system is a group of interrelated components working together towards a common goal, by accepting inputs and producing outputs in an organized transformation process. The interrelated

More information

Models and Frameworks

Models and Frameworks City University of Hong Kong IT Strategic Planning Models and Frameworks Dr. Andy Chun, Hon Wai Department of Computer Science Y6305 x7194 andy.chun@cityu.edu.hk What You Will Learn Strategic Grid Index

More information

10 Steps to Building an Architecture for Space Surveillance Projects. Eric A. Barnhart, M.S.

10 Steps to Building an Architecture for Space Surveillance Projects. Eric A. Barnhart, M.S. 10 Steps to Building an Architecture for Space Surveillance Projects Eric A. Barnhart, M.S. Eric.Barnhart@harris.com Howard D. Gans, Ph.D. Howard.Gans@harris.com Harris Corporation, Space and Intelligence

More information

Version 5.0 EXAM CONTENT MANUAL PREVIEW

Version 5.0 EXAM CONTENT MANUAL PREVIEW Version 5.0 EXAM CONTENT MANUAL PREVIEW APICS Certified in Production and Inventory Management Strategic Management of Resources Preview of CPIM Exam Content Manual Version 5.0 Please be aware, this is

More information

Data Management Glossary

Data Management Glossary Data Management Glossary A Access path: The route through a system by which data is found, accessed and retrieved Agile methodology: An approach to software development which takes incremental, iterative

More information

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers 31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers CONTENTS Focus Questions... 2 Chapter 1: Explore the Network... 2 Chapter 2: Configure a Network Operating System... 5 Chapter 3: Network

More information

Management Information Systems. B15. Managing Information Resources and IT Security

Management Information Systems. B15. Managing Information Resources and IT Security Management Information Systems Management Information Systems B15. Managing Information Resources and IT Security Code: 166137-01+02 Course: Management Information Systems Period: Spring 2013 Professor:

More information

Database Environment. Pearson Education 2009

Database Environment. Pearson Education 2009 Chapter 2 Database Environment 1 Chapter 2 - Objectives Purpose of three-level database architecture. Contents of external, conceptual, and internal levels. Purpose of external/conceptual and conceptual/internal

More information

Architectural Design. Topics covered. Architectural Design. Software architecture. Recall the design process

Architectural Design. Topics covered. Architectural Design. Software architecture. Recall the design process Architectural Design Objectives To introduce architectural design and to discuss its importance To explain the architectural design decisions that have to be made To introduce three complementary architectural

More information

Chapter 12 Developing Business/IT Solutions

Chapter 12 Developing Business/IT Solutions Chapter 12 Developing Business/IT Solutions James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA: McGraw-Hill, Inc., 2007. ISBN: 13 9780073323091

More information

Statutory Holiday Pay for Casuals effective Jan 1, 2018 Report (ZHMR188_STAT_CASUAL)

Statutory Holiday Pay for Casuals effective Jan 1, 2018 Report (ZHMR188_STAT_CASUAL) Statutory Holiday Pay for Casuals effective Jan 1, 2018 Report (ZHMR188_STAT_CASUAL) Contents Purpose Transaction Code & HRIS Menu Path Step 1: Run the Statutory Holiday Pay for Casuals effective Jan 1,

More information

T Yritysturvallisuuden seminaari

T Yritysturvallisuuden seminaari T-110.5690 Yritysturvallisuuden seminaari Chapter 10: Conceptual Security Architecture Lauri Helkkula 22.10.2007 Sources Chapter 10 of the book Sherwood, Clark, Lynas: Enterprise Security Architecture,

More information

SAFe AGILE TRAINING COURSES

SAFe AGILE TRAINING COURSES SAFe AGILE TRAINING COURSES INDEX INTRODUCTION COURSE Implementing SAfe Leading SAFe SAFe for Teams SAFe Scrum Master CERTIFICATION SAFe Program Consultant SAFe Agilist SAFe Practitioner SAFe Scrum Master

