The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.
Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by Coet Kms, 2019-11-29 03:15:11

Case Base Learning

case_base_learning

Keywords: kms

Developing Independent Learning in Vibrant Environment
SAMPLE OF MATERIALS: LECTURER & STUDENT
LECTURER’S MATERIALS

CHAPTER 3: INTERNET TECHNOLOGY
Teacher’s Notes
Subject areas

Computer Science
Topics

3.0 INTERNET TECHNOLOGY: 3.1.4 Classification of Network
Level

Matriculation (One Year Program, Semester 1)
Audience/Prerequisites knowledge

 Students have already been exposed with the topic from attending lecture.
 Students have lecture notes for the topic.
Learning Objectives
At the end of this topic, students should be able to:
1. Differentiate Local Area Network, Metropolitan Area Network and Wide Area

Network.

41

Developing Independent Learning in Vibrant Environment

Case Content

Trans Tech Gone Global: Expanding and Centralizing All Branches bring them to
be the leading IT companies in the Asia.
Trans Tech Gone Global is an IT company where the headquarters is located in Shah
Alam. Currently Trans Tech has 4 other branches all over Malaysia which operates
individually. This company plans to open their 5th branch in Singapore. In conjunction
with the opening of the 5th branch, Trans Tech has decided to centralise all branches
including the 5th branch in Singapore so that all operation can be monitored from the
headquarters. Due to the centralization of all branches to the headquarters and also the
recent expansion of the main office, Shah Alam branch will experience slow internet
connection since they are using a broadband connection with low bandwidth. This
problem is to be discussed and solved before the opening of the Singapore branch. The
Singapore branch will consist of 5 different departments namely Admin, Human
Resource, Finance, IT and Warehouse. Each department will be provided with 10
computers, 4 printers, a few peripheral devices and its respective equipment except for
warehouse with only 2 computers and other related peripherals and equipment.

Although this company has 4 operating branches, they also provide door-to-door
sales for big companies where their mobile salespersons are required to do sales all
over Malaysia. It is very important for these salespersons to have first-hand information
about the product knowledge and the stock level for each of the equipments. They
should be able to access the internal network of their respective branches and if needed,
access the network of headquarters as well. For this purpose, each sales person is
provided with a laptop for them to take along all destinations. This will prevent from any
sales hiccups since Trans Tech has become a reputable company in Malaysia.

With the opening of the 5th branch and centralizing all branches to the
headquarters, Trans Tech is prone to be seen as one of the leading IT companies in the
Asia.

42

Developing Independent Learning in Vibrant Environment

Please answer the following question based on the article:

Question 1:
Suggest a suitable network classification Trans Tech can use to centralise all branches
to the main office in Shah Alam.
Suggested Answer: Wide Area Network

Question 2:
Justify why you have chosen the respective network for question number 1.
Suggested Answers: Because WAN covered a wide geographical area of network.

Question 3:
Suggest an alternative solution if Trans Tech has decided to cut in cost by reducing the
cabling cost and other peripherals and equipment.
Suggested Answer:
Optimize the usage wireless technology to replace the physical cable. Buy the
peripherals and equipment direct from the factory etc.
Any relevant and logical answer.

Question 4:
Suggest a network topology that can be used in each department of Singapore’s branch.
Suggested Answer: Star Topology

Question 5:
Briefly explain the classification of network used by the mobile salespersons in order to
access the internal network of their respective branches from the clients’ office.
Suggested Answer: Virtual Private Network

Question 6:
Identify the network classification that Singapore’s branch should use in each of their
department.
Suggested Answer: Local Area Network (LAN)

43

Developing Independent Learning in Vibrant Environment

Question 7:
“Due to the centralization of all branches to the headquarters and also the recent
expansion of the main office, Shah Alam branch will experience slow internet connection
since they are using a broadband connection with low bandwidth”. Suggest a solution to
overcome this problem.
Suggested Answers: 1. Upgrade their bandwidth, 2. Change to another Internet Service
Provider that offer better internet coverage and better bandwidth.
Any relevant and logical answer.

Suggested Lesson Plan and Teaching Techniques
Suggested lesson plan
Below are the suggested lesson plans for one tutorial session (50-55 minutes).
Note: Lecturer may change the suggested time accordingly
Suggestions may include how to spend the time in class, how to organize the discussion
group, and how to arrange the lesson for students to report their findings and solutions
1. Introduce the case ( 5 minutes )
2. Individual preparation ( 10 minutes )
3. Small group discussion ( 15 minutes )
4. Various Learning activities ( 10 minutes )
5. Presentation ( 5 minutes )

Note: Select a group to present, while others just submit their task to lecturer
6. Large group discussion ( 10 minutes )

44

Developing Independent Learning in Vibrant Environment

Suggested teaching techniques
1. Explain the purposes of using case study to students
2. Distribute the Case Study Material – For Students
3. The case study should start according to Learning Schedule
Note: Learning Schedule stated in Case Study Material – For Students
4. Lecturer will be facilitating during the session

Assessment Guidelines

Guideline to assess students’ performance
To achieve the Learning Outcomes, students will be assessed by using the form below.
Before students working with the case, lecturers will explain to them about particular areas
so that they will know the areas on which they should focus

Items Particulars Needs Improvement
Satisfactory
Good
Excellent

1. Able to identify suitable network.

2. Able to identify suitable equipments and
peripherals for a network.

3. Able to identify the suitable network topology.

4. Able to explain the suitable classification of
networks.

5. Able to give solutions based from the network
problem.

Specific comments

45

Developing Independent Learning in Vibrant Environment
Supplementary worksheets
None
Hints for the case
Students should imagine themselves as a IT executive \ sales person in Trans Tech in order
blend themselves with the situation
References
 Turban E. et al. (2010). Introduction to Information Technology (7th Edition). New

