0 ratings0% found this document useful (0 votes) 34 views6 pagesMay June 2015
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
UNIVERSITY EXAMINATIONS UNIVERSITEITSEKSAMENS.
UNISA |S.
1CT2622 ‘Mayidune 2015
OBJECT-ORIENTED ANALYSIS
Duration 2 Hours 100 Marks
EXAMINERS ©
FIRST. PROF PL MKHIZE
‘SECOND MR'S SINGH
Closed book examination
‘This examination question paper remains the proporty of the Univereity of South Africa and may not be
Femoved trom the examination venue
‘This paper consists of 6 pages.
Instructions:
Answer all the questions
The mark for each question is given in brackets next to the question.
All the answers and all the rough work must be done m your answer book
Number your answers and label your rough work clearly.
Note that the MCQs in question 1 must be answered in the answer book.
anon
GOOD LUCK!
[TURN OVER]icTe622
MayhJune 2015
Question 1
NB: This question must be answered in the answer book with the rest of the exam
questions. Write the question number and number corresponding to the correct answer
For example" 33- B
1 Application architecture Is used to refer to
a. the organization and configuration of c the architectural structure of the
all software solutions into information ‘subsystems within a software
systems application
b the application of the information d,_the relationship between software
system to solve business problems applications and the areas of the
‘organization that they support
2 Theterm refers to all the people who have an interest nthe successful
implementabon of the system
a. users ©. managers
b. clients, 4. stakeholders
3, Questonnaires can be useful m information gathering when users
a. are widely distnbuted geographically. are not wellnformed
. need prompting to respond to d. do not have time for interviews
questions
4. The user goal technique normally begins by identfying, listing, and classifying
a. the system users the business processes
b the business events the system stakeholders
'5. Which of the following is an example of a state event?
a. Acustomer places an order ¢. Management checks order status
b_ tts time to send a late notice d._ Inventory reorder pomnt 1s reached
6 The indicates that events should be included dunng analysis only if the system
‘would be required to respond under ideal conditions,
‘8. perfect technology assumption ‘© perfect processing control
ideal technology assumptions d. ideal processing control
7 Anexample of an attnbute of an object might be
a. an inventory item ‘¢, a-social secunty number
b. items on a purchase order di. acalendar
8 relationship that has a cardinality constramt of one or more 1s a(n)
‘a. mandatory © unary
b. optional d. binary
The above cardinality constraint on the Order data entity indicates that there can bo
Zero of many orders
cone or many orders
many orders
cannot be determined without the other side of the relationship
poco
Page 2 of 6 [TURN OVER]icr2622
Mayhlune 2015
10 Inatully developed use case descnption the exception conditions represent what?
‘a What conditions might cause the system to crash
b_ What conditions prevent the system from successfully completing the use case
What conditions will confuse the actor
d. Where the system might have “bugs” and produce erroneous results
(Saronsesuancabogan] oo TeaoenGagam [Erentoqenabagne|
: a j {
Tmacionbagon | imenseqseceebagram] ammensenuncebagan] — [iararmndagion
a a ® € °
Which is correct?
aa ec
b B aD
12 An action-expression occurs when?
a Before the object leaves the ongin state
b-After the object enters the destination state
Before the object enters the destination state.
Before the transition fires
13 Which one of the six core process can be considered as a “bndge" process.
a. Identify the problem and obtain approval.
b Discover and understand the details
© Design system components.
4 Build test and integrate system components.
14 Which is a charactensstc of a peer-to-peer connection
a. Connected computers must have the same operating system
b- Connected computers do not use a server
Connected computers require special software
4d. Connected computers must have over 99% availabilty
18 Operating systems deliberately include an electronic “click” sound for keyboard and mouse
activities This descnbes which of the eight golden rules for designing interactive interfaces?
a. Offer mformative feedback
b. Offer simple error handling
‘c. Support internal locus of control
d_ Strive for consistency
16 ____ consists of writing statements in a programming language to define what each type of
‘object does
a. OOP ¢ 00D
b. OOA a 00s
17. Which of the following is a basic value of agile software development?
Following a plan over responding to change
'b Working software over comprehensive documentation
& Processes and tools over individuals and interactions
Contract negotiation over customer collaboration
Page 3 of 6 TTURN OVER]ieT2622
Mayhlune 2015
18 The onginal method used to process mput data in a Web based system was by using
computer programs in .
