Você está na página 1de 24

ICT2622/102/3/2014

Tutorial letter 102/3/2014


Object-Oriented Analysis

ICT2622
Semesters 1 & 2
School of Computing

IMPORTANT INFORMATION: This tutorial letter contains important information about your module.

ICT2622/102

CONTENTS
Page
1 1.1 2 2.1 2.2 3 3.1 3.2 3.3 4 4.1 5 INTRODUCTION .......................................................................................................................... 4 Tutorial matter............................................................................................................................... 4 PURPOSE OF AND OUTCOMES FOR THE MODULE............................................................... 5 Purpose ........................................................................................................................................ 5 Outcomes ..................................................................................................................................... 5 LECTURER(S) AND CONTACT DETAILS................................................................................... 5 Lecturer(s) .................................................................................................................................... 5 Department ................................................................................................................................... 6 University ...................................................................................................................................... 6 MODULE-RELATED RESOURCES ............................................................................................. 7 Prescribed books .......................................................................................................................... 7 STUDENT SUPPORT SERVICES FOR THE MODULE ............................................................... 7

5.1 myUNISA........................................................................................................................................... 7 5.2 E-mail .................................................................................................................................................7 5.3 Peer support discussion forum ........................................................................................................ 8 6 7 8 8.1 8.2 8.2.1 8.2.2 8.3 MODULE-SPECIFIC STUDY PLAN ............................................................................................. 8 MODULE PRACTICAL WORK AND WORK-INTEGRATED LEARNING .................................... 9 ASSESSMENT ............................................................................................................................. 9 Assessment plan .......................................................................................................................... 9 General assignment numbers ....................................................................................................... 9 Unique assignment numbers ........................................................................................................ 9 Due dates for assignments ......................................................................................................... 10 Submission of assignments ........................................................................................................ 10

8.3.1 Electronic submission of a multiple-choice assignment.................................................................. 10 8.3.2 Postal or assignment box submission of an essay assignment ...................................................... 11 8.3.3 Electronic submission of an essay assignment .............................................................................. 11 8.4 Assignments ............................................................................................................................... 11

8.4.1 Assignment 01 Semester 1 Compulsory assignment .................................................................. 12 8.4.2 Assignment 02 Semester 1 Compulsory assignment .................................................................. 17 8.4.3 Assignment 01 Semester 2: Compulsory assignment ................................................................. 18

ICT2622/102
8.4.4 Assignment 2 Semester 2: Compulsory assignment ................................................................... 23 9 10 11 12 13 14 OTHER ASSESSMENT METHODS ........................................................................................... 24 EXAMINATION ........................................................................................................................... 24 FREQUENTLY ASKED QUESTIONS ........................................................................................ 24 SOURCES CONSULTED ........................................................................................................... 24 CONCLUSION............................................................................................................................ 24 ADDENDUM ............................................................................................................................... 24

ICT2622/102

INTRODUCTION

Dear Student We extend a warm welcome to you and hope that you will find this module interesting and rewarding. We shall do our best to make your study of this module successful. If you wish to succeed, we recommend that you start studying early in the year and resolve to do the assignment(s) properly. You will receive a number of tutorial letters during the year. A tutorial letter is our way of communicating with you about teaching, learning and assessment. This tutorial letter contains important information about the scheme of work, resources and assignments for this module. We urge you to read it carefully and to keep it on hand when working through the study material, preparing the assignment(s), preparing for the examination and addressing questions to your lecturers. Please read Tutorial letter 301 in combination with Tutorial letter 101 as it gives you an idea of generally important information when studying at a distance and within a particular college. In Tutorial letter 101 you will find the assignments and assessment criteria as well as instructions for preparing and submitting the assignments. This tutorial letter also provides all the information you need about the prescribed study material and other resources and how to obtain them. Please study this information carefully and make sure that you obtain the prescribed material as soon as possible. We have also included certain general and administrative information about this module. Please study this section in the tutorial letter carefully. We recommend that you read all the tutorial letters you receive during the semester immediately and carefully, as they always contain important and, sometimes, urgent information. This tutorial letter contains particulars of the prescribed book, the syllabus, your study programme and the assignments. Please make a note of the preliminary examination dates and arrange for leave with your employer in good time if you are working full time. We hope that you will enjoy this module and wish you all the best! 1.1 Tutorial matter Some of this tutorial matter may not be available when you register. Tutorial matter that is not available when you register will be available on myUNISA. PLEASE NOTE: myUNISA is the primary medium of the lecturer-student interaction. All tutorial letters can be found on myUNISA.

