Systems Analysis SAQs

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

List the 3 primary roles of the systems analyst

3 primary roles; Consultant Supporting expert Agent of change

Explain what a DBMS is

A DBMS is used to create, access, control and manage the database. It provides logical access to the data stored in the DB so that users and programmers do not have to worry about the physical aspects of the database.

Define what a database is

A self-describing collection of logically related data, organized to meet the information needs of multiple users

Explain tangible benefits, give an example

Advantages measurable in dollars that accrue to the organization through the use of the information system Examples: Increase in the speed of processing

Explain what open source software is

An alternative of traditional software development where proprietary code is hidden from the users Open source software is free to distribute, share, and modify. Characterized as a philosophy rather than simply the process of creating new software Example: Linux Operating System, Apache Web Server, Mozilla Firefox Web Browser

Define a primary key

An attribute whose value is unique across all occurrences of a relation All relations have a primary key. This is how rows are ensured to be unique. A primary key may involve a single attribute or be composed of multiple attributes.

Why is there an increased demand for analysts who understand HCI?

As companies begin to realize that the quality of systems and the quality of work life can be improved by taking a human-centered approach at the outset of a project.

Define an attribute

Attribute: Each characteristic, or quality, describing entity (e.g., TutorPhone attribute belongs to Tutor entity)

List 4 considerations when selecting a project

Backing from management Appropriate timing of project commitment Possibility of improving attainment of organizational goals Practical in terms of resources for the system analyst and organization Worthwhile project compared with other ways the organization could invest resources

Give an example of how information systems support; Business Operations, Managerial Decision Making, Strategic Advantage

Business Operations: e.g. retail information system to record customer purchases, track inventory, pay employees Managerial Decision Making: e.g. in store managers use system to decide what lines to add or discontinue Strategic Advantage: e.g. head office uses system to look at sales trends across stores to identify ways to gain competitive advantage over other retailers

Define Business Intelligence

Business intelligence - knowledge about your customers, competitors, business partners, competitive environment, and own international operations that gives you the ability to make effective, important, and often strategic business decisions.

List the 4 agile values

Communication Simplicity Feedback Courage

Explain Physical Database design

Converts relations into database tables Programmers and database analysts code the definitions of the database. Written in Structured Query Language (SQL)

What is the difference between data and information

Data - raw facts Information - data that have a particular meaning within a specific context

Explain 3 key advantages of databases

Data is integrated and stored centrally Management and control Easier to understand Data duplication is reduced Analysis Capability Analyse/Query large volumes of data Speed of organizing and retrieving data Data is program independent (flexibility to add new applications easily

Explain 2 functions of DBMS

Database Development Create database, tables, and supporting structures (e.g. primary keys, relationships) Enforce rules Database Maintenance Maintain database structures (e.g. alter, drop, truncate tables)

DSS

Decision Support System (DSS): Aids decision makers in the making of decisions Examples; financial planning with what-if analysis, budgeting with modeling

Explain the 3 key elements of feasibility

Defining objectives Determining resources; •Operationally •Technically •Economically

Define an entity

Entity: Person, place, thing on which we store information (e.g. tutor, student, department)

ESS

Executive Support System (ESS) Helps executives to make unstructured strategic decisions in an informed way Examples; drill-down analysis, status access

List the 5 stages of agile development

Exploration Planning Iterations to the first release Productionizing Maintenance

True or false; JAD should be held onside

False.

Describe the 2 steps of database design

File and database design occurs in two steps. Develop a logical database model, which describes data using notation that corresponds to a data organization used by a database management system. Relational database model Prescribe the technical specifications for computer files and databases in which to store the data. Physical database design provides specifications Logical and physical database design in parallel with other system design steps

List the 4 problem definition steps

Find a number of points that may be included in one issue. State the objective. Determine the relative importance of the issues or objectives. Identify which objectives are most critical.

GDSS

Group Decision Support System (GDSS) Permit group members to interact with electronic support. Examples; email, Lotus Notes

List 3 benefits of ecommerce and Web systems

Increasing user awareness of the availability of a service, product, industry, person, or group The possibility of 24-hour access for users Improving the usefulness and usability of interface design

IS

Information Systems

Define Information systems as per James A. O Brien

Information Technology System - organised combination of people, hardware, software, communications networks and data resources that collects, transforms and disseminates information (James A. O'Brien)

Explain intangible benefits, give an example

Intangible benefits are benefits from use of the information system that are difficult to measure. Examples: Improving the decision-making process

List 3 interactive methods to elicit Human Information Requirements

Interviewing Joint Application Design (JAD) Questionnaires

Explain what an interview is and what they reveal

Interviewing is an important method for collecting data on human and system information requirements. Interviews reveal information about: Interviewee opinions Interviewee feelings Goals Key HCI concerns

List 3 Drawbacks of JAD

JAD requires a large block of time to be available for all session participants. If preparation or the follow-up report is incomplete, the session may not be successful. The organizational skills and culture may not be conducive to a JAD session

Explain JAD

Joint Application Design (JAD) can replace a series of interviews with the user community. JAD is a technique that allows the analyst to accomplish requirements analysis and design the user interface with the users in a group setting

When is it appropriate to use questionnaires?

List 3 considerations for questionnaire language Simple Specific Short Not patronizing Free of bias

Explain the impact of maintenance

Maintenance is performed for two reasons: Removing software errors Enhancing existing software Over time the cost of continued maintenance will be greater than that of creating an entirely new system. At that point, it becomes more feasible to perform a new systems study.