a. the Java programming language
b. the NET programming sutte
cc the C+ language for the CGI
the Javasenpt programming language
19. Which two models are the primary models in object-onented detailed design?
a Design class ctagram and component diagram
b. Package diagram and CRC cards
. Sequence diagram and state machine diagram
3 Sequence diagram and design class diagram
20 Which of the following 1s correct UML notation for an attnbute in a design class?
‘a isibiity name type-expression = inftal-value{property}
b _ wisibilty class-name.type-expression {property}
© isibiity name inital-value(property)
d__ visibility name:type-expression initial-value (property)
21. Which is the corract notation for a message label on a sequence diagram?
a. * {true/false]RetVal = name (param)
b. [ttue/faise|RetVal == name (param)
¢ [true/false]seq# RetVal = name (param)
_ * [true/false] seqi Retval = name (param)
‘When a message 1s sent from an onginating object to a destination object it means that
‘a data 1s being passed from the origin object to the destination object
b. a transition is occumng between the objects
¢ a method is being invoked on the onginating object
4d. a method ts being invoked on the destination object
23. The final step in the object-onented design (OD) process consists of developing the __.
a. attnbutes of the design classes © interaction diagrams
b method names of the design classes d. package diagrams
24. A dtferent implementation of a function 1s required in an existing system. The best way to
integrate this function into the system 1s.
a townite the code in a new class
b_ townte the code in an existing class
‘© with the factory pattern
d_ with the adapter pattern
25 Gwen the following code, identify the pattern
Class MyBullder
{static MyBuilder butider = null;
{ f bulder == null (buder = new MyBulder(},
‘etum butlder,
}
a Factory Pattern ¢. Factory Method Pattern
Singleton Pattern d Adaptor Pattern
26. Which of the following is normally the most time-consuming and resource-expensive
‘operation?
a Bullding prototypes ¢. Researching vendor solutions
b Observing business processes d_ Interview stakeholders,
Page 4 0f 6 [TURN OVER)ter2622
MayhJune 2015
27. One technique for finding “things” that need to be in the new system 1s done by the analyst
starts making Ists of “things.” He may do this from information and even without talking to
the users extensively. This technique 1s called the
a. domain analysis technique brainstorming technique
b. check list technique d._ noun technique
28. The first step in doing software appkcation design s to
‘a define the operating environment.
b. identity the approach -- structured or object-onented
© define the programming language to be used.
d._ identify the various subsystems and therr relationship to each other.
28, Akkey pnnciple of human-computer interaction (HCl), that states that the appearance of any
‘control should suggest its functionality, is called
a. informative feedback © consistency
b. affordance 4. visibility
30. Each dialog within the system should be organized with a clear sequence-a beginning,
middle, and end This descnbes which of the eight golden rules for designing interactive
interfaces?
a. Offer informative feedback
b, Permit easy reversal of actions
¢. Support internal locus of contro!
d._ Design dialogs to yield closure,
Page 5 of 6 [TURN OVER]ict2622
Mayidune 2018
Question 2 (51
Provide a description of the open-items list and then explain why itis important
Question 3
Develop an activity diagram based on the following narrative. Not
‘questions that you have as you develop the model If you need to make assumptions, also
note them.
The shipping department receives all shipments on outstanding purchase orders When the
clerk in the shipping department receives a shipment, he or she finds the outstanding
purchase order for those items The clerk then sends multiple copies of the shipment
packing slip. One copy goes to Purchasing, and the department updates its records to
indicate that the purchase order has been fulfiled Another copy goes to Accounting
department so a payment can be made A third copy goes to the requesting In-house
‘customer so he or she can receive the shipment After payment is made, the Accounting
department sends a notification to Purchasing Alter the customer recaves and accepts the
9000s, he or she sends notfieation to Purchasing When Purchasing receives these other
vertfications, t closes the purchase order as fulfilled and paid
Question 4 115)
Create @ table showing systems down the rows and the four types of data (domain
classes) across the columns. indicate C, R, U, or D for each domain class and each
‘system, Use the narrative below:
‘The portion of the database used with the licket-processing system involves driver data,
ticket data, officer data, and court data Driver data, officer data, and court data are read by
the system, and the ticket-processing system creates and updates ticket data In an
integrated system lke the ticket-processing system, some domain classes are created by
and updated by other systems, as described in ths case
Question 4 [19)
Provide a list of the 10 Agile modelling pnnciples
Question 5 {19}
Discuss the purpose of an SSD, and explain symbols that are used in an SSD
Question 6 18)
There aro at least two approaches to the SDLC, two approaches to software
construction and modelling, and a long list of techniques and models
Explain the reasons for diversity in the following approaches
(1) The field is young,
(2) the technology changes quickly,
(3) ferent organizations have different needs;
(4) there are many types of systems,
(6) developers have widely different backgrounds
©
UNISA 2015
Page 6 of 6