Sunday, May 3, 2009

Normalization Quiz

The Erd :



First Normal Form (1NF)



On first normal form still have a lot of weakness, such us:
  • Insert, we can not only inserting NOPEG and NAPEG without their PROYEK, so we can inserting their attribute if there is PROYEK.
  • Update, depend on the table above, many attribute written recurring repeat, if there is updating attribute so all the same attribute must be update.
  • Delete, when one record vanished, so all data in that record will be vanished though the data still needed.
  • UMUR attribute must not be written, because every date of now at reducing attribute TGLLAH so will be result attribute UMUR.

Second Normal Form (2NF)

Second normal form (2NF) is a normal form used in database normalization. A table that is in first normal form (1NF) must meet additional criteria if it is to qualify for second normal form. Specifically: a 1NF table is in 2NF if and only if, given any candidate key and any attribute that is not a constituent of a candidate key, the non-key attribute depends upon the whole of the candidate key rather than just a part of it.
In slightly more formal terms: a 1NF table is in 2NF if and only if none of its non-prime attributes are functionally dependent on a part (proper subset) of a candidate key. (A non-prime attribute is one that does not belong to any candidate key.) Note that when a 1NF table has no composite candidate keys (candidate keys consisting of more than one attribute), the table is automatically in 2NF.

In the second normal form, table of pegawai increased to 2 table.




Third Normal Form (3NF)


Normal form 3NF fufilled if have fulfilled form 2NF, and otherwise there is attribute of is non key primary owning depended to attribute of is non the other key primary.

Read More >>

Saturday, April 25, 2009

Database Normalization

I. Process Design Database (review)

In Process Design Database there are:
  1. Collect requirement of user / business
  2. Develop E-R Model based requirement of user / business
  3. Convert E-R Model to relationship gathering ( tables)
  4. Relationship normalization to eliminated or removed anomaly
  5. Implementation goes to database by make table for each relationship already most normalization

II. Database Normalization

In the field of relational database design, normalization is a systematic way of ensuring that a database structure is suitable for general-purpose querying and free of certain undesirable characteristics—insertion, update, and deletion anomalies—that could lead to a loss of data integrity.
Normalization phase started from lightest phase ( 1NF) until tightest ( 5NF). Usually only coming up with level 3NF or BCNF because have adequate enough to yield the tables of which with quality goodness.

Why done by normalization?
  • Optimizing table structures.
  • Improve speed.
  • Remove same data.
  • More efficient in usage of storage media.
  • Lessen redundancy.
  • Avoid anomalies ( anomalies insertion, anomalies deletion, update anomalies).
  • Improved Data integrity.


III. Functional Dependency

A functional dependency (FD) is a constraint between two sets of attributes in a relation from a database.
Given a relation R, a set of attributes X in R is said to functionally determine another attribute Y, also in R, (written X --> Y) if and only if each X value is associated with precisely one Y value. Customarily we call X the determinant set and Y the dependent attribute. Thus, given a tuple and the values of the attributes in X, one can determine the corresponding value of the Y attribute. For the purposes of simplicity, given that X and Y are sets of attributes in R, X --> Y denotes that X functionally determines each of the members of Y - in this case Y is known as the dependent set. Thus, a candidate key is a minimal set of attributes that functionally determine all of the attributes in a relation.

Example :



Functional Dependency:
  • NRP--> Nama
  • Mata_Kuliah, NRP --> Nilai


Non Functional Dependency:
  • Mata_Kuliah --> NRP
  • NRP --> Nilai

Functional Dependency from tables of Nilai:

Nrp --> Nama
Because to each Nrp value is same, so Name value is same too.

{Mata_Kuliah, NRP} --> Nilai
Because attribut value depend on Mata_Kuliah and NRP by together. In other meaning for the Mata_Kuliah and NRP is same, so have same Nilai too, because Mata_Kuliah and NRP is key ( having the character is unique).

Mata_Kuliah --> NRP
NRP --> nilai


IV. First Normal Form / 1NF

First normal form (1NF or Minimal Form) is a normal form used in database normalization. A relational database table that adheres to 1NF is one that meets a certain minimum set of criteria. These criteria are basically concerned with ensuring that the table is a faithful representation of a relation and that it is free of repeating groups.
The concept of a "repeating group" is, however, understood in different ways by different theorists. As a consequence, there is no universal agreement as to which features would disqualify a table from being in 1NF.

