10 Information Systems System Design and Projects
10 Information Systems System Design and Projects
INFORMATION SYSTEMS
Introduction
A system is an integrated set of regularly interacting or interdependent components created to
accomplish a defined objective, with defined and maintained relationships among these
components. There are many types of systems but essentially all systems are made up of various
parts that are connected together in a particular way in order for the parts to interact so as to
achieve a specific purpose. Examples of systems range from a simple system such as a central
heating system, which through the combination of parts – pipes, radiators, boiler, working
together – provides heating for a building, through to complex systems such as an organization –
which through its component parts of people, buildings, equipment, financial resources, etc work
together to meet the objectives of that organization.
In the case of information systems the inputs are the data – for example on sales, production and
people – and the outputs are the information that can be used for decision-making in the
organization. The process involves storing and manipulating the data in order to transform the
raw data into usable information. The process uses a combination of computer and
communications technology.
An information system can therefore be defined as a set of interrelated components that collect
and process data to produce information.
© 2020 1
Ordinary Levels COMPUTER SCIENCE ~CSc
an average of 12.5, then this data has changed into information, because it has acquired a context
(it’s an average) and meaning (the student has passed).
Also, the binary patterns on backing storage devices such as a disk, CD or DVD, or memory stick,
are all classed as data. For example, the binary patterns that describe an icon on your desktop are
data. They become information after the operating system software has processed them, because
then they become meaningful to you as the icons representative of your hard disk, Internet
explorer or document.
In summary,
𝐼𝑛𝑓𝑜𝑟𝑚𝑎𝑡𝑖𝑜𝑛 = 𝐷𝑎𝑡𝑎 + 𝐶𝑜𝑛𝑡𝑒𝑥𝑡 + 𝑀𝑒𝑎𝑛𝑖𝑛𝑔
Relevance: Information should be relevant or appropriate to the purpose. For example, a market
research company may give information on users’ perceptions of the quality of a product. This
may not be relevant to the manager who wants to know opinions on relative prices of the product
and its rivals.
Completeness: Information should have every necessary part or everything that is wanted. If
information is not complete, it may not be useful as the basis for making a decision or it may lead
to wrong decisions being made as only half of an entirety of the information is known.
Reliability: Reliability deals with the truth of information or the objectivity with which it is
presented. You can only really use information confidently if you are sure of its reliability and
objectivity. For example we are confident that the information found in a book, especially one
© 2020 2
Ordinary Levels COMPUTER SCIENCE ~CSc
that the library has purchased, is more reliable than information from the Internet where anybody
can write unedited and unverified material and ‘publish’ it on the web.
Conciseness: Information should be in a form that is short enough to allow for its examination
and use. There should be no extraneous information. For example, it is very common practice to
summarise financial data and present this information, both in the form of figures and by using a
chart or graph. We would say that the graph is more concise than the tables of figures as there is
little or no extraneous information in the graph or chart.
Timeliness: Delay destroys the value of information. For effective decision making, information
must reach the decision-maker at the right time. Timeliness means that information must reach
its recipients within the prescribed timeframes.
© 2020 3
Ordinary Levels COMPUTER SCIENCE ~CSc
→ Observation: In observation, the data gatherer observes what is happening during a process
or event and produces some kind of data file as a result. This method is advantageous in that
it does not rely on people’s willingness to provide information. Also, the data gatherer directly
sees what people do rather than relying on what they say they do. The disadvantages are that,
it is susceptible to observer bias and the results of the observation may suffer from the
Hawthorne effect – people usually perform better when they know they are being observed.
→ Document review: Document review is getting relevant data from a document, an article or
a book.
a. Data Verification: Verification means checking the input data to make sure it has been
entered correctly. Verification tries to ensure there have been no transcription errors. It is a check
on accuracy. Two methods of data verification are double entry and proofreading.
→ Double entry: Double entry consists of entering the data twice. The two entries are then
compared against each other and a warning given if they do not match. For example, a new
password is always entered twice.
