You are on page 1of 9

HIGHER EDUCATION QUALIFICATIONS

BCS Level 4 Certificate in IT


October 2009
EXAMINERS REPORT
Information Systems
Overall comments
There were more blank scripts, than usual. Candidates are advised to access old papers
to give them an idea of the exam content. Once again, examination technique was poor.
Too many candidates answered one Part A question very well and then did not attempt
another question in Section A. Candidates should only spend around 30 minutes per Part
A question. If a question says describe briefly, then it requires a brief answer not
several pages of notes.
A lot of answer booklets had only 3 or 4 Part B questions attempted, and a number had
only 3 or 4 part questions.
It appeared that a number of candidates were ill prepared and had not looked at the
module content as defined by the BCS web site.

Question 1
SECTION A
Answer TWO questions out of FOUR in Answer Book A. Each question carries 30 marks.

A1.

A new database has to be constructed due to the merger of several local


colleges.
One part of the database will be designed to deal with the results of student
assignments. The college offers several three-year degree courses. Each year
contains eight modules, three core modules plus five option modules. There are
ten option modules each year. In year 1 students register for an individual degree
and choose five option modules, however there are some restrictions for example
the student cannot choose both Business Networking and Networking. The
student can choose to study an extra on-line module. All modules whether core or
option have one module leader who is a senior tutor and up to three other tutors.
A tutor may teach more than one module but will only teach one group for a
module. When a student chooses a module he/she is allocated to a tutor group.
There are up to four tutor groups per module. The tutor for each group marks the
students assignment and will store the marks on the database.
a)

Construct an entity relationship model (logical data model) for the above
case study. Identify the primary keys and the relationships between each
entity and show how you resolve many to many relationships. Show any
assumptions you may have made.
(15 marks)

b)

There are several terms used when building an entity relationship model.
Explain what is meant by the following giving appropriate examples from
the above case study:

i)
ii)
iii)

An involuted relationship
An intersection entity
Optionality
(9 marks)

c)

Briefly describe the main functions of a database.


(6 marks)

Comment:
This was the least popular question and answered poorly. Marks were given for identity of
main entities and their keys. An entity can be found within the case study as a person,
place or subject, which needs information to be held. Very few candidates knew the
theories around entity relationship modelling. This would be a good area for revision.
Answer points:
(a) Main entities are: Degree Course (Course no (PK), title), Module (Module no (PK),
name, tutor no (FK), type, year, disqualifying module no (FK)), Student (student no
(PK), name etc, Student Module (Student no+Module no) PK, Tutor (Tutor no, name),
Tutor Group (group no (PK), year, tutor no), Module Assignment Results (student
no+module no (PK), result), On-line module (On-line no (PK), name).
There would be a many to many relationship between student and module. A student
may choose more than one module and several students may choose one module.
This would be resolved by a student module intersection entity.
(b)
(i) An involuted relationship models the fact that a relationship may be between an
entity and itself e.g. the disqualifying relationship between one module and another
(Enterprise Networks and Networks).
(ii) An intersection entity is created to resolve a many to many relationship e.g.
between student and module.
(iii) Optionality in a relationship means that a relationship does not have to exist e.g.
between student and on-line module a student may chose an on-line module but it is
not mandatory.
(c) The main functions of a database are to hold data in one place only, to ensure
consistency, integrity, ease of use, security, control, protection etc
Question 2
A2.

a)

There are several different approaches to analysing and developing an


information system. Briefly describe the main features of each of the
following:
i)
ii)
iii)
iv)

Soft system methodology


Waterfall method
Prototyping
Object oriented development
(16 marks)

b)

Using any system as an example, describe the use of the following:


i)
ii)
iii)

Data flow diagram


Rich picture
Entity life history

(9 marks)
c)

Briefly describe the main features of a CASE tool.

