Insy 55
Insy 55
data to provide support for business functions such as order processing, inventory
control, human resources, accounting, and many more. Some information systems
handle routine day-to-day tasks, while others can help managers make better decisions,
spot marketplace trends, and reveal patterns that might be hidden in stored data.
systems. Capable IT professionals like these are always in demand, even in a slow
services that people use to manage, communicate, and share information. Companies
use information as a way to increase productivity, deliver quality products and services,
maintain customer loyalty, and make sound decisions. In a global economy with intense
competition, information technology can mean the difference between success and
failure.
driving a new digital economy, where advances in hardware, software, and connectivity
can provide enormous benefits to businesses and individuals. Although economic trends
affect IT spending levels, most companies give IT budgets a high priority, in good rimes
or bad. The reason is simple: during periods of growth, companies cannot afford lag
behind the IT curve. Conversely, when the economy slows down, firms often use IT to
1
IT Department
network administration, web support, and quality assurance. These functions overlap
The structure of the IT department varies among companies, as does its name
and placement within the organization. In a small firm, one person might handle computer
support activities and services, whereas a large corporation might require many people
provides leadership and overall guidance, but teams consisting of users, managers, and
IT staff members develop the systems themselves. A popular model for information
protection and maintenance services for system hardware and software, including
enterprise computing
2
systems, networks, transaction processing systems, and corporate IT infrastructure. The
systems support and security group implements and monitors physical and electronic
security hardware,
software, and procedures. This group also installs and supports operating
assistance to other groups in the IT department. If a site has a large number of remote
includes a deployment team that installs and configures the workstations. User
and productivity support. The user support function usually is called a help desk. A help
desk’s staff trains users and managers on application software such as email, word
questions, troubleshoot problems, and serve as a clearinghouse for user problems and
user access, network administrators install, configure, manage, monitor, and maintain
network applications.
Web Support. Web support is a vital technical support function. Web support
specialists design and construct web pages, monitor traffic, manage hardware and
software, and link web based applications to the company’s information systems.
commerce.
3
Quality Assurance. Many large IT departments also use a quality assurance
(QA) team that reviews and tests all applications and systems changes to verify
quality standards. The QA team usually is a separate unit that reports directly to IT
management.
analyst constantly interacts with users and managers within and outside the company.
To succeed, analysts often must act as translators. For example, when they describe
will understand clearly. Typically, the analyst builds a series of models, diagrams, and
decision tables and uses other descriptive tools and techniques. Similarly, when
communicating with managers, the analyst often must translate complex technical
issues into words and images that nontechnical people can grasp. To do this, the
skills.
example, specialized systems route Internet traffic, manufacture microchips, and control
complex entities like the Hubble telescope, which took the amazing image shown in
order processing system, for example, is mission-critical because the company cannot
4
Figure 1-2. (a) Hubble telescope that
capture this (b) image
5
Large businesses with thousands or millions of sales transactions require
company-wide information systems and powerful servers, which are often now in the
produce the desired information or results. Software consists of system software and
application software. System software manages the hardware components, which can
include a single computer or a global network with many thousands of clients. Either the
vendor. Examples of system software include the operating system, security software
that protects the computer from intrusion, device drivers that communicate with
hardware such as printers, and utility programs that handle specific tasks such as data
backup and disk management. System software also controls the flow of data, provides
6
Application software consists of programs that support day-to-day business
functions and provide users with the information they need. Examples of company-wide
applications, called enterprise applications, include order processing systems, payroll
can boost productivity with tools such as spreadsheets, presentation software, and
Data. Data is the raw material that an information system transforms into
useful information. For example, an information system using a relational database can
store data in various locations, called tables. By linking the tables, the system can display
the specific information that the user needs—no more and no less. Figure 1-5 shows a
payroll system that stores data in four separate tables. Notice that the linked tables work
together to supply 19 different data items. A user can display any or all data items and
filter the data to fit defined limits. In this example, the user requested a list of employees
who live in a certain city and worked more than 40 hours in the last pay period. Jane
Figure 1-5. In a typical payroll system using a relational model, data is stored on separate
tables that are linked to form an overall database.
