Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
SUBJECT: SAD (BCA – 2) 1/47 Multiple-choice questions: 1. The major goal of requirement determination phase of information system development is a. determine whether information is needed by an organization b. determine what information is needed by an organization c. determine how information needed by an organization can be provided d. determine when information is to be given Answer: b 2. Information requirements of an organization can be determined by a. interviewing managers and users and arriving at the requirements based on consensus b. finding out what similar organizations do c. telling organization what they need based on your experience d. sending a questionnaire to all employees of the organization Answer: a 3. Requirement specification is carried out a. after requirements are determined b. before requirements are determined c. simultaneously with requirements determination d. independent of requirements determination Answer: a 4. A feasibility study is carried out a. after final requirements specifications are drawn up b. during the period when requirements specifications are drawn up c. before the final requirements specifications are drawn up d. at any time Answer: c 5. The main objective of feasibility study is a. to assess whether it is possible to meet the requirements specifications b. to assess if it is possible to meet the requirements specified subject to constraints of budget, human resource and hardware c. to assist the management in implementing the desired system d. to remove bottlenecks in implementing the desired system Answer: b 6. System test plan is specified a. when the final specifications are drawn up b. during feasibility study c. during the requirements specifications stage d. during system study stage Answer: a 7. The primary objective of system design is to a. design the programs, databases and test plan b. design only user interfaces c. implement the system d. find out how the system will perform Answer: a 8. System evaluation is carried out a. after the system has been operational for a reasonable time b. during system implementation c. whenever managers of user organization want it d. whenever operational staff want it Answer: a Prepared By: Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: SAD (BCA – 2) 2/47 9. The most important attribute of a systems analyst is a. excellent programming skills b. very good hardware designing skills c. very good technical management skills d. very good writing skills Answer: c 10. A computer-based information system a. may require some tasks to be done manually b. should not have any manual tasks c. is always fully automated d. may use only computers Answer: a 11. By technical feasibility of a solution we mean that a. technology is available to implement it b. persons are available to implement it c. persons have technical ability to implement it d. funds are available to implement it Answer: a 12. By operational feasibility we mean a. the system can be operated nicely b. the system is unusable by operators c. the system can be adapted by an organization without major disruptions d. the system can be implemented Answer: c 13. By economic feasibility of a system we mean that a. it is economical to operate b. it is expensive to operate c. it will be cost-effective if implemented d. finances are available to implement the system and it will be cost-effective Answer: d 14. A cost-benefit analysis is performed to assess a. economic feasibility b. operational feasibility c. technical feasibility d. all of the above Answer: d 15. A data dictionary has consolidated list of data contained in (i) dataflows (ii) data stores (iii) data outputs (iv) processes a. (i) and (iii) b. (i) and (ii) c. (ii) and (iv) d. (i) and (iv) Answer: b 16. By metadata we mean a. very large data b. data about data c. data dictionary d. meaningful data Answer: b 17. It is necessary to carefully design data input to a computer based system because a. it is good to be careful Prepared By: Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: SAD (BCA – 2) 3/47 b. the volume of data handled is large c. the volume of data handled is small d. data entry operators are not good Answer: b 18. In on-line data entry it is possible to a. Give immediate feedback if incorrect data is entered b. Eliminate all errors c. Save data entry operators time d. Eliminate forms Answer: a 19. Data inputs which require coding are a. fields which specify prices b. key fields c. name fields such as product name d. fields which are of variable length Answer: b 20. System Study involves a: study of an existing system b: documenting the existing system. c: identifying current deficiencies and establishing new goals d: All of the above Answer: d 21. The primary tool used in structured design is a: a: structured chart b: data-flow diagram c: program flowchart d: None of the above Answer: a 22. In a _____ one module of the new information system is activated at a time. a: System Development Life Cycle b: CASE tool c: Phased Conversion d: None of the above Answer: c 23. The approach used in top-down analysis and design is a: to identify the top level functions by combining many smaller components into a single entity b: to prepare flow charts after programming has been completed c: to identify a top level function an d then create a hierarchy of lower-level modules and components. d: All of the above Answer: c 24. Documentation is prepared a: at every stage b: at system design c: at system analysis Prepared By: Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: SAD (BCA – 2) 4/47 d: at system development Answer: a 25. Which of the following is not true of the conversion phase of the development life cycle? a: the user and systems personnel must work closely together. b: steps must be taken to phase out the old system c: documentation should be emphasized d: the non machine components of the system should be considered Answer: c 26. In phase 1 of the system development life cycle, which of the following aspects are usually analyzed? a: outputs b: input c: controls d: All of the above Answer: d 27. To run the old system and the new system at the same time for a specified period, the system implementation approach used is a: pilot b: phased c: parallel d: direct Answer: c 28: A decision tree uses a: pictorial depiction of alternate conditions b: nodes and branches c: consequences of various depicted alternates d: All of the above Answer: d 29: A decision table facilitates conditions to be related to a: actions b: programs c: tables d: operation Answer: a 30: A branch office, location or other data processing centers, where a newly developed system is used under normal operating conditions for several months, to test it, is called a: beta test data b: alpha test data c: string test data d: system test data Answer: a 31.Which are the tools not used for System Analysis a: System - test data b: Decision table c: Data Flow Diagram d: Flowcharts Answer: a 32. Acceptance testing is a: running the system in line with the requirements of the actual user b: making sure that the new programs do in fact process certain transactions according to Specifications Prepared By: Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: SAD (BCA – 2) 5/47 c: is checking the logic of one or more programs in the candidate systems d: testing changes made in an existing or a new program Answer: a 33. A Decision Table has _____ (number) quadrants: a: Four b: Two c: One d: Eight Answer : a 34: The symbol used to represent a process in a DFD: a: Circle b: Arrow c: Square d: Open Rectangle Answer: a 35: The symbol used to represent a data-store in a DFD: a: Circle b: Arrow c: Square d: Open Rectangle Answer: d 36. When logic is represented using if-then-else statements, the structured analysis tool used is: a: Algorithm b: Structured English c: Logical English d: Decision Table Answer: b 37. Data structures in motion are called: a: Data-flows b: Data-in-motion c: Data-in-action d: None of the above Answer: a 38: When the modules in a system have minimum dependence on each other, the process is known as: a: Cohesion b: De-coupling c: Coupling d: Independence Answer: b 39: When the statements in a module, relate to only a single task: a: Cohesion b: De-coupling c: Coupling d: Independence Answer: a 40. A group of data-elements handled as a single unit: a: Data-structure b: Structure c: Data-repository d: Data-store Answer: a 41. A self-monitoring system is called: Prepared By: Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: SAD (BCA – 2) 6/47 a: Dynamic system b: Cybernetic system c: Controlling system d: Computer based system Answer: b 42: The elements of a dynamic system: a: Input, process, output b: Input, output, feedback c: Input, control, output d: Input and output Answer: a 43: In a system in which input, process and output are known with certainty: a: Formal system b: Physical system c: Deterministic system d: Purposive system Answer: c 44. The study which helps in deciding whether the system is workable or not: a: Analytical study b: Design study c: Feasibility study d: None of the above Answer: c 45: The testing in which each program is tested with other programs to see if they interact well: a: Program testing b: System testing c: Interoperability testing d: String testing Answer: d 46: The tool used in structured analysis which is a matrix containing rows and columns: a: Structured English b: Decision Table c: Decision Tree d: Data Flow Diagram Answer: b 47: If a system neither accepts nor provides input or output to external environment, it is called: a: closed system b: physical system c: formal system d: none of the above Answer: a 48: When smaller systems make-up a large system, the large system is called: a: integrated system b: holistic system c: super system d: consolidated system Answer: c 49: The feasibility which analyzes whether a project can be completed within a give time-frame: a: schedule feasibility b: periodic feasibility c: productive feasibility d: timing feasibility Answer: a Prepared By: Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: SAD (BCA – 2) 7/47 50: The activity in system requirement determination involving the study if current system using fact-finding techniques: a: requirement investigation b: requirement specification c: requirement anticipation d: none of the above Answer: a 51: The technique that helps collect information related to a large system by investigating smaller and randomly selected items: a: sampling b: choosing c: selecting d: identifying Answer: a 52: The qualitative documents which provide details regarding daily activities of the organization: a: memos b: handbooks c: notes d: manuals Answer: a 53: When the on-site observation is held without the knowledge of the respondent: a: obtrusive b: unobtrusive c: contrived d: structured Answer: b 54:The visiting of an auditor in the organization will come under which observation method: a: obtrusive b: unobtrusive c: contrived d: structured Answer: a 55: When the observation takes place in a set-up by the observer: a: obtrusive b: unobtrusive c: contrived d: structured Answer: c 56: The way of conducting an interview in which the interviewer follows a “thumb rule” approach: a: formal b: legalistic c: political d: informal Answer: b 57: The “play it by ear” approach to an interview is also called: a: formal b: legalistic c: political d: informal Answer: d 58: The FLIP approaches to interviewing were given by: a: F.W. Taylor Prepared By: Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: SAD (BCA – 2) 8/47 b: Jerry and Ardra Fitzgerald c: Larry Constantine d: Mintzberg Answer: b 59: The question in which the respondent is given specific responses to choose from: a: responsive b: open-ended c: closed d: none of the above Answer: c 60: When owners, designers and builders work together with system analyst to together define and design the system: a: Group Application Development b: Group System Development c: Joint Application Development d: Joint activity Answer: c 61: An implementation independent DFD: a: Logical b: Physical c: Context d: none of the above Answer: a 62: A DFD which explains the whole system with a single process: a: Logical b: Physical c: Context d: level-one Answer: c 63: The structured analysis tool which uses English language but does not conform to any one programming language: a: Structured English b: Pseudocode c: Flow-chart d: none of the above Answer: b 64. DFDs were first developed by: a: F.W. Taylor b: Jerry and Ardra Fitzgerald c: Larry Constantine d: Mintzberg Answer: c 65: Environment is_______ of a system: a: part b: category c: element d: property Answer: c 66: A DFD is also known as: a: bubble chart b: system analysis chart c: process chart d: none of the above Prepared By: Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: SAD (BCA – 2) 9/47 Answer: a 67: A field which can not be divided further: a: atom b: fundamental c: basic d: data element Answer: d 68: A decision table consists of two parts called: a: stub and entry b: condition and entry c: action and stub d: action and entry Answer: a 69: When lower-level modules are grouped together to form higher level modules, the system design strategy is called: a: top-up strategy b: top-down strategy c: bottom-up strategy d: bottom-down strategy Answer: c 70:Factors affecting software complexity: a: Number of modules b: Cohesion and coupling between modules c: cost of constructing each modules d: all of the above Answer: b 71: HIPO is the acronym for: a: Hierarchy plus Input-Process-Output b: Hypothetical Input-Process-Output c: Hierarchy Input Program Output d: none of the above Answer: a 72: The design methodology which uses easy-to-draw vector like symbols between processes: a: HIPO chart b: IPO chart c: structured walkthrough d: pseudocode Answer: a 73: An activity of all phases of a structured project developed with the purpose of anticipating problems in system design: a: HIPO chart b: IPO chart c: structured walkthrough d: pseudocode Answer: c 74: When two different entities are referred by a single name: a: semantic homonyms b: semantic synonyms c: semantic antonyms d: none of the above Answer: a Prepared By: Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: SAD (BCA – 2) 10/47 75: _____ comprises the documentary proofs of several control methods that a transaction is put through at the time of processing: a: audit trail b: monitoring c: processing d: none of the above Answer: a 76: ________ involves the process of assessing and enhancing the internal control over time: a: audit trail b: monitoring c: processing d: none of the above Answer: b 77: The technique used in database design which specifies the relationship between different entities: a: IPO b: HIPO c: E-R Model d: DFD Answer: c 78: The type of validation which traces the flow of processes and evaluates them: a: level to level validation b: data to data validation c: process to process validation d: none of the above Answer: c 79: Documentation that fully describes each and every program within the information system is called: a: user documentation b: program documentation c: system documentation d: software documentation Answer: c 80: The process of converting user-originated inputs to computer-based format: a: output design b: input-design c: database design d: process design Answer: b 81: A three-column chart which shows the input and output requirements and the processing needed to provide the output: a: IPO b: HIPO c: Decision table d: none of the above Answer: a 82: The identification and recording of source data is called: a: data validation b: data entry c: data capture d: any of the above Answer: c 83: The method of data entry in which scanners are used: a: batch input method b: online data entry Prepared By: Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: SAD (BCA – 2) 11/47 c: source data automation d: none of the above Answer: c 84: The GUI interface which allows the user to select one or more values from a value-set: a: radio button control b: check box control c: spin box control d: tab control Answer: b 85: A single copy form which is prepared manually or by machine: a: single form b: simple form c: NCR form d: flat form Answer: d 86: A______ is a document containing some predefined data and provides fields for additional data input by the user: a: form b: memo c: report d: chart Answer: a 87: Form with several copies without carbon-paper: a: NCR paper b: fanfold form c: snap-out form d: none of the above Answer: a 88: A type of user-interface which provides a list of options to the user: a: natural language interface b: command interface c: GUI d: menu interface Answer: d 89: The level of quality assurance in which the software is checked whether it is obeying the coding rules: a: code walk-through b: compilation and linking c: routine running d: performance test Answer: a 90: In an E-R model, ______ is shown by an oval symbol: a: strong entity b: relationship c: attribute d: weak entity Answer: c 91: After the system requirements have been determined, the next stage is: a: designing the system b: analyzing the needs c: developing the software for it d: testing Answer: b Prepared By: Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: SAD (BCA – 2) 12/47 92: When a system can be developed given the technical possibility, resource constraints and organizational desirability, it is said that the system is: a: Feasible b: Desirable c: Constructible d: Implemental Answer is: a 93: A