Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Presentation Style
Guidelines for entry displays for Web sites:
Provide an entry screen or home page.
Keep the number of graphics to a reasonable minimum.
Use large and colorful fonts for headings.
Use interesting images and buttons for links.
Presentation Style
Guidelines for entry displays for Web sites
(continued)
Use tables to enhance the layout.
Use the same graphics image on several Web pages.
Avoid overusing animation, sound, and other “busy”
elements.
Navigation
Navigation guidelines:
Use the three-clicks rule.
Promote the Web site.
Encourage your viewers to bookmark your site.
Output Production and XML
An XML document may be transformed into different
media types.
There are two methods:
Using cascading style sheets (CSS).
Using Extensible Style Language Transformations (XSLT).
Cascading Style Sheets (CSS)
CSS allows you to specify the font family, color, size,
and so on.
Styles may be set up for different media, such as
display, print, or handheld devices.
Styles do not allow you to select or sort XML
elements.
Extensible Style Language
Transformations (XSLT)
XSLT allows you to:
Select XML elements.
Sort.
Select data to be output.
Extensible Style Language
Transformations (XSLT)
Chapter 12
Designing Effective Input
Systems Analysis and Design
Kendall & Kendall
Sixth Edition
Major Topics
Input design
Form design
Display design
GUI screen design
GUI controls
Web design guidelines
Input Design Objectives
The quality of system input determines the quality of system
output.
Well-designed input objectives:
Effectiveness.
Accuracy.
Ease of use.
Consistency.
Simplicity.
Attractiveness.
Form Design
Guidelines for good form design:
Make forms easy to fill out.
Ensure that forms meet the purpose for which they are
designed.
Design forms to assure accurate completion.
Keep forms attractive.
Form Completion
To make forms easy to fill out, the following
techniques are used:
First, design forms with proper flow, from left to right and
top to bottom.
Second, group information logically using the seven
sections of a form.
Third, provide people with clear captions.
Captions tell the person completing the form what to put on a
blank line, space, or box.
Seven Sections of a Form
The seven sections of a form are:
Heading.
Identification and access.
Instructions.
Body.
Signature and verification.
Totals.
Comments.
Seven Sections of a Form
Caption Types
Captions may be one of the following:
Line caption, putting the caption on the same line or
below the line.
Boxed caption, providing a box for data instead of a line.
Vertical check off, lining up choices or alternatives
vertically.
Horizontal check off, lining up choices or alternatives
horizontally.
Caption Types
Meeting the Intended Purpose
Systems analysts may use different types of specialty
forms for different purposes.
Specialty forms can also mean forms prepared by a
stationer.
Ensuring Accurate Completion
To reduce error rates associated with data collection,
forms should be designed to assure accurate
completion.
Design forms to make people do the right thing with
the form.
To encourage people to complete forms, systems
analysts should keep forms attractive.
Attractive Forms
To be more attractive, forms should look uncluttered,
and elicit information in the expected order.
Aesthetic forms or usage of different fonts and line
weights within the same form can help make it
more attractive.
Computer Form Design Software
Numerous microcomputer form design software is available.
Features of electronic form design software:
Ability to design paper, electronic, or Web- based forms.
Form design using templates.
Form design by cutting and pasting familiar shapes and objects.
Computer Form Design Software
(Continued)
Features of the electronic form design software
Facilitates completion through the use of software.
Permits customized menus, toolbars, keyboards, and
macros.
Supports popular databases.
Enables broadcasting of electronic forms.
Permits sequential routing of forms.
Computer Form Design Software
(Continued)
Features of electronic form design software
Assists form tracking.
Encourages automatic delivery and processing.
Establishes security for electronic forms.
Controlling Business Forms
Controlling forms include:
Making sure that each form in use fulfills its specific
purpose.
Making sure that the specified purpose is integral to
organizational functioning.
Preventing duplication of information collected and the
forms that collect it.
Designing effective forms.
Controlling Business Forms
(Continued)
Controlling forms include:
Attributive Entity
An attributive Entity - describes attributes, especially
repeating elements.
Entity-Relationship
Diagram Symbols
Relationships
Relationships may be:
One-to-one.
One-to-many.
Many-to-many.
A single vertical line represents one.
A circle represents zero or none.
A crows foot represents many.
Relationships
Self-Join
A self-join is when a record has a relationship with
another record on the same file.
Entity-Relationship Diagram Example
Attributes, Records, and Keys
Attributes are a characteristic of an entity,
sometimes called a data item.
Records are a collection of data items that have
something in common.
Keys are data items in a record used to identify the
record.
Key Types
Key types are:
Primary key, unique for the record.
Secondary key, a key which may not be unique, used to
select a group of records.
