Answer Updated
Answer Updated
Answer Updated
1. (a) Draw DFD up to 2nd level (start from level-0) for a ‘Library
Information System’. Make necessary assumptions.
0-level and 2nd Level Missing in PDF
Components of CASE:
• Planning and management tools: Begin the development process with information
planning and project management.
• Analysis tools: These tools ensure that business requirements are correctly captured
during the analysis phase early in the development process. Analysis tools are used to
check for incomplete, inconsistent or incorrect specifications.
• Database design toolset: It suggests database design and generates system control
information.
Differ
The following are general guidelines for the design of Forms and Reports, which make
the Form, or Report more acceptable:
Meaningful Titles: The form or report should contain title that is clear and
specific. It should clearly describe the content and use of form or report. It should
also include the date on which the form or report was generated. Page heading
formats should be consistent throughout the system. For example, the date
should always appear in the same place. Column headings should clearly indicate
the contents of the columns and should be separated from the body using extra
blank lines, horizontal rule etc.
Meaningful Information: Only the information that is relevant and needed by
the user should be displayed on the form or report. Information should be
provided in such a manner that the user could use it without any modification. All
the information irrelevant to the intent of the form or report should not be
displayed.
Balanced Layout: The information should be balanced on the screen or page,
i.e., the display should not be too crowded and not too spread out. When
deciding where to put individual fields on the form or report, we should see that
the form or report is easy to understand and to use. The most important
information should be placed where they are easiest to find (generally, at the
beginning). The different fields should be separated by means of extra spaces
whenever possible so that a subsequent field expansion will not necessarily force
to redesign the entire layout. All related information should be grouped together
wherever possible. For example, name, street address and city/state/pin code
can be grouped together. Appropriate line spacing greatly enhances the
readability of a form or report. We should insert extra blank lines to indicate
where headers end and the body of information begins, where one multi-line
detail ends and the next begins, where one group of items end and another
begins, etc.
Easy Navigation: It should be possible for the user to easily move forward and
backward through the contents of form or report. At any instance, it should be
possible for the user to know where exactly s/he is. The user should be notified
when s/he is on the last page of a multi-page sequence. The user must be able to
exit or quit the report or form easily.
(b) Is system maintenance essential ? Explain different types of
maintenance.
System maintenance involves more than 80% of the total life of a software product; this
shows the importance of maintenance. System maintenance is the task of monitoring,
evaluating and modifying the information system to make necessary desirable changes
during the total life cycle of the software. Organizational requirements as perceived
during the analysis phase changes, the system has to accommodate all such changes to
make the system current and useful for the organization. Maintenance of system also
takes care of the failure and shortcomings that arise during the operation of the
information system by the end user. During the implementation phase, one person from
the system maintenance group is nominated to collect information from the user for
maintenances. Maintenance activity involves collecting requests for changes,
transforming these requests to changes, designing the changes to be incorporated and
implementing the changes in the system.
Aggregation Diagram:
Differences
Collection of source material: The very first step of any documentation process is
to acquire the required source material for preparation of document. The
material is collected including specifications, formats, screen layouts and report
layouts. A copy of the operational software is helpful for preparing the
documentation for user.
Documentation Plan: The documenter is responsible for preparation of a
documentation plan, which specifies the details of the work to be carried out to
prepare the document. It also defines and the target audience.
Review of Plan: The plan as set out in the process above is reviewed to see that
material acquired is correct and complete.
Creation of Document: The document is prepared with the help of document
generator.
Testing of Document: The document created is tested for usability as required by
the target audience.
Maintain Document: Once the document is created and distributed, it must be
kept up to date with new version of the software product. It must be ensured
that the latest document is available to the user of the software.
(b) What is cohesion? Explain any four types of cohesion
Cohesion reflects the degree to which a module conforms itself to the performance of a
single task. A simple way to check if a module is cohesive or not, is to examine each
instruction in it. If every instruction is related to the performance of a single task, then
the module is said to be cohesive. Modules should be highly cohesive. Two objectives
can be achieved if we strive to make a module cohesive. First is that the module will
perform single task. It leads to a larger degree of portability and we can directly plug in
the module in an application which requires the performance of this task. The second is
that module will be loosely coupled. Since the module is performing the single task, it
will accept the data from a superordinate module , does the requisite function and
returns the results.
