Lecturer: Mr. Tri Djoko Wahjono, Ir, M.Sc.
By: Veronica Ong (1701317660) of class 01PCT
Task: Chapter Review of Chapter 12 from the Textbook Discovering Computers.
1. What is system
development, and what are the system development phases?
As a computer user in a business, you someday may
participate in the modification of an existing system or the development of a
new system. Thus, it is important that you understand system development.
System development is a set of activities used to build an information system.
Some system development activities may be performed concurrently. Others are
performed sequentially. Depending on the type and complexity of the information
system, the length of each activity varies from one system to the next. In some
cases, some activities are skipped entirely. System development activities
often are grouped into larger categories called phases. This collection of
phases sometimes is called the system development life cycle (SDLC).
Many SDLCs contain five phases: planning, analysis, design, implementation, operation, support, and security. Each phase of system development consists of a series of activities, and the phases form a loop. The loop forms when the operation, support, and security phase points to the planning phase. This connection occurs when the information system requires changing. A variety of situations can lead to a change in the information system. For example, users may want information in a different format, or an unauthorized user may have gained access to the information system. When change occurs or is required, the planning phase for a new or modified system begins and the SDLC starts again. In theory, the five system development phases often appear sequentially. In reality, activities within adjacent phases often interact with one another – making system development a dynamic iterative process. In the planning phase, there are 4 activities to be done, they are, review project requests, prioritize project requests, allocate resources, and form project development team. In the analysis phase, there are 2 activities to be done, which are conduct preliminary investigation, and perform detailed analysis activities (study current system, determine user requirements, recommend solutions). In the design phase, we acquire hardware and software if necessary, and we develop details of system. In the implementation phase, there are 4 activities, develop programs if necessary, install and test new system, train users, and convert to new system. In the operation, support, and security phase, there are 3 activities, which are perform maintenance activities, monitor system performance, and assess system security.
Many SDLCs contain five phases: planning, analysis, design, implementation, operation, support, and security. Each phase of system development consists of a series of activities, and the phases form a loop. The loop forms when the operation, support, and security phase points to the planning phase. This connection occurs when the information system requires changing. A variety of situations can lead to a change in the information system. For example, users may want information in a different format, or an unauthorized user may have gained access to the information system. When change occurs or is required, the planning phase for a new or modified system begins and the SDLC starts again. In theory, the five system development phases often appear sequentially. In reality, activities within adjacent phases often interact with one another – making system development a dynamic iterative process. In the planning phase, there are 4 activities to be done, they are, review project requests, prioritize project requests, allocate resources, and form project development team. In the analysis phase, there are 2 activities to be done, which are conduct preliminary investigation, and perform detailed analysis activities (study current system, determine user requirements, recommend solutions). In the design phase, we acquire hardware and software if necessary, and we develop details of system. In the implementation phase, there are 4 activities, develop programs if necessary, install and test new system, train users, and convert to new system. In the operation, support, and security phase, there are 3 activities, which are perform maintenance activities, monitor system performance, and assess system security.
2. What are
guidelines for system development?
System development should follow three general guidelines:
group activities into phases, involve the users, and define standards.
1. Group activities or tasks into phases: Many SDLCs contain
the same phases shown in Figure 12-1. Others have more or fewer phases.
Regardless, all SDLCs have similar activities. For example, Figure 12-1 shows
the ‘Develop programs’ and the ‘Install and test new system’ activities in the
Implementation phase. Some SDLCs separate these activities in an additional
phase called Construction and Testing. Other differences among SDLCs are the
terminology they use, the order of their activities, and the level of detail
within each phase.
2. Involve users: Users include anyone for whom the system
is being built. Customers, employees, students, data entry clerks, accountants,
sales managers, and owners all are examples of users. You, as a user, might
interact with an information system at your bank, library, grocery store,
fitness center, work, and school. The system development team members must
remember they ultimately deliver the system to the user. If the system is to be
successful, the user must be included in system development. Users are more apt
to accept a new system if they contribute to its design.