Jersey: John Wiley & Sons Inc.
 K. C. Loudon and J. P. Laudon (2007). Management of Information System; (7th

edition). ISBN-10: 0130330663, ISBN-13: 978-0130330666, Prentice Hall.
 Shelly, G. B., & Vermaat, M. E. (2009). Discovering Computer 2011 Complete. Boston:

Course Technology Cengage Learning

46

Developing Independent Learning in Vibrant Environment
CHAPTER 4: COMPUTER SECURITY
Teacher’s Notes
Subject areas

Computer Science
Topics
4.0 COMPUTER ETHICS AND SECURITY: 4.2 Computer Security

4.2.1 Computer Security Risks
4.2.2 Security Measures
Level
Matriculation (One Year Program, Semester 1)
Audience/Prerequisites knowledge
 Students have already attended lecture session
 Students have lecture notes for the topic
Learning Objectives
At the end of this topic, students should be able to:
1. Define computer security risks.
2. Identify types of security risks.
3. Identify different ways to overcome security risks.

47

Developing Independent Learning in Vibrant Environment
Case Content

Zalora Online Transition to Secure Information System – A Simple Case Study

Zalora is an online trading company that is selling women and man’s merchandises such
as shoes, clothes and accessories.

 It was founded more than 3 years ago and has been serving more than half a
million of customers via online

 It offers more than 5,000 thousands producst at a time and has a mutual links
with others online trading company

About DefCon Solutions
DefCon Solutions is a company specialised in cyber security consultancy. As a cyber
security consultant, DefCon has many clients from various sectors such as trading,
banking, online investment and retail business. As a senior IT security executive in
DefCon, Mr. Hadif has a responsibility to ensure that all cyber security risks for their
clients are handled professionally by their team. DefCon also will inform and consistently
advice their clients about the security risks.

Problems in Zalora’s Website
Zalora’s website has been down for 3 days. Their customers cannot access the

website and are redirected to another non related website. The lost was estimated to
about 50 thousand ringgit to the company per day as the orders and transaction could
not be performed as usual. To solve and prevent this problem, DefCon service is
engaged by Zalora. Mr. Hadif was given the task to handle the problem and give the
consultancy to Zalora.

48

Developing Independent Learning in Vibrant Environment

Please answer the following question based on the article:

Question 1:
In your opinion what types of security breach happened in Zalora’s case? Explain why.
Suggested Answer: Phishing or relevant and logical answer.
.
Question 2:
Mr. Hadif needs to explain to Zalora's Managing Director, on why their website cannot be
accessed by their customer. Using you own words, what do you think Mr.Hadif would
have explained to Zalora’s management.
Suggested Answer: Zalora’s website is infected by a security treat. Most probably it was
infected by phishing where phishing is the malicious code that will send the user un-
related website from the Zalora website.
Any relevant and logical answer.
.
Question 3:
What types of potential security risks that should be advised to Zalora that they should be
aware of? Lists down the computer security risks. Explain how the security risks that
you have listed are related to Zalora type of business.
Suggested Answer: Trojan Horse, Packet Sniffing, Denial of Service, Phishing, any other
relevant security treats.
The risks that are listed are related to Zalora because the nature of business that is
running by Zalora. Zalora businesses involve their client’s personal information such as
credit card data etc.
Any relevant and logical answer.

Question 4:
What types of security measures that should be taken by Zalora to prevent the problem
from occurring again? Gives your opinion and explain how that security measures will
help Zalora.
Installation of a good firewall protection in Zalora network. They will also have to update
their anti virus on their server regularly. This security measures will help them to protect
their server and network. Zalora also has to set up their own IT unit that has the expertise
to manage their server and network.
Any relevant and logical answer.

49

Developing Independent Learning in Vibrant Environment
Question 5:
To create awareness among Zalora staffs, Mr. Hadif is requested to give a briefing to
their Zalora’s staffs. Help Mr. Hadif to create awareness among Zalora’s staffs such as
the safe method of using email, a secure file transferring, computer and internet etiquette
and user awareness. Use your own words to explain it.
Creating a good human awareness among staffs is the most important aspects in any
company. Zalora’s staffs will be adviced to control their Internet usage from inside the
company network. This is to avoid the spread of unnecessary malicious code.
Any relevant and logical answer.

50

Developing Independent Learning in Vibrant Environment
Suggested Lesson Plan and Teaching Techniques

Suggested lesson plan
Below are the suggested lesson plans for one tutorial session (50-55 minutes).
Note: Lecturer may change the suggested time accordingly
Suggestions may include how to spend the time in class, how to organize the discussion
group, and how to arrange the lesson for students to report their findings and solutions
1. Introduce the case ( 5 minutes )
2. Individual preparation ( 10 minutes )
3. Small group discussion ( 15 minutes )
4. Various Learning activities ( 10 minutes )
5. Presentation ( 5 minutes )

Note: Select a group to present, while others just submit their task to lecturer
6. Large group discussion ( 10 minutes )

Suggested teaching techniques
1. Explain the purposes of using case study to students
2. Distribute the Case Study Material – For Students
3. The case study will start according to Learning Schedule
Note: Learning Schedule stated in Case Study Material – For Students
4. Lecturer will facilitate during the session

51

Developing Independent Learning in Vibrant Environment

Assessment Guidelines

Guideline to assess students’ performance
To achieve the Learning Outcomes, students will be assessed by using the form below.
Before students working with the case, lecturers will explain to them about particular areas
so that they will know the areas on which they should focus

Items Particulars Needs Improvement
Satisfactory
Good
Excellent

1. Able to identify the security risks.

2. Able to explain the security risks.

3. Able to identify the security measures.

4. Able to explain the security measures that should
be taken depending on the situation.

Specific comments

52

Developing Independent Learning in Vibrant Environment
Supplementary worksheets
None.
Hints for the case
Students should imagine themselves as Network Security Executive / Expert.
References
 Shelly, G. B., & Vermaat, M. E. (2009). Discovering Computer 2011 Complete. Boston:

Course Technology Cengage Learning

53

Developing Independent Learning in Vibrant Environment
CHAPTER 6: DATABASE
Teacher’s Notes
Subject areas

Computer Science
Topics
6.0 DATABASE: 6.2 Basic Concepts of Database

6.3 Database Object
Level

Matriculation (One Year Program, Semester 2)
Audience/Prerequisites knowledge

 Students already attended lecture session
 Students have lecture notes for the topic
Learning Objectives
At the end of this topic, students should be able to:
1. Explain the basic concept of database.
2. Explain the functions of database object.

