Chapter 16 Quality Assurance Through Software Engineering

Slides:



Advertisements
Similar presentations
Numbers Treasure Hunt Following each question, click on the answer. If correct, the next page will load with a graphic first – these can be used to check.
Advertisements

Requirements Engineering Processes – 2
Zhongxing Telecom Pakistan (Pvt.) Ltd
1
© 2005 by Prentice Hall Chapter 13 Finalizing Design Specifications Modern Systems Analysis and Design Fourth Edition Jeffrey A. Hoffer Joey F. George.
Chapter 7 System Models.
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
1 Copyright © 2013 Elsevier Inc. All rights reserved. Chapter 4 Computing Platforms.
Processes and Operating Systems
Slide 1 FastFacts Feature Presentation August 28, 2008 We are using audio during this session, so please dial in to our conference line… Phone number:
1 RA I Sub-Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Casablanca, Morocco, 20 – 22 December 2005 Status of observing programmes in RA I.
Local Customization Chapter 2. Local Customization 2-2 Objectives Customization Considerations Types of Data Elements Location for Locally Defined Data.
Process a Customer Chapter 2. Process a Customer 2-2 Objectives Understand what defines a Customer Learn how to check for an existing Customer Learn how.
Custom Statutory Programs Chapter 3. Customary Statutory Programs and Titles 3-2 Objectives Add Local Statutory Programs Create Customer Application For.
1 Advanced Tools for Account Searches and Portfolios Dawn Gamache Cindy Bylander.
1 Click here to End Presentation Software: Installation and Updates Internet Download CD release NACIS Updates.
The 5S numbers game..
Chapter 20 Quality Assurance Through Software Engineering
Photo Slideshow Instructions (delete before presenting or this page will show when slideshow loops) 1.Set PowerPoint to work in Outline. View/Normal click.
Week 2 The Object-Oriented Approach to Requirements
1 Daily ATM/Debit Maintenance through CU*BASE A Preview of ATM and Debit Card Maintenance Screens Prepared June 24, 2009.
Break Time Remaining 10:00.
Turing Machines.
Effectively applying ISO9001:2000 clauses 6 and 7.
Table 12.1: Cash Flows to a Cash and Carry Trading Strategy.
Red Tag Date 13/12/11 5S.
© Telcordia Technologies 2004 – All Rights Reserved AETG Web Service Advanced Features AETG is a service mark of Telcordia Technologies. Telcordia Technologies.
PP Test Review Sections 6-1 to 6-6
EIS Bridge Tool and Staging Tables September 1, 2009 Instructor: Way Poteat Slide: 1.
Legacy Systems Older software systems that remain vital to an organisation.
Exarte Bezoek aan de Mediacampus Bachelor in de grafische en digitale media April 2014.
Copyright © 2012, Elsevier Inc. All rights Reserved. 1 Chapter 7 Modeling Structure with Blocks.
1 RA III - Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Buenos Aires, Argentina, 25 – 27 October 2006 Status of observing programmes in RA.
1 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt Synthetic.
Systems Development and Documentation Techniques
1 hi at no doifpi me be go we of at be do go hi if me no of pi we Inorder Traversal Inorder traversal. n Visit the left subtree. n Visit the node. n Visit.
Chapter 10: The Traditional Approach to Design
Systems Analysis and Design in a Changing World, Fifth Edition
Types of selection structures
McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 12 View Design and Integration.
Essential Cell Biology
1 Phase III: Planning Action Developing Improvement Plans.
Chapter 15 System Implementation
PSSA Preparation.
Chapter 11 Describing Process Specifications and Structured Decisions
Immunobiology: The Immune System in Health & Disease Sixth Edition
Chapter 13 Web Page Design Studio
 2003 Prentice Hall, Inc. All rights reserved. 1 Chapter 13 - Exception Handling Outline 13.1 Introduction 13.2 Exception-Handling Overview 13.3 Other.
Physics for Scientists & Engineers, 3rd Edition
14-1 © Prentice Hall, 2004 Chapter 14: OOSAD Implementation and Operation (Adapted) Object-Oriented Systems Analysis and Design Joey F. George, Dinesh.
14-1 © Prentice Hall, 2004 Chapter 14: OOSAD Implementation and Operation Object-Oriented Systems Analysis and Design Joey F. George, Dinesh Batra, Joseph.
Energy Generation in Mitochondria and Chlorplasts
Quality Assurance Through Software Engineering Systems Analysis and Design, 7e Kendall & Kendall 16 © 2008 Pearson Prentice Hall.
Quality Assurance Through Software Engineering
Chapter 11 Trisha Cummings. Structure Charts The recommended tool for designing a modular, top- down system is a structure chart. A structure chart is.
1 Software Design Introduction  The chapter will address the following questions:  How do you factor a program into manageable program modules that can.
What is Software Design?  Introduction  Software design consists of two components, modular design and packaging.  Modular design is the decomposition.
Chapter 1 Assuming the Role of the Systems Analyst
Chapter 9 Describing Process Specifications and Structured Decisions
Quality Assurance Through Software Engineering
Systems Analysis and Design
Chapter 16 Quality Assurance Through Software Engineering Systems Analysis and Design Kendall & Kendall Sixth Edition.
Chapter 1 Assuming the Role of the Systems Analyst Systems Analysis and Design Kendall & Kendall Sixth Edition.
Chapter 16 Quality Assurance Through Software Engineering Systems Analysis and Design Kendall & Kendall Sixth Edition.
TESTING THE NEW SYSTEM Various Approaches to Testing.
BÁO CÁO THUYẾT TRÌNH MÔN: PHÂN TÍCH VÀ THI Ế T K Ế H Ệ TH Ố NG Đ Ề TÀI: Đ Ả M B Ả O CH Ấ T L Ư Ợ NG QUA CÔNG NGH Ệ PH Ầ N M Ề M QUALITY ASSURANCE THROUGH.
QUALITY ASSURANCE THROUGH SOFTWARE ENGINEERING
Quality Assurance Through Software Engineering
Quality Assurance Through Software Engineering
Presentation transcript:

