The Development of Information Systems

Size: px
Start display at page:

Download "The Development of Information Systems"

Transcription

1 Instructor: Kevin Robertson The Development of Information Systems Lecture Outline 12-1

2 Principles and Learning Objectives Understand the process used by organizations to manage the development of information systems Describe each major phase of the system development life cycle: systems identification, selection, and planning; system analysis; system design; system implementation; and system maintenance Understand the factors involved in building a system in-house, along with situations in which it is not feasible

3 Systems Development Sometimes, a system that is needed by a business is not available as a 'canned' system which can be bought and installed Such a system must be custom-built either by systems developers inhouse or by external consultants

4 System Development Life Cycle Usually a system is developed in 6 specific SDLC stages: 1.Systems Investigation: a)problem Definition b)feasibility Study 2.System Analysis 3.System Design: a)general Design b)detailed Design 4.System Development (Building) 5.System Implementation 6.System Maintenance

5 System Development Life Cycle 1.Systems investigation: Identifies problems and opportunities and considers them in light of business goals 2.Systems analysis: Studies existing systems and work processes to identify strengths, weaknesses, and opportunities for improvement 3.Systems design: Defines how the information system will do what it must do to obtain the problem s solution

6 System Development Life Cycle 4.Systems development: Creates or acquires various system components detailed in systems design, builds/assembles for implementation. 5.Systems implementation: Places new or modified system into operation 6.Systems maintenance and review: Ensures the system operates as intended Modifies the system so that it continues to meet changing business needs

7 SDLC: Systems Investigation Should we really develop a new system? Identify problems with the current system and opportunities for improvement Why do we want a new system? Do initial feasibility study for the proposed system financial feasibility (is $ available) technical feasibility (is equipment available) operational feasibility (will people be able to work with new system) If we determine that a new system is feasible, we go on to the next stages

8 Systems Investigation Criteria for evaluating and selecting a systems project

9 SDLC: System Analysis We now look at analysis in more detail After the preliminary investigation, if the system proposal is found to be feasible, a detailed analysis is carried out: For the nature current system (Current State Analysis) For the issues of the current system (Gap Analysis) For the requirements of the new system (Future State Analysis) We get an idea of WHAT will be required of the new system in terms of data, processing, and user interfaces; we document this in detail

10 System Analysis A systems (or Business) analyst can use different ways of gathering the information on system features and requirements Current system documentation Sampling outputs and input forms from current system Observation; apprenticing with a user; videotaping people using the system Administering questionnaires Interviewing users

11 Systems Analysis

12 System Analysis Collecting System Requirements (Traditional) A combination of methods are used: Interviews discussions with stakeholders (i.e. users) Questionnaires surveys to assess use and attitudes Observations watch process and systems use Document Analysis reviewing curent documents Collecting System Requirements (Alternative) A combination of traditional methods are used: Critical Success Factors (CSFs) a process of interviewing, recoding, analyzing and merging factors defined as critical by personnel at all levels of an organization Joint Application Design (JAD) - a method that brings together users and analysts in a room to define requirements. This method greatly reduces design time

13 Systems Analysis Critical Success Factors Critical Success Factor (CSF) is an element which is necessary for a project to successfully achieve its goal For example, a CSF for a successful system design is user involvement. CSF is a means of identifying the tasks and requirements needed for success, and A means to prioritize requirements At the lowest level, CSFs become concrete requirements

14 Example: CSF in establishing Goals and Requirements

15 Systems Analysis Joint Application Design JAD is a special type of a group meeting in which all (most) users meet with an analyst at the same time Users jointly define and agree upon system requirements or design dramatically reducing the design time

16 Documenting System Requirements What has been discovered through the above techniques needs to be documented adequately Can use English descriptions, but then will need to use structured diagrams Might use traditional diagrams (data flow diagram and program structure chart) OR, may model entire system as a set of interacting objects (OO object-oriented)

17 System Analysis Modeling Organizational Data The Entity Relationship Diagram (ERD) A tool used to identify the relationships between entities to assist in developing applications and databases

18 Two Ways of Diagramming for Analysis and Design The Traditional Structured way Data and programs designed separately For data: entity-relationship diagrams For programs: Start with data flow diagram (DFD) in analysis This becomes the program structure chart in design

19 Data Flow Diagrams (DFDs) Data flow diagram (DFD) is a picture of the movement of data between external entities and the processes and data stores within a system Uses only 4 symbols: square (external entity) Curved arrow (data flow) Open ended rectangle (data store) Circle (process)

20 Two Ways of Diagramming for Analysis and Design The object-oriented way of doing analysis and design Data and programs encapsulated in structures called OBJECTS There are prescribed diagrams for analysis and design which are part of the Unified Modeling language (UML)

21 An Object A structure that has BOTH attributes (variables, properties) and programs (methods) that act on these properties In an object, the attributes and programs are encapsulated

22 Example: a Customer Object Attributes: customerno., name, address, phoneno. creditlimit Programs: AcceptCustomer(); AssignCreditLimit(YearlyEarnings); DeleteCustomer(CustomerNo)

23 Object-Oriented Analysis and Design We will see what diagrams are used for a new system, as part of the Unified Modelling Language (UML) Use case diagrams What is needed in the new system is derived from what we will use the system for Object class diagrams What main items will we keep data on?

