Chapter 16 Designing Effective Output. E – 2 Before H000 Produce Hardware Investment Report HI000 Produce Hardware Investment Lines H100 Read Hardware.

Slides:



Advertisements
Similar presentations
GCSE ICT Networks & Security..
Advertisements

Basic Concepts of a Computer Network
Chapter 4 Computer Networks
Information Technology Disaster Recovery Awareness Program.
CPU GROUP Chapter 7. Manage ment Management Report Inquiry Responses Management Inquiries.
A new standard in Enterprise File Backup. Contents 1.Comparison with current backup methods 2.Introducing Snapshot EFB 3.Snapshot EFB features 4.Organization.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Perimeter Church Perimeter Network Introduction 2005.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Chapter 21 Successfully Implementing The Information System
Database Management: Getting Data Together Chapter 14.
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 18-1 Accounting Information Systems 9 th Edition Marshall.
Hands-On Microsoft Windows Server 2003 Networking Chapter 7 Windows Internet Naming Service.
Auditing Auditing & Automated Systems Chapter 22 Auditing & Automated Systems Chapter 22.
PMI Inventory Tracker™
Network security policy: best practices
Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc.
Software Development Unit 2 Databases What is a database? A collection of data organised in a manner that allows access, retrieval and use of that data.
NETWORK TOPOLOGY. WHAT IS NETWORK TOPOLOGY?  Network Topology is the shape or physical layout of the network. This is how the computers and other devices.
This is the way an organisation distributes the data across its network. It uses different types of networks to communicate the information across it.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
Computer Networks.
November 2009 Network Disaster Recovery October 2014.
SQL Server 2008 Implementation and Maintenance Chapter 7: Performing Backups and Restores.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Chapter 22 Systems Design, Implementation, and Operation Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 22-1.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Chapter 5 Networks Communicating and Sharing Resources
Chapter 4: Computer Networks Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
NETWORK Topologies An Introduction.
The Three Important Topologies By: Parimal Satashia.
15 Maintaining a Web Site Section 15.1 Identify Webmastering tasks Identify Web server maintenance techniques Describe the importance of backups Section.
Data management in the field Ari Haukijärvi 2nd EHES training seminar.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Final Coverage Topic 4: INFORMATION RESOURCES and INFORMATION SYSTEMS By Dr. Faustino Reyes.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
© CCI Learning Solutions Inc. 1 Lesson 5: Basic Troubleshooting Techniques Computer performance Care of the computer Working with hardware Basic maintenance.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
California State University, Northridge Certification Process Team B Carlos Guzman John Kramer Stacey LaMotte University of Phoenix.
Chapter 11 Designing Effective Output. E – 1 E – 1 (Cont.)
Discovering Computers Fundamentals Fifth Edition Chapter 9 Database Management.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
GCSE ICT 3 rd Edition Computer networks 19 A computer network is a collection of computers linked together so that they can communicate with each other.
Three types of network cabling Star Topology Tree Topology Linear Bus.
Verification & Validation F451 AS Computing. Why check data? It’s useless if inaccurate. Also, wrong data: Can be annoying Can cost a fortune Can be dangerous.
CHAPTER 2 TYPES OF BUSINESS INFORMATION SYSTEM. INTRODUCTION Information System support business operations by processing data related to business operation.
DataFlow Diagram – Level 0
Principles of Information Systems, Sixth Edition 1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
Networking  Networking is of linking two or more computing devices together for the purpose of sharing data.
Network Topologies.
Verification & Validation
Computer Networks.  Which is the best definition of a circuit switched network?  An electric circuit where the connections get switched based on who.
( ) 1 Chapter # 8 How Data is stored DATABASE.
Successfully Implementing The Information System Systems Analysis and Design Kendall and Kendall Fifth Edition.
Principles of Information Systems Eighth Edition
UNIT 19 Data Security 2.
Chapter Ten Managing a Database.
Installation Plan Checklist
The Impact of Information Technology on the Audit Process
Systems Design, Implementation, and Operation
The Impact of Information Technology on the Audit Process
Systems Design Chapter 6.
G061 - Network Security.
Chapter 21 Successfully Implementing The Information System
Presentation transcript:

Chapter 16 Designing Effective Output

E – 2

Before H000 Produce Hardware Investment Report HI000 Produce Hardware Investment Lines H100 Read Hardware Record H120 Accumulate Hardware Totals H150 Write Page Top Line H170 Write Report Line H170 Write Report Line** H200 Print Grand Total Lines H170 Write Report Line*

E – 2 H000 Produce Hardware Investment Report HI000 Produce Hardware Investment Lines H100 Read Hardware Record H120 Accumulate Hardware Totals H130 Print Investment Line H140 Print Heading Lines H150 Write Page Top Line H170 Write Report Line H200 Print Grand Total Lines H170 Write Report Line After

E – 3

Before

E – 3 After

E – 4

E – 5 P000 Print Problem Machine Report P100 Print Problem Machine Lines P110 Read Machine Record P120 Determine Problem Machine P130 Print Problem Machine Line P140 Print Heading Lines P150 Print Page Top Line P160 Write Report Line* P160 Write Report Line P200 Print Final Report Lines P160 Write Report Line**

E – 6 S000 Change Software File S100 Change Software Record S110 Get Software Record S120 Display Software ID Screen S130 Accept Software ID Screen S140 Find Software Record S150 Display Error Line S160 Obtain Software Changes S170 Display Change Screen S180 Accept Software Changes S190 Validate Changes S150 Display Error Line* S200 Put Software Record S210 Format Software Record S220 Rewrite Software Record