54

Developing Independent Learning in Vibrant Environment

Case Content

Mums Choice Online Shopping: Mothers and Babies - A Simple Case Study

Mums Choice is an online shopping company that is in operation since 2010. Their main
business is selling mothers’ and babies’ products via the internet. As an online shopping
company, Mums Choice uses an Information System (IS) to run its operation. The IS has
a database that stores the information for Product Preferences, Customer Contact and
Product Sales. The database has 3 tables which is Product Preferences, Customer Info
and Product Sales.

The Product Preferences table stores data about Product ID, Product Name,
Product Type, Product Characteristics and Customer ID. Customer Contact Table store
data about Customer ID, Customer Name, Customer Address and Customer Phone
while Product Sales Tables contain data such Product ID, Product Name, Product Price,
Product Cost, and Customer ID.

Initially, Mums Choice only had one store that they used to keep all of their
products. After a year when quantities and types of the products increased, Mums
Choice’s management decided to open a few more stores in different locations. This
decision of opening new branches has affected the way of storing the information in the
database. In the existence of new stores in different location, an additional of a table
named ‘Store’ is recommended to be added in the database.

55

Developing Independent Learning in Vibrant Environment

Please answer the following question based on the article:
Question 1:
How many tables are currently used in the Mums Choice Information System database?
State the tables.
3 tables. The tables are Product Preferences, Customer Info and Product Sale.

Question 2:
Draw the tables that you mentioned above. Identify and show the primary key and
foreign key in the tables.
Students have to draw the tables based from what they have learned in lecture.
Refer to 6.2 notes.

Question 3:
Design the Entity Relationship Diagram (ERD) that shows the relationship among the
entities. State the cardinality between the entities.
Students have to design the ERD based from what they have learned in lecture.
Refer to 6.2 notes.

Question 4:

Based on the questions above, prepare a data dictionary for the database. You need to

identify the suitable data type for each field.

i. Product Preferences table

Field Data Type

Product ID AutoNumber

Product Name Text

Product Type Text

Product Characteristics Text

Customer ID AutoNumber / Text

ii. Customer Info table – draw accordingly
iii. Product Sales table - draw accordingly

56

Developing Independent Learning in Vibrant Environment
Question 5:
Identify the attributes in the ‘Store’ table and prepare the table (as suggested in Question
2).
Students have to design the ‘Store’ table from what they have learned in lecture.
Refer to case study to identify the particular attributes and 6.2 notes.
Question 6:
Sketch a design of a Form for Store table.
Students have to design the sample of a Form for Store Table.
Question 7:
Name the process in order to locate a product name in the database.
The process is called Query

57

Developing Independent Learning in Vibrant Environment
Suggested Lesson Plan and Teaching Techniques

Suggested lesson plan
Below are the suggested lesson plans for one tutorial session (50-55 minutes).
Note: Lecturer may change the suggested time accordingly
Suggestions may include how to spend the time in class, how to organize the discussion
group, and how to arrange the lesson for students to report their findings and solutions
1. Introduce the case ( 5 minutes )
2. Individual preparation ( 10 minutes )
3. Small group discussion ( 15 minutes )
4. Various Learning activities ( 10 minutes )
5. Presentation ( 5 minutes )

Note: Select a group to present, while others just submit their task to lecturer
6. Large group discussion ( 10 minutes )

Suggested teaching techniques
1. Explain the purposes of using case study to students
2. Distribute the Case Study Material – For Students
3. The case study will start according to Learning Schedule
Note: Learning Schedule stated in Case Study Material – For Students
4. Lecturer will facilitate during the session

58

Developing Independent Learning in Vibrant Environment

Assessment Guidelines

Guideline to assess students’ performance

To achieve the Learning Outcomes, students will be assessed by using the form below.
Before students working with the case, lecturers will explain to them about particular areas
so that they will know the areas on which they should focus

Items Particulars Needs Improvement
Satisfactory
Good
Excellent

1. Able to identify fields and tables in a database.

2. Able to identify the primary key and foreign key
from the tables.

3. Able to design Entity Relationship Diagram.

4. Able to identify data type in a field.

5. Able to design a Form for a table.

6. Able to identify the process to display Report &
Query

Specific comments

59

Developing Independent Learning in Vibrant Environment
Supplementary worksheets
None.
Hints for the case
Students should imagine themselves a Database Administrator.
References
 Coronel, C. Morris, S & Rob, P. 2011. Database Systems Design, Implementation and

Management (9th Edition). Boston: Course Technology Cengage Learning.
 K. C. Loudon and J. P. Laudon (2007). Management of Information System; (7th

edition). ISBN-10: 0130330663, ISBN-13: 978-0130330666, Prentice Hall.
 Shelly, G. B., & Vermaat, M. E. (2009). Discovering Computer 2011 Complete. Boston:

Course Technology Cengage Learning.

60

Developing Independent Learning in Vibrant Environment
CHAPTER 7: INFORMATION SYSTEM
Teacher’s Notes

Subject areas
Computer Science

Topics
INFORMATION SYSTEM: 7.2 System Development Life Cycle (SDLC)

Level
Matriculation (One Year Program, Semester 2)

Audience/Prerequisites knowledge
 Students obtained fundamental knowledge from lecture.
 Students have prepared notes obtained from lecture.