Concatenated key, a combination of two or more data
items for the key.
Foreign key, a data item in one record that is the key of
another record.
Files
A file contains groups of records used to provide
information for operations, planning, management,
and decision making.
Files can be used for storing data for an indefinite
period of time, or they can be used to store data
temporarily for a specific purpose.
File Types
Types of files available are:
Master file.
Table file.
Transaction file.
Work file.
Report file.
Master and Transaction Files
Master files
Have large records
Contain all pertinent information about an entity
Transaction records
Are short records
Contain information used to update master files
File Organization
The different organizational structures for file design
are:
Sequential organization.
Linked lists.
Hashed file organization.
Databases
A database is intended to be shared by many users.
There are three structures for storing database files:
Relational database structures.
Hierarchical database structures (older).
Network database structures (older).
Logical and Physical Database Design
Normalization
Normalization is the transformation of complex user
views and data to a set of smaller, stable, and
easily maintainable data structures.
Normalization (Continued)
Normalization creates data that are stored only once
on a file.
The exception is key fields.
The data structures are simpler and more stable.
The data is more easily maintained.
Three Steps of Data Normalization
The three steps of data normalization are:
Remove all repeating groups and identify the primary key.
Ensure that all nonkey attributes are fully dependent on
the primary key.
Remove any transitive dependencies, attributes that are
dependent on other nonkey attributes.
Three Steps of Normalization
Data Model Diagrams
Data model diagrams are used to show relationships
between attributes.
An oval represents an attribute.
A single arrow line represents one.
A double arrow line represents many.
Data Model Example
First Normal Form (1NF)
Remove any repeating groups.
All repeating groups are moved into a new table.
Foreign keys are used to link the tables.
When a relation contains no repeating groups, it is in
the first normal form.
Second Normal Form (2NF)
Remove any partial dependencies.
A partial dependency is when the data are only
dependent on a part of a key field.
A relation is created for the data that are only
dependent on part of the key and another for data
that are dependent on both parts.
Third Normal Form (3NF)
Remove any transitive dependencies.
A transitive dependency is when a relation contains
data that are not part of the entity.
The problem with transitive dependencies is
updating the data.
A single data item may be present on many records.
Entity-Relationship Diagram and
Record Keys
The entity-relationship diagram may be used to determine
record keys.
When the relationship is one-to-many, the primary key of the file at
the one end of the relationship should be contained as a foreign
key on the file at the many end of the relationship.
A many-to-many relationship should be divided into two one-to-
many relationships with an associative entity in the middle.
Guidelines for Creating Master Files or
Database Relations
Guidelines for creating master files or database
relations are:
Each separate entity should have it's own master file or
database relation.
A specific, nonkey data field should exist on only one
master file or relation.
Each master file or relation should have programs to
create, read, update, and delete records.
Integrity Constraints
There are three integrity constraints that help to
ensure that the database contains accurate data:
Entity integrity constraints, which govern the composition
of primary keys.
Referential integrity, which governs the denature of
records in a one-to-many relationship.
Domain integrity.
Entity Integrity
Entity integrity constraints are rules for primary
keys:
The primary key cannot have a null value.
If the primary key is a composite key, none of the fields in
the key can contain a null value.
Referential Integrity
Referential integrity governs the denature of records
in a one-to-many relationship.
Referential integrity means that all foreign keys in
one table (the child table) must have a matching
record in the parent table.
Referential Integrity (Continued)
Referential integrity includes:
You cannot add a record without a matching foreign key
record.
You cannot change a primary key that has matching child
table records.
A child table has a foreign key for a different record.
You cannot delete a record that has child records.
Referential Integrity
A restricted database updates or deletes a key only if
there are no matching child records.
A cascaded database will delete or update all child
records when a parent record is deleted or
changed.
The parent triggers the changes.
Domain Integrity
Domain integrity defines rules that ensure that only
valid data are stored on database records
Domain integrity has two forms:
Check constraints, which are defined at the table level.
Rules, which are defined as separate objects and may be used
within a number of fields.
Retrieving and Presenting Database
Data
The guidelines to retrieve and present data are:
Choose a relation from the database.
Join two relations together.
Project columns from the relation.
Select rows from the relation.
Derive new attributes.
Index or sort rows.
Calculate totals and performance measures.
Present data.
Denormalization
Denormalization is the process of taking the logical
data model and transforming it into an efficient
physical model.
Data Warehouses
Data warehouses are used to organize information
for quick and effective queries.
Data Warehouses and Database
Differences
In the data warehouse, data are organized around major
subjects.
Data in the warehouse are stored as summarized rather than
detailed raw data.
Data in the data warehouse cover a much longer time frame
than in a traditional transaction-oriented database.