formal document which specifies the requirements of the system: a: SRS b: Tender c: Invoice d: Questionnaire Answer: a 94: When the statements in a module, relate to only a single task: a: Cohesion b: De-coupling c: Coupling d: Independence Answer: a 95: When a system is repaired to enhance its performance, the type of maintenance is called: a: Corrective b: Adaptive c: Perfective d: Testing Answer: c 96: When MIS is repaired according to some performance failures, the type of maintenance is called: a: Corrective b: Adaptive c: Perfective d: Testing Answer: a 97. A system which is a collection of interdependent ideas: a: Open Systems b: Logistic Systems c: Abstract Systems d: Probabilistic Systems Answer: c 98: The person responsible for analysis, designing and implementing systems to fulfill organizational needs: a: CIO b: System Analyst c: Manager-MIS d: CEO Answer: b 99: The type of testing in which multiple modules are tested whether they are working together: a: interoperability testing b: performance testing c: integration testing d: structural testing Answer: c 100: The type of testing in which the entire software is tested to determine if all reported errors have been fixed and no new ones have been introduced: a: regression testing Prepared By: Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: SAD (BCA – 2) 13/47 b: compatibility testing c: interoperability testing d: performance testing Answer: a 5 – Mark Questions Q1. Ans. Explain various facts gathering techniques. Various facts gathering techniques are: 1. Review of Literature, Procedures and forms 2. On-Site Observations 3. Interviews 4. Questionnaires 5. Joint Application Development 1. Review of Literature, Procedure and forms: Very few system problems are unique. The increasing number of software packages suggests that problem solutions become standardized. Therefore, as a first step, a search of literature through professional references and procedures, manuals, textbooks, company studies or consultant studies may prove invaluable. The primary drawback of this search is time. Procedure manuals and forms are useful sources for the analyst. They describe the format and functions of the present system. Up to date manuals save hours of information-gathering time. 2. On-Site Observations: Another fact-finding tool used in system studies is on-site observation. It is the process of recognizing and noting people, objects and occurrences to obtain information. The major objective of on-site observation is to get as close as possible to the real system being studied. As an observer, the analyst follows a set of rules. While making observations, he is more likely to listen than talk and to listen with a sympathetic and genuine interest when information is conveyed. 3. Interviews: The interview is a face-to-face interpersonal role situation in which a person called interviewer asks a person being interviewed questions designed to gather information about a problem area. It can be used for two main purposes: a) As an exploratory device to identify relations or verify information and b) To capture information, as it exists. 4. Questionnaire: In contrast to the interview is the questionnaire, which is a term, used for almost any tool that has questions to which individuals respond. It is usually associated with self-administered tools with items of the closed or fixed alternative type. 5. Joint Application Development- At times personal interviews are time consuming and subject to error. Hence, a technique called Joint Application Development(JAD) was introduced by IBM. JAD uses highly organized and intensive workshops to bring together system owners, users, analysts, designers and builders to jointly define and design the system. It requires special skills on the part of the analyst. JAD saves time and cost. Q2. Differentiate between White box and black box testing. Ans. Black Box Testing White Box Testing Black Box Testing is a software testing method White Box Testing is a software testing method in which the internal in which the tester knows the internal structure/design/implementation of the item structure/design/implementation of the item being tested is NOT known to the tester being tested. Mainly applicable to higher levels of Mainly applicable to lower levels of testing: Unit testing: acceptance testing and system testing. testing and integration testing. Programming knowledge is not required in Programming knowledge is required to perform performing the black box testing. the white box testing. Implementation knowledge is not required for Implementation knowledge is required to performing black box testing. perform white box testing. Q3. Explain the primary activities of system maintenance and the types of maintenance. Ans. Maintenance activities begin where conversion leaves off. Maintenance is handled by the same planning and control used in a formal system project. Documentation is as much a part of maintenance as it is of system development. Analysts and programmers spend far more time maintaining programs than they do writing them. The various activities involved in system maintenance are: 1. Request for systems service Prepared By: Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: SAD (BCA – 2) 14/47 2. Request system and program documentation 3. Specify required modifications 4. Acquire source program statement printout from library 5. Make required changes to programs and systems 6. Test Changes 7. Submit test results for user approval 8. Return modified documentation to library 9. Notify user of project completion Maintenance can be classified as: 1. Corrective 2. Adaptive 3. Perfective 1. Corrective: Corrective maintenance means repairing processing or performance failures or making changes because of previously not-corrected problems or false assumptions. 2. Adaptive: In adaptive maintenance, program functions are changed to enable the information system to satisfy the information needs of the user. This type of maintenance may become necessary because of organizational changes which may include: a) b) c) d) e) Change in the organizational procedures, Change in organizational objectives, goals, policies, etc. Change in forms, Change in information needs of managers. Change in system controls and security needs, etc. 3. Perfective: Perfective maintenance means enhancing the performance or modifying the program to respond to the user’s additional or changing needs. This type of maintenance undertaken to respond to user’s additional needs which may be due to the changes within or outside of the organization. Q4. What is a DFD? What are the rules to construct a DFD? Ans. Data Flow Diagram is a graphical representation of the logical flow of data. It helps in expressing the system requirements in a simple and understandable form. It is also known as Bubble Chart. There are four main symbols used in a DFD 1 Square: it represents source/destination of a system data. 2.Arrow: It identifies data flow. 3. Circle: it represents a process that transforms incoming data flow into outgoing data flow. 1. Open Rectangle: it represents a data store. Several rules of thumb are used in drawing DFDs: 1. Processes should be named and numbered for easy reference. Each name should be representative of the process. 2. The direction of flow is from top to bottom and from left to right. Data traditionally flow from the source to the destination. Prepared By: Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: SAD (BCA – 2) 15/47 3. When a process is exploded into lower level details, they are numbered. 4. The names of data stores, sources and destinations are written in capital letters. Process and data flow names have the first letter of each word capitalized. For example following DFD shows Order verification and Credit Check Q5. Write a note on decision tables. Explain with example. Ans. Decision Tables: A decision table is a table of contingencies for defining a problem and the actions to be taken. It is a single representation of the relationships between conditions and actions. A decision table consists of two parts: Stub and entry. The stub part is divided into an upper quadrant called the condition stub and lower quadrant called the action stub. The entry part is also divided into an upper quadrant, called the condition entry and a lower quadrant called the action entry. The following rules should be followed in constructing decision tables: 1. A decision should be given a name, shown in the top left of the table 2. The logic of the decision table is independent of the sequence in which the condition rules are written, but the action takes place in the order in which the events occur. 3. Standardized language must be used consistently. 4. Duplication of terms or meanings should be eliminated, where possible. For example: A technical support company writes a decision table to diagnose printer problems based upon symptoms described to them over the phone from their clients. The following is a balanced decision table (created by Systems Made Simple). Printer troubleshooter Rules Printer does not print Y Y Y Y N N N N Conditions A red light is flashing Y Y N N Y Y N N Printer is unrecognized Y N Y N Y N Y N Check the power cable Check the printer-computer cable Actions X X X Ensure printer software is installed X X Check/replace ink Check for paper jam X X X X X X X X Q6.Write a note on Cost-Benefit Analysis. Prepared By: Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: SAD (BCA – 2) 16/47 Ans. Cost Benefit analysis is a procedure that gives a picture of the various costs, benefits and rules associated with a system. The determination of costs and benefits entails the following steps: 1. Identify the costs and benefits pertaining to a given project 2. Categorize the various costs and benefits for analysis 3. Select a method of evaluation 4. Interpret the result of the analysis. 5. Take action Classification of Costs and benefits: The next step in cost and benefit determination is to categorize costs and benefits. The various categories are: 1. Tangible or Intangible Costs and benefits 2. Direct or Indirect Costs and benefits 3. Fixed or Variable costs and benefits Q7. Ans. What are the roles of System Analyst in SDLC? The various roles of the System analyst in SDLC are: 1. Change Agent: The analyst may be viewed as an agent of change. A candidate system is designed to introduce change and reorientation in how the user organization handles information or makes decisions. In the role of change agent, the system analyst may select various styles to introduce change to the user organization. 2. Investigator and Monitor: In defining a problem, the analyst pieces together the information gathered to determine why the present system does not work well and what changes will correct the problem. 3. Architect: Analyst works as liaison between the user’s logical design requirements and detailed physical system design. As architect, the analyst also creates a detailed physical design of candidate systems. 4. Psychologist: Analyst plays the role of a psychologist in the way he reaches people, interprets their thoughts, assesses their behavior, and draws conclusions fro these interactions. 5. Salesperson: Selling changes can be as crucial as initiating change. Selling the system actually takes place at each step in the system life cycle. 6. Motivator: A candidate system must be well designed and acceptable to the user. System acceptance is achieved through user participation in its development, effective user training, and proper motivation to use the system. Q8. Ans. Write a note on input/output design. Input Design: Input design is the process of converting user-originated inputs to a computer-based format. Input Data: The goal of designing input data is to make data entry as easy, logical and free from errors as possible. In entering data, operators need to know the following: 1. The allocated space for each field 2. Field sequence, which must match that in the source document. 3. The format in which data fields are entered; for example, filling out the date field is required through the edited format mm/dd/yy. Input Media and Devices: Source data are input into the system in a variety of ways. The following media and devices are suitable for operation: 1. Punch Cards 2. Key to diskette 3. MICR 4. Mark-sensing readers 5. Optical bar code readers 6. Cathode Ray tube screens 7. Optical Character recognition (OCR) Output Design: Computer output is the most important and direct source of information to the user. Efficient, intelligible output design should improve the system’s relationships with the user and help in decision making. A major form of output is a hard copy from the printer. Printouts should be designed around the output requirements of the user. The following media devices are available for providing computer-based output: 1. MICR readers 2. Line, Matrix and Page printers 3. Computer output microfilm 4. CRT screen display 5. Graph Plotters 6. Audio response Prepared By: Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: SAD (BCA – 2) 17/47 Q9. Ans. Discuss the primary characteristics of an open system. Open System: An open system has many interfaces with its environment. It permits interaction across its boundary; it receives inputs from outside and delivers outputs to the outside. Five important characteristics of open systems are: 1. Input from outside: Open systems are self-adjusting and self-regulating. When functioning properly, an open system reaches a steady state or equilibrium. 2. Entropy: All dynamic systems tend to run down over time, resulting in entropy or loss of energy. Open systems resist entropy by seeking new inputs or modifying the processes to return to a steady state. 3. Process, output and cycles: Open systems produce useful output and operate in cycles. 4. Differentiation: Open systems have a tendency toward an increasing specialization of functions and a greater differentiation of their components. 5. Equifinality: The term implies that goals are achieved through differing courses of action and a variety of paths. Q10. Ans. What advantages does a data dictionary offer in the area of documentation? Data Dictionary: In data flow diagrams, we give names to data flows, processes and data stores. Although the names are descriptive of the data, they do not give details. So following the DFD, our interest is to build some structured place to keep details of the contents of data flows, processes and data store. A data dictionary is a structured repository of data about data. It is a set of all rigorous definitions of all DFD data elements and data structures. A data dictionary has many advantages. The most common advantage of data dictionary is documentation; it is a valuable reference in any organization. During implementation, it serves as a common base against which programmers who are working on the system compare their data descriptions. Also control information maintained for each data element is a cross-referenced in the data dictionary. For example, programs that use a given data element are cross-referenced in a data dictionary, which makes it easy to identify them and make any necessary changes. Finally, a data dictionary is an important step in building a database. Most database management systems have a data dictionary as a standard feature. Q.11. What is a decision tree? Explain with example. Ans. The logic of the process, which may not be very clear through DFD, can easily be represented using a graphic representation, which looks like the branches of a tree, called decision tree. A decision tree has as many branches as there are logical alternatives. It is one way to display an algorithm. Inorder to construct a decision tree: an attribute to be placed at the root of the decision tree has to be selected and a branch has to be made for every possible value. This process has to be repeated recursively for each branch. Example of decision-tree is as follows: Prepared By: Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: SAD (BCA – 2) 18/47 Q12.Explain briefly the procedure used to construct questionnaires. Also list their advantages. Ans. A questionnaire is a research instrument consisting of a series of questions and other prompts for the purpose of gathering information from respondents. Although they are often designed for statistical analysis of the responses, this is not always the case The procedure for constructing a questionnaire consists of six steps: 1. Decide what data should be collected, that is, define the problem to be investigated. 2. Decide what type of questionnaire (closed or open-ended) should be used. 3. Outline the topics for the questionnaire and then write the questions. 4. Edit the questionnaire for technical defects or biases that reflect personal values. 5. Pretest the questionnaire to see how well it works. 