Вы находитесь на странице: 1из 117

A _________________ DFD is similar to a document flow diagram.

Select one:
Physical
A data flow diagram
ALL
A rectangle represents
EXTERNAL

TRUE OR FALSE: Two data stores cannot be connected by a data flow


TRUE
TRUE OR FALSE: External entities can process data.
DALSE
If the process p is expanded, the process at the next level will be labeled as
D
TRUE OR FALSE: Data can flow from process to process
TRUE

TRUE OR FALSE: In designing a DFD, start from the broad overview of the system.
TRUE
A category of a DFD that focuses on business activities.
PHYSICAL

TRUE OR FALSE: As a guideline in DFD, nouns are used to name an external entity.
TRUE
TRUE OR FALSE: Data cannot flow from store to external entity.
TRUE
TRUE OR FALSE: If a DFD is too detailed it will have too many data flows and will be easy to
understand.
FALSE

TRUE OR FALSE: This method of top down analysis and breaking down DFDs to give more and
more detail is known as splitting.
TRUE

Given the DFD below:


E
In a DFD, a process is represented by a
CIRCLE
TRUE OR FALSE: Data cannot flow from process to external entity.
FALSE

In DFD, the symbol use to represent a data store is


PARALLEL
Keep the number of processes at each level ____.
LESS THAN 7

Provides overview of the system to be designed.


CONTEXT D
TRUE OR FALSE: Loops are allowed in DFD.
FALSE

Ethics
Anything you post online via social networks is temporary. You may delete it at any time and any
traces will be removed completely from the website.
False
This can be defined as the application of classical ethical principles to the use of computer
technology.
COMPUTER ETHICS
A group of foreign nationals hacked into the government website. What kind of computer crime did
they commit? DATA INTERFERENCE
A person claims to be a school official via the telephone or mail and proceeds to deceive individuals
at a local office supply store into revealing secure information about a school's purchasing account.
What kind of computer crime did they execute?
ELECTRONIC FRAUD
The unauthorized use of any computer password, access code or similar data by which the whole or
any part of a computer system is capable of being accessed with malicious intent to the original
user.
ILLEGAL ACCESS

SOFT ENG
Determines the standards that are relevant for the Software Product, the Organization and the
means to achieve them.
QUALITY PLANNING
A kind of validation is done against the written specifications and is actually based on the historical
data or evidence that has been documented.
RETRO
This means that the Software product delivered should be as per the requirements defined.
ISO
Comprises of processes that ensure that the Software Project would reach its goals.
SQM
It includes all the costs needed to achieve the required Quality levels.
COST OF Q

A quantitative measure of a degree to which a software system or process possesses


some property.
SOFT M

It is a requisite in the quality management process and it makes sure that the process or product
meets the purpose intended.
VALID
It is a kind of validation process that is usually carried out during the routine service, manufacturing
or engineering processing.

CONCURRENT
It describes the quality objectives and specifies the quality assurance and control activities to be
performed in day-to-day company operations.

Q PLAN
Clearly determines the items that make up the software or system that includes source code, test
scripts, third-party software, hardware, data and both development and test documentation.
CONF MAN
DBMS
A transaction start when the first ____________ is issued.
DML

An automatic rollback is issued by the oracle under the following circumstances.


SYSTEM FAILURE
Which one (1) Data Definition Language is considered as part of Database Transaction.
CREATE TABLE

Which three (3) of thefollowing is the three Data Manipulation Langauge that is considered as part of
database transaction.
INSERT UPDATE DELETE
A transaction ends when either of the following occurs.
BE

Which one (1) DCL (Data Control Langauge) is considered as part of Database Transaction
COMMIT
n automatic commit is issued by the Oracle Server under the following circumstances.
CD

It requires learning to look at software and software components from two points of view: what it
does, and how it does it.
ABSTRACTION
Describes a responsibility-driven methodology for modularization in an object-oriented context.
MODULARITY

This category includes the computer itself, which is often referred to as the central processing unit
(CPU), and all of its support equipment.
HARDWARE

The term that refers to computer programs and the manuals (if any) that support them.
Select one:
SOFTWARE
Deals with the practical and theoretical problems of collecting and analyzing information in a
business function area.
INFORMATION MANAGEMENT
A recognition of the fact that it is easier to do things in a familiar context.
CONSISTENCY

_______are the policies that govern the operation of a computer system.


PROCEDURES
A discipline that is concerned with all aspects of software production from the early stages of system
specification to maintaining the system after it has been used.
SOFT ENG
An academic study of systems with a specific reference to information and the complementary
networks of hardware and software that people and organizations use to collect, filter, process,
create and also distribute data.
INFO SYS
They deal with structures and algorithms without regard for the meaning or importance of the data
that is involved.
SOFT DEVS

QUIZ 2
A systems approach to the analysis and design of information systems.
METHODOLOGY
It refers to the high level structures of a software system, the discipline of creating such
structures, and the documentation of these structures.
SOFT ARCH

The process of identifying, modeling and documenting how data moves around an
information system.

DATA FLOW MODELLING


The process of identifying, modeling and documenting the data requirements of the system
being designed.
LOGICAL DATA MODELLING
This is the stage where all the logical specifications of the systems are converted into descriptions
of the system in terms of real hardware and software.
PHYSICAL DESIGN
The stage where the analyst must decide on the overall design of the new system.
STAGE 2
In this stage, a large number of options for the implementation of the new system are generated.
STAGE 4
The first and most important design activity in software development.

DATA DESIGN
A software architecture based on the idea that changing the value of a variable should
automatically force recalculation of the values of variables which depend on its value.
DATAFLOW
A systematic approach to estimating the strengths and weaknesses of alternatives that
satisfy transactions, activities or functional requirements for a business.
CBA
QUIZ 3
Is a sub-discipline of project management in which software projects are planned, implemented,
monitored and controlled.
SOFTWARE PROJECT MANAGEMENT
provides the basis for the other management functions, particularly tracking and controlling.
PLANNING

requires that a demonstrable balance be achieved among the driving requirements, the
architecturally significant design decisions, and the life-cycle plans before the resources are
committed for full-scale development.
BASE THE PROCESS
The structure that addresses the issue of organization of the individual project teams is called

TEAM STRUCTURES
is a structure that does not enforce any formal team hierarchy.
DEMOCRATIC
is a structure that draws upon the ideas from both the democratic organization and the
chief-programmer organization.
MIXED TEAM
is a part of project management, which relates to the use of schedules such as Gantt charts to plan
and subsequently report progress within the project environment.

PROJECT PLANNING
goal is to improve current and future management of outputs, outcomes and impact
and is mainly used to assess the performance of projects, institutions and programs set up
by governments, international organizations and NGOs.
MONITORING AND EVAL
A continuous assessment that aims at providing all stakeholders with early detailed information on
the progress or delay of the ongoing assessed activities is called
MONITORING
The set of procedures used by organizations to ensure that a software product will meet its quality
goals at the best value to the customer, and to continually improve the organization’s ability to
produce software products in the future is called

SOFTWARE QUALITY CONTROL


CS 411
Jeremy Bentham's advice on pursuing pleasure is called ______________.
CALCULUS OF FELICITY

It argues that every act ought to be motivated by self-interest. It concludes that acting in self-interest
is the best motivator.
MORAL EGOISM
It breaks down even further into two subcategories: necessary (food, sleep, etc.) and unnecessary
(sexual desires, etc.)
NATURAL DESIRES
He claimed that no act should be undertaken except for the pleasure which results, and no act
should be rejected but for the pain it produces.
EPICURUS
He is concerned that a utilitarian might actually conclude that a game of push-pin really was better
than poetry.
JOHN STUART MILL
He is the father of utilitarianism.
JEREMY BENTHAM

He sought to rewrite utilitarianism in such a way that he would be able to demonstrate that
Shakespeare outranked push-pins.

JOHN STUART MILL


This is known as moral philosophy. It seeks to address questions of morality: right vs. wrong, good
vs. bad, etc.

ETHICS
It is a theory of moral philosophy that is based on the principle that an action is morally right if it
produces a greater quantity of good or happiness than any other possible action.

UTILITARIANISM
This theory asserts that the empirical consequences of any given act have nothing to do with the
moral worth of the act.
NON CONSEQUENTIALIST

QUIZ 2
These are often established by professional organizations to help guide members in performing their
job functions according to sound and consistent ethical principles.
PROFESSIONAL ETHICS

Orientation that requires that employees identify with and commit to specified conduct.
COMPLIANCE
Orientation that focuses more on an abstract core of ideals such as respect and responsibility
VALUES

It is a program that creates the firm's ethical climate and helps ensure that all employees understand
the organization's values and comply with the policies and codes of conduct.
ETHICAL PROGRAMS
This represents employee ethics with formal statements that describe what an organization expects
of its employees.
CODES OF CONDUCT
Corporate or business ethics with the most comprehensive document and consists of general
statements that serve as principles and the basis for the rules of conduct.
CODES OF ETHICS
This serves the general public and addresses stakeholder interests.
STATEMENT OF VALUES

These are formal statements of what an organization expects in the way of ethical behavior.
CODES OF ETHICS
May be centralized (perhaps temporarily) so that top level managers can ensure that ethical
decisions are made.
DECENTRALIZED
May be decentralized (perhaps temporarily) so that lower level managers can make more decisions.
CENTRALIZED
LONG QUIZ
Software engineers shall maintain integrity and independence in their professional __________.
Select one:
JUDGEMENT
In what year was IEEE Code of Ethics adopted by the American Institute of Electrical Engineers
(AIEE)?
1912
It includes things such as decorative clothing, exotic foods, etc.
VAIN DESIRE
He believed no one would knowingly operate against their best interests, and those that did were
clearly ignorant of what their best interests were.

PLATO
In what year did the Board fo Directors approve the revision to the IEEE Code of Ethic?
2006

It is important to review other people's work. Experience has shown that problems are eliminated
earlier this way and reviews are as effective or even more effective than testing.
Peer reviews
Programming is a fraction of the total project effort, but it is often the most visible. Other work equally
important includes requirements, architecture, analysis, design, and test.
Construction
It is an integral part of software development that needs to be planned.
Testing
It involves knowing the state of all artifacts that make up your system or project, managing the state
of those artifacts, and releasing distinct versions of a system.
Config man

It is important to establish quality priorities and release criteria for the project so that a plan is
constructed to help the team achieve quality software.
Qual and def

Without the operations department, you cannot deploy and support a new application.
System operation and support
Most applications are not brand new, but are enhancements or rewrites of existing applications,
therefore, data transfer is usually a major project by itself.
Data mig
It is important to choose the appropriate development lifecycle process to the project at hand
because all other activities are derived from the process.
Dev pro
Gathering and agreeing on requirements is fundamental to a successful project.
Requirement
Even with a good architecture, it is still possible to have a bad design. Many applications are either
over-designed or under-designed.
Design

Finals
is a structure that does not enforce any formal team hierarchy
Democratic
An agile method for project management developed by Ken Schwaber.
Scrum

A programming language that had a built-in support for a simple form of literate programming.
Haskell
Which of the following best described a code inspection?
Perform code examination for the presence of some common programming errors
It is a requirements-definition and user-interface design methodology in which end-
users, executives, and developers attend intense off-site meetings to work out a system's details.
JAD
A type of tools that can be used for business application development usually enclosed in a
package, allowing both business data manipulation and reporting.
Powerbuilder
The process of identifying, modeling and documenting how data moves around an
information system.

Data flow modelling


This is the documentation/ compilation of code, algorithms, interfaces, and APIs.
Technical

A software architecture based on the idea that changing the value of a variable should
automatically force recalculation of the values of variables which depend on its value.
Data flow
Which of the following best describe a black-box testing?
Equivalence
It includes all the costs needed to achieve the required Quality levels.

COQ
The process of identifying, modeling and documenting the data requirements of the system
being designed.
Logical Data Modelling
Even with a good architecture, it is still possible to have a bad design. Many applications are either
over-designed or under-designed.

Design
A discipline that is concerned with all aspects of software production from the early stages of system
specification to maintaining the system after it has been used.
Soft eng
Clearly determines the items that make up the software or system that includes source code, test
scripts, third-party software, hardware, data and both development and test documentation.
Conf man
n Java programming language, where does the term Java taken from?
Oak
This is a special breed of design document that is also known as software description.
Archi
It refers to the written text that accompanies computer software. It either explains how it operates or
how to use it; and may mean different things to people in different roles.
Soft doc
A very important part of the design document in enterprise software development that contains
Conceptual, Logical, and Physical Design Elements
DDD
Comprises of processes that ensure that the Software Project would reach its goals.

SQM
Which of the following best described a branch coverage test suite?
EDGE
It is a kind of validation process that is usually carried out during the routine service, manufacturing
or engineering processing.
CONCURRENT
The set of procedures used by organizations to ensure that a software product will meet its quality
goals at the best value to the customer, and to continually improve the organization’s ability to
produce software products in the future is called
SQC
An activity where increasing software maintainability or reliability is ensured to prevent problems in
the future.
PREVENTIVE
The experienced people in the technical aspects of the technology, as well as in
project management, who are assigned to oversee the implementation process from start to finish.
PRO MAN
the policies that govern the operation of a computer system

PROCEDURES
A software maintenance process wherein by confirming the modified work with the individual who
submitted the request, it could ensure that the modification provided a solution
ACCEPT AND MOD
is a structure that draws upon the ideas from both the democratic organization and the
chief-programmer organization

MIXED TEAM
It is a framework used to structure, plan, and control the process of developing an information
system
SOFT DEV
It is business management software—typically a suite of integrated applications—that a company
can use to collect, store, manage and interpret data from many business activities.
ERP
Which of the following best described a white-box testing?
Perform a a design test cases based on analysis of some aspect of source code heuristically

A recognition of the fact that it is easier to do things in a familiar context


CONSISTENCY
Which of the following best described a code walktrough?
INFORMAL

These are statements that identify attributes, capabilities, characteristics, or qualities of a system.
This is also the foundation for what shall be or has been implemented.
REQUIREMENT
It is a conceptual framework for undertaking software engineering projects
AGILE
This category includes the computer itself, which is often referred to as the central processing unit
(CPU), and all of its support equipment.
HARDWARE
A controlled and coordinated sequence of activities during which a system is
transferred progressively from the developer to the maintainer.
TRANSITION
is a part of project management, which relates to the use of schedules such as Gantt charts to plan
and subsequently report progress within the project environment
PROJECT PLANNING
What does FORTRAN stand for?

FORMULA TRAN
In C programming language, what does C stand for?
COMPILER
t is an approach in managing a company’s interactions with current and future customers and it often
involves using technology to organize, automate, and synchronize sales, marketing, customer
service, and technical support.
CRM
Which of the following best described an integration testing?
SLOWLY
goal is to improve current and future management of outputs, outcomes and impact
and is mainly used to assess the performance of projects, institutions and programs set up
by governments, international organizations and NGOs.

MAND E
This means that the Software product delivered should be as per the requirements defined
ISO

A style on how code documents are often organized, allowing a programmer to quickly look up an
arbitrary function or class

REF GUIDE
A methodology for creating software within a very unstable environment and it allows flexibility within
the modelling process

EXTREME
This refers to the various facets of a gemstone - each a different face on an underlying core.
CRYSTALS
quantitative measure of a degree to which a software system or process possesses some property.

SOFT M
Which of the following best described a clean room testing?
MAINTAINABLE
He first addressed the Software maintenance and evolution of systems in 1969.

MEIR
A maintenance activity consisting of diagnosing and fixing errors, possibly ones found by users.
CORRECTIVE
It is a general term that refers to any programming language that offers speedier implementation
than do traditional third-generation languages such as C/C++, Pascal, or Fortran. Rapid-
Development Languages (RDLs) produce their savings by reducing the amount of construction
needed to build a product
RDL

Which of the following best described a fault-based testing?


FAULT MODEL
A sophisticated lifecycle model that focuses on early identification and reduction of project risks
SPIRAL
A coding technique where maintenance is highly complicated due to difficulty in tracking every
sequence or module it passes.
SPAG
Describes a responsibility-driven methodology for modularization in an object-oriented context
MODULARITY
requires that a demonstrable balance be achieved among the driving requirements, the
architecturally significant design decisions, and the life-cycle plans before the resources are
committed for full-scale development.
BASE THE PROCESS
The stage where the analyst must decide on the overall design of the new system.

