System Analysis and Design U11522 PDF

Title System Analysis and Design U11522
Course System Analysis, Design and Development
Institution AMA Computer University
Pages 88
File Size 3.2 MB
File Type PDF
Total Downloads 128
Total Views 530

Summary

This is a set of procedures that manage a database and provide application program access the database in a form requested by the application programs. Select one: a. ER Process Diagram b. Flowcharting c. Information System d. DMBSQuestion 2Complete Mark 0 out of 1.Remove flagQuestion textInheritanc...


Description

This is a set of procedures that manage a database and provide application program access the database in a form re Select one: a. ER Process Diagram b. Flowcharting c. Information System d. DMBS Question 2 Complete Mark 0.00 out of 1.00

Remove flag

Question text Inheritance in object-oriented modelling can be used to Select one: a. generalize classes b. generalize and specialize classes c. specialize classes d. create new classes Question 3 Complete Mark 1.00 out of 1.00

Flag question

Question text Which of the following is used to secure an E Commerce Select one: a. None of the choices b. Digital certificate c. Encryption d

an object instance c. an entity d. an attribute Question 5 Complete Mark 1.00 out of 1.00

Flag question

Question text A subsystem of a complex system must specify Select one: a. with which subsystems it co-operates b. how it performs a task c. what task it performs d. how it co-operates with other systems Question 6 Complete Mark 1.00 out of 1.00

Flag question

Question text New classes are created from current classes by using the idea of _____________. Select one: a. Abstraction b. Encapsulation c. Inheritance d. Polymorphism Question 7 Complete Mark 0.00 out of 1.00

Question 8 Complete Mark 1.00 out of 1.00

Flag question

Question text Which of the following is the best hierarchy of design of a report? Select one: a. Detail lines, Report heading, Page heading, Control heading, b. Report heading, Page heading, Control heading, Detail lines c. Page heading, Report heading, Control heading, Detail lines d. Control heading, Report heading, Page heading, , Detail lines Question 9 Complete Mark 1.00 out of 1.00

Flag question

Question text Aldrin is the Systems Analyst of the company. As a System Analyst, he need to ensure logs are kept, who did in critica Aldrin need to implement? Select one: a. An Audit Trail b. None of the choices c. Inventory of records d. Backup and save all the tables Question 10 Complete Mark 0.00 out of 1.00

Flag question

Question text b

Question text Page footing is Select one: a. the labels printed at the end of each control group b. same as report heading c. the labels printed at the end of each page d. the labels printed at the end of a report Question 12 Complete Mark 1.00 out of 1.00

Flag question

Question text An instance of an object is created by a Select one: a. constructor operation b. open operation c. update operation d. query operation Question 13 Complete Mark 1.00 out of 1.00

Flag question

Question text HTML can be read by a text editor. Select one: True False Question 14 Complete Mark 1.00 out of 1.00

Question 15 Complete Mark 1.00 out of 1.00

Flag question

Question text A query operation on an object Select one: a. is not allowed b. has no side effects c. has side effect d. changes the state of an object Question 16 Complete Mark 1.00 out of 1.00

Flag question

Question text This is a standards used to define a method of exchanging data over a computer network such as local area network, computer to send data over the internet. Select one: a. Router b. http c. LAN d. Internet Protocol e. World Wide Web f. Switch Question 17 Complete Mark 1.00 out of 1.00

Flag question

Question text Pie charts are normally used when Select one: a. relative distribution of data in specified categories is to be shown b. trends as a function of time is to be illustrated c. it is required to illustrate geographical distribution of data d. percent use of resources under various heads is to be shown Question 19 Complete Mark 1.00 out of 1.00

Flag question

Question text Each column in the relation corresponds to _____________ Select one: a. An attribute of the entity b. Data of the entity c. Entity set d. Records Question 20 Complete Mark 1.00 out of 1.00

Flag question

Question text In Entity Relationship, a tuple is Select one: a.

