ISTN Tuts.pdf
Document Details
Uploaded by TolerableOrchid6896
Tags
Full Transcript
ISTN102/103 HTML5 Tutorial 1 1. Which HTML element should be used to create a bulleted list? [A] [B] [C] [D] [E] 2. All of the following HTML tags are paired except: [A] [B] [C] [D] [E] 3. Whi...
ISTN102/103 HTML5 Tutorial 1 1. Which HTML element should be used to create a bulleted list? [A] [B] [C] [D] [E] 2. All of the following HTML tags are paired except: [A] [B] [C] [D] [E] 3. Which HTML element contains the actual content of a web page? [A] [B] [C] [D] [E] 4. You have added the correct code to insert an image onto your web page. However when you view it from the browser, a red cross in a small square appears. What can be the reason for this? [A] The image filename is incorrect [B] The path to the image file is incorrect [C] The image file is missing [D] [B] or [C] [E] Any of the above ISTN102/103 HTML5 Tutorial 1 1 5. The following diagram represents the folder and file structure of a website: index.html sitemap.html chapter1 page1.html page2.html Which HTML element is correct to create a link from index.htm to page2.htm? [A] [B] [C] [D] [E] 6. When a link is needed to a different web page on a different server, a(n) ________ URL should be used. [A] absolute [B] hypertext [C] relative [D] FTP [E] None of the above ISTN102/103 HTML5 Tutorial 1 2 7. Which is the correct code to give the following browser display? [A] [B] [C] [D] [E] None of the above ISTN102/103 HTML5 Tutorial 1 3 8.1 Fill in the missing items in the HTML code below so that the web page is displayed as shown below. Sue's IT Co. - KZN's Leading IT Co. ____3____ ISTN102/103 HTML5 Tutorial 1 4 Sue's IT Co. ____4____"index.html" title="Sue's IT Co." class="active"> Home ____5____ About New Hardware New Software ISTN102/103 HTML5 Tutorial 1 5 ____6____ ____7____©2016 Sue's IT Co.All Rights Reserved____8____ ____9____ 8.2 Content, in the form of text, that appears on different lines, in the HTML source file do not appear the same when the webpage is viewed in the browser. Why is this? 8.5 How can text be displayed on separate lines? 9. Explain the purpose of the following attributes: id class title lang ping ISTN102/103 HTML5 Tutorial 1 6 ISTN102/103 HTML Tutorial 2 1. Which of the following methods is used to send data within a URL? [A] GET [B] SEND [C] RECEIVE [D] POST [E] SUBMIT 2. The "checked" attribute is used in a ________. [A] radio button [B] submit button [C] textbox [D] password box [E] textarea 3. Which of the following attributes allows a user to select more than one option in menu? [A] multiples [B] multi [C] multiple [D] multivalued [E] multivalue 4. Which of the following values is used for the type attribute of the input element to display a color picker? [A] FavColor [B] ColorPicker [C] ColorPick [D] Color [E] ColorType 5. Which of the following is used to change the increment value of a number component? ISTN102/103 HTML Tutorial 2 1 [A] max [B] min [C] step [D] next [E] increase 6. Explain the purpose of the following elements. 7. Fill in the missing items in the HTML code below so that the web page is displayed as shown below. ISTN102/103 HTML Tutorial 2 2 Check for a Booking Kindly complete the form below to request for a booking. ____1____ Name: Phone: ____3____ Email: ____5____ Hotel Booking Info Hotel: 123 East Street, Umhlanga 456 Walkway, Umhlanga 789 North Grove, Umhlanga Time: No of Guests: Tick if you would like to receive additional info from the Hotel Co. ISTN102/103 HTML Tutorial 2 3 Additional Requests: Check for a Booking ____10____ Content adapted from HTML5 Foundations by Matt West ISTN102/103 HTML Tutorial 2 4 Development & Applications Fundamentals (ISTN103) SYSTEMS ANALYSIS & DESIGN TUTORIAL 1, 2024 Having read Stair, Reynolds & Chesney (2021/2018), Chapters 11 & 12, answer the following questions: 1. (a) What is the role of the systems analyst in a systems development project? (b) With whom does the systems analyst have to interact during a systems development project? Solution (a) A systems analyst is a professional who specializes in analyzing and designing business systems. (b) Systems analysts play various roles while interacting with the users, stakeholders, management, vendors and suppliers, external companies, software programmers and other IS support personnel, also technical specialists like database administrators and network specialists. See Stair et al. (2021) Ch 11, pp. 368-70 2. List (in order) the stages of the traditional systems development lifecycle. Solution Systems investigation Systems analysis Systems design Systems implementation Systems maintenance & review See Stair et al. (2021) Ch 11, pg 375 3. A key step of the systems investigation phase is feasibility analysis. Briefly describe the various types of feasibility assessments, which take place during this stage. Technical – Assessment of whether the hardware, software and other system components can be acquired or developed to solve the problem Economic – The determination of whether the project makes financial sense and whether predicted benefits offset the cost and time needed to obtain them Legal – The determination of whether laws or regulations may prevent or limit a systems development project ISTN103 SAD Tutorial 1 1 Operational – The measure of whether the project can be put into action, in terms of will-power, motivation, acceptance of the change that the project will bring, is the logistics in place for the system to work, etc. Schedule – The determination of whether the project can be completed in a reasonable amount of time. See Stair et al. (2021) Ch 11, pg 389 4. (a) What is the main emphasis of the analysis phase? (b) What is the primary outcome of the analysis phase? Solution (a) The main emphasis of the analysis phase is determining WHAT the information system must do to solve the (business) problem. (b) The primary outcome of the analysis phase is a prioritised list of system requirements. See Stair et al. (2021) Ch 11, pg 391 5. (a) What is the purpose of systems design? (b) What is the primary outcome of the design phase? Solution (a) Systems design determines HOW the information system will solve the problem. (b) The primary result of the systems design phase is a technical design that details system inputs and the processing required to produce outputs, user interfaces, hardware, software, databases, telecommunications, personnel, procedures, control specifications, and shows how these components are related. See Stair et al. (2018) Ch 12, pg 410, 420 6. Briefly describe six (6) system controls, which help to protect a system. ▪ Input controls: Maintain input integrity and security. Their purpose is to reduce errors while protecting the computer system against improper or fraudulent input. Input controls range from using standardized input forms to eliminating data-entry errors and using tight password and identification controls. ▪ Processing controls: Deal with all aspects of processing and storage. The use of passwords and identification numbers, backup copies of data and storage rooms that have tight security systems are examples of processing and storage controls. ▪ Output controls: Ensure that output is handled correctly. In many cases, output generated from the computer system is recorded in a file that indicates the reports and documents that were generated, the time they were generated and their final destinations. ISTN103 SAD Tutorial 1 2 ▪ Database controls: Deal with ensuring an efficient and effective database system. These controls include the use of identification numbers and passwords, without which a user is denied access to certain data and information. Many of these controls are provided by database management systems. ▪ Telecommunications controls: Provide accurate and reliable data and information transfer among systems. Telecommunications controls include firewalls and encryption to ensure correct communication while eliminating the potential for fraud and crime. ▪ Personnel controls: Make sure that only authorized personnel have access to certain systems to help prevent computer-related mistakes and crime. Personnel controls can involve the use of identification numbers and passwords that allow only certain people access to particular data and information. See Stair et al. (2018) Ch 12, pg 415 7. What factors influence a decision to buy software rather than to make it? Solution Factors affecting the make-or-buy decision: Cost of development (or purchase) Needs of the users Quality of the software Speed of acquisition/development Competitive advantage See Stair et al. (2018) Ch 12, pg 423 8. What is the correct sequence of systems implementation activities? Solution i) Hardware acquisition ii) Software acquisition iii) User preparation iv) Personnel: hiring and training v) Site preparation vi) Data preparation vii) Installation viii) Testing ix) Start-up x) User acceptance See Stair et al. (2018) Ch 12, Figure 12.6, pg 422 ISTN103 SAD Tutorial 1 3 9. (a) What are typical activities involved in the systems maintenance phase? (b) What are reasons for maintenance? Solution (a) Systems maintenance involves checking, changing and enhancing the systems maintenance and system to make it more useful in achieving user and organizational goals. (b) Reasons for maintenance: Changes in business processes Changes in needs to stakeholders, users and managers Bugs or errors in the program Technical and hardware problems Corporate mergers or acquisitions Changing Government regulations Change in operating system or hardware on which the application runs Unexpected events See Stair et al. (2018) Ch 12, pg 431-432 MULTIPLE CHOICE QUESTIONS 1. A systems analyst’s role in a systems development project is to ________. [A] develop software which has the required features [B] advise on what he/she needs to system to do [C] provide a budget and resources for the project [D] develop designs for a new or existing system [E] make sure that all work is completed on time Comment: [A] = programmer; [B] = user; [C] = project sponsor; [E] = project manager 2. Systems are developed to ________. i) show off the programmer’s skills ii) gain a competitive advantage iii) meet a business need [A] i) [B] ii) [C] i) and ii) [D] i) and iii) [E] ii) and iii) ISTN103 SAD Tutorial 1 4 3. Mr Mthalane is a project manager who wants to develop a system with rigorous reviews after each development phase. Which systems development lifecycle variation will provide him this benefit? [A] Traditional systems development lifecycle [B] Prototyping [C] Evolutionary lifecycle [D] End-user systems development lifecycle [E] Rapid Application Development 4. When following the prototyping approach to systems development, ________. i) the prototype of the system always becomes the final system ii) developers and analysts get feedback from users about the system by showing them the prototype iii) prototypes are quick to develop iv) prototypes can be developed in iterations [A] i) and ii) [B] i) and iii) [C] i), iii) and iv) [D] ii), iii) and iv) [E] ii) and iii) 5. In which phase of the SDLC are potential problems and opportunities are identified and considered in light of the goals of the business? [A] systems design [B] systems investigation [C] systems analysis [D] systems maintenance [E] systems implementation ISTN103 SAD Tutorial 1 5 6. For the 2024 Amashova Classic Bicycle Race, the company Bhengu, Malik, Munsamy and Jones have been asked by the organisers to develop a system which will control all Bicycle Race-related hotel reservations in Pietermaritzburg and Durban. The system is estimated to take eighteen months to develop, but the race will take place in October 2024. What type of system feasibility is being challenged? [A] Technical [B] Economic [C] Legal [D] Operational [E] Schedule 7. When many data sources are spread over a wide geographic area, which would be the best approach to data collection? [A] Structured interviews [B] Unstructured interviews [C] Direct observation [D] Questionnaires [E] JAD sessions 8. The aim of systems analysis is to ________. i) gather information/data about the current system ii) determine the requirements for the new system iii) determine how the new system will work iv) produce a prioritised list of systems requirements [A] i) and iv) [B] ii) and iii) [C] i) and ii) [D] i), ii) and iii) [E] i), ii) and iv) ISTN103 SAD Tutorial 1 6 9. The system’s server room has been flooded during the recent rains. Fortunately, when the system was designed, a disaster recovery plan was put in place. This plan made provision for ________. i) the server room to be waterproofed ii) pivotal organisational processes to be supported by the system irrespective of circumstance iii) backups of system data to be made iv) a specialised vendor to host the system while the server room is repaired [A] i) and ii) [B] ii) and iii) [C] iii) and iv) [D] i), ii) and iii) [E] ii), iii) and iv) 10. A new version of MS Word has become available. Your boss has sent an email to all staff saying that as from Monday 4 November 2024, everyone HAS to use the new version, as the old version will no longer be available. This type of system start-up is called ________. [A] direct conversion [B] phase-in approach [C] pilot start-up [D] parallel start-up [E] piecemeal approach 11. The laws of South Africa have changed. From 1 July 2003, customers of Financial Service Providers have to produce proof of their permanent address – otherwise any financial transactions will be halted. With the coming of this law (the FICA Act), banks and financial institutions had to review their systems to assess whether they are able to capture the information required by the Act. In the SDLC, this kind of activity is called a(n) ________ review. [A] legal [B] time-based [C] financial [D] event-driven [E] institutional ISTN103 SAD Tutorial 1 7 Development & Applications Fundamentals (ISTN103) SYSTEMS ANALYSIS & DESIGN TUTORIAL 2, 2024 – Solutions MULTIPLE CHOICE QUESTIONS 1. In STUDENT shown below, Marital_status is an example of a(n) ________. [A] attribute [B] entity [C] primary key [D] relationship [E] instance of an entity Q Solution Learning Chapter / Page R or C Examiner Objective Notes or A 1 A 7.6 C CSP 2. In CUSTOMER shown below, identify the primary key. [A] Name [B] Address [C] Work_phone_number [D] Cell_phone_number [E] A suitable key is not present; will have to add our own key Q Solution Learning Chapter / Page R or C Examiner Objective Notes or A 2 E 7.8 A CSP 1 3. In STUDENT shown below, identify the primary key. [A] Name [B] Surname [C] Student_number [D] Contact_phone_number [E] A suitable key is not present; will have to add our own key Q Solution Learning Chapter / Page R or C Examiner Objective Notes or A 3 C 7.8 A CSP 4. Identify the primary key of CUSTOMER_ACCOUNT, which records information about the monthly amount a customer owes at a clothing store. CUSTOMER_ACCOUNT Account_no Account_open_date Amount_owing Total_loyalty_points [A] Account_no [B] Account_open_date [C] Amount_owing [D] Total_loyalty_points [E] A suitable key is not present; we will have to add our own key Q Solution Chapter / Notes Page R or C Learning Examiner or A Objective 4 A SAD Models overview 2-3 C LO 7.8 CSP This question is based on one in the 2010 ISTN103 Supp exam 2 Questions 5 to 7 relate to the following diagram and narrative: Some students use many SIM cards for their cellphones. Some students do not use cellphones or SIM cards. Students do not use each other’s SIM cards. 5. The most appropriate symbol to replace circle 1 is ________. [A] [B] [C] [D] [E] Q Solution Chapter / Notes Page R/ C/ A Learning Examiner Objective 5 E Lecture 8 3 A LO 8.3 CSP SAD Models overview This question appears in ISTN102/3 supp, 2010 6. The most appropriate symbol to replace circle 2 is ________. [A] [B] [C] [D] [E] Q Solution Chapter / Notes Page R/ C/ A Learning Examiner Objective 6 A Lecture 8 3 A LO 8.3 CSP SAD Models overview This question appears in ISTN102/3 supp, 2010 3 7. If students started using each other’s SIM cards, how would circle 2 change? [A] [B] [C] [D] [E] Q Solution Chapter / Notes Page R/ C/ A Learning Examiner Objective 7 B Lecture 8 3 A LO 8.3 CSP SAD Models overview This question appears in ISTN102/3 supp, 2010 Questions 8 and 9 refer to the following diagram. PLAYER makes up / TEAM is made up of is supported by / is managed by / supports manages FAN MANAGER 8. It is optional for ________. [A] the manager to manage a team [B] the team to be made up of players [C] players to make up a team [D] a player to be supported by a fan [E] a fan to support a player Q Solution Learning Chapter / Page R or C Examiner Objective Notes or A 8 D 9.1, 8.5 SAD lecture 8 A CSP 4 9. It is mandatory for ________. [A] a fan to support a player [B] a player to be supported by a fan [C] a team to be managed by a manager [D] players to make up a team [E] [A] and [D] Q Solution Learning Chapter / Page R or C Examiner Objective Notes or A 9 E 9.1, 8.5 SAD lecture 8 A CSP 10. The diagram below shows that ________. i) a module can be lectured by more than one lecturer ii) a lecturer can lecture no more than one module iii) a student must take a minimum of one module iv) all modules are taken by at least one student MODULE is lectured by / LECTURER lectures is taken by / takes STUDENT [A] i) and ii) [B] ii) and iii) [C] iii) and iv) [D] i) and iii) [E] ii) and iv) Q Solution Chapter / Notes Page R/ C/ A Learning Exami Objective ner 10 D Lecture 9 3 C LO 8.5 CSP SAD Models overview 5 This question is based on the question which appeared in ISTN102/3 supp, 2010 11. At UKZN, the modules ISTN100 (End User Computing), ISTN101 (IS&T for Business), and ISTN103 (Development and Applications Fundamentals) are all examples of ________. [A] primary keys [B] entities [C] instances of an attribute [D] instances of an entity [E] attributes Q Solution Chapter / Notes Page R/ C/ A Learning Examiner Objective 11 D SAD Models overview 2 A LO 8.1 CSP A version of this question appeared in 2010 ISTN102 & ISTN103 supp 6 NARRATIVE (CONSTRUCTED RESPONSE) QUESTIONS 12. At our university, students register for degrees. A student may register for one or more degrees over time. However, the university offers the degree, even if no students register for it. The university keeps records of the degree’s name, the degree’s abbreviation, the total number of credits required, and the minimum and maximum completion time. The university also keeps records of each student’s number, name, surname, address and cell phone number. Draw an Entity-Relationship diagram of this situation, showing the entities, attributes, relationship(s), cardinalities and primary keys. Denote your primary key with a double asterisk **. Proposed solution: STUDENT DEGREE Student_no** Degree_abbreviation** Name registers for / Degree_name Surname is registered for by Total_credits_required Address Min_completion_time Cell_phone_no Max_completion_time NB Entities are represented by rectangles, with the Entity name in CAPS and in the singular. Attributes start with a capital letter. Note: you do NOT need an entity for the University, since there is only one of them. Q Solution Learning Chapter / Page R or C Examiner Objective Notes or A 12 7.3, 7.5, 7.7, A JJ 7.8, 8.2, 8.3, 9.2, 9.3 7 13. At our university, a lecturer may be assigned a laptop but some lecturers are not assigned a laptop (e.g. if they already have a desktop computer). A laptop is assigned to one and only one lecturer. When a lecturer is assigned a laptop, his/her name, surname, staff number, building name and office number is recorded. The laptop brand, serial number and date allocated is also stored. Draw an Entity-Relationship diagram of this situation, showing the entities, attributes, relationship(s), cardinalities and primary keys. Denote your primary key with a double asterisk **. Proposed solution: LECTURER LAPTOP Name Surname is assigned / Brand Staff_no** is assigned to Serial_no** Building_name Date_allocated Office_no NB Entities are represented by rectangles, with the Entity name in CAPS and in the singular. Attributes start with a capital letter. Q Solution Learning Source of Bloom’s Examiner Objective Content: Taxonomy: Chapter/Notes (R or C or & Page A) Narrative 7.3, 7.5, 7.7, This question A Joseph 13 7.8, 8.2, 8.3, appeared in 9.2, 9.3 ISTN102 Supp Exam 8 14. At a university, a School offers many courses. A School will offer at least one course. A specific course is offered by only one School. Each School has a name, a Head of School and a Deputy Head of School. A course has a name, a code, a course level (1st year, 2nd year, 3rd year, …), and a number of credit points. Each course is offered on one or more campus. A campus offers many courses. The university system records the campus name and the town it is in. Draw an Entity-Relationship diagram of this situation, showing the entities, attributes, relationship(s), cardinalities and primary keys. Denote your primary key with a double asterisk **. Proposed solution: SCHOOL COURSE CAMPUS Name offers / Course_name is offered on / Campus_name Head_of_school is offered by Course_code** offers Town Deputy_head_of_school Course_level Campus_ID** School_ID** Credit_points NB Entities are represented by rectangles, with the Entity name in CAPS and in the singular. Attributes start with a capital letter. Note: you do NOT need an entity for the University, since there is only one of them. SCHOOL’s attribute Name and CAMPUS’ attribute Campus_name could uniquely identify the SCHOOL and the CAMPUS uniquely; however, it is generally better to have a numeric primary key. Q Solution Learning Source of Bloom’s Examiner Objective Content: Taxonomy: Chapter/Notes (R or C or & Page A) Narrative 7.3, 7.5, 7.7, This question A Joseph, 14 7.8, 8.2, 8.3, was based on a Sue 9.2, 9.3 narrative question in ISTN102 2011 exam 9 Development & Applications Fundamentals (ISTN103) SYSTEMS ANALYSIS & DESIGN TUTORIAL 3, 2024 – Solutions MULTIPLE CHOICE QUESTIONS Questions 1 to 5 relate to the following narrative and diagram: The Siyanqoba Driving School has a system to help them to manage their driving lesson appointments. When a new learner wants to learn to drive, s/he first gives the administrator his/her name and contact details. S/He also makes a payment for the lessons. The administrator gives the learner a receipt, and tells the learner which dates and times the learner could take his/her lesson. The learner then selects the appointment date and time that suits him/her. Since the Driver Instructors have other duties, they give the administrator the dates and times they are available to give driving lessons. Every day, they ask the administrator to give them a list of their appointments for that day. The administrator uses the system to generate a list of appointments for the instructor. Name & contact details Available Payment dates & times 2 4 1 3 Daily appointment List of available request appointments 5 Choice of appointment date & time 1. The best label to replace circle 1 is ________. [A] Siyanqoba Driving School System [B] 0. Appointment Management System [C] 0. Siyanqoba Driving School Appointment Management System [D] 0. Siyanqoba Driving School System [E] Driving School Management System 1 2. The best label to replace circle 2 is ________. [A] Learner [B] Learners [C] Administrators [D] Administrator [E] Driver Instructors 3. The best label to replace circle 3 is ________. [A] Learner [B] Learners [C] Administrator [D] Driver Instructor [E] Driver Instructors 4. The best label to replace circle 4 is ________. [A] Give receipt [B] Give change [C] Change [D] Appointment confirmation [E] Receipt 5. The best label to replace circle 5 is ________. [A] Give receipt [B] List of appointments [C] Generate list of appointments [D] Generate receipt [E] Receipt 2 Questions 6 and 7 relate to the following context-level data flow diagram: 6. In this diagram, how many different information sources are there? [A] One [B] Two [C] Three [D] Four [E] Five 7. In this diagram, how many different information sinks are there? [A] One [B] Two [C] Three [D] Four [E] Five 3 8. The context level DFD below shows a Soft drinks kiosk sales system, where customers choose what type of soft drink they would like to buy and the quantity of each drink. The server in the kiosk tells the customer the amount due. The customer makes a payment and the system issues a receipt. No. of soft drinks & soft drink type 0. Customer Amount due Payment Soft drink kiosk sales system Receipt You realise that the system is incomplete, as you need to ensure that the kiosk always has enough of each type of soft drink available to be purchased. When stocks are running low, the server sends an order to the supplier. When the stock arrives, it is accompanied by a delivery note which specifies the number and type of soft drinks which have been delivered. The best way of representing this added system functionality is ________. [A] 0. Soft drink Order more kiosk soft drinks Suppliers sales Delivery note system [B] 0. Soft drink Soft drink order kiosk Server sales Delivery note system [C] 0. Soft drink Soft drink order kiosk Supplier sales Update available system soft drinks [D] 0. Soft drink Soft drink order kiosk Suppliers sales Delivered softdrinks system 4 [E] 0. Soft drink Soft drink order kiosk Supplier sales Delivery note system Note: System functionality – what the system must do. A is incorrect, as Order more soft drinks is labelled as a command. Also, the data flows to Suppliers (should be Supplier). B is incorrect – Server is not an external entity C has an incorrectly labelled data flow. “Update available soft drinks” sounds like a command, whereas some data should be flowing. it is labelled as a command D is incorrect, as the external entity “Supplier” is labelled in the plural. It also has a physical flow (Delivered softdrinks) – should be information about the physical flow The completed context level DFD is as follows: No. of soft drinks & soft drink type 0. Soft drink order Customer Amount due Supplier Delivery note Payment Soft drink kiosk sales system Receipt 5 Questions 9 to 11 relate to the following narrative and diagram: Luigi’s ice cream parlour has a sales system. When customers buy ice cream, they give the server the choice of ice cream that they want to purchase. The server tells them the amount due. They give the server their payment, and the server gives them the ice creams they bought. Once a week, the manager asks her secretary to request sales reports from the system. The system generates the report for the secretary and the secretary gives the report to the manager. The context-level data flow diagram below, which depicts this narrative, has some errors. Sales Ice cream 5 report 6 1 2 0. 