信息系统外文翻译

合集下载

system information翻译

system information翻译

system information翻译
System Information翻译是指系统信息,它代表一个由系统设备、软件和服务组成的整体,系统信息可以用来描述系统的特性、配置、性能和其他重要信息。

System Information翻译是将系统信息从一种语言翻译成另一种语言,以便更好地理解系统信息。

这种翻译可以帮助用户了解不同系统的特性和配置,也可以帮助技术人员了解不同系统的工作方式和运行情况。

系统信息翻译广泛应用于系统架构,用户界面,配置文件,日志,协议,安全,性能,调试等多个方面,可以帮助用户更好地理解系统信息。

System Information翻译主要包括三个方面:一是系统结构的翻译,即将系统的结构(如系统组件,设备,连接器,总线,接口等)从一种语言翻译成另一种语言;二是用户界面的翻译,即将用户界面的文字,图标,按钮,菜单等从一种语言翻译成另一种语言;三是配置文件的翻译,即将配置文件中的参数,变量,函数,脚本等从一种语言翻译成另一种语言。

系统信息翻译不仅可以帮助用户更好地理解系统信息,而且还可以提高系统的安全性和可靠性,减少系统的
攻击和故障。

此外,正确的系统信息翻译也可以帮助技术人员更好地理解系统信息,从而更有效地解决问题。

因此,System Information翻译是一项重要的任务,可以帮助用户更好地理解系统信息,提高系统的安全性和可靠性,从而解决系统中出现的问题。

Web信息系统毕业论文中英文资料外文翻译文献

Web信息系统毕业论文中英文资料外文翻译文献

Web信息系统毕业论文中英文资料外文翻译文献中英文资料翻译With the popularity of the Inter NET applications, a variety of Web Information System Has become a pressing issue. Establish the essence of Web information systems Development of a Web repository (database as the core of a variety of Web letter Information storage) as the core Web applications. Currently, the Web repositorydevelopment technologyOperation of a wide range of different characteristics. Various periods at all levels, a variety of purposes Technology co-exist, dizzying mirror chaos, it is difficult to choose. More popular Java of Ser vet Web repository development program a more practical Of choice.Servlet is running the applet on the Web server, can be completed Xu Multi-client Applet can not complete the work, which runs on the server and clients No end, do not download do not by the client security restrictions, the running speed Greatly increasedAnd Applet running in a browser and extend the browser's ability similar Like, Serv the let run in the Web server to enable Java Serv the let engine And expand the capacity of the server. Therefore, we can say Serv the let is run in Applet on a Web server, Serv the let Jav a Ser vlet API And Jav a program of classes and packages.1 Servlet access model2 Serv the let, there are three access models:(1) an access model1 browser to Web server to issue a retrieval request.2 the Web server after receipt of the request, the requestforwarded tothe Servle tengine.3 Serlet engine to perform the requested the Ser vlet and directly throughJDBC4Servlet throughJDBC toretrieve searchresults to generate the html page and Page back to the Web server.5 the Web server the page is sent back to the browser.(2)The second access model1 browser to Web server to issue a retrieval request.2 the Web server receives the request after the request forwardedto the of Ser v the letengine.3 Serv let engine to perform the request the the Ser vlet and retrieve sentJa, vabean access to the data.4data access the Ja vabean searchable database throughJDBC informationAnd from the search results stored in itself.5Servlet remove search results from the data access Javabean generate Html page and Ht ml of page back to the w eb server.6 the Web server the page is sent back to the browser.(3) The third access model1 A browser issue a retrieval request to the Web server.2 Web server receives the request after the request forwarded to the ofSer v the let engine.Of Ser vlet engine to perform the requested Servlet directlythroughJDBC inspection3 The cable database and search results are stored in the result isstored the Jav abean into.Javabean,4. Ser v the let from the results are stored to remove the search results and JSP files to format the output page.2 Servlet functionality and life cycle2.1Servlet functions(1) Create and return dynamic Web pages based on customer requests.(2) create can be embedded into existing HTML pages as part of HTML Page (HT fragment) of the ML.(3) and other server resources (including databases and applications based on the Jav a Program) to communicate.(4) to handle multiple client connections, receiving the input of more than one client, and The results broadcast to multiple clients. For example, Ser vlet is a multi-participant Game server.(5) of MIM E type filter information on the special handling, such as image Conversion and server-side include (SSI).(6) custom processing available to all servers in the standard routine.2.2Servlet lifecycleServlet life cycle begins with it into the Web server's memory And end in the termination or re-loaded Serv the let.(1) load.Load the servlet at the following times:1. If you have configured automatic load option, and then start the Webserver automatically loaded2.After the start of the Web server, the client Serv the let issued for the first time, pleaseDemand.3.Reload Serv the let.Loaded Servlet, Web servers to create a servlet instance, and Servlet's init () method is called. Servlet initialization parameters in the initialization phase, The number is passed to the Servlet configuration object.(2) terminateWhen the Web server no longer needs the servlet, or reload Servlet A new instance of the server calls Serv the let's destroy () method, remove it from the Memory deleted.3 How to call ServletMethod of Ser vlet is called Total five kinds: call in the URL in the formT ag call, call, in HT the ML page in the JSP files Call, call in an ASP file. The following itemized to be introduced.(1) call the servlet in the URL.Simply input format in the browser as http: ∥yo ur webser ver the same the ser vlet name name / servlet path / servlet the URL to The site canbe. Ofwhich:your webser ver name is to refer to the Servlet where theWeb server name, the servlet path is the path refers to the Servlet, the servletThe name refers to the Servlet real name or an alias.(2) call the Servlet tagsCall of Ser the let the the tag allows users to input data on the Web page, andinput data submitted to the vlet of Ser.Serv the let will be submitted to receive data in different ways.For example: {place the text input area tags, buttons and other logos} (3) in the HTML page to call the servlet.Use mark tags, no need to create a complete HTML page.Instead,the servlet output isonly part of the HTMLpage (HTML fragment) and dynamicallyembedded into the static text in the original HTML page.All this happened on the server andsent to the user only the resulting HTML page. tag contained in the original HTML page.Servlet will be invoked in these two markers and the Ser vlet response will cover these two markersbetween all things and mark itself, for example: 〈SERVLET NAME= “my serv let ”CODE= “my serv let .class”CODEBASE= “u r l”initpar am= “v alue”〉〈PARAM NAME= “parm1”VALU E= “v alue1”〉〈PARAM NAME= “parm2”VALU E= “v alue2”〉〈/SERVLET 〉(4) call the servlet in the JSP files.Call in the JSP file format used by the Servlet and HTML page to call exactly the same.Andthe principles are identical. Only reconcile its dynamic JSP file is not a static HTML page.(5) in an ASP file calls the servlet.If you Micr oso ft I nt ernet Informatio n-Ser ver (II S) on the legacy of the ASP file, and can not be ASP files transplanted into a JSP file, you can use the ASP file to of Ser vlet iscalled.But it must be through a special ActiveX control, an ASP file is only through it can callthe servlet.4 Servlet Howto use ConnectionManager toefficiently manage the database connection (1) the functionality of the Connection Manager.For non-Web applications, Web-based application access tothe database will lead tohigher and unpredictable overhead, which is due to more frequent Web users connect anddisconnect.Normally connected to the resourcesused and disconnect from the databasewill farexceed the resources used in the retrieval.Connection Manager function is to minimize the additional occupancy of the users of the database resources to achieve thebest performance of database access.Connection Manager sharing overhead through the establishmentof the connection poolwill connect users Servlet available to multipleusers request.In other words, each userrequest only the connect/ disconnect with a small portion of the overhead costs.Initialresources to establish the connection of the buffer pool, the rest of the connect/ disconnectoverhead is not big, because this isonly reuse the existing connection.Serv the let in the following manner using the connectionpool: When a user throughRequest Web Serv the let the let Serv use an existing connection from the buffer poolNext, this means that the user requests do not cause the connection to the databasesystem overhead. InAfter the termination of serv the let it connect to return to the pool forits Connection ManagerThe Ser vlet. Thus, the user request does not cause the database is disconnectedOf system overhead.Connection Manager also allows users to be able tocontrol the concurrency of thedatabase products evenThen the number. When the database license agreement limit the number ofusers, this feature isVery useful. Create a buffer pool for the database, and connection managementBuffering pool "maximum number of connections" parameter setto the database product license limitGiven maximum number of users. If you use otherprograms without Connection ManagerconnectionsDatabase, you can not guarantee that the method is effective.(2) the structure of the Connection Manager.(3) Connection Manager connection pool to maintain a connection to a specificdatabase is open. Step 1: When the first Serv the let trying to Connection Manager communications is loaded by the Java Application ServerConnection Manager. As long as the Java application server running the Connection Manager has been loaded. Step 2: The Java application server passes the request to a servlet. Step 3: Servlet Connection Managerrequests a connection from the pool. Step four: the buffer pool to Ser vlet allocated a pool of existing idle connection. Step 5: servlet to use toconnect a direct dialogue with the database, this process is the standard API for a particular database. Step 6: the database through Ser vlet the connection returns data. Step 7: When theServlet end to communicate with the database, servlet connections returned to the connection manager pool for other servlet uses. Step 8: Servlet Jav a application server to the user sends back response.Servlet requests a connection, if the buffer pool, there is no idle connection, then the connection manager directlycommunicate with the database. Connection Manager will: Step 9: to the database requests a new connection. Step 10: Add connections to thebuffer pool. If the buffer pool is connected to the prescribed ceiling, connect to the serverWill not be a new connection to join the buffer pool(3) the performance characteristics of the Connection Manager.Buffer pool to create a new connection is a high overhead tasks, newconnections will use the resources on the database. Therefore, theConnection Manager the best use of existing connections of the buffer pool to meet the request of the Servlet. Meanwhile, the connecting tubeThe processor must be as much as possible to minimize the buffer pool idle connections, because this is a great waste of systemresources. Connection Manager Serv the let with the implementation of these minimize and maximize task. Connection Manager to maintain each connection verification time stamp, and recently used tags and use the logo. When the a Ser vlet first the connection, connection verification time stamp, and most recent time stamp is set to the current time, theconnection is being used flag is set to true.Connection Manager can be removed from a Serv the let a long-unused connections, this length of time specified by the Connection Manager, the longest cycleparameters.Connection Manager can view recently used mark is beingused to connect. If the time between the most recently used time and time difference is greater than the longest cycle configuration parameters, the connection will be considered to be a residual connection, which indicates Serv the let take its discontinued or no response. Residual connection will be returned to the pool for other Ser vlet, it is being used flag is set to false, authentication and time stamp is set to the current time.If Ser vlet is ready within a longer period of time to use the connection with the database several timesCommunications, you must code to the Serv the let, so that each time you use to connectConfirm that it still occupies this connection.Connection Manager can be removed from the buffer pool idle connections, because theyWould be a waste of resources. In order to determine which connection is idle, Connection Manager will checkInvestigation connected the sign and time stamp, this operation isconnected by periodic access toBuffer pool information. Connection Manager checks have not been any Ser vlet makeWith the connections (these connections is to use the logo is false). If you have recently usedBetween time and the current time difference exceeds amaximum idle time configuration parameters, theThat the connection is idle. Idle connection will be removed from the buffer pool, down toMinimum number of connections configuration parameter specifies thelower limit value.翻译:随着Inter net 的普及应用, 各种Web 信息系统的建立已成为一个迫在眉睫的问题。