E – 7 I000 Inquire Software Details I100 Inquire Software Record I200 Get Software Record I210 Display Software ID Screen I220 Accept Software ID Screen I230 Find Software ID Screen I240 Display Error Line I250 Display Inquiry Screen I260 Format Software Inquiry Screen I270 Display Software Inquiry Screen

E – 8

Program: UPDATE SOFTWARE RELATIONAL FILE Input: UPDATE SOFTWARE INSTALLATION LIST, document UPDATE INSTALLED SOFTWARE SCREEN, display Output: SOFTWARE RELATIONAL FILE, disk INSTALLED SOFTWARE TRANSACTION, disk E – 9 Update Software Relational File Update Software Installation List Update Installed Software Screen Software Relational File Installed Software Transaction

Program: PRINT USER NOTIFICATION REPORT Input: INSTALLED SOFTWARE TRANSACTION, disk Output: USER NOTIFICATION REPORT, report E – 9 Print User Notification Report User Notification Reports Installed Software Transaction

E – 9 Before After

E – 10

Inventory number: Not entered, not numeric, already on file Date purchased: Invalid date (month = 14, etc.) Network Connection : Anything other than C, D, F, M, 1, 2, 3, 0 CD ROM: Anything other than 0, 2, 4, 6, 8, 10, 12, 16, 20, B, D, V Monitor, Printer, Internet, or Board Codes: try entering data into the field that is not on the list E – 11

E – 12

Design test data and predicted results for the ADD TRAINING CLASS program. Use Microsoft Access to test the display and note whether the results conformed to your predictions. Title: Must be entered Course Description: Must be entered Class length: Not entered, not numeric, greater than 20 Operating System: Must be entered that is on the list E – 13

Design test data on paper to test the CHANGE SOFTWARE EXPERT program. Use Microsoft Access to test the display. Note any discrepancies Last name: Must be entered First Name: Must be entered Phone: Not entered, not numeric Room: Must be entered Title: Must be entered Version: Must be entered Expert Teach Course: Must be Yes or No Operating System: Must be entered data on the list E – 14

Chapter 17 Successfully Implementing The Information System

E – 1

A network is a collection of data communication hardware, computers, data communication software and data communication media, all connected in a meaningful way to allow users to share information, resources and equipment. A star network is a network where each machine is connected to a central machine, called a server. The server holds all the software, and the other machines, called nodes, request the software from it. Since the server receives all the requests, it can handle them one by one, and there are no data crashes. E – 1

Advantages Easy to install and wire No disruptions to the network when connecting or removing devices Easy to detect faults and to remove parts Disadvantages Requires more cable length than a linear topology If the hub or concentrator fails, nodes attached are disabled More expensive than linear bus topologies because of the cost of the hubs, etc.

Backup will be performed on two levels 1.All transactions entering the system from on-line screens will be placed on log (or journal) transaction files. These are located on a smaller, second hard disk within the server computer. If there is a head crash or other problem on the main hard disk, the backup files would still exist. The format of the log files is E – 2 DateTimeComputer ID User IDBackup Type Result 2010/04/0112:00 AMDot-PCDMatrixFullCompleted 2010/04/0112:00 PMDot-PCDMatrixIncrementalCompleted 2010/04/0212:00 AMDot-PCDMatrixIncrementalCompleted 2010/04/0212:00 PMDot-PCDMatrixIncrementalFailed 2010/04/0312:00 AMDot-PCDMatrixFullCompleted 2010/04/0312:00 PMDot-PCDMatrixIncrementalCompleted

E – 2 2. All database files are copied to media every night. These are removed to one of the other campus locations and stored in a vault. Advantages: 1. Backup of all major files. 2. Faster backup since major files do not have to be backed up before each update. 3. Continual backup using the log files. Disadvantages: 1. Programs must be written to restore database records in a batch mode from the log files. 2. Streamer tape units may be initially expensive.

E – 3 List security measures that should be taken to prevent unauthorized persons from using the computer system Unique username and password for all users Password must be at least 8 characters long and must include at least one number, one uppercase letter, and one special character (ex: finAlf4nt4$y) Password will expired every 60 days and will need to be changed (notification 12 days before expiration date) Username should be locked after 3 failed attempts System users audit every 3 months to check for valid users of the system and removed users who no longer have access privilege

E – 4 Team Leader / Decision Maker: Dot Matrix o Will determine the condition and stability of campus resources o Make High Level Decisions with management team o Will Initiate Communications to her team Team: o Hy Perteks – Director Information Center –  Data Backups  Manage Data Recovery Process  Routing of Network Resources if needed o Mike Rowe – Maintenance Expert - Physical Condition of PC’s  Check Condition of PC’s  Physical relocation of PCs if needed. o Cher Ware – Software Manager - Software Configuration  Ensure duplication of critical systems at new location if needed.  Ensure that any manual software changes are made (need to change servers)  Assist Mike Rowes team as needed.

E – 4 Other Recommendations: Remote Emergency Location – Satellite Campus Off Site replication should be mirrored at one of the satellite campuses. o Already owned Space o There should be little effort in backing up data here since they are already on the network. Test Disaster Recovery Twice a year.

Question: Explain in a paragraph why a phased conversion would be used to install the computer system E – 5 Answer: A phased conversion is the best method since the system has several major subsystems. Hardware records and programs must be installed first because software records reference them. The phased conversion provides data entry personnel time to update records with additional data elements not stored in the old system