→ Proof reading: Proof reading consists of reading the data entered either on screen or
printout, to be sure that it matches the data source. It is also known as visual check.
b. Data Validation: Validation is a check on input data to ensure that the data is sensible or
reasonable. A validation check compares the input data with a set of rules that the computer has
been told the data must follow. If the data does not match up with the rules then there must be an
error. Validation only checks that the data is valid but not its correctness. The data may be valid
but not correct. Five types of validation checks are:
© 2020 4
Ordinary Levels COMPUTER SCIENCE ~CSc
→ Type check: A type check ensures that data entered in a field fits the required data type. For
example, a person’s name will consist of letters of the alphabet and sometimes hyphens and
apostrophe. Any name that contains numbers will be rejected as invalid.
→ Format check: A format check ensures that input data is in a particular format. The format
that data must be in is specified using an input mask. The input mask is made up of special
characters which indicate what characters may be typed where. For example, the input mask
for a car registration number is given as LL 999 LL, where L represents any letter and 9
represents any digit. SW 499 AO and CE 021 BA will be accepted as valid.
→ Length check: A length check ensures that an entered value is not shorter or longer than a
certain number of characters. For example, a phone number has 9 digits. Entering fewer or
more digits makes a number invalid.
→ Range check: A range check is used to ensure that the data entered falls between a specified
minimum and maximum values. For example, a mark in an exam is between 0 and 20. Any
mark below 0 or above 20 is rejected as invalid.
→ Presence check: A presence check ensures that an entry has been made in a particular field.
If it has not, the system will not allow the record to be saved or any entries to be made in later
fields. Such fields called mandatory fields are indicated on some systems by the used of an
asterisk.
→ Check digits: A check digit is a digit attached to the end of a string of digits that can be used
to check that the string is correct. It is calculated from the other digits in the string. One
example where a check digit is used is in the 10 digit ISBN number which uniquely identifies
books. The last number of the ISBN is actually the check digit for the other numbers. For
example, in the ISBN 1858134153, the 3 at the end of the number is the check digit.
© 2020 5
Ordinary Levels COMPUTER SCIENCE ~CSc
The check digit for ISBNs is obtained using a calculation method known as the Modulus-11
weighted check digit calculation.
Position 10 9 8 7 6 5 4 3 2 1
Digit 1 8 5 8 1 3 4 1 5
Weighting 10 72 40 56 6 15 16 3 10
s
o Divide the total by 11 and then subtract the remainder from 11. The check digit is the result
of this operation.
228 / 11 = 20 remainder 8 => Check digit is 11-8 = 3.
o Add the check digit to the end of the original number to get the complete product number.
i.e. 1858134153.
Position 10 9 8 7 6 5 4 3 2 1
Digit 1 8 5 8 1 3 4 1 5 3
Weighting 10 72 40 56 6 15 16 3 10 3
s
© 2020 6
Ordinary Levels COMPUTER SCIENCE ~CSc
o Divide the total by 11. If the remainder is 0, then the number has passed the validation
check and so it is likely that it has been inputted correctly.
231 / 11 = 21 remainder 0
a. Optical mark recognition (OMR): A technique used to read marks made with prescribed
pens or pencils on specially designed forms (OMR forms), and convert them into information
in the computer. This system is good for multiple choice examination questions.
b. Optical character recognition (OCR): A technique used to read characters from printed or
handwritten text and transmit them to the computer as if they were typed from the keyboard.
This method is suitable for capturing data from airline tickets; reading postal codes; capturing
data from telephone and electric bills.
© 2020 7
Ordinary Levels COMPUTER SCIENCE ~CSc
d. Barcode reading: An optical device called barcode reader is used to read the barcode on
products and convert them into a form that can be processed by the computer. A bar code is
a sequence of vertical lines and numbers that identify a product. They are used in libraries,
supermarkets and retail shops.
e. Voice Recognition: A technique used to convert speech into text or a sequence of computer
commands. It is most common for data entry and word processing environments, and fields
where a user needs to interact with a computer without using their hands.
