<=Back

<=KNEC diploma in ICT module II: System Analysis and Design past paper July 2016

Outline three factors that should be considered when selecting system development methodology

    Viewed:  359  times

  Share in:
        

Question Answer:





Questions List:

1. Outline three roles of nonfunctional requirements in system development
2. Explain the term dataset as used in information systems
3. Outline three roles of the of a system implementer in system development
4. Explain three benefits that could be realized when using state transition diagram during system design
5. With the aid of the illustration in each case, outline each of the following type of relation i)One-to-one ii)One –to-many iii)many-to-many
6. Outline two negative impacts of emerging trends in system analysis and design
7. Sammy intends to use object oriented methodology for a proposed information technology system in his company. Explain three typical features that he could realize when using the methodology
8. Daisy was required to identify possible causes of project slippage. Outline four threats that she could have identified
9. Lazarus intends to use payback method to evaluate a proposed project in his company.Explain two limitations of the method
10. Risk management requires several strategies in organization. Explain two strategies that could be used
11. Outline two advantages of using Jackson system Development (JSD).
12. Outline three factors that should be considered when selecting system development methodology
13. Outline two typical components of an information system
14. Differentiate between test data and test case as applied in system testing
15. Miriam has decided to use program flow chart to design as IS. Outline three disadvantages of this tool
16. A team of system developers were allocated several independent modules to design and develop. Assume you are hired as a system analyst in the company. (i) Identify the most appropriate type of testing they could apply (ii) Explain two strengths of the testing identified in (I).
17. Explain the term feedback as applied in system control
18. Outline two characteristics of a deterministic system
19. Outline two file processing methods
20. Differentiate between probability and non-probability sampling as applied in data collection
21. Rose intends to carry out file conversion for a new information system. Explain two methods she could use to accomplish the task
22. Master-bits Systems limited intends to use on job training for its client. Explain three advantages of the training method
23. Differentiate between economical and technical feasibility studies
24. With the aid of a diagram, describe ELH for a typical library system
25. Collins intends to formulate a user guide for his client’s proposed information system. Outline four guidelines that he should use
26. A structured walkthrough is a meeting for a group of peer to review and discuss the technical aspects of system development. Explain three objectives of such meeting in organization
27. Explain the term license key as used in system acquisition
28. Explain two disadvantages of questionnaire
29. With the aid of example in each case, explain two methods of system acquisition
30. Differentiate between a project scope and a project cycle as used as applied in project management
31. Patrick was required to carry out training of users for a new information system in an organization. (i) Explain the most appropriate category of user that should be the last to be trained as per organizational structure (ii) Explain two challenges that are likely to be experienced during the training.
32. Outline two typical indicators for urgent system review
33. Explain each of the following terms as applied in project management. (4 marks) (i) Milestone (ii) Deliverable
34. Baraka was required to install an information system in a new company. (i) Identify the most appropriate changeover strategy that he could use justifying your answer ii)Explain two advantages of the changeover strategy identify in (i).
35. Explain two advantages of throw away prototyping
36. Sophia was required to enhance an existence IS because of a newly installed operating system. (i) Identify the type of maintenance she would carry out (ii) Explain two challenges that she could experience with the type of maintenance identified (i).