SlideShare a Scribd company logo
Scenario 4. 2010 Tom Langley
Dar Es Salaam High School has recently been formed by joining together six smaller schools. The head teacher wants to have a modern ICT system to administer staff and student records. She has decided to employ a systems analyst to look at the existing systems and recommend a new system.
The system will need to produce hundreds of reports in one session and should be able to find individual records very quickly.  Using the results of the analysis of the current system the analyst will need to design the new system.  Once the system has been designed and developed, user and technical documentation will need to be produced.
6a) Other than observation, describe the methods that the systems analyst could use to research the current systems. [3]
Distribute/Hand out written questionnaires to system users (to complete) [1] Interview current system users face to face [1] Examining documents used in the current system [1]
Examiners Response The answers provided were generally vague descriptions with little reference to teachers and the school.  It is surprising to see that despite teachers being the focal point of this scenario as being the ‘system users’ candidates often referred to ‘workers’ or ‘employees’ thereby implying that everybody would be interviewed or given questionnaires rather than the staff concerned.  Some candidates were able to answer the question well.
6b) Describe four different items that the systems analyst will need to include at the design stage. Using the scenario of Dar Es Salaam High School, explain the factors that will influence the choice of each item. [8]
Examiners Response Candidates were able to score highly on the part of the question which asked for items of design but, despite being told in the question to refer to the scenario, candidates frequently gave general answers not related specifically to the scenario when explaining the factors.
7a) Explain the purpose of technical documentation. [2]
Two from: Produced specifically for systems analysts/programmers. Helps when the system needs further development/upgrading/improvements. Helpful should any errors occur in the system and system needs amending to get rid of these errors.
Examiners Response This was the part of the question which most candidates found straightforward with many scoring high marks.
7b) Describe the two types of technical documentation including details of the contents of each one. [8]
Eight from: Systems documentation.... ....provides a detailed overview of the whole system. Test data/test plans so that systems analyst can see the results of these/test results. Can use this data again to check if errors have been successfully removed. The results of the systems analysis/DFD diagrams. What is expected of the system/purpose of the system. Overall design decisions such as the choice of hardware and software/file, input and output structures.
Systems flowcharts. Program documentation.... ....produced for program code that has been written. Description of the software/purpose of the software. Reasons for choosing those pieces of existing software that were used… ….. instead of the programmer having to write code. Input and output data formats. Program flowcharts/algorithms. Program listing – this will be a complete copy of the code used… …and annotation explaining what each module of code does. Notes that will help any future programmer to make modifications to the system.
Examiners Response This part of the question enabled candidates to score some marks with many getting quite high marks.  It was, however, the question which was left unanswered by a substantial number of candidates.
7c) After the system has been developed it will be evaluated.Describe how test results are recorded and explain how they affect this evaluation. [3]
Three from: (A table) showing the type of test, test data, expected results, actual results and a comment on the results. (One mark for three column headings, two marks for 5 column headings.) Test results will help the systems analyst to make judgements. Comparison will be made of the actual results with the expected results. If the results are not as expected system will need to refined. Comments in the comparison table contribute to the evaluation.
Examiners Response Candidates found this the hardest question on the paper.  Many were unable to visualise what a test plan would look like and instead concentrated on answering as if this was a question about types of test data with descriptions of normal/live and abnormal/extreme data.

More Related Content

What's hot

June 2010 exam questions and answers
June 2010   exam questions and answersJune 2010   exam questions and answers
June 2010 exam questions and answersDamonTauroa
 
Scenario $4$
Scenario $4$Scenario $4$
Scenario $4$Jason121
 
Machine learning basics
Machine learning   basicsMachine learning   basics
Machine learning basics
AtheenaPandian Enterprises
 
Faq o-Matic system Abstract 2017
Faq o-Matic system Abstract 2017Faq o-Matic system Abstract 2017
Faq o-Matic system Abstract 2017
ioshean
 
Poster Vensim Repast
Poster Vensim RepastPoster Vensim Repast
Poster Vensim Repast
Andreas Größler
 
Modeling and simulation
Modeling and simulationModeling and simulation
Modeling and simulation
Payel Rani
 
Feasibility of Study for a Jute Mill in Software and Information Engineering
Feasibility of Study  for a Jute Mill in Software and Information EngineeringFeasibility of Study  for a Jute Mill in Software and Information Engineering
Feasibility of Study for a Jute Mill in Software and Information Engineering
Suman Mia
 
Principles of effort estimation
Principles of effort estimationPrinciples of effort estimation
Principles of effort estimation
CS, NcState
 
