ebook img

Systems Analysis and Design PDF

674 Pages·2013·112.005 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Systems Analysis and Design

iii BRIEF CONTENTS PHASE I: SYSTEMS PLANNING I Chapter I Introduction to Systems Analysis and Design 2 Chapter 2 48 Analyzing the Business Case Chapter 3 Managing Systems Projects 88 PHASE 2: SYSTEMS ANALYSIS 129 Chapter 4 Requirements Modeling 130 Chapter 5 Data and Process Modeling 178 Chapter 6 Object Modeling 224 Chapter 7 Development Strategies 258 PHASE 3: SYSTEMS DESIGN 297 Chapter 8 User Interface Design 298 Chapter 9 346 Data Design Chapter I 0 System Architecture 404 PHASE 4: SYSTEMS IMPLEMENTATION 447 Chapter I I 448 Managing Systems Implementation PHASE 5: SYSTEMS SUPPORT AND SECURITY 503 Chapter 12 Managing Systems Support and Security 504 THE SYSTEMS ANALYST'S TOOLKIT 561 Toolkit Part A Communication Tools 562 Toolkit Part B CASE Tools 582 Toolkit Part C Financial Analysis Tools 600 Toolkit Part D Internet Resource Tools 620 Glossary/Index 649 Cql~Ti~ 20U C<~ ~ All Ri~ Jt~\'fd, Ml~· WI bee~ 0(&111(<,1. ~ d11p~. in wholo Ill' i3 fWl.-~ w tl~nx :i,Vr.s. Wtt(' tir.l pv!)> OC'!II«II m.or be Wll'fU1«1 £rvm e:,e elk-o.lk ~ t01r('4«(t.), &lic.,rial nvkw hMo ok(tll(l.llh;,t ·n~· w~ IX'!II«<C Otoe$ n\1'1 .-n,.n~· llt'!«ttllt q.-utill~"ttin& e•pcno:!>,Jf, (:(Oft(: L<-=c re.e...,~ the :i~ 10 ~~ l!<.kliD(IO'I.-1 OC'!II«<Cl l WI)' d~«~-1 $11bo(qunr; n,;;. fO!riW«~, m;uiro ._ I 97812851713·~0_FM.Incld 3 HIS/13 3m PM iv TABLE OF CONTENTS PHASE I: SYSTEMS PLANNING Networic Adml nistra tion 28 Web Support 2~ Quality Assurance (QA) 2~ 'Chapter I Case in l'l>int 1.3: What Should Lisa Do? 29 The Systems Analyst 29 Introduction to Systems Analysis Role 2~ and Design Knowledge, Skills, and Education 30 Certification 31 Career Opportunities 31 Objectives 2 Case in l'l>int 1.4: Just-in-Time Airfreight, Inc. 32 Introduction 2 A Question of Ethics 33 Preview Case: Mountain View College Bookstore 3 Chapter Summary 33 Video Learning Sessions: Welcome Key Terms 36 and Introduction 4 Chapter Exercises 37 What Is Information Technology? 4 Apply Your Knowledge 38 Welcome to the 21st Century: The IT joumey Continues 4 s Case Studies 40 Systems Analysis and Design What Does a Systems Analyst Do~ 6 Chapter Case: Hudson Kayak Adventures 40 Continuing Case: Personal Trajncr,lnc. 41 Case in l'l>int 1.1: Cloud Nine Financial Advisors 6 Capstone Case: New Ccnwry Wellncss Group 42 Information System Components 6 CASETooiWorkshop 44 Hardware 7 Software 7 MIS CourseMate Features 45 Data 7 PI'OCcss.es 8 Chapter 2 People 8 Business in the 21st Century 9 Analyzing the Business Case The Internet Model ~ B2C (Business-to-Cof\Sumcr) ~ B28 (Business-to-Business) 10 Objectives 48 What's Next? 10 Introduction 48 Modeling Business Operations 13 Business Profiles 13 Preview Case: Mountain View College Bookstore 49 Business Processes 13 A Framework for IT Systems Development 50 Business Information Systems 14 Strategic. Planning Overview 50 Enterprise Computing IS What Is SVI/OT Analysis? 51 Transaction PI"OCcssing IS Case in l'l>int 2.1: Lo Carb Meals 52 Business Support 16 Strategic. Planning for IT Projects 52 Knowledge Management 16 A New Role for the IT Department 54 User Productivity 17 Case in l'l>int 2.2: Attaway Airlines, Part One 54 Systems lntcgntion 17 What Is a Business Case? 54 What Information Do Users Need? 18 Top Managers 18 Information Systems Projects 55 Middle Managers and Knowledge Worirers 18 Main Reasons for Systems Projects 55 Supervisors and Team leaders I~ Case in l'l>int 2.3: Trent College 56 Operational Employees I~ Factors That Affect Systems Pro;ects 56 Systems Development Tools 19 Internal Factors 57 Modeling I~ External Fac.tors 58 Prototyping 20 Evaluation of Systems Requests 59 Computer. Aided Systems