Sei sulla pagina 1di 7

SECTION 8 Systems Analysis and Design

Recommended Prior Knowledge


Students will have used computers for basic word processing, databases and spreadsheet work. They should have covered all previous sections of the syllabus and
the relevant aspects of the practical syllabus.

Context
This section should be the eighth section studied by the students. It builds on the knowledge obtained from studying all the previous sections.

Outline
This section describes the approach to the solution of IT problems using systems design and analysis.

Sub section 8.1 Analysis


Section Learning Outcomes Suggested Teaching Activities Online Resources Other resources
8.1a Describe different methods of researching Describe each method and discuss http://www.bbc.co.uk/schools/gcs (Walmsley, et. al., 2004,
a situation, such as: situations when each method is more ebitesize/ict/system/1implementin Chapter 19)
• observation, appropriate than the alternatives for a grev2.shtml
• interviews, given situation. (Leadbetter, & Wainwright,
• questionnaires, 2004, 3)
• examination of existing
documentation.

8.1b State the need for establishing the inputs, This is just making sure students http://www.school- (Walmsley, et. al., 2004,
outputs and processing in both the existing understand that this must be done not that resources.co.uk/Analysis.htm Chapter 19)
system and the proposed system. they have to be capable of doing it.
(Leadbetter, & Wainwright,
2004, 3)

8.1c State the need for recording information Emphasise that without records of the http://www.bbc.co.uk/schools/gcs (Walmsley, et. al., 2004,
about the current system. current system it would be very difficult to ebitesize/ict/software/ Chapter 19)
know what to replace it with.
(Leadbetter, & Wainwright,
2004, 3)
Section Learning Outcomes Suggested Teaching Activities Online Resources Other resources
8.1d State the need for identifying problems with This need must be specified. (Walmsley, et. al., 2004,
the current system. Chapter 19)

(Leadbetter, & Wainwright,


2004, 3)

8.1e State the need for identifying suitable Having analysed the existing system http://www.bbc.co.uk/schools/gcs (Walmsley, et. al., 2004,
hardware and software for developing a students should be encouraged to begin ebitesize/ict/system/1implementin Chapter 19)
new system. thinking of what the hardware and grev4.shtml
software requirements of the new system (Leadbetter, & Wainwright,
will be. 2004, 3)

8.1f State the need for identifying the user and This is just the understanding that having (Walmsley, et. al., 2004,
information requirements necessary to examined all the information which has Chapter 19)
resolve the identified problems. been collected about the existing system,
the user and information requirements of (Leadbetter, & Wainwright,
the new system must now be identified. 2004, 3)

8.1g State the need for specifying the required This can be done at the end of the http://www.bbc.co.uk/schools/gcs (Walmsley, et. al., 2004,
hardware and software. analysis section or during the design ebitesize/ict/system/1implementin Chapter 19)
stage. grev4.shtml
(Leadbetter, & Wainwright,
2004, 3)
Sub section 8.2 Design
Section Learning Outcomes Suggested Teaching Activities Online Resources Other resources
8.2a State the need for producing designs for: It should be explained that before these http://www.bbc.co.uk/schools/gcs (Walmsley, et. al., 2004,
• documents, essential items can be implemented it is ebitesize/ict/system/1implementin Chapter 19)
• files, necessary to design them. grev5.shtml
• forms/inputs, (Leadbetter, & Wainwright,
• reports/outputs 2004, 4)
• validation.

8.2b Design data capture forms and screen Students should be taught what the best http://www.bbc.co.uk/schools/gcs (Walmsley, et. al., 2004,
layouts to solve a given problem. features of these are and how to produce ebitesize/ict/system/1implementin Chapter 19)
them. grev5.shtml
(Leadbetter, & Wainwright,
2004, 4)

8.2c Design reports layouts and screen displays Students can make use of their practical http://www.bbc.co.uk/schools/gcs (Walmsley, et. al., 2004,
to solve a given problem. studies here. Emphasis should be placed ebitesize/ict/software/ Chapter 19)
on the design and the fact that it is not
necessary to use a computer at this stage. (Leadbetter, & Wainwright,
2004, 4)

8.2d Design validation routines to solve a given Checks should be understood, such as: http://www.theteacher99.btinterne Sargent, & Walmsley, 2003,
problem. • length, t.co.uk/theteacher/gcse/newgcse/ Chapter 9)
• range, module5/task10.htm
• invalid character, (Leadbetter, & Wainwright,
• format, 2004, 12.3)
• presence,
• existency,
• check digit,
• hash totals.

Length check is an exact check of length.


Section Learning Outcomes Suggested Teaching Activities Online Resources Other resources
Be careful about misunderstandings that
certain sources have. Setting the length
and type of a field is not necessarily
validation. A length check must be an
exact number of characters and should
not be confused with length of surname,
for example, where the data entered can
acceptably be entered when less than the
field length. For the sake of this syllabus a
spell checker is not a method of validation
as it is possible for incorrectly spelt words
to still be valid and vice versa.

