SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
Introdaction to Python
Dr. Mohammed Kassim Page 7
Systems analysis
Information System Components
Network Resources
Telecommunications networks like the Internet, intranets, and extranets have
become essential to the successful operations of all types of organizations and their
computer-based information systems. Telecommunications networks consist of
computers, communications processors, and other devices interconnected by
communications media and controlled by communications software. The concept
of Network Resources emphasizes that communications networks are a
fundamental resource component of all information systems.
Network resources include:
• Communications media: such as twisted pair wire, coaxial cable, fiber-
optic cable, microwave systems, wireless signal and communication
satellite systems.
• Network support: This generic category includes all of the people,
Introdaction to Python
Dr. Mohammed Kassim Page 8
Systems analysis
hardware, software, and data resources that directly support the operation
and use of a communications network. Examples include communications
control software such as network operating systems and Internet packages.
Figure 1.4. Components Information Systems in process
Introdaction to Python
Dr. Mohammed Kassim Page 9
Systems analysis
Systems analysis
Systems analysis is the dissection of a system into its component pieces for
purposes of studying how those component pieces interact and work. Structured
analysis was one the first formal strategies developed for systems analysis of
information systems and computer applications. The models are structured pictures
that illustrate the processes, inputs, outputs, and files required to respond to events.
Structured analysis introduced an overall strategy that has been adopted by many
of the other techniques – model-driven development. A model is a representation
of reality. Just as ‘a picture is worth a thousand words,’ most models use pictures
to represent reality. Model-driven development techniques emphasize the drawing
of models to define requirements and system designs. The model becomes the
design blueprint for constructing the final system.
Figure 2.1. Systems model
Introdaction to Python
Dr. Mohammed Kassim Page 10
Systems analysis
System Analyst
System Analyst is a specialist who studies the problems and needs of an
organization to determine how people, data, processes, and information
technology can best accomplish improvements for the business.
System analyst understand both business and computing. They study both
business problems and opportunities and then transform business and information
requirements into specification for information systems that will be implemented
by various technical specialists including computer programmers.
System analyst initiates changes within an organization. Every new system
changes the business.
Introdaction to Python
Dr. Mohammed Kassim Page 11
Systems analysis
System analyst is basically a problem solver. Problems may be either real or
anticipated that require corrective action.
Skills to be possessed by System Analyst
An analyst must possess various skills to effectively carry out the job. They may
be divided into 2 categories — interpersonal and technical skills. Interpersonal
skills deal with relationship and the interface of the analyst with people in
business. They are useful in establishing trust and resolving conflicts. Technical
skills focus on procedures and techniques for operation analysis, system analysis
and computer science.

Mais conteúdo relacionado

Mais procurados

computer based information system
computer based information systemcomputer based information system
computer based information system
jandian
 
Concepts and components of information system
Concepts  and components of information systemConcepts  and components of information system
Concepts and components of information system
Rohit Kumar
 
Elements of systems design
Elements of systems designElements of systems design
Elements of systems design
Chandan Arora
 

Mais procurados (20)

Management information system data processing and functions
Management information system data processing and functionsManagement information system data processing and functions
Management information system data processing and functions
 
Mis classification By Ram K Paliwal
Mis classification By Ram K PaliwalMis classification By Ram K Paliwal
Mis classification By Ram K Paliwal
 
Syandes quiz 3
Syandes quiz 3Syandes quiz 3
Syandes quiz 3
 
Management information-system-computer-information-system-need of information...
Management information-system-computer-information-system-need of information...Management information-system-computer-information-system-need of information...
Management information-system-computer-information-system-need of information...
 
