Identify 5 stages of the Systems life cycle Describe the problem

Unit 1
Identify 5 stages of the Systems
life cycle
Unit 1
Unit 1
Describe the problem definition
stage of the systems life cycle
Unit 1
Describe the Documentation
stage of the systems life cycle
Describe the Installation stage
of the systems life cycle
Unit 1
Unit 1
Identify the different
methods an analyst might use
when investigating a system
Unit 1
Describe the throw-away
prototyping methodology
Unit 1
Describe the RAD software
development methodology
Describe the evolutionary
prototyping methodology
Unit 1
What are the benefits and
drawbacks of the prototyping
methodology
Unit 1
What are the Advantages and
Disadvantages of the RAD
methodology
Looking at the existing system to
see how it can be improved
Identify why the current system
does not meet the requirements of
the organisation
Feasibility report written at the end
to justify and explain new system
software



A strategy for installation needs deciding
based on time scale and the organisation

Parallel, Phased, Pilot or Direct
Training of the employees is completed
during this stage
Prototypes are the first attempt at a design
which are then extended and enhanced
Evolutionary - when a prototype is
developed and evaluated by the end user.
Using feedback a second prototype is
developed and evaluated. This process is repeated until the last one meets requirements.
Advantages
Reduced time and less development costs if
requirements being met

Improved and increased user involvement
Disadvantages

Confusion between the prototype and the
finished system

Excessive development time of the prototype

Benefits
End user is involved at all stages and developed in 6 months
End users do not have to define all
requirements
Disadvantages
System functionality may not be acceptable
Needs a good Project manager as timescale
hard to keep within 6 months
Problem Definition
Investigation and Analysis
Design
Implementation
Testing
(or Installation, Documentation, Evaluation and maintenance)
Documentation of a system needs to be
created and given to the end user.




Detailed Program specification so that
if any maintenance is needed in the
future then programmers can see this.
Operating procedures
Recovery Procedures
User Manuals





Questionnaires
Interviews
Meetings
Document Analysis
Observations
Prototypes are the first attempt at a design.
Throw-away—is when a working model of
various parts of a system is developed after a
small investigation. The prototype is
developed and evaluated by the end user,
but this is not used in the final solution and
is…..thrown away.
RAD is a software development method
that aims to create a quick solution
(usually within 6 months). Business owners play an active part in the cycle giving
constant feedback on prototypes,
working to create the final system
Unit 1
Describe the contents of the
Requirements Specification
Unit 1
Describe the contents of the
System Specification
Unit 1
Describe the contents of the
Design Specification
Unit 1
Identify the roles and
responsibilities of a project team
Unit 1
Unit 1
Describe Critical Path Analysis
and how it is used
Describe the four main features
of a gantt chart and how it is
used
Unit 1
Unit 1
Identify the four main tools/
techniques used for data
modelling
Unit 2
Explain how a users perception
can be taken into account when
designing an Interface
Explain the importance of a test
plan and testing of a system
Unit 2
Describe mental model and how
it can be applied to a user
Interface
This is developed by the systems designer

Purpose of the system

Inputs and outputs of a system,
including the Interface

The hardware to be used

Programming language to be used
This is developed by systems analyst

Should clearly define what the system
should do

What the purpose of the system is

Proposed timescale of the project

End user constraints including budget
and time
Describes the facilities and outputs the new
system should provide
Project Manager
Systems Analyst
Systems Designer
Programmer
Tester
A gantt chart is used for project planning and
is a diagram that shows tasks as blocks of
time.
Four main features are...