7
Process. Processes describe the tasks and business functions that users,
managers, and IT staff members perform to achieve specific results. Processes are the
stakeholders. Stakeholders include the management group responsible for the system,
the users (sometimes called end users) inside and outside the company who will
interact with the system, and IT staff members, such as systems analysts,
programmers, and network administrators, who develop and support the system.
Each stakeholder group has a viral interest in the information system, but
most experienced IT professionals agree that the success or failure of a system usually
depends on whether it meets the needs of its users. For that reason, it is essential to
business operations. Each situation is different. For example, a retail store, a medical
practice, and a hotel chain all have unique information systems requirements. As the
business world changes, systems analysts can expect to work in new kinds of
variety of devices such as laptops and smartphones, and the rapid growth of cloud-
based computing and software services. These trends are being driven by the immense
8
model is a series of web pages that provides a user interface, which communicates with
database management software and a web-based data server. On mobile devices, the
user interacts with the system with an app, but the same back-end services are accessed.
systems analysts.
purchase an enormous variety of products and services. This new shopping environment
arrange delivery, and choose payment methods in a single convenient session. Many
companies, such as airlines, offer incentives for online transactions because web-based
processing costs are lower than traditional methods. By making flight information available
online to last-minute travelers, some airlines also offer special discounts on seats that
new ones. For example, a common business model is a retail store that sells a product
to a customer. To carry out that same transaction on the Internet, the company must
develop an online store and deal with a totally different set of marketing, advertising, and
profitability issues.
Some companies have found new ways to use established business models. For
example, Airbnb and VRBO have transformed the traditional hospitality service industry
into a popular and successful way for individuals to rent their properties. Other retailers
seek to enhance the online shopping experience by offering gift advisors, buying guides,
how-to clinics, and similar features. In the e-commerce battles, the real winners are online
consumers, who have more information, better choices, and the convenience of shopping
at home.
9
greater. Industry observers predict that B2B sales will increase sharply as more firms
computer data transfer, usually over private telecommunications lines. Firms used EDI
to plan production, adjust inventory levels, or stock up on raw materials using data from
availability, and low communication costs. The main advantage of the web is that it
and business to consumer (B2C) for a complete product or service transaction. B2B2C
is a collaboration process that, in theory, creates mutually beneficial service and product
delivery channels.
10
Lazada is an example of a B2B2C model, business owners approach Lazada for
users, leads or sales generated by Lazada’s business or website. Business owners then
uses Lazada’s channels to locate prospective customers. Lazada provides its customers
with new and relevant products, facilitating an increased customer base and earned
process that systems developers can analyze, test, and modify. A systems analyst can
describe and simplify an information system by using a set of business, data, object,
Although much of this information is readily available, a systems analyst usually needs
11
starting point for the modeling process, and a systems analyst can describe and simplify
an information system by using a set of business models and business process models.
A business model describes the information that a system must provide. Analysts
also create models to represent data, objects, networks, and other system components.
Although the models might appear to overlap, they actually work together to describe
Business process modeling involves a business profile and a set of models that
process is a specific set of transactions, events, and results that can be described and
updating a customer account. The sales order example in Figure 1-8 shows a simple
Figure 1-8. A simple business model might consist of an event, three processes, and a result.
12
BUSINESS INFORMATION SYSTEMS
In the past, IT managers identified an information system based on its primary
users. For example, administrative staff used office systems, operational people used
operational systems, middle managers used decision support systems, and top
Today, those traditional labels no longer apply. For example, all employees,
including top managers, use office productivity systems to do their jobs. Similarly,
operational users often require decision support systems to do their jobs. As business
changes, information use also changes, and now it makes more sense to identify a
system by its functions and features, rather than by its users. A new set of system
Walmart’s inventory control system, Boeing’s production control system, and Hilton
Hotels’ reservation system are examples of enterprise computing systems. The main
reduce costs, and help managers make key decisions. Enterprise computing also
improves data security and reliability by imposing a company-wide framework for data
Also called enterprise resource planning (ERP) systems that provide cost-
effective support for users and managers throughout the company. SAP is a leading
vendor of ERP solutions that can boost productivity. SAP is a Germany company that is
the example shown in Figure 1-11, a TP system verifies the customer’s data, checks the
customer’s credit status, checks the stock status, posts to accounts receivable, adjusts
the inventory level, and updates the sales file. TP systems typically involve large amounts
Figure 1-9. A single sales transaction consists of six separate tasks, which the TP system
processes as a group.
