0% found this document useful (0 votes)
28 views56 pages

PDF

The sequence diagram shows a customer reserving a hotel room online by searching for available rooms based on dates, selecting a room, entering their customer information, and providing credit card details. The class diagram models the entities as classes including Customer, Bookings, Rooms, and a Controller class to coordinate the reservation process between the other classes.

Uploaded by

Omar Aj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views56 pages

PDF

The sequence diagram shows a customer reserving a hotel room online by searching for available rooms based on dates, selecting a room, entering their customer information, and providing credit card details. The class diagram models the entities as classes including Customer, Bookings, Rooms, and a Controller class to coordinate the reservation process between the other classes.

Uploaded by

Omar Aj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 56

Question 2:

For an Export/Import Company, with an online trading software, calculate the Benefits Analysis,
where

Total Development Cost $5,000,000


Estimated Annual Operating Cost $500,000
Estimated Annual Benefits $1,500,000
Annual Growth of Benefits 10%
Discount Factor 8%

Category Year 0 Year 1 Year 2 Year 3 Year 4 Year 5


Value of
Benefits

Development
Cost

Annual
Expenses
Net Benefits
Discount
Factor

Net Present
Value

Cumulative
NPV

Payback Period
King Saud University
College Of Computer And Information Sciences
Information Systems Department

Q2: For an online Trading Company, calculate the Benefits Analysis, where

Total Development Cost $2,000,000


Estimated Annual Operating Cost $300,000
Estimated Annual Benefits $1,000,000
Annual Growth of Benefits 0%
Discount Factor 0%

Category Year 0 Year 1 Year 2 Year 3 Year 4


Value of Benefits 1000000 1000000 10000001000000
Development Cost 2000000
Annual Expenses 300000 300000 300000 300000
Net Benefits 2000000 700000 700000 700000 700000
Discount Factor i i n I l
Net Present Value 2000000 700000 700000 700000 700000
Cumulative NPV 2000000 1300000 600000 100000 sooooo
Payback Period 2yars118 8 1 365da

years1313days
Question 2: (10 Pints)
For an Export/Import Company, with an online trading software, calculate the
Benefits Analysis, where

Total Development Cost $3,000,000


Estimated Annual Operating Cost $400,000
Estimated Annual Benefits $1,200,000
Annual Growth of Benefits 0%
Discount Factor 0%

Category Year 0 Year 1 Year 2 Year 3 Year 4 Year 5


Value of
1,200,000 1,200,000 1,200,000 1,200,000 1,200,000
Benefits
Development
-3,000,000
Cost
Annual
-400,000 -400,000 -400,000 -400,000 -400,000
Expenses
Net Benefits -3,000,000 800,000 800,000 800,000 800,000 800,000
Discount
1 1 1 1 1 1
Factor
Net Present
-3,000,000 800,000 800,000 800,000 800,000 800,000
Value
Cumulative
-3,000,000 -2,200,000 -1,400,000 -600,000 200,000 1,000,000
NPV

Payback 3 years +(600,000/(600,000+200,000)) = 3 years + 0.75 =


Period 3 years +274 days.
Question 2: (10 Pints)
For an Export/Import Company, with an online trading software, calculate the Benefits Analysis,
where

Total Development Cost $3,000,000


Estimated Annual Operating Cost $200,000
Estimated Annual Benefits $1,000,000
Annual Growth of Benefits 10%
Discount Factor 8%

Category Year 0 Year 1 Year 2 Year 3 Year 4 Year 5


Value of 1000000 1100000 1210000 1331000 1464100
Benefits
Development -3000000
Cost
Annual -200000 -200000 -200000 -200000 -200000
Expenses
Net Benefits -3000000 800000 900000 1010000 1131000 1264100

Discount 1.00 0.92 0.85 0.78 0.72 0.66


Factor
Net Present -3000000 736000 761760 786475 810240 833145
Value
Cumulative -3000000 -2264000 -1502240 -715765 94475 927620
NPV

Payback 3 years + (715765/(715765+94475)= 3 years + 0.883 of a year


Period = 3 years + 322 days
Question 2: (10 Pints)
For an Export/Import Company, with an online trading software, calculate the Benefits Analysis,
where

Total Development Cost $4,000,000


Estimated Annual Operating Cost $400,000
Estimated Annual Benefits $1,200,000
Annual Growth of Benefits 10%
Discount Factor 8%

Category Year 0 Year 1 Year 2 Year 3 Year 4 Year 5


Value of 1,200,000 1,320,000 1,452,000 1,597,200 1,756,920
Benefits
Development -4,000,000
Cost
Annual -400,000 -400,000 -400,000 -400,000 -400,000
Expenses
Net Benefits -4,000,000 800,000 920,000 1,052,000 1,197,200 1,356,920