Not allowed for :
  • Attribute that valuably there are many ( Multi valued attribute )
  • Attribute composite or combine of both

So :
  • Price of Domain attribute must represent atomic price

For Example
Table "Mahasiswa"




Or



That Tables is not complete 1NF condition.
Decomposition becomes:

Table mahasiswa :



Table hoby :



V. Second Normal Form / 2NF

Second normal form (2NF) is a normal form used in database normalization. 2NF was originally defined by E.F. Codd in 1971. A table that is in first normal form (1NF) must meet additional criteria if it is to qualify for second normal form. Specifically: a 1NF table is in 2NF if and only if, given any candidate key and any attribute that is not a constituent of a candidate key, the non-key attribute depends upon the whole of the candidate key rather than just a part of it.
In slightly more formal terms: a 1NF table is in 2NF if and only if none of its non-prime attributes are functionally dependent on a part (proper subset) of a candidate key. (A non-prime attribute is one that does not belong to any candidate key.)

Functional dependency X --> Y is said full if erase an attribute A of X its mean that Y no longer functional dependent. Functional dependency X --> Y is said partial if erases an A's attribute of X matter Y still functional dependent. Relationship schemer on 2NF form if each attribute non primary key A R full dependent functionally on primary key R.

This table accomplishes 1NF, but not exclude 2NF :





That table is Not accomplishing 2NF form, because (NIM, KodeMk) is regarded as the primary key:

{NIM, KodeMk} -> NamaMhs
{NIM, KodeMk} -> Alamat
{NIM, KodeMk} -> Matakuliah
{NIM, KodeMk} -> SKS
{NIM, KodeMk} -> NilaiHuruf

Table need to decomposition become some table measures 2NF

Functional dependency as follows:
  • {NIM, KodeMk} --> NilaiHuruf (fd1)
  • NIM --> {NamaMhs, Alamat} (fd2)
  • KodeMk --> {Matakuliah, Sks} (fd3)


So
  • fd1 (NIM, KodeMk, NilaiHuruf) --> Tabel Nilai
  • fd2 (NIM, NamaMhs, Alamat) --> Tabel Mahasiswa
  • fd3 (KodeMk, Matakuliah, Sks) --> Tabel MataKuliah


VI. Third Normal Form

The third normal form (3NF) is a normal form used in database normalization. 3NF was originally defined by E.F. Codd in 1971. Codd's definition states that a table is in 3NF if and only if both of the following conditions hold:
  1. The relation R (table) is in second normal form (2NF)
  2. Every non-prime attribute of R is non-transitively dependent (i.e. directly dependent) on every key of R.

An example of a 2NF table that fails to meet the requirements of 3NF is:



Because still there are attribute not primary key (namely Kota and Provinsi) own depended to attribute not other primary key (name is Kodepos) :
  • Kodepos --> {Town, Provinsi }
So that the table require to decomposition become :
  • Mahasiswa ( NIM, Namamhs, Jalan, Kodepos)
  • Kodepos ( Kodepos, Provinsi, Town)


VII. Boyce-Codd Normal Form / BCNF

Boyce-Codd normal form (or BCNF) is a normal form used in database normalization. It is a slightly stronger version of the third normal form (3NF). A table is in Boyce-Codd normal form if and only if, for every one of its non-trivial functional dependencies X --> Y, X is a superkey—that is, X is either a candidate key or a superset thereof.


VIII. Fourth and Fifth Normal Form

Relationship in fourth normal form (4NF) if relationship in BCNF and not contains multi value dependency. To remove multi value dependency from one relationship, we are divide relationship become two new relationships. Each relationship contains of two attributes have multi value relationship.

Relationship in fifth normal form (5NF) get business with property is calling join without marks sense information loss (lossless join). The fifth normal Form (5 NF) also know as PJNF (projection join normal form). This case is very rare to appearance and hard to detect practically.


Read More >>

Saturday, April 18, 2009

Database and Entity Relationship Diagram

I. Database

The definition of a database is a structured collection of records or data that is stored in a computer system. In order for a database to be truly functional, it must not only store large amounts of records well, but be accessed easily. In addition, new information and changes should also be fairly easy to input.
Database can meaning a collection of interconnection data for a enterprise (company, government institution or private sector).


II. Database Management System (DBMS)

A database management system (DBMS) is computer software that manages databases. DBMSes may use any of a variety of database models, such as the network model or relational model. In large systems, a DBMS allows users and other software to store and retrieve data in a structured way.
Example of DBMS :
  • MySQL
  • PostgreSQL
  • Oracle

III. Bit, Byte and Field
  • A bit is a binary digit, taking a value of either 0 or 1. Binary digits are a basic unit of information storage and communication in digital computing and digital information theory.
  • A byte is a basic unit of measurement of information storage in computer science. In many computer architectures it is a unit of memory addressing. There is no standard but a byte most often consists of eight bits.
  • Field is a group of same byte, in database used by attribute.


