Date
|
Subject(PGD)
|
27th Monday 9.00
a.m. – 10.30 a.m.
|
CSM
|
27th Monday 10.30
a.m. – 12.00 noon
|
MIS
|
28th Tuesday 9.00 a.m. – 10.30 a.m.
|
KBS
|
28th Tuesday 10.30 a.m. – 12.00 noon
|
RUID
|
28th Tuesday 1.30
p.m. – 3.30 p.m.
|
SE2
|
Date
|
Subject(Diploma)
|
29th Wednesday 9.00
a.m. – 10.30 a.m.
|
CORE
|
29th Wednesday 10.30
a.m. – 12.00 noon
|
ITPM
|
30th Thursday 9.00
a.m. – 10.30 a.m.
|
ITSM
|
30th Thursday 10.30
a.m. – 12.00 noon
|
PIT
|
Free BCS support, BCS Lecture Notes, Subject Selection BCS Certificate Level lecture Notes BCS Diploma Level lecture Notes BCS PGD Level lecture Notes
Tuesday, October 7, 2014
BCS TIME TABLE (MORNING) - FOR APRIL 2015
BCS Class( EVENING) Time table for April 2015
Date
|
Subject(Diploma)
|
27th Monday 6.00 p.m. – 7.30 p.m.
|
CORE
|
27th Monday 7.30 p.m. – 9.00 p.m.
|
ITSM
|
28th Tuesday 6.00 p.m. – 7.30 p.m.
|
ITPM
|
28th Tuesday 7.30 p.m. - 9.00 p.m.
|
PIT
|
Date
|
Subject(PGD)
|
29th Wednesday 6.00 p.m. – 7.30 p.m.
|
CSM
|
29th Wednesday 7.30 p.m. – 9.00 p.m.
|
MIS
|
30th Thursday 6.00 p.m.- 7.30
p.m.
|
KBS
|
30th Thursday 7.30 p.m. – 9.00 p.m.
|
SE2
|
|
|
Monday, September 22, 2014
BCS/PGD/ITE/ REMOTE SENSING
- LIDAR
LIDAR, which stands
for Light Detection and Ranging, is a remote sensing method that
uses light in the form of a pulsed laser to measure ranges (variable distances)
to the Earth. These light pulses—combined with other data recorded by the
airborne system— generate precise, three-dimensional information about the
shape of the Earth and its surface characteristics.
A LIDAR instrument principally
consists of a laser, a scanner, and a specialized GPS receiver. Airplanes
and helicopters are the most commonly used platforms for acquiring LIDAR data
over broad areas.
LIDAR systems allow scientists
and mapping professionals to examine both natural and manmade environments
with accuracy, precision, and flexibility. NOAA scientists are using LIDAR
to produce more accurate shoreline maps, make digital elevation models for use
in geographic information systems, to assist in emergency response operations,
and in many other applications.
Extra Reading
LIDAR (Light Detection and
Ranging) is an optical remote sensing technology that measures properties of
scattered light to find range and/or other information of a distant target.
LIDAR data is often collected by
air, such as with this NOAA (National Oceanic and Atmospheric Administration) survey
aircraft (top) over Bixby Bridge in Big Sur, Calif. Here, LIDAR data reveals a
top-down (bottom left) and profile view of Bixby Bridge. NOAA scientists use
LIDAR-generated products to examine both natural and manmade environments.
LIDAR data supports activities such as inundation and storm surge modeling,
hydrodynamic modeling, shoreline mapping, emergency response, hydrographical
surveying, and coastal vulnerability analysis.
Radiometry & Photometry
An overview of the science of
measuring light
Radiometry is the science of measuring light in any portion of the
electromagnetic spectrum. In practice, the term is usually limited to the
measurement of infrared, visible, and ultraviolet light using optical instruments.
Irradiance is the intensity of light and is measured in watts per square meter.
