Академический Документы
Профессиональный Документы
Культура Документы
Select one:
Physical
A data flow diagram
ALL
A rectangle represents
EXTERNAL
TRUE OR FALSE: In designing a DFD, start from the broad overview of the system.
TRUE
A category of a DFD that focuses on business activities.
PHYSICAL
TRUE OR FALSE: As a guideline in DFD, nouns are used to name an external entity.
TRUE
TRUE OR FALSE: Data cannot flow from store to external entity.
TRUE
TRUE OR FALSE: If a DFD is too detailed it will have too many data flows and will be easy to
understand.
FALSE
TRUE OR FALSE: This method of top down analysis and breaking down DFDs to give more and
more detail is known as splitting.
TRUE
Ethics
Anything you post online via social networks is temporary. You may delete it at any time and any
traces will be removed completely from the website.
False
This can be defined as the application of classical ethical principles to the use of computer
technology.
COMPUTER ETHICS
A group of foreign nationals hacked into the government website. What kind of computer crime did
they commit? DATA INTERFERENCE
A person claims to be a school official via the telephone or mail and proceeds to deceive individuals
at a local office supply store into revealing secure information about a school's purchasing account.
What kind of computer crime did they execute?
ELECTRONIC FRAUD
The unauthorized use of any computer password, access code or similar data by which the whole or
any part of a computer system is capable of being accessed with malicious intent to the original
user.
ILLEGAL ACCESS
SOFT ENG
Determines the standards that are relevant for the Software Product, the Organization and the
means to achieve them.
QUALITY PLANNING
A kind of validation is done against the written specifications and is actually based on the historical
data or evidence that has been documented.
RETRO
This means that the Software product delivered should be as per the requirements defined.
ISO
Comprises of processes that ensure that the Software Project would reach its goals.
SQM
It includes all the costs needed to achieve the required Quality levels.
COST OF Q
It is a requisite in the quality management process and it makes sure that the process or product
meets the purpose intended.
VALID
It is a kind of validation process that is usually carried out during the routine service, manufacturing
or engineering processing.
CONCURRENT
It describes the quality objectives and specifies the quality assurance and control activities to be
performed in day-to-day company operations.
Q PLAN
Clearly determines the items that make up the software or system that includes source code, test
scripts, third-party software, hardware, data and both development and test documentation.
CONF MAN
DBMS
A transaction start when the first ____________ is issued.
DML
Which three (3) of thefollowing is the three Data Manipulation Langauge that is considered as part of
database transaction.
INSERT UPDATE DELETE
A transaction ends when either of the following occurs.
BE
Which one (1) DCL (Data Control Langauge) is considered as part of Database Transaction
COMMIT
n automatic commit is issued by the Oracle Server under the following circumstances.
CD
It requires learning to look at software and software components from two points of view: what it
does, and how it does it.
ABSTRACTION
Describes a responsibility-driven methodology for modularization in an object-oriented context.
MODULARITY
This category includes the computer itself, which is often referred to as the central processing unit
(CPU), and all of its support equipment.
HARDWARE
The term that refers to computer programs and the manuals (if any) that support them.
Select one:
SOFTWARE
Deals with the practical and theoretical problems of collecting and analyzing information in a
business function area.
INFORMATION MANAGEMENT
A recognition of the fact that it is easier to do things in a familiar context.
CONSISTENCY
QUIZ 2
A systems approach to the analysis and design of information systems.
METHODOLOGY
It refers to the high level structures of a software system, the discipline of creating such
structures, and the documentation of these structures.
SOFT ARCH
The process of identifying, modeling and documenting how data moves around an
information system.
DATA DESIGN
A software architecture based on the idea that changing the value of a variable should
automatically force recalculation of the values of variables which depend on its value.
DATAFLOW
A systematic approach to estimating the strengths and weaknesses of alternatives that
satisfy transactions, activities or functional requirements for a business.
CBA
QUIZ 3
Is a sub-discipline of project management in which software projects are planned, implemented,
monitored and controlled.
SOFTWARE PROJECT MANAGEMENT
provides the basis for the other management functions, particularly tracking and controlling.
PLANNING
requires that a demonstrable balance be achieved among the driving requirements, the
architecturally significant design decisions, and the life-cycle plans before the resources are
committed for full-scale development.
BASE THE PROCESS
The structure that addresses the issue of organization of the individual project teams is called
TEAM STRUCTURES
is a structure that does not enforce any formal team hierarchy.
DEMOCRATIC
is a structure that draws upon the ideas from both the democratic organization and the
chief-programmer organization.
MIXED TEAM
is a part of project management, which relates to the use of schedules such as Gantt charts to plan
and subsequently report progress within the project environment.
PROJECT PLANNING
goal is to improve current and future management of outputs, outcomes and impact
and is mainly used to assess the performance of projects, institutions and programs set up
by governments, international organizations and NGOs.
MONITORING AND EVAL
A continuous assessment that aims at providing all stakeholders with early detailed information on
the progress or delay of the ongoing assessed activities is called
MONITORING
The set of procedures used by organizations to ensure that a software product will meet its quality
goals at the best value to the customer, and to continually improve the organization’s ability to
produce software products in the future is called
It argues that every act ought to be motivated by self-interest. It concludes that acting in self-interest
is the best motivator.
MORAL EGOISM
It breaks down even further into two subcategories: necessary (food, sleep, etc.) and unnecessary
(sexual desires, etc.)
NATURAL DESIRES
He claimed that no act should be undertaken except for the pleasure which results, and no act
should be rejected but for the pain it produces.
EPICURUS
He is concerned that a utilitarian might actually conclude that a game of push-pin really was better
than poetry.
JOHN STUART MILL
He is the father of utilitarianism.
JEREMY BENTHAM
He sought to rewrite utilitarianism in such a way that he would be able to demonstrate that
Shakespeare outranked push-pins.
ETHICS
It is a theory of moral philosophy that is based on the principle that an action is morally right if it
produces a greater quantity of good or happiness than any other possible action.
UTILITARIANISM
This theory asserts that the empirical consequences of any given act have nothing to do with the
moral worth of the act.
NON CONSEQUENTIALIST
QUIZ 2
These are often established by professional organizations to help guide members in performing their
job functions according to sound and consistent ethical principles.
PROFESSIONAL ETHICS
Orientation that requires that employees identify with and commit to specified conduct.
COMPLIANCE
Orientation that focuses more on an abstract core of ideals such as respect and responsibility
VALUES
It is a program that creates the firm's ethical climate and helps ensure that all employees understand
the organization's values and comply with the policies and codes of conduct.
ETHICAL PROGRAMS
This represents employee ethics with formal statements that describe what an organization expects
of its employees.
CODES OF CONDUCT
Corporate or business ethics with the most comprehensive document and consists of general
statements that serve as principles and the basis for the rules of conduct.
CODES OF ETHICS
This serves the general public and addresses stakeholder interests.
STATEMENT OF VALUES
These are formal statements of what an organization expects in the way of ethical behavior.
CODES OF ETHICS
May be centralized (perhaps temporarily) so that top level managers can ensure that ethical
decisions are made.
DECENTRALIZED
May be decentralized (perhaps temporarily) so that lower level managers can make more decisions.
CENTRALIZED
LONG QUIZ
Software engineers shall maintain integrity and independence in their professional __________.
Select one:
JUDGEMENT
In what year was IEEE Code of Ethics adopted by the American Institute of Electrical Engineers
(AIEE)?
1912
It includes things such as decorative clothing, exotic foods, etc.
VAIN DESIRE
He believed no one would knowingly operate against their best interests, and those that did were
clearly ignorant of what their best interests were.
PLATO
In what year did the Board fo Directors approve the revision to the IEEE Code of Ethic?
2006
It is important to review other people's work. Experience has shown that problems are eliminated
earlier this way and reviews are as effective or even more effective than testing.
Peer reviews
Programming is a fraction of the total project effort, but it is often the most visible. Other work equally
important includes requirements, architecture, analysis, design, and test.
Construction
It is an integral part of software development that needs to be planned.
Testing
It involves knowing the state of all artifacts that make up your system or project, managing the state
of those artifacts, and releasing distinct versions of a system.
Config man
It is important to establish quality priorities and release criteria for the project so that a plan is
constructed to help the team achieve quality software.
Qual and def
Without the operations department, you cannot deploy and support a new application.
System operation and support
Most applications are not brand new, but are enhancements or rewrites of existing applications,
therefore, data transfer is usually a major project by itself.
Data mig
It is important to choose the appropriate development lifecycle process to the project at hand
because all other activities are derived from the process.
Dev pro
Gathering and agreeing on requirements is fundamental to a successful project.
Requirement
Even with a good architecture, it is still possible to have a bad design. Many applications are either
over-designed or under-designed.
Design
Finals
is a structure that does not enforce any formal team hierarchy
Democratic
An agile method for project management developed by Ken Schwaber.
Scrum
A programming language that had a built-in support for a simple form of literate programming.
Haskell
Which of the following best described a code inspection?
Perform code examination for the presence of some common programming errors
It is a requirements-definition and user-interface design methodology in which end-
users, executives, and developers attend intense off-site meetings to work out a system's details.
JAD
A type of tools that can be used for business application development usually enclosed in a
package, allowing both business data manipulation and reporting.
Powerbuilder
The process of identifying, modeling and documenting how data moves around an
information system.
A software architecture based on the idea that changing the value of a variable should
automatically force recalculation of the values of variables which depend on its value.
Data flow
Which of the following best describe a black-box testing?
Equivalence
It includes all the costs needed to achieve the required Quality levels.
COQ
The process of identifying, modeling and documenting the data requirements of the system
being designed.
Logical Data Modelling
Even with a good architecture, it is still possible to have a bad design. Many applications are either
over-designed or under-designed.
Design
A discipline that is concerned with all aspects of software production from the early stages of system
specification to maintaining the system after it has been used.
Soft eng
Clearly determines the items that make up the software or system that includes source code, test
scripts, third-party software, hardware, data and both development and test documentation.
Conf man
n Java programming language, where does the term Java taken from?
Oak
This is a special breed of design document that is also known as software description.
Archi
It refers to the written text that accompanies computer software. It either explains how it operates or
how to use it; and may mean different things to people in different roles.
Soft doc
A very important part of the design document in enterprise software development that contains
Conceptual, Logical, and Physical Design Elements
DDD
Comprises of processes that ensure that the Software Project would reach its goals.
SQM
Which of the following best described a branch coverage test suite?
EDGE
It is a kind of validation process that is usually carried out during the routine service, manufacturing
or engineering processing.
CONCURRENT
The set of procedures used by organizations to ensure that a software product will meet its quality
goals at the best value to the customer, and to continually improve the organization’s ability to
produce software products in the future is called
SQC
An activity where increasing software maintainability or reliability is ensured to prevent problems in
the future.
PREVENTIVE
The experienced people in the technical aspects of the technology, as well as in
project management, who are assigned to oversee the implementation process from start to finish.