Information system
Information systemInformation system
Information system
 
SA Chapter 7
SA Chapter 7SA Chapter 7
SA Chapter 7
 
computer based information system
computer based information systemcomputer based information system
computer based information system
 
Information systems and its components 1
Information systems and its components 1Information systems and its components 1
Information systems and its components 1
 
Data Information
Data InformationData Information
Data Information
 
Ch01a
Ch01aCh01a
Ch01a
 
Concepts and components of information system
Concepts  and components of information systemConcepts  and components of information system
Concepts and components of information system
 
DESIGN OF A COMPUTER SYSTEM FOR AN INFORMATION SYSTEM
DESIGN OF A COMPUTER SYSTEM FOR AN INFORMATION SYSTEMDESIGN OF A COMPUTER SYSTEM FOR AN INFORMATION SYSTEM
DESIGN OF A COMPUTER SYSTEM FOR AN INFORMATION SYSTEM
 
Elements of systems design
Elements of systems designElements of systems design
Elements of systems design
 
Knowledge Work System
Knowledge Work SystemKnowledge Work System
Knowledge Work System
 
Information system
Information systemInformation system
Information system
 
IT class II - ICAB PS-KL
IT class II - ICAB PS-KL IT class II - ICAB PS-KL
IT class II - ICAB PS-KL
 
Computer based information system
Computer based information systemComputer based information system
Computer based information system
 
Data Processing
Data ProcessingData Processing
Data Processing
 
Information Systems and Technology: Basic Concepts
Information Systems and Technology:  Basic ConceptsInformation Systems and Technology:  Basic Concepts
Information Systems and Technology: Basic Concepts
 
Introduction to Information System
Introduction to Information SystemIntroduction to Information System
Introduction to Information System
 

Destaque

Physical Security Presentation
Physical Security PresentationPhysical Security Presentation
Physical Security Presentation
Wajahat Rajab
 
Word اسئلة امتحان
Word اسئلة امتحانWord اسئلة امتحان
Word اسئلة امتحان
Mahmoud Soliman
 
كتاب الحاسب الالى للصف الثانى التجارى
كتاب الحاسب الالى للصف الثانى التجارىكتاب الحاسب الالى للصف الثانى التجارى
كتاب الحاسب الالى للصف الثانى التجارى
hoda_ata
 
التضمين السعوي وفك التضمين السعوي _ AM modulation and demodulation
 التضمين السعوي وفك التضمين السعوي _ AM modulation and demodulation   التضمين السعوي وفك التضمين السعوي _ AM modulation and demodulation
التضمين السعوي وفك التضمين السعوي _ AM modulation and demodulation
AhmedAhdash
 
التجويد
التجويدالتجويد
التجويد
wayislam
 
Learning word 2010 in arabic تعليم وورد 2010 بطريقة مبسطة
Learning word 2010 in arabic تعليم وورد 2010 بطريقة مبسطة Learning word 2010 in arabic تعليم وورد 2010 بطريقة مبسطة
Learning word 2010 in arabic تعليم وورد 2010 بطريقة مبسطة
Kamal Naser
 
جميع اختصارات لوحة المفاتيح 92 اختصار
جميع اختصارات لوحة المفاتيح 92 اختصارجميع اختصارات لوحة المفاتيح 92 اختصار
جميع اختصارات لوحة المفاتيح 92 اختصار
islamtics default
 

Destaque (20)

6 Physical Security
6 Physical Security6 Physical Security
6 Physical Security
 
(Physical security) ألامن المادي
(Physical security) ألامن المادي(Physical security) ألامن المادي
(Physical security) ألامن المادي
 
Physical Security Presentation
Physical Security PresentationPhysical Security Presentation
Physical Security Presentation
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security Assessments
 
Word اسئلة امتحان
Word اسئلة امتحانWord اسئلة امتحان
Word اسئلة امتحان
 
كتاب الحاسب الالى للصف الثانى التجارى
كتاب الحاسب الالى للصف الثانى التجارىكتاب الحاسب الالى للصف الثانى التجارى
كتاب الحاسب الالى للصف الثانى التجارى
 
التضمين السعوي وفك التضمين السعوي _ AM modulation and demodulation
 التضمين السعوي وفك التضمين السعوي _ AM modulation and demodulation   التضمين السعوي وفك التضمين السعوي _ AM modulation and demodulation
التضمين السعوي وفك التضمين السعوي _ AM modulation and demodulation
 
التجويد
التجويدالتجويد
التجويد
 
الفصل الثامن- الاتصالات والشبكات- د. خالد بكرو Communications and Networks -...
الفصل الثامن-  الاتصالات والشبكات- د. خالد بكرو Communications and Networks -...الفصل الثامن-  الاتصالات والشبكات- د. خالد بكرو Communications and Networks -...
الفصل الثامن- الاتصالات والشبكات- د. خالد بكرو Communications and Networks -...
 
