0% found this document useful (0 votes)
47 views

Technology Form 4

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views

Technology Form 4

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

Chapter One: Introduction To System Analysis And Design

1. What is System?
System is an interconnected set of business procedures used within one business
unit working together for a purpose.
2. Where the term system derived from originally?
The term system is originally derived from Greek word Systema.
3. List the study of system concepts has three fundamentals implication?
 A system must be designed to meet predefined targets.
 The components have to have interrelationship and interdependence.
 The organization goals as a whole have higher priority than its sub system
goals
4. List characteristics of system?
 Interrelated components: works together with information systems to
collect process, store and disseminate information to support decision
making.
 Environment: it refers to the state of a computer – determined by which
programs are running on basic hardware and software characteristics.
 Interfaces: it is a device or a program that allows users to communicate
with a computer.
 Input: means to provide or give something to the computer or any other
electronic device.
 Output: any information that is processed by and sent out from a
computer or any other electronic device.
5. What is information System?
Information systems are a combined network of hardware, software, and
telecommunications network.
6. List examples of information system:
 Marketing information system
 Payroll system
 Human resource management system
 Library management system, School management system.
 University management system
 Restaurant management system
 Accounting management system among others
7. List the components of information system?
 Software
 Hardware
 Date
 Process
 People

8. List types of hardware


a) Servers b) Workstations c) Network d) Telecommunication
equipment a) Fiber-optic cables f) Cellular devices g) Scanners h) Digital
capture devices
9. Mention two types of software.
System software and Application Software
10. What is the system analysis and design?
System analysis and design is the mechanism by which people build (automated)
information systems.
11. What is the System Analyst?
A system analyst is a title given to person who studies the problem and needs of
an organization.
12. List system analyst skills
 Working knowledge of information technology
 Computer programming experience and expertise
 General business knowledge
 General problem-solving skills
 Good interpersonal communication skills
 Good interpersonal relations skills
 Flexibility and adaptability
 Character and ethics
13. Abbreviation of SDLC:
System Development Life Cycle.
14. Define System Development Life Cycle?
System Development Life Cycle (SDLC) is a conceptual mode that incorporates
policies and procedures to build or alter system during their life cycle.
15. List stages of system development life cycle:
 Planning
 Analysis
 Design
 Coding
 Testing
 Deployment
 Maintenance
16. What is the preliminary investigation?
The preliminary investigation is an essential stage because the result will affect
the whole development process.
17. List types of feasibility
 Operational feasibility
 Technical feasibility
 Economic feasibility
 Schedule feasibility
18. Define Planning?
Planning phase is the first phase in system development life cycle.
19. Define analysis?
Analysis stage starts with identification of the problem and analyzing the needs
of end
20. The main objective of Analysis are the following activities.
 Study or gather data from the existing system
 Describe the current system –establish the input, output, and processing
being done
 Identify the problem with the current system
 Identify the scope of the system
 Identify and agree customer needs and requirements
 Build logical model of new system
21. List four common methods in fact finding
 Observation
 Interview
 Questionnaire
 Document review
22. List advantages of Observation
 The observer acquires first-hand experience of what goes on there.
 A relatively inexpensive method
 Reliable data is collected
23. List disadvantages of Observation
 People under study may be uncomfortable and hence make mistake
 It is time consuming because the observer must be there in person
 Tasks that violate standard procedures may not be carried out the way
they are normally done, when under observation.
24. List advantages of interview:
 It provides the opportunity to motivate the interviewee into giving open
and honest answers to the analyst’s.
 It allows the analysts to probe for more feedback from the interviewee.
 It is possible to modify questions as interview proceeds and ask questions
specific to the interviewee.
25. List advantages of interview
 This approach can be a time consuming exercise.
 It is relatively expensive (use of analyst’s time)
 The interviewee cannot remain anonymous.
26. Advantages of questionnaire?
 It is relatively easy to analyze
 You can contact a wide simple of the population at a relatively low cost.
 Respondents of survey have time to think about their answers they are not
usually required to reply immediately.
27. Disadvantages of questionnaire?
 Respondents may misunderstand questions because of poor design and
ambiguous language
 Respondents may ignore certain questions.
 There is a risk of questionnaire fatigue if surveys are carried out too
frequently.
28. Advantages of Document Review?
 Analyst can see for himself how the paper system operates.
 The Analyst is able to review pervious solutions and recommendations that
have been made on the system.
29. Disadvantages of Document Review?
 It can be a very time-consuming exercise.
 It is fairly costly method to use.
30. List the requirement specification?
 Inputs
 Outputs
 Controls
 Data storage
 Processing requirement
31. What is systems Design?
The goal of the Systems Design stage is to build a physical model that will fulfill all
documented requirements for the system.
32. List system specification
 User interface design
 Output design
 Input design
 Data storage design
 Process design
 Controls design
33. What is System design?
System design is the process of defining the architecture, components, module,
interfaces and data.
34. List types of system design
 Logical design: is relates to abstract representations of the input ,outputs
and data flow of the system.
 Physical design :is related to actual input and output processes of the
system
35. What is the System construction?
The main goal of this phase is coding of the proposed system by using an
appropriate computer language.
36. What is the Testing?
The main goal of this process is to fix errors. Errors in cording, planning and
requirements are corrected.
37. List the ways of testing system and define each one
 Unit testing
 Integration testing
 System testing
 Acceptance testing
38. What is the Deployment of the system?
Deployment (install and use) of the system which has been tested and debugged
is carried out at this stage.
39. List Deployment approaches to deploy a system
 Direct Deployment
 Parallel Deployment
 Pilot Deployment
 Phased Deployment
40. What is the Maintenance?
This continuous process of system modifications is known as Maintenance.
41. List three activities of the Maintenance?
 Bug (error) Fixing
 Upgrade
 Enhancement
42. Define Waterfall Model The Waterfall Model was the first methodology to be
introduced.
43. List different phases of the Waterfall Model
 Requirements
 Design
 Development
 Testing
 Deployment
 Maintenance
44. The advantage of waterfall model?
 Easy and simple to understand and use.
 Easy to handle due to model stiffness. There are unique deliverables and
are review process for each step.
 Phases are processed and finished one at a time.
 Fits well for smaller projects where there is a clear understanding of the
specifications.
 Phases are clearly described and the milestones well known.
 Activities easy to manage and process and results are well documented.
45. The disadvantages of waterfall model
 High risk and uncertainty levels.
 Not a suitable model for object-oriented and complex projects.
 Poor methodology for long and ongoing projects.
 Progress within stages can be difficult to measure.
 Cannot meet changing requirements.
46. What is agile method?
Agile is mechanism in which a team can manage a project by breaking it up into
many stages and requiring continuous collaboration with stakeholders and
continual development and iteration at each stage.
47. Example of Agile Methodology:
 Scrum
 Extreme Programming (XP)
 Feature Driven Development (FDD)
 Dynamic Systems Development Method (DSDM)
 Adaptive Software Development (ASD)
 Kanban
 Crystal and Lean Software Development (LSD)
48. What is Rapid Application Development (RAD)?
RAD is a team-based method which accelerates the development of information
systems and produces a functioning information system.
49. Five steps or phases in RAD:
 Define and finalize project requirements.
 Begin building prototypes.
 Gather user feedback.
 Test.
 Present your system
Chapter Two: Microsoft Access
1. What is Microsoft Access?
Microsoft Access is a database management system (DBMS) package developed
for creating and managing data in an organized fashion.
2. What is a Database?
A database is a collection of logically related data which is usually stored in
electronic form.
3. Why do we use a database?
A database is essentially a collection of data stored in tables.
4. The advantages of having a database include:
 Manages large amounts of data: A database stores and manages a large
amount of data on a daily basis.
 Accurate: A database is accurate as it has all sorts of build in constraints
such as not null, primary key, foreign key checks.
 Easy to update data: in a database, it is easy to update data using various
Data Manipulation Language (DML) available. One of these languages is
SQL.
 Security of data: databases have various methods to ensure security of data
and it requires user logins before accessing a database.
5. Disadvantages of Database
 Cost of Hardware and Software: We need a high-speed processor to run
the DBMS software, and large memory size is required which causes the
need for expensive hardware.
 Date conversion: When restoring data from a computer file-based system
into a database system, the data stored in data files must be converted
into database files. Converting data from data files into database is
difficult and a time-consuming method.
 Cost of Staff Training: DBMS are always dynamic structures, so the users
need the training to use the DBMS. An organization has to pay a large
amount for the training of employees to run the database management
system.
6. The four Objects of Database
1. Tables 2. Forms 3. Queries 4. Report
7. Define database table?
A database table is essentially a collection of data organized into lists.
8. Define forms in access are used to enter new records in the table and to edit or
delete existing records into the table.
9. Define queries in access are a way of searching for and compiling data from
one or more tables.
10. Define reports Reports provides you the ability to present your data in a
printed format.
11. Define planning a query When planning a query that uses more than one
table.
12. List planning a query steps
 Pinpoint: exactly what you want to know.
 Identify: every type of information you want to include in your query
results.
 Locate: the fields you want to include in your query.
 Determine: the criteria the information in each field needs to meet.