System modeling and simulation full notes by sushma shetty (www.vtulife.com)
System modeling and simulation full notes by sushma shetty (www.vtulife.com)System modeling and simulation full notes by sushma shetty (www.vtulife.com)
System modeling and simulation full notes by sushma shetty (www.vtulife.com)
Vivek Maurya
 
Simulation & Modelling
Simulation & ModellingSimulation & Modelling
Simulation & Modelling
Saneem Nazim
 
Introduction to simulation modeling
Introduction to simulation modelingIntroduction to simulation modeling
Introduction to simulation modeling
bhupendra kumar
 
Simulation and its application
Simulation and its applicationSimulation and its application
Simulation and its application
Alesh Dulal
 
Comparison statisticalsignificancetestir
Comparison statisticalsignificancetestirComparison statisticalsignificancetestir
Comparison statisticalsignificancetestir
Claudia Ribeiro
 
EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...
EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...
EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...
ijcsa
 
System Modeling & Simulation Introduction
System Modeling & Simulation  IntroductionSystem Modeling & Simulation  Introduction
System Modeling & Simulation Introduction
SharmilaChidaravalli
 

What's hot (18)

June 2010 exam questions and answers
June 2010   exam questions and answersJune 2010   exam questions and answers
June 2010 exam questions and answers
 
Scenario $4$
Scenario $4$Scenario $4$
Scenario $4$
 
Input modeling
Input modelingInput modeling
Input modeling
 
Machine learning basics
Machine learning   basicsMachine learning   basics
Machine learning basics
 
Faq o-Matic system Abstract 2017
Faq o-Matic system Abstract 2017Faq o-Matic system Abstract 2017
Faq o-Matic system Abstract 2017
 
Poster Vensim Repast
Poster Vensim RepastPoster Vensim Repast
Poster Vensim Repast
 
Conceptual modeling
Conceptual modelingConceptual modeling
Conceptual modeling
 
Modeling and simulation
Modeling and simulationModeling and simulation
Modeling and simulation
 
Feasibility of Study for a Jute Mill in Software and Information Engineering
Feasibility of Study  for a Jute Mill in Software and Information EngineeringFeasibility of Study  for a Jute Mill in Software and Information Engineering
Feasibility of Study for a Jute Mill in Software and Information Engineering
 
Principles of effort estimation
Principles of effort estimationPrinciples of effort estimation
Principles of effort estimation
 
System modeling and simulation full notes by sushma shetty (www.vtulife.com)
System modeling and simulation full notes by sushma shetty (www.vtulife.com)System modeling and simulation full notes by sushma shetty (www.vtulife.com)
System modeling and simulation full notes by sushma shetty (www.vtulife.com)
 
Simulation & Modelling
Simulation & ModellingSimulation & Modelling
Simulation & Modelling
 
Introduction to simulation modeling
Introduction to simulation modelingIntroduction to simulation modeling
Introduction to simulation modeling
 
Simulation and its application
Simulation and its applicationSimulation and its application
Simulation and its application
 
Comparison statisticalsignificancetestir
Comparison statisticalsignificancetestirComparison statisticalsignificancetestir
Comparison statisticalsignificancetestir
 
0420 w12 qp_33
0420 w12 qp_330420 w12 qp_33
0420 w12 qp_33
 
EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...
EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...
EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...
 
System Modeling & Simulation Introduction
System Modeling & Simulation  IntroductionSystem Modeling & Simulation  Introduction
System Modeling & Simulation Introduction
 

Viewers also liked

Presentation Skills
Presentation SkillsPresentation Skills
Presentation Skillsmaryjessadee
 
Browser based games
Browser based gamesBrowser based games
Browser based games
Matthew Leach
 
Internet Marketing for Insurance Agents - Choosing Options
Internet Marketing for Insurance Agents - Choosing OptionsInternet Marketing for Insurance Agents - Choosing Options
Internet Marketing for Insurance Agents - Choosing Options
Confluency Solutions
 
Midas Rec2 Rec
Midas Rec2 RecMidas Rec2 Rec
Midas Rec2 Recrobrec2rec
 
Digital marketing tactics for customer development and value
Digital marketing tactics for customer development and valueDigital marketing tactics for customer development and value
Digital marketing tactics for customer development and value
Confluency Solutions
 

Viewers also liked (6)

Presentation Skills
Presentation SkillsPresentation Skills
Presentation Skills
 
Browser based games
Browser based gamesBrowser based games
Browser based games
 
Internet Marketing for Insurance Agents - Choosing Options
Internet Marketing for Insurance Agents - Choosing OptionsInternet Marketing for Insurance Agents - Choosing Options
Internet Marketing for Insurance Agents - Choosing Options
 
