SlideShare a Scribd company logo
Chapter 16 Designing Effective Output
E – 2
E – 2 Before
E – 2 After
E – 3
E – 3 Before
E – 3 After
E – 4
E – 5
E – 6
E – 7
E – 8
Program :  UPDATE SOFTWARE RELATIONAL FILE Input :  UPDATE SOFTWARE INSTALLATION LIST, document UPDATE INSTALLED SOFTWARE SCREEN, display Output :  SOFTWARE RELATIONAL FILE, disk INSTALLED SOFTWARE TRANSACTION, disk E – 9 Update Software Relational File Update Software Installation List Update Installed Software Screen Software Relational File Installed Software Transaction
Program : PRINT USER NOTIFICATION REPORT Input : INSTALLED SOFTWARE TRANSACTION, disk Output : USER NOTIFICATION REPORT, report E – 9 Print User Notification Report User Notification Reports Installed Software Transaction
E – 9 Before After
E – 10
Inventory number : Not entered, not numeric, already on file Date purchased : Invalid date (month = 14, etc.) Network Connection  : Anything other than C, D, F, M, 1, 2, 3, 0 CD ROM : Anything other than 0, 2, 4, 6, 8, 10, 12, 16, 20, B, D, V Monitor, Printer, Internet, or Board Codes: try entering data into the field that is not on the list E – 11
E – 12
E – 12
E – 12
E – 12
E – 12
E – 12
Design test data and predicted results for the ADD TRAINING CLASS program. Use Microsoft Access to test the display and note whether the results conformed to your predictions. Title : Must be entered Course Description : Must be entered Class length : Not entered, not numeric, greater than 20 Operating System : Must be entered that is on the list E – 13
Design test data on paper to test the CHANGE SOFTWARE EXPERT program. Use Microsoft Access to test the display. Note any discrepancies Last name : Must be entered First Name : Must be entered Phone : Not entered, not numeric Room : Must be entered Title : Must be entered Version : Must be entered Expert Teach Course : Must be Yes or No Operating System : Must be entered data on the list E – 14
Chapter 17 Successfully Implementing The Information System
E – 1
A network is a collection of data communication hardware, computers, data communication software and data communication media, all connected in a meaningful way to allow users to share information, resources and equipment.   A star network is a network where each machine is connected to a central machine, called a server. The server holds all the software, and the other machines, called nodes, request the software from it.  Since the server receives all the requests, it can handle them one by one, and there are no data crashes. E – 1
E – 1 Advantages Easy to install and wire No disruptions to the network when connecting or removing devices Easy to detect faults and to remove parts Disadvantages Requires more cable length than a linear topology If the hub or concentrator fails, nodes attached are disabled More expensive than linear bus topologies because of the cost of the hubs, etc. 
Backup will be performed on two levels All transactions entering the system from on-line screens will be placed on log (or journal) transaction files. These are located on a smaller, second hard disk within the server computer. If there is a head crash or other problem on the main hard disk, the backup files would still exist. The format of the log files is E – 2 Date Time Computer ID User ID Backup Type Result 2010/04/01 12:00 AM Dot-PC DMatrix Full Completed 2010/04/01 12:00 PM Dot-PC DMatrix Incremental Completed 2010/04/02 12:00 AM Dot-PC DMatrix Incremental Completed 2010/04/02 12:00 PM Dot-PC DMatrix Incremental Failed 2010/04/03 12:00 AM Dot-PC DMatrix Full Completed 2010/04/03 12:00 PM Dot-PC DMatrix Incremental Completed
E – 2 2. All database files are copied to media every night. These are removed to one of the other campus locations and stored in a vault. Advantages: Backup of all major files. Faster backup since major files do not have to be backed up before each update. Continual backup using the log files. Disadvantages: Programs must be written to restore database records in a batch mode from the log files. Streamer tape units may be initially expensive.
E – 3 List security measures that should be taken to prevent unauthorized persons from using the computer system Unique username and password for all users Password must be at least 8 characters long and must include at least one number, one uppercase letter, and one special character (ex: finAlf4nt4$y) Password will expired every 60 days and will need to be changed (notification 12 days before expiration date) Username should be locked after 3 failed attempts System users audit every 3 months to check for valid users of the system and removed users who no longer have access privilege
E – 4 Team Leader / Decision Maker: Dot Matrix  Will determine the condition and stability of campus resources Make High Level Decisions with management team Will Initiate Communications to her team Team:  Hy Perteks – Director Information Center –  Data Backups Manage Data Recovery Process Routing of Network Resources if needed Mike Rowe – Maintenance Expert - Physical Condition of PC’s Check Condition of PC’s Physical relocation of PCs if needed. Cher Ware – Software Manager - Software Configuration Ensure duplication of critical systems at new location if needed. Ensure that any manual software changes are made (need to change servers) Assist Mike Rowes team as needed.
E – 4 Other Recommendations: Remote Emergency Location – Satellite Campus  Off Site replication should be mirrored at one of the satellite campuses. Already owned Space There should be little effort in backing up data here since they are already on the network. Test Disaster Recovery Twice a year.
Question: Explain in a paragraph why a phased conversion would be used to install the computer system E – 5 Answer :  A phased conversion is the best method since the system has several major subsystems.  Hardware records and programs must be installed first because software records reference them.  The phased conversion provides data entry personnel time to update records with additional data elements not stored in the old system