support to users at all levels of a company. These systems can analyze transactional
data, generate information needed to manage and control business processes, and
A business support system can work hand in hand with a TP system. For example,
14
highlights slow or fast-moving items, customers with past-due balances, and inventory
radio waves to track physical objects, such as the shirt shown in Figure 1-10.
Figure 1-10. With an RFID tag, items can be tracked and monitored throughout
the retail process.
database called knowledge base that allows users to find information by entering
uses inference rules, which are logical rules that identify data patterns and
relationships.
Figure 1-11. WolframAlpha describes itself as a “computational knowledge
engine.”
15
queries in several domains. As shown in the figure, these domains include mathematics,
science and technology, society and culture, and everyday life. WolframAlpha relies upon
a large knowledge base spanning multiple website and its own proprietary algorithms to
provide users with detailed answers to their questions on many different topics. The
appropriate.
that improves productivity. Examples of user productivity systems include email, voice
mail, video and web conferencing, word processing, automated calendars, database
intranets, and integrated mobile computing systems. User productivity systems also
include groupware, which enables users to share data, collaborate on projects, and
work in teams. One popular groupware product is Slack, shown in Figure 1-12. Slack
provides common app integration and unified communication channels for distributed
teams.
16
Digital Assistant. Rapid advances in natural language processing have made a new type
of business information system possible: the personal digital assistant. These systems are
with artificial intelligence and machine learning capabilities. They are typically cloud based and
can be embedded in hardware devices of various sizes and types. Digital assistants are
exemplified by products
Figure 1-13. Amazon.com’s Echo Dot, a digital assistant embedded in a smart speaker powered
by Alexa.
such as Amazon.com’s Alexa, Apple’s Siri, and Google Assistant. Users speak to
these applications just as they would speak to a real person. The device replies in a
human-sounding voice. These services increase their capabilities over time. They can
integrate with other software applications and actual hardware, such as controlling lights
office. An image of the Amazon Echo Dot, which is a smart speaker powered by Alexa,
customer service representative enters the claim into a TP system, which updates two
other systems: a knowledge management system that tracks product problems and
warranty activity and a quality control system with decision support capabilities. A quality
control engineer uses what-if analysis to determine if the firm should make product design
knowledge management system and a business support system with decision support
features.
ORGANIZATIONAL INFORMATION MODELS
organization charts tend to be flatter, an organizational hierarchy still exists in most firms.
functions and organizational levels, as shown in Figure 1-14. Within the functional areas,
operational personnel report to supervisors and team leaders. The next level includes
middle managers and knowledge workers, who, in turn, report to top managers. In a
Figure 1-14. Typical organizational model identifies business functions and organizational
levels
A systems analyst must understand the company’s organizational model to
recognize who is responsible for specific processes and decisions and to be aware of
which define the company’s overall mission and goals. To plot a future course, top
managers ask questions such as “How much should the company invest in information
technology?”, “How much will Internet sales grow in the next five years?”, or “Should the
Strategic planning affects the company’s future survival and growth, including
long-term IT plans. Top managers focus on the overall business enterprise and use IT to
set the company’s course and direction. To develop a strategic plan, top managers also
need information from outside the company, such as economic forecasts, technology
leaders. Because they focus on a somewhat shorter time frame, middle managers need
more detailed information than top managers but somewhat less than supervisors who
oversee day-to-day operations. For example, a middle manager might review a weekly
sales summary for a three-state area, whereas a local sales team leader would need a
workers also use business support systems, knowledge management systems, and user
productivity systems. Knowledge workers provide support for the organization’s basic
functions. Just as a military unit requires logistical support, a successful company needs
operational employees and carry out day-to-day functions. They coordinate operational
tasks and people, make necessary decisions, and ensure that the right tools, materials,
Like other managers, supervisors and team leaders need decision support information,
knowledge management systems, and user productivity systems to carry out their
on transaction processing systems to enter and receive data they need to perform their
jobs. In many companies, operational users also need information to handle tasks and
make decisions that were assigned previously to supervisors. This trend, called
customer satisfaction.
