1 SAD Notes
1 SAD Notes
Objectives
- Describe the lifecycle approach to business information system development
- Use the tools of systems analysis and design to design business information systems
Introduction
“The course aims at developing effective information systems i.e. it involves cognitive
skills in understanding problems and knowing where computer technology best “fits in”)
It’s much more than just writing computer programs
Definition of concepts
1. Computer
2. Data
3. Information
4. I.T
5. System:
- A whole entity with a set of components that all work together to achieve a common
objective / goals.
4. Synergy.
- The output from two or more components working together is more than the sum of the
individual parts.
1
I.S
A set of interrelated components that collect (or retrieve), process, store, and distribute
information to support decision making and control in an organization.
N.B A good IS must be able to produce information that carries the following
characteristics:
Relevant – information must pertain to the problem at hand.
Complete – partial information is often worst than no information.
Accurate – erroneous information may lead to disastrous decisions.
Current – decisions are often based upon the latest information available.
Economical – in a business setting, the cost of obtaining information must be
considered.
Processes: Does the actual conversion of inputs in to outputs i.e calculation sorting
summarizing e.t.c
Outputs
- Outputs are tangible results produced by processes in the system, such as
products or services for consumers.
Feedback
2
- This is the output information that is returned to the appropriate member of the
system and makes the system to be self regulating and adjusting.
- Feedback comes from employees who carry out processes in the organization,
customers/clients using the products and services, etc.
- Feedback also comes from the larger environment of the organization, e.g.,
influences from government, society, economics, and technologies.
Environment
- This is the supra system within which the organization operates
Boundary and the interface: The dividing line between the system and its environment
Importance in system theory
- Determines the system permeability
- Determines the system scope of operation.
Classification of Systems
The frame of reference within which one view the system depends by the way it interacts
with its environment as follows
1. Physical systems
- Physical systems are the physical and tangible entities which can be felt and touched
e.g. the hardware components of a computer.
2. Abstract systems
- Abstract systems are representation of a real system that may exist either in theory, a
model or conceptualization of the intended. Eg Models, flow charts, DFD’s etc.
3. Open systems
3
- An open system is a system which continuously interacts with its environment i.e
receives inputs from the environment and passes back the output to to
environment.
- The interaction can take the form of information, energy, or material transfers into
or out of the system boundary.
- Examples Biological Systems, and Organizational Systems
4. Closed systems
5. Deterministic
- Deterministic systems are systems where the output can perfectly been predicted
form the inputs with certainty.
- The interaction between the parts or subsystems is known for certain; example: a
computer program which performs exactly to a set of instructions.
6. Probabilistic
- Probabilistic/ stochastic: is a system where the output can be predicted from the
previous state but with some probability.
- A system that can be described in terms of probable behavior (a certain degree of
error); examples: a business enterprise.
7. Cybernetic system.
4
- This is a self organizing system that react and adjust according to inputs and
stimulus e.g. a bank that pays the rate of interest to depositors depending with the
amount of money in the deposit account.
8. Computer based information systems –These are information systems that handle
business applications. Examples. (Stratification)
a. Transaction Processing System (TPS)
- Capture and record information about the transactions that affect the organization
(e.g. the sale of an item, a withdrawal from an ATM etc.)
Take information captured by the transaction processing system and produce reports
management needs for planning and controlling business
– Support human decision making and allows users to explore the potential
impact of available options or decisions (e.g. can ask “what if”)
– Highly interactive systems that assist managers in making semi structured
decisions.
Characteristics of a System
5
3. Interdependence. One subsystem depends on the input from another sub system
for proper functioning.
4. Integration: This is concerned within how the components are tied together and
successful system integration produces a synergistic effect (synergy) that is where
the output from two or more components working together exceeds the sum of
their individual participation.
5. Central Objective: Defines the ultimate systems goals i.e. to increase profit as you
reduce expenditure.
System Design: Involves specifying in detail how the parts of an information system
should be implemented
6
Why is it important?
8. System Analyst: A professional who used analysis and design techniques to solve
business problems.
7
IS System Development methodologies
System Development Life Cycle (S.D.L.C) /Life cycle approach
Waterfall model
Spiral
Prototyping
Structured Analysis Development Method (S.A.D.M)
- It the oldest methodology for building an information system. This method breaks the
development into various stages that must be followed systematically.
Growth Feasibility
Analysis
Design
Implementation
Death Testing
Maintenance
NB: Every system goes through a process of birth, growth maturity and decline
- This is where a formal work is done on the system to identify the new system to
develop i.e. project selection or opportunity recognition.
8
- During problem definition, the management or the system analyst must know the
exact problem. E.g. In a bank a typical problem would be the long queues in the
banking hall. Lack of data security in the existing system.
- Is a description detailing why an investigation has to be carried out and what the
system does. It also guides to determine the area of study. This should be
communicated to the systems analyst in a formal written document which acts as
the terms of reference. It can be drafted by a committee of senior personnel who
guides the work of the project according to a long range predetermined, plan of
action.
Terms of reference.