Discount 1 0.92 0.8464 0.778688 0.716393 0.659082


Factor
Net Present -4,000,000 736,000 778,688 819,180 857,666 894,321
Value 12
Cumulative -4,000,000 -3,264,000 -2,485,312 -1,666,132 -808,467 85,854
NPV
4 years + (808,467/(808,467+85,854)= 4 years + 0.904 of a
Payback year = 4 years + 330 days.
Period
King Saud University IS 340 Section 66997 12/10/2020
Midterm Exam
Student Name Student Id

Problem 1: (10 Pints)


For the following use case scenario and domain class diagram, using sequence diagrams,
give the design class diagram
Use case name: Hotel online reservation.
Scenario: Create online hotel reservation sale
Triggering New customer wants to make a hotel reservation.
event:
Brief Online customer needs to reserve a room by entering basic information and
description: then following up with a credit or debit card information
Actors: Customer
Related use
cases:
Stakeholders: Accounting, Marketing, Sales
Preconditions: Credit/debit authorization services must be available
Postconditions: Room reservation must be created and saved.
Credit/debit card information must be validated.
Actor System
1 Customer indicates desire 1.1 System searches for available rooms
to reserve a room and and costs.
enters date and room type 1.2 System prompts for available Rooms
information

2 Customer selects the 2.1 System Display Selected Room


desired room. Information
2.2 System prompts for customer
Flow of information
activities:
3 Customer enters his/her 3.1 System Display Customer
basic information Information
3.2 System prompts for credit/debit card.

4 Customer enters 4.1System verifies authorization for


credit/debit card credit/debit card.
information. 4.2 System creates the booking record
4.3 System updates rooms information
4.4 System returns booking details.
Exception None (assume no alternatives)
conditions:
.

Controller room
reservation

-reserveRoom (date, roomInformation)


-selectRoom (roomClass, roomPrice)
-createCustomer (name, mobilePhone,
homePhone, emailAddress)
-chargeCreditCard(creditCardInfo)

Customer
-cusomerId:string {key}
-name:string
-mobilePhone:string
-homePhone:string
-emailAddress:string

-searchRoom (date, roomInformation)


-selectRoom (roomClass, roomPrice)
-createCustomer (name, mobilePhone,
homePhone, emailAddress)
-chargeCreditCard(creditCardInfo)

Bookings Rooms
-customerId:string {key} -roomCode:string {key}
-roomCode:string {key} -roomClass: integer
-startDate:string -roomStatus: integer
-endDate:string -roomPrice: Integer

-createBooking(customerId,
selectedRoomInfo)
-searchRoom (date, roomInformation)
-updateRoom(selectedRoomInfo)
Sequence Diagram:

Controller room Customer Bookings Rooms


reservation

reserveRoom (date, searchRoom (date, searchRoom (date, roomInformation)


roomInformation) roomInformation)

availableRoomsInformatio availableRoomsInformation availableRoomsInformation


n

selectRoom (roomClass, selectRoom (roomClass,


roomPrice) roomPrice)

selectedRoomsInformation selectedRoomsInformation

createCustomer (name, createCustomer (name,


mobilePhone, mobilePhone, homePhone,
homePhone, emailAddress)
emailAddress)

customerInformation customerInformation

verifyCreditCard(creditCardInfo) --- to external creditcard system


chargeCreditCard(creditCard verifyCreditCard(creditCardInfo)
Info) createBooking(customerId,selectedRoom
Info)

updateRoom(selectedRoomInfo)
bookingDetails
bookingDetails bookingDetails
King Saud University IS 340 26/3/2020
Take Home Assignment
Student Name Student Id

Problem 1:
For the following use case scenario and domain class diagram, using sequence diagrams,
give the design class diagram

Use case name: Ticket online sale.


Scenario: Create online ticket sale
Triggering New customer wants to buy a ticket.
event:
Brief Online customer needs to buy a ticket by entering basic information and
description: then following up with a credit or debit card information
Actors: Customer
Related use
cases:
Stakeholders: Accounting, Marketing, Sales
Preconditions: Credit/debit authorization services must be available
Postconditions: Ticket Sale must be created and saved.
Credit/debit card information must be validated.
Actor System
1 Customer indicates desire 1.1 System searches for available flights
to buy a flight ticket and and costs.
enters flight source and 1.2 System prompts for customer
destination, date, and selection.
class information
2 Customer selects the 2.1 System prompts for customer
Flow of
desired flight. information
activities:
3 Customer enters his/her 3.2 System prompts for credit/debit card.
basic information
4 Customer enters 4.1System verifies authorization for
credit/debit card credit/debit card.
information. 4.2 System creates the booking record
4.3 System updates flight information
4.4 System returns booking details.
Exception None (assume no alternatives)
conditions:
.
Controller Ticket Sale

Customer
-cusomerId:string {key}
-name:string
-mobilePhone:string
-homePhone:string
-emailAddress:string

