Unit 2.1.2. Revision April 2023.pdf
Document Details
Uploaded by TimeHonoredSwan
2023
WJEC
Tags
Full Transcript
Investigation Analysis Design Implementation Maintenance Evaluation Investigation A Systems Analyst investigates the existing system using these methods: Questionnaires Feasibility report Interviews Observing staff The feasibility report will include: The definition of scope of the current sy...
Investigation Analysis Design Implementation Maintenance Evaluation Investigation A Systems Analyst investigates the existing system using these methods: Questionnaires Feasibility report Interviews Observing staff The feasibility report will include: The definition of scope of the current system Existing hardware and software Problems with the existing system To show an Does the current Identifying any understanding of hardware/softwar issues with the the requirements e able to cope current system of the new with the and it’s ability to system demands of the meet new new system? requirements. User requirements for the new system The cost and benefits of introducing a new system Wish list of List of solutions to all costs/benefits issues identified noting during fact finding, available and reported by features, required the user hardware or software. Analysis Data Flow Diagrams (DFDs) Maps out the flow of information in a system Decision Tables Data Dictionaries Simplifies decision rules in the form of a user-friendly table Explains what each field in a database means. It can include the data type and possible examples Design The following are included in the system design: • Hardware • Software • Network • Staff issues • Security Procedures Implementation This part of the lifecycle is when the new system is put in place: • Selecting a changover method (pilot/parallel/big-bang) • Installing hardware • Installing software Maintenance This part of the lifecycle is ongoing to support the company with any issues they have: • User Guides • Technical manuals • Error checking Evaluation Evaluating the new system to determine: • How well does the system meet the initial requirements? • What changes need to be made? • How can the system continue to evolve? WJEC GCSE DIGITAL TECHNOLOGY Systems Lifecycle 1. The manager of a local cinema has employed a systems analyst to update the present administration system. Give two methods the analyst might use to collect data about the present system. (2) Method 1: 2. There are a number of stages in the development of a new ICT system. State four tasks carried out during the design stage: Task 1: Task 2: Task 3: Method 2: Task 4: Mr Ratcliff Unit 1 Revision Summer 2023 WJEC GCSE DIGITAL TECHNOLOGY Systems Lifecycle 3. The final stage in the system life cycle process is evaluation. Identifying the good and bad points of the final system is one part of this evaluation stage. Describe two other processes undertaken during the evaluation stage. (2) Process 1: Process 2: Mr Ratcliff 4. The first stage in the creation of a new ICT system is to investigate the existing system. Fill in the table below stating which investigation method would be used in the given circumstances. (3) To find out what a few key people need from the new system To consult a large number of people To see exactly how workers use their current system Unit 1 Revision Summer 2023 Program Software Business Process Management (BPM) Customer Relationship Management Off-the-shelf software that serves a specific purpose. For example, Microsoft Office. Used by companies to develop and automate of processes. Software used by companies to review and analyse customer data Project Management Software Enterprise Resource Planning (ERP) Educational Software Used by companies to plan and implement projects Business software used by companies to manage their daily business Used by companies to teach new content or concepts Resource Management Software Used by companies to manage projects and resources Time Management Software Bespoke Software Used by companies to track how long users spend doing different tasks Software written to achieve a task for an individual or company. It is sometimes called ‘customised software’ or ‘tailored software’.. Productivity Software Used by companies to help users complete their work more efficiently Software written to achieve a task for an individual or company. It is sometimes called ‘customised software’ or ‘tailored software’.. Advantages Disadvantages The software will be able to offer features that are specific to the needs of the company. It takes a long time to develop such a system, between a few months to years because of the specific requirements outlined. The software will work exactly how the company intended it to. It costs a great deal of money to develop such a system, because it’s unique to that company. The software will only have the features that they specifically need in their business. The company may need to employ a team of people such as business analysts, programmers, testers etc WJEC GCSE DIGITAL TECHNOLOGY 2c (i) – Software types and functions Activity : Bespoke Software A local food production company want to upgrade their database so that they store and analyse their customers sales data more efficiently. They are considering purchasing bespoke software to achieve this. Discuss the specific advantages and disadvantages of purchasing bespoke software, giving examples to illustrate your answer (7) Mr Ratcliff Unit 1 Revision Summer 2023 Anti-virus software monitors activity on a computer system for the signs of virus infection. 1) Each virus has its own unique signature that is known to virus protection software and stored in a database. 2) Data stored on a computer system is scanned to see if any of the virus signatures within the database exist on the system. 3) Once a virus has been detected, it notifies the user and it could place the virus in a quarantine folder which will isolate the virus to stop it infecting other parts of the computer. 4) The user can then decide what to do with the virus by going into the quarantine folder. Feature Description Secure banking The software will open the website in a protected browser for additional security. Parental control To control who has access to certain files, programs and devices. Anti-phishing Helps users to identify risks that may present themselves in emails. Virtual private network (VPN) This can be used when users want to use a public network as it will use a different server and protect their own network from data interception and theft. Anti-ransomware A package like this can be useful as it locks areas of the user’s data where important documents and programs are located. Support Useful if software is being updated or customers need help with using the software. Notifications Antivirus companies send regular notifications regarding threats to the system, with a strong recommendation to upgrade the software to solve any issues. 1.The first copy is made and stored. The newest copy of the data is always known as the ‘son’. 2. The next time the data is backed up another copy is made and stored. The previous copy is now referred to as the ‘father’ and the new latest copy is called the ‘son’. 3. The next time the data is backed up and stored, the newest copy is called the ‘son’ the second oldest is referred to as the ‘father’ and the oldest copy is called the ‘grandfather’. 4. For subsequent backups the oldest copy of the data (the ‘grandfather’) is overwritten with the latest data, which becomes known as the ’son’. This way, three backups are stored before the oldest is overwritten. Full backup Incremental backup Advantage: Backups all the data files Advantage: Only the changes are backed up – faster to perform. Disadvantage: It could take a significant time to back up the entire system. Disadvantage: Takes longer to restore all the files because of it needs to restore the full and all the incremental backups. Differential backup Grandfather-Father-Son backup Advantage: Restoring is faster than incremental as only the last full backup and latest differential is needed. Advantage: Create more recovery/restore points (some are off site) while using less storage space. Disadvantage: Restoring is slower than full back up Disadvantage: The restore process will be complex as the last full backup AND the latest differential and will be inefficiently. backup is needed. USB Flash Drive External Hard Drive Portable and lightweight Lower memory capacity Store large amounts of data Good for temporary storage Portable and cheap Solid State Media Cloud Storage Store large amounts of data Stores data on remote servers Robust as they have no moving parts Hosted by an external company Can be very expensive A company must have a plan in case of system failure. The failure could be caused by a powercut or natural disaster The plan details step by step how the company would recover Disaster recovery site Data restoration procedure An alternative location where critical systems and data can be restored if the primary site is damaged or inaccessible. A detailed procedure that outlines how to restore data in case of a data loss event. Recovery Time Objective (RTO) Recovery Point Objective (RPO) The time within which the organisation must restore its systems and data after a data loss event. The point in time to which an organisation is willing to lose data Testing and verification Regular testing and verification can help identify weaknesses in the plan and ensure that the plan will work when needed. Employee training Employees must be trained on the data recovery plan and their respective roles in case of a data loss event.