0% found this document useful (0 votes)
31 views3 pages

Test 2 2024 Revision Activity

Uploaded by

mngunism1205
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views3 pages

Test 2 2024 Revision Activity

Uploaded by

mngunism1205
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

TEST TWO REVISION ACTIVITY

Surname and Init


Student No
Instructions:
 Revise Test2 and reflect by answering the question paper activity.
 This s an individual activity, NOT group work. However, discussion with other students in
attempting the activity is allowed.
 Provide details of the students participated on the table above.
 Save your work with your student details e.g. “SitholeKM Test 2 Revision”
 Once completed, activity must be uploaded to BB on the link provided under the activities
submission folder. Due date: 03-June--2024
 Do NOT create a new document for this activity, just provide your answers under each question on
this document.

QUESTION 1 [25]

Answer the following questions:

1.1 Identify an input control type being explained by each of the following statements: [4]
1.1.1 Control that ensures that numeric fields containing codes or identifiers are correct.
1.1.2 Control that checks numeric data inputs to ensure that the amount entered is reasonable.
1.1.3 Control that reviews various combinations of data inputs to ensure that the correct data are
entered
1.1.4 Control that ensures that all required data values describing an object or transaction are present

1.2 State the related design activity to each of the following key questions of the system design. [5]
1.2.1 What internal structure for each application component will ensure efficient construction, rapid
deployment, and reliable operation?
1.2.2 How will data be captured, structured, and stored for later use by the information system?
1.2.3 How will this system interact with other systems and with the organization’s existing technologies?
1.2.4 What are the key parts of the information system and how will they interact when the system is
deployed?
1.2.5 How will users interact with the information system?

1
1.3 List the parts or compartments of a fully developed use case description, excluding scenario. [10]
1.4 In UML, what are three types of relationships found on a class diagram? [3]
1.5 Identify three key parts of an entity relationship diagram (ERD)? [3]

QUESTION 2 [25]

Answer the following questions

2.1 Compare symmetric key encryption with asymmetric key encryption. [2]

2.2 Name two techniques that can be used for identifying things in the problem domain. [2]

2.3 Identify 5 (five) prevention techniques for Fraud risks one may adopt when designing systems [5]

2.4 Identify and describe three elements of access control systems. [6]

2.5 Develop or draw a system sequence diagram (SSD) for the following scenario:
Assume that the university uses a leave subsystem to manage leave applications by its employees.
When an employee wants to request or apply for a leave, employee will have to select type of leave
(sick, maternity, study, or vacation leave). The system will prompt for number of days, thereafter
prompt for a descriptive reason for leave form the employee. Then, the system must record leave and
return leave application outcomes to the employee. Also note that an academic assistant can perform
this application on behalf of an employee applying for a leave.
[10]

QUESTION 3 [22]

Answer the following questions

3.1 Draw a simple domain model class diagram for the university system that will be used to keep track of

all departments, instructors and modules being allocated to those instructors. A department can

employ one to many instructors, depending on the academic requirements of that specific department.

But an instructor can work for only one department. One instructor must be allocated at least one

module, but some instructors may be allocated more than one module.

[5]

3.2 Draw a simple domain model class diagram Durban Computers. Durban computers provide the service

of leasing computers to individuals and companies. Their systems must store information about

computers and lessees. One computer can be leased to different lessees at different times. A lessee is

2
also allowed to lease at least one computer to many computers. If lessee is a company, specific

information to that company must be stored. If lessee is an individual person, personal information

must be stored. For each computer, the system must store detailed information about critical

components: RAM chip, hard disk, and Processor. This will ensure that lessees are unable to change

these components while computers are in their possession.

[10]

3.3 Draw a simple domain model class diagram for Computer usage management system. An ICT

department have number of labs where each lab consists of many computers to be used by students.

However, some labs are not used as computer rooms, therefore they do not have any computers. The

system must keep track of all computers, labs, students, and the usage logs as students keep using the

different computers. No specific computers allocated to specific students

[7]

…………………………………………THE END………..GOOD LUCK…………………………………………………………

You might also like