Chapter 2: SYSTEMS PLANNING
systems development in many organizations; it features several phases that mark the
The life cycle can be thought of as a circular process in which the end of the
useful life of one system leads to the beginning of another project that will develop a new
version or replace an existing system altogether (see Figure 2-1). Software is the most
obvious end product of the life cycle; other essential outputs include documentation
about the system and how it was developed, as well as training for users.
assumption that systems are best developed using a specific cycle of analyst and user
then moves down to the next, and so on, like water flowing steadily downward from
one rock to another. Analysts disagree on exactly how many phases there are in the
SDLC, but they generally laud its organized approach. Here are seven phases of
SDLC, as shown in Figure 2-2. Although each phase is presented discretely, it is never
Figure 2-2. The seven phases of the systems development life cycle (SDLC).
Systems Planning. The systems planning phase usually begins with a formal
and users develop their business plans, they usually include IT requirements that
generate systems requests. A systems request can come from a top manager, a
planning team, a department head, or the IT department itself. The request can be very
significant or relatively minor. A major request might involve a new information system
or the upgrading of an existing system. In contrast, a minor request might ask for a new
step because the outcome will affect the entire development process. A key part of the
preliminary investigation is a feasibility study that reviews anticipated costs and benefits
and recommends a course of action based on operational, technical, economic, and time
about the business operations may be needed. After an investigation, the systems
analyst might determine that the information system functions properly, but users
recommended rather than an IT solution. In other cases, a full-scale systems review may
be necessary. If the development process continues, the next step is the systems
analysis phase.
logical model of the new system. The first step is requirements engineering, where the
analyst investigates business processes and documents what the new system must do
to satisfy users. Requirements engineering continues the investigation that began during
the systems planning phase. To understand the system, fact-finding using techniques
The fact-finding results are used to build business models, data and process models,
physical model that will satisfy all documented requirements for the system. At this
stage, the user interface is designed, and necessary outputs, inputs, and processes are
guarantee that the system will be reliable, accurate, maintainable, and secure.
During the systems design phase, the application architecture is also determined,
which programmers will use to transform the logical design into program modules and
code. The deliverable for this phase is the system design specification, which is
presented to management and users for review and approval. Management and user
involvement are critical to avoid any misunderstanding about what the new system will
system is constructed. Whether the developers use structured analysis or O-O methods,
the procedure is the same—programs are written, tested, and documented, and the
configure the software and perform any necessary modifications. The objective of the
information system. At the conclusion of this phase, the system is ready for use. Final
preparations include converting data to the new system’s files, training users, and
systems evaluation, to determine whether the system operates properly and if costs
Systems Support and Security. During the systems support and security
phase, the IT staff maintains, enhances, and protects the system. Maintenance changes
correct errors and adapt to changes in the environment, such as new tax rates.
Enhancements provide new features and benefits. The objective during this phase is to
maximize return on the IT investment. Security controls safeguard the system from both
maintainable, and scalable. A scalable design can expand to meet new business
in progress. Business processes change rapidly, and most information systems need to
be updated
system may need more servers added to cope with increased workload.
Waterfall Methodology
Originally develop by W. W.
Royce,
The V-Model
The V-model is a type of SDLC
model
tested, and reworked until an acceptable prototype is achieved. It also creates base to
produce the final system or software. It works best in scenarios where the project’s
requirements are not known in detail. It is an iterative, trial and error method which takes
requirement analysis. In this phase, the requirements of the system are defined in detail.
During the process, the users of the system are interviewed to know what is their
this stage, a simple design of the system is created. However, it is not a complete design.