3. Define standards: Standards are sets of rules and
procedures an organization expects employees to accept and follow. Standards
help people working on the same project produce consistent results. For
example, one programmer might refer to a product number in a database as a
product ID. Others may call it a product identification number, product code,
and so on. If standards are defined, then everyone involved uses the same
terms, such as product number. Standards often are implemented by using a data
dictionary.
3. What are project
management, feasibility assessment, documentation, and data and information
gathering techniques important?
Project management is the process of planning, scheduling,
and then controlling the activities during system development. The goal of
project management is to deliver an acceptable system to the user in an
agreed-upon time frame, while maintaining costs. In smaller organizations or
projects, one person manages the entire project. For larger projects, the
project management activities often are separated between a project manager and
a project leader. In this case, the project leader manages and controls the
budget and schedule of the project, and the project manager controls the
activities during system development. Project leaders and/or project managers
are part of the project team. If the systems analyst is not the project
manager, he or she works closely with the project manager. Some organizations
use extreme project management to speed development time. Extreme project
management is a team-driven project management approach, in which a project
leader is more of a participant and facilitator than a manager during the project.
To plan and schedule a project effectively, the project leader identifies the
following elements:
• Goal, objectives, and expectations of the project,
collectively called the scope
• Required activities
• Time estimates for each activity
• Cost estimates for each activity
• Order of activities
• Activities that can take place at the same time
Feasibility is a measure of how suitable the development of
a system will be to the organization. A project that is feasible at one point
during system development might become infeasible at a later point. Thus,
systems analysts frequently reevaluate feasibility during the system
development project. A systems analyst typically uses at least four tests to
evaluate feasibility of a project: operational feasibility, schedule
feasibility, technical feasibility, and economic feasibility.
• Operational feasibility measures how well the proposed
information system will work. Will the users like the new system? Will they use
it? Will it meet their requirements? Will it cause any changes in their work
environment? Is it secure?
• Schedule feasibility measures whether the established
deadlines for the project are reasonable. If a deadline is not reasonable, the
project leader might make a new schedule. If a deadline cannot be extended,
then the scope of the project might be reduced to meet a mandatory deadline.
• Technical feasibility measures whether the organization
has or can obtain the hardware, software, and people needed to deliver and then
support the proposed information system. For most information system projects,
hardware, software, and people typically are available to support an
information system. The challenge is obtaining funds to pay for these
resources. Economic feasibility addresses funding.
• Economic feasibility, also called cost/benefit
feasibility, measures whether the lifetime benefits of the proposed information
system will be greater than its lifetime costs. A systems analyst often
consults the advice of a business analyst, who uses many financial techniques,
such as return on investment (ROI) and payback analysis, to perform the
cost/benefit analysis.
During system development, project team members produce much
documentation. Documentation is the collection and summarization of data and
information. It includes reports, diagrams, programs, or any other deliverables
generated during system development. A project notebook contains all
documentation for a single project. The project notebook might be a simple
three-ring binder. Many organizations, however, have software that systems
analysts use to create an automated project notebook. Users and IT
professionals refer to existing documentation when working with and modifying
current systems. It is important that all documentation be well written, thorough,
consistent, and understandable. The final information system should be
reflected accurately and completelyin documentation developed throughout the
development project. Maintaining up-to-date documentation should be an ongoing
part of system development. Too often, project team members put off
documentation until the end because it is time-consuming, but these practices
typically result in lower quality documentation.
During system development, members of the project team
gather data and information. They need accurate and timely data and information
for many reasons. They must keep a project on schedule, evaluate feasibility,
and be sure the system meets requirements. Systems analysts and other IT
professionals use several techniques to gather data and information. They
review documen tation, observe, survey, interview, conduct joint-application
design sessions, and research.
• Review Documentation — By reviewing documentation such as
an organization chart, memos, and meeting minutes, systems analysts learn about
the history of a project. Documentation also provides information about the
organization such as its operations, weaknesses, and strengths.
• Observe — Observing people helps systems analysts
understand exactly how they per form a task. Likewise, observing a machine
allows you to see how it works.
