SAD - Basic Notes
SAD - Basic Notes
SAD - Basic Notes
Definition of a System
The term system is derived from the Greek word systema, which means an organized
relationship among functioning units or components. A system exists because it is
designed to achieve one or more objectives. We come into daily contact with the
transportation system, the telephone system etc. Similarly we talk of the business
system and of the organization as a system consisting of interrelated departments
such as production, sales, personnel.
There are more than a hundred definitions of the word system but most seem to have
a common thread that suggests that a system is an orderly grouping of
interdependent components linked together according to a plan to achieve a specific
objective. The word component may refer to physical parts or a subsystem in a
multilevel structure. The components may be simple or complex, basic or advanced.
They may be a single computer with a keyboard, memory and printer or a series of
intelligent terminals linked to a mainframe. In either case each component is part of
the total system and has to do its share to work for the system to achieve the
intended goal. This orientation requires an orderly grouping of the components for
design for a successful system.
The study of systems concept, has three basic implications:
1. A system must be designed to achieve a predetermined objective.
2. Interrelationship and interdependence must exist among the components.
3. The objectives of the organization as a whole have higher priority that the
objectives of its subsystems.
Characteristics of a System
Our definition of a system suggests some characteristics that are present in all
systems: organization, interaction, inter dependences, interaction and a central
objective.
Organization
Organization implies structure and order. It is the arrangement of components that
helps to achieve objectives. In the design of a business system, for example, the
hierarchical relationship starting with president on top and leading downward to the
blue-collar workers represents the organization structure. Such an arrangement
portrays a system subsystem relationship, defines the authority structure, specifies
the formal flow of communication and formalizes the chain of command (see figure
1.1). Likewise a computer system is designed around an input device, a central
processing unit, and output device and one or more storage units.
Interaction
Interaction refers to the manner in which each component functions with other
components of the system. In an organization, for example, purchasing must interact
with production, advertising with sales, and payroll with personnel. In a computer
system the central processing unit must intract with input device to solve a problem.
In turn, the main memory holds programs and data that the arithmetic unit uses for
computation. The interrelationship between these components enables the computer
to perform.
Interdependence
Interdependence means that parts of the organization or computer system depend
on one another. They are coordinated and linked together according to a plan. Our
subsystem depends on the input of another subsystem for proper functioning i.e. the
Formal
organization
President position
Workers Workers
output of one subsystem is the required input for another subsystem. This
interdependence is crucial in systems work.
Figure 1.1: Organisation Structure
Production
Research &
Development.
Marketing
Major Higher-level
subsystem
Purchasing
Financing &
administration
Distribution system
Personnel
Intermediate (Middle-level
subsystem
Employme
Figure 1.2:
nt section
Major subsystems of Production Firm
Benefits &
services
section Unemployme
nt reports
To illustrate these system characteristics, figure 1.2 shows three Labourlevels of
Labour distribution
subsystems. Each
section of the topHealth
inner
and
safety
circles represent a major subsystem
reports of a
production firm. The personnel subsystem,
section in turn, may be
Voluntary
deduction viewed as a system that
reports
consists of subsystemsTraining
such as a benefits and safety, and employment.
section Health and
Fringe benefits
reports
safety as a key personnel subsystem consists of lower level Insuranceelements that are
benefits reports
considered vital in personnel operation.
Input
data
Computer
programs Remote
Budget terminals for
data acquisition
Data
base
Finance
Feedbac
k and Action
control report
Administrators
Demograph
ic data
Other authorized
Personnel staff
users
Figure 1.3: A Human Resources Information System
Integration
Integration refers to the holism of systems. Synthesis follows analysis to achieve the
central objective of the organization. Integration is concerned with how a system is
tied together. It is more than sharing a physical part or location. It means that parts
of the system work together within the system even though each part performs a
unique function.
Central Objective
The last characteristics of a system is its central objective. Objective may be real or
stated. Although a stated objective may be the real objective, it is not uncommon for
an organization to state one objective and operate to achieve another. The important
point is that users must known the central objective of a computer application early
in the analysis for a successful design and conversion.
Elements of a System
1. Output and Inputs
2. Processor(s)
3. Control
4. Feedback
5. Environment
6. Boundaries and Interface
Compare output
against
performance
standards
Informational
Action feedback
Management
(Control)
Policy decision
Human resources,
material, energy,
information Transformation Goods of services
Standard of
Input Processing performance
Output
Processor(s)
The processor is the element of a system that involves the actual transformation of
input into output. It is the operational component of the system. Processor may
modify the input totally or personally, depending on the specifications of the output.
This means that as the output specifications change so does the processing. In some
cases, input is also modified to enable the processor to handle the transformation.
Control
The control element guides the system. It is the decision – making sub-system that
controls the pattern of activities governing input, processing and output. In an
organizational context, management as a decision making body controls the inflow
handling and outflow of activities that affects the welfare of the business. Output
specification determine, what and how much input is needed to keep the system in
balance.
In system analysis, knowing the attitudes of the individuals who control the area for
which a computer is being considered can make a difference between the success
and the failure of the installation. Management support is required for securing
control and supporting the objective of the proposed change.
Feedback
Control in a dynamic system is achieved by feedback. Feedback measures output
against standard in some form. After the output is compared against performance
standards, changes can result in the input or processing and consequently, the
output.
Feedback may be positive or negative, routine or informational. Positive feedback
reinforces the performance provides the controller with information for action. In
system analysis, feedback is important in different ways. During analysis, the user
may specify that the problems in a given application, and justify the need for change.
Another form of feedback comes after the system is implemented. The user informs
the analyst about the performance of the new installation. This feedback often results
in enhancements to meet the user’s requirements.
Environment
The environment is the “suprasystem” within which an organization operates. It is the
source of external elements that unhinge on the system. In fact, it often determines
how a system must function. The organization’s environment, consisting of vendors,
competitions and others, may provide constraints and consequently influence the
actual performance of the business.
Types of Systems
Systems have been classified in different ways. Common classifications are:
(i) Physical or abstract systems
(ii) Open or closed systems
(iii) Deterministic or probabilistic systems
(iv) Man-made information systems
(i) Physical or Abstract Systems: Physical systems are tangible entities that may
be static or dynamic in operation. Abstract systems are conceptual or non-
physical entities which may be as straightforward as formulas of relationships
among sets of variables or models - the abstract conceptualization of physical
situations.
(ii) Open or Closed Systems: An open system continually interacts with its
environments. It receives inputs from and delivers output to the outside. An
information system belongs to this category, since it must adapt to the
changing demands of the user. In contrast, a closed system is isolated from
environmental influences. In reality completely closed systems are rare.
(iii) Deterministic or Probabilistic Systems: A deterministic system is one in which
the occurrence of all events is perfectly predictable. If we get the description of
the system state at a particular time, the next state can be easily predicted. An
example of such a system is a numerically controlled machine tool.
Probabilistic system is one in which the occurrence of events cannot be
perfectly predicted. An example of such a system is a warehouse and its
contents.
(iv) Man-made Information Systems: It is generally believed that information
reduces uncertainty about a state or event. For example, information that the
wind is calm reduces the uncertainty that a trip by boat will be enjoyable. An
information system is the basis for interaction between the user and the
analyst. It determines the nature of relationship among decision makers. In
fact, it may be viewed as a decision centre for personnel at all levels. From this
basis, an information system may be defined as a set of devices, procedures
and operating systems designed around user-based criteria to produce
information and communicate it to the user for planning, control and
performance. Many practitioners fail to recognise that a business has several
information systems; each is designed for a specific purpose. The major
information systems are:
formal information systems
informal information systems
computer based information system
A Formal information system is based on the organisation represented by the
organization chart. The chart is a map of positions and their authority relationships,
indicated by boxes and connected by straight lines. It is concerned with the pattern of
authority, communication and work flow.
An Informal information system is an employee-based system designed to meet
personnel and vocational needs and to help in the solution of work-related problems.
