Systems Analysis and Design Manual
Systems Analysis and Design Manual
Systems Analysis and Design Manual
CHAPTER
Despite its enormous present and future technological possibilities, the computer still
owes its power and usefulness to people. It is the people in companies who define the
applications and problems that the computer has to solve .
The location of work systems and procedures is found in the administrative element of
planning, which is the moment where how things are going to be done are defined.
The process must start from the essential information to the detail of the Implementation.
The role of analysis may be to support the activities of a business, or to develop a product
that can be sold to generate profits. To achieve this objective, a computer-based system
makes use of six (6) fundamental elements:
• Software , which are computer programs, with data structures and their
documentation that make the logistics methodology or requirements controls of
the Program effective.
• Procedures, or steps that define the specific use of each of the elements or
components of the System and the rules for its management and maintenance.
A System Analysis is carried out taking into account the following objectives:
• Evaluate what concepts the client has of the system to establish its viability.
• Create a system definition that forms the foundation for all engineering work.
Analysis and design of systems 3
Natural systems and systems created or made by man. Public and private organizations
constitute systems created or made by man.
Considering the number and complexity of the elements and their relationships, and the
possibility of predicting their behavior, systems can be simple, complex and very complex;
and determinists and probabilists.
Another classification of systems distinguishes closed systems from open systems. The vast
majority of organic systems are open, this means that there is an exchange of energy with
their members.
Mechanical or non-living systems and living systems. Easy to understand because public
organizations are living systems, since the main component is the human being as an
individual entity and as a member of a social group.
Adaptive and non-adaptive systems. Organizations are adaptive systems, since they react
or respond to changes in the context, producing a new situation of the system in response
to the reaction or response.
Analysis and design of systems 4
CHAPTER
FUNDAMENTALS OF SYSTEMS
DEVELOPMENT.
2.1 THE ANALYST AS A PROBLEM SOLVER
In essence, the system analyst applies a problem-solving approach to developing systems.
Problem solving is the act of studying the environment of a problem in order to implement
relevant corrective solutions. Problem is a term that includes:
2.1.1 CHARACTERISTICS
Planning is the continued study of the environment of a problem in order to identify the
possible solutions it entails.
Ideally, the projects that are selected will provide benefits to the company in the long
term. Therefore, information system planning cannot be separated from the company
itself. It should be noted that many companies have not yet focused their attention on
which planning unit.
Analysis is the study of the problem environment and the subsequent definition and
establishment of priorities among the needs raised in order to solve the problem.
Design is the evaluation of the different alternatives as well as the detailed specifications
of the final solution.
Support is the ongoing maintenance and improvement of the solution over the course of
its life (which may last weeks, months, or years).
System analysis develops the information system for organizations. Before studying the
system construction process, it is necessary to clearly understand the product you are
trying to create.
The first, and most important, block of information systems is the person. The
predominant philosophy in systems development should be to think
that systems are made for people.
System Owner
System users
They are those people who use the information system (and obtain direct benefits from it)
on a regular basis: Capture, validate, enter and store information data.
Users are the people for whom systems analysts develop information systems. System
users define:
Data can, and should, be interpreted as the raw material used to produce information.
Consequently, we consider that data should constitute one of the fundamental pillars of an
information system.
Most people use the terms data and information interchangeably. However, they do not
mean the same thing at all.
Strictly speaking, the average system owner is not interested in the raw data, but in the
things that data describes. These things are company resources.
For system owners, data is itself a resource that helps better manage other business
resources. Which business resources are important to system owners for a given business
or information system, most of these resources fall into one of the following categories:
Users of an information system are typically data experts. They know the company's data
better than anyone. As information workers, they are responsible for capturing, storing,
processing, editing and using data on a daily basis. Unfortunately, they often view data
only in terms of how it currently applies or how they think it should be applied.
System users define the data needs of an information system. System designers convert
these needs into databases and computer files that will support the elementary block of
activities of the information system. System designers view data in the form of
Analysis and design of systems 8
When engineers design a new product, that product must fulfill some function, do
something useful. The potential clients define the desired function and the engineer
creates a design that performs said function. ACTIVITIES define the function of an
information system.
In essence, activities are jobs carried out for the company by both people and machines.
Some activities are repetitive. Others occur less frequently, sometimes almost never.
System owners are generally interested in the general plan of the company, in this case
the groups of activities called functions.
Functions are ongoing activities that support the operation of the company. In general,
they include very different activities that have something in common.
Essentially, system owners view their business functions through various planning
parameters, such as goals and objectives.
Goals are general statements of intent, something the company wants to achieve.
Business processes are activities that have inputs and outputs. These processes are often
based on specific methods and step-by-step application procedures. Business processes
can be launched by people, machines or computers.
The vision that system designers have of the activities is conditioned by the limitations of
the specific technology. Sometimes the analyst may choose this technology. But often the
choice has already been made, and the analyst must use the available technology. In both
cases, the vision of the activities that system designers have is of a rather technical
nature.
The systems development life cycle (SVD) is the process by which systems analysts,
software engineers, programmers, and end users develop information systems and
computer applications.
In any case, it is a project management tool that plans, executes and controls systems
development projects.
Involve the User: It is common to hear analysts and programmers talk about my system.
