Loading...
Back to Unit

Systems analysis and design

Unit: Information Communication Technology

Premium Topic Resources

Sign in to download the full Topic PDF and enable offline revision mode.

Login to Access
Join the community! 550+ students upgraded in the last 24 hours. Limited Discount Seats Available

Practice CPA Information Communication Technology Systems analysis and design questions with detailed answers and explanations.

Access past exam questions by topic, improve your understanding, and download PDF for offline revision.

April 2026

1 Questions
Question 5
​ ​​Unity Bank is developing an Artificial Intelligence (AI) powered loan assessment platform. 

 Required:
 (a) Stakeholder resistance has emerged during requirements gathering. 

 (i) Highlight TWO causes of user resistance. 

 (ii) Recommend TWO strategies for effective change management.

(b) The AI system relies on large datasets. 

 Evaluate FOUR data governance challenges associated with big data and machine learning systems. 

 (c) Artificial Intelligence is transforming accounting and governance.

 Examine FOUR ethical, professional and workforce implications of AI adoption in the accounting or governance profession. 

 (d) Evaluate FOUR ways Systems Development Life Cycle (SDLC) manages risks in AI-based system development. 


Answers and Explanations are locked.

Login to View Answer

December 2025

3 Questions
Question 4d
​​Analyse THREE reasons why models are used in software or systems development.


Answers and Explanations are locked.

Login to View Answer
Question 2b
​ ​​Highlight FOUR key objectives of system requirements elicitation.


Answers and Explanations are locked.

Login to View Answer
Question 1d
​ ​​Explain SEVEN key experts involved in systems analysis and design.


Answers and Explanations are locked.

Login to View Answer

August 2025

2 Questions
Question 7d
​​Describe FIVE events that might spark an iterative process in software development.


Answers and Explanations are locked.

Login to View Answer
Question 7b
​​Highlight FIVE advantages of using a prototype during system development.


Answers and Explanations are locked.

Login to View Answer

April 2025

2 Questions
Question 5b
​​Explain the following concepts in system theory: 

(i) Equifinality.     
                                                                                                                                
(ii) Entropy.     


Answers and Explanations are locked.

Login to View Answer
Question 2b
​​Discuss FOUR techniques used to measure the effectiveness of system maintenance.


Answers and Explanations are locked.

Login to View Answer

December 2024

5 Questions
Question 7
​​(a) Outline FOUR features that should be considered when choosing a presentation software. 
 
(b) Distinguish between “incremental backup” and “differential backup”.   
 
(c) Maureen Bett was required to outline system specifications to be used in a proposed information system.  
 
 Describe THREE typical contents of the specification document.       
  
(d) Citing an example in each case, explain THREE methods of linking worksheets in a spreadsheet.


Answers and Explanations are locked.

Login to View Answer
Question 6
​​(a) Outline TWO strategies to overcome each of the following challenges in electronic commerce:  
 
(i) Security challenge. 
 
(ii) High competition challenge. 
 
(iii) High customer acquisition costs.
 
(iv) Challenges in maintaining customer trust. 
 
(b) Identify FOUR features to look for when selecting an accounting software for use in an organisation. 
 
(c) Highlight FOUR potential benefits of implementing Internet of Everything (IoE) in businesses.  
 
(d) Examine FOUR benefits of conducting a post-implementation review (PIR) of an information system project.     


Answers and Explanations are locked.

Login to View Answer
Question 4
​​(a) Describe FOUR ways in which an information system supports decision-making within an organisation.  
 
(b) Explain FOUR benefits of using goal seek in financial analysis. 
 
(c) Examine THREE benefits of prototyping in identification and clarification of user requirements. 

(d) Currently, the use of wireless data transmission media has increased. However, it still faces many challenges. Evaluate THREE such challenges. 


Answers and Explanations are locked.

Login to View Answer
Question 2
​​(a) Explain TWO process management activities of an operating system.    
 
(b) Explore FOUR roles of edge computing in Internet of Things (IoT). 
 
(c) Highlight FOUR measures that could be used to minimise unethical Information Communication Technology (ICT) practices in an organisation. 
 
(d) Discuss FOUR steps carried out during system requirements elicitation process. 


Answers and Explanations are locked.

Login to View Answer
Question 1
​​(a) Highlight FOUR ways of recovering data lost through accidental erasure.     
 
(b) Describe FOUR activities that are carried out during information system implementation phase.    
 
(c) Outline SIX ways in which the internet can be used in banking and finance. 
 