IV. Attribute / Field

Attribute or Field is a characteristic from entity, which preparing detailed explanation about that's entity.
A relation could have atribute too.
Example of Attribute :
  • Student : NIM, Name, Sex, Address
  • Car : Plat Number, Color, CC
  • Book : ID, title, author

Type of Attribute

Single value Vs Multi value Attributes
  1. Single Value : only can fill at most one value
  2. Multi Value : can fill with interest from one value with same type
Composite Vs Atomic Attributes
  1. Composite : cluster from some smaller attribute. For example: Name ( First name, middle name, and last name)
  2. Atomic : can not divide into smaller attribute. For example: ID
Derived Attribute : Value of attribute result from other attribute value. For example: age from attribute date of birthday

Null Value Attribute : Attribute that doesn’t have any value for a record

Mandatory Value Attribute : Attribute must have value



V. Record / Tuple
Record is a data line in an relation. Consist of attributes where there attribute can interaction to completely information a entity / relation.

VI. Entity / File
File is a group of same record and have same element, same attribute but different of each data value.
In application process, file can be categorized as :
  • Main file
  • Transaction file
  • Report file
  • History file
  • Protector file
  • Activity file

VII. Domain

Domain is collection of value that can be inside one or more attribute. Each attribute in database relation defined as domain.

VIII. Data Element Key

Key is record's element that is used to find record that on access time or can also be utilized to identify each entity / record / the line.

Types of Key
  • Super Key : superkey is defined in the relational model of database organization as a set of attributes of a relation variable (relvar) for which it holds that in all relations assigned to that variable there are no two distinct tuples (rows) that have the same values for the attributes in this set. Equivalently a superkey can also be defined as a set of attributes of a relvar upon which all attributes of the relvar are functionally dependent.
  • Candidate Key : candidate key is a minimal set of columns necessary to identify a row, this is also called a minimal superkey.
  • Primary Key : primary key is a candidate key to uniquely identify each row in a table. A unique key or primary key comprises a single column or set of columns. One of attribute from candidate keys to get is chosen / is determined as primary keys with three criterions as follows:
  1. that key is more natural to been utilized as basis
  2. that key is simpler
  3. that key its uniqueness indemnity bond
  • Alternate Key : Alternate keys is attribute from candidate keys that don't be chosen becomes primary key.
  • Foreign Key : foreign key is a referential constraint between two tables.The foreign key identifies a column or a set of columns in one (referencing) table that refers to a column or set of columns in another (referenced) table. The columns in the referencing table must be the primary key or other candidate key in the referenced table.
  • External Key : External keys to constitute a lexical attribute (or lexical gathering attribute) one that its point do ever identify one object instance.

IX. Entity Relationship Diagram

ERD is a model of a network that uses word order is stored in the abstract system.
The difference among DFD and ERD :
  • DFD is a model of network functions that will be implemented by the system
  • ERD is a model that emphasizes the network data on the structure and relationship data
Elements Of ERD
  • Entity
In the ER Diagram Entity is described with the form of a rectangle. Entity is something that exists in the real system and the abstract where the data stored or where there are data.
  • Relationship
A relationship is some association between entities. In this section we shall concentrate on binary relationships. That is, associations between two entities. In section 16.4 we shall introduce other N-ary relationships. That is, relationships between one, three, four or N entities. In the E–R approach, more than one relationship can exist between any two entities.
  • Relationship Degree
Are total entity who participated in one relationship. Degree that frequent being used on ERD
  • Attribute
Are character or characteristic of every entity and also relationship.
  • Cardinality
Pointing out record optimum that relations can with entity on entity another one.


X. Relationship Degree
  • Unary Relationship is a relationship model between entity coming from same entity set.
  • Binary Relationship is a relationship model between 2 entity.
  • Ternary Relationship is a relationship between instance from 3 type of entitas unilaterally.

XI. Cardinality

There are 3 cardinalities relations :
  • One to One: Level one to one relationship with the one stated in the entity's first event, only had one relationship with one incident in which the two entities and vice versa.
  • One to Many or Many to One: Level one to many relationship is the same as the one to many depending on the direction from which the relationship seen .for an incident on the first entity can have any relationship with more incident on the second entity, if the one incident on the entity the second can only have one relation with the incident on the first entity.
  • Many To Many: if any incident occurs in an entities have relationships with other entities in the incident.