Chapter 16 Quality Assurance Through Software Engineering Systems Analysis and Design Kendall & Kendall Sixth Edition

© 2005 Pearson Prentice Hall Major Topics Six Sigma Quality assurance Walkthroughs Structure charts Modules Data and control passing Documentation Testing Kendall & Kendall © 2005 Pearson Prentice Hall

© 2005 Pearson Prentice Hall Quality Assurance Three quality assurance approaches through software engineering have been developed to evaluate the quality of the information system's design and analysis Kendall & Kendall © 2005 Pearson Prentice Hall

Guidelines for Quality Software Quality assurance approaches are: Securing total quality assurance through designing systems and software with a top-down and modular approach. Documenting software with appropriate tools. Testing, maintaining, and auditing software. Kendall & Kendall © 2005 Pearson Prentice Hall

© 2005 Pearson Prentice Hall Six Sigma Six Sigma is a culture built on quality. Six Sigma uses a top-down approach. Project leader is called a Black Belt. Project members are called Green Belts. Master Black Belts have worked on many projects. There are seven steps in Six Sigma. Kendall & Kendall © 2005 Pearson Prentice Hall

© 2005 Pearson Prentice Hall Steps of Six Sigma Kendall & Kendall © 2005 Pearson Prentice Hall

Total Quality Management Total quality management (TQM) is a conception of quality as an evolutionary process toward perfection instead of conceiving quality as controlling the number of defective products produced. The full organizational support of management and early commitment to quality from the analyst and from the business are necessary. Kendall & Kendall © 2005 Pearson Prentice Hall

Structured Walkthroughs One of the strongest quality assurance actions is structured walkthroughs. Walkthroughs use peer reviewers to monitor the system's programming and overall development. They point out problems, and allow the programmer or analyst to make suitable changes. Kendall & Kendall © 2005 Pearson Prentice Hall

Personal Involved in Structured Walkthroughs Structured walkthroughs involve at least four people: The person responsible for the part of the system being reviewed. A walkthrough coordinator. A programmer or analyst peer. A person to take notes about suggestions. Kendall & Kendall © 2005 Pearson Prentice Hall

Top-Down and Bottom-Up Approaches The bottom-up approach and the top-down approach are available for quality system design. Kendall & Kendall © 2005 Pearson Prentice Hall

The Bottom-Up Approach The bottom-up design refers to: Identifying the processes that need computerization as they arise. Analyzing them as systems. Either coding them or purchasing COTS (commercial off-the-shelf) software to meet the immediate problem. Kendall & Kendall © 2005 Pearson Prentice Hall

