Ginger Ninja



1.1) Project Mangement[1.1.a]Stages of the traditional system development cycle (p.3)Project management is the process of ________________________________________________ all of the activities within _________________ of the system development cycle. Good project management involves creating ____________________________. [1.1.b]A project plan is a summary of a project that specifies _______________________________________ .A project plan usually breaks down the project into major tasks called ________________________.It must also provide an _______________ schedule and a proposed schedule for each of the _____________________. It must also identify _____________________________________________________ required by the system.To minimise problems, people working on the project should understand the need for __________________________________________________________________ .Project goals may be broad or specific and they relate to ways of testing if the project is successful.Deliverables are _________________ items expected from a task. E.g. a report, diagram, manualSchedules set out the ___________________ of major tasks and assigns personnel to each task.The success of a new system depends upon _______________________ time estimates.One of the most popular tools for graphically recording and tracking these schedules is a [1.1.c]_______________________________________Example of a Gantt chart (p.5)Communication skills incorporate a variety of strategies and techniques for dealing [1.1.d] with ____________________________.They facilitate information sharing and genuine understanding.They include: Active listening involves ___________________, reflecting and __________________ the speaker’s ideas.__________________________________ solves arguments and disputes.It involves listening to all sides of a problem and looking for any ____________________________.Negotiation skills are used to reach a ________________________ between all parties.Interview techniques involve careful preparation, implementation and follow-up.Some general rules could include: Team building is the process of getting a _____________________________ working together effectively.A number of different roles are required for the project to succeed.[1.1.e]Three important roles are: Practice Questions‘If each stage of the system development cycle is carried out properly, it should not be necessary to return to the previous stage.’ Discuss this statement.A project leader estimated a time schedule for the following tasks:– Write system design documentation: 2 weeks– Purchase application software: 1 week (during the system design documentation)– Code and test the custom software: 5 weeks (after the system design documentation)– Write hardware specifications: 1 week (after the system design documentation)– Obtain quotations for hardware: 2 weeks (after hardware specifications)– Select supplier of hardware: 1 week– Deliver hardware: 2 weeks– Install hardware: 1 week– Set up software: 2 weeks (after hardware is installed).Draw a Gantt chart for the project. What is the minimum time for completion of the project?You are being employed as the designer of a new educational computer simulation. You have a meeting with the clients tomorrow. What skills would you employ in this meeting?Describe the five stages of the system development cycle. Where would the development of a prototype sit in this cycle?What is the purpose of a project manager?Which network administration task is common to many networks?Designing the cabling layout for a networkGiving users file access rightsWriting the code for an applicationPersonalising users’ desktopsExplain your answer.A website is to be created for a travel agency to answer customer enquiries. The following tasks and suggested time frames have been identified for the development of this website: ? Requirements Gathering will begin immediately and continue for three weeks? Cost-Benefit study will follow for two weeks ? Design will begin one week into the Requirements Gathering stage and end one week after the Cost-Benefit study ? Building and testing the website will follow the Design stage and continue for three weeks. Create a Gantt chart showing the minimum time required to complete the above tasks. The project team had planned to implement the new hardware and software in the week it was received. The supplier has just informed the project team that the delivery date is now the beginning of week 10. How many weeks will the original plan be delayed by?1.2 Social and Ethical DesignInformation systems should be designed to take into account the strengths and weaknesses of both people and machines.[1.2.a]Machine-centred systems are designed to simplify _______________________________________ at the expense of the ____________.They are usually powerful tools but confusing to use and require a lot of _____________________.Human-centred systems are those that let participants work effectively without having to struggle with the ________________________________________.Most systems that are used today are more __________________________ than in the past.User-friendly systems are characterised by:prompts in ______________________ termssimilar ______________________________________ of different applicationsmenu structure is _______________ and simple to followprovides ‘beginner’ and ‘advanced’ optionsallows work to be ___________________________________regularly saves so less chance of lost workWhen systems are being designed it is important to consider the health and safety issues and the nature of work.