KEMBAR78
May June 2015 | PDF
0% found this document useful (0 votes)
34 views6 pages

May June 2015

ICT2622
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
34 views6 pages

May June 2015

ICT2622
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 6
UNIVERSITY EXAMINATIONS UNIVERSITEITSEKSAMENS. UNISA |S. 1CT2622 ‘Mayidune 2015 OBJECT-ORIENTED ANALYSIS Duration 2 Hours 100 Marks EXAMINERS © FIRST. PROF PL MKHIZE ‘SECOND MR'S SINGH Closed book examination ‘This examination question paper remains the proporty of the Univereity of South Africa and may not be Femoved trom the examination venue ‘This paper consists of 6 pages. Instructions: Answer all the questions The mark for each question is given in brackets next to the question. All the answers and all the rough work must be done m your answer book Number your answers and label your rough work clearly. Note that the MCQs in question 1 must be answered in the answer book. anon GOOD LUCK! [TURN OVER] icTe622 MayhJune 2015 Question 1 NB: This question must be answered in the answer book with the rest of the exam questions. Write the question number and number corresponding to the correct answer For example" 33- B 1 Application architecture Is used to refer to a. the organization and configuration of c the architectural structure of the all software solutions into information ‘subsystems within a software systems application b the application of the information d,_the relationship between software system to solve business problems applications and the areas of the ‘organization that they support 2 Theterm refers to all the people who have an interest nthe successful implementabon of the system a. users ©. managers b. clients, 4. stakeholders 3, Questonnaires can be useful m information gathering when users a. are widely distnbuted geographically. are not wellnformed . need prompting to respond to d. do not have time for interviews questions 4. The user goal technique normally begins by identfying, listing, and classifying a. the system users the business processes b the business events the system stakeholders '5. Which of the following is an example of a state event? a. Acustomer places an order ¢. Management checks order status b_ tts time to send a late notice d._ Inventory reorder pomnt 1s reached 6 The indicates that events should be included dunng analysis only if the system ‘would be required to respond under ideal conditions, ‘8. perfect technology assumption ‘© perfect processing control ideal technology assumptions d. ideal processing control 7 Anexample of an attnbute of an object might be a. an inventory item ‘¢, a-social secunty number b. items on a purchase order di. acalendar 8 relationship that has a cardinality constramt of one or more 1s a(n) ‘a. mandatory © unary b. optional d. binary The above cardinality constraint on the Order data entity indicates that there can bo Zero of many orders cone or many orders many orders cannot be determined without the other side of the relationship poco Page 2 of 6 [TURN OVER] icr2622 Mayhlune 2015 10 Inatully developed use case descnption the exception conditions represent what? ‘a What conditions might cause the system to crash b_ What conditions prevent the system from successfully completing the use case What conditions will confuse the actor d. Where the system might have “bugs” and produce erroneous results (Saronsesuancabogan] oo TeaoenGagam [Erentoqenabagne| : a j { Tmacionbagon | imenseqseceebagram] ammensenuncebagan] — [iararmndagion a a ® € ° Which is correct? aa ec b B aD 12 An action-expression occurs when? a Before the object leaves the ongin state b-After the object enters the destination state Before the object enters the destination state. Before the transition fires 13 Which one of the six core process can be considered as a “bndge" process. a. Identify the problem and obtain approval. b Discover and understand the details © Design system components. 4 Build test and integrate system components. 14 Which is a charactensstc of a peer-to-peer connection a. Connected computers must have the same operating system b- Connected computers do not use a server Connected computers require special software 4d. Connected computers must have over 99% availabilty 18 Operating systems deliberately include an electronic “click” sound for keyboard and mouse activities This descnbes which of the eight golden rules for designing interactive interfaces? a. Offer mformative feedback b. Offer simple error handling ‘c. Support internal locus of control d_ Strive for consistency 16 ____ consists of writing statements in a programming language to define what each type of ‘object does a. OOP ¢ 00D b. OOA a 00s 17. Which of the following is a basic value of agile software development? Following a plan over responding to change 'b Working software over comprehensive documentation & Processes and tools over individuals and interactions Contract negotiation over customer collaboration Page 3 of 6 TTURN OVER] ieT2622 Mayhlune 2015 18 The onginal method used to process mput data in a Web based system was by using computer programs in . a. the Java programming language b. the NET programming sutte cc the C+ language for the CGI the Javasenpt programming language 19. Which two models are the primary models in object-onented detailed design? a Design class ctagram and component diagram b. Package diagram and CRC cards . Sequence diagram and