Is a formal document to guide the analyst on the objectives to be achieved. It has the
following contents
i) Title of project
ii) Purpose of study
iii) Project time table
iv) Constraints the analyst will meet or have to work to during the
investigation
v) The subject of study (area of study)
vi) The personnel involved in the project.
vii) The necessary material (resources) to be used in the project.
Reasons for development of new system/Modification
Difficulty being encountered in the operation of the existing system. This may be
recognized by the user who encounters difficulties and asks for help from systems
analysts.
An area of poor performance being identified by the management, which
increases the level of indirect expenses.
Invention of new systems, which are more successful than the existing ones.
N.B
- Once the problem has been recognized and acknowledged by the management,
the user and system analyst, the work of implementing new system is assigned to
the analyst.
9
- The management comes up with a report (terms of reference), which is given to
the system analyst to conducts feasibility study.
Feasibility study
- This is an exercise where the system analyst investigates the problem and the
information needs of the stakeholders.
- The process seeks to determine the resources required to provide an information
systems solution, the cost and benefits of the solution.
- The analyst conducting the study gathers information using a variety of methods,
as follows:
N.B
10
2. Technical feasibility. This tries to see whether existing technology should be
suitable to support the new system and whether the needed technology can be
developed, Examples
1. Training the staff
2. Consultants
3. Ways of developing it e.g. more training
4. Hiring experts’ e.t.c.
3. Operational feasibility. This evaluates the ability, desire, and willingness of the
stakeholders to use, support, and operate the proposed computer information system.
4. Social feasibility. This takes the needs of the various people affected by the proposed
system in to account.
5. Legal feasibility This factor mandates that no conflicts exist between the system
under consideration and the organizations ability to discharge its legal obligation.
6. Schedule feasibility The analyst must estimate when the proposed system will be
operative, assuming that it is eventually accepted. Gantt charts and PERT charts are used
to show the schedule.
11
PERTchart
- A PERT chart is a project management tool used to schedule, organize, and coordinate
tasks within a project. PERT stands for Program Evaluation Review Technique,
12
N.B After the feasibility the systems analyst prepares a system specifications/
feasibility report which contains the following
Introduction
Aim of the system
File conversion procedures
Program specification.
Job control specification
System description
Methods of fact finding
1) Interview
1) Observation
2) Questionnaire
3) Research
13
4) Reading documents - inspection of maintained records
Interview:
- Involves the direct conversation between the analyst and the user of the system, in order
to obtain answers, comments and suggestions about the current state of the system.
- Interviewing process:
i. Determine who is to interview
ii. Establish the objectives of the interview
iii. Preparing for the interview
iv. Conducting the interview
v. Documenting the interview
vi. Evaluating the interview
14
- Avoid yes or no questions
- Get used to interviewee language
- Compliment where possible (good, thank you e.g.
- Questions should not suggest their own answers (e.g. “I’m sure you have had
experience in data processing haven’t you?”
- Open-ended questions are best; they suggest no particular answer and encourage
the candidate to talk at some length. Example is: “Tell me about any data
processing experience you have had?”
- Probing questions should be used. Example If a staff says he was responsible for
a certain activity, this must not be taken at its face value – further questioning is
needed.
- The interviewer should guide the course and subject matter of the interview, by
questions which introduce new topics, linking them to what has been dealt with
before.
- A large number of questions should begin with the words how or why.
Advantages
- Access to first class information
- Give adequate opportunity for interviewee to put forward opinions and
suggestions
- Make the interviewee feel as part of the system
- Help the analyst clear the panic and resistance, and eliminate fear and rumors
Disadvantages
15
- Demands patience an persistence especially when one has decided not to give
out information
Questionnaire:
- This is a document containing a number of standard questions, asked to a
large number of people in order to gather information.
- It enables analysts to gather attitude, beliefs, behaviors and characteristics
from key people who may be affected by the proposed system.
- It is used to identify an area for in-depth study of specific requirements.
Disadvantages
16
- Analysis of questionnaire requires a lot of time
Observation:
- This is a technique, which involves observing people in the act of executing their
duties.
- It gives analysts a clear understanding of the system in question.
Benefits:
Problems:
Research
Involve reviewing journals, periodicals and books that contain information relevant to the
system, attending professional meetings and seminars, discussing with other
professionals, visiting other installation to see relatively similar systems in actual use.
Advantages
- Get the exact information needed.
The method has the following drawbacks
a) It is time consuming
b) Documents are not always up to date.
17
System Analysis
- Involves the evaluation of the current system using the general information to ascertain
whether it meets the users current and projected needs and subsequent information of
what is to be done.
- The system analysts work in conjunction with the user to develop a logical model of the
system understanding and specifying in detail what an information system should do.zzz
- This involves modeling the users’ environment with functioning diagrams, data
diagrams, entity-relationship diagrams and the other tools of the system analysis.
Analysis Tools used during systems analysis
Functional diagram (FD)/ Functional hierarchy diagram/ hierarchy diagram
Data flow diagrams (DFD)
Entity relationship model (ER Model)
Data dictionary
Decision tables
Decision Trees
Functional diagram (FD):
- A functional diagram is used to show system’s functions that will be constructed and
the implementation process of data diagram.
