BCA System analysis and Design( Input And Output Form Design Methodologies, Programing Specifications)
Input And Output Form Design Methodologies-
Input Design:-
In an information system, input is the raw data that is processed to produce output. During the
input design, the developers must consider the input devices such as PC, MICR,
OMR, etc. It should serve specific purpose effectively such as storing,
recording, and retrieving the information.
Properties:-
·
It ensures proper completion with accuracy.
·
It should be easy to fill and straightforward.
·
It should focus on user’s attention, consistency, and
simplicity.
Output Design:-
The
design of output is the most important task of any system. During output
design, developers identify the type of outputs needed, and consider the
necessary output controls and prototype report layouts.
Types
of outputs:-
1.External
Outputs:-
Manufacturers
create and design external outputs for printers. External outputs enable the
system to leave the trigger actions on the part of their recipients or confirm
actions to their recipients.
2.Internal
outputs:-
Internal
outputs are present inside the system, and used by end-users and managers. They
support the management in decision making and reporting.
Menu:-
·The use of the menu is for collect the commands in drop down approach.
· For Example-
Screen Design-
· User interface is the front-end application view to which user interacts in order to use the software. User can manipulate and control the software as well as hardware by means of user interface.
· · Today, user interface is found at almost every place where digital technology exists, right from computers, mobile phones, cars, music players, airplanes, ships etc.
· · User interface is part of software and is designed such a way that it is expected to provide the user insight of the software. UI provides fundamental platform for human-computer interaction.
Layout Consideration-
· Arrange the components on the screen s called Layout.
· · When planning a layout it is important to consider the space around each item which is needed as 'Standing space'.
· · For example when drying after a bath or shower, washing at the basin or using the WC all these areas have to be taken into consideration to ensure that each space is adequate to create a comfortable.
From Driven Methodology
In structured design a hierarchy chart represents a good program design it meets the criteria of cohesion and coupling. Each module performs single function (cohesion) and should be independent of the rest of program (coupling)
HIPO Chart:-
HIPO (Hierarchy-Input-Process-Output) charts are a structured design methodology used to document program design. They consist of a hierarchy chart showing module relationships and IPO charts for each module showing inputs, processes, and outputs. The goals of HIPO charts are to understand system functions, describe data flow between processes, and define inputs and outputs at each level. To create HIPO charts, the highest level inputs and outputs are defined first, then processing steps are identified and decomposed into sub-processes with their own IPO descriptions.
Diagram of HIPO Chart
IPO Chart
An IPO chart is a model used in computer programming and system analysis to represent a process's structure and flow. IPO stands for Input, Process, and Output, which are the three essential components of a chart. It helps understand and illustrate how the inputs of a system are transformed into outputs through various processing steps.
1. Identify the input 2. Determine the process 3. Recognize the output
1. Identify the Input
The first component of an IPO chart is the Input. Inputs are the data or information that enter the system and are used in the processing phase. Examples of inputs can be information from users, external systems, or data sources. You need to identify the inputs for the process you're examining and list them in the Input section of the IPO chart.
2. Determine the Process
The Process is the central part of an IPO chart, where the inputs are transformed into outputs. It consists of the necessary steps, operations, or activities performed on the inputs. In computer programming, the process consists of algorithms, calculations, and decision-making executed by the program. You should define all the steps required to accomplish the desired output, given the input data.
3. Recognize the Output
The Output is the result produced by the system after processing the inputs. It can be presented in various formats, like displaying on screens, generating reports, or triggering other systems. Identify and list all outputs expected from the process in the Output section of the IPO chart
Programming Specifications( विशेष विवरण)-
program:- A program is a set of instructions that a computer follows in order to perform a particular task.
Specifications:- A detailed description of the hardware installed, including the memory capacity, processor speed, and graphics card model.
Programming Specifications:-
A program specification is the definition of what a computer program is expected to do.
It can be informal,in which case it can be considered as a blueprint or user manual from a developer point of view.
formal, in which case it has a definite meaning defined in mathematical or programmatic terms.
Specifications are most important for external interfaces that must remain stable.
Operator Manual-
Systems operators must be trained properly such that they can handle all possible operations, both routine and extraordinary.
The operators should be trained in what common malfunctions may occur, how to recognize them, and what steps to take when they come.
Training involves creating troubleshooting lists to identify possible problems and remedies for them, as well as the names and telephone numbers of individuals to contact when unexpected or unusual problems arise.
System testing and Quality Assurance-
Testing-
Testing is the process or activity that checks the functionality and correctness of
software according to specified user requirements in order to improve the quality
and reliability of system. It is an expensive, time consuming, and critical approach
in system development which requires proper planning of overall testing process.
Quality Assurance-
It is the review of system or software products and its documentation for
assurance that system meets therequirements and specifications.
Purpose of QA :-
It is to provide confidence to the customers by constant delivery of product according to specification.
Software quality Assurance (SQA) is a techniques that includes procedures and tools applied by the software professionals to ensure that software meet the specified standard for its intended use and performance.
