Chapter 1.6 Systems Development Life Cycle.
|
|
- Augustine Sparks
- 6 years ago
- Views:
Transcription
1 Chapter 1.6 Systems Development Life Cycle. 1.6 (a) Problem Definition It is important from the outset to ensure that when a computer system is being designed all those that are involved are agreed about the aims of the system. There will normally be a person, or a company or organisation that decides that a task would benefit from computerisation. This belief normally arises because there is a problem which cannot be solved by previously used methods or similar problems seem to have been solved by computerisation elsewhere. Unfortunately, the owner of the problem probably understands the problem itself quite well, but does not understand the consequences of using computers to try to solve the problem, or, indeed, whether such a solution is even possible. For this reason it is necessary for the organisation to employ a specialist who does understand computers and computerised solutions to problems. This is the systems analyst. Unfortunately, it is probable that the systems analyst is not expert in the area of the problem. The system analyst s job is to solve the problem by planning and overseeing the introduction of computer technologies. The owner of the problem will be happy if the analyst can introduce a computer solution. The problem arises when the analyst, who doesn t know very much about the business, solves the problem that they think needs solving, while the owner of the problem expects a very different problem to be solved. It seems obvious that if someone is doing something for someone else that they should make sure that they know what is required. If you are asked to answer questions 1 to 5 and you do 6 to 10 instead there is an obvious breakdown in communication, but this is what can happen if you only listen to the instruction, Do the 5 questions. The method most often used to overcome this problem is for there to be discussions between all the interested parties, and then for a list of objectives to be written up. This list of objectives, if they are all solved, will be the solution to the problem. The different people involved then agree to the list of the objectives and the success or otherwise of the project depends on the completion of those objectives. The definition of the problem is the most important part of the analysis because if it is not done correctly the wrong problem may be solved.
2 1.6 (b) A Feasibility Study. When the organisation and the systems analyst have agreed the definition of the problem, a decision must be made about the value of continuing to develop the computerised solution. The organisation may be convinced that there is a problem to be solved, and that its solution will be worth the effort and the expense. However, the systems analyst is being paid to look at the problem, and its solution, from another point of view. The analyst is an expert in computer systems and what is possible with computer systems. This analyst must consider the problem from the point of view of the computerised part of the solution and make a report to the organisation saying whether the solution is possible and sensible. This report is called the feasibility study because it says whether the solution is feasible. The feasibility study will consider the problem, and the proposed solution, from a number of points of view. Is the solution technically possible? A car firm may decide that if robots are used on the production line to assemble the different parts of engines then quality of work may improve. However, if it is not possible to manufacture a robot arm of the correct dimensions to fit into the small areas under a car bonnet, it doesn t matter how big an improvement there would be in the quality of the finished product, it would simply not be feasible. Is the solution economic to produce? Perhaps the robots exist that can be programmed to assemble this engine and the benefits will be worthwhile. However, if the cost of the robots and the program to control them is so great that it puts the car manufacturer out of business, the introduction of the robots is not feasible. Is the solution economic to run? It has been decided that there are tremendous benefits in producing a robot production line and the robots are very cheap to buy, but they have so many electric motors, and they are so slow at assembling the engines that it is cheaper to employ people to do the job. What is the effect on the human beings involved? If the car plant is the only major employer in the region, and the introduction will put much of the workforce out of work, then the employer may decide that the human cost is too great, certainly the Government would. Is the workforce skilled enough? It will be necessary to employ highly skilled technicians to look after the robots. If there are no workers with the necessary skills then the computerisation is not feasible. What effect will there be on the customer? If the customer is likely to be impressed with the introduction of the new systems then it may be worth the expense, however, if the customer will notice no difference, what is the point? Will the introduction of the new systems be economically beneficial? Put bluntly, will the introduction of robots increase the profits made by the firm? If the feasibility study shows a positive result which is accepted by the company, the next stage will be for the analyst to collect as much information about the process as possible.
3 1.6 (c) Information Requirements of a System and Fact Finding When a computer system is being designed it is necessary to ensure that the designer of the system finds out as much as possible about the requirements of the system. We have already mentioned the importance of defining the problem but further difficulties can arise. Imagine an organisation that commissions an analyst to design a new payroll program. The analyst and the boss of the organisation agree that the software needs to be able to communicate with the relevant banks, and to deduct tax at source and other important details. The analyst designs the solution and the software is written. It is the best payroll program ever produced and is installed into the computer system ready to do the first monthly payroll. Unfortunately, many of the workforce are employed on a weekly basis. A simple question to one of those paid in this way would have highlighted this for the analyst and meant that the costly mistake was avoided. When a system s requirements are being studied there is no room for errors caused by lack of information. The feasibility study has been accepted so the analyst now needs to collect as much information as possible. Obvious methods of collecting information are to ask different types of people. It may not be feasible to ask everyone in the organisation for their views, but a representative sample of workers, management, customers should be given the chance to supply information. After all, the part time worker on the production line probably knows more about the business than the analyst. There are three accepted methods of finding out people s views: 1. By interview. Interviews are particularly important because they allow the interviewee to talk at length, and also to leave a prepared script. However, they are very time consuming and consequently restricting in the number of people whose views can be sought. 2. By using questionnaires. Questionnaires make it possible to find out the views of a large number of people very quickly, but because the questions are pre-determined the person who is supplying the answers may find difficulty in putting their point of view across. 3. A compromise is to hold a group meeting. This allows a number of people to discuss points and make their views known and yet cuts down on the amount of time spent in interviews getting the same answers over and over again. The problem with meetings is that one or two people tend to dominate, not allowing all the members of the group to give their opinions. Often the views of the people connected with the problem are clouded by years of familiarity, so it is important for the analyst to also gain first hand knowledge of any existing systems. One way to do this is to observe the current system in action. Care must be taken to take into account the fact that if the workers know that they are being observed it is unlikely that they will behave in their normal manner. This is the same effect as a television camera has on otherwise fairly sensible individuals. The second method is to collect printed documentation and study it in order to find out what data is required by the system and in what form information is output.