Engineering (CASE) Tools 20 Systems Request Forms 5~ Systems Development Methods 21 Systems Review Committee 60 Structured Analysis 22 Overview of Feasibility 61 Object-Oriented Analysis 24 Operational Feasibility 62 Agile Methods 25 Technical Feasibility 62 Other Development Methods 26 Video Leaming Session: Payback Analysis 63 The Information Technology Department 27 Ec.onomic Feasibility 63 Application Development 27 Sc.hedule Feasibility 64 Case in l'l>int 1.2: Global Hotels and Evaluating Feasibility 64 Momma's Motels 28 Systems Support and Security 28 Setting Priorities 64 User Support 28 Factors That Affect Priority 64 Database Administration 28 Discretionary and Nondiscretionary Projcc.ts 65 Cql~Ti~ 20U C<~ ~ All Ri~ Jt~\'fd, Ml~· WI bee~ 0(&111(<,1. ~ d11p~. in wholo Ill' i3 fWl.-~ w tl~nx :i,Vr.s. Wtt(' tir.l pv!)> OC'!II«II m.or bo Wll'fU1«1 £rvm e:,e elk-o.lk ~ t01r('4«(t.), &lic.,rial nvkw hMo ok(tll(l.llh;,t ·n~· w~ IX'!II«<C Otoe$ n\1'1 .-n,.n~· llt'!«ttllt q.-utill~"ttin& e•pcno:!>,Jf, (:(Oft(: L<-=c re.e...,~ the :i~ 10 ~~ l!<.kliD(IO'I.-1 OC'!II«<C ll WI)' d~«~-1 $11bo(qunr; n,;;. fO!riW«~, m;uiro ._ I 1116/13 3m PM Table of Contents v Case in Point 2.4: Attaway Airlines, PartT wo 65 Project Management Examples lOS PERT /CPM Example 105 Preliminary Investigation Overview 66 Interaction with Managers and Users 66 Project Management Software 107 Planning the Preliminary Investigation 66 Case in Point 3.3: Census 20 I 0 I I I Step I: Understand the Problem or Opportunity 66 Step 2: Define the Projcc.t Scope and Constraints 67 Risk Management I I I Step 3: Perform Fact-Finding 68 Steps in Risk Management Ill Step 4: M alyzc Project Usability, Cost. Benefit, and Schedule Data 73 Risk Management Software 112 Step 5: Evaluate FeasibiUcy 73 Managing for Success 113 Step 6: Present Results and Recommendations to Management 74 Business Issues 113 A Question of Ethics 75 Budget Issues 113 Schedule Issues 114 Chapter Summary 75 Case in Point 3.4: Spring Forward Products I 14 ~Th~s 76 The Bottom Line 114 Chapter Exercises 77 A Question of Ethics I IS Apply Your Knowledge 78 Chapter Summary l iS Case Studies 80 Chapter case: Town of Eden Bay 80 Key Terms I 17 Continuing Case: Personal Trainer, Inc.. 82 Chapter Exercises 118 Capstone Case: New CenturyWcllncss Group 83 Apply Your Knowledge I 19 CASE Tool Workshop 84 Case Studies 121 MIS CourseMate Features 85 Chapter Case: Town of Eden Bay (P>rt 2) 121 Continuing Case: Personal Trajner.lnc. 122 Chapter 3 Capstone Case: New Cenwry Welfne,ss Group 123 CASE Tool Workshop 124 Managing Systems Projects MIS CourseMate Features 125 PHASE 2: SYSTEMS ANALYSIS Objectives 88 Introduction 88 Chapter 4 Preview Case: Mountain View College Bookstore 89 Overview of Project Management 90 Requirements Modeling What Shapes a 90 Project~ What Is a Project 90 Triangle~ What Docs a Project Manager Do! 91 Objectives 130 Step I: Create a Work Breakdown Structure 92 Introduction 130 What Is a Gantt Chart~ 92 Preview Case: Mountain View College Bookstore 13 1 Video Learning Session: Work Breakdown Structures 92 Systems Analysis Phase Overview 132 What Is a PERT/CPM Chan:1 ~3 Systems Analysis Activities 132 Which Type of Chart Is Better~ 93 Systems Analysis Skills 133 Identifying Tasks in a Work Breakdown Structure 94 Team-Based Techniques: }AD, RAD.andAgile Methods 133 Case in Point 3.1: Parallel Services 95 Joint Application Development 133 Factors Affecting Duration 96 User Involvement IH Case in Point 3.2: Sunrise Software 97 JAD Participants and Roles IH Displaying the Woric Breakdown Structure 97 JAD Advantages and Disadvantages 135 Video Learning Session: Task Patterns 98 Rapid Application Development 135 RAD Phases and Activitie,s 136 Step 2: Identify Task Patterns 98 RAD Objectives 137 What Arc Task Patterns? 