8 choice request Customers Amount due 3 Secretary Luigi’s Generate 4 Give payment Ice cream 7 sales system report 9 Ice creams 9. There are errors in the following diagram components: ________. [A] 1 and 2 [B] 3 and 4 [C] 1 and 4 [D] 2 and 3 [E] There are no errors with components 1, 2, 3 or 4 Note: 1. Customers – should be Customer 4. Give payment – should be Payment 10. There are errors in the following diagram components: ________. [A] 5 and 6 [B] 7 and 8 [C] 5, 6 and 7 [D] 6, 7 and 8 [E] 5, 7 and 8 Note: 5. System’s name – should be 0. Luigi’s ice cream sales system 7. Generate sales report – should be Sales report 8. Secretary – should be Manager 6 11. The error in component 9 is that ________. [A] it should come directly from the server [B] it shows a physical flow [C] it is written in the plural [D] it does not match the narrative [E] There is nothing wrong with component 9 7 NARRATIVE (CONSTRUCTED RESPONSE) QUESTIONS 12. Our local sports club has just acquired a new sports tournament scheduling system. To participate in a sports tournament, different teams submit their details to the system. The system gives the tournament organiser a list of participating teams. She then inputs the possible venues where the tournament could take place. She also inputs the tournament duration. The system allocates the different teams to venues and each team is sent a team match timetable. The organiser is sent the tournament timetable. Draw a correctly-labelled context-level data flow diagram of this system. Proposed solution: It is important that the diagram is labelled correctly: external entities are in squares or rectangles, and they are labelled in the singular. The system must be in a rectangle or square with rounded corners. It must be numbered with a 0. to show that it is the least detailed version of all the types of Data Flow Diagrams. It must also be labelled with a description of what type of business it represents, and what the system does. Data flow arrows must be labelled as nouns or noun phrases (not verbs, or commands). External entities may not “talk to each other” apart from via the system – i.e. an external entity may not send a data flow to another external entity. External entities represent the source (or sink) of information – thus people like receptionists, clerks, admin staff, cashiers, bank tellers, etc. are not external entities – they don’t decide what data should be inputted into the system, nor are they the eventual recipients of the system’s output(s). 8 13. When purchasing petrol at a filling station, the motorist tells the petrol attendant the amount of the petrol s/he wants to buy. The attendant types this amount into the pump, and then starts dispensing petrol into the motorist’s car. After dispensing the petrol, the pump shows the litres and amount due. The motorist pays the attendant, and receives a receipt. Each day, the filling station manager receives a sales report which the system generates. Every month, the manager updates the petrol price in the pump. The context-level data flow diagram below depicts this scenario. Amount to purchase Petrol attendant Receipt Pay for petrol Generating 0. daily sales report Petrol Motorists Manager Petrol Amount due System Update petrol price (a) Are there any errors in this context-level data flow diagram? If so, state what they are in tabular form. DFD Component Component label Error with this How to fix this type component error (External entity / system / data flow arrow) 1 2 3 … (b) Draw the corrected diagram. Proposed solution: 13 (a) DFD Component Component label Error with this How to fix this type component error (External entity / system / data flow arrow) 1 External entity Petrol attendant Part of system Remove 2 External entity Motorists Should be in Label as “Motorist” singular 3 Data flow arrow Pay for petrol Labelled as a Label as “Payment” command 4 Data flow arrow Pay for petrol “Communication” This arrow flows from one External should go via the into the system entity to another system 9 External entity 5 Data flow arrow Petrol Labelled as a Label as “Litres of physical flow petrol” 6 Data flow arrow Generating daily Labelled as an Label as “Daily sales report activity sales report” 7 Data flow arrow Update petrol price Labelled as a Label as “Updated command petrol price” 8 System 0. Petrol system Needs description Label as “0. Petrol of what it does sales system” 9 Data flow arrow Amount to purchase Should flow from Should flow from Motorist, not from Motorist, not from Petrol attendant Petrol attendant 10 Data flow arrow Receipt Should flow to Should flow to Motorist, not to Motorist, not to Petrol attendant Petrol attendant 13(b) 14. A supermarket chain has decided to start a customer loyalty programme so that it knows what particular customers buy. A customer applies for the loyalty programme and in return is given a loyalty card with a unique number. When a loyal customer purchases items, the items’ barcode is scanned at the till. The price of each item is displayed on the till screen. The cashier tells the customer the amount due. The customer makes a payment and gives the cashier his/her loyalty card (whose card number is read by the system). The customer receives a receipt. From time to time, the customer receives SMSes reminding them of supermarket specials. Each week, the supermarket manager gets a report listing the items that the loyal customers bought. From time to time, she sends the system pricelist updates when there are specials. Draw a correctly-labelled context-level data flow diagram of this Loyal Supermarket Customer Sales System. 10 Proposed solution: 15. The local library has a book lending system to keep track of which books are borrowed and returned. When a library patron wants to borrow books, s/he gives the librarian the pile of books s/he wants to borrow and the system reads each book’s barcode. The system responds by displaying each book’s due date to the patron. When the patron returns the books, the librarian scans the returned books’ barcodes and the patron is given a receipt. Based on the above scenario, draw a correctly labelled context-level data flow diagram of this system. Proposed solution: Students must distinguish between the borrowed book (i.e. book about to be borrowed) and the returned book (i.e. book about to be returned). Just writing “Book’s barcode” will not be providing enough information. 