Hardware: Hardware refers to the physical devices that make up the system. They are the whole
set of equipment used for input, processing, storage and communication of data.
Software: Software is the collection of computer programs used in the system. They provide the
instructions that tell the computer what to do.
Data: Data are raw, unorganized, potentially useful facts and figures that are processed to produce
information.
People: People are the main actors of the system. They are the users of the information system.
They input data into the computer, give some direction to the computer to perform tasks and
review information on the computer for output.
© 2020 8
Ordinary Levels COMPUTER SCIENCE ~CSc
Procedures: Procedures are the series of documented actions taken to achieve a particular goal.
A procedure is more than a single simple task. It can be complex and involved, such as reinstalling
software, performing a backup etc.
Strategic
Level Executives
Tactical
Level Managers
Operational
Level Workers
At the strategic level, information is needed by senior managers (chief executives and directors)
to help them with their business plans. Information at this level is used for making long term
decisions.
Strategic information is broad based and will use a mixture of information gathered from both
internal and external sources.
At the tactical level, information is needed by middle managers to help them monitor and control
business activities. Tactical planning and decision-making takes place within the guidelines set
by the strategic plan. Short term decisions are tactical.
© 2020 9
Ordinary Levels COMPUTER SCIENCE ~CSc
At the operational level, employees with operational roles need information to help them carry
out their duties. Operational planning takes place based on the tactical plan. Results of operational
work are passed upwards to let the tactical planners evaluate their plans.
In order to meet with the information needs of the organization, different types of information
systems exist which can be grouped into two: operation support systems and management support
systems.
There are two types of TPS: batch processing and online processing systems.
Batch Processing: With batch processing, transaction data is collected into groups called batches,
or over a period of time and all processing is done as a group. Batch processing is ideal in
situations where processing is not time critical, and there are large amounts of data requiring
similar processing. Examples are Payroll systems for processing employee salaries and billing
systems for processing consumer bills.
© 2020 10
Ordinary Levels COMPUTER SCIENCE ~CSc
Online Transaction Processing: With online transaction processing (OLTP) the system
processes transactions as they are entered. Such systems are ideal for situations where the master
file needs to be updated each time a transaction is made. Examples are stock control systems and
reservation systems.
Stock control systems reduce automatically the number of items in stock once an item has been
bought and reservation systems reduce automatically the number of seats available on a flight or
bus once a seat has been booked.
3.1.2. Office Automation Systems
Office automation systems automate office procedures and enhance office communication and
productivity. They support a wide range of office activities such as creating and distributing
documents, sending messages and scheduling. The software an OAS uses to support these
activities include word processing, spreadsheets, databases, presentation, graphics, e-mail, Web
browsers, personal information management, and groupware. They use communication
technologies such as voice mail, facsimile (fax), videoconferencing, and electronic data
interchange (EDI) for the electronic exchange of text, graphics, audio, and video. OAS are also
called Office Information Systems (OIS).
© 2020 11
Ordinary Levels COMPUTER SCIENCE ~CSc
Systems. MIS take information from TPS and summarize them into a series of management
reports. As such, MIS are sometimes called Management Reporting Systems (MRS).
MIS generate three basic types of information or reports: detailed, summary and exception.
Detailed reports: They confirm transaction processing activities. A detailed order report is an
example of a detail report.
Summary reports: They consolidate data into a format that an individual can review quickly and
easily. To help synopsize information, a summary report typically contains totals, tables, or
graphs. An inventory summary report is an example of a summary report.
Exception reports: Exceptions reports report information that is outside of a normal condition.
These conditions called the exception criteria, define the range of what is considered normal
activity or status. An example of an exception report is an inventory exception report that notifies
the purchasing department of items it needs to reorder. Exception reports help managers save
time because they do not have to search through a detailed report for exceptions. Instead, an
exception report brings exceptions to the manager’s attention in an easily identifiable form.
Exception reports thus help them focus on situations that require immediate decisions or actions.