Learning Objectives
At the end of this topic, students should be able to:
1. Identify the steps of system development life cycle.
2. Describe each steps of system development life cycle.

61

Developing Independent Learning in Vibrant Environment

Case Content

Bagusmart Hypermarket: Adapting Technology for improving and upgrading their
business - A Simple Case Study
Bagusmart is a chained grocery shop that sells all groceries’ needs. Their motto is
‘providing every family’s needs in one roof’. The grocery shop started as a family
business since year 2000. Their first store was opened in Banting, Selangor. To-date
they have a total of 15 branches around Selangor. Since the opening of their first shop till
present, Bagusmart management does not have any Information System to handle their
inventories, stocks, payroll and financing. Everything was done either by using manual
records or by using a simple stand-alone system such a Store Keeper’s System. The
stand-alone system was developed by one of their ex-staff with minimal functions using a
simple DBMS application program.

As their business developed, the Managing Director of Bagusmart, Mr. Hadif
expressed his intention of having an automated Information System that can improve
and upgrade their business to be more efficient, systematic and reliable. He feels that it
is important for Bagusmart to have a proper system since they are expanding quite
rapidly over the years. Failing to do so may cause inefficient management that might
cause Bagusmart to fail its operation which will bring great loss to the company.

In order to materialize this plan, Mr. Wafiy, a System Analyst was hired and
given a task to handle this project. As the requirement stated, the Information System
will have to automate all the necessary functions and link all the branches in a single
system within a certain budget. This system must be able to be used in all branches and
monitored by the home branch. Therefore, Mr. Wafiy was given a month to do the
necessary and produce a convincing System Proposal so that Mr. Hadif can all the
needed action in developing an Information System for Bagusmart.

62

Developing Independent Learning in Vibrant Environment

Based on the article given, answer the following questions:

Question 1:
As a System Analyst, what will be the first thing that Mr. Wafiy should do in regards to the
project? Explain why the action is important and needed.

Suggested answer:
Requirement Gathering and Analysis: This phase is basically the brainstorming phase
and often consists of sub-stages like Feasibility Analysis to check how much of the idea
can be put into action.

Question 2:
Mr. Wafiy will not handle the project himself. Please explain who will be joining Mr. Wafiy
in this project by providing the roles of everyone you have mentioned.

Suggested answer:
The steering committee, vendors, programmers, network administrator, data analyst,
managers, users.

Question 3:
What is the best method to gather all the necessary information for this project? Why do
you think this method is the most suitable chosen by you?

Suggested answer:
#1: One-on-one interviews-There are many good ways to plan the interview, but
generally you want to ask open-ended questions to get the interviewee to start talking
and then ask probing questions to uncover requirements.

#2: Brainstorming - The appropriate subject matter experts get into a room and start
creatively brainstorming what the solution might look like. After all the ideas are
generated, the participants prioritize the ones they think are the best for this solution. The
resulting consensus of best ideas is used for the initial requirements.
Or Choose any suitable and logic answer given by students

63

Developing Independent Learning in Vibrant Environment

Question 4:
In your opinion, what is the approach that Mr. Wafiy should use in Detailed Analysis;
Process Modeling or Object Modeling? Explain your answer.

Suggested answer:
The detailed investigation of the system is carried out in accordance with the objectives
of the proposed system. This involves detailed study of various operations performed by
a system and their relationships within and outside the system. During this process, data
are collected on the available files, decision points and transactions handled by the
present system. Interviews, on-site observation and questionnaire are the tools used for
detailed system study. Using the following steps it becomes easy to draw the exact
boundary of the new system under consideration:

 Keeping in view the problems and new requirements
 Workout the pros and cons including new areas of the system
All the data and the findings must be documented in the form of detailed data flow
diagrams (DFDs), data dictionary, logical data structures and miniature specifications. It
includes planning for the new system, analysis of requirement, system constraints,
functions and proposed system architecture, prototype of the proposed system and its
analysis.

Question 5:
It is important that the Information system for Bagusmart is maintained properly and
periodically. Explain what will be the risks if the maintenance phase is not conducted for
this project.

Suggested answer:
Maintenance is necessary to eliminate errors in the system during its working life and to
tune the system to any variations in its working environments. It must meet the scope of
any future enhancement, future functionality and any other added functional features to
cope up with the latest future needs. There are always some errors found in the systems
that must be noted and corrected. Failing to do so will cause system to breakdown and
become inefficient and useless to the company. Also it will open opportunity for threats
and viruses that may jeopardize the company.

64

Developing Independent Learning in Vibrant Environment

Question 6:
Using this case study as an example, explain the importance of having a good
documentation for the whole project. What are the potential risks if there were no
documentation of poor documentation?
Documentation in this project used to communicate, instruct and record the information
for any reference or operational purpose. They are very useful for representing the formal
flow of the present system. With the help of documentation it is very easy to track the
flow of the system's progress and they working of the system can be explained very
easily.
It helps to provide the clear description of the work done so far. It is essential that the
documents prepared must be updated on regular basis this will help to trace the progress
of work easily. With appropriate and good documentation it is very easy to understand
the how aspects of the system will work for the company where the system is to installed.
It is also help to understand the type of data which will be inputted in the system and how
the output can be produced.
After the system is installed, and if in case the system is not working properly it will be
very easy for the administrator to understand the flow of data in the system with
documentation which will help him/ her to correct the flaws and get the system working in
no time.

65

Developing Independent Learning in Vibrant Environment
Suggested Lesson Plan and Teaching Techniques

Suggested lesson plan
Below are the suggested lesson plans for one tutorial session (50-55 minutes).
Note: Lecturer may change the suggested time accordingly
Suggestions may include how to spend the time in class, how to organize the discussion
group, and how to arrange the lesson for students to report their findings and solutions
1. Introduce the case ( 5 minutes )
2. Individual preparation ( 10 minutes )
3. Small group discussion ( 15 minutes )
4. Various Learning activities ( 10 minutes )
5. Presentation ( 5 minutes )

Note: Select a group to present, while others just submit their task to lecturer
6. Large group discussion ( 10 minutes )

Suggested teaching techniques
1. Explain the purposes of using case study to students
2. Distribute the Case Study Material – For Students
3. The case study will start according to Learning Schedule
Note: Learning Schedule stated in Case Study Material – For Students
4. Lecturer will be facilitate during the session

Note: Materials may be given prior to lesson for preparation purposes.