Photometry is the science of measuring visible light in units that
are weighted according to the sensitivity of the human eye. It is a
quantitative science based on a statistical model of the human visual response
to light - that is, our perception of light - under carefully controlled
conditions. The photometric equivalent of Radiance is called Illuminance and is
measured in Lumens per square meter (Lux)The human visual system responds to
the light in the electromagnetic spectrum with wavelengths ranging from 380 to
770 nanometers (nm). We see light of different wavelengths as a continuum of
colors ranging through the visible spectrum: 650 nm is red, 540 nm is green,
450 nm is blue, and so on.
Photographic interpretation is
“the act of examining photographic images for the purpose of
identifying objects and judging their significance” (Colwell, 1997). This
mainly refers to its usage in military aerial reconnaissance using
photographs taken from reconnaissance aircraft..
Thermal imaging is a
method of improving visibility of objects in a dark environment by detecting
the objects' infrared radiation and creating an image based on that
information.
Thermal imaging,
near-infrared illumination, low-light imaging and are the three most
commonly used night vision technologies.
Unlike the other two methods, thermal imaging works in environments without any
ambient light. Like near-infrared illumination, thermal imaging can penetrate obscurantist such as smoke, fog and haze.
Extra reading
Here's a brief
explanation of how thermal imaging works: All objects emit infrared energy
(heat) as a function of their temperature. The infrared energy emitted by an
object is known as its heat
signature. In general, the hotter an object is, the more radiation it
emits. A thermal imager (also known as a thermal camera) is essentially a heat
sensor that is capable of detecting tiny differences in temperature. The device
collects the infrared radiation from objects in the scene and creates an
electronic image based on information about the temperature differences.
Because objects are rarely precisely the same temperature as other objects
around them, a thermal camera can detect them and they will appear as distinct
in a thermal image.
Thursday, August 28, 2014
BCS/DIP/ITPM/TUTORIAL 01
DEFINITION
A Project is a temporary endeavor undertaken to create a unique product, service or a result.
A Project is a temporary endeavor undertaken to create a unique product, service or a result.
Project Management is about applying our knowledge, skills, tools and techniques to
project activities to meet project requirements.
1.)
List and explain very briefly
the four main criteria for assessing the success of a project.
Ø
Ø
Ø
Ø
2.)
For each of these factors
above, describe at least TWO potential problems that might arise to jeopardize
the eventual success of the project.
3.)
What is the purpose of a
business Case ?
4.)
Describe the main sections to
be found in a business case report.
a.
b.
c.
d.
e.
f.
5.)
Identify FOUR events which
might lead to an updating of the business case.
6.)
What are the main project
management Processes?
a.
Initiating Process: authorizing the
project or phase
b.
Planning
Process: define and verify requirements, objectives, goals and the way
forward.
c.
Executing
Process: coordinating people and other resources to carry out the plan
d.
Monitoring and Controlling
Process: measuring and monitoring progress
regularly
e.
Closing
Process: formalizing the completion of project
7.)
Define the word project Stakeholders?
Project
stakeholders are individuals and organizations that are actively involved in
the project, or whose interests may be affected as a result of project
execution or completion.
Ø Project Manager
Ø Project Sponsor
Ø Project team members
Ø Project Steering committee
Ø Customers
8.)
Identify the role and
responsibility of each and every stakeholder in the above.
9.)
Nine knowledge Areas of Project
Management.
10.) Explain the project
Development Life Cycle.
11.) Explain the advantages and disadvantages of In-house development,
outsourcing and cloud-computing.
In-house development
Outsourcing
Cloud computing
Off-the-shelf packages
Question A1
The Tyre-It Company sells and
fits tyres from a number of different manufacturers to a wide variety of motor
vehicles. This is a very competitive market and it is important that the
company always has a ready stock of the most popular car tyre brands. It must
also be able to answer immediately any telephone enquiry for the price and
number of tyres of a specific type available at that time.
In addition, good management
information and the strict control of costs are essential in order for the
organisation to maintain its competitive position.
It has become clear that the
existing computer-based stock system, which was developed by the in-house IT
section, is no longer adequate and a decision has been made by the Tyre-It
senior management to adopt a new more advanced stock recording and enquiry
system.
Some major tyre manufacturers
offer such systems as on off-the-shelf (OTS) package, but the Tyre-It
management are concerned that such packages might be too restrictive and thus
not suitable for the wide range of tyres that it sells. The alternative would
be to design and develop a new in-house system. However, the IT section has no
experience of on-line or cost-based systems.