DRINKINTEAM GOTCHA CLUB
DRINKINTEAM GOTCHA CLUBDRINKINTEAM GOTCHA CLUB
DRINKINTEAM GOTCHA CLUB
 
Midas Rec2 Rec
Midas Rec2 RecMidas Rec2 Rec
Midas Rec2 Rec
 
Digital marketing tactics for customer development and value
Digital marketing tactics for customer development and valueDigital marketing tactics for customer development and value
Digital marketing tactics for customer development and value
 

Similar to Scenario 4

May june 2010 scenario 4 [documentation]
May june 2010 scenario 4 [documentation]May june 2010 scenario 4 [documentation]
May june 2010 scenario 4 [documentation]owenchambers11
 
May june 2010 scenario 4 [documentation]
May june 2010 scenario 4 [documentation]May june 2010 scenario 4 [documentation]
May june 2010 scenario 4 [documentation]owenchambers11
 
May june 2010 scenario 4 [documentation]
May june 2010 scenario 4 [documentation]May june 2010 scenario 4 [documentation]
May june 2010 scenario 4 [documentation]owenchambers11
 
Online Exam Management System(OEMS)
Online Exam Management System(OEMS)Online Exam Management System(OEMS)
Online Exam Management System(OEMS)
PUST
 
75629 Topic prevention measures for vulneranbilitiesNumber of.docx
75629 Topic prevention measures for vulneranbilitiesNumber of.docx75629 Topic prevention measures for vulneranbilitiesNumber of.docx
75629 Topic prevention measures for vulneranbilitiesNumber of.docx
sleeperharwell
 
Ooad lab manual(original)
Ooad lab manual(original)Ooad lab manual(original)
Ooad lab manual(original)
dipenpatelpatel
 
Sql based paperless examination system
Sql based paperless examination systemSql based paperless examination system
Sql based paperless examination systemAlexander Decker
 
Online examination system
Online examination systemOnline examination system
Online examination systemRahul Khanwani
 
Sdlc
SdlcSdlc
Software testing and introduction to quality
Software testing and introduction to qualitySoftware testing and introduction to quality
Software testing and introduction to quality
DhanashriAmbre
 
Software development life cycle
Software development life cycle Software development life cycle
Software development life cycle
shefali mishra
 
163912338 ch-13-systems-analysis-and-design
163912338 ch-13-systems-analysis-and-design163912338 ch-13-systems-analysis-and-design
163912338 ch-13-systems-analysis-and-design
homeworkping7
 
Different Approaches To Sys Bldg
Different Approaches To Sys BldgDifferent Approaches To Sys Bldg
Different Approaches To Sys Bldg
USeP
 
Formal meth
Formal methFormal meth
Formal meth
memoalwandy
 
Software Risk Analysis
Software Risk AnalysisSoftware Risk Analysis
Software Risk Analysis
Brett Leonard
 
System_Analysis_and_Design_Assignment_New2.ppt
System_Analysis_and_Design_Assignment_New2.pptSystem_Analysis_and_Design_Assignment_New2.ppt
System_Analysis_and_Design_Assignment_New2.ppt
MarissaPedragosa
 
Intro sad
Intro sadIntro sad
Intro sad
abhijeetdavane
 
Lab management
Lab managementLab management
Lab managementlogumca
 

Similar to Scenario 4 (20)

May june 2010 scenario 4 [documentation]
May june 2010 scenario 4 [documentation]May june 2010 scenario 4 [documentation]
May june 2010 scenario 4 [documentation]
 
May june 2010 scenario 4 [documentation]
May june 2010 scenario 4 [documentation]May june 2010 scenario 4 [documentation]
May june 2010 scenario 4 [documentation]
 
May june 2010 scenario 4 [documentation]
May june 2010 scenario 4 [documentation]May june 2010 scenario 4 [documentation]
May june 2010 scenario 4 [documentation]
 
Online Exam Management System(OEMS)
Online Exam Management System(OEMS)Online Exam Management System(OEMS)
Online Exam Management System(OEMS)
 
75629 Topic prevention measures for vulneranbilitiesNumber of.docx
75629 Topic prevention measures for vulneranbilitiesNumber of.docx75629 Topic prevention measures for vulneranbilitiesNumber of.docx
75629 Topic prevention measures for vulneranbilitiesNumber of.docx
 
Ooad lab manual(original)
Ooad lab manual(original)Ooad lab manual(original)
Ooad lab manual(original)
 
Sql based paperless examination system
Sql based paperless examination systemSql based paperless examination system
Sql based paperless examination system
 
Online examination system
Online examination systemOnline examination system
Online examination system
 
Sdlc
SdlcSdlc
Sdlc
 
Gr 6 sdlc models
Gr 6   sdlc modelsGr 6   sdlc models
Gr 6 sdlc models
 
Software testing and introduction to quality
Software testing and introduction to qualitySoftware testing and introduction to quality
Software testing and introduction to quality
 
