University of Surrey ©: CS/183/17/SS06

Download as pdf or txt
Download as pdf or txt
You are on page 1of 17

CS/183/17/SS06

UNIVERSITY OF SURREY ©

BSc Programmes in Computing

Level 1 Examination

CS183: Systems Analysis and Design

Time allowed: 2 hours Spring Semester 2006

Answer ALL questions in Section A


and TWO questions from Section B.

If any candidate attempts more than TWO questions from Section B,


only the best TWO solutions will be taken into account.
Calculators are not permitted.

*IMPORTANT*
WRITE YOUR URN HERE . . . . . . . . . . . . . . . . . . . . . . . . . .

THIS QUESTION PAPER SHOULD BE HANDED IN AT THE END OF THE


EXAMINATION.

SEE NEXT PAGE


CS/183/17/SS06 - Page 2 -

SECTION A - Answer ALL 50 questions in this section [one mark each].


These questions are multiple choice. You should choose only one answer for
each question by ringing (circling) the letter of your choice on the paper.

1. The process of understanding how an information system can support business needs,
design the system, build it, and deliver it to users is the _____.

A. analysis phase of the SDLC


B. object oriented approach
C. rule for creating a CASE tool
D. systems development life cycle
E. waterfall development methodology

2. The primary goal of the systems analyst is to _____.

A. acquire a working tool


B. create a wonderful system
C. make a significant business impact
D. establish the three phases of the SDLC
E. purchase a silver bullet

3. The _____ is generated by the department or person that has an idea for a new
information system.

A. feasibility analysis
B. gradual refinement
C. project sponsor
D. system request
E. work plan

4. In which phase of the SDLC is the system proposal developed?

A. analysis
B. design
C. implementation
D. planning
E. system delivery
SEE NEXT PAGE
CS/183/17/SS06 - Page 3 -

5. The analysis phase of the SDLC answers which questions _____.

A. who will create the system and when will it be used


B. who will the system be for, what the system will do, when will it be used, and where
will it be used
C. why build the system, what the system will be, and how the system will work
D. why build the system, who will the system be for, when will it be used, and how the
system will work
E. why build the system, who will the system be for, when will it be used, and where
will it be used

6. The principal disadvantages(s) with the waterfall development methodology is (are)


_____.

A. a long time elapses between completion of the system proposal and the delivery of the
system
B. it identifies system requirements long before programming begins
C. it minimizes changes to the requirements as the project proceeds
D. the design must be completely specified on paper before programming begins
E. a long time elapses between completion of the system proposal and the delivery of the
system and the design must be completely specified on paper before programming
begins

7. Objects can be thought of as little modules that encapsulate _____.

A. Techniques for system development


B. Data and processes
C. Other objects
D. System specifications
E. Business operations

SEE NEXT PAGE


CS/183/17/SS06 - Page 4 -

8. The distinction between a class and an object is _____________________.

A. A class is a template for creating objects, while an object is an instance of a class


B. An object is a template for creating objects, while a class is an instance of an object
C. Classes can be instantiated from objects, while the opposite is not true
D. Classes and objects both are templates only, but classes provide a more complete
template
E. Neither a class nor an object is a template, but objects are better suited for system
development

9. Each object has _______ that specify information about the object.

A. Methods
B. Messages
C. Procedures
D. Other objects
E. Attributes

10. ________ implement an object’s behaviour.

A. Methods
B. Messages
C. Procedures
D. Other objects
E. Attributes

11. _________ are instructions sent to an object that in turn trigger methods.

A. Data
B. Messages
C. Procedures
D. Other objects
E. Attributes

SEE NEXT PAGE


CS/183/17/SS06 - Page 5 -

12. According to the principle of inheritance, ________________________

A. A superclass inherits methods and attributes from its subclass


B. A subclass inherits messages and data from its superclass
C. A superclass inherits messages and data from its subclass
D. A class can inherit methods and attributes from every other class
E. A subclass inherits methods and attributes from its superclass

13. _____ means that the same message can be interpreted differently by different classes of
objects.

A. Inheritance
B. Encapsulation
C. Polymorphism
D. Information Hiding
E. Dynamic Binding

14. _______ is an example of functional requirements.

A. The system should work with any web browser


B. The system should load any web page within 3 seconds
C. Customers should be able to see their orders after authentication
D. The system should comply with the company’s policy of buying all PCs and servers
from Dell
E. The system should be able to search all available inventory in order to determine
whether a product can be made by a given date

15. The most commonly used information-gathering technique is _____.

A. interviewing
B. joint application design (JAD) sessions
C. document analysis
D. observation
E. questionnaires

SEE NEXT PAGE


CS/183/17/SS06 - Page 6 -

16. During an interview, the following question is asked; “How many times during a typical
week does a customer complain about inadequate service following a sale?” This question
is an example of a (n) _____ question.

A. Opinion-generating
B. Eye-opening
C. open-ended
D. closed-ended
E. probing

17. The information gathering technique that is most effective in combining information from
a variety of perspectives, building consensus, and resolving discrepancies is a(n) _____.