(5 marks)
Comment:
This was the most popular question and was answered well. However too much time was
often spent on part a. There is a difference between 15 marks for a description of the
software development life cycle and 4 marks! Too much detail was supplied. Exam
technique can be just as important as knowledge.
Answer points:
(a) Soft system approach is a personal and ethical approach to problem solving.
Checkland devised it with seven stages to solve unstructured problem situations.
Techniques such as CATWOE (the breakdown of the problem into six areas), rich
pictures, conceptual models, root definitions identifying behaviour, conflict and
interaction between actors and stakeholders. The waterfall method is the typical life
cycle from preliminary study to feasibility, systems analysis, systems design, coding,
testing, implementation, review and maintenance. Prototyping is the user-centred
approach of developing systems according to user requirements. Typical commercial
approach is DSDM and Agile based method. Examples of prototypes are throwaway,
spiral, partial, evolutionary based on degrees of involvement. Object oriented
analysis deals with real world objects and re-usability and involves UML (Unified
Modelling Language) defining classes, use case, collaboration diagrams, and
sequence and activity diagrams. Data structures and methods are combined
together within the OO framework.
(b) A dataflow diagram identifies the external entities within the boundary of the system,
the data stores, and flow of data between the data processes via these stores. The
level of decomposition is a top down approach from a context diagram through a high
level diagram down to lower levels where the detailed processing is depicted. A rich
picture is an unstructured method for depicting the sense of the system, its conflicts
and interactions. An entity life history is used to document the life or stages of an
entity it deals with the time aspect, sequence, selection and iteration which is not
shown in data flow diagramming and data modelling.
(c) CASE (Computer Aided Software Engineering) tools provide data modelling; code
generating tools and life cycle support for several methodologies. There are Upper
and Lower CASE tools, the former providing the conceptual modelling and strategic
planning stage whilst the latter supports the back end development such as physical
design, construction, testing etc. Such tools improve communication and helps
reduce time and costs.
Question 3
A3.

a)

Describe how information flows within an organisation using an example


with which you are familiar. You should indicate the three levels of
management information and typical software associated with each level,
providing the type of information required at each level.
(12 marks)

b)

You have been asked to investigate several different versions of project


management software and recommend which one would help your IT
department control the development of a large project. Identify the
functions that should be provided.
(10 marks)

c)

Using the system development life cycle as an example, draw a


PERT chart and a Gantt chart and describe the typical use of each
method.
(8 marks)

Comment:
Part a) was answered reasonably well. Part b caused problems. Project management
software supports the software development stages; marks were given for the
management of the development rather than the stages of development. Surprisingly not
many candidates knew what a PERT or Gantt chart were. Too many candidates repeated
the software development life cycle stages which was not the point of the question the
charts should have been drawn using the SDLC as data.
Answer points:
(a) Information flows in both directions from top management to lower management. It
can also flow externally. Top (executive) management information is strategic using
DSS and EIS systems and is unstructured. It is used to help run the company from
an executive level. Tactical information is the middle level. It consists of aggregated
information often timely i.e. annually, periodically provided by MIS systems. The
operational level of management is the lowest supervisory level involving information
from TPS systems used to run the daily processes of an organisation.
(b) Project management software must provide the management and organisation of a
project in terms of resources and budgets to bring about a successful project in terms
of aims and objectives. The software should provide documentation of aims and
objectives, resource estimation, budgets etc. It should identify tasks breaking them
down into smaller bite-size tasks, which are allocated to various resources including
staff. It also needs to be able track and report on the progress of the project and
control change.
(c) PERT chart (or network chart) is used to identify the important stages of a project in
terms of time, earliest start date and end date enabling the critical path to be
identified and any slippage to be dealt with quickly. A Gantt chart is a simplistic view
of a project in terms of time and resources. It can be used for showing budgets,
allocation of staff etc.
Question 4
A4.

a)

You are the IT Manager for a large international company. The system
auditor has asked for a report detailing your disaster recovery strategy.
Draft a report detailing what documentation would be required in order to
recover from a fire which has destroyed the offices that contain all the
computers dealing with business systems. Include measures you would
take to ensure that this would not happen.
(10 marks)

b)

Testing is often seen as the final stages of the system development


project. Draft a testing strategy that could be adopted by a team
throughout the development process.
(10 marks)

c)

There are several ways to implement the changeover from an old to a


new system. Describe THREE techniques giving examples, advantages
and disadvantages of each.
(10 marks)

Comment:
Parts b and c were answered well. However many candidates did not read part a carefully
and tended to concentrate on prevention of fire without any mention of documentation.