98 RAD Advantages and Disadvantages 137 How Do I Usc Task Boxes to Create a Model~ 98 What Are the Majn Types of Task Pattems? 99 Agile Methods 137 How Do I Identify Task Patterns? 100 Agile Method Advantages and Disadvantages 138 How Do I Woric With Complex Task Patterns~ I 00 Case in Point 4.1: North Hills College 139 Video Learning Session: Critical Path Analysis I 0 I Modeling Tools and Techniques 139 Step 3: Calculate the Critical Path I 02 Video Learning Session: Functional What Is a Critical Path~ 102 Decomposition Diagrams 140 How Do I calculate the Critical Path? 102 Functional Decomposition Diagrams 140 Project Monitoring and Control I 03 Business Process Modeling 140 Monitoring and Control Techniques 103 Data Flow Diagrams 141 Main{.ajning a Schedule 103 Unified Modeling Language 141 ~~~ng 104 System Requirements Checklist 143 Project Status Meetings I 04 Output Examples 143 Project Status Reports I 04 Input Examples IH Cql~Ti~ 20U C<~ ~ All Ri~ Jt~\'fd, Ml~· WI bee~ 0(&111(<,1. ~ d11p~. in wholo Ill' i3 fWl.-~ w tl~nx :i,Vr.s. Wtt(' tir.l pv!)> OC'!II«II m.or be Wll'fU1«1 £rvm e:,e elk-o.lk ~ t01r('4«(t.), n,;;. &liiQrial nvkw hMo ok(tll(l.llh;,t ·n~· w~ IX'!II«<I Otoe$ n\1'1 .-n,.n~· llt'!«ttllt q.-utJII~"ttin& e•pcno:!>,Jf, ((Oft(: L<-=c re.e...,~ the fi~ 10 ~~ l!<.kliti(IO'I.-1 OC'!II«<C ll WI)' d~«~-1 $11bo(qunr; fO!riW«~, m;uiro ._ I I 97812851713·~0_FM.Incld 5 HIS/13 3m PM vi Table of Contents Process Examples 144 Step I: Draw a Context Diagram 188 Performance Examples 144 Video Learning Session: DFD Diagram 0 189 Conuol Examples 144 Step 2: Draw a Diagram 0 OFD I~ Future Growth, Costs, and Benefits 145 Step 3: Draw the lower-level Diagrams 1~2 Scalability 145 Case in Point 5.1: Big Ten University 197 Total Con of Ownership 145 Data Dictionary 197 Fact-Finding 146 Using CASET ools for Documentation 1~8 Fact-Finding Overview 146 Documenting the Data Elements 1~8 Who,W hat.W here, When, How, and Why? 147 Documenting the Data Flows 200 The Zachman Framework 148 Documenting the Data Stores 201 Interviews 148 Documenting the Proc.csses 202 Step I: Determine the People to Interview 14~ Documenting the Entities 203 Step 2: Establish Objectives for the lntcrYicw 14~ Documenting the Records 203 Step 3: Develop Interview Questions 14~ Data Dictionary Reports 203 Step 4: Prepare for the Interview I SO Process Description Tools 204 Step 5: Conduct the Interview I 5 I Modular Design 204 Step 6: Document the Interview I 52 Structured Eoglish 205 Step 7: Evaluate the Interview I 53 Video Learning Session: Decision Tables 206 Case in Point 4.2: Deep River College 153 Decision Tables 206 Unsuccessful Interviews I 53 Case in Point 5.2: Rock Solid Outfitters (Part I) 210 Case in Point 4.3: FastPak Overnight Package System 154 Decision Trees 210 Other Fact-Finding Techniques 154 Case in Point 5.3: Rock Solid Outfitters (Part 2) 210 Document Review I 54 Observation I 54 Logical versus Physical Models 21 I Ques-tionnaires and Surveys I 56 Sequence of Models 211 Four. Model Approach 211 Sampling I SB Research I SB Case in Point 5.4: Tip Top Staffing 21 I Interviews versus Questionnaires I 5~ A Question of Ethics 212 Case in Point 4.4: CyberStuff 160 Chapter Summary 212 Documentation 160 Key Terms 213 The Need for Recording the Facts 160 Software Tools 160 Chapter Exercises 214 Information Management Software 162 Apply Your Knowledge 215 Preview of Logical Modeling 164 Case Studies 217 A Question of Ethics 164 Chapter Case: College Driver Insurance 217 Continuing Case: Personal Trajner,lnc.. 217 Chapter Summary 165 Capnone Case: New Century WeUness GI'Oup 218 Key Terms 166 CASETooiWorkshop 219 Chapter Exercises 167 MIS CourseMate Features 220 Apply Your Knowledge 168 Chapter 6 Case Studies 170 Chapter case: Town of Eden Bay (Part 3) 