Types of Cohesion:
Functional Cohesion: A module is functionally cohesive if every instruction in the
module is related to a single task. One easy way to know whether the module is
functionally cohesive or not is to examine its name. The name of the module will
usually indicate the task that is performed by it. For example, Print Grade Cards,
Generate payslips etc. are names of modules that perform a single function.
Sequential Cohesion: In this type of cohesion, all instructions in the module are
related to each other through the data that is passed to the module. If each
instruction is examined individually, it is difficult to know whether the module is
performing single function or not. But, if the module is simulated and instruction
wise simulation is examined, then we can conclude that the module is
sequentially cohesive if each instruction’s input data is the output data of the
previous immediate instruction. In other words, the concept of sequential
cohesion is similar to the concept of pipeline processing. So, in sequential
cohesion, sequencing of instructions plays a major role in the cohesiveness of the
module.
Temporal Cohesion: In this type of cohesion, instructions in a module are related
to each other only by flow of control and are totally unrelated to their sequence.
In a temporally cohesive module, execution of all the instructions may take place
at a time.
Procedural Cohesion: Any module which is not functionally cohesive is difficult to
maintain. In this type of cohesion, the sequence of instructions is important and
they are related to each other by the control flow. It is possible to make a change
in sequence, but it cannot be arbitrarily done. The execution of instructions in the
module which is procedurally cohesive usually leads to the calls to other
modules. So, the instructions in a procedurally cohesive module are related to
the instructions in other modules.
February 2021
1. (a) Draw a Data Flow Diagram (DFD) till level-3 depicting various
processes, data flow and data repositories for booking a room in
Hotel Management System. Make necessary assumptions.
(c) Write SRS outline for Hotel Management System. Make necessary
assumptions.
(d) Explain the difference between ‘‘Analysis’’ and ‘‘Design’’ phases of
Software Development
During analysis phase, the requirements are determined. In this phase, analysts work
with users to determine what the users want from a proposed system. This phase
usually involves a careful study of any existing systems, manual or computerized that
might be replaced or enhanced as part of the project. Next, the requirements are
studied and structured according to their inter-relationship and eliminate any
redundancies. After this alternative initial design is generated to match the
requirements then these alternatives are compared to determine which alternative best
meets the requirements. After analysis phase is complete, design of the system begins.
The design consists of logical and physical design of the system. During design, the
analysis converts the description of the recommended requirements into logical and
then physical system specifications. Design occurs in two phases, viz., logical design and
physical design. Logical design concentrates on the business aspects of the system. In
physical design, the logical design is turned into physical or technical specifications
2. (a) What is Data Dictionary? What are its uses? Explain with
example.
A Data Dictionary is a catalogue of all elements in a system. It consists of data about
data. It is a document that collects co-ordinates and confirms what specific data terms
mean to different people in the team.
• communicate meaning
• facilitate analysis
The coupling between the modules should be minimum. The reason for stressing the
need for minimum dependence between modules is that, if a module-1 is largely
dependent on another module-2, then, any error in module-2 will affect the
functionality of module-1. This is the case of two modules that are largely dependent on
each other. But, in the case of multiple modules being largely dependent among
themselves, the consequences of errors in one or more modules will be drastic. The
other problem with the dependency of one module on another module is related to
maintenance. If a programmer has to change the functionality of a module then he
should also make necessary changes to the internals of the modules on which the
module in question is largely dependent. It automatically leads to the disturbance of the
entire system. Such modular design usually leads to the need for development of the
system from the scratch which is going to have significant implications in terms of
efforts to be put, amount to be spent etc. If modules are independent to the extent
possible then it will become easy for the programmers to make changes in a particular
module with out making any changes in other modules. Also, it leads to a greater reuse
of the modules in multiple projects wherever the functionality of the module is needed.
Though it is desirable, it is highly possible to minimize coupling among the modules
(b) Explain the characteristics of MIS. Also list the components of MIS .
MIS Characteristics:
Components of MIS:
External Database: External databases are databases that are not owned by the
organization and the organization pays royalty to access these databases.
Examples of these databases are: databases of Market research groups,
Statistical and Demographic organizations etc. Since organization operates in a
social environment it is influenced by various external factors. Impact of theses
external factors on the long-term goal and success of organization is very
important. Top management needs to analyse data from these sources for long
term planning.
Corporate database: Corporate database stores data generated by various
business processes through transaction processing Systems. These can be
employee database, customer database, inventory database, etc.
Management database: These databases store select data from corporate
databases. It generally stores summarized information for the requirements of
managers.