66

Developing Independent Learning in Vibrant Environment

Assessment Guidelines

Guideline to assess students’ performance

To achieve the Learning Outcomes, students will be assessed by using the form below.
Before students working with the case, lecturers will explain to them about particular areas
so that they will know the areas on which they should focus

Items Particulars Needs Improvement
Satisfactory
Good
Excellent

1. Able to identify phases in SDLC

2. Able to understand activities in the phases

3. Able to understand the terms used in SDLC

4. Able to identify the participants in SDLC

5. Able to understand the whole problem in the right
context

6. Able to suggest solution related to the phases

7. Able to describe each steps of SDLC

Specific comments

67

Developing Independent Learning in Vibrant Environment
Supplementary worksheets
For this sample of case study, lecturer can suggest students to refer to sub topic of IS –
System Development Life Cycle as below

Hints for the case
Students should imagine themselves as part of the Project Development Team in order
blend themselves with the situation
References
 Turban E. et al. (2010). Introduction to Information Technology (7th Edition). New

Jersey: John Wiley & Sons Inc.
 K. C. Loudon and J. P. Laudon (2007). Management of Information System; (7th edition)

. ISBN-10: 0130330663, ISBN-13: 978-0130330666, Prentice Hall.
 Shelly, G. B., & Vermaat, M. E. (2009). Discovering Computer 2011 Complete. Boston:

Course Technology Cengage Learning

Developing Independent Learning in Vibrant Environment
CHAPTER 8: PROGRAMMING
Teacher’s Notes
Subject areas

Computer Science
Topics

PROGRAMMING: 8.3 INTRODUCTION TO C++
Level

Matriculation (One Year Program, Semester 2)
Audience/Prerequisites knowledge

 Students already attended lecture session
 Students have lecture notes for the topic
Learning Objectives
At the end of this topic, students should be able to:
1. Identify the components of C++
2. Identify various basic data types and their usage
3. Clarify operations on variables and operators that can be used in a program
4. Specify the precedence and associatively of operators
5. Write expression in correct syntax
6. Write a program segment

69

Developing Independent Learning in Vibrant Environment

Case Content

‘All-You-Can-eat’ Buffet Restaurant; A new facelift. – A Case Study

Aleesha has just opened an ‘all-you-can-eat’ buffet restaurant in Jalan Telawi, Bangsar.
All-you-can-eat buffets are a brilliant concept where customers pay a fixed amount and
everything on the table is for them to sample. Aleesha’s buffet consists of a huge variety
of Japanese and local/Western dishes, from sashimi to sushi to tempura and fresh
seafood, and even Malaysian favourites such as wanton and satay. It's a perfect place
for gatherings, birthday parties, tour groups & company dinner. With its incredible design
and special lighting, it’s got just the right amount of style and comfort.

Since Aleesha’s restaurant is new, there are many problems that need to be solved
and one if it is the related to the cash register. Aleesha is facing a problem where there is
no proper record of the number of customers in her restaurant every day. She is finding it
difficult to keep track of the number of buffet sets she sells each day to her customers.
Since she keeps track of customers’ payment manually using a generic receipt book, she
is also worried if her staffs are not being trustworthy. Every day, her restaurant will be
crowded with many customers but her profit margin is lower than expected. For this
reason, she needs a proper system to help her keep track of the number of customers,
no of buffet, buffet type and also to track the payment through printing out the receipt to
be kept as record and to be given to customers.
Aleesya’s restaurant schedule:

Buffet Price per-Head Buffet Hour
Buffet Lunch RM78.00++ 11:30~16:20 [Weekday& PH]

Buffet Dinner RM88.00++ 17:00~21:30 [Weekday& PH]

Buffet Supper RM78.00++ 21:40~23:40 [Weekday& PH]

Aleesha is hoping that her restaurant will run smoothly without any hiccups and she is
willing to try all means to solve her problem. She was advice to consult a programmer to
solve her problem.
If your group is the team of programmer that Aleesha consulted, what would your answer
be for the following questions?

70

Developing Independent Learning in Vibrant Environment
Please answer the following question based on the article:
Question 1:
What is the best way to solve Aleesha’s problem?
Suggested answer:
to create a system that can

 Calculate the number of set buffets according to the buffet type ordered by
customers on every order.

 Calculate the total payment that customers should pay.
 Calculate the balance payment that the cashier needs to give in case of over

payment.
 Keep record of grand total of buffet sold and total collection for each day.
 Print receipt for customers and restaurant for record keeping purpose.
Question 2:
You are using C++ and ready to start with the coding, explain to other programmers how
you would declare the variables and its type for the system suggested above.
Suggested answer:
Variables: num_cust, num_buffet, buffet_type, buffetlunch_price, buffetdinner_price,
buffetsupper_price, total_price, cust_payment, balance, char name[25], cashier_id.
Type: int, float, char
Question 3:
Write a segment of program that can prompt the cashier to enter cashier’s name and
cashier ID
Suggested answer:
cout>> ‘Cashier Name: ’;
cin<<”name”;
cout>>”\n”;
cout>>’Cashier ID :’ ;
cin<<”cashier_id”;
Question 4:
Identify the most appropriate control structure and write a segment as a sample to be
presented to your fellow programmers.
Suggested answer:
Selection and repetition

71

Developing Independent Learning in Vibrant Environment
Suggested Lesson Plan and Teaching Techniques