Read More >>

Saturday, April 4, 2009

Data Flow Diagram

1. Data Flow Diagram
  • Used to perform structured analysis to determine logical requirements
  • A graphical tool, useful for communicating with users, managers, and other IS personnel
  • Useful for analyzing existing as well as proposed systems
  • A relatively simple technique to learn and use
2. Context Diagram

Defines the scope of the system by identifying the system boundary.
contains:
  • One process (which represents the entire system)
  • All sources/sinks (external entities)
  • Data flows linking the process to the sources and sinks (external entities)
  • The diagram does not contain any data stores.
  • All external entities are shown on the context diagram as well as major data flow to and from them.
Example of Context Diagram :



3. Zero Diagram
  • Describes the overall processing of the system
  • Show one process for each major processing step or functional requirement
  • Data flows from the context appear on system diagram also (level balancing)
  • Can show a single data store to represent all data in aggregate at this level
  • Can draw duplicate sources, sinks and data stores to increase legibility
Example of Zero Diagram :

4. Detail Diagram
  • Detail Diagram is the explosion of the context level diagram.
  • It should include up to 7 or 9 processes.
  • Processes are numbered with an integer.
  • The major data stores and all external entities are included on Diagram 0.
Numbering Level On DFD :



5. Spesification of Process

Each process in DFD must have the process specification. in top level method used to describe process by using descriptive sentence. At more level detailed that is under process (functional primitive) required the specification structure.Process Specification will become guide to programmer in coding. Method used in the process specification : description process in the story, decision table and decision tree.

6. External Entity
  • Any class of people, an organization, or another system which exists outside the system you are studying.
  • Form the boundaries of the system.
  • The system and external entities exchange data in the form of data flows.
  • Must be named, titles preferred to names of individuals - use a noun
7. Data Flow




  • Data flow shows the data about a person, place, or thing that moves through the system.
  • Names should be a noun that describes the data moving through the system.
  • Arrowhead indicates the flow direction.
  • Use double headed-arrows only when a process is reading data and updating the data on the same table or file.
Other rule:

* Data flow name which turn in at a process may not same by the name of secretary data flow of that process.
* Data flow into or out of data storage doesn't need to give a name if:
o The flow of data simple and easy to understand
o Describes the data flow of all data items
* There may not any data flow of terminal to data storage or on the contrary because terminal isn't part of system, terminal relation with data storage have to pass process.


8. Process


  • Transforms incoming data flows into outgoing dataflows
  • Each process has a unique number and name
  • Name each process using a verb and a noun phrase
  • the name of a process should describe what the process does
  • avoid vague names where possible
  • represent with a bubble or rounded square


9. Data Storage


  • A data store represents a collection of data flows "at rest"
  • Each data store has a unique name
  • The name should describe the contents of the data store
  • A data store may represent many different types of physical locations of data
  • A data store may be a temporary or a permanent repository of data


10. DFD Symbol





11. Data Dictionary

Data dictionary is a reserved space within a database which is used to store information about the database itself. Data dictionary is also called with a system data dictionary is a catalog of facts and data information needs of an information system. In function to help system agent to interpreting application in detail and organization all of data element that utilized by system exactly so user and system analyst have same understanding basic about entry, output, storage and process. In analysis phase, data dictionary used as communication between system analyst with user. in development system phase, data dictionary used to design input, and report database. Data flow in DFD have the character of globally, boldness more detailed can be seen in data dictionary.
Data dictionary load the followings :

  • Name of data current: must note that readers who need further explanation about a flow of data can find it easily
  • Alias: alias or other name of the data can be written when there is
  • Forms of data: used to segment the data dictionary to use when designing the system
  • Flow data: indicates from which data flows and where the data
  • Description: to give an explanation of the meaning of the data flow

12. Balancing In DFD

Data flow into and out of a process must be the same as the flow of data into and out of the details of the process on the level / levels below. Name of the data flow into and out of the process must match the name of the flow of data into and out of the details of the process. Number and the name of an entity outside the process must be equal to the number of names and entities outside of the details of the process.
Things which must be gave attention to DFD owning than one level:

  • There are must input balance and output between one level and level next
  • Balance between level 0 and level 1 seen at input / output of data stream to or from terminal in level 0, while balance between level 1 and level 2 seen at input / output of data stream to/from pertinent process
  • Data flow name, data of storage terminal and every level must be same if its same object

13. Prohibition In DFD
  • The data flow may not directly from one external entity to another external entity without any process.
  • The data flow may not directly from data storage to external entity without any process.
  • The data flow may not directly from data storage to the other data storage without any process.
  • The data flow from one process directly go to another process without any data storage should be avoided.
Read More >>

Sunday, March 29, 2009

Initial Investigation and Requirement of Analysis

System Investigation Concept

The gap between system purposes and the condition actual system.

The report of detection problem is not real or actual.
1. The purpose is excessive ideal.
2. Lacking of resource and or attitude.
3. Measuring of system is not so accurate.
4. The purpose of system was backward.
5. The difference of ideal system and several system.

Problem solving:

a. An Acurate the inverstigation.
b. Ideal Getting of system consensus.
c. Developed several alternative.
d. Select the best alternative.

Purpose of investigation indicate problem are happen in the system.


The problems in investigation system

When investigation, there are some problem, that is :
a. Time
b. Expense
c. Science
d. Politics
e. Interference



Recommendation

The investigation results are a recommendation that include these following:

- Never take any action –> if there is no problem was found

- System maintenance –> some small problems

- increase ability or user ability

- totally consider to system modification

- put problem into the development system plan



Investigation Tactics

Why we need tactic?