information system(信息系统)

information system(信息系统)

Features of ICT
• Flows of information in logistics and supply chains are as fundamental as the flows of goods and materials and people.
• All the flows of physical goods, people and material are triggered by ICT. • The timing and quality of the information affects the quality of decision-making.
Success of Tourism Information System (crucial aspects) • Comfortable and powerful access capabilities. • Comprehensive, detailed, accurate and tropical tourism information.
Case Analysis-KFC
(for customers)
• Established logistics information network platform. • Adoption of Bar Cod and GPS. • Call-center • Door-to-door service
Information System
LISA DU
What is ICT?
• Definition: ICT (Information and
Communication System ) is the use of electronic processing media for the collection, analysis and evaluation of data, and the transfer of information from one point to another.

信息管理与信息系统外文翻译!--ERP外文翻译稿

信息管理与信息系统外文翻译!--ERP外文翻译稿

Discussing about the successful factors of ERP projectsimplementation and the risk management.The primary functions of Enterprise Resource Planning (ERP) are to integrate the inter-departmental operation procedures and Management Information System (MIS) modules, and to reallocate the resources of a company. How to successfully implement an ERP system in an organization is always a hot research topic for researchers as well as a pending problem for an organization that wants to implement it. A case study on the selection of system suppliers and contract negotiation during the ERP implementation of a local construction company in Taiwan, after reviewing the common key success factors discussed in the literature, discussed seven issues: coding system, working process reengineering, priority of ERP functionality implementation, customization, participant roles, consultant role and performance level of subcontractor, which also affected the implementation.Lessons learned from the case study in discussed seven issues are valuable for a construction company in deciding to implement an ERP system. This study suggests that additional case studies are necessary for the successful application of ERP systems in the construction industry. ERP implementation is a 'Triple Play' that combines people, technology, and processes. It embodies a complex implementation process, especially in developing countries like China, often taking several years, huge amount of fund and involving a major business process reengineering exercise. An attempt has been made to identify some Chinese-specific difficulties in the implementation process and provide solutions to implement ERP system successfully through questionnaire survey, interviews, and secondary data. On the basis of analysis of questionnaire results, some common difficulties have been explored by authors, such as support of top management, costly and time-consuming, cultural differences, technical complexity, lack of professional personnel, and inner resistance. The difficulties are largely due to the nature of enterprise's ownership and size. Suggested solutions to overcome these difficulties: ERP software packages selection, ERP implementation team, BPR, Training, and Outsourcing-Application Service Provider. These solutions can effectively solve ERP difficulties.Actually, ERP is widely used in many fields, from public sectors to individual business. Recently, service organizations have invested considerable resources in the implementation of Enterprise Resource Planning (ERP) systems, even using solutions initially targeted for manufacturing companies. To get an insight into how servicesapproach help ERP implementation, a review of ERP projects, especially in services, completed by six case studies has been undertaken. We identify and discuss some characteristics of services, which are discriminatory regarding manufacturing. Main characteristics identified deal with complete or partial integration, product or customer orientation, importance of labor, human factor. In conclusion, trends to standardization and integration seen in the industrial sector are also growing in services, but in different ways.Refers to the overseas some literature material, a successful ERP project, often needs to spend several year times, number thousands of US dollars can complete. Again turns head looks at the home, along with ERP skepticisms gaining ground, price war starting, ERP took one kind of software supplier's product, has actually goes down the god world tendency. ERP leader SAP also promoted Business the One product, the price has been lower than 100,000.Even if the ERP software can achieve free, or like the IBM esteem according to the boundary which must collect fees, implements the angle from the entire enterprise, considers the personnel, training, the maintenance, the service reorganization, the re-development, three, n development, its expense should also in several 1,000,000 and even surely the scale. This speaking of the domestic enterprise, already was not the small number.But, some many enterprises harbor the beautiful dream, steps the ERP implementation the difficult travel. In which also has many projects to be defeated comes to an end. But regarding these final survivors, whether can the halberd be also put in storage, drinks wine to sing loudly? In fact, the enterprise implements the ERP project after the success will face implements a bigger risk. In future five to ten years in, some solid ERP risk management mechanism had decided whether the enterprise can obtain benefits truly in the initial ERP investment.The project is "for completes the disposable endeavor which some unique product or the service station do", the project "the distinctive quality" had decided the project not impossible was by with the before identical way, simultaneously, the project which completed by and the before identical person must create the product or the service, as well as the project possibly involved the scope, the time and the cost all not impossible started when the project completely to determine, therefore, carried on in the process in the project also corresponding to be able to appear the massive uncertainty, namely project risk. Below this article mentioned "the risk" is refers to the project "disadvantageously" the element of certainty. Exists to the projectdisadvantageous risk in any project, often and can give the project the advancement and the project success brings the negative influence. Once the risk occurs, its influence is various, like causes the project product/service the function to be unable to satisfy the customer the need, the project expense surpasses the budget, the project plan dragging or is compelled to cancel and so on, it finally manifests for customer degree of satisfaction depression. Therefore, the recognition risk, the appraisal risk and take the measure to be supposed to be the risk management have the extremely vital significance to the risk to the project management.Ⅰ Risk management concrete contentThe project risk management mainly divides into following several steps: The risk recognition, the qualitative/quota risk analysis, the risk should to plan the establishment and the risk monitoring.1. risk recognitionsThe risk recognition, is refers distinguishes and records possibly has the adverse effect to the project the factor. Because the project is in develops in unceasingly the change process, therefore the risk recognition also passes through in the entire project implementation entire process, but is not merely the project initial stage. The risk recognition is not the disposable work, but need more systems, crosswise thought. Possesses nearly about the project plan and the information all possibly takes the risk recognition the basis, like project progress and cost plan, work decomposition structure, project organizational structure, project scope, similar project historical information and so on. Needs to pay attention, all risks all may carry on the management by no means through the risk recognition. The risk recognition only can discover the known risk (for example: In the known project organization some member ability cannot satisfy the request completely) or the known unknown risk (known-unknown, namely "event name known", like "customer side personnel participates in dynamics being insufficient"); Before but certain risks, as a result of the project distinctive quality, not impossible to occur in it know in advance (unknown-unknown, namely unknown-unknown risk).2. qualitative/quota risk analysisThe latent risk quantity distinguishes which through the risk recognition process are very many, but these latent risks to the project the influence are various. "The risk analysis" namely through the analysis, the comparison, the appraisal and so on each way, to determined various risks the importance, sorts to the risk and appraises it tothe project possible consequence, thus causes the project to implement the personnel to be possible to concentrate the main energy in the few in number main risk, thus enable the project the overall risk to be under the effective control.The risk analysis mainly may use the method includes: Riskprobability/influence appraisal matrix, sensitive analysis, simulation and so on. When carries on the above analysis, mainly pays attention to following several risk factor: Risk probability: Namely the risk event occurs possible percentage expression. This numeral is, like the expert who obtains through the subjective judgment appraises, the interview or the basis before similar project