24 Prescribed Diagrams When developing a new system in the object oriented way, the system development team uses specific diagrams in the Unified Modeling Language (UML): Use case diagrams (how system will be used) Object class diagrams (database files) Sequence diagrams (order of processing) From these diagrams we will know how to set up our database and how to write the programs for the new system.

25 Use Case Diagram (For School System)

26 Object Class Diagram [for withdrawal of cash, normal flow]

27 Sequence Diagram [for withdrawal of cash, normal flow]

28 Design of Other System Components The UML diagrams helped us to design the database and programs for the new system We also have to design: menus, input screens, output screens, reports, system controls, hardware and telecommunication plans, organizational aspects

29 SDLC: System Design Here we figure out in detail HOW we will satisfy the needs of the new system: what will the screens and reports look like? how will we set up our data tables? what programs will we need to write? what hardware will we need?... etc. We end up with a detailed design ("blueprint") for our system

30 System Design Detailed design for Database Programs Menu, input, output screens, reports Controls Hardware & telecomm Organizational aspects

31 Designing Forms and Reports Forms - a business document with predefined data and places to fill in information that is used for system input Reports a system output that contains only predefined data usually in a tabular format (see below)

32 Designing Interfaces and Dialogues

33 Designing Databases and Files

34 SDLC: System Development (Build) Programmers code programs that belong to each object class Programs are tested and loaded onto disk Database personnel set up the database on the disk of the server

35 SDLC: System Implementation As part of the system implementation phase: System is tested System processes and data are converted System is documented System training for end users is conducted

36 Implementation: Software Testing Software/System Testing a series of tests designed to identify errors and validate logic in parallel with programming. There are multiple types of testing (see below)

37 Implementation: System Conversion Conversion Approaches the process of taking information from an old system to populate a new system. This is accomplished through manual and/or automated methods each comes with a different level of risk

38 Implementation: System Documentation System Documentation The collection of materials produced with an information system to support the ongoing operation and development Documentation Types User and reference guides step-by-step instructions for using the system features and functions User training and tutorials manuals and exercises designed to educate users and build competence in system use. These training manuals and tutorials can be supported by a database that utilizes realistic data Installation procedures and trouble-shooting suggestions manuals and procedures designed to support technical personnel in installing and problem solving during system operation

39 Implementation: System Training Training Approaches the processes used to educate users in new business processes and system features and functions with the goal of building competence to ensure operational success (see possible methods below)

40 SDLC: System Maintenance System Maintenance The process by which a system is kept in working order and minor enhancements are completed. Some types of system maintenance are shown below:

41 Systems Development End of Lecture 12-1

Identify the guidelines for system development. Discuss the purpose of the activities performed in the analysis phase

Identify the guidelines for system development. Discuss the purpose of the activities performed in the analysis phase Discovering Computers 2010 Living in a Digital World Objectives Overview Define system development and list the system development phases Identify the guidelines for system development Discuss the importance

More information

SOFTWARE ENGINEERING : A MCQ BOOK CODE : RBMCQ0602. Second Edition

SOFTWARE ENGINEERING : A MCQ BOOK CODE : RBMCQ0602. Second Edition SOFTWARE ENGINEERING : A MCQ BOOK CODE : RBMCQ0602 Second Edition S/W Engg. Fundamental 1) Which phase of the SDLC are information needs identified? A. preliminary investigation B. system analysis C. system

More information

Requirements Engineering Process

Requirements Engineering Process Requirements Engineering Process Requirement A description of a service that the system is expected to provide and the constraints under which it must operate. 1 Requirement Types Functional Requirement

More information

*ANSWERS * **********************************

*ANSWERS * ********************************** CS/183/17/SS07 UNIVERSITY OF SURREY BSc Programmes in Computing Level 1 Examination CS183: Systems Analysis and Design Time allowed: 2 hours Spring Semester 2007 Answer ALL questions in Section A and TWO

More information

Meltem Özturan

Meltem Özturan Meltem Özturan www.mis.boun.edu.tr/ozturan/samd 1 1 The systems development life cycle (SDLC) provides an overall framework for the process of system development, but the developer relies on many more

More information

STRUCTURED SYSTEM ANALYSIS AND DESIGN. System Concept and Environment

STRUCTURED SYSTEM ANALYSIS AND DESIGN. System Concept and Environment STRUCTURED SYSTEM ANALYSIS AND DESIGN Definition: - System Concept and Environment A system is an orderly grouping of independent components linked together according to plan to achieve a specific objective.