STAGE 2
s to the high level structures of a software system, the discipline of creating such structures, and the
documentation o
SOFT ARCH
A type of 4GL where instead of using code, the developer defines his logic by selecting an operation
in a pre-defined list of memory or data table manipulation commands
TABLE DRIVEN
n this stage, a large number of options for the implementation of the new system are generated
STAGE 4

A kind of validation is done against the written specifications and is actually based on the historical
data or evidence that has been documented.
RETRO
The first and most important design activity in software development.
DATA DESIGN
It refers to the process of setting up new software or hardware after a purchase is made
IMPLEMENTATION

This is the stage where all the logical specifications of the systems are converted into descriptions
of the system in terms of real hardware and software

PHYSICAL DESIGN
A very broad activity that includes error correction, enhancements of capabilities, deletion of
obsolete capabilities, and optimization

SOFT MAIN
It describes the quality objectives and specifies the quality assurance and control activities to be
performed in day-to-day company operations
Q PLAN
provides the basis for the other management functions, particularly tracking and controlling.
PLANNING
A systems approach to the analysis and design of information systems
METHODOLOGY
A systematic approach to estimating the strengths and weaknesses of alternatives that
satisfy transactions, activities or functional requirements for a business
CBA
The structure that addresses the issue of organization of the individual project teams is called
TEAM STRUCTURES

This contains software preparation and transition activities, such as the conception and creation of
the maintenance plan.
IMP PRO
The term that refers to computer programs and the manuals (if any) that support them.
SOFTWARE
This process recognizes that the traditional waterfall approach can be inefficient because it idles key
team members for extended periods of time
RUP
This methodology embodies the notion of dynamic stability which can be thought of as similar to how
Scrum embraces controlled chaos.
LD
Which of the following best described code review

REMOVAL MECHANISM
is a sub-discipline of project management in which software projects are planned, implemented,
monitored and controlled.

SPM
It requires learning to look at software and software components from two points of view: what it
does, and how it does it.
ABSTRACTION
Determines the standards that are relevant for the Software Product, the Organization and the
means to achieve them
QP
t refers to documentation for the end-user, system administrators and support staff
END USER
The modification of a software product after delivery to detect and correct latent faults in the software
product before it becomes effective faults
PREV MAIN
A continuous assessment that aims at providing all stakeholders with early detailed information on
the progress or delay of the ongoing assessed activities is called
MONITORING

An academic study of systems with a specific reference to information and the complementary
networks of hardware and software that people and organizations use to collect, filter, process,
create and also distribute data.
INFO SYS
refers to documentation on how to market the product and the analysis of the market demand.

MARKETING
Which of the following best described a unit testing?
Code is tested a whole
It is a requisite in the quality management process and it makes sure that the process or product
meets the purpose intended.
Validation
This enables a programmer to write programs that are more or less independent from a particular
type of computer.
3GL
Deals with the practical and theoretical problems of collecting and analyzing information in a
business function area.
Information Management

A maintenance activity wherein modifying the system to cope with changes in the software
environment is done to ensure that the system is up to date.
Adaptive
A term which means shape, or more generally, plan.
Schema
_______are the policies that govern the operation of a computer system.
Procedures

A recognition of the fact that it is easier to do things in a familiar context.


Consistency
They deal with structures and algorithms without regard for the meaning or importance of the data
that is involved.
Software Developer
This is the stage where all the logical specifications of the systems are converted into descriptions
of the system in terms of real hardware and software.
Physical Design
Which of the following best described code review?
Perform code evaluation for defects and removal mechanism
Research and Development department is developing new product models to increase sales.
TACTICAL
List of allocated and transferred budget to project sites.
OPERATIONAL
A matrix showing the attended and needed trainings of every employee per work category.

STRATEGIC
Middle Managers use

TACTICAL
What are the two methods of business processing?
OLT AND BATCH
In a hotel information system, this type of information is strategic.

PUTTING UP
Large detailed reports are highly structured.
TRUE
Yearly manufacturing production of quota of mobile phones.

STRATEGIC
Corrective maintenance plan or schedule
OPERATIONAL
Processing the college entrance exam in a university every year is an example of

BATCH
List of volunteers in every barangay.
OPERATIONAL
Available stocks in the every warehouse.
OPERATIONAL
Mr. Reyes is the Strategic Manager of the company. In the management meeting, he needs to
present the
LONG TERM
Mr. Cruz, the IT Manager, has developed a 10 year IT plan. This plan will be used as a reference in
building the IT department. What type of information did Mr. Cruz develop?
STRATEGIC
What statutory information is expected from a school?

ENROLLEES
Marketing techniques of school branches and providing incentives to the best performing branch
TACTICAL
List of existing projects and the number of beneficiaries per project.

OPERATIONAL
The ______ requires the operational information.
LINE MANAGER
In a cigarette manufacturing, which of the following information is statutory?

REAM
Which of the following is a representation of flow of information?
DFD
Jonathan is the programmer of the TRA Global Software Company. He is currently developing the
modules of the information system. What stage is the software development in?
SYSTEM IMPLEMENTATION
Ferdie is the Systems Analyst of the TRA Global Software Company. He needs to document the
complex decision logic. What tools does he need to use?
DECISION TABLE

This is the stage wherein user testing is being conducted.


SYSTEM IMPLEMENTATION
This is a model used in project management that describes the stages involved in the development
of a project starting from the feasibility study through the maintenance and enhancement of the
system.
SDLC

Ronnie is the IT Engineer of the TRA Global Software Company. He identified the type of server,
desktop computers needed to implement the proposed information system. What stage is the
software development in?
HARDWARE

Aldrin is the Sr. Programmer of TRA Global Software Company. He received the list of modules to
be fixed. He is now debugging the system. The software development is in ___________________.
SYSTEM MODIFICATION
TRA Global Software Company was contracted to develop a system that would track the
procurement process of XYZ Corporation. The Procurement Manager of XYZ Corp had identified
several applications encompassing the proposed procurement system to TRA Global Software
Company. At what stage of the software development cycle is this activity?

REQUIREMENT SPECIFICATIONS
The goal of this stage is to assess if it is possible to meet the requirements specified, subjected to
constraints of budget, human resource and hardware.

FEASIBILITY
Choose the letter that corresponds to the correct answer. Which of the following is NOT a major
responsibility of a systems analyst?
D
What stage should be completed before the training of users on how to operate the information
system be conducted?
SYSTEM DESIGN
UML stands for
UNIFIED
Refer to the diagram below and identify the stages of the software development life cycle.
FEASIB
TRA Global Software Company had developed the SRS and XYZ Corp. had approved the
document.
What stage the software development is in?
SYSTEM IMPLE

Which of the following is NOT included in the SRS document?


PROGRAMMING CODES
John is estimating the cost and benefit of the proposed procurement system. At what stage of the
software development cycle is this activity?
FEASIB
The software development team of TRA Global Software Company is understanding the existing
system. The team is now in stage ________________________.
SPECI
Which is the most important attribute of a systems analyst?
EXCELLENT
In this stage, glitches of the system are being identified.

SYSTEM MAINTENANCE
This tool uses a simple stick figure. The simple stick figure is used to represent an actor and is given
a name that characterizes the role that the actor is playing.
DFD
In a DFD, a line with arrow represents _______.

DATA ENTRY
What is the most important and difficult task of a Systems Analyst?
SRS DEV
In DFD, a pair of parallel lines represents ______.
STORAGE
Which of the following is correct about data gathering?
D
Let the interviewee do most of the talking.
FALSE
Which of the following is NOT a recommended technique during interview?
ALL
Questionnaires can be useful in information gathering when users ____.
ALL
SRS is developed by ________.

SYSTEM ANAL
Ana is the Procurement Manager of XYZ Corporation. TRA Global Software Corporation had started
the data gathering for XYZ Corporation. Ana has informed TRA that they have an existing running
application system. What is the next step the TRA should do?
ANAL
Data gathering for system analysis can be done in ________.

SEVERAL
Choose the letter that corresponds to the correct answer: Which of the following describes DFD?
ALL
Who among the following should be interviewed at the start of the project?
RANK
What is the most important role of a systems analyst in business?
PROBLEM

George is the Systems Analyst of the TRA Global Software Corporation, the company was
contracted to develop a hotel information system. George is assigned to conduct an information
gathering. Which of the following should George not avoid during the information gathering stage?
ALL
Systems Analyst used DFD as a tool in designing a system. DFD stands for ______.

DATA FLOW DIAG


John is one of the System Analysts of TRA Global Software Corporation. Which of the following
manners should he observe during the interview?

ALL
During data gathering, interviews are conducted for the purpose of _____.
PRESENTATION
A circle in a DFD represents _____.
PROCESS
Develop a long questionnaire to capture all the issues and concerns on the system.
FALSE
when designing a system, the following are good sources of information EXCEPT ____.

NONE
This is needed to find economic feasibility of proposed solution.
CBAA
TRUE or FALSE. The statement “up to date product information on the web” is an example of a
tangible benefits.
FALSE

Deficiencies in a system are pinpointed by identifying


B
The goals of the project are set
BEFORE

TRUE or FALSE. The “personnel cost” is a tangible cost.


TRUE
TRUE or FALSE. For each alternative solution for the project, it is necessary to evaluate the tangible
benefits only before picking a solution. Intangible benefits do not have cost to be analyzed.
TRUE
feasibility examines whether the proposed method can fit in with existing organizational processes.
OPERATIONAL

In the feasibility analysis stage of the SDLC, which of the following activity comes next after setting
the goals?
FIND
TRUE or FALSE. The “cost of delay in data processing” is an intangible cost.
TRUE
TRA Global Software was contracted to develop the procurement process of the XYZ Corporation.
Arlene is the assigned Systems Analyst of the proposed project. The proposed system will interface
at different department of the organization (Procurement, Accounting, Finance and Administrative)
Which of the following is NOT a characteristics of a goal of the project that Arlene need to consider?
NONE
Given the goal, “Processed data at the fastest time within the working hours.”
QUANTIFIED
feasibility examines whether the returns (in terms of benefits from the project) are commensurate
with the cost of the project.
ECONOMIC
TRUE OR FALSE. Cost-benefit analysis ensures that an information system is developed at
minimum cost.
TRUE
In the analysis a system of the proposed system, The time spent by XYZ Corporation office staff to
perform a task
Indirect
TRUE or FALSE. The “cost of database migration service” is an intangible cost.

FALSE

In evaluating alternative solutions, the methods must be technically, operationally and Answer

Economically
TRUE or FALSE. The “the cost of a hi-end server for application software” a tangible cost.
TRUE
At the end of the feasibility analysis,
D
__________ may include increased sales due to improved customer services or to managers having
better information on which to base decisions.
CBA

Decision trees are drawn _________________


Left to Right
The ___________ tag is used to link a web page to another page.
Anchor tag

A relationship is in 2NF if,


It is in 1NF
A 3 NF relation is converted to BCNF by
dependent attributes of overlapping composite keys are put in a separaterelation

Web@AT Corporation is newly established software company. Mr. Ang want to have a fast and
reliable DSL internet connection to his office. He asked his IT Officer to apply for a fast connection.
Which of the following the IT Office need to do first?
Check the telephone line if capable of DSL connection
To model an information system using objects the requirements specification is examined and all
_____________ in it are picked as potential operations.
Nouns
A subsystem of a complex system must specify

with which subsystems it co-operates


Aldrin is the Systems Analyst of the company. As a System Analyst, he need to ensure logs are
kept, who did in critical data entry and processing. What does Aldrin need to implement?
An Audit Trail
One entity may be
related to many other entities

A relation is said to be in BCNF when


it has overlapping composite keys
To model an information system using objects the requirements specification is examined and all
_____________ in it are picked as potential operations.
Nouns
Mr. Yu wants to have a report on the number enrollees in all university campuses. This will be used
for analyze in putting up a new campus. Mr.Yu is in the _________________.
Operational Management
This is a standards used to define a method of exchanging data over a computer network such as
local area network, Internet, Intranet. These is being used by computer to send data over the
internet.
Router
The current version of HTML is _______________. Version 5
Which of the following can be used to present reports to Top Management?
All of the choices

Hiding implementation details of methods from outside world.


Encapsulation
A type of testing wherein incorrect inputs, incorrect processing and incorrect outputs will be detected
during operation.
Full Testing
This is concerned with protecting data from erasure, theft, unauthorized access and unauthorized
modifications.
Data Security

Jonathan is the Report Designer of the TRA Corporation under System Department. He is tasked to
design reports of the newly developed web application system. Which of the following he need to
consider in his design?
All of the choices
Picking necessary operation and attributes to specify objects.
Abstraction
Pie charts are normally used when
relative distribution of data in specified categories is to be shown

New classes are created from current classes by using the idea of _____________.
Inheritance
Which of the following is the best hierarchy of design of a report?
Control footing, Final footing, Report footing

In Entity Relationship, the Employee number, Gender, Salary are examples of


Entity
An advantage of symmetric key is easy and fast transformation of plain text to cipher text.
True
A firewall is used in a system connected to a wide area network to

prevent unauthorized access by hackers


Functions and procedures are

Objects with similar meaning and purpose grouped together as ____________.


Class

The versions of IP address that coexist in the internet are _______________ and ____________.

Version 4 & 6
Who among the following uses reports for strategic management?
Top Management
Control in design of an information system is used to

ensure privacy of data processed by it


DFD stands for _____________
Data Flow Diagram
Information System is being tested as a whole system. What kind of testing is being conducted?

System Testing
Control in design of an information system is used to

Relationships are identified from the word statement of a problem by

picking words which are verbs


Aldrin want to conduct a testing of the developed information system together with the manual
system using live data. What kind of testing Aldrin will conduct?

Parallel Test
Buttons which can be clicked using a mouse are placed in screens as
they are convenient to use
This is an industry standard notation to represent a class.
UML
Errors are found in an operational information system will result to
lost of trust in the IS
Which of the following is an OPTIONAL when designing reports?
Use of page and report footer

A query operation on an object


has no side effects
This is concerned with protecting data regarding individuals from being accessed and used without
the permission/knowledge of concerned individuals.
Data Privacy
In ER Model, a relationship is represented by a

Diamond shape
This acts on behalf of all users of an organization wanting to use the internet.
Internet Application Protocol
E-R Model has the ability to describe

All of the choices


These are used for formatting and creating links from one webpage to another.
All of the choices
Inheritance in object-oriented modelling can be used to

create new classes


Why is there a need to control in information system?
Information system stores large volume of data.
The ER diagram is interpreted as follows:
A Manager supervises exactly N employees
Which of the following is a valid ER Diagram?

Which of the following is a control technique during input preparation?


Data entry validation
Which of the following is used to secure an E Commerce
All of the choices
Which of the following is the best hierarchy of design of a report?
Report heading, Page heading, Control heading, Detail lines
When sending data from the source to destination, the message is ____________.
broken up into packet

An instance of an object is created by a


constructor operation
The last step in object oriented modelling is
develop an object interaction/collaboration graph

The first step in object oriented modelling is


Find objects and their classes
Each computer connected to the internet must
have a unique IP address

A member of a class is __________________.


an object instance
Designing screens uses principles

similar to those used for printed reports


Each statement in DTD declares the element of HTML language.
False
Each column in the relation corresponds to _____________

Records

Aldrin is the network engineer of the TRA Corporation. TRA Corporation has offices in Cebu, Iloilo
and in Davao. As a network engineer, he need to connect the LAN of different offices to the main
office in Makati City. What computer hardware network equipment he need to use to connect these
offices.
Internet
Functions and procedures are
have side effects which require special care if they are used as subsystems
A __________ Key Encryption eliminates the key distribution problem
Public
HTML can be read by a text editor.
True
Arlene was assigned to produce the daily progress report of service contractors. To whom will
Arlene submits the reports?
Middle Management
Given the email address, inquiry@amauonline.com, what is the domain?
.com
Entities are identified from the word statement of a problem by
picking words which are nouns
Aldrin want to conduct a testing of the developed information system together with the manual
system using data used from manual system to test system when it is first implemented. What kind
of testing Aldrin will conduct?
Pilot Testing

In Entity Relationship, a tuple is


a row of relation

George is assigned present a report in a management meeting to be attended by school directors of


different university campuses. Which of the following is the best report he need to present?
All of the choices

Who uses the report for tactical management?


Middle Management
Given the email address, inquiry@amauonline.com, what is the domain?
.com
In the ER Diagram, normally entities are
Nouns
It is a communication protocol used to retrieved web pages.
HTTP

Jonathan is the Web Programmer of TRA Corporation. He was assigned to develop an informative
website. He wants to use user defined tags. What markup language he will use?
HTML
By auditing around the computer we mean
the programs and procedures are checked for correctness
BoyeCodd Normal Form (BCNF) is needed when
there are two or more possible composite overlapping keys and one attribute of a composite
key is dependent on an attribute of another composite key
Audit in the design of information system is used to
ensure that the system processes data as it was designed to and that the results are reliable

In object modelling, special properties of objects are


encapsulation, inheritance and polymorphism
IP addresses are converted to

hierarchy of domain names


A "flat file" is also called
1NF
Ronnie want to protect his data when sending from the main office to the branch office.
Which of the following information security he will apply?
Encryption

Designing screens uses principles


similar to those used for printed reports
HTTP is a language used to create web pages.
False

Every member of an entity set is described by its _______________.