It also funnels information upward through indirect channels. In this way, it is
considered to be a useful system because it works within the framework of the
business and its stated policies.
Third category of information system depends mainly on the computer for handling
business applications. Systems analysts develop several different types of
information systems to meet a variety of business needs. There is a class of systems
known collectively as Computer Based Information Systems. As we have different
types of transportation systems such as highway systems, railway systems and
airline systems, computer based information systems are of too many types. They
are classified as:
Transaction Processing Systems (TPS)
Management Information Systems (MIS)
Decision Support Systems (DSS)
Office Automation Systems (OAS).
The next figure shows the organisation chart of computer based information system
(CBIS) and figure shows the hierarchical view of CBIS.
Category of Characteristics
Information System
1. Recognition of need
Preliminaryy survey/ What is the problem or Statement of scope and
Initial investigation opportunity? Objectives
Performance criteria
2. Feasibility study
Evaluation of existing What are the user’s Technical/behavioral
System and procedures demonstrabel needs? Feasibility
Analysis alternative Is the problem worth Cost/benefit analysis
Candidate system solving? System scope and objectives
Cost estimates How can the problem be Statement of new scope and
Redefined? Objectives
3. Analysis
Detailed evaluation of What must be done to solve Logical model of system—
Present system the problem? e.g., data dictionary, data
Data collection What are the facts? flow diagram
Pertient data
4. Design
General design In general, how must the Design of alternative
specifications problem be solved? solutions
Detailed design Specifically, how must the Final cost/benefit analysis
specifications problem be solved? Hardware specifications
Output What is the system Cost estimates
Input (processing) flow? Implementation specifications
Fiels
Procedures Does the user approve the Implementation schedule
System? Approval of system by user
Programs
Program constrcution
Testing
Unit testing How well do individual Security, audit, and operating
Combined module programs/modules test out? Procedures
Testing How ready are programs for Actual hardware use
User acceptance acceptance test? Formal system test
Testing
5. Implementation
User training What is the actual operation? Training program
File/System conversion Are user manuals ready? User-friendly documentation
Are there delays in lading
Files?
6. Post-implementation and
Maintenance
Evaluation Is the key system running? User requirements met
Maintenance Should the system be User standards met
Enchancements modified? Satisfied user
Project Selection
The project has to be identified before it can be solved. The basis for an alternative
system is the recognition of a need for improving an information system or a
procedure.
The idea for change originates in the environment or within the firm due to any of the
following reasons :
speed of processing needed to be improved
increased workload
to cut down on cost of processing
requirement of increased accuracy/reliability of output reports generated
security of processing
Environment based ideas originate from customers, vendors, government sources
etc. e.g., new unemployment compensation regulations may make it necessary to
change the reporting procedure, format, and content of various reports, as well as the
file structures. Customer complaints about the delivery of orders may prompt an
investigation of the delivery schedule, the experience of the truck drivers, or the
volume of the orders to be delivered.
Ideas for change may also come from within the organisation's top management or
from the users.
When investigated, each of these ideas may lead to a problem definition which leads
to the first step in the system life cycle process.
The objective of this phase is to answer the following questions :
1. What is the problem (or opportunity) perceived ?
2. What are the goals to be achieved by the solution ?
3. What are the benefits which will result from achieving the solution ?
These details may be recorded in an informal note or in a formal document. This
document would be called the Project Request Form.
A request to receive assistance from an information system can be made for many
reasons, but in each case someone-a manager, an employee, or a systems specialist
- initiates the request.
The project proposal submitted by the users to the project selection committee is a
critical element while launching a systems study.
The form of such a request varies from firm to firm, but there is a general
agreement on the kind of information that should be provided.
A sample of the project request form is shown below.
THE PROJECT REQUEST FORM
Job Title Nature of Request To be completed
Investigation of Job Data not
an on-line safe _____ New 27/07/2001 later than
deposit system. _____ Revision 12/05/2002
Job Objectives: Provide customer service, reduce paper work, better billing
system, and possible reduction in staffing requirements.
As seen from the above table, the user’s request form specifies the following:
1. User-assigned title of work requested.
2. Nature of work requested (problem definition).
3. Date on which the request was submitted.
4. Date by which the job should be completed.
5. Job objective(s) - purpose of job requested.
6. Expected benefits to be derived from the proposed change.
7. Input/output description-quantity (number of copies or pages) and frequency
(daily, weekly, etc.) of inputs and outputs of the proposed change.
8. Requester's signature, title, department, and phone number.
9. Signature, title and department of the person(s) approving the request.
Scope of Study
The purpose of the preliminary investigation is to evaluate the project requests. It is
not a design study. It is collecting the information that permits the committee
members to
Feasibility Study
Depending on the results of the initial investigation, the survey is expanded to a
more detailed feasibility study. As we shall learn, a feasibility study is a test of a
system proposal according to its workability impact on the organization, ability to
meet user needs, and effective use of resources. It focuses on there major questions:
i. What are the user’s demonstrable needs and how does a candidate system meet
them?
ii. What resources are available for given candidate systems? Is the problem worth
solving?
iii. What are the likely impact of the candidate system on the organization? How will
it fit within the organization’s master MIS plan?
Each of these questions must be answered carefully. They revolve around
investigation and evaluation of the problem, identification and description of
candidate systems, specification of performance and the cost of each system, and
final selection of the best system.
The objective of a feasibility study is not to solve the problem but to acquire a sense
of its scope. During the study, the problem definition is crystallized and aspects of
the problem to be included in the system are determined. Consequently, costs and
benefits are estimated with greater accuracy at this stage.
The result of the feasibility study is a formal proposal. This is simply a report - a
formal document detailing the nature and scope of the proposed solution. The
proposal summarizes what is known and what is going to be done. It consists of the
following.
1. Statement of the Problem – a carefully worded statement of the problem that
led to analysis.
2. Summary of Findings and Recommendations – a list of the major findings and
recommendations of the study. It is ideal for the user who required quick
access to the results of the analysis of the system under study. Conclusions are
stated, followed by a list of the recommendations and a justification for them.
3. Details of Findings – An outline of the methods and procedures undertaken by
the existing system, followed by coverage of objectives & procedures of the
candidate system. Included are also discussions of output reports, file
structures, and costs and benefits of the candidate system.
4. Recommendations and Conclusions – special recommendations regarding the
candidate system, including the personal assignments costs, project
schedules, and target dates.
In the feasibility study offering system design, we have to consider the following:
Feasibility Considerations
Three key considerations are involved in the feasibility analysis: economic, technical,
behavioural. Let’s briefly review each consideration and how it relates to the systems
effort.
Economic Feasibility
Economic analysis is the most frequently used method for evaluating the
effectiveness of a candidate system. More commonly known as cost/benefit analysis,
the procedure is to determine the benefits and savings that are expected from a
candidate system and compare them with costs. If benefits outweigh costs, then the
decision is made to design and implement the system. Otherwise, further justification
or alterations in the proposed system will have to be made if it is to have a chance of
being approved. This is an ongoing effort that improves in accuracy at each phase of
the system life cycle.
Technical Feasibility
Behavioural Feasibility
People are inherently resistant to change, and computers have been known to
facilitate change. An estimate should be made of how strong a reaction the user staff
is likely to have towards the development of a computerized system. It is common
knowledge that computer installations have something to do with turnover, transfers,
retraining, and changes in employee job status. Therefore, it is understandable that
the introduction of a candidate system requires special effort to educate, sell, and
train the staff on new ways of conducting business.
After the proposal is viewed by management it becomes a formal agreement that
paves the way for actual design and implementation. This is a crucial decision point
in the life cycle. Many projects die here, whereas the more promising ones continue
through implementation. Changes in the proposal are made in writing, depending on
the complexity, size, and cost of the project. It is simply common sense to verify
changes before committing the project to design.
