System Analysis and Design

advertisement

DR MPS MEMORIAL

COLLEGE OF BUSINESS STUDIES, AGRA

INSTRUCTIONAL PLAN (MODIFICATION PROPOSED – SUBJECT TO STUDENTS PARTICIPATION

AND INTERACTION)

Faculty: Pawan Kumar Gupta

ALLOCATED LECTURES ARE BASED ON STUDENT INTERACTION AND PARTICIPATION.

SESSIONS REQUIRED MAY VARY, DEPENDING ON CLASS ATTENDANCE AND STUDENT

INVOLVEMENT.

LAST SESSION TOOK 45 LECTURES TO COMPLETE THE SYLLABUS.

First Semester: Aug 2015

Course No. _NMBA IT 02___ Course Title: __SYSTEM ANALYSIS & DESIGN AND

SOFTWARE ENGINEERING

Textbook: ( Book Bank – Given to Student )

1.

Elish m. Awad-System Analysis & Design

Other specific Books: (Reference)

1. Shah-Software Engineering & SAD(Wiley Dreamtech)

2. Kenneth E Kendall and Julie E Kendall – SAD (PHI Publication, 7 Ed.)

3. Singh B –Network Security (PHI Publication, 1st Ed.)

Detailed Plan for Lectures:

Lecture No.

Each

Lecture of

45 Minutes

Duration

1-4

Topic

Systems Concept; Characteristics of a System; Elements of System

5-7

7-11

12-13

14-16

Types of Systems; Decision Support System

System Development Life Cycle, Investigation, Analysis, Design,

Implementation, Post Implementation Review and Maintenance

Systems Planning and Investigation

Basis for Planning in Systems Analysis - Dimensions of Planning, Initial

Investigation, Needs Identification

Chapters/

Sections of

Textbook/ Other

Reference

Ref 1

Ref 1

Ref 1

Ref 1

Ref 1

1

17

18-20

21-22

23-26

Determining the User's Information Requirements

Feasibility Study, Feasibility Considerations

Steps in Feasibility Analysis - Feasibility Report.

Ref 1

Ref 1

Ref 1

27-30

31-33

34-35

36-38

39-41

42-43

44-45

Tools of Structured Analysis : Data Flow Diagram (DFD)

Entity Relationship Diagrams, Data Dictionary

Process Modeling : Structured English, Decision Tree & Decision Table

Object Oriented Analysis (OOA) and Object Oriented Design (OOD)

Ref 1

Ref 1

Ref 1

Basics of Information Security, Types of Attacks, Viruses, Virus Control,

Hackers

Overview of Risks associated with Internet, Intrusion Detection Risk

Management ,

Disaster Recovery Plan, Cryptography and authentication, Managing Risk

Information Security Policy, Creating a secure environment, Internet

Security Standards

Notes Given to

Students

Notes Given to

Students

Notes Given to

Students

Notes Given to

Students

Notes Given to

Students

Details of Assignments Planned:

Assignment 1:-

PPT’s:-

1.

System Development Life Cycle

2.

Tools of Structured Analysis

3.

Entity Relationship Diagrams

Assignment 2:-

PPT’s:-

1.

Information Security, Types of Attacks, Viruses, Virus Control, Hackers

2.

Disaster Recovery Plan, Cryptography and authentication

3.

Internet Security Standards

2

Scheme for Class Assessment: (out of 50):

INT. EXAM {A} ATTENDENCE {B} TEACHER ASSESMENT {C}

30 10 10

Note: Students are suggested to solve last 3 Years University Question Paper.

TOTAL MARKS=A+B+C

50

3

Download