This attitude has given rise, to a certain extent, to a confrontational position between
analysts, programmers and users. Although programmers and analysts work hard to
create technologically magnificent solutions, these solutions often backfire on their
inventors because they do not address real organizational problems or even introduce
new technical or organizational problems. For this reason, the involvement of the user in
the project is an absolute necessity to achieve fruitful development of the systems.
Apply a problem-solving method: The systems development life cycle is, first and
foremost, a problem-solving method for manufacturing systems. The term problem is used
in this case as something that includes both real problems and opportunities for
improvement and standards imposed by management. The classic problem solving method
is as follows:
Define phases and activities: Most CVDS consist of phases. In its simplest classical form,
CVDS consists of four phases:
1. System analysis
2. System design
3. System implementation
4. Systems planning
Design systems that can grow and change: There is a vital flaw that information systems
professionals who need to develop systems often incur. Along with the ever-increasing
demand for systems development, many systems analysts have fallen into the trap of
developing systems that only meet the needs of today's users. Although at first glance it
may seem necessary, in practice it is almost always a failure.
Entropy is the term used by systems specialists to describe the natural and inevitable
deterioration of all systems.
Analysis and design of systems 11
CHAPTER
SYSTEM PLANNING
System planning aims to identify and prioritize those technologies and applications that
will produce maximum benefit for the company. Some of its synonyms are strategic
systems planning and information resource management.
Systems planning is achieved through the cooperation of the system owners, hence in the
pyramid model, it has to do with PEOPLE, DATA and ACTIVITIES.
The first phase of studying systems planning consists of studying the mission of the
company. It is surprising that many companies have not formally documented their
mission, but in any case they all have a mission. The correct planning of information
Analysis and design of systems 12
The purpose of the AAE is to devise a plan that leads to highly integrated information
systems applications for a business area. The analysis phase activates projects in order
to:
1. Develop a single and integrated database for the entire company area.
2. Develop a common network infrastructure for the business area (including
connections to other networks and the outside world).
3. Develop planned information systems application development projects that
will evolve around shared databases and network infrastructures, through
which they will achieve a high degree of integration.
Elemental Blocks
• Identify the company's needs for a shared database for the business area.
• Identify the needs in the company for a shared network for the business area.
• Refine the technical needs for the business area database and networks.
• Identify high-level needs in the company regarding the availability of
integrated applications in the business area.
independent of the organizational units or the support of the information systems, whose
purpose is to determine if the basic business processes can be simplified and improved
significantly.
Analysis and design of systems 14
CHAPTER
SYSTEM ANALYSIS
Systems analysis is the current study of business and information, the definition of the
needs and priorities expressed by users for the construction of a new information system.
Models can be established for existing systems, in order to obtain a better understanding
of these systems, for proposed systems as a means of defining needs and designs.
Implementation models show not only what a system is or does, but also what its physical
implementation is like. Its synonyms include technological model and physical model.
Deployment models are useful for documenting the data of an existing system. However,
analysts have learned that the data needs of proposed systems should be specified, at best,
by essential models.
Essential models are implementation-independent models that describe the essence of the
system (what the system does or should do), regardless of how the system is physically
implemented. Essential models are sometimes called logical models or conceptual
models.
Data modeling is a technique for organizing and documenting system data. Data
modeling is sometimes called database modeling, because data models are typically
implemented as a database.
Analysis and design of systems 15
There are numerous tools for data modeling. Both systems analysts and users will find
different tools on their way, sometimes even in the same organization. Therefore, it is
important that you become familiar with two other commonly used data modeling tools:
the Martin and Bachman data models. These two tools aim to represent and convey the
same information in the form of an entity-relationship diagram; However, each of them
has a different symbolic notation. Another tool is CASE, which are programs (software)
that automate or support one or more phases of the systems development life cycle. The
purpose of this technology is to accelerate the systems development process and improve
the quality of the resulting systems.
Entity-relationship diagrams
There are many ways and methods to carry out data modeling. In this section we will see
when to do data modeling during systems development.
Data modeling can be performed during various phases of the systems development life
cycle. Data models are progressive, since enterprises and applications do not have final
models. Instead, a data model should be viewed as a living document that will change in
response to changes in the business. It is best to store data models in a dictionary, so that
they can be retrieved, expanded and edited over time.
Analysis and design of systems 16
During the definition phase of systems planning, an enterprise data model is typically built.
This model reflects a high-level view of critical information entities. The enterprise data
model is also called the substantive data model, since its entities represent high-level
substantive issues about which the company's management requires information.
Essential process modeling addresses business processes from the points of view of system
owners and users. Accordingly, these models do not contain technological or
implementation details.
A data flow diagram (DFD) is a process modeling tool that represents the flow of data
through a system and the jobs or processes carried out by said system.
Potential h Subscription
member ner coren
Order form to be
filled out
Subscription
system
Member and
musical
preference
Automatic order fulfillment date for Details
promotion Of the order
Orders by
to register date Rg Archio
of orders
Monthly or special
promotion
A4
marketing
department
Data Flow Diagram Conventions and Guidelines The main symbol of a flow diagram is
the process.
A process is a set of tasks or actions performed from an input data stream to produce an
output data stream. Although the processes can be carried out by people, departments,
robots, machines or computers, for the moment we will only focus on the task or action
carried out, and not on who is in charge of said task or activity.