Attributes
It is also known as information hiding.
Encapsulation
In ER Model, student, teacher, professor and school are
Entity
In the ER Diagram, relationships are
Verbs

This is a process of accessing state without changing value.


Query
Page footing is the labels printed at the end of a report

Ronnie is the IT Security Officer of the TRA Corporation. His task is to secure/protect the data and
programs of the company. Which of the following action he will do?
All of the choices
This is the address of a web page on the internet. URL
This is acomputer-to-computer exchange of business documents in a standard electronic format
between business partners.
Email
The purpose of parallel run is to
test a system being newly designed
This is a set of procedures that manage a database and provide application program access the
database in a form requested by the application programs.
DMBS
Grade sheets and product list are reports needed by
Operational Management

The process of unscrambling the message is called


Decryption
Objects also promote their reuse in many systems.
False

Given the IP address, 192.168.1.10 and 192.168.1.100. Are the IP addresses in the same network?
True
Computer systems are designed by
breaking of the system into smaller self-contained co-operating subsystems

Write TRUE or FALSE in the space provided.


National security and individual privacy are both critical and important to consider.
TRUE
Amazon enables users to set and manage parental controls connected to devices used by children
such as Kindle. For example, a parent may opt to set a PIN on Purchase to authorize purchases and
rentals. This is an example of what kind of ethical dilemma in privacy?

Parental Surveillance
The process of collecting data about a person using false pretenses.
Pretexting
This aims to check applications, databases, networks, remote computing resources, and any other
system connected to the business that is vulnerable.
Penetration testing
Employers should search an employee's personal effects for the purpose of searching for any
suspicious conversations and unnecessary use of social media.
TRUE
What does FORTRAN stand for?
Formula Translation
In Java programming language, where does the term Java taken from?
Oak Tree
This contains software preparation and transition activities, such as the conception and creation of
the maintenance plan.
Implementation process
It is business management software—typically a suite of integrated applications—that a company
can use to collect, store, manage and interpret data from many business activities.
ERP
It refers to the written text that accompanies computer software. It either explains how it operates or
how to use it; and may mean different things to people in different roles.
Soft doc
An activity where increasing software maintainability or reliability is ensured to prevent problems in
the future.
Preventive
The experienced people in the technical aspects of the technology, as well as in
project management, who are assigned to oversee the implementation process from start to finish.
Program manager
A style on how code documents are often organized, allowing a programmer to quickly look up an
arbitrary function or class.
Ref guide
A very important part of the design document in enterprise software development that contains
Conceptual, Logical, and Physical Design Elements.
DDD
A maintenance activity consisting of diagnosing and fixing errors, possibly ones found by users.
Corrective
This enables a programmer to write programs that are more or less independent from a particular
type of computer.
3GL
It is an approach in managing a company’s interactions with current and future customers and it
often involves using technology to organize, automate, and synchronize sales, marketing, customer
service, and technical support.
CRM
It refers to documentation for the end-user, system administrators and support staff.
End user
A type of tools that can be used for business application development usually enclosed in a
package, allowing both business data manipulation and reporting.
PowerBuilder

He first addressed the Software maintenance and evolution of systems in 1969.


Meir
A programming language that had a built-in support for a simple form of literate programming.
Haskell
These are statements that identify attributes, capabilities, characteristics, or qualities of a system.
This is also the foundation for what shall be or has been implemented.
Requirement
This is the documentation/ compilation of code, algorithms, interfaces, and APIs.
Technical
A software maintenance process wherein by confirming the modified work with the individual who
submitted the request, it could ensure that the modification provided a solution.
Acceptance and modification process
A controlled and coordinated sequence of activities during which a system is
transferred progressively from the developer to the maintainer.
Transition
In C programming language, what does C stand for?
Compiler
A maintenance activity wherein modifying the system to cope with changes in the software
environment is done to ensure that the system is up to date.
Adaptive
This is a special breed of design document that is also known as software description.
Archi
It refers to the process of setting up new software or hardware after a purchase is made.
Implementation

A term which means shape, or more generally, plan.


Schema
It refers to documentation on how to market the product and the analysis of the market demand.
Marketing
A very broad activity that includes error correction, enhancements of capabilities, deletion of
obsolete capabilities, and optimization.
Soft main
A coding technique where maintenance is highly complicated due to difficulty in tracking every
sequence or module it passes.
Spaghetti code
The modification of a software product after delivery to detect and correct latent faults in the software
product before it becomes effective faults.
Preventive maintenance
A type of 4GL where instead of using code, the developer defines his logic by selecting an operation
in a pre-defined list of memory or data table manipulation commands.
Table-driven (codeless) programming

This of the following is not part of comparison condition used in single row subquery.
IN
Which of the following is not true rule to follow in writing PL/SQL that contains subquery?
The subquery can appear on either side of the comparison operator.

Supposed that table: Workers and Employees is consists of the following values.
What will be the output if the user uses this PL/SQL.
DELETE FROM WORKERS
WHERE LASTNAME = (SELECT LASTNAME FROM EMPLOYEES WHERE LASTNAME=Cruz’)
Employee in Employees table with lastname equal to Cruz will be deleted.
Which of the following is not part of comparison condition used in multiple row subquery.
=
Supposed that table: Workers and Employees is consists of the following values.
What will be the output if the user uses this PL/SQL.
UPDATE WORKERS
SET DEPARTMENT = (SELECT DEPARTMENT FROM EMPLOYEES WHERE DEPARTMENT
=’HR’);
All Workers department will be set to HRD

Supposed that table: Workers and Employees is consists of the following values.
What will be the output if the user uses this PL/SQL.
UPDATE EMPLOYEES
SET LASTNAME = (SELECT LASTNAME FROM WORKERS WHERE LASTNAME=’Soriano’)
WHERE ID=105;
The lastname of Cruz from Employees table will be set to NULL
Supposed that table: Workers and Employees is consists of the following values. What will be the
output if the user uses this PL/SQL.
SELECT ID, LASTNAME, DEPARTMENT
FROM WORKERS
WHERE ID > (SELECT ID FROM EMPLOYEES WHERE STATUS = ‘Probi’);
This will retrieve the record of Mortos and Santiago
Supposed that table: Workers and Employees is consists of the following values.
Which of the following is the correct example of copying data from WORKERS table to
EMPLOYEES table where the status is equal to ‘Regular’?
INSERT INTO EMPLOYEES (ID, LASTNAME, DEPARTMENT)
VALUES (SELECT ID, LASTNAME, DEPARTMENT
FROM WORKERS
WHERE STATUS = ‘Regular’);
Which of the following is not true application of subquery in DML statements?
Merge one table to another table.
Which of the following are the two types of subquery.
Single row and multiple row subquery
Write TRUE or FALSE in the space provided.
National security and individual privacy are both critical and important to consider.
TRUE
Amazon enables users to set and manage parental controls connected to devices used by children
such as Kindle. For example, a parent may opt to set a PIN on Purchase to authorize purchases and
rentals. This is an example of what kind of ethical dilemma in privacy?

Parental Surveillance
The process of collecting data about a person using false pretenses.
Pretexting
This aims to check applications, databases, networks, remote computing resources, and any other
system connected to the business that is vulnerable.
Penetration testing
Employers should search an employee's personal effects for the purpose of searching for any
suspicious conversations and unnecessary use of social media.
TRUE
What does FORTRAN stand for?
Formula Translation
In Java programming language, where does the term Java taken from?
Oak Tree
This contains software preparation and transition activities, such as the conception and creation of
the maintenance plan.
Implementation process
It is business management software—typically a suite of integrated applications—that a company
can use to collect, store, manage and interpret data from many business activities.
ERP
It refers to the written text that accompanies computer software. It either explains how it operates or
how to use it; and may mean different things to people in different roles.
Soft doc
An activity where increasing software maintainability or reliability is ensured to prevent problems in
the future.
Preventive
The experienced people in the technical aspects of the technology, as well as in
project management, who are assigned to oversee the implementation process from start to finish.
Program manager
A style on how code documents are often organized, allowing a programmer to quickly look up an
arbitrary function or class.
Ref guide
A very important part of the design document in enterprise software development that contains
Conceptual, Logical, and Physical Design Elements.
DDD
A maintenance activity consisting of diagnosing and fixing errors, possibly ones found by users.
Corrective
This enables a programmer to write programs that are more or less independent from a particular
type of computer.
3GL
It is an approach in managing a company’s interactions with current and future customers and it
often involves using technology to organize, automate, and synchronize sales, marketing, customer
service, and technical support.
CRM
It refers to documentation for the end-user, system administrators and support staff.
End user
A type of tools that can be used for business application development usually enclosed in a
package, allowing both business data manipulation and reporting.
PowerBuilder
He first addressed the Software maintenance and evolution of systems in 1969.
Meir
A programming language that had a built-in support for a simple form of literate programming.
Haskell
These are statements that identify attributes, capabilities, characteristics, or qualities of a system.
This is also the foundation for what shall be or has been implemented.
Requirement
This is the documentation/ compilation of code, algorithms, interfaces, and APIs.
Technical
A software maintenance process wherein by confirming the modified work with the individual who
submitted the request, it could ensure that the modification provided a solution.
Acceptance and modification process

A controlled and coordinated sequence of activities during which a system is


transferred progressively from the developer to the maintainer.
Transition
In C programming language, what does C stand for?

Compiler
A maintenance activity wherein modifying the system to cope with changes in the software
environment is done to ensure that the system is up to date.
Adaptive
This is a special breed of design document that is also known as software description.
Archi
It refers to the process of setting up new software or hardware after a purchase is made.
Implementation
A term which means shape, or more generally, plan.
Schema
It refers to documentation on how to market the product and the analysis of the market demand.
Marketing
A very broad activity that includes error correction, enhancements of capabilities, deletion of
obsolete capabilities, and optimization.
Soft main
A coding technique where maintenance is highly complicated due to difficulty in tracking every
sequence or module it passes.
Spaghetti code
The modification of a software product after delivery to detect and correct latent faults in the software
product before it becomes effective faults.
Preventive maintenance
A type of 4GL where instead of using code, the developer defines his logic by selecting an operation
in a pre-defined list of memory or data table manipulation commands.
Table-driven (codeless) programming
This of the following is not part of comparison condition used in single row subquery.
IN
Which of the following is not true rule to follow in writing PL/SQL that contains subquery?
The subquery can appear on either side of the comparison operator.
Supposed that table: Workers and Employees is consists of the following values.
What will be the output if the user uses this PL/SQL.
DELETE FROM WORKERS
WHERE LASTNAME = (SELECT LASTNAME FROM EMPLOYEES WHERE LASTNAME=Cruz’)
Employee in Employees table with lastname equal to Cruz will be deleted.
Which of the following is not part of comparison condition used in multiple row subquery.
=
Supposed that table: Workers and Employees is consists of the following values.
What will be the output if the user uses this PL/SQL.
UPDATE WORKERS
SET DEPARTMENT = (SELECT DEPARTMENT FROM EMPLOYEES WHERE DEPARTMENT
=’HR’);
All Workers department will be set to HRD
Supposed that table: Workers and Employees is consists of the following values.
What will be the output if the user uses this PL/SQL.
UPDATE EMPLOYEES
SET LASTNAME = (SELECT LASTNAME FROM WORKERS WHERE LASTNAME=’Soriano’)
WHERE ID=105;
The lastname of Cruz from Employees table will be set to NULL

Supposed that table: Workers and Employees is consists of the following values. What will be the
output if the user uses this PL/SQL.
SELECT ID, LASTNAME, DEPARTMENT
FROM WORKERS
WHERE ID > (SELECT ID FROM EMPLOYEES WHERE STATUS = ‘Probi’);
This will retrieve the record of Mortos and Santiago
Supposed that table: Workers and Employees is consists of the following values.
Which of the following is the correct example of copying data from WORKERS table to
EMPLOYEES table where the status is equal to ‘Regular’?
INSERT INTO EMPLOYEES (ID, LASTNAME, DEPARTMENT)
VALUES (SELECT ID, LASTNAME, DEPARTMENT
FROM WORKERS
WHERE STATUS = ‘Regular’);
Which of the following is not true application of subquery in DML statements?
Merge one table to another table.
Which of the following are the two types of subquery.
Single row and multiple row subquery
Given the email address, inquiry@amauonline.com, what is the domain?
.com
Email can only be shared in a Local Area Network and NOT in an extranet.
False
This is used for formatting and creating links from one webpage to another.
All
When sending data from the source to destination, the message is ____________.
Broken
IP addresses are converted to
Domain names
This is the address of the web page on the internet.
Url
Each statement in DTD declares the element of HTML language.
False
It is a communication protocol used to retrieved web pages.
Http
HTTP is a language used to create web pages.
False
The ___________ tag is used to link a web page to another page.
Anchor
A query operation on an object
NO SIDE
A member of a class is __________________.
AN OBJECT
New classes are created from current classes by using the idea of _____________.
Inheritance
In object modelling, special properties of objects are
encapsulation, inheritance and polymorphism
Picking necessary operation and attributes to specify objects.
ABSTRACTION
It is also known as information hiding.
Encapsulation
To model an information system using objects the requirements specification is examined and all
_____________ in it are picked as potential operations.
NOUNS
UML stands for
Universal Modelling Language
The first step in object oriented modelling is
Find objects and their classes
Inheritance in object-oriented modelling can be used to
create new classes
It is a communication protocol used to retrieved web pages.
HTTP
Ronnie was assigned to produce the daily progress report of service contractors. To whom will
Ronnie submits the reports?
Middle
Every member of an entity set is described by its _______________.
ATTRIBUTES
In the ER Diagram, normally entities are
NOUNS
Page footing is
the labels printed at the end of a report
In Entity Relationship, the Student number, Course, Date Enrolled, Gender are examples of
ATTRIBUTES
New classes are created from current classes by using the idea of _____________.
Inheritance
Who uses the report for tactical management?
Middle
This is an industry standardnotation to represent a class.
UML
Grade sheets and product list are reports needed by
Operational
Web@AT Corporation is newly established software company. Mr. Ang want to have a fast and
reliable DSL internet connection to his office. He asked his IT Officer to apply for a fast connection.
Which of the following the IT Office need to do first?
Check the telephone line if capable of DSL connection
The first step in object oriented modelling is
Find objects and their classes
Jonathan is the Report Designer of the TRA Corporation under System Department. He is tasked to
design reports of the newly developed web application system. Which of the following he need to
consider in his design?
All
By ______________ we mean ability to manipulate objects of different distinct classes knowing only
their common properties
POLYMORPHISM
E-R Model has the ability to describe
ALL
The last step in object oriented modelling is
c. develop an object interaction/collaboration graph
To model an information system using objects the requirements specification is examined and all
_____________ in it are picked as potential operations.
NOUNS
Who among the following uses reports for strategic management?
Top
Line and dot matrix printers are examples of
Impact
Designing screens uses principles
Similar
Which of the following is the best hierarchy of design of a report?
Report heading, Page heading, Control heading, Detail lines
Which of the following protocol is used to transfer file from one LAN to another?
None
It is also known as information hiding.
Encapsulation
In UML, information hiding

allows improvement of modification of methods used by other objects without affecting other
parts of a system
Aldrin is the network engineer of the TRA Corporation. TRA Corporation has offices in Cebu, Iloilo
and in Davao. As a network engineer, he need to connect the LAN of different offices to the main
office in Makati City. What computer hardware network equipment he need to use to connect these
offices.