6. Do a final editing to ensure that the questionnaire is ready for administration. This includes a close look at the content, form, and sequence of questions as well as the appearance and clarity of the procedure for using the questionnaire. The advantages of a questionnaire are as follows: The responses are gathered in a standardised way, so questionnaires are more objective, certainly more so than interviews. Generally it is relatively quick to collect information using a questionnaire. However in some situations they can take a long time not only to design but also to apply and analyse (see disadvantages for more information). Potentially information can be collected from a large portion of a group. This potential is not often realised, as returns from questionnaires are usually low. However return rates can be dramatically improved if the questionnaire is delivered and responded to in class time. Usually, a questionnaire consists of a number of questions that the respondent has to answer in a set format. A distinction is made between open-ended and closed-ended questions. An open-ended question asks the respondent to formulate his own answer, whereas a closed-ended question has the respondent pick an answer from a given number of options. The response options for a closed-ended question should be exhaustive and mutually exclusive. Q13. Ans. Explain the advantages of top down design. A design is said to be top-down if it consists of a hierarchy of modules, with each module having a single entry and a single exit subroutine. Top-down design is an incremental approach to the construction of program Prepared By: Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: SAD (BCA – 2) 19/47 structure. In this design strategy, the design starts from the highest level module and moves down to the lowest level. The main module is divided into several smaller and simpler sub-modules based on the task performed by each module. N1 N2 N5 N8 N3 N6 N4 N7 N9 Top Down in a series of four steps: The top down approach is performed The Main control module is used asDesign a design driver and stubs are substituted for all components directly subordinate to the main control module. Depending on the Top-down design integration approach, selected subordinate stubs are replaced one at a time with actual components. Designs are conducted as each component is integrated. On completion of each set of design another stub is replaced with real components. The primary advantages of this design are as follows: 1. Critical interfaces are tested first. 2. Early versions of the design, though incomplete, are useful enough to resemble the real system. 3. Structuring the design provides control and improves confidence. 4. The procedural characteristics define the order that determines processing. Q14 Ans. What is implementation? How does it differ from conversion? Implementation: An important aspect of a system analyst’s job is to make sure that the new design is implemented to establish standards. The term implementation has different meanings, ranging from the conversion of a basic application to a complete replacement of a computer system. Implementation is used here to mean the process of converting a new or a revised system design into an operational one. Conversion is one aspect of implementation. The other aspects are the post-implementation review and maintenance. Conversion: Conversion means changing from one system to another. The objective is to put the tested system into operation while holding costs, risks, and personnel irritation to a minimum. It is one part of the implementation. A critical aspect of conversion is not disrupting the functioning of the organization. Three different types of implementation are: 1. Implementation of a computer system to replace a manual system: The problems encountered are converting files, training users, creating accurate files and verifying printouts for integrity. 2. Implementation of a new computer system to replace an existing one: This is usually a difficult conversion. If not properly planned, there can be many problems. Some large computer systems have taken as long as a year to convert. 3. Implementation of a modified application to replace existing one: This type of conversion is relatively easy to handle, provided there are no major changes in the files. Q15. Ans. Explain the term system design. Also explain the various phases of system design. The design phase focuses on the detailed implementation of the system recommended in the feasibility study. Emphasis is on translating performance specifications into design specifications. The design phase is a transition from a user-oriented document to a document oriented to the programmers or database personnel. System design goes through two phases of development: 1. Logical design 2. Physical Design 1. Logical Design: A data flow diagram shows the logical flow of a system and defines the boundaries of the system. For a candidate system, it describes the inputs, outputs, databases, and procedures all in a format that meets the user’s requirements. The logical design covers the following: Prepared By: Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: SAD (BCA – 2) 20/47 a) Reviews the current physical system b) Prepares output specifications c) Prepares input specification d) Prepares edit, security and control specification e) Specifies the implementation plan f) Reviews benefits, costs, target dates and system constraints. 2. Physical Design: Following logical design is physical design. This produces the working system by defining the design specifications that tell programmers exactly what the candidate system must do. In turn, the programmer writes the necessary programs or modifies the software package that accepts input from the user, performs the necessary calculations through the existing file or database, produces the report on a hard copy or displays it on a screen. Physical system design consists of the following steps: a) Design the physical system. b) Plan system implementation. c) Devise a test and implementation plan and specify any new hardware/software. d) Update benefits, costs, conversion date and system constraints. Q16. Ans. What is the purpose of system testing? Explain the different types of system testing. Testing is vital to the success of the system. System testing makes a logical assumption that if all the parts of the system are correct, the goal will be achieved. Inadequate testing or non-testing leads to errors that may not appear until months later. Another reason for system testing is its utility as a user-oriented vehicle before implementation. The best program is worthless if it does not meet user needs. System testing consists of the following steps: 1. Program testing 2. String testing 3. System testing 4. System documentation 5. User acceptance testing 1. Program testing: A program represents the logical elements of a system. For a program to run satisfactorily, it must compile and test data correctly and tie in properly with other programs. Program testing checks for two types of errors: Syntax and logic. A syntax error is a program statement that violates one or more rules of the language in which it is written. A logic error, on the other hand, deals with incorrect data fields, out-of-range items, and invalid combinations. Since diagnostics do not detect errors, the programmers must examine the output carefully for them 2. String testing: Programs are invariably related to one another and interact in a total system. Each program is tested to see whether it conforms to related programs in the system. 3. System Testing: System testing is designed to uncover weaknesses that were not found in earlier tests. This includes forced system failure and validation of the total system, as it will be implemented by its user in the operational environment. 4. System documentation: All design and test documentation should be finalized and entered in the library for future reference. The library is the central location for maintenance of the new system. The format, organization, and language of documentation should be in line with system standards. 5. User Acceptance testing: An acceptance test has the objective of selling the user on the validity and reliability of the system. It verifies that the system’s procedures operate to system specifications and that the integrity of vital data is maintained. Q17. Ans. What is Software Requirement Specification? Explain its significance. A Software Requirements Specification (SRS) – a requirements specification for a software system – is a complete description of the behavior of a system to be developed. It includes a set of use cases that describe all the interactions the users will have with the software. In addition to use cases, the SRS also contains nonfunctional (or supplementary) requirements. Non-functional requirements are requirements which impose constraints on the design or implementation. Significance of SRS includes: 1. Establish the basis for agreement between the customers and the suppliers on what the software product is to do. 2. The complete description of the functions to be performed by the software specified in the SRS will assist the potential users to determine if the software specified meets their needs or how the software must be modified to meet their needs. 3. Provide a basis for estimating costs and schedules. The description of the product to be developed as given in the SRS is a realistic basis for estimating project costs and can be used to obtain approval for bids or price estimates. Prepared By: Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: SAD (BCA – 2) 21/47 4. Provide a baseline for validation and verification. Organizations can develop their validation and Verification plans much more productively from a good SRS. 5. Facilitate transfer. The SRS makes it easier to transfer the software product to new users or new machines. Customers thus find it easier to transfer the software to other parts of their organization, and suppliers find it easier to transfer it to new customers. 6. Serve as a basis for enhancement. Because the SRS discusses the product but not the project that developed it, the SRS serves as a basis for later enhancement of the finished product. Q18. Ans. What is structured analysis? List various tools used in structured analysis. Structured Analysis: Structured analysis is a set of techniques and graphical tools that allow the analyst to develop a new kind of system specifications that are easily understandable to the user. The traditional approach focuses on cost/benefit and feasibility analyses, project management, hardware and software selection, and personnel considerations. In contrast, structured analysis considers new goals and structured tools for analysis. The new goals specify the following: 1. Use graphics wherever possible to help communicate better with the user. 2. Differentiate between logical and physical systems. 3. Build a logical system model to familiarize the user with system characteristics and interrelationships before implementation. The various tools used in structured analysis are: 1. Data flow diagram (DFD) 2. Data Dictionary 3. Structured English 4. Decision trees 5. Decision tables 6. Pseudo code Q19. Ans. Explain object oriented development life cycle and modeling. Object Oriented Development Life cycle: The object-oriented development process starts with a customer communication phase. In this phase the main emphasis is on developing the framework of object oriented project . The main stress, in object oriented analysis and design is upon ‘reuse’. Instead of developing objects from scratch, they looked up in the existing library of classes. The objects are also developed in such away that promotes their reusability after completion of their development. In most general form, object oriented analysis and design methods are composed of the following basic steps. However the details and the ordering of the steps vary quite a lot. Identify the ways in which the system interacts with its environment Identify objects and their properties (or attributes) and method names that manipulate these objects. Establish the existing relationships between objects. Identify and characterize the interface(s) of each object Anticipate exceptions that may occur in the objects operations and design the way they would be handled. Implement the objects thus identified into a formal language. Test the objects constructed so far Assemble the objects to form the complete system Test the system. Q.20. Write a short-note on audit trail. . Ans: An Audit trial is a routine designed to allow the analyst, user, or auditor to verify a process or an area in the new system. In a manual system, audit trial includes journals, ledgers and other documents that the auditor uses to trace transactions through the system. However, in an online environment, the form, content and accessibility of records are such that the auditor often has difficulty following a single transaction completely through the system. Some reasons are as follows: o Source documents are no longer used by the system after they are transcribed onto a machinereadable medium. o Files stored on a tape or disk can be read only by a computer which limits the auditing function. o Processing activities are difficult to observe since most of them are within the system. One way to maintain a viable audit trail is to keep a detailed file of the transactions as they occur. The file can then be input for an audit program that extracts the transactions for selected accounts and prints them so that the auditor can trace the status of the account in detail. The important steps in evaluation are as follows: Prepared By: Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: SAD (BCA – 2) 22/47 a. Define the control objectives as separate design and test requirements. b. Re-examine the budget costs to see whether system testing is within limits. c. Review specifications. It is the auditor’s responsibility to build controls into candidate systems to ensure integrity, reliability and confidence of the users at all levels. The auditor should be called in during design as well as testing so that any suggestions he/she has, can be considered before implementation, when changes are less costly. Q.21 What is user-interface and its types. Ans. Abbreviated UI, it is the junction between a user and a computer program. An interface is a set of commands or menus through which a user communicates with a software. The user interface is the system that helps users communicate with the computer system and/or the application system. During the system design process, end user involvement is a must so that the appropriate user interface is designed which meets the user requirements. To design a better user interface so that the system analyst and end users get better information in and out of the system, the following objectives have to be met: • The user interface should be matched with the task. • It should be efficient, ensuring a good speed of data entry with minimum errors.. • Should provide appropriate feedback to users. • Should generate usable queries. • The interface should improve productivity. Different types of user-interface are as follows: Natural-language interfaces permit users to interact with the computer in their "natural" language. Question and answer interface-It is an interface in which the computer displays a question for the user on the screen. The user enters an answer via the keyboard or a mouse click. Following which, the computer acts on the input information in a preprogrammed manner. New users may find the question-and-answer interface most comfortable A menu interface provides the user with an onscreen list of available selections. Menus could be nested and could be set-up to use keyboard/mouse. Form-fill interfaces are onscreen forms displaying fields containing data items or parameters that need to be communicated to the user. Form-fill interfaces may be implemented using the Web. Command language interface allows the user to control the application with a series of keystrokes, commands, phrases, or some sequence of these. It requires memorization of syntax rules which may be an obstacle for inexperienced users. Graphical User Interface(GUI)-allow direct manipulation of the graphical representation on the screen. It can be accomplished with keyboard input, joystick, or mouse. This interface requires more system sophistication than other interfaces. Q.22. What are the different methods of on-site observation? Ans. One of the important techniques to collect data is on-site observation. In this method, the analysts observe the activities of the system directly. One purpose of on-site observation is to get as close as possible to the real system being studied. During on-site observation, the analyst can see the office environment, workload of the system and the users, methods of work and the facilities provided by the organization to the users. While making observations, he is more likely to listen than talk and to listen with a sympathetic and genuine interest when information is conveyed. The different methods of on-site observation are as follows: a: Natural observation- Takes place in a setting, such as employee’s work place. b: Contrived observation- takes place in a set-up by the observer, such as laboratories. c: Obtrusive observation- This takes place with the knowledge of the respondent. For eg. visiting of external auditor in an organization. d: Unobtrusive observation- This is held without the knowledge of the respondent. e: Direct observation- This takes place when the observer observes the system at work by physically present at the actual work-place. f: Indirect observation- This makes use of secondary devices such as video cameras to capture observation. g: Structured observation- It takes place in a formal way in which each activity in the observation is pre-defined. h: Unstructured observation- In this type of observation, the observer observes whatever might be pertinent at the time. Q.23. Write a short-note on HIPO chart. Prepared By: Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: SAD (BCA – 2) 23/47 Ans. HIPO is a forms-driven technique in that standard forms are used to document the information. It consists of a hierarchy chart and an associated set of input/process/output charts. HlPO captures the essence of top- down decomposition; it describes the data input and output from processes and defines the data flow composition. It was developed by IBM as a design aid and implementation technique with the following objectives: 1. Provide a structure by which the functions of a system can be understood. 