0 ratings0% found this document useful (0 votes) 15 views15 pagesTill MJ 2012 ICT CAHPTER 7,8,9
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
14. Joan owns a small company. She wishes to replace the existing computerised system with
‘anew one. She has employed a systems analyst, Jasvir, to plan this.
(a) Before Jasvir decides on a system he must collect information about the existing
system. Tick whether the following statements about the various methods of information
collection are TRUE or FALSE.
TRUE
FALSE
Examining documents has to be done in the presence of all the workers
‘Appointments have to be made with a worker in order to complete a
questionnaire
Its possible to change questions in the course of an interview
‘Observing the current system can provide a detailed view of the
workings of the system
{b) After Jasvir has completed the analysis of the existing system, he will need to design
the new system. Tick four items which would need to be designed.
(4
Inputs to the current system
User and information requirements
Data capture forms
Validation routines
Problems with the current system
File structure
Report layouts
Limitations of the system
(4)
For
examiners
Use14 (a)
True [False
Mia
Examining documents has to be done in the presence of al the ol;
workers,
‘Appointments have to made with a worker in order to complete al,
a questionnaire,
Itis possible to change questions in the course of an interview. | 1
‘Observing the current system can provide a detailed view of | :
the workings of the system.
(©)
Inputs to the current system
User and information requirements
Data capture forms: v |la
Validation routines v |ia
Problems with the currant system
File structure v |la
Repor layouts v |la
Limitations of the system
15 After a system is designed it will be implemented. Give one advantage of each of the
following methods of implementation.
Direct changeover
Parallel running
Phased implementation
3
16 After a system has been implemented it needs to be evaluated. Identify two evaluation
strategies and state a reason why each is needed.
Strategy 1
Reason 1
Strategy 2
4]
QP
a2
rs15 (a) | Direct changeover 1
(b) | Parallel running 1
(€) | Phased/Pilot running 1
16 | Two strategies and two reasons from
User testing
To ensure system meets the needs of the user
Other answers will depend on method of implementation e.g.
Phased implementation
(User) testing each module with normallive data
To see how system behaves in an ordinary day to day situation/system works as
‘you would expect i.e. no error messages
(User) testing each module with abnormaljextreme data
To see how system reacts in unusual circumstances/to make sure error messages
‘appear when data is abnormal
Direct changeover
(User) testing whole system
To ensure the whole system works when all modules are combined
Parallel running
[AffalYSIS of user's results
‘To compare the two systems/to ensure all processing/calculations is/are accurate | 2+2
10 Describe the three types of test data:
Normal
Abnormal
Extreme
410. Three from:
Normal data — data within a (given) range/appropriate for that data type (1)
‘Abnormal data — data outside the range/of the wrong data type (1)
Extreme data — data on the boundaries of the range (1) BI14 John owns a small company. He wishes to replace the existing computerised system with a
new one. He has employed a systems analyst, Iqbal, to plan this.
(@) Iqbal will need to collect information about the existing system. Describe three
methods he could use to do this.
1
[3]
(b) Iqbal has completed the JARIYSIS of the existing system. Describe thr
structure which he would need to design for the new system.
1
8
(c) After a system is designed it will be implemented. Describe each of the following
methods of implementation.
(i) Direct changeover
(ii) Parallel running
i) Phased implementation
(iv) Pilot running
For
Examiners
For
Examiner's14 (@) Three from:
Examining documents about the system
Distribute questionnaires to users of the system
Interview users of the system
Observing the system/staff
(b) Three from:
Field name
Field type
Key field
Field length
Validation checkirules
(C) Direct changeover — new system replaces existing system immediately/overnight (1)
Parallel running ~ new system runs alongside/together with existing system (1)
Phased implementation — new system is implemented part by part (1)
Pilot running — system is implemented in one branch/one office (at a time) (1)
19 Describe two methods of data verification.
19 Describe two methods of data verification.
1
(4)
8)
8)
4
Examiners
Use19. Two from:
Visual verification/checking
Read through data on screen
‘Compare with source document 2
Two from
Double data entry
Data is typed in twice by one typist
Data is typed in by two operators
‘Computer compares versions
If different freezes/sounds buzzer re12. Alan owns a small company. He wishes to replace the existing computerised system with a
new one. He has employed a systems analyst, José, to plan this,
(a) José will collect information about the existing system and design the new system. Tick
whether the following statements are TRUE or FALSE.
TRUE | FALSE
[Defining a field length is part of the design of the file structure
[Screen layouts are designed before the system is implemented
|The new system is evaluated before it is designed
|The existing system is analysed before the new system is designed
(4)
(b) Name and describe three types of test data which are used when testing a system.
1
(c) After the system has been implemented it will be evaluated. Tick four activities which
José will need to carry out as part of the evaluation,
Produce user documentation
Design the new system
‘Compare the solution with the original task requirements
Analyse the existing system
Identity any limitations of the system,
Identity any necessary improvements to the system
Analyse the users’ responses to the results of testing the system
Produce technical documentation
(4)
For
Examiners(d) Part of José’s job will be to produce both technical and user documentation for the new | — for
system. For each type of documentation give two reasons why itis needed, Examiners
‘Use
Technical documentation
Reason 1
Reason 2
User documentation
Reason 1
Reason 2
4)12 (a)
(b)
()
(d)
a)
a)
~ ja)
True | False
Defining field length is part of the design of the fle structure v
Screen layouts are designed before the system is implemented v
‘The new system is evaluated before it is designed
‘The existing system is analysed before the new system is designed |
a)
‘Abnormal data — data outside the range/of the wrong data type (1)
Extreme data — data on the boundaries of the range (1)
Normal data — data within a (given) range/appropriate for that data type (1)
Produce user documentation
Design the new system
‘Compare the solution with the original task requirements
(1)
Analyse the existing system
Identify any limitations of the system
(1)
Identify any necessary improvements to the system
(1)
Analyse the users’ responses to the results of testing the system
(1)
Produce technical documentation
Technical documentation
Two from:
‘So improvements can be made to syste
To know how to repair system
To know how to maintain system
User documentation
Two from:
Help users to learn/know how to use system
Help users to overcome problems
16 Explain the difference between phishing and pharming.
4)
B31
[4]
2)
(2)
For
Examiners
Use
(3)16 Three from:
Phishing is done by email
Can invite you to go to a website/respond to an email
Pharming is done by installing malicious code on a pc or server
Redirects a genuine website's traffic to hacker's website
3. Tick TRUE or FALSE next to each of these statements about methods of implementation
I
For
Examiners
13. The use of computor networks can lead to problems of keeping data secure and
‘confidential. Two methods of overcoming this are the use of authentication techniques and
data encryption,
(a) Describe two authentication techniques.
1
(b) Describe data encryption.
TRUE | FALSE
Direct changeover needs two sets of workers to be employed
Parallel running means that the original system is still available
Phased implementation is implementing the system in parts
Parallel running is the cheapest form of implementation
4]
True | False
Direct changeover needs two sets of workers to be employed y |
Parallel running means that the original system is still available viv la
Phased implementation is implementing the system in parts v a
Parallel running is the cheapest form of implementation vim
(4)1 Aa) Adie
User ID and one of password/PINimemorable data — password has to be entered before
access is gained/password can be changed frequently to avoid hackers guessing
them/unsuccessful logins can throw you out of the system
Magnetic stripe/smart cardielectronic key/bar code system/ID cardiDongle
Prevents people without cards accessing system
Biometric data
Fingerprintiretina/irisiface/voice recognition used as input/biometric data is difficult to
replicate/is unique [2]
{b) Two from:
Key needed to encrypt
Data is jumbled up
Key must be known to decrypt it
Prevents people from understanding data/reading data 2
14. Sarbjit owns a small company with little money to spare. He wishes to replace the existing | For
computerised system with a new one. He has already made backups of the existing | swminors
system. He has employed a systems analyst, Tom, to plan the new system. ca
(a) Tom wishes to collect information about the existing system.
Give four methods he could use and for each give @ reason why it would be used.
Method 1
Reason,
Method 2
Reason
Method 3
Reason,
[8]
(b) Tom will need to design the file structure of the new system. List four items which
would need to be included in this design.
Aor amet 7 (4)(c) After the system is developed it will be implemented. Describe the most appropriate
method Sarbjit should choose giving two reasons.
Method
Reason 1
Reason 2 |
14 (a) Interview
4
Can change questions in light of previous answers/interviewer can detect body language
Questionnaire
Quicker to get every worker's response/easier to collate responses
Examining documents
Can see exact details of inputs and outputs
Observation
Easier to see data flow/can get more accurate overview of whole system
(b) Four from:
Field name
Field type
Key field
Field length
Validation check/rules
(€) Direct changeover
Two from:
Cannot afford to pay two sets of workers
Would give him immediate benefits
Does not need to set up pilot scheme ~ small company
A test is marked out of 20 and recorded as an integer. Tick whether each of the following
marks is an example of abnormal data or extreme data.
Abnormal
Extreme
20
24
twenty
(4)
For
Examinors
Use
(1)
(1)
(1)
tt)
(1)
(1)
oy
a)
(4)
(2)
ForAbnormal | Extreme
[o> [| |= |
a ¥
twenty ‘a
0 ¥
412 Name and describe three validation checks which could be carried out on a 16-digit credit
card number when itis typed into @ computer.
Name .,
Description
Name
Description
Name
42 Three pairs from:
Length check
Checks there are exactly 16 characters
Invalid characteritype check
Checks all characters entered are digits
Check digit
4
Single digit calculated from other digits appended to these, computer carries out fresh calculation
on digit and compares answer with original check digit.
Existency check
Is the card number on the database
(6)15 Gita has employed Johann, a systems analyst, to create a new database system for her car
sales business. She only sells cars made by Rock and only the models Feisty, Mendo and
Galactica in red, blue or gold. Most of the cars have air conditioning but some do not. She
sells 3, 4 and 5 door cars.
(a) Give a reason why would it not be sensible to have a Make field in the database.
(b) Complete the design table below giving the field names which would be used in the
database and describing the most appropriate validation check which could be carried
‘out on each field,
Field name
Validation check
Model
i}
Examiners(c) Discuss verification and validation.
415 (a) Would always be the same contents/waste space putting in duplicated field (1
(b)
Validation check
Must be Feisty or Mendo or Galactica
Must be red, blue or gold
Air conditioning Boolean check - Must be yes or no
Number of doors} Range check >2 AND <6 /
7
(c) Six from:
Validation is the checking that data is reasonable or acceptable
Verification is checking that data has been accurately copied from one medium to another.
Verification does not check that data is correct
If original data is incorrect it will still be incorrect after it has been copied accurately
Validation does not check that dat correct
If, for example, data is incorrect but within a given range, a range check won't reject it
Validation will pick up errors that verification does not
Verification will pick up errors that validation does not
Verification can sometimes be carried out by the user
Validation is always carried out by the computer (6)