0% found this document useful (0 votes)
97 views5 pages

Knec Examination

Knec examination programming

Uploaded by

reverickchege30
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
97 views5 pages

Knec Examination

Knec examination programming

Uploaded by

reverickchege30
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 5
easytvet.com July 2016 _ Time: 3 hours DIPLOMA IN INFORMATION COMMUNICATION TECHNOLOGY SYSTEMS ANALYSIS AND DESIGN Shours INSTRUCTIONS TO CANDIDATES dnswer any FIVE of the follawing EIGHT questions in the answer booklet provideel ALL questions carry equal mars Candidates should answer the questions in English, This paper com sof 5 printed pages, Candidates should check the question paper to ascertain that all the Pages are printed as indicated and that no questions are missing. 2006 The Kenya National Esarcinations Coumelt ‘Turn over easytvet.com 1 (a) Outline three roles of non functional requirements in system development. (3 marks) (bo) (i) Explain the term daraser as used in information systems, 2 marks) (ii) Outline three roles of a system implementer in system development. (3 marks) (c) Explain three benefits that could be realized when using state transition diagrams during system design. (6 marks) () With the aid of illustration in each case, outline cach of the following type of telatio @ one-to-one s (2 marks) (i) one-to-many (2 marks) (iii) many-to-many, (2 marks) 2. {@) Outline two negative impacts of emerging trends in systems analysis and design. (2 marks) (b) Sammy intends to use object-oriented methodology fora proposed information system in his company. Explain three typical features that he could realize while using the methodology, (6 marks) (©) Daisy was required to identify possible causes of project slippage. Outline four threats that she could have identified, (4 marks) (4) (Lazarus intends to use payback method to evaluate a proposed project in his company. Explain twa limitations of the method. (4 marks) (ii) Risk management requires several strategies in organizations. Explain two strategies that could be used (4 marks) 3.) Outline two advantages of using Jackson Systems Development (JSD). (2 marks) ii) Outline three factors that should be considered when selecting systems development methodology, (3 marks) (b) Gi) Outline two typical components of an information system. (2 marks) Gi) Differentiate between ses dasa and rest case as applied in system testing. (4 marks) {c) Miriam bas decided to use program flow charts ta design an 1S, Outline three disadvantages of this tool. (3 marks) (@) team of system developers were allocated several independent modules to design and develop. Assume you are hired as a system analyst in the company. (i) Identify the most appropriate type of testing they could apply. (2 marks) (ii) Explain two strengths of the testing identified in (i), (4 marks) 4 @) ~~ @_—_Explain the term feedPack as applied in system control (2 marks) (ii) Outline two characteristics of a deterministic system. (2 marks) 2920/201 2 uly 2016 easytvet.com (b) (i) Qutine two file processing methods. (2 marks) (ii) Differentiate between prabability:and non probabiligv sampling as applied in data collection (4 marks) if (c) Rose intends to carry out file conversion for a new information system, Explain two methods she could use to accomplish the task, (4 marks) (4) Master-bits Systems Ltd. intends to use on job training for its client. Explain three advantages of the training method. (6 marks} 3 (a) Differentiate between evanumical and technical feasibility studies. (4 marks) (b) With the aid of a diagram, describe ELH for a typical library system, (6 marks) (c) Collins intends to formulate a user guide for his client's proposed information system. ‘Outline four guidelines that he should use, (4 marks) (d) A structured walkthrongh is a meeting fora group of peers to review and discuss the technical aspects of system development. Explain three objectives of such meetin; ‘organizations. (6 marks) 6 (a) Explain the term dicense key as applied in system acquisition. (2 marks) (b) Explain two disadvantages of questionnaires. (4 marks) (©) @)_—_ With the sid of examples in each case, explain two methods of system acquisition, (4 marks) ) Differentiate between a project scope and a project cycle as applied in project management, (4 marks) (d} Patrick was required to carry out training of users for a new information system in an organization (i) Explain the most appropriate category of users that should be the last to be trained as per organizational structure. (2 marks) (ii) Explain two challenges that are likely to be experienced during the training, (4 marks} 7. (@) Outline two typical indicators for urgent system review. (@ marks) b) Explain cach of the following terms as applied in project management: (milestone (2 marks) Gi) deliverable, (2 marks) (©) Baraka was required to install an information system in a new company. Gi) Identify the most appropriate changeover strategy that he could use justifying ‘your answer, (2 matks) Gi) Explain two-advantages of the changeover strategy identified in (i). (4 marks) 2920/2061 3 ‘Turn over aly 2076 easytvet.com td Read the following narrative to answer the question that follows. Makutano Dairy Farmers Sacco intends to develop an information system that will automate its operations. Farmers are required to fill registration form and retum them to ‘the clerk’s office. The clerical officer then keys in, verifies and then stores farmer's details in verified delails files, The verified farmers are issued with registration numbers ‘and passwords that are then stored in credentials file, During the milk delivery, farmers provide the registration number to the clerical attendant to enable the system retrieves hhisfher files. After weighing the milk, the farmer file is updated by clerical officer and a transaction reecipt issued to that farmer, transaction receipt details are then stored in transaction file. At the end of the month, the accountant of the Sacco is required 10 process farmer's payment by subtracting stores credit from the farmer's income, The accountant is then required to debit farmers hank account with the net balance and then update all records for that month, Draw a level | dataflow diagram to model the narrative into a system. (8 marks) 8. (a) Explain two advantages of throw-away prototyping. (4 marks) {b) Sophia was required to enhance an existence IS beeause of a newly installed operating system, (i) Identify the type of maintenance she would carry out, «2 marks) (ii) Explain two challenges that she could experience with the type of maintenance identified in (i), (4 marks) 29207201 4 Sly 2016, easytvet.com (c) Table 1 shows activities and durations for an information system project. Use it 0 answer the questions that follow. | Activity Predecessor | Duration [A] Site survey - 3 7 (B | Feasibility report A 4 iy T_| Write proposal r= 4 Presentation mecting | BC 8 ] E | Write quotation BC 5 F_| Sign contact — 3 G | Design D 3 H_ | Implementation RG 3 T_ | Testing and waining | H ‘Table 1 (i) Draw a network diagram to represent the project activities (8 marks) (ii) Show the critical path of the project. (2 marks) ‘THIS 1S THE LAST PRINTED PAGE. 2920201 s duly 2016

You might also like