(d) Examine SIX challenges businesses face when integrating enterprise applications for business process integration.  


Answers and Explanations are locked.

Login to View Answer

August 2024

5 Questions
Question 6
​​(a) Outline THREE characteristics of mobile cloud computing application.   
 
(b) Explain FOUR services offered by an Internet Service Provider (ISP).     
 
(c) Highlight FOUR circumstances that would necessitate an organisation to use mail merge feature in a word 
processing program.   
 
(d) List FOUR disadvantages of prototyping in systems analysis and design.   
 
(e) Describe FIVE major activities of an operating system with regard to process management.


Answers and Explanations are locked.

Login to View Answer
Question 7
​​(a) Discuss THREE activities involved during information system requirements elicitation process. 
 
(b) Outline FOUR activities of an operating system in regard to management of secondary storage. 
 
(c) Describe FOUR environmental impact of ICT in business.    
 
(d) The introduction of new information technology raises new ethical, social, and political issues that must be dealt with on an individual, social, and political levels.  
  
 Discuss THREE moral dimensions raised by these issues. 


Answers and Explanations are locked.

Login to View Answer
Question 5
​​(a) State TWO factors that determine the choice of data collection method.        
 
(b) List THREE deliverables produced during the systems analysis phase of an information system development.   
   
(c) Examine THREE ways that prototyping helps to identify and clarify user requirements.            
 
(d) Giving TWO examples in each case, differentiate between an “application suite” and an “integrated software”.     
 
(e) Examine THREE factors that could be used to determine the capabilities of a data transmission medium.  


Answers and Explanations are locked.

Login to View Answer
Question 4
​​(a) Explain TWO circumstances that would necessiate an organisation to use the outsourcing method to acquire an information system. 
 
(b) Highlight FOUR limitations of cloud computing.
 
(c) Explain THREE circumstances that could necessitate setting up of a Local Area Network (LAN) in an organisation.
 
(d) Highlight SIX measures that could be used to minimise unethical ICT practices in an orgnisation.  


Answers and Explanations are locked.

Login to View Answer
Question 1

(a) Explain the function of an operating system in job accounting.       
 
(b) Highlight THREE ways in which operating systems authenticate users.        
 
(c) Outline FOUR functions of user documentation during the development of an information system.        
 
(d) Enumerate FIVE factors to consider when designing an information system output.           
 
(e) Information Communication Technology (ICT) has heightened ethical issues and exerted pressure on existing social arrangements. 
           
 Discuss THREE technological trends that are responsible for the above issues.


Answers and Explanations are locked.

Login to View Answer

April 2024

5 Questions
Question 4
​​(a) Describe TWO reasons that would necessitate the use of water mark on a word processing document.    
 
(b) Explain FOUR circumstances when batch operating system would be most appropriate.        
 
(c) Explain THREE types of feasibility studies that are conducted during the development of an information system.        
 
(d) Highlight SIX challenges of e-commerce in developing countries.  


Answers and Explanations are locked.

Login to View Answer
Question 7
​​(a) (i)  Identify FOUR security threats in mobile applications. 
 
      (ii)  Propose an appropriate measure to mitigate each of the threats identified in (a) (i) above. 

(b) Social concerns in information systems are a crucial aspect of the development and implementation of information systems. These concerns are related to ethical, social, political and moral issues that arise from the use of information systems. 

Examine FOUR social issues in Information Systems. 
 
(c) Describe FOUR events that might spark an iterative process in software development. 


Answers and Explanations are locked.

Login to View Answer
Question 6
​​(a) Explain TWO reasons for multi-booting.
 
(b) Implementation is an importance phase in the development of an information system. 

Describe THREE activities carried out in this phase. 
 
(c) Business owners looking to manage financial data tend to embrace two primary options; spreadsheets and accounting software. 

Evaluate THREE reasons why businesses prefer using accounting softwares.  
 
(d) Explain THREE differences between “word processing software” and “desktop publishing software”. 


Answers and Explanations are locked.

Login to View Answer
Question 5
​​(a) Outline SIX core processes for software development. 

(b) Explain TWO reasons why a major operating system must evolve over time. 

(c) Examine THREE methods that could be used to prevent social engineering related attacks. 

(d) Explain TWO advantages and TWO disadvantages of digital wallets as an ecommerce payment method.


Answers and Explanations are locked.

Login to View Answer
Question 3
​​(a) An increase in online data processing has led to increased rate of computer crimes.  
 