More information

Ans 1-j)True, these diagrams show a set of classes, interfaces and collaborations and their relationships.

Ans 1-j)True, these diagrams show a set of classes, interfaces and collaborations and their relationships. Q 1) Attempt all the following questions: (a) Define the term cohesion in the context of object oriented design of systems? (b) Do you need to develop all the views of the system? Justify your answer?

More information

Auditing in an Automated Environment: Appendix E: System Design, Development, and Maintenance

Auditing in an Automated Environment: Appendix E: System Design, Development, and Maintenance Accountability Modules Auditing in an Automated Environment: Agency Prepared By Initials Date Reviewed By Audit Program - System Design, Development, and Maintenance W/P Ref Page 1 of 1 Procedures Initials

More information

Discovering Computers Living in a Digital World

Discovering Computers Living in a Digital World Discovering Computers 2011 Living in a Digital World Objectives Overview See Page 619 for Detailed Objectives 2 Objectives Overview See Page 619 for Detailed Objectives 3 What is System Development? Page

More information

Chapter 12 Developing Business/IT Solutions

Chapter 12 Developing Business/IT Solutions Chapter 12 Developing Business/IT Solutions James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA: McGraw-Hill, Inc., 2007. ISBN: 13 9780073323091

More information

1. The narratives, diagrams, charts, and other written materials that explain how a system works are collectively called

1. The narratives, diagrams, charts, and other written materials that explain how a system works are collectively called CH 3 MULTIPLE CHOICE 1. The narratives, diagrams, charts, and other written materials that explain how a system works are collectively called a) documentation. b) data flows. c) flowcharts. d) schema.

More information

Systems Analysis and Design in a Changing World, Fourth Edition

Systems Analysis and Design in a Changing World, Fourth Edition Systems Analysis and Design in a Changing World, Fourth Edition Systems Analysis and Design in a Changing World, 4th Edition Learning Objectives Explain the purpose and various phases of the systems development

More information

350 Index 2005 GOAL/QPC

350 Index 2005 GOAL/QPC Index abstract testing, 274 acceptance criteria, 270 acceptance tests, 270 activity diagrams, 113, 114, 174-175, 321 actor catalog, 144 actor description, 144 actor hierarchy, 148 actor map, 59, 114, 144,

More information

1. i. What are the 3 major components of a information system and show their relationship input output

1. i. What are the 3 major components of a information system and show their relationship input output Higher National Diploma in Information Technology First Year, Second semesterexamination-2011 IT2005: System Analysis and Design Answer Script No. of pages: 11 1. i. What are the 3 major components of

More information

Chapter 5. The Database Life Cycle. Class 04: Topic 3.1: The Database Life Cycle

Chapter 5. The Database Life Cycle. Class 04: Topic 3.1: The Database Life Cycle Chapter 5 The Database Life 1 Database Design Life Database Life : all the events from the time the database is first proposed to the time it is retired from service Work is typically divided into project

More information

Full file at https://fratstock.eu

Full file at https://fratstock.eu TEACHING TIPS Chapter 2 SYSTEMS TECHNIQUES AND DOCUMENTATION I normally introduce flowcharting symbols with simple examples on the board. I first introduce a very simple manual flowchart involving only

More information

INTRODUCTORY INFORMATION TECHNOLOGY CREATING ENTERPRISE APPLICATIONS. Faramarz Hendessi

INTRODUCTORY INFORMATION TECHNOLOGY CREATING ENTERPRISE APPLICATIONS. Faramarz Hendessi INTRODUCTORY INFORMATION TECHNOLOGY CREATING ENTERPRISE APPLICATIONS Faramarz Hendessi INTRODUCTORY INFORMATION TECHNOLOGY Lecture 10 Fall 2010 Isfahan University of technology Dr. Faramarz Hendessi 2

More information

Chapter 4 Objectives

Chapter 4 Objectives Chapter 4 Objectives Eliciting requirements from the customers Modeling requirements Reviewing requirements to ensure their quality Documenting requirements for use by the design and test teams 4.1 The

More information

Managing the development and purchase of information systems (Part 2)

Managing the development and purchase of information systems (Part 2) Managing the development and purchase of information systems (Part 2) (Week 14, Thursday 4/12/2007) BUS3500 - Abdou Illia, Spring 2007 1 LEARNING GOALS Describe alternative systems development methodologies

More information

Langara College Spring archived

Langara College Spring archived 1 of 7 10/23/07 2:09 PM COMPUTING SCIENCE AND INFORMATION SYSTEMS DEPARTMENT COMPUTING SCIENCE AND INFORMATION SYSTEMS 1300 Systems Analysis & Design (3.0 credits) COURSE OUTLINE Spring 2008 Section 088

More information

Langara College Spring archived

Langara College Spring archived 1 of 7 11/23/2006 1:29 PM COMPUTING SCIENCE AND INFORMATION SYSTEMS DEPARTMENT COMPUTING SCIENCE AND INFORMATION SYSTEMS 1300 Systems Analysis & Design (3.0 credits) COURSE OUTLINE Spring 2007 Section