- A function diagram only shows what to do not how to do. In a functional diagram, a
function is divided into many smaller functions of what the system intends to do.
- Functional diagram involves Constructing diagram is a process of division, from a
higher function to appropriate smaller functions.
- example:
18
19
Data Flow Diagrams
- Definition: Data Flow Diagramming is a means of representing a system at any level of
detail with a graphic network of symbols showing data flows, data stores, data processes,
and data sources/destinations.
20
Having to start documentation from scratch when the physical system changes
since the logical system remains the same when technology changes.
Being unable to evaluate system project boundaries resulting in a project of
inappropriate scope.
Symbols Description:
Data Flow Diagrams are composed of the four basic symbols shown below.
Process
External Entity
Data flow
Data store
The External Entity symbol represents sources of data to the system or destinations
(sink) of data from the system.
- They provide the net inputs to a system and receive the new outputs from the system.
21
- Data flow names should be descriptive adjectives and nouns. data flow names should
describe the data flow without describing the implementation of that data flow.
The Data Store symbol represents data that is not moving ( data at rest).
- Data stores represent the business people, objects and events about which we need to
store data.
- Are generic for physical files (index cards, desk drawers, magnetic disk, magnetic
tape, shirt pocket, human memory, price list etc.)
The Process symbol represents an activity that transforms or manipulates the data
(combines, reorders, converts, etc.).
1. Show data transformation or change. Data coming into a process must be "worked
on" or transformed in some way. Thus, all processes must have inputs and
outputs.
2. Are represented by a rectangle
3. Are named with one carefully chosen verb and an object of the verb (eg Verb
Purchasing Object of the verb Prepare orders)
4. Are numbered within the diagram as convenient. Levels of detail are shown by
decimal notation. For example, top level process would be Process 14, next level
of detail Processes 14.1
5. Should generally move from top to bottom and left to right.
- N.B In a DFDs omit processes that do nothing e.g. move or route data. For example,
omit a process that corresponds to a secretary receiving and simply forwarding a variety
of documents to their next location. Thus, only those processes that change data should
be included on a DFD.
22
1. Identify and list external entities providing inputs and receiving outputs from
system;
2. Identify and list inputs from and outputs to external entities;
3. Create a context diagram with system at centre and external entities sending and
receiving data flows;
4. Identify the business functions included within the system boundary;
5. Identify the data connections between business functions;
6. Confirm that the sent data is received and vice-versa;
Advantages of DFD’s
SOLUTION
The analysis of the CASE should lead us to the following points.
- The store is a source,
- the accounts department is a sink
23
- The supplier is both a source and a sink.
- The files involved are the approved suppliers file, pending order,
requisition and fulfilled orders file.
The DFD is as figure below
24
Example II
Draw a data flow diagram to represent the following system When an invoice is
received from a supplier, it is checked against a file of authorized purchases. If
the invoice does not match an authorized purchase, then it is returned to the
supplier with a querying letter. If the invoice matches an authorized purchase,
but is for an incorrect amount, then it is returned to the supplier with a
standard form. If the invoice
reconciles, a payment authorization is made out. A cheque is then sent to the
25
supplier. and the invoice and the authorization are filed
- Physical models what a system is or does and also how the system is physically and
technically implemented.
- Data modeling is a technique for organizing and documenting a system’s data.
- Entity-Relationship modeling is a technique which can be used to analyze an
organization’s data requirements.
- The aim is to obtain a model which is a logical view of an organization’s data and serve
as a basis for computer implementation.
- Analysis of the proposed system will have provided the analyst with details of all the
data items or attributes
- The process uses a diagrammatic representation of the proposed tables identifying the
table’s, attributes and entities.
2.1 Entities
- An entity is a class of persons, places, objects, events, or concepts about which we need
to capture and store data.
26
- For example, in a student administration database entity could be Students; the entity
type would therefore be Student, whilst a particular occurrence of the entity type could be
the Student Chris Davies.
Identifying entities:
1. Entities are representations of data that is being stored. So if a DFD has been draw
check there should be an entity corresponding to each data store or file on the
DFD.
2. Think about what groupings of data the user is going see.
3. An entity is something we are going to hold data about .
1. It must contain information of interest to the system i.e. the STUDENT entity
contains information concerning names, addresses, qualifications, exam results
etc.;
2. It must be possible to have more than one occurrence i.e. the environment itself
cannot be an entity as there is only one occurrence;
3. Each occurrence must be uniquely identifiable - there must be a code or key for
each entity instance.
27
Example - Student as an entity may have the following attributes:
Name:
Address:
DOB:
ADM Number:
2.4 Relationships
Cardinality
- A relationship’s cardinality defines the maximum number of entities of one type that
can be associated with an entity of another type.
- One to one
- One to many
- Many to many
28
A one-to-many (1:N) relationship is when for one instance of entity A, there are zero,
one, or many instances of entity B but for one instance of entity B, there is only one
instance of entity A. An example of a 1:N relationships is
A many-to-many (M:N) relationship is when for one instance of entity A, there are zero,
one, or many instances of entity B and for one instance of entity B there are zero, one, or
many instances of entity A. An example is employees may be assigned to no more than
three projects at a time; every project has at least two employees assigned to it.
