psk - it notenasirmohammad.weebly.com/uploads/1/1/0/5/11056906/psk... · 2018. 10. 3. · md....
Post on 08-Feb-2021
0 Views
Preview:
TRANSCRIPT
-
CA in Bangladesh We believe in sharing [www.facebook.com/CAinBD]
Md. Sayduzzaman Tuhin, Articled Student, S.F. Ahmed & Co. Mob:-01552-639307
Database Structure Database Structure:
The relation between many individual data elements stored in databases are based on one of several logical data structures or modes. DBMS are designed to use specific data structure to provide end users quick and easy access to stored info.
Classification of DB structures and file methods of Database: Five Fundamental Structure
Hierarchical structure Network structure Relational Structure Object oriented Structure Multidimensional Structure
Hierarchical structure:
This is the simplest type of database. The tree structure illustrates this concept.
Hierarchical Organization of a Family Structure
Hierarchical structure:
Information is accessed from the top to the bottom (top-down). Illustrates a parent-child relationship where each item relates only to the one above
and below it. Disadvantage – following the hierarchy is sometimes difficult, cumbersome, and time
consuming. Network Structure:
Very similar to hierarchical databases except that an element can have one or more superiors.
Network Structure permits the connection of the nodes multidirectionally.
Each node may have several owners (or elements) and may own any number of other data elements on the network
The database management software permits the extraction of needed information from such a structure to begin with any record in the file.
Father Mother
Parent
Family
Male Child Child
Children
-
CA in Bangladesh We believe in sharing [www.facebook.com/CAinBD]
Md. Sayduzzaman Tuhin, Articled Student, S.F. Ahmed & Co. Mob:-01552-639307
Network Structure
Relational Structure:
They consist of one or more tables in which data are stored in the form of rows and columns.
Relational databases have many advantages over network and hierarchical databases.
The main advantage is that relationships between the data can be established whenever you (the user) request information.
Any relational database package normally uses an index of some sort for faster access to the data. Relational structures are a very popular database structuring approach for both mainframe and microcomputer database packages.
Relational Structure: Relational Operators
Join One to Many Many to Many
Multi- Dimensional Structure
Varity of Relational Model Multidimensional structure to organize and express relationships between data. Each dimension can represent data represent can represent different product
category like product type, region, sales channel and time. Object- Oriented Structure
Modern concept to handle new generation of multimedia and web application Entity Attribute Object Encapsulation Polymorphism Inheritance
-
CA in Bangladesh We believe in sharing [www.facebook.com/CAinBD]
Md. Sayduzzaman Tuhin, Articled Student, S.F. Ahmed & Co. Mob:-01552-639307
Data & Information Data: Distinct pieces of information usually formatted in a special way. All software is divided into two general categories: data and programs. Programs are collections of instructions for manipulating data. Data can exist in a variety of forms -- as numbers or text on pieces of paper, as bits and bytes stored in electronic memory, or as facts stored in a person's mind. Information: Meaningful and usable arrangement of data is called Information. In general, raw data that (1) has been verified to be accurate and timely, (2) is specific and organized for a purpose, (3) is presented within a context that gives it meaning and relevance, and which (4) leads to increase in understanding and decrease in uncertainty. The value of information lies solely in its ability to affect a behavior, decision, or outcome. A piece of information is considered valueless if, after receiving it, things remain unchanged Characteristics of Information: � Timeliness: Should be soon enough to be meaningful � Sufficiency: Completeness, adequate enough for the purpose intended � Understandability: Practicality, Simplicity � Freedom from Bias � Reliability: Correct, Verifiability � Decision-Relevance: Relevance to subject matter, Significance � Comparability: Consistency of format, Consistency of fields. Information Systems: A set of interrelated components that collect, process, store and distribute information to support decision making and control in and organization.
IS more than computers: Activities in IS Three activities in an IS produce the information that organizes need to make decisions. Control operation, analyze problem, and create products and services. Information Systems Feedback Organization: Key elements of an organization are its people, structure, business processes, politics,
and culture
Input Process Output
-
CA in Bangladesh We believe in sharing [www.facebook.com/CAinBD]
Md. Sayduzzaman Tuhin, Articled Student, S.F. Ahmed & Co. Mob:-01552-639307
Coordinates work through a structured hierarchy and through its business processes. The hierarchy arranges people in a pyramid structure of rising authority and responsibility Major Business Function:
Function Purpose Sales and marketing Selling the organization’s product and services Manufacturing and production Producing product or services Finance and accounting Managing the organization’s financial assets and
maintaining the organization’s financial records Human resources Attracting developing and maintaining the
organization’ labour forces; maintaining employee records
MANAGEMENT : Face challenges to run the organization Define strategy to face challenges Assign/ Allocate resources (Human, Finance) Do more than already exist in organization Create new product or service as using new knowledge and technology
TECHNOLOGY : Technology used to develop new product and services ► Use of Communication Internet Storage Data Processing E commerce Information need in various level of Organization:
Senior Management required information on Long term strategic decision about product and service Financial Performance
Mid level Management required information on Carries out Plan and Program of Senior management Face challenges and develop improvement ideas
Operational Management required information on Monitoring execution of activities as per plan Daily operational works
Information in Various Organizations: � Requirement of information varies from Organization to Organization � Sales and Marketing Systems � Market size for specific product � Customers behavior � Purchasing Habit/ Purchasing capacity � Cultural effect
-
CA in Bangladesh We believe in sharing [www.facebook.com/CAinBD]
Md. Sayduzzaman Tuhin, Articled Student, S.F. Ahmed & Co. Mob:-01552-639307
Communication systems Wireless: Wireless communication is the transfer of information over a distance without the use of
electrical conductors or wires Terrestrial Microwave: � Transmission systems consisting of at least two radio transmitter/receivers (transceivers) connected to high gain antennas (directional antennas which concentrate electromagnetic or radio wave energy in narrow beams) focused in pairs on each other. � The operation is point point-to to-point point-communications are established between two and only two antennas with line line-of of-sight visibility. � This can be contrasted to point point-to to-multipoint systems like broadcast radio or television.
How Terrestrial Microwave Transfer and Receive Data: � Terrestrial microwave communication employs Earth Earth-based transmitters and receivers to transfer and receive data. � The frequencies used are in the low low-gigahertz range, which limits all communications to line line-of of-sight. � Example of terrestrial microwave equipment -telephone relay towers, which are placed every few miles to relay telephone signals cross country.
The Use of Microwave Link: A microwave link frequently is used to transmit signals in instances in which it would be
impractical to run cables. If you need to connect two networks separated by a public road, for example, you might find that regulations restrict you from running cables above or
below the road. In such a case, a microwave link is an ideal solution.
Satellite Communication: � Satellite is a microwave repeater in the space. � There are about 750 satellite in the space, most of them are used for communication. � They are: ►Wide area coverage of the earth earth’s surface. ►Transmission delay is about 0.3 sec. ► Transmission cost is independent of distance.