PRO MAN
the policies that govern the operation of a computer system
PROCEDURES
A software maintenance process wherein by confirming the modified work with the individual who
submitted the request, it could ensure that the modification provided a solution
ACCEPT AND MOD
is a structure that draws upon the ideas from both the democratic organization and the
chief-programmer organization
MIXED TEAM
It is a framework used to structure, plan, and control the process of developing an information
system
SOFT DEV
It is business management software—typically a suite of integrated applications—that a company
can use to collect, store, manage and interpret data from many business activities.
ERP
Which of the following best described a white-box testing?
Perform a a design test cases based on analysis of some aspect of source code heuristically
These are statements that identify attributes, capabilities, characteristics, or qualities of a system.
This is also the foundation for what shall be or has been implemented.
REQUIREMENT
It is a conceptual framework for undertaking software engineering projects
AGILE
This category includes the computer itself, which is often referred to as the central processing unit
(CPU), and all of its support equipment.
HARDWARE
A controlled and coordinated sequence of activities during which a system is
transferred progressively from the developer to the maintainer.
TRANSITION
is a part of project management, which relates to the use of schedules such as Gantt charts to plan
and subsequently report progress within the project environment
PROJECT PLANNING
What does FORTRAN stand for?
FORMULA TRAN
In C programming language, what does C stand for?
COMPILER
t is an approach in managing a company’s interactions with current and future customers and it often
involves using technology to organize, automate, and synchronize sales, marketing, customer
service, and technical support.
CRM
Which of the following best described an integration testing?
SLOWLY
goal is to improve current and future management of outputs, outcomes and impact
and is mainly used to assess the performance of projects, institutions and programs set up
by governments, international organizations and NGOs.
MAND E
This means that the Software product delivered should be as per the requirements defined
ISO
A style on how code documents are often organized, allowing a programmer to quickly look up an
arbitrary function or class
REF GUIDE
A methodology for creating software within a very unstable environment and it allows flexibility within
the modelling process
EXTREME
This refers to the various facets of a gemstone - each a different face on an underlying core.
CRYSTALS
quantitative measure of a degree to which a software system or process possesses some property.
SOFT M
Which of the following best described a clean room testing?
MAINTAINABLE
He first addressed the Software maintenance and evolution of systems in 1969.
MEIR
A maintenance activity consisting of diagnosing and fixing errors, possibly ones found by users.
CORRECTIVE
It is a general term that refers to any programming language that offers speedier implementation
than do traditional third-generation languages such as C/C++, Pascal, or Fortran. Rapid-
Development Languages (RDLs) produce their savings by reducing the amount of construction
needed to build a product
RDL
STAGE 2
s to the high level structures of a software system, the discipline of creating such structures, and the
documentation o
SOFT ARCH
A type of 4GL where instead of using code, the developer defines his logic by selecting an operation
in a pre-defined list of memory or data table manipulation commands
TABLE DRIVEN
n this stage, a large number of options for the implementation of the new system are generated
STAGE 4
A kind of validation is done against the written specifications and is actually based on the historical
data or evidence that has been documented.
RETRO
The first and most important design activity in software development.
DATA DESIGN
It refers to the process of setting up new software or hardware after a purchase is made
IMPLEMENTATION
This is the stage where all the logical specifications of the systems are converted into descriptions
of the system in terms of real hardware and software
PHYSICAL DESIGN
A very broad activity that includes error correction, enhancements of capabilities, deletion of
obsolete capabilities, and optimization
SOFT MAIN
It describes the quality objectives and specifies the quality assurance and control activities to be
performed in day-to-day company operations
Q PLAN
provides the basis for the other management functions, particularly tracking and controlling.
PLANNING
A systems approach to the analysis and design of information systems
METHODOLOGY
A systematic approach to estimating the strengths and weaknesses of alternatives that
satisfy transactions, activities or functional requirements for a business
CBA
The structure that addresses the issue of organization of the individual project teams is called
TEAM STRUCTURES
This contains software preparation and transition activities, such as the conception and creation of
the maintenance plan.
IMP PRO
The term that refers to computer programs and the manuals (if any) that support them.
SOFTWARE
This process recognizes that the traditional waterfall approach can be inefficient because it idles key
team members for extended periods of time
RUP
This methodology embodies the notion of dynamic stability which can be thought of as similar to how
Scrum embraces controlled chaos.
LD
Which of the following best described code review
REMOVAL MECHANISM
is a sub-discipline of project management in which software projects are planned, implemented,
monitored and controlled.
SPM
It requires learning to look at software and software components from two points of view: what it
does, and how it does it.
ABSTRACTION
Determines the standards that are relevant for the Software Product, the Organization and the
means to achieve them
QP
t refers to documentation for the end-user, system administrators and support staff
END USER
The modification of a software product after delivery to detect and correct latent faults in the software
product before it becomes effective faults
PREV MAIN
A continuous assessment that aims at providing all stakeholders with early detailed information on
the progress or delay of the ongoing assessed activities is called
MONITORING
An academic study of systems with a specific reference to information and the complementary
networks of hardware and software that people and organizations use to collect, filter, process,
create and also distribute data.
INFO SYS
refers to documentation on how to market the product and the analysis of the market demand.
MARKETING
Which of the following best described a unit testing?
Code is tested a whole
It is a requisite in the quality management process and it makes sure that the process or product
meets the purpose intended.
Validation
This enables a programmer to write programs that are more or less independent from a particular
type of computer.
3GL
Deals with the practical and theoretical problems of collecting and analyzing information in a
business function area.
Information Management
A maintenance activity wherein modifying the system to cope with changes in the software
environment is done to ensure that the system is up to date.
Adaptive
A term which means shape, or more generally, plan.
Schema
_______are the policies that govern the operation of a computer system.
Procedures
STRATEGIC
Middle Managers use
TACTICAL
What are the two methods of business processing?
OLT AND BATCH
In a hotel information system, this type of information is strategic.
PUTTING UP
Large detailed reports are highly structured.
TRUE
Yearly manufacturing production of quota of mobile phones.
STRATEGIC
Corrective maintenance plan or schedule
OPERATIONAL
Processing the college entrance exam in a university every year is an example of
BATCH
List of volunteers in every barangay.
OPERATIONAL
Available stocks in the every warehouse.
OPERATIONAL
Mr. Reyes is the Strategic Manager of the company. In the management meeting, he needs to
present the
LONG TERM
Mr. Cruz, the IT Manager, has developed a 10 year IT plan. This plan will be used as a reference in
building the IT department. What type of information did Mr. Cruz develop?
STRATEGIC
What statutory information is expected from a school?
ENROLLEES
Marketing techniques of school branches and providing incentives to the best performing branch
TACTICAL
List of existing projects and the number of beneficiaries per project.
OPERATIONAL
The ______ requires the operational information.
LINE MANAGER
In a cigarette manufacturing, which of the following information is statutory?
REAM
Which of the following is a representation of flow of information?
DFD
Jonathan is the programmer of the TRA Global Software Company. He is currently developing the
modules of the information system. What stage is the software development in?
SYSTEM IMPLEMENTATION
Ferdie is the Systems Analyst of the TRA Global Software Company. He needs to document the
complex decision logic. What tools does he need to use?
DECISION TABLE
Ronnie is the IT Engineer of the TRA Global Software Company. He identified the type of server,
desktop computers needed to implement the proposed information system. What stage is the
software development in?
HARDWARE
Aldrin is the Sr. Programmer of TRA Global Software Company. He received the list of modules to
be fixed. He is now debugging the system. The software development is in ___________________.
SYSTEM MODIFICATION
TRA Global Software Company was contracted to develop a system that would track the
procurement process of XYZ Corporation. The Procurement Manager of XYZ Corp had identified
several applications encompassing the proposed procurement system to TRA Global Software
Company. At what stage of the software development cycle is this activity?
REQUIREMENT SPECIFICATIONS
The goal of this stage is to assess if it is possible to meet the requirements specified, subjected to
constraints of budget, human resource and hardware.
FEASIBILITY
Choose the letter that corresponds to the correct answer. Which of the following is NOT a major
responsibility of a systems analyst?
D
What stage should be completed before the training of users on how to operate the information
system be conducted?
SYSTEM DESIGN
UML stands for
UNIFIED
Refer to the diagram below and identify the stages of the software development life cycle.
FEASIB
TRA Global Software Company had developed the SRS and XYZ Corp. had approved the
document.
What stage the software development is in?
SYSTEM IMPLE
SYSTEM MAINTENANCE
This tool uses a simple stick figure. The simple stick figure is used to represent an actor and is given
a name that characterizes the role that the actor is playing.
DFD
In a DFD, a line with arrow represents _______.
DATA ENTRY
What is the most important and difficult task of a Systems Analyst?
SRS DEV
In DFD, a pair of parallel lines represents ______.
STORAGE
Which of the following is correct about data gathering?
D
Let the interviewee do most of the talking.
FALSE
Which of the following is NOT a recommended technique during interview?
ALL
Questionnaires can be useful in information gathering when users ____.
ALL
SRS is developed by ________.
SYSTEM ANAL
Ana is the Procurement Manager of XYZ Corporation. TRA Global Software Corporation had started
the data gathering for XYZ Corporation. Ana has informed TRA that they have an existing running
application system. What is the next step the TRA should do?
ANAL
Data gathering for system analysis can be done in ________.
SEVERAL
Choose the letter that corresponds to the correct answer: Which of the following describes DFD?
ALL
Who among the following should be interviewed at the start of the project?
RANK
What is the most important role of a systems analyst in business?
PROBLEM
George is the Systems Analyst of the TRA Global Software Corporation, the company was
contracted to develop a hotel information system. George is assigned to conduct an information
gathering. Which of the following should George not avoid during the information gathering stage?
ALL
Systems Analyst used DFD as a tool in designing a system. DFD stands for ______.
ALL
During data gathering, interviews are conducted for the purpose of _____.
PRESENTATION
A circle in a DFD represents _____.
PROCESS
Develop a long questionnaire to capture all the issues and concerns on the system.
FALSE
when designing a system, the following are good sources of information EXCEPT ____.
NONE
This is needed to find economic feasibility of proposed solution.
CBAA
TRUE or FALSE. The statement “up to date product information on the web” is an example of a
tangible benefits.
FALSE
In the feasibility analysis stage of the SDLC, which of the following activity comes next after setting
the goals?
FIND
TRUE or FALSE. The “cost of delay in data processing” is an intangible cost.
TRUE
TRA Global Software was contracted to develop the procurement process of the XYZ Corporation.
Arlene is the assigned Systems Analyst of the proposed project. The proposed system will interface
at different department of the organization (Procurement, Accounting, Finance and Administrative)
Which of the following is NOT a characteristics of a goal of the project that Arlene need to consider?
NONE
Given the goal, “Processed data at the fastest time within the working hours.”
QUANTIFIED
feasibility examines whether the returns (in terms of benefits from the project) are commensurate
with the cost of the project.
