Example: bankruptcy

CSC340S - Information Systems Analysis and Design

Csc340 Information Systems Analysis and Design page 1/18 University of TorontoFaculty of Arts and ScienceDepartment of Computer ScienceCSC340S - Information Systems Analysis and DesignSpring 1997 John MylopoulosFinal ExaminationAll Aids AllowedDuration: 2 hoursMake sure that your examination booklet has 18 pages(including this one). Write your answers in the space examination counts for 30% of your final : (Please underline your last name)Student Number: Question Marks I. _____ /20 II. _____ /40 III. _____ /40 Total _____ /100csc340 Information Systems Analysis and Design page 2/18 Part I (20 points) Multiple Choice Questions: 10 questions, 2 points eachDirections: In the following questions, circle exactly one answer which bestcompletes the sentence.

csc340 Information Systems Analysis and Design page 1/18 University of Toronto Faculty of Arts and Science Department of Computer Science CSC340S - Information Systems Analysis and Design ... d. is a methodology used in the social sciences which uses game playing to extract information from the population being studied.

Tags:

  Information, Analysis, System, Design, Games, Information systems analysis and design

Information

Domain:

Source:

Link to this page:

Please notify us if you found a problem with this document:

Other abuse

Transcription of CSC340S - Information Systems Analysis and Design

1 Csc340 Information Systems Analysis and Design page 1/18 University of TorontoFaculty of Arts and ScienceDepartment of Computer ScienceCSC340S - Information Systems Analysis and DesignSpring 1997 John MylopoulosFinal ExaminationAll Aids AllowedDuration: 2 hoursMake sure that your examination booklet has 18 pages(including this one). Write your answers in the space examination counts for 30% of your final : (Please underline your last name)Student Number: Question Marks I. _____ /20 II. _____ /40 III. _____ /40 Total _____ /100csc340 Information Systems Analysis and Design page 2/18 Part I (20 points) Multiple Choice Questions: 10 questions, 2 points eachDirections: In the following questions, circle exactly one answer which bestcompletes the sentence.

2 Although several statements seem correct, only one answer ismost a subfield of anthropology which studies how modern Systems are methods applicable to Information gathering in Systems an area of ethics which looks at the impact of Information systemsimplementations on the work a methodology used in the social sciences which uses game playing to extractinformation from the population being a field of research that tries to understand how people relate to their normalize database order to generate more efficient order to uncover hidden relationships between order not to lose valuable order to make updates more all of the above reasons (a through d.) of the following is a task for a Systems analyst? training courses to new system updating existing Systems software with the new standard releasesarriving from the the main modules of the programs being job descriptions and work specifications for people to be hired with thenew financial resources to pay for the proposed of the above (a through e).

3 Of the following might be an intangible benefit arising from the introductionof a new Information productivity improvement resulting in twice as many ordersprocessed per shrinkage (theft) of inventory through the computerized control of theitems kept in the increase in the amount of money made on interest bearing investmentsbecause of the improvement in handling cash responsiveness and thus, more satisfied of the above items (a through d) represent possible intangible benefits fromthe introduction of an Information of the above items (a through d) represents a possible intangible benefitfrom the introduction of an Information of the following items result in eliminating one or more of the phases of theSystems Development Lifecycle? CASE toolscsc340 Information Systems Analysis and Design page 3 Prototyping toolsc.

4 Purchasing a software application object oriented of the above (a through d). items a through End-User a Systems development process in which the end-user is included in all designmeetings and decision Systems development by the end-user through the use of varioussophisticated software to the training given to end-users in order to help them better understandthe Systems development to the training given to end-users in order to teach them the new systembeing to the marketing strategies used to establish a customer base for newsoftware Structure a structural chart for showing the level and location of errors in a chart for representing the data processes in an organization in objectoriented a chart for showing the possible states of a system and the various transitionspossible between the a chart that describes the detailed architecture of a not explained by any of the above (a)

5 Through d) of the following items is not an appropriate behaviour for a good listening a balance of open-ended and closed-ended responses of - being able to sell the new system to its future of the above items (a through e) are behaviours or qualities needed by a goodinterviewer. Therefore f is the only correct in an Entity-Relationship to the number of higher level entities that are used in the ER used to show the average number of items that might typically be involved ina relationship, , the average number of children a family might have or theaverage number of employees per department in a used to show the ratio of one entity in relationship to another entity, , thenumber of values that might occur for a related entity if the first entity used to show the order of the relationships between two entities, , a manyrelationship always precedes a one Information Systems Analysis and Design page 4/18e.