170 Continuing case: Personal Trainer, Inc. 170 Object Modeling Capstone Case: New CenturyWcllncss Group 1n CASE Tool Workshop 173 Objectives 224 MIS CourseMate Features 174 Introduction 224 Chapter 5 Preview Case: Mountain View College Bookstore 225 Overview of Object-Oriented Analysis 226 Data and Process Modeling Video Learning Session: Object-Oriented Concepts and Terms 226 Object-Oriented Terms and Concepts 226 Objectives 178 Objects 227 Introduction 178 Attributes 22~ Methods 230 Preview Case: Mountain View College Bookstore 179 Messages 231 Overview of Data and Process Modeling Tools 180 Classes 232 Data Flow Diagrams 180 Relationships Among Objects and Classes 234 Object Relationship Diagram 234 Video Learning Session: DFD Symbols and Diagrams 180 DFD Symbols 180 Object Modeling with the Unified Modeling Language 235 Creating a Set of DFDs 186 Video Learning Session: Object-Oriented Diagrams and Models 235 Video Learning Session: DFD Context Diagrams 186 Usc Case Modeling 235 Guidelines for Drawing DFDs 186 Cql~Ti~ 20U C<~ ~ All Ri~ Jt~..W. Ml~' WI bee~ 0(&111(<,1, ~ d11p~. in wholo Ill' i3 fWl.-~ w tl~nx :i,Vr.s. Wtt(' tir.l pv!)' OC'!II«II m.or bo W!'fm1«1 £rvm e:,e elk-o.lk ~ t01r('4«(t.), &lic.,rial nvkw hM> ok(tll(l.llh;,t ·n~· w~ IX'!II«<C Otoe$ n\1'1 .-n,.n~· llt'!«ttllt q.-utill~'tlin& e•pcno:!>,Jf, (:(Oft(: L<-=c re.e."~ the :i~ 10 ~~ l!<.kliD(IO'I.-1 OC'!II«<C ll WI)' d~«~-1 $11bo(qunr; n,;;. fO!riW«~, m;uiro ._ I I 97812851713·~0_FM.Incld 6 1116/13 3m PM Table of Contents vii Case in Point 6.1: Hilltop Motors 237 Step 4: Perform Cost-BenefttAnalysis 280 Usc Case Diagrams 237 Step 5: Prepare a Recommendation 281 Class Diagrams 238 Step 6: Implement the Solution 281 Case in Point 6.2: Train The Trainer, Inc. 240 Case in Point 7.3: Doug's Sporting Goods 281 Sequence Di-agrams 240 Completion of Systems Analysis Tasks 281 State Transition Diagrams 241 System Requirements Document 281 Case in Point 6.3: TraveiBiz 242 Presentation to Management 282 Activity Diagrams 242 Transition to Systems Design 283 Business Proces:s Modeling 242 Preparing for Systems Design 283 CASETools 244 Logical and Physical Design 283 Organizing the Object Model 244 Case in Point 7.4: Downtown! 284 Case in Point 6.4: Cyber Associates 244 A Question of Ethics 284 A Question of Ethics 244 Chapter Summary 284 Chapter Summary 245 Key Terms 286 Key Terms 247 Chapter Exercises 287 Chapter Exercises 248 Apply Your Knowledge 288 Apply Your Knowledge 249 Case Studies 290 Case Studies 251 Chapter Case: C.mpus Bikes (Part 2) 2~0 Chapter case: Campus Bikes 251 Continuing Case: Personal Trajner.lnc. 2~1 Continuing Case: Personal Trainer, Inc. 251 Capnone Case: New Cenwry Welfncss Group 2~1 Capstone Case: New CenturyWellncss Group 252 CASE Tool Workshop 293 CASE Tool Workshop 253 MIS CourseMate Features 294 MIS CourseMate Features 254 PHASE 3: SYSTEMS DESIGN Chapter 7 Ch ter 8 Development Strategies User Interface Design Objectives 258 Introduction 258 Objectives 298 Preview Case: Mountain View College Bookstore 259 Introduction 298 Development Strategies Overview 260 Preview Case: Mountain View College Bookstore 299 The Impact of the Internet 260 Systems Design Phase Overview 300 Software as a Servkc 260 Will It Succeed? 300 Traditional vs. Web-Based Systems Development 261 Evolving Trends: Web 2.0 and Cloud Computing 262 Chapter Overview 301 Outsourcing 263 What Is a User Interface? 