Frequency Modulation for a voice signal by using matlab
Frequency Modulation for a voice signal by using matlabFrequency Modulation for a voice signal by using matlab
Frequency Modulation for a voice signal by using matlab
 
الأكسيل Excel
الأكسيل  Excelالأكسيل  Excel
الأكسيل Excel
 
A Study in LTE system(in Arabic).
A Study in LTE system(in Arabic).A Study in LTE system(in Arabic).
A Study in LTE system(in Arabic).
 
Learning word 2010 in arabic تعليم وورد 2010 بطريقة مبسطة
Learning word 2010 in arabic تعليم وورد 2010 بطريقة مبسطة Learning word 2010 in arabic تعليم وورد 2010 بطريقة مبسطة
Learning word 2010 in arabic تعليم وورد 2010 بطريقة مبسطة
 
مخارج وصفات
مخارج وصفاتمخارج وصفات
مخارج وصفات
 
(Networks) مقدمة في الشبكات
(Networks) مقدمة في الشبكات (Networks) مقدمة في الشبكات
(Networks) مقدمة في الشبكات
 
قواعد تصميم العروض
قواعد تصميم العروضقواعد تصميم العروض
قواعد تصميم العروض
 
Computer Components مكونات الحاسب الآلي
Computer Components مكونات الحاسب الآليComputer Components مكونات الحاسب الآلي
Computer Components مكونات الحاسب الآلي
 
إدارة المخاطر و تأثيرها على تنفيذ المشروع الإلكتروني
إدارة المخاطر و تأثيرها على تنفيذ المشروع الإلكترونيإدارة المخاطر و تأثيرها على تنفيذ المشروع الإلكتروني
إدارة المخاطر و تأثيرها على تنفيذ المشروع الإلكتروني
 
جميع اختصارات لوحة المفاتيح 92 اختصار
جميع اختصارات لوحة المفاتيح 92 اختصارجميع اختصارات لوحة المفاتيح 92 اختصار
جميع اختصارات لوحة المفاتيح 92 اختصار
 

Semelhante a System analysis part2

Chapter 9 The People in Information Systems Learning Ob.docx
Chapter 9 The People in Information Systems Learning Ob.docxChapter 9 The People in Information Systems Learning Ob.docx
Chapter 9 The People in Information Systems Learning Ob.docx
spoonerneddy
 
Chapter 9 The People in Information Systems Learning Ob.docx
Chapter 9 The People in Information Systems Learning Ob.docxChapter 9 The People in Information Systems Learning Ob.docx
Chapter 9 The People in Information Systems Learning Ob.docx
tiffanyd4
 
software engineering
software engineeringsoftware engineering
software engineering
paramalways
 
Analyzing Systems Using Data Flow Diagrams
Analyzing Systems Using Data Flow DiagramsAnalyzing Systems Using Data Flow Diagrams
Analyzing Systems Using Data Flow Diagrams
Christina Valadez
 

Semelhante a System analysis part2 (20)

Systems analysis and design lecture 1
Systems analysis and design lecture 1Systems analysis and design lecture 1
Systems analysis and design lecture 1
 
Introduction to System analysis part1
Introduction to System analysis part1Introduction to System analysis part1
Introduction to System analysis part1
 
Foundations Of Information Systems In Business(97 2003)
Foundations Of Information Systems In Business(97 2003)Foundations Of Information Systems In Business(97 2003)
Foundations Of Information Systems In Business(97 2003)
 
Notes on Current trends in IT (1) (1).pdf
Notes on Current trends in IT (1) (1).pdfNotes on Current trends in IT (1) (1).pdf
Notes on Current trends in IT (1) (1).pdf
 
Careers in it
Careers in itCareers in it
Careers in it
 
Chapter 9 The People in Information Systems Learning Ob.docx
Chapter 9 The People in Information Systems Learning Ob.docxChapter 9 The People in Information Systems Learning Ob.docx
Chapter 9 The People in Information Systems Learning Ob.docx
 
