Uploaded by afrafabliha13846

IGCSE ICT System Life Cycle Past Paper 2010-2015

advertisement
System Life Cycle PP 2010-2015
0417_s10_qp_11.
14) Joan owns a small company. She wishes to replace the existing computerised
system with a new one. She has employed a systems analyst, Jasvir, to plan this.
(a) Before Jasvir decides on a system he must collect information about the
existing system. Tick whether the following statements about the various methods
of information collection are TRUE or FALSE.
(b) After Jasvir has completed the analysis of the existing system, he will need to
design the new system. Tick four items which would need to be designed
16) After a system has been implemented it needs to be evaluated. Identify two
evaluation strategies and state a reason why each is needed [4]
0417_s10_qp_13
14) Peter owns a small company. He wishes to replace the existing computerised
system with a new one. He has employed a systems analyst, Sarbjit, to plan this.
(a) Sarbjit wishes to collect information about the existing system using a variety
of methods. Tick TRUE or FALSE to indicate whether the following statements
give appropriate reasons why the method would be used. [4]
(b) Sarbjit will need to design the file structure of the new system. Tick four items
which would need to be included in this design
Direct changeover
Parallel running
Phased/Pilot running
16) After a system has been implemented it needs to be tested. Describe two
testing strategies and state a reason why each is needed [4]
0417_w10_qp_11
16) When a new system is implemented, documentation is provided with it.
Explain why two different types of documentation are produced [4]
19) Describe three actions which might need to be taken as a result of testing a
system [3]
0417_w10_qp_12
17) A school library is developing a new database of books. After the new system
is developed, it will be tested. (a) Name three items of the system which would
need to be tested [3]
(b) The school librarian is asking students to rate books which they have read and
wishes to include these ratings in the database of books. Each rating will be
between 0 and 10. Below are three different types of test data. For each one name
the type of test data it represents and explain why it is that type of data.
18) When a new system is implemented, different types of documentation are
provided.
(a) Identify two items which would be found in both technical documentation and
in user documentation [2]
(b) Identify two items which would be found in user documentation but would not
be found in technical documentation [2]
0417_s11_ms_11
17) A systems analyst has been asked by a school librarian to update the computer
system she uses to keep records about her books.
(a) The systems analyst must first of all collect information about the existing
system. Describe three methods which could be used to collect this information.
[3]
(b) The systems analyst must now produce a screen input form which the librarian
could use for typing in each book’s details. Design a suitable screen input form to
enter the details of one book. It should contain appropriate spacing for each field,
as well as navigation aids. [5]
(c) Name three methods which would be used in a library to input data about books
or borrowers [3]
18) A new computer system storing examination results out of 100 is to be tested
using a range of test data. For each item of test data below, name the type of test
data used, explaining your choice. Use each type once only
19) When a new system is implemented, documentation is provided with it.
Identify the two different types of documentation produced and name two different
components in each [6]
0417_s11_qp_12
16) A company is developing a new computer system. After the new system is
developed, it will be implemented.
(a) Name two methods of implementation. Give one advantage and one
disadvantage of each. [6]
(b) After the system is implemented it will be evaluated. Identify three activities
which would need to be carried out in evaluating the system [3]
0417_s11_qp_13.
16) After a system has been implemented it needs to be tested. Describe two
testing strategies and state a reason why each is needed. [4]
0417_w11_qp_11
14) John owns a small company. He wishes to replace the existing computerised
system with a new one. He has employed a systems analyst, Iqbal, to plan this.
(a) Iqbal will need to collect information about the existing system. Describe three
methods he could use to do this [3]
(b) Iqbal has completed the Analysis of the existing system. Describe three items
of file structure which he would need to design for the new system [3]
(c) After a system is designed it will be implemented. Describe each of the
following methods of implementation [4]
19) Describe two methods of data verification [4]
0417_w11_qp_12
12) Alan owns a small company. He wishes to replace the existing computerised
system with a new one. He has employed a systems analyst, José, to plan this.
(a) José will collect information about the existing system and design the new
system. Tick whether the following statements are TRUE or FALSE [4]
(b) Name and describe three types of test data which are used when testing a
system [3]
(c) After the system has been implemented it will be evaluated. Tick four activities
which José will need to carry out as part of the evaluation [4]
(d) Part of José’s job will be to produce both technical and user documentation for
the new system. For each type of documentation give two reasons why it is needed
0417_w11_qp_13
14) Sarbjit owns a small company with little money to spare. He wishes to replace
the existing computerised system with a new one. He has already made backups of
the existing system. He has employed a systems analyst, Tom, to plan the new
system.
