0% found this document useful (0 votes)
15 views15 pages

Till MJ 2012 ICT CAHPTER 7,8,9

ict pp

Uploaded by

nidhishcsn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
15 views15 pages

Till MJ 2012 ICT CAHPTER 7,8,9

ict pp

Uploaded by

nidhishcsn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 15
14. Joan owns a small company. She wishes to replace the existing computerised system with ‘anew one. She has employed a systems analyst, Jasvir, to plan this. (a) Before Jasvir decides on a system he must collect information about the existing system. Tick whether the following statements about the various methods of information collection are TRUE or FALSE. TRUE FALSE Examining documents has to be done in the presence of all the workers ‘Appointments have to be made with a worker in order to complete a questionnaire Its possible to change questions in the course of an interview ‘Observing the current system can provide a detailed view of the workings of the system {b) After Jasvir has completed the analysis of the existing system, he will need to design the new system. Tick four items which would need to be designed. (4 Inputs to the current system User and information requirements Data capture forms Validation routines Problems with the current system File structure Report layouts Limitations of the system (4) For examiners Use 14 (a) True [False Mia Examining documents has to be done in the presence of al the ol; workers, ‘Appointments have to made with a worker in order to complete al, a questionnaire, Itis possible to change questions in the course of an interview. | 1 ‘Observing the current system can provide a detailed view of | : the workings of the system. (©) Inputs to the current system User and information requirements Data capture forms: v |la Validation routines v |ia Problems with the currant system File structure v |la Repor layouts v |la Limitations of the system 15 After a system is designed it will be implemented. Give one advantage of each of the following methods of implementation. Direct changeover Parallel running Phased implementation 3 16 After a system has been implemented it needs to be evaluated. Identify two evaluation strategies and state a reason why each is needed. Strategy 1 Reason 1 Strategy 2 4] QP a2 rs 15 (a) | Direct changeover 1 (b) | Parallel running 1 (€) | Phased/Pilot running 1 16 | Two strategies and two reasons from User testing To ensure system meets the needs of the user Other answers will depend on method of implementation e.g. Phased implementation (User) testing each module with normallive data To see how system behaves in an ordinary day to day situation/system works as ‘you would expect i.e. no error messages (User) testing each module with abnormaljextreme data To see how system reacts in unusual circumstances/to make sure error messages ‘appear when data is abnormal Direct changeover (User) testing whole system To ensure the whole system works when all modules are combined Parallel running [AffalYSIS of user's results ‘To compare the two systems/to ensure all processing/calculations is/are accurate | 2+2 10 Describe the three types of test data: Normal Abnormal Extreme 410. Three from: Normal data — data within a (given) range/appropriate for that data type (1) ‘Abnormal data — data outside the range/of the wrong data type (1) Extreme data — data on the boundaries of the range (1) BI 14 John owns a small company. He wishes to replace the existing computerised system with a new one. He has employed a systems analyst, Iqbal, to plan this. (@) Iqbal will need to collect information about the existing system. Describe three methods he could use to do this. 1 [3] (b) Iqbal has completed the JARIYSIS of the existing system. Describe thr structure which he would need to design for the new system. 1 8 (c) After a system is designed it will be implemented. Describe each of the following methods of implementation. (i) Direct changeover (ii) Parallel running i) Phased implementation (iv) Pilot running For Examiners For Examiner's 14 (@) Three from: Examining documents about the system Distribute questionnaires to users of the system Interview users of the system Observing the system/staff (b) Three from: Field name Field type Key field Field length Validation checkirules (C) Direct changeover — new system replaces existing system immediately/overnight (1) Parallel running ~ new system runs alongside/together with existing system (1) Phased implementation — new system is implemented part by part (1) Pilot running — system is implemented in one branch/one office (at a time) (1) 19 Describe two methods of data verification. 19 Describe two methods of data verification. 1 (4) 8) 8) 4 Examiners Use 19. Two from: Visual verification/checking Read through data on screen ‘Compare with source document 2 Two from Double data entry Data is typed in twice by one typist Data is typed in by two operators ‘Computer compares versions If different freezes/sounds buzzer re 12. Alan owns a small company. He wishes to replace the existing computerised system with a new one. He has employed a systems analyst, José, to plan this, (a) José will collect information about the existing system and design the new system. Tick whether the following statements are TRUE or FALSE. TRUE | FALSE [Defining a field length is part of the design of the file structure [Screen layouts are designed before the system is implemented |The new system is evaluated before it is designed |The existing system is analysed before the new system is designed (4) (b) Name and describe three types of test data which are used when testing a system. 