35
Chapter 16 Designing Effective Output

Chapter16 and 17

  • Upload
    saurav

  • View
    341

  • Download
    1

Embed Size (px)

DESCRIPTION

Chapter 16 and 17 CPU cases

Citation preview

Page 1: Chapter16 and 17

Chapter 16

Designing Effective Output

Page 2: Chapter16 and 17

E – 2E – 2

Page 3: Chapter16 and 17

E – 2E – 2BeforeBefore

Page 4: Chapter16 and 17

E – 2E – 2AfterAfter

Page 5: Chapter16 and 17

E – 3E – 3

Page 6: Chapter16 and 17

E – 3E – 3BeforeBefore

Page 7: Chapter16 and 17

E – 3E – 3AfterAfter

Page 8: Chapter16 and 17

E – 4E – 4

Page 9: Chapter16 and 17

E – 5E – 5

Page 10: Chapter16 and 17

E – 6E – 6

Page 11: Chapter16 and 17

E – 7E – 7

Page 12: Chapter16 and 17

E – 8E – 8

Page 13: Chapter16 and 17

Program : UPDATE SOFTWARE RELATIONAL FILEInput : UPDATE SOFTWARE INSTALLATION LIST, document

UPDATE INSTALLED SOFTWARE SCREEN, displayOutput : SOFTWARE RELATIONAL FILE, disk

INSTALLED SOFTWARE TRANSACTION, disk

E – 9E – 9

Update Software Relational File

Update Software Relational File

Update Software Installation List

Update Software Installation List

Update Installed Software Screen

Update Installed Software Screen

Software Relational File

Software Relational File

Installed Software

Transaction

Installed Software

Transaction

Page 14: Chapter16 and 17

Program : PRINT USER NOTIFICATION REPORT

Input : INSTALLED SOFTWARE TRANSACTION, disk

Output : USER NOTIFICATION REPORT, report

E – 9E – 9

Print User Notification Report

Print User Notification Report

User Notification Reports

User Notification ReportsInstalled Software

TransactionInstalled Software

Transaction

Page 15: Chapter16 and 17

E – 9E – 9ADD SOFTWARESCREEN

HARDWAREINQUIRYSCREEN

NEWSOFTWAREFORM

SOFTWAREINSTALLATIONLISTING

SOFTWARELOGTRANSACTIONFILE

SOFTWAREMASTER FILE

HARDWAREMASTER FILE

ADD NEWSOFTWARE

PRINT SOFTWAREINSTALLATIONLISTING

DETERMINEHARDWARELOCATIONS

INSTALLSOFTWAREUPDATED

SOFTWAREINSTALLATIONLISTING

UPDATESOFTWARERELATIONAL FILE

UPDATEINSTALLEDSOFTWARESCREEN

SOFTWARERELATIONALFILE

INSTALLEDSOFTWARETRANSACTION

USERNOTIFICATIONREPORT

PRINT USERNOTIFICATIONREPORTBeforeBefore AfterAfter

Page 16: Chapter16 and 17

E – 10E – 10

Page 17: Chapter16 and 17

Inventory number : Not entered, not numeric, already on fileDate purchased : Invalid date (month = 14, etc.)Network Connection : Anything other than C, D, F, M, 1, 2, 3, 0CD ROM : Anything other than 0, 2, 4, 6, 8, 10, 12, 16, 20, B, D, V

Monitor, Printer, Internet, or Board Codes: try entering data into the field that is not on the list

E – 11E – 11

Page 18: Chapter16 and 17

E – 12E – 12

Page 19: Chapter16 and 17

E – 12E – 12

Page 20: Chapter16 and 17

E – 12E – 12

Page 21: Chapter16 and 17

E – 12E – 12

Page 22: Chapter16 and 17

E – 12E – 12

Page 23: Chapter16 and 17

E – 12E – 12

Page 24: Chapter16 and 17

Design test data and predicted results for the ADD TRAINING CLASS program. Use Microsoft Access to test the display and note whether the results conformed to your predictions.