4 1.6 (d) Requirements Specifications The planning of any system design must start by deciding what the requirements are of the system. A system may need to store data for future reference or processing. However, simply being aware that the system may need to store data is not enough. Decisions need to be made about the types of data to be held as this will dictate the form that the data will be stored in and the amount of storage space required for each set of information. Calculations as to the number of sets of data that are going to be held have to be made because the volume of storage will make some storage devices more sensible than others. Also, the volume of storage can affect the structures that will be used to store the data. Decisions need to be made about the relative importance of the different ways of accessing the data. Is it going to be necessary to access individual items of data or will all the data be accessed at the same time? Will the data be changed regularly or is it fairly static? When decisions are made as to the direction that a particular system is going to take, it is normal to produce a list of tasks that need to be carried out to complete the system. These tasks should be in a specific order. It would not make sense to consider inputting data into the system before designing the data structure into which the data is to be put. This list is called a priority list and it forms the basis of the system design. Each of the tasks that are in the list should then be considered separately to decide the important points about each one. An example would be that the file of information on stock being held in a business must allow for 1000 items (immediately putting a lower limit on the size of appropriate storage) for direct searching for information on a single item (means that some storage media are not suitable, and that some data structures cannot be used) another file, of manufacturers, to be accessed from each record in the stock file to facilitate reordering (forces one field to act as a link between the two files). Plenty of other facts must be considered and decisions made, but a set of constraints has already been placed on the design. This is known as the design specification and it should be agreed between the analyst and the organisation before the design is implemented. Often, the inputs and outputs to a system and the storage and processing that goes on in the system is such that, in order to understand it, the system needs to be divided up into a number of interconnected sections, or modules, each one being simple enough to be handled as an entity.
5 1.6 (e) Data structures, Input/Output, Processing Input Design All systems require input. The way that the data is input to the system depends on a number of factors. The data that is required. Is it graphical/textual/physical in nature? Is the data already in existence or does it need to be collected first? The hardware that is available. Is the data to be entered via a keyboard by an operator, or is there an automatic way to enter the data? The experience of the operator. The design of the user interface. This section relates back to section 1.2.d which covered the different forms of software interface. The main task in input design is to design the interface with the outside world so that data can be passed to the system, both software and hardware. Output Design. The results that are produced by the system must be presented in a way that is appropriate for the application. If the system is designed to produce bank statements for customers, then it would not be sensible to have an audio output. Similarly, a burglar alarm system would not serve the purpose for which it had been designed if the output is a message on a computer screen saying that someone has broken in as there is probably no-one in the house to read it, which is why the alarm was needed in the first place. The decision about the type of output will depend greatly upon the same factors as the input, namely, the hardware available, the form that the output needs to be in, the experience of the operator, indeed, whether there will be an operator present. Equally important to giving enough information, is the danger of providing too much. In order for users to be able to understand the information presented various tricks can be used. Information can be arranged on a monitor screen by always putting the same sort of information in the same place. The operator will then quickly become accustomed to the relative importance of different areas of the screen. Information can be colour coded. Important information may appear in red while that which is less important is in black. Notice that this implies some form of decision making on the part of the processor to determine what is important in the first place. It is also necessary to be very careful about choice of colours. People who are colour blind commonly find difficulty distinguishing between red and green, so choosing these colours to stand for information that is dangerously near a limit or at a safe level, could be disastrously wrong. Similarly, colour combinations have to be chosen carefully. Blue writing on a black background is almost impossible to see, as is yellow writing in some lighting conditions. Video reversal can be used to highlight a particular piece of information effectively. This is when the normal writing on the screen is black on a white background, but the piece that needs to stand out is shown as white on a black background. Very important pieces of information may be shown as a dialogue box obscuring the rest of the screen until it is dealt with.
6 A printer may be reserved for special messages so that a hard copy of the information is preserved. Again, the fact that the information appears on that printer means that it has a particular importance. Information can be made to flash, or can be printed in a different size, anything that makes the operator s eye go to that part of the screen. Data structure design. The data used in a computer solution will need to be stored somewhere. The storage is not that important. What is important is getting it back again when it is needed. In section 1.4, the data structures array, queue, stack, linked list, were described. When the solution is designed it is necessary to decide how access to the data will be handled and to choose an appropriate data structure. Questions on this part of the syllabus will tend to ask for the sort of choices that need to be made rather than any complex analysis of fitting a data structure to a given situation, though simple examples like modelling a queue at a check out till may be asked. Many of the decisions can be illustrated by the use of diagrams. The requirement to be able to produce specific types of diagram is no longer a part of the syllabus, but students should be aware of some of the types of diagram and should be able to follow and explain the logic behind an example diagram for an application. Jackson diagrams: A Jackson diagram starts with the original problem as the highest level. The next, and subsequent, levels show how the problems in the previous levels are split up to form smaller, more manageable, problems. This continues until each of the blocks in the lowest levels are self contained, easily solvable problems. These individual problems can then be solved and combined according to the links that have been used. If the links between the different blocks are then used correctly, the result will be a solution to the original problem. Imagine a Jackson diagram as a method for showing the individual modules that go to make up a solution to a problem and the relationships between them. Links Original Problem Individual modules Final level The links between the modules can be conditional. For example if the result of a module was a mark out of 100, then there could be two possible print routines, one for failure if the mark was below a certain level, and one for pass if it was above the pass mark. An example of a Jackson diagram to show the solution to a simple problem.