Describe THREE control measures that could be put in place to reduce computer crime rate in organisations.     
 
(b) Explain THREE circumstances that would necessitate the use of pilot approach during system change over.    
 
(c) Explain the following functions as used in spreadsheet application: 
 
(i) SUMIF. 
 
(ii) PMT.

(d) An organisation installed an inhouse developed application software to support their operations. 

 State FOUR advantages they would gain by using this software.  


Answers and Explanations are locked.

Login to View Answer

December 2023

4 Questions
Question 5
​​(a) Examine TWO obstacles/challenges that could be faced by organisations when implementing a management information system. 
 
(b) With respect to questionnaires, distinguish between open ended questions and closed ended questions as used in data collection.
 
(c) Enumerate SIX ways to secure e-commerce transactions from various threats.  
 
(d) Highlight SIX benefits of post-implementation review of an information systems project. 


Answers and Explanations are locked.

Login to View Answer
Question 1
​​(a) Highlight TWO benefits of linking worksheets in a spreadsheet program.  
 
(b) Outline FOUR qualities of a good system documentation. 
 
(c) Explain THREE desirable features of e-commerce websites that could enable customers find products quickly. 
 
(d) Examine FOUR challenges associated with cloud storage. 


Answers and Explanations are locked.

Login to View Answer
Question 3
​​(a) Differentiate between pilot implementation methodology and parallel information systems implementation methodologies.  
 
(b) Highlight FOUR benefits of a network operating system to an organisation. 
 
(c) Outline FOUR roles of an Information Systems Analyst. 
 
(d) Explain TWO technical trends that generate ethical concerns.    
 
(e) (i)    Distinguish between systems analysis and systems design.
  
     (ii)  Citing TWO reasons, explain the purpose of the system development life cycle.


Answers and Explanations are locked.

Login to View Answer
Question 4
​​(a) Explain TWO circumstances that would necessitate the use of speaker notes during a presentation.  
 
(b) Baraka Company limited networked their computers to enhance their operations.  
 
Outline FOUR methods they could use to maintain security for their information in the network. 
 
(c) Explain THREE ethical issues related to e-commerce for a business organisation.  
 
(d) Justify with THREE reasons why an organisation would install a tailor-made software.  


Answers and Explanations are locked.

Login to View Answer

August 2023

2 Questions
Question 5
​​(a) List FIVE limitations of computer networking.    
 
(b) Highlight FIVE reasons why an organisation may choose an off-the-shelf software package.  
 
(c) Highlight FIVE benefits of cloud storage.              
 
(d) Examine FIVE major components of e-commerce infrastructure. 


Answers and Explanations are locked.

Login to View Answer
Question 7
​​(a) Explain TWO ways in which an operating system acts as a resource manager.      
 
(b) Highlight FOUR benefits of Internet of Things (IoT) in smart home.      
 
(c) Outline SIX instances when you would recommend prototypes during system development.   
 
(d) Examine SIX benefits associated with business processes integration.


Answers and Explanations are locked.

Login to View Answer

April 2023

4 Questions
Question 2b
​​Explain techniques for eliciting user requirements during information systems development.


Answers and Explanations are locked.

Login to View Answer
Question 3a
​ ​​Explain the rationale behind applying the systems development life cycle (SDLC) during the development of information systems.


Answers and Explanations are locked.

Login to View Answer
Question 5a
​​Highlight objectives of an information’s system design


Answers and Explanations are locked.

Login to View Answer
Question 5d
​​Tujenge Ltd. is in the process of developing a new information system. A few managers are reluctant to embrace the new information system.

Required:

(i) Identify the most suitable method of system changeover to apply in the above scenario.

(ii) Outline advantages associated with the method identified in (d) (i) above


Answers and Explanations are locked.

Login to View Answer

December 2022

4 Questions
Question 6c
​​Outline benefits of conducting a feasibility study during systems development.


Answers and Explanations are locked.

Login to View Answer
Question 5d
​​Kibao Masetu, a system analyst, used the prototyping method to develop an information system for Petoka Ltd. Explain advantages of using this method.


Answers and Explanations are locked.

Login to View Answer
Question 5b
​​Highlight types of skills that a system analyst is required to have in order to effectively carry out his/her tasks.


Answers and Explanations are locked.

Login to View Answer
Question 2a
​​Outline the output products that result from the following systems development lifecycle stages:

(i) System initiation.

(ii) Requirement analysis.