historical information.Risk influence: Namely the risk has possibly the influence size which creates to the project. This kind of influence is possibly in the time, possibly is in the cost, also is possibly other various aspects.Risk value (required value EMV): The risk value = risk probability * risk influence, is to the risk the influence most direct appraisal which creates to the project, its overall evaluation probability with has affected two aspects the factors.3. risks should plan the establishmentThe risk should lie in to the plan goal through the formulation corresponding measure, comes to be supposed to the risk the threat which possibly creates to the project.Most often uses should to threat several measures be: The circumvention, reduces, the shift, accepts.The circumvention, namely eliminates this risk through the elimination risk origin;Reduces, namely through takes the measure to reduce "the risk probability" or "the risk influence", thus achieved reduces the risk value the result;The shift, soon the risk shifts to another side, like purchase insurance, sub package and so on;Accepts, namely does not take the measure to this risk, accepts result which it creates, or occurs after this risk uses the contingency plan to carry on processing again. Selects what method to come specifically to be supposed to some risk, is decided in this risk value (EMV), plans to adopt should to the measure possible cost, the project management personnel treat the risk the manner (utility function) the type and so on various aspects, cannot be generally spoken.The risk should be aims at the risk to the plan which distinguishes to carry on; Regarding the unknown risk, not impossible to choose in advance the formulationcorresponding to be supposed to plan or the contingency plan, therefore, may stockpile using the management should be right.Ⅱ ERP project implementation risk managementThe different type project has the different type risk. The ERP project implementation risk has its particularity similarly. The following gives a briefing to in the ERP project implementation process risk management measure, the single opinion, only supplies the reference.ERP project implementation main risk and should to the measure:As mentioned above, "possesses nearly about the project plan and the information all possibly takes the risk recognition the basis, like project progress and cost plan, work decomposition structure, project organizational structure, project scope, similar project historical information and so on." In the ERP project risk recognition process, may take the project plan as the clue, the recognition project in various aspects risk. In the implementation process, should pay attention to following several aspects specially the risk:1) project scope riskThe project purchase management usually has three contract ways, namely: The solid fixed price or the total price contract, the cost reimburse (add reward) the contract, the unit price contract. The usual uncertainty is bigger, a risk bigger project, more tends to in using depends on after the contract way. This also is overseas and the domestic part ERP supplier uses in the implementation service according to the human day provides serves and charges the fee the reason. But selects this method, the buyer (i.e. customer) has the big risk, therefore, the domestic very many customers favor in work out the implementation contract of service by the fixed price. But this contract way, then (i.e. consultant side) has the big risk regarding the seller. Under this premise, if the project scope definition is not clear, possibly causes the round turns to have the difference to the project scope cognition: The seller hoped reduces the implementation scope as far as possible, by smallest cost closing performance; But the buyer hoped ERP system all function many implementations, obtains as far as possible by the fixed price the greatest income. If the bilateral difference is big, cannot achieve consistently, then can create the efficiency inevitably to be low, wrangles mutually.Therefore, in the ERP project contract, should make as far as possible the clear limits to the project implementation scope, cuts cannot pause in "the implementationfinance module" perhaps "the implementation receivable, the manipulation, the general ledger management" and so on in stratification plane.Rather multi-flowered some time before in project implementation scope limits work, also do not have in the project implementation process, facing ERP many functions, the implementation side and the user side is unyielding, or the forced concessions, invests a bigger energy in the project, but causes the project not to be able to complete on time.2) project progress riskAbout the ERP project implementation cycle, at present has emphasizes "fast" the tendency in the propaganda. But ERP project progress control certainly not easy matter, not only is decided by consultant firm's ability, simultaneously also to a great extent receives the customer side to the ERP expected value whether reasonable, to the scope controls whether effective, to project investment (including personnel time investment and fund and so on investment) whether enough and so on aspect influences.Provides elder brother Shan Shitong by the divine land numerical code who the ERP system and is responsible to implement the metal, in a short time makes something a matter of political line successfully, one of reasons is easy to fly the ERP implementation group integrity mature to induct the mechanism and consultant personnel's remarkable quality, smoothly has assisted the world effectively with the metal political line work. Starts from the political line then to have special consultant to be responsible to induct the implementation entire the plan, the long-term accumulation profession knowledge and the managerial experience have also promoted the entire ERP operation level, has properly dealt with in the political line work issue. The user has the intense approval to the project minute stage implementation, only emphasizes in the first stage to the basic function realization, but the massive work will remain after the political line or improve in continually the process.But in the actual operation, by no means all users all have this kind of understanding and the approval to the ERP implementation, therefore, in project progress plan time, constantly when project progress plan strives for quickly, even is pursues some to have the special significance date sedulously to take the project milestone, will create the very tremendous pressure to the project progress control.In fact, the very many project defeat, is precisely is attributed to the project progress to appear the dragging, but causes the project team despondency, the efficiency to be low. Therefore, the ERP project implementation time management, needs to consider each kind of latency fully, suitable conservative; The duty decomposes the detailed degree of fineness to be moderate, is advantageous for the inspection; In the implementation, should emphasize the project according to the progress execution importance, in considered when any question, all must take the maintenance progress the precondition; At the same time, reasonably and follows up fast using rushing a job and so on the methods, uses the resources fully.3) project human resources riskThe human resources are in the ERP project implementation process the most essential resources. Guaranteed the appropriate person, participates in the project by the enough energy, is the project success implementation basic guarantee.In the ERP project implementation has each kind of role, should have the quality to each kind of role, we no longer give unnecessary detail in this. Must reduce the project the human resources risk, must guarantee enters and undertakes role each kind of project to the project in to do is the human satisfies the project request. Therefore, implements both sides to be supposed to participate in the personnel carrying on the earnest appraisal, this kind of appraisal should be the bilateral surface, not only is the user to consults consultant's appraisal, also should include the consultant firm to the user side member who participates in the project (in under the domestic present environment, mainly is refers to essential user) the appraisal. At the same time, should guarantee the project personnel to the project investment degree. Should participation the ERP project personnel's achievement to appraise and the ERP project implementation condition is connected, is clear about the ERP project is in this stage project correlation personnel most important labor of duty; Formulates the suitable rewards and punishment measure; Establishes "the member project" in the enterprise the thought, layer upon layer "the member", namely all levels of people in charge downward exercises in view of the ERP implementation plenary powers, shoulders the entire responsibility to on, extends the member from the individual concept to the organic synthesis community concept.4) The risk that people don't understand ERP correctlySome enterprises regard as ERP the business management the panacea, thought since ERP "the function is formidable", so long as on ERP, enterprise's all questionshave then been easily solved, or thought enterprise's all flows all may integrate to ERP in; Also some people simple regard as ERP the current service flow the computerization.浅谈ERP项目实施成功因素和风险管理ERP —Enterprise Resource Planning 企业资源计划系统,是指建立在信息技术基础上,以系统化的管理思想,为企业决策层及员工提供决策运行手段的管理平台。