7 A register is taken of the 25 students in a class. Each student can be either present or absent. It is necessary to print out the number of students who are present and the number absent. Register Initialise While count <25 * * repeat Output Count = 0 Cpresent = 0 Cabsent=0 Input Present or absent Output Cpresent Cabsent Increment Cpresent Increment Cabsent Data flow diagrams and system flow charts: These are diagrams that are used to describe systems. Boxes are used to stand for input, processes, storage, and output. Arrows show the direction of communication around the system, and communications outside the system. As the name implies, these diagrams are used to show the directions of flow of data from one part of a system to another. Data flow diagrams can have complex shapes for the boxes that are used, but the important thing is not the shapes of the boxes, rather the logical train of thought that has been used to produce the diagram. Rectangular boxes, though not always used, are perfectly acceptable for all elements in a data flow diagram. Such diagrams are intended to show how the processes and the data interrelate, not the details of any of the programming logic. Students are expected to be able to follow the logic in a data flow diagram and, indeed, produce their own when it comes to completing project work, but not under examination conditions because the drawing of such a diagram would take too much of the time allowed for the exam. For more knowledge on DFDs see chapter 3.8 (a). As humans are more inclined towards understanding diagrams and pictures rather than words, pseudocodes tends to become tedious to understand if too lengthy. System flowcharts, because they are represented graphically, makes understanding easier.
8 Definition: A flowchart is a graph consisting of geometrical shapes that are connected by flow lines. It is another technique used in designing and representing algorithms, alternative to pseudocoing. A pseudocode description is verbal; a flowchart is graphical in nature. At this stage the analyst will also identify the hardware that will be necessary for the system to operate as the user requires, and the software characteristics that will need to be satisfied for the system to operate.
9 1.6 (f) System Evaluation Any system must match certain criteria if it is to be considered successful. This does not only apply to a computer system but any system. For example, a car must satisfy various criteria before being able to be called a car it must move under its own power it must be possible to steer it it must have 3 or 4 wheels it must have seats. There would be many other facts which would have to be true before most of us would recognise that this system is a car. However, some assumptions have been made in just the four criteria mentioned here. A toy, radio controlled, car fits all these criteria, but it was not the sort of system that we had in mind when designing the criteria. Perhaps the second bullet point should have specified that it has to be controlled from within the car itself, or should there be a new criteria that gives a minimum size for the vehicle. When systems are being designed, this list of criteria, that the finished system must match, is of paramount importance. It must also be agreed between the designer of the system and the commissioner of the design, so that there will be no unfortunate misunderstandings. We can imagine a situation where the Ford motor company commission a new car design, only to find that it is 30 cms long when delivered. Note that these criteria are decided before the system is created. They are used to decide how well the system works. In other words, does it do what it is meant to? This question can only be answered if it is known what the system was meant to do in the first place.
10 1.6 (g) Documentation The documentation of a system consists of all the text and graphics that explain how the system was produced, how it should be used, and how it can be maintained. Documentation is created at different stages in the life of a system and for different people to use. Some of the different types of documentation are met in this section and others will be encountered later in the course. Indeed, much of the project work that is done in module 4 consists of producing the documentation for a problem solution. Requirements specification This is a list of the requirements of the customer for whom the system is being designed. It consists, largely, of the criteria that will be used for the evaluation of the finished system that were discussed in section 1.6.e. It is usual for the system analyst and the customer to sign the list of requirements so that there is no confusion when the work is finished. Design specification Taking the requirements specification and working out the stages necessary to produce the required end product is known as the design specification. This will include the different stages, often shown in diagrammatic form as mentioned earlier in this chapter, and also the criteria for each stage of the solution. For example, one part of a solution may be the production of a file of data. The ways that this file of data relates to the other parts of the system, and the specification of the file (what is the key field? How many records will there be? What type of medium should it be stored on?) make up the design specification. Program specifications These will include detailed algorithms showing the method of solution for some of the parts of the problem. These algorithms may well be in the form of flow diagrams or pseudo code. The language to be used, the data structures necessary, and details of any library routines to be used will also be in the program specification. Technical documentation The technical documentation will include the program specifications, the coded program itself, details of hardware configurations. Generally, anything that will aid a technician in maintaining or updating a system. Indeed, technical documentation is otherwise known as maintenance documentation. This type of documentation is not intended to be accessible to the user of the system, who does not need any of these details to be able to use the system correctly.
11 User documentation This is the documentation for the person who will actually be using the system. It contains those details that are needed to make the system operate as it should. Items normally included in the user documentation will be examples of output screens examples of valid input methods of input of data error messages and what to do when they appear How to install the system onto specific hardware Some user documentation is part of the software and can be called up onto the screen when it is needed. This type of documentation is called on-screen help.