More information

Technical and Architectural Overview

Technical and Architectural Overview 100% Web-Based Time & Labor Management Technical and Architectural Overview Copyright 2007 Time America 15990 N. Greenway-Hayden Loop Suite D-500, Scottsdale, AZ (800) 227-9766 www.timeamerica.com Table

More information

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Charting the Course... Certified Information Systems Auditor (CISA) Course Summary Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business

More information

Lab 16: Visio Introduction

Lab 16: Visio Introduction Lab 16: Visio Introduction () CONTENTS 1 Visio- Introduction to DFD Data Flow Diagraming... 2 1.1 In-Lab... 3 1.1.1 In-Lab Materials... 3 1.1.2 In-Lab Instructions... 3 2 Getting started: Let s decompose

More information

WHITE PAPER BCDR: 4 CRITICAL QUESTIONS FOR YOUR COMMUNICATIONS PROVIDER

WHITE PAPER BCDR: 4 CRITICAL QUESTIONS FOR YOUR COMMUNICATIONS PROVIDER WHITE PAPER BCDR: 4 CRITICAL QUESTIONS FOR YOUR COMMUNICATIONS PROVIDER Insurance for IT Infrastructure? We can buy insurance for contract performance, pitching arms and even vacations. But when it comes

More information

Software Engineering

Software Engineering Software Engineering Engr. Abdul-Rahman Mahmood MS, MCP, QMR(ISO9001:2000) Usman Institute of Technology University Road, Karachi armahmood786@yahoo.com alphasecure@gmail.com alphapeeler.sf.net/pubkeys/pkey.htm

More information

5-1McGraw-Hill/Irwin. Copyright 2007 by The McGraw-Hill Companies, Inc. All rights reserved.

5-1McGraw-Hill/Irwin. Copyright 2007 by The McGraw-Hill Companies, Inc. All rights reserved. 5-1McGraw-Hill/Irwin Copyright 2007 by The McGraw-Hill Companies, Inc. All rights reserved. 5 hapter Data Resource Management Data Concepts Database Management Types of Databases McGraw-Hill/Irwin Copyright

More information

Lecture 1. Chapter 6 Architectural design

Lecture 1. Chapter 6 Architectural design Chapter 6 Architectural Design Lecture 1 1 Topics covered Architectural design decisions Architectural views Architectural patterns Application architectures 2 Software architecture The design process

More information

User Centered Design - Maximising the Use of Portal

User Centered Design - Maximising the Use of Portal User Centered Design - Maximising the Use of Portal Sean Kelly, Certus Solutions Limited General Manager, Enterprise Web Solutions Agenda What is UCD Why User Centered Design? Certus Approach - interact

More information

Development of Computerized Reading List and Library Book Orders System for the Department of Computer Science. Abd.

Development of Computerized Reading List and Library Book Orders System for the Department of Computer Science. Abd. Development of Computerized Reading List and Library Book Orders System for the Department of Computer Science by Abd. Ghani Golamdin Dissertation Submitted for the degree the Degree of MSc in lnformation

More information

International School of Informatics and management, Jaipur Billing System Synopsis TEAM GROUP - 04 TEAM MEMBERS -ANIL KUMAR ANJANA -BHAIYA LAL ANJANA

International School of Informatics and management, Jaipur Billing System Synopsis TEAM GROUP - 04 TEAM MEMBERS -ANIL KUMAR ANJANA -BHAIYA LAL ANJANA International School of Informatics and management, Jaipur Billing System Synopsis TEAM GROUP - 04 TEAM MEMBERS -ANIL KUMAR ANJANA -BHAIYA LAL ANJANA -SAURABH JAIN PROJECT GUIDE - Ms JYOTI KHURANA (Lecturer

More information

Overview. Objectives. Components. Information and Communication Technologies Sector Development Project. Project