• Survey — To obtain data and information from a large
number of people, systems analysts distribute surveys.
• Interview — The interview is the most important data and
information gathering technique for the systems analyst. It allows the systems
analyst to clarify responses and probe during face-to-face feedback.
• JAD Sessions — Instead of a single one-on-one interview,
analysts often use joint-application design sessions to gather data and information.
Joint-application design (JAD) sessions, or focus groups, are a series of
lengthy, structured, group meetings in which users and IT professionals work
together to design or develop an application.
• Research — Newspapers, computer magazines, reference
books, trade shows, the Web, vendors, and consultants are excellent sources of
information. These sources can provide the systems analyst with information
such as the latest hardware and software products and explanations of new
processes and procedures. In addition, systems analysts often collect Web site
statistics such as the number of visitors, most visited Web pages, etc., and
evaluate these statistics as part of their research.
4. What activities
are performed in the planning phase?
The planning phase for a project begins when the steering
committee receives a project request. As mentioned earlier in this chapter, the
steering committee is a decision making body for an organization. This
committee usually consists of five to nine people. It typically includes a mix
of vice presidents, managers, non management users, and IT personnel. During
the planning phase, four major activities are performed: (1) review and approve
the project requests; (2) prioritize the project requests; (3) allocate resources
such as money, people, and equipment to approved projects; and (4) form a
project development team for each approved project. The projects that receive
the highest priority are those mandated by management or some other governing
body. These requests are given immediate attention. The steering committee
evaluates the remaining project requests based on their value to the
organization. The steering committee approves some projects and rejects others.
Of the approved projects, it is likely that only a few will begin system
development immediately. Others will have to wait for additional funds or
resources to become available.
5. What is the
purpose of activities performed in the analysis phase?
The analysis phase consists of two major activities: (1)
conduct a preliminary investigation and (2) perform detailed analysis. The main
purpose of the preliminary investigation, sometimes called the feasibility
study, is to determine the exact nature of the problem or improvement and
decide whether it is worth pursuing. Should the organization continue to assign
resources to this project? To answer this question, the systems analyst
conducts a general study of the project. Then, the systems analyst presents his
or her findings in a report. Figure 12-6 shows a sample feasibility report,
also sometimes known as the feasibility study. In this phase, the systems
analyst defines the problem or improvement accurately. The actual problem may
be different from the one suggested in the project request. The first activity
in the preliminary investigation is to interview the user who submitted the
project request. Depending on the nature of the request, project team members
may interview other users, too. In the case of the school, members of the team
might interview the controller for data entry and quality control costs. They
also might interview one or two registration clerks, quality control clerks,
instructors, and students. In addition to interviewing, members of the project
team may use other data gathering techniques, such as reviewing existing
documentation. The time spent on this phase of system development is quite
short when compared with the remainder of the project. Often, the preliminary
investigation is completed in just a few days. Detailed analysis involves three
major activities: (1) study how the current system works; (2) determine the
users’ wants, needs, and requirements; and (3) recommend a solution. Detailed
analysis sometimes is called logical design because the systems analysts
develop the proposed solution without regard to any specific hardware or
software. That is, they make no attempt to identify the procedures that should
be automated and those that should be manual. During these activities, systems
analysts use all of the data and information gathering techniques. They review
documentation, observe employees and machines, distribute surveys, interview
employees, conduct JAD sessions, and research. An important benefit from these
activities is that they build valuable relationships among the systems analysts
and users. While studying the current system and identifying user requirements,
the systems analyst collects a great deal of data and information. A major task
for the systems analyst is to document these findings in a way that can be
understood by everyone. Both users and IT professionals refer to this
documentation. Most systems analysts use either a process modeling or object
modeling approach to analysis and design. The following pages discuss these
approaches.
6. What are tools
used in process modeling?