Examples of MIS are: Sales management systems, Inventory control systems and Budgeting
systems.
© 2020 12
Ordinary Levels COMPUTER SCIENCE ~CSc
o Data from external sources could include interest rates, population trends, and costs of new
housing construction or raw material pricing.
Examples of DSS are: Logistics Systems, Financial Planning Systems and Spreadsheet Models
© 2020 13
Ordinary Levels COMPUTER SCIENCE ~CSc
Expert systems are one part of an exciting branch of computer science called artificial intelligence
(AI). AI is the science and engineering of making intelligent machines which are able to simulate
human behavior. Artificial intelligence can be used in a wide range of fields including education,
medical diagnosis, robot control, computer games, law, scientific discovery, stock trading etc.
Other branches of artificial intelligence include computer vision, speech recognition,
epistemology, heuristics, neural networks and logical reasoning,
Definition: SDLC is a structured step-by-step approach for creating and maintaining information
systems.
© 2020 14
Ordinary Levels COMPUTER SCIENCE ~CSc
SDLC consists of a number of stages that describe the activities involved in an information system
development process. These stages are: investigation, analysis, design, construction,
implementation, and maintenance.
System
Investigation
Construction
© 2020 15
Ordinary Levels COMPUTER SCIENCE ~CSc
Gathering business requirement: Business requirements are the detailed set of knowledge users
request the system must meet to be successful. They explain what has to be done by identifying
the necessary tasks, actions or activities that must be accomplished.
It involves:
o Determining specific information needs
o Determining the information processing capabilities required for each system activity (input,
processing, output, storage, and control) to meet the needs. The goal here is to identify “what”
should be done not “how” to do it.
© 2020 16
Ordinary Levels COMPUTER SCIENCE ~CSc
o Determining functional requirements (information requirements that are not tied to the
hardware, software, and people resources that end users presently use or might use in the new
system).
Feasibility analysis: Feasibility is the measure of how suitable the development of a system will
be to the organization. Feasibility study investigates the information needs of prospective users
and determines the resource requirements, cost, benefits, and workability of a proposed project.
Its goal is to evaluate alternative systems and propose the most feasible and desirable system for
development.
Feasibility of a system can be evaluated in terms of four major categories:
Organizational feasibility: focuses on how well a proposed information system supports the
objectives of the organization and its strategic plan for information systems.
Technical feasibility: focuses on the reliability/capabilities of the hardware and software to meet
the needs of the proposed system, and whether they can be acquired or developed in the required
time.
Economic feasibility: focuses on whether the tangible costs and benefits of the proposed system
will exceed the costs of developing and operating it.
Operational feasibility: focuses on the ability of the end users to operate, use, and support the
proposed system.
The outcome of a feasibility analysis is a feasibility report which is presented to the user
management for approval. It may be accepted or accepted with modifications or rejected.
© 2020 17
Ordinary Levels COMPUTER SCIENCE ~CSc
User interface design: A user interface is a means of interaction between the user and the
computer-based application. This activity focuses on designing how data will be introduced into
the system and how the information generated will be retrieved. It produces detailed
specifications for information products such as:
o Display screens
o Interactive user/computer dialogues
o Forms (on-screen forms for data input and output)
o Reports (on-screen and printed)
Data design: Data design focuses on the design of the structure of data and files to be used by the
proposed (new) system. It provides detailed descriptions of:
o Attributes (characteristics) of the entities about which the proposed system needs to maintain
information.
o Relationships between these entities (E-R diagrams, data flow diagrams)
o Specific data elements (databases, files, records, etc.) that need to be maintained for each
entity.
o Data dictionary
o Integrity rules (data validation and verification) that govern how each data element is
specified and used in the system.