302 The Growth of Outsourcing 263 Human-Computer Interaction 303 OutsOurcing Fees 264 Case in Point 8.1: Casual Observer Software 305 OutsOurcing Issues and Concems 26S Seven Habits of Successful Interface Designers 305 Offshore OutsOurcing 265 Understand the Business 305 Case in Point 7 .I: Turnkey Services 266 Maximize Graphical Effectiveness 305 In-House Software Development Options 266 Think Uke a User 306 Make or Buy Decision 266 Usc Models and Prototypes 306 Developing Software In-House 268 Focus on Usability 306 Purchasing a Software Package 269 Invite Feedback 306 CustOmizing a Software Package 270 Document Everything 307 Creating User Applications 270 A Handbook for User Interface Design 307 The Systems Analyst's Role 271 RULE I: Create an Interlace That Is Easy to learn and Usc 307 Case in Point 7.2: Sterling Associates 273 RULE 2: Enhance User Productivity 307 Analyzing Cost and Benefits 273 RULE 3: Provide Users with Help and Feedback 308 Video Learning Session: Retum on Investment (ROJ) 274 RULE 4: Create an Attractive layout and Design 310 RULE 5: Enhance the Interface 3 II FinandaJAnalysis Tools 274 RULE 6: Focus on Data Entry Screens 313 Video Learning Session: Net Present Value (NPV) 274 RULE 7: Usc Vall dation Rules 316 Cost-Benefit Analysis Checklist 274 RULE 8: Reduce Input Volume 318 The Software Acquisition Process 275 Case in Point 8.2: Boolean Toys 319 Step I: Evaluate the Information System Requirements 275 Source Document and Form Design 319 Step 2: Identify Potential Vendors or Outsourcing Options 278 Printed Output 320 Step 3: Evaluate the Aftematives 278 Overview of Report Design 321 Cql~Ti~ 20U C<~ ~ All Ri~ Jt~\'fd, Ml~· WI bee~ 0(&111(<,1. ~ d11p~. in wholo Ill' i3 fWl.-~ w tl~nx :iV!'.s. Wtt(' tir.l pv!)> OC'!II«II m.or bo Wll'fU1«1 £rvm e:,e elk-o.lk ~ t01r('4«(t.), n,;;. &liiQrial nvkw hMo ok(tll(l.llh;,t ·n~· w~ IX'!II«<I Otoe$ n\1'1 .-n,.n~· llt'!«ttllt q.-utill~"ttin& e•pcno:!>,Jf, (:(Oft(: L<-=c re.e...,~ the fi~ 10 ~~ l!<.kliD(IO'I.-1 OC'!II«<C ll WI)' d~«~-1 $11bo(qunr; fO!riW«~, m;uiro ._ I I 97812851713·~0_FM.Incld 7 HIS/13 3m PM viii Table of Contents Types of Reports 322 Case in Point 9.1: TopT ext Publishing 365 User Involvement 322 Data Normalization 365 Report Design Principles 322 Standard Notation Format 365 Case in Point 8.3: Lazy Eddie 325 Video Learning Session: First Normal Form 366 Case in Point 8.4: Trustworthy Insurance Company 325 First Normal Form 366 Technology Issues 325 Video Leaming Session: Second Normal Form 368 Output Technology 325 Second Normal Form 368 Input Technology 328 Video Leaming Session:T hird Normal Form 370 Security and Control Issues 329 Third Normal Form 370 Output Security and Control 32~ Two Real-World Examples 372 Input Scc.urity and ContrOl 330 Example I :Crossroads College 3n Where Do We Go from Here? 331 Case in Point 9.2: CyberToys 377 Modular Design 331 Example 2: Magic Majntcnance 377 Prototyping 331 Case in Point 9.3: DotComTools 378 A Question of Ethics 333 Working with a Relational Database 379 Chapter Summary 333 Quenion I 37~ Key Terms 335 Question 2 380 Chapter Exercises 336 Question 3 380 Should You Use Codes? 381 Apply Your Knowledge 337 Overview of Codes 381 Case Studies 339 Typos of Codes 381 Chapter case: Tools 4 U 33~ Designing Codes 383 Continuing case: Personal Trainer, Inc. 33~ Data Storage and Access 384 Continuing case: Pci"Sonal Trainer, Inc. 340 Tools and Techniques 384 Capstone Case: New CcnturyWcllncss Group 340 Logical versus Physical Storage 387 CASE Tool Workshop 341 Data Coding 388 MIS CourseMate Features 342 Data Control 389 Case in Point 9.4: SoccerMom 390 Chapter 9 A Question of Ethics 391 Chapter Summary 391 Data Design Key Terms 393 Objectives 346 Chapter Exercises 394 Introduction 346 Apply Your Knowledge 395 Case Studies 397 Preview Case: Mountain View College Bookstore 347 Chapter Case: Scenic Routes 3~7 Data Design Concepts 348 Continuing Case: Personal Trajner,lnc.. 3~7 Data Structures 348 Capstone Case: New Century Wellncss GI'OUp 3~8 Mario and Danica: A Data Design Example 348 CASE Tool Workshop 399 Is Fife Processing Still Important! 