1.2.4-11 System Design + Analysis Flashcards
What is a Stakeholder?
Someone (or some people) that have an interest or concern in an organisation.
Name 3 internal stakeholders
Employees, Manager, Owners
Name 5 external stakeholders
Suppliers, Society, Government, Creditors, Shareholders, Customers.
What is a Creditor?
a person or company whom money is owing
What is a Shareholder?
someone who owns at least one share of the company.
What must a new system consider when identifying a stakeholder?
Who will be affected
Who will the new system affect
Who will the end users be
What are their needs
What must all systems be designed under.
Utilitarianism philosophy.
How does one find out what a client wants?
- Surveys
- Interviews
- Collection documents
- Direct observation
What is Utilitarianism?
for the greatest good for the greatest number of people.
What are the pros of surveys?
- Large amount of data can be gathered.
- Takes little time to analyse (if done electronically)
- simple
What are the cons of surveys
- it is hard to ask the correct question
- information can be limited or biased.
- quality of response is not ensured.
What are collection documents?
Looking into documents currently in use in the system to find out how system works.
What are the pros of collection documents?
- Detailed information about the present system can be gathered.
- It can be seen where old system had problems.
What are the cons of collection documents?
- Time consuming.
- Inputs/outputs and forms may be confusing.
What are the pros of interviews?
- Allows detailed information.
- People can be asked what they don’t like about the system.
What are the cons of interviews?
Takes a long time.
What are the pros of observation?
Great at gathering first hand unbiased information.
What are the cons of observation?
Often people won’t work as they would normally do when being observed.
What are the four steps of designing a new system?
Determine stakeholders
Obtain requirements
Gather information for new system
Start designing/building a new system
What needs to be done to gather sufficient information about new systems?
- Examining current systems.
- Looking at competiting products
- organisational capabilities.
- Literature searches.
When looking at current systems what is important to consider?
What is currently being done.
Who does what and what do they want, think about five components of a computer system.
When looking at an organisation what is important to consider?
Can they afford a new system?
Can the staff use the new system, do they need training?
Can they have any ‘downtime’ to upgrade?
When looking at a competition what is important to consider?
Have a look at what competitors are doing, get an idea of what is being done at the moment.
When looking at literature what is important to do?
Have a look online and in books for what else might be out there.
What is a prototype?
They are abstract representations of the system. Focussing on one or two key aspects.
Why is a prototype important?
Important in testing, as they can test the system before implementing it, demonstrating it to the client.
Why must a company use a prototype?
Fail early and inexpensively
Gather more accurate requirements
Technical understanding
Resolve conflicts
Rally financial support
File patents more
What are the six steps in developing a prototype?
Design
Build Prototype
User tests prototype
Feedback provided
Refine Prototype
x repeat test and feedback
Final product
What is an iteration?
The act of repeating.
What is iteration in code?
in code senses, like an iteration loop, e.g. for or while.
What is iteration in real life?
Or in a procedural sense, like keep trying until reaches a result, them repetitive testing etc.
What are the consequences in not involving the end user in the system?
- User may be unsatisfied with the system.
- System may be unsuited for user’s problem, affecting productivity.
What is modularity?
Software modularity is measured by how well software is decomposed into smaller pieces with standardized interfaces
4 Methods of authentication
Encryption = encode data with only certain people who have access to the key.
Authentication = Requiring certain things, or information to access.
Physical security Measures = behind a locked door or pass door.
Restrict access to data = only allow certain individuals to access it at certain times, on certain devices.
What is the top square of the UML diagram?
Class Name
What is the middle square of the UML diagram?
Varibales
What is the bottom square of the UML diagram?
Functions
How do you write a variable in a UML diagram?
+ stringName: str
How do you write a function in a UML diagram?
+ stringFunction()
+stringBooleanFunction() : bool
: after the : put the output type, you may also have to put in relevant variables within the brackets.