Data flow represents entering data into a process or obtaining data from a process.
Internal and external agents define the limits of a system. They provide net inputs or
outputs to a system. One of its most common synonyms is internal and external entity (not
to be confused with data entity). Agents are also sometimes called sources (of net inputs to
the system) or destinations (of net outputs from a system).
A data warehouse is an inventory of data. Its synonyms include file and database (although
these two terms have a nuance more related to the implementation of essential process
models).
Ideally, essential data stores should describe things about which the company wants to
store data.
Analysis and design of systems 18
This includes:
• Participants (e.g.
customers, suppliers,
employees, students,
instructors, etc.)
• Objects (as
products, parts,
textbooks, equipment,
etc.)
• Locations (e.g.
warehouses, sales
regions, buildings,
rooms, etc.)
• Events (such as orders,
time cards, requests,
courses, registrations,
etc.)
Process modeling can be carried out in various phases of the systems development life
cycle. The process models are gradual, that is, in companies and applications they do not
have final models. Instead, a model should be considered a living document that will evolve
in response to changes experienced by the company. It is best to store process models in a
dictionary, so that they can be retrieved, expanded and edited over time.
During the study phases of systems planning, generally no process modeling is done, the
focus of this stage is completely focused on the study of the company and the mission that
said company must fulfill.
During the definition phase of systems planning, a business process model is typically
built. This model contains an overview of business functions.
The degree of detail of said model varies depending on the specific methodologies used,
however, these DFDs do not, in general, have a sufficient level of detail to give way to the
design of specific computer applications. Rather, they are used to identify specific software
applications and prioritize them for later analysis and design phases.
Process modeling usually builds an important part of many techniques and methodologies
of the study phase. Thus, analysts will create data flow diagrams for the implementation of
current systems to increase their knowledge about the systems and the problems associated
with them. Some analysts could convert these implementation DFDs into essential DFDs to
eliminate the inevitable bias that occurs when starting from existing implementation models
to consider alternative solutions.
The essential process model obtained in systems analysis describes business process needs,
not technical solutions. When you move to systems design, the process model will become
more technical. It should become an application implementation model that will direct the
technical implementation of programs. Thus DFDs can also be used in the implementation
design phases.
We will use a phased approach to deliver a complete set of DFDs that can be used in the
future.
A context data flow diagram defines the scope and boundaries of the system and the
project. The scope of any project is always subject to change, therefore, so should the
context data flow diagram. Synonyms include context diagrams, context model, and
environmental model.
Context diagrams are difficult to prepare, since they must define the scope of action of the
project or system. To determine them, we propose the following strategy:
1. Think of the system as a container, to differentiate its interior from the exterior.
2. Ignore the purely internal tasks of the vessel. In this way, the classic black box
concept of systems theory will be applied.
3. Ask your end users what events or transactions the system should respond to.
Business events simply occur, bringing new data to the system.
4. For each event, ask your end users what responses the system should produce.
5. Ask your end users what fixed format reports the system should produce.
6. Identify the net data sources for each event. These sources will become internal
or external agents in the DFD.
7. Identify the net recipients of each response or output that the system should
generate. These destinations will also be internal and external agents.
Analysis and design of systems 20
8. Identify all possible external data stores. Many systems require access to files or
databases from other systems. Maybe they will use the data from these files or
databases.
Step 2: Create a decomposition diagram that outlines the data flow diagrams.
There are two basic ways to create data flow diagrams for an entire system or application:
• Draw two data flow diagrams, each on a separate sheet of paper. The first
diagram, called general or level zero DFD, serves as a general level diagram, it
commonly consists of system or level one DFD, it is an extension of the first
diagram that provides a more detailed view of the system. It can contain from
ten to thirty processes.
• Create a set of tiered data flow diagrams. This method applies an explosion
technique, instead of the previous expansion method. The context data flow
diagram process is divided into its own data flow diagram that illustrates the
basic subsystems shown as subprocesses. Each of these subprocesses can, in
turn, be broken down into a data flow diagram that shows more detailed
processes.
A decomposition diagram, also called a hierarchy chart, shows the structure, or top-down
functional decomposition, of a system. It also provides us with an outline to prepare our
DFDs.
Before moving on to drawing our data flow diagrams, it may be useful to identify the
possible data stores that will be used in these diagrams. First, we create a composite data
store that represents all the data in the system. This data store is broken down into our data
model. Next, we will identify the primary data stores, one for each entity or associative
entity in the data model.
Using our decomposition diagram as an outline, we can now proceed to break down the
processes in the context diagram into a more detailed image of the system. This second
DFD is usually called a general data flow diagram. It shows its main subsystems and
functions, as well as the way in which they interact with each other. It is a useful way to
communicate the meaning and performance of the system in general terms.
After having prepared the systems diagram, we can divide each of the processes of said
DFD to highlight a greater level of detail about the subsystems. Any process of a DFD is
susceptible to breakdown to reveal more detailed data flow diagram of said process. The
breakdown continues until a sufficient level of detail has been obtained. All but the most
detailed DFDs are often called mid-level DFDs.