Analysis
It is a detailed study of the various operations performed by the system and their
relationship within and outside of the system. A key question is – what must be done
to solve the problem? One aspect of analysis is defining the boundaries of the system
and determining whether or not a candidate system should consider other related
systems. During analysis, data are collected on available files, decision points, and
transactions handled by the present system. We shall learn about some logical
system models and tools that are used in analysis. It requires special skills and
sensitivity to the subjects being interviewed. Bias in data collection and interpretation
can be problem. Training, experience and common sense are required for collection of
the information needed to do the analysis. Once analysis is completed the analyst
has a firm understanding of what is to be done. The next step is to decide how the
problem might be solved. Thus, in the systems design, we move from the logical to
the physical aspects of the life cycle.
Design
The most creative and challenging phase of the system life cycle is system design.
The term design describes both a final system and a process by which it is
developed. It refers to the technical specifications (analogous to the engineer’s
blueprints) that will be applied in implementing the candidate system. It also includes
the constructions of programs and programme testing. The key question here is –
How should the problem be solved? The major steps in design are shown below.
Form
1
analysis
Output
design
Detailed system
documentation
Design submitted to
management for
approval
File design
No
Processing Design accepted? Abandon project
design Output design
Yes
Test
programs
Go to implementation
Go to
implementation
The first step is to determine how the output is to be produced and in what
format. Samples of the output (and input) are also available. Second, input
data and master files (data base) have to be designed to meet the
requirements of the proposed output. The operational (processing) phase
are handled through programe construction and testing, including a list of
the programmes needed to meet the system’s objectives and complete
documentation. Finally, details related to justification of the system and an
estimate of the impact of the candidate system on the user and the
organization are documented and evaluated by management as a step
toward implementation.
The final report prior to the implementation phase includes procedural
flowcharts, record layouts, report layouts, and a workable plan for
implementing the candidate system. Information on personnel, money,
hardware, facilities and their estimated cost must also be available. At this
point, projected costs must be close to actual costs of implementation.
In some firms, separate groups of programmer do the programming
whereas other firms employ analyst programmers who do analysis and
design as well as code programmes. For this discussion, we assume that
analysis and programming is carried out by two separate persons. There
are certain functions, though, that the analyst must perform while
programes are being written operating procedures and documentation
must be completed. Security and auditing procedures must also be
developed.
Testing
No system design is ever perfect. Communication problems, programmers
negligence or time constraints create errors that most be eliminated
before the system is ready for user acceptance testing. A system is tested
for online response, volume of transactions, stress, recovery form failure
and usability. Then comes system testing, which verifies that the whole set
of programs hangs together, following system testing is acceptance
testing or running the system with live data by the actual use.
System testing requires a test plan that consists of several key activities
and steps for programs, string, system and user acceptance testing. The
system performance criteria deal with turaround time, backup, file
protection, and the human factor.
Implementation
This phase is less creative than system design. It is primarily concerned
with user training, site preparation, and file conversion. When the
candidate system is linked to terminals and remote sites the
telecommunication network and tests of the network along with the
system are also included under implementation.
During the final testing, user acceptance is tested, followed by user
training. Depending on the nature of the system, extensive user training
may be required, conversion usually takes place at about the same time
the user is being trained or later.
In the extreme, the programmer is falsely viewed as someone who ought
to be isolated from other aspects of system development. Programming is
itself design work, however. The initial parameter of the candidate system
should be modified as a result of programming efforts. Programming
provides a “reality test” for the assumptions made by the analyst. It is
therefore a mistake to exclude programmers from the initial system
design. System testing checks the readiness and accuracy of the system
to access, update and retrieve data from new files. Once the programmes
become available, test data are read into the computer and processed
against the file(s) provided for testing. If successful, the programe(s) is
then run with “live” data. Otherwise, a diagnostic procedure is used to
local and correct errors in the program. In most programes, a parallel run
is conducted where the new system runs simultaneously with the ‘old’
systems. This method, though costly, provides added assurance against
errors in the candidate system and also gives the user-staff an opportunity
to gain experience through operation. In some cases, however, parallel
processing is not practical. For example, it is not plausible to run two
parallel online point-to-sale (POS) systems for a retail chain. In any case,
after the candidate system proves itself, the old system is phased out.
Evaluation
During systems testing, the system is used experimentally to ensure that
the software does not fail. In other words, we can say that it will run
according to its specifications and in the way users expect. Special test
data are input for processing, and the results examined. A limited number
of users may be allowed to use the system so that analyst can see
whether to use it in unforeseen ways. It is desirable to discover any
surprises before the organization implements the system and depends on
it.
Implementation is the process of having systems personnel check out and
put new equipment into use, train users, install the new application and
construct any files of data needed to use it. This phase is less creative
than system design. Depending on the size of the organisation that will be
involved in using the application and the risk involved in its use, systems
developers may choose to test the operation in only one area of the Firm
with only one or two persons. Sometimes, they will run both old and new
system in parallel way to compare the results. In still other situations,
system developers stop using the old system one day and start using the
new one the next.
Evaluation of the system is performed to identify its strengths and
weaknesses. The actual evaluation can occur along any one of the
following dimensions:
(i) Operational Evaluation: Assessment of the manner in which the
system functions, impact.
(ii) Organisational Impact: Identification and measurement of benefits
to the organisation in such areas as financial concerns, operational
efficiency and competitive impact.
(iii) User Manager Assessment: Evaluation of the attitudes of senior and
user manager within the organisation, as well as end-users.
(iv) Development Performance: Evaluation of the development process
in accordance with such yardsticks as overall development time and
effort, conformance to budgets and standards and other project
management criteria.
Maintenance is necessary to eliminate errors in the working system during
its working life and to tune the system to any variations in its working
environment. Often small system deficiencies are found as a system is
brought into operation and changes are made to remove them. System
planners must always plan for resource availability to carry out these
maintenance functions. The importance of maintenance is to continue to
bring the new system to standards.
Responsible Users
The responsible users of the proposed system are store clerk and
production manager.
Types of Feasibility
During feasibility analysis, the analyst considers the three main types of
feasibility – technical, economical and operational feasibility, all of which
are interrelated.
(a) Technical Feasibility: During this study, the analyst identifies the
existing computer systems (hardware and software) of the
concerned department and determines whether these technical
resources are sufficient for the proposed system or not. If they are
not sufficient, the analyst suggests the configuration of the
computer systems that are required. The analyst generally pursues
two or three different configurations which satisfy the key technical
requirements but which represent different costs. During technical
feasibility study, financial resources and budget is also considered.
The main objective of technical feasibility is to determine whether
the project is technically feasible, provided it is economically
feasible.
(b) Economic Feasibility: Economic feasibility is the most important
study that determines the cost and benefits of the proposed system
and compares with the budget. The cost of the project should not
outweigh the budget. The cost of the project includes the cost of
hardware, software, development and implementation. Cost/benefit
analysis is the common method to determine the benefits that are
expected from the proposed system and compare them with the
costs expected to spend on development of the system. If benefits
are found to be more than costs, then the analyst decides to
continue the development of the proposed system otherwise
considers it economically not feasible. The feasibility study presents
both tangible (e.g., increased productivity, low operating cost, etc.)
and intangible benefits (e.g., improved organizational planning,
improved asset utilization, etc.) in a formal way. We will discuss the
cost/benefit analysis in a subsequent sub-section.
(c) Operational Feasibility: When it is found that the project is both
economic and technical feasible, the next step is to determine
whether it is operationally feasible or not. During operational
feasibility study, it is determined whether the system will operate in
the way that user wants. Operational feasibility depends upon
human resources for the development and implementation of the
system. It is considered whether the qualified and experienced
manpower is available for development and implementation of the
system. User involvement is more required in determining the
operational feasibility.
d. Social Feasibility: Social feasibility is a determination of whether a
proposed project will be acceptable to the people or not. This
determination typically examines the probability of the project
being accepted by the group directly affected by the proposed
system change.
e. Management feasibility: It is a determination of whether a proposed
project will be acceptable to management. If management does not
accept a project or gives a negligible support to it, the analyst will
tend to view the project as a non-feasible one.
f. Legal feasibility: Legal feasibility is a determination of whether a
proposed project infringes on known Acts, Statutes, as well as any
pending legislation. Although in some instances the project might
appear sound, on closer investigation it may be found to infringe on
several legal areas.
g. Time feasibility: Time feasibility is a determination of whether a
proposed project can be implemented fully within a stipulated time
frame. If a project takes too much time it is likely to be rejected.