350 MIS CourseMate Features 400 The Database Environment 350 DBMS Components 351 Chapter 10 Interlaces for Users. Database Administrators, and Related Systcnu 351 Data Manipulation language 353 System Architecture Schema 353 Physical Data Repository 353 Objectives 404 Web-Based Data Design 354 Overview 354 Introduction 404 Connecting to the Web 354 Preview Case: Mountain View College Bookstore 405 Data Security 356 Data Design Terms 356 Architecture Checklist 406 Dcfl ni ti ons 356 Corporate Organization and Culture 406 Key F;olds 356 Enterprise Resource Planning (ERP) 406 Referential Integrity 35~ Case in Point I 0.1: ABC Systems 407 Video Learning Session: Entity-Relationship Initial Cost and TCO 407 Diagrams 359 ScalabUity 4~ Web Integration 4~ Entity-Relationship Diagrams 360 Legacy Systems 410 Drawing an ERD 360 Processing Options 410 Types of Relationships 361 Security Issues 410 Cardinality 362 Corporate Portals 411 Cql~Ti~ 20U C<~ ~ All Ri~ Jt~\'fd, Ml~· WI bee~ 0(&111(<,1. ~ d11p~. in wholo Ill' i3 fWl.-~ w tl~nx :i,Vr.s. Wtt(' tir.l pv!)> OC'!II«II m.or be Wll'fU1«1 £rvm e:,e elk-o.lk ~ t01lf4«(t.), n,;;. &licorilll nvkw hMo ok(tll(l.llh;,t ·n~· w~ IX'!II«<C Otoe$ n\1'1 .-n,.n~· llt'!«ttllt q.-utJII~"ttin& e•pcno:!>,Jf, (:(Oft(: L<-=c re.e...,~ the :i~ 10 ~~ l!<.kliD(IO'I.-1 OC'!II«<C ll W>Yd ~«~-1 $11bo(qunr; fO!riW«~, m;uiro ._ I I 97812851713·~0_FM.Incld 8 HIS/13 3m PM Table of Contents ix System Architecture: Then and Now 411 Preview Case: Mountain View College Bookstore 449 Mainframe AI"Chitcc.ture 411 Software Quality Assurance 450 lm~ct of the Personal Cotnputer 412 Software Engineering 450 Nccwork Evolution 412 lntemational Organization for Standardization (ISO) 451 Client/Server Designs 413 Overview of Application Development 452 Overview 413 Review the System Design 452 The Client's Role 414 Application Development Tasks 453 Client/Server Tiers 414 Systems DevelopmentT ools 454 Middlcware 416 Project Management 455 Cost-Benefit Issues 416 Performance Issues 416 Video Learning Session: Structure Charts 456 The Impact of the Internet 417 Structured Application Development 456 Cloud Computing 418 Structure Charu 456 4" Web2.0 Cohesion and Coupling 457 Drawing a Svucture Chart 45~ E-Commerce Architecture 419 In-House Solutions 420 Object-Oriented Application Development 461 Characteristics of Ob;ect-Oriented Application Development 461 Case in point I 0.2: Small Potatoes, Inc. 420 Implementation of Obiett-Oriented Designs 462 Packaged Solutions 421 Object-OI'icnted Cohesion and Coupling 462 Sci'Vicc PI'OViders 421 Agile Application Development 462 Processing Methods 421 An Extreme Programming (XP) Example 463 Online Processing 422 The Future of Agile Development 465 Batch Processing: Still With Us After All These Years 423 Coding 465 Real-World Examples 423 Programming Environments 465 Generating Code 466 Case in point I 0.3: R/Way Trucking Company 424 Unit Testing 466 Network Models 425 Case in Point 11.1: Your Hove,lnc. 467 The OSI Model 425 Integration Testing 467 NccworkTopology 425 System Testing 468 Network Devices 428 Case in Point 11.1: WebT est, Inc. 469 Modeling Tools 42~ Wireless Networks 429 Documentation 469 Wireless Network Standards 430 Program Doc.umentation 46~ Wireless Network Topologies 430 System Documentation 470 Wireless Trends 431 Operations Documentation 470 User Documentation 471 Case in point I 0.4: Spider IT Services 432 Management Approval 474 Systems Design Completion 432 System Design Specification 432 System Installation and Evaluation 475 User Approval 433 Operational and Test Environments 475 Presentations 434 Training 476 A Question of Ethics 434 Training Plan 476 Chapter Summary 435 Vendor Training 477 Webinars, Pod casts, and Tutorials 478 Key Terms 437 Outside Training Resoui'Ces 478 Chapter Exercises 438 Training Tips 47~ lnteracti. ..e Training