- to find all the problem

- to find out the reason

- to find out the best solution

Investigation tactics is very important for the entire elements system so that the system can accept request solution without disturb their activities.

Some tactics that we can do:

- listening the suggestion from system agent

- don’t give beginning solution

- comparing the stories from system agents about similar cases

- notice the logical inconsistent problem


Investigation Technique

Technique directly (Internal):

- The questionnaire
- Discussion
- Monitoring

Technique Indirectly (External):

- Flow of the procedure
- Reviewing documents
- Sample
- Tabular

Current system Description

- Inputs
- Outputs
- Files
- Data elements
- Transaction and document action volume
- Data Flow Diagram

Requirement of Analysis

Intensive Interaction stage between system analyst by end is user of where team of system development indicate for get faith user.


Four Purpose which wish reached

- Explaining the system completely.
- Describing ideal the information system.
- Giving provide about make the user trusting into system development
- Bringing ideal information system to condition in this time by paying attention to resource constraint


Method

- Discussion
- Questionnaire
- Observation
- Analyse procedure
- Document Observe


Resource constaraint
- Time
- Money
- Membership
- Technological
- Eksternal Factor


The Requirement Document Analyse

1. Instruction analyse
Relationships with end users, the observation process, problems in data collection.

2. The user needs
The need actual, reporting requirements, training needs and the influence of the new system

3. System Constraint
Explain the constraints of time and cost, expertise, membership, technological and factor eksternal
4. Document in the form of data collecting instrument, statistical consensus, the logical flow of data phisical.


Generating System Alternatives

1. create alternative to solve the information system problem
2. Applying best alternative wisely.

Strategy Option

1. Distributed versus centralized processing
Changes in information decision-making from the centralized data processing to the decentralized end user responsibility center

2. Integrated versus dispersed database
System designer must consider the data which are entered in the database and into the file

3. Surround Strategy of System Development
About important environmental strategy in the case of company takeovers because the information system of other companies may vary with the company at this time.

Options Tactics
Before behavior to design operational

Designing Operational Options
Selection in design operational can be group:

Input
1. Online Vs Off Line Data Entry
2. Keyed Vs Machine Readable Data Entry
3. Centralized Vs Decentralized Data Entry

Processing
1. Batch Vs Realtime record update
2. Sequential Vs Direct Access to records
3. Single Vs Multiple User update of records

Output
1. Traditional Vs Turn Around Documents
2. Structured Vs Inquiry based reports

Selecting the proper system

System the based of cost and profit with relative. There are 3 way system A, that is more preeminent than other system, if :

1. A have a cost more inferior than B and the profit of both are same.
2. A have a cost more inferior than B and A yielding profit is more much than B.
3. A and B have a some cost, but A's profit is more much.

Some comparation system method
1. Break Even point Analyisis
2. Payback Period
3. Discounted PayBack period
4. Internal Rate of Return

Categorize expense
1. Hardware
2. Software
3. People
4. Suppliers
5. Teleccommunications
6. Physical sites

Detail of expense
Comparing the expense of information system through life of system, projection analyst how much/many change of expense for the future and there is 3 model of is expense of information system that is Linear, Eksponensial and of Step Function.
Expense of information system earn just happened once and earn also happened chronically.

1. Expense of just information system that happened once that is cost ontime and of development cost that happened system development moment.

2. Expense of information system that happened continually among others is cost reccuring and also cost operational where this expense happened information system moment operate every day.

The Information System Factor

Qualitative factors that lead the performance information system that both of them:

a. Reducing mistake storey
b. Reducing the time to fix errors
c. Reduce the response time from the workstation alternative
d. Accelerate the time of providing information
e. Improve security systems
f. Multiply to update the active source record
g. Improving user satisfaction


Company Strategy Factor

a. Customer satisfaction
b. Sales increased
c. Consumer and vendor commitment
d. Product marketing Information

Decision to continue or not

1. If the company decided to develop the system, the information department will do next, namely the System Design Process.

2. If the other way then the System Development Life Cycle (SDLC) will be terminated.

3. Often a problem will be found with the study system and then usually top management will ask for the re-employment the study system.

4. Model will describe some of the stages of the repeated and sometimes the information will make a decision before the repeat stage system of study.

5. With the alternative, the decision to repeat a previous stage SDLC or not is called Go-No-Go Decision.

Read More >>

Saturday, March 7, 2009

System Development Concept (Part II)

Approaches Of Developing A System

1. Classical approach and structured approach ( looked into used methodologies).

A. Classical Approach
Is classic approach methodologies to develop the system by following the step in system life cycle.