Answer points:
(a) A disaster recovery plan must ensure that not only the data is recoverable but all the
details of the system; e.g. system backups, the system documentation, the coding,
hardware and network configuration detail, computer identities, manual procedures,
contacts, continuity plans etc. In order to prevent a fire, system backups should be
done regularly and kept off site in rotation, fireproof safes, fire alarms, controlled
access etc are also ways of trying to prevent this kind of disaster. Large companies
also may use disaster recovery specialist companies or have reciprocal arrangements
with other companies.
(b) Testing should occur at all stages throughout the development progress. In the early
stages this is achieved by structured walkthroughs, during the coding test data should
be produced and various techniques such as black and white box testing, stress
testing, system integration testing, acceptance testing, response and performance
testing would be used. At the end of the development the system testing should occur
in parallel with clerical/manual procedure testing. The V model of testing is also
acceptable.

(c) Methods of changeover are direct, parallel, pilot, staged, phased etc. Direct
changeover as it name implies occurs when the new system is very different to the old
e.g. web based and the new system is used immediately once thorough testing has
been carried. It is a risky but time efficient method. The parallel method incurs running
both old and new system in parallel, checking output. It is less risky but time
consuming and causes more work for the users. The pilot, staged and phased
methods are similar in that only small parts of the system are implemented and used
before the complete system goes live. Again they are less risky but time consuming.
Question 5
SECTION B
Answer FIVE questions out of EIGHT in Answer Book B. Each question carries 12 marks.

B5.

Discuss the advantages and disadvantages of three different types of multimedia


that could be used to enhance a web site.
(12 marks)

Comment:
A very poorly answered question, with answering mainly focusing on the amount of
bandwidth various elements would take up. There were a number of references to playing
of music, advertising and illegal use of images and media, which were outside of the
scope of the question.
Answer points:
This was an open ended question and a discussion on three different types of multimedia
such as the following was expected
Movie / Avi etc
Sound
Picture
Text
Etc
Up to 2 marks for positives and up to 2 marks for negatives in each area were awarded.
in each area

Question 6
B6.

A questionnaire is a basic technique for gathering large amounts of data that


could be used to gather information on how users spend their time on the internet.
a)

Identify three types of questions, with examples, that could be asked.


(6 marks)

b)

Briefly explain the design features of an on-line questionnaire.


(6 marks)

Comment:
A reasonably well answered question.
Answer points:
a)

The following question types, with comments, were anticipated


a. Open ended questions
b. Closed ended questions
c. Multiple choice question (with one answer)
d. Multiple choice question (with a number of answers etc)
e. Etc.
Some good answers discussed each type of question but generally the comments for
style of question were identical which resulted in lower marks being awarded.
One mark (in up to 3 sections) for each different style of question, and one mark (up
to three in total) for a reasonable example.

b)

The good candidates referenced the answer to the part a) to help their explanation.
For example, multiple choice questions could use a radio group. For an open ended
question, a text book etc.
Some marks were awarded for general questionnaire design but the higher marks
were awarded when the answer discussed how the question would be implemented.

Question 7
B7.

You are employed as a consultant for a food transport company which intends to
design and build a new computer system to manage its fleet of vehicles.
The majority of vehicles carry fresh food and have inbuilt sensors which link
directly back to the central computer system. If the temperature in the vehicle is
too high (i.e. the food has been spoilt) the vehicle is recalled.
Suggest a suitable, perhaps hybrid, methodology to aid the development of the
above scenario.
(12 marks)

Comment:
A very poorly answered question, with most answers discussing the hardware solutions
rather than any methodology.
Answer points:
A reasonable discussion about any structured methodology would have achieved good
marks.