© 2020 18
Ordinary Levels COMPUTER SCIENCE ~CSc
Process design: Process design focuses on the design of software resources, that is, computer
programs and of procedures needed by the proposed system. It concentrates on developing
detailed specifications for the program modules that will have to be purchased as software
packages or developed by custom programming. Process design produces:
o Detailed specification of algorithms (pseudo-codes, flow charts, etc.)
o Detailed specifications of the procedures needed to meet the user interface and data design
specifications.
o Detailed specification of the database schema (E-R diagram, object diagrams)
The design stage is very important because it is the place where quality is fostered in software
engineering. Design provides us with representations of software that can be assessed for quality.
Design is the only way that we can accurately translate a customer's requirements into a finished
software product or system.
5.4. Construction
Once the design of the system is complete, it has to be converted into a computer understandable
form. Development is the stage where the design is converted into a computer program.
Prototyping: Prototyping is the rapid development and testing of a working model of a product
in an interactive and iterative process involving both systems analysts and end users. This
working model or prototype, is a partially developed product that enables customers and
developers to examine some aspects of the proposed product and decide if it is suitable for a
finished product.
Various types of prototyping exist.
© 2020 19
Ordinary Levels COMPUTER SCIENCE ~CSc
Throw-away prototyping: In throw-away prototyping, the prototype is discarded once the actual
requirements have been understood and the final system is developed with a much clear
understanding of user requirements.
Testing: It is the process of executing a program with the intent of finding an error. During testing,
trial runs are done to check for errors and whether or not the new system meets the users' needs.
Once source code has been generated, the software must be tested to uncover and correct as many
errors as possible before delivery.
There are three sets of data that can be used to test the system: normal data and abnormal data.
Normal data: This is valid data which the system will accept.
Abnormal data: This erroneous or invalid data which the system will reject.
Extreme data: These are data values that are chosen at the absolute limits of the normal range.
This is to ensure that all normal values will be accepted and processed correctly.
Using these test data, the following test runs can be carried out:
Unit testing tests the individual units or modules separately with prepared test data so that any
errors can be corrected.
Integration testing tests the complete system after the individual units have been tested and put
together. This tests that separately developed modules/units work together as planned without
error.
© 2020 20
Ordinary Levels COMPUTER SCIENCE ~CSc
System testing tests the integrated system to evaluate the system's compliance with its specified
requirements.
Two testing techniques that can be used are black-box testing and white-box testing.
Black-box Testing: Black-box testing is a test that relies on the input/output behavior of the
system, without any assumptions to what is happening within the system. It examines some
fundamental aspects of a system with little regard for the internal logical structure of the system.
Black-box tests are used to demonstrate that system functions are operational, that input is
properly accepted and output is correctly produced, while at the same time searching for errors in
each function. Simply put, black-box testing tests the functionality of the system.
White-box Testing: White-box testing, also called glass-box testing, is a test that relies on
information about how the system has been designed and constructed. It requires knowledge of
the internal structure or implementation of the system. White-box testing tests the code rather the
functionality of the system. White-box tests are conducted to ensure that internal operations are
performed according to specifications and all internal components have been adequately
exercised.
Documentation: The job of the programmer does not end with the code or software instructions.
The organization or users need to know how to get the best out of the system. This is done through
documentation. System documentation ensures continuity of the system. There are two types of
documentation; user documentation and technical documentation.
User Documentation: It is a complete description of the system from the user’s point of view
detailing how to use or operate the system. It could be a paper-based user manual or help
incorporated into the software that can be accessed when the software is installed. User
documentation always covers the following:
- A guide that describes what the system is supposed to do in non-technical terms
© 2020 21
Ordinary Levels COMPUTER SCIENCE ~CSc
Technical Documentation: This is a description from the designer’s point of view. Technical
documentation often contains:
- Detail functioning of the software showing algorithms, formulae, source codes etc.
- Description of data structures
- Test plans and testing procedures
- User interface and reports
- Location and version of the software
5.5. Implementation/Conversion
Implementation is the conversion from the use of the present (old) system to the operation of the
new system. It involves:
o Installation of new system
o Loading of data into new system
o Education and training of users of the system
Direct conversion or plunge: In this type of conversion the old system is completely replaced by
the new one. Its disadvantage is that, if the new system fails, there is no back-up system, so data
can be lost.