Data Warehouses and Database
Differences (Continued)
Data warehouses are organized for fast queries.
Data warehouses are usually optimized for answering
complex queries, known as OLAP.
Data warehouses allow for easy access via data-
mining software called software.
Data Warehouses and Database
Differences (Continued)
Data warehouses include multiple databases that
have been processed so that data are uniformly
defined, containing what is referred to as “clean”
data.
Data warehouses usually contain data from outside
sources.
Online Analytic Processing (OLAP)
Online analytic processing (OLAP) is meant to answer
decision makers’ complex questions by defining a
multidimensional database.
Data mining, or knowledge data discovery (KDD), is the
process of identifying patterns that a human is incapable
of detecting.
Data Mining Decision Aids
Data mining has a number of decision aids
available, including:
Statistical analysis.
Decision trees.
Neural networks.
Intelligent agents.
Fuzzy logic.
Data visualization.
Data Mining Patterns
Data mining patterns that decision makers try to
identify include:
Associations, patterns that occur together.
Sequences, patterns of actions that take place over a
period of time.
Clustering, patterns that develop among groups of people.
Trends, the patterns that are noticed over a period of
time.
Web Based Databases and XML
Web-based databases are used for sharing data.
Extensible markup language (XML) is used to define
data used primarily for business data exchange
over the Web.
Chapter 14
Designing User Interfaces
Systems Analysis and Design
Kendall & Kendall
Sixth Edition
Major Topics
User interfaces
Dialogue guidelines
Feedback
Help
Ecommerce dialogue
Data mining
Ergonomics
The User Interface
The user interface is the system that helps users
communicate with the computer system and/or the
application system
User Interface Design Objectives
To design a better user interface, use the following
objectives:
Match the user interface to the task.
Make the user interface efficient.
Provide appropriate feedback to users.
Generate usable queries.
Improve productivity of knowledge workers.
Components of the User Interface
The user interface has two main components:
Presentation language, which is the computer-to-human
part of the transaction.
Action language that characterizes the human-to-
computer portion.
Types of User Interfaces
There are several types of user interfaces:
Natural-language interfaces.
Question-and-answer interfaces.
A menu interface.
Form-fill interfaces.
Command-language interfaces.
Graphical User Interfaces (GUIs).
Natural-Language Interfaces
Natural-language interfaces permit users to interact
with the computer in their everyday or "natural"
language.
Question-and-Answer Interfaces
The computer displays a question for the user on the
screen.
The user enters an answer via the keyboard or a mouse
click.
The computer acts on that input information in a
preprogrammed manner.
New users may find the question-and-answer interface
most comfortable.
A Menu Interface
A menu interface, that provides the user with an
onscreen list of available selections.
A nested menu is a menu that can be reached
through another menu.
Advantages of Nested Menus
The advantages of nested menus are:
Less cluttered screen.
Eliminate menu options which do not interest a user.
Allow users to move quickly through the program.
Graphical User Interface (GUI) Menus
GUI menus guidelines:
The main menu is always on the screen.
The main menu uses single words.
The main menu should have secondary menus grouped
into similar features.
Graphical User Interface (GUI) Menus
GUI menus guidelines (continued):
The secondary drop-down menus often consist of more
than one word.
Secondary options perform actions or display additional
menu options.
Menu items in grey are unavailable for the current
activity.
Form-Fill Interfaces
Form-fill interfaces are onscreen forms displaying
fields containing data items or parameters that
need to be communicated to the user.
Form-fill interfaces may be implemented using the
Web.
Advantages and Disadvantages of
Web Forms
Advantages of using a Web-based form are:
User enters the data.
Data may be entered 24 hours a day, globally.
Disadvantages of a Web-based form are:
The experienced user may become impatient with input/output
forms.
Command-Language Interfaces
Allow the user to control the application with a series
of keystrokes, commands, phrases, or some
sequence of these.
Require memorization of syntax rules.
May be an obstacle for inexperienced users.
Graphical User Interfaces (GUIs)
Allow direct manipulation of the graphical
representation on the screen.
Can be accomplished with keyboard input, joystick, or
mouse.
Requires more system sophistication than other
interfaces.
Voice or Speech Recognition
Voice or speech recognition systems are developing
rapidly
There are two different types of voice recognition:
Continuous speech systems, allowing for dictation.
Speaker independence, so people can enter commands or
words at a given workstation.
Evaluating User Interfaces
The five useful standards in evaluating the
interfaces are:
The training period for users should be acceptably short.
Users early in their training should be able to enter
commands without thinking about them, or referring to a
help menu or manual.
Evaluating User Interfaces
The five useful standards in evaluating the interfaces are
(continued):
The interface should be seamless so that errors are few, and those
that do occur are not occurring because of poor design.