Suggested lesson plan
Below are the suggested lesson plans for one tutorial session (50-55 minutes).
Note: Lecturer may change the suggested time accordingly
Suggestions may include how to spend the time in class, how to organize the discussion
group, and how to arrange the lesson for students to report their findings and solutions
1. Introduce the case ( 5 minutes )
2. Individual preparation ( 10 minutes )
3. Small group discussion ( 15 minutes )
4. Various Learning activities ( 10 minutes )
5. Presentation ( 5 minutes )

Note: Select a group to present, while others just submit their task to lecturer
6. Large group discussion ( 10 minutes )

Suggested teaching techniques
1. Explain the purposes of using case study to students
2. Distribute the Case Study Material – For Students
3. The case study will start according to Learning Schedule
a. Note: Learning Schedule stated in Case Study Material – For Students
4. Lecturer will facilitate during the session

72

Developing Independent Learning in Vibrant Environment

Assessment Guidelines

Guideline to assess students’ performance

To achieve the Learning Outcomes, students will be assessed by using the form below.
Before students working with the case, lecturers will explain to them about particular areas
so that they will know the areas on which they should focus

Items Particulars Needs Improvement
Satisfactory
Good
Excellent

1. Able to understand case requirement
2. Able to list down problems that needs solving
3. Able to identify various basic data types
4. Write expression in correct syntax

Specific comments

73

Developing Independent Learning in Vibrant Environment
Supplementary worksheets
For this sample of case study, lecturer can suggest students to refer to sub topic Introduction
to C++ from lecture notes provided by the computer science unit, KMS.
Hints for the case
Students should imagine themselves as part of the programmers’ team.
References
 Stanley Lippman, Josée Lajoie, Barbara E. Moo(2012). C++ Primer. The fifth edition

(released August 16, 2012) covers C++11.
 Shelly, G. B., & Vermaat, M. E. (2009). Discovering Computer 2011 Complete. Boston:

Course Technology Cengage Learning

74

Developing Independent Learning in Vibrant Environment

STUDENT’S MATERIAL

Student’s Notes

Topic
3.0 INTERNET TECHNOLOGY: 3.1.4 Classification of Network

Learning Objectives
At the end of this topic, students should be able to:

 Differentiate Local Area Network, Metropolitan Area Network and Wide Area Network

Case Content

Trans Tech Gone Global: Expanding and Centralizing All Branches bring them to
be the leading IT companies in the Asia.

Trans Tech Gone Global is an IT company where the headquarters is located in Shah
Alam. Currently Trans Tech has 4 other branches all over Malaysia which operates
individually. This company plans to open their 5th branch in Singapore. In conjunction
with the opening of the 5th branch, Trans Tech has decided to centralise all branches
including the 5th branch in Singapore so that all operation can be monitored from the
headquarters. Due to the centralization of all branches to the headquarters and also the
recent expansion of the main office, Shah Alam branch will experience slow internet
connection since they are using a broadband connection with low bandwidth. This
problem is to be discussed and solved before the opening of the Singapore branch. The
Singapore branch will consist of 5 different departments namely Admin, Human
Resource, Finance, IT and Warehouse. Each department will be provided with 10
computers, 4 printers, a few peripheral devices and its respective equipment except for
warehouse with only 2 computers and other related peripherals and equipment.

Although this company has 4 operating branches, they also provide door-to-door
sales for big companies where their mobile salespersons are required to do sales all
over Malaysia. It is very important for these salespersons to have first-hand information
about the product knowledge and the stock level for each of the equipments. They
should be able to access the internal network of their respective branches and if needed,
access the network of headquarters as well. For this purpose, each sales person is
provided with a laptop for them to take along all destinations. This will prevent from any
sales hiccups since Trans Tech has become a reputable company in Malaysia.

With the opening of the 5th branch and centralizing all branches to the
headquarters, Trans Tech is prone to be seen as one of the leading IT companies in the
Asia.

75

Developing Independent Learning in Vibrant Environment
Please answer the following question based on the article:
Question 1:
Suggest a suitable network classification Trans Tech can use to centralise all branches
to the main office in Shah Alam.
Question 2:
Justify why you have chosen the respective network for question number 1.
Question 3:
Suggest an alternative solution if Trans Tech has decided to cut in cost by reducing the
cabling cost and other peripherals and equipment.
Question 4:
Suggest a network topology that can be used in each department of Singapore’s branch.
Question 5:
Briefly explain the classification of network used by the mobile salespersons in order to
access the internal network of their respective branches from the clients’ office.
Question 6:
Identify the network classification that Singapore’s branch should use in each of their
department.

76

Developing Independent Learning in Vibrant Environment
Suggested Lesson Plan and Teaching Techniques

Suggested lesson plan
Below are the suggested lesson plans for one tutorial session (50-55 minutes).
Note: Lecturer may change the suggested time accordingly
Suggestions may include how to spend the time in class, how to organize the discussion
group, and how to arrange the lesson for students to report their findings and solutions
1. Introduce the case ( 5 minutes )
2. Individual preparation ( 10 minutes )
3. Small group discussion ( 15 minutes )
4. Various Learning activities ( 10 minutes )
5. Presentation ( 5 minutes )

Note: Select a group to present, while others just submit their task to lecturer
6. Large group discussion ( 10 minutes )

Presentation and report writing guidelines
1. Read and understand the case content given to you thoroughly.
2. Using your knowledge and understanding, answer the questions.
3. Be prepared to present to the whole class your finding. You will have a time limit. You
should strictly respect this limit.
4. Write your answer on a piece of paper and hand it over to your lecturer at the end of
the class.

Note: Materials may be given prior to lesson for preparation purposes.

