Search This Blog

Wednesday, 9 June 2010

c

© Institute for the Management of Information Systems –D.2008.
Page: 1 of 6
DIPLOMA
INFORMATION SYSTEMS BUILDING
(D 26)
MONDAY 8TH DECEMBER 2008
TIME: 14.00 –17.00 HOURS
DURATION: 3 HOURS
Candidates should attempt FIVE questions only. Clearly cross out
‘surplus’ answers; failure to do so will result in the first 5 answers being
marked.
No reference material of any kind may be taken into the examination.
[Turn over]
© Institute for the Management of Information Systems –D.2008.
Page: 2 of 6
Candidates should attempt FIVE questions only. Clearly cross out
‘surplus’ answers; failure to do so will result in the first 5 answers being
marked.
Question 1.
As a system developer for a design company, you have been asked to work
on a new project to introduce National Identity cards in another country.
Discuss your obligations and concerns as a computer professional when
working on such a project under the following headings:-
a) Professional. ( 5 marks)
b) Society. ( 5 marks)
c) Legal. ( 5 marks)
d) Personal values. ( 5 marks)
(Total 20 marks)
Question 2.
MusicMax is an Internet music CD retailer.
 MusicMax orders CDs from suppliers.
 CDs delivered are added to the MusicMax catalogue.
 Customers register their details to become members.
 Members can then login to the site.
 Members can browse the catalogue by artist or title.
Use the above description to create a level 1 Data Flow Diagram (DFD).
Include only those sub-processes mentioned in the description.
Marks will be awarded for:-
a) Correct diagram syntax. ( 4 marks)
b) Detailed diagram. (10 marks)
c) Completeness of solution. ( 4 marks)
d) Clear, easy to follow, well-structured diagram. ( 2 marks)
(Total 20 marks)
[Turn over]
© Institute for the Management of Information Systems –D.2008.
Page: 3 of 6
Question 3.
As a system designer, you have been asked to implement a contract
management database for Timberoak, a timber management company.
Clients take out a contract with Timberoak e.g. to chop down and remove an
old tree. The contract will require one or more employees. Employees need
sufficient skills to operate machinery and drive the vehicles.
 Timberoak has Employees for which it stores personal details which
allows them to be contacted by telephone.
 Qualifications achieved by employees are stored.
 Skills required for particular tasks e.g. ‘use a chainsaw’, ‘driving
licence’ are also stored.
 Timberoak has Contracts with clients. As well as client details, the
skills needed are stored.
Produce an entity-relationship diagram (ERD) that accurately models the
information listed above. Include on your diagram suitable attributes, and the
cardinality of each relationship.
You do not need to resolve many-to-many relationships or show participation
constraints.
Marks will be awarded for:-
a) Correct diagram syntax. ( 3 marks)
b) Good choice of entities, relationships and attributes. (10 marks)
c) Cardinality constraints. ( 4 marks)
d) Clear, easy to follow, well-structured diagram. ( 3 marks)
(Total 20 marks)
[Turn over]
© Institute for the Management of Information Systems –D.2008.
Page: 4 of 6
Question 4.
As a system designer, you have been asked to implement a contract
management database for Timberoak, a timber management company.
Clients take out a contract with Timberoak e.g. to chop down and remove an
old tree.
a) Why may it be difficult to involve the end users in the development
of this system? ( 4 marks)
b) Discuss the consequences of NOT involving the users in the
development process. ( 4 marks)
c) Describe how Timberoak managers may be involved in the
following stages of development:-
i) Analysis.
ii) Prototyping.
iii) Testing.
(12 marks)
(Total 20 marks)
Question 5.
As a system designer, you have been asked to implement a contract
management database for Timberoak, a timber management company.
Clients take out a contract with Timberoak e.g. to chop down and remove an
old tree.
a) Explain to the managers, with the aid of a diagram, the main stages
in the traditional (Waterfall) systems lifecycle for their system.
(12 marks)
b) What is a “legacy” information system? ( 2 marks)
c) Discuss the extra problems that could arise when developing
models based on legacy systems at Timberoak. ( 6 marks)
(Total 20 marks)
[Turn over]
© Institute for the Management of Information Systems –D.2008.
Page: 5 of 6
Question 6.
SuperSeat is a low budget airline which allows customers to book seats
online. The first screen in the booking process is entitled “Tell us your
requirements?”
a) In this version, the user will need to type in the responses to EACH
question. Identify and describe THREE different input validation
techniques that could be used, making clear which items they could