Router
The following are entities EXCEPT
VOLUNTEER AND OFFICER
A teenager requests for money from random people because of an email he received containing
instructions on how to make cash in the next few weeks. This scam is done in the form of
_______________.
Monetary
The process of using historical data to predict the future. This type of technology is used for
purchasing inventory, stock predictions, sales predictions and overall business assessments.
Data Forecasting
This process checks the basic vulnerabilities of the program. These tests probe and attempt to
penetrate the security of the program and system in which it is running.
Code review
The main job of the postmaster is to retrieve an email from the legitimate sender to the legitimate
receiver.
True
These are considered significant security risk, but not being able to get into an application is a
serious development issue when a problem arises.
Using backdoors
This reveals surprisingly detailed information that is significantly private. It is suggested that you
keep this practice limited to authorized investigations and legitimate troubleshooting in order to
preserve the users' expectation of privacy, as defined by company policy.
Traffic
This type of coding is done to have minimum reworking to do at the testing phase.
Code Design
Performing shortcuts when implementing a new system is not always a good idea, but unfortunately,
sometimes it is necessary in order to meet aggressive time constraints.
TRUE
When a patch is not aptly tested, problems arise.
True
This involves controlling an integrated computer system and maximizing performance and
productivity of that system.
Networking
Allowing the destruction of discoverable evidence is legal if approved by a higher official.
FALSE
The process of stealing a domain name from another entity.
Domain Hijacking
What type of coding practice should be done when operating systems are upgraded?
Redoing
A crucial process for determining system integrity and business practice integrity.
Audits
What type of coding practice emphasises the importance of the allocation and use of memory for
programmers?
Correct Use of memory
A cyberattack wiped the data from hard drives of computers in banks in South Korea. The attack
came from an email mimicking a South Korean bank. What type of identity theft scam did they do?
Account
The process of creating an architecture diagram that represents the entities and their corresponding
relationship within a corporate database.
Data modelling
This coding practice is done when the deadlines imposed on programmers force them to find the
best possible solution somewhere in the middle.
Pseudo
A key player in information technology who is responsible for all of the data within a corporation.
DBA
Having this policy within a company means that whomever signs the nondisclosure agreement
agrees to keep the vulnerability information within that organization tightly contained so that no one
outside of the organization, especially the general public, ever learns of the existence of product
vulnerabilities.
Non
The modification of a software product after delivery to detect and correct latent faults in the software
product before it becomes effective faults.
Preventive maintenance
A maintenance activity wherein modifying the system to cope with changes in the software
environment is done to ensure that the system is up to date.
Adaptive
A controlled and coordinated sequence of activities during which a system is
transferred progressively from the developer to the maintainer.
Transition
A software maintenance process wherein by confirming the modified work with the individual who
submitted the request, it could ensure that the modification provided a solution.
Acceptance and modification process

A very broad activity that includes error correction, enhancements of capabilities, deletion of
obsolete capabilities, and optimization.
Soft main
He first addressed the Software maintenance and evolution of systems in 1969.
Meir
A maintenance activity consisting of diagnosing and fixing errors, possibly ones found by users.
Corrective
An activity where increasing software maintainability or reliability is ensured to prevent problems in
the future.
Preventive
This contains software preparation and transition activities, such as the conception and creation of
the maintenance plan.
Imple
A coding technique where maintenance is highly complicated due to difficulty in tracking every
sequence or module it passes.
Spaghetti code
Based on the table EMPLOYEES, DEPARTMENTS and LOCATIONS.
From the given select statement below: What is/are the full name of employee whose
LOCATION_ID is equal to 1700?
SELECT (LASTNAME||','||FIRSTNAME) AS "FULL NAME", DEPARTMENT_ID,
DEPARTMENT_NAME, LOCATION_ID
FROM EMPLOYEES
NATURAL JOIN DEPARTMENTS;
KOCHAR, NENA and LEX, DE HAAN
Which of the following is the correct query that will create a report that will display the following:
FIRTSNAME, SALARY with additional 1000 in employees salary, rename this column as BONUS,
then get the DEPARTMENT_NAME and DEPARTMENT_ID. Join the table using ON condition.
c. SELECT FIRSTNAME, SALARY + 1000 AS BONUS, DEPARTMENT_NAME,
DEPARTMENT_ID
FROM EMPLOYEES E JOIN DEPARTMENTS D
ON E.DEPARTMENT_ID = D.DEPARTMENT_ID;

What will be the output if the user uses this PL/SQL.


SELECT ID, LASTNAME, DEPARTMENT
FROM WORKERS
WHERE ID > (SELECT ID FROM EMPLOYEES WHERE STATUS = ‘Probi’);
This will retrieve the record of Mortos and Santiago
What will be the output if the user uses this PL/SQL.
UPDATE WORKERS
SET DEPARTMENT = (SELECT DEPARTMENT FROM EMPLOYEES WHERE DEPARTMENT
=’HRD’);
d. There will be no changes on the department of employee ID number 105
Which of the following is the correct example of multiple row subquery?
SELECT EMPLOYEE_ID, SALARY
FROM EMPLOYEES
WHERE SALARY =(SELECT MIN(SALARY) FROM EMPLOYEES;
Which of the following is the correct example of creating a subquery that copy the values from
employees table to workers table?
INSERT INTO WORKERS(ID, NAME, POSITION)
VALUES (ID, NAME, POSITION
FROM EMPLOYEES);
Which of the following is not part of single to subqueries?
IN
In the given complex view example what will be the possible output if this code is run?
CREATE OR REPLACE VIEW DEPT_EMP
AS (SELECT EMPLOYEE_ID, LASTNAME, DEPARTMENT_NAME
FROM EMPLOYEES JOIN DEPARTMENT)
It will successfully create the view that join 1 table to another table.
Which of the following is the correct example of creating a subquery that will copy all values from
employees table to workers where job_id is equal to ST_CLERK;
INSERT INTO WORKERS
SELECT * FROM EMPLOYEES
WHERE JOB_ID = ‘ST_CLERK’;
What will be the output if the user uses this PL/SQL.
UPDATE EMPLOYEES
SET LASTNAME = (SELECT LASTNAME FROM WORKERS WHERE LASTNAME=’Soriano’)
WHERE ID=105;
The lastname of Cruz from Employees table will be set to Soriano
Which of the following is not true about complex view when using DELETE statement?
ALL
This is used to quality ambiguous column when joining two or more tables.
Table prefixes
What will be the output if the user uses this PL/SQL.
DELETE FROM WORKERS
WHERE LASTNAME = (SELECT LASTNAME FROM EMPLOYEES WHERE LASTNAME=Cruz’)
Employee in Employees table with lastname equal to Cruz will be deleted.

Which of the following is not part of multiple row subqueries?


MAX
Which of the following is the correct example of creating a view where LASTNAME ends with letter S
rename LASTNAME to SURNAME?
CREATE VIEW WORKERS (EMPLOYEE_ID, SURNAME, FIRSTNAME)
AS (EMPLOYEE_ID, LASTNAME, FIRSTNAME
FROM EMPLOYEES
WHERE SALARY LASTNAME LIKE 'S%');
Refer to the table AUTHORS and COPY_AUTHORS (Note ID column is with Primary Key
constraint). Supposed that the user insert the following values to COPY_AUTHORS view as shown
below what is/are the possible output on both table and view?
INSERT INTO COPY_AUTHORS VALUES (6,'SUSAN CARLOS','OS','2016');
1 row is added on COPY_AUTHORS view but 0 rows are added on AUTHORS table.
If WITH CHECK OPTION is added on the view (see sample code below) what is/are the restriction?
CREATE OR REPLACE VIEW VIEW STUD_VIEW (USN_ID, LASTNAME, FIRSTNAME, COURSE)
AS (SELECT USN_ID, LASTNAME, FIRSTNAME, COURSE
FROM STUDENTS
WHERE COURSE = ‘BSCS’
WITH CHECK OPTION CONSTRAINT STUD_VIEW_CK;
It restricts the users to add a value where course is not equal to BSCS
SELECT EMPLOYEES.EMPLOYEE_ID,
EMPLOYEES.LASTNAME,EMPLOYEES.DEPARTMENT_ID,DEPARTMENTS.DEPARTMENT_ID,D
EPARTMENTS.LOCATION_ID
FROM EMPLOYEES RIGHT OUTER JOIN DEPARTMENTS
ON( EMPLOYEES.DEPARTMENT_ID = DEPARTMENTS.DEPARTMENT_ID);
OUTER
SELECT EMPLOYEES.EMPLOYEE_ID,
EMPLOYEES.LASTNAME,EMPLOYEES.DEPARTMENT_ID,DEPARTMENTS.DEPARTMENT_ID,D
EPARTMENTS.LOCATION_ID
FROM EMPLOYEES JOIN DEPARTMENTS
USING (DEPARTMENT_ID);
INCORRECTY
If WITH READ ONLY is added on the view (see sample code below) what is/are the restriction?
CREATE OR REPLACE VIEW STUD_VIEW (USN_ID, LASTNAME, FIRSTNAME, COURSE)
AS (SELECT USN_ID, LASTNAME, FIRSTNAME, COURSE
FROM STUDENTS
WHERE COURSE = ‘BSCS’)
WITH READ ONLY;
SELECT statement is not allowed on this view
Which of the following is the correct query that will create a report that will display the following:
STREET_ADDRESS, CITY, DEPARTMENT_NAME and LOATION_ID? Use using clause to get the
data from two tables.
SELECT STREET_ADDRESS, CITY, DEPARTMENT_NAME, LOCATION_ID
FROM DEPARTMENTS
JOIN LOCATIONS
NATURAL JOIN (LOCATION_ID);
Which of the following is the correct example of copying data from WORKERS table to
EMPLOYEES table where the status is equal to ‘Regular’?

INSERT INTO EMPLOYEES VALUES (ID, LASTNAME, DEPARTMENT)


SELECT ID, LASTNAME, DEPARTMENT
FROM WORKERS
WHERE STATUS = ‘Regular’;

SELECT EMPLOYEES.EMPLOYEE_ID,
EMPLOYEES.LASTNAME,EMPLOYEES.DEPARTMENT_ID,DEPARTMENTS.DEPARTMENT_ID,D
EPARTMENTS.LOCATION_ID
FROM EMPLOYEES JOIN DEPARTMENTS
ON( EMPLOYEES.DEPARTMENT_ID (+)= DEPARTMENTS.DEPARTMENT_ID);
Incorrect
Refer to the table AUTHORS and COPY_AUTHORS (Note during the creation of view the condition
added is YR_PUBLISHED=2010). Supposed that the user update the YR_PUBLISHED of book OS
to from 2010 to 2010 as shown below what is/are the possible output on both table and view?
UPDATE COPY_AUTHORS
SET YR_PUBLISHED = 2016
WHERE BOOK='OS';
The record of book OS YR_PUBLISHED will be updated from 2010 to 2016 on
COPY_AUTHORS view only.

Based on the table EMPLOYEES, DEPARTMENTS and LOCATIONS.


From the given select statement below: What is the address of employee under the
department_name IT?
SELECT STREET_ADDRESS, CITY, DEPARTMENT_NAME, LOCATION_ID
FROM DEPARTMENTS
JOIN LOCATIONS
USING (LOCATION_ID);
2014 JABBERWACKY
Which of the following joins are mutually exclusive.
Natural Join and Using clause
Which of the following is not true about complex view when using UPDATE statement?
All
Which of the following is the correct example of modifying a view where salary manager_id is null?
b. CREATE OR REPLACE VIEW WORKERS (EMPLOYEE_ID, SURNAME, FIRSTNAME,
MANAGER_ID)
AS (EMPLOYEE_ID, LASTNAME, FIRSTNAME, MANAGER_ID)
FROM EMPLOYEES
WHERE MANAGER_ID IS NULL);

Which of the following is not true about complex view when using INSERT statement?
All
This is used for formatting and creating links from one webpage to another.
All of the choices

It is also known as information hiding.


Encapsulation

The first step in object oriented modelling is

Find objects and their classes

This ________________ is a procedure used to transform a set of relations into another set which
has some desirable properties.
Normalization

New classes are created from current classes by using the idea of _____________.
Inheritance

Each statement in DTD declares the element of HTML language.

FALSE

IP addresses are converted to


hierarchy of domain names

Given the email address, inquiry@amauonline.com, what is the domain?


.com

To model an information system using objects the requirements specification is examined and all
_____________ in it are picked as potential operations.
Nouns

Inheritance in object-oriented modelling can be used to


create new classes
Which of the following is the best hierarchy of design of a report?
Report heading, Page heading, Control heading, Detail lines

To use a ________, a ___________ model of data needed for current and future applications is
designed. ___________ modelling is useful for this.
DBMS, conceptual, Entity Relationship

What is the best printer to use when printing multiple copies with carbon paper?
Dot matrix

Which of the following is an OPTIONAL when designing reports?


Use of page and report footer

Grade sheets and product list are reports needed by


Operational Management

Page footing is

the labels printed at the end of a report

Which of the following can be used to present reports to Top Management?


All of the choices
UML stands for
Universal Modelling Language

The last step in object oriented modelling is

develop an object interaction/collaboration graph

A member of a class is __________________.


an object instance

In Entity Relationship, a tuple is


a row of relation

Line and dot matrix printers are examples of

Impact Printers

Jonathan is the Web Programmer of TRA Corporation. He was assigned to develop an informative
website. He wants to use user defined tags. What markup language he will use?
HTML

Which of the following printer produces poor quality of printing?


Dot matrix

For large volume output and multiple copies, what type of printer you need to use

Line

Pie charts are normally used when


relative distribution of data in specified categories is to be shown

In the ER Diagram, relationships are


Verbs

In Entity Relationship, the Student number, Course, Date Enrolled, Gender are examples of
Attributes

A query operation on an object


has no side effects

An instance of an object is created by a


constructor operation
When setting up an extranet, which of the following is a requirement to interconnect 2 corporate
intranet.
Hi End servers

Two corporate intranets may be interconnected using a leased line from PSTN -such a network is
called __________
An internet
The daily responsibilities of the administrator such as monitoring the system, managing users and
passwords, allocating system resources and installations.

System administration

The process of using historical data to predict the future. This type of technology is used for
purchasing inventory, stock predictions, sales predictions and overall business assessments.
Data Forecasting

The process of stealing a domain name from another entity.


Domain hijacking

Disclosing referral fees to the client is up to the executive's decision.


False

This type of coding is done to have minimum reworking to do at the testing phase.
Code Design

The process of broadly disseminating as much information as possible regarding product or system
vulnerabilities so that potential victims possess the same information as the potential hackers.
Full disclosure

A cyberattack wiped the data from hard drives of computers in banks in South Korea. The attack
came from an email mimicking a South Korean bank. What type of identity theft scam did they do?

Con Artists and Email Questionnaires

They are responsible for finding vulnerabilities. They also have their own set of moral issues to
address when reversing engineering products for the protection purposes of discovering
vulnerabilities.
White hat hackers
Entities are represented by
Circle

An example of non-impact printer


Laser & Ink Jet

Hiding implementation details of methods from outside world.

Encapsulation

Aldrin is the web developer of TRA Corporation. He is created a website a university. He store the
html files under the folder name students including the home page html file. Which of the following
address will be the valid home page of the university?

http://myuniversity.edu/students/home.html

Given employee (employee number, salary, department code, supervisor code). What is the unique
relation key.
Employee number

Objects also promote their reuse in many systems.

FALSE

Which of the following is the correct hierarchy of tags in a HTML?


<html><head><body></head></body></html>

Objects with similar meaning and purpose grouped together a


Class

Each column in the relation corresponds to


Records

George is assigned present a report in a management meeting to be attended by school directors of


different university campuses. Which of the following is the best report he need to present?
All of the choices

A relationship is in 2NF if,

It is in 1NF

Each row in a table contains a


All of the choices

They possess great power in the corporate world. They have the ability to spy on fellow employees
as they can see the websites employees are visiting, monitor employee emails and online chats,
view data on personal computers connected to the corporate network and much more.
System administrator

Buttons which can be clicked using a mouse are placed in screens as


they are convenient to use

This is a process of accessing state without changing value._____


Query

This is a standards used to define a method of exchanging data over a computer network such as
local area network, Internet, Intranet. These is being used by computer to send data over the
internet.
World Wide Web
Given the email address, inquiry@amauonline.com, what is the domain?
.com
Email can only be shared in a Local Area Network and NOT in an extranet.
False
This is used for formatting and creating links from one webpage to another.
All
When sending data from the source to destination, the message is ____________.
Broken
IP addresses are converted to
Domain names
This is the address of the web page on the internet.
Url
Each statement in DTD declares the element of HTML language.
False
It is a communication protocol used to retrieved web pages.
Http
HTTP is a language used to create web pages.
False
The ___________ tag is used to link a web page to another page.
Anchor
A query operation on an object
NO SIDE
A member of a class is __________________.
AN OBJECT
New classes are created from current classes by using the idea of _____________.
Inheritance
In object modelling, special properties of objects are
encapsulation, inheritance and polymorphism

Picking necessary operation and attributes to specify objects.


ABSTRACTION
It is also known as information hiding.
Encapsulation
To model an information system using objects the requirements specification is examined and all
_____________ in it are picked as potential operations.
NOUNS
UML stands for
Universal Modelling Language

The first step in object oriented modelling is


Find objects and their classes
Inheritance in object-oriented modelling can be used to
create new classes
It is a communication protocol used to retrieved web pages.
HTTP
Ronnie was assigned to produce the daily progress report of service contractors. To whom will
Ronnie submits the reports?
Middle
Every member of an entity set is described by its _______________.
ATTRIBUTES
In the ER Diagram, normally entities are
NOUNS
Page footing is
the labels printed at the end of a report

In Entity Relationship, the Student number, Course, Date Enrolled, Gender are examples of
ATTRIBUTES
New classes are created from current classes by using the idea of _____________.
Inheritance

Who uses the report for tactical management?