Milestones

Resources

Status

Dependencies
Operation Requirements (w hat the
system should carry out)
Information Requirements (w hat information the system provides to end user)
Volume Requirements (how m uch
processing to be handled)
A CPA diagram is a tool used for project
planning.
CPA is the process of identifying how the
tasks within a project fit together so all are in
logical order and w ith minimum delay
Test Plan is a formal document that lists and
structures all tests to be carried out.
Testing is important
Make sure the system meets the design spec
Make sure the system returns correct results and
actually works
Give confidence to end users if system passes
tests successfully
If a user has a mental model of the computer
and knowledge of how it works then they can
use it more effectively.
The design of a user interface must take into
account the perception of the majority of
users
Entity Relationship Diagram (ERD)
State Transition Diagram (STD)
Data Flow Diagram (DFD)
Flowchart
Common perceptions built into the Interface
such as
“green for go or good and red for stop or
wrong”.
Sound is also important, where perceptions
of a sad sound associate (incorrect) or positive sound as (correct)
Unit 2
Unit 2
Identify three different types of
processing
Unit 2
What is an OS and what does it
manage
Unit 2
What factors must be
considered when designing a
Human Computer Interface
Describe the user interface
design tool known as the Model
Human Processor (MHP)
Unit 3
Unit 3
Describe the facilities of IRC
Unit 3
Compare the different types of
broadband connection ADSL and
Leased Line stating where they
are best used.
Unit 3
Identify and explain all of the
components used in a cellular
phone network
List the actions that take place
when a mobile phone calls a
land line phone
Unit 3
Identify how satellites can be
used in communication systems
Designing Computer Based Systems
A program that controls the entire operation
of the computer system
Responsible for allocating memory, processor
time and use of peripheral devices
MHP attempts to portray the user of a
computer system as a computer with
memory areas and processors
ADSL—Uses existing copper telephone lines
to provide broadband Internet. Mainly used
in homes.
Leased Line— Exists only between two locations. Guaranteed bandwidth. Used by large
businesses and organisations
1. Caller dials landline number
2. Request sent to BST for the cell the
mobile is connected too.
3. Request passed to MSC
4. MSC checks the callers status (ie
enough credit)
5. MSC connects the call to the PSTN
Batch Processing (processes batches of
data when the system is not busy at night
e.g. payroll wages)
Interactive Processing (each transaction processed one at a time e.g ticket booking website)
Real-time Processing (Data processed
as soon as received e.g Air Traffic Control)
Colour
Layout
Quantity of information
Font size
Complexity of language
Types of controls
IRC (Internet Relay Chat) also known as
messaging software

Two or more people can communicate
using text

Keep a log of the conversation

Sending files in a conversation

Use of emoticons
MS—Mobile Stations
BST—Base Station Transceiver
MSC—Mobile Switching Centre
BSC– Base Station Controller
PSTN— Public Switched Telephone
Network
Global Positioning (GPS)
Weather
Data Transfer
Satellite Television
Unit 3
Describe the characteristics of a
LAN
Unit 3
Describe the characteristics of a
Virtual Network
Unit 3
Unit 3
Describe the characteristics of a
WAN
Unit 3
Describe the characteristics of
an Intranet
Unit 3
Identify the 6 different types of
server on a network
Unit 3
Describe the advantages of
setting up a Client-Server
network
Unit 3
Describe the term Bandwidth
What is an Extranet?
Unit 3
Describe the advantages of
setting up a peer to peer
network
Unit 3
Why is it important to have high
bandwidth
WAN (computers are not close
together, external communications
line needed such as telephone line,
router to connect)
LAN (computers are within a local geographic area, computers have
network cards, share devices, software and data)
Provides services for one organisation that
are secure and internal where employees
with have a username and password to access. Internal email, internal web pages, chat
and file transfer)
Virtual Network (allows computers to
communicate within a LAN who do
not know that they are part of a
larger network)
Mail server
Print Server
Proxy Server
Print Server
Backup Server
Application Server
When an employee connects to a companies
Intranet externally either from home or on
the move. Must enter User name and Pwd.
There is no reliance on a single server
Backups managed centrally
Data available from any computer
Peer to peer network easy to set up
Security and antivirus is managed centrally
Each computer works independently
Application software is managed and deployed to clients so it does not have to be
installed on each machine
Generally setup in a small business or home
Bandwidth measures how much data can
be transferred along the communications
channel.
A higher bandwidth means that more data
can flow per second and has a positive impact on data transfer.
Networks
Unit 3
Unit 3
Describe the characteristics of a
Switch
Identify the device used to
extend the range of cables
Unit 3
Unit 3
What hardware component
needs to be installed to connect
a stand alone computer to a
network?
Describe the characteristics of a
Hub
Unit 3
Unit 3
Describe the characteristics of a
WAP
Describe the characteristics of a
Router
Unit 3
Unit 3
State the function of a bridge
What is a MAC address?
Unit 3
Unit 3
Describe two applications of
Bluetooth
Identify three Optical communication
methods
Networks
Repeater (Can sit betw een tw o
segments of cable. Used over distances longer than 100m)
A device that connects more than one
computer to create a LAN. Examines data
packets to send to correct ports.
Switches can be configured to manage data
packets giving priority
Network Interface Card (NIC)
Or
Wireless Network Interface Card (WNIC)
A device that connects more than one
computer to create a LAN (Least Intelligent).
Does not examine data packets but will
broadcast to every port. Devices have to filter
data packets intended for it.
Connects more than one computer to create
a LAN (Most Intelligent).
Mainly used to connect a LAN with a
WAN.
Examines data packets, stores IP addresses
of devices to ensure sending down most
efficient route
Wireless Access Point (WAP)
Connects to a network and broadcasts a
wireless signal.
Enables wireless devices such as laptops,
PDA and mobile phones to connect.
A unique address found on...
Network Interface Cards and
Wireless Network Interface Cards
(e.g. 00:1D:D8:B7:1C:00 )
A bridge is used to connect two LAN’s
together. (Is software based and a PC
can act as a bridge)
Bluetooth headset working with mobile phone
Transferring files between two mobiles
Connecting a mobile phone to laptop
Laser
Infrared
Fibre Optic
Networks
Unit 4
Unit 4
Describe the use of ICT in
the Banking sector
How is ICT used within weather
forecasting
Unit 4
Unit 4
What are the Advantages of
Computer Based Training to the
trainee?
Unit 4
What are the Advantages of
Computer Based Training to the
tutor?
Unit 4
Identify three methods of
distributing databases
Explain the security issues of
distributed databases
Unit 4
Unit 4
What are the components of an
Expert System
Describe and give examples of
where an Expert System might
be used
Unit 4
Unit 4
How can an MIS help managers
and assist in decision making?
Identify the range of services
offered by digital
television networks
Apps of ICT
Credit/Debit Card
Cheques (MICR)
ATM Machines
(withdrawing cash, mini statement,
balance, changing PIN,
deposit cheque)
Measuring and recording data
(temperature, wind speed etc)

