2920/261
SYSTEMS ANALYSIS AND DESIGN
January 2023
Time: 3 hours
THE KENYA NATIONAL EXAMINATIONS COUNCIL
DIPLOMA IN INFORMATION COMMUNICATION TECHNOLOGY
MODULE III
SYSTEMS ANALYSIS AND DESIGN
3 hours
INSTRUCTIONS TO CANDIDATES
This paper consists of EIGHT questions.
Answer any FIVE questions.
All questions carry equal marks.
Candidates to answer the questions in English.
1.
(a) Define functional requirements as used in system development.
ANSWER: Functional requirements refer to specific behavior, actions, or operations a system should perform to meet user needs. These are the key functions that the system must support for it to fulfill its intended purpose.
(b) Explain two issues that could be captured when formulating a problem statement.
ANSWER:
- Scope Definition: Determining the boundaries of the problem and the system’s expected role in solving it.
- Stakeholder Concerns: Addressing the requirements and expectations of the various users and stakeholders involved.
(c) Differentiate between process-oriented and data-oriented system design models.
ANSWER:
- Process-Oriented Models: Focus on the processes or functions that the system must perform, emphasizing the flow of information and control within the system.
- Data-Oriented Models: Focus on the data, its structure, and relationships within the system, emphasizing how data is stored and retrieved.
(d) Plan and describe activities to design adaptive processes. Outline the stages likely to be carried out to ensure effective development.
ANSWER:
- Requirement Gathering: Understanding the needs and identifying system functionalities.
- Design: Creating system models (such as data and process models).
- Development: Writing the code and implementing the system.
- Testing: Verifying system performance, identifying, and resolving errors.
- Deployment: Rolling out the system into production.
- Maintenance: Addressing any issues and updating the system as needed.
2.
(a) Outline five risks of a system analysis project.
ANSWER:
- Scope Creep: Expansion of project goals beyond the initial plan.
- Technology Risk: Unforeseen technical challenges.
- Budget Overruns: Exceeding the allocated budget due to miscalculations.
- Time Delays: Failing to complete the project within the set timeline.
- Stakeholder Misalignment: Conflicting interests among stakeholders.
(b) Explain the roles of computer systems that support Information Systems.
ANSWER:
- Data Processing: Automating the collection, manipulation, and dissemination of information.
- Decision Support: Assisting in the analysis and decision-making process by providing necessary data.
- Communication: Enabling collaboration and information sharing across various organizational levels.
(c) Discuss interests in designing questionnaires for data gathering. Explain three considerations.
ANSWER:
- Clarity: Ensuring questions are easily understood to avoid misinterpretation.
- Relevance: Asking questions that are directly related to the objectives of the system being developed.
- Structure: Designing the questionnaire in a way that flows logically and encourages comprehensive responses.
3.
(a) Outline four importance of system maintenance.
ANSWER:
- Performance Optimization: Ensuring the system operates efficiently.
- Error Correction: Fixing bugs or issues that arise after the system is implemented.
- System Adaptation: Updating the system to meet new requirements or technologies.
- Security Enhancements: Addressing vulnerabilities to protect against threats.
(b) Detail two Structural System Analysis and Design Methodology (SSADM) techniques.
ANSWER:
- Logical Data Modeling: Identifying, organizing, and documenting the data the system will manage.
- Data Flow Modeling: Mapping out the movement of information within the system.
(c) Information Systems design uses specifications as an input in systems development. Explain three characteristics of these methodologies.
ANSWER:
- Formal Structure: A well-documented, step-by-step approach.
- Consistency: Ensures that each phase aligns with the overall goals and objectives.
- Iteration: Allows for revisiting and refining earlier stages if necessary.
(d) ABC Company invested in a project with a life of five years. The initial cost was Ksh 2,000,000 and cash flow between year 1 and year 5 was as follows: Year 1, 100,000; Year 2, 300,000; Year 3, 500,000; Year 4, 700,000; Year 5, 900,000. If the interest rate is 12% per annum, determine the viability of the project using the Net Present Value (NPV) criterion.
ANSWER: This question involves calculations, which I’ll skip per your instructions.
4.
(a) Outline three goals of system security.
ANSWER:
- Confidentiality: Ensuring that sensitive information is only accessible to authorized users.
- Integrity: Protecting data from unauthorized alterations.
- Availability: Ensuring that the system and its data are accessible when needed.
(b) Explain the importance of evaluating an Information System.
ANSWER:
- Efficiency: To ensure the system operates as intended without unnecessary waste of resources.
- Effectiveness: To verify if the system meets its intended objectives and goals.
- User Satisfaction: Ensuring that the users are happy with how the system functions and supports their tasks.
(c) Differentiate between legal and social feasibility.
ANSWER:
- Legal Feasibility: Concerns whether the system complies with existing laws and regulations.
- Social Feasibility: Refers to how the system will impact and be accepted by people in the organization and community.
(d) Explain two reasons for using PERT in project management.
ANSWER:
- Time Estimation: Helps in estimating the time required for each task and the overall project.
- Risk Identification: PERT helps to identify tasks that are critical and where delays would affect the entire project.