[1.2.b]The relationship between people and their work environment is called ____________________________.Things to be considered with ergonomics and information systems include:furniture – chairs, tables, keyboards, workstations, monitor, etc.lighting – reduced glare, evennessclimate – temperature and humidity (_________________oC; ______% - ______%)air quality – removal of particles and ozonenoise – should be < ___________________New systems need to increase work satisfaction and decrease stress.Stress could result from : Ethics is a set of beliefs we hold about what is_______________________________.[1.2.c]Ethical issues involving the use of information systems include: Information systems can both reduce and increase pollution.Decreased pollution comes from:decreased communication transporttele-commuting reducing trafficcountry access to electronic services reducing crowding & overpopulationIncreased pollution comes from: _________________ chemicals in computer manufacturingincreased use of _________________________ to power devicesEquity concerns ____________________________________________ .I.T. has the potential to give many people equal access to: It can also overcome differences in ____________________________________________________.However, people may be disadvantaged because they do not have access due to costs or technology fears.This lack of access may lead to other inequities because a lot of things are being computerised these days, e.g. bill paying.1.2 Practice QuestionsSam is using a webcam to communicate with his friend Lee. Lee has decided to post Sam’s video on a social networking site. What should Lee do before posting the video?Ask Sam for permissionEdit Sam’s video fileSave a backup onto his computerPlace a copyright symbol on the videoA group of Year 12 students wants to develop a secure social networking site that enables them to communicate once they have finished school. The site should allow students to communicate with ease, through the sharing of photos, videos and messages.Discuss the following issues in relation to the use of this and other social networking websites:?access?ownership and control of data?privacy principles.Scientists have set up the Centre for Embedded Networked Systems (CENS) to collect ecological data from remote regions. Nesting boxes for birds, possums and other wildlife have been placed in trees. Each hour, sensors inside the boxes collect data and send it to a base station which is up to one kilometre away. The data collected from inside the boxes includes temperature, humidity and a still image of the occupants.Once each day the stored data are transmitted via satellite from the base station to a national database, and then made available on a website.Prior to the implementation of this system, park rangers manually measured the temperature and humidity in each of the regions once a day.Analyse the following issues relating to this communication system: the change in the nature of work for the rangers accessibility of data to the general public the change in the nature of work for the scientists using the information. A student uses a digital photograph of another student in an email. Which issue needs to be considered in this scenario? Privacy Security Copyright Accuracy of informationA state government is introducing new digital combined red light/speed cameras. These new cameras are very similar to existing speed and red light cameras, except that they use digital imaging technology and utilise different detection technologies such as road sensors as opposed to radar devices. The digital camera works by taking a digital image of any vehicle that runs a red light and/or exceeds the speed limit. The image and information is then loaded directly into the infringement processing system.Describe a social and/or ethical issue related to the digital red light/speed camera. In your answer consider the position of either the owner/driver or the state government.A local council stores information relating to property ownership in a database. Under the terms of the Freedom of Information Act (now Government Information (Public Access) Act) who owns the data.The local councilThe person to whom the data referThe participants who collected the dataThe personnel who manage the databaseSacha’s Fitness wishes to develop a new system that will automate processes of member access and security within their gyms across Australia. After an initial investigation, management has decided that the new system will provide:? self-service access, 24 hours per day using swipe cards. Members will swipe their card at the door, which will open automatically if the membership payment is up to date? membership inquiries and payment via online access only? a skeleton staff who assist members with fitness-related advice? the installation of sophisticated security and surveillance equipment? transformation of all gyms within 12 months.Assess the impact of the changes on both employees and members.A state police department is fitting its highway patrol cars with state-of-the-art crime-fighting technology. This includes Automatic Number Plate Recognition System(ANPRS) and a computer installed in the boot of the car. ANPRS uses a number of cameras that are mounted on the police car. The cameras are constantly scanning number plates on parked and moving vehicles. These are checked immediately against the police database in a real-time process. Stolen, unregistered or wanted vehicles set off a warning beep. The offending registration plate appears on a monitor in the police car. Essential components of the on-board computer are housed in tamper-proof and fire-proof containers. An officer is able to type reports into the computer using a keyboard that is stowed on a sliding tray in the car. The mobile computers are connected to a central police computer system via a wireless 3G mobile communication link so that all data (including ANPRS) is up to date and regularly backed up.The processing power of the on-board computer and its wireless connections allow data collected by the ANPRS system to be compared to a range of data from other government databases and collection devices. Data from fixed speed cameras, toll collection gates and the Roads and Traffic Authority (RTA) driver licence and car registration databases are analysed using a process of data-matching, enabling cross-linking of the data for the purpose of profiling offenders. Analyse the social and ethical issues arising from data-matching. Use examples from the scenario to illustrate the issues.1.3) Understanding the ProblemThe _______________ stage in the system development cycle is understanding the problem.[1.3.a]The _____________________ of the problem must be determined, then there needs to be an analysis of whether an ______________________________ can be a solution.A ____________________________________ must be created at this stage.This involves a preliminary _______________, a requirement ____________ & (ideally) prototyping.[1.3.b]A preliminary investigation is also called a _____________________________.It determines whether a _________________ will solve the problem or a _______________________ is necessary.It takes into account the _______________________________ of all the participants.___________ is collected to understand the problem and develop a solution.The ___________________________________ is a statement about the need for a new system.It outlines _______________________________ of the new system and how it will help the organisation.It also provides an overview of the new system in terms of: It is used to develop potential ____________________ to the problem.A prototype is a ______________________ of a proposed information system.[1.3.c]They help to:understand the ___________________ of the new systemdefine the __________________ to be solveddetermine how an __________________________ can helptest possible information system _______________________A prototype may contain data screens, a sample database or formulae that produce approximate results.It is often a repetitive process used to clarify issues.As a prototype is shown to the participants they evaluate it and suggest improvements, then a new prototype is made and the process begins again.The three main advantages of a prototype are: 1.3 Practice QuestionsSacha’s Fitness wishes to develop a new system that will automate processes of member access and security within their gyms across Australia. After an initial investigation, management has decided that the new system will provide:? self-service access, 24 hours per day using swipe cards. Members will swipe their card at the door, which will open automatically if the membership payment is up to date? membership inquiries and payment via online access only? a skeleton staff who assist members with fitness-related advice? the installation of sophisticated security and surveillance equipment? transformation of all gyms within 12 months.List the important headings on the contents page of the requirements report for this new system.The owner/operator of a retail store is designing a database to manage stock/sales within the workplace. Initially she designs the solution on a spreadsheet prior to developing the information system using a Database Management System. Which development approach would be most appropriate?OutsourcePrototyping Structured Traditional A group of Year 12 students wants to develop a secure social networking site that enables them to communicate once they have finished school. The site should allow students to communicate with ease, through the sharing of photos, videos and messages.The designers have produced the following prototype before putting the website online.Explain whether the objectives for this website project are met by this screen design.When is it most appropriate to use prototyping? When testing the final system When refining system requirements When system feasibility is being determined When team members disagree on what to build1.4) Making DecisionsThe next stage in the system development cycle is making _____________________.[1.4.a]The data gathered in the ______________________________ is used to develop one or more potential solutions.The _________________ of the problem are also factored in when generating solutions.A constraint is a factor that ______________ the system.Management is informed of the ____________________ and _____________________ of each proposal and then _________________________________ are carried out.Block diagram of making decisions (p.15)A feasibility study is a short report that analyses ____________________________ in terms of the known ___________________________.[1.4.b]The recommendations coming out of a feasibility study are based upon a number of criteria:_________________ – cost of building and maintaining_____________________ – the IT requirements____________________ – whether there is enough time to achieve and maintain the new system____________________ – does it fit into the organisational structure and are staff skilled enough and/or supported properlyThere are three recommendation options coming out of a feasibility study.These are: If manager’s decide to proceed then a more detailed analysis is required.The problems with the current system are fully investigated and then organised and analysed.When this is completed an ______________________ is written.[1.4.c]It provides more details than the feasibility study as well as recommendations for design, implementation and maintenance.It also contains the _____________________________________ for the next stage.They also form the basis for a more detailed project plan.