You are on page 1of 8

MARKING GUIDELINE

NATIONAL CERTIFICATE (VOCATIONAL)

NOVEMBER 2011

SYSTEM ANALYSIS AND DESIGN


NQF LEVEL 4

26 OCTOBER 2011

This marking guideline consists of 8 pages.

Copyright reserved Please turn over


MARKING GUIDELINE -2- NC2430(E)(O26)V
SYSTEM ANALYSIS AND DESIGN LEVEL 4

SECTION A

QUESTION 1

1.1 1.1.1 Code of practice. √


1.1.2 Penalties. √
1.1.3 Identification. √
1.1.4 Objectives. √
1.1.5 Checkbox. √
1.1.6 Analyst. √
1.1.7 Online. √
1.1.8 White box testing. √
1.1.9 Phased adoption/phased installation. √
1.1.10 Neuron. √ (10 × 1) (10)

1.2 1.2.1 Professional. √


1.2.2 Antivirus. √
1.2.3 Technical. √
1.2.4 Relationship. √
1.2.5 Data dictionary. √
1.2.6 Check box. √
1.2.7 Offline. √
1.2.8 Requirements. √
1.2.9 Measurements.√
1.2.10 Neural. √ (10 × 1) (10)

1.3 1.3.1 PHP – Pre Hypertext Processor or Personal Home Page. √

1.3.2 PIN – Personal Identification Number. √

1.3.3 ID – Identity Document. √

1.3.4 ER – Entity Relationship. √

1.3.5 URS – User Requirements Specification. √

1.3.6 SRS – System Requirements Specification. √

1.3.7 EAN – European Article Number. √

1.3.8 GST – General Sales Tax. √

1.3.9 ISP – Internet Service Provider. √

1.3.10 AI – Artificial Intelligence. √ (10 × 1) (10)

Copyright reserved Please turn over


MARKING GUIDELINE -3- NC2430(E)(O26)V
SYSTEM ANALYSIS AND DESIGN LEVEL 4

1.4 1.4.1 D√
1.4.2 I √
1.4.3 G√
1.4.4 J √
1.4.5 H√
1.4.6 B√
1.4.7 A√
1.4.8 F√
1.4.9 C√
1.4.10 E√ (10 × 1) (10)
[40]

TOTAL SECTION A: 40

SECTION B

QUESTION 2: ETHICS AND PROFESSIONALISM FOR THE COMPUTER INDUSTRY IN


SOUTH AFRICA

2.1 2.1.1 Accountability. √


Integrity. √
Team-working skills. √
Communication skills. √
Or Ongoing professional development. (4)

2.2 2.2.1 Skills. √


Qualities. √
Qualifications. √
Obey code of conduct. √ (4)

2.3 End-user piracy.


Occurs when a company employee makes copies of software without
authorisation. √√ (2)

Internet piracy.
Occurs when a company downloads illegal software from the internet. √√ (2)

Hard-disk loading.
Occurs when a business that sells new computers loads illegal copies of
software onto a computer to encourage people to buy it. √√ (2)

Client-server overuse.
Occurs when there are more users on the network using the central copy of
the program at the same time than there are licences. √√ (2)
[16]

Copyright reserved Please turn over


MARKING GUIDELINE -4- NC2430(E)(O26)V
SYSTEM ANALYSIS AND DESIGN LEVEL 4

QUESTION 3: ICT RISK AND THREAT MANAGEMENT

3.1 Risk assessment. Risk management.


Enable us to find out which risk might Knows the risks that have been
occur, which one’s are most important to assessed by risk assessment
consider for a project and which one’s can that might occur and find the
be managed. √√ best way to prevent, lessen or
manage them. √√

3.2 By measuring and comparing it uses two concepts at the same time, which
are consequences and probability. √√ (2)

3.3 When it is completed on time. √


When it meets the requirements. √
When it is completed within the estimated budget. √
When it meets the required quality standard. √ (4)

3.4 It means all the things that the project needs to do and achieve (their scale,
range, size or quantity). √√

3.5 3.5.1 Change technical feasibility document. √


Change costs and benefit document. √ (2)

3.5.2 It is the field of engineering that focuses on the development and


organisation of complex systems. √√
Or It is a field of engineering that gives a set of procedures,
strategies and techniques that a development team can apply to
the development process. (2)

3.6 Determine the acceptable level of risk for a project. √√


Assess likely risks to discover the actual expected risk. √√
Make plans to reduce individual risks until the total expected risk falls bellow
the acceptable limits, if the actual risk are more than the acceptable risk. √√ (6)

3.7 Confidentiality Integrity


Confidential information is only It's similar to confidentiality but
available to people or other computers refers to how information is
that are allowed to read that changed. √√
information. √√
Only authorised people can access, Only authorised people or systems
read or be given confidential should be able to change, update,
information. √√ create or delete the information. √√ (8)

3.8 It means that people, who secure your information, should always ensure that
it’s available or accessible to you whenever you need it, they should not
prevent you from accessing it. √√ (2)
[32]

Copyright reserved Please turn over


MARKING GUIDELINE -5- NC2430(E)(O26)V
SYSTEM ANALYSIS AND DESIGN LEVEL 4

QUESTION 4: INFORMATION GATHERING TECHNIQUES FOR COMPUTER SYSTEMS


DEVELOPMENT

4.1 It is a conversation between two or more people, including the interviewer


who asks questions and an interviewee who answers those questions. √√ (2)

4.2 What the important aspects of the business are. √√


How these aspects relate to each other. √√
How the new system will need to manipulate or process the aspects of the
business. √√
How the existing system works, if there is one in place. √√
What features the users particularly likes or dislikes about the current system.
√√
What changes the users would like to see in the new system. √√ (12)

4.3 Determine specific objectives √


• The interview should be kept shorter than 45 minutes. √
• The interviewer must know exactly what it is that he needs to get out of
the interview. √
• These are the objectives of the interview and must be used to decide
what questions you need to ask. √

Inform the interviewee of the objectives √


• Interviews should never be a surprise and must be planned. √
• The interviewee should not feel that the interview is an interrogation, then
he or she will not be a helpful partner in the process. √
• The interviewee must know when and where the interview will happen
and let them know what the objectives of the interview will be. √
Or This information will help them to prepare for the interview and will help
the interviewee to realise that they are an important part of the process.