apply to in this version. ( 9 marks)
b) The input form could be improved by replacing the text boxes with
more suitable windows controls. Identify and describe THREE
different controls, making clear how they improve on the text boxes
they would replace. ( 9 marks)
c) Describe ONE other addition or change that would improve the
usability of the monochrome online form. ( 2 marks)
(Total 20 marks)
[Turn over]
© Institute for the Management of Information Systems –D.2008.
Page: 6 of 6
Question 7.
a) Name and describe THREE techniques used in fact finding to
determine system requirements. ( 6 marks)
b) Give ONE advantage of EACH technique. ( 3 marks)
c) One way in which a system developer can model behaviour is use
case.
Consider the scenario where a shop sells a pair of shoes to a
customer.
Use Case – Make a sale
1. Customer enters shop
….
….
…. Customer leaves shop
Insert no more than FIVE statements to complete the above use
case. ( 5 marks)
d) By using your part c) answer or otherwise, explain the terms:-
i) Actors.
ii) Includes relationship.
iii) Extends relationship.
( 6 marks)
(Total 20 marks)
Question 8.
DriveSafe is a car insurance company with many offices throughout Europe.
They have used a computer system to handle customer accounts for many
years but contact was by post or telephone. You have been called in by
Drivesafe to develop the system to allow customers to do business over the
Internet.
a) Discuss the security issues that need to be considered. ( 6 marks)
b) Describe how you might control customer access to the system.
( 6 marks)
c) Describe TWO suitable changeover techniques once the system is
ready. ( 8 marks)
(Total 20 marks)
END OF EXAMINATION.
© Institute for the Management of Information Systems –D.2008.
Page 1 of 8
D 26 –INFORMATION SYSTEMS BUILDING DECEMBER 2008
SOLUTIONS & MARKING SCHEME.
Question 1 answer.
The scenario is given to help candidates but answers on the topic in general are acceptable.
Many possible answers may be given. Allow some answers in different sections but only
once.(BIC)
Each section up to 5x1 points and 2x1 examples/explanation (max 5).
a) Profession
Follow standards/Code of Conduct e.g.of ISO/IMIS.
Responsibilities of/to:
Employees e.g. attempt work within competence.
Employers e.g. ensure employees have sufficient training.
(5 marks)
b) Society
Effect on Employment.
Job creation.
Job loss.
Job skills changed.
Personal privacy.
Sharing data.
Monitoring activity.
Digital divide.
Old/poor disadvantaged.
Public safety. (5 marks)
c) Legal
Comply with Acts on:
Data Protection.
Computer Misuse.
Copyright, Designs and Patents.
Investigatory Powers.
Human Rights.
Freedom of Information, et al.
Aware of laws in different countries.
Theft.
Piracy.
Hacking. (5 marks)
d) Personal
Morals.
Religious beliefs.
Integrity.
Keep up to date.
(5 marks)
(Total 20 marks)
© Institute for the Management of Information Systems –D.2008.
Page 2 of 8
Question 2 answer
Marks will be awarded for:-
i) Correct diagram syntax
4x1 correct symbols with suitable text (4 marks)
ii) Detailed diagram
10x1 correct elements (or equivalent) seen anywhere (10 marks)
iii) Completeness of solution
4 x 1 mark for 4 each suitable process
(4 marks)
iv) Clear, easy to follow, well-structured diagram
(2 marks)
(Total 20 marks)
Alternatives/
additions possible
Browse
Catalogue
Orders
Catalogue
Suppliers Supplier
Delivery
Supplier
Order
Sign Up
Customers
name address
login details
name address login
detail
Log In
login details try
Accept/reject response
Members
login details real
Title/artist
Title/artist
Item list/prices/availability
Item list/prices
order detail
Item list/quantity
order detail
delivery details/invoice
order number/
delivery list
process data flow entity
data store
© Institute for the Management of Information Systems –D.2008.
Page 3 of 8
Question 3 answer.
Marks to be awarded as follows:-
a) Correct diagram syntax. (3 marks)
b) Good choice of entities, relationships and attributes. (10 marks)
c) Cardinality constraints. (4 marks)
d) Clear, easy to follow, well-structured diagram. (3 marks)
(Total 20 marks)
© Institute for the Management of Information Systems –D.2008.
Page 4 of 8
Question 4 answer.
a) Users not involved because of:
Cognitive gap between users and developers.
Users not sure what they want.
Physical/geographical isolation.
Users lack skills/training.
Other possible.
(up to 4x1) + descriptions (up to 2x1). (max 4 marks)
b) Lack of involvement causes:
Users hostile to system.
Users do not get what they want.
. Users might get what they need without understanding that.
Users ‘blame’ system for errors.
Users avoid interaction with system.
(up to 4x1) + descriptions (up to 2x1). (max 4 marks)
c) Involvement in:
i. Analysis stage
Defining requirements.
Questionnaire completion.
Interview participation.
ii. Prototyping stage
Feedback on
screens/formats/dialogues/forms/reports.
iii. Testing stage
Scenario development.
Functional aspect.
General.
Multi-user simulations.
Inexperienced user exposure.
User acceptance.
Alpha and Beta phases.
(up to 12x1) + descriptions (up to 6x1). (max 12 marks)
(Total 20 marks)
© Institute for the Management of Information Systems –D.2008.
Page 5 of 8
Question 5 answer.
a) Waterfall
(Any 6 x 1) + descriptions (6 x 1) (12 marks)
b) Legacy system: An existing, working system (1) which is to be incorporated into/work
alongside a new system (1). (2 marks)
c) Problems:
Lack of documentation may mean system requires reverse engineering to see how it
works.
Cost already invested in legacy system makes it difficult to justify changes.
System critical systems may be difficult;/impossible/costly to interrupt.
Difficult to interface with older hardware.
End user resistance to changing ‘working’ system.
Other possible.
(Any 3 x 1) + descriptions (3 x 1) ( 6 marks)
(Total 20 marks)
Initiation
Feasibility
(Requirements) Analysis
Design
Implementation
Installation/Test
Maintain/Review
© Institute for the Management of Information Systems –D.2008.
Page 6 of 8
Question 6 answer.
a) Validate using:
Range/Type/Value/Length/Format/Lookup/Existence (any 3x1) + description (3x1)
+ suitable field (3x1).
e.g. Value Check. Must be one of a known list. Meals must be either Yes or No.
(9 marks)
b) Suitable controls ComboBox, DropDown List, Radio|Buttons, CheckBox, Calendar
(any 3x1) + descriptions (3x1) + suitable field (3x1).
e.g. Checkbox is a square box which toggles between ticked/empty when clicked for
Yes/No questions. Replace text box on meals required. (9 marks)
c) Improvements
Colour
Text size
Font
Graphics
Maps
Layout (any 2x1). (2 marks)
(Total 20 marks)
Question 7 answer.
a) and b) Fact finding techniques:
Interview.
Questionnaire.
Observation.
Document analysis.
Any (3x1) + description (3x1) + advantage (3x1).
e.g Interview is face-to-face conversation with users using prepared questions.
Advantage is the ability to ask follow-up questions and see facial responses
(9 marks)
c) Possible statements:
Customer browses shoes.
Customer tries shoes on.
Customer takes shoes to till.
Assistant uses till.
Customer pays.
Assistant wraps.
others possible. (5 marks)
d) Actors: People, software or other devices that interface with a system (1) e.g Customer,
assistant, till (1).
Includes: a common activity which can then be written as its own use case and included
as a step in others (1).
e.g. ‘Assistant uses till’ could be used in the sale of any item (1).
Extends: The customisation of an existing use case by the addition of extra steps (1).
e.g. Assistant uses till may be extended to include different methods of payment (1).
(6 marks)
(Total 20 marks)
© Institute for the Management of Information Systems –D.2008.
Page 7 of 8
Question 8 answer.
a) Security issues that could be considered.
Authentication: Users are who they seem to be.
Authorisation: Authenticated users only have permissions to access relevant data.
Privacy: Ensuring that data cannot be seen by unauthorised users, typically during data
transfer.
Integrity: Data sent/stored has not become corrupt in the process of sending/storing
Any (3x1) + description (3x1) (6 marks)
b) Control of customer access to the system, using:-
Username/Password.
Strong passwords.
Mandatory, frequent password changes.
Security Questions.
Digital certificates.
Biometrics.
Encryption.
Any (3x1) + description (3x1) (6 marks)
c) Any TWO changeover techniques from:-
Immediate –sudden changeover.
Parallel –old and new systems together.
Phased –partial parallel.
Pilot –trial.
Hybrid –a mixture.
Any (2x1) + description (2x2) + suitability (2x1) (8 marks)
(Total 20 marks)
© Institute for the Management of Information Systems –D.2008.
Page 8 of 8
Reading references:
[1] Main course text:
Hawryszkiewycz, I (2001)
Introduction to Systems Analysis & Design (5th Ed.)
Pearson Education. ISBN: 1740092805.
[2] Secondary course text:
Bocij, P., Chaffey, D., Greasley, A. & Hickie, S (2003)
Business Information Systems: Technology, Development & Management for the e-
Business (2nd Ed.)
Pearson Education. ISBN: 027365540X.
Question
No.
Learning
outcome
Reference
1 LO12 [2] Ch. 17
2 LO5 [1] Ch. 8
3 LO5 [1] Ch. 9 [2] Ch. 10
4 LO10 [1] Ch. 16 [2] Ch. 7
LO7 [2] Ch. 12 pp486-490
5 LO2 [1] Ch. 5 [2] Ch. 7 pp292-297
LO3 [1] Ch. 7 p164
6 LO6 [1] Ch. 14
LO9 [2] Ch. 11 pp454-567
LO13 [1] Ch. 14 p534 [2] Ch. 11 pp468-469
7 LO4, LO5 [1] Ch. 11 pp278-283
8 LO13 [2] Ch. 11 pp470-471, Ch. 15 pp613-626
LO11 [2] Ch. 12

No comments:

Post a Comment