This is the last tutorial letter you will receive by post. All future tutorial letters must be downloaded from myUNISA.

ICT2622/102

2
2.1

PURPOSE OF AND OUTCOMES FOR THE MODULE


Purpose

The main purpose of this module is to enable intermediate level systems analysts competences to analyse information systems according to the object-oriented approach using the tools, techniques and methodologies of systems development. 2.2 Outcomes Analyse client needs and interpret and document them according to the systems functional requirements by applying the object-oriented approach as part of the systems analysis phase of the systems development Distinguish between traditional approaches and the object-oriented approach Apply object-oriented tools, techniques and methodologies Display analytical competencies Develop information from the analysis phase into design models Design a database schema in relation to a class diagram Design system inputs and output Clearly articulate assumptions when faced with ambiguity Display to analyse environment and situation then apply best possible solution

3
3.1

LECTURER(S) AND CONTACT DETAILS


Lecturer(s)

Your lecturers are fully prepared to communicate with you and resolve any content-related issues that you may have. Generally, most students experience the same type of problems. In this tutorial letter we address some of the most common student enquiries, so please take the time to read through this tutorial letter as some of the questions that you may have might be answered here. This is a comprehensive first tutorial letter to assist you in the best possible way and to ensure that you have effective interactions with the lecturers of this module and Unisa in general. Some of the frustrations that our students experience include the following: Problems that are still unresolved after an effort to contact Unisa. The fact that it is necessary to contact Unisa more than once to solve a problem. The fact that students are passed from one person to another when they call.

In this module we will try to reduce these frustrations to a minimum and help you to spend time effectively on your studies. To make this possible you need to understand the general regulations and workflow within Unisa and how this affects us all. Certain actions from your side can slow down the Unisa wheel, making it difficult for lecturers to provide you with the standard of service that they would like to provide. To begin with, we will provide a few statistics to give you an idea of the size of Unisa and its workflow, and that unrestricted action by masses of students can slow down the workflow processes considerably. Currently, Unisa is one of the largest universities in the world, with more than 290 000 registered students and the numbers keep on growing every year. Many of these students are enrolled in the School of Computing. Providing an effective service to such a large number of students is not an easy task. 5

ICT2622/102 If, for instance, only 10% of our students phone the department to request an extension for an assignment, this would result in 2 900 phone calls. If the average time of each call is three minutes, then just listening to students asking for an extension would take at least 100 hours. Remember that each module has several assignments, which causes a snowball effect just for an extension! As you can see, this kind of issue can rapidly make even a large department very ineffective indeed. When you read through this tutorial letter it may initially appear to be a brochure filled with strict rules of Thou shalt and Thou shalt not However, what we are trying to do is to address general queries that you may have, as well as matters that create unnecessary administrative burdens. We are convinced that many of the problems would not even exist if all the roleplayers understood the rules of the game. The information about the lecturers responsible for this module will be announced on myUNISA and is also available in Tutorial letter 301/2014. All queries that are not of a purely administrative nature but are about the content of this module should be directed to your lecturers. Please have your study material with you when you contact them. Letters should be sent to: The Module Leader (ICT 2622) School of Computing PO Box 392 UNISA 0003

PLEASE NOTE: assignments. 3.2 Department

Letters to lecturers should not be enclosed with or inserted in

Type here 3.3 University

If you need to contact the university about matters not related to the content of this module, please consult the publication entitled my Studies @ Unisa, which you should have received with your study material. This booklet contains information on how to contact the university (e.g. to whom you can write with different queries, important telephone and fax numbers, addresses and details of the times certain facilities are open). PLEASE NOTE: Students who phone the Unisa Contact Centre using the old UCC telephone numbers may, from now on, hear a pre-recorded message redirecting them to the relevant email address/website

ICT2622/102

4
4.1

MODULE-RELATED RESOURCES
Prescribed books

The prescribed textbook for this module is: Satzinger, JW, Jackson, RB & Burd SD. 2012. Introduction to Systems analysis and design: An Agile, Iterative Approach. 6th edition. USA: Thomson Course Technology. NB: Textbook is the primary source of learning material. There is no study guide for this course. We do not give support on the older editions of the prescribed book. You are therefore advised to use the prescribed edition. For purchasing books, consult the list of official bookstores in the booklet, my Studies @ Unisa

