Академический Документы
Профессиональный Документы
Культура Документы
University
Government legislation may impact the overall mission of the University
and cause changes to strategic and tactical plans. Government funding
may also impact these plans by applying constraints to the University's
implementation plans. The User Community, of the University network,
both internal and external, will influence strategic and tactical plans by
making requests for hardware, software, or support. Private Sector
Funding, to a lesser extent than Government funding, may also apply
constraints on the strategic and tactical plans for the University. Industry,
both inside and outside the province, will influence the strategic and
tactical plans for the University by making requests to the University for
services and setting new educational requirements for University
programs. The Education Community is made up of universities, public
schools, vocational schools, private educational institutions, and university
educators. This group will influence the strategic and tactical plans for the
University in many ways, for example, by making requests for educational
services, gaining a competitive advantage through technology, or gaining
advancement in educational techniques.
Example 1:
University
Government legislation may impact the overall mission of the University
and cause changes to strategic and tactical plans. Government funding
may also impact these plans by applying constraints to the University's
implementation plans. The User Community, of the University network,
both internal and external, will influence strategic and tactical plans by
making requests for hardware, software, or support. Private Sector
Funding, to a lesser extent than Government funding, may also apply
constraints on the strategic and tactical plans for the University. Industry,
both inside and outside the province, will influence the strategic and
tactical plans for the University by making requests to the University for
services and setting new educational requirements for University
programs. The Education Community is made up of universities, public
schools, vocational schools, private educational institutions, and university
educators. This group will influence the strategic and tactical plans for the
University in many ways, for example, by making requests for educational
services, gaining a competitive advantage through technology, or gaining
advancement in educational techniques.
Example 1:
University Context Diagram
Example 2:
SafeHome
SafeHome software enables the homeowner to configure the security
system when it is installed, monitors all sensors connected to the security
system, and interacts with the homeowner through a keypad and function
keys contained in the SafeHome control panel.During installation, the
SafeHome control panel is used to ‘program’ and configure the system.
Each sensor is assigned a number and type, a master password is
programmed for arming and disarming the system, and telephone number
(s) are input for dialing when a sensor event occurs.When a sensor event
is recognized, the software invokes an audible alarm attached to the
system. After a delay time that is specified by the homeowner during
system configuration activities, the software dials a telephone number of a
monitoring service, provides information about the location, reporting the
nature of the event that has been detected. The telephone number will be
redialed every 20 seconds until telephone connection is obtained.All
interaction with SafeHome is managed by a user-interaction subsystem
that reads input provided through the keypad and function keys, displays
prompting messages on the LCD display, displays system status
information on the LCD display. Keyboard interaction takes the following
form ...
Example 2:
SafeHome
SafeHome software enables the homeowner to configure the security
system when it is installed, monitors all sensors connected to the security
system, and interacts with the homeowner through a keypad and function
keys contained in the SafeHome control panel. During installation, the
SafeHome control panel is used to ‘program’ and configure the system.
Each sensor is assigned a number and type, a master password is
programmed for arming and disarming the system, and telephone number
(s) are input for dialing when a sensor event occurs. When a sensor event
is recognized, the software invokes an audible alarm attached to the
system. After a delay time that is specified by the homeowner during
system configuration activities, the software dials a telephone number of a
monitoring service, provides information about the location, reporting the
nature of the event that has been detected. The telephone number will be
redialed every 20 seconds until telephone connection is obtained. All
interaction with SafeHome is managed by a user-interaction subsystem
that reads input provided through the keypad and function keys, displays
prompting messages on the LCD display, displays system status
information on the LCD display.
Example 2:
SafeHome Context Diagram
Example 2:
Level 0 DFD
Example 2:
SafeHome
SafeHome software enables the homeowner to configure the security
system when it is installed, monitors all sensors connected to the security
system, and interacts with the homeowner through a keypad and function
keys contained in the SafeHome control panel. During installation, the
SafeHome control panel is used to ‘program’ and configure the system.
Each sensor is assigned a number and type, a master password is
programmed for arming and disarming the system, and telephone number
(s) are input for dialing when a sensor event occurs. When a sensor event
is recognized, the software invokes an audible alarm attached to the
system. After a delay time that is specified by the homeowner during
system configuration activities, the software dials a telephone number of a
monitoring service, provides information about the location, reporting the
nature of the event that has been detected. The telephone number will be
redialed every 20 seconds until telephone connection is obtained. All
interaction with SafeHome is managed by a user-interaction subsystem
that reads input provided through the keypad and function keys, displays
prompting messages on the LCD display, displays system status
information on the LCD display. Keyboard interaction takes the following
form ...
Example 2:
Level 1 DFD
Rules for
Data Flow Diagramming
Process:
No process can have only outputs
No process can have only outputs.
A process has a verb-phrase label (sound familiar)
Data Store:
Data cannot move directly from one data store to
another. It must flow through a process.
Data cannot be moved directly from an outside data
source or sink to a data store. It must first go through a
process.
A data store has a noun-phrase label.
Source / Sink:
Data cannot move directly from a source to a sink. It
must be moved by a process.
A source/sink has a noun-phrase label.
Rules for
Data Flow Diagramming (cont’d)
Data Flow:
A data flow has only one direction of flows between symbols.
This is called a net flow: Example: a read before an update will
show one arrow for the update only.
A fork in a data flow means a copy of the data is going to more
than one location.
A join in a data flow (not shown) means data is being received
from more than one process, data store and/or data sink/
source.
A data flow cannot loop back to itself. If it does need to loop
back, it must flow through a process.
A data flow to a data store means an update (delete or
change).
A data flow from a data store implies a read. A data flow has a
noun-phrase label.
Example2: Level 2 DFD for
Monitor Sensors Process
Example 3: ATM