Process modeling, sometimes called structured analysis and
design, is an analysis and design technique that describes processes that
transform inputs into outputs. Tools that a systems analyst uses for process
modeling include entity-relationship diagrams, data flow diagrams, and the
project dictionary. An entity-relationship diagram (ERD) is a tool that
graphically shows the connections among entities in a system. An entity is an
object in the system that has data. For example, a school might have student,
grades, class, room, and instructor entities. On the ERD, entity names usually
are nouns written in all capital letters. Each relationship describes a
connection between two entities. In the ERD shown in Figure 12-7, a class
contains one or more students, is taught by one instructor, and may or may not
be held in a room. A student may or may not take classes in a given semester
and, similarly, may or may not earn grades. It is important that the systems
analyst has an accurate understanding of the system. The systems analyst
reviews the ERD with the user. After users approve the ERD, the systems analyst
identifies data items associated with an entity. For example, the STUDENT
entity might have these data items: Student ID, First Name, Last Name, Address,
City, State, Postal Code, E-mail Address, Date Admitted, Major, and Photo. A
data flow diagram (DFD) is a tool that graphically shows the flow of data in a
system. The key elements of a DFD are the data flows, the processes, the data
stores, and the sources. A data flow, indicated by a line with an arrow, shows
the input or output of data or information into or out from a process. A
process, which is drawn as a circle, transforms an input data flow into an
output data flow. A data store, shown as a rectangle with no sides, is a
holding place for data and information. Examples of data stores are filing
cabinets, checkbook registers, or electronic files stored on a computer. A
source, drawn as a square, identifies an entity outside the scope of the system.
Sources send data into the system or receive information from the system. The
project dictionary, sometimes called the repository, contains all the
documentation and deliverables of a project. The project dictionary helps
everyone keep track of the huge amount of details in a system. The dictionary
explains every item found on DFDs and ERDs. Each process, data store, data
flow, and source on every DFD has an entry in the project dictionary. Every
entity on the ERD has an entry in the project dictionary. The dictionary also
contains an entry for each data item associated with the entities. The number
of entries added to the dictionary at this point can be enormous. Thus, this
activity requires a lot of time. The systems analyst uses a variety of
techniques to enter these items in the project dictionary. Some of these
include structured English, decision tables and decision trees, and the data
dictionary.
7. What are tools
used in object modeling?
Object modeling can use the same tools as those used in
process modeling. Many systems analysts, however, choose to use tools defined
in the UML. Although used in all types of business modeling, the UML (Unified
Modeling Language) has been adopted as a standard notation for object modeling
and development. The UML is a graphical tool that enables analysts to document
a system. It consists of many inter related diagrams. Each diagram conveys a
view of the system. The latest UML version includes 13 different diagrams to
assist the analyst in modeling the system. Two of the more common tools are the
use case diagram and class diagram. A use case diagram graphically shows how
actors interact with the information system. An actor is a user or other entity
such as a program. The function that the actor can perform is called the use
case. Thus, a use case diagram shows actors and their use cases. The actor is
drawn as a stick figure that connects to each use case with an arrow. Because
these diagrams are easy to understand, analysts find that the use case diagram
is an ideal tool for communicating system requirements with users. A class
diagram graphically shows classes and subclasses in a system (Figure 12-14). On
a class diagram, objects are grouped into classes. Each class can have one or
more lower levels called subclasses. Each subclass inherits the methods and
attributes of the objects in its higher-level class. Every object in a class
shares methods and attributes that are part of its higher-level class. This
concept of lower levels inheriting methods and attributes of higher levels is
called inheritance.
8. What activities
are performed in the design phase?
The design phase consists of two major activities: (1) if
necessary, acquire hardware and software and (2) develop all of the details of
the new or modified information system. The systems analyst often performs
these two activities at the same time instead of sequentially. When the
steering committee approves a solution, the systems analyst begins the activity
of obtaining additional hardware or software or evaluating cloud storage
providers that offer the hardware or software to meet the organization’s needs.
