CS Paper 1 Notes
CS Paper 1 Notes
1 Systems in organisations 2
Planning and system installation (1.1.1 - 1.1.7) 2
1.1.1 Identify the context for which a new system is planned. 2
1.1.2 Describe the need for change management. 3
1.1.3 Outline compatibility issues resulting from situations including legacy systems
or business mergers. 3
Legacy systems 3
1.1.4 Compare the implementation of systems using a client’s hardware with hosting
systems remotely. 4
Locally hosted system 4
Remote hosted system (SaaS) 4
1.1.5 Evaluate alternative installation processes. 4
Parallel Running 4
Big Bang/Direct Changeover 5
Pilot Running 5
Phased Conversion 5
1.1.6 Discuss problems that may arise as a part of data migration. 6
1.1.7 Suggest various types of testing. 6
1. Static Testing 6
2. Dynamic Testing 6
3. Alpha Testing 6
4. Beta Testing 6
5. Black-box testing 7
6. White-box testing 7
7. User acceptance testing 8
8. Automated testing 8
User focus (1.1.8 - 1.1.10) 8
1.1.8 Describe the importance of user documentation. 8
1.1.9 Evaluate different methods of providing user documentation. 8
Help files 8
Online documentation 9
Community Forums 9
1.1.10 Evaluate different methods of delivering user training. 9
Self-instruction 9
Formal classes 10
Remote / online training 10
System backup (1.1.11 - 1.1.13) 10
1.1.11 Identify a range of causes of data loss. 10
1.1.12 Outline the consequences of data loss in a specified situation. 10
1.1.13 Describe a range of methods that can be used to prevent data loss. 11
Software deployment (1.1.14) 11
1.1.14 Describe strategies for managing releases and updates. 11
Types of Updates 11
Management 12
Deployment Methods 12
1.2 System design basics 12
Components of a computer system 13
1.2.1 Define the terms: hardware, software, peripheral, network, human resources.13
1.2.2 Describe the roles that a computer can take in a networked world. 13
1.2.3 Discuss the social and ethical issues associated with a networked world. 14
System design and analysis (1.2.4 - 1.2.11) 14
1.2.4 Identify the relevant stakeholders when planning a new system. 14
1.2.5 Describe methods of obtaining requirements from stakeholders. 15
Questionnaire 15
Interviews 15
Direct observations 15
1.2.6 Describe appropriate techniques for gathering the information needed to arrive
at a workable solution. 16
1.2.7 Construct suitable representations to illustrate system requirements. 16
1.2.8 Describe the purpose of prototypes to demonstrate the proposed system to the
client. 17
1.2.9 Discuss the importance of iteration during the design process. 17
1.2.10 Explain the possible consequences of failing to involve the end-user in the
design process. 18
1.2.11 Discuss the social and ethical issues associated with the introduction of new
IT systems. 18
Human interaction with the system (1.2.12 - 1.2.16) 19
1.2.12 Define the term usability. 19
Accessibility 19
1.2.13 Identify a range of usability problems with commonly used digital devices. 19
1.2.14 Identify methods that can be used to improve the accessibility of systems. 20
1.2.15 Identify a range of usability problems that can occur in a system. 20
1.2.16 Discuss the moral, ethical, social, economic and environmental implications of
the interaction between humans and machines. 21
Negative Impacts:
● resistance,
● confusion,
● decreased productivity,
● project failure.
Managing Factors:
1. Communication (of the need for and benefits of change)
2. Training and Support
3. Recruitment → bring in suitable skill sets
State two compatibility issues that may arise when international businesses merge. [M22]
1. Language differences
a. Communication issues and different interpretations.
2. Software incompatibility
a. Newer software may not run on old hardware or may not integrate well with
legacy software, limiting functionality and leading to inefficiencies.
3. Data Transfer (structure and formats)
a. Legacy systems often use outdated data formats that may not be supported
by modern systems, requiring complex data transformation.