B. Structured Approach
Approach of structure provide the additional system in the form of appliances and techniques to develop the system beside fixed follow idea from system life cycle.

2. Piecemeal approach and system approach (looked into the target to reach).

A. Piecemental Approach
Piecemeal approach is a system development approach that emphasize to an activity or just the application. The selected activity or application is developed without pay the attention from the position in information system or without pay the attention from the organization target comprehensively.

B. System Approach
Approach of system, pay attention the information system as one unity integrated to each activity or his application.

3. Bottom-up approach and Top-down approach (looked into the way of determining requirement of system).

A. Bottom-Up Approach
A bottom-up approach is piecing together systems to give rise to grander systems, thus making the original systems sub-systems of the emergent system. In a bottom-up approach the individual base elements of the system are first specified in great detail. These elements are then linked together to form larger subsystems, which then in turn are linked, sometimes in many levels, until a complete top-level system is formed. This strategy often resembles a "seed" model, whereby the beginnings are small but eventually grow in complexity and completeness. However, "organic strategies" may result in a tangle of elements and subsystems, developed in isolation and subject to local optimization as opposed to meeting a global purpose.

B. Top-Down Approach
A top-down approach is essentially breaking down a system to gain insight into its compositional sub-systems. In a top-down approach an overview of the system is first formulated, specifying but not detailing any first-level subsystems. Each subsystem is then refined in yet greater detail, sometimes in many additional subsystem levels, until the entire specification is reduced to base elements. A top-down model is often specified with the assistance of "black boxes" that make it easier to manipulate. However, black boxes may fail to elucidate elementary mechanisms or be detailed enough to realistically validate the model.

4. Total-system approach andmodular approach (looked into the way of developing it).

A. Total System Approach
Total system approach is the approach which developing a system together according to comprehensive.

B. Modular Approach
Modular approach tries to divide complex system to simple some part, so that system easier will be understood and developed.

5. Great loop approach and evolutionary approach (looked into technology to be used).

A. Great Loop Approach
Great Loop Approach apply change totally at a timely use the sophisticated technology. Have the big risk because speed of change of technology.

B. Evolutionary Approach
Evolutionary approach applies sophisticated technology just for applications that need that moment and will be developed for next periods based on technology development. This approach causes investment not too expensive and can follow fast technology development.



The Meaning Of Methodology, Method And Algorithm

1. Methodology can be defined as:
  • The analysis of the principles of methods, rules, and postulates employed by a discipline.
  • The systematic study of methods that are, can be, or have been applied within a discipline.
  • A particular procedure or set of procedures.
2. Method
Method is How to do or make something

3. Algorithm
Algorithm is a sequence of finite instructions, often used for calculation and data processing.


Classifications Of Development Methodology

1. Functional decomposition methodologies
Functional decomposition methodologies emphasize at resolving of system into smaller subsystems, so that will be more easy to be comprehended, to be designed and applied. Which included in this methodologies is:
  • HIPO (Hierarchy plus Input Process Output)
  • SR (Stepwise Refinement)
  • ISR (Iterative Stepwise Refinement)
  • Information-Hiding
2. Data-oriented methodologies

This methodologies emphasize at characteristic of data to be processed. This methodologies is grouped into 2 class:

A. Data-flow oriented methodologies
There are the include in this group methodologies such as SADT (Structured Analysis and Design Techniques), Composite Design.

B. Data structure oriented methodologies
There are the include in this group methodologies such as JAD (Jackson's system development), W/O (Warnier/Orr).

3. Prescriptive Methodologies

This methodology usually has been provided by software maker factory. In this methodology including:
  • ISDOS (Information System Design and Optimization System)
  • PLEXSYS
  • PRIDE
  • SDM/70
  • SPECTRUM
  • SRES and SREM, etc.

Tools For Developing A System

The tools there are in the form of diagram and chart, such as :
• HIPO diagram, Data flow diagram, SADT, structure chart, Jackson's diagrams, etc.

Besides the tools that mention above, there are utilizes that used at all of methodology. The tools as a chart set that grouped by:

• Activity charting: to figuring activity, example: chart's substituting, flowchart, etc.
• Layout charting: to figuring layout
• Personal relationship charting: to figuring person relationship, example: organization chart, working distribution chart



Techniques Used In Developing A System

1. Project Management Technique
Project management technique is the discipline of planning, organizing and managing resources to bring about the successful completion of specific project goals and objectives.

2. Finding Fact Technique
Fact-finding is an important activity in system investigation. In this stage, the functioning of the system is to be understood by the system analyst to design the proposed system. Various methods are used for this and these are known as fact-finding techniques. The analyst needs to fully understand the current system.
The analyst needs data about the requirements and demands of the project undertaken and the techniques employed to gather this data are known as fact-finding techniques.
Various kinds of techniques are used and the most popular among them are interviews, questionnaires, record reviews, case tools and also the personal observations made by the analyst himself. Each of these techniques is further dealt in next pages.