The systems analyst may skip this activity if the approved solution does not
require new hardware or software. If this activity is required, the selection
of appropriate products or providers is crucial for the success of the
information system. The activity consists of four major tasks: (1) identify
technical specifications, (2) solicit vendor proposals, (3) test and evaluate
vendor proposals, and (4) make a decision. After the systems analyst identifies
the data and process requirements, the next step is to develop detailed design
specifications for the components in the proposed solution. A detailed design
sometimes is called a physical design because it specifies hardware and
software — the physical components required — for automated procedures. The
activities to be performed include developing designs for the databases,
inputs, outputs, and programs. The length and complexity of these activities
vary depending on previous decisions. For example, the systems analyst may skip
many of these activities when purchasing packaged software. If an organization
is developing custom software, however, these activities can be quite
time-consuming.
9. Why is program development
part of system development?
During the design phase, an organization can purchase
packaged software, which is mass-produced, copyrighted, prewritten software. If
suitable packaged software is not available, however, a company may opt for
custom software, which is application software developed at the user’s request
to match the user’s requirements exactly. Programmers write custom software
from the program specification package created during the analysis phase,
following an organized set of activities known as the program development life
cycle.
10. What activities
are performed in the implementation phase?
The purpose of the implementation phase is to construct, or
build, the new or modified system and then deliver it to the users. Members of the
system development team perform four major activities in this phase: (1)
develop programs, (2) install and test the new system, (3) train users, and (4)
convert to the new system. If the organization purchases packaged software and
no modifications to the software are required, the development team may skip
this activity. For custom software or packaged software that requires
modification, however, programs are developed or modified either by an outside
firm or in-house. Programmers write or modify programs from the program
specification package created during the analysis phase. Just as system
development follows an organized set of activities, so does program
development. These program development activities are known as the program
development life cycle. If the organization acquires new hardware or software,
someone must install and test it. The systems analysts should test individual
programs. They also should be sure that all the programs work together in the
system. Systems analysts do not want errors in the system after it is delivered
to the users. According to a recent study, poor user training is one of the top
ten reasons why system development projects fail. Users must be trained
properly on a system’s functionality. Training involves showing users exactly
how they will use the new hardware and software in the system. Some training
takes place as one-on-one sessions or classroom style lectures. Other
organizations use Web-based training, which is a self-directed, self-paced
online instruction technique. Whichever method is used, it should include
hands-on sessions with realistic sample data. The final implementation activity
is to change from the old system to the new system. This change can take place
using one or more of the following conversion strategies: direct, parallel,
phased, or pilot.
11. What activities
are performed in the operations, support, and security phase?
The purpose of the operation, support, and security phase is
to provide ongoing assistance for an information system and its users after the
system is implemented. The operation, support, and security phase consists of
three major activities: (1) perform maintenance activities, (2) monitor system
performance, and (3) assess system security. Information system maintenance activities
include fixing errors in, as well as improving, a system’s operations. To
determine initial maintenance needs, the systems analyst should meet with
users. The purpose of this meeting, called the post-implementation system
review, is to discover whether the information system is performing according
to the users’ expectations. Sometimes users identify errors in the system.
Problems with design (logic) usually are the cause of these errors. For
example, the total of a column might be incorrect. These types of errors return
the analyst to the planning phase to perform corrective maintenance, which is
the process of diagnosing and correcting errors in an information system.
Sometimes, users have enhancements or additional requirements that involve
modifying or expanding an existing information system. Adaptive maintenance is
the process of including new features or capabilities in an information system.
To perform adaptive maintenance, the analyst returns to the planning phase.
During this phase, the systems analyst monitors performance of the new or
modified information system. The purpose of performance monitoring is to
determine whether the system is inefficient or unstable at any point. If it is,
the systems analyst must investigate solutions to make the information system
more efficient and reliable, a process called perfective maintenance — back to
the planning phase. Most organizations must deal with complex computer security
issues. All elements of an information system — hardware, software, data, people,
and procedures — must be secure from threats both inside and outside the
enterprise. For example, users should be allowed access only to the data and
information for which they are authorized, which typically is limited to the
amount necessary to do their job. Data should be secure so that intruders
cannot alter, damage, or steal data. Networks need safeguards to prevent them
from being compromised. If any vulnerabilities are detected, the analyst
returns to the planning phase to investigate techniques to safeguard the
information system.
No comments:
Post a Comment