phase suspense account by alicejenny

VIEWS: 3 PAGES: 8

									Name: Mohammed Khalid ALkhalily

ID:120080016

                                       Phase 3#




3#System Design:-

3-1 Output design and specifications

3-2 Input design and specifications

3-3 Files and database design

3-4 Design of procedures for processing



4 Conclusion

4-1 results that have been reached

4-2 recommendations and future work




5 References




6 appendices
3-1 Output design and specifications:-



3.1Design Constraints

The system must be designed to allow web usability. That is, the

system must

be designed in such a way that will be easy to use and visible on most

of the browsers.

Output Controls:

Automated output controls help ensure systems securely maintain and properly
distribute processed information. Examples of automated output controls include:




Batch Logs – Batch logs record batch totals. Recipients of distributed output verify
the output against processed batch log totals.




Distribution Controls – Distribution controls help ensure output is only distributed to
authorized individuals. Automated distribution lists and access restrictions on
information stored electronically or spooled to printers are examples of distribution
controls.

Destruction Controls – Destruction controls help ensure electronically distributed and
stored information is destroyed appropriately by overwriting outdated information or
demagnetizing (degaussing) disks and tapes. Refer to the IT Handbook’s “Information
Security Booklet” for more information on disposal of media.
3-2 Input design and specifications:-

Input Controls:

Automated input controls help ensure employees accurately input information, systems
properly record input, and systems either reject, or accept and record, input errors
for later review and correction. Examples of automated input controls include:

Check Digits – Check digits are numbers produced by mathematical calculations
performed on input data such as account numbers. The calculation confirms the
accuracy of input by verifying the calculated number against other data in the input
data, typically the final digit.

Completeness Checks – Completeness checks confirm that blank fields are not input
and that cumulative input matches control totals.

Duplication Checks – Duplication checks confirm that duplicate information is not
input.

Limit Checks – Limit checks confirm that a value does not exceed predefined limits.

Range Checks – Range checks confirm that a value is within a predefined range of
parameters.

Reasonableness Checks – Reasonableness checks confirm that a value meets
predefined criteria.

Sequence Checks – Sequence checks confirm that a value is sequentially input or
processed.

Validity Checks – Validity checks confirm that a value conforms to valid input criteria.




3-3 Files and database design:-

Provides readers with a clear understanding of the structure of library automation
systems along with enough information about underlying algorithms, file structures,
and processing strategies to enable them to evaluate vendor products, build a system
using the techniques described and continue to improve their own library system.
After explaining the basics of traditional automated library systems, the author
presents an integrated library system as well as the tools which aid in the design of
all aspects of these systems. The tools are available for use and modification via
anonymous FTP over the Internet and readers can build systems or just experiment
with these tools.




3-4 Design of procedures for processing:-

Processing Controls
Automated processing controls help ensure systems accurately process and record
information and either reject, or process and record, errors for later review and
correction. Processing includes merging files, modifying data, updating master files,
and performing file maintenance. Examples of automated processing controls include:

Table of Contents

Organization of Library Automation Activities. Computer System Configurations. Disk
Drives and Disk Files. Online Catalogs. Library Circulation Systems. Library
Acquisitions Systems. Library Serials Systems. Relational Database Design for an
Integrated Library Automation System. Integrated Data Dictionary for Library
Automation. File Management. Indexes. Integrated File Management. Postings Files.
MARC Record Management. Search Procedures. User Interface Management.
Browsing Procedures. Display Formatting. Record Editing. Accounting Systems. Data
Validation. Authority Control. Client/Server System Design. Index




Batch Controls – Batch controls verify processed run totals against input control
totals. Batches are verified against various items such as total dollars, items, or
documents processed.

Error Reporting – Error reports identify items or batches that include errors. Items
or batches with errors are withheld from processing, posted to a suspense account
until corrected, or processed and flagged for later correction.

Transaction Logs – Users verify logged transactions against source documents.
Administrators use transaction logs to track errors, user actions, resource usage, and
unauthorized access.

Run-to-Run Totals – Run-to-run totals compiled during input, processing, and output
stages are verified against each other.

Sequence Checks – Sequence checks identify or reject missing or duplicate entries.

Interim Files – Operators revert to automatically created interim files to validate the
accuracy, validity, and completeness of processed data.
Backup Files – Operators revert to automatically created master-file backups if
transaction processing corrupts the master file.




3-4 Design of procedures for processing:-

Processing Controls

Automated processing controls help ensure systems accurately process and record
information and either reject, or process and record, errors for later review and
correction. Processing includes merging files, modifying data, updating master files,
and performing file maintenance. Examples of automated processing controls include:

Batch Controls – Batch controls verify processed run totals against input control
totals. Batches are verified against various items such as total dollars, items, or
documents processed.

Error Reporting – Error reports identify items or batches that include errors. Items
or batches with errors are withheld from processing, posted to a suspense account
until corrected, or processed and flagged for later correction.



Transaction Logs – Users verify logged transactions against source documents.
Administrators use transaction logs to track errors, user actions, resource usage, and
unauthorized access.

Run-to-Run Totals – Run-to-run totals compiled during input, processing, and output
stages are verified against each other.

Sequence Checks – Sequence checks identify or reject missing or duplicate entries.

Interim Files – Operators revert to automatically created interim files to validate the
accuracy, validity, and completeness of processed data.

Backup Files – Operators revert to automatically created master-file backups if
transaction processing corrupts the master file.

4 -Conclusion:-
This study was done by technical staff representing a few sites. The review of the
market, the

response of the library community, and input of users have all played an important
role in the

report. The Committee recommends that additional study, by representatives of all
library

departments (acquisitions, cataloging, circulation, etc.), is needed before the correct
solution can

be identified for Louisiana academic libraries.

The Committee therefore recommends:

1. LOUIS should remain on the NOTIS LMS at this time.

2 . LOUIS should continue to work with epixtech to help insure the future of
NOTIS LMS.

3 . The LLN Commission should establish a committee with representation from
different

areas of the library to track and continue to evaluate library management system
software

solutions.

4 . The LLN Commission should prepare the Louisiana Board of Regents for a capital

expenditure of $4 million, over a three-year period, within the next two or three
years.

Online Library Management System 24 Conclusion From a proper analysis of positive
points and constraints on the component, it can be safely concluded that the product
is a highly efficient GUI based component. This application is working properly and
meeting to all user requirements. This component can be easily plugged in many other
systems.

5 References:-

1-        Elmasri, R. and Navathe,
Fundamentals of Database Systems.

Benjamin / Cummings publishing company, California, USA

2-    Jeffrey A. Hoffer & Joey F. George & Joseph S. Valacich.

Modern System Analysis & design.

Books: • Beginning Java Objects: From Concepts to Code -by Jacquie Barker) •
Introduction to Java Programming (NIIIT publication) • The Complete Reference
Java(McGrawhill; Herbert Schildth- reprint 2008) • Introduction to MS-
Access(Aptech) Web Sites:

- www.apache.org

- www.wikipedia.com

								
To top