ECONOMIC
TRUE OR FALSE. Cost-benefit analysis ensures that an information system is developed at
minimum cost.
TRUE
In the analysis a system of the proposed system, The time spent by XYZ Corporation office staff to
perform a task
Indirect
TRUE or FALSE. The “cost of database migration service” is an intangible cost.
FALSE
In evaluating alternative solutions, the methods must be technically, operationally and Answer
Economically
TRUE or FALSE. The “the cost of a hi-end server for application software” a tangible cost.
TRUE
At the end of the feasibility analysis,
D
__________ may include increased sales due to improved customer services or to managers having
better information on which to base decisions.
CBA
Web@AT Corporation is newly established software company. Mr. Ang want to have a fast and
reliable DSL internet connection to his office. He asked his IT Officer to apply for a fast connection.
Which of the following the IT Office need to do first?
Check the telephone line if capable of DSL connection
To model an information system using objects the requirements specification is examined and all
_____________ in it are picked as potential operations.
Nouns
A subsystem of a complex system must specify
Jonathan is the Report Designer of the TRA Corporation under System Department. He is tasked to
design reports of the newly developed web application system. Which of the following he need to
consider in his design?
All of the choices
Picking necessary operation and attributes to specify objects.
Abstraction
Pie charts are normally used when
relative distribution of data in specified categories is to be shown
New classes are created from current classes by using the idea of _____________.
Inheritance
Which of the following is the best hierarchy of design of a report?
Control footing, Final footing, Report footing
The versions of IP address that coexist in the internet are _______________ and ____________.
Version 4 & 6
Who among the following uses reports for strategic management?
Top Management
Control in design of an information system is used to
System Testing
Control in design of an information system is used to
Parallel Test
Buttons which can be clicked using a mouse are placed in screens as
they are convenient to use
This is an industry standard notation to represent a class.
UML
Errors are found in an operational information system will result to
lost of trust in the IS
Which of the following is an OPTIONAL when designing reports?
Use of page and report footer
Diamond shape
This acts on behalf of all users of an organization wanting to use the internet.
Internet Application Protocol
E-R Model has the ability to describe
Records
Aldrin is the network engineer of the TRA Corporation. TRA Corporation has offices in Cebu, Iloilo
and in Davao. As a network engineer, he need to connect the LAN of different offices to the main
office in Makati City. What computer hardware network equipment he need to use to connect these
offices.
Internet
Functions and procedures are
have side effects which require special care if they are used as subsystems
A __________ Key Encryption eliminates the key distribution problem
Public
HTML can be read by a text editor.
True
Arlene was assigned to produce the daily progress report of service contractors. To whom will
Arlene submits the reports?
Middle Management
Given the email address, inquiry@amauonline.com, what is the domain?
.com
Entities are identified from the word statement of a problem by
picking words which are nouns
Aldrin want to conduct a testing of the developed information system together with the manual
system using data used from manual system to test system when it is first implemented. What kind
of testing Aldrin will conduct?
Pilot Testing
Jonathan is the Web Programmer of TRA Corporation. He was assigned to develop an informative
website. He wants to use user defined tags. What markup language he will use?
HTML
By auditing around the computer we mean
the programs and procedures are checked for correctness
BoyeCodd Normal Form (BCNF) is needed when
there are two or more possible composite overlapping keys and one attribute of a composite
key is dependent on an attribute of another composite key
Audit in the design of information system is used to
ensure that the system processes data as it was designed to and that the results are reliable
Ronnie is the IT Security Officer of the TRA Corporation. His task is to secure/protect the data and
programs of the company. Which of the following action he will do?
All of the choices
This is the address of a web page on the internet. URL
This is acomputer-to-computer exchange of business documents in a standard electronic format
between business partners.
Email
The purpose of parallel run is to
test a system being newly designed
This is a set of procedures that manage a database and provide application program access the
database in a form requested by the application programs.
DMBS
Grade sheets and product list are reports needed by
Operational Management
Given the IP address, 192.168.1.10 and 192.168.1.100. Are the IP addresses in the same network?
True
Computer systems are designed by
breaking of the system into smaller self-contained co-operating subsystems
Parental Surveillance
The process of collecting data about a person using false pretenses.
Pretexting
This aims to check applications, databases, networks, remote computing resources, and any other
system connected to the business that is vulnerable.
Penetration testing
Employers should search an employee's personal effects for the purpose of searching for any
suspicious conversations and unnecessary use of social media.
TRUE
What does FORTRAN stand for?
Formula Translation
In Java programming language, where does the term Java taken from?
Oak Tree
This contains software preparation and transition activities, such as the conception and creation of
the maintenance plan.
Implementation process
It is business management software—typically a suite of integrated applications—that a company
can use to collect, store, manage and interpret data from many business activities.
ERP
It refers to the written text that accompanies computer software. It either explains how it operates or
how to use it; and may mean different things to people in different roles.
Soft doc
An activity where increasing software maintainability or reliability is ensured to prevent problems in
the future.
Preventive
The experienced people in the technical aspects of the technology, as well as in
project management, who are assigned to oversee the implementation process from start to finish.
Program manager
A style on how code documents are often organized, allowing a programmer to quickly look up an
arbitrary function or class.
Ref guide
A very important part of the design document in enterprise software development that contains
Conceptual, Logical, and Physical Design Elements.
DDD
A maintenance activity consisting of diagnosing and fixing errors, possibly ones found by users.
Corrective
This enables a programmer to write programs that are more or less independent from a particular
type of computer.
3GL
It is an approach in managing a company’s interactions with current and future customers and it
often involves using technology to organize, automate, and synchronize sales, marketing, customer
service, and technical support.
CRM
It refers to documentation for the end-user, system administrators and support staff.
End user
A type of tools that can be used for business application development usually enclosed in a
package, allowing both business data manipulation and reporting.
PowerBuilder
This of the following is not part of comparison condition used in single row subquery.
IN
Which of the following is not true rule to follow in writing PL/SQL that contains subquery?
The subquery can appear on either side of the comparison operator.
Supposed that table: Workers and Employees is consists of the following values.
What will be the output if the user uses this PL/SQL.
DELETE FROM WORKERS
WHERE LASTNAME = (SELECT LASTNAME FROM EMPLOYEES WHERE LASTNAME=Cruz’)
Employee in Employees table with lastname equal to Cruz will be deleted.
Which of the following is not part of comparison condition used in multiple row subquery.
=
Supposed that table: Workers and Employees is consists of the following values.
What will be the output if the user uses this PL/SQL.
UPDATE WORKERS
SET DEPARTMENT = (SELECT DEPARTMENT FROM EMPLOYEES WHERE DEPARTMENT
=’HR’);
All Workers department will be set to HRD
Supposed that table: Workers and Employees is consists of the following values.
What will be the output if the user uses this PL/SQL.
UPDATE EMPLOYEES
SET LASTNAME = (SELECT LASTNAME FROM WORKERS WHERE LASTNAME=’Soriano’)
WHERE ID=105;
The lastname of Cruz from Employees table will be set to NULL
Supposed that table: Workers and Employees is consists of the following values. What will be the
output if the user uses this PL/SQL.
SELECT ID, LASTNAME, DEPARTMENT
FROM WORKERS
WHERE ID > (SELECT ID FROM EMPLOYEES WHERE STATUS = ‘Probi’);
This will retrieve the record of Mortos and Santiago
Supposed that table: Workers and Employees is consists of the following values.
Which of the following is the correct example of copying data from WORKERS table to
EMPLOYEES table where the status is equal to ‘Regular’?
INSERT INTO EMPLOYEES (ID, LASTNAME, DEPARTMENT)
VALUES (SELECT ID, LASTNAME, DEPARTMENT
FROM WORKERS
WHERE STATUS = ‘Regular’);
Which of the following is not true application of subquery in DML statements?
Merge one table to another table.
Which of the following are the two types of subquery.
Single row and multiple row subquery
Write TRUE or FALSE in the space provided.
National security and individual privacy are both critical and important to consider.
TRUE
Amazon enables users to set and manage parental controls connected to devices used by children
such as Kindle. For example, a parent may opt to set a PIN on Purchase to authorize purchases and
rentals. This is an example of what kind of ethical dilemma in privacy?
Parental Surveillance
The process of collecting data about a person using false pretenses.
Pretexting
This aims to check applications, databases, networks, remote computing resources, and any other
system connected to the business that is vulnerable.
Penetration testing
Employers should search an employee's personal effects for the purpose of searching for any
suspicious conversations and unnecessary use of social media.
TRUE
What does FORTRAN stand for?
Formula Translation
In Java programming language, where does the term Java taken from?
Oak Tree
This contains software preparation and transition activities, such as the conception and creation of
the maintenance plan.
Implementation process
It is business management software—typically a suite of integrated applications—that a company
can use to collect, store, manage and interpret data from many business activities.
ERP
It refers to the written text that accompanies computer software. It either explains how it operates or
how to use it; and may mean different things to people in different roles.
Soft doc
An activity where increasing software maintainability or reliability is ensured to prevent problems in
the future.
Preventive
The experienced people in the technical aspects of the technology, as well as in
project management, who are assigned to oversee the implementation process from start to finish.
Program manager
A style on how code documents are often organized, allowing a programmer to quickly look up an
arbitrary function or class.
Ref guide
A very important part of the design document in enterprise software development that contains
Conceptual, Logical, and Physical Design Elements.
DDD
A maintenance activity consisting of diagnosing and fixing errors, possibly ones found by users.
Corrective
This enables a programmer to write programs that are more or less independent from a particular
type of computer.
3GL
It is an approach in managing a company’s interactions with current and future customers and it
often involves using technology to organize, automate, and synchronize sales, marketing, customer
service, and technical support.
CRM
It refers to documentation for the end-user, system administrators and support staff.
End user
A type of tools that can be used for business application development usually enclosed in a
package, allowing both business data manipulation and reporting.
PowerBuilder
He first addressed the Software maintenance and evolution of systems in 1969.
Meir
A programming language that had a built-in support for a simple form of literate programming.
Haskell
These are statements that identify attributes, capabilities, characteristics, or qualities of a system.
This is also the foundation for what shall be or has been implemented.
Requirement
This is the documentation/ compilation of code, algorithms, interfaces, and APIs.
Technical
A software maintenance process wherein by confirming the modified work with the individual who
submitted the request, it could ensure that the modification provided a solution.
Acceptance and modification process
Compiler
A maintenance activity wherein modifying the system to cope with changes in the software
environment is done to ensure that the system is up to date.
Adaptive
This is a special breed of design document that is also known as software description.
Archi
It refers to the process of setting up new software or hardware after a purchase is made.
Implementation
A term which means shape, or more generally, plan.
Schema
It refers to documentation on how to market the product and the analysis of the market demand.
Marketing
A very broad activity that includes error correction, enhancements of capabilities, deletion of
obsolete capabilities, and optimization.
Soft main
A coding technique where maintenance is highly complicated due to difficulty in tracking every
sequence or module it passes.