Components of ER Diagrams:
Example:
- The entity types such as EMP and PROJ are depicted as rectangular boxes, and the
relationship types such as WORK-FOR are depicted as a diamond-shaped box.
- The attributes such as EMP#, NAME, and PHONE are depicted as ellipse.
- The cardinality information of relationship is also expressed. For example, the “1” or
“N” on the lines between the entity types and relationship types indicated the upper
limit of the entities of that entity type participating in that relationship.
29
Review Questions
Question 1. For each of the following pairs of rules, identify two entity types and
one relationship. State the cardinality and existence of the relationship in each
case. Draw the ER diagram.
30
Question 2: Draw an ER diagram for the following. Be sure to indicate the
existence and cardinality for each relationship.
A college runs many classes. Each class may be taught by several teachers, and a teacher
may teach several classes. A particular class always uses the same room. Because classes
may meet at different times or on different evenings, it is possible for different classes to
use the same room.
4. Decision Tables:
Used to explain confusing narratives with clear and structured definitions of what
happens under certain condition.
- Are graphics methods for describing the logic of a decision? They give a clear and
structured definition of what happens under certain circumstances.
- The conditions applying in the particular problem are set out and actions to be taken as
a result of any combination of the conditions arising are shown.
1. Condition stub:- contain a list of all possible conditions which could apply in a
particular problem.
2. condition entry:- contain the different combination of the condition, where each is
given a number of “Rule”
3. Action stub:- contain a list of the possible actions which could apply for any given
combination of conditions.
4. Action entry:- shows the actions to be taken for each combination of condition
Conditions Rules
Condition Stub Condition entry
31
Action / AternativeStub Action Entry
1. on the narrative, identify all the conditions which must be addressed before a
decision can be executed and enter them on the condition stub
2. Identify all actions, and enter them on the action stub.
3. Tabulate the number of rules
4. Make Y(yes) or N(no) for the conditions entry
5. Mark actions to be taken by an X in the Action entry.
Example 1.
Motorists who are 31 years old or over, with no accidents in the last ten years,
who hold a full license are accepted for full cover
Motorists who are 31 years old or over, with no accidents in the last ten years,
who hold a provisional license are accepted for third party cover
All others are rejected.
32
Conditions Rules
1 2 3 4 5 6 7 8
Age 31 yrs or over Y Y Y Y N N N N
Full license Y N Y N Y N Y N
Full cover X
Third party
X
Reject
X X X X X X
Example 2:
Students who have passed both the course work and exam for a Degree Course are
allowed to graduate. They are also issued their Degree scripts provided they have
completed payment of all fees. Students who have passed their course work only must
attend further exam coaching before sitting for the next exam. Those who have passed
their exam but not their course work are required to attend a semester of remedial classes.
Any student who has not paid his or her fees is issued a warning letter.
R1 R2 R3 R4 R5 R6 R7 R8
Passed course work? Y Y Y Y N N N N
Passed exam? Y Y N N Y Y N N
Paid all fees? Y N Y N Y N Y N
33
Issue graduate status X X - - - - - -
Issue degree script X - - - - - - -
Attend exam coaching - - X X - - X X
Attend remedial classes - - - - X X X X
Issue warning letter - X - X - X - X
Redundancy
Consider the following decision table which shows a procedure for dealing with
applicants for a motor car license.
Insurance 1 2 3 4
Age ≥ 25? Y Y N N
Clean license? Y N Y N
Normal terms X
Loaded premiums X
Refuse X X
The last two vertical rules lead to the same action an could therefore be combined
into one, since once an applicant is less than 21 yrs, the applicant is refused regardless
of the conditions of the applicants license hence question of clean license is redundant
in the last two rules.
Thus where two vertical rules have action entries which are exactly the same and
conditions differ in one respect only, they can be combined. Rule 3 & 4 can be
combined into one whereby it has a dash opposite the condition which is irrelevant.
Insurance 1 2 3
Age ≥ 25? Y Y N
Clean license? Y N -
Normal terms X
34
Loaded premiums X
Refuse X
Exercise
Students registered for technical exams by K.N.E.C are dealt with, according to the
following.
A student who passes the examinations and completes the coursework and
project satisfactorily is awarded a pass
If the coursework and/or the project are not satisfactory, the student is asked
to re-submit the unsatisfactory work as long as the exams have been passed.
A student who fails the examinations is deemed to have failed the whole
course, unless both the coursework and the project are satisfactory, in which
case the student is allowed to re-sit the examination.
i) Draw a full limited entry decision table which covers all the above rules
[8
Mks]
35
processor.
Decision trees
Are used when complex branching occurs in a structured decision process. Are also
useful when it is essential to keep a string of decision in a particular sequence..
Action 2
Condition A1 Condition X2
Condition X1 Action 3
Condition A2
Condition X2 Action 4
Example
Full licence Full cover
No accidents in 10yrs
Provisional
Full licence
Reject
Provisional
Reject
36
System flowcharts
Is a diagram which gives an overall view of data processing system by showing
tasks carried out, device and medium used by the system.
