Vous êtes sur la page 1sur 9

System Design

Submission date:16/2/18

Components of a Computer System


1.2.1 Define the terms: hardware, software, peripheral, network, human resources

1. Define the terms: hardware, software, peripheral, network, human resources.

 Hardware: anything within a computer you can physically touch.


 Software: the collection of programs and instructions that control the computer.
 Peripheral: the devices attached to the computer that allow it to interact with its
environment and exchange information.
 Network: a group of computers connected together in some way to share resources
such as documents or files and printers.
 Human resources: the humans operating the computers

1.2.2 Describe the roles that a computer can take in a networked world

2. Describe three roles that a computer can take in a networked world.

A computer can take the following roles in a networked world:

1. Client, a computer accessing resources hosted by an other computer, the server.


Resources could be documents, printers, scanners etc.
2. Server: a computer hosting resources to be shared across the network, like documents,
printers etc.
3. A computer can be both client and server in a network at the same time.

1.2.3 Discuss the social and ethical issues associated with a networked world

3. Security, privacy, and censorship are three areas that have been impacted by a networked
world. Give an example from each area that illustrates this impact.

With a networked world security has greatly been impacted, and there are more chances of data being
hacked/stolen in a networked world for example banks now have to worry a lot about how secure their
system is with internet banking and their they have to regularly maintain security of their core banking
software (CBS) which is always at risk in a networked world.

Privacy of people has reduced in the networked world as everyone’s profile, personal data, their work
portfolio leaves a digital footprint which cannot be deleted and their activity can be seen by many
people on the internet for example photos on social media, companies tracking browsing and collecting
other user data which is used for commercial purposes.

With a networked world it is increasingly becoming difficult for governments to do censorship and the
government can have a tough time in censoring information on the internet, this may lead to national
security and other problems if the citizens can see sensitive information and can know things they are
not supposed t0.

4. Describe another social or ethical issue that has arisen because of the networking of computers.

Through extensive networking many business activities can be outsourced to cheaper locations, like
call centers to India, leading to loss of jobs in home country.

System Design and Analysis


1.2.4 Identify the relevant stakeholders when planning a new system

5. List several people who might be affected by a new system?

1. Systems analyst
2. End users
3. Software manufacturer Client company
4. Government
5. Clients
6. Employees and staff

1.2.5 Describe methods of obtaining requirements from stakeholders

6. Describe each of the four methods used to obtain information from stakeholders.

1. Observation - Involves systems analyst walking around the organization watching how things are
done with his own eyes. It enables the possibility of gathering first-hand, unbiased information but
Often people don't work the way they normally do when being observed.

2. Interviews - Involves the systems analyst interviewing key people within the system to find out how it
works. Interviews Allows a lot of very detailed information to be gathered, people can be asked about
what they don't like on the system but interviews take a lot of time.

3. Questionnaires - involves the systems analysts handing out questionnaires for people to fill out, Large
amount of data from a large group can be gathered and it is simple to conduct and takes little time but
information gathered is limited by questionnaire and it may not be taken seriously.
4. Collecting documents - Involves the systems analysts looking in the documents in the archive to try to
find out how the present system works, detailed information about the present system can be gathered,
It can be seen where the old system has problems but it can be very time consuming

1.2.6 Describe appropriate techniques for gathering the information needed to arrive at a workable
solution

7. Describe three of the techniques used for gathering information.

1. Examining current system – involves critically analyzing the working of the current systems and
identify the benefits or the features that have to be retained in the new system and identifying
the shortfalls and the problems faced in the current system which have to be sold and won’t be
there in the new system.

2. Looking at competing products – looking at products used by others in the industry and
competitors product can give an idea of the current industry standards and may give a different
perspective on solving the same problem.

3. Literature searches - Involves searching the web, books and research papers for ideas or new
technology which could be incorporated into the solution.

1.2.7 Construct suitable representations to illustrate system requirements

8. List three methods used to illustrate system requirements.


1. System flow chart
2. Data flow diagram
3. Structure Chart
9. Construct a system flow chart that represents the ice machine system in a refrigerator.

10. List 5 inputs and 5 outputs in a computer system.

Inputs:
Sound through microphones
Text through keyboard
Movement and pointing through trackpad/mouse
Photo/Video through webcam
Drawings thorough graphic tablet

Output:
Graphics using monitor
Print outs using printers
Sound using speakers
Plotting using plotters
Computer output micro film

11. Construct a data flow diagram that represents the flow of data when ordering a hamburger at a
fast food restaurant.

Construct a structure chart for a computer program that manages the purchase of fireworks at a
fireworks stand.
1.2.8 Describe the purpose of prototypes to demonstrate the proposed system to the client.

12. Describe the purpose of prototypes to demonstrate the proposed system to the client.

Prototypes are abstract representations of the system, often focusing on only one or two key aspects of
the system. They are important in testing as each component of the system can be tested before
implementing, and to illustrate the working of the future system to the client. Prototypes in systems
development are usually 'ghost' user interfaces illustrating the position of control elements to the user
or little programs developed to explore the working of a key algorithm in the system.

1.2.9 Discuss the importance of iteration during the design process.

13. List the six stages in the SDLC.

1. Design
2. Implementation
3. Maintenance
4. Planning
5. Analysis

14. Why is the iterative approach to the SDLC better than a linear approach?

The linear approach uses a set number of steps and development goes from start to finish in a linear
path of progression.

Linear development is done in steps from design, implementation, testing/verification, maintenance.


These can be broken down further into sub-steps but most incremental models follow that same
pattern. The Waterfall Model is a traditional linear development approach.

The Iterative Approach has no set number of steps, rather development is done in cycles.

Iterative development is less concerned with tracking the progress of individual features. Instead, focus
is put on creating a working prototype first and adding features in development cycles where the
Increment Development steps are done for every cycle. Agile Modeling is a typical iterative approach.
Iterative approach is better as more focus is on the client and there is more involvement of the client

15. Discuss the importance of iteration during the design process.

Iterative development is less concerned with tracking the progress of individual features. Instead, focus
is put on creating a working prototype first and adding features in development cycles where the
Increment Development steps are done for every cycle. Designing and creating the system usually
happens in 5 stages: Planning, analysis, design, implementation, maintenance. However, the
maintenance step is often let out because in maintenance you plan, analyse, design and implement
changes, so the circle effectively begins from start again the iterative process happens during the entire
product life cycle, it is important as it brings in more involvement of the client

1.2.10 Explain the possible consequences of failing to involve the end-user in the design process

16. Explain the possible consequences of failing to involve the end-user in the design process.

Failing to involve the end-user in the design process may lead to the user being unsatisfied with system
and System may be unsuited for user's problem, affecting productivity.

1.2.11 Discuss the social and ethical issues associated with the introduction of new IT systems

17. Give an example of three social or ethical issues that have arisen because of introduction a new
IT system.

1. Digital divide
2. Firing workers because computer
3. Less social interaction due to home offices

1.2.12 Define the term usability

18. Define the term usability.

Usability is the ease of use and learnability of a human-made object. The object of use can be a software
application, website, machine, process, or anything a human interacts with.

1.2.13 Identify a range of usability problems with commonly used digital devices

19. Give an example of usability problem that can occur from using any two of the devices listed.

Microsoft drastically changed user interface of Windows 8 compared to Windows 7. This confused many
users. Settings menus in early versions of Android were confusing and expressions were sometimes
meaningless

1.2.14 Identify methods that can be used to improve the accessibility of systems

20. Define assistive technology.

Assistive technology is any item, piece of equipment, software program, or product system that
is used to increase, maintain, or improve the functional capabilities of persons with disabilities.
21. Identify methods that can be used to improve the accessibility of systems.
1. Touch screens
2. Voice recognition
3. Text-to-speech
4. Braille keyboards
5. Braille printers
6. Simpler interface with fewer buttons

1.2.15 Identify a range of usability problems that can occur in a system

22. Choose a system and identify a range of usability problems that can occur in that system.

In a ticketing system, there can be the following usability problem:

1. Slow response in a ticketing system


2. Irresponsible touch screens in ticketing system, constantly hitting the wrong button
3. Voice recognition being the only one way to interact with the system, misinterpreting
commands.
4. Difficult for visually impaired to us

1.2.16 Discuss the moral, ethical, social, economic and environmental implications of the interaction
between humans and machines.

23. Discuss moral implications of the interaction between humans and machines.

There can be many moral implications of the interaction between humans and machines for example
robots such as drones being used in wars can cause great damage many natural setting and can be a
threat to human life as machines don’t have any emotions and it can be very dangerous and morally
incorrect.

24. Discuss ethical implications of the interaction between humans and machines.

There can be many ethical implications of the interaction between humans and machines such
as privacy & anonymity for example the tor project, who develop the tor browser. During the
Arab Spring, protesters used tor to access social media and report on crimes against protesters
when governments blocked social media. Ensuring protection of the identities of those
protesters was a very important consideration in the design of tor by the developers, but later
the same browser was used for trade of illegal items and it has implications on intellectual
property file sharing websites challenge traditional copyright ideas, and they cause financial
loss for the content creators.
25. Discuss social implications of the interaction between humans and machines.

Globalization of culture. Allows people from distance parts of the world to meet instantly.
Easy, cheap entertainment for all, it has also enabled access of knowledge, information and
data on a wider scale.

26. Discuss economic implications of the interaction between humans and machines.

Due to the interaction between humans and machines the industries have grown rapidly as
things can be done in a more cost effective, efficient and faster this has lead to increase in
market capitalization and GDP, but many people who are not able to operate the machines are
being made redundant.

27. Discuss environmental implications of the interaction between humans and machines.

Data centers use large amounts of electrical power. However, countries like Iceland have
already invested in 100% renewable energy data centers, computers have also reduced
pollution costs of travel through introduction of telecommuting.

Vous aimerez peut-être aussi