4. Security
a. Legacy systems may lack modern security features, making them more
vulnerable to attacks when connected with newer systems.
Legacy systems
Refers to outdated computer systems that have been superseded by newer technologies
1. higher costs for maintaining older systems as the systems may fail more frequently
with age
2. no more technical support for these systems
3. legacy systems tend to be more vulnerable to security threats due to a lack of
security updates
- full control over the hardware and - higher initial cost than remote
software, including updates, security - harder to predict total cost (maybe
configurations, and backup policies more expensive in long run with
- this allows for customisation and maintenance payments)
can tailor the system more easily to - have to maintain yourself (hire IT
their specific needs without needing personnel).
to adhere to the limitations of
external providers.
- locally hosted systems can offer
high performance with reduced
latency as all data processing
happens on-site.
Pilot Running
- New system is introduced in one of the sites (pilot site/group) then introduced to
others if successful, suitable for organisations with multiple sites.
- risk limited to the pilot group - higher local risk → subset of users
- all features are fully trialled; in the pilot group, there is no backup
- if the new system fails, only if the new system fails
a small part of the
organisation suffers; staff
who were part of the pilot
can train other staff
- cheaper than parallel
- less staff and work involved
Phased Conversion
- Convert one module of system at a time
- risk limited to specific system - higher local risk → if the new system
component fails, there is no fall back for that
- small change each time part
- longer ease in period - training period and implementation
takes longer
- allows people to get used to
the new system; training of
staff can be done in stages
Issues:
1. incompatible with file formats in the new system
a. If the new system cannot read or properly interpret the file format from the old
system, data may be corrupted or lost during migration.
2. incompatible data structures
a. result in a mismatch of data
3. different validation rules
a. may not meet the validation criteria in the new system, leading to rejected
data
4. data misinterpretation
a. due to conventions in different countries e.g. date, measurements, currencies
Testing is important (at every stage) to make sure the system operates in line with user
requirements/as intended;
To prevent the end user being dissatisfied with the final system;
Methodology: testing what the system is supposed to do, from the point of
view of the user, with no knowledge of how the program does
what it does
Objective: to verify the internal workings and logic of the code, ensuring
that it behaves correctly at a granular level.
Methodology: testing the system from the point of view of the programmer,
with full knowledge of how it does what it does
Outline one reason why accurate user documentation is necessary for a system [M22]
Importance →
Online documentation
- web service hosted by the system's developer to provide user documentation
Community Forums
- Community forums allow users to ask questions, share insights, and access a
library of articles, often moderated by support staff or user community members.
Formal classes
- classroom setting, free discussion
- cheap option for large amounts of - class sizes may be too big
staff - cant deal with individual
- structured learning environment problems and questions
- expert on hand to answer questions - resource intensive
- curriculum designed to teach all - Time, teachers, facilities
aspects, including ones that might - rigid schedule and curriculum
be misunderstood or difficult to
grasp
Types of Updates
1. Patches
a. small pieces of software designed to fix specific problems or security
vulnerabilities in existing programs. Patches are typically released more
frequently than updates and are used to quickly address issues that have
been discovered in the software.
2. Updates
a. periodic release of software that typically includes new features, add minor
functionalities, and bug fixes. Updates are usually released to improve the
overall user experience and bring new functionality to the software
b. free
3. Upgrades
a. new version of software that replaces an older version. Upgrades typically
include significant changes to the software and may involve the addition of
new features, enhancements, and bug fixes. Upgrades are usually released
to bring the software up to date with the latest technology and to address
compatibility issues with other software or hardware
b. paid
4. Releases
a. final, working applications gone through testing
Management
Deployment Methods
1. Manual Downloads
a. updates and patches are made available for download on a vendor's website
or a software repository, such as the Microsoft Update Catalog. The end user
must manually download and install the updates on their own.
b. or email sent to the registered user with a link to download the update
2. Automatic Updates
a. Cookie is placed on the machine which communicates with the developer
automatically when software is started up. If an update is available, updates
and patches are automatically downloaded and installed on the end user's
device.