More information

Organizing Database Project Work. (Chapter 4)

Organizing Database Project Work. (Chapter 4) Organizing Database Project Work (Chapter 4) 1 Learn the rules like a pro, so you can break them like an artist Pablo Picasso 2 Database Life Cycle The life cycle starts when the need is identified and

More information

Organizing Database Project Work

Organizing Database Project Work Organizing Database Project Work (Chapter 4) 1 Learn the rules like a pro, so you can break them like an artist Pablo Picasso 2 Database Life Cycle The life cycle starts when the need is identified and

More information

What is the Joint Application Development (JAD) Process?

What is the Joint Application Development (JAD) Process? What is the Joint Application Development (JAD) Process? By Joy Matthews, Vice President, Pierson Requirements Group, Inc. jmatthews@piersonrequirementsgroup.com JAD is an Important Technique for Software

More information

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Charting the Course... Certified Information Systems Auditor (CISA) Course Summary Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business

More information

SOFTWARE ENGINEERING. Lecture 6. By: Latifa ALrashed. Networks and Communication Department

SOFTWARE ENGINEERING. Lecture 6. By: Latifa ALrashed. Networks and Communication Department 1 SOFTWARE ENGINEERING Networks and Communication Department Lecture 6 By: Latifa ALrashed Outline q q q q q q q q Define the concept of the software life cycle in software engineering. Identify the system

More information

Abstract class Audit trail Class diagram Balancing Acceptance testing Closed-ended questions Baseline modules Action stubs Cohesion Activation

Abstract class Audit trail Class diagram Balancing Acceptance testing Closed-ended questions Baseline modules Action stubs Cohesion Activation Glossary of Terms Abstract class A class that has no direct instances but whose descendants may have direct instances. Acceptance testing The process whereby actual users test a completed information system,

More information

TASKS IN THE SYSTEMS DEVELOPMENT LIFE CYCLE

TASKS IN THE SYSTEMS DEVELOPMENT LIFE CYCLE SUMMARY AND REFERENCE ACTG 313 TASKS IN THE SYSTEMS DEVELOPMENT LIFE CYCLE PREPARATION PHASE 1. Identification of the Need for a new Information System 2. Initial Feasibility Study (always flawed because

More information

Chapter 8: SDLC Reviews and Audit Learning objectives Introduction Role of IS Auditor in SDLC

Chapter 8: SDLC Reviews and Audit Learning objectives Introduction Role of IS Auditor in SDLC Chapter 8: SDLC Reviews and Audit... 2 8.1 Learning objectives... 2 8.1 Introduction... 2 8.2 Role of IS Auditor in SDLC... 2 8.2.1 IS Auditor as Team member... 2 8.2.2 Mid-project reviews... 3 8.2.3 Post

More information

Joint Application Design & Function Point Analysis the Perfect Match By Sherry Ferrell & Roger Heller

Joint Application Design & Function Point Analysis the Perfect Match By Sherry Ferrell & Roger Heller Joint Application Design & Function Point Analysis the Perfect Match By Sherry Ferrell & Roger Heller Introduction The old adage It s not what you know but when you know it that counts is certainly true

More information

Business Analysis for Practitioners - Requirements Elicitation and Analysis (Domain 3)

Business Analysis for Practitioners - Requirements Elicitation and Analysis (Domain 3) Business Analysis for Practitioners - Requirements Elicitation and Analysis (Domain 3) COURSE STRUCTURE Introduction to Business Analysis Module 1 Needs Assessment Module 2 Business Analysis Planning Module

More information

PDA Trainer Certification Process V 1.0

PDA Trainer Certification Process V 1.0 PDA Trainer Certification Process V 1.0 ~ 1 ~ Index Introduction to the Certification Process... 3 Certification Process Steps... 4 Description of the Certification Process Steps... 5 A - PDA Trainer Profile...

More information

Professional (CBAP) version 3

Professional (CBAP) version 3 Certified Business Analysis Professional (CBAP) version 3 Amman Jordan July 29 th August 5 th, 2017 Instructor Mr. Tareq Al Nashawati Certified CBAP, PMP Table of Content 1 PROGRAM VALUE... 3 2 TARGET

More information

Objectives. Connecting with Computer Science 2

Objectives. Connecting with Computer Science 2 Objectives Learn how software engineering is used to create applications Learn some of the different software engineering process models Understand what a design document is and how it should be used during

More information

Standard. Number of Correlations

Standard. Number of Correlations Computer Science 2016 This assessment contains 80 items, but only 80 are used at one time. Programming and Software Development Number of Correlations Standard Type Standard 2 Duty 1) CONTENT STANDARD

More information

ANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. And

ANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. And ANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. Content 261311 - Analyst Programmer... 2 135111 - Chief

More information

System Development Life Cycle Methods/Approaches/Models

System Development Life Cycle Methods/Approaches/Models Week 11 System Development Life Cycle Methods/Approaches/Models Approaches to System Development System Development Life Cycle Methods/Approaches/Models Waterfall Model Prototype Model Spiral Model Extreme

More information

Threat and Vulnerability Assessment Tool

Threat and Vulnerability Assessment Tool TABLE OF CONTENTS Threat & Vulnerability Assessment Process... 3 Purpose... 4 Components of a Threat & Vulnerability Assessment... 4 Administrative Safeguards... 4 Logical Safeguards... 4 Physical Safeguards...