After the feasibility study, a document is prepared that is known as
‘Feasibility Study Report’. Besides this report, the analyst also gives the
oral presentation of feasibility study to the management.
Oral Presentations
Although, feasibility study report is the best written presentation of the
proposed system, it is expected that the analyst gives an oral presentation
to the management and end users. During oral presentation, many issues
can be clarified and new ideas from the users can be picked up by the
analyst.
There is no standard form of the sequence of topics to be discussed during
oral presentation by the analyst but the following general outline is
suggested:
I. Introduction.
A. Self introduction by the analyst.
B. A brief introduction of the problem.
C. A brief description of the current system.
(i) Specify the drawbacks of the current system.
(ii) Specify how the proposed system can solve the
problem.
II. Body of Presentation.
A. Describe Current System.
(i) Highlight drawbacks of the current system.
(ii) Highlight how the current system cannot satisfy the
user.
B. Describe Proposed System.
(i) Highlight System Requirements.
(ii) Highlight scope and objectives of the proposed system.
(iii) Highlight savings and benefits of the proposed system.
C. Describe implementation plan of the proposed system.
D. Describe Operational Feasibility of the system.
III. Conclusion.
A. Summarize the proposal.
B. Summarize the objectives and recommendations.
C. Summarize the benefits and savings.
IV. Discussion period.
Cost/Benefit Analysis
Since cost plays quite an important role in deciding the new system, it
must be identified and estimated properly. Costs vary by type and consist
of various distinct elements. Benefits are also of different type and can be
grouped on the basis of advantages they provide to the management. The
benefits of a project include four types:
(i) Cost-savings benefits
(ii) Cost-avoidance benefits
(iii) Improved-service-level benefits
(iv) Improved-information benefits
Cost-savings benefits lead to reduction in administrative and operational
costs. A reduction in the size of the clerical staff used in the support of an
administrative activity is an example of a cost-saving benefit.
Cost-avoidance benefits are those, which eliminate future administrating
and operational costs. No need to hire additional staff in future to handle
an administrative activity is an example of a cost-avoidance benefit.
Improved-service-level benefits are those where the performance of a
system is improved by a new computer-based method.
Improved-information-benefit is where computer based methods lead to
better information for decision-making. For example, a system that reports
the most-improved fifty customers as measured by an increase in sales is
an improved-information. This information makes it easier to provide
better service to major customers.
Structured Analysis
Structured analysis is a development method for analysis of an existing
system. It is a set of techniques that allow the analyst to design the
proposed system. The main purpose of structured analysis is to completely
understand the current system.
Determination of DFD
Armed with interview results, tabulated questionnaires, and experience
through personal observations, the analyst is ready to describe the current
system in narrative form, with a data-flow diagram, or with a system
flowchart. Since all organisations have an accounts payable (AP) system
let us being with such an example using a context DFD. A context DFD
defines the system under study in a general form, showing:
Inputs to AP: Packing slips, invoices, checking account balances, payment
notifications.
Outputs from AP: reports to management, cheque to suppliers.
Figure 4.6: A context data-flow diagram depicts a typical accounts payable system
in its broadest perspective, not showing any of the details or internal processes
A context DFD does not show any detail but is an overview drawing of the
system. It is an excellent diagram to share with management whose
interest is general in nature. Context DFDs place a boundary around the
system under investigation, saying that this is what will be examined -
nothing more and nothing less.
After developing a context DFD, the analyst turns his attention to the
details of accounts able. Management reviews inventory reports and
determines what to order from suppliers orders are placed by the
accounting department using a purchase order/requisition: on delivery
merchandise and packing slips enter the warehouse, and packing slips are
sent to the accounting department, which receives invoices directly from
suppliers, while merchandise stays the warehouse or goes to a distribution
outlet. Accounting clerks compare purchase order requisitions with
invoices and packing slips to make sure all invoiced items have actually
rived, and then post the purchase to the supplier's ledger. At the end of
each month, the accounting department prepares a report of balances due
suppliers-and an inventory report for management evaluation.
These detailed activities by the accounting department, management,
warehouse personnel the bank and suppliers add up lo six major activities
(Figure 4.8):
1. Generation of reports
2. Ordering of stock
3. Printing of cheque
4. Posting of accounts
5. Reconciliation of bank statements
6. Authorisation of payment
During the design phase of the systems process, the analyst will study
each of these activities further, leveling the data-flow diagram of Figure
4.7 into far more details.
To draw the analysis DFD:
1. Look at the system from the inside to the outside
2. Identify the activities
3. Locate the data flows
4. Show the relationships between activities
5. Find the internal inputs or outputs that exist within the system
6. Level complex processes in the DFD into simpler ones
7. Look for duplication of data flows or data stores (Files)
Figure 4.7
While determining the flow of data, the analyst collects samples of all
relevant documents, such as sample cheques, invoices, packing slips, and
other relevant forms. To create a record of all purchases from and
payments to suppliers, a manual system requires that someone prepare a
ledger entry for each supplier.
The assembled documents help an analyst understand what data the new
system must collect and process. For example, the company can easily
obtain the following data from the invoice itself:
1. Supplier name, address, and telephone number
2. Invoice number
3. Invoice dale
4. Invoice
5. Terms of invoice
6. Amount of invoice
From the packing slip, it can obtain
1. Supplier name
2. Shipping date
3. Date goods are received
4. Freight charges
5. Invoice number
Packing slips are carbon copies of invoices omitting certain data, such as
the money value of the shipment. The warehouse clerk checks the
merchandise received against the packing slip to be sure everything is in
the carton and notes any discrepancies. Then the packing slip goes to
accounting for comparison with invoices to be sure that the company
received what it is paying for.
The ledger offers two categories offers supplier data and
purchase/payment history:
1. Supplier name
2 Supplier address
3. Supplier telephone number
4. Date of transaction
5. Description of transaction
6. Amount of invoice or payment
7. Discount
8. Balance due the supplier
Each cheque sent to a supplier contains the following data:
1. Invoice number
2. Cheque number
3. Amount of payment
4. Payment date
In addition to these documents, it is useful to have copies of reports
prepared by the accounting department
Types of DFD
There are two types of DFD - Physical and Logical DFD.
(a) Physical DFD: The data flow diagrams which represent the model of
the current system (manual or computerised), are known as
physical DFD. These diagrams are drawn, when the analyst studies
the current working system in detail.
(b) Logical DFD: The data flow diagrams which represent the model of
the proposed system, are known as logical DFD. These diagrams are
drawn from the physical DFD.
Each of these DFD can be further categorised into different levels like zero
level (context diagram), first level, second level and third level. Each
higher level DFD is drawn by adding more details to each process of lower
level, by a technique called ‘Exploding DFD’. We will learn these
techinques in subsequent sections.
(a) External Entity: External Entity represents any entity that supplies
data or receives information from the system. For example,
customer, sales department, employee, etc., are external entities.
(b) Data Flow: The data flow indicates the movement of data either
from input to process or from process to output. Data flow is labeled
to show what data is flowing. For example, customer details, sale
reports, etc., are data flows.
(c) Process: Processes are the actions performed on input data to
produce the output data. They are given some meaningful names.
For example, Prepare Bill, Calculate Sales, Compute Pay, etc., are
the processes.
(d) Data Store: Data store indicates the data file or register where data
is accumulated. For example, Customer Master File, Employee
Register, Sales Transaction File, etc., are data stores.
Data Dictionary
Data dictionary is a catalogue of all data elements, data structures and
processes described in logical DFDs. Before we discuss the importance
and contents of a data dictionary, let us understand the meaning of the
following terminology:
Data Element: Data element is the smallest unit of data that has some
meaning. For example, part code, part name, date of transaction, etc., are
data elements.