It gives a brief idea of the system to the user. The quick design helps in developing the
prototype.
information gathered from quick design. It is a small working model of the required
system. Initial user evaluation. In this stage, the proposed system is presented to the
client for an initial evaluation. It helps to find out the strength and weakness of the
working model. Comment and suggestion are collected from the customer and
provided to the developer. Refining prototype. If the user is not happy with the current
prototype, you need to refine the prototype according to the user’s feedback and
the requirements specified by the user are met. Once the user is satisfied with the
prototype. Implement Product and Maintain. Once the final system is developed
based on the final prototype, it is thoroughly tested and deployed to production. The
system undergoes routine maintenance for minimizing downtime and prevent large-
scale failures.
Agile Modeling
the agile process continues, developers revise, extend, and merge earlier versions into
the final product. An agile approach emphasizes continuous feedback, and each
both developers and businesses can adequately be served. Because there is often
tension between what developers do in the short term and what is commercially
desirable in the long term, it is important that analysts knowingly espouse values that
will form a basis for acting together on a software project. The four values are
in Figure 2-6.
approach.
Typical agile practices such as pair programming, tasks estimation, and unit
testing rely heavily on good communication. Problems are fixed rapidly, holes are
closed, and weak thinking is quickly strengthened through interaction with others on the
team.
software development project, our first inclination is to become overwhelmed with the
complexity and bigness of the task. However, you cannot run until you know how to walk,
nor walk until you know how to stand. Simplicity for software development means
Feedback is the third basic value that is important when taking an extreme
programming approach. When you think of feedback in this context, it is good to consider
that feedback is wrapped up with the concept of time. Good, concrete feedback that is
useful to the programmer, analyst, and customer can occur within seconds, minutes,
days, weeks, or months, depending on what is needed, who is communicating, and what
Courage has to do with the level of trust and comfort that must exist in a
development team. It means not being afraid to throw out an afternoon or a day of coding
and begin again if all is not right. It means being able to stay in touch with one’s instincts
The Basic Principles of Agile Modeling. Agile principles are the reflections
and specifications of agile values. They serve as guidelines for developers to follow
when developing systems. They also serve to set agile methodologies apart from the
more traditional plan-driven methodologies such as the systems development life cycle
sayings:
together daily.
Among the Agile approaches are Scrum, Lean, Kanban, Crystal, Extreme
Method.
strategies, and resources. A strategic plan looks beyond day-to-day activities and
focuses on a horizon that is three, five, ten, or more years in the future. The IT team
must deliver IT resources to support the firm’s long-term strategic goals. Therefore, IT
managers and systems analysts must understand and participate in strategic planning
activities. IT managers must prepare for long range needs, such as a new data
warehouse, even as they handle immediate problems, such as a logic bug in the
case, or justification.
Strategic planning starts with a mission statement that reflects the firm’s vision,
purpose, and values. Mission statements usually focus on long-term challenges and
goals, the importance of the firm’s stakeholders, and a commitment to the firm’s role
as a corporate citizen.
opportunities, and threats. A SWOT analysis can focus on a specific product or project,
an operating division, the entire company, or the mission statement itself. The overall
• What are our strengths, and how can we use them to achieve our business
goals? • What are our weaknesses, and how can we reduce or eliminate them?
• What are our opportunities, and how do we plan to take advantage of them? •
What are our threats, and how can we assess, manage, and respond to the
possible risks?
Figure 2-7. SWOT analysis
THE BUSINESS CASE
During the systems planning phase, the IT team reviews a request to determine
if it presents a strong business case. The term business case refers to the reasons, or
justification, for a proposal. To perform the review, the analyst must consider the
comprehensive yet easy to understand. It should describe the project clearly, provide
financial impact. Specifically, the business case should answer questions such as the
• What are the risks of doing the project? What are the risks of not doing the
The starting point for most information systems projects is called a systems
request, which is a formal way of asking for IT support. A systems request might propose
older system, or the development of an entirely new information system that is needed
As Figure 2-8 shows, the six main reasons for systems requests are stronger
Stronger Controls. A system must have effective controls to ensure that data is
secure and accurate. This is becoming increasingly important given the number of data
breaches that seem to occur daily. Some common security controls include passwords,
various levels of user access, and encryption, or coding data to keep it safe from
minimize data entry errors whenever possible. For example, if a user enters an invalid
customer number, the order processing system should reject the entry immediately
and prompt the user to enter a valid number. Data entry controls must be effective
without being excessive. If a system requires users to confirm every item with an “Are
you sure? Y/N” message, internal users and customers might complain that the system
is not user-friendly.
