...CHAPTER 20 SYSTEMS DESIGN, IMPLEMENTATION AND OPERATION In chapter 18 we focused on the first phase of the Systems Development Life Cycle – Systems Analysis. Chapter 20 deals with the remaining four phases: - conceptual systems design - physical systems design - systems implementation and conversion - operation and maintenance CONCEPTUAL SYSTEMS DESIGN In the conceptual systems design phase, the developer creates a general framework for implementing user requirements and solving problems identified in the analysis phase. As shown in Figure 20-1 on page 747 HC (page 637 SC), there are three main steps in conceptual design: 1. evaluating design alternatives, 2. preparing design specifications, and 3. preparing the conceptual systems design report. [pic] Evaluate Design Alternatives There are many ways to design an AIS, so accountants and others involved in systems design must continually make design decisions. [pic] The design team should identify a variety of design alternatives and evaluate each with respect to the following standards: 1) how well it meets organizational and system objectives, 2) how well it meets user needs, 3) whether it is economically feasible, and 4) what its advantages and disadvantages are. The steering committee evaluates the alternatives. Table 20-1 on page 748 HC (page 638 SC) presents examples of conceptual and physical design considerations and their corresponding...
Words: 3220 - Pages: 13
...just a symbol manipulation system such of that as a strong AI. Ultimately the strong AI would then be incapable of being able to help understand machines and the aspect of thinking. Furthermore, the definition of “machine” needs to be reiterated in a simpler term to help explain this issue....
Words: 1229 - Pages: 5
...8Data Flow Diagrams Symbols There are some symbols that are used in the drawing of business process diagrams (data flow diagrams). These are now explained, together with the rules that apply to them. Flow diagrams in general are usually designed using simple symbols such as a rectangle, an oval or a circle depicting a processes, data stored or an external entity, and arrows are generally used to depict the data flow from one step to another. A DFD usually comprises of four components. These four components can be represented by four simple symbols. These symbols can be explained in detail as follows: External entities (source/destination of data) are represented by squares; Processes (input-processing-output) are represented by rectangles with rounded corners; Data Flows (physical or electronic data) are referred to by arrows; and finally, Data Stores (physical or electronic like XML files) are presented by open-ended rectangles. Data flow diagrams present the logical flow of information through a system in graphical or pictorial form. Data flow diagrams have only four symbols, which makes it useful for communication between analysts and users. Data flow diagrams (DFDs) show the data used and provided by processes within a system. DFDs make use of four basic symbols. Create structured analysis, information flow, process-oriented, data-oriented, and data process diagrams as well as data flowcharts. External Entity An external entity is a source or destination of a data...
Words: 1375 - Pages: 6
...------------------------------------------------- Documentation Techniques Five documentation techniques include data flow diagrams, entity relationship diagrams, system flowcharts, program flowcharts, and record layout diagrams. Data Flow Diagrams and Entity Relationship Diagrams * Data flow diagrams – Data flow diagrams (DFD) use symbols to represent the entities, processes, data flows, and data stores that pertain to a system. * Entities – Entities in a DFD are objects that lie at the boundary of the system being modeled. They are the sources of and destinations for data and can be other interfacing systems or entities external to the organization. Entities are labeled as singular nouns on a DFD. Data stores represent the accounting files and records used in each process, and the labeled arrows represent data flows between processes, data stores, and entities. * Processes – Processes are labeled with a descriptive verb. Process objects should not be represented as nouns. The arrows connecting objects should be labeled to represent specific flows of data. Also, each data flow label should be unique. The same label should not be attached to two different flow lines in the same DFD. * Usage – Systems analysts use DFDs extensively to represent the logical elements of the system. It does not depict the physical system. * Entity relationship diagrams – An entity relationship diagram is used to represent the relationship between business entities. An entity is...
Words: 735 - Pages: 3
...“multiple-realizability” of mind in differing physical systems breaks down Physicalism, more specifically the Identity Theory. Identity theorists claim that mental states are brain states, but the multiple-realizability demonstrates the fact that the same mental states can be manifested from different physical forms. Therefore, by the very basic confronting principles, multiple-realizability contradicts Physicalism. 2. Machine functionalism states that if the mind, similar to a Turing machine, in a specific state receives an input, will produce an output by considering the original state and the input. This means that it is a probabilistic automaton, where probability will decide what the output will be based on the state and the set of inputs. Analytic functionalism states there is an a priori truth in the relationship between the input, output, and mental state; therefore, analytic functionalism tries to define mental states by contemplating on the folk psychological concepts. On the other hand, psychofunctionalism uses empirical, a posteriori observations to find true mental states...
