Sie sind auf Seite 1von 10

Allowing the destruction of discoverable evidence is legal if approved by a higher official.

False
A teenager requests for money from random people because of an email he received containing
instructions on how to make cash in the next few weeks. This scam is done in the form of
_______________.
Monetary
This reveals surprisingly detailed information that is significantly private. It is suggested that you
keep this practice limited to authorized investigations and legitimate troubleshooting in order to
preserve the users' expectation of privacy, as defined by company policy.
Traffic Analysis
A cyberattack wiped the data from hard drives of computers in banks in South Korea. The attack
came from an email mimicking a South Korean bank. What type of identity theft scam did they do?
Account Verification or "Phisher" exams
The main job of the postmaster is to retrieve an email from the legitimate sender to the legitimate
receiver.
TRUE

Dbms
Supposed that a user performs the query as shown below, what will happen to the data?
UPDATE EMPLOYEES SET JOB_ID = ‘IT’, SALARY =10000
WHERE MANAGER_ID IS NULL;

SAVEPOINT UPDATE_IT;

UPDATE EMPLOYEES SET JOB_ID = ‘SECRETARY’


WHERE DEPARTMENT IN (50,90) OR SALARY > 500;

SAVEPOINT UPDATE_SECRETARY;

ROLLBACK TO UPDATE_IT;
Savepoints are discarded.
Which of the following is the correct example of multivalued attributes?
A state of the data where a transaction must be fully compliant with the state of the database as it
was prior to the transaction.
Consistency
Which of the following is the correct representation of many-to-many relation?

UPDATE EMPLOYEES SET JOB_ID = ‘IT’, SALARY =10000


WHERE MANAGER_ID IS NULL;

SAVEPOINT UPDATE_IT;

UPDATE EMPLOYEES SET JOB_ID = ‘SECRETARY’


WHERE DEPARTMENT IN (50,90) OR SALARY > 500;
SAVEPOINT UPDATE_IT;

ROLLBACK TO UPDATE_IT;
The manager_id that is equal to null is now change to IT and the job_id of employees under
department_id 50,90 or salary greater that 500 have been updated to secretary.
Which of the following is the correct representation of one-to-one relation?

Supposed that a user performs the query as shown below, what will happen to the data?
UPDATE EMPLOYEES SET JOB_ID = ‘IT’, SALARY =10000
WHERE MANAGER_ID IS NULL;

SAVEPOINT UPDATE_IT;

UPDATE EMPLOYEES SET JOB_ID = ‘SECRETARY’


WHERE DEPARTMENT IN (50,90) OR SALARY > 500;

SAVEPOINT UPDATE_IT;

ROLLBACK;
No changes made on employees table.
A type of constraint uniquely identifies each record in a database table.
Primary key
A type constraint that uniquely identifies each record in a database table and can be applied on one
or more column.
Unique
Which of the following is the correct example of derived attribute?
None
It is the skeleton structure that represents the logical view of the entire database.
Database schema
A state where a transaction data changes must be available, even in the event of database failure.
Durability
Which of the following is the correct example of adding primary key constraint?
d. ALTER TABLE AUTHORS
ADD CONSTRAINT AUTHOR_ID PRIMARY KEY;

Which of the following statement is not true about Foreign Key constraint
b. A foreign key in one table points to a foreign key in another table
A state of the data where a transaction must be fully complete, saved (committed) or completely
undone (rolled back).
Atom
This is the fundamental entity which introduces abstraction in a Database Management System
(DBMS).
Data model
Which of the following is the correct example of referencing the BOOKS table to AUTHORS?
b. CREATE TABLE BOOKS(
BOOK_ID NUMBER PRIMARY KEY NOT NULL,
TITLE VARCHAR(10),
YEAR NUMBER(4),
CONSTRAINT BK_ID (BOOK_ID)
REFERENCES AUTHORS (BOOK_ID));
This gives the user more flexibility and control when changing data and they ensure data
consistency in the event of user process or system failure.
Transaction
Which of the following is the correct representation of one-to-many relation?
Which of the following is the correct example of an attributes?
Usn id
Which of the following is the correct example of dropping on delete cascade?
d. ALTER TABLE AUTHORS
DROP PRIMARY KEY ON DELETE CASCADE;
This is a kind of mechanism, which liberalizes itself from actual data stored on the disk.
Logical data independence
It is a state of operational database with data at any given time.
Dtabase instance
Supposed that a user performs the query as shown below, what will happen to the data?
UPDATE EMPLOYEES SET JOB_ID = ‘IT’
WHERE MANAGER_ID IS NULL;

SAVEPOINT UPDATE_IT;

UPDATE EMPLOYEES SET JOB_ID = ‘SECRETARY’


WHERE DEPARTMENT IN (50,90);

SAVEPOINT UPDATE_IT;

COMMIT;

