BCA System analysis and Design( Input And Output Form Design Methodologies, Programing Specifications)

 Input And Output Form Design Methodologies-

Input Design:-

In an information system, input is the raw data that is processed to produce output. During the input design, the developers must consider the input devices such as PC, MICR, OMR, etc. It should serve specific purpose effectively such as storing, recording, and retrieving the information.

 

Properties:-

·         It ensures proper completion with accuracy.

·         It should be easy to fill and straightforward.

·         It should focus on user’s attention, consistency, and simplicity.

 

Output Design:-

The design of output is the most important task of any system. During output design, developers identify the type of outputs needed, and consider the necessary output controls and prototype report layouts.

Types of outputs:-

1.External Outputs:-

Manufacturers create and design external outputs for printers. External outputs enable the system to leave the trigger actions on the part of their recipients or confirm actions to their recipients.

2.Internal outputs:-

Internal outputs are present inside the system, and used by end-users and managers. They support the management in decision making and reporting.

 

 

Menu:-

·The use of the menu is for collect the commands in drop down approach.

· For Example-

 


Screen Design-

 ·      User interface is the front-end application view to which user interacts in order to use the software. User can manipulate and control the software as well as hardware by means of user interface.

·       ·  Today, user interface is found at almost every place where digital technology exists, right from computers, mobile phones, cars, music players, airplanes, ships etc.

·      ·    User interface is part of software and is designed such a way that it is expected to provide the user insight of the software. UI provides fundamental platform for human-computer interaction.

 

Layout Consideration-

 ·        Arrange the components on the screen s called Layout.

·       ·  When planning a layout it is important to consider the space around each item which is needed as 'Standing space'.

·       ·   For example when drying after a bath or shower, washing at the basin or using the WC all these areas have to be taken into consideration to ensure that each space is adequate to create a comfortable.


From Driven Methodology

In structured design a hierarchy chart represents a good program design it meets the criteria of cohesion and coupling. Each module performs single function (cohesion) and should be independent of the rest of  program (coupling)


HIPO Chart:-

HIPO (Hierarchy-Input-Process-Output) charts are a structured design methodology used to document program design. They consist of a hierarchy chart showing module relationships and IPO charts for each module showing inputs, processes, and outputs. The goals of HIPO charts are to understand system functions, describe data flow between processes, and define inputs and outputs at each level. To create HIPO charts, the highest level inputs and outputs are defined first, then processing steps are identified and decomposed into sub-processes with their own IPO descriptions.

Diagram of HIPO Chart



IPO Chart

An IPO chart is a model used in computer programming and system analysis to represent a process's structure and flow. IPO stands for Input, Process, and Output, which are the three essential components of a chart. It helps understand and illustrate how the inputs of a system are transformed into outputs through various processing steps.

1. Identify the input      2. Determine the process   3. Recognize  the output

1. Identify the Input

The first component of an IPO chart is the Input. Inputs are the data or information that enter the system and are used in the processing phase. Examples of inputs can be information from users, external systems, or data sources. You need to identify the inputs for the process you're examining and list them in the Input section of the IPO chart.


2. Determine the Process

The Process is the central part of an IPO chart, where the inputs are transformed into outputs. It consists of the necessary steps, operations, or activities performed on the inputs. In computer programming, the process consists of algorithms, calculations, and decision-making executed by the program. You should define all the steps required to accomplish the desired output, given the input data.


3. Recognize the Output

The Output is the result produced by the system after processing the inputs. It can be presented in various formats, like displaying on screens, generating reports, or triggering other systems. Identify and list all outputs expected from the process in the Output section of the IPO chart


Programming Specifications( विशेष विवरण)-

program:- A program is a set of instructions that a computer follows in order to perform a particular task.

Specifications:- A detailed description of the hardware installed, including the memory capacity, processor speed, and graphics card model.

Programming Specifications:-

A program specification is the definition of what a computer program is expected to do. 

It can be informal,in which case it can be considered as a blueprint or user manual from a developer point of view.

formal, in which case it has a definite meaning defined in mathematical or programmatic terms.

 Specifications are most important for external interfaces that must remain stable.

Operator Manual-


Systems operators must be trained properly such that they can handle all possible operations, both routine and extraordinary. 


The operators should be trained in what common malfunctions may occur, how to recognize them, and what steps to take when they come.


Training involves creating troubleshooting lists to identify possible problems and remedies for them, as well as the names and telephone numbers of individuals to contact when unexpected or unusual problems arise.


System testing and Quality Assurance-

Testing-

Testing is the process or activity that checks the functionality and correctness of


software according to specified user requirements in order to improve the quality


and reliability of system. It is an expensive, time consuming, and critical approach


in system development which requires proper planning of overall testing process.


Quality Assurance-

It is the review of system or software products and its documentation for


assurance that system meets therequirements and specifications.


Purpose of QA :-

  1. It is to provide confidence to the customers by constant delivery of product according to specification.

  2. Software quality Assurance (SQA) is a techniques that includes procedures and tools applied by the software professionals to ensure that software meet the specified standard for its intended use and performance.