Overview. Objectives. Components. Information and Communication Technologies Sector Development Project. Project Ministry of Communication Technologies Information and Communication Technologies Sector Development Project Video conference on from strategy to implementation: Lessons learned in World Bank funded ICT

More information

Big data privacy in Australia

Big data privacy in Australia Five-article series Big data privacy in Australia Three actions you can take towards compliance Article 5 Big data and privacy Three actions you can take towards compliance There are three actions that

More information

Sample Answers to Discussion Questions

Sample Answers to Discussion Questions Human Resource Information Systems Basics Applications and Future Directions 4th Edition Kavanagh Solutions Full Download: https://testbanklive.com/download/human-resource-information-systems-basics-applications-and-future-

More information

MAM4P MANAGEMENT INFORMATION SYSTEM. Unit : I - V

MAM4P MANAGEMENT INFORMATION SYSTEM. Unit : I - V MAM4P MANAGEMENT INFORMATION SYSTEM Unit : I - V UNIT-I Syllabus Definition of management information system MIS Support for planning,organizing and controlling structure of MIS information for decision

More information

COSO ERM. To improve organizational performance & Governance COSO ERM. COSO Internal Control. COSO ERM_prepared by Nattapan T. 2

COSO ERM. To improve organizational performance & Governance COSO ERM. COSO Internal Control. COSO ERM_prepared by Nattapan T. 2 COSO ERM COSO Internal Control COSO ERM To improve organizational performance & Governance COSO ERM_prepared by Nattapan T. 2 COSO ERM Definition of Enterprise Risk Management (ERM) A process applied in

More information

WHITE PAPER. The truth about data MASTER DATA IS YOUR KEY TO SUCCESS

WHITE PAPER. The truth about data MASTER DATA IS YOUR KEY TO SUCCESS WHITE PAPER The truth about data MASTER DATA IS YOUR KEY TO SUCCESS Master Data is your key to success SO HOW DO YOU KNOW WHAT S TRUE AMONG ALL THE DIFFER- ENT DATA SOURCES AND ACROSS ALL YOUR ORGANIZATIONAL

More information

Engr. M. Fahad Khan Lecturer Software Engineering Department University Of Engineering & Technology Taxila

Engr. M. Fahad Khan Lecturer Software Engineering Department University Of Engineering & Technology Taxila Engr. M. Fahad Khan Lecturer Software Engineering Department University Of Engineering & Technology Taxila Software Design and Architecture Software Design Software design is a process of problem-solving

More information

Design Checklist. Application Architecture. Initial cost and Total Cost of Ownership (TCO) Enterprise Resource Planning (ERP) Peter Lo

Design Checklist. Application Architecture. Initial cost and Total Cost of Ownership (TCO) Enterprise Resource Planning (ERP) Peter Lo Design Checklist Application Architecture Peter Lo Before selecting application architecture, the analyst must consider the following issues: Enterprise resource planning Initial cost and Total Cost of

More information

You will first be brought to the Account Summary screen where you will need to select Payments on the left side of your screen to access ClickSWITCH.

You will first be brought to the Account Summary screen where you will need to select Payments on the left side of your screen to access ClickSWITCH. LOGIN: To start, sign into your online banking. ENROLLING IN CLICKSWITCH: You will first be brought to the Account Summary screen where you will need to select Payments on the left side of your screen

More information

Module 5 - CPU Design

Module 5 - CPU Design Module 5 - CPU Design Lecture 1 - Introduction to CPU The operation or task that must perform by CPU is: Fetch Instruction: The CPU reads an instruction from memory. Interpret Instruction: The instruction

More information

System Analysis and Design

System Analysis and Design System Analysis and Design M Umair www.m-umair.com System Description Techniques Graphical representation of any process is always better and more meaningful than its representation in words. System Analysis

More information

Single Window Systems Conceptual Framework and Global Trends and Practices. OIC study th Meeting of the COMCEC Trade Working Group