Write a memorandum to
the Tyre-It management setting out the advantages and disadvantages of
acquiring an ‘off-the-shelf’ system as opposed to developing a new application
in-house using its own staff, bearing in mind the scenario outlines above
(15 marks)
A decision has been
made to acquire an off-the-shelf package. Describe the activities that would
now be needed to select and acquire the software and to set up a fully
operational stock system.
(10 marks)
Question A3
a) Explain the main reasons for using:
i) change control and
ii) configuration management
when developing a new in-house computer
system. Highlight at least TWO advantages and ONE disadvantage of each.
(12 marks)
b) List and explain briefly FIVE major
stages in the change control process.
(7 marks)
c) List and explain briefly the THREE major
elements of a configuration management system. (6 marks)
2011 –Sep
a) Costs and
benefits are two essential sections within a business case. List FIVE other
sections in a business case.(5
marks)
b)
List FIVE categories or types of benefits that are associated with an IT
project and provide an example for each one.(10 marks)
c) List FIVE
estimating techniques that can be used to identify costs.(5 marks)
d) There are
some projects that will be given approval even though the costs exceed the
benefits in the business case. Describe ONE example of when this might be
legitimate.(4 marks)
Question 1
a) Explain what is meant by a
successful project, giving the four main criteria of success. (4 marks)
b) Identify and describe SIX of
the major types of activity that would be carried out in a software development
project, highlighting those in which the eventual users should be involved and
explaining how. (6
marks)
c) A large distribution company
wishes to implement a new warehouse system, and is undecided whether to develop
the system internally (i.e. an “in-house system”) or to acquire and adapt an
“off-the-shelf” (OTS) package for this purpose.
For EACH of the six types of
activity listed in part b, compare the work to be undertaken for each of these
two possible methods of system development, highlighting the key
differences. (12 marks)
d) Identify one significant risk
specific to the “in-house” approach and one risk specific to the “OTS”
approach. (3
marks)
BCS / DIP / PGD/ CORE /CSM / COMPUTER MISUSE ACT 1990
The Computer Misuse Act (1990)
Hacking has been around almost as
long as the Internet; some people just love to try and break into a computer
system.
The Computer Misuse Act of 1990
is a law in the United Kingdom that makes certain activities illegal, such as hacking into
other people’s systems, misusing software, or helping a person to gain access
to protected files of someone else's computer. So, in 1990, the Computer
Misuse Act was passed.
The Computer Misuse Act (1990)
recognised the following new offences:
- Unauthorised access to computer material
The first section in the act
forbids a person to use someone else’s identification to access a computer, run
a program, or obtain any data, even if no personal gain is involved in such
access. Individuals also cannot change, copy, delete, or move a program. The
Computer Misuse Act also outlaws any attempts to obtain someone else’s
password. Obviously, if someone gives another person his identification and he
may legally use the computer, these laws under unauthorized access do not
apply.
- Unauthorised access with intent to commit or
facilitate a crime
The second provision in the law is gaining access to a
computer system in order to commit or facilitate a crime. An individual can’t
use someone else’s system to send material that might be offensive or to start worms or
viruses. He also can’t give someone his identification so that he can use a
system for this purpose. This second part means that the individual would be
facilitating someone else’s intent or crime.
- Unauthorised modification of computer
material.
Unauthorized modification in the Computer Misuse Act means
that a person can’t delete, change, or corrupt data. Again, if someone puts a
virus into someone else’s system, he would be violating the act. Usually,
committing unauthorized access only is thought a crime punishable by fine.
Access with intent and unauthorized modification are considered more severe and
may be punished by heavy fines and/or jail time.
3a. Making, supplying
or obtaining anything which can be used in computer misuse offences.
Making: This includes the writing or creation of computer viruses,
worms, trojans, malware, malicious scripts etc.
Supplying: This part covers the distribution of any of the above
material whether you have created it yourself or obtained it from elsewhere. It
is an offense to supply or distribute these files to others.
