Pamantasan ng Cabuyao
College of Engineering
1ST SEMESTER & A.Y. 2020-2021
MODULE
5 TOOLS OF A SYSTEM ANALYST
INTRODUCTION
This module views. different tools and approaches the analyst utilize to perform his/her task
efficiently and effectively. A successful systems analyst must have good written and oral
communication skills to perform his or her job effectively. Never underestimate the importance
of effective communication, whether you are using a memo, e-mail, an oral presentation, or a
social networking site to convey your ideas. The following guidelines will help you prepare and
deliver effective presentations. Remember, however, that nothing increases your ability to
communicate better than practicing these skills.
LEARNING OUTCOMES
By the end of this module you should be able to:
1. Plan, develop, and deliver a successful presentation
2. Organize and prepare written reports that are required during systems development
3. Use effective speaking techniques to achieve your objectives
PRE-TEST
You may want the students to test their knowledge/understanding of the unit’s topics before they
start (this helps students to know where they should focus their efforts). Can be self-check or
direct the student to an online quiz/survey/exercise.
5.1] ESSENTIAL TOOLS FOR AN ANALYST
Pamantasan ng Cabuyao
College of Engineering
1ST SEMESTER & A.Y. 2020-2021
5.2] SYSTEM DEVELOPMENT LIFE CYCLE
The first problem in designing a system is to define goals and specifications. At the highest
level, the design of the system will be affected by the choice of hardware and the type of
system: traditional desktop/laptop, mobile, distributed, or real time.
Name Score
Section Instructor Date
POST-TEST – MODULE 5
I. True or False: Evaluate each statement and write true if it is factual, else identify the word that
makes the statement false and supply the correct word to make it factual. (20 pts)
1. An operating system provides an environment for the execution of programs by providing
services to users and programs.
2. The three primary approaches for interacting with an operating system are (1) command
interpreters, (2) graphical user interfaces, and (3) touchscreen interfaces.
3. System calls provide an interface to the executable made available by an operating system.
4. System calls can be divided into five major categories.
5. Operating systems also include a collection of system programs that provide utilities to users.
6. Programmers use a system call’s application programming interface (API) for executing system-
call services.
7. There are several reasons why OS are operating-system specific.
8. An operating system is designed with common goals in mind. These goals ultimately determine
the operating system’s policies.
9. An operating system implements these policies through specific timers.
10. A layered operating system is divided into a number of common layers, where the bottom layer is
the hardware interface and the highest layer is the user interface.
ANSWER
1.__________________________ 6.________________________
2.__________________________ 7.________________________
3.__________________________ 8.________________________
4.__________________________ 9.________________________
5.__________________________ 10.________________________
II. Question and Answer: Answer the following questions accurately. The grading rubrics are as follows:
POINTS
Category / Description Full No
Partial
answer answer
Completeness
3 1 0
-Does your response directly answer each part of the question(s)?
Knowledge
-Does your answer clearly show you have read and understand the
5 2 0
lesson content by correctly defining key terms, key persons and
summarizing concepts?
Writing Skills 2 1 0
Pamantasan ng Cabuyao
College of Engineering
1ST SEMESTER & A.Y. 2020-2021
-Do you write clearly, in complete sentences, with minimal errors in
grammar and spelling?
1. The services and functions provided by an operating system can be divided into
two main categories. Briefly describe the two categories, and discuss how they
differ.
2. Contrast and compare an application programming interface (API) and an application
binary interface (ABI).
3. What are the two models of interprocess communication? What are the strengths and
weaknesses of the two approaches?
Pamantasan ng Cabuyao
College of Engineering
1ST SEMESTER & A.Y. 2020-2021
ANSWER KEY MODULE 4 POST-TEST
True or False:
1. True
2. True
3. Executable – services
4. Five-six
5. True
6. Executing – accessing
7. OS – applications
8. Common – specific
9. Timers- mechanism
10. Common - discrete
SAMPLE ANSWER FOR II
1. One class of services provided by an operating system is to enforce protection
between different processes running concurrently in the system. Processes are
allowed to access only those memory locations that are associated with their
address spaces. Also, processes are not allowed to corrupt files associated with
other users. A process is also not allowed to access devices directly without
operating system intervention. The second class of services provided by an
operating system is to provide new functionality that is not supported directly by
the underlying hardware. Virtual memory and file systems are two such examples
of new services provided by an operating system.
2. Make it simple, API(Application programming interface) is used in traditional computer
languages, where applications, libraries or server application expose interface to others
to invoke.While ABI(Application binary interface) is used in blockchain such as
Ethereum, where one contract exposes interface to other contract or frontend to
invoke.These two can be considered to be the same concept but with different names
and used in different regions
3. The two models of interprocess communication are message-passing model and the
shared-memory model. Message passing is useful for exchanging smaller amounts of
data, because no conflicts need be avoided. It is also easier to implement than is shared
memory for intercomputer communication. Shared memory allows maximum speed and
convenience of communication, since it can be done at memory transfer speeds when it
takes place within a computer. However, this method compromises on protection and
synchronization between the processes sharing memory.