• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18
  19. 19
    19
  20. 20
    20
  21. 21
    21
  22. 22
    22
  23. 23
    23
  24. 24
    24
  25. 25
    25
  26. 26
    26
  27. 27
    27
  28. 28
    28
  29. 29
    29
  30. 30
    30
  31. 31
    31

Systems Life Cycle. The main disadvantage of the traditional waterfall method is with the sequence of stages, in that often the system cannot be tested or run until it is fully complete.

Extracts from this document...

Introduction

SYSTEMS

ANALYSIS

1. Traditional Systems Life Cycle

1.1 Introduction

1.2 Shortcomings

1.3 Stages

1.3.1 Initiation

1.3.2 Feasibility

1.3.3 Investigation and Analysis

1.3.4 Design

1.3.5 Implementation

1.3.6 Testing

1.3.7 Maintenance

2.  SSADM

2.1 Introduction

2.2 Advantages / Disadvantages

2.3 Suitability

2.4 Stages

2.4.1 The Feasibility Study

2.4.2 Investigation of Current System

2.4.3 Business Systems Options (BSOs)

2.4.4 Requirements Specification

2.4.5 Technical System Options (TSOs)

2.4.6 Logical Design

2.4.7 Physical Design

2.5 Tools and Techniques

2.5.1 Data Flow Diagrams (DFD)

2.5.2 Entity Relation Diagrams

3. DSDM

3.1 Introduction

3.2 Advantages / Disadvantages

3.3 Suitability

3.4 Stages

3.4.1 Functional Model Iteration

3.4.2 Design and Build Iteration

3.4.3 Implementation

3.5 Tools and Techniques

3.5.1 CASE Tools

3.5.2 Facilitated Workshops

4. Fact-finding

4.1 Document analysis

4.2 Observation

4.3 Questionnaire

4.4 Interviews

4.5 Data Recording Techniques

5. Existing System

5.1 Interview Transcript – Restaurant Manager

5.2 DFDs

5.2.1 Context Diagram

5.2.2 Level 1 Diagram

5.3 ERD

6. Design Specification

6.1 The problems associated with the current system

6.2 New system requirements

6.3 Business system Options

6.3.1 Personal Digital Assistants (PDA)

6.3.2 Microsoft Access Database

6.3.3 Excel

6.3.4 Selected Option

6.4 Technical System Option

6.5 Diagrams

6.5.1 Context Diagram

6.5.2 Level 1 Data Flow Diagram & Explanation

6.5.3 Entity Relationship Diagram with Explanation

6.6 Data dictionary

6.7 Input/output formats

6.7.1 Customer-Order - Input

6.7.2 Menu-Ingredients - Input

6.7.3 Business-Order - Input

6.7.5 Menu - Output

6.7.6 Purchase Order - Output

6.8 Structured English

6.9 Flowchart

7. Evaluation

7.1 Strengths of the System

7.2 Weaknesses of the System

7.3 Potential Improvements

7.4 Personal Performance

8. Bibliography

8.1 Books

8.2 Websites

8.3 Software

1. Traditional Systems Life Cycle

1.1 Introduction

A Systems Life Cycle describes the process in which a Business Information System is fully developed. It attempts to create a structured framework in order to establish more control of this process.

The traditional approach is a waterfall method meaning a sequence of stages in which the output of each stage becomes the input for the next. A traditional systems life cycle has a number of different stages. The following diagram shows these:-

image00.png

1.2 Shortcomings

The main disadvantage of the traditional waterfall method is with the sequence of stages, in that often the system cannot be tested or run until it is fully complete.

...read more.

Middle

3.5.1 CASE Tools

CASE tools enable automation of much of a system’s development and can better adjust to changes in user requirements. Importantly, by enabling the modelling of systems using standardised notations and techniques, a CASE tool can often produce prototype code to help programmers.

3.5.2 Facilitated Workshops

Workshops are the process of interaction with a group of members from the organisation. Rather than picking the senior staff members off one by one, a process of consultation and direct relationships in workshops enable better interaction and teamwork. This can pave the way for fewer contradictions during the system development process.

4. Fact-finding

4.1 Document analysis

Documentary evidence is vital to the systems analyst in order that he/she can start designing a realistic solution. The study of the documents listed below is helpful as an insight into how the organisation works. However, other fact-finding methods are essential to complete the picture.

  • Company policy
  • Business plan
  • Organisation chart
  • Sales and Accounts records / reports
  • Invoices
  • Complaint forms
  • Previous System Analysis reports (if applicable)

One of the major drawbacks from this method is it’s more possible to carry on something that was not working into the new system.

4.2 Observation

Direct contact with the staff and observation of them using the current system brings about a better understanding of the true needs of the organization. For example, one may spot mistakes which are frequently being repeated by a number of staff. When this is found, we can build a means of avoiding it in the system.