12 1.6 (h) Testing and Installation Planning Any system needs to be tested to ensure that it works. This seems to be a fairly obvious statement, but in reality such testing is impossible in all but the simplest of systems because it simply is not possible to test every conceivable input to or logical construction in, the system. This difficulty means that testing that is to be done must be carefully planned and that it should relate directly to the criteria referred to earlier in this section. Specific types of testing will be covered in P2. When the system has been completed it has to be installed or implemented so that it is performing the tasks for which it was designed. Initially, this involves ensuring that the correct hardware is available arranging for staff to be trained in the use of the new system inputting the data to the data files, either manually or by downloading them from the original system. The system handover (installation method), itself can be done in a number of ways: Parallel running. Until the system can be considered fault free, the old and new systems are run side by side, both doing the same processing. This allows results to be compared to ensure that there is no problem with the new system. Such a system is safe and also allows staff training to be carried out, but it is obviously very expensive because of the need to do everything twice. Parallel running is used in situations where the data is so valuable that there must be no possibility of failure. Pilot running. Key parts of the new system are run alongside the old system until it is considered that they have been fully tested. This is a compromise with the idea of parallel running, but it does not give a clear idea of the effects on the system of the large amounts of data that are going to be encountered in the full application. Big bang, or direct change. The old system is removed and the new system replaces it completely and immediately. Phasing. Parts of a system are replaced while the remaining parts are covered by the old system. This allows for some testing of the new system to be done, and for staff training to take place, but also allows for a back-up position if the new version does not work as anticipated. This topic is not fully expounded upon here, the candidate simply needing to understand that there are different methods of installation and be able to outline some of the methods along the lines shown here. This topic will reappear for a fuller treatment in chapter 3.8.e.
13 1.6 (i) System Maintenance Systems may be designed for a well defined purpose and may realise that purpose, hence they would be considered successful. However, the original reasons for a particular system to be created may change, the hardware may alter, the law governing a system may change. For many reasons the original system may no longer be satisfactory. One solution would be to produce a totally new system, another would be to adapt the present one so that it can be used in the new circumstances. This situation is reviewing the system and is the main reason for technical documentation. While the system is running it will need attention because of faults being discovered, this again needs a technician with a set of maintenance documentation. Computing and computer applications is a subject that changes so regularly through improvements in technology, new ideas, different legal frameworks trying to keep pace, that, in reality, a system should never be considered to be finished. Rather than being a linear process with a beginning, a middle and an end, it should be thought of as a circular process, continually returning to previous stages to fine tune them and take advantage of changing circumstances.
Systems Development Life Cycle.
Chapter 1.6 Systems Development Life Cycle. A systems analysis team or analyst is often brought in to improve on an existing system. Frequently this involves moving from a paper-based filing system to
More informationThe Systems Life Cycle
[1] The Systems Life Cycle Introduction Systems analysis is, as the name states, the analysis of systems! The systems that we are talking about are the systems within organizations and businesses - systems
More informationTesting is a very big and important topic when it comes to software development. Testing has a number of aspects that need to be considered.
Testing Testing is a very big and important topic when it comes to software development. Testing has a number of aspects that need to be considered. System stability is the system going to crash or not?
More informationcommunications and software
1 Computer systems, communications and software 1.1 Components of a computer system and modes of use A computer system is made up of hardware and flow of data and information. The storage device is both
More informationChapter 2.6: Testing and running a solution
Chapter 2.6: Testing and running a solution 2.6 (a) Types of Programming Errors When programs are being written it is not surprising that mistakes are made, after all they are very complicated. There are
More informationOperating system. Hardware
Chapter 1.2 System Software 1.2.(a) Operating Systems An operating system is a set of programs designed to run in the background on a computer system, giving an environment in which application software
More informationMICRO DIGITAL: TECHNICAL CRITERIA FOR MAKING THE RTOS CHOICE
MICRO DIGITAL: TECHNICAL CRITERIA FOR MAKING THE RTOS CHOICE 15 December 2008: Technical Criteria for Making the RTOS Choice INTERVIEWEE. RALPH MOORE PRESIDENT TEL. 714 427 7333 EMAIL. RALPHM@SMXRTOS.COM
More informationSOME TYPES AND USES OF DATA MODELS
3 SOME TYPES AND USES OF DATA MODELS CHAPTER OUTLINE 3.1 Different Types of Data Models 23 3.1.1 Physical Data Model 24 3.1.2 Logical Data Model 24 3.1.3 Conceptual Data Model 25 3.1.4 Canonical Data Model
More informationYou already have some basic knowledge of the stages in the system life cycle:
You already have some basic knowledge the stages in the system life cycle: feasibility study analysis design development and testing implementation documentation Evaluation. In this chapter you will learn
More informationXP: Backup Your Important Files for Safety
XP: Backup Your Important Files for Safety X 380 / 1 Protect Your Personal Files Against Accidental Loss with XP s Backup Wizard Your computer contains a great many important files, but when it comes to
More informationBCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT. March 2017 PRINCIPLES OF USER INTERFACE DESIGN
BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT March 2017 PRINCIPLES OF USER INTERFACE DESIGN EXAMINERS REPORT General Comments Candidates should focus
More informationKeep Track of Your Passwords Easily
Keep Track of Your Passwords Easily K 100 / 1 The Useful Free Program that Means You ll Never Forget a Password Again These days, everything you do seems to involve a username, a password or a reference
More informationTips & Tricks for Microsoft Word
T 330 / 1 Discover Useful Hidden Features to Speed-up Your Work in Word For what should be a straightforward wordprocessing program, Microsoft Word has a staggering number of features. Many of these you
More informationChapter 1.5 Data Transmission and Networking.
Chapter 1.5 Data Transmission and Networking. 1.5 (a) Networks All the systems that have been mentioned so far have been individual computers, sometimes with more than one user, but single processors.
More informationThere we are; that's got the 3D screen and mouse sorted out.