2. State the functions to be performed by the program rather than specifying the program statements to be used to perform the functions. 3. Provide a visual description of input to be used and output to be 'produced for each level of the diagram. HIPO makes the transformation of input to output data visible. HIPO uses easy-to-draw vector-like symbols between processes that define data communicati0n and data direction. The procedure for generating HIPO diagrams is simple: 1. Begin at the highest level of abstraction and define the inputs to the system and the outputs from it in aggregate terms. 2. Identify the processing steps by those that convert input into output. 3. Document each element using HIPO diagram notation and the associated tree-like structure. 4. Identify sub processes and their respective inputs and outputs. Continue decomposition until the processes cannot be decomposed any further. It is important to use HIPO early in the design phase of a project so that designers can document their thoughts concurrently with the design process. Thus, the preparation of HIPO diagrams is a by-product of the thought process of the design rather than an additional chore. Q.24. What is Software Quality Assurance? Ans. Software quality assurance (SQA) is a systematic, planned set of actions necessary to provide adequate confidence that the software development process or the maintenance process of a software system product conforms to established functional technical requirements as well as with the managerial requirements of keeping the schedule and operating within the budgetary confines. SQA is a comprehensive life-cycle approach concerned with every aspect of the software product development process and includes comprehensive set of quality objectives, measurable quality attributes to assess progress towards the objectives and quantitative certification targets for all component of the software development processes. The Objectives of SQA are as follows: (1) Assuring an acceptable level of confidence that the software will conform to functional technical requirements. (2) Assuring an acceptable level of confidence that the software will conform to managerial scheduling and budgetary requirements. (3) Initiation and management of activities for the improvement and greater efficiency of software development and SQA activities. Typical activities of a SQA process – Requirements validation. – Design verification. – Static code checking(inspection/reviews). – Dynamic testing. – Process engineering and standards. – Metrics and continuous improvement Q.25. What is a system? What are the elements of a system? Ans. A system is an orderly grouping of interdependent components linked together according to a plan to achieve a specific objective. We come into daily contact with the transportation system, the telephone system, the accounting system etc. Prepared By: Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: SAD (BCA – 2) 24/47 To construct a system, the following key elements must be considered: 1. Outputs and inputs: A major objective of a system is to produce an output that has value to its user. Whatever the nature of the output, it must be in line with the expectations of the intended user. Inputs are the elements that enter the system for processing. The output component produces the processed elements in the form of information products to another system for further processing or as a final objective. 2. Processor(s): The processor is the element of a system that involves the actual transformation of input into output. It is the operational component of a system. Processors may modify the input totally or partially, depending on the specification of the output. 3. Control: The control element guides the system. It is the decision-making subsystem that controls the pattern of activities governing input, processing and output. 4. Feedback: Control in a dynamic system is achieved by feedback. Feedback measures output against a standard in some form of cybernetic procedure that includes communication and control. 5. Environment: The environment is the “supra-system” within which an organization operates. It is the source of external element that impinges on the system. In fact it often determines how a system must function. 6. Boundaries and interfaces: A system should be defined by its boundaries-the limits that identify its components, processes, and interrelationships when it interfaces with another system. Q.26. How will you generate a feasibility analysis Report of the system? Ans. Feasibility analysis is carried out in the following steps: Form a Project Team and Appoint a Project Leader: First of all, project management group of the organization, forms separate teams for independent projects. Each project team comprises of one or more system analysts and programmers with a project leader. The project leader is responsible for planning and managing the development activities of the system. Start Preliminary Investigation: The system analyst of each project team starts preliminary investigations through different fact finding techniques. Prepare the Current Systems Flow Chart: After preliminary investigations, the analysts prepare the systems flow chart of the current system. These charts describe the general working of the system in a graphical way. Describe the Deficiencies in the Current system: On studying the systems flow chart, the analysts identify and describe the deficiencies in the current system. Determine Objectives of the Proposed System: The major objectives of the proposed systems are listed by each analyst and are discussed with the project leader. Prepare the Proposed Systems Flow Chart: After determining the major objectives of the proposed system, the analysts prepare their systems flow chart. Systems flow chart of the proposed system are compared with those of current system in order to ensure that they meet the objectives. Determine the Technical Feasibility: The existing computer systems (hardware and software) of the concerned department are identified and their technical specifications are noted down. The analysts decide, whether the existing systems are sufficient for the technical requirements of the proposed system or not. Determine the Economic Feasibility: The analysts determine the costs and benefits of the proposed system in order to ensure that the project is economically feasible. Determine the Operational Feasibility: After determining the economic feasibility, the analysts identify the responsible users of the system and hence, determine the operational feasibility of the project. Presentation of feasibility Analysts: During the feasibility study, the analysts also keep on preparing the feasibility study report. At the end of feasibility analysis, the feasibility analysis report is given to the management along with an oral presentation. Q.27. Write and explain the requirements of form design: Ans. Requirements of forms Design Forms design follows analyzing forms, evaluating present documents, and creating new or improved forms. Bear in mind that detailed analysis occurs only after the problem definition stage and the beginning of designing the candidate system. Since the purpose of a form is to communicate effectively through forms design, there are several major requirements. Identification and wording: The form title must clearly identify its purpose. Columns and rows should be labeled to avoid confusion. The form should also be identified by firm name or code number to make it easy to reorder. Maximum readability and use: The form must be easy to use and fill out. It should be legible, intelligible, and uncomplicated. Ample writing space must be provided for inserting data. This means analyzing for adequate space and balancing the overall forms layout, administration, and use. Prepared By: Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: SAD (BCA – 2) 25/47 Physical factors: The form’s composition, color, layout (margins, space, etc.), and paper stock should lend themselves to easy reading. Pages should be numbered when multiage reports are being generated for the user. Order of data items: The data requested should reflect a logical sequence. Related data should be in adjacent positions. Data copied from source documents should be in the same sequence on both forms. Much of this design takes place in the forms analysis phase. Ease of data entry: If used for data entry, the form should have field positions indicated under each column of data and should have some indication of where decimal points are (use broken vertical lines). Size and arrangement: The form must be easily stored and filed. It should provide for signatures. Important items must be in a prominent location on the form. Use of instructions: The instructions that accompany a form should clearly show how it is used and handled. Efficiency considerations: The form must be cost effective. This means eliminating unnecessary data and facilitating reading lines across the form. To illustrate, if a poorly designed form causes 10 supervisors to waste 30 seconds each, then 5 minutes are lost because of the form. If the firm uses 10,000 of these forms per year, then 833 hours of lost time could have been saved by a better forms design. Type of report: Form design should also consider whether the content is executive summary, intermediate managerial information, or supporting-data. The user requirements for each type often determine the final form design Q.28. Ans. What are the activities in the implementation phase of a system? The implementation phase is less creative than system design. It is primarily concerned with user training, site preparation and file conversion. When the candidate system is linked to terminal or remote sites, the telecommunication network and tests of network along with the system are also included under implementation. During the final testing, user acceptance is tested, followed by user training. Depending on the nature of the system, extensive user training may be required. Conversion usually takes place at about the same time, when the user is being trained or later. In the extreme, the programmer is falsely viewed as someone, who ought to be isolated from other aspects of system development. Programming is itself a design work, however, the initial parameters of the candidate system should be modified, as a result of the programming efforts. Programming provides a reality test for the assumption made by the analyst. It is, therefore, a mistake to exclude programmers from the initial system design. System testing checks the readiness and accuracy of the system to access update and retrieve data from new files. Once the programs become available, test data are read into computer and processed against the files provided for testing. If successful, the program is then run with live data. Otherwise, a diagnostic procedure is used to locate and correct errors in the program. In most conversions, a parallel run is conducted, where the new system runs simultaneously with the old system. This system, though costly, provides added assurance against errors in the candidates system, and also provides opportunity to the staff to work with the new system. However, in some cases it is not possible to run parallel systems. For example, it is not possible to run two parallel online Point Of Sale (POS) systems for a retail chain. In any case, after the candidate system proves itself, the old system is phased out. There are three aspects of implementation: Training personnel: It involves systems operator training and user training. Training of operator and users can be organized in several different ways. Most important are among them are: Vendor and in-service training In-house training Conversion procedures: Conversion is a process of changing from the old system to the new one. It must be properly planned and executed. Four methods are common in use. They are: Parallel systems Direct conversion Pilot system System phase-in Post implementation review: After the system is implemented and conversion is complete, a review should be conducted to determine whether the system is meeting expectations and where improvements are needed. A post implementation review measures the system’s performance against pre-defined requirements. It determines how well the system continues to meet performance specifications. It also provides information to determine whether major re-design or modification is required. Q.29. What is an E-R model? Ans.In software engineering, an Entity – Relationship model (ER model ) is an abstract way to describe a database. It usually starts with a relational database, which stores data in tables. Using the three schema Prepared By: Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: SAD (BCA – 2) 26/47 approach to software engineering, there are three levels of ER models that may be developed. The conceptual data model is the highest level ER model in that it contains the least granular detail but establishes the overall scope of what is to be included within the model set. The logical ER model contains more detail than the conceptual ER model. In addition to master data entities, operational and transactional data entities are now defined. The physical model is normally forward engineered to instantiate the structural metadata into a database management system as relational database objects such as database tables, indexes , and database constraints. The building blocks of an E-R model are: entity, relationship, attributes. An entity may be defined as a thing which is recognized as being capable of an independent existence and which can be uniquely identified. An entity may be a physical object such as a house or a car, an event such as a house sale or a car service, or a concept such as a customer transaction or order. A relationship captures how entities are related to one another. Entities and relationships can both have attributes. For eg. an employee entity might have a Social Security Number (SSN) attribute. In this model, tables can be related as any of the following: many-to-many, many-to-one (rev. one-tomany), or one-to-one. This is said to be the cardinality of a given table in relation to another. The entity–relationship modeling uses rectangles to represent entities, and diamonds to represent relationships. Attributes are drawn as ovals and are connected with a line to exactly one entity or relationship set. If an entity set participates in a relationship set, they are connected with a line. Cardinality constraints are expressed as follows: A double line indicates a participation constraint. All entities in the entity set must participate in at least one relationship in the relationship set; An arrow from entity set to relationship set indicates a key constraint. Each entity of the entity set can participate in at most one relationship in the relationship set; A thick line indicates both: each entity in the entity set is involved in exactly one relationship. An underlined name of an attribute indicates that it is a key: two different entities or relationships with this attribute always have different values for this attribute. Q.30. Explain the difference between dynamic and cybernetic systems. Ans. A system is a set of inter-related tasks and procedures working in co-ordination towards achieving a common objective by receiving the inputs and providing the outputs in an organized form. Such a system can be called as dynamic system and has three basic components: input, process and output. All systems operate in an environment where a system is designed to achieve objectives. It sets boundaries for itself. The environment influences the inputs, procedures for processing and nature of outputs. The figure below shows the model of a dynamic system. Environment Boundary Input Processing Output A system which includes two or more components called feedback and control is more effective. Such selfregulating and self-monitoring system is called a cybernetic system. The data that is received about system performance is called feedback. Control is an important system function that monitors and evaluates the feedback to establish if the system is going towards achieving its goal. To ensure that proper output is produced, the control component can make needed adjustments to the input and processing components of the system. The diagram below shows a cybernetic system: Prepared By: Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: SAD (BCA – 2) Feedback Input Control 27/47 Feedback Processing Output Q.31. Write a short-note on Joint Application development. Ans. Joint Application Development (JAD) is a process that accelerates the design of information technology solutions. JAD uses customer involvement and group dynamics to accurately depict the user's view of the business need and to jointly develop a solution. Before the advent of JAD, requirements were identified by interviewing stakeholders individually. The ineffectiveness of this interviewing technique, which focused on