Spaghetti code
The modification of a software product after delivery to detect and correct latent faults in the software
product before it becomes effective faults.
Preventive maintenance
A type of 4GL where instead of using code, the developer defines his logic by selecting an operation
in a pre-defined list of memory or data table manipulation commands.
Table-driven (codeless) programming
This of the following is not part of comparison condition used in single row subquery.
IN
Which of the following is not true rule to follow in writing PL/SQL that contains subquery?
The subquery can appear on either side of the comparison operator.
Supposed that table: Workers and Employees is consists of the following values.
What will be the output if the user uses this PL/SQL.
DELETE FROM WORKERS
WHERE LASTNAME = (SELECT LASTNAME FROM EMPLOYEES WHERE LASTNAME=Cruz’)
Employee in Employees table with lastname equal to Cruz will be deleted.
Which of the following is not part of comparison condition used in multiple row subquery.
=
Supposed that table: Workers and Employees is consists of the following values.
What will be the output if the user uses this PL/SQL.
UPDATE WORKERS
SET DEPARTMENT = (SELECT DEPARTMENT FROM EMPLOYEES WHERE DEPARTMENT
=’HR’);
All Workers department will be set to HRD
Supposed that table: Workers and Employees is consists of the following values.
What will be the output if the user uses this PL/SQL.
UPDATE EMPLOYEES
SET LASTNAME = (SELECT LASTNAME FROM WORKERS WHERE LASTNAME=’Soriano’)
WHERE ID=105;
The lastname of Cruz from Employees table will be set to NULL
Supposed that table: Workers and Employees is consists of the following values. What will be the
output if the user uses this PL/SQL.
SELECT ID, LASTNAME, DEPARTMENT
FROM WORKERS
WHERE ID > (SELECT ID FROM EMPLOYEES WHERE STATUS = ‘Probi’);
This will retrieve the record of Mortos and Santiago
Supposed that table: Workers and Employees is consists of the following values.
Which of the following is the correct example of copying data from WORKERS table to
EMPLOYEES table where the status is equal to ‘Regular’?
INSERT INTO EMPLOYEES (ID, LASTNAME, DEPARTMENT)
VALUES (SELECT ID, LASTNAME, DEPARTMENT
FROM WORKERS
WHERE STATUS = ‘Regular’);
Which of the following is not true application of subquery in DML statements?
Merge one table to another table.
Which of the following are the two types of subquery.
Single row and multiple row subquery
Given the email address, inquiry@amauonline.com, what is the domain?
.com
Email can only be shared in a Local Area Network and NOT in an extranet.
False
This is used for formatting and creating links from one webpage to another.
All
When sending data from the source to destination, the message is ____________.
Broken
IP addresses are converted to
Domain names
This is the address of the web page on the internet.
Url
Each statement in DTD declares the element of HTML language.
False
It is a communication protocol used to retrieved web pages.
Http
HTTP is a language used to create web pages.
False
The ___________ tag is used to link a web page to another page.
Anchor
A query operation on an object
NO SIDE
A member of a class is __________________.
AN OBJECT
New classes are created from current classes by using the idea of _____________.
Inheritance
In object modelling, special properties of objects are
encapsulation, inheritance and polymorphism
Picking necessary operation and attributes to specify objects.
ABSTRACTION
It is also known as information hiding.
Encapsulation
To model an information system using objects the requirements specification is examined and all
_____________ in it are picked as potential operations.
NOUNS
UML stands for
Universal Modelling Language
The first step in object oriented modelling is
Find objects and their classes
Inheritance in object-oriented modelling can be used to
create new classes
It is a communication protocol used to retrieved web pages.
HTTP
Ronnie was assigned to produce the daily progress report of service contractors. To whom will
Ronnie submits the reports?
Middle
Every member of an entity set is described by its _______________.
ATTRIBUTES
In the ER Diagram, normally entities are
NOUNS
Page footing is
the labels printed at the end of a report
In Entity Relationship, the Student number, Course, Date Enrolled, Gender are examples of
ATTRIBUTES
New classes are created from current classes by using the idea of _____________.
Inheritance
Who uses the report for tactical management?
Middle
This is an industry standardnotation to represent a class.
UML
Grade sheets and product list are reports needed by
Operational
Web@AT Corporation is newly established software company. Mr. Ang want to have a fast and
reliable DSL internet connection to his office. He asked his IT Officer to apply for a fast connection.
Which of the following the IT Office need to do first?
Check the telephone line if capable of DSL connection
The first step in object oriented modelling is
Find objects and their classes
Jonathan is the Report Designer of the TRA Corporation under System Department. He is tasked to
design reports of the newly developed web application system. Which of the following he need to
consider in his design?
All
By ______________ we mean ability to manipulate objects of different distinct classes knowing only
their common properties
POLYMORPHISM
E-R Model has the ability to describe
ALL
The last step in object oriented modelling is
c. develop an object interaction/collaboration graph
To model an information system using objects the requirements specification is examined and all
_____________ in it are picked as potential operations.
NOUNS
Who among the following uses reports for strategic management?
Top
Line and dot matrix printers are examples of
Impact
Designing screens uses principles
Similar
Which of the following is the best hierarchy of design of a report?
Report heading, Page heading, Control heading, Detail lines
Which of the following protocol is used to transfer file from one LAN to another?
None
It is also known as information hiding.
Encapsulation
In UML, information hiding
allows improvement of modification of methods used by other objects without affecting other
parts of a system
Aldrin is the network engineer of the TRA Corporation. TRA Corporation has offices in Cebu, Iloilo
and in Davao. As a network engineer, he need to connect the LAN of different offices to the main
office in Makati City. What computer hardware network equipment he need to use to connect these
offices.
Router
The following are entities EXCEPT
VOLUNTEER AND OFFICER
A teenager requests for money from random people because of an email he received containing
instructions on how to make cash in the next few weeks. This scam is done in the form of
_______________.
Monetary
The process of using historical data to predict the future. This type of technology is used for
purchasing inventory, stock predictions, sales predictions and overall business assessments.
Data Forecasting
This process checks the basic vulnerabilities of the program. These tests probe and attempt to
penetrate the security of the program and system in which it is running.
Code review
The main job of the postmaster is to retrieve an email from the legitimate sender to the legitimate
receiver.
True
These are considered significant security risk, but not being able to get into an application is a
serious development issue when a problem arises.
Using backdoors
This reveals surprisingly detailed information that is significantly private. It is suggested that you
keep this practice limited to authorized investigations and legitimate troubleshooting in order to
preserve the users' expectation of privacy, as defined by company policy.
Traffic
This type of coding is done to have minimum reworking to do at the testing phase.
Code Design
Performing shortcuts when implementing a new system is not always a good idea, but unfortunately,
sometimes it is necessary in order to meet aggressive time constraints.
TRUE
When a patch is not aptly tested, problems arise.
True
This involves controlling an integrated computer system and maximizing performance and
productivity of that system.
Networking
Allowing the destruction of discoverable evidence is legal if approved by a higher official.
FALSE
The process of stealing a domain name from another entity.
Domain Hijacking
What type of coding practice should be done when operating systems are upgraded?
Redoing
A crucial process for determining system integrity and business practice integrity.
Audits
What type of coding practice emphasises the importance of the allocation and use of memory for
programmers?
Correct Use of memory
A cyberattack wiped the data from hard drives of computers in banks in South Korea. The attack
came from an email mimicking a South Korean bank. What type of identity theft scam did they do?
Account
The process of creating an architecture diagram that represents the entities and their corresponding
relationship within a corporate database.
Data modelling
This coding practice is done when the deadlines imposed on programmers force them to find the
best possible solution somewhere in the middle.
Pseudo
A key player in information technology who is responsible for all of the data within a corporation.
DBA
Having this policy within a company means that whomever signs the nondisclosure agreement
agrees to keep the vulnerability information within that organization tightly contained so that no one
outside of the organization, especially the general public, ever learns of the existence of product
vulnerabilities.
Non
The modification of a software product after delivery to detect and correct latent faults in the software
product before it becomes effective faults.
Preventive maintenance
A maintenance activity wherein modifying the system to cope with changes in the software
environment is done to ensure that the system is up to date.
Adaptive
A controlled and coordinated sequence of activities during which a system is
transferred progressively from the developer to the maintainer.
Transition
A software maintenance process wherein by confirming the modified work with the individual who
submitted the request, it could ensure that the modification provided a solution.
Acceptance and modification process
A very broad activity that includes error correction, enhancements of capabilities, deletion of
obsolete capabilities, and optimization.
Soft main
He first addressed the Software maintenance and evolution of systems in 1969.
Meir
A maintenance activity consisting of diagnosing and fixing errors, possibly ones found by users.
Corrective
An activity where increasing software maintainability or reliability is ensured to prevent problems in
the future.
Preventive
This contains software preparation and transition activities, such as the conception and creation of
the maintenance plan.
Imple
A coding technique where maintenance is highly complicated due to difficulty in tracking every
sequence or module it passes.
Spaghetti code
Based on the table EMPLOYEES, DEPARTMENTS and LOCATIONS.
From the given select statement below: What is/are the full name of employee whose
LOCATION_ID is equal to 1700?
SELECT (LASTNAME||','||FIRSTNAME) AS "FULL NAME", DEPARTMENT_ID,
DEPARTMENT_NAME, LOCATION_ID
FROM EMPLOYEES
NATURAL JOIN DEPARTMENTS;
KOCHAR, NENA and LEX, DE HAAN
Which of the following is the correct query that will create a report that will display the following:
FIRTSNAME, SALARY with additional 1000 in employees salary, rename this column as BONUS,
then get the DEPARTMENT_NAME and DEPARTMENT_ID. Join the table using ON condition.
c. SELECT FIRSTNAME, SALARY + 1000 AS BONUS, DEPARTMENT_NAME,
DEPARTMENT_ID
FROM EMPLOYEES E JOIN DEPARTMENTS D
ON E.DEPARTMENT_ID = D.DEPARTMENT_ID;
SELECT EMPLOYEES.EMPLOYEE_ID,
EMPLOYEES.LASTNAME,EMPLOYEES.DEPARTMENT_ID,DEPARTMENTS.DEPARTMENT_ID,D
EPARTMENTS.LOCATION_ID
FROM EMPLOYEES JOIN DEPARTMENTS
ON( EMPLOYEES.DEPARTMENT_ID (+)= DEPARTMENTS.DEPARTMENT_ID);
Incorrect
Refer to the table AUTHORS and COPY_AUTHORS (Note during the creation of view the condition
added is YR_PUBLISHED=2010). Supposed that the user update the YR_PUBLISHED of book OS
to from 2010 to 2010 as shown below what is/are the possible output on both table and view?
UPDATE COPY_AUTHORS
SET YR_PUBLISHED = 2016
WHERE BOOK='OS';
The record of book OS YR_PUBLISHED will be updated from 2010 to 2016 on
COPY_AUTHORS view only.