business. It might be
possible to adapt the system to newer technology or upgrade it. On the other hand, cost-
benefit analysis might show that a new system would be more cost effective and provide
example, a system that tracks customer orders might not be capable of analyzing and
predicting marketing trends. In the face of intense competition and rapid product
development cycles, managers need the best possible information to make major
requirements. For example, it might respond slowly to data inquiries at certain times, or
it might be unable to support company growth. Performance limitations also result when
a system that was designed for a specific hardware configuration becomes obsolete
customers or users within the company. For instance, allowing mutual fund investors to
check their account balances on a website, storing data on rental car customer
More Support for New Products and Services. New products and services
often require new types or levels of IT support. For example, a software vendor might
might add a special service for RFID-tagged shipments. In situations like these, it is most
likely that additional IT support will be required. At the other end of the spectrum, product
obsolescence can also be an important factor in IT planning. As new products enter the
marketplace, vendors often announce that they will no longer provide support for older
Internal and external factors affect every business decision that a company
makes, and IT projects are no exception. Figure 2-9 shows internal and external factors
Internal Factors. Internal factors include the strategic plan, top managers, user
requests, information technology department, existing systems and data, and company
finances.
• Strategic Plan: A company’s strategic plan sets the overall direction for the firm
and has an important impact on IT projects. Company goals and objectives that
strategic plan that stresses technology tends to create a favorable climate for IT
usually initiates large-scale projects. Those decisions often result from strategic
business goals that require new IT systems, more information for decision
their jobs, they are likely to request even more IT services and support. For
more powerful sales analysis report, a network to link all sales locations, or an
online system that allows customers to obtain the status of their orders instantly.
Or, users might not be satisfied with the current system because it is difficult to
learn or lacks flexibility. They might want information systems support for
business requirements that did not even exist when the system was first
developed.
trigger requests for systems projects. When dealing with older systems, analysts
sometimes spend too much time reacting to day-to-day problems without looking
patchwork of corrections and changes that cannot support the company’s overall
business needs. This problem typically occurs with legacy systems, which are
older systems that are less technologically advanced. When migrating to a new
the company is going through a difficult time, the project may be postponed
until there is
more cash available to finance the effort. On the other hand, if the company
be easier to make.
External Factors. External factors include technology, suppliers, customers,
components, has created entire new industries and technologies, including the
might require that suppliers code their parts in a certain manner to match the
auto company’s inventory control system. EDI also enables just-in-time (JIT)
systems that interact with customers usually receive top priority. Many
For example, if one cellular telephone provider offers a new type of digital
service, other firms must match the plan in order to remain competitive. New
product research and development, marketing, sales, and service all require
IT support.
need to be ready with scalable systems that can handle additional volume
and growth. Predicting the business cycle is not an exact science, and careful
proceed further. The first step is to identify and weed out systems requests that are not
feasible. For example, a request would not be feasible if it required hardware or software
for multiple versions of a report could require considerable design and programming
effort. A better alternative might be to download the server data to a personal computer-
and show users how to produce their own reports. In this case, training users would be
Sometimes assessing request feasibility is quite simple and can be done in a few
hours. If the request involves a new system or a major change, however, extensive fact-
feasibility.
examines
operational, technical, economic, and
schedule factors.