Obtaining: If you purposely obtain malicious files such as computer
viruses or scripts that you know could be used to damage computer systems then
you have committed an offence under the Computer Misuse Act.
Wednesday, August 27, 2014
BCS/DIP/CER/PGD/ BCS CODE OF CONDUCT SUMMARY
BCS Code of Conduct
As a professional body the British Computer
Society (known as BCS, the Chartered Institute for IT), has a responsibility to
set rules and professional standards to direct the behaviour of its members in
professional matters. It is expected that these rules and professional
standards will be higher than those established by the general law and that
they will be enforced through disciplinary action which can result in expulsion
from membership.
Members are expected to exercise
their own judgement (which should be made in such a way as to be reasonably
justified) to meet the requirements of the code and seek advice if in doubt.
- · sets out the professional standards required by BCS as a condition of membership.
- · applies to all members, irrespective of their membership grade, the role they fulfil, or the jurisdiction where they are employed or discharge their contractual obligations.
- · governs the conduct of the individual, not the nature of the business or ethics of any Relevant Authority*.
1. Public Interest
You shall:
a. have due regard for public health, privacy, security and wellbeing
of others and the environment.
b. have due regard for the legitimate rights of Third Parties*.
c. conduct your professional activities without discrimination on the
grounds of sex, sexual orientation, marital status, nationality, colour, race,
ethnic origin, religion, age or disability, or of any other condition or
requirement
d. promote equal access to the benefits of IT and seek to promote the
inclusion of all sectors in society wherever opportunities arise.
2. Professional Competence and Integrity
You shall:
a. only undertake to do work or provide a service that is within your
professional competence.
b. NOT claim any level of competence that you do not possess.
c. develop your professional knowledge, skills and competence on a
continuing basis, maintaining awareness of technological developments,
procedures, and standards that are relevant to your field.
d. ensure that you have the knowledge and understanding of Legislation*
and that you comply with such Legislation, in carrying out your professional
responsibilities.
e. respect and value alternative viewpoints and, seek, accept and offer
honest criticisms of work.
f. avoid injuring others, their property, reputation, or employment by
false or malicious or negligent action or inaction.
g. reject and will not make any offer of bribery or unethical
inducement.
3. Duty to Relevant Authority
You shall:
a. carry out
your professional responsibilities with due care and diligence in accordance
with the Relevant Authority’s requirements whilst exercising your professional
judgement at all times.
b. seek to
avoid any situation that may give rise to a conflict of interest between you
and your Relevant Authority.
c. accept
professional responsibility for your work and for the work of colleagues who
are defined in a given context as working under your supervision.
d. NOT disclose
or authorise to be disclosed, or use for personal gain or to benefit a third
party, confidential information except with the permission of your Relevant
Authority, or as required by Legislation.
e. NOT misrepresent
or withhold information on the performance of products, systems or services
(unless lawfully bound by a duty of confidentiality not to disclose such
information), or take advantage of the lack of relevant knowledge or
inexperience of others.
4. Duty to the Profession
You shall:
a. accept your personal duty to
uphold the reputation of the profession and not take any action which could
bring the profession into disrepute.
b. seek to improve professional
standards through participation in their development, use and enforcement.
c. uphold the reputation and good
standing of BCS, the Chartered Institute for IT.
d. act with integrity and respect
in your professional relationships with all members of BCS and with members of
other professions with whom you work in a professional capacity.
e. notify BCS if convicted of a
criminal offence or upon becoming bankrupt or disqualified as a Company
Director and in each case give details of the relevant jurisdiction.
f. encourage and support fellow members in their
professional development.
BCS/ PGD /SE2/MIS/CSM OR BCS/DIP/ITPM / CAPABILITY MATURITY MODEL(CMM)
The Capability
Maturity Model (CMM) is a methodology used to develop and refine an
organization's software development process. The model describes a five-level
evolutionary path of increasingly organized and systematically more mature
processes. CMM was developed and is promoted by the Software Engineering
Institute (SEI), a research and development center sponsored by the U.S.
Department of Defense.
The Software
Capability Maturity Model describes the principles and practices underlying
software process maturity and is intended to help software organizations
improve the maturity of their software processes in terms of an evolutionary
path from ad hoc, chaotic processes to mature, disciplined software processes.