Which of the following is not true about complex view when using INSERT statement?
All
This is used for formatting and creating links from one webpage to another.
All of the choices
This ________________ is a procedure used to transform a set of relations into another set which
has some desirable properties.
Normalization
New classes are created from current classes by using the idea of _____________.
Inheritance
FALSE
To model an information system using objects the requirements specification is examined and all
_____________ in it are picked as potential operations.
Nouns
To use a ________, a ___________ model of data needed for current and future applications is
designed. ___________ modelling is useful for this.
DBMS, conceptual, Entity Relationship
What is the best printer to use when printing multiple copies with carbon paper?
Dot matrix
Page footing is
Impact Printers
Jonathan is the Web Programmer of TRA Corporation. He was assigned to develop an informative
website. He wants to use user defined tags. What markup language he will use?
HTML
For large volume output and multiple copies, what type of printer you need to use
Line
In Entity Relationship, the Student number, Course, Date Enrolled, Gender are examples of
Attributes
Two corporate intranets may be interconnected using a leased line from PSTN -such a network is
called __________
An internet
The daily responsibilities of the administrator such as monitoring the system, managing users and
passwords, allocating system resources and installations.
System administration
The process of using historical data to predict the future. This type of technology is used for
purchasing inventory, stock predictions, sales predictions and overall business assessments.
Data Forecasting
This type of coding is done to have minimum reworking to do at the testing phase.
Code Design
The process of broadly disseminating as much information as possible regarding product or system
vulnerabilities so that potential victims possess the same information as the potential hackers.
Full disclosure
A cyberattack wiped the data from hard drives of computers in banks in South Korea. The attack
came from an email mimicking a South Korean bank. What type of identity theft scam did they do?
They are responsible for finding vulnerabilities. They also have their own set of moral issues to
address when reversing engineering products for the protection purposes of discovering
vulnerabilities.
White hat hackers
Entities are represented by
Circle
Encapsulation
Aldrin is the web developer of TRA Corporation. He is created a website a university. He store the
html files under the folder name students including the home page html file. Which of the following
address will be the valid home page of the university?
http://myuniversity.edu/students/home.html
Given employee (employee number, salary, department code, supervisor code). What is the unique
relation key.
Employee number
FALSE
It is in 1NF
They possess great power in the corporate world. They have the ability to spy on fellow employees
as they can see the websites employees are visiting, monitor employee emails and online chats,
view data on personal computers connected to the corporate network and much more.
System administrator
This is a standards used to define a method of exchanging data over a computer network such as
local area network, Internet, Intranet. These is being used by computer to send data over the
internet.
World Wide Web
Given the email address, inquiry@amauonline.com, what is the domain?
.com
Email can only be shared in a Local Area Network and NOT in an extranet.
False
This is used for formatting and creating links from one webpage to another.
All
When sending data from the source to destination, the message is ____________.
Broken
IP addresses are converted to
Domain names
This is the address of the web page on the internet.
Url
Each statement in DTD declares the element of HTML language.
False
It is a communication protocol used to retrieved web pages.
Http
HTTP is a language used to create web pages.
False
The ___________ tag is used to link a web page to another page.
Anchor
A query operation on an object
NO SIDE
A member of a class is __________________.
AN OBJECT
New classes are created from current classes by using the idea of _____________.
Inheritance
In object modelling, special properties of objects are
encapsulation, inheritance and polymorphism
In Entity Relationship, the Student number, Course, Date Enrolled, Gender are examples of
ATTRIBUTES
New classes are created from current classes by using the idea of _____________.
Inheritance
allows improvement of modification of methods used by other objects without affecting other
parts of a system
Aldrin is the network engineer of the TRA Corporation. TRA Corporation has offices in Cebu, Iloilo
and in Davao. As a network engineer, he need to connect the LAN of different offices to the main
office in Makati City. What computer hardware network equipment he need to use to connect these
offices.
Router
The following are entities EXCEPT
VOLUNTEER AND OFFICER
A teenager requests for money from random people because of an email he received containing
instructions on how to make cash in the next few weeks. This scam is done in the form of
_______________.
Monetary
The process of using historical data to predict the future. This type of technology is used for
purchasing inventory, stock predictions, sales predictions and overall business assessments.
Data Forecasting
This process checks the basic vulnerabilities of the program. These tests probe and attempt to
penetrate the security of the program and system in which it is running.
Code review
The main job of the postmaster is to retrieve an email from the legitimate sender to the legitimate
receiver.
True
These are considered significant security risk, but not being able to get into an application is a
serious development issue when a problem arises.
Using backdoors
This reveals surprisingly detailed information that is significantly private. It is suggested that you
keep this practice limited to authorized investigations and legitimate troubleshooting in order to
preserve the users' expectation of privacy, as defined by company policy.
Traffic
This type of coding is done to have minimum reworking to do at the testing phase.
Code Design
Performing shortcuts when implementing a new system is not always a good idea, but unfortunately,
sometimes it is necessary in order to meet aggressive time constraints.
TRUE
When a patch is not aptly tested, problems arise.
True
This involves controlling an integrated computer system and maximizing performance and
productivity of that system.
Networking
Allowing the destruction of discoverable evidence is legal if approved by a higher official.
FALSE
The process of stealing a domain name from another entity.
Domain Hijacking
What type of coding practice should be done when operating systems are upgraded?
Redoing
A crucial process for determining system integrity and business practice integrity.
Audits
What type of coding practice emphasises the importance of the allocation and use of memory for
programmers?
Correct Use of memory
A cyberattack wiped the data from hard drives of computers in banks in South Korea. The attack
came from an email mimicking a South Korean bank. What type of identity theft scam did they do?
Account
The process of creating an architecture diagram that represents the entities and their corresponding
relationship within a corporate database.
Data modelling
This coding practice is done when the deadlines imposed on programmers force them to find the
best possible solution somewhere in the middle.
Pseudo
A key player in information technology who is responsible for all of the data within a corporation.
DBA
Having this policy within a company means that whomever signs the nondisclosure agreement
agrees to keep the vulnerability information within that organization tightly contained so that no one
outside of the organization, especially the general public, ever learns of the existence of product
vulnerabilities.
Non
The modification of a software product after delivery to detect and correct latent faults in the software
product before it becomes effective faults.
Preventive maintenance
A maintenance activity wherein modifying the system to cope with changes in the software
environment is done to ensure that the system is up to date.
Adaptive
A controlled and coordinated sequence of activities during which a system is
transferred progressively from the developer to the maintainer.
Transition
A software maintenance process wherein by confirming the modified work with the individual who
submitted the request, it could ensure that the modification provided a solution.
Acceptance and modification process
A very broad activity that includes error correction, enhancements of capabilities, deletion of
obsolete capabilities, and optimization.
Soft main
He first addressed the Software maintenance and evolution of systems in 1969.
Meir
A maintenance activity consisting of diagnosing and fixing errors, possibly ones found by users.
Corrective
An activity where increasing software maintainability or reliability is ensured to prevent problems in
the future.
Preventive
This contains software preparation and transition activities, such as the conception and creation of
the maintenance plan.
Imple
A coding technique where maintenance is highly complicated due to difficulty in tracking every
sequence or module it passes.
Spaghetti code
Based on the table EMPLOYEES, DEPARTMENTS and LOCATIONS.
From the given select statement below: What is/are the full name of employee whose
LOCATION_ID is equal to 1700?
SELECT (LASTNAME||','||FIRSTNAME) AS "FULL NAME", DEPARTMENT_ID,
DEPARTMENT_NAME, LOCATION_ID
FROM EMPLOYEES
NATURAL JOIN DEPARTMENTS;
KOCHAR, NENA and LEX, DE HAAN
Which of the following is the correct query that will create a report that will display the following:
FIRTSNAME, SALARY with additional 1000 in employees salary, rename this column as BONUS,
then get the DEPARTMENT_NAME and DEPARTMENT_ID. Join the table using ON condition.
c. SELECT FIRSTNAME, SALARY + 1000 AS BONUS, DEPARTMENT_NAME,
DEPARTMENT_ID
FROM EMPLOYEES E JOIN DEPARTMENTS D
ON E.DEPARTMENT_ID = D.DEPARTMENT_ID;
What will be the output if the user uses this PL/SQL.
SELECT ID, LASTNAME, DEPARTMENT
FROM WORKERS
WHERE ID > (SELECT ID FROM EMPLOYEES WHERE STATUS = ‘Probi’);
This will retrieve the record of Mortos and Santiago
If WITH CHECK OPTION is added on the view (see sample code below) what is/are the restriction?
CREATE OR REPLACE VIEW VIEW STUD_VIEW (USN_ID, LASTNAME, FIRSTNAME, COURSE)
AS (SELECT USN_ID, LASTNAME, FIRSTNAME, COURSE
FROM STUDENTS
WHERE COURSE = ‘BSCS’
WITH CHECK OPTION CONSTRAINT STUD_VIEW_CK;
It restricts the users to add a value where course is not equal to BSCS
SELECT EMPLOYEES.EMPLOYEE_ID,
EMPLOYEES.LASTNAME,EMPLOYEES.DEPARTMENT_ID,DEPARTMENTS.DEPARTMENT_ID,D
EPARTMENTS.LOCATION_ID
FROM EMPLOYEES RIGHT OUTER JOIN DEPARTMENTS
ON( EMPLOYEES.DEPARTMENT_ID = DEPARTMENTS.DEPARTMENT_ID);
OUTER
SELECT EMPLOYEES.EMPLOYEE_ID,
EMPLOYEES.LASTNAME,EMPLOYEES.DEPARTMENT_ID,DEPARTMENTS.DEPARTMENT_ID,D
EPARTMENTS.LOCATION_ID
FROM EMPLOYEES JOIN DEPARTMENTS
USING (DEPARTMENT_ID);
INCORRECTY
If WITH READ ONLY is added on the view (see sample code below) what is/are the restriction?
CREATE OR REPLACE VIEW STUD_VIEW (USN_ID, LASTNAME, FIRSTNAME, COURSE)
AS (SELECT USN_ID, LASTNAME, FIRSTNAME, COURSE
FROM STUDENTS
WHERE COURSE = ‘BSCS’)
WITH READ ONLY;
SELECT statement is not allowed on this view
Which of the following is the correct query that will create a report that will display the following:
STREET_ADDRESS, CITY, DEPARTMENT_NAME and LOATION_ID? Use using clause to get the
data from two tables.
SELECT STREET_ADDRESS, CITY, DEPARTMENT_NAME, LOCATION_ID
FROM DEPARTMENTS
JOIN LOCATIONS
NATURAL JOIN (LOCATION_ID);
Which of the following is the correct example of copying data from WORKERS table to
EMPLOYEES table where the status is equal to ‘Regular’?