Web@AT Corporation is newly established software company. Mr. Ang want to have a fast and reliable DSL internet c Officer to apply for a fast connection. Which of the following the IT Office need to do first? Select one: a. Check the telephone line if capable of DSL connection b. Upgrade the company server. c. Connect Mr. Ang computer to the server. d. Request subscription fee to the Account Office. Question 22 Complete Mark 1.00 out of 1.00

Flag question

Question text Jonathan is the Report Designer of the TRA Corporation under System Department. He is tasked to design reports of system. Which of the following he need to consider in his design? Select one: a. Volume of the report b. All of the choices c. Purpose of the report d. User of the report e. Frequency of the report Question 23 Complete Mark 0.00 out of 1.00

Flag question

Question text Given the email address, [email protected], what is the domain? Select one: a. @

Encryption b. Firewall c. HTTP d. Description e. HTML Question 25 Complete Mark 0.00 out of 1.00

Flag question

Question text This acts on behalf of all users of an organization wanting to use the internet. Select one: a. Web application b. Server application c. Proxy application gateway d. Internet Application Protocol Question 26 Complete Mark 1.00 out of 1.00

Flag question

Question text In the ER Diagram, relationships are Select one: a. Verbs b. None of the choices c. Adjective d. Nouns

d. Identify attributes Question 28 Complete Mark 1.00 out of 1.00

Flag question

Question text BoyeCodd Normal Form (BCNF) is needed when Select one: a. there are two possible keys and they are dependent on one another b. there is more then one possible composite key c. there are two or more possible composite overlapping keys and one attribute of a composite key is dependent on an d. two non-key attributes are dependent Question 29 Complete Mark 0.00 out of 1.00

Flag question

Question text Mr. Yu wants to have a report on the number enrollees in all university campuses. This will be used for analyze in putt _________________. Select one: a. Middle Management b. Operational Management c. All of the choices d. Top Management Question 30 Complete Mark 1.00 out of 1.00

Flag question

Question text Designing screens uses principles Select one: a. similar to those used for printed reports b. different from those used for printed reports c. which are unique d. which are well specified Question 32 Complete Mark 1.00 out of 1.00

Flag question

Question text In the ER Diagram, normally entities are Select one: a. Adjective b. Nouns c. None of the choices d. Verbs Question 33 Complete Mark 1.00 out of 1.00

Flag question

Question text HTTP is a language used to create web pages. Select one: True

System Testing d. Pilot Testing Question 35 Complete Mark 1.00 out of 1.00

Flag question

Question text Which of the following is a valid ER Diagram? Select one: a.

b.

c.

d.

Question 36 Complete Mark 1.00 out of 1.00

Flag question

Flag question

Question text This is concerned with protecting data from erasure, theft, unauthorized access and unauthorized modifications. Select one: a. Data Privacy b. Data Piracy c. Data Integrity d. Data Security Question 38 Complete Mark 1.00 out of 1.00

Flag question

Question text Grade sheets and product list are reports needed by Select one: a. Top Management b. All of the choices c. Middle Management d. Operational Management Jonathan is the Web Programmer of TRA Corporation. He was assigned to develop an informative website. He wants language he will use? Select one: a. XML b. SGML c. UDML d. HTML

If key attributes is independent on composite attribute Question 41 Complete Mark 0.00 out of 1.00

Flag question

Question text George is assigned present a report in a management meeting to be attended by school directors of different univers the best report he need to present? Select one: a. Summary report of number of enrollees in every campus per course b. List of names of students enrolled in every campus c. Summary report of number of enrollees in every campus d. All of the choices Question 42 Complete Mark 1.00 out of 1.00

Flag question

Question text A "flat file" is also called Select one: a. 2NF b. 1NF c. 3NF d. 1 is to Many Question 43 Complete Mark 1.00 out of 1.00

Flag question

Question 44 Complete Mark 1.00 out of 1.00

Flag question

Question text This is concerned with protecting data regarding individuals from being accessed and used without the permission/k Select one: a. Data Piracy b. Data Integrity c. Data Security d. Data Privacy Question 45 Complete Mark 1.00 out of 1.00

Flag question

Question text This is a process of accessing state without changing value. Select one: a. Data upload b. Query c. Indexing d. Migration Question 46 Complete Mark 1.00 out of 1.00

Flag question

Question text Who among the following uses reports for strategic management?

