
PLEASE SHARE This website with your FRIENDS, JUNIORS & SENIORS
|
UNIT 1 [Book Link] |
|
1 |
Systems Concept; Characteristics of a System |
VIEW |
2 |
Elements of System; Types of Systems |
VIEW |
3 |
Decision Support System |
VIEW |
4 |
System Development Life Cycle |
VIEW |
5 |
System Development Life Cycle: Investigation, Analysis, Design |
VIEW |
6 |
System Development Life Cycle: Implementation, Post Implementation Review and Maintenance |
VIEW |
|
UNIT 2 [Book Link] |
|
1 |
Systems Planning and Investigation |
VIEW |
2 |
Basis for Planning in Systems Analysis |
VIEW |
3 |
Dimensions of Planning |
VIEW |
4 |
Initial Investigation |
VIEW |
5 |
Needs Identification |
VIEW |
|
UNIT 3 [Book Link] |
|
1 |
Determining the User’s Information Requirements |
VIEW |
2 |
Feasibility Study, Feasibility Considerations in Feasibility Analysis |
VIEW |
3 |
Feasibility Report |
VIEW |
|
UNIT 4 [Book Link] |
|
1 |
Tools of Structured Analysis: Data Flow Diagram (DFD) |
VIEW |
2 |
Entity Relationship Diagrams |
VIEW |
3 |
Data Dictionary |
VIEW |
4 |
Process Modeling : Structured English, Decision Tree & Decision Table |
VIEW |
5 |
Object Oriented Analysis (OOA) |
VIEW |
6 |
Object Oriented Design (OOD) |
VIEW |
|
UNIT 5 [Book Link] |
|
1 |
Basics of Information Security, Types of Attacks |
VIEW |
2 |
Viruses, Virus Control, Hackers |
VIEW |
3 |
Overview of Risks associated with Internet, Intrusion Detection Risk Management |
VIEW |
4 |
Disaster Recovery Plan |
VIEW |
5 |
Cryptography and Authentication |
VIEW |
6 |
Managing Risk |
VIEW |
7 |
Information Security Policy |
VIEW |
8 |
Creating a Secure environment |
VIEW |
9 |
Internet Security Standards |
VIEW |
Like this:
Like Loading...
Related
One thought on “RMBIT05 System Analysis & Design”