individual input rather than group consensus, led to the development of the JAD approach. JAD offers a team oriented approach to the development of information management solutions that emphasize a consensus-based problem-solving model. By incorporating facilitated workshops and emphasizing a spirit of partnership, JAD enables system requirements to be documented more quickly and accurately than if a traditional approach were used. Chuck Morris of IBM conceived JAD in 1977. When to use JAD: Project Types JAD can be successfully applied to a wide range of projects, including the following: ·New systems ·Enhancements to existing systems ·System conversions ·Purchase of a system Project Characteristics Not all projects, however, are good candidates for JAD. An appropriate project exhibits at least some of the following characteristics: ·Involves many groups of users whose responsibilities cross traditional department or division boundaries ·Is considered critical to the future success of the organization ·Involves willing users ·Is a first-time project for the organization ·Has a troubled project history or relationship between the systems and user organizations As the development team and the customer become more comfortable with the JAD approach, more complex projects can be undertaken. Q.32. What is instructor-led training? What are its types? Ans. Instructor-led training or ILT, is the practice of training and learning material between an instructor and learners, either individuals or groups. Instructors can also be referred to as a facilitator, who may be knowledgeable and experienced in the learning material, but can also be used more for their facilitation skills and ability to deliver material to learners. ILT is an effective means of delivering information, as it allows for real-time feedback, questions and answers, manipulation and changeable delivery to suit the needs of learners in a real-time environment, and a learning environment can be created by the instructor's style. Instructors may deliver training in a lecture or classroom format, as an interactive workshop, as a demonstration with the opportunity for learners to practice, or even virtually, utilizing video-conferencing tools; and the instructor may have facilitation and teaching skills, in which they can utilize different methods to engage learners. There are two types of instructor-led training: virtual and normal class-room. Prepared By: Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: SAD (BCA – 2) 28/47 Virtual Instructor-Led Training blends the qualities of Instructor-Led classroom training with the convenience of a virtual, online classroom. The trainer and trainees may not be at the same place. The tools used for training include video conferencing, or virtual reality packages or text-based internet relay chats. In a normal classroom training, the trainers and trainees must meet at the same time and place. The tools used could be blackboard, LCD projectors, etc. Q.33. Explain the pros and cons of each tool used in structured analysis. Draw the DFD for inventory control system Ans. Which tool is the best depends on a number of factors: the nature and complexity of the problem, the number of actions resulting from the decisions, and the ease of use. In reviewing the benefits and limitations of each tool, we come to the following conclusions: 1. The primary strength of the DFD is its ability to represent data flows. It may be used at high or low levels of analysis and provides good system documentation. However, the tool only weakly shows input and output detail. The user often finds it confusing initially. 2. The data dictionary helps the analyst simplify the structure for meeting the data requirements of the system. It may be used at high or low levels of analysis, but it does not provide functional details, and it is not acceptable to many non-technical users. 3. Structured English is best used when the problem requires sequences of actions with decisions. 4. Decision trees are used to verify logic and in problems that involve a few complex decisions resulting in a limited number of actions. 5. Decision trees and decision tables are best suited for dealing with complex branching routines such as calculating discounts or sales commissions or inventory control procedures. The DFD for inventory control system is as shown below: DFD Example Customer Warehouse Invalid Orders Orders Order Detail 1. Receive Order Cust.Name, Address Orders Shipping Detail Customers Cust.Name, Address Billing Info Cust.Name, Address Invoices Goods info 2. Ship goods Goods info Invoice Statement Invoice Details Customer 3. Collect Pmts Pmt. Inquiries Q.34.Write a short note on Post Implementation Review. Ans. The Post-Implementation Review is used to evaluate the effectiveness of the system development after the system has been in production for a period of time (normally 6 months). The objectives are to determine if the system does what it is designed to do, whether it supports the user as required in an effective and efficient manner. The review should assess how successful the system is in terms of functionality, performance, and cost versus benefits, as well as assess the effectiveness of the life-cycle development activities that produced the system. The review results can be used to strengthen the system as well as system development procedures. The review is scheduled to follow the release of a system or system revision by an appropriate amount of time to allow determination of the effectiveness of the system. A representative from the functional development group or other member of the major user organization participates in the review. The System Proponent ensures that all documentation and all personnel needed to participate in the review are accessible. The reviewer and an assigned team collect the information needed for the Post-Implementation Review by interviewing Prepared By: Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: SAD (BCA – 2) 29/47 end users and their managers, system administrators, and computer operations personnel. The report is then prepared and provided to the user organization that requested it and the information systems organization, which may jointly use the findings to initiate other actions. The Post-Implementation Review is a free-form report, and not all sections are relevant or necessary to the final product. A description of the Post-Implementation Review Report is attached. 10-mark questions: Q.1. Ans. Explain the various stages of SDLC. System development, consisting of two components system analysis and system design, starts only when a new system or an improvement in the existing system is required. A candidate system has a life cycle, just like a living system or a new product. The stages are shown in the figure below. The analyst must progress from one stage to another methodically. Identifying Problem Determining information requirements Analyzing system needs Designing the proposed system Developing software Testing Implementing STEPS IN SYSTEM DESIGN Major steps in the SDLC are briefly described below: Identifying the problem One must know, what the problem is before it can be solved. The basis for a candidate system is the recognition of a need for improving an information system or a procedure. If the problem is serious enough, management may want to have an analyst look at it. In larger organizations, where formal procedures are the norms, the analyst’s first task is to prepare a statement specifying the scope and objective of the problem. He/She then reviews it with the user to check if the system is working towards the objectives or there whether there were any problems in the system. Once, the problem has been identified, an important consideration at this stage is the feasibility of the proposed project. Feasibility has 4 important aspects which are: technical, time, economic, operational feasibility. Technical Feasibility identifies whether the technical resources are sufficient for the proposed system or not. Economic Feasibility is the most important study that determines the cost and benefits of the proposed system and compares it with the budget. Operational Feasibility determines whether the system will operate in the way that the user wants. Prepared By: Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: SAD (BCA – 2) 30/47 Time feasibility is the determination of whether a proposed project can be implemented fully within a stipulated time frame. Determining information requirements- At this stage, the system analyst determines the requirements from the user, for the system to work. Sampling and investigating hard data, interviewing, questionnaires, etc. are the tools used for this purpose. Sampling involves systematically determining the selective representative elements of a population. Interviewing is a directed conversation in ‘question and answer’ format. Questionnaire can be used to collect large data from the users of the system. Analyzing system needs At this stage, the system analyst by analyzing the system requirements, determines whether the proposed system is right and headed in the right direction. Various structured analysis tools are used for this purpose, which are: data flow diagram, decision tree, decision table. data dictionary, etc. System Design The most creative and challenging phase of the system life cycle is system design. The term design, describes a final system and process by which it is developed. It refers to the technical specifications (analogous to engineer’s blue prints) that will be applied in implementing the candidate system. The design process of a software system involves two important phases: logical design and physical design. During logical design, the dataflow diagrams made during the analysis phase are analyzed and converted into the design that reveals various kinds of quality attributes supported by structured design. During the physical design phase, the necessary changes are made to the logical design to incorporate the changes in end-user requirements. Developing and documenting software-In this phase, the software is developed. The system analyst works with the programmers. The programmers may use purchased programs or they may design their own customized programs. The documentation is also done explaining why the procedures are coded in a certain way. Testing No system design is ever perfect. Communication problems, programmer’s negligence or time constraints create errors that most be eliminated before the system is ready for user acceptance testing. A system is tested for online response, volume of transactions, stress, recovery form failure and usability. Then comes system testing, which verifies that the whole set of programs hang together, following system testing is acceptance testing or running the system with live data by the actual use. System testing requires a test plan that consists of several key activities and steps for programs string, system and user acceptance testing. Implementation The implementation phase is less creative that system design. It is primarily concerned with user training, site preparation and file conversion. When the candidate system is linked to terminal or remote sites, the telecommunication network and tests of network along with the system are also included under implementation. During the final testing, user acceptance is tested, followed by user training. Depending on the nature of the system, extensive user training may be required. Conversion from old system to new one, usually takes place at about the same time, when the user is being trained or later. Evaluation-Various evaluation approaches are developed for evaluating the system, including the revised design evaluation approach, user involvement evaluations and cost-benefit analysis. Q2. Ans. Write short notes on Elements and various types of System. A system is an orderly grouping of interdependent components linked together according to a plan to achieve a specific objective. We come into daily contact with the transportation system, the telephone system, the accounting system etc. To construct a system, the following key elements must be considered: 1. Outputs and inputs: A major objective of a system is to produce an output that has value to its user. Whatever the nature of the output, it must be in line with the expectations of the intended user. Inputs are the elements that enter the system for processing. The output component produces the processed elements in the form of information products to another system for further processing or as a final objective. Prepared By: Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: SAD (BCA – 2) 31/47 2. Processor(s): The processor is the element of a system that involves the actual transformation of input into output. It is the operational component of a system. Processors may modify the input totally or partially, depending on the specification of the output. 3. Control: The control element guides the system. It is the decision-making subsystem that controls the pattern of activities governing input, processing and output. 4. Feedback: Control in a dynamic system is achieved by feedback. Feedback measures output against a standard in some form of cybernetic procedure that includes communication and control. 5. Environment: The environment is the “supra-system” within which an organization operates. It is the source of external element that impinges on the system. In fact it often determines how a system must function. 6. Boundaries and interfaces: A system should be defined by its boundaries-the limits that identify its components, processes, and interrelationships when it interfaces with another system. Systems are of the following types: . Physical or Abstract system: Physical systems are tangible entities that may be static or dynamitic operation. E.g. The physical parts of computer center are the offices, desks and chairs that facilitate operation of the computer. They can be seen and counted; they are static. Abstract systems are conceptual or nonphysical entities. They may be as straight forward as formulae of relationships among sets of variables or models, the abstract conceptualization of physical situations. A model is a representation of a real or a planned system. They use of models makes it easier for the analyst to visualize relationships in the systems under study. The objective is to point out the key interrelationships of a complex system. Open or closed system: Another classification of systems is based on their degree of independence. An open system has many interfaces with its environment. It permits action across its boundary. It receives inputs from and delivers outputs to the outside. A closed system is isolated from environmental influences. The occurrences in the environment do not affect the nature and functioning of the closed system. Man Made information system: Man-made information systems are those systems which provide a specific task according to user requirements. The basis of the information system may be defined as a set of devices, procedures and OS designed around user-based criteria to produce information and communicate it to the user for planning, control and performance. The major information systems are formal, informal and computer based. Formal information Systems: A formal information system is based on the organization represented by organization chart. The chart is a map of positions and their authority relationships, indicated by boxes and connected by straight lines. It is concerned with a pattern of authority communication and workflow. Information is formally disseminated in instructions; memos or reports from top management to the intended user in the organization. All the policies are developed by top management and transmitted to lower lad management for implementation. The output represents employee performance. Informal information system: The informal system works under an organization. It is an employee based system designed to meet personnel and vocational needs and to help solve work related problems. It also funnels information upward through indirect channels. In this respect it is a useful system because it works within the framework of the business and its stated policies. Computer Based information systems: Computer based information systems manage system with the help of computer. This works if the Analyst is familiar with computer technology. There are two types of computer based information system: Management information system (MIS) and Decision support system (DSS) Q.3. Ans. Explain the various types of feasibility. The proposed system has to be determined whether its workable or not. This is what is called feasibility analysis. During feasibility analysis, the analyst considers seven distinct types of feasibility, all of which are interrelated. Technical Feasibility: During this study, the analyst identifies the existing computer systems (hardware and software) of the concerned department and determines whether these technical resources are sufficient for the proposed system or not. If they are not sufficient, the analyst suggests the configuration of he computer systems that are required. The analyst generally pursues two or three different configurations which satisfy the key technical requirements but which represent different costs. During technical feasibility study, financial resources and budget is also considered. The main objective of technical feasibility is to determine, whether the project is technically