Chapter Three: Programming

1. What is programming?
Programming is the process of creating a set of instructions that tell a
computer how to perform a task. Programming can be done using a
variety of computer programming languages, such as JavaScript,
Python, and C++.
2. How compiler works?

Machine
Source code compiler output
code

3. How interpreter works?


 Source code
 Interpreter
 output
4. List the most popular programming languages?
 Java
 JavaScript
 Python
 C
 C++
 C#
 Goland
5. Define integrated development environment (IDE)?
Is an application used to create programs an IDE can often support different
languages also an IDE have a number of tools and functions that assist the
developer in the creation of program
6. What are the common tools of IDE?
 Code editor
 Translator
 Debugger
7. Define debugging?
The process of tracking of complex processes down and correcting them is called
debugging
8. Define variables?
a variable is a value that can change, depending on conditions or on information
passed to the program
9. Define integer?
Integers are zero, positive or negative whole numbers without a fractional part and
having unlimited precision, e.g. 0, 100, -10.
10. Define string?
A string in Python is a sequence of characters. It is a derived data type.
11. Define floats?
A floats or” floating – pointing numbers “are numbers with decimal for instance
3.14159265 is float.
12. Who created JavaScript?
The first ever JavaScript was created by Brendan Eich at Netscape
13. When java was created?
Java was first released in 1995
14. When python was developed?
It was created by Guido van Resume, and first released on February 20, 1991.
15. When c# (c-sharp) was developed?
It was developed in 2000 by Microsoft Corporation
16. Basic Data Types in Python?
 Integers.
 Floating-Point Numbers.
 Complex Numbers.
 Strings. Boolean Type
Chapter four: ict security and ethics

1. What is digital security risk?


A digital security risk is an action or event that could result in loss or damage to
computer software, hardware, data or information
2. Common digital security risk?
 Internet and network attacks
 Unauthorized access and use
 Theft of hardware
 Software theft
 Theft of information
 System failure
3. Define hacker?
A hacker is a person skilled in information technology who uses their technical
knowledge to achieve a goal or overcome an obstacle
4. Define cracker?
Refers to someone who illegally accesses a computer or network with sole purpose
of destroying data and stealing information.
5. Define Script kiddie?
They have the same aim as a cracker but lack the knowledge and technological
skills.
6. What is malware?
Malware is any software intentionally designed to cause disruption to a computer,
server, client, or computer network
7. Define computer virus?
A computer virus is a type of computer program that, when executed, replicates
itself by modifying other computer programs and inserting its own code.
8. List the types of malware?
 Worm malware.
 Trojan malware.
 Ransom ware.
 Bots or botnets.
 Adware malware.
 Spyware.
 Rootkits
9. Define ethics?
Is a branch of philosophy that "involves systematizing, defending, and
recommending concepts of right and wrong behavior
10. Define computer ethics?
Normally computers can be used for both good and bad purposes .the principles
which determine whether an action is good or bad are referred to as ethics.
11. Define Intellectual property?
Intellectual property relates to unique and original tasks including ideas
innovations, art, writing ,processes, names of companies and product and logos.
12. Define copyright?
A copyright is intellectual property method that allows the owner an exclusive
right to produce copies of an item for a specific period.
13. Define plagiarism?
Plagiarism is the representation of another author's language, thoughts, ideas, or
expressions as one's own original work
14. Define botnets?
A botnet is a number of Internet-connected devices, each of which runs one or
more bots.
15. Define denial of service attack DOS?
a denial-of-service attack is a cyber-attack in which the perpetrator seeks to make a
machine or network resource unavailable to its intended users by temporarily or
indefinitely disrupting services of a host connected to a network
16. Define DDOS attack?
DDoS Attack means "Distributed Denial-of-Service (DDoS) Attack" and it is a
cybercrime in which the attacker floods a server with internet traffic to prevent
users from accessing connected online services and sites

You might also like