Introduction to 3D To all intents and purposes, the world we live in is three dimensional. Therefore, if we want to construct a realistic computer model of it, the model should be three dimensional as
More informationMARK SCHEME for the October/November 2011 question paper for the guidance of teachers 9713 APPLIED ICT
UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS GCE Advanced Subsidiary Level and GCE Advanced Level MARK SCHEME for the October/November 2011 question paper for the guidance of teachers 9713 APPLIED
More informationArtificial Intelligence Prof. Deepak Khemani Department of Computer Science and Engineering Indian Institute of Technology, Madras
Artificial Intelligence Prof. Deepak Khemani Department of Computer Science and Engineering Indian Institute of Technology, Madras (Refer Slide Time: 00:17) Lecture No - 10 Hill Climbing So, we were looking
More informationPowerPoint Basics: Create a Photo Slide Show
PowerPoint Basics: Create a Photo Slide Show P 570 / 1 Here s an Enjoyable Way to Learn How to Use Microsoft PowerPoint Microsoft PowerPoint is a program included with all versions of Microsoft Office.
More informationDEADLY SINS. Of Document. 7 Production THE. automated document assembly
automated document assembly 7 Production THE DEADLY SINS Of Using document automation technology to generate documents is still not a common practice in many organisations. Instead, staff resort to a range
More informationGraph Structure Over Time
Graph Structure Over Time Observing how time alters the structure of the IEEE data set Priti Kumar Computer Science Rensselaer Polytechnic Institute Troy, NY Kumarp3@rpi.edu Abstract This paper examines
More informationThis session will provide an overview of the research resources and strategies that can be used when conducting business research.
Welcome! This session will provide an overview of the research resources and strategies that can be used when conducting business research. Many of these research tips will also be applicable to courses
More informationTemplating and Rubber- Stamping in RCM
Templating and Rubber- Stamping in RCM RCM Notes series Dr Mark Horton, Numeratis.com, March 2011 Introduction The implementation of RCM requires the investment of a significant level of resources. Those
More informationSOFTWARE ENGINEERING Prof.N.L.Sarda Computer Science & Engineering IIT Bombay. Lecture #10 Process Modelling DFD, Function Decomp (Part 2)
SOFTWARE ENGINEERING Prof.N.L.Sarda Computer Science & Engineering IIT Bombay Lecture #10 Process Modelling DFD, Function Decomp (Part 2) Let us continue with the data modeling topic. So far we have seen
More informationBurning CDs in Windows XP
B 770 / 1 Make CD Burning a Breeze with Windows XP's Built-in Tools If your PC is equipped with a rewritable CD drive you ve almost certainly got some specialised software for copying files to CDs. If
More informationCDs & DVDs: Different Types of Disk Explained
CDs & DVDs: Different Types of Disk Explained C 200 / 1 Don t Waste Money Buying the Wrong Type Find Out Which Disks Your PC Can Use! Your PC almost certainly has at least one CD/DVD drive. In its most
More informationVirtualization. Q&A with an industry leader. Virtualization is rapidly becoming a fact of life for agency executives,
Virtualization Q&A with an industry leader Virtualization is rapidly becoming a fact of life for agency executives, as the basis for data center consolidation and cloud computing and, increasingly, as
More informationPrinting Envelopes in Microsoft Word
Printing Envelopes in Microsoft Word P 730 / 1 Stop Addressing Envelopes by Hand Let Word Print Them for You! One of the most common uses of Microsoft Word is for writing letters. With very little effort
More informationIntroduction to Programming
CHAPTER 1 Introduction to Programming Begin at the beginning, and go on till you come to the end: then stop. This method of telling a story is as good today as it was when the King of Hearts prescribed
More informationExcel Basics Rice Digital Media Commons Guide Written for Microsoft Excel 2010 Windows Edition by Eric Miller
Excel Basics Rice Digital Media Commons Guide Written for Microsoft Excel 2010 Windows Edition by Eric Miller Table of Contents Introduction!... 1 Part 1: Entering Data!... 2 1.a: Typing!... 2 1.b: Editing
More informationAnimations involving numbers
136 Chapter 8 Animations involving numbers 8.1 Model and view The examples of Chapter 6 all compute the next picture in the animation from the previous picture. This turns out to be a rather restrictive
More informationEssay & Assignment Preparation using MindGenius
Essay & Assignment Preparation using MindGenius This workshop is aimed at those of you who struggle gathering and sorting information when beginning to write an essay. Using MindGenius you can plan essays
More informationEssay & Assignment Preparation using MindGenius
Essay & Assignment Preparation using MindGenius This workshop is aimed at those of you who struggle gathering and sorting information when beginning to write an essay. Using MindGenius you can plan essays
More informationThis exam is open book / open notes. No electronic devices are permitted.
SENG 310 Midterm February 2011 Total Marks: / 40 Name Solutions Student # This exam is open book / open notes. No electronic devices are permitted. Part I: Short Answer Questions ( / 12 points) 1. Explain
More informationChapter 9. Software Testing
Chapter 9. Software Testing Table of Contents Objectives... 1 Introduction to software testing... 1 The testers... 2 The developers... 2 An independent testing team... 2 The customer... 2 Principles of
More informationFLOWCHARTS A flowchart is a graphical representation of the steps to be followed for solving problem. It consists of a set of symbols.
FLOWCHARTS A flowchart is a graphical representation of the steps to be followed for solving problem. It consists of a set of symbols. Each symbol represents a specific activity. A typical problem involves
More informationExcel Basics: Working with Spreadsheets
Excel Basics: Working with Spreadsheets E 890 / 1 Unravel the Mysteries of Cells, Rows, Ranges, Formulas and More Spreadsheets are all about numbers: they help us keep track of figures and make calculations.