Single Window Systems Conceptual Framework and Global Trends and Practices. OIC study th Meeting of the COMCEC Trade Working Group Single Window Systems Conceptual Framework and Global Trends and Practices OIC study 2017 9 th Meeting of the COMCEC Trade Working Group Outline 1. Introduction to the study Objectives Approach 2. Single

More information

Chapter 2 Introduction to Transaction Processing

Chapter 2 Introduction to Transaction Processing Chapter 2 Introduction to Transaction Processing TRUE/FALSE 1. Processing more transactions at a lower unit cost makes batch processing more efficient than real-time systems. T 2. The process of acquiring

More information

Upgrade EZ-Pay V6 Guide

Upgrade EZ-Pay V6 Guide Upgrade EZ-Pay V6 Guide Who should use this patch Users who are using versions 3.0.4 of EZ-Pay can upgrade to version 3.1.0 Where to get this patch Download it from http://www.hr21.com.hk/ -> Products->

More information

Level 4 Diploma in Computing

Level 4 Diploma in Computing Level 4 Diploma in Computing 1 www.lsib.co.uk Objective of the qualification: It should available to everyone who is capable of reaching the required standards It should be free from any barriers that

More information

ARC BRIEF. Application Downtime, Your Productivity Killer. Overview. Trends in Plant Application Adoption. By John Blanchard and Greg Gorbach

ARC BRIEF. Application Downtime, Your Productivity Killer. Overview. Trends in Plant Application Adoption. By John Blanchard and Greg Gorbach ARC BRIEF JANUARY 2012 Application Downtime, Your Productivity Killer By John Blanchard and Greg Gorbach Overview Today, manufacturing enterprises are faced with intense competitive pressure, limited IT

More information

SYMBIOSIS CENTRE FOR DISTANCE LEARNING (SCDL) Subject: Management Information Systems

SYMBIOSIS CENTRE FOR DISTANCE LEARNING (SCDL) Subject: Management Information Systems Sample Questions: Section I: Subjective Questions 1. Which factors are considered critical for the success/failure of the Decision Support System? 2. List the categories of data warehousing tools. 3. "MIS

More information

References. The vision of ambient intelligence. The missing component...

References. The vision of ambient intelligence. The missing component... References Introduction 1 K. Sohraby, D. Minoli, and T. Znadi. Wireless Sensor Networks: Technology, Protocols, and Applications. John Wiley & Sons, 2007. H. Karl and A. Willig. Protocols and Architectures

More information

ITIL : the basics. Valerie Arraj, Compliance Process Partners LLC. AXELOS.com. The APM Group and The Stationery Office 2013

ITIL : the basics. Valerie Arraj, Compliance Process Partners LLC. AXELOS.com. The APM Group and The Stationery Office 2013 ITIL : the basics Valerie Arraj, Compliance Process Partners LLC AXELOS.com The APM Group and The Stationery Office 2013 White Paper July 2013 Contents 1 What is ITIL and what are its origins? 3 2 The

More information

Meltem Özturan

Meltem Özturan Meltem Özturan www.mis.boun.edu.tr/ozturan/samd 1 1 The systems development life cycle (SDLC) provides an overall framework for the process of system development, but the developer relies on many more

More information

Architectural Blueprint

Architectural Blueprint IMPORTANT NOTICE TO STUDENTS These slides are NOT to be used as a replacement for student notes. These slides are sometimes vague and incomplete on purpose to spark a class discussion Architectural Blueprint

More information

Distributed systems. Distributed Systems Architectures. System types. Objectives. Distributed system characteristics.

Distributed systems. Distributed Systems Architectures. System types. Objectives. Distributed system characteristics. Distributed systems Distributed Systems Architectures Virtually all large computer-based systems are now distributed systems. Information processing is distributed over several computers rather than confined

More information

= s readsheet and utility software

= s readsheet and utility software I PRACTICE EXAM - PAPER 1 is test consists of 60 items. You will have 90 minutes to answer them. r answer sheet is on page 52. - ::ach item in this test has four suggested answers lettered,, (e), (0).