Middle
This is an industry standardnotation to represent a class.
UML
Grade sheets and product list are reports needed by
Operational
Web@AT Corporation is newly established software company. Mr. Ang want to have a fast and
reliable DSL internet connection to his office. He asked his IT Officer to apply for a fast connection.
Which of the following the IT Office need to do first?
Check the telephone line if capable of DSL connection

The first step in object oriented modelling is


Find objects and their classes
Jonathan is the Report Designer of the TRA Corporation under System Department. He is tasked to
design reports of the newly developed web application system. Which of the following he need to
consider in his design?
All
By ______________ we mean ability to manipulate objects of different distinct classes knowing only
their common properties
POLYMORPHISM
E-R Model has the ability to describe
ALL
The last step in object oriented modelling is
c. develop an object interaction/collaboration graph
To model an information system using objects the requirements specification is examined and all
_____________ in it are picked as potential operations.
NOUNS
Who among the following uses reports for strategic management?
Top
Line and dot matrix printers are examples of
Impact
Designing screens uses principles
Similar
Which of the following is the best hierarchy of design of a report?
Report heading, Page heading, Control heading, Detail lines
Which of the following protocol is used to transfer file from one LAN to another?
None
It is also known as information hiding.
Encapsulation
In UML, information hiding

allows improvement of modification of methods used by other objects without affecting other
parts of a system
Aldrin is the network engineer of the TRA Corporation. TRA Corporation has offices in Cebu, Iloilo
and in Davao. As a network engineer, he need to connect the LAN of different offices to the main
office in Makati City. What computer hardware network equipment he need to use to connect these
offices.

Router
The following are entities EXCEPT
VOLUNTEER AND OFFICER
A teenager requests for money from random people because of an email he received containing
instructions on how to make cash in the next few weeks. This scam is done in the form of
_______________.
Monetary
The process of using historical data to predict the future. This type of technology is used for
purchasing inventory, stock predictions, sales predictions and overall business assessments.
Data Forecasting
This process checks the basic vulnerabilities of the program. These tests probe and attempt to
penetrate the security of the program and system in which it is running.
Code review
The main job of the postmaster is to retrieve an email from the legitimate sender to the legitimate
receiver.
True
These are considered significant security risk, but not being able to get into an application is a
serious development issue when a problem arises.
Using backdoors
This reveals surprisingly detailed information that is significantly private. It is suggested that you
keep this practice limited to authorized investigations and legitimate troubleshooting in order to
preserve the users' expectation of privacy, as defined by company policy.
Traffic
This type of coding is done to have minimum reworking to do at the testing phase.
Code Design
Performing shortcuts when implementing a new system is not always a good idea, but unfortunately,
sometimes it is necessary in order to meet aggressive time constraints.
TRUE
When a patch is not aptly tested, problems arise.
True
This involves controlling an integrated computer system and maximizing performance and
productivity of that system.
Networking
Allowing the destruction of discoverable evidence is legal if approved by a higher official.
FALSE
The process of stealing a domain name from another entity.
Domain Hijacking
What type of coding practice should be done when operating systems are upgraded?
Redoing
A crucial process for determining system integrity and business practice integrity.
Audits
What type of coding practice emphasises the importance of the allocation and use of memory for
programmers?
Correct Use of memory
A cyberattack wiped the data from hard drives of computers in banks in South Korea. The attack
came from an email mimicking a South Korean bank. What type of identity theft scam did they do?
Account
The process of creating an architecture diagram that represents the entities and their corresponding
relationship within a corporate database.
Data modelling
This coding practice is done when the deadlines imposed on programmers force them to find the
best possible solution somewhere in the middle.
Pseudo
A key player in information technology who is responsible for all of the data within a corporation.
DBA
Having this policy within a company means that whomever signs the nondisclosure agreement
agrees to keep the vulnerability information within that organization tightly contained so that no one
outside of the organization, especially the general public, ever learns of the existence of product
vulnerabilities.
Non
The modification of a software product after delivery to detect and correct latent faults in the software
product before it becomes effective faults.
Preventive maintenance
A maintenance activity wherein modifying the system to cope with changes in the software
environment is done to ensure that the system is up to date.
Adaptive
A controlled and coordinated sequence of activities during which a system is
transferred progressively from the developer to the maintainer.
Transition
A software maintenance process wherein by confirming the modified work with the individual who
submitted the request, it could ensure that the modification provided a solution.
Acceptance and modification process

A very broad activity that includes error correction, enhancements of capabilities, deletion of
obsolete capabilities, and optimization.
Soft main
He first addressed the Software maintenance and evolution of systems in 1969.
Meir
A maintenance activity consisting of diagnosing and fixing errors, possibly ones found by users.
Corrective
An activity where increasing software maintainability or reliability is ensured to prevent problems in
the future.
Preventive
This contains software preparation and transition activities, such as the conception and creation of
the maintenance plan.
Imple
A coding technique where maintenance is highly complicated due to difficulty in tracking every
sequence or module it passes.
Spaghetti code
Based on the table EMPLOYEES, DEPARTMENTS and LOCATIONS.
From the given select statement below: What is/are the full name of employee whose
LOCATION_ID is equal to 1700?
SELECT (LASTNAME||','||FIRSTNAME) AS "FULL NAME", DEPARTMENT_ID,
DEPARTMENT_NAME, LOCATION_ID
FROM EMPLOYEES
NATURAL JOIN DEPARTMENTS;
KOCHAR, NENA and LEX, DE HAAN
Which of the following is the correct query that will create a report that will display the following:
FIRTSNAME, SALARY with additional 1000 in employees salary, rename this column as BONUS,
then get the DEPARTMENT_NAME and DEPARTMENT_ID. Join the table using ON condition.
c. SELECT FIRSTNAME, SALARY + 1000 AS BONUS, DEPARTMENT_NAME,
DEPARTMENT_ID
FROM EMPLOYEES E JOIN DEPARTMENTS D
ON E.DEPARTMENT_ID = D.DEPARTMENT_ID;
What will be the output if the user uses this PL/SQL.
SELECT ID, LASTNAME, DEPARTMENT
FROM WORKERS
WHERE ID > (SELECT ID FROM EMPLOYEES WHERE STATUS = ‘Probi’);
This will retrieve the record of Mortos and Santiago

What will be the output if the user uses this PL/SQL.


UPDATE WORKERS
SET DEPARTMENT = (SELECT DEPARTMENT FROM EMPLOYEES WHERE DEPARTMENT
=’HRD’);
d. There will be no changes on the department of employee ID number 105
Which of the following is the correct example of multiple row subquery?
SELECT EMPLOYEE_ID, SALARY
FROM EMPLOYEES
WHERE SALARY =(SELECT MIN(SALARY) FROM EMPLOYEES;
Which of the following is the correct example of creating a subquery that copy the values from
employees table to workers table?
INSERT INTO WORKERS(ID, NAME, POSITION)
VALUES (ID, NAME, POSITION
FROM EMPLOYEES);
Which of the following is not part of single to subqueries?
IN
In the given complex view example what will be the possible output if this code is run?
CREATE OR REPLACE VIEW DEPT_EMP
AS (SELECT EMPLOYEE_ID, LASTNAME, DEPARTMENT_NAME
FROM EMPLOYEES JOIN DEPARTMENT)
It will successfully create the view that join 1 table to another table.
Which of the following is the correct example of creating a subquery that will copy all values from
employees table to workers where job_id is equal to ST_CLERK;
INSERT INTO WORKERS
SELECT * FROM EMPLOYEES
WHERE JOB_ID = ‘ST_CLERK’;
What will be the output if the user uses this PL/SQL.
UPDATE EMPLOYEES
SET LASTNAME = (SELECT LASTNAME FROM WORKERS WHERE LASTNAME=’Soriano’)
WHERE ID=105;
The lastname of Cruz from Employees table will be set to Soriano
Which of the following is not true about complex view when using DELETE statement?
ALL
This is used to quality ambiguous column when joining two or more tables.
Table prefixes
What will be the output if the user uses this PL/SQL.
DELETE FROM WORKERS
WHERE LASTNAME = (SELECT LASTNAME FROM EMPLOYEES WHERE LASTNAME=Cruz’)
Employee in Employees table with lastname equal to Cruz will be deleted.
Which of the following is not part of multiple row subqueries?
MAX
Which of the following is the correct example of creating a view where LASTNAME ends with letter S
rename LASTNAME to SURNAME?
CREATE VIEW WORKERS (EMPLOYEE_ID, SURNAME, FIRSTNAME)
AS (EMPLOYEE_ID, LASTNAME, FIRSTNAME
FROM EMPLOYEES
WHERE SALARY LASTNAME LIKE 'S%');
Refer to the table AUTHORS and COPY_AUTHORS (Note ID column is with Primary Key
constraint). Supposed that the user insert the following values to COPY_AUTHORS view as shown
below what is/are the possible output on both table and view?
INSERT INTO COPY_AUTHORS VALUES (6,'SUSAN CARLOS','OS','2016');
1 row is added on COPY_AUTHORS view but 0 rows are added on AUTHORS table.

If WITH CHECK OPTION is added on the view (see sample code below) what is/are the restriction?
CREATE OR REPLACE VIEW VIEW STUD_VIEW (USN_ID, LASTNAME, FIRSTNAME, COURSE)
AS (SELECT USN_ID, LASTNAME, FIRSTNAME, COURSE
FROM STUDENTS
WHERE COURSE = ‘BSCS’
WITH CHECK OPTION CONSTRAINT STUD_VIEW_CK;
It restricts the users to add a value where course is not equal to BSCS

SELECT EMPLOYEES.EMPLOYEE_ID,
EMPLOYEES.LASTNAME,EMPLOYEES.DEPARTMENT_ID,DEPARTMENTS.DEPARTMENT_ID,D
EPARTMENTS.LOCATION_ID
FROM EMPLOYEES RIGHT OUTER JOIN DEPARTMENTS
ON( EMPLOYEES.DEPARTMENT_ID = DEPARTMENTS.DEPARTMENT_ID);
OUTER
SELECT EMPLOYEES.EMPLOYEE_ID,
EMPLOYEES.LASTNAME,EMPLOYEES.DEPARTMENT_ID,DEPARTMENTS.DEPARTMENT_ID,D
EPARTMENTS.LOCATION_ID
FROM EMPLOYEES JOIN DEPARTMENTS
USING (DEPARTMENT_ID);

INCORRECTY
If WITH READ ONLY is added on the view (see sample code below) what is/are the restriction?
CREATE OR REPLACE VIEW STUD_VIEW (USN_ID, LASTNAME, FIRSTNAME, COURSE)
AS (SELECT USN_ID, LASTNAME, FIRSTNAME, COURSE
FROM STUDENTS
WHERE COURSE = ‘BSCS’)
WITH READ ONLY;
SELECT statement is not allowed on this view
Which of the following is the correct query that will create a report that will display the following:
STREET_ADDRESS, CITY, DEPARTMENT_NAME and LOATION_ID? Use using clause to get the
data from two tables.
SELECT STREET_ADDRESS, CITY, DEPARTMENT_NAME, LOCATION_ID
FROM DEPARTMENTS
JOIN LOCATIONS
NATURAL JOIN (LOCATION_ID);

Which of the following is the correct example of copying data from WORKERS table to
EMPLOYEES table where the status is equal to ‘Regular’?
INSERT INTO EMPLOYEES VALUES (ID, LASTNAME, DEPARTMENT)
SELECT ID, LASTNAME, DEPARTMENT
FROM WORKERS
WHERE STATUS = ‘Regular’;
SELECT EMPLOYEES.EMPLOYEE_ID,
EMPLOYEES.LASTNAME,EMPLOYEES.DEPARTMENT_ID,DEPARTMENTS.DEPARTMENT_ID,D
EPARTMENTS.LOCATION_ID
FROM EMPLOYEES JOIN DEPARTMENTS
ON( EMPLOYEES.DEPARTMENT_ID (+)= DEPARTMENTS.DEPARTMENT_ID);
Incorrect
Refer to the table AUTHORS and COPY_AUTHORS (Note during the creation of view the condition
added is YR_PUBLISHED=2010). Supposed that the user update the YR_PUBLISHED of book OS
to from 2010 to 2010 as shown below what is/are the possible output on both table and view?
UPDATE COPY_AUTHORS
SET YR_PUBLISHED = 2016
WHERE BOOK='OS';
The record of book OS YR_PUBLISHED will be updated from 2010 to 2016 on
COPY_AUTHORS view only.
Based on the table EMPLOYEES, DEPARTMENTS and LOCATIONS.
From the given select statement below: What is the address of employee under the
department_name IT?
SELECT STREET_ADDRESS, CITY, DEPARTMENT_NAME, LOCATION_ID
FROM DEPARTMENTS
JOIN LOCATIONS
USING (LOCATION_ID);
2014 JABBERWACKY
Which of the following joins are mutually exclusive.
Natural Join and Using clause
Which of the following is not true about complex view when using UPDATE statement?
All
Which of the following is the correct example of modifying a view where salary manager_id is null?
b. CREATE OR REPLACE VIEW WORKERS (EMPLOYEE_ID, SURNAME, FIRSTNAME,
MANAGER_ID)
AS (EMPLOYEE_ID, LASTNAME, FIRSTNAME, MANAGER_ID)
FROM EMPLOYEES
WHERE MANAGER_ID IS NULL);
Which of the following is not true about complex view when using INSERT statement?
All

Which of the following printer produces poor quality of printing?


Dot matrix
For large volume output and multiple copies, what type of printer you need to use
Line
Page footing

c. the labels printed at the end of each page


Mr. Ang wants to have a report on the number enrollees in all university campuses. This will be used
for analyze in putting up a new campus. Mr. Ang is in the _________________.
Operational
Ronnie was assigned to produce the daily progress report of service contractors. To whom will
Ronnie submits the reports?
Middle
Which of the following is the best hierarchy of design of a report?
Control footing, Final footing, Report footing
Line and dot matrix printers are examples of
Impact
Jonathan is the Report Designer of the TRA Corporation under System Department. He is tasked to
design reports of the newly developed web application system. Which of the following he need to
consider in his design?
All
Who among the following uses reports for strategic management?
Top
Pie charts are normally used when
relative distribution of data in specified categories is to be shown
Grade sheets and product list are reports needed by
Operational
Which of the following can be used to present reports to Top Management?
All
Who uses the report for tactical management?
Middle
Buttons which can be clicked using a mouse are placed in screens as
Convenient
Which of the following is an OPTIONAL when designing reports?
Use of page and report footer
What is the best printer to use when printing multiple copies with carbon paper?
Dot matrix
An example of non-impact printer
Laser & Ink Jet

Designing screens uses principles


Similar
George is assigned present a report in a management meeting to be attended by school directors of
different university campuses. Which of the following is the best report he need to present?
All
Which of the following is the best hierarchy of design of a report?
Report heading, Page heading, Control heading, Detail lines
The process of creating an architecture diagram that represents the entities and their corresponding
relationship within a corporate database.
Data modelling
The process of stealing a domain name from another entity.
Domain Hijacking
A key player in information technology who is responsible for all of the data within a corporation.
DBA
What type of coding practice emphasises the importance of the allocation and use of memory for
programmers?
Correct Use of memory
This coding practice is done when the deadlines imposed on programmers force them to find the
best possible solution somewhere in the middle.
Pseudo
The process of using historical data to predict the future. This type of technology is used for
purchasing inventory, stock predictions, sales predictions and overall business assessments.
Data Forecasting
What type of coding practice should be done when operating systems are upgraded?
Redoing
This type of coding is done to have minimum reworking to do at the testing phase.
Code Design
These are considered significant security risk, but not being able to get into an application is a
serious development issue when a problem arises.
Using backdoors
This process checks the basic vulnerabilities of the program. These tests probe and attempt to
penetrate the security of the program and system in which it is running.
Code review
It refers to documentation on how to market the product and the analysis of the market demand.
Marketing
A programming language that had a built-in support for a simple form of literate programming.
Haskell
It refers to documentation for the end-user, system administrators and support staff.
End user
This is the documentation/ compilation of code, algorithms, interfaces, and APIs.
Technical
These are statements that identify attributes, capabilities, characteristics, or qualities of a system.
This is also the foundation for what shall be or has been implemented.
Requirement
It refers to the written text that accompanies computer software. It either explains how it operates or
how to use it; and may mean different things to people in different roles.
Soft doc
This is a special breed of design document that is also known as software description.
Archi
A very important part of the design document in enterprise software development that contains
Conceptual, Logical, and Physical Design Elements.
DDD
A term which means shape, or more generally, plan.
Schema
A style on how code documents are often organized, allowing a programmer to quickly look up an
arbitrary function or class.
Ref guide
It is a join of two or more table that returns only matched rows.
Inner join
Which of the following joins are mutuallu exclusive.
Natural
It is formed when a join condition is omitted.
Cartesian
This is a join clause used when the columns in two or more tables have the same but of different
data type.
Using
A join condition used when a table has columns with match values.
Self
A join condition that is based on all the columns in two or more table that have the same name.
Natural
This is used to quality ambiguous column when joining two or more tables.
Table prefixes
It is join between two tables that return the result of an Inner Join as well as the results of Left and
Right joins.
Outer
This is a jpin clause that produces a cross-product of two or more tables.
Cross
This is a join clause used to specify arbitrary conditions of specify columns to join.
On
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees JOIN departments
ON( employees.department_id (+)= departments.department_id);
Equi