Words: 537 - Pages: 3
...between a file-oriented system and a database system. a. A file-oriented system utilizes data in a regular OS file based format where a database system uses a database engine that organizes data in a database in a table format utilizing rows for each record. 2. What is a DBMS? Briefly describe the components of a DBMS. a. DBMS stands for Database Management System. A DBMS is a collection of tools, features, and interfaces that enables users to add, update, manage, access, and analyze the contents of a database. A DBMS is made up of a DML (data manipulation language), Schema and subschemas, Physical data repository, and an Interface to allow access to the database from DBA’s, Users, and Related Information Systems. 3. Describe a primary key, candidate key, secondary key, foreign key, and common field. a. Primary Key – a field or combination of fields that uniquely and minimally identifies an entity. Candidate Key – Any field or combination of fields that can act as the primary key but are not. Secondary Key – Any field of combination of fields that can be use to identify a entity. Foreign Key – A field that exists in an entity that is the PK of another entity. Common Field – An attribute (field) that appears in more than one entity (record). 4. What are entity-relationship diagrams and how are they used? What symbol is used to represent and entity in an ERD? What symbol is used for a relationship? What is cardinality, and what symbols do you use in the crow’s...
Words: 842 - Pages: 4
...between a file-oriented system and a database system. A file-oriented system utilizes data in a regular OS file based format where a database system uses a database engine that organizes data in a database in a table format utilizing rows for each record. 2. What is a DBMS? Briefly describe the components of a DBMS. DBMS stands for Database Management System. A DBMS is a collection of tools, features, and interfaces that enables users to add, update, manage, access, and analyze the contents of a database. A DBMS is made up of a DML (data manipulation language), Schema and subschemas, Physical data repository, and an Interface to allow access to the database from DBA’s, Users, and Related Information Systems. 3. Describe a primary key, candidate key, secondary key, foreign key, and common field. Primary Key – a field or combination of fields that uniquely and minimally identifies an entity. Candidate Key – Any field or combination of fields that can act as the primary key but are not. Secondary Key – Any field of combination of fields that can be use to identify a entity. Foreign Key – A field that exists in an entity that is the PK of another entity. Common Field – An attribute (field) that appears in more than one entity (record). 4. What are entity-relationship diagrams and how are they used? What symbol is used to represent and entity in an ERD? What symbol is used for a relationship? What is cardinality, and what symbols do you use in the...
Words: 1096 - Pages: 5
...There are three parts to this assignment relating to each lecture in Module 1. Part 1: Layering and the Internet Model Imagine that a technology organization has been in business for decades, and that the organization developed its own method of computer-to-computer communication. Because this method of communication only occurs within this organization, it is not layered, but rather is designed to operate as quickly and efficiently as possible on the custom hardware by using the least amount of overhead possible. The organization continues to create its own communication hardware and software that works with modern computers, but the CTO of the organization is considering replacing this custom communication solution with the adoption of the Internet Model in use today, along with its technologies. With this scenario in mind, address each of the topics below. Topic 1: The Advantages of a Layered Model Identify and describe the advantages that a layered solution would offer the technology organization when compared to its non-layered solution. Advantages : The advantage of implementing layered model in technology organization will be : 1. They can communicate with the other organizations and can provide the information/presence about their business on internet too. 2. By implementing layered module… changes at one layer will not affect hardware /software at the other layers. Vendors can develop hardware and software to provide the functions of...
Words: 3129 - Pages: 13
...Name: Leomar James R. Canopin Discussion Questions #9 IT 193 - Systems Analysis & Design Chapter 9: Data Design 1. Explain the main difference between a file processing system and a database system. Answer: File processing is the method by which a file-oriented system stores and managesdata.Today, file processing is less common than database systems, although in somecases, file processing is more efficient and cost-effective. Database systems provide aframework for storing data within a real-time, dynamic environment, without the risk ofdata redundancy. A database management system (DBMS) is a collection of tools,features, and interfaces that allows users to manage the contents of a database. Link: https://www.coursehero.com/file/7367193/CH9doc/?justUnlocked=1 2. What is a DBMS? Briefly describe the components of a DBMS. Answer: DBMS stands for Database Management System. A DBMS is a collection of tools,features, and interfaces that enable users to add, update, manage, access, and analyze thecontents of a database. A DBMS provides an interface between a database and the users,database administrators (DBAs), and the other information systems with which theDBMS interacts. In addition to interfaces, other DBMS components include a datamanipulation language, a schema, and a physical data repository. A data manipulationlanguage, or DML, controls the operations of the database. Link: https://www.coursehero.com/file/7367193/CH9doc/?justUnlocked=1 ...
Words: 988 - Pages: 4
...of Chinese symbols, and a guide book that maps sequences of symbols to other sequences of symbols. You receive a piece of paper with symbols on it from outside the room, the input, and, using the guidebook, the program, arrange and pass different sets of symbols out of the room. Unbeknownst to you, the symbols you pass out, the output, are carrying on a fluent Chinese conversation with a person outside of the room. Strong AI is the position that a computer running a sufficiently advanced program could generate mental states that are identical to those generated by humans, that is, the AI would be conscious in the same way we are. Contrast this with weak AI, which merely mimics human behaviour, without the corresponding mental states. Searle maintains that any system that operates in a purely syntactic manner will never be intelligent in the same manner a human is,...