信息系统(InformationSystem,IS)简称IS。

信息系统(InformationSystem,IS)简称IS。

信息系统(InformationSystem,IS)简称IS。

信息系统(Information System,IS)简称IS。

信息系统是与信息加工,信息传递,信息存贮以及信息利用等有关的系统。

信息系统可以不涉及计算机等现代技术,甚至可以是纯人工的。

但是,现代通信与计算机技术的发展,使信息系统的处理能力得到很大的提高。

在现在各种信息系统中已经离不开现代通信与计算机技术,所以所说的现代信息系统一般均指人、机共存的系统。

信息系统是一个非常宽泛的概念,信息的载体是数据,数据的具体形式各种各样,如数字,文字,图像,声音等等都是数据的形式,文件是数据的集合单位,数据库是更加复杂的数据文件,文件以某种格式存放在物理介质中。

从哲学的角度来看,信息是世界一切事物状态,属性和变化的反映。

世界万物联系与发展的过程在人脑中的反映就是信息获取,信息处理和信息传递的过程,它们的关系就是客观与主观的对立统一,当主观思维与客观事实一致时对应的信息便是真理。

信息系统的理论基础是系统论,信息论和控制论。

系统论研究的是系统内部各部分之间有机结合形成的整体,体现的是各部分之间的相互作用相互影响的存在。

信息论研究的是信息的采集,存储,加工,输出,传递等过程中的规律。

控制论与系统论和信息论紧密联系,三者是三位一体的关系,既相互联系,不可分割,又有所区别,无论是人的大脑还是计算机的CPU,处理的都是数据/信息,人类的语言是人类思维的载体,而语言的形式无非就是文字,数字等符号,而在人类的形象思维中,图形又是表象的载体,因此,人的思维(无论是逻辑思维还是形象思维)是数据/信息的采集,存储,加工,输出的过程,人的思维系统可以看作是一套信息系统,眼睛可以采集文字(如看书),图像(看图),耳朵采集声音,经过大脑编辑,处理,输出结果,如计划,观念,判断,没有信息,就无法输出结果,也就没有任何决策,行为活动也便变得混乱(大概只能靠潜意识了)。

企业管理同样也是一个有机的系统,各部门,各员工之间组成一个有机的整体,也存在一个信息系统。

Information Technology, the Internet and you

Information Technology, the Internet and you

INFORMATION TECHNOLOGY, THE INTERNET, AND YOU(信息技术、互联网和你)INFORMATION SYSTEMS(信息系统)The way to think about a microcomputer is to re-alize that it is one part of an information sys-tem. There are five parts of an information system:译文:把微型计算机作为信息系统其中的一部分来考虑。

信息系统有五个部分:1.People are an essential part of the system. The purpose of information systems is to makepeople, or end users like you, more productive.译文:人是系统中必不可少的一部分。

信息系统的目的是使人或者最终用户喜欢,更有生产性。

2.Procedures are rules or guidelines to follow when using software, hardware, and data. Theyare typically documented in manuals written by computer professionals.译文:步骤是当使用软件、硬件和数据时可以遵循的规则或者指导方针。

通常情况下由计算机专业人士写的文档手册。

3.Software(programs) provides step-by-step instructions to control the computer to con-vertdata into information.译文:软件(程序)提供一步一步的指示来控制计算机将数据转换成信息。

4.Hardware consists of the physical equipment. It is controlled by software and processes datato create information.译文:硬件包括物理设备。