Modelling a forecast

Producing a forecast

Does not need to plan materials, saves
time
Work can be marked electronically
Easily identify common areas of
weakness in topics
Multimedia methods such as images, animations, sounds and videos
Interactive quizzes
Monitor own progress
Can receive feedback on progress
Work at own pace
Interception of Data (due to data being
moved around)
Partitioned Database
Replicated Database
Physical Access to data
Centralised Database with Indexes
Consistency and Integrity of data
Knowledge Base
Medical Diagnosis
Mobile phone fault diagnosis
Printer trouble shooting






Inference Engine
User Interface
Pay per view
Voting
Game show participation
Choose camera angles
Feedback comments to TV
Interactive recording/live pause
Identify trends in sales for different products
(e.g sales of ice cream in summer)
Monitor budgets and actual expenditure
Monitoring labour input and contribution to
the organisation.
Apps of ICT
Unit 4
Describe the Internal Resources
of a System
Unit 5
What are the advantages of
custom written software
Unit 5
Identify the Four methods for
installing a new computer based
system
Unit 5
What factors will influence the
decisions about upgrading and
installing new hardware and
software
Unit 6
Explain why consultation,
participation and communication
is needed when managing
change
Unit 4
Describe three characteristics of
a Finance system
Unit 4
Describe three characteristics of
a Stock control system
Unit 5
Identify and describe the three
different types of maintenance
Unit 6
Identify the factors that must be
considered when managing
change
Unit 6
Explain the advantages of being
a member of a professional
body such as the BCS
Stores data about a companies finances.
Placing orders for products
Reports showing profit and loss
Setting budgets for company
Monitoring orders
Forecasting for future cash
Main purpose is to ensure stock levels are
maintained
Minimum stock levels to maintain
Re-order amounts for each product
Have current up to date info for each product
Planned deliveries of replacement stock
Location of stock, where it can be found
Human (the people that use and m aintain the system)
Technological (consists of the equipment for the system i.e. computers, printers)
Accommodation (these are the buildings , offices and property)
Also known as Bespoke software

Will fill the purpose and meet all of the
clients requirements

The end user owns the system and can
sell it on to recoup costs

Likely to only require limited memory
in hardware to run as program small
Corrective (corrects bugs or errors
in the system)
Adaptive (updates the softw are
with new features as a clients requirements may change)
Perfective (enhances a w orking system, better layout and interface)
Parallel
Phased
Pilot
Direct
Staff Capability
Staff Views
Systems and software
Equipment
Accommodation
Expertise of staff (do they have the skills
or will they need to be retrained?)
Costs (is it affordable?)
Benefits of the change (is it worth it?)
Current systems (what's wrong with
existing system?)
Recognition of experience in IT industry
Opportunities for training and career
development
Discuss issues on forums with other
members
Keep up to date with latest technology
Consultation— Consult staff via meetings and
letter to inform them
Communication—Must explain the need for
change and how it affects the workers
Participation—Staff to be involved with the
change to help it go through
Unit 6
Describe the term
authentication and identify three
methods of this.
Unit 6
Why is it important for
organisations to keep data
confidential
Unit 5
Describe the Phased method of
Installation
Unit 6
Describe the term encryption
Unit 5
Describe the Direct method of
Installation
Encryption is where data is scrambled and
locked using an encryption key. If the data
packet is intercepted it cannot be read. It
must be unscrambled using the decryption
key.
Reviews of a system should be scheduled to
occur on a regular basis using a
review strategy.
Reviews allow users to report any
problems
Ensure that the system does not become out
of date
Authentication is used to prove a person is
who they say they are.
Password/PIN
Finger Print
Retina Scan
Voice Recognition
To comply with the data protection act
Keeping data that is commercially
sensitive from competitors
Used within larger systems when the
software can be separated into smaller
subsystems. Each subsystem is installed
one at a time, if there are any problems
it is small enough to correct.