It is important, as
it is an objective assessment of an organization’s software capability with a
proven approach to improvements.
SCMM has five levels:
Initial - The
software process is characterised as ad hoc, and occasionally even chaotic. Few
processes are defined and success depends on individual effort and heroics.
Repeatable - Basic
project management processes are established to track cost, schedule and
functionality. The necessary process discipline is in place to repeat earlier
successes on projects with similar applications.
Defined - The
software process for both management and engineering activities is documented,
standardised and integrated into a standard software process for the
organisation. All projects use an approved, tailored version of the
organisation's standard software process for developing and maintaining
software.
Managed - Detailed
measures of the software process and product quality are collected. Both the
software process and products are quantitatively understood and controlled.
Optimising -
Continuous process improvement is enabled by quantitative feedback from the
process and from piloting innovative ideas and technologies.
ISO Vs CMM
The CMM is similar to
ISO 9001, one of the ISO 9000 series of standards specified by the
International Organization for Standardization. The ISO 9000 standards specify
an effective quality system for manufacturing and service industries; ISO 9001
deals specifically with software development and maintenance. The main
difference between the two systems lies in their respective purposes: ISO 9001
specifies a minimal acceptable quality level for software processes, while the
CMM establishes a framework for continuous process improvement and is more
explicit than the ISO standard in defining the means to be employed to that
end.
BCS/CER/IS/Hard System Methodology(SSADM)
Hard System methodology
Hard problems
In hard systems approaches (or Structured
Systems Analysis and Design Methodology (SSADM)), rigid techniques and
procedures are used to provide unambiguous solutions to well-defined data and
processing problems. These focus on computer implementations.
·
Problems can be well defined
·
Assumption of definite goals & solutions
·
Can pre-define success criteria
·
Technologically-oriented
e.g. - SSADM
What is SSADM?
Stand for Structured Systems Analysis
and Design Method, a set of standards developed in the early 1980s
for systems analysis and application design widely used for government
computing projects in the United Kingdom. SSADM uses a combination of text and
diagrams throughout the whole life cycle of a system design, from the
initial design idea to the actual physical design of the application.
Stage 0: Feasibility
The Feasibility stage is a short
assessment of a proposed information system to determine if the system can meet
the business requirements of an organization, assuming the business case exists
for developing the system. The analyst considers possible problems faced by the
organization and produces various options to resolve these issues. Either the
organization or you must decide if the cost of resolving the problems is worth
the likely benefit to the project.
Stage 1: Investigation of the Current Environment
Detailed requirements are
collected and business models are built in the Investigation of the Current
Environment stage. This stage is where you develop a business-activity model,
investigate and define requirements, investigate current processing in the data
flow model, investigate current data and derive the logical view of current
services.
Stage 2: Business System Options
The Business Systems Options, or
BSO, stage allows the analyst and you to choose between a number of
business-system options that each describe the scope and functionality provided
by a particular development and implementation approach. After you present
these to management, the management then decides which BSO is the better
option.
Stage 3: Definition of Requirements
This stage specifies the details
in the processing and data requirements of the selected BSO option. In this
stage you define the required system processing, develop the required data
model, determine the systems for existing or new functions, develop the user
job specifications, enhance the required data model, develop specific
prototypes and confirm the system objectives.
Stage 4: Technical Systems Options
This stage allows you and the
analyst to consider the technical options. Details such as the terms of cost,
performance and impact on the organization is determined. You identify, define
and select the possible technical system option in this stage.
Stage 5: Logical Design
This stage involves you
specifying the new system through designing the menu structure and dialogues of
the required system. The steps in this stage include defining the user
dialogue, defining update processes and defining the inquiry processes.
Stage 6: Physical Design
This is the implementation phase
of SSADM. The Physical Design stage is used to specify the physical data and
process design use the language and features of the chosen environment and
incorporate installation standards. This stage concentrates on the environment
in which the new system will be running.
BCS/CER/IS/Soft System Methodology
Soft System Methodology
Soft problems
- · Difficult to define - they are problem situations
- · High social, political & human activity component
- · Sometimes wicked!
