Free Essay

Documentation Techniques

In: Business and Management

Submitted By seunglee
Words 735
Pages 3
-------------------------------------------------
Documentation Techniques

Five documentation techniques include data flow diagrams, entity relationship diagrams, system flowcharts, program flowcharts, and record layout diagrams.

Data Flow Diagrams and Entity Relationship Diagrams

* Data flow diagrams – Data flow diagrams (DFD) use symbols to represent the entities, processes, data flows, and data stores that pertain to a system. * Entities – Entities in a DFD are objects that lie at the boundary of the system being modeled. They are the sources of and destinations for data and can be other interfacing systems or entities external to the organization. Entities are labeled as singular nouns on a DFD. Data stores represent the accounting files and records used in each process, and the labeled arrows represent data flows between processes, data stores, and entities. * Processes – Processes are labeled with a descriptive verb. Process objects should not be represented as nouns. The arrows connecting objects should be labeled to represent specific flows of data. Also, each data flow label should be unique. The same label should not be attached to two different flow lines in the same DFD. * Usage – Systems analysts use DFDs extensively to represent the logical elements of the system. It does not depict the physical system. * Entity relationship diagrams – An entity relationship diagram is used to represent the relationship between business entities. An entity is anything about the organization that captures data. The labeled connecting line represents the nature of the relationship between two entities. Cardinality is the degree of the relationship and the numeric mapping between entities. Cardinality reflects normal business rules as well as organizational policy. Systems designers identify organization entities and prepare a model for them. The data model is the blueprint for what ultimately become the physical database. * Relationship between ER diagrams and data flow diagrams – A DFD is a model of system processes and the ER diagram models the data used in the system. Each data store in the DFD represents a corresponding entity in the ER diagram.

System Flowcharts

A system flowchart is the graphical representation of the physical relationships among key elements of a system, including organizational departments, manual activities, computer programs, hard-copy accounting records, and digital records. They also describe the physical computer media being employed in the system. * Flowcharting manual activities – The flowchart should be labeled to clearly identify the system that it represents, the correct symbols should be used to represent the various entities in the system, all symbols should be labeled, lines should have arrowheads to clearly show the process flow direction and sequence of events, and a text description should be included if necessary. * Lay out the physical areas of activity – A flowchart reflects the physical system, which is represented as vertical columns of events and actions separated by lines of demarcation.

Program Flowcharts

System flowcharts do not provide all the operational details that are sometimes needed, which are provided by a program flowchart. Every program represented in a system flowchart should have a supporting program flowchart that describes its logic. A separate symbol represents each step of the program’s logic, and each symbol represents one or more lines of computer code. Accountants sometimes use program flowcharts to verify the correctness of program logic. 1. The program retrieves a single record from the unedited transaction file and stores it in memory. 2. The first logical tests is to see if the program has reached the end-of-file (EOF) condition for the transaction file. Most file structures use a special record or marker to indicate an EOF condition. When EOF is reached, the edit program will terminate and the next program in the system will be executed. 3. Processing involves a series of tests to identify certain clerical and logical errors. Each test is represented by a decision symbol and evaluates the presence or absence of a condition. 4. Error-free records are sent to the edited transaction file. 5. Records containing errors are sent to the error file. 6. The program loops back to step 1 and the process is repeated until the EOF condition is reached.

Record Layout Diagrams

Record layout diagrams are used to reveal the internal structure of digital records in a flat-file or database table. The layout diagram usually shows the name, data type, and length of each attribute or field in the record. Each data attribute and key field is shown in terms of its name and relative location in the record.

Similar Documents

Free Essay

Compliance Recommendations

...RCAP 2008 Rationales and Recommendations for Compliance for MLS, DMS, MLT, HT/HTL, CG, and PathA programs (*compatible with merged Guide to Accreditation) (version: October 2011) [pic] |Standard 1 | |Standard 1 | | |1-1 |The [sponsoring institution/affiliate(s)] is (are) not accredited by a recognized |1-1 |Submit documentation that the [sponsoring institution] [affiliate(s)] is (are) | | |agency. | |currently accredited by a recognized agency. | |1-2 |There is (are) no signed agreement(s) with [affiliate(s)] |1-2 |Submit a copy of a signed and dated current agreement with _______________________. | | | | | | |1A-1 |The agreement does not address the reason for the agreement |1A-1 |Submit (an) (the) agreement(s) which......