Apply Your Knowledge 439 47~ Data Conversion 484 Case Studies 441 Data Conversion Strategies 484 Chapter case: Precision Consulting 441 Data Conversion Security and Controls 484 Continuing Cas.e: Pcr"SooaiTraincr, Inc.. 441 Capstone Case: New CcnturyWcllncss Group 442 System Changeover 484 Direct Cutover 485 CASE Tool Workshop 443 Parallel Operation 485 MIS CourseMate Features 444 Pilot Operation 486 Phased Operation 486 PHASE 4: SYSTEMS Case in Point 11.3: Global Cooling 487 IMPLEMENTATION Post-Implementation Tasks 487 Post-Implementation Evaluation 487 Case in Point 11.4: Yorirtown Industries 4~9 Final Report to Management 48~ Managing Systems Implementation A Question of Ethics 490 Chapter Summary 490 Objectives 448 Key Terms 492 Introduction 448 Chapter Exercises 493 Cql~Ti~ 20U C<~ ~ All Ri~ Jt~\'fd, Ml~· WI bee~ 0(&111(<,1. ~ d11p~. in wholo Ill' i3 fWl.-~ w tl~nx :i,Vr.s. Wtt(' tir.l pv!)> OC'!II«II m.or be Wll'fU1«1 £rvm e:,e elk-o.lk ~ t01r('4«(t.), n,;;. &lic.,rial nvkw hMo ok(tll(l.llh;,t ·n~· w~ IX'!II«<C Otoe$ n\1'1 .-n,.n~· llt'!«ttllt q.-utJII~"ttin& e•pcno:!>,Jf, (:(Oft(: L<-=c re.e...,~ the :i~ 10 ~~ l!<.kliti(IO'I.-1 OC'!II«<C ll WI)' d~«~-1 $11bo(qunr; fO!riW«~, m;uiro ._ I 97812851713·~0_FM.Incld 9 1116/13 3m PM Table of Contents X Apply Your Knowledge 494 Case in Point 12.4: Chain Link Case Studies 496 Consulting, Inc. 540 Chapter case: White Diamond Glass 496 Backup and Recovery 540 Continuing case: Per"SonaiTrainer, Inc. 496 Backup Policies 541 Capstone Case: New CenturyWcllncss Group 497 Business Continuity Issues 542 CASETooiWorkshop 498 Future Challenges and Opportunities 542 MIS CourseMate Features 499 System Obsolescence 543 Trends and Predictions 5+1 Strategic Planning for IT Profes:sionals 5+1 PHASE 5: SYSTEMS SUPPORT IT Credentials and Certification 546 AND SECURITY Critical Thinking Skills 546 A Question of Ethics 547 ' Chapter 12 Chapter Summary 548 Key Terms 550 Managing Systems Support Chapter Exercises 552 and Secunty Apply Your Knowledge 553 Case Studies 555 Objectives 504 Chapter Case: Best of the Best! (BoB) 555 Introduction 504 Continuing Case: Personal Trainer, Inc. 556 Capstone Case: New Century WeiJness Group 556 Preview Case: Mountain View College CASE Tool Workshop 557 Bookstore 449 MIS CourseMate Features 558 Overview 506 User Support 506 THE SYSTEMS ANALYST'S User Training 506 TOOLKIT Service Desks 506 OutsOurcing Issues 508 Toolkit Part A Maintenance Tasks 508 Col'l"cc.tivc Maintenance 50'1 Adaptive Maintenance 5 II Communication Tools Perfective Maintenance 511 Preventive Maintenance 512 Objectives 562 Case in Point 12.1: Outback Outsourcing, Inc. 512 Introduction 562 Maintenance Management 512 Preview Case: Mountain View College The Maintenance Team 512 Bookstore 563 Case in Point 12.2: Brightside Insurance, Inc. 514 Maintenance Requests 5 I 5 Successful Communication Strategies 564 Establishing Priorities 516 Why,Who,What,Whon,and How 564 Confl.guration Management 516 Cultural Context 564 Maintenance Releases 517 Know Your Subject 565 Version Control 517 W ritten Communications 565 Baselines 518 Writing Style and Readability 565 System Performance Management 519 f.Mail, Memos, and Letter'$ 566 Fault Management Social Media at Work 567 51~ Perlorrnance and Workload Measurement 51~ Netiquette 56~ Capacity Planning 521 Workgroup Software 570 System Maintenance Tools 523 Reports 570 System Securky Overview 524 Oral Communications 572 System Security Concepts 524 Define the Audience 5n Risk Management 524 Define the Objectives 573 Anacker Profiles and Attacks 526 Organize the Presentation 573 Define Any Technical Terms 573 Security Levels 526 Prepare Presentation Aids 573 Physical Security 527 Practice 575 Case in Point 12.3: Outer Banks County 530 The Presentation 575 Network Security 531 Online Presentations 576 Application Security 535 Managing Your Communication Skills 577 File Security 536 Toolkit Summary 578 User Security 537 Procedural Security 540 Key Terms 579 Toolkit Exercises 580 Cql~Ti~ 20U C<~ ~ All Ri~ Jt~\'fd, Ml~· WI bee~ 0(&111(<,1. ~ d11p~. in wholo Ill' i3 fWl.