More informationHuman Error Taxonomy
Human Error Taxonomy The Human Error Taxonomy (HET) provides a structure for requirement errors made during the software development process. The HET can be employed during software inspection to help
More information7.1 Analysis 7.2 Design 7.3 Development and Testing 7.4 Implementation 7.5 Documentation 7.6 Evaluation
7.1 Analysis 7.2 Design 7.3 Development and Testing 7.4 Implementation 7.5 Documentation 7.6 Evaluation Systems Analysts will review an existing system which is currently not meeting expectations. The
More informationInstruction manual Gulden desktop wallet 1.6.1
Instruction manual Gulden desktop wallet 1.6.1 Written by Aat de Kwaasteniet Translated by Arjan Bartlema Edited by amongst others Guldentest Date: 10 12 2016 Introduction Great that you have found your
More informationMULTIMEDIA TRAINING KIT INTRODUCTION TO OPENOFFICE.ORG WRITER HANDOUT
MULTIMEDIA TRAINING KIT INTRODUCTION TO OPENOFFICE.ORG WRITER HANDOUT Developed by: Anna Feldman for the Association for Progressive Communications (APC) MULTIMEDIA TRAINING KIT...1 INTRODUCTION TO OPENOFFICE.ORG
More informationGame keystrokes or Calculates how fast and moves a cartoon Joystick movements how far to move a cartoon figure on screen figure on screen
Computer Programming Computers can t do anything without being told what to do. To make the computer do something useful, you must give it instructions. You can give a computer instructions in two ways:
More information0417 INFORMATION AND COMMUNICATION TECHNOLOGY
CAMBRIDGE INTERNATIONAL EXAMINATIONS Cambridge International General Certificate of Secondary Education MARK SCHEME for the May/June 2015 series 0417 INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12 Paper
More informationRapid Software Testing Guide to Making Good Bug Reports
Rapid Software Testing Guide to Making Good Bug Reports By James Bach, Satisfice, Inc. v.1.0 Bug reporting is a very important part of testing. The bug report, whether oral or written, is the single most
More informationDownload Free Pictures & Wallpaper from the Internet
Download Free Pictures & Wallpaper from the Internet D 600 / 1 Millions of Free Graphics and Images at Your Fingertips! Discover How To Get Your Hands on Them Almost any type of document you create can
More informationPublic Meeting Agenda Formatting Best Practices
DEFINITIVE GUIDE Public Meeting Agenda Formatting Best Practices In this guide, we will first walk you through some best practices with text and images. Then, we will show you how to execute the best practices
More informationTaskbar: Working with Several Windows at Once
Taskbar: Working with Several Windows at Once Your Best Friend at the Bottom of the Screen How to Make the Most of Your Taskbar The taskbar is the wide bar that stretches across the bottom of your screen,
More informationPhysically-Based Laser Simulation
Physically-Based Laser Simulation Greg Reshko Carnegie Mellon University reshko@cs.cmu.edu Dave Mowatt Carnegie Mellon University dmowatt@andrew.cmu.edu Abstract In this paper, we describe our work on
More informationTERMINOLOGY MANAGEMENT DURING TRANSLATION PROJECTS: PROFESSIONAL TESTIMONY
LINGUACULTURE, 1, 2010 TERMINOLOGY MANAGEMENT DURING TRANSLATION PROJECTS: PROFESSIONAL TESTIMONY Nancy Matis Abstract This article briefly presents an overview of the author's experience regarding the
More informationABCs of Direct Mail. Tips for More Effective Marketing Publications
ABCs of Direct Mail Tips for More Effective Marketing Publications ABCs of Direct Mail 2 Introduction Direct mail is a growing business and everyone is eager and excited to jump on board. The problem is
More informationCritical Systems. Objectives. Topics covered. Critical Systems. System dependability. Importance of dependability
Objectives Critical Systems To explain what is meant by a critical system where system failure can have severe human or economic consequence. To explain four dimensions of dependability - availability,
More informationProblem Solving through Programming In C Prof. Anupam Basu Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur
Problem Solving through Programming In C Prof. Anupam Basu Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 04 Introduction to Programming Language Concepts
More informationIntroduction to TT Payroll - Training
Introduction to TT Payroll - Training This document will guide you through the steps of generating your payslips. At any stage if you have any questions we are happy to take your call or email. Our contact
More informationBusiness Process Outsourcing
Business Process Outsourcing Copyright 2012-2014, AdminBetter Inc. LIST BUILDING SERVICES Table of Contents Introduction To List Building Services... 3 A Note On Ballbark Pricing... 3 Types Of List Building
More information11. The Other Queue Always Goes Faster (Queues and Stacks)
11. The Other Queue Always Goes Faster (Queues and Stacks) Waitin' for when the last shall be first and the first shall be last Bruce Springsteen, The Ghost of Tom Joad,1995, cf The Bible, St Mathew ch.
More informationExsys RuleBook Selector Tutorial. Copyright 2004 EXSYS Inc. All right reserved. Printed in the United States of America.
Exsys RuleBook Selector Tutorial Copyright 2004 EXSYS Inc. All right reserved. Printed in the United States of America. This documentation, as well as the software described in it, is furnished under license
More informationCHAPTER 18: CLIENT COMMUNICATION
CHAPTER 18: CLIENT COMMUNICATION Chapter outline When to communicate with clients What modes of communication to use How much to communicate How to benefit from client communication Understanding your
More informationClean & Speed Up Windows with AWO
Clean & Speed Up Windows with AWO C 400 / 1 Manage Windows with this Powerful Collection of System Tools Every version of Windows comes with at least a few programs for managing different aspects of your
More informationINFS 328 Systems Analysis and Design
INFS 328 Systems Analysis and Design Session 13 Systems Analysis and Construction Tools Lecturer: Prof. Ellis Edwin Badu, Dept. of Information Studies Contact Information: eebadu@ug.edu.gh College of Education
More informationFile Organisation and Data Access 3.1.2
File Organisation and Data Access 3.1.2 Computers can store large volumes of data. The difficulty is to be able to get it back. In order to be able to retrieve data, it must be stored in some sort of order.