More information

ERP/CRM System Implementation Methodology

ERP/CRM System Implementation Methodology ERP/CRM System Implementation Methodology Prepared by Admiral Consulting Group Date Submitted May 27, 2016 TABLE OF CONTENTS Implementation Methodology... 3 1.1. Analysis (Solution Envisioning) Phase...

More information

Position Description IT Auditor

Position Description IT Auditor Position Title IT Auditor Position Number Portfolio Performance and IT Audit Location Victoria Supervisor s Title IT Audit Director Travel Required Yes FOR OAG HR USE ONLY: Approved Classification or Leadership

More information

Chapter 10. Object-Oriented Analysis and Modeling Using the UML. McGraw-Hill/Irwin

Chapter 10. Object-Oriented Analysis and Modeling Using the UML. McGraw-Hill/Irwin Chapter 10 Object-Oriented Analysis and Modeling Using the UML McGraw-Hill/Irwin Copyright 2007 by The McGraw-Hill Companies, Inc. All rights reserved. Objectives 10-2 Define object modeling and explain

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 9001 Lead Auditor www.pecb.com The objective of the PECB Certified ISO 9001 Lead Auditor examination is to ensure that the candidate possesses

More information

Academic Program Review at Illinois State University PROGRAM REVIEW OVERVIEW

Academic Program Review at Illinois State University PROGRAM REVIEW OVERVIEW Academic Program Review at Illinois State University PROGRAM REVIEW OVERVIEW For Research and Service Centers Submitting Self-Study Reports Fall 2017 INTRODUCTION Primary responsibility for maintaining

More information

Competency Assessment Parameters for System Analyst Using System Development Life Cycle

Competency Assessment Parameters for System Analyst Using System Development Life Cycle IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Competency Assessment Parameters for System Analyst Using System Development Life Cycle To cite this article: A Sugiandi and Y

More information

Data Process Modeling: Context Diagrams & Data Flow Diagrams (DFDs)

Data Process Modeling: Context Diagrams & Data Flow Diagrams (DFDs) Introduction Data Process Modeling: Context Diagrams & Data Flow Diagrams (DFDs) MIS 374 When designing/building an information system for an organization, you should consider the following questions regarding

More information

Requirement Analysis

Requirement Analysis Requirement Analysis Requirements Analysis & Specification Objective: determine what the system must do to solve the problem (without describing how) Done by Analyst (also called Requirements Analyst)

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 22301 Lead Implementer www.pecb.com The objective of the Certified ISO 22301 Lead Implementer examination is to ensure that the candidate

More information

Incident Response Lessons From the Front Lines. Session 276, March 8, 2018 Nolan Garrett, CISO, Children s Hospital Los Angeles

Incident Response Lessons From the Front Lines. Session 276, March 8, 2018 Nolan Garrett, CISO, Children s Hospital Los Angeles Incident Response Lessons From the Front Lines Session 276, March 8, 2018 Nolan Garrett, CISO, Children s Hospital Los Angeles 1 Conflict of Interest Nolan Garrett Has no real or apparent conflicts of

More information

Meltem Özturan misprivate.boun.edu.tr/ozturan/mis515

Meltem Özturan misprivate.boun.edu.tr/ozturan/mis515 Meltem Özturan misprivate.boun.edu.tr/ozturan/mis515 1 2 1 Selecting the Best Alternative Major Activities in the Analysis Phase Gather information Define system requirements Prototype for feasibility

More information

Systems Analysis and Design

Systems Analysis and Design Systems Analysis and Design Michael Brydon Summer 2003 Slide 1 Introduction to the Course Course structure Lectures: material from the Dennis text Labs: in-lab assignments, demonstrations, and consulting

More information

(c) Addison Wesley Chapter 3. ! Interviewing customers and domain experts. ! Questionnaires. ! Observation. ! Study of documents and software systems

(c) Addison Wesley Chapter 3. ! Interviewing customers and domain experts. ! Questionnaires. ! Observation. ! Study of documents and software systems MACIASZEK, L.A. (2001): Analysis and System Design. Developing Information Systems with UML, Addison Wesley elicitation Domain Expert Customer Chapter 3 Determination Domain Knowledge Business Analyst

