StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Information Technology Is a Fast-Changing World of Computing - Essay Example

Cite this document
Summary
The paper "Information Technology Is a Fast-Changing World of Computing" states that Interlobular testing referred to as black-box testing involves testing the whole system to ensure that it is functional as expected and easy to use. This test evaluates whether the system is also user-friendly…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.5% of users find it useful
Information Technology Is a Fast-Changing World of Computing
Read Text Preview

Extract of sample "Information Technology Is a Fast-Changing World of Computing"

? System Planning and Design Information technology is a fast changing world of computing. With changes in base systems, hardware and applications, information system building has become to be critical and thus requiring extra keen while undertaking the decision making stage followed by design stage, implementation stage, testing stage integration and evolution stages. In the case of SFO clinic, system development takes the waterfall model from understanding user requirements to testing. Introduction Building systems for organizations thhus understanding wide scopes of requirements and among them are organizational and user ones. In addition it is also imperative to understand hardware platforms for deployment of developed systems such that failure of operation is avoided (Smith, 2012). In this regard requirement analysis becomes essential. Secondly, since the onset of the digital era, there has been overwhelming demand for digitizing existing and forthcoming records and consequently information system building has to solve these problems. Such demand thus calls for specific design that takes into consideration all these requirements hence the need for system specification (Johnson, 2011). When all specific system requirements have been met, it is imperative that design commences. While designing IT experts usually break down system components such that each component is developed independently of the other to avoid numerous system errors. This is also highly encouraged while using implementation of tools that are object oriented. Thus the system is separated into modules, which are independent of each other. Upon clearance of modular development, development stage begins which entails system coding whereby the real transition between human and machine interaction happens (Edwards, 2012). Coding begins with creating pseudo codes at each functional level and consequently reviewing whether all requirements have been met and thus the system is constructed at this stage (Johnson, 2011). After development system integration follows which involves a combination of the different modules developed above. After successful integration of different modules for SFO clinic, then system testing follows which is done in two phases. While testing might be done after integration, it is of great essence that testing be carried out before and after integration to ensure that developed modules are error-free and that the system has efficient communication abilities, that is, modules are able to communicate with each other while passing data. This last stage will ensure whether the developed system is important for SFO clinic in California by achieving user acceptance. Requirement analysis This stage involves two critical foundational stages of system development which include business case and user requirements (Edwards, 2012). Business case provides useful information upon which the system is to be based on. In this case, SFO clinic in California is an urgent health care facility that admits individuals with urgency cases. Understanding the institution by name, location and requirements gives the developer a background idea on how to get in touch with the organization and conduct further research as entails other requirements. Johnson (2011) argues that user requirements form another essential step in the design and development process. In order to transform organization functions to digital records, it is imperative the extensive research be undertaken. This can either be done through prototyping, simulation, user interviews among others or a combination of either of these requirement collection methodologies. In the case of SFO clinic, requirement analysis is done through a combination of prototyping and user interviews. Inclusive users undergoing the interviewing process involved the director of the clinic, the receptionist, doctors at the clinic and the billing department. The requirement process obtained that digitization exercise at the clinic involves the billing department whereby client payment records are kept. In this specific clinic, the billing department is not prioritized such that clients have to make payments such that they can undergo treatment. Given that this is an urgency care center, incoming patients as recorded by the receptionist and are assigned to the available emergence attending doctor. Thirdly, it was found out that outpatient records are also recorded with health status. In addition, other non-patient records such as dead patients are also needed. External development of clinical service evaluation was also necessary as explained by the director in evaluating the quality of services they offer. Design stage Given that all needs have been identified, the design stage takes care of identification of relationships between these needs and appropriate actions to be carried out in the hospital environment. Thus design separates these needs according to associated actions and corresponding department. This process creates modules which involve specific functions at the different departments involved. Functions or modules Modules are a very important aspect of system creation. They ease the process by breaking down different components of the system which are usually referred to as subsystems (Edwards, 2012). While modules do not represent sensible facets of system development, they make it easier for system developers to achieve the whole process systematically. Given that patient records need to created, a combination approach is undertaken to articulate incoming patient records with outgoing patient records. This thus led to creation of patient records with different dates as regards admission and discharge. Thus this module includes variable such as patient name, age, residence, diagnosis, attended by, progress and discharge. A second module to be designed is the billing module. While record keeping entails provision of patient personal information, this information should not be shared with the billing department. Therefore the billing department should be absolutely independent of other modules. This calls for privacy of the module from the others. Thus billing information should depict client personal information and mediation fee and status, whether paid or not paid. Thirdly, creation of another highly private record keeping module known as death patient record is essential. These records are not to be accessed by anyone within the hospital environment but only the treating doctor and the clinic director. This information is essential in determination of the effective of urgency provision services and thus the essence of the clinic’s existence. The last module is not directly associated with addition or removal of records from within the database but to only view certain records. Doctors highly preoccupied at eh hospital may find it necessary to know their patient progress while attending to other patients and thus reduce the amounts of time involved in