Let's then complete the set of DFDs by levels by creating diagrams that show the detailed
process needs within the system. These diagrams are called primary or low-level data flow
diagrams. Periodically, decomposition diagrams should be reviewed to ensure that the
original scheme is correctly followed. This diagram contains an example of each of the
existing types of primitive processes:
Note that the original DFDs must show all appropriate data stores and original data flows.
Much of today's existing foundation of information systems and applications applies, with
reasonable success but at increasing cost, an outdated technology: centralized computing
and time sharing.
There are several reasons that justify the current concerns in the process with clients /
servers:
• Client computers are becoming more powerful and cheaper than large
computers and mini computers.
• Data storage can be brought closer than ever to the end user, where these
resources have the most value to the business.
These and other questions force the analyst to perfectly understand the geographic
distribution associated with each system.
A job connection diagram (PCD) is a network modeling tool that describes the shape of a
system based on the location of its users, processes and data, as well as the necessary
interconnections between those locations.
Shows the set of symbols used for the documentation of business networks (geographical
scheme of a specific information system or application).
A position is any place in which there is a user who uses or interacts with the information
system or application.
Analysis and design of systems 24
Essential Locations are places where data and processes can eventually be distributed.
Initially, we may not be sure of the decisions to be made about the distribution of data and
processes in a DCP.
Essential connections
Essential Connections do not have a name in DCP. However, if it is useful, the connections
can be given a name that indicates the distance between the stations they connect. In cases
of mobile stations, distance intervals could be indicated, which would also be appropriate
Analysis and design of systems 25
CHAPTER
SYSTEM DESIGN
5.1 SYSTEM DESIGN CONCEPT
System design is the evaluation of the different alternative solutions and the specification
of a detailed computer solution. Also known as physical design.
During the selection phase it is interactive to identify and analyze the various possible
options, and only then propose the most viable solutions based on the analysis carried out
.
1. Identify and investigate alternative solutions, both manual and computer-based, that
can support obtaining the Object Information system.
2. Evaluate the feasibility of alternative solutions and recommend the best of these
solutions from a global point of view.
Given the design needs and the integration needs of the object system, this phase involves
the development of the technical design specifications.
Elementary blocks for carrying out the design and integration phase
The design and integration phase has a double objective. First, and as a top priority, the
analyst seeks to design a system that satisfies the needs and is attractive to end users.
Ergonomics will play a central role during the design. Secondly, it is also very important,
the analyst aims to present clear and complete explanations to programmers and
information technicians. Our elementary blocks of information systems serve as a
framework to carry out the design phase:
Analysis and design of systems 27
• Networking: During the systems analysis phase, we established the system networking
requirements of the target system.
• Data: During the definition phase, we specify the content of each of the information
and data flows.
• Activities: The sequence of steps and control flow through the new system must be
specified during design.
• People: the roles played by the people participating in the new system must be
specified.
• Technology: Even if hardware is not selected or designed during the physical design
phase, the hardware imposes limitations on the system.
Normalization: is a procedure with three stages that puts the data model in:
In most organizations data analysis is carried out by the system analyst and/or database
administrator. He is also involved in the end user, but mainly as a reviewer of the final
data model.
There are numerous possible approaches to carry out data analysis. In which are:
Systems analysts and database administrators use some special terms to differentiate
between the different specific types of keys that exist.
Primary Key: designates the attribute or attributes that uniquely identify one and only
one presence of each entity.
Candidate Key: is an alternative primary key used to uniquely identify one and only one
presence of an entity.
Concatenated Key: is a primary key composed of more than one data attribute. One of its
most common synonyms is combination keys.
The distribution of processes is not the only design problem. So is the location of data
warehouses. At the time, it was considered essential to be able to control data in a single
process center. Until very recently, the only known practical way to achieve this goal was
to store all data on one or several mainframe computers with complete control by the
data management group. Only some local data could be distributed to mid-range
computers, while the rest remained under the control of a data management group.
Fundamental design decisions must also be made regarding inputs and outputs. The
decisions applied are usually simple (for example, how to work in Batch mode or Online
mode). Currently, we must also consider more modern alternatives, such as remote Batch,
in data entry without a keyboard, data entry using pencils, graphical user interfaces,
electronic data exchange, the exchange of images and documents, etc .
Systems flow charts are diagrams that show the flow of control through a system by
specifying all programs, inputs, outputs, and data access and retrievals in files/databases.
Analysis and design of systems 30
Conventional files and modern databases are the heart of many information systems. The
design of computer files and databases can be more difficult because the storage and
organization of data on computer media requires the analyst to take into account complex
and sometimes contradictory issues such as, for example, the storage capacity and
performance.
In this section, we will see how to design and document files. Remember that some
physical design decisions had already been saved in the project dictionary. We will then
proceed to design a file to illustrate this important system design task.
There are two important and related issues that have a notable influence on file design:
• Internal controls
The design of any database generally involves the database administrator and database
specialists. These will manage the technical details and issues related to other
applications. However, it will be useful for the systems analyst to understand the
fundamentals of design principles for relational databases.
A schema is the structural model of a database. Any given DBMS supports two schemas, a
logical schema and a physical schema.
These two schemas specify the physical and logical structures of the records in a
database.
The physical schema defines data structures, access methods, file organizations, indexes,
locking, pointers, and other physical attributes.
The logical schema defines the database in simpler terms from the point of view of end
users and programmers.
The outputs present information to users. Outputs, the most visible component of a work
information system, are the justification for the system.
