Analysis of questions for ISAD (Information System Analysis and Design)

Questions for ISAD (Information System Analysis and Design)

There has been too many rants about the past experiences of students who have taken the ISAD course which is Information System Analysis and Design. In this post, I had enumerated all the possible questions, there references and later I would post a detailed information on what points one should consider when preparing to pass the examinations. Rememeber, these are my own analysis from the past question papers and I am in no way eligible to promote future upcoming questions. If these questions repeat, it’s purely co-incidential and if not, I am not responsible. It’s only a quick was to make you prepared in 5 days!

So my list of questions for the upcoming (2014 onward) and beyond goes here!

  • What is meant by the term risk management?
  • What is meant by risk containment?
  • What is clean decmposition and neat arrangement in modular design approach?
  • What are the different approaches in Software design?
  • What are the shortcomings of a Data Flow Diagram (DFD[s])?
  • What are the differences in a flow chart and a structural chart?
  • What is software documentation?
  • What are the different types of Software Documentation?
  • What are the disadvantages of Classical waterfal model?
  • Discuss about the prototype model.
  • Compare and explain briefly different life cycle models (SDLC models)
  • Write the names of different types of software testing with it’s definitions.
  • Write different types of unit testing.
  • Explain Quality Assurance (QA).
  • What is quality factor in Quality assurance?
  • What are open and closed systems?
  • Define System with an example.
  • What is a sub-system?
  • Name the different typpes of systems.
  • What is an ER-Diagram? Give an example.
  • What is system testing and prototyping?
  • What is meant by user interface design?
  • Explain DSS
  • What are the important elements of a system?
  • What is a spiral model?
  • State advantages of Spiral model.
  • What is DFD? Discuss different symbols in DFD
  • Explain Generalizationa and Specialization.
  • What is post-implementation review? explain!
  • Why is system training essential to implement a new system?
  • What are the differences between a logical and a physical design?
  • Define pseudo code with an example.
  • State the merits and the de-merits of decision table.
  • State the general guidelines for writing structure english procedure.
  • Explain feasibility study of a project.
  • What are the uses of feasiblity study?
  • Write down the major steps of documentation.
  • What is meant by coupling and cohesion?
  • What are the different types of Cohesion?
  • What are the different types if coupling?
  • When is a module called functionally independent?
  • What is meant by incremental model? Give an example.
  • What is black-box testing?
  • What is white-box testing?
  • How is black-box testing different from a white-box test?
  • What is meant by physical and logical DFD?
  • What are context diagrams?
  • What are the major responsibilities of a system analyst?
  • What is a model?
  • List out different system development models.
  • What are the various types of spiral model?
  • Why is spiral model called meta-model?
  • What is meant by process description?
  • Define prototype.
  • Explain Top-down and bottom-up approach of prototype model.
  • Explain the various operations of feasibility study phase and system design phase of SDLC.
  • List out reasons why Software Project becomes a success.
  • List out reasons why Software Project becomes a failure.
  • What are databases?
  • What is a data warehouse?
  • Define DBMS.
  • What is an Entity in terms of databases?
  • What is a primary key in terms of a database?
  • What is a candidate key in terms of a database?
  • What is a Alternate key in terms of a database?
  • What is a super key in terms of a database?
  • What is Data Dictionary?
  • what are the advantages of data dictionary?
  • What are the types of Data Dictionary?
  • Write down various properties of a primary key in database.
  • Define Normalization. Explain 1NF to 3NF through an example.
  • Define partial functionaly dependency and transiitive functional dependency.
  • Explain COCOMO.
  • What is the importance of Debugging?
  • Distinguish between software verification and software validation.

Now these questions are not the end. Never focus on grades, try learning new things. The point is to analyze teh questions in such a way that resembles a pattern. using this pattern, deduce down the last years repetitave questions and try writing them down in a hardcopy and read the resources I post on om next post at this section. I am trying to cover all the aspects keeping in mind a 60% coverage since the topics covered is vast and university is dumber enough to put everything at once. There is no escaping, however if you act clever and analyze wise, I am sure you’ll see a pattern in the questions. I have worked on the “Computer Architecture” pattern analysis for the questions and deduced out a 80% hit rates on those questions which are always (if not 50% of the time) repeated over years. But however, this does not seem to happen with Information System Analysis and Design.

Here are some deduced short note question which might hit off teh boundaries of expectation! Keeping it straight, these are the exact topics:

  1. Black Box Testing
  2. Maintainees and it’s types
  3. Decision Analysis
  4. Cyclomatic Complexity
  5. CASE Tools
  6. SRS (Software Requirement Specification)
  7. Break Even Analysis
  8. Data Dictionary
  9. WBS (Work Break-Down Structure)
  10. System Testing
  11. Decision Table
  12. Decision Tree
  13. UML Diagram

There will be detailed topic which I would be including in my next post with resources, if you are curious to know the “Computer Architectural” Notes and posts/resources and references I had made and chalked out questions with dissected deduction possibilities, check out here

Until then, I would have to roger out!

Undefined security voodoo people..

I might not had added this before but since it’s too deep and possibly very deeper to understand various people, this post is dedicated to the morons I had met in past and intend to meet in the future. Life is no shorter than what I initially thought. Morons make lifespan seem more longer than it actually is. Now, some people may cal us the ‘voodoo people’ because we  stay awake late night working on problems and understanding things. It’s not on us to always judge what we do, but it is only us who can judge ourselves. It so happens that people who are in quest to innovate something must be first put to an endless criticism, moronic situations, and real world sociological problems to which they must deal with at an intense shutter speed rate all the time.