-it depict the logical flows of data and processing steps in an Information System.
They use symbols that are industry conventions standardized by the National
Bureau of Standards.
37
4.System Design
- The design of an information system produces the details that state how a system
will meet the requirements identified during systems analysis.
- System design can be categorised into two sections i.e Logical and Physical Design.
- Logical is concened with what is required. It defines all the input to the systems, the
output to be produced, the processes that must be performed and constrains to be
met.
- Physical design deals with how the requirements are satisfied. Describes how the
data is input, how it is stored and processed, how the output is produced, and the
constraints that are met.
- Design objectives
Produce information with all the desirable quality of accuracy, timeliness,
efficiency and robustness.
Develop a system which conforms with company policy.
To develop a system which will link with other subsystems
To design a realistic cost effective system with laid down constraints
To intensify system security inorder to ensure confidentiality of stoterd
data, prevent invations of privacy and minimize accidents.
38
Aspects to systems design.
(a) Design the Input : The types of forms to be used.
(b) Design the Output
- Is identifying reports and other output the system will produce
Usually, designers sketch the form or display(screen) as they expect it
to appear when the system is complete.
Site preparation
39
Software quality testing.
- Involves testing all the system aspects to ensure its ready for use and of quality.
Examples.
- Volume testing; to ensure the system can handle situations with a lot of work.
Product Operations
40
The extent to which access to software or data by unauthorised
persons can be controlled.
Product Revision
Product Transition
41
Training
- This involves the orientation of the users to give them confidence and minimize data
entry errors.
Thus training has advantages like
Enable staff to carry out the tasks required of them to support the system
Convince the user department staff that the new system is an effective and
efficient one.
Overcome fear of change and any feeling that they may be unable to cope with
the demands of the new system
Who should be trained
Amount of training required for various categories of personnel will depend upon the
complexity of the system i.e. how much someone’s job will change and the skills
presently available.
Basically all staff who will come into contact with the system need to be
trained. This include
i. Staff in data entry department e.g. operators and data preparation staff
ii. I.T department staff who support the operation of the system
iii. Management staff who make use of the output to make decisions
iv. The auditors who are responsible for determining whether or not an
organization assets are properly protected
v. Any other department staff affected by the new system.
NB/ Ensure that users of different skill levels and job interests are separated. Certain
trouble is the result of mixing novices with experts.
42
Methods of training
The options include
i) Handbooks- will be produced as part of, or as a development from the
systems specification
ii) Courses- Either full time or part time courses often run by vendors or
training institutions
iii) Lectures- covers general background knowledge or knowledge of specific
areas including advantages of the system
iv) Case studies and group discussion
NB/ Staff recruitment: if new staff is required to be hired for technical areas, then it can
be done alongside the training.
System Testing
Test log
43
Test plan
Test data
Test results (both expected and actual)
Test Plan
A test plan is required before testing starts. It serves as a guide to carry out the tests.
During preparation of the test plan, the objective must be to ensure that the component is
tested thoroughly.
Affected personnel from various departments are involved in a test walkthrough. This
apart from assisting to improve confidence, it ensure an error free system is implemented.
Each group has special contribution namely:
i. System managers check if the system conforms with the policy of the
organization
ii. System analyst check if objectives are being met and the system is error free
iii. Programmers debug the programs in case of errors
iv. Auditors check the controls in the system
v. Operation managers check on the operational weakness of the system
vi. User department ensure the system is tested to their satisfaction
Test data
44
Dummy data which contains valid and invalid data items created by user department
staff, analyst, programmers and auditors to determine expected resorts. The test data may
cover conditions such as:-
i. Range errors
ii. Format errors
iii. Zero or negative values where +ve values are allowed
iv. Non-integers in such fields as quantities
v. Transaction record which is not matched by a corresponding master file.
vi. Invalid combination e.g sex “M” title “Miss”
………E.T.C
Types of Tests.
Then the actual result from a given set of test data is compared with the expected result.
If the actual results agree with the expected results, it can be concluded that the codes
work as specified.
As with black box testing, the code is said to have passed the test if the actual and
expected results agree.
Alpha and beta testing
45
- Are acceptance tests conducted to enable the customer to validate all
requirements.
- Alpha testing is conducted at developers site by a customer. The customer uses
the software with the developer and recording errors and usage problem.
- It is conducted in a controlled environment.
- Beta testing is conducted at one or more customers site. It is a live testing in an
environment not contolled by the developer. The customer records and reports
difficulties and errors.
File Conversion
Conversion is the process of changing existing files into a format suitable for
the new system. Example conversion of the existing master file in to a
magnetic file.
System Changeover
Refers to the activities necessary to transfer operations from the old to the new
system.
The factors to consider when choosing a change over method are
i. Maintenance and operation of the new system
ii. Method of controlling errors
46
iii. Method of monitoring and evaluating the results of the system change
over
iv. Necessary communication required during the system changeover
v. Types of personnel responsible.
Methods.
1. Direct Changeover
Places the new system in operation and immediately ceases operation of the
old one.