INSERT INTO EMPLOYEES VALUES (ID, LASTNAME, DEPARTMENT)
SELECT ID, LASTNAME, DEPARTMENT
FROM WORKERS
WHERE STATUS = ‘Regular’;
SELECT EMPLOYEES.EMPLOYEE_ID,
EMPLOYEES.LASTNAME,EMPLOYEES.DEPARTMENT_ID,DEPARTMENTS.DEPARTMENT_ID,D
EPARTMENTS.LOCATION_ID
FROM EMPLOYEES JOIN DEPARTMENTS
ON( EMPLOYEES.DEPARTMENT_ID (+)= DEPARTMENTS.DEPARTMENT_ID);
Incorrect
Refer to the table AUTHORS and COPY_AUTHORS (Note during the creation of view the condition
added is YR_PUBLISHED=2010). Supposed that the user update the YR_PUBLISHED of book OS
to from 2010 to 2010 as shown below what is/are the possible output on both table and view?
UPDATE COPY_AUTHORS
SET YR_PUBLISHED = 2016
WHERE BOOK='OS';
The record of book OS YR_PUBLISHED will be updated from 2010 to 2016 on
COPY_AUTHORS view only.
Based on the table EMPLOYEES, DEPARTMENTS and LOCATIONS.
From the given select statement below: What is the address of employee under the
department_name IT?
SELECT STREET_ADDRESS, CITY, DEPARTMENT_NAME, LOCATION_ID
FROM DEPARTMENTS
JOIN LOCATIONS
USING (LOCATION_ID);
2014 JABBERWACKY
Which of the following joins are mutually exclusive.
Natural Join and Using clause
Which of the following is not true about complex view when using UPDATE statement?
All
Which of the following is the correct example of modifying a view where salary manager_id is null?
b. CREATE OR REPLACE VIEW WORKERS (EMPLOYEE_ID, SURNAME, FIRSTNAME,
MANAGER_ID)
AS (EMPLOYEE_ID, LASTNAME, FIRSTNAME, MANAGER_ID)
FROM EMPLOYEES
WHERE MANAGER_ID IS NULL);
Which of the following is not true about complex view when using INSERT statement?
All
Equi
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees, departments
WHERE employees.department_id IN (50, 60, 90);
Equi
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees LEFT JOIN departments
ON( employees.department_id = departments.department_id);
Outer
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id FROM employees JOIN departments WHERE
employees.department_id = departments.department_id;
Equi
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees, departments
WHERE employees.department_id (+)= departments.department_id;
Outer
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees FULL OUTER JOIN departments
ON (WHERE employees.department_id = departments.department_id);
Outer
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees JOIN departments
USING (department_id);
Cartesian
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees RIGHT OUTER JOIN departments
ON( employees.department_id = departments.department_id);
The given statement would cause Cartesian or Cross Join
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees, departments
WHERE employees.department_id IN (50, 60, 90);
The given statement would cause Cartesian or Cross Join
Equi
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees, departments
WHERE employees.department_id IN (50, 60, 90);
Equi
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees LEFT JOIN departments
ON( employees.department_id = departments.department_id);
Outer
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id FROM employees JOIN departments WHERE
employees.department_id = departments.department_id;
Equi
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees, departments
WHERE employees.department_id (+)= departments.department_id;
Outer
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees FULL OUTER JOIN departments
ON (WHERE employees.department_id = departments.department_id);
Outer
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees JOIN departments
USING (department_id);
Cartesian
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees RIGHT OUTER JOIN departments
ON( employees.department_id = departments.department_id);
The given statement would cause Cartesian or Cross Join
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees, departments
WHERE employees.department_id IN (50, 60, 90);
The given statement would cause Cartesian or Cross Join
Equi
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees, departments
WHERE employees.department_id IN (50, 60, 90);
Equi
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees LEFT JOIN departments
ON( employees.department_id = departments.department_id);
Outer
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id FROM employees JOIN departments WHERE
employees.department_id = departments.department_id;
Equi
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees, departments
WHERE employees.department_id (+)= departments.department_id;
Outer
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees FULL OUTER JOIN departments
ON (WHERE employees.department_id = departments.department_id);
Outer
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees JOIN departments
USING (department_id);
Cartesian
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees RIGHT OUTER JOIN departments
ON( employees.department_id = departments.department_id);
The given statement would cause Cartesian or Cross Join
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees, departments
WHERE employees.department_id IN (50, 60, 90);
The given statement would cause Cartesian or Cross Join
Dbms
Supposed that a user performs the query as shown below, what will happen to the data?
UPDATE EMPLOYEES SET JOB_ID = ‘IT’, SALARY =10000
WHERE MANAGER_ID IS NULL;
SAVEPOINT UPDATE_IT;
ROLLBACK TO UPDATE_IT;
Savepoints are discarded.
Which of the following is the correct example of multivalued attributes?
A state of the data where a transaction must be fully compliant with the state of the database as it
was prior to the transaction.
Consistency
Which of the following is the correct representation of many-to-many relation?
SAVEPOINT UPDATE_IT;
ROLLBACK TO UPDATE_IT;
The manager_id that is equal to null is now change to IT and the job_id of employees under
department_id 50,90 or salary greater that 500 have been updated to secretary.
Which of the following is the correct representation of one-to-one relation?
Supposed that a user performs the query as shown below, what will happen to the data?
UPDATE EMPLOYEES SET JOB_ID = ‘IT’, SALARY =10000
WHERE MANAGER_ID IS NULL;
SAVEPOINT UPDATE_IT;
SAVEPOINT UPDATE_IT;
ROLLBACK;
No changes made on employees table.
A type of constraint uniquely identifies each record in a database table.
Primary key
A type constraint that uniquely identifies each record in a database table and can be applied on one
or more column.
Unique
Which of the following is the correct example of derived attribute?
None
It is the skeleton structure that represents the logical view of the entire database.
Database schema
A state where a transaction data changes must be available, even in the event of database failure.
Durability
Which of the following is the correct example of adding primary key constraint?
d. ALTER TABLE AUTHORS
ADD CONSTRAINT AUTHOR_ID PRIMARY KEY;
Which of the following statement is not true about Foreign Key constraint
b. A foreign key in one table points to a foreign key in another table
A state of the data where a transaction must be fully complete, saved (committed) or completely
undone (rolled back).
Atom
This is the fundamental entity which introduces abstraction in a Database Management System
(DBMS).
Data model
Which of the following is the correct example of referencing the BOOKS table to AUTHORS?
b. CREATE TABLE BOOKS(
BOOK_ID NUMBER PRIMARY KEY NOT NULL,
TITLE VARCHAR(10),
YEAR NUMBER(4),
CONSTRAINT BK_ID (BOOK_ID)
REFERENCES AUTHORS (BOOK_ID));
This gives the user more flexibility and control when changing data and they ensure data
consistency in the event of user process or system failure.
Transaction
Which of the following is the correct representation of one-to-many relation?
Which of the following is the correct example of an attributes?
Usn id
Which of the following is the correct example of dropping on delete cascade?
d. ALTER TABLE AUTHORS
DROP PRIMARY KEY ON DELETE CASCADE;
This is a kind of mechanism, which liberalizes itself from actual data stored on the disk.
Logical data independence
It is a state of operational database with data at any given time.
Dtabase instance
Supposed that a user performs the query as shown below, what will happen to the data?
UPDATE EMPLOYEES SET JOB_ID = ‘IT’
WHERE MANAGER_ID IS NULL;
SAVEPOINT UPDATE_IT;
SAVEPOINT UPDATE_IT;
COMMIT;
ROLLBACK;
Permanently
Which of the following is the correct example of adding a check constraint on column BOOK_ID to
accept value greater that 10?
c. CREATE TABLE BOOKS(
BOOK_ID NUMBER,
TITLE VARCHAR(10),
YEAR NUMBER(4),
CONSTRAINT BK_ID CHECK (BOOK_ID > 10));
This is used to deactivate an integrity constraint.
DISABLE
It is used to ensures that data values inside a database follow defines rules for values, range and
format
DOMAIN INTEGRITY
A state of the data where a transaction data must not be available to other transactions until the
original transaction is committed or rolled back.
Isolation
SOFT ENG
It includes all the costs needed to achieve the required Quality levels.
b. Cost of Quality
Which of the following best described a clean room testing?
a. Perform a document production of code that is more reliable and maintainable
This methodology embodies the notion of dynamic stability which can be thought of as similar to how
Scrum embraces controlled chaos.
d. Lean Development Methodology
Clearly determines the items that make up the software or system that includes source code, test
scripts, third-party software, hardware, data and both development and test documentation.
a. Configuration management
An agile method for project management developed by Ken Schwaber.
c. Scrum methodology
It is a general term that refers to any programming language that offers speedier implementation
than do traditional third-generation languages such as C/C++, Pascal, or Fortran. Rapid-
Development Languages (RDLs) produce their savings by reducing the amount of construction
needed to build a product.
a. Rapid Development Language
Which of the following best described a fault-based testing?
d. Perform a strategy which focuses on what constitute a fault model of the strategy
It is a kind of validation process that is usually carried out during the routine service, manufacturing
or engineering processing.
CONCURRENT
A kind of validation is done against the written specifications and is actually based on the historical
data or evidence that has been documented.
RETRO
This means that the Software product delivered should be as per the requirements defined.
ISO
Which of the following best described a white-box testing?
c. Perform a a design test cases based on analysis of some aspect of source code
heuristically
This refers to the various facets of a gemstone - each a different face on an underlying core.
CRYSTAL
Determines the standards that are relevant for the Software Product, the Organization and the
means to achieve them.
QUALITY PLANNING
This process recognizes that the traditional waterfall approach can be inefficient because it idles key
team members for extended periods of time.
RUP
It is a conceptual framework for undertaking software engineering projects.
Agile
A quantitative measure of a degree to which a software system or process possesses
some property.
SOFT M
It is a requisite in the quality management process and it makes sure that the process or product
meets the purpose intended.
VALID
Comprises of processes that ensure that the Software Project would reach its goals.
SQM
Which of the following best described a branch coverage test suite?
EDGE
It describes the quality objectives and specifies the quality assurance and control activities to be
performed in day-to-day company operations.
QUALITY PLANNING
Which of the following best described code review?
a. Perform code evaluation for defects and removal mechanism
It is a framework used to structure, plan, and control the process of developing an information
system.
SOFTWARE DEVELOPMENT
Which of the following best described a code inspection?
Perform code examination for the presence of some common programming errors
It is a requirements-definition and user-interface design methodology in which end-
users, executives, and developers attend intense off-site meetings to work out a system's details.
JAD
Which of the following best described a code walktrough?
Informal
Which of the following best described a unit testing?
c. Code is tested a whole
A methodology for creating software within a very unstable environment and it allows flexibility within
the modelling process.
EXTREME
A sophisticated lifecycle model that focuses on early identification and reduction of project risks.
SPIRAL
Which of the following best described an integration testing?
SLOWLY
Which of the following best describe a black-box testing?
c. Perform equivalence class partitioning
This is a set of procedures that manage a database and provide application program access the
database in a form requested by the application programs.