MAC(Media Access Control) protocols for satellite links � ALOHA: � Every station can transmit any time � Very low efficiency 18- 36 %. � FDMA (Frequency Division Multiple Access) � It is the oldest and most common. � the available satellite channel bandwidth is broken into frequency bands for different earth stations. Very Small Aperture Terminal (VSAT) Network: At the Very Small Aperture Terminal a lower performance microwave transceiver and
lower gain dish antenna (smaller size) is used. VSAT networks are arranged in a star based topology. Ideal for centralized networks with a central host (Banking institutions with branches all
over the country). Use the S ALOHA and TDMAS
-
CA in Bangladesh We believe in sharing [www.facebook.com/CAinBD]
Md. Sayduzzaman Tuhin, Articled Student, S.F. Ahmed & Co. Mob:-01552-639307
Application: Telephony ►The first and historically most important application for communication satellites was
in intercontinental long distance telephony Satellite television Satellite radio Satellite Internet Military uses GPS
Cellular network : A cellular network is a radio network made up of a number of cells, each served by at
least one fixed served fixed--location transceiver known as a known cell site or base station. When joined together these cells provide radio coverage over a wide geographic area. This enables a large number of portable transceivers (mobile phones, pagers, etc) to communicate, with each other and with fixed transceivers and telephones anywhere in the network, via base stations, even if some of the transceivers are moving through more than one cell during transmission. Benefit of Cellular network: Cellular networks offer a number of advantages over alternative solutions: increased capacity reduced power usage larger coverage area reduced interference from other signals
Wireless LAN: A wireless local area local network (WLAN) links (devices via a wireless distribution
method and usually provides a connection through an access point to the wider internet. This gives users the mobility to move around within a local coverage area and still be connected to the network. Application of Wireless Network: Home network Network in Conference room Network in a floor of a office
Bluetooth: Bluetooth is a proprietary open wireless protocol for exchanging data over short distances (using short length radio waves) from fixed and mobile devices, creating personal area networks (PANs). It was originally conceived as a wireless alternative to RS--232 data cables. It can connect several devices, overcoming problems of synchronization. Bluetooth Application: � Wireless control of and communication between a mobile phone and a hands hands-free headset. This was one of the earliest applications to become popular. � Wireless networking between PCs in a confined space and where little bandwidth is required. � Wireless communication with PC input and output devices, the most common being the mouse, keyboard and printer. . � Transfer of files, contact details, calendar appointments, and reminders between devices with OBEX. � Replacement of traditional wired serial communications in test equipment, GPS receivers, medical equipment, bar code scanners, and traffic control devices. � For controls where infrared was traditionally used. � For low bandwidth applications where higher USB bandwidth is not required and cable -free connection desired.
-
CA in Bangladesh We believe in sharing [www.facebook.com/CAinBD]
Md. Sayduzzaman Tuhin, Articled Student, S.F. Ahmed & Co. Mob:-01552-639307
� Sending small advertisements from Bluetooth enabled advertising hoardings to other, discoverable, Bluetooth devices. � Wireless bridge between two Industrial Ethernet networks. � Dial up internet access on personal computers or PDAs using a data capable mobile phone as a wireless modem � Short range transmission of health sensor data from medical devices to mobile phone, set set-top box or dedicated telehealth devices Wireless Web: Accessing internet web application without cables. PDA, Mobile devices using this technology WAP, GPRS (General packet radio service), 3G
Telecommunication Devices: Modem (modulator--demodulator): A device that modulates an analog carrier signal to encode digital information, and also demodulates such a carrier signal to decode the transmitted information. The goal is to produce a signal that can be transmitted easily and decoded to reproduce the original digital data. Modems can be used over any means of transmitting analog signals, from driven diodes to radio. HUB: A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN. A hub contains multiple ports. When a packet arrives at one port, it is copied to the other ports so that all segments of the LAN can see all packets. � A passive hub serves simply as a conduit for the data, enabling it to go from one device (or segment) to another. � Intelligent hubs include additional features that enables an administrator to monitor the traffic passing through the hub and to configure each port in the hub. Intelligent hubs are also called manageable hubs. � A third type of hub, called a switching hub, actually reads the destination address of each packet and then forwards the packet to the correct port. Router: A device that forwards data packets along networks . A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP network. Routers are located at gateways , the places where two or more networks connect. Routers use headers and forwarding tables to determine the best path for forwarding the packets, and they use protocols to communicate with each other and configure the best route between any two hosts networks. ISP’s gateways, Gateway: The function of a gateway is to allow two or more dissimilar network to communicate as single logical entity. Port : An interface on a computer to which you can connect a device. Personal computers have various types of ports. Internally, there are several ports for connecting disk drives, display screens, and keyboards. Externally, personal computers have ports for connecting modems, printers, mice, and other peripheral devices. Almost all personal computers come with a serial RS RS-232C port or RS RS-422 port
for connecting a modem or mouse and a parallel port for connecting a printer. On PCs, the parallel port is a, Centronics interface that uses a 25 25-pin connector. SCSI (Small Computer System Interface) ports support higher transmission speeds than do conventional ports and enable you to attach up to seven devices to the same port. � In TCP/IP and UDP networks, an endpoint to a logical connection. The port number identifies what type of port it is. For example, port 80 is used for HTTP traffic. Also see Well-Known TCP Port Numbers in the Quick Reference section of Webopedia.
-
CA in Bangladesh We believe in sharing [www.facebook.com/CAinBD]
Md. Sayduzzaman Tuhin, Articled Student, S.F. Ahmed & Co. Mob:-01552-639307
Telecommunication Software: TP: Short for transaction processing monitor, a program that monitors a transaction as it
passes from one stage in a process to another. The TP monitor's purpose is to ensure that the transaction processes completely or, if an error occurs, to take appropriate actions. TP monitors are especially important in three tier architectures that employ load balancing because a transaction may be forwarded to any of several servers. In fact, many TP monitors handle all the load balancing operations, forwarding transactions to different servers based on their availability transaction processing three-servers. CICS: Short for customer information control system, a TP monitor from IBM that was
originally developed to provide transaction processing for IBM mainframes. It controls the interaction between applications and users and lets programmers develop screen displays without detailed knowledge of the terminals being used. CICS is also available on non mainframe platforms including the RS/6000, AS/400 and OS/2 based PCs. Ping
Network management: � Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance, and provisioning of networked systems � 4 Major issues � Traffic Management � Security Management � Monitoring � Capacity Planning Traffic / Bandwidth management: The process of measuring and controlling the communications (traffic, packets) on a
network link, to avoid filling the link to capacity or overfilling the link, which would result in network congestion and poor performance. Security Management: The specialist area of network security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network and the network accessible resources from unauthorized access, and consistent and continuous monitoring and measurement of its effectiveness (or lack) combined together. Monitoring The term network monitoring describes the use of a system that constantly
monitors a computer network for slow or failing components and that notifies the network administrator in case of outages via email, pager or other alarms For example, to determine the status of a web server, monitoring software may
periodically send an HTTP request to fetch a page; for email servers, a test message might be sent through SMTP and retrieved by IMAP or POP3 . Capacity planning Capacity planning is the process of determining the production capacity needed by an
organization to meet changing demands for its products. In the context of capacity planning, "capacity" is the maximum amount of work that an organization is capable of completing in a given period of time. The phrase is also used in business computing as a synonym for Capacity Management products.
-
CA in Bangladesh We believe in sharing [www.facebook.com/CAinBD]
Md. Sayduzzaman Tuhin, Articled Student, S.F. Ahmed & Co. Mob:-01552-639307
Nature and Type of systems Nature and Type of systems: There are different interests, specialties, and levels in an organization, there are different
kinds of systems. No single system can provide all the information an organization needs Three main categories of information systems serve different organizational levels:
operational level systems, management level systems, and strategic level systems.
Three main categories of IS in Organization
Four Major Types of IS Type of System
Information Inputs
Processing Information Output Users
ESS Aggregate data; external, internal
Graphics; simulations interactive
Projection; responses to queries
Senior managers
DSS MIS TPS
TRANSACTION PROCESSING SYSTEMS (TS) Basic business systems that serve the operational level of the organization. A transaction processing system is a computerized system that performs and records the
daily routine transactions necessary to conduct business. Examples are sales order entry, hotel reservation systems, payroll, employee record keeping, and shipping.
