You are on page 1of 12

SYSTEM ANALYSIS & DESIGN

Department of Information and


Communication Technology 2017
SYSTEM DESIGN
What is Input Output Design?

Dashboard Output

Reference : Shelly Rosenblatt, “Systems Analysis and Design Ninth Edition”, page 350
SYSTEM DESIGN

Personal Finance Manager Health Tracker

Reference : Shelly Rosenblatt, “Systems Analysis and Design Ninth Edition”, page 350
SYSTEM DESIGN

CV Creator
User Registration

Reference : Shelly Rosenblatt, “Systems Analysis and Design Ninth Edition”, page 350
SYSTEM DESIGN

Order Food Delivery

Sistem Tempahan Tiket

Reference : Shelly Rosenblatt, “Systems Analysis and Design Ninth Edition”, page 350
SYSTEM DESIGN
What is Data Entry

Data entry is the process of manually entering data into the information system,
usually in the form of keystrokes, mouse clicks, touch screens, or spoken words.

The most
effective
method of
online data
entry is form
filling!

Reference : Shelly Rosenblatt, “Systems Analysis and Design Ninth Edition”, page 364
SYSTEM DESIGN
What is Batch Input?

BATCH INPUT Using batch input, data entry usually is performed on a specified
time schedule, such as daily, weekly, monthly, or longer.

Reference : Shelly Rosenblatt, “Systems Analysis and Design Ninth Edition”, page 368
SYSTEM DESIGN
What is Online Input?

1. ONLINE INPUT Although batch input is used in specific situations, most


business activity requires online data entry.

2. The online method offers major advantages, including the immediate


validation and availability of data.

3. A popular online input method is source data automation, which combines


online data entry and automated data capture using input devices such as
RFID tags or magnetic data strips.

Barcoding using Biometric Input


RFID

Reference : Shelly Rosenblatt, “Systems Analysis and Design Ninth Edition”, page 368
SYSTEM DESIGN
What is Input Mask
Use input masks, which are templates or patterns that restrict data entry and prevent
errors.
What is Validation Rules

Reducing the number of input errors improves data quality.


One way to reduce input errors is to eliminate unnecessary data entry.

sequence check range check


data must be in some predetermined to verify that they fall between a specified
sequence. (date 2/1/17) 8 types of minimum and maximum value.
existence check data
reasonableness check
used for mandatory data items validation values that are questionable, but not
(ic 789288-10-2292) rules necessarily wrong (24 hours not logic)
data type check validity check
ensure that a data item fits the used for data items that must have
required data type certain values. (limit 20 data)
(email@.com )
combination check
Batch controls performed on two or more fields to ensure that they are
totals used to verify batch input consistent or reasonable when considered together.
(number of quantity order = sum total order) (quantity vs discount)
The batch control totals often are called
hash totals.
Reference : Shelly Rosenblatt, “Systems Analysis and Design Ninth Edition”, page 367
SYSTEM DESIGN
What is Output Type? INTERNET-BASED INFORMATION DELIVERY E-MAIL
BLOGS INSTANT MESSAGING

WIRELESS DEVICES
COMPUTER OUTPUT TO
DIGITAL MEDIA

DIGITAL AUDIO, IMAGES, AND VIDEO

COMPUTER OUTPUT TO MICROFILM (COM) AUTOMATED FACSIMILE SYSTEMS

PODCASTS SPECIALIZED FORMS OF OUTPUT

Reference : Shelly Rosenblatt, “Systems Analysis and Design Ninth Edition”, page 358 - 359
SYSTEM DESIGN
Types of Reports

DETAIL REPORTS
• A detail report produces one or more lines of
output for each record processed.
• Each line of output printed is called a detail
line.

EXCEPTION REPORTS
• An exception report displays only those
records that meet a specific condition or
conditions.

SUMMARY REPORTS
• Upper-level managers often want to see total
figures and do not need supporting details.

Reference : Shelly Rosenblatt, “Systems Analysis and Design Ninth Edition”, page 352
SYSTEM DESIGN
Input Output Security Control

• Input control includes the • Output Security and Control


necessary measures to ensure Output must be accurate,
that input data is correct, complete, current, and secure.
complete and secure.
• Companies use various output
• Provide an audit trail that control methods to maintain
records the source of each data output integrity and security.
item and when it entered the
system. • Output security protects privacy
rights and shields the
• Data security policies and organization’s proprietary data
procedures protect data from from theft or unauthorized access.
loss or damage, which is a vital
goal in every organization.

Reference : Shelly Rosenblatt, “Systems Analysis and Design Ninth Edition”, page 352

You might also like