3. Meeting Technique
During conducted system development process, oftentimes meeting performed either by developer team with user and manager.



The Differences Of Being A System Analyst And A Programmer

1. System Analyst

A systems analyst is responsible for researching, planning, coordinating and recommending software and system choices to meet an organization's business requirements. The systems analyst plays a vital role in the systems development process. A successful systems analyst must acquire four skills: analytical, technical, managerial, and interpersonal.
Basically a systems analyst performs the following tasks:
  • Interact with the customers to know their requirements
  • Interact with designers to convey the possible interface of the software
  • Interact/guide the coders/developers to keep track of system development
  • Perform system testing with sample/live data with the help of testers
  • Implement the new system
  • Prepare High quality Documentation

2. Programmer

A programmer is someone who writes computer software. The term computer programmer can refer to a specialist in one area of computer programming or to a generalist who writes code for many kinds of software. One who practices or professes a formal approach to programming may also be known as a programmer analyst.


Read More >>

System Development Concept (Part I)

The Importance Of Developing An Information System

1. Problems existence
There is a problems from the old system.

2. Organization Growth
Because the requirement is increasing, the system needed to develop.

3. For reach the opportunities
A chance to improve the organization.

4. Instructions existence (directives)
Instruction existence is instructions from the leader or from outside organization, for example regulation of government.


The Purpose Or Goal Of Developing An Information System

1. Solving the problems
2. Reach the opportunities
3. Complete the directives that given


The Organization’s Expectations After Implementing An Information System

1. Performance
In this case, performance is Measured to use and throughput of response time.

2. Information
Increase the quality of information.

3. Economy
Increase the profit and decrease the cost.

4. Control
The Purpose of control is detect and fix the mistakes or error.

5. Efficiency
The organization must to increase the efficiency of operational.

6. Services
Increase the services of system.


The Principles Of Developing An Information System

1. Developed system for the management.
2. Developed system is a big investment
3. The development of system needs educated people.
4. There is a step or process that must be done in system development.
5. System development process must not massage.
6. Don't be afraid to cancel a project.
7. Documentation is important for guidance in system development


System Development Life Cycle Models

1. Waterfall Models

waterfall models

The waterfall model is a sequential development process, in which development is seen as flowing steadily downwards (like a waterfall) through the phases of Conception, Initiation, Analysis, Design (validation), Construction, Testing and maintenance.

In waterfall model, the following phases are followed in order:
1. Requirements specification
The most important task in creating a software product is extracting the requirements or requirements analysis. Customers typically have an abstract idea of what they want as an end result, but not what software should do. Incomplete, ambiguous, or even contradictory requirements are recognized by skilled and experienced software engineers at this point. Frequently demonstrating live code may help reduce the risk that the requirements are incorrect.
Once the general requirements are gleaned from the client, an analysis of the scope of the development should be determined and clearly stated. This is often called a scope document. Certain functionality may be out of scope of the project as a function of cost or as a result of unclear requirements at the start of development. If the development is done externally, this document can be considered a legal document so that if there are ever disputes, any ambiguity of what was promised to the client can be clarified.

2. Design
This Phase is process which focusing at four attributes: data structure, system architecture, interface representation, and algorithm. This phase is translate requirement process into software representation.

3. Construction
4. Integration
5. Testing and debugging
6. Installation
7. Maintenance
This Phase is system maintenance process. System possibly will experience of change after submitted to customer.


Strengths:
1. Ideal for supporting less experienced project teams and project managers, or project teams whose composition fluctuates.
2. The orderly sequence of development steps and strict controls for ensuring the adequacy of documentation and design reviews helps ensure the quality, reliability, and maintainability of the developed software.
3. Progress of system development is measurable.
4. Conserves resources.

Weaknesses:
1. Inflexible, slow, costly and cumbersome due to significant structure and tight controls.
2. Project progresses forward, with only slight movement backward.
3. Little room for use of iteration, which can reduce manageability if used.
4. Depends upon early identification and specification of requirements, yet users may not be able to clearly define what they need early in the project.
5. Requirements inconsistencies, missing system components, and unexpected development needs are often discovered during design and coding.
6. Problems are often not discovered until system testing.
7. System performance cannot be tested until the system is almost fully coded, and under-capacity may be difficult to correct.
8. Difficult to respond to changes. Changes that occur later in the life cycle are more costly and are thus discouraged.
9. Produces excessive documentation and keeping it updated as the project progresses is time-consuming.
10. Written specifications are often difficult for users to read and thoroughly appreciate.
11. Promotes the gap between users and developers with clear division of responsibility.



