CS183 2008ans
CS183 2008ans
CS183 2008ans
UNIVERSITY OF SURREY ©
Level 1 Examination
********************************************************
ANSWERS
********************************************************
*IMPORTANT*
WRITE YOUR URN HERE …………………………………………………
A. analysis
B. design
C. implementation
D. planning
E. system delivery
A. modular development
B. rapid application development
C. prototyping
D. agile development
E. throwaway prototyping
A. a long time elapses between completion of the system proposal and the
delivery of the system
B. it identifies system requirements long before programming begins
C. it minimizes changes to the requirements as the project proceeds
D. the design must be completely specified on paper before programming begins
E. a long time elapses between completion of the system proposal and the
delivery of the system and the design must be completely specified
(usually on paper) before programming begins
7. If the system under development will employ technology with which the analysts
and programmers are unfamiliar, the most appropriate methodology to employ is:
A. Waterfall Development
B. Throw-Away Prototyping
C. Parallel Development
D. Phased Development
E. Prototyping
A. parallel
B. phased
C. prototyping
D. throwaway prototyping
E. waterfall
A. Parallel Development
B. Phased Development
C. Prototyping
D. Throw-Away Prototyping
E. Waterfall Development
10. _____ development is a structured design methodology that divides the project
into a series of distinct subprojects that can be designed and implemented
together.
A. Parallel
B. Phased
C. Prototyping
D. Rapid Application
E. Throwaway Prototyping
SEE NEXT PAGE
CS/183/23/SS08 - Page 5 - SOLUTIONS
11. The _____ is generated by the department or person that has an idea for a new
information system.
A. feasibility analysis
B. gradual refinement
C. project sponsor
D. system request
E. work plan
A. interviews.
B. JAD (Joint Application Design) sessions.
C. questionnaires.
D. document analysis.
E. observation.
13. In a JAD (Joint Application Design) Session, which of the following is NOT a
proper role for the facilitator?
14. During document analysis the systems analyst learns that users in the purchasing
department have created their own forms. This is a clear sign that the _____.
15. During an interview, the following question is asked; "How many times during a
typical week does a customer complain about inadequate service following a
sale?" This question is an example of a(n) _____________
A. probing question.
B. open-ended question.
C. closed-ended question.
D. inappropriate question.
E. opinion question.
16. A systems analyst has prepared an interview that begins with specific, detailed
questions, and then asks the interviewee to make general statements about policies
and procedure of the business process. This is a(n) _____ interview structure.
A. bottom up
B. closed
C. open ended
D. probing
E. top down
17. The examination of existing paperwork in order to better understand the as-is
system is an example of what information-gathering strategy?
A. document analysis
B. interviewing
C. joint application design (JAD) sessions
D. observation
E. questionnaires
18. The information gathering technique that enables the analyst to collect facts and
opinions from a wide range of geographically dispersed people quickly and with
the least expense is the _____.
A. document analysis
B. interview
C. JAD session
D. observation
E. questionnaire
A. waterfall development
B. parallel development
C. phased development
D. prototyping
E. prototyping and throwaway prototyping
20. Which of the following development strategies is preferred when the business
need is common and time is a limiting factor?
A. use case.
B. object.
C. activity diagram.
D. message.
E. method.
SEE NEXT PAGE
CS/183/23/SS08 - Page 8 - SOLUTIONS
22. The Unified Modeling Language diagramming technique that illustrates the
objects and messages involved in a use case is the _____________
23. Each use case describes how the system reacts to a(n) _____ that occurs to trigger
the system.
A. activity
B. event
C. model
D. session
E. transition
24. Which of the following is often left out by end users when identifying elements
within Use Case steps?
25. When developing use cases, the project team first identifies the _______.
26. Validating that the use case is correct and complete is the major activity
performed during which step of the Writing Use Case Reports process?
A.
B.
C.
D.
E.
A. association relationship
B. extend relationship
C. include relationship
D. generalization relationship
E. optional relationship
SEE NEXT PAGE
CS/183/23/SS08 - Page 10 - SOLUTIONS
32. Manipulating certain parameters to refine the way features work in a software
package is called ______.
A. a workaround
B. adjustment
C. customization
D. feature adjustability
E. parameterizing
SEE NEXT PAGE
CS/183/23/SS08 - Page 11 - SOLUTIONS
A. generalization
B. association
C. aggregation
D. subsetting
E. vague
A. generalization
B. association
C. aggregation
D. subsetting
E. vague
A. student
B. patient
C. James
D. customer
E. doctor
A. attribute
B. behaviour
C. operation
D. message
E. instance
38. Which of the following is NOT one of the four basic functions of a computer
application?