Words: 7468 - Pages: 30

Premium Essay

Scope Management

...selection methods involve comparing the values of one project against another. There are the following type of Benefit Measurement project selection techniques - o Murder Boards - This involves a committee asking tough questions from each project o Scoring Models - Different projects are given scores based on certain defined criteria. Project with higher score is selected. o Benefits Cost Ratio - This technique involves computing benefits to cost ratio (BCR) for a project. Project with higher BCR is selected. o Payback period - This technique involves considering how long it takes back to "pay back" the cost of the project. Inflation or interest earned in not considered in this technique. A project with lower pay back period is better. o Discounted Cash Flow - This technique takes into account the interest earned on the money. The Future Value (FV) of projects is compared. FV=PV(1+i)n PV is the present value of the project. A project with higher present value is better. o Internal Rate of Return (IRR) - A project that has higher IRR is better, as it is giving higher return on money. 6. Constrained Optimization Project selection methods are used for large projects. These are techniques based on mathematical models. The Constrained Optimization techniques are - o Linear Programming o Non-Linear Programming o Integer Algorithm o Dynamic Programming ......

Words: 942 - Pages: 4

Premium Essay

Project Scope Management

...Measurement project selection methods involve comparing the values of one project against another. There are the following type of Benefit Measurement project selection techniques - * Murder Boards - This involves a committee asking tough questions from each project * Scoring Models - Different projects are given scores based on certain defined criteria. Project with higher score is selected. * Benefits Cost Ratio - This technique involves computing benefits to cost ratio (BCR) for a project. Project with higher BCR is selected. * Payback period - This technique involves considering how long it takes back to "pay back" the cost of the project. Inflation or interest earned in not considered in this technique. A project with lower pay back period is better. * Discounted Cash Flow - This technique takes into account the interest earned on the money. The Future Value (FV) of projects is compared. FV=PV(1+i)n PV is the present value of the project. A project with higher present value is better. * Internal Rate of Return (IRR) - A project that has higher IRR is better, as it is giving higher return on money. 6. Constrained Optimization Project selection methods are used for large projects. These are techniques based on mathematical models. The Constrained Optimization techniques are - * Linear Programming * Non-Linear Programming * Integer Algorithm * Dynamic Programming * Multi-objective......

Words: 909 - Pages: 4

Free Essay

Code to Do

...208 Task 1 Produce the C++ program The documentation should contain the following elements: 1. Listing of the completed program. [P1.4, P2.1] 2. Produce appropriate user documentation which describes the operation of the program and identifies validate input data. [P3.1, P3.2] 3. Document the testing you performed to ensure the correct operation of your code. [P4,1, P4.4] BTEC HIGHER NATIONAL IN COMPUTING Unit 3: Software Development - H1 Assessment guidance Outcomes | |To achieve a pass grade the evidence must show that the learner is able to: | | |To achieve a merit grade the evidence must show that the learner is able to: | | |To achieve a distinction grade the evidence must show that the learner is able to: | | |1 – Design and develop code using structured programming methods |P1.1 |Identify and select appropriate pre-defined data types | |M1.2 |Complex problems with more than one variable have been explored | |D1.4 |Realistic improvements have been proposed against defined characteristics for success | | | |P1.2 |Use simple input/output and appropriate operators with the above | |M2.2 |A range of methods and techniques have been applied | |D2.4 |The unforeseen has been accommodated | | | |P1.3 |Identify and use appropriate selection structures and loop structures for the given task | |M2.4 |The selection/design of methods and techniques/sources has been justified | |D3.1 |Ideas......

