Sample Questions
System Architecture
With a two tier architecture we address the disadvantages of Data Redundancy Data Inconsistency across locations Convenient Graphical User Interface All of the Above None of the Above
2
System Architecture
The two components of an application are Business Logic and Presentation Logic Graphical User Interface (GUI) and the Buttons Business Rules and the Business Logic All of the Above None of the Above
3
System Architecture
Three-tier architecture is also called client
preferable to keep data and applications in the same hardware component. (T/ F)
System Architecture
System Architecture is a representation of
architecture. (T/F)
ER Diagram
STUDENT Student ID Student First Name Student Last name Student Major
ER Diagram
The attributes of STUDENT are Student First Name Student Last Name Student Major All of the Above None of the Above
ER Diagram
Student Id is the primary key for Student First
name (T/F)
Normalization
STUDENT is in the following normal form First Normal Form Second Normal Form Third Normal Form All of the Above None of the Above
Normalization
If there are no repeating groups then the entity is in First Normal Form Second Normal Form Third Normal Form All of the Above None of the Above
11
Normalization
If all the non key attributes are independent of each other then the entity is in First Normal Form Second Normal Form Third Normal Form All of the Above None of the Above
Normalization
Before you normalize an entity you need to
Normalization
Before you normalize an entity you need to identify Repeating groups Primary key Composite key All of the Above None of the Above
physical model includes implementation of referential integrity. (T/F) A procedure will perform a specific action and return a single value. (T/F) An index enables faster retrieval of data. (T/F) A view is a pseudo table. (T/F)
SQL
Write an SQL statement to find the
SELECT * FROM EMPLOYEES WHERE DEPT != 40 SELECT * FROM EMPLOYEES WHERE DEPT <> 40
SQL
Write an SQL statement to list the clerks in
SELECT * FROM EMPLOYEES WHERE DEPT = 40 AND JOBDESC = clerk ORDER BY FIRSTNAME
SQL
Write an SQL statement to find managers in
Application Development
Java and Visual Basic are computer
languages. (T/F)
Application Development
A compiler converts lower level language into
your organization to write the program which does the task of a compiler. (T/F)
English. (T/F)
Application Development
A compiler converts lower level language into
your organization to write the program which does the task of a compiler. (T/F)
English. (T/F)
Application Development
Whether to choose VB Script or javascript as the programming language will depend on The system architecture The application to be developed Whether it is to be web enabled or not All of the Above None of the Above
Application Development
IDE is a software that helps to compile a
program. (T/F)
An IDE helps to write a program. (T/F) Code written in C++ can be compiled by
Application Development
In object oriented methodology, a method is
Application Development
POLYMORPHISM is the phenomenon by
which the same attribute could mean different things in different methods. (T/F)
which the same method could mean different things in different attributes. (T/F)
Application Development
In object oriented methodology, data integrity is ensured by Allowing change to happen in the values of attributes only through an execution of a method Using SQL statements for CRUD functions Data normalization All of the Above None of the Above
Application Development
In object oriented methodology,
INHERITANCE is the phenomenon by which one class inherits attributes from another class. (T/F)
INHERITANCE is the phenomenon by which one attribute inherits methods from another class. (T/F)
Vendor Management
Criteria for evaluating potential vendors include Geographical location of the vendor Prior experience in similar applications Staff and facilities available to perform the work All of the Above None of the Above
Vendor Management
Vendor selection is done based on Geographical location of the vendor Suppliers performance records on similar work Staff and facilities available to perform the work All of the Above None of the Above
Vendor Management
Transitioning the application from the vendor
done for long periods of time (10 years minimum) to take advantage of economies of scale (T/F)
Vendor Management
Technical reviews are conducted with the
Vendor Management
The formal agreement with the vendor should include Service Level Agreements Support terms and conditions Discounts and Liabilities All of the Above None of the Above
Vendor Management
We monitor selected vendor processes for Compliance with requirements of the agreement Detecting issues as early as possible Taking early corrective actions All of the Above None of the Above
Project Management
The Project Management processes are
Requirement Analysis Design Coding and Testing All of the Above None of the Above
Project Management
Project Management processes are
Project Planning Project Tracking Risk Management All of the Above None of the Above
Project Management
A good project estimate is that which
Is based on historical data Takes into considerations assumptions and
constraints Can be easily revised All of the Above None of the Above
Project Management
For every $1 spend on software development,
ERP
Extended ERP supports business partners. (T/F) KM system provides interface to external customers.
(T/F)
ERP
eCRM includes FAQs Chat rooms Call centers All of the Above None of the Above
ERP
Corporates implement ERP as Strategic Initiative Operational Initiative Organizational Initiative All of the Above None of the Above
IT Quality
Cost of Quality includes Prevention Costs Appraisal Costs Failure Costs All of the Above None of the Above
IT Quality
Pareto chart is used when analyzing data about the
of the datas distribution, especially when determining whether the output of a process is distributed approximately normally. (T/F)
IT in Business
A good outsourcing strategy would include
IT Security
Unintentional security threats include
Human errors Environmental hazards Computer system failures All of the Above None of the Above
IT Security
Methods of attack on computer systems include Hacking Data Tampering Programming attacks All of the Above None of the Above
IT Security
IT Security management practices include Prevention and Deterrence Detection Limitation of Damage All of the Above None of the Above