You are on page 1of 4

Question 1

Q.1.1

A subsystem in my own words would be that it is a small part of a larger or complete system. A
subsystem does not contain all the overarching functionalities of the complete system but just a part
of it.

The importance of diving an information system into a subsystem is that:

 neither the developers of the system and the users of the system have to have everything
about the system figured out.
 It allows for better allocation of resources.
 It boosts employee morale because employees will be located to the part which they have
better knowledge in compared to doing everything in one system.
 It allows for flexibility in this world of growing change, like for example its easier to change
one part of a subsystem than compared to changing it in one long program which could lead
to conflicts and errors within the system.

An everyday real-life example of a subsystem is a car, a car is divided into subsystems like the car
stereo is a subsystem even if it were to be removed the car could still move around without
audio it would be boring but it shows that it’s an optional subsystem.

(Satzinger, 2016) (Sai, 2018)

Q.1.2

The SDLC is a systematic approach that breaks down all the activities involved in developing a
system, it identifies everything required for the research, building, and even the development and
breaks down all the work into phases needed either for the implantation of a new system or
updating an existing system. The first two core processes of the SDLC are:

1. Identify the problem and obtain approval: - and this is basically like it says it looks at what
the is problem so that they get the answer as to why the system needs to be developed, and
then get it approved.
2. Plan and monitor the project: - on this part the team looks what they are going to be doing,
how they do it like as in software they need to use as an example and then they look at who
does it for example is the team going to be divided and each team focuses on a specific
subsystem.
(Satzinger, 2016) (Prokopets, 2020)

Q.1.3

Stakeholders in system development are basically all the groups that are interested in the realization
of the project, although the reasons behind this interest will vary between groups. Two examples of
these stakeholders are the organisation which had the system made and the last one would be the
team working on it. (viewpoints and perspectives, 2017)

Q.1.4

Event Decomposition Technique basically looks at the events that will occur and might occur that
will require the system to respond and then it also determines how the system will respond.
The difference between external events and state events is that external events are events that
occur from the outside of the system like they occur when a person or actor initiates them and state
events are events that occur from the inside of the system usually leading to the system triggering
some processing. (Satzinger, 2016)

Question 2
UML activity diagram for Dawn Help Desk Corporation

Question 3
Q.3.1

The importance of encryption in computer systems:

 Can prevent data breaches during data transfers like when employees at the multinational
technology corporations will be communicating with their help desk consultants and also in
storage.
 It enforces privacy as only allowed users have access.
 Can prevent against data manipulation during a transfer

Encryption is basically the use of ciphertext to alter data so that there is no unauthorized access and
the decryption is converting back this ciphertext to their original text so that authorised users can
use the information. (Satzinger, 2016) (Team, 2021)

Q.3.2
The four aspects of a use case covered in the use case description are:

1. Help desk consultant collects customer details and registers incident.


2. Technical consultant receives from help desk consultant and troubleshoots then compiles an
initial report.
3. Supervisor confirms details.
4. Supervisor approves report.

Q.3.3

Three elements that access control systems rely on are:


1. Authentication
 The process whereby users who want to access sensitive resources are
identified. Users can be authenticated using various methods for example
passwords, biometrics, retinas.
2. Identification
 Usually this is a list linked to a specific resource that tells the individuals that
are permitted to access the resource, and if an individual is not on the list
this means they cannot access the resource.
3. Authorization
 This is a process whereby an authenticated user cannot access some of the
resources based on where they stand on the hierarchy from the
identification list.
(Jones, 2019) (Satzinger, 2016)
Q.3.4
Two things I would take into consideration when designing the interface for both Web and Mobile
are:
 Keeping the interface simple because the best interfaces are those that are
almost invisible to the user because they do not contain any unnecessary
elements and have clear language in the labels they use.
 Making sure the interface communicates what is happening to the user, it
has to inform the user of actions, changes in state and also errors obviously
as this can reduce frustration for the user.
(team, 2021)

Bibliography
Jones, L. (2019, July 8). TouchStar. Retrieved from touchstar.com:
https://www.touchstar-atc.com/blog/understanding-physical-access-control-
systems#:~:text=Understanding%20Physical%20Access%20Control%20Systems%201%20The
%20three,streamlined%20working%20environment%20with%20physical%20access
%20control.%20

Prokopets, E. (2020, October 30). Edvantis. Retrieved from edvantis.com:


https://www.edvantis.com/blog/software-development-process/

Sai, S. (2018, July 10). YOUR ARTICLE LIBRARY. Retrieved from yourarticlelibrary.com:
https://www.yourarticlelibrary.com/business/business-system-features-sub-system-and-
evaluation-business/69399

Satzinger, J. (2016). Systems Analysis And Design. Boston,USA: Cengage.


Team, I. E. (2021, July 22). Indeed. Retrieved from indeed.com: https://www.indeed.com/career-
advice/career-development/what-is-encryption#:~:text=1%20Security.%20Encryption
%20can%20help%20prevent%20data%20breaches,verify%20a%20website%27s%20data.
%20...%205%20Regulation.%20

team, U. (2021, May 5). Usability.gov. Retrieved from usability.gov: https://www.usability.gov/what-


and-why/user-interface-design.html#:~:text=User%20Interface%20Design%20Basics
%20User%20Interface%20%28UI%29%20Design,from%20interaction%20design%2C
%20visual%20design%2C%20and%20information%20architecture.

viewpoints and perspectives. (2017, August 8). Retrieved from viewpointsandperspectives.info:


https://www.viewpoints-and-perspectives.info/home/stakeholders/#:~:text=A
%20stakeholder%20in%20the%20architecture%20of%20a%20system,importance%20will
%20obviously%20vary%20from%20project%20to%20project.

You might also like