Nothing Special   »   [go: up one dir, main page]

DCS 0204 System Analysis and DesignF

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

School of Business and Technology

Department of Computer Science


Main Examination for Year I Semester II
Diploma in ICT
COURSE CODE: DCS 0204
COURSE TITLE: SYSTEM ANALYSIS AND DESIGN

August 2023 Time: 2 hours

INSTRUCTION
ANSWER QUESTION ONE AND ANY OTHER TWO QUESTIONS
Question One (30 marks)
a) Outline two examples of external problem indicators in the development of an
information system. (2 marks)
b) Describe each of the following system development methodologies
i. Structured (2 marks)
ii. Object -oriented (2 marks)
c)
i) Marcus prepared a requirement specification document for a proposed system.
Explain two importance of this document during system development (4 marks)
ii) Differentiate between critical and dummy activities as used in ICT project
management (4 marks)
d) A company hired a system analyst to train staff on the use of a new information system.
Describe three methods of training that he could use. (6 marks)
e) Differentiate between structured and unstructured decisions as used in system theory
(4marks)
f) Mara intends to design input output interface for an information system. Describe three
types of interfaces she could use (6 marks)
Question Two (20 marks)
a) .
i) Explain the term acceptance testing as used in system development (2 marks)
ii) A company uses an online system to capture data from its potential customers.
Recently, several complains were received from customers with regards to their input
form design. Outline four reasons for these complaints (4 marks)

Page 1 of 3
b) UBZ company implemented a new system in one department while the other departments
continued to use the old system.
i) Identify this system implementation method. (1 mark)
ii) Outline two advantages of the method identified in (i) (2 marks)
c) Melissa used interviews to collect data during system investigation
i) Outline two challenges of using this method only. (1 marks)
ii) Describe two other appropriate methods she could use to verify the data collected
(4 marks)
d) A supermarket has a reward system for its loyal customers. If a customer purchases
goods worth shs 30,000 or more, and the loyalty card has more than 3,000 points, the
customer is awarded a voucher worth shs 5,000 or a voucher worth shs 2,000 if the card
has less than 3,000 points. The transaction is stored in a file and report generated.
Draw a system flowchart to represent this logic (6 marks)
Question Three (20 marks)

a) Define slack time as used in project management (2 marks)


b) State the stage in the system development lifecycle (SDLC) where each of the following
is a deliverable:
i) Terms of reference (TOR)
ii) Program Specification.
iii) Feasibility report
iv) Project initiation document (4 marks)
c) .
i) Differentiate between form and command line as used in dialog design (4 marks)
ii) Tumaini Institute intends to load existing student records into a new system. describe
two file conversion methods they could use. (4 marks)
d) A logistics company has a fleet of vehicles. Each vehicle is identified by a unique vehicle
number, weight and destination. A vehicle can transport different items to different
destinations. A destination has an address and a name. a vehicle follows a schedule that
has a unique number and route.
Draw an entity relationship diagram to represent this logic (6 marks)

Question Four (20 marks)

2) Explain each of the following terms as used in system development


i) Perfective maintenance (2 marks)
ii) Structured walkthrough (2 marks)

b) Relaytec company developed a prototype for a new system. Explain three benefits of
using this design method (6 marks)
c) Differentiate between project evaluation review technique (PERT) and critical path
method (CPM) (4 marks)

Page 2 of 3
d) Students at Mlinzi technical college accesses academic report through an online learner’s
portal. A student signs up on the portal by filling details on an online form. The details
are stored in a register file. A verification link is then sent to the student email. The
student uses the link to change the default password. To access the report a student is
required to login using registration number and password.
Draw a level 1 dataflow diagram to represent this information. (6 marks)

Question Five (20 marks)

a) Outline four characteristics of a user-friendly software. (4 marks)


b) Explain three importance of system analysis (6 marks)
c) A student intends to undertake an ICT project. Explain two constraints the student is
likely to encounter at the inception stage. (4 marks)
d) Table 1 shows details of an information system project. Use it to answer the question that
follows.
Activity Predecessor Duration
A Assembly - 3
B Resource allocation A 5
C Installation B 4
D Configuration B 6
E Testing C,D 5
F Going live E 3
Table 1

Draw a network analysis diagram for the project (6 marks)

Page 3 of 3

You might also like