Wednesday 7 October 2015

IT3: Topic 9 - Systems development life cycle

Winter 2012
13
During the design phase of the system development life cycle many issues need to be considered. Other than design of hardware, describe in detail four features or processes which should be considered when designing a new computer system.
[8]
Summer 2012
13
A systems analyst is called in to give advice after a new ICT system is implemented. Describe, using examples, four maintenance issues that could have arisen.
[8]
Winter 2013
14
When developing a new computer system, a systems analyst will have to investigate to produce the feasibility report. Describe what will be investigated in order to produce this report.
[5]
15
Once a new computer system has been designed, it has to be implemented. Discuss two different changeover strategies that an organisation could use for conversion to the new system.
[6]
16
Once the new computer system is up and running, it has to be maintained. Describe two different system maintenance methods and illustrate each method with appropriate examples.
[6]
Summer 2013
13
A systems analyst is investigating a company with regard to creating a new ICT system.  Describe three methods she would use to gather information about the existing system.
[9]
Winter 2014
4
A system analyst has a choice of direct changeover or parallel running when updating a computer system. Describe these two different potential changeover strategies and describe the advantages and disadvantages of each of the different strategies.
[6]
Summer 2014
12
A company has installed a new ICT system which will have to be maintained. Describe two different methods of system maintenance, illustrating each method with an appropriate distinct example.
[2x3]



Summer 2015
8
A system analyst has been employed by a council to produce a new computer based system to replace the system currently running their central lending library.  Other than observation, describe two methods the analyst could use to investigate their current system.
[2x3]
10
A doctors’ practice has installed a new computer system to help run the practice.  Once this system is up and running, it has to be maintained.  Describe three different methods of system maintenance and illustrate each method with appropriate examples.
[3x3]

IT3: Topic 7 - Management of change

Winter 2012
14
Following a company takeover, the introduction of new ICT systems has a big impact upon the workforce and working patterns. These changes have to be carefully managed. Describe in detail four different consequences of change caused by the introduction of new ICT systems.
[4]
Winter 2014
7
Describe in detail three fears the workforce may have when a new ICT system is introduced into their workplace.
[3x2]
8
Describe, using examples, two things that management could do to lessen any fears that the staff might have about the introduction of a new ICT system.       
[4]

IT3: Topic 5 - Security Policies

Winter 2012
8
Describe three factors an organisation needs to consider when producing a risk analysis.
[6]
9
A local council uses a network to manage their client records, appointments and all their financial functions. The council’s Information Officer is worried about the confidentiality of the records.  Explain why the council should have a security policy. Other than user accounts and logs, give three examples of what it should contain.
[5]
10
Describe the use of user accounts and logs as a way of keeping records secure.
[3]
Summer 2012
19
With the increase in the use of computing systems most organisations have adopted ICT security policies.  Discuss in detail three different types of potential threats to data. For each type of threat, describe the possible consequences of the destruction of data. You need to use distinctly different examples to illustrate your threats.
[9]
20
Discuss four possible operational procedures for preventing misuse of data. Use distinct examples to illustrate your procedures.
[8]
Winter 2013
5
A large Research Agency uses ICT systems to store customer records and all its financial functions. Explain why the agency should have a security policy and give two examples of what it should contain, other than user accounts and logs.
[4]
6
Describe the use of user accounts and logs as a way of maintaining the security of customer records.
[3]
9
Other than how well the company is equipped to deal with the risk, describe in detail three of the factors an organisation needs to consider when producing a risk analysis.
[6]
10
A bank is reviewing its disaster recovery programme. Other than risks, explain with reasons three factors, which should be included in a disaster recovery programme.
[6]
Winter 2014
18
Due in parts to potential threats to data, most organisations have now created ICT security policies. Discuss in detail four distinctly different types of potential threats to data. For each type of threat, describe a possible distinctly different consequence of the destruction of the data.
[12]
19
Describe three operational procedures an organisation could put in place to prevent misuse of data. Use different examples to illustrate each procedure.
[6]
Summer 2014
5
The Data Officer of a large company has written a security policy for that company.  Explain why the company should have a security policy. Other than user accounts and logs, give three examples of what it should contain.
[5]
6
Describe the use of user accounts and logs as a way of keeping confidential data secure.
[3]
11
A finance company is carrying out a risk analysis. Describe in detail three of the    factors the company should take into account when deciding how much to spend to control and minimise the risk to data.
[3x2]
Summer 2015
11
Other than establishing a code of conduct, discuss five possible operational procedures which could be introduced to prevent the misuse of data.  Use distinct examples to illustrate these procedures.
[5x2]
13
Companies and their customers are increasingly dependent on electronic information.  The security of electronic data is very important to every company and their customers.