DBMS
Given employee (employee number, salary, department code, supervisor code). What is the unique
relation key.
EMPLOYEE NO.
Diamond shape is represented by
RELATIONSHIP
Each column in the relation corresponds to _____________
RECORDS
Relationship are normalized to ensure that
ALL
In the ER Diagram, normally entities are
NOUNS
The following are entities EXCEPT
VOLUNTEER AND OFFICER
Every member of an entity set is described by its _______________.
ATTRIBUTES
This ________________ is a procedure used to transform a set of relations into another set which
has some desirable properties.
NORMALIZATION
In Entity Relationship, the Student number, Course, Date Enrolled, Gender are examples of
ATTRIBUTES
In the ER Diagram, relationships are
VERBS
To use a ________, a ___________ model of data needed for current and future applications is
designed. ___________ modelling is useful for this.
b. DBMS, conceptual, Entity Relationship
Each row in a table contains a
ALL
Entities are represented by
RECTANGLE
A relationship is in 2NF if,
a. It is in 1NF
E-R Model has the ability to describe
ALL
A "flat file" is also called
e. 1NF
In Entity Relationship, a tuple is
f. a row of relation
Which of the following is a valid ER Diagram?
Which of the following is an entity
PROGRAMMER AND EMPLOYEE
Disclosing referral fees to the client is up to
the executive's decision.
False
Having this policy within a company means that whomever signs the nondisclosure agreement
agrees to keep the vulnerability information within that organization tightly contained so that no one
outside of the organization, especially the general public, ever learns of the existence of product
vulnerabilities.
Nondisclosure policy
They possess great power in the corporate world. They have the ability to spy on fellow employees
as they can see the websites employees are visiting, monitor employee emails and online chats,
view data on personal computers connected to the corporate network and much more.
System administrator
A statement that highlights an organization's key ethical issues and identifies the outstretching
values and principles that are important to the organization and its decision making.
Code of ethics
Performing shortcuts when implementing a new system is not always a good idea, but unfortunately,
sometimes it is necessary in order to meet aggressive time constraints
True
A method wherein an organization reviews how well it is meeting its new goals for the upcoming
year.
SOCIAL AUDIT
One of the responsibilities of a compliance officer is to suggest contents for the code of ethics for
approval of a higher official.
True
The process of broadly disseminating as much information as possible regarding product or system
vulnerabilities so that potential victims possess the same information as the potential hackers.
Full disclosure
The daily responsibilities of the administrator such as monitoring the system, managing users and
passwords, allocating system resources and installations.
System administration
When a patch is not aptly tested, problems arise.
True
In developing a code of ethics, always disregard anonymous reports.
False
Ethics training must increase the percentage of employees reporting incidents of misconduct.
True
A crucial process for determining system integrity and business practice integrity.
Audits
This involves controlling an integrated computer system and maximizing performance and
productivity of that system
Networking
They are responsible for finding vulnerabilities. They also have their own set of moral issues to
address when reversing engineering products for the protection purposes of discovering
vulnerabilities.
White hat hackers
Which of the following is the correct example of saving changes made on the table?
Save;
Dbms
Supposed that a user performs the query as shown below, what will happen to the data?
UPDATE EMPLOYEES SET JOB_ID = ‘IT’, SALARY =10000
WHERE MANAGER_ID IS NULL;
SAVEPOINT UPDATE_IT;
SAVEPOINT UPDATE_SECRETARY;
ROLLBACK TO UPDATE_IT;
Savepoints are discarded.
Which of the following is the correct example of multivalued attributes?
A state of the data where a transaction must be fully compliant with the state of the database as it
was prior to the transaction.
Consistency
Which of the following is the correct representation of many-to-many relation?
SAVEPOINT UPDATE_IT;
ROLLBACK TO UPDATE_IT;
The manager_id that is equal to null is now change to IT and the job_id of employees under
department_id 50,90 or salary greater that 500 have been updated to secretary.
Which of the following is the correct representation of one-to-one relation?
Supposed that a user performs the query as shown below, what will happen to the data?
UPDATE EMPLOYEES SET JOB_ID = ‘IT’, SALARY =10000
WHERE MANAGER_ID IS NULL;
SAVEPOINT UPDATE_IT;
SAVEPOINT UPDATE_IT;
ROLLBACK;
No changes made on employees table.
A type of constraint uniquely identifies each record in a database table.
Primary key
A type constraint that uniquely identifies each record in a database table and can be applied on one
or more column.
Unique
Which of the following is the correct example of derived attribute?
None
It is the skeleton structure that represents the logical view of the entire database.
Database schema
A state where a transaction data changes must be available, even in the event of database failure.
Durability
Which of the following is the correct example of adding primary key constraint?
d. ALTER TABLE AUTHORS
ADD CONSTRAINT AUTHOR_ID PRIMARY KEY;
Which of the following statement is not true about Foreign Key constraint
b. A foreign key in one table points to a foreign key in another table
A state of the data where a transaction must be fully complete, saved (committed) or completely
undone (rolled back).
Atom
This is the fundamental entity which introduces abstraction in a Database Management System
(DBMS).
Data model
Which of the following is the correct example of referencing the BOOKS table to AUTHORS?
b. CREATE TABLE BOOKS(
BOOK_ID NUMBER PRIMARY KEY NOT NULL,
TITLE VARCHAR(10),
YEAR NUMBER(4),
CONSTRAINT BK_ID (BOOK_ID)
REFERENCES AUTHORS (BOOK_ID));
This gives the user more flexibility and control when changing data and they ensure data
consistency in the event of user process or system failure.
Transaction
Which of the following is the correct representation of one-to-many relation?
Which of the following is the correct example of an attributes?
Usn id
Which of the following is the correct example of dropping on delete cascade?
d. ALTER TABLE AUTHORS
DROP PRIMARY KEY ON DELETE CASCADE;
This is a kind of mechanism, which liberalizes itself from actual data stored on the disk.
Logical data independence
It is a state of operational database with data at any given time.
Dtabase instance
Supposed that a user performs the query as shown below, what will happen to the data?
UPDATE EMPLOYEES SET JOB_ID = ‘IT’
WHERE MANAGER_ID IS NULL;
SAVEPOINT UPDATE_IT;
SAVEPOINT UPDATE_IT;
COMMIT;
ROLLBACK;
Permanently
Which of the following is the correct example of adding a check constraint on column BOOK_ID to
accept value greater that 10?
c. CREATE TABLE BOOKS(
BOOK_ID NUMBER,
TITLE VARCHAR(10),
YEAR NUMBER(4),
CONSTRAINT BK_ID CHECK (BOOK_ID > 10));
This is used to deactivate an integrity constraint.
DISABLE
It is used to ensures that data values inside a database follow defines rules for values, range and
format
DOMAIN INTEGRITY
A state of the data where a transaction data must not be available to other transactions until the
original transaction is committed or rolled back.
Isolation
SOFT ENG
It includes all the costs needed to achieve the required Quality levels.
b. Cost of Quality
Which of the following best described a clean room testing?
a. Perform a document production of code that is more reliable and maintainable
This methodology embodies the notion of dynamic stability which can be thought of as similar to how
Scrum embraces controlled chaos.
d. Lean Development Methodology
Clearly determines the items that make up the software or system that includes source code, test
scripts, third-party software, hardware, data and both development and test documentation.
a. Configuration management
An agile method for project management developed by Ken Schwaber.
c. Scrum methodology
It is a general term that refers to any programming language that offers speedier implementation
than do traditional third-generation languages such as C/C++, Pascal, or Fortran. Rapid-
Development Languages (RDLs) produce their savings by reducing the amount of construction
needed to build a product.
a. Rapid Development Language
Which of the following best described a fault-based testing?
d. Perform a strategy which focuses on what constitute a fault model of the strategy
It is a kind of validation process that is usually carried out during the routine service, manufacturing
or engineering processing.
CONCURRENT
A kind of validation is done against the written specifications and is actually based on the historical
data or evidence that has been documented.
RETRO
This means that the Software product delivered should be as per the requirements defined.
ISO
Which of the following best described a white-box testing?
c. Perform a a design test cases based on analysis of some aspect of source code
heuristically
This refers to the various facets of a gemstone - each a different face on an underlying core.
CRYSTAL
Determines the standards that are relevant for the Software Product, the Organization and the
means to achieve them.
QUALITY PLANNING
This process recognizes that the traditional waterfall approach can be inefficient because it idles key
team members for extended periods of time.
RUP
It is a conceptual framework for undertaking software engineering projects.
Agile
A quantitative measure of a degree to which a software system or process possesses
some property.
SOFT M
It is a requisite in the quality management process and it makes sure that the process or product
meets the purpose intended.
VALID
Comprises of processes that ensure that the Software Project would reach its goals.
SQM
Which of the following best described a branch coverage test suite?
EDGE
It describes the quality objectives and specifies the quality assurance and control activities to be
performed in day-to-day company operations.
QUALITY PLANNING
Which of the following best described code review?
a. Perform code evaluation for defects and removal mechanism
It is a framework used to structure, plan, and control the process of developing an information
system.
SOFTWARE DEVELOPMENT
Which of the following best described a code inspection?
Perform code examination for the presence of some common programming errors
It is a requirements-definition and user-interface design methodology in which end-
users, executives, and developers attend intense off-site meetings to work out a system's details.
JAD
Which of the following best described a code walktrough?
Informal
Which of the following best described a unit testing?
c. Code is tested a whole
A methodology for creating software within a very unstable environment and it allows flexibility within
the modelling process.
EXTREME
A sophisticated lifecycle model that focuses on early identification and reduction of project risks.
SPIRAL
Which of the following best described an integration testing?
SLOWLY
Which of the following best describe a black-box testing?
c. Perform equivalence class partitioning
This is a set of procedures that manage a database and provide application program access the
database in a form requested by the application programs.
DBMS
Given employee (employee number, salary, department code, supervisor code). What is the unique
relation key.
EMPLOYEE NO.
Diamond shape is represented by
RELATIONSHIP
Each column in the relation corresponds to _____________
RECORDS
Relationship are normalized to ensure that
ALL
In the ER Diagram, normally entities are
NOUNS
The following are entities EXCEPT
VOLUNTEER AND OFFICER
Every member of an entity set is described by its _______________.
ATTRIBUTES
This ________________ is a procedure used to transform a set of relations into another set which
has some desirable properties.
NORMALIZATION
In Entity Relationship, the Student number, Course, Date Enrolled, Gender are examples of
ATTRIBUTES
In the ER Diagram, relationships are
VERBS
To use a ________, a ___________ model of data needed for current and future applications is
designed. ___________ modelling is useful for this.
b. DBMS, conceptual, Entity Relationship
Each row in a table contains a
ALL
Entities are represented by
RECTANGLE
A relationship is in 2NF if,
a. It is in 1NF
E-R Model has the ability to describe
ALL
A "flat file" is also called
e. 1NF
In Entity Relationship, a tuple is
f. a row of relation
Which of the following is a valid ER Diagram?
