You are on page 1of 6

School of Computing and Mathematics

Examination Session X, 201X


ITC548 System Analysis (PG)
This paper is for Distance Education (Distance), Study Centre Sydney and Study Centre
Melbourne students.

EXAM CONDITIONS:
This is a closed book exam
Scientific calculator is permitted
Notes are NOT permitted in the Exam
Bilingual Dictionary permitted (printed copy only, unmarked and unannotated) The
student may NOT retain the question paper

WRITING TIME: 2 hours plus 10 minutes reading time


Writing is permitted during reading time

MATERIALS SUPPLIED BY UNIVERSITY: 1 x 12 page answer booklet


1 x General purpose answer sheet (GPAS)

MATERIALS PERMITTED IN EXAMINATION: Ruler - any type


2B Pencil/Eraser

(No electronic aids are permitted e.g. laptops, phones)

NUMBER OF QUESTIONS: Part A: 15 Multiple Choice Questions


Part B: 6 Short Answer Questions

VALUE: 30%

INSTRUCTIONS TO CANDIDATES:

There are 2 parts to this exam:


 PART A has 15 multiple choice questions each worth 4 marks (60 marks in total).
 PART B has 6 short answer questions each worth 10 marks (60 marks in total).

STUDENT NAME: …………………………………………. STUDENT ID: ……………………….

SIGNATURE …………………………………………………………………………………………….

CALCULATOR USED (IF ANY) …………………...…………………………………………………

Session X, 201X – ITC548 Page 1 of 6


Several of the questions that follow are based on the Ridgeline Mountain Outfitters
(RMO) New Consolidated Sales and Marketing System (CSMS).
Part A (15 questions x 4 marks = 60 marks)
Each multiple choice question is worth 4 marks.
1. The term “____” refers to a business professional who uses analysis and design
techniques to solve business problems using information technology.

A. database manager
B. computer programmer
C. systems analyst
D. computer analyst

2. Questionnaires can be useful in information gathering when users _____.

A. are widely distributed geographically


B. are not well-informed
C. need prompting to respond to questions
D. do not have time for interviews

3. The user goal technique normally begins by identifying, listing, and classifying
_______ .

A. the system users


B. the business processes
C. the business events
D. the system stakeholders

4. One technique to find the “things” that need to be included in the new system begins
by starting with a user and then try to identify the necessary informational “things”.
This technique is called the _______.
A. domain analysis technique
B. check list technique
C. brainstorming technique
D. noun technique

5. In a fully developed use case description the exception conditions represent what?

A. What conditions might cause the system to crash.


B. What conditions prevent the system from successfully completing the use case.
C. What conditions will confuse the actor.
D. Where the system might have “bugs” and produce erroneous results.

Session X, 201X – ITC548 Page 2 of 6


6. The specific area of the user’s business need that is within the scope of the new system
is called the _______.

A. use cases
B. user specifications
C. functional requirements
D. problem domain

7. ____ is a philosophy and set of guidelines for developing software in an unknown,


rapidly changing environment.

A. Object-oriented development
B. Refactoring
C. Pair programming
D. Agile development

8. What technique is used to control the scope in an Agile project?

A. Not important to worry about scope.


B. Freeze the requirements in an early iteration.
C. Keep a prioritized list of required functions.
D. Let the client and the users worry about the scope.

9. Which of the following statements best defines what a project is?

A. A planned activity consisting of defined tasks by a team of people.


B. A sequence of steps with a scheduled completion.
C. A set of procedures that must be completed in a timely fashion.
D. A planned undertaking with a start and stop and that produces a result.

10. A ____ combines three components: the problem description, the business benefits,
and the system capabilities.
a. Project charter c. System vision document
b. Proof-of-concept analysis d. System scope document

11. In the following CRUD analysis

a. The Sale use case is read twice c. The class ‘Update customer account’ deletes the
data
b. Is missing deletion processes d. Validates use cases

Session X, 201X – ITC548 Page 3 of 6


12. “Customer decides to buy a shirt” is an example of what?
a. An external event c. A temporal event
b. Activity prior to an event d. Activity after an event.

13. The association shown on the following image is a(n) ________ association.

a. unary c. n-ary
b. binary d. undefined

14. In the following activity diagram for the use case Create Customer Account, the
activity ‘Verify credit info’

a. Is an external bank event c. A temporal activity


b. Seeks to validate credit information d. Should be listed under Customer.

Session X, 201X – ITC548 Page 4 of 6


15. In the following system sequence diagram for the use case Create Customer Account,
the “address details” after the “*”

a. Are the details sent to the system c. Is a conditional statement


b. Is what is returned to the customer d. Is missing the dashed return statement.

Part B (6 questions x 10 marks = 60 marks) Each


short answer question is worth 10 marks.

Question 1 (10 marks).


What is the difference between functional requirements and non-functional requirements?
Question 2 (10 marks).
Describe five techniques for collecting information during analysis.
Question 3 (10 marks).
Describe five types of information systems found in most organizations.
Question 4 (10 marks).
Describe what is represented in the following data flow diagram fragment

Session X, 201X – ITC548 Page 5 of 6


Question 5 (10 marks).
With examples from your assignments this session, explain the steps in preparing for an
interview session.
Question 6 (10 marks).
Draw a UML domain class diagram to represent the following home automation system.
You must show all the classes, the associations between them and the multiplicities. Note:
Use only the following classes in your diagram: MotionSensor, Light, SecuritySystem and
ContactSwitch.
‘A wireless home automation system has been deployed in a house in Bathurst. Motion
sensors have been installed at various locations in the house. While in normal operation
mode (when the security system is not armed) if motion is detected, the motion sensor
notifies the security system, and turns on the lights adjacent to it. Contact switches are
installed on all the doors. Each contact switch will alert the security system whenever the
door it is attached to is opened or closed. While the system is armed, if any door is opened
or closed, or motion is detected, the security system will turn on all the lights.’

END OF EXAMINATION

Session X, 201X – ITC548 Page 6 of 6

You might also like