More information

Turning Risk into Advantage

Turning Risk into Advantage Turning Risk into Advantage How Enterprise Wide Risk Management is helping customers succeed in turbulent times and increase their competitiveness Glenn Tjon Partner KPMG Advisory Presentation Overview

More information

Modeling Issues Modeling Enterprises. Modeling

Modeling Issues Modeling Enterprises. Modeling Modeling Issues Modeling Enterprises SE502: Software Requirements Engineering Modeling Modeling can guide elicitation: It can help you figure out what questions to ask It can help to surface hidden requirements

More information

5.0 Welcome Introduction Addresses Master-Detail Data Warehouses Applications...11

5.0 Welcome Introduction Addresses Master-Detail Data Warehouses Applications...11 5. Design Patterns... 2 5.0 Welcome...2 5.1 Introduction... 2 5.2 Addresses...4 5.3 Master-Detail... 7 5.4 Data Warehouses...8 5.5 Applications...11 5.6 What have we learned?...16 Page 1 5. Design Patterns

More information

Figure 9.1 A file versus a database organization. Database 12/28/2014. Chapter 9: Database Systems

Figure 9.1 A file versus a database organization. Database 12/28/2014. Chapter 9: Database Systems Chapter 9: Database Systems Computer Science: An Overview Twelfth Edition by J. Glenn Brookshear Dennis Brylow Chapter 9: Database Systems 9.1 Database Fundamentals 9.2 The Relational Model 9.3 Object-Oriented

More information

Chapter 10. Database System Development Lifecycle

Chapter 10. Database System Development Lifecycle Chapter 10 Database System Development Lifecycle Chapter 10 - Objectives Main components of an information system. Main stages of database system development lifecycle. Main phases of database design:

More information

Terms in the glossary are listed alphabetically. Words highlighted in bold are defined in the Glossary.

Terms in the glossary are listed alphabetically. Words highlighted in bold are defined in the Glossary. Glossary 2010 The Records Management glossary is a list of standard records terms used throughout CINA s guidance and training. These terms and definitions will help you to understand and get the most

More information

Data Warehouse. Asst.Prof.Dr. Pattarachai Lalitrojwong

Data Warehouse. Asst.Prof.Dr. Pattarachai Lalitrojwong Data Warehouse Asst.Prof.Dr. Pattarachai Lalitrojwong Faculty of Information Technology King Mongkut s Institute of Technology Ladkrabang Bangkok 10520 pattarachai@it.kmitl.ac.th The Evolution of Data

More information

ASIS EXAM - PSP. Physical Security Professional. Buy Full Product.

ASIS EXAM - PSP. Physical Security Professional. Buy Full Product. ASIS EXAM - PSP Physical Security Professional Buy Full Product http://www.examskey.com/psp.html Examskey ASIS PSP exam demo product is here for you to test the quality of the product. This ASIS PSP demo

More information

SOFTWARE ENGINEERING. Lecture 6. By: Latifa ALrashed. Networks and Communication Department

SOFTWARE ENGINEERING. Lecture 6. By: Latifa ALrashed. Networks and Communication Department 1 SOFTWARE ENGINEERING Networks and Communication Department Lecture 6 By: Latifa ALrashed Outline q q q q q q q q Define the concept of the software life cycle in software engineering. Identify the system

More information

1.2.3 The Graphics Hardware Pipeline

1.2.3 The Graphics Hardware Pipeline Figure 1-3. The Graphics Hardware Pipeline 1.2.3 The Graphics Hardware Pipeline A pipeline is a sequence of stages operating in parallel and in a fixed order. Each stage receives its input from the prior

More information

At a Glance. Introducing Security Metrics

At a Glance. Introducing Security Metrics At a Glance PART I Introducing Security Metrics 1 What Is a Security Metric?... 3 2 Designing Effective Security Metrics... 25 3 Understanding Data... 55 Case Study 1: In Search of Enterprise Metrics...

