• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18
  19. 19
    19
  20. 20
    20
  21. 21
    21
  22. 22
    22
  23. 23
    23
  24. 24
    24
  25. 25
    25
  26. 26
    26
  27. 27
    27
  28. 28
    28
  29. 29
    29
  30. 30
    30
  31. 31
    31

Systems Life Cycle. The main disadvantage of the traditional waterfall method is with the sequence of stages, in that often the system cannot be tested or run until it is fully complete.

Extracts from this document...

Introduction

SYSTEMS

ANALYSIS

1. Traditional Systems Life Cycle

1.1 Introduction

1.2 Shortcomings

1.3 Stages

1.3.1 Initiation

1.3.2 Feasibility

1.3.3 Investigation and Analysis

1.3.4 Design

1.3.5 Implementation

1.3.6 Testing

1.3.7 Maintenance

2.  SSADM

2.1 Introduction

2.2 Advantages / Disadvantages

2.3 Suitability

2.4 Stages

2.4.1 The Feasibility Study

2.4.2 Investigation of Current System

2.4.3 Business Systems Options (BSOs)

2.4.4 Requirements Specification

2.4.5 Technical System Options (TSOs)

2.4.6 Logical Design

2.4.7 Physical Design

2.5 Tools and Techniques

2.5.1 Data Flow Diagrams (DFD)

2.5.2 Entity Relation Diagrams

3. DSDM

3.1 Introduction

3.2 Advantages / Disadvantages

3.3 Suitability

3.4 Stages

3.4.1 Functional Model Iteration

3.4.2 Design and Build Iteration

3.4.3 Implementation

3.5 Tools and Techniques

3.5.1 CASE Tools

3.5.2 Facilitated Workshops

4. Fact-finding

4.1 Document analysis

4.2 Observation

4.3 Questionnaire

4.4 Interviews

4.5 Data Recording Techniques

5. Existing System

5.1 Interview Transcript – Restaurant Manager

5.2 DFDs

5.2.1 Context Diagram

5.2.2 Level 1 Diagram

5.3 ERD

6. Design Specification

6.1 The problems associated with the current system

6.2 New system requirements

6.3 Business system Options

6.3.1 Personal Digital Assistants (PDA)

6.3.2 Microsoft Access Database

6.3.3 Excel

6.3.4 Selected Option

6.4 Technical System Option

6.5 Diagrams

6.5.1 Context Diagram

6.5.2 Level 1 Data Flow Diagram & Explanation

6.5.3 Entity Relationship Diagram with Explanation

6.6 Data dictionary

6.7 Input/output formats

6.7.1 Customer-Order - Input

6.7.2 Menu-Ingredients - Input

6.7.3 Business-Order - Input

6.7.5 Menu - Output

6.7.6 Purchase Order - Output

6.8 Structured English

6.9 Flowchart

7. Evaluation

7.1 Strengths of the System

7.2 Weaknesses of the System

7.3 Potential Improvements

7.4 Personal Performance

8. Bibliography

8.1 Books

8.2 Websites

8.3 Software

1. Traditional Systems Life Cycle

1.1 Introduction

A Systems Life Cycle describes the process in which a Business Information System is fully developed. It attempts to create a structured framework in order to establish more control of this process.

The traditional approach is a waterfall method meaning a sequence of stages in which the output of each stage becomes the input for the next. A traditional systems life cycle has a number of different stages. The following diagram shows these:-

image00.png

1.2 Shortcomings

The main disadvantage of the traditional waterfall method is with the sequence of stages, in that often the system cannot be tested or run until it is fully complete.

...read more.

Middle

3.5.1 CASE Tools

CASE tools enable automation of much of a system’s development and can better adjust to changes in user requirements. Importantly, by enabling the modelling of systems using standardised notations and techniques, a CASE tool can often produce prototype code to help programmers.

3.5.2 Facilitated Workshops

Workshops are the process of interaction with a group of members from the organisation. Rather than picking the senior staff members off one by one, a process of consultation and direct relationships in workshops enable better interaction and teamwork. This can pave the way for fewer contradictions during the system development process.

4. Fact-finding

4.1 Document analysis

Documentary evidence is vital to the systems analyst in order that he/she can start designing a realistic solution. The study of the documents listed below is helpful as an insight into how the organisation works. However, other fact-finding methods are essential to complete the picture.

  • Company policy
  • Business plan
  • Organisation chart
  • Sales and Accounts records / reports
  • Invoices
  • Complaint forms
  • Previous System Analysis reports (if applicable)

One of the major drawbacks from this method is it’s more possible to carry on something that was not working into the new system.

4.2 Observation

Direct contact with the staff and observation of them using the current system brings about a better understanding of the true needs of the organization. For example, one may spot mistakes which are frequently being repeated by a number of staff. When this is found, we can build a means of avoiding it in the system.

(http://www.pubmedcentral.nih.gov/articlerender.fcgi?artid=1839513 Accessed 12th Mar 09)

4.3 Questionnaire

A questionnaire must have questions which are clear and concise. It is most suitable when only a small amount of information needs to be obtained from the masses. An advantage over other methods is that the responses are often confined to objectives we have set.