Words: 513 - Pages: 3

Premium Essay

Mindmaps

...initial requirements that satisfy stakeholder's needs and expectations. Finalizing all activities across all Process Groups to formally complete the project or phase Project Management Plan Accepted Deliverables Organizational Process Assets Expert Judgment Tool & Techniques Outputs Inputs Inputs Project Statement of Work Business Case Contract (when applicable) Enterprise Environmental Factors Organizational Process Assets Tool & Techniques Outputs Expert Judgment 4.6 Close Project or Phase Closing Process Group 4.1 Develop Project Charter Initiating Process Group Final Product, Service, or Result Transition Organizational Process Assets Updates Project Charter Reviewing all change requests, approving, and managing changes to deliverables, org process assets, documents, and the PM Plan Project Management Plan Work Performance Information Change Requests Enterprise Environmental Factors Organizational Process Assets Expert Judgment Change Control Meetings Tool & Techniques Inputs Documenting actions necessary to define, prepare, integrate, and coordinate all other plans Project Charter Inputs Outputs from Planning Processes Enterprise Environmental Factors Organizational Process Assets Tool & Techniques Outputs Expert Judgment 4.5 Perform Integrated Change Control Monitoring & Controlling Process Group 4.2 Develop Project Management Plan Change Request Status Updates Project Management Plan Updates Project Document Updates Outputs 4. Project......

Words: 2545 - Pages: 11

Premium Essay

Accounting

...Kudler Fine Foods is a company that uses a significant amount of electronic data and information to flow through their system on a daily basis. The company relies on this data to be accurate and trustworthy. Considering the dependency and importance of the electronic data flowing through the system in such a high volume, they would benefit from computer assisted audit techniques (CAATs). A CAATs audit is focused on testing the computer systems for data integrity and security of the company’s information data processing. CAATs provide a 10 step process made available to the auditor for use as guidelines in conducting an efficient audit. The guidelines will reduce the time to complete the audit, save money and ensure a high degree of confidence in the audit results. The CAATs audit will provide the owner of Kudler Fine Foods with assurance that the systems are operating with accuracy and the data is secure. To initiate the audit procedure, the auditor will first collaborate with the owner of Kudler Fine Foods to define the intents and desired end results of the audit. The auditor will review the computer systems, processes, types of data and process controls with Kathy Kudler to ensure that she thoroughly understands the system. Through this collaboration, the auditor will determine the best strategies for assessing the risks associated with the system and current processes. He or she will also determine the optimal strategy for collecting and testing data.......

Words: 1856 - Pages: 8

Premium Essay

Rest

...E-mail | | | | | | | | | | | | | | | | | Subject Code | ECAU607202 | Subject Title | Accounting Information System | Credit Value | 3 | Pre-requisite/Co-requisite/Exclusion | Introductory to Accounting 2Management Information System | Role and Purposes | This subject provides students with an understanding of various business cycle in a company, system documentation techniques to document those cycles, documents and information flow within each cycle and internal control required in each cycle. Students will be required to attend a computer laboratory class to learn system documentations techniques and basic database design. | Subject Learning Outcomes | Upon completion of the subject, student will be able to:Technical competence: in Governance, Risk Management and Internal Control a. Analyze the components of internal control related to financial reporting (T4) * Understand the accounting information system and its position in an organization’s information system * Understand various system documentation techniques * Apply system documentation techniques to describe an accounting information system in an organization * Differentiate the general audit and the IT audit * Understand internal control principles in an organization * Understand the business cycles in a company (in general) * Analyze an accounting information system in a company with respect to the internal control procedures employed in each cycleTechnical......

Words: 853 - Pages: 4

Premium Essay

Not Sure

...The 9 knowledge Areas and the 42 Processes Based on the PMBoK® 4th Prepared by: Amr Miqdadi,PMP,MCSE amiqdadi@pmlead.net www.pmlead.net PMI®, PMP®, CAPM® and PMBOK® Guide are trademarks of the Project Management Institute, Inc. PMI® has not endorsed and did not participate in the development of this product. Integration Management Process Name Develop Project Charter Inputs Outputs Tools and Techniques Project Statement of Work Business Case Project Charter Experts Judgment Project Management Plan Experts Judgment Project Management Plan Approved Change Requests Deliverables Work Performance Information Experts Judgment Project Management Information System Enterprise Environmental Factors Change Requests Organizational Process Assets Project Management Plan Updates Contracts Enterprise Environmental Factors Organizational Process Assets Develop Project Management Plan Project Charter Outputs From Planning Processes Enterprise Environmental Factors Organizational Process Assets Direct and Manage Project Execution Project Document Updates Project Management Plan Performance Reports Change Requests Project Management Plan Updates Enterprise Environmental Factors Monitor and Control Project Work Experts Judgment Project Document Updates Organizational Process Assets Project Management Plan Work Performance Information Change Requests Status Updates Project......