(http://www.pubmedcentral.nih.gov/articlerender.fcgi?artid=1839513 Accessed 12th Mar 09)

4.3 Questionnaire

A questionnaire must have questions which are clear and concise. It is most suitable when only a small amount of information needs to be obtained from the masses. An advantage over other methods is that the responses are often confined to objectives we have set.

...read more.

Conclusion

I initially found the use of flow charts particularly difficult in SSADM because of the use of shapes that I had not become accustomed to. However through the help of a website and a book from the college library, I was able to come overcome this. Even though SSADM was designed to be a single-structured approach there are in fact different takes, views and versions of SSADM. This made my research long and cumbersome and as I result I found it really difficult to finish the assignment on time.

I am disappointed that I did not have time to focus more on the security features of the system. Built in functions of Access can provide password protection before being able to enter the system an VBA code could be used to turn off all modification for certain user groups.  

8. Bibliography

8.1 Books

  • Yeates, D. & Wakefield, T. Systems Analysis and Design (2004) Second Edition
  • Long, L. & N. Computers: Information Technology in Perspective (2005) Twelfth Edition, Pearson Education
  • The DSDM Consortium, DSDM: Business Focused Development (2003) Second Edition, Pearson Education
  • Bowman, K. Systems Analysis: A Beginner's Guide (2004) Hampshire: Palgrave Macmillian
  • Weaver, P., Lambrou, N. & Walkley, M. Practical SSADM 4+: A Complete Tutorial Guide (1998) Second Edition, London: Pitman Publishing

8.2 Websites

  • http://www.getahead-direct.com/gwbadfd.htm [Accessed 09 January 2009]
  • http://www.dsdm.org/atern/techniques/facilitated-workshops/[Accessed 15  February 2009]
  • http://www.codeproject.com/KB/architecture/dsdm.aspx [Accessed 16 December 2008]
  • http://www.comp.glam.ac.uk/pages/staff/tdhutchings/chapter4.html[Accessed 05  January 2009]
  • http://www.grin.com/e-book/106034/the-use-of-ssadm-structured-systems-analysis-and-design-methodology-as[Accessed 03  February 2009]
  • http://www.ehow.com/facts_4827300_advantages-disadvantages-microsoft-access.html[Accessed 20 March 2009]
  • http://www.ehow.com/facts_4842302_difference-between-microsoft-access-excel.html[Accessed 20 March 2009]
  • http://www.oracle.com/technology/pub/articles/gagne_access.html[Accessed 20 February 2009]

8.3 Software

  • Microsoft® Student 2008 [DVD]. Redmond, WA: Microsoft Corporation, 2007

Page  of


[1] Analysis and Design of Information Systems p. 51

[2]http://www.smartdraw.com/tutorials/software/ssadm/tutorial_03.htm [Accessed 20th Jan 2008]

...read more.

This student written piece of work is one of many that can be found in our University Degree Information Systems section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Information Systems essays

  1. Office systems project

    It also covers the justification of Information Systems development methodology like Rapid Application Development [RAD], Dynamic System Development Method [DSDM] and the testing procedures used. The main technology used to derive at the end result of this project is Microsoft Access.

  2. individual project

    cards; both types are often referred to as smart card for microprocessor cards, whereas chip card can include memory cards." (Hendry, 1997, p4) Below is a diagram of a smart or chip card. 2.1 The origins and the development of smart cards There is some debating involved into actually determining

  1. Use the Internet to find ways that some companies currently destroy their data before ...

    He further explains that this program runs on Windows computers and offers six methods to overwrite data, including a Defense Department standard (DoD 5220.22-M) that can overwrite the disk three times, as well as a method called PRNG Stream Wipe, which can make a user-defined number of disk overwrites using randomly generated characters.

  2. The case study I have chosen is Northwestern Business College. Northwestern Business College is ...

    These are the services/applications that the case study will focus on. Ranking Service / Application Impact of Disruption 1 File System High 2 Student Record System(SRS) High 3 Email High 4 Goldmine High 5 Voicemail Medium 6 Internet Medium 7 Library Catalogue Low This case study has identified the following

  1. Facebook and its Multimedia elements

    Facebook also allows user to join or like an particular group easily.Users can like, unlike, create or edit the particular group.Users also can create event such as an invitation to a birthday party where users can add the destination, time,location, and even invite the person that the users desire only.Facebook

  2. Organisational Information Systems. In this assignment I have chosen the accounting department, I ...

    The software also gives the user reminders of the important dates that certain tasks are to be done such as submitting the tax, payment due discounts etc. The cost of the software can vary from £5,000 to £33,000 1.

  1. NTUC case study. On June 1, 2003, Income succeeded in the migration of ...

    In addition, the IT team found developing new products in COBOL to be quite cumbersome and the time taken to launch new products ranged from a few weeks to months. At the same time, transaction processing for policy underwriting was still a batch process and information was not available to agents and advisors in real-time.

  2. IT Project - Over the last month we have researched and planned how ...

    In addition, we will need to order high speed internet access at each location. Each wireless access point will need to be configured for security using encryption and password protection at the time of installation and setup.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work