Professional Documents
Culture Documents
NC2430 - System Analysis and Desigh Level 4 Supp 2012
NC2430 - System Analysis and Desigh Level 4 Supp 2012
NC2430 - System Analysis and Desigh Level 4 Supp 2012
(10041004)
1 March (Y-Paper)
13:00 – 16:00
TIME: 3 HOURS
MARKS: 200
______________________________________________________________________________
3. Number the answers according to the numbering system used in this question
paper.
SECTION A: (COMPULSORY)
QUESTION 1
1.1 Choose the correct word from those given in brackets. Write only the word
next to the question number (1.1.1 – 1.1.10) in the ANSWER BOOK.
1.1.5 The best way to know that the (respondent/interviewee) has under-
stood the question is to listen to the answer.
1.2 Complete the following sentences by filling in the missing words. Write only
the word(s) next to the question number (1.2.1 – 1.2.10) in the ANSWER
BOOK.
1.2.1 Software that is under … can be used but cannot be copied and
modified.
1.2.7 … occurs when a tester tests the inner working part of the
information system.
1.2.9 Checking whether the user has met all its objectives and satisfied
all user requirements is a reason why one should review the
system after … .
1.3.1 HTML
1.3.2 PM
1.3.3 IM
1.3.4 ISP
1.3.5 VCR
1.3.6 JAD
1.3.7 ASCII
1.3.8 ROM
1.3.9 DVD
1.3.10 3D (10 × 1) (10)
COLUMN A COLUMN B
TOTAL SECTION A: 40
SECTION B
2.1 Several professional bodies apply to the South African computer industry, but
thus far we are familiar with CSSA, IFIP and ACM.
2.2. Briefly explain the code of practice in your own words. (2)
2.3 Recommend FOUR steps that one can follow to reduce software piracy. (8)
[16]
3.2 Recommend FOUR criteria that will enable you to determine if a project or a
system is a failure. (4)
3.4 Name and briefly explain THREE states in which confidentiality, integrity and
availability of information can be protected. (9)
3.5 Identify THREE different forms that security control may take. (6)
3.6 Name FIVE technical or hardware and software security controls that you
know. (5)
[32]
4.1 Explain why it is important to have a second member of the interviewer's team
present when conducting an interview. (2)
4.3 Identify ONE disadvantage of using public venues like the student cafeteria
as the environment where an interview will be conducted. (2)
4.4 Identify ONE disadvantage of using private quieter venues that can be rented. (2)
4.5 Name THREE ways or methods in which students can gather information. (3)
4.6 Of the methods you identified in QUESTION 4.5, which do you think is the
best and why? Name and explain ONE reason for your answer. (3)
4.8 Name ONE way in which you can ensure that the interviewee has understood
the question. (2)
4.9 Name TWO broad areas that form the design of a system. (4)
4.10 Name THREE types of descriptions that can be stored in a data dictionary. (6)
5.1 Explain what the term 'systems analysis' means to IT students who want to
become system analysts. (2)
5.3 Identify TWO important things that system analysts can learn from users of
the current system. (4)
5.4 Give TWO reasons why you think a system analyst must analyse the current
system before updating or developing a new system. (4)
[16]
6.1 Name THREE output processes that a computer performs when outputting
data. (3)
6.4 Students who passed Grade 12 always have to fill in application forms before
they can be admitted to a tertiary institution. Many students make mistakes
when filling in these forms because they find them complicated.
Identify THREE points that will help ensure the success of the system that
you are designing and developing for a user. (6)
6.5 Identify ONE way in which one can simulate a system/design in the user's
workplace when testing the design. (1)
6.6 Briefly explain the purpose of a prototype (e.g. dummy cell phone). (2)
[16]
Pilot adoption
Parallel adoption
Phased adoption
Bing–bang/direct/immediate cutover adoption. (8)
7.2 Specify one advantage and one disadvantage of all the above
QUESTION 7.1 adoption strategies. (16)
7.3 Identify TWO ways that could assist IT specialists decide which of the
adoption strategies to choose as the best option for Vhembe FET College. (2)
7.4 List THREE reasons why the IT specialists should review their system after
the administrators have implemented it. (6)
[32]
8.1 Name and explain THREE parts of a neuron and their uses. (9)
8.3 There are two main categories that are involved in neural networks, and one
of them is called an adaptive neural network. These categories of neural
networks see and handle data in different ways.
Name the other category of neural network and compare how these TWO
categories of neural network accommodate data. (3)
[16]