Data Structure: Data structure is a group of data elements that describe a
unit in the system. For example, Part Details is a data structure that
contains part code, part name and date of transaction as data elements.
Data Store: Data store is a data structure for collecting data input during
processing. For example, Part Register is a data store.
Data Flow: Data flow is a data structure, that shows a unit of data in
motion. For example, New Part Details is a data flow that moves from an
external entity to a process.
The data elements, data stores, data flows and processes are described in
a data dictionary as illustrated in Figures 4.13, 4.14, 4.15 and 4.16.
Part Code
Data Element
Date:
If Discrete If Continuous
Length: 4
Transactions file
Data Store
Description: Day’s Transaction
Contents: Part No., Part Name, Date of Transaction, Issue, Receipt, Name of Concerned Person and
Posting Status
4
Empho Empted
Get empted
Data flows:
Emp_no: Char (6)
Emp_details: Ep_Empa_add+Emp_det
Data stores:
Emp_record: Emp_no + Emp_no+Emp_add+Emp_doc
Process
do while not of empmaster
open emp_master
gotop
get emp_det
Four Rules
Four rules govern the construction of data dictionary entries:
1. Words should be defined to stand for what they mean and not the
variable names by which they may be described in the program;
use CLIENT_NAME not ABCPQ or CODE06. Capitalization of words
helps them to stand out and may be of assistance.
2. Each word must be unique; we cannot have two definitions of the
same client name.
3. Aliases, or synonyms, are allowed when two or more entries show
the same meaning a vendor number may also be called a customer
number. However, aliases should be used only when absolutely
necessary.
4. Self-defining words should not be decomposed. We can even
decompose a dictionary definition. For instance, we might write
Vendor name = Company name,
Individual's name
which we might further decompose to
Company name = (Contact) +
Business name
Individual's name = Last name +
First name +
(Middle initial)
After defining a term, say VENDOR NUMBER, we list any aliases or
synonyms, describe the term verbally, specify its length and data type,
and list the data stores where the term is found (figure 4.8). Some terms
may have no aliases, may be found in many files, or may be limited to
specific values. Some self-defining or obvious words and terms may not
require inclusion in the data dictionary. For example, we all know what a
PIN code and a middle initial are. Data dictionaries seldom include
information such as the number of records in file, the frequency a process
will run, or security factors such as passwords users must enter to gain
access to sensitive data. Rather, data dictionaries offer definitions of
words and terms relevant to a system, not statistical facts about the
system.
Data dictionaries allow analysts to define precisely what they mean by a
particular file, data flow, or process. Some commercial software packages,
usually called Data Dictionary Systems (or DDS), help analysts maintain
their dictionaries with the help of the computer. These systems keep track
of each term, its definition, which systems or programs use the term,
aliases, the number of times a particular term is used and the size of the
term can be tied to commercial data managers.
Figure 4.8
The IBM data dictionary, which is actually six linked databases, each with
many segments, consists of standard categories and the infrastructure
needed to "customize" installation categories. The standard categories
have the attributes prebuilt and ready for the user to fill in. These
standard categories are:
DATA-BASE
SEGMENT
ELEMENT
PROGRAM COMMUNICATION BLOCK
IMS SYSTEM DEFINITION
APPLICATION SYSTEM
JOB
PROGRAM
MODULE
TRANSACTION
PSB
These categories are all related to servicing the data processing function
and are not sufficiently broad in scope to support a dictionary for the
entire organisation. The strategic plan cannot be documented with just
these categories. It is the ability of this data dictionary to allow the
creation of other user-defined categories that allows us to consider the
dictionary a serious tool for systems analysis and documentation in
support of the current and new system applications.
Process Descriptions
After defining all the data elements and data structures in the data
dictionary, the systems analyst begins to describe the processes. Process
descriptions are the tools for documenting the procedures and describing
the system logic. They contain the logic used to process the input data for
getting the output. The commonly used process description tools are–
(a) Structured English - used to describe a procedure in simple English
statements.
(b) Decision Tree - used to describe a set of conditions and actions
diagrammatically.
(c) Decision Table - used to describe a set of conditions and actions in a
tabular form.
Structured English
Structured English is used to describe the logic of a process. It consists of
simple narrative sentences and adheres to limited vocabulary and limited
syntaxes. Structured English uses narrative statements to describe a
procedure and reserve words for logical formulation. No strict syntaxes but
simple English words with vocabulary consisting of:
i. Imperative English language verbs
ii. Terms defined in data dictionary
iii. Reserved or key words for logic formulation
Eg. Keywords
BEGIN……END
IF….ELSE, ENDIF
REPEAT…..UNTIL
WHILE…..DO
It uses three basic types of statements -
(a) Sequence Structures: They include a set of instructions that are
carried out one after another and do not depend on any condition.
(b) Decision Structures: They include one or more sets of instructions
that are carried out depending upon one or more conditions. They
generally use the phrase IF THEN ELSE to carry out different actions.
(c) Iteration Structures: They include a set of instructions that are
repeated until a particular condition occurs. They generally use the
phrase DO WHILE ...ENDDO to repeat a set of instructions.
The examples of these three types of statements are illustrated in Table
4.3.
Decision Tables
The decision table is a chart with four sections listing all the logical
conditions and actions. In addition the top section permits space for title,
date, author, system and comment
The condition stub displays all the necessary tests or conditions. Like the
diamond in a flowchart or the IF in pseudocode, these tests require yes or
no answers. The condition stub always appears in the upper left-hand
corner of the decision table, with each condition numbered to allow easy
identification.
Thus Condition stub is a list of all the necessary tests in a decision table. In
the lower left-hand comer of the decision table we find the action stub
where one may note all the processes desired in a given module. Actions,
like conditions, receive numbers for identification purposes. Thus Action
Stub is a list of all the processes involved in a decision table.
The upper right corner provides space for the condition entry - all possible
permutations of yes and no responses related to the condition stub. The
yes or no possibilities are arranged as a vertical column called rules. Rules
are numbered 1,2,3, and so on. We can determine the number of rules in a
decision table by the formula:
Number of rules = 2 h N where N represents the number of conditions and
h means exponentiation. Thus a decision table with four conditions has 16
(2M = 2x2x2x2 = 16) rules one with six conditions has 64 rules and eight
conditions yield 256 rules.
Thus Condition entry is a list of all the yes/no permutations in a decision
table. The lower right comer holds the action entry. X's or dots indicate
whether an action should occur as a consequence of the yes/no entries
under condition entry. X's indication action; dots indicate no action.
Thus Action entry Indicates via dot or X whether something should happen
in a decision table.
Figure 4.17
A decision table with four conditions (2M = 16) would have 16 different
sets of y's and n's and would result in the following pattern of yes and no
responses.
The first row therefore will have eight y's followed by eight n's. The second
row (corresponding to the second entry in the condition stub) has four y's,
four n's, four y's and four n's.
The complete four-condition entry would read:
This form ensures that the analyst includes all combinations with
duplication.
If large number of conditions exist (four conditions result in 16 condition
entries, six conditions in 64), decision tables can become unwieldy. To
avoid lengthy decision tables, analysts must remove redundancies and yet
still take precautions not to overlook anything. On occasion, two or more
rules may be combined to reduce or eliminate redundancy. In figures 4.19
and 4.20, rules 1 and 2 cause the last action in the action stub to occur.
Therefore, these two-rules could be combined to eliminate redundancy. To
indicate redundancy, we put a dash (-) in the condition entry to show that
this condition stub is irrelevant and can be ignored.
The decision table in figure 4.21 depicts the AP cheque module. Compare
with figure 4.16 (IPO). Although this format is fairly typical, in practice you
will encounter several different kinds of decision tables. Figure 4.22 called
limited entry, because the condition entry contains yes or no responses for
each rule.
Limited Entry: A type of decision table listing a y or n response for each
condition.
