MBA II SEMESTER III SYSTEM ANALYSIS AND DESIGN (IS 342) End Term Repeater Examination Date: 2/5/14 Marks: 40 Duration: 2.5 Hrs Time: 1.30 to 4.00 Instructions: 1. This paper has FIVE questions. 2. Your answer should be precise and to the point. 3. Give examples and make diagrams wherever necessary. ________________________________________________________________________________________
Question 1. Answer the following: [08]
A. What is JAD? How is it better than traditional information-gathering techniques? What are its weaknesses? B. What are CASE tools and how are they utilized in SDLC? OR B. Describe the role of the systems analyst in information systems development.
Question 2. Answer the following: [08]
A. Explain when to use Agile Methodologies and when to use engineering-based approaches to systems development. B. List and explain the different phases of SDLC. OR A. Compare collecting information through observation and through document analysis. Describe a hypothetical situation in which each of these methods would be an effective way to collect information system requirements. B. List and describe common website design errors.
Question 3. Answer the following: [08]
A. Describe the methods used for enhancement of validity of input data. B. Describe types of data error. OR A. Describe several project evaluation criteria. B. Explain the various activities performed by a project manager during project closedown. Question 4. Answer the following: [08] A. Describe three commonly used methods for performing economic cost-benefit analysis. B. Column, row and text formatting issues are important when designing tables and lists. Justify. OR A. What is an RFP, and how do analysts use one to gather information about hardware and system software? B. How are relationships between entities represented in RDBMS.
Question 5. Answer the following: [08]
Suppose you are a systems analyst charged with gathering information requirements. You decide that you want to use prototyping to gather these requirements. It provides benefits beyond interviews and observations but also presents unique challenges. What are the challenges you would expect to face and what processes you will put in place to prevent them from harming your information system.