0% found this document useful (0 votes)
17 views5 pages

System Analysis and Design CA

Uploaded by

gracious pezoh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views5 pages

System Analysis and Design CA

Uploaded by

gracious pezoh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

System analysis and design receit

1.The step-by-step instruction that solves a problem is called?

A. An algorithm

B. A list

C. A plan

D. A sequential structure

E. None of the above

2.Questionnaires are used when

i.a large number of people's responses are required

ii.manual data processing is required

iii.when a small number of people's response is required

iv.it is difficult to personally interview people

A.i and ii

B.ii and iii

C.iii and iv

D.i and iv

3.System Requirements Specification is developed by

A. users of the proposed system

B. top level managers of an organization

C. examining the functioning of similar organizations

D. systems analyst after information gathering phase in consultation with users

4.In a document flow diagram entities are represented by

A. circles
B. rectangles with rounded edges
C. diamond shaped boxes
D. rectangles

5.Document flow diagrams are developed by

A. systems analyst
B. programmers
C. system designers
D. users and managers of an organization

6.All information required can be gathered in

A. one interview
B. two interviews
C. several interviews
D. several interviews and group discussions

7,A computer-based information system

A. may require some tasks to be done manually


B. should not have any manual tasks
C. is always fully automated
D. may use only computers

8.By operational feasibility we mean

A. the system can be operated nicely


B. the system is unusable by operators
C. the system can be adapted by an organization without major
disruptions
D. the system can be implemented

9.External Entities may be a

A. source of input data only


B. source of input data or destination of results
C. destination of results only
D. repository of data

10.It is necessary to carefully design data input to a computer based system


because

A. it is good to be careful
B. the volume of data handled is large
C. the volume of data handled is small
D. data entry operators are not good

11.By metadata we mean

A. very large data


B. data about data
C. data dictionary
D. meaningful data

12.An entity is

A. a collection of items in an application


B. a distinct real world item in an application
C. an inanimate object in an application
D. a data structure

13.By data security in DBMS we mean

A. preventing access to data


B. allowing access to data only to authorized users
C. preventing changing data
D. introducing integrity constraints

14.Attributes are

i. properties of relationship
ii. attributed to entities
iii. properties of members of an entity set

A. i
B. i and ii
C. i and iii
D. iii

15.Normalization is a process of restructuring a relation to

A. minimize duplication of data in a database


B. maximize duplication of data to ensure reliability
C. make it of uniform size
D. allow addition of data

16.A second Normal Form (2 NF) relation should

A. be in 1 NF
B. not have a composite key
C. not have attributes dependent on key attribute
D. not have attributes dependent on one another

17.A relationship is

A. an item in an application
B. a meaningful dependency between entities
C. a collection of related entities
D. related data

18.Rows of a relation are called

A. tuples
B. a relation row
C. a data structure
D. an entity

19.A relation is said to be in 3 NF if

i. it is in 2 NF
ii. non-key attributes are independent of one another
iii. key attribute is not dependent on part of a composite key
iv. has no multi-valued dependency

A. i and iii
B. i and iv
C. i and ii
D. ii and iv

20.When a logical model is mapped into a physical storage such as a disk


store the resultant data model is known as

A. conceptual data model


B. external data model
C. internal data model
D. disk data model

SECTION B

1) Mention what is the basic role of a computer system analyst?


(4MARKS)
2) 2) Mention what are the skills required to become a computer analyst?
(3marks)
3) Mention what does the software audit includes?
(3marks)
4) What are the different phases in a typical system development life
cycle?(5marks)
5) What’s your understanding of functional requirement specification
documents? (3marks)

You might also like