Flag question

Question text A 3 NF relation is converted to BCNF by Select one: a. dependent non-key attributes are put in a separate table b. removing multivalued dependencies c. removing composite keys d. dependent attributes of overlapping composite keys are put in a separaterelation Question 48 Complete Mark 1.00 out of 1.00

Flag question

Question text Hiding implementation details of methods from outside world. Select one: a. Polymorphism b. Encapsulation c. Inheritance d. Abstraction Question 49 Complete Mark 1.00 out of 1.00

Flag question

Question text Control in design of an information system is used to Select one: a.

a. URL b. HTML c. XML d. DTD Question 1 Complete Mark 1.00 out of 1.00

Flag question

Question text A __________ Key Encryption eliminates the key distribution problem Select one: a. Public b. Universal c. Private d. Global Question 2 Complete Mark 0.00 out of 1.00

Flag question

Question text Buttons which can be clicked using a mouse are placed in screens as Select one: a. it is the modern trend b. they are convenient to use c. using a keyboard is error prone d. large number of buttons can be used Q

ti

3

DBMS Question 4 Complete Mark 1.00 out of 1.00

Flag question

Question text Each statement in DTD declares the element of HTML language. Select one: True False Question 5 Complete Mark 1.00 out of 1.00

Flag question

Question text Ronnie want to protect his data when sending from the main office to the branch office. Which of the following information security he will apply? Select one: a. File compression either zip or rar b. Encryption c. Decryption d. Firewall Question 6 Complete Mark 0.00 out of 1.00

Flag question

Question text Aldrin is the network engineer of the TRA Corporation. TRA Corporation has offices in Cebu, Iloilo and in Davao. As a the LAN of different offices to the main office in Makati City. What computer hardware network equipment he need t Select one: a. Internet

Flag question

Question text Given the IP address, 192.168.1.10 and 192.168.1.100. Are the IP addresses in the same network? Select one: True False Question 8 Complete Mark 0.00 out of 1.00

Flag question

Question text Audit in the design of information system is used to Select one: a. protect data from accidental or intentional loss b. inspect the system and check that it is built as per specifications c. ensure privacy of data processed by it d. ensure that the system processes data as it was designed to and that the results are reliable Question 9 Complete Mark 1.00 out of 1.00

Flag question

Question text These are used for formatting and creating links from one webpage to another. Select one: a. Markups b. All of the choices c. Tags d

Control footing, Final footing, Report footing c. Final footing, Control footing, Report footing d. Report footing, Final footing, Control footing Question 11 Complete Mark 1.00 out of 1.00

Flag question

Question text Which of the following can be used to present reports to Top Management? Select one: a. Pie Chart b. All of the choices c. Map d. Bar Graph Question 12 Complete Mark 1.00 out of 1.00

Flag question

Question text Decision trees are drawn _________________ Select one: a. After the system analysis stage b. Right to Left c. Top to bottom d. Depending on the complexity of the problem e. Left to Right Question 13 Complete

e. Report should be able read left to right and top to bottom Question 14 Complete Mark 1.00 out of 1.00

Flag question

Question text These are used for formatting and creating links from one webpage to another. Select one: a. None of the choices b. Tags c. All of the choices d. Markups e. Special annotations Question 15 Complete Mark 1.00 out of 1.00

Flag question

Question text Picking necessary operation and attributes to specify objects. Select one: a. Encapsulation b. Polymorphism c. Abstraction d. Inheritance Question 16 Complete Mark 0.00 out of 1.00

Flag question

Question text It is also known as information hiding. Select one: a. Inheritance b. Abstraction c. Polymorphism d. Encapsulation Question 18 Complete Mark 0.00 out of 1.00

Flag question

Question text Arlene was assigned to produce the daily progress report of service contractors. To whom will Arlene submits the rep Select one: a. All of the choices b. Operational Management c. Top Management d. Middle Management Question 19 Complete Mark 1.00 out of 1.00

Flag question

Question text Entities are identified from the word statement of a problem by Select one: a.

