Therion Aplha Numeric Second
Therion Aplha Numeric Second
Therion Aplha Numeric Second
Assignment 1
A matrix showing the attended and needed trainings of every employee per work
category.
- Tactical
Aldrin is the Sr. Programmer of TRA Global Software Company. He received the list of
modules to be fixed. He is now debugging the system. The software development is in
___________________.
Select one:
a. System Implementation
b. Systems modification
c. Systems Design
d. System evaluation
Ronnie is the IT Engineer of the TRA Global Software Company. He identified the type of
server, desktop computers needed to implement the proposed information system.
What stage is the software development in?
Select one:
a. Hardware Study
b. System Implementation
c. Server installation and implementation
d. Server inventory Stage
This is a model used in project management that describes the stages involved in the
development of a project starting from the feasibility study through the maintenance
and enhancement of the system.
Select one:
a. Software Coding
b. Prototyping
c. SDLC
d. Conceptual Model
Ferdie is the Systems Analyst of the TRA Global Software Company. He needs to
document the complex decision logic. What tools does he need to use?
Select one:
a. Decision Flow Chart
b. Logic Table
c. Truth Table
d. Decision Table
TRA Global Software Company was contracted to develop a system that would track the
procurement process of XYZ Corporation. The Procurement Manager of XYZ Corp had
identified several applications encompassing the proposed procurement system to TRA
Global Software Company. At what stage of the software development cycle is this
activity?
Select one:
a. Requirements Determinations
b. Requirements Specifications
c. System Implementation
d. Feasibility Analysis
e. Systems Design
Choose the letter that corresponds to the correct answer. Which of the following is NOT
a major responsibility of a systems analyst?
Select one:
a. Know the operation and management structure of the organization
b. Write programs to meet specifications
c. Propose information technology solution through an information system that solves the
requirements of an organization
d. Analyze current systems/applications used by the organization
The goal of this stage is to assess if it is possible to meet the requirements specified,
subjected to constraints of budget, human resource and hardware.
Select one:
a. Systems Design
b. Requirements Determinations
c. Requirements Specifications
d. System Implementation
e. Feasibility Analysis
Assignment 3
Ana is the Procurement Manager of XYZ Corporation. TRA Global Software Corporation
had started the data gathering for XYZ Corporation. Ana has informed TRA that they
have an existing running application system. What is the next step the TRA should do?
Select one:
a. Interconnect the existing and new application system.
b. Analyze the existing application system.
c. Design an updated information system using new programming technology.
d. Recommend to XYZ Corporation to set a cutof on using the existing application system.
The statement “up to date product information on the web” is an example of a tangible
benefits.
FALSE
In the feasibility analysis stage of the SDLC, which of the following activity comes next
after setting the goals?
Select one:
a. Start the development stage
b. Create a proto type of the system and present to the company
c. Convert the goal to data flow diagram
d. Find alternative methods of meeting the goals
The Operational feasibility examines whether the proposed method can fit in with
existing organizational processes.
For each alternative solution for the project, it is necessary to evaluate the tangible
benefits only before picking a solution. Intangible benefits do not have cost to be
analyzed.
FALSE
Assignment 5
If the process p is expanded, the process at the next level will be labeled as
Select one:
a. p.1, p.2, p.3
b. p.a, p.b, p.c
c. None of the choices
d. 1.0, 2.0, 3.0
TRUE OR FALSE: As a guideline in DFD, nouns are used to name an external entity.
TRUE OR FALSE: In designing a DFD, start from the broad overview of the system.
A rectangle represents
Select one:
a. An input or output of the system
b. Start of the DFD
c. A data storage
d. An external entity
TRUE or FALSE. Use Structured English when there are large number of conditions to
check and logic is complex.
The ______________ data entry is suitable if the number of records is very large.
Select one:
a. Real-time
b. On-line
c. Mobile
d. Of-line
Assignment 8
Relationship are normalized to ensure that
Select one:
a. All of the choices
b. Simplifies retrieval of required data
c. Collection of relations do not unnecessarily hold duplicate data
d. When a data item is modified it is modified in all relations where it appears -no
inconsistency is there
e. When data is deleted accidentally, required data is not deleted
f. None of the choices
This is a set of procedures that manage a database and provide application program
access the database in a form requested by the application programs.
Select one:
a. DMBS
b. Flowcharting
c. Information System
d. ER Process Diagram
In Entity Relationship, the Student number, Course, Date Enrolled, Gender are examples
of
Select one:
a. Attributes
b. Cardinality
c. Entity
d. Relationship
e. Tuples
In Entity Relationship, the Student number, Course, Date Enrolled, Gender are examples
of
Select one:
a. Attributes
b. Cardinality
c. Entity
d. Relationship
e. Tuples
This ________________ is a procedure used to transform a set of relations into another set
which has some desirable properties.
Select one:
a. Migration
b. Normalization
c. Export Transport Load
d. Indexing
Given employee (employee number, salary, department code, supervisor code). What it
the unique relation key.
Select one:
a. Department code
b. Employee number
c. Supervisor code
d. All of the choices
Assignment 9
Hiding implementation details of methods from outside world.
Select one:
a. Abstraction
b. Polymorphism
c. Encapsulation
d. Inheritance
Assignment 11
When sending data from the source to destination, the message is ____________.
Select one:
a. broken up into packet
b. converted to ip address during sending
c. none of the choices
d. compressed using .zip
This is used for formatting and creating links from one webpage to another.
Select one:
a. Markups
b. None of the choices
c. All of the choices
d. Tags
e. Special annotations
Email can only be shared in a Local Area Network and NOT in an extranet.
Select one:
a. TRUE
b. MAYBE
c. Not enough information
d. FALSE
Assignment 12
This is concerned with protecting data regarding individuals from being accessed and
used without the permission/knowledge of concerned individuals.
Select one:
a. Data Integrity
b. Data Security
c. Data Piracy
d. Data Privacy
A type of testing wherein incorrect inputs, incorrect processing and incorrect outputs will
be detected during operation.
Select one:
a. Parallel Test
b. System Testing
c. Full Testing
d. Pilot Testing
This is concerned with protecting data from erasure, theft, unauthorized access and
unauthorized modifications.
Select one:
a. Data Security
b. Data Piracy
c. Data Privacy
d. Data Integrity
This is concerned with the quality and reliability of raw as well as processed data.
Select one:
a. Data Integrity
b. Data Piracy
c. Data Security
d. Data Privacy
Assignment 13
This is a computer-to-computer exchange of business documents in a standard
electronic format between business partners.
Select one:
a. XML
b. Email
c. EDI
d. HTML
An advantage of symmetric key is easy and fast transformation of plain text to cipher
text.
Select one:
True
False