feasible, provided it is economically feasible. Economic Feasibility: Economic feasibility is the most important study that determines the cost and benefits of the proposed system and compares with the budget. The cost of the project should not outweigh the budget. The cost of the project includes the cost of hardware, software, development and implementation. Cost/benefit analyst is the common method to determine the benefits that are expected from the proposed system and compare them with the cost expected to spend on development of the system. If benefits are Prepared By: Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: SAD (BCA – 2) 32/47 found to be more than costs, then the analyst decides to continue the development of the proposed system, otherwise considers it economically not feasible. The feasibility study present both tangible (e.g., increased productivity, low operating cost, etc) and intangible benefits (e.g., improved organizational planning, improved assets utilization, etc) in a formal way. Operational Feasibility: When it is found that the project is both economically and technically feasible, the next step is to determine, whether it is operationally feasible or not. During operational feasibility study, it is determined, whether the system will operate in the way that the user wants. Operational feasibility depends upon human resources for the development and implementation of the system. It is considered, whether the qualified and experienced manpower is available for development and implementation of the system. User involvement is more required in determining the operational feasibility. Behavioral Feasibility: People are inherently resistant to change and computers have been known to facilitated change. An estimate should be made of how strong a reaction the user staff is likely to have towards the development of a computerized system. It is common knowledge that computer installation has something to do with turnover, transfer, retraining, and changes in employee job status. Therefore, it is understandable that the introduction of a candidate system requires special effort to educate, sell and train the staff on new ways of conducting business. Social Feasibility: Social feasibility is a determination of, whether a proposed project will be acceptable to the people or not. This determination, typically examines the probability of the project being accepted by the group directly affected by the proposed system change. Management feasibility: It is the determination of whether a proposed project will be acceptable to management. If management does not accept a project or gives a negligible support to it, the analyst will tend to view the project as a non-feasible one. Legal feasibility: Legal feasibility is the determination of whether a proposed project infringes on known acts, statutes, as well as any pending legislation. Although, in some instances the project might appear sound, on closer investigation it may be found to infringe on several legal areas. Time feasibility: Time feasibility is a determination of, whether a proposed project can be implemented fully within a stipulated time frame. If a project takes too much time it is likely to be rejected. After the feasibility study, a document is prepared, which is known as ‘Feasibility study Report’. Besides this report, the analyst also gives the oral presentation of feasibility study to the management. Q4. Ans. Explain Top-down & Bottom-up design. Top-Down: - A Design Strategy is said to be Top-Down, if it consists of a hierarchy of modules with each module having a single entry & a single exit subroutine. Top-down design is an incremental approach to the construction of program structure. In this design strategy, the design starts from the highest level module and moves down to the lowest level. The main module is divided into several smaller and simpler sub-modules based on the task performed by each module. N1 N2 N5 N8 N3 N6 N4 N7 N9 Top Down in a series of four steps: The top down approach is performed The Main control module is used asDesign a design driver and stubs are substituted for all components directly subordinate to the main control module. Depending on the Top-down design integration approach, selected subordinate stubs are replaced one at a time with actual components. Designs are conducted as each component is integrated. On completion of each set of design another stub is replaced with real components. Bottom-up Approach: Bottom-up designing, as its name implies, begins construction and testing with atomic modules (i.e., components at the lowest levels in the program structure). Because components are integrated from the bottom up, processing required for components subordinate to a given level is always available and the need for stubs is eliminated. Prepared By: Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: SAD (BCA – 2) 33/47 A bottom-up integration strategy may be implemented using the following steps: Low-level components are combined into clusters (sometimes called builds) that perform a specific software sub-function. A driver (a control program for testing) is written to co-ordinate test case input and output. The cluster is tested. Drivers are removed and clusters are combined moving upwards in the program structure. Integration follows the pattern illustrated in figure below. Components are combined to form clusters 1, 2, and 3. Each of the clusters are tested using a driver (shown as a dashed block). Components in clusters 1 and 2 are subordinate to Ma. Driver D 1 and D2 are removed and the clusters are interfaced directly to M a. Similarly driver D3 for cluster 3 is removed prior to integration with module Mb. Both Ma and Mb will ultimately be integrated with component Mc and so forth. Mc Ma D1 Mb D2 D3 Cluster 3 Cluster 1 Cluster 2 BOTTOM – UP INTEGRATION If the top two levels of program structure are integrated top down, the drivers can be reduced substantially and integration of clusters is greatly simplified. Q5. Ans. Explain Coupling and Cohesion. Coupling Coupling is a measure of interconnection among modules in a program structure. It may by represented on a spectrum as shown in Figure 5.6 Coupling depends on interface complexity between modules, the point at which entry or reference is made to a module and what data passes the interface. No direct coupling Data coupling Control coupling Stamp coupling Low. | . | . | . | . | . | . | . | . | . | . | . | Coupling High External coupling Content coupling Common coupling Spectrum. | . | . | . | . | . | . | . | . | . | . | . |. In systems design, we strive for lowest possible coupling,. Simple connectivity among modules result is software that is easier to understand and less prone to “ripple effect” caused when error occurs at one location and propagates through a system. Prepared By: Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: SAD (BCA – 2) 34/47 No direct coupling Control flag Data Variable a Data Structure b d i e c f g h j k Globa ldata area The figure above provides an example of different types of module-coupling. Modules ‘a’ and ‘d’ are subroutines to different modules. Each is unrelated and therefore no direct coupling occurs. Module ‘c’ is subordinate to module ‘a’ and is accessed via a conventional argument list through which data are passed; a one-to-one correspondence of items exists, low coupling (data coupling on the spectrum) is exhibited in this portion of structure. A variation of data coupling, called stamp coupling is found when a portion of a data structure (rather than simple arguments) is passed via a module interface. This occurs between module b and a. At moderate levels, coupling is characterized by passage of control between modules. Control coupling is very common in most software designs and is also shown in the figure above. Here i is a control flag (a variable that controls decision is a subordinate or super-ordinate module) which is passed between modules d and e. Relatively high level of coupling occurs when modules are tied to an environment external to software. For example, I/O couples a module to specify devices, formats and communication protocols. External coupling is essential but should be limited to a small number of modules with-in a structure. High coupling also occurs when a number of modules refer to a global data area. Common coupling, as this mode is called, occurs among modules e.g., g and k, in which each uses a global data area. The highest degree of coupling- content coupling- occurs when one module makes use of data or control information maintained within the boundaries of another module. Secondly, content coupling occurs when branches are made into the middle of a module. This mode of coupling can be and should be avoided. Cohesion Cohesion is the degree to which a module performs a single task. A cohesive module performs a single task within a software procedure requiring little interaction with procedures being performed in other parts of a program. Stated simply, a cohesive module should (ideally) do just one thing. Cohesion may be represented as a spectrum shown in the figure below. We always strive for high cohesion, although, the medium range of the spectrum is often acceptable. The scale for cohesion is non-linear. That is, low-ended cohesiveness is much “worse” than the middle range, which is nearly as “good” as high ended cohesion. In practice, a designer need not be concerned with categorizing cohesion in a specific module. Rather, the overall concept should be understood and low level of cohesion should be avoided when modules are designed. Coincidental Procedural Logical Communicational Functional Sequential Temporal Low. | . | . | . | . | . | . | . | . | . | . | . | Cohesion Spectrum. | . | . | . | . | . | . | . | . | . | . | . |. High A module that performs a set of tasks that relate to each other loosely, if at all, is termed coincidentally cohesive. A module that performs tasks that are logically related to each other (e.g., a module that produces all output regardless of type) is logical cohesiveness. When the module contains tasks that are related by the fact that, all must be executed within the same span of time , the module exhibits temporal cohesion. Prepared By: Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: SAD (BCA – 2) 35/47 As an example of low cohesion, consider a module that performs error processing for an engineering analysis package. The module is called, when computed data exceeds pre-specified bounds. It performs the following tasks: Computes supplementary data based on original computed data Produces an error report on user’s workstation Performs follow-up calculations requested by user Updates a database Enables menu selection for subsequent processing Although, the preceding tasks performed are loosely related, each is a separate function entity that might best be performed as separate modules. Combining the function in single module can only serve the likelihood of error propagation when a modification is made to any one of the processing tasks noted above. Moderate levels of cohesion are relatively close to one another in the degree of module independence. When processing elements of a module are related and must be executed in a specific order, procedural cohesion exists. When all processing elements concentrate on one area of data structure, communicational cohesion is present. High cohesion is characterized by a module that performs one distinct procedural task. It is unnecessary to determine the precise level of cohesion. Rather, it is important to strive for high cohesion and recognize low cohesion so that software design can be modified to achieve greater functional independence. Q.6.. Ans. Explain the various steps involved in system testing. The steps involved in system testing are shown through the following diagram: Each of these stages have a definite Entry and Exit criteria , Activities & Deliverables associated with it. In an Ideal world you will not enter the next stage until the exit criteria for the previous stage is met. But practically this is not always possible. The different stages in SDLC are explained below:. Requirement Analysis During this phase, the test team studies the requirements from a testing point of view to identify the testable requirements. The Quality Assurance(QA) team may interact with various stakeholders (Client, Business Analyst, Technical Leads, System Architects etc) to understand the requirements in detail. Requirements could be either Functional (defining what the software must do) or Non Functional (defining system performance /security availability ) . The activities involved in this phase are as follows: Identify types of tests to be performed. Gather details about testing priorities and focus. Prepare Requirement Traceability Matrix (RTM). Identify test environment details where testing is supposed to be carried out. Automation feasibility analysis (if required). Prepared By: Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: SAD (BCA – 2) 36/47 Test Planning This phase is also called Test Strategy phase. Typically , in this stage, a Senior QA manager will determine efforts and cost estimates for the project and would prepare and finalize the Test Plan. Test Case Development This phase involves creation, verification and rework of test cases & test scripts. Test data , is identified/created and is reviewed and then reworked as well. Test Environment Setup Test environment decides the software and hardware conditions under which a work product is tested. Test environment set-up is one of the critical aspects of testing process and can be done in parallel with Test Case Development Stage. Test team may not be involved in this activity if the customer/development team provides the test environment in which case the test team is required to do a readiness check of the given environment. Test Execution During this phase the test team will carry out the testing based on the test plans and the test cases prepared. Bugs will be reported back to the development team for correction and retesting will be performed. Test Cycle Closure Testing team will meet , discuss and analyze testing artifacts to identify strategies that have to be implemented in future, taking lessons from the current test cycle. The idea is to remove the process bottlenecks for future test cycles and share best practices for any similar projects in future. Q.7. Ans. What are different types of documentation? Describe the importance of each type of documentation. After successful testing of the system, all the work done during systems analysis and design is required to be properly organized. The organized way of keeping records of all the documents programs and diagrams prepared during all the phases of system development life cycle (SDLC) is called documentation. All types of written instructions, which are prepared during SDLC and are required for operating and maintaining the system, must be included in the documentation. There are five major types of documentation. They are: Program Documentation: Many companies discuss about programming documentation but fail to provide it adequately. Before a program is developed, the system analyst should provide the programmer with the require documentation. The logic in some programs is best described by a flowchart. Sometimes, decision tables are most appropriate for explaining the logic of a program. Programmers should insist on proper documentation before starting a job. Operations Documentation: A well-designed system may run for a long time with little or no assistance from the systems department. This can happen only when the system has been documented in a proper way. For smooth running of the system, the console operator must have complete knowledge about the job,. Providing the computer center with a set of operating instructions will not serve the purpose. The instructions must be in a form readily accessible to the console operator and written in simple and understandable style. A systems analyst must thoroughly discuss al the requirements of new jobs with their operations staff before the job can be properly transferred. User Documentation: Systems users require proper documentation to prepare a developing system and to smoothly carry out existing ones. To meet this requirement, each system should have a manual that spells everything the users must know to do their job correctly. Users require two general types of information; completer details to handle each case of the system processes, and overall picture of the system so that they can see their role in the total operation of the company. Management Documentation: the documentation required by corporate management differs quite a lot from that required by users. The systems designer must know the requirements of the management and provide documentation to enable management to perform three functions: i. Evaluate progress on system development ii. Monitor existing systems iii. Understand the objectives and methods of new and existing systems. Prepared By: Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: SAD (BCA – 2) 37/47 Management is primarily interested to know, in general, the systems’ overall objectives and basic operations. A brief manual highlighting the key steps in each system may be prepared for management. Good mangers have an exceptional ability to get to the root of a system and their experience should enable them to retrieve information from, a systems summary or chart which may not be