During systems analysis, output needs and requirements were defined, but outputs were
not designed. There are two basic types of computer outputs. The first type is that of
external outputs.
External outputs emerge from the system to trigger or request confirmation of actions
outside.
Cyclic outputs are those that are typically implemented as forms that eventually return to
the system as inputs.
Internal outputs remain within the system to support the work of users and system
administrators.
A source document is a form used to record data that will ultimately be entered into a
computer. Source documents should be easy for system users to complete and facilitate
rapid data entry in a machine-understandable format.
Data entry is the process of translating source documents into a machine-understandable
format. This format can be a punched card, an optically marked sheet, a magnetic tape,
or a flexible floppy disk, to name just a few.
Data entry is the actual entry of data into the computer in a machine-understandable
format.
The analyst is normally responsible for recommending the method, support and format of
all inputs and outputs.
Batch input is the oldest and most traditional input method. In it, the original documents
are collected and periodically delivered to data entry operators, who type said data
through a data entry device that translates it into a machine-understandable format.
Online entry is the capture of data at the point in the business where it originates and its
direct entry into the computer, preferably as soon as possible. Today, most, if not all,
systems use or are beginning to use online data entry methods.
A good systems analyst will consider all possible options for implementing an output,
especially the output support and output format.
The format is the way in which information is presented on a medium, for example in
columns of numbers.
Input controls ensure that data entry into the computer is accurate and that the system is
protected from accidental and intentional errors and abuses, including fraud.
Output controls ensure the reliability and distribution of the outputs generated by the
computer. For inputs, the following internal control guidelines are offered:
Can any specific strategy be employed to design a better user interface? Indeed, there are
Analysis and design of systems 33
several strategies of this type and choosing the best one depends on the functions to be
performed and the characteristics of the system user. Let's briefly examine these
strategies:
• Selection in menus
• Instruction set
• Question-answer dialogues
• Graphics
We are going to focus our attention on the way in which programming specifications must
be presented to computer programmers for implementation. To this end, we will see
program design as the combination of two components:
The programs have been identified from the design units. Given these programs, we want
to break them down into manageable models around which we can write program
specifications. Ali programs may build and test each module differently. The modules can
then be integrated according to the structure graph and tested as complete programs.
A module is a group of executable instructions with a single entry point and a single exit
point.
There are some modules that perform unique functions. Some of them would be:
• Read a record
• Edit a record
• Calculate a payment
• Add a record to a file
perform three types of tasks: entering or reading data, manipulating input data, and
outputting data or information. In other words, all program tasks can be classified
according to input, process and output (EPS) requirements. In this model it will help us
obtain the requirements to implement a computer program.
Analysis and design of systems 35
CHAPTER
SYSTEMS IMPLEMENTATION
6.1 CONCEPT
It is the construction of the new system and the delivery of said system to production
(daily exploitation). Unfortunately, one of its common synonyms is systems development.
The fundamental objectives of the network and database construction and testing phase
are the following:
Finally, during this phase a conversion plan is developed to successfully guide the
delivery of the new system to production.
Elementary blocks for the installation and testing phases of the new system
The fundamental objectives of this phase are:
Now, let's move on to the last implementation phase of our life cycle: the delivery of the
new system for production. The analyst is the main figure in this delivery phase,
regardless of his or her participation in the construction of the system.
Elementary blocks in the delivery phase of the new system for its
exploitation
The purpose of the new system delivery phase for operation is to smoothly convert the old
system into the new system. To achieve this purpose of this phase, we must achieve the
following objectives:
• Install the files or databases that the new system will use.
• Offer training and documentation to people who will use the new system.
• Convert the old system to the new system.
• Evaluate the project and the final system.
CHAPTER
SYSTEM SUPPORT
7.1 SYSTEM MAINTENANCE
Regardless of how a system or application is designed, built and tested, errors will
inevitably appear. Some of these errors will have their origin in failures to communicate
needs. Others will be caused by design defects. There will also be those caused by
unforeseen and, therefore, unproven situations. And finally, errors can also be caused by
unforeseen misuse of programs. In all of these situations, corrective action must be taken.
Let's now review the general guidelines for reading these diagrams:
• Dates reflect the inputs and outputs of a task. They all have a name. When one
of these inputs or outputs is referenced in the text, underlines appear.
Analysis and design of systems 39
From time to time, it is inevitable that a system will fail. This failure generally results in
what is called an aborted program (also called ABEND or crash) and possible loss of
data. So, it is often the systems analyst who is in charge of fixing the system or acting as
an intermediary between the users and those who must recover the system. The purpose of
this section is to briefly summarize the role of the analyst in systems recovery.
This activity does not require a multitasking flowchart to detail its steps, and can be
summarized as follows:
In many cases, the analyst can sit at the user terminal and recover the system. Sometimes,
it can be as simple as pressing a specific key or restarting the main computer.
Another ongoing and relatively routine activity in systems support is routine end-user
assistance. Regardless of the user training or the quality of the documentation, users will
require additional assistance. The systems analyst is generally available to users to offer
help in the daily use of specific applications. In critical applications, the analyst must be
available day and night.