MIS Software: This is used to extract and process information from various
databases. It acts as a user interface to the managers.
DBMS: Database Management System stores, retrieves and manages data on
various databases.
Communication Software: This is used to communicate with customers, suppliers
and other stakeholders of the organization. Examples are Messaging Software or
Organization’s Bulletin board.
(c) Explain the criteria and specifications to be considered while
designing Reports.
Several criteria that should be considered in order to produce good reports are given
below:
Relevance: Only the information that is relevant to the purpose of the report
should be present in the report. This is a selection process, i.e., all the relevant
information should be included and all the irrelevant information or data should
be excluded. Only required information should be printed or displayed. In on-line
reports, we should use information hiding and provide methods to expand and
contract levels of information details.
Accuracy: The data that appears on the report should be accurately recorded,
accurately transmitted and accurately transformed into summary data. Accuracy
is very important because if the data are inaccurate, then the main purpose of
the report which is to provide accurate information to the user will not be
accomplished. Incomplete data are also inaccurate.
Clarity: The information that is present on the report should be clear and
understandable. The information present should be balanced on the report, the
display should not be too crowded and not too spread out. Sufficient margins and
spacing throughout the output will enhance readability. Desired information
must be easy to locate. Comparisons, ratios, percentages, exception flags and
graphs should be used where necessary.
Timeliness: Reports must be prepared and ready for use in time. Most reports
provide information, which is used to make decisions. Hence, this information
must reach the recipients while the information is pertinent to transactions or
decisions. Information is of very little use if it arrives after the decisions are made.
Cost: Every report has two costs. First is the cost of preparation, which consists of
analysis, design, computation and distribution. Second is the cost of reading the
report and locating germane parts of it. Often the cost of reading the report is
forgotten during the calculation of costs. The reading cost can be significantly
reduced only if the appropriate information is presented clearly on the report.
The total cost should always be less than the expected benefits. Only then the
report should be prepared.
4. (a) Explain the process of design of physical records.
A Record is a collection of fields. Records are common to both databases and files.
Records are collection of fields in a predefined format. The design of physical record
involves putting the collection of fields in a single logical unit so that the fields are stored
in adjacent locations for better storage and retrieval. The main objective of the design of
physical records is to store and retrieve them efficiently. Also, the fields should be
stored in adjacent locations in such a way that the storage is used efficiently and speed
of data processing is appropriate.
Physical pages or blocks are units of information moved between disk and memory
buffers. They hold not only records, or table entries, but other information such as the
amount of free space currently available in the block, the starting position of each
record, etc. Blocks of data (pages) are normally read or written by the operating system.
Page is referred to as the amount of data written in one I/O operation of operating
system. Blocking factor refers to the number of physical records per page. If a record
size is 1340 bytes and the page size is 2048 bytes, then 708 bytes are wasted if DBMS
does not allow physical records to span different pages. Selecting a block size involves a
trade-off. In principle, the larger the block size, the fewer read-write operations need be
performed to access a file by the operating system and therefore the more efficient is
the processing. However, it requires a correspondingly large allocation of buffer space in
memory. Since this is limited (and perhaps shared by many users), there is in practice,
an upper bound. Moreover, large block sizes are primarily advantageous for sequential
access. Denormalization is the process of transforming normalized relations into
unnormalized physical record specifications. The motivation behind de-normalization is
poor performance of normalized table. The following may be of use for denormalization.
• A means for transfer of knowledge and details about description of the system
Collection of source material: The very first step of any documentation process is
to acquire the required source material for preparation of document. The
material is collected including specifications, formats, screen layouts and report
layouts. A copy of the operational software is helpful for preparing the
documentation for user.
Documentation Plan: The documenter is responsible for preparation of a
documentation plan, which specifies the details of the work to be carried out to
prepare the document. It also defines and the target audience.
Review of Plan: The plan as set out in the process above is reviewed to see that
material acquired is correct and complete.
Creation of Document: The document is prepared with the help of document
generator.
Testing of Document: The document created is tested for usability as required by
the target audience.
Maintain Document: Once the document is created and distributed, it must be
kept up to date with new version of the software product. It must be ensured
that the latest document is available to the user of the software.
5. Write short notes on the following:
June, 2020
1. (a) Draw a DataFlow Diagram (DFD) up to level-3 clearly showing
various processes, data flow and data repositories for Doctor's
appointment in a Hospital Management System. Make
necessary assumptions.