Drawbacks:
i. it is extremely risky if the new system fails.
ii. Places the organization in a do or die situation
2. Pilot
Installation of the entire new system but implement first within a limited
segment of the organization. The new system is introducer in piecemeal to
different departments at a time until the entire system is converted.
47
Benefits:
i. Unexpected problems can be corrected before introducing the new system
throughout the organization.
ii. Allow system to be implemented quickly
iii. Less costly
iv. Causes minimum disruption
v. Allows for training of personnel in the new system
Drawbacks:
i. a system works well in one department may not work as well in others.
ii. Problems on ensuring that the part of system is implemented and
converted.
3. Parallel
Processes actual data on both the old system and new one. Both systems run
simultaneously in order to ex-check the results.
Benefits:
Drawbacks:
i. it requires all operations be performed twice, thus it doubles the employee
workloads.
ii. Additional cost of running two systems
iii. Cross checking is difficult and taxing
48
iv. If employees are not enough, then more staff needed for training
4. Phase-in
Implement portions of the new system one at a time until the entire new
system is functioning properly.
Benefits: limits the problems that can arise during changeover to those
associated with the current portion of the system.
Old System
Old System New System
New
System
1 2 3 1 2 3
Old System
New
System Ol Ol Ol Ol Ol N
d d d d d e
w
49
1 2 3 1 2 3
Ol N N N N N
d e e e e e
w w w w w
Post-implementation
- The activities which take place immediately after the implementation. cutover are
onsite support and the post-implementation review (PIR).
50
Ensure that the system is able to cope with the changing requirement of
organization
Provide information about system development and design which may be
beneficial to future projects.
-
- System review report
- The results of a system review would be used for system maintenance. Normally the
management, I.T department, users and auditors meet to review the system and come
up with the report. The report incudes
I. Introductory summary of the parts of the system which have poor
peformance.
II. Details of whether the systems objectives are still the same and whether
are being met.
III. Level of errors experienced by the system
IV. Changes which have been experienced e.g environment, organizational
policy and government laws
V. Whether the system is easy to use.
VI. Whether the system is taking advantage of latest technology
VII. Whether the security of the system are sufficiently tight
VIII. Report on the cost-benefit appraisal showing how actual cost and benfits
compare with the anticipated ones.
IX. Recommendation on how the system can be improved in order that any
short comings can be rectified.
Maintenance
- Maintenance is the ongoing process of monitoring and evaluating the new system.
- Involves identifying the need for change in the current system and making
appropriate change due to change in technology.
Types of Maintenance
51
1. Corrective maintenance: This type of maintenance deals with fixing or
correcting problems with the system. I.e. Problems that were not
identified during the implementation phase. An example improper
functionality of the system.
Problems of maintanance
Many systems developed by consultants and software houses do not have
source code made available to the organization
Maintenance work requires extra training of the personnel to do the job e.g
programming and operating system
Can cause more failures especially if documentation is poor.
52
Fine-tuning is an excellent way to introduce a new writer to the documentation,
while reducing the probability of serious errors in the future.
Adaptive Maintenance
Is maintenance, which is required because of changes in the environment of the
program.
Equipment configurations, such as, new computers, new terminals, local printers,
etc., usually to take advantage of improved features and/or pricing; normally
performed on a scheduled basis.
Data formats, file structures, etc.; may require extensive maintenance if same
were not properly designed and implemented. If changes are isolated to specific
modules, they may have less impact, if not, the effort can be both lengthy and
costly.
Corrective Maintenance
Is the correction of previously undiscovered system errors.
53
Design errors. Incomplete or faulty design due to incorrect, incomplete, or
unclear descriptions, or when the analyst does not fully understand the user's
needs.
Logic errors. Invalid tests, assumptions, instructions, and conclusions; faulty
logic flow, incorrect implementation; usually attributable to the designer or
previous maintainer. Often logic errors occur when user instructions and/or
unusual combinations of data are not tested during development or maintenance.
Writing Errors. Incorrect implementation or design logic or incorrect use of
special terms; caused by the writer. While they may be errors of negligence or
carelessness, they are usually the easiest to fix.
System Documentation
.
- This is a written record of all the steps taken during system development process.
It acts as an operational, reference and users manual for the installed system.
- Includes all the documents describing the system itself from the
requirements specification to the final acceptance test plan.
- Documents describing the design, implementation and testing of
a system are essential if the program is to be understood and
maintained.
- System documentation should include:
1. The requirements document and an associated rationale.
2. A document describing the system architecture.
3. For each program in the system, a description of the
architecture of that program.
4. For each component in the system, a description of its
functionality and interfaces.
5. Program source code listings. These should be commented where
the comments should explain complex sections of code and provide a
rationale for the coding method used.
6. Validation documents describing how each program is validated and
how the validation information relates to the requirements.
54
Porpose of documentation
Acts as a communication tool: Communicate facts about the system to
users
Aid to maintenance: Provision of all neccesary information to allow
corecton or mintenance of the system or its programs
Aid to understability of the system: Provision of operating instruction to
user and operaters
Aid of training: For training of new staff
Aid to development process: Acts as a reference material for the system
55
INPUT CONROLS
To Ensure there has been a complete and accurate conversion from the
source document to the input media
are composed of
1. Transaction code (in any organization , data represent people not
events, assets, object etc)
2. Form design:-the form can be designed to force more legible entries
by use of the individual blocks for each character to be recorded.