Once again, it is necessary to provide a detailed flowchart for this activity. The most
characteristic tasks include:
The adaptation of an existing system to new needs is a possibility always open in all newly
implemented systems. The maintenance linked to these adaptations forces the analyst to
analyze the new needs and return to the appropriate phases of analysis, design and system
implementation. In this section, we will examine two types of adaptive maintenance:
systems improvements and systems reengineering.
• People: For the most part, system improvements are proposed by system
users, although system analysts, designers, and builders can also detect
potential technical issues related to performance, security, and internal
controls.
• Data: Many system improvements are demands for new information that can
be derived from existing stored data. Some data enhancements may require
expanding data storage.
• Networks: For the most part, system improvements have nothing to do with
networks.
CHAPTER
PROJECT MANAGEMENT
In any systems development project, effective project management is necessary to ensure
that the project meets its objectives and is developed within an acceptable budget.
Although the tools and techniques of systems analysis and design play a fundamental role
in obtaining systems that work, these methods are not sufficient on their own. As we saw
in the previous mini-case, poor project management, or making them ineffective. The
mini-case that opens the module highlights the four most common consequences derived
from poor project management:
These problems are not always due to poor project management, but there is no doubt
that it has an important responsibility for their appearance.
One of the main problems associated with cost overruns is that many methodology or
project plans require an excessively precise estimate of costs before starting the project.
These estimates are made after a quick prior or feasibility study.
To be a good project manager, the analyst must have good training in basic management
functions.
Analysis and design of systems 42
The project manager is not simply an experienced analyst who takes charge of a project.
A project manager must apply a different set of techniques and knowledge than an
analyst. These functions include planning, recruiting, organizing, scheduling, directing,
and controlling.
Pert , which means Project or Program Evaluation and Review Technique (project or
program evaluation and review technique), was developed at the end of the 1950-1959
scholarship to plan and control the army's large weapons development projects. US. It
was developed to demonstrate the interdependence of project tasks when project planning
is carried out. In essence, PERT is a technique of interrelated graphical models.
THE GRAPHIC
The PERT chart is the graphic representation of the relationships between all the events
and tasks necessary to carry out a project.
An event (represented by a circle) is a specific instant in time; Therefore an event does
not consume time. An event can be the beginning or the end of a task, a point in time that
can be clearly recognized and identified.
An activity (represented by a date) is the work necessary to achieve an event. An activity
cannot begin until all preceding activities have been completed.
Thus a graph is composed of a certain number of events linked together by activities.
Analysis and design of systems 43
The graph begins with a single initial event, branches into several paths that link various
events, and ends in a final event that signals the end of the project.
Since PERT is an event-oriented technique, the focus is on the beginning or end of
events rather than the activities themselves.
BASIC RULES
Rule 1: One and only one arrow is used to represent an activity to be executed. The length
of the arrow and the direction it is facing have no meaning.
Rule 2: The diagram is constructed by connecting arrows that represent activities,
considering for each one the following three questions:
a) What immediately precedes this activity
b) What immediately follows this activity
c) What activities are concurrent.
Rule 3: Start the diagram with a preliminary arrow.
Rule 4: List the events.
Rule 5: Use dummy activities only when you need to maintain the logic of the diagram.
TIME ESTIMATES
Once a correct graph has been achieved, with the appropriate details, it is necessary to
establish an estimate of the duration of each of the activities; and although a single
estimate could be used, three estimates are usually used:
1 .- Optimistic Duration (to): time needed to carry out the activity if no unforeseen
difficulties or complications arise.
In most cases the probability of carrying out the activity in this time is small. A rule of
thumb for this case is: There is only a one percent chance of performing the activity in a
time less than the optimistic duration.
2 .- Most likely duration (tm): time that the activity is most likely to need to be carried
out. This estimate should take into account normal circumstances, allowing for some
delays due to unforeseen events, and should be based on the best information available.
3 .- Pessimistic Duration (tp): time needed to carry out the activity if unusual difficulties
Analysis and design of systems 44
NUMBERING OF EVENTS
The events should be numbered sequentially when the graph is finished, that is before
starting the calculations.
When numbering begins at the initial event and continues sequentially through the graph,
each successor event has a larger number than its predecessors.
In this way the circuit can be easily detected, since an activity will have a larger number
at the tail of the arc than at the head.
• h Equipment selection.
• Yo Final evaluation.
• J. Programming.
• K Equipment shipment.
• l Equipment reception.
Analysis and design of systems 45
The Gantt chart is a simple time chart tool that was developed by Henry L. Gantt in 1917.
Gantt charts, which still remain popular today, are quite effective for planning and
evaluating project progress. Like PERT charts, Gantt charts are based on a graphical
approach. The popularity of Gantt charts stems from their simplicity: they are easy to
learn, read, prepare, and use.
Analysis and design of systems 46
A Gantt chart is a simple bar chart. Each bar symbolizes a project task. In a Gantt chart,
the horizontal axis represents time. Since Gantt charts are used to chain tasks together,
the horizontal axis should include dates. Vertically, and in the left column, a list of the
tasks is offered.
Fact finding is a formal process that uses search procedures, interviews, questionnaires,
sampling, and other techniques to collect all available information about systems, their
needs, and displayed preferences.
Analysis and design of systems 47
Fact investigation is of vital importance primarily during the planning and systems
analysis phases. It is during these phases that the analyst learns the vocabulary of the
company and the system, such as its problems, opportunities, limitations, needs and
priorities. Fact research is also used during the design and support phases, but to a lesser
extent.