STUDENT SUPPORT SERVICES FOR THE MODULE

Important information in this regard appears in your my Studies @ Unisa brochure. 5.1 myUNISA For the purpose of this module, you should have regular access to a computer with an Internet connection. This will enable you to access resources and information at the university quickly. The myUNISA learning management system is Unisa's online campus which will help you to communicate with your lecturers, with other students and with the administrative departments of Unisa all through the computer and the internet. You may send emails to your lecturer via the module e-mail address provided on myUNISA in the course contact link. To go to the myUNISA website, start at the main Unisa website, http://www.unisa.ac.za, and then click on the Login to myUNISA link on the right-hand side of the screen. This should take you to the myUNISA website. You can also go there directly by typing in http://my.unisa.ac.za. You will be able to download the tutorial matter from myUNISA. You are welcome to use the discussion forum for each module on myUNISA. This discussion forum serves as a platform where students can communicate with each other and may only be used for academic issues. The lecturer(s) will not actively participate in the discussion forum. You should thus not post urgent questions for the lecturers attention here. Rather use the email option if you have an urgent academic issue to discuss. Please consult the publication my Studies @ Unisa, which you will have received with your study material, for more information on myUNISA. 5.2 E-mail If you have access to a computer connected to the internet, we encourage you to use email rather than the telephone for communication purposes. For all e-mail communication in this module use the course contact link on myUNISA or find out the lecturers name in Tutorial letter 301 and e-mail the lecturer directly.

ICT2622/102 Queries about the content of the module must be directed to the discussion forum or via e-mail to the responsible lecturer. You can use the course contact link on myUNISA to send e-mail to the course lecturer. The response time will be determined by the amount of detail that your question requires. NB: Lecturers in this module do not handle administrative queries such as exam extensions, late submission, admission and registration. Please contact the relevant departments directly in this regard. 5.3 Peer support discussion forum There is more to the course than assignments. Discussion forum will help if you participate regularly. Discussion forum participation means contributing to the understanding of concepts covered in your syllabus, instead of just viewing other students comments. Study shows that student who are actively participating in discussion forum do well in assignments and exams.

MODULE-SPECIFIC STUDY PLAN

Read the my Studies @ Unisa brochure for general time management and planning skills. You can plan around the following chapters: Syllabus Investigating systems requirements Use cases Domain modelling Extending the requirement Model Essentials of Designing and he Design Activities Approached to Systems Development Object-oriented design: Principles Object-oriented design: Use case realization Designing systems interface, control and security Please note: Assignment 1 1 1 1&2 1&2 1&2 1&2 1&2 1&2 Chapters chapter 2 examinable chapter 3 - examinable chapter 4 - examinable chapter 5 - examinable chapter 6 - examinable chapter 8 - examinable chapter 10 - examinable chapter 11 - examinable chapter 12 - examinable

Non-examinable chapters are essential but we wont set assessment question from those chapters. In fact, it is important to read the whole textbook in order to ensure a comprehensive understanding of the whole analysis and design concept. Meanwhile, we want to focus on OO concepts for assessment purposes. Your textbook also includes chapters that focus on traditional approaches which we have tried to eliminate. However, some of the OO concepts have developed from traditional approaches (and sometimes overlap). It is thus advisable to read more than merely the prescribed chapters in order to contextualise your studies. You should complete ALL the questions in the assignments, even though not all the questions may be marked. In other words, selected questions will be marked in all submissions but students will not be informed beforehand which questions will be marked. You will, however, receive a complete solution to all the questions in the assignments in the next tutorial letter. You may also be expected to evaluate your own assignment according to a given model solution. 8

ICT2622/102 We will not accept additions to students answers for assignments or later versions. All diagrams should be drawn in portrait orientation. If MS Visio or any drawing tool is used, convert the document to a PDF format before submission, otherwise drawings and tables will be distorted and we will not accept a resubmission. Students are allowed to discuss the problems set for the assignments with fellow students. However, we expect students to do the final implementations themselves. Should a student copy another students solution, both students will receive zero credits and we will not enter into any discussion about who did the original work. This means that although you may explain a solution to a fellow student, you should not give them access to your solution

MODULE PRACTICAL WORK AND WORK-INTEGRATED LEARNING

There are no practicals for this module.