3. System Center Configuration Manager (SCCM)
a. This is a centralised management tool used by organisations to manage
updates and patches across their entire infrastructure. SCCM allows
administrators to deploy updates and patches to specific groups of devices,
such as those in a particular geographic location or those used by a specific
department
1.2.2 Describe the roles that a computer can take in a networked world.
Email server Message transfer agent that transfers electronic messages from
one computer to another in a network
DNS (Domain Name Server that translates web addresses written in letters (more
Server) memorable for humans) to the numeric IP (Internet Protocol)
address
1.2.3 Discuss the social and ethical issues associated with a networked
world.
Issue Description Social and Ethical Implications
Privacy and Extensive data collection Users face compromised privacy, raising
Surveillance and tracking reduce user concerns about rights and trust in digital
privacy. spaces.
● End-users
○ have specific requirements for the system's functionality, usability, and
performance.
● IT department
○ responsible for implementing, maintaining, and supporting the new system.
They will have concerns about the technical requirements of the system and
the resources needed to deploy and maintain it.
● Regulators
○ responsible for ensuring that the new system complies with relevant
regulations and standards. They will have concerns about the security and
privacy of the system and the protection of sensitive data.
Questionnaire
- Can be closed/restricted (yes/no, box checking) or open/unrestricted (free
response questions)
Interviews
- Face-to-face with verbal responses
- can observe non-verbal behaviour - data is hard to summarise/ evaluate/
- more reliable, valid data analyse
- unstructured interviews can reveal - time-consuming to get detailed
more questions that otherwise results
wouldn’t have been addressed
- more detail, depth
Direct observations
- On-site observation of different departments to see where things can be more
efficient
1.2.11 Discuss the social and ethical issues associated with the
introduction of new IT systems.
Same as 1.2.3
Issue Description Social and Ethical Implications
Privacy and Extensive data collection Users face compromised privacy, raising
Surveillance and tracking reduce user concerns about rights and trust in digital
privacy. spaces.
Factors:
complexity / simplicity / amount of effort to get a result / number of errors with the time taken
to move past them;
readability / comprehensibility / reading or writing speed;
learnability / time to accomplish tasks on the first use;
effectiveness ( user performance);
efficiency (time needed to complete a task);
Accessibility
Device Specific:
- PCs, digital cameras, cell phones, games consoles, MP3 players and other
commonly used digital devices.
- Mobile Phone
- Size of screen
- Difficult to accurately select the correct character on the virtual
keyboard;
- difficult to see/use especially in poor light
- Battery life- may need to recharge regularly, inconvenient
- (CBA)
Summary:
- shitty UI → confusing, difficult to find stuff
- slow performance → difficult to do stuff in a timely manner
- security
1. e-Ticketing
a. Difficult navigation: The process of purchasing tickets online can be
confusing, with a poorly designed website or a confusing layout that makes it
difficult for users to find what they are looking for.
b. Slow performance: The website may be slow to load or slow to process
transactions, making it difficult for users to complete their ticket purchase in a
timely manner.
c. Security concerns: Users may be concerned about the security of their
personal and financial information when making purchases online.
2. Online Payroll
a. Complex user interface: The online payroll system may have a complex user
interface that is difficult for users to navigate and understand, leading to
confusion and frustration.
b. Inadequate feedback: The system may not provide adequate feedback to
users, making it difficult for them to know what is happening and whether their
actions are having the desired effect.
c. Data accuracy: Users may be concerned about the accuracy of the data that
is being entered into the system, as errors can lead to incorrect paychecks or
other problems.
3. Scheduling
a. Unreliable software: The scheduling software may be unreliable, leading to
crashes or other problems that can be difficult for users to recover from.
b. Limited customization options: The scheduling software may have limited
customization options, making it difficult for users to personalize their
schedules and meet their specific needs.
c. Inadequate documentation: The scheduling software may come with
inadequate documentation, making it difficult for users to learn how to use it
effectively.