(iii) Systems design.

(iv) System integration.

(v) Systems testing.


Answers and Explanations are locked.

Login to View Answer

August 2022

6 Questions
Question 1
​​(a) Suggest the ethical issues resulting from each of the following technological trends:  
 
(i) Doubling of computing power every eighteen (18) months.              
 
(ii) Rapidly declining data storage costs.
 
(iii) Advances in networking and the internet.    
 
(b) Outline four characteristics of an open system.
 
(c) Describe five moral dimensions of information systems. 
 
(d) Outline three measurers that you could include in your business continuity plan. 
 
(e) Explain the purpose of HLOOKUP as used in spreadsheet applications.  


Answers and Explanations are locked.

Login to View Answer
Question 3
​​(a) Formulate four questions that would enable you to conduct stakeholder analysis in system development. 

(b) Explain the bookmark feature in the context of the internet browsing.

(c) Identify the type of cell referencing used in the spreadsheet expressions below: 

 (i) =RANK($C$3 : $A$10,0) 

 (ii) =SUM(A$3 : A12)

(d) Differentiate between sorting and filtering as used in worksheet data management.

(e) Differentiate between proofreading and formatting a document as used in word processing. 

(f) A comprehensive backup plan is an essential tool for information security for the entire organisation. Not only should the data on the corporate servers be backed up, but individual computers used throughout the organisation should also be backed up. With reference to the above statement, discuss three components of a good backup plan.

(g) Explain each of the following terms as used in internet: 

 (i) Cookies.

 (ii) Blog.


Answers and Explanations are locked.

Login to View Answer
Question 4
​​(a) Citing three reasons, explain the importance of requirements gathering in system development.
 
(b) Justify why an information system is considered as an intellectual property. 
 
(c) Explain the following features of a presentation package: 
 
(i) Transition effects.            
 
(ii) Speaker notes. 
 
(iii) Templates. 
 
(d) The organisation where you work intends to set up a local area network.  
 
Advise your management team on three hardware components required to accomplish the above task. 
 
(e) Outline four factors that could be used when selecting the best software development methodology for a specific project. 


Answers and Explanations are locked.

Login to View Answer
Question 5
​​(a) Explain six reasons that would cause an information system project to fail during the implementation stage.

(b) In each of the following, explain how a spreadsheet program is used:

(i) Accounting.

(ii) Forecasting.

(c) Describe each of the following ethical issues in regard to computer technology:

(i) Trade marks.

(ii) Patent rights.

(d) Most organisations align their information systems functions to their business strategic plan.

Explain three benefits of this alignment.


Answers and Explanations are locked.

Login to View Answer
Question 6
​​(a) An insurance company has decided that it no longer requires a physical Head Office. Its strategic aim is to become a virtual organisation. The company’s auditors have concerns that information held by the virtual company would lack security. 

Required: 
Describe three measures that could be adopted to ensure the information in the insurance company remain secure.

(b) Highlight three challenges of prosecuting ICT cases in court.

(c) Explain four application areas of cloud computing technology in a governance/accounting services firm. 

(d) Identify five major management challenges to building and implementing information systems within an organisation. 

(e) Outline two limitations of a touch screen as an input device. 


Answers and Explanations are locked.

Login to View Answer
Question 7
​ ​​(a) Explain three legal issues involved when a person who is a resident in Kenya or your country wants to purchase a car offered for sale in Japan via a server in Hungary. Assume he is doing online purchase through e-Commerce. 

(b) John Mbululu intends to implement cloud computing in his organisation but he has several concerns about cloud computing. 
      Suggest three possible concerns for John Mbululu. 

(c) One technique for gathering requirements during system development is the use of workshops. 
     Discuss two advantages and two disadvantages of using workshops for requirements gathering.

(d) (i) To minimise resistance during system changeover, it is always necessary to involve users. Identify four different ways of involving users in the system development process.

     (ii) Explain four approaches used in system changeover. 

    (iii) Explain the significance of an information centre in an organisation.


Answers and Explanations are locked.

Login to View Answer

April 2022

3 Questions
Question 2
​ ​​(a) ABC Ltd. has opted to adopta decision support system in the restructure of its business processes. 

Required: 
(i) State three moral dimensions the company would consider from this move.

(ii) Outline three legal issues the company is likely to consider from this move. 

(b) Outline four possible causes of ICT project failure during system implementation. 

(c) (i) Explain the term "requirement elicitation" in relation to software development. 