A. application logic
B. data access logic
C. data storage
D. networking logic
E. presentation logic
39. Assume that your network has a server and three clients, the network is an
example of a(n) _____.
A. 4-tiered architecture
B. single-tiered architecture
C. three-tiered architecture
D. tierless architecture
E. two-tiered architecture
40. A server in a typical client-server based system performs which of the following
application functions?
A. application logic
B. data access logic and presentation logic
C. data storage and data access logic
D. data storage and presentation logic
E. presentation logic and application logic
SEE NEXT PAGE
CS/183/23/SS08 - Page 13 - SOLUTIONS
42. Which of the following is NOT one of the fundamental computing architectures?
A. Client-based computing
B. System-based computing
C. Server-based computing
D. Client-server based computing
43. An analyst depicts the static view of an information system with ______.
A. use-case models
B. structural models
C. behavioural models
D. interaction diagrams
E. statechart diagrams
45. In a sequence diagram, an analyst draws a lifeline with an X at the end. This
lifeline represents _____.
46. The UML diagramming technique that shows the different state that a single
object passes through in reponse to events is a(n) _____ diagram.
A. class
B. sequence
C. behavioural state machine
D. use case
E. component
47. In a sequence diagram, an analyst draws a long box shape on top of a lifeline. This
box represents _____.
A. right to left
B. bottom to top
C. left to right
D. top to bottom
E. left to right, top to bottom
49. The process of building new systems by combining packaged software, existing
legacy systems, and new software written to integrate everything together is called
______.
A. customization
B. formal methodology
C. outsourcing
D. systems integration
E. workaround
50. Which of the following is not a fundamental way to approach the creation of a
new information system?
52. A(n) _____ file stores past transactions that may no longer be needed, is usually
stored off-line, and can be accessed on an as-needed basis.
A. audit
B. history
C. look-up
D. master
E. transaction
SEE NEXT PAGE
CS/183/23/SS08 - Page 16 - SOLUTIONS
53. The process of adding redundancy back into a physical data model is known as
_____.
A. balancing
B. clustering
C. denormalization
D. indexing
E. normalization
54. The most efficient tables in a relational database in terms of storage space have
_____.
55. ______ is the general template used to define and create specific instances or
objects.
A. a class
B. inheritance
C. a message
D. polymorphism
E. a method
56. ______ is essentially a function or procedure call from one object to another, and
is the information sent to objects to trigger methods.
A. encapsulation
B. information hiding
C. inheritance
D. a message
E. polymorphism
A. internal hackers.
B. industrial espionage.
C. device failure.
D. viruses.
E. natural disasters.
58. When all files are regularly tested for worms, bugs, and illicit programs; this is an
example of _____ requirements.
A. access control
B. encryption and authentication
C. portability
D. technical environment
E. virus control
59. A file that stores information on who, when, and how data was altered is a(n)
______ file.
A. audit
B. history
C. look-up
D. master
E. transaction
A. storage efficiency.
B. indexing scheme.
C. access speed.
D. multiple dimensions.
E. none of the above.
61. The ability of the same message to be interpreted differently by different classes
of objects is referred to as _____________
A. encapsulation.
B. polymorphism.
C. inheritance.
D. association.
E. None of the above.
62. When the analyst is evaluating a data model to ensure that all fields in a record
depend fully on the entire primary key, which step of normalization is being
performed?
63. If the logical data model contains fields that depend on another non-primary key
field, then it is in violation of the rules of _____.
64. The process of ensuring that values linking tables together through the primary
and foreign keys are valid and correctly synchronized is _____.
A. hierarchical integrity
B. primary integrity
C. table integrity
D. referential unity
E. referential integrity
SEE NEXT PAGE
CS/183/23/SS08 - Page 19 - SOLUTIONS
65. In order to reduce the number of joins that must be performed in a query and to
increase the speed of data access, the data analyst can _____ the physical model.
A. cluster
B. denormalize
C. index
D. normalize
E. optimize
67. The plan for the creation of the hardware and software infrastructure is commonly
called _____.
A. architecture design
B. hardware specifications
C. software specifications
D. network model
E. presentation logic
68. The number of errors found is likely to be highest in the _____ stage of testing.
A. unit test
B. integration test
C. system test
D. acceptance test (alpha)
E. acceptance test (beta)
69. _____ is the development of all parts of the new system including the software,
documentation, and initiation of new operating procedures.
A. Construction
B. Design
C. Documentation
D. Management
E. Testing
ii) The Doctor, Patient and Management are called ‘actors’ in this kind of diagram.
This term is particularly appropriate because they refer to ‘roles’ and not
necessarily particular people. In a movie, a movie actor plays a part, or role. For
example Patient refers to the role of being a patient, and not any particular one
patient. Indeed, here, there are many such possible patients, shown on the diagram
as one Patient actor (i.e. role).