To obtain higher marks, reference would have needed to be made to the real time data
feeds and how this would have been designed.
For example, SSADM would have been a reasonable starting point and by adapting it to
make reference to the data capture from the sensors would have been decent suggestion
and answer.
A discussion on RAD would have resulted in an average mark due to the nature of the
methodology. Iterative prototyping is perhaps not the correct method for trapping a data
stream, but an adaption of the method to take account of the live feeds would be
acceptable.
Question 8
B8.

a)

Discuss what features an application development environment (ADE)


such as Visual Basic has that could aid the developer in creating quality,
error free code.
(7 marks)

b)

Discuss what you consider to be good naming conventions when


designing a database table
(5 marks)

Comment:
Part a) was answered reasonably well; most answers having a CASE slate on how VB
assists in the development of software
Whereas part a) was well answered, part b) was poorly attempted.
Lots of the answers were often quite poor, commenting that table names should be short
etc., mainly focusing on how quickly the developer can create the table, rather than
looking at standards and naming conventions.
Answer points:
a) Syntax checking
Re-use of code
Compilers
Inbuilt help
b) One mark for each reasonable comment
A table name could be meaningful and represent the entity
Tables maybe prefixed with an identifier to show that they are table; queries and
views should have different prefixes.
If a column is used as part of a primary key then it should be clearly identified
If a column references a foreign table then it should be shown clearly
Avoid shortcuts in names; e.g. cid for customer identifier
Everything should be singular
etc

Question 9
B9.

a)

Outline the stages of normalisation which results in the data being in 3NF.
(3 marks)

b) Using an example of your choice, show the stages discussed in a)


(9 marks)

Comment:
Where the candidate understood the topic they scored highly, and of course the reverse
was true.
Answer points:
a) Up to three marks were awarded for a definition that resulted in The key, the whole
key and nothing but the key.
b) Marks were awarded (but not the full marks) if the end result was in 3NF but the stages
have been confused.

Question 10
B10.

Outline the stages of Rapid Application Development (RAD).


For each stage, state how the user is involved and the potential deliverables from
each stage.
(12 marks)
Comment:
If the question has not asked for the deliverables from each stage, the average mark
would have been higher, as this section was missed from the majority of the answers.
It was clear that a lot of the answers clearly understood the RAD process, but where not
clear on what documentation is delivered at the end of each stage.
Answer points:
The normal 4 stages of RAD are
Requirements Planning Phase
User design phase
Construction
Handover
But there are variations.
Up to 3 or 4 marks for the stages and what is included.
Up to 3 or 4 marks for how the user in involved (JRP, JAD etc)
Up to 3 or 4 marks for the deliverables

Question 11
B11.

a)

State six rules that you would consider to be essential for any password
policy.
(6 marks)

b)

How would you test your recommendations of a)?


(6 marks)

Comment:
Part a) was reasonably well attempted but part b) was not.

Some answers did discuss the use of white hat hackers and use of internal security
people to monitor the process but lots did not.
Answer points:
a)
One mark for each reasonable rule
i)
ii)
iii)
iv)
v)
vi)

Greater than 6 characters


Must mix characters and numerics
Must be changed regularly
Must not re-use old password
Should not use words out of a dictionary etc.
Etc

b)
This was an open ended question with marks being awarded for reasonable comments
Could use software to test password at point of entry; could use people or software to
attempt to hack; could undertake an audit.

Question 12
B12.

You are a consultant working for an online questionnaire company. The


companys
primary business is conducting surveys for marketing companies to ensure that
any
advertising is having its maximum effect.
Outline the guidance you would give to the online questionnaire company to
ensure that
the design of the screens, data input and navigation would aid any potential user
of this
web site.
(12 marks)

Comment:
A number of answers picked up on the word marketing and went off at a tangent.
The question clearly asked for three areas to be discussed and the majority of answers
missed this and produced a note dump on questionnaire design.
Answer points:
An open ended question
Up to 4 marks on design of screens - Consistency, use of standards, usability testing, etc
Up to 4 marks on design of data input - Use of drop downs, radio groups, consistency of
questions, etc.
Up to 4 marks on navigation - Consistency, conformance to other applications, etc.

You might also like