Open In App

System Analysis and Design Interview Topics for Freshers

System Analysis is the “what” before the “how” in system design. It provides the essential roadmap for crafting a system that is both effective and efficient in solving the intended problem. “Imagine you’re building a dream house. You wouldn’t start hammering nails without a detailed blueprint, right?”The same goes for software development.”

System analysis is the blueprint, while system design translates it into the actual system.



1. Information System(IS)

Information systems are integral to system design, shaping the architecture, data management, user interaction, and development process.



By carefully considering the role of IS, system designers can create systems that are robust, user-friendly, and meet the needs of their intended users.

Six Major Components of Information System:

2. Characteristics(Properties) of a System Analysis

Properties of a system analysis are:

3. Classification of System Analysis

Classification of system analysis is as follows:

Real Time Systems – Interactive processing system with severe time limitations. There are two types of Real Time systems. They are:

System Users – The people who use information systems.

4. Distributed Systems

Distributed Systems: Data, Process and Interface components are distributed to multiple locations in computer networks.

Advantages of Distributed Systems:

The five layers of Distributed System architecture are:

  1. Presentation Layer is the actual user interface and helps in input & output operations.
  2. Presentation Logic layer include processing for establishing user interface.
  3. Application Logic Layer includes all the logic and processing for support the application
  4. Data Manipulation Layer Includes all the commands and logic for storing and retrieving data.
  5. Data Layer is actual stored data in the database

5. System Analysis and Design

Approaches to Development

Attempts to make system development less of an art and more of a science usually referred to as engineering techniques, are applied to system development. Techniques are:

6. System Analyst

A System Analyst is an individual responsible for analyzing requirements and designing information systems.

Role of a System Analyst

Duties of a System Analyst

Qualifications of a System Analyst

7. System Development Life Cycle(SDLC)

SDLC, or Software Development Life Cycle, is a common set of steps for system development used by many organizations.

SDLC consists of mainly seven steps or phases. These are:

8. Documentation of Systems

Documentation – It is the process of communicating about the system.

The steps involved in the process of documentation are:

9. System Requirements Specification(SRS)

it is a set of complete and precisely stated properties along with the constraints of the system that the software must satisfy.

Characacteristics of a SRS

Structure or Outine of a SRS Document:

System Design Specification or Software Design Specification

it gives a complete understanding of the details of each component of the system, and its associated algorithms, etc.

10. Fact Finding Techniques or Information Gathering Techniques

Techniques used for collecting data related to the existing system to learn the function of the existing system. Various fact-finding techniques are:

Interviews

The steps involved in the interview are Introduction, Asking Questions, Recording the interview, and Doing a final check. There are two types of interviews:

Advantages of Interviews

Disadvantages of Interviews

Feasibility Study

Consists of activities which determine the existence of the scope of developing an information system for the organisation. There are different feasibility study like

Cost Benefit Analysis

It involves analysing the costs associated with implementing and operating a system against the expected benefits it will bring. Different costs are

11. Modular and Structured Design

Design – it bridges the gap between specifications and coding. Some of the properties of design are Verifiability, Traceability, Completeness, Consistency, Efficiency, and Simplicity.

Design Principles

These principles are meant to effectively handle the complexity of design.

These principles are:

Guidelines for good design are:

Coupling

The communication between modules should be through parameters. Boolean variables or flags can be used for communication. There are five types of coupling:

Cohesion

A module conforms itself to the performance of a single task.

There are seven types of cohesion. They are:

12. Form Design

Forms are used for collecting data from users. Form design refers to the process of creating intuitive and user-friendly forms.

The common GUI controls used in forms for inputs include:

Criteria for form design

To create a well-conceived and attractive design form, we have to satisfy the following criteria:

13. Report Design

Reports are used for presenting and summarizing data in a structured format. Report design refers to the process of creating clear, organized, and user-friendly layouts for displaying information.