Mixed Entry; A type of decision table mixing values in the condition and
action entries.
AP cheque written as a mixed-entry decision table: Shown below in Fig.
4.24
Open ended (1) A type of decision table that permits access to another
decision table. (2)
Questionnaire items that respondents must answer in their own words.
A mixed-entry decision table combines the values and yes or no (Figure
4.24), while an open-ended one allows an action entry specifying an
additional decision table(figure 4.25). An analyst may want to use one of
these other types of decision tables to make the table more readable for a
user or manger or to decompose a large (seven conditions leading to 128
rules) table into a series of smaller ones.
AP cheque decision table (open-ended):
Figure 4.21: A open-ended decision table
Tree
Once the data elements are defined in the data dictionary, we begin to
focus on the processes.
Trees provide a graphical representation of logics for non-technical people
to understand easily:
Example
If the analyst requires “What is the discount policy?” He may will be shown
a memo, which looks like:
Trade discount (to established booksellers) is 20%. For private customers
and libraries, 5% discount is allowed on orders for 6 books or more, 10%
on orders for 20 books or more, and 15% on orders for 50 or more. Trade
orders for 20 books and over receive the 10% discount in addition to the
trade discount. The tree for the process will be:
Type of customer
Ordersie Discount
20 or more……………… 30%
Trade
50 or more……………… 15%
20-49…………………….10%
6-19………………………5%
Private or Librarian
Less than 6…………………Nil
As shown, a dialogue tree has multiple branch points when menus are
used, and forks at yes or no points. If we trace the steps shown in figure
4.27, the dialogue tree should lead you to conclude the following:
1. When an initial response of 2 is received, the program branches to a
procedure to DELETE A RECORD from the employee master file.
2. Before a record is deleted, the user is asked to verify that the
employee name is correct. The message reads: EMPLOYEE NAME
OK?
3. If the name is correct, the tree forks and asks: SURE YOU WANT TO
DELETE?
4. If the name is incorrect, the tree forks and asks: NAME OK NOW?
5. If the name is correct (is OK now) and the user responds yes to the
question sure you want to Delete, the record is removed from the
file.
6. If the name is not correct, or if the name is correct but the user
decides not to delete control is shown as "return to start" - namely,
a loop back to the start of the tree.
Isn't this tree incomplete? If the employee name is not correct at node 2.0,
how could it be correct at node 2.1? an expanded dialogue tree, like the
one shown in figure 4.28, helps fill the missing messages. The more
detailed tree shown a node with an X. This is a nonrestricted node,
meaning that it is not restricted to a prescribed number of choices. The
first nonrestricted node indicates that it is necessary to find an employee
record before testing to determine whether the name is correct. Moreover,
if a record is found but the name is incorrect, a second attempt (as noted
by a second unrestricted node) is made to find the correct employee
record. If this second search is successful, the user is aksed: NAME OK
NOW?
Figure 4.24
Decision Trees
At times, a dialogue tree is too specific for design teams to work with.
What they prefer is an easier-to-follow mapping of a complex design. This
mapping should show branch points and forks, but not the details of the
user dialogue. A decision tree helps to show the paths that are possible in
a design following an action or decision by the user. Figure 4.29 illustrates
this second type of tree. As indicated, if the user selects 1, followed by M
and A, the algebra menu would be displayed.
Figure 4.25
What is the value of a tree such as this? It helps the designer visulaize how
the user will move through the design to reach a desired location. Thus, a
decision tree provides an overview of the flow of consol to be built into
computer programs.
Decision trees turn a decision table into a diagram (figure 4.30). This tool
is read from left to right, decisions result in a fork, and all branches end
with an outcome. Figure 4.30 shows the decision trees for printing the
accounts payable check. Trees can be easily ready by nontechnical users
who dined decision tables too complex. Users readily grasp branches,
folks, and outcomes.
Figure 4.26: Decision trees she graphic equivalents of decision tables
Logical Models
Logical models show what a system is or does. They are implementation
independent; that is, they depict the system independent of any technical
implementation. As such, logical models illustrate the essence of the
system. Popular synonyms include essential model, conceptual model, and
business model.
Physical Models
Physical models show not only what a system is or does, but also how the
system is physically and technically implemented. They are
implementation-dependent because they reflect technology choices and
the limitations of those technology choices. Synonyms include
implementation model and technical model.
Systems analysts have long recognised the value of separating business
and technical concerns. That is why they use logical system models to
depict business requirements and physical system models to depict
technical designs. Systems analysis activities tend to focus on the logical
system models for the following reasons:
Logical models remove biases that are the result of the way the
current system is implemented or the way that any one person thinks
the system might be implemented. Thus, we overcome the “we’ve
always done it that way” syndrome. Consequently, logical models
encourage creativity.
Logical models reduce the risk of missing business requirements
because we are too preoccupied with technical details. Such errors
can be costly to correct after the system is implemented. By
separating what the system must do from how the system will do it
we can better analyse the requirements for completeness, accuracy,
and consistency.
Logical models allow us to communicate with end-users in
nontechnical or less technical languages. Thus, we don’t lose
requirements in the technical jargon of the computing discipline. Here
we will focus exclusively on logical process modeling.
Physical Data
Physical
Files, Data
Procedures
Elements Data
Programs
Elements
Clerical
Database
Figure 4.3: Chart of Logical Requirements
Database Design
As we have discussed that the organization selected for a particular file
mainly depends on the nature of the application for which it will be used.
Historically, Files have been designed based on specific application. Payroll
files are created containing all the data pertinent to a company's payroll
system. Similarly, individual files are created for use with the company's
personnel, accounts receivable, inventory, and other systems. If the data
contained on these files are not carefully delineated, it is very likely that
the same data will appear on several of these files. In other words, these
files would contain redundant data. For example, both a company's
personnel file and payroll file could contain the name and address of each
employee. This would mean that a simple change of address would have
to be processed twice and possibly three or four times, depending on the
number of other files on. which these data appear. Clearly, it would be
more practical to have each employee's name and address on one file
from which it can be accessed by all programs requiring these data. This
would reduce the amount of redundant data and minimise the possibility
that data contained on a file might be inaccurate because they were never
updated. This is but one of the reasons that database technology was
developed.
A DATABASE can be thought of as a set of logically related files organised
to facilitate access by one or more applications programs and to minimise
data redundancy. In other words, a database can be defined as a stored
collection of data, organised on the basis of relationships in the data
rather than the convenience of storage structures. It is not a replacement
for files.
Some general objectives in establishing a database are as follows:
– Eliminate redundant data as much as possible.
– Integrate existing data files.
– Share data among all users.
– Incorporate changes easily and quickly.
– Simplify the use of data files.
– Lower the cost of storing and retrieving data.
– Improve accuracy and consistency.
– Provide data security from unauthorised use.
– Exercise central control over standards.
In addition to the database itself, a set of programs is necessary to
facilitate adding new data as well as modifying and retrieving existing data
within a database. This set of programs is referred to as a Data Base
Management System (DBMS). A data base system merge data into one
pool shared by all systems so that any change automatically affects all
relevant systems. The following figures defines the difference between the
traditional file systems and database management system.
Figure below shows the Traditional file systems in which each system is
responsible for its own data.
Figure below shows the Data Base Management Systems in which data is
centralised.
SCHEMA
Once a database system has been designed, it will be possible to identify
each type of data item, data aggregate, record and set by a name or code.
It will be possible to state which data item types go together to make data
aggregate types and record types, and to identify which record types are
members and owners of set types. A coded set of tables describing this
information and stored in the computer system on direct access devices is
called a SCHEMA. It is a description of the data structure which is separate
from the data itself. The schema describes the areas, their identifiers and
page sizes, and indicates how these are related to the records and sets. In
other systems, a different set of tables is used for this.
The schema therefore, is the view of the data, the overall logical data
structure which is held by the DBMS. Each time a program requires data,
the DBMS will look up in the schema for the details of the structure of the
data requested. For example if the program requires an occurrence of a
set, the DBMS will look up in the schema which record types are required,
how to find the relevant records given a certain key by the program, and
perhaps also which areas the pages containing the relevant data are
stored in.