2. Iterative Models

iterative models

Iterative and Incremental development is a cyclic software development process developed in response to the weaknesses of the waterfall model. It starts with an initial planning and ends with deployment with the cyclic interaction in between.

There is process or steps of Iterative Model :

1. Initial planning
2. Planning
3. Requirement
4. Analysis and design
5. Implementation
7. Testing
8. Evaluation

The Advantages :
1. Especially useful for resolving unclear objectives; developing and validating user requirements; experimenting with or comparing various design solutions or investigating both performance and the human computer interface.
2. Potential exists for exploiting knowledge gained in an early iteration as later iterations are developed.
3. Helps to easily identify confusing or difficult functions and missing functionality.
4. May generate spesifications for a production application.
5. Encourages innovation and flexible designs.
6. Provides quick implementation of an incomplete, but functional application



3. Spiral Models

spiral models

The spiral model is a software development process combining elements of both design and prototyping-in-stages, in an effort to combine advantages of top-down and bottom-up concepts. Also known as the spiral lifecycle model, it is a systems development method (SDM) used in information technology (IT). This model of development combines the features of the prototyping model and the waterfall model. The spiral model is intended for large, expensive and complicated projects.

The steps in the spiral model can be generalized as follows:

1. The new system requirements are defined in as much detail as possible. This usually involves interviewing a number of users representing all the external or internal users and other aspects of the existing system.
2. A preliminary design is created for the new system.
3. A first prototype of the new system is constructed from the preliminary design. This is usually a scaled-down system, and represents an approximation of the characteristics of the final product.
4. A second prototype is evolved by a fourfold procedure:
  1. evaluating the first prototype in terms of its strengths, weaknesses, and risks
  2. defining the requirements of the second prototype
  3. planning and designing the second prototype
  4. constructing and testing the second prototype
Advantages :
The spiral model promotes quality assurance through prototyping at each stage in systems development.

Read More >>

Friday, February 20, 2009

Definition of Information

Information

Information is data that processed become better form and more meaning to accept it. If data is not useful to accept it so the data cannot be referred as by information.

The quality of information

- Accurate is measured by comparing the data to actual events .Payroll information must be exact or accurate. For example the information must be simple, not confusing and true free from mistakes.

- Timeliness
The information likes real time system. Its means that the information comes to user can not be late.

- Relevance
It means the information must have advantages and useful for users.
Information is relevant if it leads to improved decision making. It might also be relevant if it reaffirms a previous decision.

Value of information is depending on 2 factor, advantages and cost.
An information has a high value if the advantages more effective than the cost to get it.

Source : Analisis dan Desain. Prof.Dr Jogiyanto HM,MBA,Akt. Penerbit Andi: Yogyakarta 2005
Read More >>

Definition of System

System

There are two approaches to define the system

1. Procedure Approach

Definition of procedure by Jerry FitzGerald, Ardra F. FitzGerald and Warren D. Stallings as that :
A procedure is a good arrangement of step by step instruction, that to explane what must i do (what), who must to do it (who), when to do it (when), and how to do it (how).

Definition of System based on procedure approach is a work of network from procedures which is having a mutual connection and together to do the activity or to finish a certain target.

2. Element Approach

Definition of system based on element approach is interacted a group of elements to achieve a certain goal.

A system have definite porpuse. Some people said, meaning of a system is to reach a purpose(goal), and some people said to reach a target (objectives).


The characteristic of the system

- Components of system
An integrated a set of components for collecting, storing and communicating information.

- Boundary of system
Boundary of system is scope area between another system and environment.

- Environment
Environment means is everything outside the system boundary.

- Interface
Link between subsystems to another subsystem

- input
The Energy entered into system. Input can be the treatment input ( input maintenance) and input of signal ( input signal).be the example of in computer system, treatment input is a programe, input of signal is a data.

- output
The Result of energy is processed and classified to be output which usefull and rest of dismissal. Example of the system of computer, the hot that yielded is the rest of dismissal, while information is output which good for.

- Processing
A process from input to be output

- Goal
It’s functioning because there are limits to what it can do and how it can achieve its purpose within its environment


Classification of system
Definition 1 :
1. Abstraction system : system in the form of idea.
2. Physical system : existing system physically.
Definition 2 :
1. Natural system : the system that occur passing natural’s process , the system doesn’t made by human (circle of earth).
2. Artificial system : the system that created by human (Human-Machine System).
Definition 3 :
1. Specifics system : the system operate with attitude that can be predicted.
2. Unspecific system : the system that futures condition doesn’t be predicted.
Definition 4 :
1. Closed’s system : the system doesn’t relation and effect the outside’s environment.
2. Open’s system : the system is relation and effect the outside’s environment

Source : Analisis & Desain. Prof.Dr. Jogiyanto HM,MBA,Akt. Penerbit Andi: Yogyakarta 2005
Read More >>