Types of Output for Report Design

Criteria for report design

For producing a good report following criteria should be considered:

User Interface Design

it involves creating interfaces that facilitate effective communication between users and computer systems. It focuses on making interactions intuitive, efficient, and user-friendly.

If you are interested to learn more about design, you can refer Design Pattern Tutorial.

14. Process Modeling or Data Flow Diagram (DFD)

Graphical representation of the function and process, which capture, manipulate, store and distribute data between components within a system.

The components of a Data Flow Diagram(DFD) are:

here are the notations for the components:

Notations for the components of DFD.

15. CASE Tools – Computer-Aided Software Engineering Tools

All software that supports managerial, technical, or administrative aspects of any part of the software development process is termed as CASE tools.

Use of CASE Tools:

Role of CASE Tools:

Advantages of CASE Tools:

Types or Components of CASE Tools:

The components of CASE tools.

16. Implementation of Systems

It involves coding, testing, creating necessary hardware, and providing training to end-users.

System Testing

A holistic approach to testing the application. Types include Recovery Testing, Security Testing, Stress Testing, Performance Testing, Response Testing, Usability and Documentation Testing.

Converting Old System to the New System:

Can be performed in several ways depending on system criticality and related issues:

17. Maintenance of Systems

Monitoring, evaluating, and modifying the information system to make necessary desirable changes. Maintenance activity has four key stages:

Different Maintenance Activities

Legacy System: A very old and large system modified heavily since its inception. Solutions include replacing software with a package, re-implementing from scratch, discarding software, freezing maintenance and phasing in a new system, or reverse engineering the legacy system.

18. Audit of Computer Systems

An assessment of an information system to provide recommendations and advice to improve system performance and security. It is done by an IS auditor. Objectives of the audit are:

Responsibility and Authority of the System Auditor:

Factors Audited by IS Auditor:

Some Important Terms

Risk Assessment – Evaluating threats and vulnerabilities of IS. two methods are there for analysing the risks:

Disaster Recovery Plan

Techniques applied for contingency situations are:

Contigency Events

Necessary Recovery Action

Loss of Data

Identify the appropriate recovery plan, The location of required recovery files.

Loss of Software

Identify the type of software and location where backup copies are maintained.

Loss of Communication

Identify alternate communication facility, Estimate recovery time.

Loss of hardware

Identify any alternate substitute for the equipment. Estimate replacement cost of hardware.

Loss of Personnel

Identify substitutes for each personnel, if alternates are not available then obtain them from an outside source.

Loss of Facility

Identify all necessary hardware, software, data, and personnel required for normal functioning at the alternative location

Contingency Planning Steps:

19. Viruses

One of the biggest security threats to computer systems can cause irreparable damage to certain systems. Anti-virus measures for protecting against viruses include:

20. Concurrent Audit

Data is audited while the transaction is in progress. It helps in finding missing audit trails and is also used in monitoring largely integrated and automated systems.

Concurrent Audit Techniques

21. Different Kinds of Information Systems

Management Information System (MIS)

It helps the organization produce information that can aid in improving decision-making, problem-solving, controlling operations, and creating new products or services.Generates semi-structured, ad-hoc reports tailored for strategic management. Examples: Marketing information systems.

Transaction Processing System (TPS)

TPS processes data from business operations, providing essential support for day-to-day operations. Handles routine transactions, employs fixed periodic reporting, and serves operational management needs. Examples: Sales processing systems, and online reservation systems.

Decision Support System (DSS)

DSS utilizes analytical models, specialized databases, and internal data to provide interactive decision support. Offers reports like sensitivity and what-if analyses, catering to individual manager’s decision-making needs. Example: Geographic Information System (e.g., IBM’s Geo-Manager).

Expert System

Expert Systems apply knowledge from a specific field, delivering expert advice within a defined domain. Provides human-like expert advice; sought by managers seeking specialized knowledge. Example: Medical diagnostic expert systems (e.g., MYCIN).

If you are a beginner and want to learn about system design then you can refer to System Design Tutorial.


Article Tags :