More information

Chapter System Analysis and Design. 5.1 Introduction

Chapter System Analysis and Design. 5.1 Introduction Chapter 5 5. System Analysis and Design 5.1 Introduction Using of correct and clear System Analysis and Design methodology helps to close the communication gaps between business people and IS developers,

More information

(Extended) Entity Relationship

(Extended) Entity Relationship 03 - Database Design, UML and (Extended) Entity Relationship Modeling CS530 Database Architecture Models and Design Prof. Ian HORROCKS Dr. Robert STEVENS In this Section Topics Covered Database Design

More information

WARNING OPERATOR S MANUAL. Series 300 Three Phase Uninterruptible Power System. Load Bus Synchronization Option

WARNING OPERATOR S MANUAL. Series 300 Three Phase Uninterruptible Power System. Load Bus Synchronization Option POWER PROTECTION OPERATOR S MANUAL Series 300 Three Phase Uninterruptible Power System Load Bus Synchronization Option WARNING READ BEFORE HANDLING OR INSTALLING. ONLY QUALIFIED PERSONNEL SHOULD HANDLE

More information

INTRODUCTORY INFORMATION TECHNOLOGY CREATING ENTERPRISE APPLICATIONS. Faramarz Hendessi

INTRODUCTORY INFORMATION TECHNOLOGY CREATING ENTERPRISE APPLICATIONS. Faramarz Hendessi INTRODUCTORY INFORMATION TECHNOLOGY CREATING ENTERPRISE APPLICATIONS Faramarz Hendessi INTRODUCTORY INFORMATION TECHNOLOGY Lecture 10 Fall 2010 Isfahan University of technology Dr. Faramarz Hendessi 2

More information

New Vision Paymate Payroll System

New Vision Paymate Payroll System Conduent Finance & Tax Systems Constituent and Government Software Systems New Vision Paymate Payroll System Purge Processing Menu Conduent 130 Division Street Waite Park, MN 56387 @ 2017 Conduent Business

More information

Business Analysis in Practice

Business Analysis in Practice Business Analysis in Practice (Level 2 CCBA Certification Preparation Course) Duration: 3 days PM-Partners have been leaders in project management certification for 20 years, training over 8,500 industry

More information

REQUIREMENTS ENGINEERING LECTURE 2017/2018. Dr. Jörg Dörr. Conceptual Modelling. Fraunhofer IESE

REQUIREMENTS ENGINEERING LECTURE 2017/2018. Dr. Jörg Dörr. Conceptual Modelling. Fraunhofer IESE REQUIREMENTS ENGINEERING LECTURE 2017/2018 Dr. Jörg Dörr Conceptual Modelling AGENDA Analysis & Specification with Conceptual Models 2 Requirements Specification ANALYSIS & SPECIFICATION WITH CONCEPTUAL

More information

1 Executive Overview The Benefits and Objectives of BPDM

1 Executive Overview The Benefits and Objectives of BPDM 1 Executive Overview The Benefits and Objectives of BPDM This is an excerpt from the Final Submission BPDM document posted to OMG members on November 13 th 2006. The full version of the specification will

More information

Introduction to TT Payroll - Training

Introduction to TT Payroll - Training Introduction to TT Payroll - Training This document will guide you through the steps of generating your payslips. At any stage if you have any questions we are happy to take your call or email. Our contact

More information

Project Management Professional (PMP) Certification Course

Project Management Professional (PMP) Certification Course Project Management Professional (PMP) Certification Course Project based management appears to be the most efficient and effective way of managing the strategic goals of an organisation. Therefore, Project

More information

Hello, my name is Cara Daly, I am the Product Marketing Manager for Polycom Video Content Management Solutions. Today we are going to look over the