A. document analysis
B. interview
C. joint application development
D. observation
E. questionnaire

18. The information gathering technique that enables the analyst to collect facts and opinions
from a wide range of geographically dispersed people quickly and with the least expense
is the _____.

A. document analysis
B. interview
C. JAD session
D. observation
E. questionnaire

SEE NEXT PAGE


CS/183/17/SS06 - Page 7 -

19. Which of the following diagramming symbols represents a use case in a use case
diagram?

A.

B.

C.

D.

E.

20. Which of the following diagramming symbols represents a generalization relationship in


a use case diagram?

A.

B.

C.

D.

E.

SEE NEXT PAGE


CS/183/17/SS06 - Page 8 -

21. The event that causes a use case to begin is called a(n) _____.

A. action
B. trigger
C. hammer
D. anvil
E. stakeholder

22. Which of the following relationships represent the extension of the functionality of the
use case to cover optional behaviour?

A. association relationship
B. extend relationship
C. include relationship
D. generalization relationship
E. optional relationship

23. Which of the following are used to create objects?

A. concrete objects
B. abstract objects
C. concrete classes
D. abstract classes
E. concrete instances

24. Which of the following would most likely not be an example of an attribute?

A. employee name
B. customer address
C. stock number
D. ISBN number
E. cancel appointment

SEE NEXT PAGE


CS/183/17/SS06 - Page 9 -

25. A(n) _____ of an analysis class is where the behaviour of the class is defined.

A. operation
B. attribute
C. class
D. object
E. abstract class

26. “A-kind-of” relationships represent _____ relationships.

A. generalization
B. association
C. aggregation
D. subsetting
E. vague

27. “A-part-of” or “has-parts” relationships represent _____ relationships.

A. generalization
B. association
C. aggregation
D. subsetting
E. vague

28. Which of the following would not be an appropriate class name?

A. student
B. patient
C. John
D. customer
E. doctor

SEE NEXT PAGE


CS/183/17/SS06 - Page 10 -

29. An analyst depicts the static view of an information system with _____.

A. use-case models
B. structural models
C. behavioural models
D. interaction diagrams
E. statechart diagrams

30. A(n) _____ describes information about an object.

A. attribute
B. behaviour
C. operation
D. message
E. instance

31. A systems analyst draws a lifeline with an X at the end. This lifeline represents _____.

A. a message that cannot be delivered


B. an object that is destroyed at a point in time
C. a message that is delivered at that point in time
D. an object that is complete at that point in time
E. an object that arrives at its final destination

32. On a sequence diagram, an object name of Students:List would indicate that _____.

A. Students is an instance of the List class that contains individual student objects
B. List is an instance of the Students class
C. List is a method of the Students class
D. the Students and Lists objects are combined for that step in the sequence diagram
E. a message is being passed from the Students class to the List class

SEE NEXT PAGE


CS/183/17/SS06 - Page 11 -

33. The order of messages on a sequence diagram goes from ____ to _____.

A. right to left
B. bottom to top
C. left to right
D. top to bottom
E. left to right, top to bottom

34. Which of the following is not a fundamental way to approach the creation of a new
information system?

A. develop a custom application in-house


B. rely on an external vendor to build the system
C. purchase a software package and customize it
D. rely on end-users to develop it themselves
E. all of the above are ways to create new information systems

35. An advantage of custom development is that the organization can _____.

A. accept functionality that is not a perfect fit


B. build technical skills and functional knowledge
C. install in a short period of time
D. remove all risk from the project
E. save money on the purchase

36. The process of building new systems by combining packaged software, existing legacy
systems, and new software written to integrate everything together is called _____.

A. customization
B. formal methodology
C. outsourcing
D. systems integration
E. workaround

SEE NEXT PAGE


CS/183/17/SS06 - Page 12 -

37. Manipulating certain parameters to refine the way features work in a software package is
called _____.

A. a workaround
B. adjustment
C. customization
D. feature adjustability
E. parameterizing

38. What is one primary problem with server-based computing architectures?

A. As more users place heavier demands on the server, it is expensive to increase server
capacity.
B. Client terminals are no longer made by hardware vendors.
C. It is difficult to maintain security in the server-based environment.
D. Servers are no longer made by hardware vendors.
E. Servers cannot be manufactured quickly by vendors.

39. In an n-tiered architecture, the _____ is (are) spread across two or more different sets of
servers.

A. presentation logic
B. application logic
C. data access logic
D. data storage
E. presentation logic, application logic, data access logic or data storage

40. A(n) _____ is basically an electronic list of information that is stored on a disk.

A. sequential access file


B. unordered sequential access file
C. ordered sequential access file
D. random access file
E. transaction file

SEE NEXT PAGE


CS/183/17/SS06 - Page 13 -

41. The process of ensuring that values linking tables together through the primary and
foreign keys are valid and correctly synchronized is _____.

A. hierarchical integrity
B. primary integrity
C. table integrity
D. referential unity
E. referential integrity

42. A data model that does not contain repeating fields and leads to tables containing fields
that are dependent on a whole primary key is in _____ normal form.

