You are on page 1of 5

S a m p l e of exa m

Exercise 1: DATABASES
Answer the questions with True or False

1. Data entry forms are created by using the data manipulation subsystem. 2. The key field uniquely identifies each record. 3. . Data redundancy results due to lack of data integrity 4. The logical view of data focuses on meanings and content of the data. 5. Data redundancy results due to lack of data integrity.

6. A DBMS allows you to create, but not modify, databases. 7. Database tables can be related or connected to other tables by common key fields. 8. Relational database tables require a common data item or key field. 9. The ATM works on the principle of real-time processing. 10. In order to create, modify, and gain access to a database, special software called the database management system is required.

Exercise 2: PRIVACY, SECURITY AND ETHICS


Fill the table with correct terms from the list bellow

Trojan Horses ; Scam ; Virus ; Denial of service; Zombies; Crackers; Worms ;Plagiarism.

Terms

Description
Is a fraudulent or deceptive act or operation designed to trick individuals into providing personnel information or spending their time or money Are special virus that does not attach itself to programs and databases. Are programs that come into a computer system disguised as something else. Is a attack attempts to slow down or stop computer system or network by flooding with requests for information and data. Is the illegal and unethical representation of some other persons work and idea as your own without giving credit to the original source. Are criminal people who share programs to gain unauthorized access to computer systems or disrupt network. Is a program that migrates through networks and operating system and most attach itself to different programs and databases. Are computers infected by a virus, worms or Trojan Horse that allows them to be remotely controlled for malicious purposes.

Exercise 3: INFORMATION SYSTEMS


Fill the table bellow

Management levels

role

Type of planning

Information flow Topmanagerial level

Direction of the flow

Computer based information system

Top Management

Middle Management

Manages deal with control planning and decision making

Middlemanagerial level

Supervisors

Manage and monitor the employees and workers

Supervisorylevel

Exercise 4: SYSTEM ANALYSIS AND DESIGN


a. Put the names of the different phases of the system live cycle in the following figure

b. Fill the following table Description or tasks of this phase Phase 1 Phase 2 Phase 3 Phase 4 Phase 5 Phase 6

You might also like