8.2e Design the required data/file structures to Make use of the knowledge gained from (Walmsley, et. al., 2004,
solve a given problem. Practical unit section 3 Chapter 19)

(Leadbetter, & Wainwright,


2004, 4)
Sub section 8.3 Implementation
Section Learning Outcomes Suggested Teaching Activities Online Resources Other resources
8.3a Identify the different methods of system Pupils should be taught the correct http://www.bbc.co.uk/schools/gcs (Walmsley, et. al., 2004,
implementation, such as: terminology and the definition of each. ebitesize/ict/system/1implementin Chapter 19)
• parallel running, grev6.shtml
• phased implementation, (Leadbetter, & Wainwright,
• direct changeover. http://www.theteacher99.btinterne 2004, 5.2)
t.co.uk/theteacher/gcse/newgcse/
module6/task12.htm
8.3b Identify suitable situations for the use of the Examples of the above should be given of http://www.bbc.co.uk/schools/gcs (Walmsley, et. al., 2004,
methods in 8.3a, giving advantages and which one is appropriate for a particular ebitesize/ict/system/1implementin Chapter 19)
disadvantages of each. situation. grev6.shtml
(Leadbetter, & Wainwright,
http://www.theteacher99.btinterne 2004, 5.2)
t.co.uk/theteacher/newalevel/cp1
_1_8.htm

8.3c State testing strategies that would be It is important that students understand http://www.theteacher99.btinterne (Walmsley, et. al., 2004, Chpts
employed in implementing the new system, the difference between normal, abnormal t.co.uk/theteacher/gcse/newgcse/ 9 & 19)
such as: and extreme data. Simple examples using others/testing.htm
• the use of normal, data for examination scores would be (Leadbetter, & Wainwright,
• abnormal, useful. The knowledge should be gained 2004, 7)
• extreme data, that there is no substitute for the use of
• as well as the use of test data, live data to test a system.
• real/live data.

8.3d Identify improvements that could be Ensure that students realise that testing is (Walmsley, et. al., 2004, Chpts
needed as a result of testing. not an end in itself. It must lead to 9 & 19)
improvements in a system being made.
(Leadbetter, & Wainwright,
2004, 7)
Sub section 8.4 Verification
Section Learning Outcomes Suggested Teaching Activities Online Resources Other resources
8.4a Identify the need for, and the different Get students to compare data in a http://www.theteacher99.btinterne Walmsley, et. al., 2004,
methods of, verification when entering data. database with data they have collected on t.co.uk/theteacher/gcse/newgcse/ Chapter 9)
a data capture form visually, highlighting module5/task9.htm
differences. Make sure they understand (Leadbetter, & Wainwright,
that verification is the process of checking http://www.bbc.co.uk/schools/gcs 2004, 12.3)
that data has been copied correctly ebitesize/ict/databases/3datavalid
NOT that it is correct in the first place. ationrev3.shtml
Ensure they know about double entry
methods used in business applications.

Sub section 8.5 Documentation


Section Learning Outcomes Suggested Teaching Activities Online Resources Other resources
8.5a Identify the components of technical Differentiate between the types of (Walmsley, et. al., 2004,
documentation for an information system, documentation which are needed to Chapter 19)
such as: support a system. Explain who would use
• program coding, technical documentation (a programmer / (Leadbetter, & Wainwright,
• program flowcharts, systems analyst) and why their needs are 2004, 8.5)
• system flowcharts, different to an ordinary user of a system.
• hardware and software requirements,
• file structures,
• list of variables,
• validation routines.

8.5b Identify the components of user Explain why the needs of a user are often http://www.bbc.co.uk/schools/gcs (Walmsley, et. al., 2004,
documentation for an information system, simpler than a programmer or systems ebitesize/ict/system/1implementin Chapter 19)
such as: analyst. grev6.shtml
• purpose and limitations, (Leadbetter, & Wainwright,
• hardware and software requirements, 2004, 8.5)
• how to use the system,
• input and output formats,
• sample runs,
• error messages,
• trouble-shooting guide.
Sub section 8.6 Evaluation

Section Learning Outcomes Suggested Teaching Activities Online Resources Other resources
8.6a State the need for evaluating a new system Remind students that systems analysis http://www.bbc.co.uk/schools/gcs (Walmsley, et. al., 2004,
in terms of the efficiency, ease of use, and and design is a cycle and ends with ebitesize/ict/system/1implementin Chapter 19)
appropriateness of the solution. evaluation which might then become the grev7.shtml
first stage in the new cycle. (Leadbetter, & Wainwright,
2004, 7.1)

8.6b State the need for comparing the solution A good evaluation will always start by (Walmsley, et. al., 2004,
with the original task requirements. comparing the system which has been Chapter 19)
produced with the original problem and
requirements of the solution. (Leadbetter, & Wainwright,
2004, 7.1)

8.6c State the need for identifying any This is the point at which faults with the (Walmsley, et. al., 2004,
limitations and necessary improvements to system (found during the testing stage) Chapter 19)
the system are identified. There should then be
suggestions as to how these faults should (Leadbetter, & Wainwright,
be rectified. 2004, 7.2)

8.6d State the need for evaluating the users' As well as testing the system with data it (Walmsley, et. al., 2004,
responses to the results of testing the is expected that the future users of this Chapter 19)
system. system will have the opportunity to test it
out and identify problems which the (Leadbetter, & Wainwright,
systems analyst might have failed to spot. 2004, 7.3)

Potrebbero piacerti anche