SELECT employees.employee_id, employees.lastname,employees.department_id,


departments.department_id,departments.location_id
FROM employees RIGHT OUTER JOIN departments
ON( employees.department_id = departments.department_id);
Outer
SELECT e.employee_id, e.lastname,e.department_id, d.department_id,d.location_id
FROM employees e, departments d
WHERE e.department_id between 20 AND 50;
Incorrect

SELECT emp.employee_id, employees.lastname,emp.department_id,


dept.department_id,dept.location_id
FROM employees emp, departments dept
WHERE emp.department_id = dept.department_id;

Equi
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees, departments
WHERE employees.department_id IN (50, 60, 90);
Equi
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees LEFT JOIN departments
ON( employees.department_id = departments.department_id);
Outer
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id FROM employees JOIN departments WHERE
employees.department_id = departments.department_id;
Equi
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees, departments
WHERE employees.department_id (+)= departments.department_id;

Outer
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees FULL OUTER JOIN departments
ON (WHERE employees.department_id = departments.department_id);
Outer
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees JOIN departments
USING (department_id);
Cartesian
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees RIGHT OUTER JOIN departments
ON( employees.department_id = departments.department_id);
The given statement would cause Cartesian or Cross Join
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees, departments
WHERE employees.department_id IN (50, 60, 90);
The given statement would cause Cartesian or Cross Join

SELECT employees.employee_id, employees.lastname,employees.department_id,


departments.department_id,departments.location_id
FROM employees JOIN departments
USING (department_id);
The given statement is not a valid join condition or is incorrect
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees LEFT JOIN departments
ON( employees.department_id = departments.department_id);
The given statement is an Equijoin
ELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees FULL OUTER JOIN departments
ON (WHERE employees.department_id = departments.department_id);
The given statement is not a valid join condition or is incorrect
SELECT e.employee_id, e.lastname,e.department_id, d.department_id,d.location_id
FROM employees e, departments d
WHERE e.department_id between 20 AND 50;
The given statement would cause Cartesian or Cross Join
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees, departments
WHERE employees.department_id (+)= departments.department_id;
The given statement would cause Cartesian or Cross Join
SELECT emp.employee_id, employees.lastname,emp.department_id,
dept.department_id,dept.location_id
FROM employees emp, departments dept
WHERE emp.department_id = dept.department_id;
The given statement is not a valid join condition or is incorrect
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees JOIN departments
ON( employees.department_id (+)= departments.department_id);
The given statement is Outer Join
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id FROM employees JOIN departments WHERE
employees.department_id = departments.department_id;
The given statement is an Equijoin
Which of the following printer produces poor quality of printing?
Dot matrix
For large volume output and multiple copies, what type of printer you need to use
Line
Page footing
c. the labels printed at the end of each page
Mr. Ang wants to have a report on the number enrollees in all university campuses. This will be used
for analyze in putting up a new campus. Mr. Ang is in the _________________.
Operational
Ronnie was assigned to produce the daily progress report of service contractors. To whom will
Ronnie submits the reports?
Middle
Which of the following is the best hierarchy of design of a report?
Control footing, Final footing, Report footing
Line and dot matrix printers are examples of
Impact
Jonathan is the Report Designer of the TRA Corporation under System Department. He is tasked to
design reports of the newly developed web application system. Which of the following he need to
consider in his design?
All
Who among the following uses reports for strategic management?
Top
Pie charts are normally used when
relative distribution of data in specified categories is to be shown
Grade sheets and product list are reports needed by
Operational
Which of the following can be used to present reports to Top Management?
All
Who uses the report for tactical management?
Middle
Buttons which can be clicked using a mouse are placed in screens as
Convenient
Which of the following is an OPTIONAL when designing reports?
Use of page and report footer
What is the best printer to use when printing multiple copies with carbon paper?
Dot matrix
An example of non-impact printer
Laser & Ink Jet

Designing screens uses principles


Similar
George is assigned present a report in a management meeting to be attended by school directors of
different university campuses. Which of the following is the best report he need to present?
All
Which of the following is the best hierarchy of design of a report?
Report heading, Page heading, Control heading, Detail lines
The process of creating an architecture diagram that represents the entities and their corresponding
relationship within a corporate database.
Data modelling
The process of stealing a domain name from another entity.
Domain Hijacking
A key player in information technology who is responsible for all of the data within a corporation.
DBA
What type of coding practice emphasises the importance of the allocation and use of memory for
programmers?
Correct Use of memory
This coding practice is done when the deadlines imposed on programmers force them to find the
best possible solution somewhere in the middle.
Pseudo
The process of using historical data to predict the future. This type of technology is used for
purchasing inventory, stock predictions, sales predictions and overall business assessments.
Data Forecasting
What type of coding practice should be done when operating systems are upgraded?
Redoing
This type of coding is done to have minimum reworking to do at the testing phase.
Code Design
These are considered significant security risk, but not being able to get into an application is a
serious development issue when a problem arises.
Using backdoors
This process checks the basic vulnerabilities of the program. These tests probe and attempt to
penetrate the security of the program and system in which it is running.
Code review
It refers to documentation on how to market the product and the analysis of the market demand.
Marketing
A programming language that had a built-in support for a simple form of literate programming.
Haskell
It refers to documentation for the end-user, system administrators and support staff.
End user
This is the documentation/ compilation of code, algorithms, interfaces, and APIs.
Technical
These are statements that identify attributes, capabilities, characteristics, or qualities of a system.
This is also the foundation for what shall be or has been implemented.
Requirement
It refers to the written text that accompanies computer software. It either explains how it operates or
how to use it; and may mean different things to people in different roles.
Soft doc
This is a special breed of design document that is also known as software description.
Archi
A very important part of the design document in enterprise software development that contains
Conceptual, Logical, and Physical Design Elements.
DDD
A term which means shape, or more generally, plan.
Schema
A style on how code documents are often organized, allowing a programmer to quickly look up an
arbitrary function or class.
Ref guide
It is a join of two or more table that returns only matched rows.
Inner join
Which of the following joins are mutuallu exclusive.
Natural
It is formed when a join condition is omitted.
Cartesian
This is a join clause used when the columns in two or more tables have the same but of different
data type.
Using
A join condition used when a table has columns with match values.
Self
A join condition that is based on all the columns in two or more table that have the same name.
Natural
This is used to quality ambiguous column when joining two or more tables.
Table prefixes
It is join between two tables that return the result of an Inner Join as well as the results of Left and
Right joins.
Outer
This is a jpin clause that produces a cross-product of two or more tables.
Cross
This is a join clause used to specify arbitrary conditions of specify columns to join.
On
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees JOIN departments
ON( employees.department_id (+)= departments.department_id);
Equi

SELECT employees.employee_id, employees.lastname,employees.department_id,


departments.department_id,departments.location_id
FROM employees RIGHT OUTER JOIN departments
ON( employees.department_id = departments.department_id);
Outer
SELECT e.employee_id, e.lastname,e.department_id, d.department_id,d.location_id
FROM employees e, departments d
WHERE e.department_id between 20 AND 50;
Incorrect

SELECT emp.employee_id, employees.lastname,emp.department_id,


dept.department_id,dept.location_id
FROM employees emp, departments dept
WHERE emp.department_id = dept.department_id;

Equi
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees, departments
WHERE employees.department_id IN (50, 60, 90);
Equi
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees LEFT JOIN departments
ON( employees.department_id = departments.department_id);
Outer
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id FROM employees JOIN departments WHERE
employees.department_id = departments.department_id;
Equi
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees, departments
WHERE employees.department_id (+)= departments.department_id;

Outer
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees FULL OUTER JOIN departments
ON (WHERE employees.department_id = departments.department_id);
Outer
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees JOIN departments
USING (department_id);
Cartesian
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees RIGHT OUTER JOIN departments
ON( employees.department_id = departments.department_id);
The given statement would cause Cartesian or Cross Join
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees, departments
WHERE employees.department_id IN (50, 60, 90);
The given statement would cause Cartesian or Cross Join

SELECT employees.employee_id, employees.lastname,employees.department_id,


departments.department_id,departments.location_id
FROM employees JOIN departments
USING (department_id);
The given statement is not a valid join condition or is incorrect
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees LEFT JOIN departments
ON( employees.department_id = departments.department_id);
The given statement is an Equijoin
ELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees FULL OUTER JOIN departments
ON (WHERE employees.department_id = departments.department_id);
The given statement is not a valid join condition or is incorrect
SELECT e.employee_id, e.lastname,e.department_id, d.department_id,d.location_id
FROM employees e, departments d
WHERE e.department_id between 20 AND 50;
The given statement would cause Cartesian or Cross Join
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees, departments
WHERE employees.department_id (+)= departments.department_id;
The given statement would cause Cartesian or Cross Join
SELECT emp.employee_id, employees.lastname,emp.department_id,
dept.department_id,dept.location_id
FROM employees emp, departments dept
WHERE emp.department_id = dept.department_id;
The given statement is not a valid join condition or is incorrect
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees JOIN departments
ON( employees.department_id (+)= departments.department_id);
The given statement is Outer Join
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id FROM employees JOIN departments WHERE
employees.department_id = departments.department_id;
The given statement is an Equijoin
Which of the following printer produces poor quality of printing?
Dot matrix
For large volume output and multiple copies, what type of printer you need to use
Line
Page footing
c. the labels printed at the end of each page
Mr. Ang wants to have a report on the number enrollees in all university campuses. This will be used
for analyze in putting up a new campus. Mr. Ang is in the _________________.
Operational
Ronnie was assigned to produce the daily progress report of service contractors. To whom will
Ronnie submits the reports?
Middle
Which of the following is the best hierarchy of design of a report?
Control footing, Final footing, Report footing
Line and dot matrix printers are examples of
Impact
Jonathan is the Report Designer of the TRA Corporation under System Department. He is tasked to
design reports of the newly developed web application system. Which of the following he need to
consider in his design?
All
Who among the following uses reports for strategic management?
Top
Pie charts are normally used when
relative distribution of data in specified categories is to be shown
Grade sheets and product list are reports needed by
Operational
Which of the following can be used to present reports to Top Management?
All
Who uses the report for tactical management?
Middle
Buttons which can be clicked using a mouse are placed in screens as
Convenient
Which of the following is an OPTIONAL when designing reports?
Use of page and report footer
What is the best printer to use when printing multiple copies with carbon paper?
Dot matrix
An example of non-impact printer
Laser & Ink Jet

Designing screens uses principles


Similar
George is assigned present a report in a management meeting to be attended by school directors of
different university campuses. Which of the following is the best report he need to present?
All
Which of the following is the best hierarchy of design of a report?
Report heading, Page heading, Control heading, Detail lines
The process of creating an architecture diagram that represents the entities and their corresponding
relationship within a corporate database.
Data modelling
The process of stealing a domain name from another entity.
Domain Hijacking
A key player in information technology who is responsible for all of the data within a corporation.
DBA
What type of coding practice emphasises the importance of the allocation and use of memory for
programmers?
Correct Use of memory
This coding practice is done when the deadlines imposed on programmers force them to find the
best possible solution somewhere in the middle.
Pseudo
The process of using historical data to predict the future. This type of technology is used for
purchasing inventory, stock predictions, sales predictions and overall business assessments.
Data Forecasting
What type of coding practice should be done when operating systems are upgraded?
Redoing
This type of coding is done to have minimum reworking to do at the testing phase.
Code Design
These are considered significant security risk, but not being able to get into an application is a
serious development issue when a problem arises.
Using backdoors
This process checks the basic vulnerabilities of the program. These tests probe and attempt to
penetrate the security of the program and system in which it is running.
Code review
It refers to documentation on how to market the product and the analysis of the market demand.
Marketing
A programming language that had a built-in support for a simple form of literate programming.
Haskell
It refers to documentation for the end-user, system administrators and support staff.
End user
This is the documentation/ compilation of code, algorithms, interfaces, and APIs.
Technical
These are statements that identify attributes, capabilities, characteristics, or qualities of a system.
This is also the foundation for what shall be or has been implemented.
Requirement
It refers to the written text that accompanies computer software. It either explains how it operates or
how to use it; and may mean different things to people in different roles.
Soft doc
This is a special breed of design document that is also known as software description.
Archi
A very important part of the design document in enterprise software development that contains
Conceptual, Logical, and Physical Design Elements.
DDD
A term which means shape, or more generally, plan.
Schema
A style on how code documents are often organized, allowing a programmer to quickly look up an
arbitrary function or class.
Ref guide
It is a join of two or more table that returns only matched rows.
Inner join
Which of the following joins are mutuallu exclusive.
Natural
It is formed when a join condition is omitted.
Cartesian
This is a join clause used when the columns in two or more tables have the same but of different
data type.
Using
A join condition used when a table has columns with match values.
Self
A join condition that is based on all the columns in two or more table that have the same name.
Natural
This is used to quality ambiguous column when joining two or more tables.
Table prefixes
It is join between two tables that return the result of an Inner Join as well as the results of Left and
Right joins.
Outer
This is a jpin clause that produces a cross-product of two or more tables.
Cross
This is a join clause used to specify arbitrary conditions of specify columns to join.
On
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees JOIN departments
ON( employees.department_id (+)= departments.department_id);
Equi

SELECT employees.employee_id, employees.lastname,employees.department_id,


departments.department_id,departments.location_id
FROM employees RIGHT OUTER JOIN departments
ON( employees.department_id = departments.department_id);
Outer
SELECT e.employee_id, e.lastname,e.department_id, d.department_id,d.location_id
FROM employees e, departments d
WHERE e.department_id between 20 AND 50;
Incorrect

SELECT emp.employee_id, employees.lastname,emp.department_id,


dept.department_id,dept.location_id
FROM employees emp, departments dept
WHERE emp.department_id = dept.department_id;

Equi
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees, departments
WHERE employees.department_id IN (50, 60, 90);
Equi
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees LEFT JOIN departments
ON( employees.department_id = departments.department_id);
Outer
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id FROM employees JOIN departments WHERE
employees.department_id = departments.department_id;
Equi
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees, departments
WHERE employees.department_id (+)= departments.department_id;

Outer
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees FULL OUTER JOIN departments
ON (WHERE employees.department_id = departments.department_id);
Outer
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees JOIN departments
USING (department_id);
Cartesian
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees RIGHT OUTER JOIN departments
ON( employees.department_id = departments.department_id);
The given statement would cause Cartesian or Cross Join
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees, departments
WHERE employees.department_id IN (50, 60, 90);
The given statement would cause Cartesian or Cross Join

SELECT employees.employee_id, employees.lastname,employees.department_id,


departments.department_id,departments.location_id
FROM employees JOIN departments
USING (department_id);
The given statement is not a valid join condition or is incorrect
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees LEFT JOIN departments
ON( employees.department_id = departments.department_id);
The given statement is an Equijoin
ELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees FULL OUTER JOIN departments
ON (WHERE employees.department_id = departments.department_id);
The given statement is not a valid join condition or is incorrect
SELECT e.employee_id, e.lastname,e.department_id, d.department_id,d.location_id
FROM employees e, departments d
WHERE e.department_id between 20 AND 50;
The given statement would cause Cartesian or Cross Join
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees, departments
WHERE employees.department_id (+)= departments.department_id;
The given statement would cause Cartesian or Cross Join
SELECT emp.employee_id, employees.lastname,emp.department_id,
dept.department_id,dept.location_id
FROM employees emp, departments dept
WHERE emp.department_id = dept.department_id;
The given statement is not a valid join condition or is incorrect
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id
FROM employees JOIN departments
ON( employees.department_id (+)= departments.department_id);
The given statement is Outer Join
SELECT employees.employee_id, employees.lastname,employees.department_id,
departments.department_id,departments.location_id FROM employees JOIN departments WHERE
employees.department_id = departments.department_id;
The given statement is an Equijoin
Allowing the destruction of discoverable evidence is legal if approved by a higher official.
False
A teenager requests for money from random people because of an email he received containing
instructions on how to make cash in the next few weeks. This scam is done in the form of
_______________.
Monetary
This reveals surprisingly detailed information that is significantly private. It is suggested that you
keep this practice limited to authorized investigations and legitimate troubleshooting in order to
preserve the users' expectation of privacy, as defined by company policy.
Traffic Analysis
A cyberattack wiped the data from hard drives of computers in banks in South Korea. The attack
came from an email mimicking a South Korean bank. What type of identity theft scam did they do?
Account Verification or "Phisher" exams
The main job of the postmaster is to retrieve an email from the legitimate sender to the legitimate
receiver.
TRUE

Dbms
Supposed that a user performs the query as shown below, what will happen to the data?
UPDATE EMPLOYEES SET JOB_ID = ‘IT’, SALARY =10000
WHERE MANAGER_ID IS NULL;

SAVEPOINT UPDATE_IT;

UPDATE EMPLOYEES SET JOB_ID = ‘SECRETARY’


WHERE DEPARTMENT IN (50,90) OR SALARY > 500;
SAVEPOINT UPDATE_SECRETARY;

ROLLBACK TO UPDATE_IT;
Savepoints are discarded.
Which of the following is the correct example of multivalued attributes?