Chapter 9 The People in Information Systems Learning Ob.docx
Chapter 9 The People in Information Systems Learning Ob.docxChapter 9 The People in Information Systems Learning Ob.docx
Chapter 9 The People in Information Systems Learning Ob.docx
 
software engineering
software engineeringsoftware engineering
software engineering
 
Mis
MisMis
Mis
 
Mis lecture 3
Mis lecture 3Mis lecture 3
Mis lecture 3
 
Multiview Methodology
Multiview MethodologyMultiview Methodology
Multiview Methodology
 
Components of an information system
Components of an information systemComponents of an information system
Components of an information system
 
Instant message
Instant  messageInstant  message
Instant message
 
MIS
MISMIS
MIS
 
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
INTERNAL Assign no   207( JAIPUR NATIONAL UNI)INTERNAL Assign no   207( JAIPUR NATIONAL UNI)
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
 
Foundations of Information System in Business - Mark John Lado
Foundations of Information System in Business - Mark John LadoFoundations of Information System in Business - Mark John Lado
Foundations of Information System in Business - Mark John Lado
 
Analyzing Systems Using Data Flow Diagrams
Analyzing Systems Using Data Flow DiagramsAnalyzing Systems Using Data Flow Diagrams
Analyzing Systems Using Data Flow Diagrams
 
DEVELOPMENT OF A MULTIAGENT BASED METHODOLOGY FOR COMPLEX SYSTEMS
DEVELOPMENT OF A MULTIAGENT BASED METHODOLOGY FOR COMPLEX SYSTEMSDEVELOPMENT OF A MULTIAGENT BASED METHODOLOGY FOR COMPLEX SYSTEMS
DEVELOPMENT OF A MULTIAGENT BASED METHODOLOGY FOR COMPLEX SYSTEMS
 
computer Unit 8
computer Unit 8computer Unit 8
computer Unit 8
 
Mis 1st chapter notes foundation of is in business
Mis 1st chapter notes foundation of is in businessMis 1st chapter notes foundation of is in business
Mis 1st chapter notes foundation of is in business
 

Mais de DrMohammed Qassim

Mais de DrMohammed Qassim (20)

Repatino code - hamming code (7,4) - chapter four
Repatino code - hamming code (7,4) - chapter fourRepatino code - hamming code (7,4) - chapter four
Repatino code - hamming code (7,4) - chapter four
 
Shannon code & shannon fano & huffman method - chapter three
Shannon code  & shannon fano & huffman method  - chapter threeShannon code  & shannon fano & huffman method  - chapter three
Shannon code & shannon fano & huffman method - chapter three
 
ٍSource Entropy - binary symmetric channe - chapter one - two
ٍSource Entropy - binary symmetric channe - chapter one - twoٍSource Entropy - binary symmetric channe - chapter one - two
ٍSource Entropy - binary symmetric channe - chapter one - two
 
(Win7) مقدمة في نظام التشغيل
(Win7) مقدمة في نظام التشغيل  (Win7) مقدمة في نظام التشغيل
(Win7) مقدمة في نظام التشغيل
 
مقدمة في برمجة و تصميم الشبكات
مقدمة في برمجة و تصميم الشبكاتمقدمة في برمجة و تصميم الشبكات
مقدمة في برمجة و تصميم الشبكات
 
مقدمة حول الشبكات
مقدمة حول الشبكاتمقدمة حول الشبكات
مقدمة حول الشبكات
 
منهاج تحليل و تصميم نظم المعلومات
منهاج تحليل و تصميم نظم المعلوماتمنهاج تحليل و تصميم نظم المعلومات
منهاج تحليل و تصميم نظم المعلومات
 
منهاج بناء و تصميم مواقع الانترنيت
منهاج بناء و تصميم مواقع الانترنيتمنهاج بناء و تصميم مواقع الانترنيت
منهاج بناء و تصميم مواقع الانترنيت
 
مقدمة في قواعد البيانات
مقدمة في قواعد البياناتمقدمة في قواعد البيانات
مقدمة في قواعد البيانات
 