Time necessary for users and the system to bounce back from
errors should be short.
Infrequent users should be able to relearn the system quickly.
Dialog
Dialog is the communication between a person and
the computer
Three key points to be considered are:
Meaningful communication.
Minimal user action.
Standard operation and consistency.
Communication
Communication means that the user understands the
information that is being presented
Users with less skill require a greater amount of
communication
Provide easy to use help screens
Often these contain hyperlinks to other related help
topics
Minimal User Action
Minimal user action is achieved by:
Entering codes instead of code meanings.
Enter only data that are not stored on files.
Not requiring users to enter editing characters.
Supplying default values on entry screens.
Providing inquiry, change, or delete programs with short
entry fields.
Minimal User Action
Minimal user action is achieved by:
Providing keystrokes for selecting menu options that are
normally selected using a mouse
Selecting codes from a pull-down menu on a GUI
screen
Standard Operation
Standard operation is achieved by:
Keeping header and footer information in the same
locations for all screens.
Using the same keystrokes to exit a program.
Using the same keystroke to cancel a transaction.
Using a standard key for obtaining help.
Standard Operation
Standard operation is achieved by (continued):
Standardized use of icons when using graphical user interface
screens.
Consistent use of terminology within a screen or Web site.
Providing a consistent way to navigate through the dialog.
Consistent font alignment, size, and color on a Web page.
Tab Control Dialogue Boxes
Tab control dialog boxes are a feature of GUI design.
They should have logically grouped functions on each
tab.
Each tab dialog box should have OK, Cancel or Apply,
and perhaps Help buttons.
Feedback
All systems require feedback in order to monitor
and change behavior by:
Comparing current behavior with predetermined goals.
Giving back information describing the gap between
actual and intended performance.
Types of Feedback
Feedback to the user is necessary in seven distinct
situations:
The computer has accepted the input.
The input is in the correct form.
The input is not in the correct form.
There will be a delay in processing.
The request has been completed.
The computer cannot complete the request.
More detailed feedback is available.
Program Help
Program help comes in a variety of ways:
Pressing a function key, such as F1.
A GUI pull-down menu.
Context-sensitive help, specific for the operation being
performed.
Iconic help, obtained when a cursor is left over an icon for
a few seconds.
Program Help
Program help comes in a variety of ways (continued):
Wizards, which provide a series of questions and answers
when trying to perform an operation
Telephone help desks provided by the software
manufacturer
Software forums on nation wide bulletin boards
Ecommerce Dialog
Extra considerations are needed when developing
ecommerce Web sites.
Feedback needs to be solicited from customers,
using either of two methods:
Launch the user’s email program.
Create a blank feedback template with a submit button
labeled “feedback”.
Intuitive Navigation for Ecommerce
Sites
Intuitive navigation should be designed for:
Creating a rollover menu.
Building a collection of hierarchical links.
Placing a site map on the home page and emphasizing the link to it
from every page on the site.
Placing a navigational bar on every inside page that repeats the
categories used on the entry screen.
Types of Queries
The six different types of queries are :
Obtain specified data for a particular entity.
Find a group of entities that have certain characteristics.
Find attributes for an entity for certain characteristics.
Display all the attributes for a certain entity.
Types of Queries
The different types of queries are (continued):
Find all entities with a certain characteristic.
List attributes for all entities for certain characteristics.
Entities, Attributes, and Values
Query Notation
V is value, E is entity, A is attributes, variables in
parentheses are given:
Query type 1: V <--- (E,A)
Query type 2: E <--- (V,A)
Query type 3: A <--- (V,E)
Query type 4: V <--- (E, all A)
Query type 5: E <--- (V, all A)
Query type 6: A <--- (V, all E)
Methods for Implementing Queries
There are two methods for implementing database
queries:
Query By Example (QBE), which allows users to select
fields and specify conditions using a grid.
Structured Query Language (SQL), which uses a series of
keywords and commands to select the rows and
columns that should be displayed.
SQL Example
Parameter Queries
A parameter query allows users to enter a value to
select records without changing the query syntax.
Web Searches
Web searches uses search engines to answer a
query.
Guidelines for searching the Web are:
Decide whether to search or surf the Web.
Think of the key terms before searching.
Construct the search questions logically, with attention to
the use of AND and OR search logic.
Web Searches
Guidelines for searching the Web are (continued):
Use a metasearch engine that saves your searches
Use a search engine that informs you of changes in the
Web sites you select
Look for new search engines periodically
Data Mining
Data mining is gathering a large amount of
information about a person and their habits and
using that information as a predictor of future
behavior.
It must be carefully and ethically used to avoid
infringing on an individual’s privacy.
Data Mining