apparent to the systems analyst. System Documentation: each phase in the system development cycle is accompanied by appropriate documentation. The systems request, even if it is initially merit, verbally, eventually, must be written. It is desirable for the client and a systems analyst to work jointly in writing the request since each van contribute knowledge the other does not have. The written systems request is merely a statement of the user’s problem. Documentation also includes plans to test the system and convert from the old to the new one. The system analyst must also provide a plan to train the personnel affected by the changes. During the life cycle of the completed system, the system itself must provide documentation of, how well it is operating and consequently should be designed to yield data about itself as a normal by-product. Q.8. Ans. What is disaster/Recovery planning? Why is it important? Who initiates the planning? DISASTER/RECOVERY PLANNING What happens if your system burns out or if a disgruntled employee inflicts serious damage to it? How do you recover? Where do you get your information? Studies have shown that a company’s very survival is threatened within 48 hours after the loss of computer operations. Even a limited disruption or disaster can result in substantial financial losses and even the threat of litigation. Direct financial losses result from the loss of sales and production. Indirect financial losses include long-term loss of customer’s uncollected receivables, and undetected fraud, Loss of control over vital data compromises data integrity and business decisions. Disaster/recovery planning is a means of addressing the concern for system availability by identifying potential exposure, prioritizing applications, and designing safeguards that minimize loss if a disaster occurs. It means that no matter what the disaster, you can cover. The business will survive because a disaster/recovery plan allows quick recovery under the circumstances. How does one guard against such losses? There are several alternatives. After an alternative has been determined a decision must be made about the applications to be processed, the hardware to process the applications, and what would be relocated after a disaster. In disaster/recovery planning, management’s primary roll is to accept the need for contingency planning select an alternative measure, and recognize the benefits that can be derived from establishing a disaster/recovery plan. Top management should establish the disaster/recovery policy and commit corporate support staff for its implementation. The user’s role is also important. The user’s responsibilities include the following: Identifying critical applications, why they are critical, and how computer unavailability would affect the department. Approving data protection procedures and determining how long and how well operations will continue without the data. Funding the costs of backup. The plan When a disaster/recovery procedure is planned, several questions have to be answered: How long would it take to rebuild the computer center or aspects of it? What type of accommodation should we look for in a backup installation? How quickly is it available? What equipment is needed to keep the corporation functioning? How would reports be transmitted to the user? That is, is there going to be a telecommunications network or simply a courier service? What utilities (electric power, air conditioning etc) are required then a disaster occurs? Would there be sufficient experienced staff available for proper recovery? When their questions are answered and management gives its support for a disaster/recovery plan, the next step is to initial a plan that involves four phases. Appointment a disaster/recovery team and a team coordinator to develop the plan or procedure. Prepare planning tasks. Compile a disaster/recovery manual. Dummy run to test the procedure. The team A disaster/recovery team should include a cross section of system designers, users and computer operators. Under the leadership of a coordinator the team’s main functions are to organize the project, monitor progress on the plan, and oversee its completion. The team meets periodically to ensure that the plan is kept up to date, considers new vulnerabilities or exposures to loss, and implements new technology/ or procedures as needed. More specifically the objectives of a disaster/recovery team include the following: Prepared By: Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: SAD (BCA – 2) 38/47 Secure backup sites for occupation and use. Contract for hardware to meet minimum processing needs. Supply working copies of all operating systems and applications programs to meet minimum processing requirements. Supply communication facilities to make reports promptly available to the users. Supply consumables and administrative support. Planning Task Disaster/recovery planning tasks are prepared in a cycle, similar to that of system development. Briefly the cycle entails the following: o Definition phase sets the objectives of there disaster/recovery project. o Requirements phase evaluates applications against disaster/recovery objectives, determines what is to be included in the plan, and specifies priorities. The team takes inventory of the hardware, software, telecommunications, backup and clerical procedures utilities and personnel assignments. o Design phase evaluates design alternatives potential vendors, and prices and chooses the final design. Testing and implementation phase runs backup systems, compares results, and corrects errors. During implementation procedures are written sites are prepared and maintenance plans are developed. Q.9. What is information? What are the characteristics of information? Ans. Information is data that has been processed into a form that is meaningful to the recipient and is having real perceived value in current or prospective decision. It is data that has been put into meaningful and useful context. Some kinds of information are more suitable than others. The value of information depends on the various levels at which it is used. The time-frame for information can be historical or predictive. Historical information is used to design alternative solutions and monitor performance levels. Predictive information is used to plan the tasks and processes based on the input provided. Information may be expected or unexpected. Expected information is predicted through surveys and analysis and unexpected information is the result of certain unforeseen happening. Information can be processed in a detailed manner or in a summarized form. The characteristics of information are as follows: Source- Information can be collected from within the organization as well as from external sources taken into consideration. Scope- It depends on factors like reporting of collected information. Accuracy- The data must be accurate else the conclusions derived on its basis would be incorrect. Element of surprise- It should contain an element of surprise. Good information involves different views and better perspectives that makes a difference. Timeliness- The availability of information when needed is invaluable in making of managerial decisions. Relevance- The information has to be valid and according to the need for being used in decision making. Consistency- Information should be derived from data that displays a consistent pattern over a period. Reliability- Information should be collected from the right sources so that it could be relied upon. Impartiality- The information should not be biased. Pertinence- Information should relate to matters that seem important to persons for whom it is meant. Time frame- Time frame of information may relate to past, present and future and may cover the entire time-span. Frequency- This refers to how often the information is needed and how often it needs to be updated. Reduced uncertainty-Good information reduces unpredictable results and uncertainty. Q.10. What are the different structured analysis tools. Explain. Prepared By: Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: SAD (BCA – 2) 39/47 Ans. Structured analysis tools help the system analyst to document the system specification of a system to be built. The main tools, which are used for the purpose, are given below. 1. Data Flow Diagram (DFD). 2. Data Dictionary. 3. Decision Trees. 4. Structured English. 5. Decision Tables. 6. Pseudocode Data Flow Diagram(DFD)-Data Flow Diagram is a graphical representation of the logical flow of data. It helps in expressing the system requirements in a simple and understandable form. It is also known as Bubble Chart. A DFD consists of series of bubbles joined by lines representing the data flow in the system. There are four main symbols used in a DFD 1 Square: it represents source/destination of a system data. 2.Arrow: It identifies data flow. 3. Circle: it represents a process that transforms incoming data flow into outgoing data flow. 2. Open Rectangle: it represents a data store. Data Dictionary: A data dictionary is a structured repository of data, about data. It is a set of precise and accurate definition of all DFDs, Data elements and data structures. There are mainly three items of data present in a data dictionary. i) Data Element: it is the smallest unit of data and cannot be decomposed further. ii) Data Structures: it is a group of elements handled as a unit. A data structure contains a number of data elements as its fields. iii) Data Flows and Data Stores: data flows are nothing but data structures in motion. Whereas data stores are data structures at rest. Data stores are the locations where data structures are temporarily stored. Decision Tree The logic of the process, which may not be very clear through DFD, can easily be represented using a graphic representation, which looks like the branches of a tree, called decision tree. A decision tree has as many branches as there are logical alternatives. Structured English The logic can be represented by using Structured English. It uses logical construction and imperative sentences designed to carry out instructions for actions. It is most useful when sequences and loops in a program must be taken into account. Prepared By: Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: SAD (BCA – 2) 40/47 Decision table Decision table is a matrix of rows and columns that shows conditions and actions. Decision rules state the procedure to be followed when certain conditions exist. A decision table consists of 4 sections. A condition stub at the upper left, a condition entry at the upper right, an action stub at the lower left, and an action entry at the lower right. Condition Stub Condition Entry Action Stub Action Entry Stub Entry A Decision Table The questions are listed in the condition stub and the action stub outlines the action to be taken to meet each condition. The condition entry part contains the answers to questions asked in the condition stub and the action entry part indicates the appropriate action resulting from the answers to the conditions in the condition entry quadrant. Pseudocode This expresses programming type logic in English language but it does not conform to any one programming language. It may be used during and after the physical design to specify physical programming logic, but without any actual coding. Q.11. What is a DFD? What are its types? Specify the rules to construct a DFD. Ans. Data Flow Diagram is a graphical representation of the logical flow of data. It helps in expressing the system requirements in a simple and understandable form. It is also known as Bubble Chart. There are four main symbols used in a DFD 1 Square: it represents source/destination of a system data. 2.Arrow: It identifies data flow. 3. Circle: it represents a process that transforms incoming data flow into outgoing data flow. 1. Open Rectangle: it represents a data store. Several rules of thumb are used in drawing DFDs: Prepared By: Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: SAD (BCA – 2) 41/47 1. Processes should be named and numbered for easy reference. Each name should be representative of the process. 2. The direction of flow is from top to bottom and from left to right. Data traditionally flows from the source (upper left corner) to the destination (lower right cornered), although they may flow back to a source. One way to indicate this is to draw a long flow line back to the source. An alternative way is to repeat the source symbol as a destination. Since it is used more than once in the DFD, it is marked with a short diagonal in the lower right. 3. When a process is exploded into 1ower'-level details, they are numbered. 4. The names of data stores, sources, and destinations are written in capital letters. Process and data flow names have the first letter of each word capitalized. Different types of DFDs are as follows: It is common practice to draw the context-level data flow diagram first, which shows the interaction between the system and external agents which act as data sources and data sinks. On the context diagram the system's interactions with the outside world are modeled purely in terms of data flows across the system boundary. The context diagram shows the entire system as a single process, and gives no clues as to its internal organization. This contextlevel DFD is next "exploded", to produce a Level 0 DFD that shows some of the detail of the system being modeled. Data flow diagrams (DFDs) are categorized as either logical or physical. A logical DFD focuses on the business and how the business operates. It describes the business events that take place and the data required and produced by each event. On the other hand, a physical DFD shows how the system will be implemented as we mentioned before. For example following DFD shows Order verification and Credit Check Q.12. What is an interview? Specify its objectives. What are the different approaches to an interview? Ans. An interview is "a formal face-to-face meeting, especially, one arranged for the assessment of the qualifications of an applicant, as for employment or admission.... A conversation, as one conducted by a reporter, in which facts, or statements are elicited from another." (The American Heritage Dictionary, Second College Edition) The interview is the primary technique for information gathering during the systems analysis phases of a development project. It is a skill which must be mastered by every analyst. The interviewing skills of the analyst determine what information is gathered, and the quality and depth of that information. Interviewing, observation, and research are the primary tools of the analyst. The interview is a specific form of meeting or conference, and is usually limited to two persons, the interviewer and the interviewee. In special circumstances there may be more than one interviewer or more than one interviewee in attendance. In these cases there should still be one primary interviewer and one primary interviewee. The objectives of an interview are: Prepared By: Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: SAD (BCA – 2) 1. 2. 3. 4. 5. 6. 7. 8. 9. 42/47 Gather information on the company Gather information on the function Gather information on processes or activities Uncover problems Conduct a needs determination Verification of previously gathered facts Gather opinions or viewpoints Provide information Obtain leads for further interviews The different approaches/ ways of interviewing are as follows: 1. Formal approach- It is purely business like, which follows systematic logical plan with no idle talk or undue friendship. 2. Legalistic approach- This approach follows a “thumbs rules” approach. The interviewer always goes “by the book” or always follows rules. 