8
8.1

ASSESSMENT
Assessment plan

This module consists of three assessments: Assignment 01 contained in this tutorial letter Assignment 02- contained in this tutorial letter Examination to be written at the end of the semester in the exam centre you selected during registration All three assessments, that is the two assignments plus the exam, contribute towards your final mark at the end of the semester. Assignment 01 (50%) + Assignment 02 (50%) = Year mark (100%) Year mark (10%) + Exam mark (90%) = Final mark 8.2 General assignment numbers

The table below summarises the assignments scheduled for the year: SEMESTER 1 1 2 2 8.2.1 Unique assignment numbers SEMESTER 1 1 2 2 ASSIGNMENT NUMBER 01 02 01 02 UNIQUE_NUMBER 897672 757864 809880 794038 ASSIGNMENT NUMBER 01 02 01 02

ICT2622/102 8.2.2 Due dates for assignments SEMESTER 1 1 2 2 8.3 ASSIGNMENT NUMBER 01 02 01 02 UNIQUE_NUMBER 897672 757864 809880 794038 DUE DATE 25/02/2014 17/04/2014 28/08/2014 25/09/2014

Submission of assignments

Please ensure that your assignments reach the university on or before the due dates. Kindly note that NO exceptions or concessions will be made for any students who may claim that their assignments were lost in the post or incorrectly submitted. Bear in mind that you will NOT obtain admission to the examination on the basis of your expertise in computers, experience at work, or for any other reason. You will only obtain admission to the examination through the submission of your assignments, especially Assignment 01. Students who fail to submit assignments or submit them late will automatically be excluded from the exam. You will receive credit for each assignment submitted on time and, regardless of the marks you obtain for each assignment, your early submission of them guarantees you a seat in the exam hall for this module! Study the my Studies @ Unisa brochure for detailed instructions on the submission of assignments. All assignments are printed by the Assignments Section on a predetermined date. The submitted assignments are marked through batch processing, and late assignments will therefore NOT be considered. The Assignments Section will notify you of the results. The lecturers have NO control over the marking process or the marks allocated. Please do NOT call the lecturers about the results of your assignments. DO NOT ask for an extension if you cannot make the date for a particular assignment, but start working on the next one instead. You can submit your assignments: by post by placing them in one of Unisas assignment boxes electronically via myUNISA in a PDF format (NO RESUBMISSION)

8.3.1 Electronic submission of a multiple-choice assignment Connect to the URL: https://my.unisa.ac.za. Register to become a user. Retain proof of your submission.

Please avoid any form of plagiarism when completing your assignments. Plagiarism is the act of taking the words, ideas and thoughts of others and passing them off as your own. It is a form of theft which involves a number of dishonest academic activities.

10

ICT2622/102 All students receive a copy of the Disciplinary Code for Students (2004) when they register. You are advised to study the Code, especially sections 2.1.13 and 2.1.4 (2004:34). Also read the universitys Policy on Copyright Infringement and Plagiarism. 8.3.2 Postal or assignment box submission of an essay assignment Complete your assignment and place it in one of the assignment covers you received when you registered. Put your assignment in an envelope and submit it by posting it or placing it in one of Unisas assignment boxes. 8.3.3 Electronic submission of an essay assignment Type your assignment using a program such as MSWord, Word Perfect or Notepad. Avoid using macros or complicated diagrams. The tour on myUNISA provides guidelines on the electronic submission of assignments. Follow the instructions carefully. Upload your assignment.

Essay assignments must be submitted for marking. These will either be marked or considered for evaluation by the lecturers of ICT2622. In this module, evaluation includes the following: You MUST submit your assignment. The lecturers will evaluate the quality of your assignment. The lecturers will assign an impression mark 8.4 Assignments

NB: Most of the questions are cross-referenced. You may have to answer other questions to finish assignment questions or read previous chapters. We have tried to limit the number of examinable chapters but sometimes you will have to read other chapters in order to answer the questions.

11

ICT2622/102 8.4.1 Assignment 01 Semester 1 Compulsory assignment Due date 2104/02/25 Submission procedure MyUnisa only Number of questions 40 Marks 40 Unique number 897672 Multiple Choice Identify the choice that best completes the statement or answers the question. 1.The term technology architecture refers to a. the software resources which make c. the combination of information up the information systems systems and the hardware infrastructure b. the hardware, network, and system d. the configuration of the old software technology and new technology within an organization 2.Application architecture is used to refer to a. the organization and configuration c. the architectural structure of the of all software solutions into subsystems within a software information systems application b. the application of the information d. the relationship between software system to solve business problems applications and the areas of the organization that they support 3.Diagrams and schematic representations of some aspect of a system are examples of a ______ model. a. logical c. mathematical b. graphical d. textual 4. Persons who regularly interact with the system as part of their jobs are called _______. a. user stakeholders c. operational stakeholders b. client stakeholders d. executive stakeholders 5. The group that provides direction for the configuration of the new system in the existing computing environment are called _______. a. Technical stakeholders c. System programmers b. Support staff d. Operational stakeholders 6. One technique to identify use cases is to ask users what they want to achieve with a particular business procedure. This technique is called the ______ technique. a. business procedure c. workflow b. event decomposition d. user goal 7. Which of the following is an example of a state event? a. A customer places an order c. Management checks order status b. It is time to send a late notice d. Inventory reorder point is reached 8. The way to determine whether an occurrence is an event or part of the interaction before or after the event is to ask the following question: _______? a. Is the user finished with the task? c. Is all the data input? 12

ICT2622/102 b. Is the system at rest? d. Is all the printing completed?

9. In using the event decomposition technique, which of the following is NOT a type of event that is considered? a. Event initiated by an external agent c. Event initiated by a system change b. Event initiated by a point in time d. Event initiated by a user login 10. The level of analysis to use when identifying user goals is the _______. a. external event level c. temporal event level b. elementary business process level d. elementary activity level 11. When making a list of nouns to determine what are the important things for the new system, there are three question that should be asked about each noun. Which of the following is one of those questions? a. Is it a tangible item? b. Is it an abstract item? c. Who needs information about this item? d. Should it be researched further? 12. The number of associations that occur among specific things in an entity relationship diagram is called ____. a. a relationship b. an attribution c. a binary relationship d. cardinality

13. The above cardinality constraint on the Order data entity indicates that there can be _____ . a. zero or many orders b. one or many orders c. many orders d. cannot be determined without the other side of the relationship 14. In a fully developed use case description normally the preconditions describe what? a. What objects must exist prior to the use case executes. b. What data the actor must have before the use case executes. c. Who the actors are that invoke the use case. d. What business conditions must occur before the use case is invoked. 15. In a sequence diagram the syntax of a message is given by the following: [A] B := C (D) The letter B represents what? a. message name c. true/false condition b. return value d. parameter list 16. Which of the following is NOT a step in the development of a state machine diagram? a. List all the status conditions for an object. b. Identify state exiting transitions. c. Expand the name of each state to identify concurrent activities. d. Sequence the state-transition fragments. 13

ICT2622/102

17. Which one of the six core process can be considered as a bridge process. a. Identify the problem and obtain approval. b. Discover and understand the details. c. Design system components. d. Build, test and integrate system components. 18. The first step in doing software application design is to _______. a. define the operating environment. b. identify the approach -- structured or object-oriented. c. define the programming language to be used. d. identify the various subsystems and their relationship to each other. 19. The key design question, Have we specified in detail how the users will interact with the system to carry out all the use cases? is associated with which design activity? a. Design user interfaces c. Design application software b. Design system interfaces d. Design use cases 20. Which if the following is NOT considered part of designing the application architecture and software? a. Multilayer design c. Detailed design b. Subsystem definition d. Program security design 21. Which of the following is NOT an important consideration in database design? a. Performance issues c. Partitioning issues b. Encryption issues d. Data presentation issues 22. Which design activity that pervades all other design activities? a. Environment design c. Security and controls design b. Database design d. Interface design 23. The _____ approach is an SDLC approach that assumes the output of each phase are frozen before moving on to the next phase. a. iterative c. waterfall model b. spiral model d. prototyping 24. The objective of the ____ is to keep the system running productively during the years following its initial installation. a. version release c. maintenance phase b. support phase d. deployment phase 25. Which of the following is a basic value of agile software development? a. Following a plan over responding to change b. Working software over comprehensive documentation c. Processes and tools over individuals and interactions d. Contract negotiation over customer collaboration 26. Which of the following diagrams is used for architectural design? a. Interaction diagrams c. Sate machine diagrams b. Package diagrams d. Component diagrams