JAD session leader: The JAD leader organizes and runs the JAD. This person is trained in
group management and facilitation as well as system analysis. The JAD leader sets the
agenda and sees that it is met. The JAD leader remains neutral on issues and does not
contribute ideas or opinions but rather concentrates on keeping the group on the
agenda, resolving conflicts and disagreements, and soliciting all ideas.
(1) Users: The key users of the system under consideration are vital participants in a
JAD. They are the only ones who have a clear understanding of what it means to use the
system on a daily basis.
(2) Managers: The role of managers during JAD is to approve project objectives,
establish project priorities, approve schedules and costs and approve identified training
needs and implementation plans.
(3) Sponsors: A JAD must be sponsored by someone at a relatively high level in the
company i.e. the person from top management. If the sponsor attends any session, it is
usually at the very beginning or at the end.
(4) Systems Analysts: Members of the systems analysis team attend the JAD session
although their actual participation may be limited. Analysts are there to learn from
customers and managers, but not to run or dominate the process.
(5) Scribe: The scribe takes down the notes during the JAD sessions. This is usually done
on a personal computer or a laptop. Notes may be taken using a word processor.
Diagrams may directly be entered into a CASE tool.
(6) IS staff like systems analysts, other IS staff such as programmers, database analysts,
IS planners and data center personnel may attend to learn from the discussions and
possibly to contribute their ideas on the technical feasibility of proposed ideas or on
technical limitations of current systems.
(b) Give full form of CASE. Draw a CASE diagram showing all
components. Explain each component briefly.
CASE stands for Computer Aided Software Engineering
The following are general guidelines for the design of Forms and Reports, which make
the Form, or Report more acceptable:
Meaningful Titles: The form or report should contain title that is clear and
specific. It should clearly describe the content and use of form or report. It should
also include the date on which the form or report was generated. Page heading
formats should be consistent throughout the system. For example, the date
should always appear in the same place. Column headings should clearly indicate
the contents of the columns and should be separated from the body using extra
blank lines, horizontal rule etc.
Meaningful Information: Only the information that is relevant and needed by
the user should be displayed on the form or report. Information should be
provided in such a manner that the user could use it without any modification. All
the information irrelevant to the intent of the form or report should not be
displayed.
Balanced Layout: The information should be balanced on the screen or page,
i.e., the display should not be too crowded and not too spread out. When
deciding where to put individual fields on the form or report, we should see that
the form or report is easy to understand and to use. The most important
information should be placed where they are easiest to find (generally, at the
beginning). The different fields should be separated by means of extra spaces
whenever possible so that a subsequent field expansion will not necessarily force
to redesign the entire layout. All related information should be grouped together
wherever possible. For example, name, street address and city/state/pin code
can be grouped together. Appropriate line spacing greatly enhances the
readability of a form or report. We should insert extra blank lines to indicate
where headers end and the body of information begins, where one multi-line
detail ends and the next begins, where one group of items end and another
begins, etc.
Easy Navigation: It should be possible for the user to easily move forward and
backward through the contents of form or report. At any instance, it should be
possible for the user to know where exactly s/he is. The user should be notified
when s/he is on the last page of a multi-page sequence. The user must be able to
exit or quit the report or form easily.
(b) How can risks and threats to IT system be identified, analyzed and
managed?
Risk Assessment and Management: A thorough and proactive risk assessment is the
first step in establishing a sound security system. This is the ongoing process of
evaluating threats and vulnerabilities, and establishing an appropriate risk management
program to mitigate potential monetary losses and harm to an institution's reputation.
Threats have the potential to harm an institution, while vulnerabilities are weaknesses
that can be exploited. There are different approaches followed by organizations to
analyze risks. However, ultimately all the methods boil down to two types of
approaches: quantitative and qualitative.
Quantitative Risk Analysis: This approach although difficult to implement gives an idea
about the amount of risk involved with the event. This basically employs two
fundamental elements i.e. The probability of occurrence of the loss making event and
probability of occurrence of the event.
It is therefore possible to rank the events in order of estimated loss. But the problem
associated with the quantitative approach is estimating the probability of occurrence of
the event, also in some cases the events are interrelated making the probability
calculation even more difficult. Notwithstanding above difficulty, many organizations
have adopted and implemented this approach successfully.