信息系统中英文对照外文翻译文献

信息系统中英文对照外文翻译文献

中英文对照翻译附录1 外文翻译(原文)Systems Analysis and DesignWorking under control of a stored program, a computer processes data into information. Think about that definition for a minute. Any given computer application involves at least three components: hardware, software, and data. Merely writing a program isn't enough; because the program is but one component in a system.A system is a group of components that work together to accomplish an objective. For example, consider a payroll system. Its objective is paying employees. What components are involved? Each day,employees record their hours worked on time cards. At the end of each week, the time cards are collected and delivered to the computer center, where they are read into a payroll program. As it runs, the program accesses data files. Finally, the paychecks are printed and distributed. For the system to work, people, procedures, input and output media, files, hardware, and software must be carefully coordinated. Note that the program is but one component in a system.Computer-based systems are developed because people need information. Those people, called users, generally know what is required, but may lack the expertise to obtain it. Technical professionals, such as programmers, have the expertise, but may lack training in the user's field. To complicate matters, users and programmers often seem to speak different languages, leading to communication problems. A systems analyst is a professional who translates user needs into technical terms, thus serving as a bridge between users and technical professionals.Like an engineer or an architect, a systems analyst solves problems by combining solid technical skills with insight, imagination, and a touch of art. Generally, the analyst follows a well-defined, methodical process that includes at least the following steps;1.Problem definition2.Analysis3.Design4.Implementation5.MaintenanceAt the end of each step, results are documented and shared with both the user and the programmers. The idea is to catch and correct errors and misunderstandings as early as possible. Perhaps the best way to illustrate the process is through example.Picture a small clothing store that purchases merchandise at wholesale, displays this stock, and sells it to customers at retail. On the one hand, too much stock represents an unnecessary expense. On the other hand, a poor selection discourages shoppers. Ideally, a balance can be achieved: enough, but not too much.Complicating matters is the fact that inventory is constantly changing, with customer purchases depleting stock, and returns and reorders adding to it. [1] The owner would like to track inventory levels and reorder and given item just before the store runs out. For a single item, the task is easy-just count the stock-on-hand. Unfortunately, the store has hundreds of different items, and keeping track of each one is impractical. Perhaps a computer might help.2-1 Problem DefinitionThe first step in the systems analysis and design process is problem definition. The analyst's objective is determining what the user (in this case, the store's owner) needs. Note that, as the process begins, the user possesses the critical information, and the analyst must listen and learn. Few users are technical experts. Most see the computer as a "magic box, "and are not concerned with how it works. At this stage, the analyst has no business even thinking about programs, files, and computer hardware, but must communicate with the user on his or her own term.The idea is to ensure that both the user and the analyst are thinking about the same thing-Thus, a clear, written statement expressing the analyst's understanding of the problem is essential. The user should review and correct this written statement. The time to catch misunderstandings and oversights is now, before time, money and effort are wasted.Often, following a preliminary problem definition, the analyst performs a feasibility study. The study a brief capsule version of the entire systems analysis and design process, attempts to answer three questions:1.Can the problem be solved?2.Can it be salved in the user's environment?3.Can it be solved at a reasonable cost?If the answer to any one of these questions is no, the system should not be developed. Given a good problem definition and a positive feasibility study, the analyst can turn to planning and developing a problem solution.2- 2 AnalysisAs analysis begins, the analyst understands the problem. The next step is determining what must be done to solve it. The user knows what must be done 1 during analysis; this knowledge is extracted and formally documented. Most users think in terms of the functions to be performed and the data elements to be manipulated. The objective is to identify and link these key functions and data elements, yielding a logical system design.Start with the system's basic functions. The key is keeping track of the stock-on-hand for each product in inventory. Inventory changes because customers purchase, exchange, and return products, so the system will have to process customer transactions. The store's owner wants to selectively look at the inventory level for any product in short supply and, if appropriate, order replacement stock, so the system must be able to communicate with management. Finally, following management authorization, the system should generate a reorder ready to send to a supplier.Fig 1Given the system's basic functions, the analyst's next task is gaining a sense of their logical relationship. A good way to start is by describing how data flow between the functions. As the name implies, data flow diagrams are particularly useful for graphically describing these data flows. Four symbols are used (Fig. 1). Data sources and destinations are represented by squares; input data enter the system from a source, and output data flow to a destination. Once in the system, the data are manipulated orchange by processes, represented by round-corner rectangles. A process might be a program, a procedure, or anything else that changes or moves data. Data can be held for later processing in data stores, symbolized by open-ended rectangles. A data store might be a disk file, a tape file, a database, written notes, or even a person's memory. Finally, data flow between sources, destinations, processes, end data stores over data flows, which are represented by arrows.Fig 2Figure 2 shows a preliminary data flow diagram for the inventory system. Start with CUSTOMER. Transactions flow from a customer f into the system, where they are handled by Process transaction. A data store, STOCK, holds data on each item in inventory. Process transaction changes the data to reflect the new transaction. Meanwhile, MANAGEMENT accesses the system through Communicate, evaluating the data in STOCK and, if necessary, requesting a reorder. Once, a reorder is authorized. Generate reorder sends necessary data to the SUPPLIER, who ships the items to the store. Note that, because the reorder represents a change in the inventory level of a particular product or products it is handled as a transaction.The data flow diagram describes the logical system. The next step is tracing the data flows. Start with the destination SUPPLIER. Reorders flow to suppliers; for example, the store might want 25 pairs of jeans. To fill the order, the supplier needs the product description and the reorder quantity. Where do these data elements come from? Since they are output by Generate reorder, they must either be Input to or generated by this process. Data flow into Generate reorder for STOCK; thus, product descriptions and reorder quantities must be stored in STOCK.Other data elements, such as the item purchased and the purchase quantity are generated by CUSTOMER. Still others, for example selling price and reorder point, are generated by or needed by MANAGEMENT. The current stock-on-hand for agiven item is an example of a data element generated by an algorithm in one of the procedures. Step by step, methodically, the analyst identifies the data elements to be input to .stored by, manipulated by, generated by, or output by the system.To keep track of the data elements, the analyst might list each one in a data dictionary. A simple data dictionary can be set up on index cards, but computerized data dictionaries have become increasingly popular. The data dictionary, a collection of data describing and defining the data, is useful throughout the systems analysis and design process, and is often used to build a database during the implementation stage.The idea of analysis is to define the system's major functions and data elements methodically. Remember that the objective is translating user needs into technical terms. Since the system starts with the user, the first step is defining the user's needs. Users think in terms of functions and data. They do not visualize programs, or files, or hardware .and during this initial, crucial analysis stage it is essential that the analyst think like a user, not like a programmer.Data flow diagrams and data dictionaries are useful tools. They provide a format for recording key information about the proposed system. Also, they jog the analyst's memory) for example, if the analyst doesn't have sufficient information to complete a data dictionary entry, he or she has probably missed something. Perhaps most importantly, the data flow diagram and the data dictionary document the analyst's understanding of the system requirements. By reviewing these documents, the user can correct misunderstandings or oversights. Finally, they represent an excellent starting point the next step, design.2-3 DesignAs we enter the design stage, we know what the system must do, and thus can begin thinking about how to do it. The objective is to develop a strategy for solving the problem. At this stage, we are not interested in writing code or in defining precise data structures; instead, we want to identify, at a black box level, necessary programs, files, procedures, and other components.The data flow diagram defines the system's necessary functions; how might they be implemented? One possibility is writing one program for each process. Another is combining two or more processes in a single program; there are dozens of alternative solutions. Let's focus on one option and document it.A system flowchart uses symbols to represent programs, procedures, hardware devices, and the other components of a physical system (Fig. 3). Our flowchart (.Fig.4) shows that transaction data enter the system through a terminal, are processed by a data collection program, and then are stored on an inventory file. Eventually, the inventory file is processed by a Report and reorder program. Through it, management manipulates the data and authorizes reorders.Fig. 4 on a system flowchart, symbols represent programs, procedures, hardware devices, and the other components of a physical system.Fig 3Look at the system flowchart. It identifies several hardware components, including a computer, a disk drive, a data entry terminal, a printer, and a display terminal. Two programs are needed; Process transaction and Report and reorder. In add ition to the hardware and the programs, we’ll need data structures for the inventory file and for data flaws between the I/O devices and the software. Note that this system flowchart illustrates one possible solution; a good analyst will develop several feasible alternatives before choosing one.Fig 4The flowchart maps the system, highlighting its major physical components. Since the data link the components, the next task is defining the data structures. Consider, for example, the inventory file. It contains all the data elements from the data store STOCK. The data elements are listed in the data dictionary. Using them, the file's data structure can be planned,How should the file be organized? That depends on how it will be accessed. For example, in some applications, data are processed at regular, predictable intervals. Typically, the data are collected over time and processed together, as a batch. If batch processing is acceptable, a sequential file organization is probably best.It is not always possible to wait until a batch of transactions is collected, however. For example, consider an air defense early warning system. If an unidentified aircraft is spotted it must be identified immediately the idea of waiting until 5 _ 00 p.m. because "that's when the air defense program is run" is absurd. Instead, because of the need for quick response, each transaction must be processed as it occurs. Generally such transaction processing systems call for direct access file.Our inventory system has two programs. One processes transactions. A direct access inventory file seems a reasonable choice. The other allows management to study inventory data occasionally; batch processing would certainly do. Should the inventory file be organized sequentially or directly? Faced with such a choice a good analyst considers both options. One possible system might accept transactions and process them as they occur. As an alternative, sales slips might be collected throughout the day and processed as a batch after the store closes. In the first system, the two programs would deal with direct access files; in the second system, they would be linked to sequential files. A program to process direct access data is different from a program to process sequential data. The data drive the system. The choice of a data structure determines the program’s structure. Note that the program is defined and planned in the context of the system.2- 4 ImplementationOnce the system's major components have been identified .we can begin to develop them. Our system includes two programs, several pieces of equipment, and a number of data structures. During implementation, each program is planned and written using the techniques described in Chapter 7. Files are created, and theircontents checked. New hardware is purchased, installed, and tested. Additionally, operating procedures are written and evaluated. Once all the component parts are ready, the system is tested. Assuming the user is satisfied, the finished system is released.2- 5 MaintenanceMaintenance begins after the system is released. As people use it, they will suggest minor improvements and enhancements. Occasionally, bugs slip through debug and testing, and removing them is another maintenance task. Finally, conditions change, and a program must be updated; for example, if the government passes a low changing the procedure for collecting income taxes, the payroll program must be modified. Maintenance continues for the life of a system, and its cost can easily match or exceed the original development cost. Good planning, solid documentation, and well-structured programs can help to minimize maintenance cost.附录2 外文翻译(译文)系统的分析与设计在存储程序的控制下,计算机把数据处理成信息。