Booked Flights Flights


-customerId:string {key} -flightCode:string {key}
-flightCode:string {key} -Source:string
-class:string -Destenation:string
-comment:string -Day: string
-Time: string
-noOfavailableSeats1stClass: integer
-noOfavailableSeatsBusinessClass: integer
-noOfavailableSeatsEconomyClass: integer
Sequence Diagram:
King Saud University IS 340 8/11/2020
Midterm Exam
Student Name Student Id

Problem 1: (10 Pints)


For the following use case scenario and domain class diagram, using sequence diagrams,
give the design class diagram
Use case name: Online Airline reservation
Scenario: Create Online Airline reservation
Triggering New customer wants to make a flight reservation.
event:
Brief Online customer needs to book a flight by entering flight information, his
description: basic information and then following up with a credit or debit card
information
Actors: Customer
Related use
cases:
Stakeholders: Accounting, Marketing, Sales
Preconditions: Credit/debit authorization services must be available
Postconditions: Flight reservation must be created and saved.
Credit/debit card information must be validated.
Actor System
1 Customer indicates desire 1.1 System searches for available flights
to book a flight and and costs.
enters date, Origin, 1.2 System prompts for available flights
Destination and class
type information

2 Customer selects the 2.1 System Display Selected flight


desired flight. Information
2.2 System prompts for customer
Flow of
information
activities:
3 Customer enters his/her 3.1 System Display Customer
basic information Information
3.2 System prompts for credit/debit card.

4 Customer enters 4.1System verifies authorization for


credit/debit card credit/debit card.
information. 4.2 System creates the booking record
4.3 System updates flight information
4.4 System returns booking details.
Exception None (assume no alternatives)
conditions:
.

controllerFlightReservation

-bookFlight (date, from, to, class)


- selectflight(date, from, to, class)
- createCustomer (name, mobilePhone,
homePhone, emailAddress)
-chargeCreditCard(creditCardInfo)

Customer
-cusomerId:string {key}
-name:string
-Nationality: string
-mobilePhone:string
-homePhone:string
-emailAddress:string

-bookFlight (date, from, to, class)


- selectflight(date, from, to, class)
- createCustomer (name, mobilePhone,
homePhone, emailAddress)
-chargeCreditCard(creditCardInfo)

Bookings Flights Seats


-customerId:string {key} -flightCode:string {key} -flightCode:string {key}
-flightCode:string {key} -flightFrom:string -flightClass: integer {key}
-flightClass: string -flightTo: string -seatNumber: String {key}
-seatNumber: String -flightDate:string -flightCost: integer
-flightTime:string -seatStatus: Boolean

-createBooking(customerId,
selectedFlightInfo) - searchFlights (date, from, to, class) -findSeat ()
-selectSeat()
- selectFlights (date, from, to, class) --updateSeatStatus(seatNumber)
Sequence Diagram:

controllerFlightReservation customer bookings flights seats

bookFlight (date, bookFlight (date, from, to, searchFlights (date, from, to, class)
from, to, class) findSeat(class)
class)

flightsInformation flightsInformation seatFound


flightsInformation

selectflight(date, from, selectflight(date, from, to,


to, class) class) selectflight(date, from, to, class) selectSeat()

reservationInformation
reservationInformation reservationInformation seatNumber

createCustomer (name, createCustomer (name,


mobilePhone, mobilePhone, homePhone,
homePhone, emailAddress)
emailAddress)

customerInformation customerInformation

verifyCreditCard(creditCardInfo) --- to external creditcard system


chargeCreditCard(creditCard verifyCreditCard(creditCardInfo)
Info) createBooking(custo
merId,selectedFlight
mInfo)
updateSeatStatus(seatNumber)

bookingDetails bookingDetails
bookingDetails
2- In the following software architecture:

B C E
D

J
F G H I

a) What is the Top-Down sequence of testing the system modules


Answers:

Integrated Modules Stubs


AB C, D, E
ABC F, G, D, E
ABCF G, D, E
ABCFG D, E
ABCFGD H, E
ABCFGDH E
ABCFGDHE I, J
ABCFGDHEI J
ABCFGDHEIJ ---

b) What is the Bottom-Up down sequence of testing the system modules


Answers:

Integrated Modules Stubs


AB C, D, E
FC G
FCG ---
ABFCG D, E
DH ---
ABFCGDH E
EI J
EIJ ---
ABFCGDHEIJ ---
3- In the following software architecture:

B D
C

I
G H
E F

H K
a) What is the Top-Down sequence of testing the system modules
Answers:
Integrated Modules Stubs
AB C, D, E, F
ABE C, D, F
ABEF C, D, H, K
ABEFH C, D, K
ABEFHK C, D
ABEFHKC G, D
ABEFHKCG D
ABEFHKCGD H, I
ABEFHKCGDH I
ABEFHKCGDHI ----

b) What is the Bottom-Up down sequence of testing the system modules


Answers:
Integrated Modules Stubs
BE F
FH K
FHK ---
BEFHK ---
BEFHKA C, D
CG ---
BEFHKACG D
DH I
DHI ---
BEFHKACGDHI ---
Problem 3: (5 Pints)
Select the correct answer(s)
1. Which of the following are not considered as internal project manager responsibilities? (Select
as many as you can)
a. Developing the project schedule
b. Training users
c. Assigning work to teams and team members
d. Assessing project risks
e. Monitoring and controlling the developed work support
2.
a. Poor executive support for the project
b. Unclear project management practices
c. Heavy requirements
d. Unclear business needs and project objectives
e. Naive user involvement
3. In high ceremonies, specific participants are invited
a. Yes
b. No
4. In high ceremonies, detailed models are kept to a minimum
a. Yes
b. No
5. Agile iterations must be flexible due to changes
a. Yes
b. No
6. Agile Costs are more difficult to estimate
a. Yes
b. No
7. In the System Vision Document, problem description gives the capabilities the new system will
have
a. Yes
b. No
8. In the System Vision Document, system capabilities help define the scope, size, complexity of
the system
a. Yes
b. No
9. In the System Vision Document, business benefits give the problem and idea for the solution
a. Yes
b. No
10. Net Present Value (NPV) gives point in time at which benefits and costs are equal
a. Yes
b. No
W
N
O
O

O
O

O
O
O
O

O
O
O

O
O

I
King Saud University IS 340: Final Exam 6/5/2020
Duration: 1:30 hours
Student Name Student Id Section

Problem 1 (10 Points): Highlight the correct answer


1. Which of the following is not considered as advantages of explicit
architecture
a. It is used as a focus of discussion by system stakeholders.
b. It is possible that the analysis of the system can meet its non-
functional requirements.
c. It may be reusable across a range of systems
d. It represents the semantics and relationships between entities
2. Layered architecture organizes
a. The system into a set of abstract machines each of which provide a set
of services.
b. Shared data in a central database that is accessed by all sub-systems.
c. Data such that each sub-system could maintain its own database and
passes data explicitly to other sub-systems.
d. Servers such that a set of stand-alone servers to provide specific
services.
3. Which of the following is not considered for use of application architectures
a. As a starting point for architectural design.
b. As a design framework.
c. As a way of organizing the work of the development team.
d. As a means of assessing components for reuse.
4. Which of the following is correct
a. Software testing is to execute a program using artificial data.
b. Software testing reveal the presence of errors not their absence.
c. Software testing is part of the verification and validation process.
d. All of the above
Oe. None of the above
5. In Users Testing
a. Users work with the development team to test the software at the

b. Users are allowed to experiment and to raise problems that they


discover with the system developers.
c. Users decide whether or not the system is ready to be accepted from
the system developers for deployment.
O
d. All of the above
e. None of the above
6. Validation testing
a. A successful test is a test that makes the system perform incorrectly
and so exposes a fault to the system.
Ob. To demonstrate to the developer and the system customer that the
software meets its requirements
c. To check that the software meets its stated functional and non-
functional requirements.
d. To discover faults in the software where its behavior is incorrect or
not in conformance with its specification
7. Verification means
a. "Are we building
O
b.
a. Both a & b
b. None of the above
8. In System Testing
a. System testing is testing the system to check that changes have not

b. System testing is testing the interactions between components.


O
c.
committed.
d. All of the above
e. None of the above
9. Release Testing
a. Release testing is testing the system to check that changes have not

b.
committed.
c. Release testing is the process of testing a particular system that is
O intended for use outside of the development team.
d. All of the above
e. None of the above
10. Reliability is defined as
I a. The probability that a system, at a point in time, will be operational
b. The probability of failure-free system operation over a specified time
c. The probability that a system, at a range of time, will be operational
d. The probability of system not working over a specified time in a given
environment for a given purpose
11. It is accepted that to design an overall systems architecture of agile
processes
a. Yes
Ob. No
12. In agile development, refactoring the system architecture is expensive.
a. Yes
O
b. No
13. In repository architecture, when large amounts of data are to be shared, the
central database model of sharing is most commonly used.
a. Yes
b. No
14. Pipe and filter architecture is suitable for interactive systems.
a. Yes
b. No
15. Exhaustive system testing is possible where all tests are covered.
a. Yes
b. No
O
16. Defect testing is concerned with rooting out undesirable system behavior
Oa.b. Yes
No
17. Validation means that the software should do what the user really requires.
a. Yes
O
b. No
18. White Box testing guarantees that there is no interface errors
a. Yes
b. No
O
19. Release testing is usually a white-box testing process where tests are only
derived from the system specification.
a. Yes
b. No
O
20. Software customers expect non-critical applications to be completely
p dependable.
a. Yes
b. No
Problem 2 (6 Points):
Match column 1 with column 2 (specify the matching in the Related Column.
Please note that some items may have no matches)
Column 1 Related Column 2
Column
2
1 A development view 1 Include redundant components and
mechanisms for fault tolerance.
2 A logical view 2 Localize critical operations and
minimize communications.
3 Availability 3 Show how the software is
decomposed for development.
4 Maintainability 4 Show the key abstractions in the
system.
5 Performance 5 Show the system hardware and the
distribution of software components

6 Safety 6 Use a layered architecture with


critical assets in the inner layers.