Disadvantages of a Bottom-up Approach The disadvantages of a bottom-up approach to design are: There is a duplication of effort in purchasing software, and entering data. Much worthless data are entered into the system. Overall organizational objectives are not considered and therefore cannot be met. Kendall & Kendall © 2005 Pearson Prentice Hall

© 2005 Pearson Prentice Hall The Top-Down Approach Top-down design allows the systems analyst to ascertain overall organizational objectives along with ascertaining how they are best met in an overall system. The system is divided into subsystems and their requirements. Kendall & Kendall © 2005 Pearson Prentice Hall

Using the Top-Down Approach Kendall & Kendall © 2005 Pearson Prentice Hall

Advantages of the Top-down Approach The advantages of a top-down approach to design are: Avoiding the chaos of attempting to design a system “all at once”. The ability to have separate systems analysis teams working in parallel on different but necessary subsystems. Losing sight of system goals as a result of getting so mired in detail. Kendall & Kendall © 2005 Pearson Prentice Hall

Disadvantages of the Top-down Approach The three disadvantages of a top-down approach are: There is a danger that the system will be divided into the wrong subsystems. Once subsystem divisions are made, their interfaces may be neglected or ignored. The subsystems must be reintegrated, eventually. Kendall & Kendall © 2005 Pearson Prentice Hall

Modular Programming and the Top-Down Approach The modular programming concept is useful for a top-down approach. Once the top-down design approach is taken, the whole system is broken into logical, manageable portions or modules. They should be functionally cohesive, accomplishing only one function. Kendall & Kendall © 2005 Pearson Prentice Hall

Advantages of Modular Programming Advantages of modular programming are: Modules are easier to write and debug. Tracing an error in a module is less complicated. A problem in one module should not cause problems in others. Modules are easier to maintain. Modules are easier to grasp because they are self-contained subsystems. Kendall & Kendall © 2005 Pearson Prentice Hall

Guidelines for Modular Programming Four guidelines for correct modular programming are: Keep each module to a manageable size. Pay particular attention to the critical interfaces. Minimize the number of modules the user needs to modify when making changes. Maintain the hierarchical relationships set up in the top-down phases. Kendall & Kendall © 2005 Pearson Prentice Hall

Linking Programs in Microsoft Windows There are two systems to link programs in Microsoft Windows: Dynamic Data Exchange (DDE) updates data in one program based on data in another program. Object Linking and Embedding (OLE) where an object in a second program retains the properties of an object in the first program. Kendall & Kendall © 2005 Pearson Prentice Hall

© 2005 Pearson Prentice Hall Structure Charts The recommended tool for designing a modular, top-down system is a structure chart. They help systems analysts by providing a picture of modules and the relationships among those modules. Consists of rectangular boxes that represents the modules Connecting lines or arrows Kendall & Kendall © 2005 Pearson Prentice Hall

Data and Control Passing Data and control passed between structure chart modules is either a: Data couple, passing only data, shown as an arrow with an empty circle. Control couple, passing switches or flags, shown as an arrow with a filled-in circle. Switches, which have only two values. Flags, that have more than two values. Kendall & Kendall © 2005 Pearson Prentice Hall

Structure Chart and Coupling Kendall & Kendall © 2005 Pearson Prentice Hall

© 2005 Pearson Prentice Hall Control Coupling Control flags should be passed up the structure chart. Control modules make the decisions about which lower-level modules should be executed. Lower-level modules are functional, performing only one task. Kendall & Kendall © 2005 Pearson Prentice Hall

© 2005 Pearson Prentice Hall Minimal Coupling Systems analysts should keep the number of couples to a minimum. The fewer data couples and control flags one has in the system, the easier it is to change the system. Kendall & Kendall © 2005 Pearson Prentice Hall

Data and Control Passing Data and control passed between structure chart modules is either: Data coupling, only the data required by the module are passed, or Stamp coupling, more data than necessary are passed between the modules Control coupling Kendall & Kendall © 2005 Pearson Prentice Hall

Creating Reusable Modules Kendall & Kendall © 2005 Pearson Prentice Hall

Data Flow Diagrams and Structure Charts A data flow diagram may be used to create a structure chart in the following two ways: Indicating the sequence of the modules. Indicating modules subordinate to a higher module. Kendall & Kendall © 2005 Pearson Prentice Hall

© 2005 Pearson Prentice Hall Types of Modules Modules fall into three classes: Control modules, determining the overall program logic. Transformational modules, changing input into output. Functional modules, performing detailed work. Kendall & Kendall © 2005 Pearson Prentice Hall