walking directly to each wardroom to check on their status. Thus view module entails extracting certain information, relevant to users (Smith, 2012). Hardware understanding While designing the system, modular testing encompasses software design requirements it is of great significance that understanding of deployment platform be undertaken for the purposes of choice of development and implementation approach. Therefore this forced the design team to undertake the installation platform for implementation technology. Issues to consider in the design process Privacy is one of the critical aspects of system design and development. While privacy involves shielding of certain information from random access, it provides a platform to maintain confidentiality and thus organizational or individual image (Johnson, 2011). Thus in this system, patients’ personal information as regards the billing department and death records need to be hidden from access from non-staff members. Security issues involve the use or installation of functional firewalls to prevent external access to the system and hence database (Smith, 2012). Given that the system is to be used in an intranet setting, it is essential that additional access security be applied. In this regard, username and password access prompt is created for the purposes of preventing unnecessary access. In addition, data storage will be implemented in a database and types of files to be stored in the database should be files devoid of viral attacks and carriage. This thus restricts files to only saving extra files as text, pdf and image files such as jpeg, btmp and related files. This step will ensure avoidance of importation of viruses that can attack the system from within and collapse it, Basically, patient records such as names and date of admission and discharge should be shared within all departments of the hospital. Other details such as billing information, death information should only be restricted to the director, and involved departments such as the accounts department and mortuary one. Implementation stage Coding of different modules Coding makes the beginning making system development feasible. In order to commence the process of coding, one need to understand modules appropriately and their associated functions. In this case, there are four modules identified which needs implementation. This is implemented below using pseudo code technology. However, it is important to understand that this technology can not be physically tested since it is called human programming and thus not machine compatible. To begin with, information gathering and storage from patients or relatives is the first module to undergo coding. Thus this module will require variables such as surname, first name, age, and residence. Thus using coding technique this will be implemented in text fields as follows, Enter surname (Char) /new line Enter first name (char)/ new line Enter age (num)/ new line Enter residence (char)/new line A button should be shown at the bottom indicating submission. When all fields have been entered, then submit should follow with a function to insert the information into a database. But before submission, a validation script should ensure that all fields have entered in order to attain all the required information. Secondly, the billing module should entail personal information as indicated above obtained through a form and then submitted to billing department database. Addition fields should include’ Enter amount (Num)/new line Status (choice options) A subsequent submission button should be shown at the bottom. Thirdly, user authentication module need be created which will prompt users for username and password. Addition of user information into authentication list will only be carried out by the director. However, the system will limit actions for different users within the clinic facility. This code will be implemented through a MySQL script. Lastly, creation of death records within the facility is another module that needs be created. Achieved through change of patient status, basic patient information can be obtained from the database with a corresponding tag of the patient as either ok, recovering, critical or dead. This module is only available to staff members such as doctors, and nurses and should only indicated information regarding patient information and status. Change of status can only be confirmed by the doctor undertaking treatment, the director or the care giving nurse. This module will be implemented as follows Patient status (variable) Update patient status (OK/Recovering/Critical/Dead) Integration After the above development process, it is important that the modules be put together to form one functional system that integrates all the needs of the hospital. Integration will thus involve combination of the modules developed above and creation of communication interfaces. The first form will display login form and consequently followed by other forms such as add patient, change patient status, view patient information such as progress and show patient billing information. These actions will be attributed to appropriate staff as applies the policies of privacy and confidentiality of the hospital. Integration will thus ensure that appropriate system components have been put together to achieve the process of system development (Edwards, 2012). Testing While integration precedes testing, the latter should commence at modular developmental stage to ensure that each module developed meets required expectation. Thus modular testing, Modular testing or white box testing will thus ensure that all modules have no bugs within them and are thus syntax and semantic error free. Interlobular testing referred to as black box testing involves testing of the whole system to ensure that it is functional as expected and easy to use. This test evaluates whether the system is also user friendly or requires further modification. This testing step also involves user test and acceptance since at all times, the system will be put into use by appropriate users on different ends. Evolution stage After system acceptance and implementation into the clinic environment, follow up and evaluation should proceed such that system developers will ensure that the system functions well as intended and caters for emergent needs in the course of usage. Evolution will ensure that appropriate changes are made to accommodate new demands from the environment and consequently digitize all clinical needs for the care center. References Smith, H.T. (2012). System analysis and design. New York, NY: McGraw Hill. Johnson, E. D. (2011). System development: Life cycles. Houston, Chicago: Wiley & Sons. Edwards, F. P. (2012). Software engineering. System development. Montreal, CA: McMillan. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“System Planning and Design Essay Example | Topics and Well Written Essays - 1750 words”, n.d.)
System Planning and Design Essay Example | Topics and Well Written Essays - 1750 words. Retrieved from https://studentshare.org/design-technology/1447868-plan-and-design-a-small-system
(System Planning and Design Essay Example | Topics and Well Written Essays - 1750 Words)
System Planning and Design Essay Example | Topics and Well Written Essays - 1750 Words. https://studentshare.org/design-technology/1447868-plan-and-design-a-small-system.
“System Planning and Design Essay Example | Topics and Well Written Essays - 1750 Words”, n.d. https://studentshare.org/design-technology/1447868-plan-and-design-a-small-system.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Technology Is a Fast-Changing World of Computing