3. Verification : source document can be proof read by another clerk to
improve accuracy
4. Control totals: are prepared for specific batches of data to minimize
loss of data when transported from one location to another.
5. control total: are prepared for specific batches of data minimize loss of
data transported from one location to another
6. Other control: use check digit for important code such as acc No
PROCESSING CONTROLS
These are procedures incorporated in the programs to ensure there is
complete and accurate processing of the data that has been entered into
the system.
An edit run Test that consists of a series of checks is created. E.g.
program checks
Arithmetical accuracy is performed by limit checks and overflow tests.
Checks are made to ensure that the correct files are being proceed.
OUTPUT CONTROL
Output control are established as final checks on the accuracy and completeness of
the processed information . The following control procedures are related to output.
1. Output should be immediately be rooted to a controlled area and distributed
only by authorized person.
56
2. Output control totals should be reconciled to input control totals to ensure that
no date has been changed lost or added during processing or transmission
3. All vital forms (e.g paychecks passbook etc) should be pre-numbered and
accounted for
4. Any highly sensitive output that should not be accessible by computer
centre should be generated via an output device in a secured location.
5. screening conducted to detect errors
Control of errors wound be part of output control which should specify
how error should be handled
Other controls are
1. Organizational control
Control to ensure that proper segregation of duties in computer department
and that they achieve the appropriate specialization required for operation
efficiency.
2. Documentation control
It shows the managers, auditor, users on how the system is supposed to be and
how it should perform.
3 Management controls
concerned with system planning and evaluation of the system performance
from both the equipment and personnel
4 Sociological control
Ensure that computerization do not dehumanize the staff
5 Technological control
Is meant to eliminate the unfair deal of acquiring less competitive
equipments.
6 Environmental controls. Ergonomics effects.
The computer room has to be dust free, the correct temperature has to be
maintained and should also have the correct power supply without power
interruption
Objectives of system development control
1 To ensure that only beneficial systems are developed
57
2 To ensure that suitable operations and administration control are built in system
design
3 Ensure users acquired the understanding of the new system
4 Ensure the system is properly tested
5 Ensure proper documentation is maintained
6 Ensure system and program are well maintained
Auditing
Auditor:-is a person who determines whether or not an organization assets are properly
protected.
For it to be successful the auditor should be familiar with
a) Organization and responsibilities of the I.T department
b) Data correction and validation techniques
c) File organization and processing techniques
d) System controls
e) Methods of control of system, development, programming and
operation activities
Audit Objectives
1 Ensure that an adequate system of controls is implemented and used.
2 Determine whether resources are being used in a cost effective manner.
3 Check to see that assets are properly safeguarded and used in a proper manner.
4 Review the integrity, reliability and efficiency of the information system and the
financial report it produces
Auditing techniques
The three most common methods of auditing in a computer are
I. Auditing around the computer
II. Auditing through the computer
III. Auditing with the computer
58
Concentrates on review of inputs and output documents and disregards
the way in which such results are achieved by processing (“the computer
is viewed as a block box”) thus auditor do not review the computer
system and program.
The auditor select input and compare them against the appropriate
output and the vice versa if they matched and proved to be accurate its
assumed that the system of controls is operational and working properly
The technique is adopted if
I. The system is such that adequate check can be made without examination of
computer processing.
II. Auditors knowledge of data processing is insufficient for him to carry out an
effective audit.
Advantages
I. There is little risk in tampering with the live data
II. Little technical training of the auditor is required
III. It is simple straight forward and easily understood
IV. Cost of audit resources are generally low
Disadvantages
I. Many computer system are voluminous for proper manual testing
II. No means are provided by which the auditor got involved and gain firm
understanding of the computer system
III. It ignores the system of controls and thereby fails to recognize potential errors and
weakness within the system
IV. It does not make use of the computer
V. It does not really achieve the auditors goals
59
2. Actual testing of computing programs ,logic and programmed
control
One of the key tool in applying this technique is the preparation of a series of test
transaction referred to as test deck or test packs :-it include both valid & invalid
transactions.
Advantages
1. Help auditor become more involved in the system
2. Works as an aid in making compliance tests and aid in the evaluation of the
programmed controls
3. increase services to client since controls and operation are checked
4. Test results are readily identifiable and can be as a measure of internal proceeding
reliability.
5. utilized the computer as a tool
Disadvantage
Require computer time
Require more technique knowledge
Represents only a limited test of the system test deck
60
Data outside specified limit e.g overdue
acc. ,non-active records, payment above certain
values etc
5. Analysis of file contents e.g depts. or type of customers,
payments by size or by type and stock holdings by
value
6. Comparison of two files (reporting any differences )to
verify the accuracy of file maintenance.