A state of the data where a transaction must be fully compliant with the state of the database as it
was prior to the transaction.
Consistency
Which of the following is the correct representation of many-to-many relation?

UPDATE EMPLOYEES SET JOB_ID = ‘IT’, SALARY =10000


WHERE MANAGER_ID IS NULL;
SAVEPOINT UPDATE_IT;

UPDATE EMPLOYEES SET JOB_ID = ‘SECRETARY’


WHERE DEPARTMENT IN (50,90) OR SALARY > 500;

SAVEPOINT UPDATE_IT;

ROLLBACK TO UPDATE_IT;
The manager_id that is equal to null is now change to IT and the job_id of employees under
department_id 50,90 or salary greater that 500 have been updated to secretary.
Which of the following is the correct representation of one-to-one relation?

Supposed that a user performs the query as shown below, what will happen to the data?
UPDATE EMPLOYEES SET JOB_ID = ‘IT’, SALARY =10000
WHERE MANAGER_ID IS NULL;

SAVEPOINT UPDATE_IT;

UPDATE EMPLOYEES SET JOB_ID = ‘SECRETARY’


WHERE DEPARTMENT IN (50,90) OR SALARY > 500;

SAVEPOINT UPDATE_IT;

ROLLBACK;
No changes made on employees table.
A type of constraint uniquely identifies each record in a database table.
Primary key
A type constraint that uniquely identifies each record in a database table and can be applied on one
or more column.
Unique
Which of the following is the correct example of derived attribute?
None
It is the skeleton structure that represents the logical view of the entire database.
Database schema
A state where a transaction data changes must be available, even in the event of database failure.
Durability
Which of the following is the correct example of adding primary key constraint?
d. ALTER TABLE AUTHORS
ADD CONSTRAINT AUTHOR_ID PRIMARY KEY;

Which of the following statement is not true about Foreign Key constraint
b. A foreign key in one table points to a foreign key in another table
A state of the data where a transaction must be fully complete, saved (committed) or completely
undone (rolled back).
Atom
This is the fundamental entity which introduces abstraction in a Database Management System
(DBMS).
Data model
Which of the following is the correct example of referencing the BOOKS table to AUTHORS?
b. CREATE TABLE BOOKS(
BOOK_ID NUMBER PRIMARY KEY NOT NULL,
TITLE VARCHAR(10),
YEAR NUMBER(4),
CONSTRAINT BK_ID (BOOK_ID)
REFERENCES AUTHORS (BOOK_ID));
This gives the user more flexibility and control when changing data and they ensure data
consistency in the event of user process or system failure.
Transaction
Which of the following is the correct representation of one-to-many relation?
Which of the following is the correct example of an attributes?
Usn id
Which of the following is the correct example of dropping on delete cascade?
d. ALTER TABLE AUTHORS
DROP PRIMARY KEY ON DELETE CASCADE;
This is a kind of mechanism, which liberalizes itself from actual data stored on the disk.
Logical data independence
It is a state of operational database with data at any given time.
Dtabase instance
Supposed that a user performs the query as shown below, what will happen to the data?
UPDATE EMPLOYEES SET JOB_ID = ‘IT’
WHERE MANAGER_ID IS NULL;

SAVEPOINT UPDATE_IT;

UPDATE EMPLOYEES SET JOB_ID = ‘SECRETARY’


WHERE DEPARTMENT IN (50,90);

SAVEPOINT UPDATE_IT;

COMMIT;

ROLLBACK;
Permanently
Which of the following is the correct example of adding a check constraint on column BOOK_ID to
accept value greater that 10?
c. CREATE TABLE BOOKS(
BOOK_ID NUMBER,
TITLE VARCHAR(10),
YEAR NUMBER(4),
CONSTRAINT BK_ID CHECK (BOOK_ID > 10));
This is used to deactivate an integrity constraint.
DISABLE
It is used to ensures that data values inside a database follow defines rules for values, range and
format
DOMAIN INTEGRITY
A state of the data where a transaction data must not be available to other transactions until the
original transaction is committed or rolled back.
Isolation

SOFT ENG
It includes all the costs needed to achieve the required Quality levels.
b. Cost of Quality
Which of the following best described a clean room testing?
a. Perform a document production of code that is more reliable and maintainable

This methodology embodies the notion of dynamic stability which can be thought of as similar to how
Scrum embraces controlled chaos.
d. Lean Development Methodology
Clearly determines the items that make up the software or system that includes source code, test
scripts, third-party software, hardware, data and both development and test documentation.
a. Configuration management
An agile method for project management developed by Ken Schwaber.
c. Scrum methodology
It is a general term that refers to any programming language that offers speedier implementation
than do traditional third-generation languages such as C/C++, Pascal, or Fortran. Rapid-
Development Languages (RDLs) produce their savings by reducing the amount of construction
needed to build a product.
a. Rapid Development Language
Which of the following best described a fault-based testing?
d. Perform a strategy which focuses on what constitute a fault model of the strategy
It is a kind of validation process that is usually carried out during the routine service, manufacturing
or engineering processing.
CONCURRENT
A kind of validation is done against the written specifications and is actually based on the historical
data or evidence that has been documented.
RETRO
This means that the Software product delivered should be as per the requirements defined.
ISO
Which of the following best described a white-box testing?
c. Perform a a design test cases based on analysis of some aspect of source code
heuristically
This refers to the various facets of a gemstone - each a different face on an underlying core.
CRYSTAL
Determines the standards that are relevant for the Software Product, the Organization and the
means to achieve them.
QUALITY PLANNING
This process recognizes that the traditional waterfall approach can be inefficient because it idles key
team members for extended periods of time.
RUP
It is a conceptual framework for undertaking software engineering projects.
Agile
A quantitative measure of a degree to which a software system or process possesses
some property.

SOFT M
It is a requisite in the quality management process and it makes sure that the process or product
meets the purpose intended.
VALID
Comprises of processes that ensure that the Software Project would reach its goals.
SQM
Which of the following best described a branch coverage test suite?
EDGE
It describes the quality objectives and specifies the quality assurance and control activities to be
performed in day-to-day company operations.
QUALITY PLANNING
Which of the following best described code review?
a. Perform code evaluation for defects and removal mechanism
It is a framework used to structure, plan, and control the process of developing an information
system.
SOFTWARE DEVELOPMENT
Which of the following best described a code inspection?
Perform code examination for the presence of some common programming errors
It is a requirements-definition and user-interface design methodology in which end-
users, executives, and developers attend intense off-site meetings to work out a system's details.
JAD
Which of the following best described a code walktrough?
Informal
Which of the following best described a unit testing?
c. Code is tested a whole
A methodology for creating software within a very unstable environment and it allows flexibility within
the modelling process.
EXTREME
A sophisticated lifecycle model that focuses on early identification and reduction of project risks.
SPIRAL
Which of the following best described an integration testing?
SLOWLY
Which of the following best describe a black-box testing?
c. Perform equivalence class partitioning

This is a set of procedures that manage a database and provide application program access the
database in a form requested by the application programs.
DBMS
Given employee (employee number, salary, department code, supervisor code). What is the unique
relation key.
EMPLOYEE NO.
Diamond shape is represented by
RELATIONSHIP
Each column in the relation corresponds to _____________
RECORDS
Relationship are normalized to ensure that
ALL
In the ER Diagram, normally entities are
NOUNS
The following are entities EXCEPT
VOLUNTEER AND OFFICER
Every member of an entity set is described by its _______________.
ATTRIBUTES
This ________________ is a procedure used to transform a set of relations into another set which
has some desirable properties.
NORMALIZATION
In Entity Relationship, the Student number, Course, Date Enrolled, Gender are examples of
ATTRIBUTES
In the ER Diagram, relationships are
VERBS
To use a ________, a ___________ model of data needed for current and future applications is
designed. ___________ modelling is useful for this.
b. DBMS, conceptual, Entity Relationship
Each row in a table contains a
ALL
Entities are represented by
RECTANGLE
A relationship is in 2NF if,
a. It is in 1NF
E-R Model has the ability to describe
ALL
A "flat file" is also called
e. 1NF
In Entity Relationship, a tuple is
f. a row of relation
Which of the following is a valid ER Diagram?
Which of the following is an entity
PROGRAMMER AND EMPLOYEE
Disclosing referral fees to the client is up to
the executive's decision.
False
Having this policy within a company means that whomever signs the nondisclosure agreement
agrees to keep the vulnerability information within that organization tightly contained so that no one
outside of the organization, especially the general public, ever learns of the existence of product
vulnerabilities.
Nondisclosure policy
They possess great power in the corporate world. They have the ability to spy on fellow employees
as they can see the websites employees are visiting, monitor employee emails and online chats,
view data on personal computers connected to the corporate network and much more.
System administrator
A statement that highlights an organization's key ethical issues and identifies the outstretching
values and principles that are important to the organization and its decision making.
Code of ethics
Performing shortcuts when implementing a new system is not always a good idea, but unfortunately,
sometimes it is necessary in order to meet aggressive time constraints
True
A method wherein an organization reviews how well it is meeting its new goals for the upcoming
year.

SOCIAL AUDIT
One of the responsibilities of a compliance officer is to suggest contents for the code of ethics for
approval of a higher official.
True

The process of broadly disseminating as much information as possible regarding product or system
vulnerabilities so that potential victims possess the same information as the potential hackers.

Full disclosure
The daily responsibilities of the administrator such as monitoring the system, managing users and
passwords, allocating system resources and installations.

System administration
When a patch is not aptly tested, problems arise.
True
In developing a code of ethics, always disregard anonymous reports.
False
Ethics training must increase the percentage of employees reporting incidents of misconduct.
True
A crucial process for determining system integrity and business practice integrity.

Audits
This involves controlling an integrated computer system and maximizing performance and
productivity of that system

Networking
They are responsible for finding vulnerabilities. They also have their own set of moral issues to
address when reversing engineering products for the protection purposes of discovering
vulnerabilities.
White hat hackers
Which of the following is the correct example of saving changes made on the table?
Save;

Allowing the destruction of discoverable evidence is legal if approved by a higher official.


False
A teenager requests for money from random people because of an email he received containing
instructions on how to make cash in the next few weeks. This scam is done in the form of
_______________.
Monetary
This reveals surprisingly detailed information that is significantly private. It is suggested that you
keep this practice limited to authorized investigations and legitimate troubleshooting in order to
preserve the users' expectation of privacy, as defined by company policy.
Traffic Analysis
A cyberattack wiped the data from hard drives of computers in banks in South Korea. The attack
came from an email mimicking a South Korean bank. What type of identity theft scam did they do?
Account Verification or "Phisher" exams
The main job of the postmaster is to retrieve an email from the legitimate sender to the legitimate
receiver.
TRUE

Dbms
Supposed that a user performs the query as shown below, what will happen to the data?
UPDATE EMPLOYEES SET JOB_ID = ‘IT’, SALARY =10000
WHERE MANAGER_ID IS NULL;

SAVEPOINT UPDATE_IT;

UPDATE EMPLOYEES SET JOB_ID = ‘SECRETARY’


WHERE DEPARTMENT IN (50,90) OR SALARY > 500;

SAVEPOINT UPDATE_SECRETARY;

ROLLBACK TO UPDATE_IT;
Savepoints are discarded.
Which of the following is the correct example of multivalued attributes?
A state of the data where a transaction must be fully compliant with the state of the database as it
was prior to the transaction.
Consistency
Which of the following is the correct representation of many-to-many relation?

UPDATE EMPLOYEES SET JOB_ID = ‘IT’, SALARY =10000


WHERE MANAGER_ID IS NULL;

SAVEPOINT UPDATE_IT;

UPDATE EMPLOYEES SET JOB_ID = ‘SECRETARY’


WHERE DEPARTMENT IN (50,90) OR SALARY > 500;
SAVEPOINT UPDATE_IT;

ROLLBACK TO UPDATE_IT;
The manager_id that is equal to null is now change to IT and the job_id of employees under
department_id 50,90 or salary greater that 500 have been updated to secretary.
Which of the following is the correct representation of one-to-one relation?

Supposed that a user performs the query as shown below, what will happen to the data?
UPDATE EMPLOYEES SET JOB_ID = ‘IT’, SALARY =10000
WHERE MANAGER_ID IS NULL;

SAVEPOINT UPDATE_IT;

UPDATE EMPLOYEES SET JOB_ID = ‘SECRETARY’


WHERE DEPARTMENT IN (50,90) OR SALARY > 500;

SAVEPOINT UPDATE_IT;

ROLLBACK;
No changes made on employees table.
A type of constraint uniquely identifies each record in a database table.
Primary key
A type constraint that uniquely identifies each record in a database table and can be applied on one
or more column.
Unique
Which of the following is the correct example of derived attribute?
None
It is the skeleton structure that represents the logical view of the entire database.
Database schema
A state where a transaction data changes must be available, even in the event of database failure.
Durability
Which of the following is the correct example of adding primary key constraint?
d. ALTER TABLE AUTHORS
ADD CONSTRAINT AUTHOR_ID PRIMARY KEY;

Which of the following statement is not true about Foreign Key constraint
b. A foreign key in one table points to a foreign key in another table
A state of the data where a transaction must be fully complete, saved (committed) or completely
undone (rolled back).
Atom
This is the fundamental entity which introduces abstraction in a Database Management System
(DBMS).
Data model
Which of the following is the correct example of referencing the BOOKS table to AUTHORS?
b. CREATE TABLE BOOKS(
BOOK_ID NUMBER PRIMARY KEY NOT NULL,
TITLE VARCHAR(10),
YEAR NUMBER(4),
CONSTRAINT BK_ID (BOOK_ID)
REFERENCES AUTHORS (BOOK_ID));
This gives the user more flexibility and control when changing data and they ensure data
consistency in the event of user process or system failure.
Transaction
Which of the following is the correct representation of one-to-many relation?
Which of the following is the correct example of an attributes?
Usn id
Which of the following is the correct example of dropping on delete cascade?
d. ALTER TABLE AUTHORS
DROP PRIMARY KEY ON DELETE CASCADE;
This is a kind of mechanism, which liberalizes itself from actual data stored on the disk.
Logical data independence
It is a state of operational database with data at any given time.
Dtabase instance
Supposed that a user performs the query as shown below, what will happen to the data?
UPDATE EMPLOYEES SET JOB_ID = ‘IT’
WHERE MANAGER_ID IS NULL;

SAVEPOINT UPDATE_IT;

UPDATE EMPLOYEES SET JOB_ID = ‘SECRETARY’


WHERE DEPARTMENT IN (50,90);

SAVEPOINT UPDATE_IT;

COMMIT;

ROLLBACK;
Permanently
Which of the following is the correct example of adding a check constraint on column BOOK_ID to
accept value greater that 10?
c. CREATE TABLE BOOKS(
BOOK_ID NUMBER,
TITLE VARCHAR(10),
YEAR NUMBER(4),
CONSTRAINT BK_ID CHECK (BOOK_ID > 10));
This is used to deactivate an integrity constraint.
DISABLE
It is used to ensures that data values inside a database follow defines rules for values, range and
format
DOMAIN INTEGRITY
A state of the data where a transaction data must not be available to other transactions until the
original transaction is committed or rolled back.
Isolation

SOFT ENG
It includes all the costs needed to achieve the required Quality levels.
b. Cost of Quality
Which of the following best described a clean room testing?
a. Perform a document production of code that is more reliable and maintainable

This methodology embodies the notion of dynamic stability which can be thought of as similar to how
Scrum embraces controlled chaos.
d. Lean Development Methodology
Clearly determines the items that make up the software or system that includes source code, test
scripts, third-party software, hardware, data and both development and test documentation.
a. Configuration management
An agile method for project management developed by Ken Schwaber.
c. Scrum methodology
It is a general term that refers to any programming language that offers speedier implementation
than do traditional third-generation languages such as C/C++, Pascal, or Fortran. Rapid-
Development Languages (RDLs) produce their savings by reducing the amount of construction
needed to build a product.
a. Rapid Development Language
Which of the following best described a fault-based testing?
d. Perform a strategy which focuses on what constitute a fault model of the strategy
It is a kind of validation process that is usually carried out during the routine service, manufacturing
or engineering processing.
CONCURRENT
A kind of validation is done against the written specifications and is actually based on the historical
data or evidence that has been documented.
RETRO
This means that the Software product delivered should be as per the requirements defined.
ISO
Which of the following best described a white-box testing?
c. Perform a a design test cases based on analysis of some aspect of source code
heuristically
This refers to the various facets of a gemstone - each a different face on an underlying core.
CRYSTAL
Determines the standards that are relevant for the Software Product, the Organization and the
means to achieve them.
QUALITY PLANNING
This process recognizes that the traditional waterfall approach can be inefficient because it idles key
team members for extended periods of time.
RUP
It is a conceptual framework for undertaking software engineering projects.
Agile
A quantitative measure of a degree to which a software system or process possesses
some property.