ROLLBACK;
Permanently
Which of the following is the correct example of adding a check constraint on column BOOK_ID to
accept value greater that 10?
c. CREATE TABLE BOOKS(
BOOK_ID NUMBER,
TITLE VARCHAR(10),
YEAR NUMBER(4),
CONSTRAINT BK_ID CHECK (BOOK_ID > 10));
This is used to deactivate an integrity constraint.
DISABLE
It is used to ensures that data values inside a database follow defines rules for values, range and
format
DOMAIN INTEGRITY
A state of the data where a transaction data must not be available to other transactions until the
original transaction is committed or rolled back.
Isolation

SOFT ENG
It includes all the costs needed to achieve the required Quality levels.
b. Cost of Quality
Which of the following best described a clean room testing?
a. Perform a document production of code that is more reliable and maintainable

This methodology embodies the notion of dynamic stability which can be thought of as similar to how
Scrum embraces controlled chaos.
d. Lean Development Methodology
Clearly determines the items that make up the software or system that includes source code, test
scripts, third-party software, hardware, data and both development and test documentation.
a. Configuration management
An agile method for project management developed by Ken Schwaber.
c. Scrum methodology
It is a general term that refers to any programming language that offers speedier implementation
than do traditional third-generation languages such as C/C++, Pascal, or Fortran. Rapid-
Development Languages (RDLs) produce their savings by reducing the amount of construction
needed to build a product.
a. Rapid Development Language
Which of the following best described a fault-based testing?
d. Perform a strategy which focuses on what constitute a fault model of the strategy
It is a kind of validation process that is usually carried out during the routine service, manufacturing
or engineering processing.
CONCURRENT
A kind of validation is done against the written specifications and is actually based on the historical
data or evidence that has been documented.
RETRO
This means that the Software product delivered should be as per the requirements defined.
ISO
Which of the following best described a white-box testing?
c. Perform a a design test cases based on analysis of some aspect of source code
heuristically
This refers to the various facets of a gemstone - each a different face on an underlying core.
CRYSTAL
Determines the standards that are relevant for the Software Product, the Organization and the
means to achieve them.
QUALITY PLANNING
This process recognizes that the traditional waterfall approach can be inefficient because it idles key
team members for extended periods of time.
RUP
It is a conceptual framework for undertaking software engineering projects.
Agile
A quantitative measure of a degree to which a software system or process possesses
some property.

SOFT M
It is a requisite in the quality management process and it makes sure that the process or product
meets the purpose intended.
VALID
Comprises of processes that ensure that the Software Project would reach its goals.
SQM
Which of the following best described a branch coverage test suite?
EDGE
It describes the quality objectives and specifies the quality assurance and control activities to be
performed in day-to-day company operations.
QUALITY PLANNING
Which of the following best described code review?
a. Perform code evaluation for defects and removal mechanism
It is a framework used to structure, plan, and control the process of developing an information
system.
SOFTWARE DEVELOPMENT
Which of the following best described a code inspection?
Perform code examination for the presence of some common programming errors
It is a requirements-definition and user-interface design methodology in which end-
users, executives, and developers attend intense off-site meetings to work out a system's details.
JAD
Which of the following best described a code walktrough?
Informal
Which of the following best described a unit testing?
c. Code is tested a whole
A methodology for creating software within a very unstable environment and it allows flexibility within
the modelling process.
EXTREME
A sophisticated lifecycle model that focuses on early identification and reduction of project risks.
SPIRAL
Which of the following best described an integration testing?
SLOWLY
Which of the following best describe a black-box testing?
c. Perform equivalence class partitioning

This is a set of procedures that manage a database and provide application program access the
database in a form requested by the application programs.
DBMS
Given employee (employee number, salary, department code, supervisor code). What is the unique
relation key.
EMPLOYEE NO.
Diamond shape is represented by
RELATIONSHIP
Each column in the relation corresponds to _____________
RECORDS
Relationship are normalized to ensure that
ALL
In the ER Diagram, normally entities are
NOUNS
The following are entities EXCEPT
VOLUNTEER AND OFFICER
Every member of an entity set is described by its _______________.
ATTRIBUTES
This ________________ is a procedure used to transform a set of relations into another set which
has some desirable properties.
NORMALIZATION
In Entity Relationship, the Student number, Course, Date Enrolled, Gender are examples of
ATTRIBUTES
In the ER Diagram, relationships are
VERBS
To use a ________, a ___________ model of data needed for current and future applications is
designed. ___________ modelling is useful for this.
b. DBMS, conceptual, Entity Relationship
Each row in a table contains a
ALL
Entities are represented by
RECTANGLE
A relationship is in 2NF if,
a. It is in 1NF
E-R Model has the ability to describe
ALL
A "flat file" is also called
e. 1NF
In Entity Relationship, a tuple is
f. a row of relation
Which of the following is a valid ER Diagram?
Which of the following is an entity
PROGRAMMER AND EMPLOYEE

Das könnte Ihnen auch gefallen