© 2020 22
Ordinary Levels COMPUTER SCIENCE ~CSc
Pilot conversion: Here the new system is installed in one part of the business or organization.
This allows the new system to be fully developed and tested. Once the pilot system is running
successfully, the new system is introduced to all of the business/organization.
Its advantages are that, if something goes wrong with the new system, only a small part of the
organization is affected, and the staff that were part of the pilot scheme can help train other staff.
As a disadvantage, there is no back-up system for the office/department doing the pilot, if things
go wrong.
Parallel conversion: In parallel cutover, the old system and new system operate alongside each
other (in parallel) until new system is proven capable.
It is advantageous in that, if the new system fails, the old system will act as a back-up. Also, the
outputs from the old and new systems can be compared to check that the new system is running
correctly.
Its disadvantage is that, entering data into two systems, and running two systems together, takes
a lot of extra time and effort.
Phased conversion: in which the new system is installed in phases (stages or steps) gradually
replacing parts of the old system until eventually, the new system takes over.
Its advantages are that, it allows users to gradually get used to the new system, and training of
staff can be done in stages.
Its disadvantage is that, if a part of the new system fails, there is no back-up system, so data can
be lost
5.6. Maintenance
Maintenance is the general process of changing a system after delivery to correct faults, improve
performance or adapt the system to a changing environment or business requirements.
Maintenance is necessary to eliminate errors in the system during its working life and to tune the
system to any variations in its working environment.
Maintenance can be adaptive, preventive, corrective or perfective.
© 2020 23
Ordinary Levels COMPUTER SCIENCE ~CSc
→ Preventive maintenance: This aims in retaining the system’s capabilities before the
occurrence of any problem (e.g. system failure). It locates weaknesses in the system and
provides repairs in order to avoid any eventual breakdown of the system. Making changes to
prevent future system failures.
→ Corrective maintenance: This aims in restoring a defective system to a required state. This
implies that repairs are made after a breakdown of the system. (Making changes to repair
system defects)
→ Perfective maintenance: This refers to enhancements to the product in order to either add
new capabilities or modify existing functions. Making changes to enhance the system and
improve such things as processing performance and usability.
6. Project Management
A project is a temporary endeavor undertaken to create a unique product, service, or result. Project
management is the application of knowledge, skills, tools, and techniques to deliver projects
successfully. The project manager is the individual responsible for maintaining this expertise and
ensuring that a project is delivered successfully.
A project is considered constrained by three functions:
→ Scope: what it is intended to accomplish. In other words, a project’s scope is the customer’s
requirements for the project.
→ Time allocation: the time schedule for the project.
→ Cost: the money, budget, and resources for a project.
© 2020 24
Ordinary Levels COMPUTER SCIENCE ~CSc
These three functions are called the Triple Constraint. The relationship between them is
represented using the Project Management Triangle.
The Project Management Triangle visualizes the fact that time, cost and scope of a project are
interdependent; changing one of them causes changes in one of the other two. For example, if
you want to shorten a schedule, you can hire more resources which would increase cost, or reduce
customer requirements which would affect quality. This simply means “you can have any two of
fast, good or cheap, but not all three.”
Definition: Project management is the application of knowledge, skills, tools and techniques to
activities of a project for the achievement of the project’s objectives/requirements.
Project management ensures that an acceptable system is developed within time and budget.
a. Initiation: Project initiation determines the main objective of the project and forms a clear
understanding about the necessity and suitability of the project. This stage answers the questions
“what?” and “why?” Common activities at this stage are:
o Identification and initial analysis of the business needs.
o Determination of the main objective(s).
o Resource analysis (people, equipment, financial; needs and availability).
© 2020 25
Ordinary Levels COMPUTER SCIENCE ~CSc
b. Planning: Project planning involves the project plan development and approval. It
determines an optimal scheme/algorithm for project execution. This stage answers the question
“how?” The main activities at this stage are:
o Needs analysis
o Description of the project (including determination of activities and necessary resources)
o Composition of project plan
o Planning and performing necessary PR-activities.