-
CA in Bangladesh We believe in sharing [www.facebook.com/CAinBD]
Md. Sayduzzaman Tuhin, Articled Student, S.F. Ahmed & Co. Mob:-01552-639307
Payroll TPS Five functional categories of TPS:
-
CA in Bangladesh We believe in sharing [www.facebook.com/CAinBD]
Md. Sayduzzaman Tuhin, Articled Student, S.F. Ahmed & Co. Mob:-01552-639307
Five functional categories of TPS: Sales/marketing, Manufacturing/production, Finance/accounting, Human resources, and Other types of systems specific to a particular industry. Within each of these major
functions are sub functions TPS applications: � Transaction processing systems are often so central to a business that TPS failure for a few hours can lead to a firm firm’s demise and s perhaps that of other firms linked to it � Managers need TPS to monitor the status of internal operations and the firm firm’s relations s with the external environment. � TPS are also major producers of information for the other types of systems MANAGEMENT INFORMATION SYSTEMS (MIS): MIS primarily serve the functions of planning, controlling, and decision making at the
management level. Generally, they depend on underlying transaction processing systems for their data. Typically, MIS are oriented almost exclusively to internal, not environmental or external,
events. Depend on underlying transaction processing systems for their data
MIS
-
CA in Bangladesh We believe in sharing [www.facebook.com/CAinBD]
Md. Sayduzzaman Tuhin, Articled Student, S.F. Ahmed & Co. Mob:-01552-639307
Characteristics of MIS: MIS usually serve managers primarily interested in weekly, monthly, and
yearly results MIS generally provide answers to routine questions that have been specified in
advance and have a predefined procedure for answering them. These systems are generally not flexible and have little analytical capability. Most MIS use simple routines such as summaries and comparisons, as opposed to
sophisticated mathematical models or statistical techniques. DECISION-SUPPORT SYSTEMS (DSS): DSS help managers make decisions that are unique, rapidly changing, and not easily
specified in advance DSS use internal information from TPS and MIS, they often bring in information from
external sources, such as current stock prices or product prices of competitors. Voyage-estimating decision-support system: Company carries bulk cargoes of coal, oil, ores and finished products for parent company Owns some ships, charters others Bids for shipping contracts in open market for general cargo
Voyage-estimating decision-support system What is the optimal speed at which a particular vessel can optimize its profit and still
meet its delivery schedule? What is the optimal loading pattern for a ship journeying from US W coast to Malaysia Given a customer delivery schedule and an offered freight rate, which vessel should be
assigned at what rate to maximize profits?
Voyage-estimating decision-support system
-
CA in Bangladesh We believe in sharing [www.facebook.com/CAinBD]
Md. Sayduzzaman Tuhin, Articled Student, S.F. Ahmed & Co. Mob:-01552-639307
DSS Sometimes you ll hear DSS systems referred to as business intelligence systems because
they focus on helping users make better business decisions. Executive Support Systems (ESS): Senior managers use executive support systems (ESS) to help them make
decisions ESS are designed to incorporate data about external events, such as new tax laws or
competitors, but they also draw summarized information from internal MIS and DSS ESS employ the most advanced graphics software and can present graphs and data from
many sources. Often the information is delivered to senior executives through a portal, which uses a Web interface to present integrated personalized business content from a variety of sources. Unlike the other types of information systems, ESS are not designed primarily to
solve specific problems. ESS provide a generalized computing and communications capacity that can be applied to
a changing array of problems. Although many DSS are designed to be highly analytical, ESS tends to make less use of analytical models.
Executive Support Systems
Interrelationships among systems
-
CA in Bangladesh We believe in sharing [www.facebook.com/CAinBD]
Md. Sayduzzaman Tuhin, Articled Student, S.F. Ahmed & Co. Mob:-01552-639307
IT Asset Management IT asset management (ITAM): IT asset management is the set of business practices that join financial, contractual and inventory functions to support life cycle management and strategic decision making for the IT environment. Assets include all elements of software and hardware that are found in the business environment.
Logic of asset management Systems:
• Asset Acquisition: – Usually begins with the departmental manager by recognizing the actual need – Managers have authority usually limited by materiality limit – Higher value needed to be approved by higher authority – After requisition approval and selection of supplier, asset purchased - Unlike expenditure this assed sends to direct department of custodian not central
inventory - Fixed asset department not inventory control, perform record keeping.
• Asset Maintenance: – Adjustment of asset subsidiary account balance as the asset depreciate (except
land) over the time or usages – Various depreciation method used
• Straight line • Double declining • Unit of production • Sum of the years digit
- Some time IFS specify the depreciation method e.g. for new office building straight –ling method with the period at least 40 years
- Depreciation value related to manufacturing charged as manufacturing overhead then WIP
- Other depreciation value charged as expense in current period.
• Disposal: – When asset reached at end of its useful life then it removed from asset
subsidiary ledger. – Firm can dispose it by scrap, donate or retire – Disposal report need to be sent to proper department for reporting
Computer Base Fixed Assed Systems:
• Acquisition Procedure: – Acquisition recognized in the systems when asset receiving report arrived and
cash disbursement required – At the time of registering fixed assed in the systems historical data used to
• Define residual value • Depreciation method • Useful life time • Location of the asset
– A fixed assed system automatically updates • Fixed asset control account in GL • Prepare Journal voucher as evidence of the entry • Prepare reports for accounting management
-
CA in Bangladesh We believe in sharing [www.facebook.com/CAinBD]
Md. Sayduzzaman Tuhin, Articled Student, S.F. Ahmed & Co. Mob:-01552-639307
– Depending of depreciation parameters system prepare a depreciation schedule for each fixed asset.
• Maintenance: – Fixed asset system automatically doing
• Calculating the current period of depreciation • Updating the accumulated depreciation and book value in subsidiary
ledger • Posting the total amount of depreciation to affected GL accounts
(depreciation, expense, accumulated depreciation) • Asset routine services and maintenance
• Disposal: – After disposal authorization and entering in to systems, it automatically doing
• Post adjustment entry in the fixed asset control account of the GL • Records any loss or gain for disposal • Prepare journal voucher
Controlling Fixed Asset Systems:
• Authorization control: – Should be formal and explicitly authorized – Written approval is required – For high value items independent approval process required to evaluate merit
and cost-benefit analysis of the asset • Supervision:
– As widely distributed these have high scope of miss use. So super vision is important
-
CA in Bangladesh We believe in sharing [www.facebook.com/CAinBD]
Md. Sayduzzaman Tuhin, Articled Student, S.F. Ahmed & Co. Mob:-01552-639307
Systems Development Life Cycle (SDLC) Topics to cover
• Portfolio/programme management • Business Case • Benefit realization techniques • Project management structure • Project organization forms • Project communication, culture, roles & responsibilities • Project management frameworks • Gantt Charts & PERT/CPM • Function Point Analysis • All software development projects • All software acquisition & implementation projects • All network development and extension projects
All kinds of IT projects are referred to as SDLC, in general.
System development approach, depending Upon the specific requirement of the organization in the total system may follow any one of the following models :
1. Waterfall model 2. Prototyping model 3. Spiral model
The combination of more than one of the Above model may be used for system Development, depending upon the nature and size of the project and the risk involved. This Is called hybrid approach of system Development
-
CA in Bangladesh We believe in sharing [www.facebook.com/CAinBD]
Md. Sayduzzaman Tuhin, Articled Student, S.F. Ahmed & Co. Mob:-01552-639307
Waterfall Model – Typical Phases
PROPOSAL DEFINATION
FEASIBILITYSTUDY
SYSTEM DESIGN
IMPLEMENTATION
CODINGANDTESTING
SYSTEM MAINTENANCE
REQUIREMENTANALYSIS
Waterfall Model: Strength:
• Easy to understand, easy to use • Provides structure to inexperienced staff • Milestones are well understood • Sets requirements stability • Good for management control (plan, staff, track) • Works well when quality is more important than cost or schedule
Deficiencies: • All requirements must be known upfront • Deliverables created for each phase are considered frozen – inhibits flexibility • Can give a false impression of progress • Does not reflect problem-solving nature of software development – iterations of phases • Integration is one big bang at the end • Little opportunity for customer to preview the system (until it may be too late)
When to use Waterfall: • Requirements are very well known • Product definition is stable • Technology is understood • New version of an existing product • Porting an existing product to a new platform.