This happened me in the past and has been happening to me now. This post is for them, if found in good conditions; alike minds can take a peek at and know they are not the only ones left from the situations described here. The situations been very brightly put up to you to make you feel defeated at times. These situation could be communication, friends, family, finances and a whole range of more moronic useless points which have no real solutions and stop your efforts to know the unknown and solving your own curiosity. To be on the personal side, most of my early days of my research faced problems from the social side and now has lately been limited to friends, college, and roommates since I had to somehow shift town to make myself up to the research I was pursuing.

To pinpoint the troubles, I will lie down some energetic points which I had been facing and am facing now.

  • Trouble with communicating to people who have persistent level of low understanding
  • Some are not spiritually awake, and even in their own problems, they teach me what spiritualism is
  • College professors trying to outsmart everyone else and think they know everything after having a M.Tech certification
  • There are other problems including roommate complaining about night wake policies and not being able to sleep because of the keystroke sounds
  • Complains from remote phone which would be made by parents to really not know what’s going on
  • Rumors from friends and suspecting me of doing job which is beyond their explanation
  • The above happens due to absence at college, brief absence..

There are more but no limited to rumors of the old blatant moronic thinking society, peer pressure to attend parties where you just get drunk and never really will be likely around the people who have the same mindset. Bu same mindset I mean to talk on ground basics of something which puts you to thinking and solving problems out of the reality check sake.  We do security, we do coding, that’s what we can surely (at least me) can try finding among the local community parties. To be honest, I only found some of them who have the actual curiosity to even arrange those parties if not Defcon, Toorcon, Nullcon or Malcon. But these are conferences and they are not like local chapters, it’s more like spending to attend keynotes and spend time with security voodoo people. That’s not what I call local parties. That’s a party where you attend to meet people more broad who might have no residency at your town. Now, there is more to this, with changing lifestyles, there are more people into fake their possessions they really do not possess at the first place. You will find girls bragging all day about clothes, people screaming on faces about how much pocket-money he/she can spend over the next upcoming mobile set and absolutely forgetting about the real tech smart! not tech savvy, but you call this as making up to something you are truly not! we see things from the other side, voodoo people!


Hands on Computer Architecture.

This could be a quite good start for me, not just because of the academic syllabus; but this also introduces me to ASM and the interior computer set language. I could later use all the gained information to Buffer Overflows and deeper exploitation like stack exhaustion, stack overflow, heap sprays, etc later for my penetration tests. I think this was a great move for the academic course I enrolled in. Sad that this has to move faster aligned strictly to the academic syllabus here.

After I looked down to the syllabus, I found these topics to be included for the detailed study.

  1. Microprocessor 8085 features.
  2. Bus structure.
  3. Data Representation.
  4. Register Transfer and Micro-operations.
  5. Central Processing Unit.
  6. Pipelining.
  7. Vector Processing.
  8. Computer Architecture.
  9. Input-Output Organization.
  10. Memory Organization.
  11. CPU Architecture.
  12. Instruction Format.
  13. Addressing Modes.
  14. Stacks.
  15. Interrupt Handling.
  16. Basic Computer Organization and Design.
  17. Programming with ASM.
  18. Micro-programmed Control.

Previously, I did some research level study on it; I ended up with mass junk information which I pulled out from IITD training sessions. They were on Youtube, the channel list had great topics and theory lectures to browse and learn from. I then ended up documenting some of my study in hardcopy. Following are some samples.

In continuation to this plus what I had already did, I would take this up to next level, so that this doesn’t stick to to benefit my academic curriculum but also my private research which assists me with different penetration testing vectors. Resources and shares will be posted to this thread at the end. I have no idea about the beyond part, because I guess particular series of topics will be posted later to this blog in an attempt to complete the penetration testing sections. The following sees the academic portion prescribed by the West Bengal university only and sticks around it. This isn’t complete information however; to complete this you’ll need to go through the resources I give you and follow them as well. But prior to following them, you should have a basic kickstart here because that will strengthen you up!

I also looked down to the assignments I had been given to pick a clue of what the instructor could had setup the paper for the next upcoming exams (that is exactly tomorrow!). It’s always a thrill to do things at the last moment, but hey I am not that dumb either; i could do this. I will post a quick reference since you’d be wondering, if you have a best book to subscribe to! for e-learners like myself, I had been able to figure out the best book which could be applied to this subject. It’s the 3rd edition of Morris Mano on computer Architecture. You could google it away, there are torrents to it but for a quick hit, here’s the direct download link on google share:

If you need the torrent for the book (and not the answer keys to the book as well), follow the below link:

The share also covers the answer key manual with the book itself. You don’t have to depend on your teachers now to teach you stuff, which you could easily know in better ways. Now for those who are more curious about references to videos, follow the list here:

You just need to download the videos from 1 upto 14 to complete the whole courses. Others are an extension. I had been struggling long nights to end this and today I had my hands on to write some basic on from the lectures. What I would do is summarize the whole lectures in a cronological way, and write down points related to what Ajit Pal had been talking in his series of Computer Architecture. Let’s begin with his first lecture and end to the last.