Title : Must be enteredCourse Description : Must be enteredClass length : Not entered, not numeric, greater than 20Operating System: Must be entered that is on the list

E – 13E – 13

Page 25: Chapter16 and 17

Design test data on paper to test the CHANGE SOFTWARE EXPERT

program. Use Microsoft Access to test the display. Note any

discrepancies

Last name : Must be entered

First Name : Must be entered

Phone : Not entered, not numeric

Room : Must be entered

Title : Must be entered

Version : Must be entered

Expert Teach Course : Must be Yes or No

Operating System : Must be entered data on the list

E – 14E – 14

Page 26: Chapter16 and 17

Chapter 17

Successfully Implementing The Information System

Page 27: Chapter16 and 17

E – 1E – 1

Page 28: Chapter16 and 17

A network is a collection of data communication hardware, computers, data communication software and data communication media, all connected in a meaningful way to allow users to share information, resources and equipment. A star network is a network where each machine is connected to a central machine, called a server. The server holds all the software, and the other machines, called nodes, request the software from it.

Since the server receives all the requests, it can handle them one by one, and there are no data crashes.

E – 1E – 1

Page 29: Chapter16 and 17

E – 1E – 1

Advantages

• Easy to install and wire

• No disruptions to the network

when connecting or removing

devices

• Easy to detect faults and to

remove parts

Disadvantages

• Requires more cable length

than a linear topology

• If the hub or concentrator fails,

nodes attached are disabled

• More expensive than linear

bus topologies because of the

cost of the hubs, etc. 

Page 30: Chapter16 and 17

Backup will be performed on two levels1.All transactions entering the system from on-line screens will be placed on log (or journal) transaction files. These are located on a smaller, second hard disk within the server computer. If there is a head crash or other problem on the main hard disk, the backup files would still exist. The format of the log files is

E – 2E – 2

Date Time Computer ID

User ID Backup Type

Result

2010/04/01 12:00 AM Dot-PC DMatrix Full Completed

2010/04/01 12:00 PM Dot-PC DMatrix Incremental Completed

2010/04/02 12:00 AM Dot-PC DMatrix Incremental Completed

2010/04/02 12:00 PM Dot-PC DMatrix Incremental Failed

2010/04/03 12:00 AM Dot-PC DMatrix Full Completed

2010/04/03 12:00 PM Dot-PC DMatrix Incremental Completed

Page 31: Chapter16 and 17

E – 2E – 2

2. All database files are copied to media every night. These are removed to one of the other campus locations and stored in a vault.

Advantages:1. Backup of all major files.2. Faster backup since major files do not have to be backed up before each

update.3. Continual backup using the log files.

Disadvantages:• Programs must be written to restore database records in a batch mode

from the log files.• Streamer tape units may be initially expensive.

Page 32: Chapter16 and 17

E – 3E – 3

List security measures that should be taken to prevent unauthorized

persons from using the computer system

•Unique username and password for all users

•Password must be at least 8 characters long and must include at least one

number, one uppercase letter, and one special character (ex: finAlf4nt4$y)

•Password will expired every 60 days and will need to be changed

(notification 12 days before expiration date)

•Username should be locked after 3 failed attempts

•System users audit every 3 months to check for valid users of the system

and removed users who no longer have access privilege

Page 33: Chapter16 and 17

E – 4E – 4• Team Leader / Decision Maker: Dot Matrix

o Will determine the condition and stability of campus resourceso Make High Level Decisions with management teamo Will Initiate Communications to her team

• Team: o Hy Perteks – Director Information Center –

Data Backups Manage Data Recovery Process Routing of Network Resources if needed

o Mike Rowe – Maintenance Expert - Physical Condition of PC’s Check Condition of PC’s Physical relocation of PCs if needed.

o Cher Ware – Software Manager - Software Configuration Ensure duplication of critical systems at new location if needed. Ensure that any manual software changes are made (need to

change servers) Assist Mike Rowes team as needed.

Page 34: Chapter16 and 17

E – 4E – 4

Other Recommendations:• Remote Emergency Location – Satellite Campus • Off Site replication should be mirrored at one of the satellite

campuses.o Already owned Spaceo There should be little effort in backing up data here since

they are already on the network.• Test Disaster Recovery Twice a year.

Page 35: Chapter16 and 17

Question: Explain in a paragraph why a phased conversion

would be used to install the computer system

E – 5E – 5

Answer : A phased conversion is the best method since the

system has several major subsystems. Hardware

records and programs must be installed first

because software records reference them. The

phased conversion provides data entry personnel

time to update records with additional data

elements not stored in the old system