-~ w tl~nx :i,Vr.s. Wtt(' tir.l pv!)> OC'!II«II m.or bo Wll'fU1«1 £rvm e:,e elk-o.lk ~ t01r('4«(t.), &lic.,rial nvkw hMo ok(tll(l.llh;,t ·n~· w~ IX'!II«<C Otoe$ n\1'1 .-n,.n~· llt'!«ttllt q.-utill~"ttin& e•pcno:!>,Jf, (:(Oft(: L<-=c re.e...,~ the :i~ 10 ~~ l!<.kliD(IO'I.-1 OC'!II«<C ll WI)' d~«~-1 $11bo(qunr; n,;;. fO!riW«~, m;uiro ._ I 97812851713·~0_FM.Incld 10 HIS/13 3m PM Table of Contents xi Toolkit Part B Toolkit Part D CASE Tools Internet Resource Tools Objectives 582 Objectives 620 Introduction 582 Introduction 620 Preview Case: Mountain View College Preview Case: Mountain View Bookstore 583 College Bookstore 621 Overview of CASE Tools 584 Overview 622 CASET ools History 5SS Planning an Internet Research Strategy 622 The Marketplace for CASE Tools 58S Step I, Review Your Jnfonnation Requirements 622 CASE Terms and Concepts 586 Step 2. Usc the Proper Search Tools and Techniques 622 Repository 586 Step 3. Evaluate the Resufts 623 Individual Tools 586 Step 4. Consider Copyright and Data Integrity Issues 623 DEVELOPMENT ENVIRONMENTS 589 Search Basics 624 Integrated Development Envii"'nmcnu 58~ Search Engines 625 AppUcation Life Cycle Management Environments 58~ Search Engine Concepts 625 Pros and Cons of Integrated Development Tools 5'10 Search Techniques 626 CASE Tool Examples 591 Online Tutorials 627 Visible Analyst 5~1 Advanced Search Techniques 628 Rational Software 5'n Search Chcckl~t 62~ CASE Tool Trends 593 Subject Directories 630 New Products and Fcawres 5~4 A Subject Directory Example 630 Method-Specific CASE Tools 5~4 Advantages and Disadvantages of Subject Directories 632 Toolkit Summary 595 The Invisible Web 632 Invisible Web Examples 632 Key Terms 597 Navigation Tools for the InvisibleW eb 633 Toolkit Exercises 598 Internet Communication Channels 634 Social Networking 635 Toolkit Part C Forums 635 Newsletters, Slogs, Po.dcasu,and Webcasts 636 RSS Feeds 636 Financial Analysis Tools Webinars 637 Majling lists 637 Objectives 600 Web.Based Discussion Groups 637 Chat Rooms 638 Introduction 600 Instant Messaging and Text Messaging 638 Preview Case: Mountain View Information Technology Community Resources 639 College Bookstore 601 Corporate Resources 641 Describing Costs and Benefits 602 Govcmment Resourc.es 641 Personal and Profe,ssional Resources 641 Cost Classifications 602 Online Learning Resources 642 Managing Information Systems Costs and Charges 604 Benefit Classifications 605 Toolkit Summary 644 Cost-Benefit Analysis 605 Key Terms 646 Video Learning Session: Payback Analysis 605 Toolkit Exercises 647 Payback Analysis 606 Glossary/Index 649 Using a Spreadsheet to Compute Payback Analysis 608 Video Learning Session: Retum on Investment 609 Return on Investment Analysis 610 Using a Spreadsheet to Compute ROI 611 Video Learning Session: Present Value Analysis 612 Present Value Analysis 612 Using a Spreadsheet to Calculate Present Value 614 Toolkit Summary 616 Key Terms 617 Toolkit Exercises 618 Questions 618 Projects 618 Cql~Ti~ 20U C<~ ~ All Ri~ Jt~..W. Ml~' WI bee~ 0(&111(<,1, ~ d11p~. in wholo Ill' i3 fWl.-~ w tl~nx :i,Vr.s. Wtt(' tir.l pv!)> OC'!II«II m.or be Wl'ffU1«1 £rvm e:,e elk-o.lk ~ t01r('4«(t.), &lic.,rial nvkw hMo ok(tll(l.llh;,t ·n~· w~ IX'!II«<C Otoe$ n\1'1 .-n,.n~· llt'!«ttllt q.-utill~"ttin& e•pcno:!>,Jf, (:(Oft(: L<-=c re.e...,~ the :i~ 10 ~~ l!<.kliD(IO'I.-1 OC'!II«<C ll WI)' d~«~-1 $11bo(qunr; n,;;. fO!riW«~, m;uiro ._ I I 97812851713·~0_FM.Incld 11 HIS/13 3m PM

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.