Problem 3 (4 Points):
Match column 1 with column 2 (specify the matching in the Related Column.
Please note that some items may have no matches)
Column 1 Related Column 2
Column
2
1 Application security 1 An attack that corrupts the system or
its data
2 Application-level 2 If a system is attacked and the system
protection or its data are corrupted as a
consequence of that attack
3 Infrastructure 3
security systems
4 Operational security 4 Specific protection mechanisms built
into the application itself
King Saud University IS 340: Final Exam 6/5/2020
Duration: 1:30 hours
Student Name Student Id Section

Problem 1 (10 Points): Highlight the correct answer


1. Which of the following is not considered as advantages of explicit
architecture
a. It is used as a focus of discussion by system stakeholders.
b. It is possible that the analysis of the system can meet its non-
functional requirements.
c. It may be reusable across a range of systems
d. It represents the semantics and relationships between entities
2. Layered architecture organizes
a. The system into a set of abstract machines each of which provide a set
of services.
b. Shared data in a central database that is accessed by all sub-systems.
c. Data such that each sub-system could maintain its own database and
passes data explicitly to other sub-systems.
d. Servers such that a set of stand-alone servers to provide specific
services.
3. Which of the following is not considered for use of application architectures
a. As a starting point for architectural design.
b. As a design framework.
c. As a way of organizing the work of the development team.
d. As a means of assessing components for reuse.
4. Which of the following is correct
a. Software testing is to execute a program using artificial data.
b. Software testing reveal the presence of errors not their absence.
c. Software testing is part of the verification and validation process.
d. All of the above
e. None of the above
5. In Users Testing
a. Users work with the development team to test the software at the

b. Users are allowed to experiment and to raise problems that they


discover with the system developers.
c. Users decide whether or not the system is ready to be accepted from
the system developers for deployment.
d. All of the above
e. None of the above
6. Validation testing
a. A successful test is a test that makes the system perform incorrectly
and so exposes a fault to the system.
b. To demonstrate to the developer and the system customer that the
software meets its requirements
c. To check that the software meets its stated functional and non-
functional requirements.
d. To discover faults in the software where its behavior is incorrect or
not in conformance with its specification
7. Verification means
a.
b.
a. Both a & b
b. None of the above
8. In System Testing
a. System testing is testing the system to check that changes have not
previously working code.
b. System testing is testing the interactions between components.
c.
committed.
d. All of the above
e. None of the above
9. Release Testing
a. Release testing is testing the system to check that changes have not

b.
committed.
c. Release testing is the process of testing a particular system that is
intended for use outside of the development team.
d. All of the above
e. None of the above
10. Reliability is defined as
a. The probability that a system, at a point in time, will be operational
b. The probability of failure-free system operation over a specified time
c. The probability that a system, at a range of time, will be operational
d. The probability of system not working over a specified time in a given
environment for a given purpose
11. It is accepted that to design an overall systems architecture of agile
processes
a. Yes
b. No
12. In agile development, refactoring the system architecture is expensive.
a. Yes
b. No
13. In repository architecture, when large amounts of data are to be shared, the
central database model of sharing is most commonly used.
a. Yes
b. No
14. Pipe and filter architecture is suitable for interactive systems.
a. Yes
b. No
15. Exhaustive system testing is possible where all tests are covered.
a. Yes
b. No
16. Defect testing is concerned with rooting out undesirable system behavior
a. Yes
b. No
17. Validation means that the software should do what the user really requires.
a. Yes
b. No
18. White Box testing guarantees that there is no interface errors
a. Yes
b. No
19. Release testing is usually a white-box testing process where tests are only
derived from the system specification.
a. Yes
b. No
20. Software customers expect non-critical applications to be completely
dependable.
a. Yes
b. No
Problem 2 (6 Points):
Match column 1 with column 2 (specify the matching in the Related Column.
Please note that some items may have no matches)
Column 1 Related Column 2
Column
2
1 A development view 3 1 Include redundant components and
mechanisms for fault tolerance.
2 A logical view 4 2 Localize critical operations and
minimize communications.
3 Availability 1 3 Show how the software is
decomposed for development.
4 Maintainability -- 4 Show the key abstractions in the
system.
5 Performance 2 5 Show the system hardware and the
distribution of software components

6 Safety -- 6 Use a layered architecture with


critical assets in the inner layers.