SOFT M
It is a requisite in the quality management process and it makes sure that the process or product
meets the purpose intended.
VALID
Comprises of processes that ensure that the Software Project would reach its goals.
SQM
Which of the following best described a branch coverage test suite?
EDGE
It describes the quality objectives and specifies the quality assurance and control activities to be
performed in day-to-day company operations.
QUALITY PLANNING
Which of the following best described code review?
a. Perform code evaluation for defects and removal mechanism
It is a framework used to structure, plan, and control the process of developing an information
system.
SOFTWARE DEVELOPMENT
Which of the following best described a code inspection?
Perform code examination for the presence of some common programming errors
It is a requirements-definition and user-interface design methodology in which end-
users, executives, and developers attend intense off-site meetings to work out a system's details.
JAD
Which of the following best described a code walktrough?
Informal
Which of the following best described a unit testing?
c. Code is tested a whole
A methodology for creating software within a very unstable environment and it allows flexibility within
the modelling process.
EXTREME
A sophisticated lifecycle model that focuses on early identification and reduction of project risks.
SPIRAL
Which of the following best described an integration testing?
SLOWLY
Which of the following best describe a black-box testing?
c. Perform equivalence class partitioning

This is a set of procedures that manage a database and provide application program access the
database in a form requested by the application programs.
DBMS
Given employee (employee number, salary, department code, supervisor code). What is the unique
relation key.
EMPLOYEE NO.
Diamond shape is represented by
RELATIONSHIP
Each column in the relation corresponds to _____________
RECORDS
Relationship are normalized to ensure that
ALL
In the ER Diagram, normally entities are
NOUNS
The following are entities EXCEPT
VOLUNTEER AND OFFICER
Every member of an entity set is described by its _______________.
ATTRIBUTES
This ________________ is a procedure used to transform a set of relations into another set which
has some desirable properties.
NORMALIZATION
In Entity Relationship, the Student number, Course, Date Enrolled, Gender are examples of
ATTRIBUTES
In the ER Diagram, relationships are
VERBS
To use a ________, a ___________ model of data needed for current and future applications is
designed. ___________ modelling is useful for this.
b. DBMS, conceptual, Entity Relationship
Each row in a table contains a
ALL
Entities are represented by
RECTANGLE
A relationship is in 2NF if,
a. It is in 1NF
E-R Model has the ability to describe
ALL
A "flat file" is also called
e. 1NF
In Entity Relationship, a tuple is
f. a row of relation
Which of the following is a valid ER Diagram?
Which of the following is an entity
PROGRAMMER AND EMPLOYEE

Which of the following classification of codes is NOT concise?

Group Classification code and Significant Code


Which of the following classification of codes is NOT comprehensive?
Serial number and Block codes
The main models of interactive data input are

Menus, Templates, Commands


Data dictionary may be used to eliminate redundancy.
FALSE
Which of the following statements is INCORRECT with respect to a Data Dictionary?
Data dictionary and data source both are the same
This gives a single point reference of data repository of an organization.
Data dictionary
Which of the following why there is a need for codes?
d. All of the choices
The _____________________ is a catalogue of all data used in an application, their names, type
and their origin.
d. Data dictionary
Which of the following classification of codes is NOT expandable

NONE
The ______________ data entry is suitable if the number of records is very large.
OFFLINE
The _____________________ is where user presented several alternatives and asked to type
his/her choice.
MENU
In ____________ data entry, batches of data are formed and entered. They are checked by a
validation program and the corrected records are stored in a file.
OFF LINE

For interactive data input, customized screens are designed for easy data entry. Errors in data entry
are instantly detected by a ________________ during data entry and can be immediately corrected.
VALIDATION
Which of the following classification of codes is NOT precise?
NONE
Which of the following classification of codes is NOT expandable?
NONE
Which of the following classification of codes is NOT comprehensive?
d. Serial number and block codes
A data element in a data dictionary may have
NO VALUE
What is metadata?
b. Data about data
A data dictionary is usually developed
c. when data flow diagram is developed
Which one of the following statements is FALSE about data dictionary?
NONE

The following are requirements of a good code EXCEPT


ALL

ETHICS
Performing shortcuts when implementing a new system is not always a good idea, but unfortunately,
sometimes it is necessary in order to meet aggressive time constraints.
TRUE
A crucial process for determining system integrity and business practice integrity.
Audits
The daily responsibilities of the administrator such as monitoring the system, managing users and
passwords, allocating system resources and installations.
System administration
When a patch is not aptly tested, problems arise.
True
This involves controlling an integrated computer system and maximizing performance and
productivity of that system.
Networking
They possess great power in the corporate world. They have the ability to spy on fellow employees
as they can see the websites employees are visiting, monitor employee emails and online chats,
view data on personal computers connected to the corporate network and much more.
Sys ad
The process of broadly disseminating as much information as possible regarding product or system
vulnerabilities so that potential victims possess the same information as the potential hackers.
Full Disclosure
Disclosing referral fees to the client is up to the executive's decision.
False
Having this policy within a company means that whomever signs the nondisclosure agreement
agrees to keep the vulnerability information within that organization tightly contained so that no one
outside of the organization, especially the general public, ever learns of the existence of product
vulnerabilities.
Non Disclosure
They are responsible for finding vulnerabilities. They also have their own set of moral issues to
address when reversing engineering products for the protection purposes of discovering
vulnerabilities.
White hat

Soft Eng
Which of the following best described a code walktrough?
Informal
Which of the following best described a white-box testing?
c. Perform a a design test cases based on analysis of some aspect of source code
heuristically

Which of the following best described a fault-based testing?


d. Perform a strategy which focuses on what constitute a fault model of the strategy
Which of the following best described an integration testing?
SLOWLY
Which of the following best described a clean room testing?
a. Perform a document production of code that is more reliable and maintainable
Which of the following best describe a black-box testing?
c. Perform equivalence class partitioning
Which of the following best described a code inspection?
Perform code examination for the presence of some common programming errors
Which of the following best described code review?
a. Perform code evaluation for defects and removal mechanism
Which of the following best described a unit testing?
c. Code is tested a whole
Which of the following best described a branch coverage test suite?
EDGE

Which of the following classification of codes is NOT concise?


Group Classification code and Significant Code
Which of the following classification of codes is NOT comprehensive?
Serial number and Block codes
The main models of interactive data input are
Menus, Templates, Commands
Data dictionary may be used to eliminate redundancy.
FALSE
Which of the following statements is INCORRECT with respect to a Data Dictionary?
Data dictionary and data source both are the same

This gives a single point reference of data repository of an organization.


Data dictionary
Which of the following why there is a need for codes?
d. All of the choices

The _____________________ is a catalogue of all data used in an application, their names, type
and their origin.

d. Data dictionary
Which of the following classification of codes is NOT expandable
NONE
The ______________ data entry is suitable if the number of records is very large.
OFFLINE
The _____________________ is where user presented several alternatives and asked to type
his/her choice.
MENU
In ____________ data entry, batches of data are formed and entered. They are checked by a
validation program and the corrected records are stored in a file.
OFF LINE

For interactive data input, customized screens are designed for easy data entry. Errors in data entry
are instantly detected by a ________________ during data entry and can be immediately corrected.
VALIDATION
Which of the following classification of codes is NOT precise?
NONE
Which of the following classification of codes is NOT expandable?
NONE
Which of the following classification of codes is NOT comprehensive?
d. Serial number and block codes
A data element in a data dictionary may have
NO VALUE
What is metadata?
b. Data about data
A data dictionary is usually developed

c. when data flow diagram is developed


Which one of the following statements is FALSE about data dictionary?
NONE

The following are requirements of a good code EXCEPT


ALL

ETHICS
Performing shortcuts when implementing a new system is not always a good idea, but unfortunately,
sometimes it is necessary in order to meet aggressive time constraints.
TRUE
A crucial process for determining system integrity and business practice integrity.
Audits
The daily responsibilities of the administrator such as monitoring the system, managing users and
passwords, allocating system resources and installations.
System administration
When a patch is not aptly tested, problems arise.
True
This involves controlling an integrated computer system and maximizing performance and
productivity of that system.
Networking
They possess great power in the corporate world. They have the ability to spy on fellow employees
as they can see the websites employees are visiting, monitor employee emails and online chats,
view data on personal computers connected to the corporate network and much more.
Sys ad
The process of broadly disseminating as much information as possible regarding product or system
vulnerabilities so that potential victims possess the same information as the potential hackers.
Full Disclosure
Disclosing referral fees to the client is up to the executive's decision.
False
Having this policy within a company means that whomever signs the nondisclosure agreement
agrees to keep the vulnerability information within that organization tightly contained so that no one
outside of the organization, especially the general public, ever learns of the existence of product
vulnerabilities.
Non Disclosure
They are responsible for finding vulnerabilities. They also have their own set of moral issues to
address when reversing engineering products for the protection purposes of discovering
vulnerabilities.
White hat

Soft Eng
Which of the following best described a code walktrough?
Informal
Which of the following best described a white-box testing?
c. Perform a a design test cases based on analysis of some aspect of source code
heuristically
Which of the following best described a fault-based testing?
d. Perform a strategy which focuses on what constitute a fault model of the strategy
Which of the following best described an integration testing?
SLOWLY
Which of the following best described a clean room testing?
a. Perform a document production of code that is more reliable and maintainable
Which of the following best describe a black-box testing?
c. Perform equivalence class partitioning
Which of the following best described a code inspection?
Perform code examination for the presence of some common programming errors

Which of the following best described code review?


a. Perform code evaluation for defects and removal mechanism
Which of the following best described a unit testing?
c. Code is tested a whole

Which of the following best described a branch coverage test suite?


EDGE
CS 352
Also known as Oracle Database backup and restore operations
Large
It holds information about changes made to the database
Redo Log
It is a collection of data treated as a unit with the main purpose of storing and retrieving related
information in the database.
ORACLE DBMS
It is a communication between a user process and an instance
CONNECTION

It is a type of process structure that automatically connects to other databases involved in in- doubt
distributed transactions

RECOVERER
It is a type of process structure that can collect transaction, redo data and transmit that data to
standby destinations
LGWR
It is a type of process structure that cleans up the database buffer cache
PMON
It is a type of process structure that records checkpoint information in Control file on each data file
header
CKPT
It is a type of process structure that writes modified (dirty) buffers in the database buffer cache
asynchronously while performing other processing to advance the checkpoint
DBWn

It is a type of process structure that writes the redo log buffer to a redo log file on disk
Lgwr
It is also known as specific connection of a user to an instance through a user process
SESSION
It is part of the System Global Area (SGA) that hold copies of data blocks that are read from data
files
DATA BUFFER CACHE
It is part of the System Global Area which is used to provide memory for Oracle Streams processes
JAVA POOL
It is the key in solving the problems of information management.
DATABASE
In planning to install Oracle which of the following is not important to consider.
ANY

QUIZ 2
Which of the following is the correct Disk space requirement when installing Oracle?
1GB
Which of the following is not part or Oracle Installation System Requirement.
FILE MANAGER
It is a type a Oracle environment where Oracle Products run.
ORACLE HOME
It is a type a Oracle environment where Oracle Products run.
EIPCBE

QUIZ 3
It is a named group of related privileges that can be granted to the user. This method makes it easier
to revoke and maintain privileges

ROLE
It is a type of privilege that gain access to the database
SYSTEM
It is a type of privilege that is used to manipulating the content of the database objects.

OBJECT
This is also known collection of objects such as tables, views, and sequences.
SCHEMA
This is used to remove a privilege granted to a user.

REVOKE
Which of the following is the correct example of passing a privilege (INSERT and UPDATE) to user
HR coming from a user scott?
D
Which of the following is the correct example of passing a privilege (INSERT and UPDATE) to user
HR coming from a SYSTEM?
A
Which of the following is the correct syntax for creating a new user?
C
Which of the following System Privileges is not part of SYSTEM privilege?
INDEX
Which of the following system privileges is not part of the task by the database admin.?
MANAGING

This is concerned with the quality and reliability of raw as well as processed data.
Data integrity
This is concerned with protecting data regarding individuals from being accessed and used without
the permission/knowledge of concerned individuals.
Data privacy
Organizational measures in control mean
proper organization of data

This is processing control that is use to check intermediate results in long and complex calculations.
Check points
By auditing around the computer we mean
Correctness
Which of the following is an objective of control?
All
A type of testing wherein incorrect inputs, incorrect processing and incorrect outputs will be detected
during operation.
System testing
A firewall is used in a system connected to a wide area network to
Unauthorized
Why is there a need to control in information system?
Large volume
This is concerned with protecting data from erasure, theft, unauthorized access and unauthorized
modifications.
Data sec
Information System is being tested as a whole system. What kind of testing is being conducted?
System testing
Which of the following does NOT considered as potential threats to security of the Information
System?
All
Errors are found in an operational information system will result to
Trust
Which of the following is a control technique during input preparation?
Data entry
This is a potential threat wherein an interruption in an authorized user's access to a computer
network.
All
Ronnie is the IT Security Officer of the TRA Corporation. His task is to secure/protect the data and
programs of the company. Which of the following action he will do?
All
Aldrin want to conduct a testing of the developed information system together with the manual
system using data used from manual system to test system when it is first implemented. What kind
of testing Aldrin will conduct?
Pilot
Aldrin want to conduct a testing of the developed information system together with the manual
system using live data. What kind of testing Aldrin will conduct?
Parallel
Aldrin is the Systems Analyst of the company. As a System Analyst, he need to ensure logs are
kept, who did in critical data entry and processing. What does Aldrin need to implement?
Audit trail
Ronnie want to protect his data when sending from the main office to the branch office.
Which of the following information security he will apply?
Encryption
Which of the following does NOT considered as potential threats to security of the Information
System?
None
A __________ Key Encryption eliminates the key distribution problem
Public
An advantage of symmetric key is easy and fast transformation of plain text to cipher text.
True
Page footing is
End of a report
In E-commerce, the pair of keys for each organization is a ____________ Key and its _________
Key
Public private
After encryption, a transformed data is also known as
Cipher text
Given the email address, inquiry@amauonline.com, what is the domain?
.com
A type of testing wherein incorrect inputs, incorrect processing and incorrect outputs will be detected
during operation.
Full testing
In the E commerce, a customer sends an order over the internet.
To secure the order,
Encrypted
This is a computer-to-computer exchange of business documents in a standard electronic format
between business partners.
Email
Which of the following does NOT considered as potential threats to security of the Information
System?
None
This is a security device deployed at the boundary of an organization's network to protect it from
unauthorized external access.
Firewall
This is a standards used to define a method of exchanging data over a computer network such as
local area network, Internet, Intranet.
These is being used by computer to send data over the internet.
Router
Which of the following is used to secure an E Commerce
All
Two corporate intranets may be interconnected using a leased line from PSTN -such a network is
called __________
Extranet
Jonathan is the Web Programmer of TRA Corporation. He was assigned to develop an informative
website. He wants to use user defined tags.
Corporate intranets may be interconnected using a
When sending data from the source to destination, the message is ____________.
Broken up
The ___________ tag is used to link a web page to another page.
Anchor
It is a communication protocol used to retrieved web pages.
HTTP
Detailed enrollment list and Grade sheet are reports needed by
TOP
The process of unscrambling the message is called
DECRYPTION
Aldrin is the network engineer of the TRA Corporation. TRA Corporation has offices in Cebu, Iloilo
and in Davao. As a network engineer, he need to connect the LAN of different offices to the main
office in Makati City.
What computer hardware network equipment he need to use to connect these offices.
INTERNET
Use ___________________ to attach EDI forms to e-mail messages
VAN

Which of the following tell about Triple DES?


1, 2 & 4
It is a combination of permutation and substitution on blocks of 64 bits. A message is broken up into
64 bit blocks and each block is separately encrypted.
DES

TRUE or FALSE. The for keyword is a loop structure.


True
Which of the following is BEST for checking for completeness?
Any of the choices

Which of the following is NOT an advantage of using decision table?


Simple representation of complex decision rules

Вам также может понравиться