(PR is the practice of managing the spread of information between an individual or an
organization and the public. Public relations activities include: launchings, media conferences,
sales promotions, open day, product testing, websites, press release, newsletters.)
c. Execution: Project execution is the phase within which the deliverables are physically
constructed and presented to the customer for acceptance. It integrates people and other resources
to carry out the project management plan for the project. The activities undertaken to construct
each deliverable will vary depending on the type of project being undertaken. Main activities
are:
o Starting up the execution.
o Building the deliverables
o Day-to-day management and reporting
d. Monitoring and Control: Project control measures and monitors progress to identify
variances from the project management plan so that corrective action can be taken when
necessary to meet project objectives. Control occurs throughout the duration of the project and
has a range relatively similar to that of execution. While the project is being executed, a series
© 2020 26
Ordinary Levels COMPUTER SCIENCE ~CSc
of management processes are undertaken to monitor and control the deliverables being output
by the project. This includes:
→ Change management: Requesting, evaluating and approving changes to the project scope,
deliverables, timescales or resources.
→ Time management: Controlling the amount of time spent undertaking each activity within
the project.
→ Issue management: Identifying and handling issues currently affecting the ability of the
project to produce the required deliverables.
Performing a phase review at the end of execution to ensure the project has achieved its objectives
as planned.
© 2020 27
Ordinary Levels COMPUTER SCIENCE ~CSc
e. Closing: Once all the deliverables have been produced and the customer has accepted the
final solution, the project is ready for closure.
Project closure involves:
o releasing the final deliverables to the customer
o handing over project documentation to the business
o terminating supplier contracts,
o releasing project resources
o communicating the closure of the project to all stakeholders
→ Task/Activity: Anything that needs to be done that requires time and consumes resources.
→ Dependent task: A task that can only begin after a previous one is finished. For example,
roofing a house depends on the construction of the walls.
Slack time or float time: The amount of delay that can be tolerated between the starting time
and completion time of a task without causing a delay in the completion date of the entire
project. If we have tasks A and B that start at the same time and task C that is dependent on
both tasks A and B. If task A takes 3 days and task B takes 5 days, then task A has 2 days
slack time. That is, it can run for 2 days before it affects the planned starting time for task C.
→ Lag time: The delay or amount of time that passes between the end of one activity and the
beginning of another if the two are dependent. For example, if task A is laying of cement
blocks and dependent task B is building the walls of the house, there would be some lag time
between the end of task A and the start of task B to let the blocks get dry.
→ Lead time: Occurs when a task should theoretically wait for its predecessor to finish, but can
actually start a little early. The time that the tasks overlap is lead time.
© 2020 28
Ordinary Levels COMPUTER SCIENCE ~CSc
→ Deliverable: Some concrete thing which is to be delivered, to the client or internally to the
development team.
→ Critical path: A sequence of dependent tasks that have the largest sum of most likely
durations. In other words, it is a sequence of tasks that determine the earliest possible
completion date of the project.
→ Critical task: A task found on the critical path. A critical task cannot be delayed without
delaying the entire project schedule. Critical task have 0 float.
→ Project management plan (PMP): a document that describes how the project is to be
executed, monitored and controlled, which includes creating a project work breakdown
structure, identifying and planning to mitigate risk, identifying manners in which to
effectively communicate with stakeholders and other project team members, and developing
a plan to manage changes.
a. Critical path method: CPM is an analysis technique used to predict project duration by
analyzing which sequence of activities (which path) has the least amount of scheduling flexibility
© 2020 29
Ordinary Levels COMPUTER SCIENCE ~CSc
(the least amount of total float). Early dates are calculated by means of a forward pass using a
specified start date while late dates are calculated by means of a backward pass starting from a
specified completion date, usually the forward pass’s calculated project early finish date.
Forward pass: The calculation of the early start and early finish dates for the uncompleted
portions of all network activities, determined by working forward through the schedule network
logic from the project’s start date.