Hello, my name is Cara Daly, I am the Product Marketing Manager for Polycom Video Content Management Solutions. Today we are going to look over the Page 1 of 17 Hello, my name is Cara Daly, I am the Product Marketing Manager for Polycom Video Content Management Solutions. Today we are going to look over the launch for the RealPresence Counter Series,

More information

International Function Point Users Group References: Capers Jones: Applied Software Measurement (1997) Estimating Software Costs (1998)

International Function Point Users Group  References: Capers Jones: Applied Software Measurement (1997) Estimating Software Costs (1998) Function Point Estimation Normalized software project metric Application domain rather than technical domain Application functions and data rather than code International Function Point Users Group www.ifpug.org

More information

CIM LEVEL 6 DIPLOMA IN PROFESSIONAL MARKETING

CIM LEVEL 6 DIPLOMA IN PROFESSIONAL MARKETING CIM LEVEL 6 DIPLOMA IN PROFESSIONAL MARKETING QUALIFICATION OVERVIEW The aim of the CIM Level 6 Diploma in Professional Marketing is to provide the practising marketer with relevant, contemporary marketing

More information

Managing Web Resources for Persistent Access

Managing Web Resources for Persistent Access Página 1 de 6 Guideline Home > About Us > What We Publish > Guidelines > Guideline MANAGING WEB RESOURCES FOR PERSISTENT ACCESS The success of a distributed information system such as the World Wide Web

More information

Information Value Chain

Information Value Chain Physical Value Chain Introduction When I was head of architecture at the newly global Dun and Bradstreet I needed to change my thinking from that of a software vendor, which I had recently been, to that

More information

The Firm Experience. Updated May Copyright World Bank Group All Rights Reserved

The Firm Experience. Updated May Copyright World Bank Group All Rights Reserved The Firm Experience Updated May 2017 Welcome! econsultant2 is the World Bank Group tendering platform for the selection of operational consulting firms. A business does not need to be an approved World

More information

USER-CENTERED DESIGN KRANACK / DESIGN 4

USER-CENTERED DESIGN KRANACK / DESIGN 4 USER-CENTERED DESIGN WHAT IS USER-CENTERED DESIGN? User-centered design (UCD) is an approach to design that grounds the process in information about the people who will use the product. UCD processes focus

More information

A2A EAI. Overview and recommendations Data Transport. Jerome CAPIROSSI. people are keen to argue since they find themselves to be affected.

A2A EAI. Overview and recommendations Data Transport. Jerome CAPIROSSI. people are keen to argue since they find themselves to be affected. . EAI A2A EAI Overview and recommendations Jerome CAPIROSSI Abstract Since customers or corporate users get various terminals (Phone, PDAs, Web, Workstation, ) and therefore various channels for connecting

More information

PIPELINE Program Competency Model for Informa on Technology Strategic Planning/Business Management Career Cluster Pathway

PIPELINE Program Competency Model for Informa on Technology Strategic Planning/Business Management Career Cluster Pathway PIPELINE Program Competency Model for Informaon Strategic Planning/Business Career Cluster Pathway Employer-Specific Requirements Occupation-Specific Competencies* Define/Implement IT Strategy Analyze

More information

Chapter 6 Architectural Design

Chapter 6 Architectural Design Chapter 6 Architectural Design Chapter 6 Architectural Design Slide 1 Topics covered The WHAT and WHY of architectural design Architectural design decisions Architectural views/perspectives Architectural

More information

Guide. A small business guide to data storage and backup

Guide. A small business guide to data storage and backup Guide A small business guide to data storage and backup 0345 600 3936 www.sfbcornwall.co.uk Contents Introduction... 3 Why is data storage and backup important?... 4 Benefits of cloud storage technology...