Prototype Model: Prototyping is the process of quickly putting together a working model in order to test various aspects of a design, illustrate ideas or features and gather early user feedback. Prototyping is often treated as an integral part of the system design process, where it is believed to reduce project risk and cost. Often one or more prototypes are made in a process of incremental development where each prototype is influenced by the performance of previous designs, in this way problems or deficiencies in design can be corrected.
-
CA in Bangladesh We believe in sharing [www.facebook.com/CAinBD]
Md. Sayduzzaman Tuhin, Articled Student, S.F. Ahmed & Co. Mob:-01552-639307
Prototype Model:
REQUIREMENT ANALYSIS
REDEFINEPROTOTYPE
QUICKDESIGN
ENGINEER THEPRODUCT
PROTOTYPEBUILDING
USER EVALUATION
STOP
START
Advantages :
• Can be used when customer is not sure about what he wants • Faster way of finalizing the requirements • Useful for new technologies and domains
Disadvantage : • A prototype if used in a production environment, may lack quality • Overall maintainability may be overlooked • The customer may want the prototype delivered. • Process may continue forever (scope creep)
Spiral Model: The spiral model is a SDLC methodology that combines features of prototyping with the waterfall methodology. The spiral model is often favored for large, complex projects. Iterates cycles of these project phases: 1. Requirements definition 2. Risk analysis 3. Prototyping 4. Simulate, benchmark 5. Design, implement, test 6. Plan next cycle (if any)
-
CA in Bangladesh We believe in sharing [www.facebook.com/CAinBD]
Md. Sayduzzaman Tuhin, Articled Student, S.F. Ahmed & Co. Mob:-01552-639307
Spiral Model – Steps:
• The new system requirements are defined. This usually involves interviewing a number of users representing all the end users of the system.
• A preliminary system design is created. • An initial prototype of the new system is constructed from the preliminary design. This is
usually a scaled-down system, and represents an approximation of the final product’s characteristics.
• After evaluating the strengths, weaknesses and risks of the first prototype, a second prototype is developed and tested.
• If the risk is considered to be too great, the client may choose to terminate the project at this point. Risk factors to be considered include development cost overruns, operating-cost miscalculation, etc.
• Subsequent prototypes are developed until the customer is satisfied that the latest prototype represents the desired product.
• The system is constructed, based on the final prototype. The final system is evaluated and tested. Routine maintenance is carried out continually to prevent large-scale failures and to minimize downtime. Advantages: 1. Avoidance of Risk is enhanced. 2. Strong approval and documentation control. 3. Implementation has priority over functionality. 4. Additional Functionality can be added at a later date.
• Adds risk analysis, and 4GL RAD prototyping to the waterfall model
• Each cycle involves
the same sequence of steps as the waterfall process model
-
CA in Bangladesh We believe in sharing [www.facebook.com/CAinBD]
Md. Sayduzzaman Tuhin, Articled Student, S.F. Ahmed & Co. Mob:-01552-639307
Disadvantages: 1. Highly customized limiting re-usability 2. Applied differently for each application 3. Risk of not meeting budget or schedule 4. Possibility to end up implemented as the Waterfall framework When to use Spiral Model
When creation of a prototype is appropriate When costs and risk evaluation is important For medium to high-risk projects Long-term project commitment is unwise because of potential changes to economic
priorities Users are unsure of their needs Requirements are complex New product line Significant changes are expected (research and exploration)
Incremental SDLC Model:
Construct a partial implementation of a total system Then slowly add increased functionality The incremental model prioritizes requirements of the system and then implements
them in groups. Each subsequent release of the system adds function to the previous release, until all
designed functionality has been implemented. Incremental Model: Strengths:
Develops high-risk or major functions first Each release delivers an operational product Customer can respond to each build Uses “divide and conquer” breakdown of tasks Lowers initial delivery cost Initial product delivery is faster Customers get important functionality early Risk of changing requirements is reduced
Weaknesses: Requires good planning and design Requires early definition of a complete and fully functional system to allow for the
definition of increments Well-defined module interfaces are required (some will be developed long before
others) Total cost of the complete system is High
-
CA in Bangladesh We believe in sharing [www.facebook.com/CAinBD]
Md. Sayduzzaman Tuhin, Articled Student, S.F. Ahmed & Co. Mob:-01552-639307
V-Shaped Model:
• A variant of the Waterfall that emphasizes the verification and validation of the
product. • Testing of the product is planned in parallel with a corresponding phase of
development. V-Shaped Model Steps:
• Project and Requirements Planning – allocate resources • Product Requirements and Specification Analysis – complete specification of the
software system • Architecture or High-Level Design – defines how software functions fulfill the design • Detailed Design – develop algorithms for each architectural component • Production, operation and maintenance – provide for enhancement and corrections • System and acceptance testing – check the entire software system in its environment • Integration and Testing – check that modules interconnect correctly • Unit testing – check that each module acts as expected • Coding – transform algorithms into software
Advantages:
• Emphasize planning for verification and validation of the product in early stages of product development
• Each deliverable must be testable • Project management can track progress by milestones • Easy to use
Disadvantages: • Does not easily handle concurrent events • Does not handle iterations or phases • Does not easily handle dynamic changes in requirements • Does not contain risk analysis activities
When to use V-Shaped Model • Excellent choice for systems requiring high reliability – hospital patient control
applications • All requirements are known up-front • When it can be modified to handle changing requirements beyond analysis phase
Solution and technology are known
-
CA in Bangladesh We believe in sharing [www.facebook.com/CAinBD]
Md. Sayduzzaman Tuhin, Articled Student, S.F. Ahmed & Co. Mob:-01552-639307
Iterative SDLC Model:
DESIGN1 DESIGN2 DESIGN3 DESIGNn
IMPLEMENT1 IMPLEMENT2 IMPLEMENTn
ANALYSIS1 ANALYSIS2 ANALYSISn
Rapid Application Development (RAD) Model: • Requirements planning phase (a workshop utilizing structured discussion of business
problems) • User description phase – automated tools capture information from users • Construction phase – productivity tools, such as code generators, screen generators, etc. inside
a time-box. (“Do until done”) • Cutover phase -- installation of the system, user acceptance testing and user training
Strengths: • Reduced cycle time and improved productivity with fewer people means lower costs • Time-box approach mitigates cost and schedule risk • Customer involved throughout the complete cycle minimizes risk of not achieving customer
satisfaction and business needs • Focus moves from documentation to code (WYSIWYG). • Uses modeling concepts to capture information about business, data, and processes.
Weaknesses: • Accelerated development process must give quick responses to the user • Risk of never achieving closure • Hard to use with legacy systems • Requires a system that can be modularized • Developers and customers must be committed to rapid-fire activities in an abbreviated time frame.