...read more.

Conclusion

I initially found the use of flow charts particularly difficult in SSADM because of the use of shapes that I had not become accustomed to. However through the help of a website and a book from the college library, I was able to come overcome this. Even though SSADM was designed to be a single-structured approach there are in fact different takes, views and versions of SSADM. This made my research long and cumbersome and as I result I found it really difficult to finish the assignment on time.

I am disappointed that I did not have time to focus more on the security features of the system. Built in functions of Access can provide password protection before being able to enter the system an VBA code could be used to turn off all modification for certain user groups.  

8. Bibliography

8.1 Books

  • Yeates, D. & Wakefield, T. Systems Analysis and Design (2004) Second Edition
  • Long, L. & N. Computers: Information Technology in Perspective (2005) Twelfth Edition, Pearson Education
  • The DSDM Consortium, DSDM: Business Focused Development (2003) Second Edition, Pearson Education
  • Bowman, K. Systems Analysis: A Beginner's Guide (2004) Hampshire: Palgrave Macmillian
  • Weaver, P., Lambrou, N. & Walkley, M. Practical SSADM 4+: A Complete Tutorial Guide (1998) Second Edition, London: Pitman Publishing

8.2 Websites

  • http://www.getahead-direct.com/gwbadfd.htm [Accessed 09 January 2009]
  • http://www.dsdm.org/atern/techniques/facilitated-workshops/[Accessed 15  February 2009]
  • http://www.codeproject.com/KB/architecture/dsdm.aspx [Accessed 16 December 2008]
  • http://www.comp.glam.ac.uk/pages/staff/tdhutchings/chapter4.html[Accessed 05  January 2009]
  • http://www.grin.com/e-book/106034/the-use-of-ssadm-structured-systems-analysis-and-design-methodology-as[Accessed 03  February 2009]
  • http://www.ehow.com/facts_4827300_advantages-disadvantages-microsoft-access.html[Accessed 20 March 2009]
  • http://www.ehow.com/facts_4842302_difference-between-microsoft-access-excel.html[Accessed 20 March 2009]
  • http://www.oracle.com/technology/pub/articles/gagne_access.html[Accessed 20 February 2009]

8.3 Software

  • Microsoft® Student 2008 [DVD]. Redmond, WA: Microsoft Corporation, 2007

Page  of


[1] Analysis and Design of Information Systems p. 51

[2]http://www.smartdraw.com/tutorials/software/ssadm/tutorial_03.htm [Accessed 20th Jan 2008]

...read more.

This student written piece of work is one of many that can be found in our University Degree Information Systems section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Information Systems essays

  1. The intention of this study is to analyze and explore the emerging field of ...

    Second-generation technologies include Globus [TGP] and Legion. The second generation provided the interoperability that was required for large-scale computation. However as other aspects of the grid were explored it became apparent that it was desirable to use existing components and information resources.

  2. Use the Internet to find ways that some companies currently destroy their data before ...

    He further explains that this program runs on Windows computers and offers six methods to overwrite data, including a Defense Department standard (DoD 5220.22-M) that can overwrite the disk three times, as well as a method called PRNG Stream Wipe, which can make a user-defined number of disk overwrites using randomly generated characters.

  1. The case study I have chosen is Northwestern Business College. Northwestern Business College is ...

    These are the services/applications that the case study will focus on. Ranking Service / Application Impact of Disruption 1 File System High 2 Student Record System(SRS) High 3 Email High 4 Goldmine High 5 Voicemail Medium 6 Internet Medium 7 Library Catalogue Low This case study has identified the following

  2. The Treasury department is the financial hub of the government of ST. Vincent and ...

    * The risk involve when these failures occur. * The expected loss from these failures. Figure 1 The partial WAN above was developed by the Treasury department. A change of government brought about the creation of a new ministry called Ministry of Telecommunication.

  1. Organisational Information Systems. In this assignment I have chosen the accounting department, I ...

    The software also gives the user reminders of the important dates that certain tasks are to be done such as submitting the tax, payment due discounts etc. The cost of the software can vary from £5,000 to £33,000 1.

  2. NTUC case study. On June 1, 2003, Income succeeded in the migration of ...

    In all, the HP 3000 system experienced a total of three major hardware failures, resulting in a total of six days of complete downtime. That was not enough. The COBOL programs that were developed in the early 1980s and maintained by Income's in-house IT team also broke multiple times, halted the systems, and caused temporary interruptions.

  1. IT Project - Over the last month we have researched and planned how ...

    The database application will be implemented one location at a time once the initial testing has been completed in the first location. The coordination of the wireless network install will be timed so that, each location is online just before its rollout of the database application.

  2. Facebook and its Multimedia elements

    user scan will be able to find friends from the same school, college, office, same class, or same location from where user are staying and more through Facebook friend finder. Moreover, Facebook also brings positive impact on marketing, networking wise, as we know Facebook is well known so its one of the best way of publitising buisness and many more.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work