[1.4.d]1.4 Practice QuestionsIn which of the following documents will potential costs associated with a new system be included?Gantt chartUser manualProcess diaryFeasibility reportWhich of the following would be included in a feasibility study? Participants’ qualificationsComputer equipment availableA report from users who have trialled the new systemA prototype to clarify participants’ understanding of the problemUse this information to answer Question 3. A school is considering the network solution represented below as a replacement for networked personal computers (PCs) in classrooms. Network server Data server 40 PCs centrally located 60 clients in four classrooms The network operates in the following ways: Users log on to the network at a client The logon is validated by the network server The user is automatically assigned a PC from a bank of centrally located PCs. The PC contains an operating system and applications software User data is stored on a data server accessed via the PC Users log off from the network at the client and the centrally located PC is released for other users. This solution assigns PCs to users as required rather than every user having a dedicated PC. Another PC can be automatically reassigned to a client if a fault occurs on the allocated PC. A consultant has been asked by the school to prepare a feasibility study for the new network solution. Discuss the issues that should be considered by the consultant. Your answer may include: technical issues economic issues staff expertise other relevant issues. In which stage of system development would you undertake a feasibility study? Implementing Making decisions Designing solutions Testing, evaluating and maintaining A family consists of Mr and Mrs Morgan and their child, Taylor, who is in Year 11. Mrs Morgan works as a librarian and helps to manage the library’s internet site. She uses a desktop computer at home to carry out emergency maintenance of the library site. This computer is presently connected to the internet by dial-up and to a laser printer which has network capabilities. Mr Morgan and Taylor both have laptops, neither of which are connected to the internet. The family feels that it is time to upgrade so they can have more access to internet resources for work, study and entertainment. Outline THREE aspects that the family should consider when determining the feasibility of upgrading to a wireless network.1.5) Designing SolutionsDesigning a solution is the transformation of the specifications into appropriate hardware, software and information processes.[1.5.a]It involves: Participant development occurs when people ___________________________________ develop the solution.[1.5.b]Participant development became a solution because IT personnel were often unable to provide _________________ service.The stages of the system development cycle are affected by participant development in the following way:_______________________________—participant identifies the problem. Information system personnel might be used to advise the participant on possible tools to solve the problem._____________________________—participant chooses an appropriate solution.____________________________—participant develops the solution, often using guided processes found in application packages. The participant may require some training________________________—participant begins using the system. This stage is often easier to accomplish with participant development than with a system developed by information system personnel as the participant is familiar with the application and does not require further training. __________________________________—participant is totally responsible for the maintenance and testing of the solution and determining if any changes need to be made to the solution.Advantages:Participant development is more responsive to ____________________________Potential to save _______________less need for _________________less time wasted on ________________________ between participants and IT specialistsDisadvantages:Participants are NOT __________________________Different participants within an organisation could choose ________________________________Increased ______________ in terms or purchasing and trainingIncreased access to data leads to ______________________________________________Design tools assist in the development of a new system.[1.5.c]They include: Context diagrams are ____________________________________of representing systems by using only a _______________________________ together with inputs and outputs.The input and output sources are also called ______________________________.The external entities are ___________ to the single process through ____________________________.Symbols used in a context diagram (p.20)_______________________________ are graphical methods of representing a system that use a __________________________ together with inputs, outputs and storage.DFD’s focus on the flows of data between information processes in a system.They show where data is: There are four main symbols: To draw a DFD, start with the ______________________ and use ___________________ to link them to ________________ and __________________.Symbols used in a data flow diagram (p.21)The limitation of context diagrams and DFD’s is that, while they identify ___________________________, they do not show ____________________ of operations or decisions that are required.Many information processes that occur are determined by various ______________________.Two tools used to display and analyse decisions are ____________________ and ___________________.A decision tree is a ________________________ way of representing all possible ___________________ of ______________ and their resultant __________________.Example of a decision tree (p.22)A decision table is a table that represents all possible _______________ and ____________________.The table is divided vertically into conditions and actions, and horizontally into __________.Example of a decision table (p.23)A ________________________________ describes the data within a system.A data dictionary describes each field in a database.It clarifies characteristics such as: A system flowchart is a graphical means of representing both the flow of _______ and the ____________ of a system.SYMBOLMEANINGSYMBOLMEANINGSymbols used in a system flowchart (p.24)It documents such things as: 1.5 Practice QuestionsThe data dictionary shown was developed to show users the fields to be included in a database system that stores information about countries in a single table called ‘Countries’.After seeing the data dictionary, a user would like to be able to: calculate the rate of population increase using the fields BirthRate and DeathRate; store information about the expected life span of the female population. Explain the changes that would have to be made to the data dictionary to best meet the user’s needs.Build Safe, a government agency, is responsible for safety on building sites. Before builders can work on a building site, they must be certified by Build Safe. Certification lasts for five years. A new system for certifying builders is to be developed by Build Safe.Draw a data flow diagram for the proposed new system. Show the external entity, processes, data stores and data flows.A state government is introducing new digital combined red light/speed cameras. These new cameras are very similar to existing speed and red light cameras, except that they use digital imaging technology and utilise different detection technologies such as road sensors as opposed to radar devices. The digital camera works by taking a digital image of any vehicle that runs a red light and/or exceeds the speed limit. The image and information is then loaded directly into the infringement processing system.Draw a context diagram to represent the new system.Mel’s Mobile Apps has been approached by the owners of various restaurants to develop an application (app) that customers can use on mobile hand-held devices. The app would contain data to help customers select a suitable restaurant located nearby. The proposed application should allow customers to search for, select and view details of individual restaurants including: ?location ?cuisine ?menu items ?prices ?reservations ?take-away meals ?favourite meals.Provide the metadata for data type and field size as indicated by A, B, C, D, E and F in the data dictionary below.The Pet Electronic Tracking System (PETS) contains a database used to identify stray pets. Dog and cat owners can have a microchip implanted in their pets. The microchip has a unique identification number and is inserted by a vet. The vet then records the identification number, name of the pet, owner’s details and whether or not a fee for this service has been paid. The vet then emails this information to PETS. An email confirmation is sent back to the vet. Draw a context diagram representing the information system for this scenario. Which is the most likely order in which data elements are passed to the Find Product procedure?ProductDescription, ProductDetails, AddToCartRequest, AddToCartOK AddToCartRequest, ProductDetails, ProductDescription, ShopperDetails IDisOK + ShopperDetails, ProductDescription, ProductDetails, AddToCartOK ShopperID + Password, IDisOK + ShopperDetails, ProductDetails, ProductDescription, AddToCartOK 1.6) ImplementationThe implementation stage __________________ the new system to the participants. [1.6.a]It often involves a major change in the way that the __________________ operates.To ensure that the new system is implemented __________________, it must be carefully __________________.This implementation plan details participant ______________________, the __________________ method and the system ________________________.____________________________ ensures participants can use the new system.[1.6.b]The type of training is dependent upon the existing knowledge of the participants and the scope of the change.Management may decide to train some ________________ who then ___________________ others.They may also employ training ______________ or create training ________________________.Technical support staff are often employed or out-sourced for use on an ‘________________’ basis.There are four main methods of ____________________.[1.6.c]They are: Methods of conversion (p.28)Direct involves the ________________________ change from the old to the new system.It is not often used even though the costs are __________________, because it does not allow any ‘real world’ ________________________ of the system.Another reason is that the old system is not available as a ____________________ if the new system fails.Parallel involves the old and new systems working _________________________________.If there are any problems, they can be _____________________ before the old system is discontinued.It does, however, result in _____________________________________ since everything needs to be done ________________________. It can also lead to ________________________ if there are ______________________ between the data.Phased implementation involves the __________________________________ to the new system.Certain operations are brought on line first, while areas of the old system _________________.Each operation is _____________________________, if there is a problem it is possible to switch back Phased conversion is often ______________________ as the users are not sure whether they are using the old or new system.Pilot conversion is where the _______________________ is trialed in a few branches of the organisation.Once all the problems are sorted out with the system it is implemented to every branch.Practice QuestionsOpen source software (OSS) is an emerging technology that has evolved with the use of the internet. OSS is developed in a new copyright and licensing environment where one goal is to provide software at no cost to the public. Users of OSS have free access to the software, but they also take responsibility for its ongoing maintenance and help desk support.Recent examples of open source projects include the Firefox browser and the Android operating system. An open source project is undertaken in a collaborative environment by a skilled team, often with members in diverse countries who communicate remotely using online chat, video conferencing and editing of shared documents. Teams often use the internet to recruit other members and to make their projects available. Also, other development teams are able to revise and improve the product and to provide greater variety of features to the community.Identify the participants of an open source project and describe how they can contribute to the development of the project.A large clothing-store chain has recently made major upgrades to its stock/sales information system. Many of the staff need to be trained in the use of the new information system. The director is implementing the new system in the following sequence: - men’s clothing section women’s clothing section children’s clothing section. Which of the following methods of conversion is being used?DirectPhasedPilotParallelA state government is introducing new digital combined red light/speed cameras. These new cameras are very similar to existing speed and red light cameras, except that they use digital imaging technology and utilise different detection technologies such as road sensors as opposed to radar devices. The digital camera works by taking a digital image of any vehicle that runs a red light and/or exceeds the speed limit. The image and information is then loaded directly into the infringement processing system.The first digital camera will be installed in one location and if it proves to be successful, the new system will be rolled out across the state. Justify this method of converting from the existing system to the new system.Which task performed by systems developers is most likely to ensure that participants accept a new system? Interviewing the users and participants of a system to identify system requirements Carrying out a feasibility study looking specifically at the cost of introducing the new system Using a prototype to get feedback from participants before defining the system requirements Meeting with participants at several stages during the project to discuss training and how the systems will be implemented 1.7) Testing, evaluating and maintainingTesting a system is a very important part of the ________________________ process. [1.6.d & 1.7.a]Tests must be designed to examine the system under all possible ______________________._______________ should be tested using ________________ software and through general use._______________ systems should also be tested by deleting and __________________ data._____________________ is tested using data that has been structured to test all ___________________ to be made by the system.The test data should be based upon the original ________________________. There are a variety of tests using various kinds of data including: Volume data is used to test that the system can cope with a ___________________of data all at once.Simulated data aims to replicate many _____________________ situations.Live data is using the _________________ data and this takes place once the system is _____________________.The various operational processes are continually _________________ during implementation and ___________________ over time.[1.7.b]Evaluation is ________________; if the system is not performing then ________________ need to be made.If a major ______________ is required then the system development cycle starts ____________.Evaluation should also review the ________________ on the users.___________________ issues, as well as ________________________, should be addressed.The operational __________________________ should also be trialed and tested.[1.7.c]It should be modified as _______________________ is given from users.Maintenance is any ____________________________ that are made to the system.Any of these changes should be _____________________ and passed on to users.1.7 Practice QuestionsMel’s Mobile Apps has been approached by the owners of various restaurants to develop an application (app) that customers can use on mobile hand-held devices. The app would contain data to help customers select a suitable restaurant located nearby. The proposed application should allow customers to search for, select and view details of individual restaurants including: ?location ?cuisine ?menu items ?prices ?reservations ?take-away meals ?favourite meals.Why should live data be used to test the developed app?An e-commerce site offers perfumes for sale online. Since launching the site, the website functionality, ease of navigation and payment system have been tested. Sales have grown from two to fifty purchases per hour. This increased sales growth has caused the system to malfunction.Which of the following test data should have been used in the testing stage of development?LiveRealVolumeUnit ................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download