assignmentssolution@gmail.com

Get Assignments and Projects prepared by experts at a very nominal fee.

More than 8 years in assisting assignments and projects/dissertation/thesis of MBA,BBA,BCA,MCA,PhD and others-

Contact us at : Email : assignmentssolution@gmail.com

Help for : SMU, IIBM,IMT, NMIMS, NIBM ,KSBM, KAIZAN, ISBM, SYMBIOSIS, NIMS, IGNOU, XAVIER, XIBMS, ISM, PSBM, NSBM, NIRM, ISBM, ISMRC, ICMIND, UPES and many others.

Help in : Assignments, projects, M.Phil,Ph.D disseration & thesis,case studies

Courses,MBA,BBA,PhD,MPhil,EMBA,MIB,DMS,MMS,BMS,GDS etc

Contact us at : Email : assignmentssolution@gmail.com



Monday 29 April 2013

CMJU Exam papers 2013: contact us for answers at assignmentssolution@gmail.com

Question Booklet Code: C Duration: 2 Hours
Course: Diploma in Engineering in Computer Science Year: Second Year
Paper Code: 702203 Paper Name: System Analysis &
Design
ATTEMPT ALL THE BELOW MENTIONED QUESTIONS:
1. A transaction processing system is
concerned with
a. Operational day-to-day activities.
b. Strategic decision-making support.
c. A large database of specialised knowledge.
d. Support for an organisation’s management
needs.
2. A store manager of Red Fried Chicken
only makes operational decisions based
on daily reports.An example of a decision
the manager would make is
a. Changing the type of products sold.
b. Reducing the price of unsold chickens.
c. Implementing a national TV campaign.
d. Opening a new store in a nearby suburb.
3. Which of the following could not be
considered an organisational goal?
a. Increase company profit margin.
b. Expand customer base.
c. Provide quality service.
d. Complete backups every Friday.
4. An organisation’s goal is to ‘improve
the communication of events to
members’. Which of the following
strategies would best achieve this aim?
a. Reduce labour costs.
b. Produce a regular newsletter.
c. Make sure all membership information is
accurate.
d. Use a spreadsheet to keep track of
finances.
5. The profile of an audience can include
its
a. Employment category, income level and
average age.
b. Employment category, favourite colour and
average age.
c. Tax file number, income level and years of
employment.
d. Educational level, Medicare number and
name of doctor.
6. Which of the following is not a
component of an information system?
a. Equipment
b. End-user
c. Organisational goals
d. Procedures
7. Which of the following would not be
considered an end-user of an information
system?
a. A student who accesses information on a
website.
b. A programmer who writes code for a
software module.
c. A customer who uses a credit card in an
EFTPOS machine.
d. A sales assistant in a video shop who
searches a database for a specific title.
8. Which of the following would improve
the effectiveness of a system?
a. Install a barcode reader to reduce the time
needed to enter data.
b. Make it easier for employees to access
information by developing a database.
c. Allow management to make timely
decisions by providing up-to-date information
in a spreadsheet.
d. Automate a manual process to reduce
salaries.
9. The correct order of steps to solve a
problem is
a. Analyse, design, develop, test, evaluate,
implement, document.
b. Analyse, design, test, develop, document,
implement, evaluate.
c. Design, analyse, develop, document,
implement, test, evaluate.
d. Analyse, design, develop, test, document,
implement, evaluate.
CMJ UNIVERSITY, SHILLONG
TERM END EXAMINATION - 2013
2 | P a g e Center for Collaboration of Industry and Institutions (CCII) – www.cmju.in
10. A sales assistant needs to record a
sale by manually completing a form in a
docket book. What is a likely problem
that this practice could lead to?
a. It takes too long for sales to be recorded
and processed.
b. The sales assistant is under-qualified for
the task.
c. The use of a docket book is old fashioned.
d. The information in the docket book is not
timely.
11. A milestone in project management
indicates
a. The passing of 50% of the time allocated to
the project.
b. The completion of the project.
c. The conclusion of an important stage of a
project and has zero time duration.
d. The conclusion of an important stage of a
project and has a time duration equal to the
sum of the time durations for each step of
that stage.
12. A project has a critical path of 21
days. The ‘testing the solution’ task has a
slack time (or lag time) of three days.
What is the minimum time the project
can be completed?
a. 18 days
b. 21 days
c. 24 days
d. Depends on whether the ‘testing the
solutio’ task lies on the critical path.
13. Which of the following is a primary
source of data?
a. A student reads the voltage across a lamp
using a voltmeter.
b. The meaning of a word is read from a
dictionary.
c. A website provides information on the cost
of air flights.
d. A sales brochure indicates what items are
on special.
14. A database of patient information for
a medical clinic is to be developed. From
the patient’s data below, which is the
least important?
a. Patient’s name
b. Patient’s age
c. Patient’s allergies
d. Patient’s credit rating
15. Constraints on data to be used in a
presentation include
a. Copyright restrictions, trademarks,
validation techniques.
b. Copyright restrictions, trademarks, privacy
regulations.
c. Copyright, privacy regulations, validation
techniques.
d. Proofreading, validation techniques, testing