More information

Systems Analysis & Design

Systems Analysis & Design Systems Analysis & Design Dr. Ahmed Lawgali Ahmed.lawgali@uob.edu.ly Slide 1 Systems Analysis & Design Course Textbook: Systems Analysis and Design With UML 2.0 An Object-Oriented Approach, Second Edition

More information

SOFTWARE ANALYSIS & DESIGN TOOLS

SOFTWARE ANALYSIS & DESIGN TOOLS SOFTWARE ANALYSIS & DESIGN TOOLS http://www.tutorialspoint.com/software_engineering/software_analysis_design_tools.htm Copyright tutorialspoint.com Software analysis and design includes all activities,

More information

Business Architecture Implementation Workshop

Business Architecture Implementation Workshop Delivering a Business Architecture Transformation Project using the Business Architecture Guild BIZBOK Hands-on Workshop In this turbulent and competitive global economy, and the rapid pace of change in

More information

Practical Database Design Methodology and Use of UML Diagrams Design & Analysis of Database Systems

Practical Database Design Methodology and Use of UML Diagrams Design & Analysis of Database Systems Practical Database Design Methodology and Use of UML Diagrams 406.426 Design & Analysis of Database Systems Jonghun Park jonghun@snu.ac.kr Dept. of Industrial Engineering Seoul National University chapter

More information

Information Security Management System (ISMS) ISO/IEC 27001:2013

Information Security Management System (ISMS) ISO/IEC 27001:2013 Information Security Management System (ISMS) ISO/IEC 27001:2013 Course No. 110B Attendees will learn how to help your organization manage the security of assets such as financial information, intellectual

More information

CS487 Midterm Exam Summer 2005

CS487 Midterm Exam Summer 2005 1. (4 Points) How does software differ from the artifacts produced by other engineering disciplines? 2. (10 Points) The waterfall model is appropriate for projects with what Characteristics? Page 1 of

More information

Modern Systems Analysis and Design. Third Edition. Jeffrey A. Hoffer Joey F. George Joseph S. Valacich. Chapter 17 System Implementation

Modern Systems Analysis and Design. Third Edition. Jeffrey A. Hoffer Joey F. George Joseph S. Valacich. Chapter 17 System Implementation Modern Systems Analysis and Design Third Edition Jeffrey A. Hoffer Joey F. George Joseph S. Valacich Chapter 17 System Implementation 17.1 Copyright 2002 Prentice-Hall, Inc. Learning Objectives Describe

More information

Objectives of the Security Policy Project for the University of Cyprus

Objectives of the Security Policy Project for the University of Cyprus Objectives of the Security Policy Project for the University of Cyprus 1. Introduction 1.1. Objective The University of Cyprus intends to upgrade its Internet/Intranet security architecture. The University

More information

Basics : the Requirements Engineering Process

Basics : the Requirements Engineering Process SEG3101 (Fall 2010) Basics : the Requirements Engineering Process Gregor v. Bochmann, University of Ottawa Based on Powerpoint slides prepared by Gunter Mussbacher with material from: Sommerville & Kotonya

More information

Introduction to UML What is UML? Motivations for UML Types of UML diagrams UML syntax Descriptions of the various diagram types Rational Rose (IBM.. M

Introduction to UML What is UML? Motivations for UML Types of UML diagrams UML syntax Descriptions of the various diagram types Rational Rose (IBM.. M Introduction to UML Part I 1 What is UML? Unified Modeling Language, a standard language for designing and documenting a system in an object- oriented manner. It s a language by which technical architects

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 22000 Lead Auditor www.pecb.com The objective of the Certified ISO 22000 Lead Auditor examination is to ensure that the candidate has

More information

System Implementation

System Implementation MIT- 534 Systems Analysis and Design Software Quality Assurance Quality assurance Software Engineering Lecture 8 System Implementation ดร. สล ล บ ญพราหมณ ส าน กว ชาสารสนเทศศาสตร Software Engineering Institute

More information

TEL2813/IS2820 Security Management

TEL2813/IS2820 Security Management TEL2813/IS2820 Security Management Security Management Models And Practices Lecture 6 Jan 27, 2005 Introduction To create or maintain a secure environment 1. Design working security plan 2. Implement management

More information

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 4 Certificate in IT INFORMATION SYSTEMS

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 4 Certificate in IT INFORMATION SYSTEMS BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 4 Certificate in IT INFORMATION SYSTEMS Tuesday 27 th September 2016 - Afternoon Time: TWO hours Section A and Section B

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified Management System Auditor www.pecb.com The objective of the PECB Certified Management System Auditor examination is to ensure that the candidates

More information

Information Security Incident Response Plan

Information Security Incident Response Plan Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,

More information

Chapter 12. Systems Design. McGraw-Hill/Irwin. Copyright 2007 by The McGraw-Hill Companies, Inc. All rights reserved.