More information

Corporate Online. Using Accounts

Corporate Online. Using Accounts Corporate Online. Using Accounts About this Guide About Corporate Online Westpac Corporate Online is an internet-based electronic platform, providing a single point of entry to a suite of online transactional

More information

Building a Data Warehouse step by step

Building a Data Warehouse step by step Informatica Economică, nr. 2 (42)/2007 83 Building a Data Warehouse step by step Manole VELICANU, Academy of Economic Studies, Bucharest Gheorghe MATEI, Romanian Commercial Bank Data warehouses have been

More information

Section 1: Getting Started Training... 4 Help Notes Section 2: Installation Instructions... 6 Section 3: Security and Licensing...

Section 1: Getting Started Training... 4 Help Notes Section 2: Installation Instructions... 6 Section 3: Security and Licensing... CASH FOCUS CONTENTS Section 1: Getting Started... 4 Training... 4 Help Notes... 4 Section 2: Installation Instructions... 6 Section 3: Security and Licensing... 7 To licence your data via the Internet...

More information

GLOBAL INDICATORS OF REGULATORY GOVERNANCE. Scoring Methodology

GLOBAL INDICATORS OF REGULATORY GOVERNANCE. Scoring Methodology GLOBAL INDICATORS OF REGULATORY GOVERNANCE Scoring Methodology To advance our analysis, we developed a composite Global Indicators of Regulatory Governance score designed to quantify good regulatory practices

More information

University Information Systems. Administrative Computing Services. Contingency Plan. Overview

University Information Systems. Administrative Computing Services. Contingency Plan. Overview University Information Systems Administrative Computing Services Contingency Plan Overview Last updated 01/11/2005 University Information Systems Administrative Computing Services Contingency Plan Overview

More information

Report Exec Mobile. Configuring Mobile

Report Exec Mobile. Configuring Mobile Report Exec Mobile Report Exec Mobile is a mobile application that allows officers to track daily events and issue citations from the field. The application is supported on both Android and ios devices

More information

Database Design: Conceptual Model and ER Diagramming

Database Design: Conceptual Model and ER Diagramming Database Design: Conceptual Model and ER Diagramming Ray R. Larson University of California, Berkeley School of Information IS 257: Database Management 2015-09-03 - SLIDE 1 Announcements Accounts and MySQL

More information

File Organization. Serial: Records are accessed in the order in which they were stored.

File Organization. Serial: Records are accessed in the order in which they were stored. File Organization Types of Access Serial: Records are accessed in the order in which they were stored. Sequential: Records are accessed in descending or ascending key sequence. Storage Medium: Magnetic

More information

UCC Employee Self Service User Guide

UCC Employee Self Service User Guide University College Cork UCC Employee Self Service User Guide Version 1.0 Contents How to Access UCC Employee Self Service (ESS)... 1 How to Log In to UCC Employee Self Service (ESS)... 2 UCC ESS Main Page

More information

Is your privacy secure? HIPAA Compliance Workshop September Presented by: Andrés Castañeda, Senior Manager Steve Nouss, Partner

Is your privacy secure? HIPAA Compliance Workshop September Presented by: Andrés Castañeda, Senior Manager Steve Nouss, Partner Is your privacy secure? HIPAA Compliance Workshop September 2008 Presented by: Andrés Castañeda, Senior Manager Steve Nouss, Partner Agenda Have you secured your key operational, competitive and financial

More information

Computer Network Architecture

Computer Network Architecture Computer Network Architecture Lecture 2: Fundamental of Network Internet and Intranet Intranet: An intranet is a private network that is contained within an enterprise. It may consist of many interlinked

More information

Mississippi DOT's Approach to an Enterprise Wide Linear Referencing System

Mississippi DOT's Approach to an Enterprise Wide Linear Referencing System Mississippi DOT's Approach to an Enterprise Wide Linear Referencing System Michael Cresap, Mississippi Department of Transportation Bruce Aquila, Intergraph Corporation Concurrent Session 3.4, State LRS

More information