信息系统和数据库开发中英文对照外文翻译文献

信息系统和数据库开发中英文对照外文翻译文献

中英文对照外文翻译文献(文档含英文原文和中文翻译)Information System Development and DatabaseDevelopmentIn many organizations, database development from the beginning of enterprise data modeling, data modeling enterprises determine the scope of the database and the general content. This step usually occurs in an organization's information system planning process, it aims to help organizations create an overall data description or explanation, and not the design of a specific database. A specific database for one or more information systems provide data and the corporate data model (which may involve a number of databases) described by the organization maintaining the scope of the data. Data modeling in the enterprise, you review of the current system, the need to support analysis of the nature of the business areas, the need for further description of the abstract data, and planning one or more database developmentproject. Figure 1 shows Pine Valley furniture company's enterprise data model of a part.1.1 Information System ArchitectureSenior data model is only general information system architecture (ISA) or a part of an organization's information system blueprint. In the information system planning, you can build an enterprise data model as a whole information system architecture part. According to Zachman (1987), Sowa and Zachman (1992) views of an information system architecture consists of the following six key components:DataManipulation of data processing (of a data flow diagram can be used, with the object model methods, or other symbols that).Networks, which organizations and in organizations with its main transmission of data between business partners (it can connect through the network topology map and to demonstrate).People who deal with the implementation of data and information and is the source and receiver (in the process model for the data shows that the sender and the receiver).Implementation of the events and time points (they can use state transition diagram and other means.)The reasons for the incident and data processing rules (often in the form of text display, but there are also a number of charts for the planning tools such as decision tables).1.2 Information EngineeringInformation systems planners in accordance with the specific information system planning methods developed information system architecture. Information engineering is a popular and formal methods. Information engineering is a data-oriented creation and maintenance of the information system. Information engineering is because the data-oriented, so when you begin to understand how the database is defined by the logo and when information engineering a concise explanation is very helpful. Information Engineering follow top-down planning approach, in which specific information systems from a wide range of informationneeds in the understanding derived from (for example, we need about customers, products, suppliers, sales and processing of the data center), rather than merging many detailed information requested ( orders such as a screen or in accordance with the importation of geographical sales summary report). Top-down planning will enable developers to plan more comprehensive information system, consider system components provide an integrated approach to enhance the information system and the relationship between the business objectives of the understanding, deepen their understanding of information systems throughout the organization in understanding the impact.Information Engineering includes four steps: planning, analysis, design and implementation. The planning stage of project information generated information system architecture, including enterprise data model.1.3 Information System PlanningInformation systems planning objective is to enable IT organizations and the business strategy closely integrated, such integration for the information systems and technology to make the most of the investment interest is very important. As the table as a description, information engineering approach the planning stage include three steps, we in the follow-up of three sections they discussed.1. Critical factors determining the planningPlanning is the key factor that organizational objectives, critical success factors and problem areas. These factors determine the purpose of the establishment of planning and environment planning and information systems linked to strategic business planning. Table 2 shows the Pine Valley furniture company's key planning a number of possible factors, these factors contribute to the information systems manager for the new information systems and databases clubs top priority to deal with the demand. For example, given the imprecise sales forecasts this problem areas, information systems managers in the organization may be stored in the database additional historical sales data, new market research data and new product test data.2. The planning organizations set targetsOrganizations planning targets defined scope of business, and business scope will limit the subsequent analysis and information systems may change places. Five key planning targets as follows:● organizational units in the various sectors.● organizations location of the place of business operations.● functions of the business support organizations handling mission of the relevant group. Unlike business organizations function modules, in fact a function can be assigned to various organizations modules (for example, product development function is the production and sale of the common responsibility of the Ministry).● types of entities managed by the organization on the people, places and things of the major types of data.● Information System data set processing software applications and support procedures.3. To set up a business modelA comprehensive business model including the functions of each enterprise functional decomposition model, the enterprise data model and the various planning matrix. Functional decomposition is the function of the organization for a more detailed decomposition process, the functional decomposition is to simplify the analysis of the issue, distracted and identify components and the use of the classical approach. Pine Valley furniture company in order to function in the functional decomposition example in figure 2 below. In dealing with business functions and support functions of the full set, multiple databases, is essential to a specific database therefore likely only to support functions (as shown in Figure 2) provide a subset of support. In order to reduce data redundancy and to make data more meaningful, has a complete, high-level business view is very helpful.The use of specific enterprise data model to describe the symbol. Apart from the graphical description of this type of entity, a complete enterprise data model should also include a description of each entity type description of business operations and a summary of that business rules. Business rules determine the validity of the data.An enterprise data model includes not only the types of entities, including the link between the data entities, as well as various other objects planning links. Showed that the linkage between planning targets a common form of matrix. Because of planning matrix need not be explicit modeling database can be clearly described business needs, planning matrix is an important function. Regular planning matrix derived from theoperational rules, it will help social development activities that top priority will be sorting and development activities under the top-down view through an enterprise-wide approach for the development of these activities. There are many types of planning matrix is available, their commonalities are:● locations - features show business function in which the implementation of operational locations.● unit - functions which showed that business function or business unit responsible for implementation.● Information System - data entities to explain how each information system interact with each data entity (for example, whether or not each system in each entity have the data to create, retrieve, update and delete).● support functions - data in each functional entities in the data set for the acquisition, use, update and delete.● Information System - target indication for each information system to support business objectives.Data entities matrix. Such a matrix can be used for a variety of purposes, including the following three objectives:1) identify gaps in the data entities to indicate the types of entities not use any function or functions which do not use any entity.2) found that the loss of each functional entities involved in the inspection staff through the matrix to identify any possible loss of the entity.3) The distinction between development activities if the priority to the top of a system development function for a high-priority (probably because it important organizational objectives related), then this area used by entities in the development of the database has a high priority. Hoffer, George and Valacich (2002) are the works of the matrix on how to use the planning and completion of the Information Engineering.The planning system more complete description.2 database development processBased on information engineering information systems planning database is a source of development projects. These new database development projects is usuallyin order to meet the strategic needs of organizations, such as improving customer support, improve product and inventory management, or a more accurate sales forecast. However, many more database development project is the bottom-up approach emerging, such as information system user needs specific information to complete their work, thus beginning a project request, and as other information systems experts found that organizations need to improve data management and begin new projects. Bottom-up even in the circumstances, to set up an enterprise data model is also necessary to understand the existing database can provide the necessary data, otherwise, the new database, data entities and attributes can be added to the current data resources to the organization. Both the strategic needs or operational information needs of each database development projects normally concentrated in a database. Some projects only concentrated in the database definition, design and implementation of a database, as a follow-up to the basis of the development of information systems. However, in most cases, the database and associated information processing function as a complete information systems development project was part of the development.2.1 System Development Life CycleGuide management information system development projects is the traditional process of system development life cycle (SDLC). System development life cycle is an organization of the database designers and programmers information system composed of the Panel of Experts detailed description, development, maintenance and replacement of the entire information system steps. This process is because Waterfall than for every step into the adjacent the next step, that is, the information system is a specification developed by a piece of land, every piece of the output is under an input. However shown in the figure, these steps are not purely linear, each of the steps overlap in time (and thus can manage parallel steps), but when the need to reconsider previous decisions, but also to roll back some steps ahead. (And therefore water can be put back in the waterfall!)Figure 4 on the system development life cycle and the purpose of each stage of the product can be delivered concise notes. The system development life cycle including each stage and database development-related activities, therefore, the question of database management systems throughout the entire development process. In Figure 5 we repeat of the system development life cycle stage of the seven, and outlines thecommon database at each stage of development activities. Please note that the systems development life cycle stages and database development steps一一对应exists between the relationship between the concept of modeling data in both systems development life cycle stages between.Enterprise ModelingDatabase development process from the enterprise modeling (system development life cycle stage of the project feasibility studies, and to choose a part), Organizations set the scope and general database content. Enterprise modeling in information systems planning and other activities, these activities determine which part of information systems need to change and strengthen the entire organization and outlines the scope of data. In this step, check the current database and information systems, development of the project as the main areas of the nature of the business, with a very general description of each term in the development of information systems when needed data. Each item only when it achieved the expected goals of organizations can be when the next step.Conceptual Data ModelingOne has already begun on the Information System project, the concept of data modeling phase of the information systems needs of all the data. It is divided into two stages. First, it began the project in the planning stage and the establishment of a plan similar to Figure 1. At the same time outlining the establishment of other documents to the existing database without considering the circumstances specific development projects in the scope of the required data. This category only includes high-level data (entities), and main contact. Then in the system development life-cycle analysis stage must have a management information system set the entire organization Details of the data model definition of all data attributes, listing all data types that all data inter-entity business linkages, defining description of the full data integrity rules. In the analysis phase, but also the concept of inspection data model (also called the concept behind the model) and the goal of information systems used to explain other aspects of the model of consistency categories, such as processing steps, rules and data processing time of timing. However, even if the concept is such detailed data model is only preliminary, because follow-up information system life cycle activities in the design of