effectively after it has been developed. If users have difficulty with a new
system, it will not produce the expected benefits. Organizational culture can
also affect operational feasibility. For instance, a system that works well in a
system outweigh the estimated costs usually considered the total cost of
that improves service and decreases the need for clerical staff, and a
are difficult to measure in dollars but are important to the company. Examples
of intangible benefits include the following: a user-friendly system that
better information for marketing decisions, and a new website that enhances
develop, purchase, install, or operate the system. The systems requests that
For
request and recommend specific action. After obtaining an authorization to proceed, the
analyst interacts with managers, users, and other stakeholders, as shown in the model
in Figure 2-11. The analyst gathers facts about the problem or opportunity, project scope
and constraints, project benefits, and estimated development time and costs. The
important to let people know about the investigation and explain the role of the system
analyst. Meetings with key managers, users, and other stakeholders such as the IT staff
should be scheduled, to describe the project, explain roles and responsibilities, answer
questions, and invite comments. Interactive communication with users starts at this point
When interacting with users, use the word problem carefully, because it has a
negative meaning. When users are asked about problems, some will stress current
focusing on difficulties, question users about additional capability they would like to
have. This approach highlights ways to improve the user’s job, provides a better
understanding of operations, and builds better, more positive relationships with users.
Performing the Preliminary Investigation. During a preliminary investigation,
a systems analyst typically follows a series of steps. The exact procedure depends on
the nature of the request, the size of the project, and the degree of urgency.
3. Perform Fact-Finding
b. Conduct interview
c. Review documentation
d. Observe operations
e. Conduct survey
5. Evaluate feasibility
the oral presentation are examples of the need for systems analysts to develop strong
communications skills. The report includes an evaluation of the systems request, an
action, which is a summary of the project request and a specific recommendation. The
CLASS DIAGRAM
When the analyst has identified the object classes from the use case diagram, a
logical model in a form of class diagram is produced to how the association between them. A
class association is used to represent the relationship between two classes. It has a descriptive
label and shows multiplicity. Multiplicity describes how many instances of one class in the
relationship relates to instances of the other class. This is also sometimes referred to as
cardinality.
In a class diagram, each class (Figure 6.6) appears as a rectangle, with the class
The Student class is a group of Student objects that share a common structure and
a common behavior. Each object knows to which class it belongs; for example, the Mary
Jones object knows that it belongs to the Student class. Objects belonging to the same class
may also participate in similar relationships with other objects; for example, all students register
for courses and, therefore, the Student class can participate in a relationship called “registers-
class called Course (see the section Representing Associations). An operation, such as calc-
gpa in Student (see Figure 6.6), is a function or a service that is provided by all the instances of
operations that other objects can access or manipulate the information stored in an object. The
operations, therefore, provide an external interface to a class; the interface presents the
class without showing its internal structure or how its operations are implemented. Lines show
relationships between classes and have labels identifying the action that relates the two
classes. To create a class diagram, review the use case and identify the classes that
participate in the underlying business process. The class diagram also includes a concept called
cardinality, which describes how instances of one class relate to instances of another class. For
example, an employee might have earned no vacation days or one vacation day or
many vacation days. Similarly, an employee might have no spouse or one spouse. Figure 6.7
shows various UML notations and cardinality examples. Notice that in 6.7, the first column
shows a UML notation symbol that identifies the relationship shown in the second column. The
third column provides a typical example of the relationship, which is described in the last
column. In the first row of the figure, the UML notation 0..* identifies a zero or many relation.
The example is that an employee can have no payroll deductions or many deductions.
Figure 6.7. Examples of UML notations that indicate the nature of the relationship between instances
of one class and instances of another class.
In the following class diagram, the binary relationship between MODULE and
LECTURER would be read from right to left as one LECTURER delivers one or many MODULEs
(1..*) and read left to right, one module is delivered by zero or one lecturer (0..1). the implication
here could be either that a module may not yet have a lecturer assigned to deliver it, or that it is
a self-study module.
Now let us consider the many-to-many relationship between STUDENT and MODULE.
As a student can study one or many modules (1..*) and a module may be studied by zero, one
or many students (0..*) there will be a need to store additional data generated by this relationship
– the assessment mark and grade for each student taking a module. Whilst you may
consider storing this information in either of the classes, this would not be a practical solution due
to the potentially large number of items of data, so the data is held in new association class
named STUDIES, which is shown linked to the initial relationship with a dashed line. This
approach resolves the many-to-many relationship in an effective implementation that can cope