More informationCreating a Box-and-Whisker Graph in Excel: Step One: Step Two:
Creating a Box-and-Whisker Graph in Excel: It s not as simple as selecting Box and Whisker from the Chart Wizard. But if you ve made a few graphs in Excel before, it s not that complicated to convince
More informationCOMP6471 WINTER User-Centered Design
COMP6471 WINTER 2003 User-Centered Design Instructor: Shahriar Ameri, Ph.D. Student: Pedro Maroun Eid, ID# 5041872. Date of Submission: Monday, March 10, 2003. (Week 9) Outline Outline... 2 ABSTRACT...3
More informationCyber Smarts Using Social Media Wisely
Cyber Smarts Using Social Media Wisely Posted on March 24, 2016 by Shridevi Stock Photo You have access to the world s largest museum, art gallery, library and social group ever created. You also have
More informationUp and Running Software The Development Process
Up and Running Software The Development Process Success Determination, Adaptative Processes, and a Baseline Approach About This Document: Thank you for requesting more information about Up and Running
More informationSoftware Engineering Prof.N.L.Sarda IIT Bombay. Lecture-11 Data Modelling- ER diagrams, Mapping to relational model (Part -II)
Software Engineering Prof.N.L.Sarda IIT Bombay Lecture-11 Data Modelling- ER diagrams, Mapping to relational model (Part -II) We will continue our discussion on process modeling. In the previous lecture
More informationSpecifying and Prototyping
Contents Specifying and Prototyping M. EVREN KIYMAÇ 2008639030 What is Specifying? Gathering Specifications Specifying Approach & Waterfall Model What is Prototyping? Uses of Prototypes Prototyping Process
More informationBTEC Nationals IT - Unit2 FAQs
BTEC Nationals IT - Unit2 FAQs Q1 Q2 I need more clarity on what is required in the design task Is it expected that the race officials are entering times as raw times and then the table is set up so it
More informationCORE BASICS COMPETENCY EXAM README RICOH GROUP COMPANIES
RICOH GROUP COMPANIES CORE BASICS COMPETENCY EXAM README It is the reader s responsibility when discussing the information contained within this document to maintain a level of confidentiality that is
More informationNCMail: Microsoft Outlook User s Guide
NCMail: Microsoft Outlook 2003 Email User s Guide Revision 1.0 11/10/2007 This document covers how to use Microsoft Outlook 2003 for accessing your email with the NCMail Exchange email system. The syntax
More informationSoftware Development 2
Software Development 2 Course Map This module introduces some of the techniques programmers use to create applications and programs. Introduction Computer Principles and Components Software Development
More informationExcel Tips for Compensation Practitioners Weeks Data Validation and Protection
Excel Tips for Compensation Practitioners Weeks 29-38 Data Validation and Protection Week 29 Data Validation and Protection One of the essential roles we need to perform as compensation practitioners is
More information4 KEY FACTORS FOR DATA QUALITY ON A DATA LAKE (OR: HOW TO AVOID THE DATA SWAMP) JOSH HERRITZ MIOSOFT CORPORATION MIOsoft Corporation.
4 KEY FACTORS FOR DATA QUALITY ON A DATA LAKE (OR: HOW TO AVOID THE DATA SWAMP) JOSH HERRITZ MIOSOFT CORPORATION The trends in digital business promise that the future holds an unprecedented volume, variety,
More informationSAPtips. Journal. Creating a Well-Developed Master Data Management Solution in BW. August/September 2005 Volume III Issue 4. SAPtips.
Page 1 Creating a Well-Developed Master Data Management Solution in BW By Arthur Pat Pesa, arthurpesa, inc Editor Note: Pat Pesa delivers another one-two-three punch with his discussion of developing,
More informationEFFICIENT CLIENT INTAKE WITH TIME MATTERS
EFFICIENT CLIENT INTAKE WITH TIME MATTERS An efficient client intake process boosts productivity and enhances your ability to market your firm. There are a number of reasons why developing and using an
More informationUser Interfaces Assignment 3: Heuristic Re-Design of Craigslist (English) Completed by Group 5 November 10, 2015 Phase 1: Analysis of Usability Issues Homepage Error 1: Overall the page is overwhelming
More informationMAXQDA and Chapter 9 Coding Schemes
MAXQDA and Chapter 9 Coding Schemes Chapter 9 discusses how the structures of coding schemes, alternate groupings are key to moving forward with analysis. The nature and structures of the coding scheme
More informationNational 5 Computing Science Software Design & Development
National 5 Computing Science Software Design & Development 1 Stages of Development 2 Analysis 3 Design 4 Implementation 5 Testing 6 Documentation 7 Evaluation 8 Maintenance 9 Data Types & Structures 10
More informationCHAPTER 9: PRESENTATTIONAL AIDS. A presentational aid is any visual, audio, audio visual, or other sensory material used by the speaker in a speech.