1 (c) After the system has been implemented it will be evaluated. Tick four activities which José will need to carry out as part of the evaluation, Produce user documentation Design the new system ‘Compare the solution with the original task requirements Analyse the existing system Identity any limitations of the system, Identity any necessary improvements to the system Analyse the users’ responses to the results of testing the system Produce technical documentation (4) For Examiners (d) Part of José’s job will be to produce both technical and user documentation for the new | — for system. For each type of documentation give two reasons why itis needed, Examiners ‘Use Technical documentation Reason 1 Reason 2 User documentation Reason 1 Reason 2 4) 12 (a) (b) () (d) a) a) ~ ja) True | False Defining field length is part of the design of the fle structure v Screen layouts are designed before the system is implemented v ‘The new system is evaluated before it is designed ‘The existing system is analysed before the new system is designed | a) ‘Abnormal data — data outside the range/of the wrong data type (1) Extreme data — data on the boundaries of the range (1) Normal data — data within a (given) range/appropriate for that data type (1) Produce user documentation Design the new system ‘Compare the solution with the original task requirements (1) Analyse the existing system Identify any limitations of the system (1) Identify any necessary improvements to the system (1) Analyse the users’ responses to the results of testing the system (1) Produce technical documentation Technical documentation Two from: ‘So improvements can be made to syste To know how to repair system To know how to maintain system User documentation Two from: Help users to learn/know how to use system Help users to overcome problems 16 Explain the difference between phishing and pharming. 4) B31 [4] 2) (2) For Examiners Use (3) 16 Three from: Phishing is done by email Can invite you to go to a website/respond to an email Pharming is done by installing malicious code on a pc or server Redirects a genuine website's traffic to hacker's website 3. Tick TRUE or FALSE next to each of these statements about methods of implementation I For Examiners 13. The use of computor networks can lead to problems of keeping data secure and ‘confidential. Two methods of overcoming this are the use of authentication techniques and data encryption, (a) Describe two authentication techniques. 1 (b) Describe data encryption. TRUE | FALSE Direct changeover needs two sets of workers to be employed Parallel running means that the original system is still available Phased implementation is implementing the system in parts Parallel running is the cheapest form of implementation 4] True | False Direct changeover needs two sets of workers to be employed y | Parallel running means that the original system is still available viv la Phased implementation is implementing the system in parts v a Parallel running is the cheapest form of implementation vim (4) 1 Aa) Adie User ID and one of password/PINimemorable data — password has to be entered before access is gained/password can be changed frequently to avoid hackers guessing them/unsuccessful logins can throw you out of the system Magnetic stripe/smart cardielectronic key/bar code system/ID cardiDongle Prevents people without cards accessing system Biometric data Fingerprintiretina/irisiface/voice recognition used as input/biometric data is difficult to replicate/is unique [2] {b) Two from: Key needed to encrypt Data is jumbled up Key must be known to decrypt it Prevents people from understanding data/reading data 2 14. Sarbjit owns a small company with little money to spare. He wishes to replace the existing | For computerised system with a new one. He has already made backups of the existing | swminors system. He has employed a systems analyst, Tom, to plan the new system. ca (a) Tom wishes to collect information about the existing system. Give four methods he could use and for each give @ reason why it would be used. Method 1 Reason, Method 2 Reason Method 3 Reason, [8] (b) Tom will need to design the file structure of the new system. List four items which would need to be included in this design. Aor amet 7 (4) (c) After the system is developed it will be implemented. Describe the most appropriate method Sarbjit should choose giving two reasons. Method Reason 1 Reason 2 | 14 (a) Interview 4 Can change questions in light of previous answers/interviewer can detect body language Questionnaire Quicker to get every worker's response/easier to collate responses Examining documents Can see exact details of inputs and outputs Observation Easier to see data flow/can get more accurate overview of whole system (b) Four from: Field name Field type Key field Field length Validation check/rules (€) Direct changeover Two from: Cannot afford to pay two sets of workers Would give him immediate benefits Does not need to set up pilot scheme ~ small company A test is marked out of 20 and recorded as an integer. Tick whether each of the following marks is an example of abnormal data or extreme data. Abnormal Extreme 20 24 twenty (4) For Examinors Use (1) (1) (1) tt) (1) (1) oy a) (4) (2) For Abnormal | Extreme [o> [| |= | a ¥ twenty ‘a 0 ¥ 412 Name and describe three validation checks which could be carried out on a 16-digit credit card number when itis typed into @ computer. Name ., Description Name Description Name 42 Three pairs from: Length check Checks there are exactly 16 characters Invalid characteritype check Checks all characters entered are digits Check digit 4 Single digit calculated from other digits appended to these, computer carries out fresh calculation on digit and compares answer with original check digit. Existency check Is the card number on the database (6) 15 Gita has employed Johann, a systems analyst, to create a new database system for her car sales business. She only sells cars made by Rock and only the models Feisty, Mendo and Galactica in red, blue or gold. Most of the cars have air conditioning but some do not. She sells 3, 4 and 5 door cars. (a) Give a reason why would it not be sensible to have a Make field in the database. (b) Complete the design table below giving the field names which would be used in the database and describing the most appropriate validation check which could be carried ‘out on each field, Field name Validation check Model i} Examiners (c) Discuss verification and validation. 415 (a) Would always be the same contents/waste space putting in duplicated field (1 (b) Validation check Must be Feisty or Mendo or Galactica Must be red, blue or gold Air conditioning Boolean check - Must be yes or no Number of doors} Range check >2 AND <6 / 7 (c) Six from: Validation is the checking that data is reasonable or acceptable Verification is checking that data has been accurately copied from one medium to another. Verification does not check that data is correct If original data is incorrect it will still be incorrect after it has been copied accurately Validation does not check that dat correct If, for example, data is incorrect but within a given range, a range check won't reject it Validation will pick up errors that verification does not Verification will pick up errors that validation does not Verification can sometimes be carried out by the user Validation is always carried out by the computer (6)

You might also like