Words: 3026 - Pages: 13

Free Essay

Service Request Sr-Rm-022 for Riordan Manufacturing

...to be gathered from key stakeholders and from observations of how the current system works and is used. Next this document will describe information-gathering techniques that can be used, as well as systems analysis tools that can and will be used for the project. This document will also identify key factors to ensure that information required for the project is gathered successfully. An explanation of the importance of the project scope, will be given. A description of the areas of project feasibility that will be examined will also be discussed. Information will need to be gathered in two different ways. First information will be gathered from the key stakeholders, such as the President & Ceo- Dr. Michael Riordan, the Chief Operating Officer- Hugh McCauley, the Director of Human Resources- Yvonne McMillan, and the Chief Information Officer- Maria Trinth. These key stakeholders are important because they can explain what the current system is as well as how it is used. The second way is to gather information by observing how each employee uses the current system, notating key elements of the system that is used by all employees. Two techniques that are recommended to be used in the information-gathering process are, one-on-one interviews and/or a facilitated session. When using the one-on-one interview technique, each stakeholder will need to be interviewed to gather information on the current systems and to gather their ideas of how they would like the new system to......

Words: 3731 - Pages: 15

Premium Essay

Kudler Frequent Shopper

...gathering techniques, user needs identifications techniques, envisioning and evaluating techniques, and requirement specifications to determine user needs techniques. The method analysis techniques evaluate stakeholders, end-users, managers, and employee requirements of the new system. The following analysis technique methods were derive from, Maguire and Bevan (2002) case study, which are the methods being used to determine end-user system requirements. Information Gathering • Stakeholder analysis identifies all the users and stakeholders who may influence or be impacted by the system. • Secondary market research involves researching published sources such as research reports, census data, demographic information, that throw light upon the range of possible user markets. • Task analysis involves the study of what a user is required to do in terms of actions and/or cognitive processes to achieve a task. • Rich pictures involve creating a series of sketches to show how people and systems relate to each other in an organization. • Field study and observational methods involve an investigator viewing users as they work and taking notes of the activity that takes place. User Needs Identifications • User surveys involve administering a set of written questions to a sample population of users. • Focus groups bring together a cross-section of stakeholders in a discussion group format. • Interviewing is a commonly used......

Words: 5143 - Pages: 21

Free Essay

Effective Documentation Via Photography

...CHAPTER 2 2.1 International guidelines USA Heritage Documentation Program Secretary of the Interior’s Guidelines for Architectural and Engineering Documentation (USA) state the following guidelines on how to produce architectural and engineering documentation. The Guidelines are organized as follows: Definitions. The following definitions are used in conjunction with these guidelines: Documentation—measured drawings, photographs, histories, or other media that depict historic buildings, sites, structures, objects or landscapes. Field Photography—photography other than large-format photography (usually 35mm), intended for the purposes of producing documentation. Field Records—notes of measurements taken, field photographs and other recorded information intended for the purpose of producing documentation. Large-Format Photographs—photographs taken of historic buildings, sites, structures, objects, or landscapes where the dimensions of the negatives are either 4″ × 5″, 5″ × 7″ or 8″ × 10″ and where the photographs are taken with appropriate means to correct perspective distortion. Measured Drawings—drawings produced according to HABS/HAER/HALS guidelines depicting existing conditions or other relevant features of historic buildings, sites, structures, objects or landscapes. Written Data—inventory forms, data sheets, historical reports, or other original, written works of......