77

Developing Independent Learning in Vibrant Environment

Assessment Guidelines

Guideline to assess students’ performance
To achieve the Learning Outcomes, students will be assessed by using the form below.
Before students working with the case, lecturers will explain to them about particular areas
so that they will know the areas on which they should focus

Items Particulars Needs Improvement
Satisfactory
Good
Excellent

1. Able to identify suitable network.

2. Able to identify suitable equipments and
peripherals for a network.

3. Able to identify the suitable network topology.

4. Able to explain the suitable classification of
networks.

5. Able to give solutions based from the network
problem.

Specific comments

78

Developing Independent Learning in Vibrant Environment
Supplementary worksheets
None
Hints for the case
Students should imagine themselves as a IT executive \ sales person in Trans Tech in order
blend themselves with the situation
References
 Turban E. et al. (2010). Introduction to Information Technology (7th Edition). New

Jersey: John Wiley & Sons Inc.
 K. C. Loudon and J. P. Laudon (2007). Management of Information System; (7th

edition). ISBN-10: 0130330663, ISBN-13: 978-0130330666, Prentice Hall.
 Shelly, G. B., & Vermaat, M. E. (2009). Discovering Computer 2011 Complete. Boston:

Course Technology Cengage Learning

79

Developing Independent Learning in Vibrant Environment

Student’s Notes

Topics
4.0 COMPUTER ETHICS AND SECURITY: 4.2 Computer Security

4.2.1 Computer Security Risks
4.2.2 Security Measures

Learning Objectives
At the end of this topic, students should be able to:

1. Define computer security risks.
2. Identify types of security risks.
3. Identify different ways to overcome security risks.

Case Content

Zalora Online Transition to Secure Information System – A Simple Case Study

Zalora is an online trading company that is selling women and man’s merchandises such
as shoes, clothes and accessories.

 It was founded more than 3 years ago and has been serving more than half a
million of customers via online

 It offers more than 5,000 thousands producst at a time and has a mutual links
with others online trading company

About DefCon Solutions
DefCon Solutions is a company specialised in cyber security consultancy. As a

cyber security consultant, DefCon has many clients from various sectors such as trading,
banking, online investment and retail business. As a senior IT security executive in
DefCon, Mr. Hadif has a responsibility to ensure that all cyber security risks for their
clients are handled professionally by their team. DefCon also will inform and consistently
advice their clients about the security risks.

Problems in Zalora’s Website
Zalora’s website has been down for 3 days. Their customers cannot access the

website and are redirected to another non related website. The lost was estimated to
about 50 thousand ringgit to the company per day as the orders and transaction could
not be performed as usual. To solve and prevent this problem, DefCon service is
engaged by Zalora. Mr. Hadif was given the task to handle the problem and give the
consultancy to Zalora.

80

Developing Independent Learning in Vibrant Environment

Please answer the following question based on the article:
Question 1:
In your opinion what types of security breach happened in Zalora’s case? Explain why.
Question 2:
Mr. Hadif needs to explain to Zalora's Managing Director, on why their website cannot be
accessed by their customer. Using you own words, what do you think Mr.Hadif would
have explained to Zalora’s management.
Question 3:
What types of potential security risks that should be advised to Zalora that they should be
aware of? Lists down the computer security risks. Explain how the security risks that
you have listed are related to Zalora type of business.
Question 4:
What types of security measures that should be taken by Zalora to prevent the problem
from occurring again? Gives your opinion and explain how that security measures will
help Zalora.
Question 5:
To create awareness among Zalora staffs, Mr. Hadif is requested to give a briefing to
their Zalora’s staffs. Help Mr. Hadif to create awareness among Zalora’s staffs such as
the safe method of using email, a secure file transferring, computer and internet etiquette
and user awareness. Use your own words to explain it.

81

Developing Independent Learning in Vibrant Environment
Suggested Lesson Plan and Teaching Techniques

Suggested lesson plan
Below are the suggested lesson plans for one tutorial session (50-55 minutes).
Note: Lecturer may change the suggested time accordingly
Suggestions may include how to spend the time in class, how to organize the discussion
group, and how to arrange the lesson for students to report their findings and solutions
1. Introduce the case ( 5 minutes )
2. Individual preparation ( 10 minutes )
3. Small group discussion ( 15 minutes )
4. Various Learning activities ( 10 minutes )
5. Presentation ( 5 minutes )

Note: Select a group to present, while others just submit their task to lecturer
6. Large group discussion ( 10 minutes )

Presentation and report writing guidelines
1. Read and understand the case content given to you thoroughly.
2. Using your knowledge and understanding, answer the questions.
3. Be prepared to present to the whole class your finding. You will have a time limit. You
should strictly respect this limit.
4. Write your answer on a piece of paper and hand it over to your lecturer at the end of
the class.

Note: Materials may be given prior to lesson for preparation purposes.

82

Developing Independent Learning in Vibrant Environment

Assessment Guidelines

Guideline to assess students’ performance

To achieve the Learning Outcomes, students will be assessed by using the form below.
Before students working with the case, lecturers will explain to them about particular areas
so that they will know the areas on which they should focus

Items Particulars Needs Improvement
Satisfactory
Good
Excellent

1. Able to identify suitable network.

2. Able to identify suitable equipments and
peripherals for a network.

3. Able to identify the suitable network topology.

4. Able to explain the suitable classification of
networks.

5. Able to give solutions based from the network
problem.

Specific comments

83

Developing Independent Learning in Vibrant Environment
Supplementary worksheets
None
Hints for the case
Students should imagine themselves as Network Security Executive / Expert.
References
 Shelly, G. B., & Vermaat, M. E. (2009). Discovering Computer 2011 Complete. Boston:

Course Technology Cengage Learning

84

Developing Independent Learning in Vibrant Environment

Student’s Notes

Topic
6.0 DATABASE : 6.2 Basic Concept of Database
6.3 Database Object

Learning Objectives
At the end of this topic, students should be able to:

1. Explain the basic concept of database.
2. Explain the functions of database object.

Case Content

Mums Choice Online Shopping: Mothers and Babies - A Simple Case Study

Mums Choice is an online shopping company that is in operation since 2010. Their main
business is selling mothers’ and babies’ products via the internet. As an online shopping
company, Mums Choice uses an Information System (IS) to run its operation. The IS has
a database that stores the information for Product Preferences, Customer Contact and
Product Sales. The database has 3 tables which is Product Preferences, Customer Info
and Product Sales.

