0% found this document useful (0 votes)
75 views2 pages

CSE-3507 (SADD) Final Spring-2021

This document contains the questions and instructions for a final exam in System Analysis, Design and Development. It includes questions about data flow diagrams, decision tables, data dictionaries, software testing techniques, documentation, training, maintenance, hardware selection factors, security risks, and encryption methods. Students are instructed to answer all 5 questions, which vary between 1.5 and 3 marks each and cover topics relating to system analysis and design.

Uploaded by

habibi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
75 views2 pages

CSE-3507 (SADD) Final Spring-2021

This document contains the questions and instructions for a final exam in System Analysis, Design and Development. It includes questions about data flow diagrams, decision tables, data dictionaries, software testing techniques, documentation, training, maintenance, hardware selection factors, security risks, and encryption methods. Students are instructed to answer all 5 questions, which vary between 1.5 and 3 marks each and cover topics relating to system analysis and design.

Uploaded by

habibi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

CSE-3507 Page 1 of 2

International Islamic University Chittagong


Department of Computer and Communication Engineering
Final Examination, Spring-2021
Program: CCE Semester: 5th

Course Code: CSE-3507


Course Title: System Analysis, Design and Development

Time: 5 Hours Full Marks: 30


The figure in the right margin indicates full marks. The questions are of equal value.
Answer all of the five (5) questions.

Q.1(a) List five characteristics of a physical data flow diagram that a logical data 1
flow diagram does not have.
Q.1(b) A computer supplies firm called True Disk has set up accounts for countless 3
businesses in Chattogram. True Disk sends out invoices monthly and will
give discounts if payments are made within 10 days. The discounting policy
is as follows: If the amount of the order for computer supplies is greater than
Tk. 1,000, subtract 4 percent for the order; if the amount is between Tk. 500
and Tk. 1,000, subtract a 2 percent discount; if the amount is less than Tk.
500, do not apply any discount. All orders made via the Web automatically
receive an extra 5 percent discount. Any special order (computer furniture,
for example) is exempted from all discounting.
Solve if your ID is ODD:
Develop a decision table for True Disk discounting decisions, for which the
condition alternatives are limited to Y and N.
Solve if your ID is EVEN:
Write structured English to solve the True Disk company situation.
Q.1(c) List the eight specific categories that each entry in the data dictionary should 2
contain. Briefly give the definition of each category. What are the main
benefits of using a data dictionary?
Q.2(a) What are some of the different model-driven methodologies? Prototyping 1.5
has many strengths, but it also has a number of weaknesses and hazards.
Discuss some of these weaknesses and hazards.
Q.2(b) Contrast external outputs with internal outputs produced by a system. List 1.5
three categories of the printed reports. Discuss in brief.
Q.2(c) IIUC needs to keep better track of students and others who use the many 3
computers available in the Library.
CSE-3507 Page 2 of 2

i) Design and draw a representation of a display screen for students to use in


signing into the computers in the library. Label the three sections of a display
that you included.
ii) Design a paper form to be left alongside each computer that users who
are part of the community (but are not students) are required to fill out daily.
The form should ask for name, date and time of visit, general purpose for
computer use (i.e., word processing, Web surfing, examining real estate
documents online), and the time they have logged off. Label the seven
sections of a form that you included.
Q.3(a) Who does test the software? What type of errors do White-box and Black- 1.5
box testing discover?
Q.3(b) How do you create Boundary Value Analysis (BVA) test cases? Create BVA 3
test cases for the following input conditions:
(i) Input (a range): -24 to 76
(ii) Input (a number of values): { -15, -20, -10, 10, 20, 15 }
(iii) Input (data structure): salary[149]
Q.3(c) What is software quality? Define all of the six key quality attributes 1.5
identified by the ISO 9126 standard.
Q.4(a) What is meant by Internal documentation and External documentation? 2.5
Describe the procedure manuals of documenting the system including its
key sections and complaints against it.
Q.4(b) Who should be trained to use the new or modified information system? List 1.5
the five possible sources of training for users of information systems. What
are the classic implementation mistakes?
Q.4(c) What is the process of maintaining information systems? Categorize the 2
maintenance into different types and discuss in brief.
Q.5(a) What are the relative advantages and disadvantages of the following 2
financial factors in hardware selection?
i) Rental,
ii) Lease, and
iii) Purchase.
Q.5(b) Write short notes on the following risks to data and applications: 1.5
i) Social Engineering,
ii) Trojan Horse,
iii) Logic Bomb.
Q.5(c) What are authentication and encryption? Describe the symmetric (secret key) 2.5
and asymmetric (public key) encryption along with the proper figure.

-The End-

You might also like