6 Gives the count of the number of entities involved in a single of the following items of Information is unlikely to be found in a feasibilityanalysis? cost / benefit Analysis comparing alternative a list of the operational problems for the current list of potential intangible benefits that may be gained by undertaking Analysis of the potential risk involved in undertaking the projected schedule for undertaking the set of recommendations on which alternative to of the above items (a through f) represent items likely to be found in afeasibility of the above items except b and e represent items likely to be found infeasibility Information Systems Analysis and Design page 5/18 Part II. Data Flow and Entity-Relationship Diagrams: In the two questionswhich follow, you will be given a description of an Information system and the descriptionof data to be handled by another Information system .

7 Your task will be to draw data flowdiagrams for question 1 and ER diagrams for the data described in question 2. Be sure toread the questions carefully. Do your scratch work on the opposing page before drawingin your final answers. Data flow diagrams which are impossible to interpret because of allthe scratching out and changes are not likely to have the most generous grading (15 points) Below you will find a description of an Information system Draw thecontext level and the level 0 data flow diagrams for this systemProblem Description: Queenston Prison system : A major penal centre has beenbuilt outside the town of Queenston for keeping prisoners convicted of only one offense orof white collar crimes. The prison facility has a constant flow of prisoners into and out ofthe prison They are also moving prisoners within the prison based on their goodbehaviour.

8 On a day to day basis, approximately 136 prisoner changes take place. Thechanges are processed in the prison control centre office by Miss Keepkey. Each day, thenew prisoner processing division receives the new prisoners, conducts a physicalexamination, assigns the prisoners to living quarters and sends the Information file on thenew prisoners to Miss Keepkey s office. Miss Keepkey adds Information on the newprisoner to a prisoner Information database kept on her PC. She also updates her prisonerlocator log which keeps records of where each prisoner resides. Finally, she files theactual folder away in an enormous storehouse of file cabinets which contains informationon all prisoners who have ever stayed at Queenston. If a new prisoner is found to havebeen a previous occupant of Queenston, she consolidates both prisoners stay at Queenston, the officials review their behaviour record.

9 Goodbehaviour or closeness to release time warrant an upgrade in accommodations, usually tominimum security housing. Movement of prisoners to new quarters is done on a weeklybasis. Orders are issued to move the prisoners and the move Information is sent to MissKeepkey. She makes these changes in her prisoner locator log and her prisonerinformation database. She also pulls the prisoners long term file and notes good release review and parole board reviews prisoner records on a daily basis and generates aset of prisoners to be released either into the custody of a parole officer or without anyrestrictions. They notify the prisoner and send an update of the release to Miss Keepkey soffice. She removes the prisoner from her prisoner Information database and prisonerlocator log and updates the long-term file of the prisoner to reflect the Information Systems Analysis and Design page 6/18 Draw the Context Level Diagram for the Queenston Prisoner LocatorSystem:csc340 Information Systems Analysis and Design page 7/18 Scratch PageDraw the Level 0 Data Flow Diagram for the Queenston Prisoner LocatorSystem.

10 Csc340 Information Systems Analysis and Design page 8/18 Final AnswerDraw the Level 0 Data Flow Diagram for the Queenston Prisoner LocatorSystem: csc340 Information Systems Analysis and Design page 9/1812. (25 points) Draw an entity-relationship diagram for the following Aeroporter Transport Services Company runs a limousine service that carriespassengers to and from the Toronto airport to their homes or places of business. Theymaintain a database of customers on a PC in order to schedule pickups and also to keeptheir customers from having to repeat address Information each time they call the limousineservice. The database for the customers is accessed by customer telephone number. If acustomer is picked up sometimes at their home and sometimes at their office, both homeand office telephone numbers and addresses are stored in the database.


Related search queries