Which of the following is an entity
PROGRAMMER AND EMPLOYEE
NONE
The ______________ data entry is suitable if the number of records is very large.
OFFLINE
The _____________________ is where user presented several alternatives and asked to type
his/her choice.
MENU
In ____________ data entry, batches of data are formed and entered. They are checked by a
validation program and the corrected records are stored in a file.
OFF LINE
For interactive data input, customized screens are designed for easy data entry. Errors in data entry
are instantly detected by a ________________ during data entry and can be immediately corrected.
VALIDATION
Which of the following classification of codes is NOT precise?
NONE
Which of the following classification of codes is NOT expandable?
NONE
Which of the following classification of codes is NOT comprehensive?
d. Serial number and block codes
A data element in a data dictionary may have
NO VALUE
What is metadata?
b. Data about data
A data dictionary is usually developed
c. when data flow diagram is developed
Which one of the following statements is FALSE about data dictionary?
NONE
ETHICS
Performing shortcuts when implementing a new system is not always a good idea, but unfortunately,
sometimes it is necessary in order to meet aggressive time constraints.
TRUE
A crucial process for determining system integrity and business practice integrity.
Audits
The daily responsibilities of the administrator such as monitoring the system, managing users and
passwords, allocating system resources and installations.
System administration
When a patch is not aptly tested, problems arise.
True
This involves controlling an integrated computer system and maximizing performance and
productivity of that system.
Networking
They possess great power in the corporate world. They have the ability to spy on fellow employees
as they can see the websites employees are visiting, monitor employee emails and online chats,
view data on personal computers connected to the corporate network and much more.
Sys ad
The process of broadly disseminating as much information as possible regarding product or system
vulnerabilities so that potential victims possess the same information as the potential hackers.
Full Disclosure
Disclosing referral fees to the client is up to the executive's decision.
False
Having this policy within a company means that whomever signs the nondisclosure agreement
agrees to keep the vulnerability information within that organization tightly contained so that no one
outside of the organization, especially the general public, ever learns of the existence of product
vulnerabilities.
Non Disclosure
They are responsible for finding vulnerabilities. They also have their own set of moral issues to
address when reversing engineering products for the protection purposes of discovering
vulnerabilities.
White hat
Soft Eng
Which of the following best described a code walktrough?
Informal
Which of the following best described a white-box testing?
c. Perform a a design test cases based on analysis of some aspect of source code
heuristically
The _____________________ is a catalogue of all data used in an application, their names, type
and their origin.
d. Data dictionary
Which of the following classification of codes is NOT expandable
NONE
The ______________ data entry is suitable if the number of records is very large.
OFFLINE
The _____________________ is where user presented several alternatives and asked to type
his/her choice.
MENU
In ____________ data entry, batches of data are formed and entered. They are checked by a
validation program and the corrected records are stored in a file.
OFF LINE
For interactive data input, customized screens are designed for easy data entry. Errors in data entry
are instantly detected by a ________________ during data entry and can be immediately corrected.
VALIDATION
Which of the following classification of codes is NOT precise?
NONE
Which of the following classification of codes is NOT expandable?
NONE
Which of the following classification of codes is NOT comprehensive?
d. Serial number and block codes
A data element in a data dictionary may have
NO VALUE
What is metadata?
b. Data about data
A data dictionary is usually developed
ETHICS
Performing shortcuts when implementing a new system is not always a good idea, but unfortunately,
sometimes it is necessary in order to meet aggressive time constraints.
TRUE
A crucial process for determining system integrity and business practice integrity.
Audits
The daily responsibilities of the administrator such as monitoring the system, managing users and
passwords, allocating system resources and installations.
System administration
When a patch is not aptly tested, problems arise.
True
This involves controlling an integrated computer system and maximizing performance and
productivity of that system.
Networking
They possess great power in the corporate world. They have the ability to spy on fellow employees
as they can see the websites employees are visiting, monitor employee emails and online chats,
view data on personal computers connected to the corporate network and much more.
Sys ad
The process of broadly disseminating as much information as possible regarding product or system
vulnerabilities so that potential victims possess the same information as the potential hackers.
Full Disclosure
Disclosing referral fees to the client is up to the executive's decision.
False
Having this policy within a company means that whomever signs the nondisclosure agreement
agrees to keep the vulnerability information within that organization tightly contained so that no one
outside of the organization, especially the general public, ever learns of the existence of product
vulnerabilities.
Non Disclosure
They are responsible for finding vulnerabilities. They also have their own set of moral issues to
address when reversing engineering products for the protection purposes of discovering
vulnerabilities.
White hat
Soft Eng
Which of the following best described a code walktrough?
Informal
Which of the following best described a white-box testing?
c. Perform a a design test cases based on analysis of some aspect of source code
heuristically
Which of the following best described a fault-based testing?
d. Perform a strategy which focuses on what constitute a fault model of the strategy
Which of the following best described an integration testing?
SLOWLY
Which of the following best described a clean room testing?
a. Perform a document production of code that is more reliable and maintainable
Which of the following best describe a black-box testing?
c. Perform equivalence class partitioning
Which of the following best described a code inspection?
Perform code examination for the presence of some common programming errors
It is a type of process structure that automatically connects to other databases involved in in- doubt
distributed transactions
RECOVERER
It is a type of process structure that can collect transaction, redo data and transmit that data to
standby destinations
LGWR
It is a type of process structure that cleans up the database buffer cache
PMON
It is a type of process structure that records checkpoint information in Control file on each data file
header
CKPT
It is a type of process structure that writes modified (dirty) buffers in the database buffer cache
asynchronously while performing other processing to advance the checkpoint
DBWn
It is a type of process structure that writes the redo log buffer to a redo log file on disk
Lgwr
It is also known as specific connection of a user to an instance through a user process
SESSION
It is part of the System Global Area (SGA) that hold copies of data blocks that are read from data
files
DATA BUFFER CACHE
It is part of the System Global Area which is used to provide memory for Oracle Streams processes
JAVA POOL
It is the key in solving the problems of information management.
DATABASE
In planning to install Oracle which of the following is not important to consider.
ANY
QUIZ 2
Which of the following is the correct Disk space requirement when installing Oracle?
1GB
Which of the following is not part or Oracle Installation System Requirement.
FILE MANAGER
It is a type a Oracle environment where Oracle Products run.
ORACLE HOME
It is a type a Oracle environment where Oracle Products run.
EIPCBE
QUIZ 3
It is a named group of related privileges that can be granted to the user. This method makes it easier
to revoke and maintain privileges
ROLE
It is a type of privilege that gain access to the database
SYSTEM
It is a type of privilege that is used to manipulating the content of the database objects.
OBJECT
This is also known collection of objects such as tables, views, and sequences.
SCHEMA
This is used to remove a privilege granted to a user.
REVOKE
Which of the following is the correct example of passing a privilege (INSERT and UPDATE) to user
HR coming from a user scott?
D
Which of the following is the correct example of passing a privilege (INSERT and UPDATE) to user
HR coming from a SYSTEM?
A
Which of the following is the correct syntax for creating a new user?
C
Which of the following System Privileges is not part of SYSTEM privilege?
INDEX
Which of the following system privileges is not part of the task by the database admin.?
MANAGING
This is concerned with the quality and reliability of raw as well as processed data.
Data integrity
This is concerned with protecting data regarding individuals from being accessed and used without
the permission/knowledge of concerned individuals.
Data privacy
Organizational measures in control mean
proper organization of data
This is processing control that is use to check intermediate results in long and complex calculations.
Check points
By auditing around the computer we mean
Correctness
Which of the following is an objective of control?
All
A type of testing wherein incorrect inputs, incorrect processing and incorrect outputs will be detected
during operation.
System testing
A firewall is used in a system connected to a wide area network to
Unauthorized
Why is there a need to control in information system?
Large volume
This is concerned with protecting data from erasure, theft, unauthorized access and unauthorized
modifications.
Data sec
Information System is being tested as a whole system. What kind of testing is being conducted?
System testing
Which of the following does NOT considered as potential threats to security of the Information
System?
All
Errors are found in an operational information system will result to
Trust
Which of the following is a control technique during input preparation?
Data entry
This is a potential threat wherein an interruption in an authorized user's access to a computer
network.
All
Ronnie is the IT Security Officer of the TRA Corporation. His task is to secure/protect the data and
programs of the company. Which of the following action he will do?
All
Aldrin want to conduct a testing of the developed information system together with the manual
system using data used from manual system to test system when it is first implemented. What kind
of testing Aldrin will conduct?
Pilot
Aldrin want to conduct a testing of the developed information system together with the manual
system using live data. What kind of testing Aldrin will conduct?
Parallel
Aldrin is the Systems Analyst of the company. As a System Analyst, he need to ensure logs are
kept, who did in critical data entry and processing. What does Aldrin need to implement?
Audit trail
Ronnie want to protect his data when sending from the main office to the branch office.
Which of the following information security he will apply?
Encryption
Which of the following does NOT considered as potential threats to security of the Information
System?
None
A __________ Key Encryption eliminates the key distribution problem
Public
An advantage of symmetric key is easy and fast transformation of plain text to cipher text.
True
Page footing is
End of a report
In E-commerce, the pair of keys for each organization is a ____________ Key and its _________
Key
Public private
After encryption, a transformed data is also known as
Cipher text
Given the email address, inquiry@amauonline.com, what is the domain?
.com
A type of testing wherein incorrect inputs, incorrect processing and incorrect outputs will be detected
during operation.
Full testing
In the E commerce, a customer sends an order over the internet.
To secure the order,
Encrypted
This is a computer-to-computer exchange of business documents in a standard electronic format
between business partners.
Email
Which of the following does NOT considered as potential threats to security of the Information
System?
None
This is a security device deployed at the boundary of an organization's network to protect it from
unauthorized external access.
Firewall
This is a standards used to define a method of exchanging data over a computer network such as
local area network, Internet, Intranet.
These is being used by computer to send data over the internet.
Router
Which of the following is used to secure an E Commerce
All
Two corporate intranets may be interconnected using a leased line from PSTN -such a network is
called __________
Extranet
Jonathan is the Web Programmer of TRA Corporation. He was assigned to develop an informative
website. He wants to use user defined tags.
Corporate intranets may be interconnected using a
When sending data from the source to destination, the message is ____________.
Broken up
The ___________ tag is used to link a web page to another page.
Anchor
It is a communication protocol used to retrieved web pages.
HTTP
Detailed enrollment list and Grade sheet are reports needed by
TOP
The process of unscrambling the message is called
DECRYPTION
Aldrin is the network engineer of the TRA Corporation. TRA Corporation has offices in Cebu, Iloilo
and in Davao. As a network engineer, he need to connect the LAN of different offices to the main
office in Makati City.
What computer hardware network equipment he need to use to connect these offices.
INTERNET
Use ___________________ to attach EDI forms to e-mail messages
VAN