Example for ER diagram part11
Example for ER diagram part11Example for ER diagram part11
Example for ER diagram part11
 
Primary Key & Foreign Key part10
Primary Key & Foreign Key part10Primary Key & Foreign Key part10
Primary Key & Foreign Key part10
 
Entity Relationship Diagram part9
Entity Relationship Diagram part9Entity Relationship Diagram part9
Entity Relationship Diagram part9
 
Activity Diagram part8
Activity Diagram part8Activity Diagram part8
Activity Diagram part8
 
Use Case Context Diagram part5
Use Case Context Diagram part5Use Case Context Diagram part5
Use Case Context Diagram part5
 
Use Case Diagrams part4
Use Case Diagrams part4Use Case Diagrams part4
Use Case Diagrams part4
 
System Development Life Cycle part3
System Development Life Cycle part3System Development Life Cycle part3
System Development Life Cycle part3
 
Introduction to Python
Introduction to PythonIntroduction to Python
Introduction to Python
 
(Protracted your system) حماية نظامك من الدخلاء
(Protracted your system) حماية نظامك من الدخلاء(Protracted your system) حماية نظامك من الدخلاء
(Protracted your system) حماية نظامك من الدخلاء
 
(Internet privacy) حماية الخصوصية
(Internet privacy) حماية الخصوصية (Internet privacy) حماية الخصوصية
(Internet privacy) حماية الخصوصية
 
(Information security) مقدمة في أمن المعلومات
(Information security) مقدمة في أمن المعلومات(Information security) مقدمة في أمن المعلومات
(Information security) مقدمة في أمن المعلومات
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Último (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

System analysis part2

  • 1. Introdaction to Python Dr. Mohammed Kassim Page 7 Systems analysis Information System Components Network Resources Telecommunications networks like the Internet, intranets, and extranets have become essential to the successful operations of all types of organizations and their computer-based information systems. Telecommunications networks consist of computers, communications processors, and other devices interconnected by communications media and controlled by communications software. The concept of Network Resources emphasizes that communications networks are a fundamental resource component of all information systems. Network resources include: • Communications media: such as twisted pair wire, coaxial cable, fiber- optic cable, microwave systems, wireless signal and communication satellite systems. • Network support: This generic category includes all of the people,
  • 2. Introdaction to Python Dr. Mohammed Kassim Page 8 Systems analysis hardware, software, and data resources that directly support the operation and use of a communications network. Examples include communications control software such as network operating systems and Internet packages. Figure 1.4. Components Information Systems in process
  • 3. Introdaction to Python Dr. Mohammed Kassim Page 9 Systems analysis Systems analysis Systems analysis is the dissection of a system into its component pieces for purposes of studying how those component pieces interact and work. Structured analysis was one the first formal strategies developed for systems analysis of information systems and computer applications. The models are structured pictures that illustrate the processes, inputs, outputs, and files required to respond to events. Structured analysis introduced an overall strategy that has been adopted by many of the other techniques – model-driven development. A model is a representation of reality. Just as ‘a picture is worth a thousand words,’ most models use pictures to represent reality. Model-driven development techniques emphasize the drawing of models to define requirements and system designs. The model becomes the design blueprint for constructing the final system. Figure 2.1. Systems model
  • 4. Introdaction to Python Dr. Mohammed Kassim Page 10 Systems analysis System Analyst System Analyst is a specialist who studies the problems and needs of an organization to determine how people, data, processes, and information technology can best accomplish improvements for the business. System analyst understand both business and computing. They study both business problems and opportunities and then transform business and information requirements into specification for information systems that will be implemented by various technical specialists including computer programmers. System analyst initiates changes within an organization. Every new system changes the business.
  • 5. Introdaction to Python Dr. Mohammed Kassim Page 11 Systems analysis System analyst is basically a problem solver. Problems may be either real or anticipated that require corrective action. Skills to be possessed by System Analyst An analyst must possess various skills to effectively carry out the job. They may be divided into 2 categories — interpersonal and technical skills. Interpersonal skills deal with relationship and the interface of the analyst with people in business. They are useful in establishing trust and resolving conflicts. Technical skills focus on procedures and techniques for operation analysis, system analysis and computer science.