services, statements, display and inquiries may find that missing element or mistakes. Therefore, the concept of data often said that modeling is atop-down manner, its areas of operation from the general understanding of the driver, rather than the specific information processing activities by the driver.3. Logical Database DesignLogical database design from two perspectives database development. First, the concept of data model transform into relational database theory based on the criteria that means - between. Then, as the design of information systems, every computer procedures (including procedures for the input and output format), database support services, statements, and inquiries revealed that a detailed examination. In this so-called Bottom-up analysis, accurate verification of the need to maintain the database and the data in each affairs, statements and so on the needs of those in the nature of the data.For each separate statements, services, and so on the analysis must take into account a specific, limited but complete database view. When statements, services, and other analysis might be necessary to change the concept of data model. Especially in large-scale projects, the different analytical systems development staff and the team can work independently in different procedures or in a centralized, the details of their work until all the logic design stage may be displayed. In these circumstances, logic database design stage must be the original concept of data model and user view these independent or merged into a comprehensive design. In logic design information systems also identify additional information processing needs of these new demands at this time must be integrated into the logic of earlier identified in the database design.Logical database design is based on the final step for the formation of good data specifications and determine the rules, the combination, the data after consultation specifications or converted into basic atomic element. Most of today's database, these rules from the relational database theory and the process known as standardization. This step is the result of management of these data have not cited any database management system for a complete description of the database map. Logical database design completed, we began to identify in detail the logic of the computer program and maintenance, the report contents of the database for inquiries.4. Physical database design and definitionPhysical database design and definition phase decisions computer memory (usuallydisk) database in the organization, definition of According to the library management system for physical structure, the procedures outlined processing services, produce the desired management information and decision support statements. The objective of this stage is to design an effective and safe management of all data-processing database, the physical database design to closely integrate the information systems of other physical aspects of the design, including procedures, computer hardware, operating systems and data communications networks.5. Database ImplementationThe database prepared by the realization stage, testing and installation procedures for handling databases. Designers can use the standard programming language (such as COBOL, C or Visual Basic), the dedicated database processing languages (such as SQL), or the process of the non-exclusive language programming in order to produce a statement of the fixed format, the result will be displayed, and may also include charts. In achieving stage, but also the completion of all the database files, training users for information systems (database) user setup program. The final step is to use existing sources of information (documents legacy applications and databases and now needs new data) loading data. Loading data is often the first step in data from existing files and databases to an intermediate format (such as binary or text files) and then to turn intermediate loading data to a new database. Finally, running databases and related applications for the actual user maintenance and retrieval of data. In operation, the regular backup database and the database when damaged or affected resume database.6. Database maintenanceDuring the database in the progressive development of database maintenance. In this step, in order to meet changing business conditions, in order to correct the erroneous database design, database applications or processing speed increase, delete or change the structure of the database. When a procedure or failure of the computer database affect or damage the database may also be reconstruction. This step usually is the longest in the database development process step, as it continued to databases and related applications throughout the life cycle, the development of each database can be seen as a brief database development process and data modeling concepts arise, logical and physical database design and database to achieve dealing with the changes.2.2 Information System developed by other meansSystem Development Life Cycle minor changes in law or its variant of the often used to guide information systems and database development. Information System is a life-cycle methodology, it is highly structured approach, which includes many checks and balances to ensure that every step of produce accurate results, and new or alternative information system and it must communications or data definitions consistent existing system needs consistency. System development life cycle because of the regular need to have a working system for a long time been criticized because only work in the system until the end of the whole process generated. More and more organizations now use rapid application development method, it is a includes analysis, design and implementation of steps to repeat the rapid iterative process until convergence to users the system so far. Rapid Application Development Act required the database has been in existence, and enhance system is mainly to the application of data retrieval application, but not to those who generate and modify database applications.The most widely used method of rapid application development is one of the prototype. The prototype system is a method of iterative development process, analysts and users through close co-operation, continuing to revise the system will eventually convert all the needs of a working system. Figure 6 shows prototype of the process. In this diagram we contains notes, briefly describes each stage of the prototype of the database development activities. Normally, when information systems problems were identified, tried only a rough concept of data modeling. In the development of the initial prototype, the design of the user wants to display and statements, and that any new database needs and define a term prototype database. This is usually a new database, copy the part of the existing system, but might also added some new content. When the need for new content, these elements are usually from external data sources, such as market research data, the general economic indicators or industry standards.When a prototype of a new version to repeat the achievement and maintenance of database activities. Usually only a minimum level of security and integrity control, because at this time the focus is as soon as possible to produce a prototype version can be used. But document management project also deferred to the final, only be used in the delivery of user training. Finally, once constructed an acceptable prototype,developers, and users will be the final decision of whether to prototype delivery and the use of the database. If the system (including database) efficiency is very low, then the system and database will be re-programming and re-organization in order to achieve the desired performance.Along with visual programming tools (such as Visual Basic, Java, Visual C + + and fourth generation language) increasingly popular use of visual programming tools can easily change the user interface with the system, the prototype is becoming the choice of system development methodology. Customers using the prototype method statements and show changes to the content and layout is quite easy. In the process, the new database needs were identified, so it is the development of the use of the existing database should be amended. There is even the possibility of a need for a new database system prototype method, in such circumstances, when the system demand in the iterative process of development in the ever-changing needs access to sample data, the construction or reconstruction of the database prototype.3 database development of the three-tier architecture modelIn this article on the front of the database development process mentioned in the interpretation of a system development project on the establishment of the several different, but related database view or model:● conceptual model (in the analysis stage of the establishment).● external model or user view (in the analysis phase and the establishment of logical design phase).● physical model or internal model (in the physical design phase of the establishment).Figure 7 describes the database view that the relationship between the three, it is important to remember that they are the same organizations database view or model. In other words, each organization has a database of the physical model, a concept model and one or more users view.Therefore, the three-tier architecture model using the same data set observe the different ways definition database.Concept models on the full database structure, has nothing to do with the technical specifications. Conceptual model definition do not involve the entire database datastored in the computer how the secondary memory. Usually, the conceptual model by entities - links (E-R) map or object modeling symbols such a graphical format to describe, we have this type of concept model called the data model. In addition, the conceptual model specification as a metadata stored in the database or data dictionary.Physical models including conceptual model of how data stored in computer memory in the two specifications. Analysts and the database design is as important to the physical database (physical mode) definition, it provides information on the distribution and management of data storage and access of the physical memory space of two full database technology specifications.Database development and database technology database is among the three models divided into basis. Database development projects may have a role to only deal with these three views of a related work. For example, a beginner may be designed for one or more procedures external model, and an experienced developer will design the physical model or conceptual model. Database design issues at different levels are quite different.4 three-tier structure of the database positioning systemObviously, all the good things in the database are, and the "three"!When designing a database, you have to choose where to store data. This option in the physical database design stage. Database is divided into individual databases, the Working Group database, departmental databases, corporate databases and the Internet database. Individuals often by the end-user database design and development of their own, just by database experts to give training and advice to help, it only contains individual end-users interested in the data. Sometimes, personal database from the database or enterprise Working Group extracted from the database, such circumstances database prepared by some experts from the regular routine to create local database. Sector Working Group database and the database is often the end-user, business experts and the central database system experts development. The collaborative work of these officers is necessary because in the design of the database to be shared by a large number of issues weigh: processing speed, ease of use, data definition differences and other similar problems. Due to corporate databases and the Internet database broad impact, large-scale, it is normally concentrated in the database development team has received professional training to develop a database of experts.1. Customers layerA desktop or notebook also known as that layer, which specialized management user interface and system localization data in this layer can be implemented on the Web scripting tasks.2. Server / Web serverHTTP protocol handling, scripting tasks, the implementation of computing and provide data access, the layer known as processing services layer.3. Enterprise Server (Minicomputer or mainframe) layerThe implementation of complex computing and inter-organizational management from multiple data sources of data integration, also known as data services layer.In an organization, hierarchical database and information system architecture for distributed computing and the client / server architecture of the concept of correlation. Client / server architecture based on a LAN environment, including servers (referred to as database server or database engine) database software implementation from the client workstation database orders, each customer applications focus on their user interface functions. In fact, the whole concept of the database (as well as the application of these databases to handle routine) as a distributed database or the separate but related physical database distribution in the local PC workstation, server intermediate (working group or sector) and one center server (departments or enterprises ). Simply said that the use of client / server architecture for:● it can handle multiple processors on the same application at the same time, improve application response time and data processing speed.● It can use each computer platform of the best data processing (such as PC Minicom Advanced user interface with the mainframe and computing speed).● can mix various client technology (Intel or Motorola processor assembly of personal computers, computer networks, information kiosks, etc.) and public data sharing. In addition, you can change the technology at any layer and other layers only a small influence on the system module.● able to handle close to the data source to be addressed to improve response time and reduce network traffic.。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