MIS

Management Information System (MIS): Supports a broad spectrum of organizational tasks including decision analysis and decision making Examples; profit margin by sales region, expenses vs. budgets

Explain Metadata

Metadata in the Data Dictionary describes each piece of data in a business and describes in detail the characteristics of the data, including: Size of the data (how many bytes) Range of acceptable values for each field (e.g. 1-100) Type of data (e.g number, character, audio, etc.) Ownership (who has the right to view or modify the data)

Explain logical database design

Must account for every data element on a system input or output Normalized relations are the primary deliverable.

Explain nominal and interval scales

Nominal scales are used to classify things. It is the weakest form of measurement | An interval scale is used when the intervals are equal. There is no absolute zero.

Explain "Open" and "Closed" questions and the pros and cons of each

Open-ended interview questions allow interviewees to respond how they wish, and to what length they wish. Open-ended interview questions are appropriate when the analyst is interested in breadth and depth of reply. Puts the interviewee at ease(pros) Allows the interviewer to pick up on the interviewee's vocabulary Provides richness of detail Reveals avenues of further questioning that may have gone untapped May result in too much irrelevant detail(cons) Possibly losing control of the interview May take too much time for the amount of useful information gained Potentially seeming that the interviewer is unprepared Possibly giving the impression that the interviewer is on a "fishing expedition" | Closed interview questions limit the number of possible responses. Closed interview questions are appropriate for generating precise, reliable data that is easy to analyze. The methodology is efficient, and it requires little skill for interviewers to administer. Saving interview time Easily comparing interviews Getting to the point Keeping control of the interview Covering a large area quickly Getting to relevant data Boring for the interviewee Failure to obtain rich detailing Missing main ideas Failing to build rapport between interviewer and interviewee

List the 5 resources of an information system

People Software Data Networks Hardware

Draw a Venn diagram that explains People, Process, Technology

People: Staff Training & Awareness | Proffessional Skills and Qualifications | Competent Resources Process: Management Systems | Government Frameworks | Best Practice | IT Audit Technology: You cant deploy technology without competent people, support process or an overall plan.

Who coined the phrase "People, process, technology"?

Peter Keen

List 3 qualities of the systems analyst

Problem solver Communicator Strong personal and professional ethics Self-disciplined and self-motivated

Explain 2 reasons for project initiation

Problems in the organization Problems that lend themselves to systems solutions Opportunities for improvement Caused through upgrading, altering, or installing new systems

Explain 3 approaches for arranging interview questions

Pyramid- Starting with closed questions and working toward open-ended questions Funnel- Starting with open-ended questions and working toward closed questions Diamond- Starting with closed, moving toward open-ended, and ending with closed questions

Explain what questionnaires are useful for

Questionnaires are useful in gathering information from key organization members about: Attitudes Beliefs Behaviors Characteristics

List 4 ways to prepare for an interview

Reading background material Establishing interview objectives Deciding whom to interview Preparing the interviewee Deciding on question types and structure

Explain reliability in relation to questionnaires

Reliability of scales refers to consistency in response—getting the same results if the same questionnaire was administered again under the same conditions

SDLC

Software Development Life Cycle

What does SQL stand for

Structured Query Language

SAD

Systems Analysis & Design

Seven Phases of SDLC

Systems Development Life Cycle 1. Identifying problems, opportunities, and objectives 2. Determining human information requirements 3. Analyzing system needs 4. Designing the recommended system 5. Developing and documenting software 6. Testing and maintaining the system 7. Implementing and evaluating the system

When to Use SDLC

Systems have been developed and documented using SLDC. It is important to document each step. Upper level management feels more comfortable or safe using SDLC.

When to Use Agile

There is a project champion of agile methods in the organization. Applications need to be developed quickly in response to a dynamic environment. A rescue takes place (the system failed and there is no time to figure out what went wrong).

List the 4 agile resources

Time Cost Quality Scope

List 3 benefits of JAD

Time is saved, compared with traditional interviewing Rapid development of systems Improved user ownership of the system Creative idea production is improved

Explain 3 qualities of information

Time; Having access to information when you need it. | Having information that describes the time period you're considering Location; Access to information wherever you are Form; Audio, video, text, images, etc. | Free of errors

TPS

Transaction Processing System (TPS): Process large amounts of data for routine business transactions Boundary-spanning Support the day-to-day operations of the company Examples; Payroll Processing, Inventory Management

True or false; Executive sponsor, IS analysts, and users can all be involved in JAD

True.

Explain 3 functions of systems analysis

Understanding what an information system should do. How the current system functions. What users would like to see in new systems.

List the 4 ways information flows in an organisation Information flows

Upward - current state of the organization based on its transactions Downward - strategies, goals, directives Horizontal - between functional units and work teams Outward/Inward - to/from customers, suppliers, distributors, and other partners

Explain Validity in relation to questionnaires

Validity is the degree to which the question measures what the analyst intends to measure.

Define a foreign key

an attribute that appears as a nonprimary key attribute in one relation and as a primary key attribute (or part of a primary key) in another relation

Define normalisation

the process of converting complex data structures into simple, stable data structures The result of normalization is that every nonprimary key attribute depends upon the whole primary key.


Kaugnay na mga set ng pag-aaral

Chapter 64: Care of Patients with Diabetes Mellitus

View Set

Chapter 10. Intrusion Event Categories

View Set