answer scheme

CONFIDENTIAL
ANSWER SCHEME
COURSE CODE
: BCS 2413
COURSE TITLE
: SYSTEM ANALYSIS AND
DESIGN
SEMESTER/SESSION
: 1-2015/2016
DURATION
: 1½ HOUR
CONFIDENTIAL
SYSTEM ANALYSIS AND DESIGN (BCS 2413)
___________________________________________________________________________
SECTION A (20 MARKS)
QUESTION 1
a)
What are the four (4) organizational levels common to many businesses?
(4 marks)
Answer should tell four (4) organizational levels (1m each).
Four organizational levels are operational personnel, lower management, middle
management, and top management.
b)
What are four (4) types of feasibility?
(4 marks)
Answer should tell four (4) types of feasibility (1m each).
A systems project must be feasible from an operational, technical, economic, and
schedule standpoint.
QUESTION 2
a)
Name five (5) familiar fact-finding questions. For each of these questions, name
another very important question.
(6 marks)
Answer should name five (5) familiar fact-finding questions and another very important
question (1m each).
Fact-finding involves answers to five familiar questions: who, what, where, when, and
how. For each of those questions, you also must ask another very important question:
why.
QUESTION 3
a)
Complete the following Figure 1 data flow diagrams for Gane and Sarson and Yourdon
symbols represent processes, data stores and entities.
CONFIDENTIAL
SYSTEM ANALYSIS AND DESIGN (BCS 2413)
___________________________________________________________________________
Figure 1
(6 marks)
Answer should complete Figure 1 by drawing processes, data stores and entities (1m
each).
SECTION B (20 MARKS)
QUESTION 4
a)
This hierarchy depicts the “Base” object, the “Scene”, “PipelineBase” and the
“ModuleManager”. Complete Figure 2 by naming the class and objects.
i)
ii)
iii)
iv)
Figure 2
(4 marks)
CONFIDENTIAL
SYSTEM ANALYSIS AND DESIGN (BCS 2413)
___________________________________________________________________________
Answer should complete Figure 2 by naming class and objects (1m each).
b)
For each question asked in Table 1, enter a code that correctly identifies the question.
Table 1
Question
O = open-ended
C = closed-ended
R = range-of response
Does this happen never, sometimes, often, or always?
How do users feel about the new system?
How many people report to you?
How will this system help the company achieve its profit
goals?
On a scale of 1 (low) to 10 (high), how would you rate this
employee’s productivity?
Which tech support person scored the highest?
(6 marks)
Answer should enter a code (1m each).
Question
O = open-ended
C = closed-ended
R = range-of response
Does this happen never, sometimes, often, or always?
How do users feel about the new system?
How many people report to you?
How will this system help the company achieve its profit
goals?
On a scale of 1 (low) to 10 (high), how would you rate this
employee’s productivity?
Which tech support person scored the highest?
R
O
C
O
R
C
QUESTION 5
a)
Based on the following Table 2 list of planning statements, decide which type of
feasibility applies.
Table 2
CONFIDENTIAL
SYSTEM ANALYSIS AND DESIGN (BCS 2413)
___________________________________________________________________________
Statement
Feasibility Type
The network will not be ready until next year, which might be too
late.
Expensive training will be required.
The hardware is unreliable and will not integrate with other
company systems.
The new system will cause a workforce reduction, and employees
are very concerned.
i)
ii)
iii)
iv)
(4 marks)
Answer should decide which type of feasibility applies (1m each).
b)
Statement
Feasibility Type
The network will not be ready until next year, which might be too
late.
Expensive training will be required.
The hardware is unreliable and will not integrate with other
company systems.
The new system will cause a workforce reduction, and employees
are very concerned.
Schedule
Economic
Technical
Operational
Figure 3 decision table below shows the policy for paying various types of employees.
In this case there are 2 conditions: The type of employee (salaried or hourly) and
hours worked. Below the conditions, the actions are listed. There are four possible
actions:
1.
Pay the employee their base salary
2.
Pay the employee their hourly wage
3.
Pay the employee overtime
4.
Produce an absence report
Complete Figure 3 decision table by filling in the condition and action stubs.
Figure 3
(6 marks)
CONFIDENTIAL
SYSTEM ANALYSIS AND DESIGN (BCS 2413)
___________________________________________________________________________
Answer should fill-in Figure 3 decision table with condition and action stubs (1m each).
SECTION C (10 MARKS)
QUESTION 6
The following summarizes input, process, and output.
Process:
Description:
Input:
Output:
Process:
Description:
Input:
Output:
Process:
Description:
Input:
Output:
4.1
1.
1.
4.2
1.
2.
1.
2.
4.3
1.
1.
2.
KEY DELETE ID
The computer ID is keyed interactively
DELETED COMPUTER ID
KEYED DELETE
OBTAIN COMPUTER RECORD
COMPUTER MASTER record is read to ensure that it exists
KEYED DELETE (interface)
COMPUTER RECORD, from the COMPUTER MASTER data store
NOT FOUND ERROR (interface)
VALID COMPUTER RECORD
CONFIRM COMPUTER DELETION
The computer information is displayed on the screen for operator
confirmation or rejection
VALID COMPUTER RECORD
REJECTED DELETION (interface)
CONFIRMED DELETION
CONFIDENTIAL
SYSTEM ANALYSIS AND DESIGN (BCS 2413)
___________________________________________________________________________
a)
Complete the Figure 4 explosion data flow diagram for process 4, DELETE
COMPUTER.
4.1
4.2
4.3
Confirm
Personal
Computer
Deletion
D1
4.4
Remove
Computer
Record
Computer Record
Figure 4
CONFIDENTIAL
SYSTEM ANALYSIS AND DESIGN (BCS 2413)
___________________________________________________________________________
Answer should complete Figure 4 explosion data flow diagram (1m each).
4.1
Deleted
Computer ID
Key Delete
ID
Keyed
Delete
4.2
Not Found
Error
Obtain
Computer
Record
Computer Record
Valid
Computer
Record
4.3
Rejected
Deletion
Confirm
Personal
Computer
Deletion
D1
Computer Master
Confirmed
Deletion
4.4
Remove
Computer
Record
Computer Record
--------------------------------------------------End of question--------------------------------------------------