14

ICT2622/102 27. Which of the following is valid Unified Modeling Language (UML) notation for a method signature? a. visibility name:type-expression {parameter list} b. name:class-name (parameter list):type-expression c. visibility name(parameter list):type-expression d. visibility class-name:name:type-expression {parameter list} 28. In a design class diagram, navigation visibility is identified by ____. a. a solid arrow between the classes, pointing to the visible class b. a solid arrow between the classes, initiating from the visible class c. a dashed arrow between the classes, pointing to the visible class d. a solid line between the classes 29. System designers frequently create a class called a ____ that can serve as a collection point for incoming messages. a. switchboard c. use case controller b. message controller d. message collector 30. Which is the correct notation for a message label on a sequence diagram? a. * [true/false]RetVal := name (param) b. [true/false]RetVal == name (param) c. [true/false]seq# RetVal := name (param) d. * [true/false] seq# Retval := name (param) 31. Referential integrity is normally enforced by the ____. a. application programmer c. operating system b. database management system d. user 32. A relational database table is in ____ normal form if every non-key field is functionally dependent on the primary key. a. first c. third b. second d. fourth 33. What can be said about the following relational database table (key is underlined): (Choose the most correct answer) StudentID, Name, Major, CreditsCompleted, GPA, AcademicStanding a. Not in any valid normal form b. In First Normal Form c. In First and Second Normal Form d. In First, Second and Third Normal Form 34. A significant disadvantage of a single server database architecture is that it ____. a. must be located on the same local area network (LAN) as all database users b. requires partitioning the schema among user groups c. can result in an overloaded network d. is relatively expensive 35. Three types of users that are considered in the design of a security system are ____. a. manager user, technical user, and clerical user b. technical user, authorized user, and privileged user c. unauthorized user, registered user, and privileged user d. supervisor user, administration user, and operational user 15

ICT2622/102

36. Using digital signatures is primarily a technique to ____. a. verifying who sent a document b. allow for remote signatures on official documents c. electronically send a signature d. digitize (scan) a signed document 37. In a fully developed use case description the exception conditions represent what? a. What conditions might cause the system to crash. b. What conditions prevent the system from successfully completing the use case. c. What conditions will confuse the actor. d. Where the system might have bugs and produce erroneous results. 38. One main principle of structured design is that program modules should be designed so that they are ____. a. highly cohesive c. tightly structured b. tightly coupled d. highly engineered 39. Which of the following is NOT one of the categories of difference between networked based systems and Internet based systems. a. State configuration c. Server configuration b. Client configuration d. Connectivity configuration 40. The realization of a use casedetermining what objects collaborate by sending messages to each other to carry out the use caseis done through the development of a(n) ____ diagram. a. system sequence c. interaction b. package d. design class

16

ICT2622/102 8.4.2 Assignment 02 Semester 1 Compulsory assignment Due date Submission procedure Number of questions Total marks Unique number QUESTION 1 2014/04/17 MyUNISA only 5 60 757864 [20]

The portion of the database used with the ticket-processing system involves driver data, ticket data, officer data, and court data. Driver data, officer data, and court data are read by the system, and the ticket-processing system creates and updates ticket data. In an integrated system like the ticket-processing system, some domain classes are created by and updated by other systems, as described in this case. Create a table with systems down the rows and the four types of data (domain classes) across the columns. Indicate C, R, U, or D for each domain class and each system.

QUESTION 2

[10]

Consider the classes involved when modelling a car and all its parts. Draw a domain model class diagram that shows the whole-part relationships involved, including multiplicity. Which type of whole-part relationships are involved? QUESTION 3 [15]

For the use case Add agent to real estate office, write a fully developed use case description and draw an SSD. Review the case materials in previous chapters and recall that the system will need to know which real estate office the agent works for before prompting for agent information. QUESTION 4 [5]

Explain the components of message syntax in a communication diagram. How does this syntax differ from that of a sequence diagram message? QUESTION 5 Describe the risk factors associated with database design. [10]

17

ICT2622/102 8.4.3 Assignment 01 Semester 2: Compulsory assignment Due date Submission procedure Number of questions Total mark Unique number 2014/08/28 MyUNISA only 40 40 809880