When to use RAD: • Reasonably well-known requirements • User involved throughout the life cycle • Project can be time-boxed • Functionality delivered in increments • High performance not required • Low technical risks • System can be modularized
Agile Model Speed up or bypass one or more life cycle phases Usually less formal and reduced scope Used for time-critical applications Used in organizations that employ disciplined methods
Some Agile methods • Adaptive Software Development (ASD) • Feature Driven Development (FDD) • Crystal Clear • Dynamic Software Development Method (DSDM) • Rapid Application Development (RAD) • Scrum • Extreme Programming (XP) • Rational Unify Process (RUP)
-
CA in Bangladesh We believe in sharing [www.facebook.com/CAinBD]
Md. Sayduzzaman Tuhin, Articled Student, S.F. Ahmed & Co. Mob:-01552-639307
SDLC Model Comparison Waterfall RAD Incremental Prototype Spiral Step by Step Approach. Next step can not start unless previous step is through
High speed adaptation of waterfall model. Development is done for independent components in parallel and then integrated
Successive enlargements and refinements of a system through multiple mini SDLCs. Customer’s requirements are gradually known
A simplified model of the system (prototype) is built fast to make the client have a feel of the system. While building prototype the minimum amount of coding is done without implementing coding standard, error management, normalization etc. It is a way of understanding requirements from the customer
Iterative nature of the Prototyping Model with the controlled and systematic approach of the Waterfall Model • Used in projects where risk factor is
high: military, research-oriented. • Performs risk evaluation in each
cycle. • Can be integrated with other life
cycles. • Multiple cycles performed. Each
cycle consists of: 1. Determine objectives, alternatives,
constraints 2. Evaluate alternatives, identify &
resolve risk (e.g. risk analysis, prototype, simulation)
3. Develop and verify product: prototype, product or other deliverable
4. Plan next phase: Review findings of this round and plan goals for next round
Waterfall RAD Incremental Prototype Spiral When the requirements are clear
When a system can be broken into independent sub systems
When the objectives of the system can be achieved by dividing the system into sub systems with a core system. The core system of sub system will serve the basic needs and the subsequent systems will serve the incremental needs. When there is a technical / resource risk
When Requirements are not completely known
When Risk is high
1.Requirements have to be fully understood to implement this model 2.As one phase depends on the other so it causes delay 3.Things keep coming in for a particular phase even after the phase is signed off 4.Rigid Model
1.Performance issue. 2.Technical issues are high 3.Interoperability issue with existing systems 4. Resource may be an issue
Difficulty in managing multiple concurrent increments
1.Does not work well for production system 2.Customer sees a 'working' model and gets impatient. 3.Developer may make implementation compromises to get prototype working quickly.
1.No scheduled project completion. 2.A dedicated team for risk analysis is required
-
CA in Bangladesh We believe in sharing [www.facebook.com/CAinBD]
Md. Sayduzzaman Tuhin, Articled Student, S.F. Ahmed & Co. Mob:-01552-639307
Common Risks in SDLC:
1. Lack of management support 2. Functionality non-alignment with user departments 3. Scope variation, i.e., scope creeping (ineffective freezing of SRS) 4. Unfulfilling the requirements set in SRS by the vendor 5. Time over-run 6. Cost over-run 7. Insufficient or wrong identification of stakeholders and their participation 8. Insufficient breakdown of project activities and segregation of duties 9. Insufficient planning process 10. Insufficient or weak risk management 11. Improper cost estimation 12. Wrong selection of technology 13. Inappropriate or insufficient Test Cases in UAT 14. Insufficient participation user departments in UAT design and testing 15. Absence of Regression Testing (and fallback plan) and Sociability Testing (compatibility with
other related systems) 16. In sufficient Technical Testing, e.g., configuration testing, load testing, inter-operatibility of
system components, unhandled errors, automaticity of transactions, password encryption, etc 17. Erroneous data migration 18. Insufficient attention to security and controls (including validations and audit trails) in the
application system 19. Performance criteria not being met 20. Inappropriate resourcing 21. Insufficient documentation 22. Inadequate contractual protection 23. Inadequate adherence to chosen SDLC and/or development methodologies 24. Insufficient skill transfer by user training
Typical Audit Steps for SDLC: A. Control Objective #1 - SDLC Methodology
1. Determine the extent of the responsibilities of management, internal audit, users, quality assurance, and data processing during the system design, development, and maintenance.
2. Review SDLC workpapers to determine if the appropriate levels of authorization were obtained for each phase.
3. Obtain and review requests for DP services. Determine if the University's procedures are being followed.
B. Control Objective #2 - Needs Analysis 1. Review and evaluate the procedures for performing a needs analysis. 2. Review a needs analysis for a recent project and determine if it conforms to standards.
C. Control Objective #3 - Systems Design and Development 1. Review and evaluate the procedures for systems design and development. 2. Review design specifications schedules, look for written evidence of approval, and determine
if the design specifications comply with the standards. 3. Determine if an audit trail and programmed controls are incorporated in the design
specifications of a recent project. 4. Review samples of source documents used for data entry which are included in SDLC
workpapers of a recently developed application. Determine if they are designed to facilitate accurate gathering and entry of information.
5. Obtain and review programs to determine if they comply with the University's programming standards.
D. Control Objective #4 - Testing Procedures 1. Review and evaluate the procedures for system and program testing. 2. Review documented testing procedures, test data, and resulting output to determine if they
appear to be comprehensive and if they follow University standards. 3. Review the adequacy of testing performed on the manual phases of an application.
-
CA in Bangladesh We believe in sharing [www.facebook.com/CAinBD]
Md. Sayduzzaman Tuhin, Articled Student, S.F. Ahmed & Co. Mob:-01552-639307
E. Control Objective #5 - Implementation Procedures 1. Review and evaluate procedures for program promotion and implementation. 2. Review documentation of the program promotion procedure. Determine if the standards are
followed and if documentation of compliance with the standards is available. Trace selected program and system software changes to the appropriate supporting records to determine if the changes have been properly approved.
3. Review documentation of the conversion/implementation of a newly developed application. Determine if the University's implementation procedures were followed.
F. Control Objective #6 - Post-implementation Review 1. Review and evaluate the procedures for performing post-implementation reviews. 2. Review program modifications, testing procedures, and the preparation of supporting
documentation to determine if the University's standards are being followed. G. Control Objective #7 - Maintenance of Applications
1. Review and evaluate the procedures for the maintenance of existing applications. 2. Review program modifications, testing procedures, and the preparation of supporting
documentation to determine if the University's standards are being followed. H. Control Objective #8 - Control over Systems Software
1. Review and evaluate the procedures for modifying systems software. 2. Review systems software modifications, testing procedures, and the preparation of supporting
documentation to determine if the University's standards are being followed. 3. Review and evaluate documentation of in-house developed systems software and the
features/options of proprietary systems software in use. I. Control Objective #9 - Documentation Standards
1. Obtain and review the documentation standards to determine if they are complete. EFFECT OF WEAKNESSES: Major portion of the cost of an application over its useful life is incurred for maintenance after the application becomes operational. If little attention is given to the SDLC in the creation of a system, excessive maintenance costs can be incurred, especially if it is necessary to put controls in after the application is already in production. Redesign is not only expensive, but also difficult to accomplish. If accurate and comprehensive documentation is not maintained, the auditor will have difficulty assessing controls without expending substantial effort to obtain an accurate description of significant applications and their relationships to one another. If modifications to application and system software are not adequately controlled, the integrity of the software may be compromised by unauthorized changes in programs, procedures, or data. When an application is properly designed, systems development and documentation controls can prevent or disclose the following types of errors:
1. implementation of applications that do not have adequate application controls; development of applications that either do not meet management objectives or do not operate in accordance with original specifications;
2. Implementation of applications that have not been adequately tested, and; 3. Implementation of applications that is susceptible to unauthorized modification.
-
CA in Bangladesh We believe in sharing [www.facebook.com/CAinBD]
Md. Sayduzzaman Tuhin, Articled Student, S.F. Ahmed & Co. Mob:-01552-639307
Introduction to e-Business Learning Objectives
1. Explain what e-business is and how it affects organizations. 2. Discuss methods for increasing the likelihood of success and for minimizing the potential
risks associated with e-business. 3. Describe the networking and communications technologies that enable e-business.
Learning Objective 1: Explain what e-business is and how it affects organizations. Introduction: E-Business E-business refers to all uses of advances in information technology (IT), particularly networking and communications technology, to improve the ways in which an organization performs all of its business processes. E-business encompasses an organization’s external interactions with its:
Suppliers Customers Investors Creditors The government Media
E-business includes the use of IT to redesign its internal processes. For organizations in many industries, engaging in e-business is a necessity. Engaging in e-business in and of itself does not provide a competitive advantage. However, e-business can be used to more effectively implement its basic strategy and enhance
the effectiveness and efficiency of its value-chain activities. E-Business Models
Business to Consumers (B2C): Interactions between individuals and organizations. Business to Business (B2B): Interorganizational e-business.