Discuss the objectives with the interviewee √


• The interview should be started by discussing the objectives of the
interviewee. √
• This will help the interviewee to relax before the interview starts. √
• The interviewee will get a chance to get to know the interviewer before
the main questions are asked. √
Or Prepare short notes on what to say before the interview actually starts.

4.4 Questions the require answers in more detail. √


Why? √
How? √
Or What? (3)

4.5 Questions that require a short or restricted answer. √


Who? √
When? √
Or Where? (3)
[32]

Copyright reserved Please turn over


MARKING GUIDELINE -6- NC2430(E)(O26)V
SYSTEM ANALYSIS AND DESIGN LEVEL 4

QUESTION 5: ANALYSING INFORMATION SYSTEMS

5.1 The people that actually do a job (the users) usually understand that job
better than anyone else does. √√
The people trained in information technology (analysts, designers and
developers) have the best understanding of the capabilities of that
technology. √√
The best information systems result when these three groups of people meet
and work together as equal partners within the project. √√
Or Business processes usually do not exist in isolation. They interact with,
and affect other processes within the business.

5.2 Logical data modelling. √


Data flow modelling. √
Entity behaviour modelling. √ (3)

5.3
registers_a_course √

check_student_requirements

no √ yes √
does student
have a
computer? √

do not
register_student √ register_student √

(7)
[16]

QUESTION 6: PRINCIPLES OF DESIGNING COMPUTER SYSTEMS INPUTS AND


OUTPUTS

6.1
√ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √
83 97 118 101 32 116 101 120 116 32 97 115 32 78 111 0
S A v e space t e x t space a s space N o .
[16]

Copyright reserved Please turn over


MARKING GUIDELINE -7- NC2430(E)(O26)V
SYSTEM ANALYSIS AND DESIGN LEVEL 4

QUESTION 7: IMPLEMENTING AND MAINTAINING AN INFORMATION SYSTEM

7.1 Testing procedures. √


Implementation procedures. √
Maintenance procedures. √ (3)

7.2 Testing procedures.


The process that one can follow or use to test the system by checking,
examining, analysing and assessing that the system is working properly
without errors and bugs. √√
Implementation procedures.
Measures that ensure that the system has practically started to be used.√√
Maintenance procedures.
Process of checking and repairing the system regularly in order to keep it in a
good working condition, without errors. √√ (6)

7.3 What we test. √√


How we test the system. √√
How much information is available to the tester and, √√
The size of the parts that are being tested. √√ (8)

7.4 Static testing. √


Inspect a system’s design, source code and implementation to see if there are
any errors, and it occurs without running or using the system. √√
Dynamic testing. √
Perform tests on a completed system by inputting test data to see if it
produces the correct output. √√
Or it tests all the features of the system to see if they working as expected. (6)

7.5 White – box testing. √


The method of testing that test the inner workings of the information system,
where the tester diagnose the problems in much more detail and find out why
the problem is occurring. √√

Black – box testing. √


The method of testing that tests the interface of the system, without knowing
any details about the internal processing that take place in the system. √√ (6)

Unit testing
Used to test the individual components or the smallest parts of a system. √

Integration testing
Test the groups of units or related units to ensure that they work correctly
when used together. √

7.6 System testing


Tests the entire system or the complete system as a whole. √ (3)
[32]

Copyright reserved Please turn over


MARKING GUIDELINE -8- NC2430(E)(O26)V
SYSTEM ANALYSIS AND DESIGN LEVEL 4

QUESTION 8: CONCEPTS OF ARTIFICIAL INTELLIGENCE

8.1 Robots. √
Fuzzy logic. √
Expert systems. √
Neural networks. √ (4)

8.2 Robots.
Machines that has sensors that can take in information and use that particular
information to make decisions.√√

Fuzzy logic
A type of artificial intelligence code that lets computers work out definite
answers from data that is not exact, is vague or has pieces missing. √√
Or is a type of artificial intelligence code that lets computers work out definite
answers based on partial information.

Expert systems
A software application that uses artificial intelligence to provide the same sort
of information and advice as a human expert. √√

Neural networks
A type of artificial intelligence that models the structure of a human brain, and
imitates the way that a human brain thinks and learns.√√
Or is a system of programs and data structures that imitates the operations of
a human brain. (8)

8.3 For repetitive tasks. √


For dangerous tasks. √
In areas that are inaccessible. √ (3)

8.4 They can work more than eight hours a day without getting tired or taking
breaks. √
Or Their cost will be less expensive than hiring a human being. - Because a
human being will have to be paid for a life time, pension funds or retirement if
s/he reties but it will be a once off payment with a robot.
They can perform repetitive tasks without getting bored.
They can perform dangerous tasks without getting hurt.
They are able to work in areas that are inaccessible. (1)
[16]

TOTAL SECTION B: 160


GRAND TOTAL: 200

Copyright reserved Please turn over

You might also like