A. balanced
B. first
C. primary
D. second
E. third

43. If the logical data model contains fields that depend on another non-primary key field,
then it is in violation of the rules of _____.

A. base normal form


B. first normal form
C. non-normal form
D. second normal form
E. third normal form

44. In order to reduce the number of joins that must be performed in a query and to increase
the speed of data access, the data analyst will _____ the physical model.

A. cluster
B. denormalize
C. index
D. normalize
E. optimize

SEE NEXT PAGE


CS/183/17/SS06 - Page 14 -

45. _____ is the development of all parts of the new system including the software,
documentation, and new operating procedures.

A. Construction
B. Design
C. Documentation
D. Management
E. Testing

46. The cost of fixing one major bug after the system is installed can easily exceed the _____.

A. annual salary of a programmer


B. cost of one week’s work as a programmer
C. cost of two weeks’ work as a programmer
D. entire cost of the programming project
E. value of the entire systems team

47. The number of errors found will be highest in the _____ stage of testing.

A. unit test
B. integration test
C. system test
D. acceptance test (alpha)
E. acceptance test (beta)

48. _____ documentation is designed to help programmers and systems analysts understand
the application software and maintain it after the system is installed.

A. Acceptance
B. Integration
C. Navigation
D. System
E. User

SEE NEXT PAGE


CS/183/17/SS06 - Page 15 -

49. Which of the following is the most costly aspect of the installation process?

A. change management
B. conversion
C. maintenance
D. training
E. analysis

50. Training for a business system should focus on _____.

A. all the capabilities of the new system


B. complex computerized modules and code
C. helping the users to accomplish their jobs
D. how to use the system
E. not using the system

[Total for Section A: 50 marks]

SEE NEXT PAGE FOR SECTION B


CS/183/17/SS06 - Page 16 -

SECTION B - Answer TWO questions in this section. You should answer this
section in the answerbook provided.

1. Consider the following Use Case Description. This relates to the scenario of a customer
placing an order with an online CD marketing company.

Use Case Name: Place Order ID: 3 Importance Level: High

Primary Actor: Customer Use Case Type: Detail, Essential

Stakeholders and Interests:Customer - wants to search website to purchase CD.


Marketing Manager - wants to maximise customer satisfaction.

Brief Description: This use case describes how customers can search the website and place orders.

Trigger: Customer visits website and places order


Type: External

Relationships:
Association: Customer
Include: Checkout, Maintain Order
Extend:
Generalization:

Normal Flow of Events:


1. The Customer submits a search request to the system.
2. The system provides the customer with a list of recommended CDs.
3. The Customer chooses one of the CDs to find out additional information..
4. The System provided the Customer with basic information and reviews on the CD.
5. The Customer calls the Maintain Order use case.
6. The Customer iterates over steps 3 through 5 until finished shopping.
7. The Customer executes the checkout use case.
8. The Customer leaves the website.

Subflows:

Alternate/exceptional flows:
3a-1. The Customer submits a new search request to the system.
3a-2. The Customer iterates over steps 2 through 3 until satisfied with search results or gives up.
7a. The Customer aborts the order.

(a) From the above use case description, draw a Unified Modeling Language (UML)
Sequence Diagram, showing the normal flow of events only.

Hint: The objects needed to describe this scenario are instances of the Search Request,
CD List, CD, Marketing Information, Customer, Review, Artist Information, Sample
Clip, Shopping Cart/Basket and Order classes.
[20 marks]

(b) Without drawing any further diagrams, describe the two main differences between
sequence diagrams and class diagrams.
[5 marks]
CS/183/17/SS06 - Page 17 -

2. This question is about Requirements Gathering (Requirements Determination).

(a) Joint Application Design (JAD) Sessions are often used to gather information during
the analysis phase of a project. List the five steps involved in the use of JAD Sessions
for requirements gathering.
[5 marks]
(b)
i) What are the three key functions of the facilitator during a JAD session?
[6 marks]

ii) What does a facilitator specifically not do during a JAD session?


[2 marks]

iii) What is the function of a scribe during a JAD session?


[2 marks]

(c) Interviews are another method commonly used for system requirements gathering.
List the five steps involved in the use of interviews, giving a short explanation of each
step.
[10 marks]

3. This question is about Class Diagrams. Consider the following scenario.

In Hogwits University Health Centre, the Health Team is made up of three doctors and
one or more secretaries. At busy times, one or more nurses join the team. All these
persons are a kind of employee at the health centre. Persons who visit the health centre
with at least one symptom are called patients. Each symptom may, or may not, be caused
by an illness.

(a) Construct a UML (Unified Modelling Language) Class Diagram using the
information provided in the above scenario. You should show aggregation,
generalisation, and other associations, together with multiplicity, where appropriate.

[21 marks]

(b) A treatment can be used to cure an illness, or relieve symptoms of that illness. Where
would you place a 'treatment' class on the diagram that you constructed in 3. (a)
above? You should add the 'treatment' class appropriately to your diagram, and
provide a clear explanation of your reasoning.
[4 marks]

[Total for Section B: 50 marks]

EXAMINER: Dr J. Y. Clark

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy