Download presentation
Presentation is loading. Please wait.
Published byOswald Long Modified over 9 years ago
1
www.bzupages.com Introduction Presented By: KHURRAM SHAHZAD Presented To: Sir Ahmad Tasman Pasha Roll #: 07-32
2
www.bzupages.com CH#15 System Design
3
www.bzupages.com Contents Determining the Storage Requirements Developing Procedures For Using The System
4
www.bzupages.com Determining the Storage Requirements
5
www.bzupages.com Determining the Storage Requirements Access and Organization of Data Storage Volume of Data Media
6
www.bzupages.com 1-Accessing of Data Understanding the User Requirements Sequentially Access Directly Access Both
7
www.bzupages.com Example of Sequentially Access
8
www.bzupages.com Example of Directly Access
9
www.bzupages.com Example of Both
10
www.bzupages.com Organization of Data Select the appropriate data organizing method File oriented Method Sequential and Index structure Direct structure Database Processing Method Indexes Primary and Secondary keys
11
www.bzupages.com 2-Storage Volume Analyze the storage needs Design the storage mechanism Avoid the extra spaces Disk-Fragmentation
12
www.bzupages.com 3-Appropriate Storage Media Disk Hard-Disk Tapes Optical Disk
13
www.bzupages.com Developing Procedures For Using The System
14
www.bzupages.com Developing Procedures For Using The System Work Procedures Control Procedures Security Control Accuracy Control Privacy Control
15
www.bzupages.com 1-Work Procedures Analyze the daily performed work These can be represented by: Data Flow Diagrams System Flow Charts
16
www.bzupages.com 2-Control Procedures 2.1-Security Control: Provide Security from unauthorized users Security Control Methods Password Protection Security Policies (Firewall) IDS (Intrusion Detection System)
17
www.bzupages.com 2.2-Accuracy Control Provide accuracy of data Accuracy Control Methods Batch Processing Sequence Check Real Time Processing Audits Audit Trails
18
www.bzupages.com 2.3-Privacy Control Provides protection of people’s rights Enforced by government Applied when information is transferred Enforce on both public and private sectors
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.