NC2430 - System Analysis and Desigh Level 4 Supp 2012

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

NATIONAL CERTIFICATE (VOCATIONAL)

SYSTEM ANALYSIS AND DESIGN


NQF LEVEL 4

SUPPLEMENTARY EXAMINATION 2012

(10041004)

1 March (Y-Paper)
13:00 – 16:00

This question paper consists of 9 pages.

Copyright reserved Please turn over


(10041004) -2- NC2430(E)(M1)V

TIME: 3 HOURS
MARKS: 200

______________________________________________________________________________

INSTRUCTIONS AND INFORMATION

1. Answer ALL questions.

2. Read ALL the questions carefully.

3. Number the answers according to the numbering system used in this question
paper.

4. Write neatly and legibly.

Copyright reserved Please turn over


(10041004) -3- NC2430(E)(M1)V

SECTION A: (COMPULSORY)

QUESTION 1

1.1 Choose the correct word from those given in brackets. Write only the word
next to the question number (1.1.1 – 1.1.10) in the ANSWER BOOK.

1.1.1 A (management/professional) body sets up standards of training


and ethics in order to determine if people work professionally.

1.1.2 A/an (firewall/anti-virus) is software or hardware that only allows


approved data to flow in and out of the company's network.

1.1.3 (Scope-creep/Consequence) is a word used to describe the size of


the outcome if a risk was realised.

1.1.4 The interviewee can answer (open questions/closed questions) in


as much detail as he/she can.

1.1.5 The best way to know that the (respondent/interviewee) has under-
stood the question is to listen to the answer.

1.1.6 A (simulation/model) is a visual presentation of a system that


allows one to show, diagrammatically, what a system does and
how it does it.

1.1.7 A (checksum/binary) is an extra number that the scanner can read


at the end of the bar code.

1.1.8 Creating a/an (example/prototype) is another way of simulating a


system in the user's workplace when testing a design.

1.1.9 (Duration/Availability) of a system is the measure of the amount of


time users can actually use the system.

1.1.10 (Local area/Neural) network is one of the four applications of


artificial intelligence. (10 × 1) (10)

Copyright reserved Please turn over


(10041004) -4- NC2430(E)(M1)V

1.2 Complete the following sentences by filling in the missing words. Write only
the word(s) next to the question number (1.2.1 – 1.2.10) in the ANSWER
BOOK.

1.2.1 Software that is under … can be used but cannot be copied and
modified.

1.2.2 A … is equal to consequence multiplied by probability.

1.2.3 … knows what might go wrong and works on how to continue in


the best way to prevent or reduce risk.

1.2.4 A … can be created to give everyone access to information and


enable all project stakeholders to understand what data the system
will use and maintain.

1.2.5 It is important for the interviewer to discuss the objectives of the …


with the interviewee to ensure that they understand them properly.

1.2.6 Two methods of documenting process flows include use of cases


and … .

1.2.7 … occurs when a tester tests the inner working part of the
information system.

1.2.8 Verification and validation falls under the aspect of … a new


system.

1.2.9 Checking whether the user has met all its objectives and satisfied
all user requirements is a reason why one should review the
system after … .

1.2.10 One of the advantages of using … is that its language is easier to


read and understand than formal logic. (10 × 1) (10)

1.3 Write the following acronyms in full:

1.3.1 HTML
1.3.2 PM
1.3.3 IM
1.3.4 ISP
1.3.5 VCR
1.3.6 JAD
1.3.7 ASCII
1.3.8 ROM
1.3.9 DVD
1.3.10 3D (10 × 1) (10)

Copyright reserved Please turn over


(10041004) -5- NC2430(E)(M1)V

1.4 Choose an item from COLUMN B that matches a description in COLUMN


A. Write only the letter (A – J) next to the number (1.4.1 – 1.4.10) in the
ANSWER BOOK.

COLUMN A COLUMN B

1.4.1 What enables everyone to get the A risk assessment


same opportunity or chance to
apply for something? B closed questions

1.4.2 What measures the true size of C validation


risk by looking at both its
consequence and probability? D adaptive neural network

1.4.3 The scope of the project and E equal opportunity


everything that the project needs
to do F check boxes

1.4.4 What relies entirely on the G open questions


questionnaire for guidance?
H scope creep
1.4.5 What often starts with words like
why, how or what? I respondent

1.4.6 A piece of information that has J attribute


both the name and the value

1.4.7 What keeps the interviewer in


control of an interview?

1.4.8 What tests that a product does


what the user wants it to do?

1.4.9 What are the types of questions


that give a respondent a choice
between 'no' or 'yes' answer?

1.4.10 What process input data more


than once and can work on it in
different ways?
(10 × 1) (10)
[40]

TOTAL SECTION A: 40

Copyright reserved Please turn over


(10041004) -6- NC2430(E)(M1)V

SECTION B

QUESTION 2: ETHICS AND PROFESSIONALISM FOR THE COMPUTER


INDUSTRY IN SOUTH AFRICA

2.1 Several professional bodies apply to the South African computer industry, but
thus far we are familiar with CSSA, IFIP and ACM.