     (ii) Explain two "requirements Elicitation" techniques. 

(d) Highlight four features of a word processing of application package.


Answers and Explanations are locked.

Login to View Answer
Question 5
​​(a) (i) Explain the term "smart home" as used in the world of technology.

(ii) Describe the importance of the "Internet of Things" in the smart home.

(b) Explain three reasons why organisations pursue business process integration.

(c) E-commerce customers should be able to find the product they are looking for quickly.

Identify three best practice features for e-commerce websites.

(d) Examine the significance of carrying out stakeholder analysis before undertaking an information systems project.


Answers and Explanations are locked.

Login to View Answer
Question 7
​​(a) The Internet of Things (loT) has grown very rapidly and emerged to be a large part of how human beings live, communicate and conduct business. While web-enabled devices are turning our global rights into a great switched-on operating area, the implementation ofIoT has several challenges.

Discuss four security challenges that accompany IoT.

(b) Identify four benefits of requirements gathering process in an information system development.

(c) (i) Identify three challenges that businesses could face in adopting e-commerce.

     (ii) For each of the identified challenges in (c) (i) above, suggest a suitable solution that businesses could use to deal with it.

(d) Summarise two common challenges encountered while using the system development life cycle (SDLC) model.


Answers and Explanations are locked.

Login to View Answer

December 2021

6 Questions
Question 2
​​(a) Discuss "sales and marketing systems" from a functional perspective. 

(b) Explain five moral dimensions of the information age in the context of information systems. 

(c) Alpha Limited is in the process of automating its operations.
     State four types of office automation systems that the company should adopt. 

(d) ABC Company intends to undertake an information systems project.
     Outline three challenges that the company is likely to face. 

(e) Explain three goals of a transaction processing system to an organisation.


Answers and Explanations are locked.

Login to View Answer
Question 3
​​​​(a) (i) Outline three models used in classifying e-commerce applications.
     (ii) Explain two security challenges encountered in digital marketing of e-commerce.

(b) Most companies have embraced the use of cloud technology though they are facing challenges in its use.
     Explain three such challenges. 

(c) Define each of the following terms as used in systems theory.
     (i)  Functional decomposition. 
    (ii)  Functional cohesion. 
    (iii) Feed-forward. 

(d) Describe four features of systems approach to information systems.


Answers and Explanations are locked.

Login to View Answer
Question 4
​​(a) Highlight four characteristics of Internet of Things (loT). 

(b) Propose four duties of an information centre in an organisation.

(c) ABC Transport company has opted to train its users before a new system is implemented.

     Suggest four benefits of training users before implementing a new information system. 

(d) Outline four advantages of using joint application design (JAD) technique in the design of an information system.

(e) (i) Define "cell referencing" in the context of spreadsheet applications.

     (ii) Using an example, explain one type of cell referencing.


Answers and Explanations are locked.

Login to View Answer
Question 5
​​(a) Describe five challenges associated with the use of internet. 

(b) (i) Define the term "system" in the context of information systems. 

     (ii) Distinguish between "physical systems" and "abstract systems". 

(c) (i) Describe the job of a Systems Analyst. 

    (ii) Outline five tasks performed by a Systems Analyst. 

(d) Study the worksheet given below and answer the questions that follow:

Inserted Image

Required:
(i) Interpret the function displayed in cell G1. 

(ii) State the value to be displayed in cell G1 on execution of the function.

(e) Veronica would like to display the progress of her project to a panel of examiners usinga presentation application. 

     Outline two ways in which she could display her presentation in slide show mode.
 


Answers and Explanations are locked.

Login to View Answer
Question 6
​​(a) Evaluate the impact of the internet on the following competitive forces:

(i) Threat of new entrants.

(ii) Suppliers' bargaining power.

(iii) Customers' bargaining power.

(iv) Substitute products or services.

(b) Outline eight activities carried out during systems analysis.

(c) Using an example, demonstrate how you would use a formula to link data between two worksheets.


Answers and Explanations are locked.

Login to View Answer
Question 7
​​(a) Describe each of the following types of information systems as used in organisations:

(i) Transaction processing system.

(ii) Management reporting system.

(iii) Decision support system.

(b) XYZ Company Ltd. intends to implement a new information system.

Explain three organisational factors that should be considered to ensure success of the system.

(c) Explain three types of applications of Internet of Things (IoT) in the government sector. 

(d) Outline two features of a word processing program.


Answers and Explanations are locked.

Login to View Answer