Chapter 12. Systems Design. McGraw-Hill/Irwin. Copyright 2007 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 12 Systems Design McGraw-Hill/Irwin Copyright 2007 by The McGraw-Hill Companies, Inc. All rights reserved. Objectives Describe the design phase in terms of your information building blocks. Identify

More information

This tutorial also elaborates on other related methodologies like Agile, RAD and Prototyping.

This tutorial also elaborates on other related methodologies like Agile, RAD and Prototyping. i About the Tutorial SDLC stands for Software Development Life Cycle. SDLC is a process that consists of a series of planned activities to develop or alter the Software Products. This tutorial will give

More information

Professor Hausi A. Müller PhD PEng FCAE Department of Computer Science Faculty of Engineering University of Victoria

Professor Hausi A. Müller PhD PEng FCAE Department of Computer Science Faculty of Engineering University of Victoria Professor Hausi A. Müller PhD PEng FCAE Department of Computer Science Faculty of Engineering University of Victoria http://www.engr.uvic.ca/~seng321/ https://courses1.csc.uvic.ca/courses/201/spring/seng/321

More information

Document Title Ingest Guide for University Electronic Records

Document Title Ingest Guide for University Electronic Records Digital Collections and Archives, Manuscripts & Archives, Document Title Ingest Guide for University Electronic Records Document Number 3.1 Version Draft for Comment 3 rd version Date 09/30/05 NHPRC Grant

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO/IEC 20000 Lead Auditor www.pecb.com The objective of the Certified ISO/IEC 20000 Lead Auditor examination is to ensure that the candidate

More information

Answer: D. Answer: B. Answer: B

Answer: D. Answer: B. Answer: B 1. Management information systems (MIS) A. create and share documents that support day-today office activities C. capture and reproduce the knowledge of an expert problem solver B. process business transactions

More information

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI EXECUTIVE SUMMARY The shortage of cybersecurity skills Organizations continue to face a shortage of IT skill

More information

Object-Oriented Analysis and Design Using UML (OO-226)

Object-Oriented Analysis and Design Using UML (OO-226) Object-Oriented Analysis and Design Using UML (OO-226) The Object-Oriented Analysis and Design Using UML course effectively combines instruction on the software development processes, objectoriented technologies,

More information

Chapter : Analysis Modeling

Chapter : Analysis Modeling Chapter : Analysis Modeling Requirements Analysis Requirements analysis Specifies software s operational characteristics Indicates software's interface with other system elements Establishes constraints

More information

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE Overview all ICT Profile changes in title, summary, mission and from version 1 to version 2 Versions Version 1 Version 2 Role Profile

More information

Chapter 2 SYSTEMS TECHNIQUES AND DOCUMENTATION

Chapter 2 SYSTEMS TECHNIQUES AND DOCUMENTATION Chapter 2 SYSTEMS TECHNIQUES AND DOCUMENTATION TEACHING TIPS I normally introduce flowcharting symbols with simple examples on the board. I first introduce a very simple manual flowchart involving only

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 22000 Lead Implementer www.pecb.com The objective of the Certified ISO 22000 Lead Implementer examination is to ensure that the candidate

More information

Automating the Top 20 CIS Critical Security Controls

Automating the Top 20 CIS Critical Security Controls 20 Automating the Top 20 CIS Critical Security Controls SUMMARY It s not easy being today s CISO or CIO. With the advent of cloud computing, Shadow IT, and mobility, the risk surface area for enterprises

More information

Texas Commission on Fire Protection

Texas Commission on Fire Protection 2017 Texas Commission on Fire Protection OVERVIEW, REVENUE, DATA MANAGEMENT PROJECT, PERFORMANCE MEASURES Page 1 of 9 Overview The Commission on Fire Protection is charged with developing and enforcing

More information

Cyber Security & Homeland Security:

Cyber Security & Homeland Security: Cyber Security & Homeland Security: Cyber Security for CIKR and SLTT Michael Leking 19 March 2014 Cyber Security Advisor Northeast Region Office of Cybersecurity and Communications (CS&C) U.S. Department

More information

SUGGESTED SOLUTION IPCC MAY 2017EXAM. Test Code - I M J

SUGGESTED SOLUTION IPCC MAY 2017EXAM. Test Code - I M J SUGGESTED SOLUTION IPCC MAY 2017EXAM INFORMATION TECHNOLOGY Test Code - I M J 7 1 2 1 BRANCH - (MULTIPLE) (Date : 20.11.2016) Head Office : Shraddha, 3 rd Floor, Near Chinai College, Andheri (E), Mumbai

More information

CAPM & PMP Exam Preparation Boot Camp

CAPM & PMP Exam Preparation Boot Camp CAPM & PMP Exam Preparation Boot Camp About This Course In this course, you will gain the essential knowledge and preparation needed to pass either the Certified Associate in Project Management (CAPM)

More information

The Quick CASP USER S GUIDE. What is the Quick CASP? Sample Quality Improvement Plan. >>> page 3. >>> page 7