Words: 1398 - Pages: 6

Premium Essay

Sr-Rm

...Marketing user. The analyst needs to gather requirements from this two department because if the Finance and Accounting system is change, the Sales and Marketing system needs to be informed. For example the Finance and Accounting change a customer’s information, Sales and Marketing needs to know the new information so Sales and Marketing can promote to the right customer. In addition stakeholders are the people who can or will be affected of the systems changes. Information-gathering technique Five techniques to gather requirements * Interview * Joint Application Development * Questionnaires * Document Analysis * Observations  (Dennis, Chapter 5, 2012).  First is an interview involved asking questions on one or more end user and “There are five basic steps to an interview: selecting and interviewee, designing interview questions, preparing for the interview, conducting the interview, and post-interview follow-up” (Dennis, Chapter 5, 2012). Also interview is the most popular technique of gathering requirements because it provides the analyst the ability to argue in detail a stakeholder’s thoughts and obtain his or her standpoint on the business want and the feasibility of potential solutions (Masters, 2011). Second is Joint Application development JAD. JAD allows each project team member, the user, and the management to work together to identify system requirements. Also JAD uses groupware to discover the problems among groups (Dennis, Chapter 5, 2012).......

Words: 1347 - Pages: 6

Free Essay

Salut!

...README - Application Centralisée de Gestion : REPARTOUT Table des matières README - Application Centralisée de Gestion : REPARTOUT ...............................................................1 I. II. 1. 2. 3. 4. III. 1. 2. 3. 4. Eléments du Projet ......................................................................................................................2 Notice Technique – Application JAVA ..........................................................................................2 Lancement ..............................................................................................................................2 Authentification ......................................................................................................................2 Fonctionnement ......................................................................................................................3 A Propos..................................................................................................................................3 Technical Documentation – JAVA Application ..........................................................................4 Launch ....................................................................................................................................4 Authentification ......................................................................................................................4 Functionment ........................................

Words: 566 - Pages: 3

Premium Essay

Bsa 375 Service Request Riordan Manufacturing Week 4

...and resources needed to house and track the current systems and files used by the human resource department. Analysis shows that the time it takes to request and access individual files such as spread sheets and other employee data is inefficient, time consuming and opens more possibility for corruption or other forms of data loss. Analysis Once the project has been declared feasible, the next step in the analysis phase is gathering information. Three common and effective techniques of information gathering are interviews, JAD sessions, documentation and observation. The project requirements are determined by gathering the appropriate information to move to the next phase of the project. There are four key factors to remember According to "Information Gathering Techniques" (2013), " 1) include stakeholders from different levels of the organization and 2) review notes with the stakeholder prior to writing the requirement to validate what was captured, 3) utilize at least two information gathering techniques and 4) have the Requirements Document signed off by key stakeholders before proceeding to the next phase (Design).” Interviewing is an involved process and should include best practices when preparing and conducting the interview. According to Valacich, George, and Hoffer (2012), the traditional methods of gathering requirements are “to plan the interview, be neutral, listen and take notes, review notes, and seek diverse views.” The first consideration is who to......

Words: 3618 - Pages: 15

Premium Essay

Paper

... Discuss three techniques for breaching operating system controls can be breached. e) What security questions must be considered with regard to Internet commerce? CHOOSE TWO FROM FOUR BELOW: Question #4 (Ch.4) You have been asked by your boss, Dan, to give him input for database systems. Answer the following: a) One purpose of a database system is the easy sharing of data. But your boss says this ease of sharing can also jeopardize security. Discuss with him at least three forms of access control designed to reduce this risk. b) In a distributed data processing system, a database can be centralized or distributed. What are the options? Explain to your boss. c) You have an understanding that replicated databases create considerable data redundancy, which is in conflict with the database concept. Explain to him the justification of this approach. Question #5 (Ch.5) Your boss Dan is so impressed with your knowledge that he wants to know more about software development life cycle (SDLC). a) What are three problems that account for most system failures? b) Discuss the advantages and disadvantages of the three methods of converting to a new system: cold turkey cutover, phased cutover, and parallel operation cutover. c) What is the purpose of the auditor's review of SDLC documentation? d)......

Words: 820 - Pages: 4