11 Development and Application Fundamentals (ISTN103) – Excel 2019 Business Applications - Tutorial 1 Microsoft Excel 2019 Exercise 1 - Lookup Functions 1. Explain the following formulas with regard to the spreadsheet below. That is, describe what the function looks up and what value it returns. =HLOOKUP("Axles";A1:C4;2;TRUE) =HLOOKUP("Bearings";A1:C4;3;FALSE) =HLOOKUP("B";A1:C4;3;TRUE) =HLOOKUP("Bolts";A1:C4;4;TRUE) 2. What formulas where used in the following description of results with regard to the spreadsheet below? Using an approximate match, searches for the value 1 in column A, finds the largest value less than or equal to 1 in column A which is 0.946, and then returns the value from column B in the same row. (2.17) Using an approximate match, searches for the value 1 in column A, finds the largest value less than or equal to 1 in column A, which is 0.946, and then returns the value from column C in the same row. (100) Using an exact match, searches for the value.7 in column A. Because there is no exact match in column A, an error is returned. (#N/A) Using an approximate match, searches for the value 0.1 in column A. Because 0.1 is less than the smallest value in column A, an error is returned. (#N/A) Using an approximate match, searches for the value 2 in column A, finds the largest value less than or equal to 2 in column A, which is 1.29, and then returns the value from column B in the same row. (1.71) Exercise 2 - Pivot Tables and Pivot Charts 1. With regard to the Pivot Table Field List, which fields will be used as the, Report Filter, Column Labels, Row Labels and Values to accomplish the following: 1.1. count the total number of employees in every department 1.2. count the total number of employees with and without a car 1.3. the average salary of employees with a car, and of employees without a car 1.4. the average salary of employees with a car and without a car, inside every department 1.5. the highest number of monthly working hours for every department Note: Not all fields need to be used. For example, only two fields may be used to create a pivot table. Page 1 Development and Application Fundamentals (ISTN103) – Excel 2019 Business Applications - Tutorial 1 2. Using the same fields that were used in question one, which fields is used as the Report Filter, Legend Fields, Axis Fields and Values to create the pivot chart below? 25000 20000 15000 10000 No 5000 Yes 0 3. What will happen if you delete the associate pivot table for the pivot chart above? 4. What will happen to the associate pivot table when you delete the pivot chart above? Exercise 3 - Macros 1. What is a macro and what is its function? 2. Why is macro security important? 3. Why is it imperative that you ensure the workbook comes from a trusted source? Exercise 4 - Validation 1. Why is data validation important? 2. List three errors that could result in incorrect calculations. 3. When would you use the Trace Precedence function? 4. When would you use the Trace Dependents function? Exercise 5 - Working with Templates 1. Why is it necessary to use templates? 2. What is the file extension of a template created in Excel? 3. List 3 guidelines for creating templates. Exercise 6 - Importing Data into Excel 1. List two ways of importing a text file into Excel? 2. List four delimiters. Exercise 7 - Using Scenario Manager 1. What is a scenario and what is its function? Page 2 Development and Application Fundamentals ISTN103 Business Applications – Tutorial 1 Solutions Microsoft Excel 2019 Exercise 1 – Lookup Functions 1. Explain the following formulas with regard to the spreadsheet below. That is, describe what the function looks up and what value it returns. Looks up Axles in row 1, and returns the value from row 2 that's in the same column. (4) Looks up Bearings in row 1, and returns the value from row 3 that's in the same column. (7) Looks up B in row 1, and returns the value from row 3 that's in the same column. Because B is not an exact match, the next largest value that is less than B is used: Axles. (5) Looks up Bolts in row 1, and returns the value from row 4 that's in the same column. (11) 2. What formulas where used in the following description of results with regard to the spreadsheet below? =VLOOKUP(1;A2:C10;2;TRUE) =VLOOKUP(1;A2:C10;3;TRUE) =VLOOKUP(0.7;A2:C10;3;FALSE) =VLOOKUP(0.1;A2:C10;2;TRUE) =VLOOKUP(2;A2:C10;2;TRUE) Exercise 2 – Pivot Tables and Pivot Charts 1. Report Filter Column Labels Row Labels Values 1.1 Department Count of Employee 1.2 Car Ownership Count of Employee 1.3 Car Ownership Average of Salary 1.4 Department Car Ownership Average of Salary 1.5 Department Max of Monthly hours 2. Report Filter Legend Fields Axis Fields Values Department Car Ownership Employee Sum of Salary 3. Deleting the associated Pivot Table report of a Pivot Chart report creates a static chart that you can no longer change. 4. Deleting the Pivot Chart report will not automatically delete the associated Pivot Table report. Exercise 3 – Macros 1. A Macro is an action or a set of actions that are stored and can be run every time you need to perform a repetitive task. Macros assist in speeding up editing or formatting you may perform. It is generally used to automate repetitive tasks. 