Improper Subordination A subordinate module is one found lower on the structure chart, called by another higher module. Allowing a lower-level module to perform any function of the calling, higher-level module, is called improper subordination. Kendall & Kendall © 2005 Pearson Prentice Hall

© 2005 Pearson Prentice Hall System Documentation One of the requirements for total quality assurance is preparation of an effective set of system documentation. This serves as: A guideline for users. A communication tool. A maintenance reference as well as development reference. Kendall & Kendall © 2005 Pearson Prentice Hall

Forms of System Documentation Documentation can be one of the following: Pseudocode. Procedure manuals. The FOLKLORE method. Kendall & Kendall © 2005 Pearson Prentice Hall

© 2005 Pearson Prentice Hall Pseudocode Pseudocode is an English-like code to represent the outline or logic of a program. It is not a particular type of programming code, but it can be used as an intermediate step for developing program code. Kendall & Kendall © 2005 Pearson Prentice Hall

© 2005 Pearson Prentice Hall Procedure Manuals Common English-language documentation Contain Background comments Steps required to accomplish different transactions Instructions on how to recover from problems Online help may be available “Read Me” files included with COTS software Kendall & Kendall © 2005 Pearson Prentice Hall

Procedure Manuals (Continued) The biggest complaints with procedure manuals are that: They are poorly organized. It is difficult to find needed information. The specific case in question does not appear in the manual. The manual is not written in plain English. Kendall & Kendall © 2005 Pearson Prentice Hall

© 2005 Pearson Prentice Hall Web Documentation A Web site can help maintain and document the system by providing: FAQ (Frequently Asked Questions). Help desks. Technical support. Fax-back services. Kendall & Kendall © 2005 Pearson Prentice Hall

FOLKLORE Documentation The FOLKLORE documentation method collects information in the categories of: Customs. Tales. Sayings. Art forms. Kendall & Kendall © 2005 Pearson Prentice Hall

FOLKLORE Documentation Kendall & Kendall © 2005 Pearson Prentice Hall

Choosing a Documentation Technique Guidelines for choosing a documentation technique: Is it compatible with existing documentation? Is it understood by others in the organization? Does it allow you to return to working on the system after you have been away from it for a period of time? Kendall & Kendall © 2005 Pearson Prentice Hall

Choosing a Documentation Technique Guidelines for choosing a documentation technique (continued): Is it suitable for the size of the system you are working on? Does it allow for a structured design approach if it is considered to be more important than other factors? Does it allow for easy modification? Kendall & Kendall © 2005 Pearson Prentice Hall

© 2005 Pearson Prentice Hall Testing Overview The new or modified application programs, procedural manuals, new hardware, and all system interfaces must be tested thoroughly. Kendall & Kendall © 2005 Pearson Prentice Hall

© 2005 Pearson Prentice Hall Testing Procedures The following testing process is recommended: Program testing with test data. Link testing with test data. Full system testing with test data. Full system testing with live data. Kendall & Kendall © 2005 Pearson Prentice Hall

Organizational Roles and Testing Kendall & Kendall © 2005 Pearson Prentice Hall

Program Testing with Test Data Desk check programs. Test with valid and invalid data. Check for errors and modify programs. Kendall & Kendall © 2005 Pearson Prentice Hall

Link Testing with Test Data Also called string testing See if programs can work together within a system Test for normal transactions Test with invalid data Kendall & Kendall © 2005 Pearson Prentice Hall

Full System Testing with Test Data Operators and end users test the system. Factors to consider: Is adequate documentation available? Are procedure manuals clear? Do work flows actually flow? Is output correct and do the users understand the output? Kendall & Kendall © 2005 Pearson Prentice Hall

Full System Testing with Live Data Compare the new system output with the existing system output. Only a small amount of live data are used. Kendall & Kendall © 2005 Pearson Prentice Hall

© 2005 Pearson Prentice Hall Maintenance Maintenance is performed to: Repair errors or flaws in the system. Enhance the system. Ensure feedback procedures are in place to communicate suggestions. Kendall & Kendall © 2005 Pearson Prentice Hall

© 2005 Pearson Prentice Hall Auditing There are internal and external auditors. Internal auditors study the controls used in the system to make sure that they are adequate. Internal auditors check security controls. External auditors are used when the system influences a company’s financial statements. Kendall & Kendall © 2005 Pearson Prentice Hall