Now that we have a framework for our fact-finding activities, we can introduce six
common fact-finding techniques:
Since it would not be practical to study all the presences of each of the forms,
Analysts often apply sampling techniques to get a general idea of what is happening in the
system.
The size of a sample depends on how representative you want the sample to be. There are
many design issues and factors, in themselves a good reason to attend an introductory
course on statistical techniques.
Two commonly used sampling techniques are random sampling and statification
sampling.
Observation is one of the most effective techniques for collecting data that helps us
understand a system.
This technique is frequently used when there is uncertainty about the validity of data
collected by other means or when the complexity of certain aspects of the system prevents
clear explanations to end users.
8.3.7 QUESTIONNAIRES
Questionnaires are specific documents that allow the analyst to collect the information
and opinions expressed by the people surveyed.
Types of questionnaires
There are two questionnaire formats: free format and fixed format.
Fixed format questionnaires contain questions that require specific answers from
respondents.
Questionnaire design
1. Determine what facts and opinions should be collected and from what people. If the
number of people is very large, consider using a smaller, randomly selected group of
respondents.
2. Based on the necessary facts and opinions, determine which type of questionnaire
would produce better responses: fixed format or free format. Often, a combination of
formats is used to allow free-form clarifications to fixed-format responses.
3. Write down the questions. Examine them carefully to avoid that they contain errors of
expression or that could lead to erroneous interpretations. Make sure the questions
do not give away your personal opinions. Edit the questions.
4. Test the questions on a small sample group of respondents. If your respondents had
trouble answering them or if the answers were unhelpful, modify it.
5. Make copies and distribute the questionnaire.
8.3.8 INTERVIEWS
The personal interview is generally recognized as the most important and frequently used
fact-finding technique.
Interviews are fact-finding techniques during which the analyst collects information
provided by people face to face.
In structured interviews , the interviewer has a specific set of questions that he or she
wants to ask the interviewee.
Unstructured interviews are conducted with only a general objective or topic in mind and
few, if any, specific questions. In this case, the interviewer counts on the interviewee to
define the general context of the interview and direct the conversation.
The success of a systems analyst depends, at least in part, on his or her ability to
interview. A good interview will involve selecting the right people for the interviews,
intensive preparation for the interview, correct conduct of the interview and follow-up of
the interview.
Co-design of applications
The classic fact-finding technique has always been to conduct separate interviews with
end users. However, many analysts have had big problems with interviews: they, taken
separately, often yield conflicting facts, opinions, and priorities as conclusions. As a
Analysis and design of systems 50
result, numerous follow-up interviews and group meetings have to be done. For this
reason, many information centers are using group work sections as substitutes for
interviews.
CHAPTER
ANALYSIS OF VARIABLES
9.1 VARIABLE ANALYSIS
It deals with the variable elements and calculation methods used by the analyst and
companies when getting involved in the development of an application.
This module talks about cost-benefit analysis and other feasibility topics that are of
interest to analysts and users of information systems. There are few issues as important as
this. Feasibility analysis is not, in fact, a systems analysis, nor is it a systems design.
Rather, it is a cross-life cycle activity and should be carried out permanently in the course
of systems projects.
So far, we have defined feasibility and feasibility analysis, and pointed out the feasibility
checkpoints in the life cycle. In their Mayorga, analysts agree that there are four
categories of viability tests:
The costs can be classified into two categories. There are costs associated with the
development of the system and costs associated with the operation of the system.
The costs of developing an information system can be classified according to the phase in
which they occur. Systems development costs are generally incurred only once and do not
occur again after the project is completed. Many organizations have standard categories
of costs that they must evaluate. In the absence of such categories, the following list could
help us:
• Personnel cost
• computer use
• Training Costs of supplies, duplications and equipment.
• Cost of any new computer equipment or software.
Fixed costs occur at regular intervals and in relatively fixed ratios. Examples of fixed
operating costs are:
Benefits generally increase profits or reduce costs, both highly desirable features in any
new information system.
To the greatest extent possible, benefits should be quantified in current currency. Benefits
can be classified as tangible and intangible.
Analysis and design of systems 53
Intangible benefits are those that are thought to be difficult or impossible to quantify.
Unless these benefits are, at a minimum, identified, it may be entirely possible that many
projects will not be viable.
There are three well-known techniques for evaluating economic viability, also called cost
effectiveness.
1. Amortization analysis.
2. Return on investment.
3. Net present value.
Analysis and design of systems 54
CHAPTER
INTERPERSONAL TECHNIQUES
10.1 COMMUNICATE WITH PEOPLE
Communication barriers frequently arise in information system projects, usually created
intentionally or accidentally by project participants. System owners and users use their
own language to describe forms, methods, procedures, etc. Designers and system builders
have their own terms, acronyms and clichés to describe the same things. As a result, a gap
has opened up in communication between these two groups.
For years, language and communications experts have told us that the secret to
maintaining good and effective oral and written communication skills consists of knowing
who we are addressing. At least four different groups can be identified:
1. Systems designers, including our colleagues (other information systems analysts and
specialists).
2. System builders, programmers and technical specialists who will develop the system in
practice.