在社会环境中设计信息系统
------设计目标和情景模拟方法
林柳计算机科学系,多伦多大学,40圣乔治街,多伦多,安大略省,加拿大M5S 2E4
肇烈资讯学系,多伦多大学,140圣乔治街,多伦多,安大略省。

加拿大M5S 3G6
于2002年8月31日完成初稿,在2003年1月14日进行修订;于2003年2月23日完成最总稿
摘要
为了设计出更好的信息系统,设计人员可以根据自己的特定的社会和技术的情况确定如何设计一个专门的信息系统。

我们提出了一个在目标为导向的需求语言(GRL)和情景化表示法代表的用例设计知识地图(UCM)之间联合使用信息系统的方法。

以目标为导向的模型是用于整个要求和设计过程。

在目标为导向的需求语言中,目标是用来描述系统的业务目标和要求,既实用又非功能。

任务是用来代表不同的方式的实现目标。

一定方式的推理是用来探索替代解决方案和系统构建成可执行的操作方式。

社会背景作为代理人之间的依赖关系和角色.在UCM中表达情景的术语用来描述业务流程或工作流程的阐述。

目标为导向的需求语言(GRL)和情景化表示法代表的用例设计知识地图的发展目标的建模与货\u200b\u200b物审查清单和场景建模与UCM 互补的使用说明与设计是基于Web的培训体系.
2003埃尔塞维尔有限公司为例。

保留所有权利。

关键词:信息系统设计;目标为导向的需求分析,基于场景的符号
1、简介
信息系统是一个服务于社会,对许多利益相关者有不同的利益。

因此,不可避免地,一个信息系统的设计是一种社会活动,这需要了解社会和组织。

环境和技术的限制决定系统将要设计的背景。

随着越来越多的软件和信息系统采用互联网技术和更加开放的协议和互操作性,对信息系统出现许多新的要求。

不像封闭
的计算环境那样,采用传统的信息系统开发方法。

设计开放的,动态的和面向互联网的的信息系统性质对现代信息系统提出了许多新的挑战性和复杂性。

新的信息系统,特别是互联网应用和基于Web的系统,它的设计越来越基于可重用的组件和现有的灵活组合模式,这就很难处理无效的模型和决策支持工具。

在需求工程,以目标为导向的建模方法已被公认为是有益的。

一般来说,目标应通过设计者对软件的分析和现实环境的结合来实现。

它提出对数据和功能的分析,看是否为实现高层次的目标提供了能够解决需求工程中出现的所有自然过程。

需求模型中提供了明确的目标和一个完整性的要求,即标准的要求。

如果他们能够确定目标的绝对真确性,那么完全可以作为一个系统的评判标准。

方案为导向的模式在目前是系统可以用来完成一些所需的功能或隐含的目的最可能的方式。

通常情况下,预期的软件之间及其环境(其他系统和人类)组成的时间序列是一个互动的活动。

一个方案可能是各种形式表达,包括叙事文本,结构化文本,图像,动画或模拟,图表,地图等。

一个方案的内容可以在一个系统中描述环境之间的相互作用或事件.这种方案已被用来作为手段,征求或验证系统要求的各种用途,作为使用导向来使系统描述具体化,或作为测试用例基地。

方案背景也同样成为了热门的领域,特别是人机交互和战略规划。

虽然目标建模和场景建模都提供重要的功能,但是自身也不能足够的充分支持要求和设计流程。

目标有时是抽象和内隐的,可以通过具体和明确的方案进行补充。

通常情况下目标是片面的,不完整的。

覆盖面不足之处,通过目标建模和手段,目的推理可以发现。

方案提供的设计方案可能是快照或部分片段。

他们的具体化促进利益相关者和系统的执行者之间的沟通。

在另一方面,目标建模支持替代品和设计权衡明确鉴定这两个过程。

因此,通过拟议相结合的办法对目标进行互补,促进方案在早期的要求中作出决定,并在所有阶段作出公正的详细设计。

同时,它使所有的决策过程具有可追溯性。

以目标为导向的需求语言旨在支持目标和面向对象建模和推理,并提供指导设计过程。

本文,我们提出的基于场景的符号UCM的使用案例图是结合目标为导向的需求分析使用。

UCM允许所设计的系统在行为方面可以有不同程度的抽象和细节层次可视化。

这两个方面是互为补充的技术解决方案,通过描述、评价和阐述,根据其贡献的不同利益相关者的目标,指导可行的解决办法的设计。

虽然
其他方法可以表达上述情况,例如,使用UML中的案件和活动图,消息序列图表等,因为有以下的考虑,所以我们选择目标为导向的需求分析。

UCM有跨越要求和高层次的设计阶段,这与目标为导向的需求语言的作用范围相匹配。

UCM 的支持不同层次的抽象(存根和插件机制)系统架构,补充了多层次的目标为导向的需求语言。

信息系统的设计是一个知识化过程。

它涉及特定领域的设计知识,并涉及当前设计的具体情况的知识。

GRL和UCM的共同提供一个表达这种知识的模式。

例如,考虑一个基于网络的培训(WBT)系统设计。

通用软件在可能的合作机制上,设计了一个基于网络的系统,目的在于通过结构连接的可能机制(电子邮件,新闻组,聊天,屏幕共享和音频/视频会议)来确定目标协作机制。

目标为导向的需求语言的概念介绍。

在第3节中,我们总结我们的使用方法,逐步完成一目标为导向的需求和设计模型。

在第4节,以电子培训领域为例来说明该方法。

在第5节,对GRL和UCM进行介绍。

在第6节,对相关工作进行了讨论。

在第7节,进行结论和未来工作的介绍。

2、GRL建模表示法
GRL是一种支持有关要求目标和代理的建模和推理语言,重点是关于处理与非功能要求。

它提供了表达的概念,这支持高层次的设计过程中有用的各类结构。

GRL的内容和链接是有意,他们被用在模型中回答意图,动机和理由等问题,例如:
为什么系统要求包含特定的行为,信息和结构?
什么是需要考虑的替代标准?
选择一个替代方案的原因是什么?
一个GRL可以由任一全球目标模式,或者是几个演员之间的分布式目标模型系列构成。

如果目标模式包括多个行为,那么行为者之间的依赖关系也会得到反映,和思索。

GRL的要素是目标,任务,资源和信仰。

目标是一个国家在世界事务中的利益相关者想达到的目标。

一个目标一定能够以不同的方式来实现,这促使替代模式加以考虑。

目标可以是一个企业目标或一个系统的目标。

企业目标是对业务或财务状况的个人或组织希望的实现。

系统目标是系统应实现的目标,其中,一般
描述目标信息系统的功能要求。

在货GRL的图形表示中,目标被表示为一个目标名称与内圆角矩形。

softgoal通常是质量属性的元素之一。

softgoal类似于一个硬性的的目标,只是softgoal的标准不明确。

它是由开发商来判断是否在特定的事实中充分说明softgoal已经达到。

NFRs,如性能,安全性,准确度,可重用性,互操作性,时间,市场和成本往往对信息系统的成功是至关重要的。

在GRL中,NFRs表示为softgoals和软件生命周期的解决。

他们应该在解决之前作出的承诺,并进行妥善设计建模和推理
,这是一个特定的的设计选择过程。

在GRL的图形表示中,softgoal表示为不规则的曲线形状。

一个任务指定一个特定的做东西的方式。

它可以分解成一个组合分目标,分任务,资源和softgoals .这些子组件指定一个特定的行动方针,同时仍然允许一些自由。

任务是用来指定和逐步完善的系统解决方案中的目标。

它们被用来实现所要达到的目标或具体实施.这些解决方案提供业务,流程,数据表示,结构,限制和代理商,满足规定的目标和softgoals 的需要。

在GRL的图形表示中,任务被表示为一个内六角的任务名称。

相关文档
最新文档