Qualitative Risk Analysis: The extent of the information security program should
commensurate with the degree of risk associated with the institution’s systems,
networks, and information assets. For example, compared to an information-only Web
site, institutions offering transactional Internet banking activities are exposed to greater
risks. Further, real-time funds transfers generally pose greater risks than delayed or
batch-processed transactions because the items are processed immediately. The extent
to which an institution contracts with third-party vendors will also affect the way the
risk assessment has to be done.
Natural and man-made disasters are inevitable. Earthquake, floods, fire and terrorist
attack can severely damage organizations computing infrastructure. The disaster
recovery plan is a document containing procedures for emergency response, extended
backup operations, and recovery should a computer installation experience a partial or
total loss of computing resources or physical facilities (or of access to such facilities). The
primary objective of this plan, used in conjunction with the contingency plans, is to
provide reasonable assurance that a computing installation can recover from disasters,
continue to process critical applications in a degraded mode, and return to a normal
mode of operation within a reasonable time. A key part of disaster recovery planning is
to provide for processing at an alternative site during the time that the original facility is
unavailable.
In-House Backup: This level is the minimum acceptable and is mandatory for all
installations and application’s systems. Define in detail all in-house back up procedures,
the techniques used, files copied, frequency, etc.
Alternate Storage Area: This level of protection is necessary for mission critical
components. It consists of offsite storage of at least one copy of all AIS files and
databases, programs, and procedures necessary to operate the high priority application
systems, either at the installation or at an alternate site of operation (including copies of
contingency plans and related materials). The alternate storage area should be located
in an area reasonably accessible to the installation, but not subject to the same degree
of major threat as the site. It is recommended that, as a rule of thumb, the alternate
storage area be no closer than one mile from the site. However, the distance may vary
from location to location.
The Disaster Recovery Toolkit: The Disaster Recovery Toolkit is a highly valuable
collection of items and documents to assist in ensuring business continuity in the face of
serious incident or disaster. Many organizations use these documents as a checklist and
add element specific to their need.
3. (a) What are the steps involved for designing a database. Explain using an
example.
1. Selection of database architecture: Selecting database architecture is one of the
most challenging parts of database design for any information system. Before
deciding on the target DBMS where the database is to be implemented, few
considerations are required. Hierarchical database structure is a kind of database
management system that links records in tree data structure such that each
record has only one owner. For example an order is owned by only one customer.
It resembles a tree structure. Network database structure is more flexible
structure than Hierarchical model as well as relational model, but not preferred
due to the high processing time. A neural network is an example of network
database. Relational database structure is most commonly used database model.
The data is modeled as a mathematical relation. Reference key joins different
tables together. Indexes provide rapid access to specific record in the database.
For example, DB2, MySQL, Oracle are some RDBMS. Object Oriented Database
management system is based on object oriented paradigm. In object oriented
database, data is stored as objects and can be interpreted only by using the
methods specified by its class. A blue print of the database is a physical model. A
schema defines the database in terms of tables, keys, indexes and integrity rules.
A relational schema consists of a relation, name of the attributes in the relations
and restrictions on the relations called integrity constraints.
2. Designing Database Schema: A database schema is a set of relation schemas.
Changes to a schema or database schema are expensive. So, careful thought
must be given to design of a database schema. The following are some guidelines
for the design of a database schema.
• Each entity should be implemented as a database table.
• Each attribute should be implemented as a field.
• Each table must have a primary key and an index based on the key.
• Each table may have zero or more secondary keys.
• Appropriate foreign keys.
3. Selecting Indexes: During the process of file and database design one must
choose index based on a single field (usually the primary key) or multiple fields.
While selecting index, one must keep in mind the performance issues vis-à-vis the
issue of inserting and deleting records. While indexes can be used generously on
tables primarily used for query purpose with rare necessity to update records,
they should be used judiciously in tables that support transaction processing
which involve large insertion, updation and deletion operations. The amount of
time needed to maintain the indexes in database tables increases with the
number of rows stored. In an employee database table, one will retrieve records
based on employee name, department, or hire date. One may create three
indexes-one on the DEPT field, one on the LAST_NAME field, and one on the
HIRE_DATE field. The indexes are created on fields that appear in where clause of
select statements.
4. Estimating capacity of the database: Database administrator needs to calculate
the amount of disk space required for the database.
a. In a given table, calculate the record size by adding the sizes of various
fields in it.
b. Also, the number of records that will be present in each table at a
particular period of time should be forecast.
i. Table size = record size * number of records in the table
If there is a system which can be read easily, code easily and maintain easily, then we
can come to a conclusion that the design is fine. Any design which achieves the goals
given below can be termed as good design:
1. The design of the system should be module based. It means there are
modules which together make up the system and the organization of
these modules is hierarchical.