The Product Preferences table stores data about Product ID, Product Name,
Product Type, Product Characteristics and Customer ID. Customer Contact Table store
data about Customer ID, Customer Name, Customer Address and Customer Phone
while Product Sales Tables contain data such Product ID, Product Name, Product Price,
Product Cost, and Customer ID.

Initially, Mums Choice only had one store that they used to keep all of their
products. After a year when quantities and types of the products increased, Mums
Choice’s management decided to open a few more stores in different locations. This
decision of opening new branches has affected the way of storing the information in the
database. In the existence of new stores in different location, an additional of a table
named ‘Store’ is recommended to be added in the database.

85

Developing Independent Learning in Vibrant Environment

Please answer the following question based on the article:
Question 1:
How many tables are currently used in the Mums Choice Information System database?
State the tables.

Question 2: Identify and show the primary key and
Draw the tables that you mentioned above.
foreign key in the tables.

Question 3:
Design the Entity Relationship Diagram (ERD) that shows the relationship among the
entities. State the cardinality between the entities.

Question 4:
Based on the questions above, prepare a data dictionary for the database. You need to
identify the suitable data type for each field.

Question 5:
Identify the attributes in the ‘Store’ table and prepare the table (as suggested in Question
2).

Question 6:
Sketch a design of a Form for Store table.

Question 7:
Name the process in order to locate a product name in the database.

86

Developing Independent Learning in Vibrant Environment
Suggested Lesson Plan and Teaching Techniques

Suggested lesson plan
Below are the suggested lesson plans for one tutorial session (50-55 minutes).
Note: Lecturer may change the suggested time accordingly
Suggestions may include how to spend the time in class, how to organize the discussion
group, and how to arrange the lesson for students to report their findings and solutions
1. Introduce the case ( 5 minutes )
2. Individual preparation ( 10 minutes )
3. Small group discussion ( 15 minutes )
4. Various Learning activities ( 10 minutes )
5. Presentation ( 5 minutes )

Note: Select a group to present, while others just submit their task to lecturer
6. Large group discussion ( 10 minutes )

Presentation and report writing guidelines
1. Read and understand the case content given to you thoroughly.
2. Using your knowledge and understanding, answer the questions.
3. Be prepared to present to the whole class your finding. You will have a time limit. You
should strictly respect this limit.
4. Write your answer on a piece of paper and hand it over to your lecturer at the end of
the class.

Note: Materials may be given prior to lesson for preparation purposes.

87

Developing Independent Learning in Vibrant Environment

Assessment Guidelines

Guideline to assess students’ performance
To achieve the Learning Outcomes, students will be assessed by using the form below.
Before students working with the case, lecturers will explain to them about particular areas
so that they will know the areas on which they should focus

Items Particulars Needs Improvement
Satisfactory
Good
Excellent

1. Able to identify fields and tables in a database.

2. Able to identify the primary key and foreign key
from the tables.

3. Able to design Entity Relationship Diagram.

4. Able to identify data type in a field.

5. Able to design a Form for a table.

6. Able to identify the process to display Report &
Query

Specific comments

88

Developing Independent Learning in Vibrant Environment
Supplementary worksheets
None.
Hints for the case
Students should imagine themselves a Database Administrator.
References
 Coronel, C. Morris, S & Rob, P. 2011. Database Systems Design, Implementation and

Management (9th Edition). Boston: Course Technology Cengage Learning.
 K. C. Loudon and J. P. Laudon (2007). Management of Information System; (7th

edition). ISBN-10: 0130330663, ISBN-13: 978-0130330666, Prentice Hall.
 Shelly, G. B., & Vermaat, M. E. (2009). Discovering Computer 2011 Complete. Boston:

Course Technology Cengage Learning.

89

Developing Independent Learning in Vibrant Environment

Student’s Notes

Topic
7.0 INFORMATION SYSTEM : 7.2 System Development Life Cycle

Learning Objectives
At the end of this topic, students should be able to:

1. Identify the steps of system development life cycle
2. Describes each steps of system development life cycle

Case Content

Bagusmart Hypermarket: Adapting Technology for improving and upgrading their
business - A Simple Case Study
Bagusmart is a chained grocery shop that sells all groceries’ needs. Their motto is
‘providing every family’s needs in one roof’. The grocery shop started as a family
business since year 2000. Their first store was opened in Banting, Selangor. To-date
they have a total of 15 branches around Selangor. Since the opening of their first shop till
present, Bagusmart management does not have any Information System to handle their
inventories, stocks, payroll and financing. Everything was done either by using manual
records or by using a simple stand-alone system such a Store Keeper’s System. The
stand-alone system was developed by one of their ex-staff with minimal functions using a
simple DBMS application program.

As their business developed, the Managing Director of Bagusmart, Mr. Hadif
expressed his intention of having an automated Information System that can improve
and upgrade their business to be more efficient, systematic and reliable. He feels that it
is important for Bagusmart to have a proper system since they are expanding quite
rapidly over the years. Failing to do so may cause inefficient management that might
cause Bagusmart to fail its operation which will bring great loss to the company.

In order to materialize this plan, Mr. Wafiy, a System Analyst was hired and given
a task to handle this project. As the requirement stated, the Information System will have
to automate all the necessary functions and link all the branches in a single system
within a certain budget. This system must be able to be used in all branches and
monitored by the home branch. Therefore, Mr. Wafiy was given a month to do the
necessary and produce a convincing System Proposal so that Mr. Hadif can all the
needed action in developing an Information System for Bagusmart.

90


Click to View FlipBook Version