Problem 3 (4 Points):
Match column 1 with column 2 (specify the matching in the Related Column.
Please note that some items may have no matches)
Column 1 Related Column 2
Column
2
1 Application security -- 1 An attack that corrupts the system or
its data
2 Application-level 4 2 If a system is attacked and the system
protection or its data are corrupted as a
consequence of that attack
3 Infrastructure -- 3
security systems
4 Operational security 3 4 Specific protection mechanisms built
into the application itself
Problem 3: (5 Pints)
Select the correct answer
1. In high ceremonies, specific participants are invited
a. Yes
b. No
2. In the System Vision Document, problem description gives the capabilities the new
system will have
a. Yes
b. No
3. Net Present Value (NPV) gives point in time at which benefits and costs are equal
a. Yes
b. No
4. In plan-driven development, extensive tool support is used to support development.
a. Yes
b. No
5. In agile development, there is a minimal documentation. It only focuses on working code
a. Yes
b. No
6. Projects that are implemented using agile process, should
a. have a very detailed specification and design before moving to implementation? If
so, you probably need to use a plan-driven approach.
b. have an incremental delivery strategy, where you deliver the software to
customers and get rapid feedback from them.
c. require a large development team, where communication is done formally
d. All of the above
e. None of the above
7. In plan-driven development, incremental development could be used.
a. Yes
b. No
8. In Agile development, the outputs from the development process are decided through a
process of negotiation during the software development process.
a. Yes
b. No
9. In agile development, design documents may be required if the team is distributed.
a. Yes
b. No
10. In plan driven development, support for visualisation and program analysis is essential if
design documentation is not available.
a. Yes
b. No
King Saud University
College of Computer and Information Sciences
Information Systems Department
Course: IS 340 (Information Systems Analysis and Design II) Total Marks: 20
Assessment: Final Exam Semester / Year: Spring 2020-21
Assessment Date: April 26th., 2021 Duration: 150 minutes

55143 (Females)
EXAM POLICY & ETHICS:
Read the questions carefully (It is a closed Book Exam)
Cheating in any form,or copying of portions of answers will not be tolerated.
Any evidence of cheating will result in a failing grade for the exam.
This exam is done as a (Homework Via Zoom Session) as scheduled by the College Exam Committee.
Failure to abide by CCIS & KSU announced Exam regulations, rules and guidelines will result in a

Note: Report ALL your answers in the Answer Sheet

Course Learning Outcomes/ Student Outcomes: This exam covers the following outcomes

CLOS COURSE OUTCOME SOS


CLO 1 Realize advanced design principles SO2

CLO 2 Describe the basic Information Systems Development and Software Team Structures and Dynamics. SO6

CLO 4 Describe software testing design and techniques. SO2

CLO 6 Describe software security. SO6

Grades distribution with student outcome covered for each question

Student Outcomes Questions Total Grades

SO6 Question I /2
SO6 Question II /2
SO6 Question III /2
SO2 Question IV /2
SO2 Question V /2
Total /100
Mark out of 20 /2
Course Instructor Ashraf Youssef
Signature:

QUESTIONS of Final Exam - IS 340 Section 55143- April 26th., 2021-Monday 14-9-1442@11:15 am
ANSWER ONLY ON THE FOUR PROVIDED ANSWER SHEETS

ANSWER SHEET (SHEET 1 of 4)

Answer to Question I:

(Maximum 20 pts) Use ANSWER SHEET (SHEET 1 of 4)

Multiple Choice Questions (MCQ)


Choose the only one answer that best fits.

1. 2. 3. 4.

5. 6. 7. 8.

Answer to Question II:

(Maximum 20 pts) Use ANSWER SHEET (SHEET 1 of 4)

Multiple Choice Questions (MCQ)


Choose the only one answer that best fits.

1. 2. 3. 4.

QUESTIONS of Final Exam - IS 340 Section 55143- April 26th., 2021-Monday 14-9-1442@11:15 am
ANSWER SHEET (SHEET 2 of 4)
Answer to Question III: (Maximum 20pts) Use ANSWER SHEET (SHEET 2 of 4)
Problem on Cost/benefit Analysis:
Compare the costs and benefits for two projects (A) and (B) to decide, which one to select for
investment, based on the data provided, in tables (A) and (B).

Hint: Complete the (12) missing entries in each table, then calculate the payback period for each project
as a basis for comparison, to make your decision.

Table :

Year 0 Year 1 Year 2 Year 3 Year 4


1. Value of benefits $ 2000 $2500 $3000 $3500
2. Development costs -$3500
3. Annual expenses -$300 -$300 -$300 -$300
4. Net benefit/costs -$3500

5. Discount factor (0%) 1 1 1 1 1


6. Net present value -$3500

7. Cumulative NPV -$3500

8. Payback period

Payback period for project =

Table B :

Year 0 Year 1 Year 2 Year 3 Year 4


1. Value of benefits $ 3000 $3500 $4000 $4500
2. Development costs -$4000
3. Annual expenses -$500 -$500 -$500 -$500
4. Net benefit/costs -$4000

5. Discount factor (0%) 1 1 1 1 1


6. Net present value -$4000

7. Cumulative NPV -$4000

8. Payback period

Payback period for project B

THE SELECTED PROJECT IS:

QUESTIONS of Final Exam - IS 340 Section 55143- April 26th., 2021-Monday 14-9-1442@11:15 am
ANSWER SHEET (SHEET 3 of 4)
Answer to Question IV: (Maximum 20pts)

REQUIREMENT: DSD (Design Sequence Diagram) Use ANSWER SHEET (SHEET 3 of 4)

QUESTIONS of Final Exam - IS 340 Section 55143- April 26th., 2021-Monday 14-9-1442@11:15 am
ANSWER SHEET (SHEET 4 of 4)

Answer to Question V: (Maximum 20pts)

REQUIREMENT A: (Top-Down Sequence of Testing) Use ANSWER SHEET (SHEET 4 of 4)

a) What is the Top-Down sequence of testing the system modules? (10 Points)
Answers:

REQUIREMENT B: (Bottom-Up Sequence of Testing) Use ANSWER SHEET (SHEET 4 of 4)

b) What is the Bottom-Up sequence of testing the system modules? (10 Points)

Answers:

LAST ANSWER SHEET


END OF ANSWERS

QUESTIONS of Final Exam - IS 340 Section 55143- April 26th., 2021-Monday 14-9-1442@11:15 am
EXAM QUESTIONS Page1 (Question 1 of 5)
Question I: (SO6) MCQ (Maximum 20 pts) Use ANSWER SHEET (SHEET 1 of 4)
Choose the only one answer that best fits. Each correct answer of the given eight entries carries a weight of (2.5 pts.)

1. One of the characteristics of the Unified Process approach is


a. Has iterations, where each iteration outcomes an increment that contains added or improved functionality.
b. Its executable architecture is created during the construction phase.
c. Developed without focusing on use case requirements.
d. Focus on addressing all risks in the Elaboration phase
2. In the Unified Process (
a. The remaining functional requirements are collected from users
b. The building the system is established along with all kinds of constraints that are facing the project.
c. Resources are evaluated.
d. The project is developed and completed.
3. In Extreme Programming (XP) approach
a. The development is responsiveness to changing customer requirements.
b. The development is starting with the solution with extra functionality.
c. The development do
d. The development team is not responsible for giving an estimation of the time of the implemented
requirements.
4. Which of the following is not considered in the Extreme Programming (XP) approach
a. All developers take responsibility for all of the code.
b.
c. A representative of the end-users of the system should be available full time with the XP team.
d. The standards for code are followed.

5. In Agile development, which of the following statements is incorrect


a. New versions are frequently delivered for evaluation
b. Automated tools are used to support development.
c. Documentations are focused on Analysis, Design and Implementation.
d. All of the above
e. None of the above
6. In the plan-driven development
a. It is based around separate development stages with the outputs to be produced at each of these stages
planned in advance.
b. In waterfall model plan-driven, incremental development is possible
c. Increments of developed software occur within activities.
d. All of the above
e. None of the above.
7. In agile development
a. The outputs from the development process are negotiated during the software development process.
b. Separate development stages with the outputs to be produced at each of these stages planned in advance.
c. Iteration occurs within activities.
d. All of the above
e. None of the above.
8. In the Sprint cycle
a. The team is directly communicating with customers.
b. The Scrum master protects the development team from external distractions.
O c. During the cycle, work done is presented to stakeholders.
d. All of the above
e. None of the above.

QUESTIONS of Final Exam - IS 340 Section 55143- April 26th., 2021-Monday 14-9-1442@11:15 am
EXAM QUESTIONS Page 2 (Question 2 of 5)

Question II: (SO6) Multiple Choice (Maximum 20 pts) Use ANSWER SHEET (SHEET 1 of 4)
Choose the only one answer that best fits. Each correct answer of the given five entries carries a weight of (5 pts.)

1. As one of the design guidelines for secure systems engineering, use redundancy and diversity to reduce risk means
a. When systems fail, for whatever reason, ensure that sensitive information cannot be accessed by
unauthorized users
b. Organize the system so that assets are in separate areas and users only have access to the information that
they need
c. Design the system to simplify recoverability after a successful attack.
d. All of the above
e. None of the above
O
2. In any networked system, which of the following is considered a security threat
a. Threats to the confidentiality of the system and its data.
b. Threats to the integrity of the system and its data.
c. Threats to the availability of the system and its data.
O d. All of the above
e. None of the above

3. As one of the design guidelines for secure systems engineering, avoid a single point of failure means
a. Ensure that a security failure can only result when there is more than one failure in security procedures.
Ob. Organize the system so that assets are in separate areas and users only have access to the information that
they need.
c. When systems fail, for whatever reason, ensure that sensitive information cannot be accessed by
unauthorized users.
d. All of the above.
e. None of the above.