: PRESENTATTIONAL AIDS A presentational aid is any visual, audio, audio visual, or other sensory material used by the speaker in a speech. A visual aid allows the audience to see as well as hear the speaker
More informationRoad and Street Maintenance Supervisors Conference
Road and Street Maintenance Supervisors Conference Distracted Driving Definition: Distracted Driving The practice of driving a motor vehicle while engaged in another activity, typically one that involves
More informationExcel Core Certification
Microsoft Office Specialist 2010 Microsoft Excel Core Certification 2010 Lesson 6: Working with Charts Lesson Objectives This lesson introduces you to working with charts. You will look at how to create
More informationMEI STRUCTURED MATHEMATICS. MEI conference University of Hertfordshire June C3 COURSEWORK
MEI STRUCTURED MATHEMATICS MEI conference University of Hertfordshire June 29 2009 C3 COURSEWORK What is this coursework designed to do and how do we prepare students for it? Presenter: Val Hanrahan The
More informationThis factsheet intends to provide guidance on how you can manage your s. You will discover:
Summary This factsheet intends to provide guidance on how you can manage your emails. You will discover: Why it is important to manage your emails Guidance for approaching email management How to identify
More informationDCN Synoptic Microphone Control. Software User Manual en LBB 3571
DCN en LBB 3571 GENERAL CONTENTS Chapter 1-1.1 About 1.2 What is a synoptic layout? 1.3 Controlling microphones Chapter 2 - Getting Started 2.1 Starting 2.2 Using Help Chapter 3 - Preparing for a Conference
More informationWith IBM BPM 8.5.5, the features needed to express both BPM solutions and case management oriented solutions comes together in one offering.
Case Management With the release of IBM BPM 8.5.5, case management capabilities were added to the product. It must be noted that these functions are only available with IBM BPM Advanced and the Basic Case
More informationDEPARTMENT OF POLITICAL SCIENCE AND INTERNATIONAL RELATIONS. Posc/Uapp 816 INTRODUCTION
DEPARTMENT OF POLITICAL SCIENCE AND INTERNATIONAL RELATIONS Posc/Uapp 816 INTRODUCTION I. CLASS 1: AGENDA A. Course objectives and a pep talk 1. Statistics and substantive theory. B. Course procedures
More information(Refer Slide Time: 02.06)
Data Structures and Algorithms Dr. Naveen Garg Department of Computer Science and Engineering Indian Institute of Technology, Delhi Lecture 27 Depth First Search (DFS) Today we are going to be talking
More informationSilverStripe - Website content editors.
SilverStripe - Website content editors. Web Content Best Practices In this section: Learn how to make your site search-engine friendly Learn how to make your content accessible Other web best practices
More informationTool Selection and Implementation
Tool Selection and Implementation Paul Gerrard Systeme Evolutif Limited email: paulg@evolutif.co.uk http://www.evolutif.co.uk 2000 Systeme Evolutif Ltd Slide 1 Agenda What Can Test Execution Tools Do For
More informationthe NXT-G programming environment
2 the NXT-G programming environment This chapter takes a close look at the NXT-G programming environment and presents a few simple programs. The NXT-G programming environment is fairly complex, with lots
More informationACTIVITY 2: Reflection of Light
UNIT L Developing Ideas ACTIVITY 2: Reflection of Light Purpose Most people realize that light is necessary to see things, like images in mirrors, and various kinds of objects. But how does that happen?
More informationDocument your findings about the legacy functions that will be transformed to
1 Required slide 2 Data conversion is a misnomer. This implies a simple mapping of data fields from one system to another. In reality, transitioning from one system to another requires a much broader understanding
More informationUNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS International General Certificate of Secondary Education
UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS International General Certificate of Secondary Education INFORMATION TECHNOLOGY Paper 2 Candidates answer on the Question Paper. No Additional Materials
More informationReasons to NOT Use . for Urgent Messages. Steuart Snooks. CEO Solutions For Success
by 0413 830 772 steuart@solutions4success.com.au Steuart Snooks CEO Solutions For Success @2 E-mail should never be urgent... really! Do you often feel you have to check e-mail on an almost constant basis,
More informationLearn to use the vector and translation tools in GX.
Learning Objectives Horizontal and Combined Transformations Algebra ; Pre-Calculus Time required: 00 50 min. This lesson adds horizontal translations to our previous work with vertical translations and
More informationCrash Course in Modernization. A whitepaper from mrc
Crash Course in Modernization A whitepaper from mrc Introduction Modernization is a confusing subject for one main reason: It isn t the same across the board. Different vendors sell different forms of
More informationNETW3005 Operating Systems Lecture 1: Introduction and history of O/Ss
NETW3005 Operating Systems Lecture 1: Introduction and history of O/Ss General The Computer Architecture section SFDV2005 is now complete, and today we begin on NETW3005 Operating Systems. Lecturers: Give
More informationFormal Methods of Software Design, Eric Hehner, segment 1 page 1 out of 5
Formal Methods of Software Design, Eric Hehner, segment 1 page 1 out of 5 [talking head] Formal Methods of Software Engineering means the use of mathematics as an aid to writing programs. Before we can
More informationProgramming and Data Structures Prof. N.S. Narayanaswamy Department of Computer Science and Engineering Indian Institute of Technology, Madras
Programming and Data Structures Prof. N.S. Narayanaswamy Department of Computer Science and Engineering Indian Institute of Technology, Madras Lecture - 13 Merging using Queue ADT and Queue types In the
More informationGuide for candidates
Guide for candidates 2 APMP Guide for candidates Introduction 3 Applying for an examination 3 Completing your application form 3 Taking the examination 4 Examination rules 4 Examination materials 4 Examination
More informationAgilent Connectivity Advances for Component Manufacturers. Product Note
Agilent Connectivity Advances for Component Manufacturers Product Note Introduction Since the introduction of the IEEE 488 interface, computers have been used to control instrumentation and capture test
More informationFoundation Level Syllabus Usability Tester Sample Exam
Foundation Level Syllabus Usability Tester Sample Exam Version 2017 Provided by German Testing Board Copyright Notice This document may be copied in its entirety, or extracts made, if the source is acknowledged.
More information