US Department of Defense moves to Cloud Computing

loud computing technology based arrangement puts together a network of computing resources that can be accessed anywhere, being shared between its clients.... Basically, cloud computing is the latest technology model offering on-demand ICT network access to more reliable and efficient information technology services and devices (for example storage, servers and a wide variety of software applications).... Hence, the Department of Defense has to change the method and approach through which it performs its operations and manages its information technology department in an attempt to identify augmented competence, efficiency, and safety....
10 Pages (2500 words) Research Paper

Seagate Technology Plc Company Analysis

This research paper is on the company Seagate Technology (STX) which is the leading maker of hard disk drives in the world today.... his paper is a research report on the company Seagate technology.... The scope of this report is to give clear insights about the financial condition of Seagate technology and its potential as an investment compared to other similar firms or other equally attractive companies as alternative.... Although there are other alternative investment opportunities in the market, the report is focused on Seagate technology and makes a subsequent recommendation after a thorough evaluation of the company based on a number of internal and external factors....
15 Pages (3750 words) Essay

The Internet Technology and Data Ownership Issue

Though it started off merely as a very small scale office network today the internet is the biggest network of connected computing devices from all over the world that has ever existed.... Evan Charles Sveum (July 2010) mentions computing and Internet Technology in the following words: “computing and Internet technologies (U.... The dependence of man on computing machines for transactions related to monetary and personal details cannot be overlooked in this fast paced...
4 Pages (1000 words) Assignment

Enterprise Information Security Architecture

Client-server technology is used to link the individual hosts sharing common data and information.... computing hardware Light Walkers Ltd hardware computing infrastructures are medium in terms of specification.... The organization is organized into different departments whereby each department is equipped with different computing hardware.... The RAM size for most computing hardware in this organization is 512MB with hard disk space of 120GB and processing speeds of 2....
3 Pages (750 words) Research Paper

Organizational information technology budgeting criteria and solutions

t must be taken to note that information technology is not limited merely to computer equipment or more aptly hardware.... This paper will attempt to look into various aspects that concern budgeting in relation to information technology structures in a number of organizations to bring out the relevant constraints and fitting solutions.... hellip; information technology has assumed a large part in the function of modern organization and businesses....
7 Pages (1750 words) Essay

The Model of a Technical Leader

Discussion 1b Science and Technology Even, though, technology is on the rise, it gives them extra work of developing software's in languages understood by people from certain languages.... The fact that technology is dynamic everyone will not be able to grasp the new technologies (Ellis 72).... Leadership is a profound concept, which has more increased complex implications; these are driven by the fast changing world.... On the other side some cultures in communities do not embrace technology use and still embrace the modes of communication that were used in the olden days....
7 Pages (1750 words) Assignment

How Cloud Computing Affects the Accounting World

The other form of computing was known as traditional computing.... The school can benefit from information technology infrastructure at minimal costs.... This can be beneficial to both the students and faculty especially the ones engaged in computer science and information technology courses.... How Cloud computing Affects the Accounting World (Name of Student) (Institutional Affiliation) How Cloud computing Affects the Accounting World Introduction Cloud computing refers to the practice of using remote servers hosted on the internet (KPMG, 2012)....
5 Pages (1250 words) Research Paper

Women in Computing

The roots of the development of computing devices, however rudimentary they may have been compared to present times, can be traced back to the abacus – the arithmetic-oriented machine – and continued with the invention of the Slide Rule in 1620 which was used by generations of engineers and other professionals who needed to do some fast calculations with numbers.... Till the Second world War, all computers were mechanical and electrical analog computers....
10 Pages (2500 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us