Software development life cycle
Software development life cycle Software development life cycle
Software development life cycle
 
163912338 ch-13-systems-analysis-and-design
163912338 ch-13-systems-analysis-and-design163912338 ch-13-systems-analysis-and-design
163912338 ch-13-systems-analysis-and-design
 
Different Approaches To Sys Bldg
Different Approaches To Sys BldgDifferent Approaches To Sys Bldg
Different Approaches To Sys Bldg
 
Formal meth
Formal methFormal meth
Formal meth
 
Marking report
Marking reportMarking report
Marking report
 
Software Risk Analysis
Software Risk AnalysisSoftware Risk Analysis
Software Risk Analysis
 
System_Analysis_and_Design_Assignment_New2.ppt
System_Analysis_and_Design_Assignment_New2.pptSystem_Analysis_and_Design_Assignment_New2.ppt
System_Analysis_and_Design_Assignment_New2.ppt
 
Intro sad
Intro sadIntro sad
Intro sad
 
Lab management
Lab managementLab management
Lab management
 

Recently uploaded

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 

Recently uploaded (20)

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 

Scenario 4

  • 1. Scenario 4. 2010 Tom Langley
  • 2. Dar Es Salaam High School has recently been formed by joining together six smaller schools. The head teacher wants to have a modern ICT system to administer staff and student records. She has decided to employ a systems analyst to look at the existing systems and recommend a new system.
  • 3. The system will need to produce hundreds of reports in one session and should be able to find individual records very quickly. Using the results of the analysis of the current system the analyst will need to design the new system. Once the system has been designed and developed, user and technical documentation will need to be produced.
  • 4. 6a) Other than observation, describe the methods that the systems analyst could use to research the current systems. [3]
  • 5. Distribute/Hand out written questionnaires to system users (to complete) [1] Interview current system users face to face [1] Examining documents used in the current system [1]
  • 6. Examiners Response The answers provided were generally vague descriptions with little reference to teachers and the school. It is surprising to see that despite teachers being the focal point of this scenario as being the ‘system users’ candidates often referred to ‘workers’ or ‘employees’ thereby implying that everybody would be interviewed or given questionnaires rather than the staff concerned. Some candidates were able to answer the question well.
  • 7. 6b) Describe four different items that the systems analyst will need to include at the design stage. Using the scenario of Dar Es Salaam High School, explain the factors that will influence the choice of each item. [8]
  • 8.
  • 9. Examiners Response Candidates were able to score highly on the part of the question which asked for items of design but, despite being told in the question to refer to the scenario, candidates frequently gave general answers not related specifically to the scenario when explaining the factors.
  • 10. 7a) Explain the purpose of technical documentation. [2]
  • 11. Two from: Produced specifically for systems analysts/programmers. Helps when the system needs further development/upgrading/improvements. Helpful should any errors occur in the system and system needs amending to get rid of these errors.
  • 12. Examiners Response This was the part of the question which most candidates found straightforward with many scoring high marks.
  • 13. 7b) Describe the two types of technical documentation including details of the contents of each one. [8]
  • 14. Eight from: Systems documentation.... ....provides a detailed overview of the whole system. Test data/test plans so that systems analyst can see the results of these/test results. Can use this data again to check if errors have been successfully removed. The results of the systems analysis/DFD diagrams. What is expected of the system/purpose of the system. Overall design decisions such as the choice of hardware and software/file, input and output structures.
  • 15. Systems flowcharts. Program documentation.... ....produced for program code that has been written. Description of the software/purpose of the software. Reasons for choosing those pieces of existing software that were used… ….. instead of the programmer having to write code. Input and output data formats. Program flowcharts/algorithms. Program listing – this will be a complete copy of the code used… …and annotation explaining what each module of code does. Notes that will help any future programmer to make modifications to the system.
  • 16. Examiners Response This part of the question enabled candidates to score some marks with many getting quite high marks. It was, however, the question which was left unanswered by a substantial number of candidates.
  • 17. 7c) After the system has been developed it will be evaluated.Describe how test results are recorded and explain how they affect this evaluation. [3]
  • 18. Three from: (A table) showing the type of test, test data, expected results, actual results and a comment on the results. (One mark for three column headings, two marks for 5 column headings.) Test results will help the systems analyst to make judgements. Comparison will be made of the actual results with the expected results. If the results are not as expected system will need to refined. Comments in the comparison table contribute to the evaluation.
  • 19. Examiners Response Candidates found this the hardest question on the paper. Many were unable to visualise what a test plan would look like and instead concentrated on answering as if this was a question about types of test data with descriptions of normal/live and abnormal/extreme data.