4. As one of the design guidelines for secure systems engineering, Fail securely means
a. Ensure that a security failure can only result when there is more than one failure in security procedures
b. Organize the system so that assets are in separate areas and users only have access to the information that
they need
c. When systems fail, for whatever reason, ensure that sensitive information cannot be accessed by
unauthorized users.
d. Only (a and c).
e. None of the above.

QUESTIONS of Final Exam - IS 340 Section 55143- April 26th., 2021-Monday 14-9-1442@11:15 am
EXAM QUESTIONS Page 3 (Question 3 of 5)
Question III: (SO6) (Maximum 20pts) Use ANSWER SHEET (SHEET 2 of 4)
Problem on Cost/benefit Analysis:
Compare costs and benefits for two projects (A) and (B) to decide, which one to select for
investment, based on the data provided, in tables (A) and (B), below.

Table :

Year 0 Year 1 Year 2 Year 3 Year 4


1. Value of benefits $ 2000 $2500 $3000 $3500
2. Development costs -$3500
3. Annual expenses -$300 -$300 -$300 -$300
4. Net benefit/costs -$3500 --------------
1700 2200
-------------- 2700
--------------- 3200
---------------
5. Discount factor (0%) 1 1 1 1 1
6. Net present value -$3500 ------------
1700 2200
------------ 2700
------------ ------------
3200
7. Cumulative NPV -$3500 ------------
1800 ------------
400 ------------
3100 6300
------------
8. Payback period year 48889ohm days
Table B :
a year 299day

Year 0 Year 1 Year 2 Year 3 Year 4


1. Value of benefits $ 3000 $3500 $4000 $4500
2. Development costs -$4000
3. Annual expenses -$500 -$500 -$500 -$500
4. Net benefit/costs -$4000 2500
-------------- 3000
-------------- ---------------
3500 ---------------
4000
5. Discount factor (0%) 1 1 1 1 1
6. Net present value -$4000 ------------
2500 ------------
3000 ------------
3500 ------------
4000
7. Cumulative NPV -$4000 1500
------------ 1500
------------ ------------
sooo ------------
aooo
8. Payback period

year 131 1365days

year 1 182.5days

QUESTIONS of Final Exam - IS 340 Section 55143- April 26th., 2021-Monday 14-9-1442@11:15 am
EXAM QUESTIONS Page 4 (Question 4 of 5)
Question IV: (SO2)
Using the given SSD (System Sequence Diagram) and a First cut DCD (Design Class Diagram) to
develop a complete DSD (Design Sequence Diagram) (Maximum 20 pts)

Based on the two given Figures 1 and 2 (SSD and First cut DCD) below, develop a complete Design
Sequence Diagram (DSD) and put it on page 3 of Answer sheet

GIVEN [Figure-1 (System Sequence Diagram)]

GIVEN [ Figure-2 (First cut Design Class Diagram)]

QUESTIONS of Final Exam - IS 340 Section 55143- April 26th., 2021-Monday 14-9-1442@11:15 am
EXAM QUESTIONS Page 5
(continued Question 4 of 5)
HINT: Follow this process:

For each input message, extend the message to the internal objects within the :System Object.

1. From the first-cut design class diagram, identify the classes that will be required to carry out the execution of the
message. Place the corresponding objects on the design sequence diagram.

2. Beginning with the input message, identify each message that will be required for each of the included objects on
the diagram. For each message, ensure that the origin object has navigation visibility to the destination object.
Determine which object should have primary responsibility for completing the required service. Place appropriate
messages based on navigation and responsibility.

3. Name each message to reflect the service requested from the destination object. Identify and include the
parameters that the destination object will require to carry out the requested service. Identify and name any return
messages or return values that need to be returned to origin objects. This completes the Design Sequence Diagram
(DSD).

QUESTIONS of Final Exam - IS 340 Section 55143- April 26th., 2021-Monday 14-9-1442@11:15 am
EXAM QUESTIONS Page 6 (Question 5 of 5)
Question V: (SO2) (Maximum 20pts)

Use the given (Software Modules Diagram) do the following:


A. Top-Down Sequence of Testing (Maximum 10 pts)
B. Bottom-Up Sequence of Testing (Maximum 10 pts)

Based on the given figure [ Figure-3 (Software Modules Diagram)] below, do Top-Down Sequence of
Testing and Bottom-Up Sequence of Testing and put them both on page 4 of Answer sheet
REQUIREMENT A: (Top-Down Sequence of Testing) Use ANSWER SHEET (SHEET 4 of 4)
REQUIREMENT B: (Bottom-Up Sequence of Testing) Use ANSWER SHEET (SHEET 4 of 4)

GIVEN [ Figure-3 (Software Modules Diagram)]

B D

E
G I J
F H

GIVEN [ Table-1 (Integrated Modules and Stubs)]

END OF EXAM QUESTIONS Page 6


(Question 5 of 5)

QUESTIONS of Final Exam - IS 340 Section 55143- April 26th., 2021-Monday 14-9-1442@11:15 am

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy