CONFIDENTIAL ANSWER SCHEME COURSE CODE : BCS 2413 COURSE TITLE : SYSTEM ANALYSIS AND DESIGN SEMESTER/SESSION : 1-2015/2016 DURATION : 1½ HOUR CONFIDENTIAL SYSTEM ANALYSIS AND DESIGN (BCS 2413) ___________________________________________________________________________ SECTION A (20 MARKS) QUESTION 1 a) What are the four (4) organizational levels common to many businesses? (4 marks) Answer should tell four (4) organizational levels (1m each). Four organizational levels are operational personnel, lower management, middle management, and top management. b) What are four (4) types of feasibility? (4 marks) Answer should tell four (4) types of feasibility (1m each). A systems project must be feasible from an operational, technical, economic, and schedule standpoint. QUESTION 2 a) Name five (5) familiar fact-finding questions. For each of these questions, name another very important question. (6 marks) Answer should name five (5) familiar fact-finding questions and another very important question (1m each). Fact-finding involves answers to five familiar questions: who, what, where, when, and how. For each of those questions, you also must ask another very important question: why. QUESTION 3 a) Complete the following Figure 1 data flow diagrams for Gane and Sarson and Yourdon symbols represent processes, data stores and entities. CONFIDENTIAL SYSTEM ANALYSIS AND DESIGN (BCS 2413) ___________________________________________________________________________ Figure 1 (6 marks) Answer should complete Figure 1 by drawing processes, data stores and entities (1m each). SECTION B (20 MARKS) QUESTION 4 a) This hierarchy depicts the “Base” object, the “Scene”, “PipelineBase” and the “ModuleManager”. Complete Figure 2 by naming the class and objects. i) ii) iii) iv) Figure 2 (4 marks) CONFIDENTIAL SYSTEM ANALYSIS AND DESIGN (BCS 2413) ___________________________________________________________________________ Answer should complete Figure 2 by naming class and objects (1m each). b) For each question asked in Table 1, enter a code that correctly identifies the question. Table 1 Question O = open-ended C = closed-ended R = range-of response Does this happen never, sometimes, often, or always? How do users feel about the new system? How many people report to you? How will this system help the company achieve its profit goals? On a scale of 1 (low) to 10 (high), how would you rate this employee’s productivity? Which tech support person scored the highest? (6 marks) Answer should enter a code (1m each). Question O = open-ended C = closed-ended R = range-of response Does this happen never, sometimes, often, or always? How do users feel about the new system? How many people report to you? How will this system help the company achieve its profit goals? On a scale of 1 (low) to 10 (high), how would you rate this employee’s productivity? Which tech support person scored the highest? R O C O R C QUESTION 5 a) Based on the following Table 2 list of planning statements, decide which type of feasibility applies. Table 2 CONFIDENTIAL SYSTEM ANALYSIS AND DESIGN (BCS 2413) ___________________________________________________________________________ Statement Feasibility Type The network will not be ready until next year, which might be too late. Expensive training will be required. The hardware is unreliable and will not integrate with other company systems. The new system will cause a workforce reduction, and employees are very concerned. i) ii) iii) iv) (4 marks) Answer should decide which type of feasibility applies (1m each). b) Statement Feasibility Type The network will not be ready until next year, which might be too late. Expensive training will be required. The hardware is unreliable and will not integrate with other company systems. The new system will cause a workforce reduction, and employees are very concerned. Schedule Economic Technical Operational Figure 3 decision table below shows the policy for paying various types of employees. In this case there are 2 conditions: The type of employee (salaried or hourly) and hours worked. Below the conditions, the actions are listed. There are four possible actions: 1. Pay the employee their base salary 2. Pay the employee their hourly wage 3. Pay the employee overtime 4. Produce an absence report Complete Figure 3 decision table by filling in the condition and action stubs. Figure 3 (6 marks) CONFIDENTIAL SYSTEM ANALYSIS AND DESIGN (BCS 2413) ___________________________________________________________________________ Answer should fill-in Figure 3 decision table with condition and action stubs (1m each). SECTION C (10 MARKS) QUESTION 6 The following summarizes input, process, and output. Process: Description: Input: Output: Process: Description: Input: Output: Process: Description: Input: Output: 4.1 1. 1. 4.2 1. 2. 1. 2. 4.3 1. 1. 2. KEY DELETE ID The computer ID is keyed interactively DELETED COMPUTER ID KEYED DELETE OBTAIN COMPUTER RECORD COMPUTER MASTER record is read to ensure that it exists KEYED DELETE (interface) COMPUTER RECORD, from the COMPUTER MASTER data store NOT FOUND ERROR (interface) VALID COMPUTER RECORD CONFIRM COMPUTER DELETION The computer information is displayed on the screen for operator confirmation or rejection VALID COMPUTER RECORD REJECTED DELETION (interface) CONFIRMED DELETION CONFIDENTIAL SYSTEM ANALYSIS AND DESIGN (BCS 2413) ___________________________________________________________________________ a) Complete the Figure 4 explosion data flow diagram for process 4, DELETE COMPUTER. 4.1 4.2 4.3 Confirm Personal Computer Deletion D1 4.4 Remove Computer Record Computer Record Figure 4 CONFIDENTIAL SYSTEM ANALYSIS AND DESIGN (BCS 2413) ___________________________________________________________________________ Answer should complete Figure 4 explosion data flow diagram (1m each). 4.1 Deleted Computer ID Key Delete ID Keyed Delete 4.2 Not Found Error Obtain Computer Record Computer Record Valid Computer Record 4.3 Rejected Deletion Confirm Personal Computer Deletion D1 Computer Master Confirmed Deletion 4.4 Remove Computer Record Computer Record --------------------------------------------------End of question--------------------------------------------------
© Copyright 2026 Paperzz