Sub-Schema
In a database system, it is not always possible to allow programmers to
write the data division of their choice for reasons of security or control. It
is more useful to provide the programmer with a standard description of
the logical data to be used in a particular application. All references to
data within the program will be for this description, which is called a
SUBSCHEMA and is similar to the Schema in structure. The DBMS has the
job of matching data requests on a subschema and data requests based
on the schema.
Types of Database
In conventional file systems, groups of bytes constitute a field, one or
more Fields make a record, and two or more records make a file. In a
database environment, a group of bytes constitutes a data item or
segment, a collection of segments a data entry, and a series of data
entries a data set. The complete collection of data sets is the database
itself. With traditional processing of files, records are not automatically
related, so a programmer must be concerned with record relationships.
Often the Files are stored and processed by record key, just as we sorted
the transaction file. Data bases relate data sets in one of three models:
hierarchical, network, or relational.
Hierarchical Model
In a hierarchical structure, sometimes referred to as a tree structure, the
stored data get more and more detailed as one branches further and
further out on the tree. Each segment, or node, may be subdivided into
two or more subordinate nodes, which can be further subdivided into two
or more additional nodes. However, each node can have only one "parent"
from which it emanates. The Figure below shows the hierarchical structure.
Network Model
The network related data sets are similar to hierarchical ones, except that
a node may have more than one parent. Thus a hierarchical DBMS is a
subset of network DBMS. The trade off between the simplicity of design of
a hierarchical structure and the storage efficiency of a network structure is
a very important consideration in database implementation. The Figure
below shows the Network structure.
Figure 5.15: Network Structure
Relational Model
The relational structure, however, organises the data in terms of two
dimensional tables. That is. Relational data sets order data in a table of
rows and columns and differ markedly from their hierarchical or network
counterparts. "There are no parent or node data sets as shown in Fig. 1.8.
In a relational database management systems, we have the same concept
of files, records, and Fields. Files are represented by two-dimensional
tables, each of which is called a "relation". Records, which can be
visualized as rows in the table, are called "Tuples". Fields can be visualised
as columns, and are called by attribute names, or domains.
For example, note that in the supplier table in Figure below we have three
Tuples, or rows, and three attribute names or columns. If we need to know
the name of the supplier of blue chairs, the relational DBMS searches the
type and color columns of the Furniture, Table and Finds supplier number
30, and then it scans the supplier table for number 30, which turns out to
be PANKAJ'S. Since each "record" is a row in the table and each "Field" a
column, an inventory system of 1600 Tuples, each with 5 attributes, would
create a table of 1600 rows and 5 columns.
Parallel Systems
The most secure method of converting from an old to new system is to run
both systems in parallel. Under this approach, users continue to operate
the old system in the usual manner but they also start using the new
system. This method is the safest one because it ensures that in case of
any problems in using the new system, the organisation can still fall back
to the old system without loss of time and money.
The disadvantages of the parallel systems approach are:
It doubles operating costs
The new system may not get fair trial.
Direct Conversion
This method converts from the old to the new system abruptly, sometimes
over a weekend ( even overnight. The old system is used until a planned
conversion day, when it is replaced by the new system. There are no
parallel activities. The organisation relies fully on the new system. The
main disadvantages of this approach are: no other system to fall back on,
if difficulties arise with new system. Secondly, wise and careful planning is
required.
Pilot System
Pilot approach is often preferred in the case of the new system which
involves new techniques or some drastic changes in organisation
performance. In this method, a working version of the system is
implemented in one part of the organisation, such as a single work area or
department. The users in this area are aware that they are piloting a new
system and that changes can be made to improve the system. Based on
the feedback, changes are made and the system is installed in the
remaining departments of the organisation, either all at on (direct
conversion method) or gradually (phase-in method). This approach
provides experience and live test before implementation.
Phase-in Method
This method is used when it is not possible to install a new system
throughout an organisation all at once. The conversion of files, training of
personnel or arrival of equipment may force the staging of the
implementation over a period of time, ranging from weeks to months. It
allows some users to take advantage of the new system early. Also it
allows training and installation without unnecessary use of resources.
Hardware Acquisitions
Once a decision has been reached to install an in-house computing device,
the next step is to prepare a list of specifications of the proposed system
so that suitable vendors would be invited for meeting the specific
requirements.
The tender specifications are prepared as per norms of approved
feasibility report. Main technical parameters of the various units of the
required hardware objectives of the project and implementation schedule
are also included in the tender specifications. Vendors may also be asked
to quote separately in respect of leasing' and 'buying' options. In addition
to this, the vendors may be required to furnish the details of the
infrastructure which the customer will have to arrange.
Tender Evaluations
It is often seen that requirements as indicated by the customer do not
match with the offer made by individual vendors where the specification
given by the vendors are far below the essential requirements of the
customers, such offers may be rejected straightway from the purview of
short listing. Marginal shortfalls may be considered on merits. However, in
case of additional features in the offers which could be categorised as
'desirable', it becomes necessary to assign appropriate weights to such
features, in order to bring all the bids on equal footing. The additional
features include quantifiable differences are:
One time costs as well as in the continually running and
maintenance costs.
Equipment characteristics such as storage capacities, speeds of
various units of computing device.
In-built spare capacity as well as capability of the system to support
additional peripherals.
Additional support to be provided by the vendor.
Costing Factor
Cost consideration is quite important factor in computer acquisitions.
Costs are of two types:
(i) One-time costs such as post of site preparation (space, false
ceilings, special floorings, electrical fittings, air- conditioning etc.)
(ii) Continued running and maintenance costs of the entire installations.
Equipment Characteristics
Hardware device which provides higher transfer rates (that is arrange
number of bytes passing between various functional units per unit of
time), or has large storage capacity or in case of printers, if the printed
characters per line are quite high, then such additional characteristics get
entitled to weightage to the extent of their practical utility to the buying
organisation. Appropriate weightage can also be given to such
characteristics as high mean-time-between-failures (MTBF), compatibility
with the equipment, peripherals etc. available in the market
Vendor Support
The features to be given weightage under the vendor support include:
hardware maintenance facilities offered.
training facilities provided.
assistance to be provided in software development
back-up facilities provided by vendor in case of system failure
comparative delivery periods offered by different vendors.
Service Suppliers
Outside computer services are commonly used by small firms or first time
users. Also called ‘Services’ they include the following:-
1. Computer manufacturers supply services such as system design,
programming, education and training and hardware maintenance.
2. Service bureaus run “bread and butter” applications for small firms.
Larger firms contract for specialised applications or for running jobs
during peak volume periods. The primary services are
programming, file and system conversions, system design and user
training.
3. Facilities management (FM) furnishes specialists to manage a
user installed computer on the users premises. In some cases
service is limited to developing application programs. The user runs
the system but calls on the service organisation for developmental
work and maintenance.
The FM concept has several benefits. The user pays only for the service
rendered. Turnover problems for the user are eliminated when the service
manages the centre. The main drawbacks, however, are loss of control
over the operation, valuerability of information, and the high fees charged
for the service.
Role of Consultant
For a small firm, an analysis of competitive bids can be confusing. For this
reason, the user may wish to contract on outside consultant to do the job.
Consultants provide expertise and an objective opinion. A recent survey
found, however, that 50 percent of respondent users had an unfavourable
experience with the consultants they hired, and 25 percent said they
would never hire another consultant. With such findings, a decision to use
consultants should be based on careful selection and planning. A rule of
thumb is that the larger the acquisition the more serious should be the
consideration of using professional help.
Although the payoffs from using consulting services can be dramatic, the
costs are also high for many small companies that are exploring system
acquisition, for them, consulting services may be totally out of reach.
During 1984, the average rates of consultants were $600 - $1,800 a day,
not including travel and out-of-pocket expenses.
The past decade has seen the growth of internal management consultant
terms in large organisations as opposed to external consulting teams. The
figure below outlines the cases where an external or internal consultant is
appropriate.
Pros and Cons of Using Consultants
Full-time internal consultant is not needed or An outside consultant is too costly; internal
is beyond the budget of the organisation. consultants can be much chapter.
Extra help on a project is needed for a short A fast decision necessitates using an internal
time, and internal person cannot afford the consultant.
time.
The internal staff does not possess the An external consultant often does not
expertise or broad knowledge needed for a understand the nature of the internal problem.
specific situation.
The political nature of the problem requires An internal consultant already exists who has
an objective, neutral opinion. an objective and technical understanding.
Economic Factors
Cost comparisons
Return on investment
Acquisition method
Hardware Factors
Hardware performance and its reliability
Facilities for back up facilities
Provision for back up facilities
Firmness of delivery data
Compatibility with existing systems
Expandability
Software Factors
Performance of software and its price
Efficiency and reliability of available software
Programming languages available
Availability of well documented package programs
Firmness of delivery date for a promised software
Ease of use and modification as per user requirements
Portability and its capacity to interface with the environment.
Service Factors
Facilities provided by the manufacturer for detecting errors in the
new programs
Providing of good training facilities
Assistance in software development and conversion facilities
provided
Maintenance terms and quality
Reputation of Manufacturer
Financial stability
Past history for keeping promises
Three criteria may have to be further sub-divided particularly for hardware
performance and support services.
Software Selection
Software selection is a critical aspect of system development. As
mentioned earlier, the search starts with the software, followed by the
hardware. There are two ways of acquiring software: custom-made or "off-
the-shelf packages. Today's trend is toward purchasing packages, which
represent roughly 10 percent of what is costs to develop the same in
house. In addition to reduced cost, there are other advantages:
1. A good package can get the system running in a matter of days
rather than the weeks or months required for "home-grown"
packages.
2. MIS personnel are released for other projects.
3. Packages are generally reliable and perform according to stated
documentation.
4. Minimum risks are usually associated with large-scale systems and
programming efforts.
5. Delays in completing software projects in house often occur
because programmers quit 'n midstream.
6. It is difficult to predict the cost of "home-grown" software.
7. The user has a chance of seeing how well the package performs
before purchasing it.
There are drawbacks, however, to software packages:
1. The package may not meet user requirements adequately.
2. Extensive modification of a package usually results in loss of the
vendor support.
3. The methodology for package evaluation and selection is often
poorly defined. The result is a haphazard review based on a faulty
process or questionable selection criteria.
4. For first-time software package users, the overall expectation from
package is often unclear and ill defined.
It can be seen, then, that the quality of a software package cannot be
determined by price alone. A systematic review is crucial.
Reliability
It is the probability that the software will execute for specified time period
without a failure, weighted by the cost to the user of each failure
encountered. It relates to the ease of recovery and ability to give
consistent results. Reliability is particularly important to the profession.
Users
Functionality
It is a definition of the facilities, performance, and. Other factors that the
user requires in the finished product. All such information comes from the
user. The following are key questions to consider
1. Do the input transactions, files, and reports contain the necessary
data elements?
2. Are all the necessary computations and processing performed
according to specifications?
Capacity
Flexibility
Usability
This criterion refers to the effort required to operate, prepare the input,
and interpret the output of a program. Additional points to be considered
are portability and understandability. Portability refers to the ability of the
software to be used on different hardware and operating systems.
Understandability means that the purpose of the product is clear to the
evaluator and that the package is clearly and simply written, is free of
jargon, and contains sufficient references to readily available documents
so that the reader can comprehend advanced contents. that the reader
can comprehend advanced contents.
Security
Performance
Serviceability
Ownership
Who owns the software once it is "sold" to the user? Most of the standard
license agreement forms essentially lease the software to the user for an
indefinite time. The user does not "own" it, which means that the source
code is inaccessible for modification, except by the vendor. Many users
enter into an escrow arrangement whereby the vendor deposits the source
code with a third-party escrow agent who agrees to release the code to
the user if the vendor goes out of business or is unable to perform the
services specified in the license.
In acquiring software, several questions should be asked:
Criterion Meaning
Minimal Costs
Design of Input
The input design is the link that ties the information system into the world
of its users.
Input specifications describe the manner in which data enters the system
for processing.
Input design features can ensure the reliability of the system and produce
results from accurate data, or they can result in the production of
erroneous information.
Input design consists of developing specifications and procedures for data
preparation steps necessary to put transaction data into a usable form for
processing data entry, the activity of putting data into the computer for
processing
Avoiding delay
What is a Form?
People read from forms, write on forms, and spend billions of hours
handling forms and filing forms. The data the forms carry come from
people, and the informational output of the system goes to people. So the
form is a tool with a message; it is the physical carrier of data-of
information. It also can constitute authority for action. For example, a
purchase order says BUY, a customer's order says SHIP, and a paycheck
says PAY TO THE ORDER OF. Each form is a request for action. It provides
information for making decisions and improving operations.
With this in mind, it is hard to imagine a business operating without using
forms. They are the vehicles for most communications and the blue-print
for many activities. As important as a printed form is, however, the
majority of forms are designed by poorly trained people. People are
puzzled by confusing forms they ask for directions on how to read them
and how to fill them out. When a form is poorly designed, it is a poor (and
costly) administrative tool.
Classification of Forms
A printed form is generally classified by what it does in the system. There
are three primary classifications: action, memory, and report forms. An
action form requests the user to do something-get action. (Examples are'
purchase orders and shop orders.! A memory form is a record of historical
data that remains in a file, is used for reference, and serves as control on
key details. (Examples are inventory records, purchase records, and bond
registers.! A report form guides supervisors and other administrators in
their activities. It provides data on a project or a job.
Figure 4.4: Different Types of Forms
Form Control
The first step in tonus control is to determine whether a, form is
necessary, Managing the hundreds of tonus in a typical organization
requires a forms control program. Forms control is a procedure for (1)
providing improved and effective forms (2) reducing printing costs, and
(3) securing adequate stock at all times.
The first step in a procedure for forms control is to collect group, index,
stock, and control the tonus of the organization. Each form is identified
and' classified by the function it pelf onus and whether it is a flat form, a
snap-out form, or something else. Once classified, a form is evaluated by
the data it requires, where it is used, and how much it overlaps with other
forms. The object is to get rid of unnecessary tonus and improve those
forms that are necessary.
Before launching a tonus control program, the designer needs to consider
several questions:
1. Who will be responsible for improving tonus design?
2. Should forms be produced in house or assigned10 an outside printer?
3. What quantity should be printed? What is the break-even point on
printing forms?
4. How much lead time is required to replenish forms?
5. How will one handle reorders? Who will initiate them? In what way?
6. How will obsolete forms be handled?
7. What should be the life of the form?
8. Where and how should the forms be stored?
If questions of this nature are not addressed in advance, the organization
is probably not ready to launch a tonus control program.
Input Stages
Several activities have to be carried out as part of the overall input
process. They include some or all of t following:
data recording (i.e., collection of data at its source):
data transcription (i.e., transfer of data to an input form);
data conversion (i.e., conversion of the input data to a computer
acceptable medium);
data verification (i.e. checking the conversion);
data control (i.e. checking the accuracy and controlling the flow of the
data to the computer);
data transmission (i.e. transmitting or transporting the data to the
computer);
data validation (i.e. checking the input data by a program when it
enters the computer system)
data correction (i.e. correcting the errors that are found in any of the
earlier stages).
Input Media
Once the input types and their contents have been examined the analyst
can start to think about input devices of which there is a very wide range.
Much careful thought has to be given to the choice of the input media and
devices. Consideration can be given to:
type of input
flexibility of format
speed
they -accuracy
verification methods
rejection rates
ease of correction
off-line facilities
need for specialised documentation
storage and handling requirements
automatic features
hard copy requirements
security
ease of use
environment of data capture
portability
compatibility with other systems
cost