Words: 835 - Pages: 4
...to the forces that influences and envelops reality. We conceptualize these omnipotent forces through our usages of symbols – to create an understandable world through abstractions – in order to explain what these forces are. Trying to find a single definition for chaos is impossible as chaos is the foundation of human knowledge and influences the creation of ideas, of thoughts and of intelligence. However, if we conceptualize reality through abstractions, are we denizens of reality or denizens of a realm of abstractions? Lewis Thomas, in his essay “Crickets, Bats, Cats & Chaos,” defines chaos as “total unpredictability and randomness” that nevertheless occurs when “when any complex, dynamic system is perturbed by a small uncertainty . . . [results in] an amplification of that disturbance and spread of unpredictable, random behavior throughout the whole system” (492). It is the apparent randomness, compilations of thoughts and sequences, which results...
Words: 909 - Pages: 4
...OSI Physical Layer Network Fundamentals – Chapter 8 ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Explain the role of physical layer protocols and services in supporting communication across data networks. Describe the role of signals used to represent bits as a frame as the frame is transported across the local media. Describe the purpose of physical layer signaling and encoding as they are used in networks. Identify the basic characteristics of copper, fiber and wireless network media. Describe common uses of copper, fiber and wireless network media. ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 2 Outline Physical layer: Communication signals –Purpose of the physical layer –Physical layer standards –Physical layer fundamental principles Physical signaling and encoding: Representing bits –Signaling bits for the media –Encoding: Grouping bits –Data-carrying capacity Physical media: Connecting communication –Types of physical media ITE PC v4.0 Chapter 1 –Media connectors © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 3 Purpose of the Physical Layer The roles of the OSI physical layer: –To encode the binary digits that represent data link layer frames into signals. –To transmit and receive these signals across the physical media. There are various types of physical media and they carry different types...
Words: 3652 - Pages: 15
...3GPP LTE Downlink System Using Joint Time-Frequency Two-Dimensional Iterative Wiener Filter Jinfeng Hou, Jian Liu School of Communication and Information Engineering University of Electronic Science and Technology of China (UESTC) Chengdu 611731, China Email: houjinfeng@gmail.com, liuj@uestc.edu.cn Abstract—The channel estimation algorithms are employed in 3GPP Long Term Evolution (LTE) downlink system to assist the coherent demodulation of Orthogonal Frequency Division Multiplexing (OFDM) symbols. Based on the comparison of several exiting different channel estimation algorithms, we propose a joint time-frequency two-dimensional iterative Wiener filter (IWF) channel estimation algorithm for 3GPP LTE downlink system. In this scheme, we first apply the linear minimum mean square error (LMMSE) algorithm based on singular value decomposition (SVD) for IWF in frequency domain, and then the values after the first filtering in frequency domain are used to achieve the second IWF in time domain. Comparing to the conventional algorithms, the channel estimation algorithm proposed by this paper brings up lower bit error rate (BER) and adds little computational complexity. I. I NTRODUCTION In December 2004, the Third Generation Partnership Program (3GPP) members started a feasibility study on the enhancement of the Universal Terrestrial Radio Access (UTRA) in the aim of continuing the long time frame competitiveness of the 3G Universal Mobile Telecommunications System (UMTS) technology...
Words: 2979 - Pages: 12
...Components of a communication system Common channel types General theme of digital communication engineering Digital comm overview.ppt 1 What is Communications? Physical separation Source of information Intended receiver Voice, text, numerical data Pictures, video Etc. Analog sources of information • Voice, video, are analog continuous time signals • No mapping of analog signal into a discrete alphabet of symbols • Eg. AM, FM etc. Digital sources of information • Text, data files etc. • Source data consists of symbols which are members of a finite discrete set. eg text • Digital source may have originated as an analog signal that was mapped into a discrete set of symbols. eg DVD Digital comm overview.ppt 2 Communications channel Physical separation Source Noise distortion Intended Receiver • Channel is always analog continuous time in nature • Regardless of whether source is analog or digital • Challenge for communications engineer is: – – – that channel resources are limited, power, bandwidth etc. Interference noise in channel Distortion effects Digital comm overview.ppt 3 What is Analog Communications then? Analog source Analog modulator FM, AM etc Communication link Receiver Analog signal demodulator Analog communications analog mapping of analog source directly into analog transmit signal No intermediate mapping into a discrete finite set of symbols Digital comm overview.ppt ...
Words: 1186 - Pages: 5
...Chapter 7 1. A process by which organizations select objectives, establish processes to achieve objectives, and monitor performance is |a. |enterprise risk management | |b. |internal control | |c. |organizational governance | |d. |risk assessment | ANS: C 2. A process, effected by an entity’s board of directors, management and other personnel, applied in strategy setting and across the enterprise, designed to identify potential events that may effect the entity, and manage risk to be within its risk appetite, to provide reasonable assurance regarding the achievement of entity objectives. |a. |enterprise risk management | |b. |internal control | |c. |organizational governance | |d. |risk assessment |...
Words: 11772 - Pages: 48