(a) Tom wishes to collect information about the existing system. Give four
methods he could use and for each give a reason why it would be used. [8]
(b) Tom will need to design the file structure of the new system. List four items
which would need to be included in this design. [4]
(c) After the system is developed it will be implemented. Describe the most
appropriate method Sarbjit should choose giving two reasons [3]
0417_s12_qp_11.
4) A test is marked out of 20 and recorded as an integer. Tick whether each of the
following marks is an example of abnormal data or extreme data. [4]
12) Name and describe three validation checks which could be carried out on a 16digit credit card number when it is typed into a computer. [6]
15) Gita has employed Johann, a systems analyst, to create a new database system for her car
sales business. She only sells cars made by Rock and only the models Feisty, Mendo and
Galactica in red, blue or gold. Most of the cars have air conditioning but some do not. She sells
3, 4 and 5 door cars.
(a) Give a reason why would it not be sensible to have a Make field in the database [1]
ANS: Would always be the same contents/waste space putting in duplicated field
(b) Complete the design table below giving the field names which would be used in the database
and describing the most appropriate validation check which could be carried out on each
field. [7]
Must be Feisty or Mendo or Galactica
Colour
Must be red, blue or gold
Air conditioning
Boolean check - Must be yes or no
Number of doors
Range check >2 AND =3 AND <=5
(c) Discuss verification and validation [6]
0417_s12_qp_12
4) An examination is marked out of 100 and the mark is recorded as an integer.
Tick whether each of the following marks is an example of abnormal data or
normal data. [4]
0417_s12_qp_13
12) (b) Compare and contrast parallel running and direct changeover as ways of
implementing the new database system. [5]
13) A teacher has developed a new system for keeping a record of student
examination marks on her laptop and wishes to test it. Each examination is marked
out of 50. Identify three types of test data she could use and describe each type
using an example [6]
0417_w11_qp_11
10) Describe the three types of test data: Normal, Abnormal, Extreme. [3]
Normal data – data within a (given) range/appropriate for that data type (1)
Abnormal data – data outside the range/of the wrong data type (1)
Extreme data – data on the boundaries of the range (1)
14) John owns a small company. He wishes to replace the existing computerised
system with a new one. He has employed a systems analyst, Iqbal, to plan this.
(a) Iqbal will need to collect information about the existing system. Describe three
methods he could use to do this. [3]
(b) Iqbal has completed the Analysis of the existing system. Describe three items
of file structure which he would need to design for the new system. [3]
(c) After a system is designed it will be implemented. Describe each of the
following methods of implementation. [4]
0417_w11_qp_13
3) Tick TRUE or FALSE next to each of these statements about methods of
implementation. [4]
0417_s12_qp_13
9) A group of car mechanics wants to have an expert system to help them with
their work in diagnosing car engine faults. Describe how such a system would be
created [5]
SOME 2013 QUESTIONS
0417_s13_qp_11
13) (b) Explain the differences between parallel running and direct changeover as
ways of implementing the new database [5].
16) Iqbal wants to test the new computerised payroll system he would like to
introduce to his company. No company worker is paid less than $100 and no
worker is paid more than $500. Explain what is meant by the following three types
of test data using examples of the wages paid to workers
ANS: Normal data – data within a (given) range/appropriate for that data type [1]
Example – any wage between $100 and $500 [1]
Abnormal data – data outside the range/of the wrong data type [1] Example –
any wage less than $100 or greater than $500 or text example [1]
Extreme data – data on the boundaries of the range [1] Example – $100 or $500.
0417_s13_qp_12
12) When large volumes of data are input to a new system it is usual to carry out
verification and validation on this data. (b) Name and describe two methods of
verification which could be used [4]
(c) Explain why it is necessary to carry out validation even though the data has
been verified. [3]
0417_s13_qp_13
4) An examination mark is recorded as an integer in a database. The marks are
between 0 and 100. Name and describe two validation checks which would be used
to check the marks as they are entered. [4]
0417_w13_qp_11
14) The head teacher of a school has employed Pierre, a systems analyst, to create
a new database system to keep details of all students. Each student will be
allocated a unique ten digit reference number.
Pierre has written out some of the questions that the head teacher might ask. He
can then analyse these in order to design a database which may answer these
questions.
Some are: Which year is Johann Schmidt in? (the school has students in years 7 to
13) Does Anita Nash have a sibling (brother or sister) in the school?
(a) Complete the data dictionary table below giving the field names which would
be used in the database and identifying a validation check for each field. [6]
System Life Cycle Past Paper 2013-2015
0417_s14_qp_11
9) Students are using questionnaires to find information about workers at a
company. They are going to construct a database to store the results. Each worker
at the company has an individual works number which starts with a letter and has 6
digits e.g. A123456. Below is part of a questionnaire which some students have
created to collect the results.
