Upload
julian-clark
View
220
Download
0
Tags:
Embed Size (px)
Citation preview
Chapter 16
Designing Effective Output
E – 2E – 2
E – 2E – 2BeforeBefore
E – 2E – 2AfterAfter
E – 3E – 3
E – 3E – 3BeforeBefore
E – 3E – 3AfterAfter
E – 4E – 4
E – 5E – 5
E – 6E – 6
E – 7E – 7
E – 8E – 8
Program : UPDATE SOFTWARE RELATIONAL FILEInput : UPDATE SOFTWARE INSTALLATION LIST, document
UPDATE INSTALLED SOFTWARE SCREEN, displayOutput : SOFTWARE RELATIONAL FILE, disk
INSTALLED SOFTWARE TRANSACTION, disk
E – 9E – 9
Update Software Relational File
Update Software Relational File
Update Software Installation List
Update Software Installation List
Update Installed Software Screen
Update Installed Software Screen
Software Relational File
Software Relational File
Installed Software
Transaction
Installed Software
Transaction
Program : PRINT USER NOTIFICATION REPORT
Input : INSTALLED SOFTWARE TRANSACTION, disk
Output : USER NOTIFICATION REPORT, report
E – 9E – 9
Print User Notification Report
Print User Notification Report
User Notification Reports
User Notification ReportsInstalled Software
TransactionInstalled Software
Transaction
E – 9E – 9ADD SOFTWARESCREEN
HARDWAREINQUIRYSCREEN
NEWSOFTWAREFORM
SOFTWAREINSTALLATIONLISTING
SOFTWARELOGTRANSACTIONFILE
SOFTWAREMASTER FILE
HARDWAREMASTER FILE
ADD NEWSOFTWARE
PRINT SOFTWAREINSTALLATIONLISTING
DETERMINEHARDWARELOCATIONS
INSTALLSOFTWAREUPDATED
SOFTWAREINSTALLATIONLISTING
UPDATESOFTWARERELATIONAL FILE
UPDATEINSTALLEDSOFTWARESCREEN
SOFTWARERELATIONALFILE
INSTALLEDSOFTWARETRANSACTION
USERNOTIFICATIONREPORT
PRINT USERNOTIFICATIONREPORTBeforeBefore AfterAfter
E – 10E – 10
Inventory number : Not entered, not numeric, already on fileDate purchased : Invalid date (month = 14, etc.)Network Connection : Anything other than C, D, F, M, 1, 2, 3, 0CD ROM : Anything other than 0, 2, 4, 6, 8, 10, 12, 16, 20, B, D, V
Monitor, Printer, Internet, or Board Codes: try entering data into the field that is not on the list
E – 11E – 11
E – 12E – 12
E – 12E – 12
E – 12E – 12
E – 12E – 12
E – 12E – 12
E – 12E – 12
Design test data and predicted results for the ADD TRAINING CLASS program. Use Microsoft Access to test the display and note whether the results conformed to your predictions.
Title : Must be enteredCourse Description : Must be enteredClass length : Not entered, not numeric, greater than 20Operating System: Must be entered that is on the list
E – 13E – 13
Design test data on paper to test the CHANGE SOFTWARE EXPERT
program. Use Microsoft Access to test the display. Note any
discrepancies
Last name : Must be entered
First Name : Must be entered
Phone : Not entered, not numeric
Room : Must be entered
Title : Must be entered
Version : Must be entered
Expert Teach Course : Must be Yes or No
Operating System : Must be entered data on the list
E – 14E – 14
Chapter 17
Successfully Implementing The Information System
E – 1E – 1
A network is a collection of data communication hardware, computers, data communication software and data communication media, all connected in a meaningful way to allow users to share information, resources and equipment. A star network is a network where each machine is connected to a central machine, called a server. The server holds all the software, and the other machines, called nodes, request the software from it.
Since the server receives all the requests, it can handle them one by one, and there are no data crashes.
E – 1E – 1
E – 1E – 1
Advantages
• Easy to install and wire
• No disruptions to the network
when connecting or removing
devices
• Easy to detect faults and to
remove parts
Disadvantages
• Requires more cable length
than a linear topology
• If the hub or concentrator fails,
nodes attached are disabled
• More expensive than linear
bus topologies because of the
cost of the hubs, etc.
Backup will be performed on two levels1.All transactions entering the system from on-line screens will be placed on log (or journal) transaction files. These are located on a smaller, second hard disk within the server computer. If there is a head crash or other problem on the main hard disk, the backup files would still exist. The format of the log files is
E – 2E – 2
Date Time Computer ID
User ID Backup Type
Result
2010/04/01 12:00 AM Dot-PC DMatrix Full Completed
2010/04/01 12:00 PM Dot-PC DMatrix Incremental Completed
2010/04/02 12:00 AM Dot-PC DMatrix Incremental Completed
2010/04/02 12:00 PM Dot-PC DMatrix Incremental Failed
2010/04/03 12:00 AM Dot-PC DMatrix Full Completed
2010/04/03 12:00 PM Dot-PC DMatrix Incremental Completed
E – 2E – 2
2. All database files are copied to media every night. These are removed to one of the other campus locations and stored in a vault.
Advantages:1. Backup of all major files.2. Faster backup since major files do not have to be backed up before each
update.3. Continual backup using the log files.
Disadvantages:• Programs must be written to restore database records in a batch mode
from the log files.• Streamer tape units may be initially expensive.
E – 3E – 3
List security measures that should be taken to prevent unauthorized
persons from using the computer system
•Unique username and password for all users
•Password must be at least 8 characters long and must include at least one
number, one uppercase letter, and one special character (ex: finAlf4nt4$y)
•Password will expired every 60 days and will need to be changed
(notification 12 days before expiration date)
•Username should be locked after 3 failed attempts
•System users audit every 3 months to check for valid users of the system
and removed users who no longer have access privilege
E – 4E – 4• Team Leader / Decision Maker: Dot Matrix
o Will determine the condition and stability of campus resourceso Make High Level Decisions with management teamo Will Initiate Communications to her team
• Team: o Hy Perteks – Director Information Center –
Data Backups Manage Data Recovery Process Routing of Network Resources if needed
o Mike Rowe – Maintenance Expert - Physical Condition of PC’s Check Condition of PC’s Physical relocation of PCs if needed.
o Cher Ware – Software Manager - Software Configuration Ensure duplication of critical systems at new location if needed. Ensure that any manual software changes are made (need to
change servers) Assist Mike Rowes team as needed.
E – 4E – 4
Other Recommendations:• Remote Emergency Location – Satellite Campus • Off Site replication should be mirrored at one of the satellite
campuses.o Already owned Spaceo There should be little effort in backing up data here since
they are already on the network.• Test Disaster Recovery Twice a year.
Question: Explain in a paragraph why a phased conversion
would be used to install the computer system
E – 5E – 5
Answer : A phased conversion is the best method since the
system has several major subsystems. Hardware
records and programs must be installed first
because software records reference them. The
phased conversion provides data entry personnel
time to update records with additional data
elements not stored in the old system