3. Political approach- This approach is based on doing favors for people and acting in a prudent, shrewd and diplomatic way. 4. Informal approach- This approach follows a plan but the interviewer is able to deviate as required without losing control of the situation. The best approach is one in which the interviewer is able to combine the above four approaches. The analyst can be formal when necessary, legalistic when challenged, play politics in necessary situations and be informal in unknown situations. Interviewing musty be adopted throughout the system study because it can produce upto date information where as other documentations are some-time old. During interview, the analyst can observe how the system runs as well as the personality and attitude of the employee which is very important in many situations. Q.13.What are the different design methodologies? Ans. For designing the information systems, it is necessary for the system analyst to comprehend the flow of information in an organization, how it assists in making decisions and how it is associated with the objectives of the organization. To develop a good design, the analyst has to choose a good design methodology. A good methodology is further dependent on the type of application, time available and availability of various other resources. The different design methodologies are as follows: a: Structured design- It is a data-flow based methodology that helps in identifying the input/output from the system. In this methodology, the system specifications act a basis for graphically representing the flow of data and sequence of processes involved in software development with the help of data flow diagrams (DFDs). After developing the DFD, the next step is to develop the structured flowcharts which define the modules of software development and the relationships between them. b: IPO charts- This is the acronym used for Input-Process-Output chart. This charts shows in three columns, the inputs and outputs from the system and the process used to provide the output. The input defines the data external to the process. Typically this is a file composed of related fields. The output is typically a new data, a revised file or a report. After the inputs and outputs have been determined, the analyst finds out the processing requirements. c: HIPO charts-this is a Hierarchy plus Input-Process-Output chart. It is a graphic technique used to explain a system. A sequence of drawings explaining the system, beginning with overview diagrams and then moving further to descriptive diagrams and precise functions is made. It follows structured approach that offers top-down approach for refinement of module-sequence. d: Structured walkthrough- A study of results from the investigation and the models that are built on the basis of these results are defined as structured walkthrough. The purpose of this process is to identify any mistakes or issues. e: Structured Analysis and Design Technique(SADT)- This is a method where large and complex systems are developed. This technique follows a structured approach to analyze and design various system activities, date required in each activity and the inter-relationships. A specific notation is followed to communicate the analysis and design results amongst the departments of a company. f: Pseudocode- It is an approach which uses English words just as Structured English , however unlike the latter, it can be coded like any other programming language. It has three main structures: selection, iteration and sequence. g: Entity Relationship(E-R) model-This is a database-design technique which shows the relationships between different entities. The relationships could be: one to one, one to many and many to many. After the E-R model has been made, the analyst determines the semantic synonyms and homonyms. Q.14. What is conversion? What are the different methods of conversion? Prepared By: Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: SAD (BCA – 2) 43/47 When the final system is ready to go there needs to be a method of converting from the old system to the new system. Conversion is the method to replace the old system with the new one. A conversion plan includes a description of all activities that must occur during the implementation of a new system. This can be done in one of the following four ways: Parallel conversion Parallel conversion involves keeping the old system running alongside the new system for the first couple of weeks or months after the introduction of the new system. This means that any problems with the new system will not affect the continuation of the business. The problem with parallel implementation is that it costs more to run both systems and it also means data has to be entered twice which takes more time and is liable to errors. Direct conversion This involves taking the old system offline and putting the new system online within a day or over a weekend or holiday period. This is cheap but also quick, allowing the new features to be put to use immediately. However if there is a problem with the new system there isn't anything to fall back on. Pilot conversion A pilot conversion involves using the new system in only a small section of the company, for example a single department, branch or office. This allows any bugs to be found without a large effect on the company as a whole. When the system is approved, it is implemented in the entire organization all at once or stage by stage. Phased conversion This involves taking offline parts of the old system and replacing them with the corresponding parts of the new system. The actually conversion from the old parts of the system to the new parts may be either parallel or direct. This provides a compromise between parallel and direct conversion. This approach is advantageous as it has the ability to come up with improved and more accurate estimates of the amount of work to be undertaken, thereby avoiding large contingencies for risk management. Q.15.What are the training strategies and methods? Ans. The success of the training sessions can be ensured and increased in many ways: a. The company must hire high quality IT personnel. b. The hiring process should be fast, focused, decisive and candid. c. The employees should be continuously educated. d. Employees should be trained about the latest information. e. The training courses should be aimed at providing to employees with the skills to input information and generate reports. f. Training should focus on suppressing any negative feelings amongst the users. The users should be motivated to reap out the advantages from training. g. Training is more productive if the end-users are trained by their peers. Such trainings are less technical on aspects of CBIS and concentrate more on the daily tasks which is what is needed. h. Industrial organizations with fewer resources for in-house research and development should focus on projects in conjunction with non-profit research institutions. i. Refresher courses or new training programs should be arranged periodically lest the employees may forget what they had learnt earlier. j . Just-in-time training should be provided. The monolithic and instructor-led courses must be divided into several chunks to be made available when required by users. Prepared By: Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: SAD (BCA – 2) 44/47 k. Employees should be provided with web and computer-based training also. l. The training strategies should be determined by the trainer and the trainee. The analyst ensures that the person/persons whose work is affected by the new system is properly trained. Q.16. What is input design? Specify its objectives? What are the data entry methods and the procedures used for efficient input? Ans. Input is the raw data that is processed to give the output. To have a good quality output, it is imperative that the input should also be of good quality. During input design, the developers must consider the various input devices such as desktop PC, Web-enabled cell-phone, pager, MICR, OCR, etc. the following objectives should be met while designing input: a: Effectiveness- The input-design must serve a specific purpose. b: Accuracy- If the forms are completed accurately, the error rates decline considerably. c: Ease of use-The input designed should be straightforward. It should facilitate an easy entry of data. d: Consistency- The similar data should be grouped from one application to the next. e. Simplicity- The data should be uncluttered. f: Attractiveness- It should appear attractive to the user. The data entry methods that could be used are as follows: a: Batch-input method- Under this method, data is input in batches, one batch at a time. The entry of data is done over a period of time. b: Online data-entry method- In this method data entry and its validation is immediate. c: Source data automation- In this method swipe scanners and magnetic data strips are used. The common examples are: bar code readers, ATMs,MICR,OCR,etc. The input procedures used must be efficient. The input-data collected must be error-free and timely. To ensure this, following points are emphasized: a: Reduce input volume-For this purpose, the following guidelines are emphasized: i. Only necessary data should be input ii. Data which can be calculated or which can be retrieved from other f ields should not be input iii. Constant data should also not be input iv. Codes should be used b: Reduce input errors- Fewer errors in data mean better-quality data. Following are the eight types of datavalidation checks: i. Sequence ii. Range iii. Existence iv. Data-type v. Validity vi. Reasonableness vii. Batch controls Q.17. What is output design? What are its objectives? What should be the considerations to select output media? What are the ways in which output can be biased and what are the ways in which can be avoided? Ans. Computer output is the most important and direct source of information to the user. Efficient, intelligible output design should improve the system’s relationships with the user and help in decision making. A major form of output is a hard copy from the printer. Printouts should be designed around the output requirements of the user. The following media devices are available for providing computer-based output: 1. MICR readers 2. Line, Matrix and Page printers 3. Computer output microfilm 4. CRT screen display 5. Graph Plotters 6. Audio response The objectives for an output design are as follows: Prepared By: Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: SAD (BCA – 2) 45/47 a. The output design should be such which serves the intended purpose and minimizes the production of unwanted output. b. It should meet the end-user requirements. c. Should deliver the appropriate quantity of output d. Output should be directed to the right person only e. It should be available on time for taking good decisions f. It should be in appropriate format for the end-users to understand. The following points should be kept in mind while selecting an output technology: a: Who will be using the output? b: what is the number of people needing the output? c: Where will the output be required? d: What is the required speed? e: What is the frequency with which the output will be accessed? f: How long should the output be kept? g: What are the maintenance costs? h: What are the space, noise, cabling and other environmental constraints? Following are the ways in which the output can be biased: 1. Information sorting- The way information is sorted by the system analyst influences the decision of the decision makers. 2. Setting of acceptable limits- The level of acceptable limits set by the analyst may bias the output. 3. Choice of graphics- Bias may occur in the size of graphics, in color and the scale used to draw a graphics. Methods for avoiding bias are as follows: 1. Work with end users so that they can point out the bias. 2. Be aware of the source of bias. 3. Use interactive design of output for greater flexibility 4. Train end-users to depend on multiple outputs for the conduction of reality tests on system output. Q.18.What are forms and their types? What are the guidelines for designing a good form? Ans. A business document that contains some predefined data and may include some areas where additional data are to be filled in. An instance of a form is typically based on one database record. Form can be considered as the basic business tool (whether printed or electronic) for collecting and transmitting information. It is the catalyst for getting things done and keeps a record of what was done. Forms must be easy to read and write and must appear easy to use. The guidelines for designing a good form are as follows: 1. Keep the screen simple- The form should be designed in a proper sequence i.e. from left to right and from top to bottom. Information such as heading, instructions, etc. Should be grouped logically. Clear captions should be given. 2.Meet the intended people- According to the needs of different people, a system analyst has to define different types of forms. 3. Assure accurate completion- The forms should be accurate and ensure that people act correct information so that error rates could be reduced. 4. Keep forms attractive- The aim should be to make attractive forms whether printed or electronic. 5. Facilitate movement-In online forms, it should be easy to navigate from one screen to another. 6. Controlling forms- Controlling business forms is an important task and usually organizations have a business specialist that does this job. The forms are of the following types: Flat forms- A flat form is a single copy form prepared manually or by a machine and printed on paper. It is easiest to design, print and reproduce. For additional copies of forms, carbon-paper needs to be inserted. It uses less volume and is inexpensive. Snapout forms- These forms have an original copy and several copies with one-time carbon paper interleaved between them. The copies are perforated at the margin for tearing out. Because of perforation and the shorter carbon, the forms can be easily snapped out after completion. Prepared By: Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: SAD (BCA – 2) 46/47 Fanfold form- These are multiple-unit forms joined together in a continuous strip with perforation between each pair of forms. The fanfold is the least expensive construction for large volume use. NCR paper-These are carbonless papers. They use two chemical coatings , one on the face and the other n the back of a sheet of paper. When pressure is applied, the two capsules interact and create an image. Q.19. What are the different types of software testing. Explain. Ans. The different types of software testing are as follows: Unit testing is the process of testing a singular item of software. An example would be a window/form which allows a user to choose two ways of launching the application. Option A will launch exe A whereas Option B will launch exe B. The single form can be launched on its own ( normally by the developer ) and the function of launching each option can be confirmed before adding the code to the main application. System testing is the first time at which the entire system can be tested against the system specification. The specifications are defined within the business analysis documentation defining the programs purpose. Functional Testing is the process of confirming the functionality of the application. Generally this form of testing can be scripted directly from the menu options of the application. Integration Testing is often set up with it’s own testing team who only perform integration testing. The main purpose of this type of testing is to check if the new software interferes with any other functionality of any other software which is running on the companies machines.. Dynamic testing confirms that a deliverable – typically some software – functions according to its specifications. Test scripts and recorded results should be agreed within an acceptance plan This testing can be based on two different aspects. Black box and White box testing Black box testing is the process of testing a function without having access to the code which is converting the data. The name ‘Black Box’ comes from not being able to see how the function works White box testing on the other hand allows the tester to see the code which is converting the data. Consequently the tester can write tests to include data which will ‘trip up the code’. Performance testing is the most effective way to gauge an application or an environment’s capacity and scalability. This type of testing must be automated and record the systems response times to a simulation of users logging onto the system. Stress/Load testing involves running the system under heavy loading by simulating users and functionality’s up to a point where the maximum loads are anticipated from the design specification documentation. Volume testing submits the system to a large volume of data. Normally this is automated and consists of multiple processes being run simultaneously increasing the size of transactions files being processed. Limit Testing -At least one test should be developed for each of the documented system limits Such tests are designed to investigate how the system will react to data which is maximal or minimal in the sense of attaining some limit either specified within the system specification or the user guide. Disaster Recovery Testing -This is clearly a vital area of testing for safety critical and similar systems. The systems reactions to failures of all sorts might need to be tested. During this testing we can identify any corruptions and potential down times during system failure. . User acceptance testing is probably the most known term of testing by non testers. Consequently if the testing structure and stages have not been performed correctly, users will tend to include and lump all aspects of testing into the User Acceptance Testing stage. User Acceptance Testing includes the processes and functionality performed by the users who will be using the system on a day to day basis. The tests will follow the processes from end to end with a fully functional and complete system. Additionally and the more difficult to identify; this phase will also include all the strange and wonderful things the users will attempt to do with the software even though the software was never designed to do these things. Prepared By: Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: SAD (BCA – 2) 47/47 Equivalence class partitioning-A software testing technique which identifies a small amount of input values that invokes as many different input conditions as possible. Boundary Value Analysis-A test data selection technique in which values are chosen to lie along data extremes. Boundary values include maximum, minimum, just inside/outside boundaries, typical values, and error values. Compatibility Testing / Data Migration-Tests are made to probe where the new system does not subsume the facilities and modes of use of the old system where it was intended to do so. In these cases dependent on the system being tested, a parallel run should be considered so that data from the old system can be directly compared to the new system. Prepared By: Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100