Alphanumeric/text
Boolean/logical
Numeric/integer
(b) Name the validation check which would be most suitable to ensure that data
entered for question 1 of the questionnaire is acceptable. [1]
ANS: Format/picture/length
11) Put the following steps into the correct order that the systems analyst would
follow. [5]
ANS:
17) A car company has decided to develop an expert system to help mechanics
with their diagnoses of car faults.
(a) Describe steps required in the analysis and design of such a system. [5]
(b) Name two other applications which involve the use of expert systems. [2]
0417_s14_qp_12
8) The chemistry department in a school keeps its stock records on computer. The
stock for any item is not allowed to fall below 10 or go above 100. Here are
examples of records from the suggested database
(a) As the data is entered it will need to be verified. Name two ways in which the
data could be verified. [2]
ANS: Visual verification [1] Double data entry [1]
(b) For each of these validation checks write down the field that would be best
suited to it. You must name three different fields. [3]
Range: Number_in_Stock [1]
Length: Area_code [1]
Check digit: Serial_number [1]
Q11)
(d) The new system will be implemented. Describe three different ways in which
the system could be implemented. [3]
(e) After the system is implemented the library will be given two types of
documentation. [4]
(i) One type will help people use the new system. Give two examples of the
contents of this type of documentation. [2]
(ii) The other type will help a programmer or systems analyst who wants to
upgrade the system. Give two examples of the contents of this type of
documentation. [2]
0417_s14_qp_13
4) Tick whether the following tasks are carried out in the Evaluation or Analysis
phase of the systems life cycle. [4]
0417_w14_qp_11
12) Here is part of a database of students born between 1st January 1999 and 31st
December 1999. It shows the number of IGCSEs each student is taking next year.
No student is allowed to take more than 10 IGCSEs. Each student has a seven digit
Student_number. Some of the data has been entered incorrectly.
(a) Paul Nixon has an incorrect Student_number. For each of the following fields
write down the names of the students whose data has been entered incorrectly. [3]
(i) Year_of_birth: Joyce Alonzo and Aftab Ali
(ii) Gender: Maria Jones
(iii) Number_of_IGCSEs: David Senior
(b) Identify two methods of verification [2]
Visual verification/visually comparing data entered with original [1]
Double data entry/entering data twice and the computer compares them [1]
(c) For each field, name a different validation check which would have prevented
the errors in the following fields. [3]
(i) Year_of_birth: Range (check)/lookup (check)
(ii) Number_of_IGCSEs: (Invalid) character (check)/type (check)
(iii) Student_number : Length (check)
15) A mining company has asked a knowledge engineer to devise an expert system
to help them with their prospecting for valuable minerals. Describe how this expert
system would be created. [5]
0417_w14_qp_12.
11) The owner of a shop wants a new computer system to store the records of all
the stock and customers. The systems analyst will need to find out how the existing
system works.
(a) Describe, in detail, two out of the four possible ways she could find out this
information. [4]
(b) After analysing the existing system, the systems analyst will design a database.
Identify four items that the systems analyst will need to design for the database. [4]
After the system is designed, it will be developed, then implemented.
(c) Name two methods, other than direct changeover, that could be used to
implement the system and give an advantage for each method compared to direct
changeover. [4]
0417_s15_qp_11
8) The owner of a sports club has recently had a new computerised stock control
system installed. He employed a systems analyst to research the existing system
and then install the new system.
(a) Tick the relevant stage of the systems analysis and design (systems life cycle)
for each of the following activities. [4]
(b) Name and describe three methods of implementation. [6]
0417_s15_qp_12
2) Below is a list of statements. Each statement is true for only one of the given
methods of implementation. Tick the method which matches the statement. [4]
15) One of the stages in systems analysis and design is called development and
testing. Describe the different testing strategies that can be used on a new system.
[6]
0417_s15_qp_13
0417_w15_qp_11
13) A company has decided to introduce a new computer system. It has employed
a systems analyst to oversee this. Her first task is to research the current system.
(b) The new system will be designed after the current system is analysed. Identify
three items which will be part of the design. [3]
0417_w15_qp_12
0417_w15_qp_13.
13) A company is going to introduce a new computer system. The company
employs drivers to deliver orders and they are rarely in the office for more than a
few minutes. The office secretaries process the orders and dislike being
interrupted. A manager is in charge of the current system and appointments can be
made to see her.
(a) Name three methods of researching the current system other than from
examining documents. Identify the workers that each method would be most
suitable for. Each method will be used with a different type of worker. [6]
(b) After the current system has been researched, the new system will be designed.
This means that the file structure will be designed. Identify three items of a flat file
structure which will form part of this activity [3]
Download