- · Soft systems thinking
Soft systems methodology is a
qualitative methodology developed by Peter Checkland and his colleagues at
Lancaster University. It applies systems concepts to qualitative research
(as does the Snyder process).
The 7-stage
description
1 The
problem situation unstructured
The problem situation is first experienced, as it is, by the
researcher. That is, the researcher makes as few presumptions about the
nature of the situation as possible.
2 The
problem situation expressed
In this step the researcher develops a detailed description,
a "rich picture", of the situation within which the problem occurs.
This is most often done diagrammatically.
Throughout the 7 stages, both and logic and the culture of
the situation are taken into account. These twin streams of enquiry,
logic and culture, are incorporated into the rich picture.
Checkland puts it this way. In addition to the logic
of the situation, the rich picture also tries to capture the relationships, the
value judgments people make, and the "feel" of the situation.
3 Root
definitions of relevant systems (CATWOE)
Now the "root definitions", the essence of
the relevant systems, are defined.
For the logical analysis, Checkland provides the mnemonic
CATWOE as a checklist for ensuring that the important features of the root
definitions are included:
·
Customers...................who
are system beneficiaries
·
Actors......................who
transform inputs to outputs
·
Transformation..............from
inputs into outputs
·
Weltanschauung..............the
relevant world views
·
Owner.......................the
persons with power of veto
·
Environmental
constraints...that need to be considered
"transformation" element is one of
the features that signal this as a "systems" approach.
The cultural analysis has three parts:
A role analysis, focusing on the intervention itself.
This seeks to identify the client, the would-be problem solver (the
researcher), and the problem owner (roughly, stakeholders). In the terms
that we used in earlier sessions you could think of this as the diagnostic part
of entry and contracting.
A social system analysis. This identifies, for the problem situation, three sets of elements: roles, norms, and values.
A political system analysis. This identifies the use of power in the problem situation.
A social system analysis. This identifies, for the problem situation, three sets of elements: roles, norms, and values.
A political system analysis. This identifies the use of power in the problem situation.
4 Making
and testing conceptual models
The researcher now draws upon her knowledge of systems
concepts and models. She develops descriptions, in system terms, of how
the relevant parts of the situation might ideally function.
One of the important questions here is: ideals from whose
point of view? If you adopt those who pay you as your client, you may well just
help the organisation exploit its members more effectively. If you adopt
everyone in the system as a client, you will avoid this problem. But
perhaps people outside the system will bear some of the cost of this.
Here, as elsewhere, a careful identification of stakeholders can make a large
difference to the outcomes.
5 Comparing
conceptual models with reality
The purpose is not to implement the conceptual models.
Rather, it is so that models and reality can be compared and contrasted.
The differences can be used as the basis for a discussion: how the relevant
systems work, how they might work, and what the implication of that might be.
6 Identify
feasible and desirable changes
From the discussion at step 5, certain possible changes are
identified. They are likely to vary in desirability and feasibility:
desirable: is it
technically an improvement?
feasible:
especially, does it fit the culture?
7 Action
to improve the problem situation
The most desirable and feasible changes identified at step 6
are now put into practice.
I would like now to offer a different
description. My hope is to do this in such a way that the cyclic nature
of the process, and the use of dialectic comparisons, are made more
evident.
Monday, August 25, 2014
BCS/ CER / IS / FEASIBILITY STUDY
Feasibility Study (TELOS)
Feasibility study is carried out
to select the best system that meets performance requirements.
The main aim of the feasibility study activity is to determine whether it would be financially and technically feasible to develop the product. The feasibility study activity involves the analysis of the problem and collection of all relevant information relating to the product such as the different data items which would be input to the system, the processing required to be carried out on these data, the output data required to be produced by the system as well as various constraints on the behavior of the system.
The main aim of the feasibility study activity is to determine whether it would be financially and technically feasible to develop the product. The feasibility study activity involves the analysis of the problem and collection of all relevant information relating to the product such as the different data items which would be input to the system, the processing required to be carried out on these data, the output data required to be produced by the system as well as various constraints on the behavior of the system.
