Tuesday, December 8, 2009

Question Bank SAD/SE

Question Bank
Semester-III

Subject-SAD/SE Faculty-Nidhi Bhatia

Objectives-:
1. Systems are designed to achieve………….
2. Two elements of system are…………&……….
3. Dynamic system tends to run down over time is called………….
4. The term meaning Goals achieved through different paths is called………..
5. TPS stand for……………
6. SDLC’s phase after implementation is called………
7. Phase in which errors or bugs are detected in candidate system………….
8. ………….. is the element of the system that involves actual transformation of
9. input to output.
10. The limits of the system are called………….
11. Operational information is established by………….
12. The most creative and challenging phase of SDLC is………….
13. …………. Is a strategy for determining information requirement.
14. Stream of user request are handled by……….
15. …………..are bias in data selection and use.
16. Data dictionary does not include……..
17. ………………borrows heavily from structured programming
18. …………..is network virus.
19. Systems are designed to achieve………….
20. Dynamic system tends to run down over time is called………….
21. The term meaning Goals achieved through different paths is called………..
22. TPS stand for……………
23. SDLC’s phase after coding is called………
24. ……….is the technique for generating new ideas and obtaining information.
25. The result of feasibility analysis is………….
26. ……… helps management in making decisions.
27. An outsider attacking the system security is called…………………..
28. Resource shortage …………………. Expansion.
29. Strategy for determining information is………………..
30. SMIME stands for…………………………………
31. ……………..are used to sign electronic documents
32. ………………pages do not change their contents when requested from server
33. …………….is virus control method
34. ……………………is a type of passive attack
35. Encrypted text is called…………..text
36. Relationship symbol of ERD is………………….
37. OOD symbolizes ………………….domain
38. Nor more than ………processes can be included in DFD
39. ………….is a type of active attack
40. ……………..is method of encrypting plain text



State whether true or false

1. Stub and entry area are part of decision table.
2. Cost Benefit analysis is done at end of SDLC
3. Closed system allows external inputs.
4. Planning policies is not the task of upper management.
5. Prototyping is data gathering tool.
6. Class has physical existence
7. questionnaire was a traditional analysis issue
8. SET is not a internet protocol
9. Feasibility study does not consider economic considerations.
10. Black box is not a testing strategy
11. SRS is a validation for correct candidate system.
12. MIS are man made software’s.
13. Traditional analysis had no problems.
14. Disgruntled employees are threats to security.
15. Before sending data is decrypted.
16. System integrity and security are same.
17. structured English is similar to structured programming
18. Information system cannot be centralized
19. Preliminary investigation can be skipped
20. DFD is similar to flow chart
21. DPS is used upper management
22. Data flows are symbolized by arrows
23. Parasite is type of virus
24. Interdependence is not a characteristic of a system.
25. Software system is everlasting.
26. Oval is symbol for attribute in ERD
27. All computer languages support OOPs
28. System programmers can be analyst.
29. MIS can be called man made information system
30. Group consensus is method of user requirement.
31. Feed back is an element of a system
32. Interview is means of fact finding
33. Analyst need to have domain knowledge
34. DFD can be logical
35.




Questions-:
1. What is a system? Explain its types. What are its characteristics?
2. Describe SDLC in Detail?
3. Write the elements of system.
4. Write a short note on DSS.
5. Write notes on following terms
Need identification, Testing, Post Implementation
Case study-:
1. A major publication company wishes to computerize his process of Appraisals (promotions).If you were sent as an analyst to the organization, Prepare a feasibility study Report for this imaginative organization
2. You are in a coffee shop across the street from your college having lunch. A customer walks up to the counter. You observe the following.
Customer: Hi Janne I d like a burger to go. Everything but onions
Janne (waitress): Anything else?
Customer: Yes a small order of French fries and a root beer
Janne: that will be Rs 200.
Questions
1. Explain the pattern of the system in action.
2. The organization system characteristics.
3. The subsystems, information flow and interfaces.
4. Inputs and outputs of the environment
5. If you were to improve the performance of the system what would you do and how?

UNIT -2
Objectives-:
1. ……….is the technique for generating new ideas and obtaining information.
2. The result of feasibility analysis is………….
3. ……… helps management in making decisions.
4. Any two fields of user Request form are………. &…………..

Questions-:
1. Describe the importance of planning in system design.
2. How do you determine user’s information requirement?
3. What do you mean by feasibility study and what are its considerations?
4. Write the steps involved in feasibility analysis.
5. Describe the following scharer strategies with respect to user requirements –kitchen sink, smoking, same thing strategy

Case study-:
1. Allied corporation has had to revamp its approach to maintaining a computer system and converting applications. Recently management has established a steering committee to oversee all application before they are run. The committee consists of one member from each of following areas: accounting sales production and information system. The committee is chaired by the vice president in charge of production. The primary aim is to review each user request and approve or disapprove it based on priority and feasibility. If request is approved the department is billed for its development by debit transaction against its budget. The amount includes computer time, analyst and programmer time.
Review Questions
1. What is the structure and role of the steering committee?
2. What is the role of analyst, programmer, and database specialist?
2. Discuss system planning approach in designing software for a Reputed Bank. Explain the process required.

UNIT -3
Objectives-:
Questions-:
1. What do you mean by structured analysis? Why do we need to do structured analysis?
2. Prepare a DFD for College Library System
3. Describe the terms OOA and OOD and differentiate them.
4. Prepare an ERD for hospital Management System
5. Write short notes on
Decision Tree, Decision Table, Structured English
Case study-:
1. Draw a DFD for the following application:-
A travel agency making a round trip for Europe.
2. a major manufacturer or floppy disks wants to have a party for employees who have been with the company between one and three months .In addition to master list of these employees, the public relation department wishes to have tally of those who are single, married divorced and other.
-Assuming that the master personnel file of company employees will be used develop decision table to illustrate the job.

UNIT -4
Objectives-:
Questions-:
1. Describe Internet Security standards.
2. Discuss the Disaster Recovery approaches in detail.
3. What do you mean by system security? Explain its counter parts.
4. What are the Risks associated to internet comment.
5. Who are intruders or hackers categorize them. Explain methods of intrusion detection.

Case study-:
1. Prepare a Security Policy for a Nationalized Bank being a analyst analyzing the security measures related to them.
2. Hackers good or bad. Analyze giving reasons

No comments:

Post a Comment