Backward pass: The calculation of late finish and late start dates for the uncompleted portions
of all schedule activities, determined by working backward through the schedule network logic
from the project’s end date.
CPM models the events and activities of a project as a network. Activities are depicted as nodes
on the network and events that signify the beginning or ending of activities are depicted as arcs
or lines between the nodes.
a)
b)
Network diagrams
© 2020 30
Ordinary Levels COMPUTER SCIENCE ~CSc
o Joining task A to E shows that task A must be completed before task E can be started.
o Joining tasks A and B to E shows that both task A and B must be completed before task E
can be started.
o The number marked on each arc (arrow) shows the duration of the task from which the arc
starts.
The critical path can be identified by determining the following four parameters for each activity:
o ES – earliest start time: the earliest time at which an activity can begin given that its
predecessor activities must be completed first.
o EF – earliest finish time, equal to the earliest start time for the activity plus the time required
to complete the activity.
o LF – latest finish time: the latest time at which an activity can be completed without delaying
the project.
o LS – latest start time, equal to the latest finish time minus the time required to complete the
activity.
Activities with the same earliest and latest start times (ES=LS) or with same earliest and latest
finish times (EF=LF) define the critical path. This means that these activities have a float time of
0.
© 2020 31
Ordinary Levels COMPUTER SCIENCE ~CSc
F 2 25 25 0
G 5 17 19 2
H 8 22 24 2
I 2 27 27 0
J 3 29 29 0
Finish 32 32
© 2020 32
Ordinary Levels COMPUTER SCIENCE ~CSc
Exercise 2: Find the critical path for each of the activity networks below.
a.
b.
c.
© 2020 33
Ordinary Levels COMPUTER SCIENCE ~CSc
These three estimates are then used to calculate a weighted duration for each task by using the
formula 𝑇𝐸 = (𝑎 + 4𝑚 + 𝑏)/6
The weighted durations are then used as a more realistic estimate of task durations for
constructing a PERT chart (network diagram).
Using PERT, the probability of completing the project by a certain date t, can now be found by
finding
𝑡−𝑇 𝑡−𝑇
𝑃(𝑡 ≥ 𝑇) = =
√σT 2 σ
Where
𝑇is the expected completion time of the project
And
2
𝑏−𝑎 2
σT = ( )
6
is the variance of T = (variances of activities on the critical path).
Example:
If a project’s expected completion time is 𝑇 = 246 𝑑𝑎𝑦𝑠 with its variance σT 2 = 25, then what
is the probability that the project
a) is actually completed within 246 days?
b) is actually completed within 240 days?
c) is actually completed within 256 days
Solution
a) 𝑡 = 246, 𝑇 = 246 and σT 2 = 25
246 − 246
𝑃(𝑡 ≥ 𝑇) = =0
25
© 2020 34
Ordinary Levels COMPUTER SCIENCE ~CSc
240 − 246 −6
𝑃(𝑡 ≤ 𝑇) = = = −0.24
25 25
∴ 𝑃(𝑡 ≤ 𝑇) = 1 − (𝑃(𝑡 < 0.24)) = 1 − 0.24 = 0.76
c. Gantt chart: A Gantt chart is a horizontal bar graph that helps plan and monitor project
development or resource allocation on a horizontal time scale. It depicts project tasks against a
calendar. A Gantt chart is constructed with a horizontal axis representing the total time span of
the project, broken down into increments (days, weeks, or months) and a vertical axis representing
the tasks that make up the project. Horizontal bars of varying lengths represent the sequences,
timing, and time span for each task. The bar spans may overlap, as, for example, you may conduct
research and choose software during the same time span. As the project progresses, secondary
bars, arrowheads, or darkened bars may be added to indicate completed tasks, or the portions of
tasks that have been completed. A vertical line is used to represent the report date.
A Gantt chart
© 2020 35
Ordinary Levels COMPUTER SCIENCE ~CSc
© 2020 36