Steps in System Implementations and Software Maitenance-

Software maintenance is a part of Software Development Life

Cycle. Its main purpose is to modify and update software

application after delivery to correct faults and to improve

performance. Software is a model of the real world. When the

real world changes, the software requires alteration wherever

possible.


Data security

Data security is the practice of protecting digital information from unauthorised access, corruption or theft throughout its entire lifecycle.

It includes the physical security of hardware and storage devices, along with administrative and access controls.

Types of data security

To enable the confidentiality, integrity and availability of sensitive information, organizations can implement the following data security measures:

  1. Encryption

  2. Data erasure

  3. Data masking

  4. Data resiliency


Encryption

By using an algorithm to transform normal text characters into an unreadable format, encryption keys scramble data so that only authorized users can read it

Data erasure

Data erasure uses software to completely overwrite data on any storage device, making it more secure than standard data wiping. It verifies that the data is unrecoverable.

Data masking

By masking data, organizations can allow teams to develop applications or train people that use real data. It masks personally identifiable information (PII) where necessary so that development can occur in environments that are compliant.

Data resiliency

Resiliency depends on how well an organization endures or recovers from any type of failure—from hardware problems to power shortages and other events that affect data availability


Data security capabilities and tools


  1. Data discovery and classification tools

  2. Data and file activity monitoring

  3. Vulnerability assessment and risk analysis tools

  4. Automated compliance reporting


Data security strategies


  1. Physical security of servers and user devices

  2. Access management and controls

  3. Application security and patching

  4. Backups

  5. Employee education

  6. Network and endpoint security monitoring and controls


Data security trends

In the changing landscape of data security, new developments such as AI, multi cloud security and quantum computing are influencing protection strategies, aiming to improve defence against threats.



Disaster(आपदा)/Recovery Planning

Sometimes your system burns out or a dishonest employee makes the serious damage in it? Then how you recover? How do you get your information? Thus this becomes a big issue. Studies shows that within 48 hours after the loss of computer operation, a company‘s survival is threatened. The loss of sales and productions causes the direct financial loss. Indirect financial losses refer to the long term loss of consumers, uncollected receivables and undetected frauds. Data integrity and business decisions cause the loss of control over vital data.

Definition:-

Disaster/ Recovery planning refers to minimise the loss if a disaster occurs by addressing the concern for system 

in which potential exposure are identified, applications are prioritizing and safeguards are designed. 

In disaster/Recovery planning, the primary role of management is to accept the requirements for contingency(संकट)planning alternative measure selection and benefits reorganization. These can be derived/inherited from establishing a disaster recovery plan.


disaster recovery plan

A plan in disaster/recovery planning answers the how, what, why, where and when questions. Initiate a plan involves four phases:-

1. Appoint a disaster/recovery team.

2. Prepare planning tasks.

3. Disaster/recovery manual.

4. Dummy run to test the procedure.


 The Team:-

The team of disaster/recovery includes a class of system users, designers and computer operators. The main goal of the team is to organize and monitor the projects and their progress and completion. 

The plan is kept up to date periodically by the team. The team describes new rules, procedures and technologies to make a plan best. The team performs the following tasks:-

  1. Save the backup files provide

  2.  communication features.

3. provide customer and administrative support.

4. use the hardware to meet the minimum processing requirements.

5. provide operating system copies and application programs. 

Planning Tasks:- Planning tasks in disaster/recovery planning use the concept of system development. It means it also works in a cyclic manner. It include the following phases:-

1. Definition phase:- It is used to describe the goals or objectives of the disaster/recovery project.


2. Requirement phase:- This phase evaluates the l


3. Design phase:- This phase helps to design alternatives, vendors, requirement and prices and then choose the 

best one.


4. Testing and Implementation:- Testing means to make a plan error free. Thus it helps to detect and correct the errors. After testing, implementation is done. In implementation, sites and procedures are written and prepared. It also maintains the plans according to the change in time. 


3) The Manual:- After the completion of the assignment, disaster manuals are prepared. The team members and management share the copies of the manuals that are updated according to the requirements.


Ethics( Manner, नीति) in System Development:-

With the increase in computer use, problems of dishonest(बेईमान)  and unethical issues are also increased. These problems have tempted( लुभाना) the employees to steal the records and sensitive information. Computer related crimes, security ethics have a deep impact( प्रभाव) on the system analysts. Thus there is a need to produce the operational codes of ethics that helps to gain the good knowledge, sense and law. These codes also help to support the privacy conditions against the religious( धार्मिक) and political affiliations( connection, bond, जुडाव). It aware the security safeguards to make the files confidential(गोपनीय).


 Ethics Codes and Standards of Behavior

Development of Standards and codes of behaviour is necessary to concern the ethical behaviour of analysts and professionals. Three associations are most important, these are 

1. Data Processing Management Association,

2. The Association for Computing Machinery

3. Institute for Certification of Computer Professionals. 

These codes of ethics handle the problems of honesty, competency, and confidentiality. Unfortunately there are limited associations that punish the code violators.









Comments

Popular posts from this blog

Class 10th IT(402) sample paper

CLASS 12TH WEBAPPLICATION(CODE 803) PRACTICAL FILE

class 12th Unit-3 Web Scripting - Java Script