Name of the Institute : National Institute of Electronics and Information Technology (nielit.gov.in)
Name of the Course : A Level Course
Subject Code/Name : A5R4/Structured System Analysis And Design
Document Type : Old Question Paper
Location : India
Website : nielit.gov.in
Download Model/Sample Question Paper :
January 2012 : https://www.pdfquestion.in/uploads/nielit.in/7078-jan12A5-R4.pdf
JULY 2012 : https://www.pdfquestion.in/uploads/nielit.in/7078-jul12A5-R4.pdf
January 2013 : https://www.pdfquestion.in/uploads/nielit.in/7078-jan13A5-R4.pdf
JULY 2013 : https://www.pdfquestion.in/uploads/nielit.in/7078-jul13A5-R4.pdf
January 2014 : https://www.pdfquestion.in/uploads/nielit.in/7078-jan14A5-R4.pdf
July 2014 : https://www.pdfquestion.in/uploads/nielit.in/7078-jul14A5-R4.pdf
NIELIT Structured System Analysis Sample Paper
A5-R4:
PART ONE
(Answer all the questions)
1. Each question below gives a multiple choice of answers. Choose the most appropriate one and enter in the “tear-off” answer sheet attached to the question paper, following instructions therein. (1×10)
Related : NIELIT Question Paper A Level Course Computer System Architecture : www.pdfquestion.in/7077.html
1.1 Running the system under a live environment using Live data in order to find errors is known as
A) Beta Testing
B) Alpha Testing
C) Acceptance Testing
D) System Testing
1.2 The components that make up any system is known as system
A) Boundary
B) Environment
C) Description
D) None of the above
1.3 Which of the following is tactical decision?
A) Diversification
B) Workshop Location
C) Budget Allocation
D) None of the above
1.4 In consid ering the total cost associated with desired information, cost of data collection, datainput and computer processing costs are
A) One time
B) Temporary
C) Permanent
D) Recurring
1.5 A Design conc ept which is natural extension of the information hiding concept and is definedas the strength of different elements within a module is known as
A) Coupling
B) Cohesion
C) Abstraction
D) Problem Partitioning
1.6 The main advantage of normalized relations in RDBMS is that they
A) Are highly secure
B) Do not suffer from anomalies during delete and update operations
C) Occupy minimal storage
D) All of the above
1.7 Which phase of Waterfall model decides whether the system is worthwhile or not?
A) Requirement Analysis
B) Feasibility Analysis
C) Coding
D) System Design
1.8 Pseudo code is
A) False logic
B) Programming aid
C) Both A) and B)
D) Neither A) nor B)
1.9 Entities, attributes and relationship are associated with
A) Logical concepts of data
B) Physical concepts of data
C) Persons of an organization
D) None of the above
1.10 Which of the following tool of structured Analysis uses narrative statements to describe a procedure?
A) Data Dictionary
B) Warnier–Orr Diagrams
C) Structure Chart
D) Structured English
2. Each statement below is either TRUE or FALSE. Choose the most appropriate one and ENTER in the “tear-off” sheet attached to the question paper, following instructions therein. (1×10)
2.1 A decision support system need not necessarily use computer graphics.
2.2 Systems approach involves studying each element of system deeply and assuming that the interaction between elements is weak.
2.3 It is necessary to specify output requirements before determining the content of the output.
2.4 Module coupling refers to the relationship among elements within a module.
2.5 The procurement process for hardware starts after system analysis.
2.6 Each data flow in the DFD has a corresponding entry in the data dictionary.
2.7 In decision tables, for each rule, there can be more than one condition being true.
2.8 Program specifications should be prepared after the system is accepted and implemented.
2.9 A cost benefit analysis calculates the break even point.
2.10 A data structure is a set of data items that are related to one another.
PART TWO
(Answer any FOUR questions)
5. a) What is SRS document? What are the major characteristics of SRS?
b) What are the objectives of input design? Discuss the different methods, which are used for Input verification and Control? (7+8)
6. a) Discuss the various levels of security on Local Area Networks.
b) Write short notes on contents of Feasibility Analysis reports and project requests contents. (7+8)
7. a) Enumerate the steps of structured Design Methodology.
b) List and illustrate the primary uses and elements of a decision table with rules which should be followed in constructing decision tables.
c) What is the role of the audit control trail in conversion? Who performs it? Explain. (5+5+5)
8. a) Elaborate the concepts of Coupling and Cohesion with reference to modular design approach.
b) Elaborate the technical and interpersonal skills required in a System Analyst.
c) What is a form? Summarize the characteristics of action, memory and report forms. (5+5+5)
9. Write short notes on the following:
a) Delphi Method and Brain storming
b) Dichotomous and multiple choice questions
c) BPR (Business Process Reengineering)
d) Pay back method of evaluation
e) Object oriented approach v/s Module oriented approach (3×5)
View Comments (1)
where is the answers??