the message.
16. Which design tool would be most
appropriate for a website?
a. Layout diagrams
b. Nassi-Schneidermann diagram
c. Storyboard
d. Data flow diagram
17. A web-based solution has been
developed and needs to be tested. Which
attributes should be tested?
a. Useability, functionality, spelling.
b. Useability, spelling, presentation.
c. Useability, functionality, presentation.
d. Spelling, functionality, presentation.
18. A patient’s medical records are found
at the tip. Which of the following is true?
a. This is a breach of the Health Records Act
2001.
b. This is a breach of the Privacy Amendment
(Private Sector) Act 2000.
c. This is embarrassing but is not actually in
breach of any law.
d. The owner of the tip is liable for damages.
19. One way to secure data for
transmission over a network is to
a. Validate the data
b. Encrypt the data
c. Decrypt the data
d. Archive the data
20. A disaster recovery plan should
include
a. Biometric technology replacement plan,
backup plan, recovery plan, test plan.
b. Biometric technology replacement plan,
emergency plan, backup plan, recovery plan.
c. Biometric technology replacement plan,
emergency plan, backup plan, test plan.
d. Emergency plan, backup plan, recovery
plan, test plan.
21. Accidental damage to an information
system can be caused by
a. User error.
b. Failure to follow file management
procedures.
c. Failure of hardware components.
d. All of the above.
22. How many steps are in the systems
development life cycle (SDLC)?
a. 4
b. 5
c. 6
d. 10
3 | P a g e Center for Collaboration of Industry and Institutions (CCII) – www.cmju.in
23. The first step in the systems
development life cycle (SDLC) is:
a. Analysis.
b. Design.
c. Problem/Opportunity Identification.
d. Development and Documentation.
24. Most modern software applications
enable you to customize and automate
various features using small custom-built
“miniprograms” called:
a. macros.
b. code.
c. routines.
d. subroutines.
25. The organized process or set of steps
that needs to be followed to develop an
information system is known as the:
a. analytical cycle.
b. design cycle.
c. program specification.
d. system development life cycle.
26. How many steps are in the program
development life cycle (PDLC)?
a. 4
b. 5
c. 6
d. 10
27. The make-or-buy decision is
associated with the ____________ step
in the SDLc.
a. Problem/Opportunity Identification
b. Design
c. Analysis
d. Development and Documentation
28. In the Analysis phase, the
development of the ____________
occurs, which is a clear statement of the
goals and objectives of the project.
a. documentation
b. flowchart
c. program specification
d. design
29. Actual programming of software code
is done during the ____________ step in
the SDLc.
a. Maintenance and Evaluation
b. Design
c. Analysis
d. Development and Documentation
30. Enhancements, upgrades, and bug
fixes are done during the ____________
step in the SDLc.
a. Maintenance and Evaluation
b. Problem/Opportunity Identification
c. Design
d. Development and Documentation
31. The ____________ determines
whether the project should go forward.
a. feasibility assessment
b. opportunity identification
c. system evaluation
d. program specification
32. Technical writers generally provide
the ____________ for the new system.
a. programs
b. network
c. analysis
d. documentation
33. ____________ design and implement
database structures.
a. Programmers
b. Project managers
c. Technical writers
d. Database administrators
34. ____________ spend most of their
time in the beginning stages of the SDLC,
talking with end-users, gathering
information, documenting systems, and
proposing solutions.
a. Systems analysts
b. Project managers
c. Network engineers
d. Database administrators
35. ____________ manage the system
development, assign staff, manage the
budget and reporting, and ensure that
deadlines are met.
a. Project managers
b. Network engineers
c. Graphic designers
d. Systems analysts
36. ____________ is the process of
translating a task into a series of
commands that a computer will use to
perform that task.
a. Project design
b. Installation
c. Systems analysis
d. Programming
37. Debugging is:
a. creating program code.
b. finding and correcting errors in the
program code.
c. identifying the task to be computerized.
d. creating the algorithm.
4 | P a g e Center for Collaboration of Industry and Institutions (CCII) – www.cmju.in
38. Translating the problem statement
into a series of sequential steps
describing what the program must do is
known as:
a. coding.
b. debugging.
c. creating the algorithm.
d. writing documentation.
39. Translating the algorithm into a
programming language occurs at the
____________ step of the PDLc.
a. Debugging
b. Coding
c. Testing and Documentation
d. Algorithm Development
40. The problem statement should
include all of the following EXCEPT:
a. input.
b. output.
c. processing.
d. storage.
41. The problem statement includes the
____________, which lists specific input
numbers a program would typically
expect the user to enter and precise
output values that a perfect program
would return for those input values.
a. testing plan
b. error handler
c. IPO cycle
d. input-output specification
42. A data dictionary has consolidated list
of data contained in
(i) dataflows (ii) data stores (iii) data outputs
(iv) processes
a. (i) and (iii)
b. (i) and (ii)
c. (ii) and (iv)
d. (i) and (iv)
43. A data dictionary is useful as
(i) it is a documentation aid
(ii) it assists in designing input forms
(iii) it contains al data in an application
including temporary data used in processes
(iv) it is a good idea in system design
a. (i) and (ii)
b. (i) and (iv)
c. (i),(ii) and (iii)
d. (i) and (iv)
44. By metadata we mean
a. very large data
b. data about data
c. data dictionary
d. meaningful data
45. A data dictionary is usually developed
a. At requirements specification phase
b. During feasibility analysis
c. When DFD is developed
d. When a datadase is designed
46. A data dictionary has information
about
a. every data element in a data flow
b. only key data element in a data flow
c. only important data elements in a data flow
d. only numeric data elements in a data flow
47. A data element in a data dictionary
may have
a. only integer value
b. no value
c. only real value
d. only decimal value
48. A data element in a data flow
(i) may be an integer number
(ii) may be a real number
(iii)may be binary
(iv)may be imaginary
a. (i),(ii),(iv)
b. (iii),(iv),(ii)
c. (i),(ii),(iii)
d. (i) and (ii)
49. It is necessary to carefully design
data input to a computer based system
because
a. it is good to be careful
b. the volume of data handled is large
c. the volume of data handled is small
d. data entry operators are not good
50. Errors occur more often when
a. data is entered by users
b. data is entered by operators
c. when data is handwritten by users and
entered by an operator
d. the key board design is bad
51. Good system design prevents data
entry errors by
(i) Designing good forms with plenty of space
to write in block capitals
(ii)By giving clear instructions to a user on
how to fill a form
(iii)Reducing keystrokes of an operator
(iv)Designing good keyboard
a. i, ii, iii
b. i, ii, iv
c. i, ii
d. iii and iv
52. In on-line data entry it is possible to
a. Give immediate feedback if incorrect data is
entered
b. Eliminate all errors
c. Save data entry operators time
d. Eliminate forms
5 | P a g e Center for Collaboration of Industry and Institutions (CCII) – www.cmju.in
53. The main problems encountered in
off-line data entry are:
(i)Data are entered by operators
(ii)Data entered by hand in forms batched and
forms may be missed or misread
(iii) Errors are detected after a lapse of time
(iv)Data are entered by users
a. i and ii
b. i and iii
c. ii and iii
d. iii and iv
54. In interactive data input a menu is
used to
a. enter new data
b. add/delete data
c. select one out of many alternatives often by
a mouse click
d. detect errors in data input
55.In interactive data input a template is
normally used to
a. enter new data
b. add/delete data
c. select one out of many alternatives often by
a mouse click
d. detect errors in data input
56.In interactive data input terminal
commands are normally used to
a. enter new data
b. add/delete data
c. select one out of many alternatives often by
a mouse click
d. detect errors in data input
57. Data inputs which required coding are
a. fields which specify prices
b. key fields
c. name fields such as product name
d. fields which are of variable length
58. Key fields are normally coded
a. i and ii
b. i and iv
c. ii and iii
d. i and iii
59. A code is useful to represent a key
field because
a. it is a concise representation of the field
b. it is usually done by all
c. it is generally a good idea
d. it is needed in database design
60. By the term “concise code” we
understand that the code
a. conveys information on item being coded
b. is of small length
c. can add new item easily
d. includes all relevant characteristics of item
being coded
61. By the term “expandable code” we
understand that the code
a. conveys information on item being coded
b. is of small length
c. can add new item easily
d. includes all relevant characteristics of item
being coded
62. By the term “meaningful code” we
understand that the code
a. conveys information on item being coded
b. is of small length
c. can add new item easily
d. includes all relevant characteristics of item
being code
63. By the term “comprehensive code“
we understand that the code
a. conveys information on item being coded
b. is of small length
c. can add new item easily
d. includes all relevant characteristics of item
being coded
64. A concise code is necessarily
a. Precise
b. Meaningful
c. Comprehensive
d. Difficult
65. Serial numbers used as codes are
(i) concise
(ii ) meaningful
(iii) expandable
(iv) comprehensive
a. i and ii
b. ii and iii
c. ii and iv
d. i and iii
66. Block codes are
(i)concise
(ii )meaningful
(iii)expandable
(iv)comprehensive
a. i and ii
b. ii and iii
c. iii and iv
d. i and iii
67. Group classification codes are
(i)concise
(ii)meaningful
(iii) expandable
(iv)comprehensive
a. i and ii
b. i, ii and iii
c. ii, iii and iv
d. i, ii and iv
6 | P a g e Center for Collaboration of Industry and Institutions (CCII) – www.cmju.in
68. Significant codes are
(i)concise
(ii)meaningful
(iii )expandable
(iv)comprehensive
a. i and ii
b. i, ii and iii
c. ii, iii and iv
d. i, ii and iv
69. In significant codes some or all parts
of the code
a. are meaningful
b. are usable
c. are significant
d. represent values
70. Errors in codes are detected by
a. proper design of code
b. introducing redundant digits/characters
designed to detect errors
c. making the code concise
d. making the code precise

No comments:

Post a Comment