1. Application architecture is used to refer to a. the organization and configuration c. the architectural structure of the of all software solutions into subsystems within a software information systems application b. the application of the information d. the relationship between software system to solve business problems applications and the areas of the organization that they support 2. The group that provides direction for the configuration of the new system in the existing computing environment are called _______. a. Technical stakeholders c. System programmers b. Support staff d. Operational stakeholders 3. Which if the following is NOT considered part of designing the application architecture and software? a. Multilayer design c. Detailed design b. Subsystem definition d. Program security design 4. Which is the correct notation for a message label on a sequence diagram? a. * [true/false]RetVal := name (param) b. [true/false]RetVal == name (param) c. [true/false]seq# RetVal := name (param) d. * [true/false] seq# Retval := name (param) 5. Three types of users that are considered in the design of a security system are ____. a. manager user, technical user, and clerical user b. technical user, authorized user, and privileged user c. unauthorized user, registered user, and privileged user d. supervisor user, administration user, and operational user 6. Using digital signatures is primarily a technique to ____. a. verifying who sent a document b. allow for remote signatures on official documents c. electronically send a signature d. digitize (scan) a signed document 7. Which of the following items is NOT a part of the application architecture? a. software c. user-interface technology b. programming languages and d. virtual private networks development tools 8. A series of formulas that describe technical aspects of a system is a(n) model. a. textual c. graphical b. descriptive d. mathematical 18

ICT2622/102 9. What do we call the person or group who provides funding for the development of the new system? a. Oversight committee c. Board of directors b. Client d. Department head 10. The user goal technique normally begins by identifying, listing, and classifying _______ . a. the system users c. the business processes b. the business events d. the system stakeholders 11. An occurrence at a specific time and place, which can be described and is worth remember, is called a(n) _______. a. business process c. requirement b. event d. business transaction 12. Customer decides to buy a shirt is an example of what? a. An external event c. A temporal event b. Activity prior to an event d. Activity after an event. 13. The systems reaction to an event is called a(n) _______ . a. system process c. activity b. use case d. system requirement 14. The technique used to identify use cases based on external, temporal, and state events is the _______. a. user goals technique c. event decomposition technique b. list of nouns technique d. CRUD technique 15. A piece of information about a particular object is called a(n) _______. a. identifier c. field b. attribute d. data value 16. A synonym for cardinality (used with UML class diagrams) is ____. a. relationship c. unary relationship b. multiplicity d. inheritance 17. An attribute that contains a collection of related attributes is called a(n) _______. a. class attribute c. compound attribute b. key attribute d. association attribute

18. The association shown on the above image is a(n) ________ association. a. unary c. n-ary 19

ICT2622/102 b. binary d. undefined

19. Which is correct? a. A b. B

c. C d. D

20. In a sequence diagram a horizontal dashed line represents what? a. A return message c. A lifeline b. An input message d. An event 21. A state machine diagram is used to document the states and transitions of a(n) ________. a. Business process c. Message b. Use case d. Object 22. Environment design consists of the following: a. specify the network and hardware linking the system together. b. describe the computer programs. c. Design the buildings and facilities such as air conditioning and environmental components. d. Describe the interfaces that the user and other systems use. 23. Which of the following is NOT considered a design model? a. Package diagram c. User interface screen layouts b. Sequence diagram d. Activity diagram 24. Which of the following terms describes computer software that implements communication protocols on the network and helps different systems communicate? a. Nodes and locations diagram c. Distributed architecture b. Virtual environment d. Middleware 25. Limiting user access to the system is considered what type of design? a. User interface design c. System interface design b. Security and controls design d. Application software design 26. What is the difference between a client computer and a server computer? a. Location on the network c. The services that each performs b. Computing power that each has d. The connectivity to the Internet 27. An adaptive approach to a development project is best used when _______. a. the system has low technical risk b. the requirements are simple and the system is small c. the requirements are well understood d. the requirements are uncertain 20

ICT2622/102 28. A(n) _____ provides guidelines to follow for completing every activity in systems development, including specific models, tools, and techniques. a. predictive approach b. object-oriented analysis c. system development methodology d. systems development life cycle 29. An important way to measure the quality of a module in structured programming is by assessing its _____. a. structured design c. internal constructs b. top-down approach d. cohesion and coupling 30. Which of the following is NOT an Agile Modeling principle? a. Minimize your modeling activity b. Know your models and how to use them c. Focus on content rather than representation d. Maintain core models to verify past decisions 31. Ports and sockets are used to show the interface in what kind of UML diagram? a. Deployment diagram c. Package diagram b. Network diagram d. Component diagram 32. The original method used to process input data in a Web based system was by using computer programs in ______. a. the Java programming language b. the .NET programming suite c. the C++ language for the CGI d. the Javascript programming language 33. Which of the following is included in the top compartment of a design class? a. Attributes c. Type-expression b. Parameter list d. Stereotype name 34. Which of the following is true of class-level methods? a. They depend on the existence of a particular object. b. They cannot access data across all objects. c. They are executed by the class instead of a specific object of the class. d. There can only be one class method per class. 35. What is the least cohesive approach in creating use case controllers in a system? a. Define a single controller for all use cases. b. Define several controllers, each with a specific set of responsibilities c. Create a single controller for a single subsystem d. Create one controller per use case 36. When a message is sent from an originating object to a destination object it means that ______. a. data is being passed from the origin object to the destination object b. a transition is occurring between the objects c. a method is being invoked on the originating object d. a method is being invoked on the destination object 37. ____ is a one-to-one correspondence between two field values. 21