[4 marks]
(b)
CS/183/23/SS08 - Page 22 - SOLUTIONS
Use cases are shown in this diagram as ovals. The ‘New Patient’ and ‘Old Patient’ are
specialised actors, which are generalised (shown by an arrow) to the ‘Patient’ actor. The
‘Update Patient Information’ use case extends the ‘Make Old Patient Appointment’ use
case because sometimes the patient information is updated (the New Patient doesn’t have
this because a record cannot be updated before it is created). Similarly, the ‘Make Payment
Arrangements’ use case is an extension of the generalised (for both old and new patients)
Make Appointment use case, because sometimes new payment arrangements are made.
The Make ‘Old’ and ‘New’ Patient Appointment use cases are generalised to the ‘Make
Appointment’ use case. A new patient record is always created by the ‘Create New
Patient’ use case, when an appointment is made for a New patient, using the ‘Make New
Patient Appointment’ use case, so <<includes>> is used here. Similarly, when the
Management ‘Produce Schedule Information’, and a Doctor ‘Records Availability’, the
Manage Schedule use case is always invoked, so <<includes>> is also used here. (Note:
many use case diagrams do not use the * multiplicity syntax, so no marks will be lost if
they are not included here.)
Use Cases 1 mark each+1 mark for each actor+1 mark for each generalisation+ 1 mark for
each extend or include =[21 marks]
(c)
CS/183/23/SS08 - Page 23 - SOLUTIONS
Specialised actors for GP(General Practitioner) and Specialist can be added as shown,
generalised to Doctor, using the generalisation arrow – see diagram above [3 marks].
(a)
scribe (or scribes): assists the facilitator by recording notes, making copies
(sometimes using CASE tools for this). Basically a scribe acts as a secretary and does
not actually take part in the discussion.
facilitator: a person who sets the meeting agenda and guides the discussion, but does
not join in the discussion as a participant. He/she does not provide ideas or opinions
on the topics under discussion, remaining neutral throughout the session. However,
the facilitator does write group points and conclusions on a board/flipchart for all to
see. The facilitator must be an expert in both group process techniques and IS analysis
and design techniques.
agenda merry-go-round: this is when a group member keeps returning to the same
issue every few minutes and won't let go. One solution is to let the person have 5
minutes to ramble on, while every point is carefully written on a flip-chart. Then at
future occasions, the flip chart can be referred to whenever the person raises the point
again.
side discussions: this is a problem in a JAD session, when some participants persist in
private discussions with the person sitting next to them rather than taking part openly
in the group session. This can often be resolved by walking over to where they are
sitting.
violent agreement: is when participants really agree on the issues, but don't realise
they are agreeing because they are using different terms. For example, one might
argue that a glass is half full, whereas the other might be arguing that it is half empty.
To solve this, the facilitator has to translate the terms into different words to find
common ground so that the parties realise that they really agree.
[2 marks for each = 10 marks]
(b)
Interviews:
(1) Selecting interviewees: make schedule or list of all people to be interviewed.
(2) Designing interview questions: designing closed-ended, open-ended, or probing
questions.
(3) Preparing for the interview: create interview plan, anticipating possible answers
and providing follow-up questions.
(4) Conducting the interview: build up rapport and trust, explain why the questions
are being asked, present an unbiased view, take careful notes, and make sure every
answer is understood.
(5) Post-interview follow-up: prepare interview report, often also sending this to the
interviewees for approval/clarification (with thanks).
[one mark for each listed plus one for each explanation = 10 marks]
(c) List the other THREE main information-gathering techniques used in the analysis
phase.
(1) Document analysis
(2) Questionnaires
(3) Observation
CS/183/23/SS08 - Page 24 - SOLUTIONS
(d) JAD Sessions and Interviews provide the greatest amount of detail (greatest depth).
They both also help the analyst to understand the reasons behind the information
provided. They are useful for obtaining not only facts and figures, but also an
understanding of why those facts and opinions exist. (In contrast, document analysis
and observation really only are useful for obtaining facts. Questionnaires can provide
medium depth, regarding both facts and opinions, but obtain little understanding of
why.)
[4 marks]
(e) Interviews and JAD Sessions are the most costly; both having what might be called
‘moderate’ costs. JAD Sessions are much more expensive initially, because many
users and highly-paid managers and consultants need to be away from their offices for
a long period of time, BUT since JAD Sessions can significantly reduce the time
spent in design and information integration, that cost is offset in the long term.
Interviews have moderate costs because although personnel are removed from their
offices, it is generally one at a time, and therefore has less impact on productivity.
[3 marks]
EXAMINER: Dr J. Y. Clark