More Related Content

DOC
GEOREGWHITE1
DOC
Englert_Resume_Job_Description_
DOCX
Jaime Gutierrez Resume_
DOCX
PPT
17. Computer System Configuration And Methods
PPTX
Design computer system group a
PPT
EVOLUTION OF SYSTEM
PPTX
System Programming
GEOREGWHITE1
Englert_Resume_Job_Description_
Jaime Gutierrez Resume_
17. Computer System Configuration And Methods
Design computer system group a
EVOLUTION OF SYSTEM
System Programming

What's hot (18)

DOCX
Ken+Jorae+resume+2015
PPT
Computer system administrator
PDF
Mike_Moulder_Resume_6-2-2016
PDF
Computer software and computer network
DOCX
IT Resume
DOCX
Shawn_Connett_09112015
DOCX
AnthonyWSewellJr
PDF
MCA-5 unit1
PDF
Software Concepts Notes
PDF
IT Essentials (Version 7.0) - ITE Chapter 11 Exam Answers
DOCX
Jonson Update resume
DOC
Burnett resume
PDF
Resume for Chip Bennett - 2015
PPT
L2 ch1
PPTX
Introduction to system programming
PDF
Computer organization
PPTX
Soft skill-( ICT)part-1
DOCX
Stephen S. Wilson
Ken+Jorae+resume+2015
Computer system administrator
Mike_Moulder_Resume_6-2-2016
Computer software and computer network
IT Resume
Shawn_Connett_09112015
AnthonyWSewellJr
MCA-5 unit1
Software Concepts Notes
IT Essentials (Version 7.0) - ITE Chapter 11 Exam Answers
Jonson Update resume
Burnett resume
Resume for Chip Bennett - 2015
L2 ch1
Introduction to system programming
Computer organization
Soft skill-( ICT)part-1
Stephen S. Wilson
Ad

Viewers also liked (7)

PPT
Tin Eye
PPTX
PPT
Chapter9 and10
PPT
Chapter9and10
PPT
Chapter16 and 17
PPTX
Microsoft Surface
PPT
AP WH Chapter 16
Tin Eye
Chapter9 and10
Chapter9and10
Chapter16 and 17
Microsoft Surface
AP WH Chapter 16
Ad

Similar to Chapter16and17 (20)

DOCX
Muthupm01
DOCX
DOCX
DOC
Resume
PDF
Wilbert M David
DOCX
Joseph Perkins Resume
PDF
Introduction of computer and components of computer or block diagram of computer
PDF
UNIT-IQA.pdf.............................
DOCX
Resume_Updated
PPTX
1-Introduction.pptx computer Networking
PDF
Resume2_Roy Anderson_online version
DOCX
2016 resume
PPT
PLM World Conference 2007
DOCX
Amresh
PDF
E Santana Resume
PDF
Markinng schme ICT questions.pdf
PDF
Terence McLeod (1)
DOCX
AKHILESH RESUME
DOCX
Marvin Resume 2015
DOCX
01-01-2017 This section will lay out the implementation plan o.docx
Muthupm01
Resume
Wilbert M David
Joseph Perkins Resume
Introduction of computer and components of computer or block diagram of computer
UNIT-IQA.pdf.............................
Resume_Updated
1-Introduction.pptx computer Networking
Resume2_Roy Anderson_online version
2016 resume
PLM World Conference 2007
Amresh
E Santana Resume
Markinng schme ICT questions.pdf
Terence McLeod (1)
AKHILESH RESUME
Marvin Resume 2015
01-01-2017 This section will lay out the implementation plan o.docx

Chapter16and17

  • 1. Chapter 16 Designing Effective Output
  • 3. E – 2 Before
  • 4. E – 2 After
  • 6. E – 3 Before
  • 7. E – 3 After
  • 13. Program : UPDATE SOFTWARE RELATIONAL FILE Input : UPDATE SOFTWARE INSTALLATION LIST, document UPDATE INSTALLED SOFTWARE SCREEN, display Output : SOFTWARE RELATIONAL FILE, disk INSTALLED SOFTWARE TRANSACTION, disk E – 9 Update Software Relational File Update Software Installation List Update Installed Software Screen Software Relational File Installed Software Transaction
  • 14. Program : PRINT USER NOTIFICATION REPORT Input : INSTALLED SOFTWARE TRANSACTION, disk Output : USER NOTIFICATION REPORT, report E – 9 Print User Notification Report User Notification Reports Installed Software Transaction
  • 15. E – 9 Before After
  • 17. Inventory number : Not entered, not numeric, already on file Date purchased : Invalid date (month = 14, etc.) Network Connection  : Anything other than C, D, F, M, 1, 2, 3, 0 CD ROM : Anything other than 0, 2, 4, 6, 8, 10, 12, 16, 20, B, D, V Monitor, Printer, Internet, or Board Codes: try entering data into the field that is not on the list E – 11
  • 24. Design test data and predicted results for the ADD TRAINING CLASS program. Use Microsoft Access to test the display and note whether the results conformed to your predictions. Title : Must be entered Course Description : Must be entered Class length : Not entered, not numeric, greater than 20 Operating System : Must be entered that is on the list E – 13
  • 25. Design test data on paper to test the CHANGE SOFTWARE EXPERT program. Use Microsoft Access to test the display. Note any discrepancies Last name : Must be entered First Name : Must be entered Phone : Not entered, not numeric Room : Must be entered Title : Must be entered Version : Must be entered Expert Teach Course : Must be Yes or No Operating System : Must be entered data on the list E – 14
  • 26. Chapter 17 Successfully Implementing The Information System
  • 28. A network is a collection of data communication hardware, computers, data communication software and data communication media, all connected in a meaningful way to allow users to share information, resources and equipment.   A star network is a network where each machine is connected to a central machine, called a server. The server holds all the software, and the other machines, called nodes, request the software from it. Since the server receives all the requests, it can handle them one by one, and there are no data crashes. E – 1
  • 29. E – 1 Advantages Easy to install and wire No disruptions to the network when connecting or removing devices Easy to detect faults and to remove parts Disadvantages Requires more cable length than a linear topology If the hub or concentrator fails, nodes attached are disabled More expensive than linear bus topologies because of the cost of the hubs, etc. 
  • 30. Backup will be performed on two levels All transactions entering the system from on-line screens will be placed on log (or journal) transaction files. These are located on a smaller, second hard disk within the server computer. If there is a head crash or other problem on the main hard disk, the backup files would still exist. The format of the log files is E – 2 Date Time Computer ID User ID Backup Type Result 2010/04/01 12:00 AM Dot-PC DMatrix Full Completed 2010/04/01 12:00 PM Dot-PC DMatrix Incremental Completed 2010/04/02 12:00 AM Dot-PC DMatrix Incremental Completed 2010/04/02 12:00 PM Dot-PC DMatrix Incremental Failed 2010/04/03 12:00 AM Dot-PC DMatrix Full Completed 2010/04/03 12:00 PM Dot-PC DMatrix Incremental Completed
  • 31. E – 2 2. All database files are copied to media every night. These are removed to one of the other campus locations and stored in a vault. Advantages: Backup of all major files. Faster backup since major files do not have to be backed up before each update. Continual backup using the log files. Disadvantages: Programs must be written to restore database records in a batch mode from the log files. Streamer tape units may be initially expensive.
  • 32. E – 3 List security measures that should be taken to prevent unauthorized persons from using the computer system Unique username and password for all users Password must be at least 8 characters long and must include at least one number, one uppercase letter, and one special character (ex: finAlf4nt4$y) Password will expired every 60 days and will need to be changed (notification 12 days before expiration date) Username should be locked after 3 failed attempts System users audit every 3 months to check for valid users of the system and removed users who no longer have access privilege
  • 33. E – 4 Team Leader / Decision Maker: Dot Matrix Will determine the condition and stability of campus resources Make High Level Decisions with management team Will Initiate Communications to her team Team: Hy Perteks – Director Information Center – Data Backups Manage Data Recovery Process Routing of Network Resources if needed Mike Rowe – Maintenance Expert - Physical Condition of PC’s Check Condition of PC’s Physical relocation of PCs if needed. Cher Ware – Software Manager - Software Configuration Ensure duplication of critical systems at new location if needed. Ensure that any manual software changes are made (need to change servers) Assist Mike Rowes team as needed.
  • 34. E – 4 Other Recommendations: Remote Emergency Location – Satellite Campus Off Site replication should be mirrored at one of the satellite campuses. Already owned Space There should be little effort in backing up data here since they are already on the network. Test Disaster Recovery Twice a year.
  • 35. Question: Explain in a paragraph why a phased conversion would be used to install the computer system E – 5 Answer : A phased conversion is the best method since the system has several major subsystems. Hardware records and programs must be installed first because software records reference them. The phased conversion provides data entry personnel time to update records with additional data elements not stored in the old system