2. Each module controls the functions of a suitable number of subordinate
modules at the next hierarchical level.
3. One of the important features of good design is that the modules, which
make up the system don’t communicate intensively. The
communication should be kept at minimum level. The reason for this
imposition is that modules should be independent of each other to the
maximum extent possible. Independence means, “one module’s
functionality should not be dependent on the internal functions of other
module”.
4. The size of module should be appropriate as required for the features it
should possess like being relatively independent of other modules etc.
Basically, no specific size of range of size can be defined on modules
though it is done occasionally. The size varies from module to module
and from project to project.
5. A module should not be assigned the duty of performing more than one
function. 6. The coding of modules should be generic. It enables the
system to use the module as frequently as possible.
Advantages:
• A superordinate module should control not more than seven subordinate modules. Of
course, this guideline is not strict and varies from system to system.
• Usually, a module if of not more than 100 lines. It may be a minimum of 50 lines. But,
these sizes are not to be strictly followed and they may vary from system to system. It is
notable here that lesser the lines of code, easier to read.
(c) Coupling
Components of MIS:
External Database: External databases are databases that are not owned by the
organization and the organization pays royalty to access these databases.
Examples of these databases are: databases of Market research groups,
Statistical and Demographic organizations etc. Since organization operates in a
social environment it is influenced by various external factors. Impact of theses
external factors on the long-term goal and success of organization is very
important. Top management needs to analyse data from these sources for long
term planning.
Corporate database: Corporate database stores data generated by various
business processes through transaction processing Systems. These can be
employee database, customer database, inventory database, etc.
Management database: These databases store select data from corporate
databases. It generally stores summarized information for the requirements of
managers.
MIS Software: This is used to extract and process information from various
databases. It acts as a user interface to the managers.
DBMS: Database Management System stores, retrieves and manages data on
various databases.
Communication Software: This is used to communicate with customers, suppliers
and other stakeholders of the organization. Examples are Messaging Software or
Organization’s Bulletin board.
(b) Describe the role of forms as means of input to the system and report as the means
of output of the system with the help of suitable examples for each.
Like a form on paper that is used to fill out information with a pen or pencil, a Form in computer
terminology identifies the data we want to collect. It also allows us to enter data into the database,
display it for review and also print it for distribution. However, an electronic form has several important
advantages over standard paper forms. These have the advantage of using a computer database and are
more versatile and powerful than paper forms. Examples of forms are Business forms, Electronic spread
sheet, ATM transaction layout, etc.
A report is the information that is organized and formatted to fit the required specification. It is a
passive document that contains only predefined data and is used solely for viewing and reading. Reports
can be printed on paper, or these may be transferred to a computer file, a visual display screen, etc.
Reports are the most visible component of a working information system and hence they often form the
basis for the users and management’s final assessment of the systems value. Examples of reports are:
invoices, weekly sales summaries, mailing labels, pie chart, etc.
(c) Discuss any two standards for documentation of software project.
The Documentation Standard defines various aspects of documentation such as style, format, and the
document revision/change process of these documents.
The International Standards, ISO/IEC 12207 – Software life cycle process, describes documentation as
one of the supporting parallel process of software development process. It may be noted that this
standard is not documentation standard but describes the process of documentation during the
software development process. The following are other documentation standards:
1. ISO/IEC 18019: Guidelines for the design and preparation of user documentation for application
software This standard describes how to establish what information users need, how to determine the
way in which that information should be presented to the users, and then how to prepare the
information and make it available. It covers both on-line and printed documentation. It describes
standard format and style to be adopted for documentation. It gives principles and recommended
practices for documentation.
2. ISO/IEC 15910: Software user documentation process This standard specifies the minimum process
for creating user documentation for software that has a user interface, including printed documentation
(e.g., user manuals), on-line documentation, help text and on-line documentation systems.
3. IEEE 1063: Software user Documentation It provides minimum requirement for structure, information
content and format for user documentation. It does not describe the process to be adopted for
documentation. It is applicable for both printed and on-line documentation.
2. (a) Draw E-R diagram for "Visitor's Management System". Make necessary
assumptions.
(b) Develop SRS for "Visitor's Management System". Make necessary assumptions.
3. (a) List and discuss the importance of various types of feasibility studies.
(b) Explain the process and technical related issues in software maintenance.