Categories of E-Business
Type of E-Business Characteristics
B2C Organization-individual Smaller dollar value One-time or infrequent transactions Relatively simple
B2B B2G B2E
Interorganizational Larger dollar value Established, on-going relationships Extension of credit by seller to customer More complex
E-Business Effects on Business Processes
Electronic Data Interchange (EDI): Standard protocol, available since the 1970s, for electronically transferring information between organizations and across business processes.
EDI: Improves accuracy Cuts costs
-
CA in Bangladesh We believe in sharing [www.facebook.com/CAinBD]
Md. Sayduzzaman Tuhin, Articled Student, S.F. Ahmed & Co. Mob:-01552-639307
Recent EDI Facilitators Traditional EDI was expensive. New developments that have removed this cost barrier are: The Internet: Eliminates the need for special proprietary third-party networks. XML: Extensible Markup Language – Set of standards for defining the content of data on
Web pages. ebXML:
Defines standards for coding common business documents. Eliminates need for complex software to translate documents created by different
companies. Integrated Electronic Data Interchange (EDI)
Reaping the full benefits of EDI requires that it be fully integrated with the company’s AIS.
Suppliers
Customers
AIS
Company
EDIPurchase orders
Customer orders
EDI
E-Business Effects on Value Chain Activities:
Value Chain – Primary Activities
E-Business Opportunity
Inbound logistics Acquisition of digitizable products Reduced inventory “buffers”
Operations Faster, more accurate production
Outbound logistics Distribution of digitizable products Continuous status tracking
Sales and Marketing Improved customer support Reduced advertising costs More effective advertising
Post-sale Support and Service Reduced costs 24/7 Service availability
Purchasing Human Resources Infrastructure
Source identification and reverse auctions
Employee self-service EFT, FEDI, other electronic payments
Purchasing and Inbound Logistics
The Internet improves the purchasing activity by making it easier for a business to identify potential suppliers and to compare prices.
-
CA in Bangladesh We believe in sharing [www.facebook.com/CAinBD]
Md. Sayduzzaman Tuhin, Articled Student, S.F. Ahmed & Co. Mob:-01552-639307
Purchase data from different organizational subunits can be centralized. • This information can be used to negotiate better prices. • Number of suppliers can be reduced. • Reverse auctions can be held
For products that can be entirely digitized, the entire inbound logistics function can be performed electronically.
Internal Operations, Human Resources, and Infrastructure
Advanced communications technology can significantly improve: The efficiency of internal operations. Planning. The efficiency and effectiveness of the human resource support activity. The efficiency and effectiveness of customer payments.
Information Flows in Electronic Commerce
Buyer Seller1. Inquiries
2. Responses
3. Orders
4. Acknowledgment
5. Billing
6. Remittance data
7. PaymentsExplanations:
EDI = Steps 1-6
EFT = Step 7
FEDI = Steps 1-7 Financial Electronic Data Interchange (FEDI)
The use of EDI to exchange information is only part of the buyer-seller relationship in business-to-business electronic commerce.
Electronic funds transfer (EFT) refers to making cash payments electronically, rather than by check.
EFT is usually accomplished through the banking system’s Automated Clearing House (ACH) network.
An ACH credit is an instruction to your bank to transfer funds from your account to another account.
An ACH debit is an instruction to your bank to transfer funds from another account into yours.
Company A’sbank
Company B’sbank
Company A Company B
Remittance data and payment instruction
Remittance data and funds An Application Service Provider (ASPs):
An Application Service Provider (ASP) is a company that provides access to and use of application programs via the Internet.
The ASP owns and hosts the software; the contracting organization accesses the software via the Internet.
Factors to Consider When Evaluating ASPs
-
CA in Bangladesh We believe in sharing [www.facebook.com/CAinBD]
Md. Sayduzzaman Tuhin, Articled Student, S.F. Ahmed & Co. Mob:-01552-639307
Advantages Lower costs Automatic upgrading to current version of software Need fewer in-house IT staff Reduced hardware needs Flexibility Knowledge support Security and privacy of data
Disadvantages Viability of ASP Security and privacy of data Availability and reliability of service Inadequate support or poor responsiveness to problems Standard software that may not meet all customized needs
Factors to Include in Service Level Agreements
Detailed specification of expected ASP performance Uptime Frequency of backups Use of encryption Data access controls
Remedies for failure of ASP to meet contracted service levels Ownership of data stored at ASP
Outbound Logistics: E-Business can improve the efficiency and effectiveness of sellers’ outbound logistical
activities. Timely and accurate access to detailed shipment information. Inventory optimization. For goods and services that can be digitized, the outbound logistics function can be
performed entirely electronically. Sales and Marketing:
Companies can create electronic catalogs to automate sales order entry. Significantly reduce staffing needs. Customization of advertisements
Post-Sale Support and Service: Consistent information to customers. Provide answers to frequently asked questions (FAQs)
Learning Objective 2: Discuss methods for increasing the likelihood of success and for minimizing the potential risks associated with E-Business. .E-Business Success Factors:
The degree to which e-business activities fit and support the organization’s overall business strategy.
The ability to guarantee that e-business processes satisfy the three key characteristics of any business transaction
Validity Integrity Privacy
Encryption: There are two principal types of encryption systems:
Single-key systems: Same key is used to encrypt and decrypt the message • Simple, fast, and efficient • Example: the Data Encryption Standard (DES) algorithm
Public Key Infrastructure (PKI): Uses two keys: • Public key is publicly available and usually used to encode message • Private key is kept secret and known only by the owner of that pair of keys.
Usually used to decode message
-
CA in Bangladesh We believe in sharing [www.facebook.com/CAinBD]
Md. Sayduzzaman Tuhin, Articled Student, S.F. Ahmed & Co. Mob:-01552-639307
Advantages & Disadvantages of PKI: Advantages
No sharing of key necessary More secure than single-key systems
Disadvantages Much slower than single-key systems
Digital Signatures and Digests: Digital signature: An electronic message that uniquely identifies the sender of that message. Digest: The message that is used to create a digital signature or digital summary.
If any individual character in the original document changes, the value of the digest also changes. This ensures that the contents of a business document have not been altered or garbled during transmission
Digital Certificates & Certificate Authorities: Digital Certificate: Used to verify the identity of the public key’s owner.
A digital certificate identifies the owner of a particular private key and the corresponding public key, and the time period during which the certificate is valid.
Digital certificates are issued by a reliable third party, called a Certificate Authority, such as: Verisign Entrust Digital Signature Trust
The certificate authority’s digital signature is also included on the digital certificate so that the validity of the certificate can also be verified.
Learning Objective 3: Describe the networking and communications technologies that enable e-business. Types of Networks:
The global networks used by many companies to conduct electronic commerce and to manage internal operations consist of two components:
1 Private portion owned or leased by the company 2 The Internet
The private portion can be further divided into two subsets: 1 Local area network (LAN) — a system of computers and other devices, such as printers, that
are located in close proximity to each other. ■Wide area network (WAN) — covers a wide geographic area. 2 Companies typically own all the equipment that makes up their local area network (LAN). 2 They usually do not own the long-distance data communications connections of their wide
area network (WAN). 2 They either contract to use a value-added network (VAN) or use the Internet. 2 The Internet is an international network of computers (and smaller networks) all linked
together. 2 What is the Internet’s backbone?
2 the connections that link those computers together 2 Portions of the backbone are owned by the major Internet service providers (ISPs). 2 What is an Intranet? 2 The term Intranet refers to internal networks that connect to the main Internet. 2 They can be navigated with the same browser software, but are closed off from the general
public. 2 What are Extranets?
Companies build a virtual private network (VPN) to improve reliability and security, while
still taking advantage of the Internet.
-
CA in Bangladesh We believe in sharing [www.facebook.com/CAinBD]
Md. Sayduzzaman Tuhin, Articled Student, S.F. Ahmed & Co. Mob:-01552-639307
Company A
AIS VPNequipmentISP
Internet
Data Communications System Components:
There are five basic components in any data communication network (whether it is the Internet, a LAN, a WAN, or a VAN):
1 The sending device 2 The communications interface device 3 The communications channel 4 The receiving device 5 Communication software
The following are components of the data communications model: – interface devices – communications software – communications channel
Interface Devices: There are six basic communication interface devices that are used in most networks:
1 Network interface cards 2 Modems 3 Remote access devices 4 Hubs 5 Switches 6 Routers
Company APC-1NIC
PC-2 PC-3NIC NIC
Switch
Router
Hub 1
Hub 1 OtherLANs
Internet service provider
Remote accessdevice
Frame relayswitch
Router
-
CA in Bangladesh We believe in sharing [www.facebook.com/CAinBD]
Md. Sayduzzaman Tuhin, Articled Student, S.F. Ahmed & Co. Mob:-01552-639307
Home PCModem
Remote accessdevice
Frame relayswitch
Router
Home PCModem
Internet service provider
Communications Software:
Communications software manages the flow of data across a network. It performs the following functions:
– access control – network management – data and file transmission – error detection and control – data security
Communications Channels: A communications channel is the medium that connects the sender and the receiver.
– standard telephone lines – coaxial cables – fiber optics – microwave systems – communications satellites – cellular radios and telephones
SatelliteMicrowave stations
Topologies:
Local area networks (LANs) can be configured in one of three basic ways: 1 Star configuration 2 Ring configuration 3 Bus configuration
Network Configuration Options: A star configuration is a LAN configured as a star; each device is directly connected to the
central server. All communications between devices are controlled by and routed through the central server. Typically, the server polls each device to see if it wants to send a message.
Network Configuration Options (Star) The star configuration is the most expensive way to set up a LAN, because it requires the greatest amount of wiring.
-
CA in Bangladesh We believe in sharing [www.facebook.com/CAinBD]
Md. Sayduzzaman Tuhin, Articled Student, S.F. Ahmed & Co. Mob:-01552-639307
Host computeror server
A B C
G F E
DH
Network Configuration Options (Ring) In a LAN configured as a ring, each node is directly linked to two other nodes
A
H
B
D
C
EGF
Network Configuration Options (Bus)
In a LAN configured as a bus, each device is connected to the main channel, or bus. Communication control is decentralized on bus networks.
A B C
GFE
D
H
Host computeror server
Bus channel
Network Configuration Options
Wide area networks (WANs) can be configured in one of three basic ways: 1 Centralized system 2 Decentralized system 3 Distributed data processing 3 In a centralized WAN, all terminals and other devices are connected to a central corporate
computer.
In a decentralized WAN, each departmental unit has its own computer and LAN. Decentralized systems usually are better able to meet individual department and user needs
than are centralized systems.
-
CA in Bangladesh We believe in sharing [www.facebook.com/CAinBD]
Md. Sayduzzaman Tuhin, Articled Student, S.F. Ahmed & Co. Mob:-01552-639307
A distributed data processing system WAN is essentially a hybrid of the centralized and decentralized approaches
Many WANs, and most LANs, are set up as client/server systems. Each desktop computer is referred to as a client. The client sends requests for data to the servers. The servers perform preprocessing on the database and send only the relevant subset of data
to the client for local processing.
-
CA in Bangladesh We believe in sharing [www.facebook.com/CAinBD]
Md. Sayduzzaman Tuhin, Articled Student, S.F. Ahmed & Co. Mob:-01552-639307
Programming language Objectives of this session
Introduction to Programming Language? Generation of Programming Language? Object Oriented Programming language. Visual Programming Steps in Programming Flowchart Pseudocode
Programming Language Set of rules that tell the computer what operations to perform. Can be classified in two levels
Lower level Higher Level
Lower Level: Closer to form to the language the computer itself uses[1,0]
Higher Level: Closer to the language people use. Compiler:
A compiler is a computer program (or set of programs) that transforms source code written in a computer language (the source language) into another computer language (the target language, often having a binary form known as object code). The most common reason for wanting to transform source code is to create an executable program.
Examples are C++, VB Interpreter:
An interpreter translates high-level instructions into an intermediate form, which it then executes.
In contrast, a compiler translates high-level instructions directly into machine language. Compiled programs generally run faster than interpreted programs.
The advantage of an interpreter, however, is that it does not need to go through the compilation stage during which machine instructions are generated. This process can be time-consuming if the program is long
OS independent Examples JAVA, Perl
Generation of Programming language Five Generations
1. First Generation language - Machine language - Basic language of the computer, representing instructions & data as binary digits. - Machine dependant. 2. Second Generation - Assembly Language -use symbols as abbreviations L for load.. - Easier and more efficient in software development.
First and Second Generation P.L More Technical More flexible Less user friendly Faster 3.Third Generation
High level languages, are very much like every day text & mathematical formula Run on different computers COBOL, FORTRAN, BASIC,C
Third Generation languages are Less technical Less flexible More user friendly Slower
-
CA in Bangladesh We believe in sharing [www.facebook.com/CAinBD]
Md. Sayduzzaman Tuhin, Articled Student, S.F. Ahmed & Co. Mob:-01552-639307
4.Fourth Generation Language Nonprocedural languages, Not specify how. Need one-tenth number of statements of high-level language Easier
5.Fifth Generation Language Natural Language. No need to learn specific vocabulary, grammar, syntax. Very closely resembles human speech.
Expert systems, Computer-based collection of knowledge, Artificial Intelligence. Object Oriented Programming(OOP):
Object oriented programming combines data with instructions for processing that data to make a self-sufficient object that can be used in other programs.
An object is a block of preassembled programming code that is a self-contained module. Three Concepts of OOP Encapsulation: Means an object contains both data and instructions for processing. Inheritance: An object can be used as the foundation for similar objects. Polymorphism: Means a message produces different results based on the object that it is sent to. Visual Programming: Visual programming is a method of creating programs in which the programmer makes connections between objects by drawing, pointing, and clicking on diagrams and icon. Easier and graphical way. Steps in Programming: Five Steps Step -1:Define the problem: 1. Specify program objective and program users 2. Specify output requirements. 3. Specify input requirements 4. Specify processing requirements. 5. Study feasibility of implementing program 6. Document analysis and objective specification process. Step -2: Design a solution:
1. Map out the Program logic 2. Diagram a document program design. 3. Test design with structured walkthrough
Step -3: Code the program Write the program using high level language
Step –4: Test the program Test program with structured walkthrough, desk checking and sample data to try to break the program. Step –5: Finalize the Documentation
Assemble and finalize all documentation made during all previous steps. Algorithm:
An algorithm is a set of well-defined rules for the solution of a problem in a particular number of steps.
Pseudocode: • Pseudocode uses human-language stataements instead of symbols to represent program logic. • Precise • Does not follow a specific programming language
Flow chart: A program flowchart is a diagram that uses standard ANSI Symbols to show the step-by-step processing objectives and decision logic needed to solve a problem.
-
CA in Bangladesh We believe in sharing [www.facebook.com/CAinBD]
Md. Sayduzzaman Tuhin, Articled Student, S.F. Ahmed & Co. Mob:-01552-639307
Standard flowchart Symbols:
Terminal, marks the beginning, end, or a part of interruption in a program Input/output
Processing, shows a group of instructions in located in order to perform a processing task. Decision, shows where alternative operation are performed based on the existence of certain
conditions.
Connector, shows movement to or from another part of the program. Predefined process, Indicate a group of operations not detailed in the particular flowchart.
The benefits of flowcharts:
Communication: Flowcharts are better way of communicating the logic of a system to all concerned;
Effective analysis: With the help of flowchart, problem can be analyzed in more effective way;
Proper documentation: Program flowcharts serve as a good program documentation, which is needed for various purposes;
Efficient Coding: The flowcharts act as a guide or blueprint during the systems analysis and program development phase;
Efficient Program Maintenance: The maintenance of operating program becomes easy with the help of flowchart. It helps the programmer to put efforts more efficiently on that part;
Flow chart to find the maximum
Start
READ N1, N2, N3
MAX=N1
2/11/2002
IF N2> MAX
MAX=N2
MAX=N3
PRINT MAX
NoYes
IF N3> MAXYes
No
-
CA in Bangladesh We believe in sharing [www.facebook.com/CAinBD]
Md. Sayduzzaman Tuhin, Articled Student, S.F. Ahmed & Co. Mob:-01552-639307
Transaction Processing Processing Model:
• Batch Processing – Lag between the point of transaction (economic event) and reflect in firm’s
accounting systems – Data synchronized after fulfilling certain condition – Example : Salary of employees
• Real Time – Main accounting system updating immediate after transaction takes place. No lag,
no time gap. • Distributing Processing
- Transactions first up date with individual accounting system then update the main accounting system
-
CA in Bangladesh We believe in sharing [www.facebook.com/CAinBD]
Md. Sayduzzaman Tuhin, Articled Student, S.F. Ahmed & Co. Mob:-01552-639307
Network and communication Network: A network is nothing more than two or more computers connected together so that they can exchange information. Types of Network: Local Area Network(LAN) Metropolitan Area Network(MAN) Wide Area Network(WAN) LAN: When computers located within a small geographical area such as office or a University Campus are connected together we call it a Local Area Network. MAN: The geographical range of MAN is bigger than LAN. It covers a small city. WAN: Wide area network span broad geographical distances, ranging from several miles to across entire continents. Wan may consist of a combination of switched and dedicated Lines, microwaves, and satellite communication. Uses of Computer Networks: Business Applications: 1. First goal is resource sharing to make all programs, equipment, and specially data available to anyone on the network without regard to the physical location of the resource and the user. 2. A computer network can provide a powerful communication medium among employees. 3. Many companies are doing business electronically with other companies, especially suppliers and customers. 4. Doing business with consumers over the Internet. Home Applications: Some of the popular uses of the Internet for home users are as follows: 1. Access to remote information 2. Person-to-person communication 3. Interactive entertainment 4. Electronic Commerce Mobile users: People on the road and sea may use their portable electronic equipment to send and receive telephone calls, faxes, electronic mail, surf the web, access remote files, and log on to the remote machines. Social issues: A popular feature of many networks is newsgroups or bulletin boards whereby people can exchange messages with like-minded individuals. Network Topology:
Network Topology refers to the physical data path that traffic takes across the network. Three basic types of topologies are bus, star and ring. Bus Topology: In a bus topology
Each node is connected to a common cable called a bus. Each node has a unique address. All nodes will receive a message, but only the addressed node is to respond. If one node is down, the network is still available. Fewer wires or lines are needed.
Fig: Bus topology
-
CA in Bangladesh We believe in sharing [www.facebook.com/CAinBD]
Md. Sayduzzaman Tuhin, Articled Student, S.F. Ahmed & Co. Mob:-01552-639307
Star Topology: In a star topology a central host computer connected to a number of small computers or terminals. This topology is useful for applications where some processing must be centralized and some can be preformed locally. If the central host computer is down, the network will come to standstill. Ring Topology: In a ring topology all computers are connected by a closed loop in a manner that passes data in one direction from one computer to another. The main disadvantage of a ring is larger communication delays if the number of nodes increases. Model of Connectivity for networks:
Reference model: A reference model is a generic framework for thinking about a problem. Protocol: A protocol is a statement that explains how a specific task will be performed. Open system Interconnect (OSI) Model: OSI model is an international reference model developed by the International Standard Organization (ISO) for linking different types of computers and networks. The OSI model is made up of seven layers Application Layer Application Layer Presentation Network Presentation Layer Session Layer Session Layer Transport Layer Transport Layer Network Layer Network Layer Data Link Layer Data Link Layer Physical Layer Physical Layer
Physical Layer: This layer defines the electrical and mechanical aspects of interfacing to a physical medium for transmitting data. It also defines how physical links are setup, maintained and disconnected. Data Link Layer: This layer establishes an error-free communications path between computers over the physical channel. It gives the standard for framing messages, checking integrity of received messages, accessing and using channels and sequencing of transmitted data. Network Layer: The network layer handles the routing functions for data moving from one open system to another. This layer provides the addressing necessary to relay data through intermediate nodes or systems that provide the connectivity between nonadjacent open systems. Transport Layer: The transport layer is responsible for maintaining a specific class of service for the user. The transport layer provides communications flow control beyond the frame-level control provided in that data-link layer. To prevent congestion in a network, this layer segments data or block data to form smaller or larger packets. Session Layer: The session layer allows users on different machines to establish sessions between them. Session offers various services, including dialog control, token management and synchronization.
-
CA in Bangladesh We believe in sharing [www.facebook.com/CAinBD]
Md. Sayduzzaman Tuhin, Articled Student, S.F. Ahmed & Co. Mob:-01552-639307
Presentation Layer: This layer is concerned with the syntax and semantics of the information transmitted. The presentation layer manages the abstract data structures and allows higher level data structures. It also provides ASCII-to-EBCDIC and EBCDIC-to-ASCII conversion. Application Layer: This provides services that directly support users such as file transfers, remote files access, and data base management, etc. Communication Media:
Physical communication media are the physical channels through which information is transmitted between computers in a network. A channel can utilize different kinds of telecommunication media: twisted wire, coaxial cable, fiber optics, terrestrial microwave, satellite, and wireless transmission. Twisted Wire: Twisted wire consists of stands of copper wire twisted in pairs and is the oldest transmission medium. Although it is low in cost, twisted pair is relatively slow for transmission data, and high-speed transmission causes interference called crosstalk. Coaxial Cable: Coaxial Cable consists of thickly insulated copper wire, which can transmit a larger volume of data than twisted wire can. It is faster, more interference-free transmission medium, with speeds up to 200 megabits per second. However, coaxial cable is thick, is hard to wire in many buildings, and cannot support analog phone conversations. Inner Outer Insulation Connector(wire) Conductor Insulation Fiber optics: Fiber optics cable consists of thousands of stands of clear glass fiber, the thickness of a human hair, which are bound into cables. Data are transformed into pulses of light, which are sent through the fiber optics cable by a laser device at a rate of 100 Mbps to 2Gbps. Light ray Cladding Core Optical fibers have several advantages. They are:
i) Very high bandwidth. ii) Protection against electromagnetic interface iii) More secure, as they cannot be trapped easily. iv) Light weight and no corrosion.
The major disadvantages of fibers are: i) It is more difficult to work with, more expensive, and hard to install ii) They are fragile and cannot have sharp bends.
Microwave: Microwave systems transmit high-frequency radio signals through the atmosphere and are widely used for high-volume, long-distance, point-to-point communication. The great advantage of microwaves is the large bandwidth of 40 to 200 MHz available which will permit data transmission rates in the range of 250 Mbps. The capital investment needed to install microwave link is very high.
-
CA in Bangladesh We believe in sharing [www.facebook.com/CAinBD]
Md. Sayduzzaman Tuhin, Articled Student, S.F. Ahmed & Co. Mob:-01552-639307
Satellite A communication satellite is essentially a microwave relay station in the sky. Conventional communication satellites move in stationary orbits approximately 22000 miles above the earth. Communication satellites are cost effective for transmitting large quantities of data over long distances. Other communication Systems Gateway The function of a gateway is to allow two or more dissimilar network to communicate as single logical entity. Bridges A bridge is a device that’s used to connect two similar types of networks so that they act as if they’re one network. Router A router is similar to a super-intelligent bridge for big networks. Bridges know the address of all the computers on each side of the bridge and can be forwarded messages accordingly. Router not only knows the addresses of all computers but also other bridges and routers of the network, and can decide the most efficient path to send each message. Fire Wall A network fire wall is a gatekeeper computer system that protects a company’s networks from intrusion by serving as a filter and safe transfer point for access to and from the internet and other networks. It screens all network traffic for proper passwords or other security codes, and only allows authorized transmissions in and out of the network.
top related