1. System Fundamentals Flashcards

1
Q
  1. Define the term ‘computer system’ and explain its main functions. (3 marks)
A
  • Definition: An interconnected set of hardware and software components (1).
    • Functions: Processes data, stores data, and outputs information (1).
    • Key role: Facilitates task automation and supports decision-making (1).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. List the main hardware components of a computer system and briefly describe the role of each. (5 marks)
A
  • Central Processing Unit (CPU): Executes instructions (1).
    • Memory (RAM): Temporarily holds active data and instructions (1).
    • Storage: Permanently holds data, e.g., hard drive or SSD (1).
    • Input Devices: Allow user interaction, e.g., keyboard, mouse (1).
    • Output Devices: Display information, e.g., monitor, printer (1).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Explain the difference between hardware and software, and give two examples of each. (4 marks)
A
  • Hardware: Physical components, e.g., CPU, hard drive (1).
    • Software: Programs/instructions for hardware, e.g., OS, apps (1).
    • Example of hardware: e.g., RAM, monitor (1).
    • Example of software: e.g., spreadsheet, web browser (1).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Describe the roles of application software and system software, and provide an example of each type. (4 marks)
A
  • System Software: Manages hardware, e.g., OS like Windows (1).
    • Application Software: User-specific tasks, e.g., word processor (1).
    • Example of System Software: e.g., macOS, Linux (1).
    • Example of Application Software: e.g., MS Word, Photoshop (1).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Define ‘feasibility study’ and ‘requirements specification’ in system development. (4 marks)
A
  • Feasibility Study: Assesses viability of the proposed system, including cost, resources, and time (2).
    • Requirements Specification: Detailed document of system features and functions to guide development (2).
      (TELOS)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Explain the importance of understanding user requirements in the SDLC. (4 marks)
A
  • Ensures system meets user needs (1).
    • Reduces costly changes later (1).
    • Improves user satisfaction (1).
    • Enhances system usability and effectiveness (1).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Outline the main stages of the SDLC and briefly describe the purpose of each stage. (6 marks)
A
  • Planning: Defines project scope and objectives (1).
    • Analysis: Gathers user requirements and identifies needs (1).
    • Design: Outlines system architecture and layout (1).
    • Development: Builds the system based on design specs (1).
    • Testing: Verifies the system meets requirements and is error-free (1).
    • Maintenance: Provides ongoing support and updates (1).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Explain two advantages and two disadvantages of prototyping in system development. (4 marks)
A
  • Advantages: Improves requirement clarity (1); Increases user involvement (1).
    • Disadvantages: May lead to scope creep (1); Can increase development time if overused (1).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Discuss the role of stakeholders in the system development process, providing examples. (4 marks)
A
  • Role: Provide input on system requirements and feedback (1).
    • Key Stakeholders: Users, developers, project managers, financial managers (2).
    • Example: Users give feedback on usability needs (1).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Describe the differences between parallel, phased, and direct system implementations. (6 marks)
A
  • Parallel: Old and new systems run together temporarily (2).
  • Phased: System implemented in stages (2).
  • Direct (Big Bang): Immediate switch to new system; old system retired (2).
  • Pilot: System implemented in department/ small part of business
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. Explain ‘data migration’ and describe two challenges associated with it. (4 marks)
A
  • Definition: Process of transferring data from old to new system (1).
    • Challenge 1: Data compatibility issues (1).
    • Challenge 2: Data integrity loss during transfer (1).
    • Challenge 3: Possible data corruption or loss (1).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. Discuss the importance of testing in system implementation and explain two types of testing. (5 marks)
A
  • Importance: Ensures system reliability and user satisfaction (1).
    • Functional Testing: Verifies system functions correctly (2).
    • User Acceptance Testing (UAT): Confirms system meets user needs (2).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. Explain what a ‘pilot run’ is in system implementation and discuss its advantages. (3 marks)
A
  • Definition: Limited system rollout to a small group for testing (1).
    • Advantages: Identifies issues before full launch, minimises risk (2).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. Define corrective, adaptive, and perfective maintenance, and explain why each is necessary. (6 marks)
A
  • Corrective: Fixes bugs and issues (2).
    • Adaptive: Updates system to meet new needs (2).
    • Perfective: Enhances performance/features for user benefit (2).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Discuss the importance of regular system evaluation and describe two performance evaluation criteria. (4 marks)
A
  • Importance: Ensures system efficiency and meets changing needs (1).
    • Criteria 1: System uptime/reliability (1).
    • Criteria 2: User satisfaction/feedback (1).
    • Criteria 3: Cost-effectiveness or ROI (1).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Explain why system documentation is important for maintenance and provide two examples. (4 marks)
A
  • Importance: Ensures system can be updated and maintained by others (1).
    • Example 1: User manuals (1).
    • Example 2: Technical specifications (1).
    • Example 3: Maintenance logs (1).
17
Q
  1. Describe ‘legacy systems’ and discuss one challenge in maintaining or upgrading them. (4 marks)
A
  • Definition: Outdated systems that may still serve critical functions (2).
    • Challenge: Compatibility with modern hardware/software (2).
18
Q
  1. Define ‘usability’ in HCI and provide two examples of usability features in software. (4 marks)
A
  • Definition: How easy and efficient a system is to use (2).
    • Example 1: Clear navigation/menu structure (1).
    • Example 2: Customizable interface (1).
19
Q
  1. Explain the purpose of accessibility features in computer systems and give two examples. (4 marks)
A
  • Purpose: Makes systems usable for people with disabilities (2).
    • Example 1: Screen readers for visually impaired users (1).
    • Example 2: High-contrast mode for colorblind users (1).
20
Q
  1. Describe the importance of user-centred design and discuss two techniques for collecting user feedback. (5 marks)
A
  • Importance: Ensures system meets actual user needs (1).
    • Technique 1: Surveys/questionnaires (2).
    • Technique 2: Usability testing sessions (2).
21
Q
  1. Discuss two ethical issues related to data privacy and security in computer systems. (4 marks)
A
  • Issue 1: Unauthorised access or data breaches (2).
    • Issue 2: Misuse of personal data, e.g., selling user data without consent (2).
22
Q
  1. Explain the digital divide and discuss one way to reduce its impact on society. (4 marks)
A
  • Definition: Gap in access to digital technology (2).
    • Solution: Increase access to affordable internet and devices (2).
23
Q
  1. Describe how environmental considerations might influence computer system design. (3 marks)
A
  • Considerations: Energy efficiency, recyclable materials, reduced e-waste (3).
24
Q
  1. Explain the importance of data security and describe two methods for securing data. (5 marks)
A
  • Importance: Protects against unauthorised access and data loss (1).
    • Method 1: Encryption to secure data (2).
    • Method 2: Strong authentication methods (2).