Chapter 3 System Analysis Phase
Chapter 3 System Analysis Phase
FIGURE 3.1
The Systems development process building a system can be broken
down into six core activities.
Systems analysis involves defining the problem, identifying its causes,
specifying the solution, and identifying the information requirements
that must be met by a system solution. System analysis also involves
a feasibility study used to determine whether the proposed solution is
achievable, from a financial, technical, and organizational standpoint,
given the organization's resources and constraints. One of the most
challenging task of the systems analyst is to define the specific
information requirements that must be met by the system solution
selected.
Information requirements of a new system involve identifying who
needs what information, where, when, and how. The systems design is
the overall plan or model that shows how the system will meet its
information requirements. Like a blueprint of a building or house, a
system design consists of all the specifications that give the system its
form and structure. The system designer details the systems
specifications that should address all of the managerial, organizational,
and technical components of the system solution. User information
requirements drive the entire system building effort, so information
system design often demands a very high level of end-user participation.
During the programming stage, system specifications that were
prepared during the design stage are translated into software program
code. Thorough testing must be conducted to confirm that the system
produces the right results. Testing an information system involves three
types of activities: -
A. Unit testing tests each program separately in the system.
B. System testing checks the information system as a whole to
determine if it works as intended.
C. Acceptance testing results in user and management final
certification that the system is ready to be used in a production
setting.
To ensure that all aspects of testing are as comprehensive as possible,
the development team works with users to devise a systematic test plan.
C. Production Manager: -
The Production manager is a person that is responsible for the technical
management, supervision and control of the company’s production
processes (Hatching, Rearing, Feedings, Vaccination & Medication,
etc.) as well as Manure Management. His requirements are as follows: -
1: - Able to view daily activity programs.
2: - Able to view stock Inventory.
3: - Able to register (CRUD) products (End Produce).
4: - Able to view (Retrieve) products.
D. Purchase Manager: -
The Purchase manager is a person dealing with Vendors (Suppliers), and
is responsible for buying hygienic food, Medication & Protection to the
Husbandry Animals (Birds), the best quality equipment, goods and
services, at the most competitive prices, to enable a company to operate
at Optimism.
1: - Able to register supplier details.
2: - Able to view supplier details.
3: - Able to register stocks & Vendors (Suppliers).
4: - Able to view products details.
5: - Able to view purchase report.
6: - Able to view stock.
2
: - https://www.gantt.com/
Project Chapters & Task Operations will have been made (done). As a
project, you will have to pay close attention to the progress of the
research operations to ensure that tasks are finished & ready for
submission by their scheduled date.
3
: - https://uk.practicallaw.thomsonreuters.com/w-010-6945?
transitionType=Default&contextData=(sc.Default)&firstPage=true
Figure 3.3: PFIM System Architecture
3.8.3 Process Modeling
In process modeling, the Sequence diagram was used to model the flow
of logic within the proposed system in visual manner. It shows the major
sub-processes identified in the Poultry Management information system.
3.8.4 Data Modeling
The data modeling of the system was done by ascertaining the data
requirements, entities and their related attributes that make up the
system. Modeling of the relationships between the entities was designed
with an enriched entity relationship diagram for the system.
A. Data Requirements Details
1. Purchase: This stores information about purchases made. The
information stored includes the purchase ID, purchase date,
Employee_id,quantity, transaction mode and remarks.
2. Product: This stores information about products. The information
stored includes product ID, employee_id, name,quantity, date in,
expiry date and cost
3. Customer: This stores information about customer. The
information stored includes name, contact and address
4. Employee: This stores information about employees. The
information stored includes first name, middle name, last name, role,
address and email.
5. Order: This stores information about customer’s order. The
information stored includes customer_id, employee_id, Order_id,
order date and product_id
6. Inventory: This stores information about Stock Inventory
Informations.
AIU-PFIMS-Context Diagram.
Credentials. This has been a standard practice for applications, but most
security organizations would have a panic attack if it were proposed that
all human users share the same login credentials. If those credentials
leak, it is very challenging to identify the source of the compromise or
leak. Updating or rotating credentials creates a coordination problem, as
there are many users of the credential.
A. Technical Feasibility.
Technical Feasibility is the most important of all types of feasibility
analysis. Technical feasibility deals with hardware as well as software
requirements. An idea from the Outline design to system requirements in
terms of inputs, outputs, files and procedures is drawn and type of
hardware, software, and the methods required for running the system are
analyzed and subsequently approved.
B. Economical Feasibility.
C. Schedule Feasibility.
D. Operational feasibility.
E.Behavioral Feasibility
F. Legal feasibility
Legal feasibility study is to know if the proposed project confirms the
legal and ethical requirement. It is important that the project or business
is following the requirements needed to start a business or a project
including business licenses, certificates, copyrights, business insurance,
tax number, health and safety measures, and many more.