ICT2622/102 a. First normal form b. Second normal form c. Referential integrity d. Functional dependency

38. A ____ database server architecture is the simplest to build and operate if sufficient network capacity is already available for database access. a. single c. partitioned b. replicated d. cloud-based 39. Database synchronization should be implemented when using a(n) ____ database server architecture. a. single c. partitioned b. replicated d. cloud-based 40. Which is NOT an objective of integrity controls? a. Allow only valid business transactions b. Ensure that transactions are recorded completely c. Protect the assets of the organization d. Ensure a stable functioning operating environment

22

ICT2622/102 8.4.4 Assignment 2 Semester 2: Compulsory assignment Due date Submission procedure Number of questions Total marks Unique number QUESTION 1 2014/09/25 MyUNISA only 3 75 794038 [25]

Refer to Sandia Medical Devices running case, Using the event decomposition technique for each event you identified in the description, name the event, state the type of event, and name the resulting use case. Then draw a use case diagram for these use cases. QUESTION 2 [20]

The SBRU information system includes four major subsystems: Resort relations, Student booking, Accounting and finance, and Social networking. List as many of the domain classes that would probably be involved in each of the subsystems. Note which classes are used by more than one subsystem. QUESTION 3 [30]

Figure 11-28 is an SSD for the use case Record dental procedure in the dental clinic system. Do the following: a. Develop a first-cut sequence diagram that only includes the actor and problem domain classes. [16] b. Develop a design class diagram based on the domain class diagram. [14]

23

ICT2622/102

9 10

OTHER ASSESSMENT METHODS EXAMINATION

Student are require to write all assignments and write venue-based examination at the end of the semester. Read the my Studies @ Unisa brochure for general examination guidelines and examination preparation guidelines. An exam tutorial letter will be made available on myUNISA during the course of your studies which will help you to prepare for the exam.

11

FREQUENTLY ASKED QUESTIONS

I have not received some of my study material? What should I do? The Dispatch Department is responsible for distributing printed material. If the study material took longer to reach you than expected, you can visit the myUNISA portal and download the course material from the official study material link. How do I go about forming a study group? Students are encouraged to form study groups. This is quite easy if you regularly visit discussion forums and interact with other students. Regional centres organize tutorial classes upon requests from students. Enquire at the regional office in this regard. When will I get my assignment back? It takes between four and five weeks to mark an assignment, and only after this period will it be returned to you. If you have not received your assignment after this period, check the discussion forums to see if there are any delays or contact the Assignment Department. What mark did I receive for my assignment? As soon as your assignment has been marked, the mark you received will be displayed on the myUNISA system. Have you received my assignment? If you used myUNISA to upload your assignment, you should immediately see that the assignment is on the system, next to the applicable assignment in the assignment list. If not, re-enter your answers. If you used the postal system, check myUNISA after two to three days after submitting your assignment. If it is not on the system, make enquiries with the Assignment Department. If it was not received, you will have to resubmit it. What software package should I use to draw the diagrams? You may use any software that you have access to. Microsoft Visio is probably the most popular but you should be able to do most of the diagrams in Microsoft Power Point. Once you have drawn your diagram, convert your assignment to pdf before submitting.

12 13 14

SOURCES CONSULTED CONCLUSION ADDENDUM


UNISA 2014

Satzinger, JW, Jackson, RB & Burd SD. 2012. Introduction to Systems analysis and design: An Agile, Iterative Approach. 6th edition. USA: Thomson Course Technology. We wish all students best in studying towards completion of their qualifications. You should always feel free to contact your lecturer whenever you need help with course content. No addendum

24

Você também pode gostar