The Quick CASP USER S GUIDE. What is the Quick CASP? Sample Quality Improvement Plan. >>> page 3. >>> page 7 The Quick CASP A Summer Learning Program Quality Assessment Tool USER S GUIDE What is the Quick CASP? >>> page 3. Sample Quality Improvement Plan >>> page 7 CONTENT 3 4 6 7 7 8 OVERVIEW OF THE QUICK CASP

More information

NRS Data Flow and Planning Workbook

NRS Data Flow and Planning Workbook NRS Data Flow and Planning Workbook Department of Education, Office of Career, Technical and Adult Education, Contract No. ED-VAE-15-0-5027 September 2018 Contents Introduction... 1 Overview of the Workbook

More information

MIS Systems & Infrastructure Lifecycle Management 1. Week 12 April 7, 2016

MIS Systems & Infrastructure Lifecycle Management 1. Week 12 April 7, 2016 MIS 5203 Lifecycle Management 1 Week 12 April 7, 2016 Study Objectives Systems Implementation Data Migration Change Over 2 Phase 1 Feasibility Phase 2 Requirements Which ones of these activities are part

More information

Object-Oriented Systems Analysis and Design Using UML

Object-Oriented Systems Analysis and Design Using UML 10 Object-Oriented Systems Analysis and Design Using UML Systems Analysis and Design, 8e Kendall & Kendall Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall Learning Objectives Understand

More information

Executive Summary. Zuma Engineering and Research. Data Center Virtualization Assessment. Service Description

Executive Summary. Zuma Engineering and Research. Data Center Virtualization Assessment. Service Description Executive Summary is firmly planted in the Green Computing movement by providing independent auditing of Information Technology (IT) data centers to assist with optimizing performance and reducing their

More information

Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure

Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure March 2015 Pamela Curtis Dr. Nader Mehravari Katie Stewart Cyber Risk and Resilience Management Team CERT

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE EXAM PREPARATION GUIDE PECB Certified ISO 50001 Lead Auditor The objective of the PECB Certified ISO 50001 Lead Auditor examination is to ensure that the candidate has the knowledge and skills to plan

More information

Chapter 8. Database Design. Database Systems: Design, Implementation, and Management, Sixth Edition, Rob and Coronel

Chapter 8. Database Design. Database Systems: Design, Implementation, and Management, Sixth Edition, Rob and Coronel Chapter 8 Database Design Database Systems: Design, Implementation, and Management, Sixth Edition, Rob and Coronel 1 In this chapter, you will learn: That successful database design must reflect the information

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 14001 Lead Implementer www.pecb.com The objective of the PECB Certified ISO 14001 Lead Implementer examination is to ensure that the candidate

More information

"Charting the Course... ITIL 2011 Managing Across the Lifecycle ( MALC ) Course Summary

Charting the Course... ITIL 2011 Managing Across the Lifecycle ( MALC ) Course Summary Course Summary Description ITIL is a set of best practices guidance that has become a worldwide-adopted framework for IT Service Management by many Public & Private Organizations. Since early 1990, ITIL

More information

CCNA Discovery 4.0 Designing and Supporting Computer Networks

CCNA Discovery 4.0 Designing and Supporting Computer Networks CCNA Discovery 4.0 Designing and Supporting Computer Networks Characterizing Existing Network Chapter 3 1 Objectives 2 Creating a Network Diagram Typically, the first step in installing a new network is

More information

2018 CANADIAN ELECTRICAL CODE UPDATE TRAINING PROVIDER PROGRAM Guidelines

2018 CANADIAN ELECTRICAL CODE UPDATE TRAINING PROVIDER PROGRAM Guidelines 2018 CANADIAN ELECTRICAL CODE UPDATE TRAINING PROVIDER PROGRAM Guidelines Under this program, CSA Group has developed a training program that provides detailed instruction on all changes of the CE Code

More information

STRATEGIC PLAN. USF Emergency Management

STRATEGIC PLAN. USF Emergency Management 2016-2020 STRATEGIC PLAN USF Emergency Management This page intentionally left blank. Organization Overview The Department of Emergency Management (EM) is a USF System-wide function based out of the Tampa

More information

Factsheet. Power Generation Service Energy efficiency in power generation and water

Factsheet. Power Generation Service Energy efficiency in power generation and water Factsheet Power Generation Service Energy efficiency in power generation and water Opportunity identification Opportunity identification overview The opportunity identification phase of Industrial Energy

More information

Using the Web in Your Teaching

Using the Web in Your Teaching Using the Web in Your Teaching November 16, 2001 Dirk Morrison Extension Division, University of Saskatchewan Workshop Outline What will we cover? Why use the Web for teaching and learning? Planning to

More information

Social Media Managers Course - Navigation Guide

Social Media Managers Course - Navigation Guide Defense Information School Strength Through Truth Social Media Managers Course - Navigation Guide Log In Visit dinfos-lms.goaclc.com and enter your username and password. Click the Login Button. Note:

More information