There are some things to consider in legal feasibility study including
ethical issues and some social issues. These issues are the privacy,
nepotism, and accountability. A proposed system should determine if it
has a conflicts with a legal requirements like for example if the data
processing system is complying with the local Data Protection Act (4).
3.10 Poultry Farm Information Management System UML
diagrams.
The Unified Modeling Language (UML) is a standard visual language
for describing and modelling software (Desktop Application) blueprints.
The UML is more than just a graphical language. Stated formally, the
UML is for: - Visualizing, Specifying, Constructing, and Documenting.
The artifacts of a software-intensive system (particularly systems built
using the object-oriented style). In AIU UML diagrams, there are four
diagrams available to model the dynamic nature of the proposed system.
A. Use Case Diagram: -
To model a system, the most important aspect is to capture the dynamic
behavior. Dynamic behavior means the behavior of the system when it is
running/operating. the use case diagram is dynamic in nature, there
should be some internal or external factors for making the interaction.
These internal and external agents are known as actors. Use case
diagrams consists of actors, use cases and their relationships.
The diagram is used to model the system/subsystem of an application. A
single use case diagram captures a particular functionality of a system (5).
4
: - http://sampleproposal.net/feasibility-study/legal-feasibility-study/
5
: - https://www.tutorialspoint.com/uml/uml_component_diagram.htm
Figure 3.5: PFIMS, UML USECASE DIAGRAM.
A1. Use Case Specification: - A use case specification captures the
requirements, typically of a system, in the form of a use case that
contains the descriptive requirements steps in a logical sequence so that
document specification can be understood by users to obtain sign-off of
their requirements and for testers and developers to understand what is
needed by the system to test and build the system functionality detailed
in the system use case. Use cases and use case specifications were
popular in the unified modelling language (UML) and is still used in
some corporate environments.
A2. Use Case Tables
1. Login
2. User registration
3. Assign Roles
4. Module Class Permission
5. Manage production
6. Manage purchases
7. Manage User Access & Full Application.
8. Manage Customer_Order (Sales).
9. Manage Employees CRUD.
10. Manage Stock Inventory information’s.
11. Logout.
B. Sequence Diagrams: –
A sequence diagram simply depicts interaction between objects in a
sequential order i.e. the order in which these interactions take place. We
can also use the terms event diagrams or event scenarios to refer to a
sequence diagram. Sequence diagrams describe how and in what order
the objects in a system function. These diagrams are widely used by
businessmen and software developers to document and understand
requirements for new and existing systems (6).
6
: - https://www.tutorialspoint.com/uml/uml_component_diagram.htm
can be described as an operation of the system. The control flow is
drawn from one operation to another.
This flow can be sequential, branched, or concurrent. Activity diagrams
deal with all type of flow control by using different elements such as
fork, join, etc (7).
8
: - https://www.tutorialspoint.com/uml/uml_component_diagram.htm
A data dictionary describes the data stored in a database. In simple
terms, it provides information and insights about your database, in other
words, a data dictionary is a documentation for all the data assets in a
database. A data dictionary provides complete information about an
organization’s data assets. This information can include: -
A. Column description
B. Distinct values, missing values, and frequency of each value within a
column
C. Data type
D. Classification and glossary terms.
SN Process Description
1 User Registration Allows the Product Manager, Sales
Manager and Purchase Manger
(Staff) to insert their details into the
system.
2 Authentication Allows the system to authenticate
registered users and provide an
Authentication response.
3 Add Product Allows the Product manager and the
purchase manager to register and
view products in the system
respectively.
4 Purchases (Customer Order) It Processes customer orders and
allows the sales manager to allocate a
product to a customer.
5 View Customer-Order (Sales) Generates a sales reports on products
report sold to customers.
6 View Suppliers Report Generates a supplier report.
7 Add Purchases Allows the purchase manager to add
purchases and also view registered
purchases.
8 View Purchase Report Generates a purchase report.
9 Employee Registration Allows the System Admin Manager
(Staff) to insert Employee records &
their details profile into the system.
10 Stock Inventory Information Allows the Purchase Manger (Staff),
items, Machines, tools, Equipment’s
record to be inserted their details into
the system.
9
: - https://csrc.nist.gov/glossary/term/information_systems_security
10
: - https://pressbooks.pub/bus206/chapter/chapter-6-information-systems-security/
The Security trial
Figure 3.9
3.12.3: The Information Security Triad: - CIA
B. Hardware Requirement
1. Processor: - Dual core and above
2. RAM: - 1 GB and above
3. Hard Disk Utilization: - 40 GB and above
4. Input Devices: - Mouse, Keyboard, etc.
5. Output Devices: - Monitor, Printer, etc.
C. Non-functional Requirements
1. Security.
2. Logging.
3. Storage.
4. Configuration.
5. Performance.
6. Cost.
7. Interoperability.
8. Flexibility.
9. Disaster recovery.
10. Accessibility.