state machine diagram 3 Sequence diagram and design class diagram 20 Which of the following 1s correct UML notation for an attnbute in a design class? ‘a isibiity name type-expression = inftal-value{property} b _ wisibilty class-name.type-expression {property} © isibiity name inital-value(property) d__ visibility name:type-expression initial-value (property) 21. Which is the corract notation for a message label on a sequence diagram? a. * {true/false]RetVal = name (param) b. [ttue/faise|RetVal == name (param) ¢ [true/false]seq# RetVal = name (param) _ * [true/false] seqi Retval = name (param) ‘When a message 1s sent from an onginating object to a destination object it means that ‘a data 1s being passed from the origin object to the destination object b. a transition is occumng between the objects ¢ a method is being invoked on the onginating object 4d. a method ts being invoked on the destination object 23. The final step in the object-onented design (OD) process consists of developing the __. a. attnbutes of the design classes © interaction diagrams b method names of the design classes d. package diagrams 24. A dtferent implementation of a function 1s required in an existing system. The best way to integrate this function into the system 1s. a townite the code in a new class b_ townte the code in an existing class ‘© with the factory pattern d_ with the adapter pattern 25 Gwen the following code, identify the pattern Class MyBullder {static MyBuilder butider = null; { f bulder == null (buder = new MyBulder(}, ‘etum butlder, } a Factory Pattern ¢. Factory Method Pattern Singleton Pattern d Adaptor Pattern 26. Which of the following is normally the most time-consuming and resource-expensive ‘operation? a Bullding prototypes ¢. Researching vendor solutions b Observing business processes d_ Interview stakeholders, Page 4 0f 6 [TURN OVER) ter2622 MayhJune 2015 27. One technique for finding “things” that need to be in the new system 1s done by the analyst starts making Ists of “things.” He may do this from information and even without talking to the users extensively. This technique 1s called the a. domain analysis technique brainstorming technique b. check list technique d._ noun technique 28. The first step in doing software appkcation design s to ‘a define the operating environment. b. identity the approach -- structured or object-onented © define the programming language to be used. d._ identify the various subsystems and therr relationship to each other. 28, Akkey pnnciple of human-computer interaction (HCl), that states that the appearance of any ‘control should suggest its functionality, is called a. informative feedback © consistency b. affordance 4. visibility 30. Each dialog within the system should be organized with a clear sequence-a beginning, middle, and end This descnbes which of the eight golden rules for designing interactive interfaces? a. Offer informative feedback b, Permit easy reversal of actions ¢. Support internal locus of contro! d._ Design dialogs to yield closure, Page 5 of 6 [TURN OVER] ict2622 Mayidune 2018 Question 2 (51 Provide a description of the open-items list and then explain why itis important Question 3 Develop an activity diagram based on the following narrative. Not ‘questions that you have as you develop the model If you need to make assumptions, also note them. The shipping department receives all shipments on outstanding purchase orders When the clerk in the shipping department receives a shipment, he or she finds the outstanding purchase order for those items The clerk then sends multiple copies of the shipment packing slip. One copy goes to Purchasing, and the department updates its records to indicate that the purchase order has been fulfiled Another copy goes to Accounting department so a payment can be made A third copy goes to the requesting In-house ‘customer so he or she can receive the shipment After payment is made, the Accounting department sends a notification to Purchasing Alter the customer recaves and accepts the 9000s, he or she sends notfieation to Purchasing When Purchasing receives these other vertfications, t closes the purchase order as fulfilled and paid Question 4 115) Create @ table showing systems down the rows and the four types of data (domain classes) across the columns. indicate C, R, U, or D for each domain class and each ‘system, Use the narrative below: ‘The portion of the database used with the licket-processing system involves driver data, ticket data, officer data, and court data Driver data, officer data, and court data are read by the system, and the ticket-processing system creates and updates ticket data In an integrated system lke the ticket-processing system, some domain classes are created by and updated by other systems, as described in ths case Question 4 [19) Provide a list of the 10 Agile modelling pnnciples Question 5 {19} Discuss the purpose of an SSD, and explain symbols that are used in an SSD Question 6 18) There aro at least two approaches to the SDLC, two approaches to software construction and modelling, and a long list of techniques and models Explain the reasons for diversity in the following approaches (1) The field is young, (2) the technology changes quickly, (3) ferent organizations have different needs; (4) there are many types of systems, (6) developers have widely different backgrounds © UNISA 2015 Page 6 of 6

You might also like