Steps in System Implementations and Software Maitenance-
Software maintenance is a part of Software Development Life
Cycle. Its main purpose is to modify and update software
application after delivery to correct faults and to improve
performance. Software is a model of the real world. When the
real world changes, the software requires alteration wherever
possible.
Data security
Data security is the practice of protecting digital information from unauthorised access, corruption or theft throughout its entire lifecycle.
It includes the physical security of hardware and storage devices, along with administrative and access controls.
Types of data security
To enable the confidentiality, integrity and availability of sensitive information, organizations can implement the following data security measures:
Encryption
Data erasure
Data masking
Data resiliency
Encryption
By using an algorithm to transform normal text characters into an unreadable format, encryption keys scramble data so that only authorized users can read it
Data erasure
Data erasure uses software to completely overwrite data on any storage device, making it more secure than standard data wiping. It verifies that the data is unrecoverable.
Data masking
By masking data, organizations can allow teams to develop applications or train people that use real data. It masks personally identifiable information (PII) where necessary so that development can occur in environments that are compliant.
Data resiliency
Resiliency depends on how well an organization endures or recovers from any type of failure—from hardware problems to power shortages and other events that affect data availability.
Data security capabilities and tools
Data discovery and classification tools
Data and file activity monitoring
Vulnerability assessment and risk analysis tools
Automated compliance reporting
Data security strategies
Physical security of servers and user devices
Access management and controls
Application security and patching
Backups
Employee education
Network and endpoint security monitoring and controls
Data security trends
In the changing landscape of data security, new developments such as AI, multi cloud security and quantum computing are influencing protection strategies, aiming to improve defence against threats.
Disaster(आपदा)/Recovery Planning
Sometimes your system burns out or a dishonest employee makes the serious damage in it? Then how you recover? How do you get your information? Thus this becomes a big issue. Studies shows that within 48 hours after the loss of computer operation, a company‘s survival is threatened. The loss of sales and productions causes the direct financial loss. Indirect financial losses refer to the long term loss of consumers, uncollected receivables and undetected frauds. Data integrity and business decisions cause the loss of control over vital data.
Definition:-
Disaster/ Recovery planning refers to minimise the loss if a disaster occurs by addressing the concern for system
in which potential exposure are identified, applications are prioritizing and safeguards are designed.
In disaster/Recovery planning, the primary role of management is to accept the requirements for contingency(संकट)planning alternative measure selection and benefits reorganization. These can be derived/inherited from establishing a disaster recovery plan.
disaster recovery plan
A plan in disaster/recovery planning answers the how, what, why, where and when questions. Initiate a plan involves four phases:-
1. Appoint a disaster/recovery team.
2. Prepare planning tasks.
3. Disaster/recovery manual.
4. Dummy run to test the procedure.
The Team:-
The team of disaster/recovery includes a class of system users, designers and computer operators. The main goal of the team is to organize and monitor the projects and their progress and completion.
The plan is kept up to date periodically by the team. The team describes new rules, procedures and technologies to make a plan best. The team performs the following tasks:-
Save the backup files provide
communication features.
3. provide customer and administrative support.
4. use the hardware to meet the minimum processing requirements.
5. provide operating system copies and application programs.
Planning Tasks:- Planning tasks in disaster/recovery planning use the concept of system development. It means it also works in a cyclic manner. It include the following phases:-
1. Definition phase:- It is used to describe the goals or objectives of the disaster/recovery project.
2. Requirement phase:- This phase evaluates the l
3. Design phase:- This phase helps to design alternatives, vendors, requirement and prices and then choose the
best one.
4. Testing and Implementation:- Testing means to make a plan error free. Thus it helps to detect and correct the errors. After testing, implementation is done. In implementation, sites and procedures are written and prepared. It also maintains the plans according to the change in time.
3) The Manual:- After the completion of the assignment, disaster manuals are prepared. The team members and management share the copies of the manuals that are updated according to the requirements.
Ethics( Manner, नीति) in System Development:-
With the increase in computer use, problems of dishonest(बेईमान) and unethical issues are also increased. These problems have tempted( लुभाना) the employees to steal the records and sensitive information. Computer related crimes, security ethics have a deep impact( प्रभाव) on the system analysts. Thus there is a need to produce the operational codes of ethics that helps to gain the good knowledge, sense and law. These codes also help to support the privacy conditions against the religious( धार्मिक) and political affiliations( connection, bond, जुडाव). It aware the security safeguards to make the files confidential(गोपनीय).
Ethics Codes and Standards of Behavior
Development of Standards and codes of behaviour is necessary to concern the ethical behaviour of analysts and professionals. Three associations are most important, these are
1. Data Processing Management Association,
2. The Association for Computing Machinery
3. Institute for Certification of Computer Professionals.
These codes of ethics handle the problems of honesty, competency, and confidentiality. Unfortunately there are limited associations that punish the code violators.
Comments
Post a Comment