Describe three different types of threat to a company’s data and illustrate each type of threat with a different detailed example.  For each of the different threats, describe a distinctly different consequence for a company or its customers, should the security of the data be compromised of the data destroyed.
[3x3]

Tuesday 6 October 2015

IT3: Topic 8 - Management information systems (MIS)

Winter 2012
6
Most organisations now use Management Information Systems (MIS). Describe what is meant by an MIS, and use a suitable example to illustrate how it can be used.
[4]
7
Describe the factors which make a Management Information System (MIS) either good or poor.
[7]
Summer 2012
14
Many organisations now depend on their Management Information System (MIS) for the success of their businesses. Discuss using appropriate examples four of the features of an effective MIS system.
[8]
Winter 2013
11
More and more organisations are becoming very dependent on their Management Information Systems (MIS). Describe in detail four factors that can lead to an effective MIS.
[8]
Summer 2013
12
Most organisations could not operate without a good Management Information System (MIS). Define what is meant by an MIS and describe the factors which make an MIS good or poor.
[10]
Winter 2014
9
Describe, in detail, four of the factors which make an effective Management Information System (MIS).
[8]
Summer 2014
13
Describe the factors which make a Management Information System (MIS) either good or poor.
[6]
Summer 2015
14
Organisations find that having an ineffective Management Information Systems (MIS) can be counter-productive.  Describe, in detail, four factors that can help prevent a MIS being non-effective.
[4x2]

IT3: Topic 6 - Database systems

Winter 2012
17
Many companies would now struggle to operate effectively without database technology. Explain what is meant by a relational database.
[2]
18
Using appropriate examples, describe the advantages of a relational database approach over a flat file approach.
[6]
19
Describe what a data warehouse is and give an example of how a company might use it.
[3]
20
Explain what is meant by data mining and give a detailed example of how a company might use it.
[3]
21
Discuss in general terms, the advantages and disadvantages distributed databases give to a company.
[3]
Summer 2012
15
Explain what is meant by a relational database.
[2]
16
A DVD Rental Company uses a relational database management system for organising its lending. For simplicity, a person may only borrow one DVD at a time. Part of one table in the DVD Rental Company database could be:

BORROWER [BorrowerID, FirstName, Surname, Borrower Type, Address1, ........] with BorrowerID being the primary key.

Give two other suitable tables you could expect to see in this database, identifying any primary and foreign keys.
[7]
17
Relational databases are normalised to work effectively. Explain what is meant by the term data normalisation.
[2]
18
Some companies now use distributed databases. Explain what is meant by the term distributed databases and explain their advantages and disadvantages.
[6]
21
Discuss in general terms, the advantages and disadvantages distributed databases give to a company.
[3]
Winter 2013
17
Data in a relational database is normalised. Explain what is meant by a relational database and data normalisation.
[4]
18
Describe the terms data redundancy, data integrity and data consistency in relation to a relational database approach over a flat-file approach.
[3x2]
19
Give two reasons why relational databases are more secure than the flat-file approach.
[2]
20
Modern technology also makes use of distributed databases. Define what is meant by a distributed database. Describe two security issues that apply to distributed databases and suggest a different method for overcoming each issue.
[5]
Summer 2013
15
A Hospital uses a relational database for storing patient records. Explain what is meant by a relational database.
[2]
16
Data consistency, Data redundancy, Data integrity and Data independence are all terms associated with relational databases. Explain what each of these four terms means.
[4]
17
Consultants and patients are allocated to wards but each patient has only one consultant and each ward has their own consultant. One table in this database could be:

WARD(Wardid, WardName, NumOfBeds).  With Wardid being the primary key.

Give two other suitable tables you could expect to see in this database, identifying any primary or foreign key.
[6]
18
Describe what a data warehouse is and give an example of how a company might use it.
[3]
19
Explain what is meant by data mining and give a detailed example of how a company might use it.
[3]
21
Discuss in general terms, the advantages and disadvantages distributed databases give to a company.
[3]
Winter 2014
13
Relational databases are normalised to work effectively. Explain what is meant by the term data normalisation.
[2]
14
Give three reasons why relational databases are more secure than a flat file approach.
[3]
15
Distributed databases are widely used. Explain what is meant by the term distributed databases and explain their advantages and disadvantages.
[7]
16
Explain what is meant by a data warehouse and describe the advantages it might give a retail company.
[3]
17
Explain what is meant by data mining and describe an example of how a retail company might use it.
[3]
Summer 2014
15
Explain what is meant by a relational database.
[2]
16
A car hire company uses a relational database management system for organising its rentals. For simplicity, a person may only hire one car at a time. Part of one table in the car hire database could be:

CAR [CarID, Make, Model, Colour, Year of registration, Hire rate, .........] with CarID being the primary key.

Give two other suitable tables you could expect to see in this database, identifying any primary and foreign keys and at least two other fields in each table.
[7]
17
Describe how the car hire database structure could be improved to allow a person to hire more than one car at a time.
[1]
18
Using appropriate examples, describe the advantages of a relational database approach over a flat file approach.
[8]
21
Discuss in general terms, the advantages and disadvantages distributed databases give to a company.
[3]
Summer 2015
15
Organisations now store vast amounts of data in normalise form in relational databases.  This data is used as a data warehouse and is mined to aid decision making.  Explain what is meant by:
·         Data normalisation
·         Relational database
·         Data warehouse
·         Data mining.
[6]
16
A relational database approach has many advantages, including increased security.  Describe the positive security implications of a relational database over other types of database.
[2]
17
Give one advantage of using a data warehouse and one detailed advantage of data mining to an organisation.
[3]
18
Distributed databases are used by some hotel chains.  Describe two benefits to a hotel chain of using a distributed database and describe two security issues associated with distributed databases for the hotel chain.  Suggest a different method the hotel chain could use for overcoming each of these issues.
[6]