SYSTEM OBSOLESCENCE
- An obsolete information system is one that has reached the end of its
economically useful period and should be replaced by another information system
- or one that is not used because its function are no longer required by the end
users, or the hardware, software on which it depend become out of date
Sign of a system which is nearing the end of it economic life
1. High cost in maintenance of the system
2. Increased operation costs and lags in execution times
3. A software package is available that will provide the same or additional services
as well or better than the current system
4. New technology developments in hardware provide a means to perform the same
services in a more efficient manner
5. When the users define additional requirements that cannot be easily
accommodated in the existing system
Project failures
Project failure is the worst experience for a system analyst, though not without a good
experience, such as experience should be avoided in future.
An information system project is said to have failed if
1. The resulting information system does not meet the end users needs.
2. If the cost exceed the budget
3. If the deadline for system development is not met
61
Causes of project failures
When finally a project fails the likely causes include
1. Unidentified requirement or lack of proper objective.
2. Poor design choices.
3. Insufficient testing or inadequate testing procedures.
4. unrealistic end user expectation
5. Schedule delays due to unanticipated factors.
6. Poor monitoring and control of progress
7. Personality conflict among the team members
8. Insufficient feedback and feed forward
9. Lack of user participation.
10. Lack of management support.
Review questions
1 An important aspect of input and output design is Form design. List five
factors that should be considered in Form design.
i) Correctness
ii) Integrity
iii) Maintainability
62
5
(i) Define the term maintenance
(ii) Describe the three types of maintenance
(iii) Outline the four problems of maintenance
6
(i) Explain the term system obsolescence
(ii) List any six causes of project failure
7 The outcome of a complete system design is a system specification
i. Outline FOUR functions of the document
ii. ii Explain the contents of system specification
- Site preparation. Involves putting up new structures that will accommodate the system.
- System testing. Examples.
- Stress testing. Testing whether the system can handle situations with a lot of work.
- Functionality testing. Does the intended
- Usability testing. Whether it can be used easily by all users
- User training. Orientation of the users to give them confidence and minimise data
entry errors.
- File conversion. Converting existing files in to a format suitable for the new system.
63
The Classic Life Cycle
Systems Engineering:
Analysis:
Involves understanding and specifying in detail what an information system should do.
64
Design:
Spiral model.
65
- The spiral seeks to improve on the waterfall model and other models by combining
their useful features combining some characteristics of the waterfall and prototyping
approaches.
- Takes the form of a spiral and includes a well defined risk analysis activity.
- Objective setting. Specific objectives for the phase constraints for the process and the
products are identified. A detailed management plan ids drawn for the phase.
- Risk assessment and reduction. In this stage of the loop, project risks are identified,
for each detailed analysis is carried out, steps are taken to reduce risk.
- Planning. The project is reviewed and a decision made on whether to continue with a
further spiral in the model. If to continue plans are drawn up for the next phase of the
project.
66
Cumulative
cost
Progress
through
Determine steps Evaluate alternatives,
objectives, identify, resolve risks
alternatives,
constraints
(OAC) Risk
Assessment
Concrete
Specification
OAC Risk
Assessment
Abstract
Specifcation
OAC Risk Risk
Requirements Assessment Control
Risk
OAC Control
Risk
Commit Control
Review
partition Requirements
Concept of
Plan
Operation
Requirements
Abstract Specification Abstract
Plan Specification Concrete
Requirements Specification
Validation
Concrete Specification
Plan
Abstract Specification
Validation
Software Concrete
Plan next phases Development Plan Specification Validation Develop, verify
and Verification next-level product
67
Risk
Assessment Req. Change
Requirements Risk
Assessment
Verify
Design
Risk
Assessment
Verify Implementati
on
Test
Adds a Risk
Analysis
step to each phase Operations
Retirement
Prototyping.
Prototyping Paradigm
68
A prototype is only a working model that is refined un till it meets all users
requirements.
Engineer product
SSADM
69
STRUCTURED SYSTEM ANALYSIS AND DESIGN METHODOLOGY (SSADM)
Is a data driven methodology whose objectives is to provide tools and procedures which enable
production of computer systems which provide what people want, robust and capable of
amendments to cope with future changes.
Consists of six phases each subdivided into sub-phases
70
Assist user in selection
Set performance objectives
This phase can be carried out either as part of feasibility study or as a full study.
In a feasibility study the various options for implementation are presented to users which include
options such as a centralized, distributed batch processing or online system.
In a full study, the options tend to be more detailed as users are made aware of the implications of
any option on issues such as staffing levels and skills, other resourses required, standard of
service provided etc.
6) Physical Design
Design system test plan
Create program specification
Create operating schedule
71
Create file and database definitions
Write user manuals
This phase is concerned with the production of a plan for building and testing the system,
program specifications, operating procedures and file layouts.
These aspects are analyzed on papers and verified to maximize performance before developed on
computer. Alternatively the prototype in (5) is developed so that it conforms to acceptable
performance criteria.
Lastly documentation is consolidated and checked for completeness. This includes test plans,
operation guides, implementation plan and user guides.
NB/ SSADM is expected to be used along with general computer CASE tools eg 4GL.s packages,
auto-mate and data-mate which help in drawing ER-models, DFD’s and data dictionary. It
recommends quality assurance reviews based on structured walkthrough.
72