3. System users, those people whose daily work will be directly or indirectly affected by
the new system.
4. Systems owners, who, in addition to being users of the systems, sponsor the project
and approve the expenses of the systems.
Positive expressions are words or phrases that provoke positive responses in listeners.
These terms can be used very effectively to convince those listening to us of the
advantages of the changes being proposed. Managers will more easily accept those ideas
that promote actions reflected by positive expressions.
Negative expressions are words or phrases that provoke negative responses in listeners.
These terms can also be used effectively to convince these listeners of the advantages of
the proposed changes. Managers will more easily accept those ideas that eliminate the
Analysis and design of systems 55
10.2 EMAIL
It seems that new and more effective means of communication between people have
continually been found. One of the most recent forms of interpersonal communication, of
particular importance to the systems analyst, is email.
Email gives us the opportunity to create, edit, send and receive information electronically,
usually through the use of some type of computer network. The only thing you need is a
computer and some type of email software. The advantages of this form of communication
are obvious. A person can send and receive messages almost instantly in contact with
virtually any place in the world (as long as the sender and receiver are connected to some
kind of computer network). These messages can be read, stored, printed, edited or
deleted. Furthermore, once the mail system software and computer network have been
installed, the actual cost of sending messages is very small.
Proxemics is the relationship established between people and the space that surrounds
them. Proxemics is an important factor of communication that can be controlled by
analysts who know and master it.
10.4 MEETINGS
During the course of a systems development project, many meetings are typically held.
Many people have a negative image of meetings because many meetings they have
attended were poorly organized and poorly run. Meetings are also very expensive,
because they require several people to spend time that could have been better spent on
more productive work. The more people participating in a meeting, the more expensive it
is.
Try to arrive on time, but don't start the meeting until everyone is present. If any
important participants arrive more than fifteen minutes late, consider canceling the
meeting. Once this has started, try to avoid interruptions or delays caused by, for
Analysis and design of systems 56
example, telephone calls. Have enough printouts for all participants. Get off to a good
start by reviewing the agenda so that the discussion points become ownership of the entire
group. Then address each agenda item according to the time allotted when the meeting
was scheduled. The group leader must ensure that no person or subgroup becomes
dominant in the meeting or is marginalized. Decisions should be made by consensus or
majority vote. A basic rule is to always stay on schedule: stay on schedule and finish on
time. If all agenda items are not discussed, another meeting will be scheduled.
As soon as possible after the meeting has concluded, the minutes of the meeting should be
sent. These minutes should be expressed in a short written summary of what occurred
during the meeting: points discussed, decisions made, and points for future
considerations. The minutes are normally prepared by the secretary, a member of the
team appointed by the group leader.
The project meeting is a special type of meeting called to conduct group reviews of
systems development documentation. These meetings can be used to review almost any
type of detailed documentation.
A project meeting group should consist of at most seven participants. All members of the
meeting should be treated as equals. The analyst in charge of preparing the
documentation to be reviewed should present this documentation to the group during the
meeting. Another analyst or key system user should be appointed as the meeting
coordinator. The coordinator is responsible for scheduling the meeting and ensuring that
all participants obtain documentation well in advance of the meeting date. The remaining
participants include system users, analysts or specialists who will involve documentation.
These reviewers may also take on special roles. For example, some may evaluate the
accuracy of documentation, and others may comment on quality, standards, and technical
issues.
All participants must agree to follow the same set of rules and procedures. Additionally,
participants must agree to review the documentation; This task should not be performed
by the person who prepared the documentation. The basic purpose of the meeting is error
stopping, not error correction. Analysts should never refute reviewers' comments. A
defensive attitude inhibits constructive criticism. The coordinator is responsible for
ensuring that these rules are explained, understood and obeyed in the appropriate way.
Reviewers should be encouraged to offer at least one positive and one negative comment
in order to ensure that the meeting is not superficial.
Analysis and design of systems 57
The business and technical report is the primary method used by analysts to
communicate information about a systems development project. The purpose of the report
is to inform or convince, or perhaps both.
The written report is a method that is frequently abused by analysts to communicate with
system users. We have a tendency to generate long, voluminous reports that look
impressive. Sometimes such reports are necessary, but other times they are not. If a 300-
page technical report is placed on a manager's desk, the manager can be expected to skim
it, but not read it, much less study it carefully.
The size of the report is an interesting question. After many unsuccessful experiences, we
have learned to apply the following general guidelines to limit the size of reports:
The way you write can have a great influence on your career path in any occupation.
Below we offer some guidelines in this regard:
• Paragraphs should convey a single idea. They should easily flow from one to
another. Poor paragraph writing almost always leads to deficiencies in the
exposition.
• The sentences should not be too complex. The average length of a sentence should
not exceed twenty words. Studies suggest that sentences longer than twenty words
are difficult to read and understand.
• It will be written in active voice. The passive voice becomes heavy and boring
when used systematically.
There is a general pattern for organizing any report. All reports consist of parent and
child elements.
Primary elements show actual information that a report is trying to convey. Examples of
these elements are the introduction and the conclusion.
While parent elements present the actual information, all reports also contain child
Analysis and design of systems 58
elements.
Secondary elements summarize the report so that the reader can easily identify both the
report and its parent elements. Secondary elements also add a professional finish to
reports.