Based on this statement identify THREE uses or functions of the professional


bodies that are identified above. (6)

2.2. Briefly explain the code of practice in your own words. (2)

2.3 Recommend FOUR steps that one can follow to reduce software piracy. (8)
[16]

QUESTION 3: ICT RISK AND THREAT MANAGEMENT

3.1 Describe the following terms:

3.1.1 Consequences (2)

3.1.2 Probability (2)

3.1.3 Virus (2)

3.2 Recommend FOUR criteria that will enable you to determine if a project or a
system is a failure. (4)

3.3 Explain what is meant by the term, confidential information. (2)

3.4 Name and briefly explain THREE states in which confidentiality, integrity and
availability of information can be protected. (9)

3.5 Identify THREE different forms that security control may take. (6)

3.6 Name FIVE technical or hardware and software security controls that you
know. (5)
[32]

Copyright reserved Please turn over


(10041004) -7- NC2430(E)(M1)V

QUESTION 4: INFORMATION GATHERING TECHNIQUES FOR COMPUTER


SYSTEMS DEVELOPMENT

4.1 Explain why it is important to have a second member of the interviewer's team
present when conducting an interview. (2)

4.2 Identify ONE disadvantage of having a second member of the interviewer's


team present. (2)

4.3 Identify ONE disadvantage of using public venues like the student cafeteria
as the environment where an interview will be conducted. (2)

4.4 Identify ONE disadvantage of using private quieter venues that can be rented. (2)

4.5 Name THREE ways or methods in which students can gather information. (3)

4.6 Of the methods you identified in QUESTION 4.5, which do you think is the
best and why? Name and explain ONE reason for your answer. (3)

4.7 Identify TWO advantages of using closed questions in an interview. (4)

4.8 Name ONE way in which you can ensure that the interviewee has understood
the question. (2)

4.9 Name TWO broad areas that form the design of a system. (4)

4.10 Name THREE types of descriptions that can be stored in a data dictionary. (6)

4.11 List TWO minimum needs of a user requirement. (2)


[32]

QUESTION 5: ANALYSING INFORMATION SYSTEMS

5.1 Explain what the term 'systems analysis' means to IT students who want to
become system analysts. (2)

5.2 Identify THREE roles of a system analyst. (6)

5.3 Identify TWO important things that system analysts can learn from users of
the current system. (4)

5.4 Give TWO reasons why you think a system analyst must analyse the current
system before updating or developing a new system. (4)
[16]

Copyright reserved Please turn over


(10041004) -8- NC2430(E)(M1)V

QUESTION 6: PRINCIPLES OF DESIGNING COMPUTER SYSTEMS INPUTS AND


OUTPUTS

6.1 Name THREE output processes that a computer performs when outputting
data. (3)

6.2 Differentiate between validation and verification (2)

6.3 Compare the advantages of GUI over command–line interface when


capturing text on a form. (2)

6.4 Students who passed Grade 12 always have to fill in application forms before
they can be admitted to a tertiary institution. Many students make mistakes
when filling in these forms because they find them complicated.

Identify THREE points that will help ensure the success of the system that
you are designing and developing for a user. (6)

6.5 Identify ONE way in which one can simulate a system/design in the user's
workplace when testing the design. (1)

6.6 Briefly explain the purpose of a prototype (e.g. dummy cell phone). (2)
[16]

QUESTION 7: IMPLEMENTING AND MAINTAINING AN INFORMATION SYSTEM

7.1 Explain the following adoption, approach or installation strategy:

Pilot adoption
Parallel adoption
Phased adoption
Bing–bang/direct/immediate cutover adoption. (8)

7.2 Specify one advantage and one disadvantage of all the above
QUESTION 7.1 adoption strategies. (16)

7.3 Identify TWO ways that could assist IT specialists decide which of the
adoption strategies to choose as the best option for Vhembe FET College. (2)

7.4 List THREE reasons why the IT specialists should review their system after
the administrators have implemented it. (6)
[32]

Copyright reserved Please turn over


(10041004) -9- NC2430(E)(M1)V

QUESTION 8: CONCEPTS OF ARTIFICIAL INTELLIGENCE

8.1 Name and explain THREE parts of a neuron and their uses. (9)

8.2 Identify TWO purposes of a neural network. (4)

8.3 There are two main categories that are involved in neural networks, and one
of them is called an adaptive neural network. These categories of neural
networks see and handle data in different ways.

Name the other category of neural network and compare how these TWO
categories of neural network accommodate data. (3)
[16]

TOTAL SECTION B: 160


GRAND TOTAL: 200

Copyright reserved Please turn over

You might also like