Technical Feasibility
This is concerned with specifying equipment and
software that will successfully satisfy the user requirement. The technical
needs of the system may vary considerably, but might include :
• The facility to produce outputs in a given time.
• The facility to produce outputs in a given time.
• Response time under certain conditions.
• Ability to process a certain volume of
transaction at a particular speed.
• Facility to communicate data to distant
locations.
In examining technical feasibility, configuration of the system is
given more importance than the actual make of hardware. The configuration
should give the complete picture about the system’s requirements:
How many workstations are required, how these units are interconnected so that they could operate and communicate smoothly. What speeds of input and output should be achieved at particular quality of printing.
How many workstations are required, how these units are interconnected so that they could operate and communicate smoothly. What speeds of input and output should be achieved at particular quality of printing.
Economic Feasibility
Economic analysis is the most frequently used technique for evaluating the effectiveness of a proposed system. More commonly known as Cost / Benefit analysis, the procedure is to determine the benefits and savings that are expected from a proposed system and compare them with costs. If benefits outweigh costs, a decision is taken to design and implement the system. Otherwise, further justification or alternative in the proposed system will have to be made if it is to have a chance of being approved. This is an outgoing effort that improves in accuracy at each phase of the system life cycle.
Operational Feasibility
This is mainly related to human organizational and political aspects. The points to be considered are
• What changes will be brought with the system?
• What organizational structure are disturbed?
• What new skills will be required? Do the existing staff members have
these skills? If not, can they be trained in due course of time?
This feasibility study is carried out by a small group of people who are familiar with information system technique and are skilled in system analysis and design process.
Proposed projects are beneficial only if they can be turned into
information system that will meet the operating requirements of the
organization. This test of feasibility asks if the system will work when it is
developed and installed.
BCS / PGD/ MIS/ MIS Development (Approaches)
MIS Development
Traditional approach – development is undertaken in a series of
steps, with each one being completed before the next starts. Steps may be
requirements determination, design, coding, testing and installation.
Maintenance can be seen as the next cycle, or the last of the series of steps.
Another name used for the traditional approach is the waterfall approach, as it
can be depict as a waterfall from one stage to the next in the development
process. The motto of this approach is to “get things right first time” and
backtracking to a previous stage is seen as weakness in the quality of the work
within the previous stage. The approach is suitable for developments that have
static and clear requirements at the outset of the development.
Evolutionary approach – where a series of prototypes are produced
and examined by the users, feedback is received and the prototype amended, and
this cycle of “creation and feedback” continues until the final prototype
becomes the actual system to be used. The motto of this approach is “don’t expect
to get things right first time”, as iteration is expected until the prototype
is deem acceptable to satisfy the needs of the users. Normally, this approach
is used with small scale systems that have dynamic or initially unclear user
requirements.
Phased approach – similar to the traditional approach, except that
the project is carved up into phases of development, so that each phase is
suitably manageable, and can be delivered within a relatively short timescale.
Users then gain benefits earlier than in the traditional approach. This
approach is suitable when the project has defined aspects that can be separated
and developed at different times. The overall requirements still need to be
clear and well defined, so that phases can be identified and appropriately
scheduled.
Overall user requirements for
data within a data warehouse will probably be fairly well defined and the data
structures will not change rapidly. It is also stated to be a large data
warehouse. For these reasons, it is probably best that a phased approach is
used (indeed, a phased approach is frequently used in practice e.g. in the case
of the well-documented First American Corporation (FAC) data warehouse
development) so that some parts of the data warehouse (i.e., the implementation
of the support for 1 or 2 Key Performance Indicators (KPIs)) can be developed
quickly and thus the benefits of the data warehouse can be felt quickly within
aspects of the organisation: this would be much slower if a pure traditional
approach was used. Indeed, a criticism often levelled at the traditional
approach is that the time it takes to develop the entire data warehouse is very
long and consequently management lose interest in the system (as it is not
visibly producing anything of value for potentially several months). An
evolutionary approach would not be as suitable, given the generally easy
identification of the data requirements, and indeed may be quite difficult to
manage in the case of such a large data warehouse.
Subscribe to:
Posts (Atom)