Presentation is loading. Please wait.

Presentation is loading. Please wait.

Www.bzupages.com Introduction Presented By: KHURRAM SHAHZAD Presented To: Sir Ahmad Tasman Pasha Roll #: 07-32.

Similar presentations


Presentation on theme: "Www.bzupages.com Introduction Presented By: KHURRAM SHAHZAD Presented To: Sir Ahmad Tasman Pasha Roll #: 07-32."— Presentation transcript:

1 www.bzupages.com Introduction Presented By: KHURRAM SHAHZAD Presented To: Sir Ahmad Tasman Pasha Roll #: 07-32

2 www.bzupages.com CH#15 System Design

3 www.bzupages.com Contents Determining the Storage Requirements Developing Procedures For Using The System

4 www.bzupages.com Determining the Storage Requirements

5 www.bzupages.com Determining the Storage Requirements Access and Organization of Data Storage Volume of Data Media

6 www.bzupages.com 1-Accessing of Data Understanding the User Requirements Sequentially Access Directly Access Both

7 www.bzupages.com Example of Sequentially Access

8 www.bzupages.com Example of Directly Access

9 www.bzupages.com Example of Both

10 www.bzupages.com Organization of Data Select the appropriate data organizing method File oriented Method Sequential and Index structure Direct structure Database Processing Method Indexes Primary and Secondary keys

11 www.bzupages.com 2-Storage Volume Analyze the storage needs Design the storage mechanism Avoid the extra spaces Disk-Fragmentation

12 www.bzupages.com 3-Appropriate Storage Media Disk Hard-Disk Tapes Optical Disk

13 www.bzupages.com Developing Procedures For Using The System

14 www.bzupages.com Developing Procedures For Using The System Work Procedures Control Procedures Security Control Accuracy Control Privacy Control

15 www.bzupages.com 1-Work Procedures Analyze the daily performed work These can be represented by: Data Flow Diagrams System Flow Charts

16 www.bzupages.com 2-Control Procedures 2.1-Security Control: Provide Security from unauthorized users Security Control Methods Password Protection Security Policies (Firewall) IDS (Intrusion Detection System)

17 www.bzupages.com 2.2-Accuracy Control Provide accuracy of data Accuracy Control Methods Batch Processing Sequence Check Real Time Processing Audits Audit Trails

18 www.bzupages.com 2.3-Privacy Control Provides protection of people’s rights Enforced by government Applied when information is transferred Enforce on both public and private sectors


Download ppt "Www.bzupages.com Introduction Presented By: KHURRAM SHAHZAD Presented To: Sir Ahmad Tasman Pasha Roll #: 07-32."

Similar presentations


Ads by Google