2. Viruses can be attached as Macros to documents created in Excel. 3. Once users open these infected workbooks, Excel runs the attached virus-infected macro automatically. Page 1 Development and Application Fundamentals ISTN103 Business Applications – Tutorial 1 Solutions Exercise 4 – Validation 1. To prevent misleading and incorrect results in your spreadsheet. 2. The three errors are: Your formula is not correct, i.e. it is getting the data from an incorrect cell. The formula is not using all the data required for the calculation to accurately calculate the result. The formula is incorrectly calculating the result. 3. Trace Precedents is used to find out where a formula gets its data from. 4. Trace Dependents is used to find which formulas a cell might affect. Exercise 5 – Working with Templates 1. Templates provide consistency of layout structure and saves time and repetition of work. 2..xltx 3. Clear out unwanted data Assume formulas will remain the same Use lists and outlining Turn off worksheet gridlines Add the finishing touches Any three Delete unused worksheets Assign relevant names to worksheets Add custom macros to make more professional spreadsheets Save your custom templates Exercise 6 – Importing Data into Excel 1. Import from a delimited text file by opening the text file Import a text file by connecting to it 2. Tab, Semicolon, Comma and Space Exercise 7 – Using Scenario Manager 1. A scenario is a set of values that Excel saves and can substitute automatically on your worksheet. You can use scenarios to predict the outcome of a worksheet model. Page 2 Development and Application Fundamentals (ISTN103) – PowerPoint 2019 Business Applications - Tutorial 2 Microsoft PowerPoint 2019 Exercise 1 1. List four things you need to do, in order to deliver an effective presentation. 2. What title is the default presentation given? 3. What are the six types of illustrations you can insert into your presentation? 4. What is the file extension of a PowerPoint presentation? 5. List the nine slide content layouts. 6. List and describe the four master slides? 7. List and describe the 3 print options. 8. In the Print What drop-down you have the choice of printing in Colour, Grayscale or Pure Black and White. Describe what the printout will look like if you select each of these, independently. 9. When printing handouts, which Handouts format provides lines for the audience to take notes? 10. List the following presentation views and discuss when it is typically used: Normal Slide Sorter Notes Page Slide Show 11. What should you do in order to create the perfect circle or square or constraint the dimensions of other shapes? 12. What is effect type and effect timing, with regard to transitions? Development and Application Fundamentals (ISTN103) Business Applications – Tutorial 2 Solutions Microsoft PowerPoint 2019 Exercise 1 1. To deliver an effective presentation, you need to do the following: Make your slides legible Enhance the presentation with graphics and possibly sound without distracting the audience from the content Do not over-utilise the sound, animation and colour Use text moderately 2. Presentation1 3. Illustrations: Picture ClipArt Photo Album Shapes SmartArt Charts 4. Pptx 5. Slide content layouts: Title Slide Title and Content Section Header Two Content Comparison Title Only Blank Content with Caption Picture with Caption 6. Four slide masters: Slide Master: for all slides in the presentation, excluding the Title Master Title Slide Master: the master for the Title slide only Notes Master: the master for creating the Notes pages Handout Master: the master for creating Handout pages 7. Print - opens the Print dialog box Quick Print - sends the presentation to the default printer set up on your computer Print Preview - opens the Print Preview window allowing you to edit the slides Page 1 Development and Application Fundamentals (ISTN103) Business Applications – Tutorial 2 Solutions 8. Color - is used if you print to a colour printer and want to print in colour. However, if you print to a black-and-white printer, this option prints in grayscale. Grayscale - prints images that contain variations of gray tones between black and white. Background fills are printed as white, so that the text will be more legible. Pure Black and White - prints the handout with no gray fills. 9. The Handouts (3 Slides Per Page) format provides lines for the audience to take notes. 10. Normal view is the most often used view to create presentations. Slide Sorter view displays miniature versions (thumbnails) of all the slides in horizontal rows. Effects such as transitions and sounds can be added to several slides at the same time in Slide Sorter view. Notes Page view shows a smaller version of the slide with an area below for printed notes. Each slide is created on its own notes page and is not displayed on screen in Slide Show view. Slide Show view is the view used for presenting to an audience. The whole screen is taken over by your PowerPoint presentation. Slide Show view can also be accessed by pressing the F5 key on the keyboard. To exit Slide Show view, press the Esc key. 11. Press and hold down the Shift key on your keyboard while you drag the mouse when inserting the shape. 12. Effect type: The nature of the special effect with which PowerPoint introduces the slide. Effect timing: The speed with which PowerPoint runs the visual effect when introducing the slide. Page 2