True False Question 21 Complete Mark 1.00 out of 1.00

Flag question

Question text The ___________ tag is used to link a web page to another page. Select one: a. Open tag b. Anchor tag c. Connect tag d. Link tag Question 22 Complete Mark 1.00 out of 1.00

Flag question

Question text Computer systems are designed by Select one: a. breaking of the system into smaller self-contained co-operating subsystems b. simplifying requirements of system c. breaking up the systems into independent parts d. modular design Question 23 Complete Mark 0.00 out of 1.00

Fl

ti

Flag question

Question text An advantage of symmetric key is easy and fast transformation of plain text to cipher text. Select one: True False Question 25 Complete Mark 1.00 out of 1.00

Flag question

Question text Aldrin want to conduct a testing of the developed information system together with the manual system using live dat conduct? Select one: a. Parallel Test b. Full Testing c. Pilot Testing d. System Testing Question 26 Complete Mark 1.00 out of 1.00

Flag question

Question text Objects with similar meaning and purpose grouped together as ____________. Select one: a. Method b. Attribute c. Class

c. Compression d. Encryption Question 28 Complete Mark 1.00 out of 1.00

Flag question

Question text When sending data from the source to destination, the message is ____________. Select one: a. compressed using .zip b. broken up into packet c. none of the choices d. converted to ip address during sending Question 29 Complete Mark 1.00 out of 1.00

Flag question

Question text To model an information system using objects the requirements specification is examined and all _____________ in it ar Select one: a. Phrases b. Verbs c. Nouns d. Class Question 30 Complete Mark 1.00 out of 1.00

Flag question

Question text By auditing around the computer we mean Select one: a. the inputs and the corresponding outputs are compared and checked for correctness b. the programs and procedures are checked for correctness c. programs are written to check the functioning of the computer har d. special synthetic data is input and outputs checked for correctness Question 32 Complete Mark 0.00 out of 1.00

Flag question

Question text The ER diagram is interpreted as follows:

Select one: a. A Manager may supervise up to N employees; Some Managers may not supervise any employees b. A Manager supervises exactly N employees c. A Manager supervises upto N employees d

report to the programmers d. system shutdown Question 34 Complete Mark 1.00 out of 1.00

Flag question

Question text Aldrin want to conduct a testing of the developed information system together with the manual system using data us when it is first implemented. What kind of testing Aldrin will conduct? Select one: a. System Testing b. Pilot Testing c. Full Testing d. Parallel Test Question 35 Complete Mark 1.00 out of 1.00

Flag question

Question text IP addresses are converted to Select one: a. binary string b. hexadecimal string c. phanumeric string d. hierarchy of domain names Question 36 Complete Mark 1.00 out of 1.00

Flag question

Question text In ER Model, student, teacher, professor and school are Select one: a. Properties b. Relations c. Actors d. Entity e. Nouns Question 38 Complete Mark 0.00 out of 1.00

Flag question

Question text The purpose of parallel run is to Select one: a. to see whether outputs of a newly computerized system matches those of currently running manual or legacy system b. test an operational information system c. have redundancy for reliability d. test a system being newly designed Question 39 Complete Mark 1.00 out of 1.00

Flag question

Question text Every member of an entity set is described by its _______________.

In object modelling, special properties of objects are Select one: a. methods, attributes, classes b. entity, relationship, attributes c. encapsulation, inheritance and polymorphism d. none of the choices Question 41 Complete Mark 1.00 out of 1.00

Flag question

Question text The current version of HTML is _______________. Select one: a. Version 5 b. Version 6 c. Version 7 d. Version 4 e. Version 2010 Question 42 Complete Mark 1.00 out of 1.00

Flag question

Question text Why is there a need to control in information system? Select one: a. Information system took time to design. Redesigning the system will took a time to redevelop. b. To comply with the technology requirement of the company. c

picking words which are pronouns c. picking words which are verbs d. picking words which are nouns Question 44 Complete Mark 1.00 out of 1.00

Flag question

Question text A type of testing wherein incorrect inputs, incorrect processing and incorrect outputs will be detected during operatio Select one: a. Full Testing b. Pilot Testing c. Parallel Test d. System Testing Question 45 Complete Mark 1.00 out of 1.00

Flag question

Question text A firewall is used in a system connected to a wide area network to Select one: a. prevent spread b. to extinguish fire spreading via network cables c. to scan for viruses in files d. prevent unauthorized access by hackers Question 46 Complete Mark 1.00 out of 1.00

Flag question

Quest...


Similar Free PDFs