You are on page 1of 27

_____ activities check the correctness of the product; _____ activities check that the software meets all

behavioral specifications. Verification, validation


_____ is the process of breaking the product into _____, which are self-contained pieces of code that interact with other _____. Modular decomposition,
modules, modules
A back-end CASE tool lowerCASE tool! is one that assists with which phases of software development" Implementation, integration, and maintenance
A complete and detailed description of the functionalit# available in a software product is found in the User reference manual
A configuration-control tool is used to specify which versions and which variations of each component are required for a complete product
A front-end CASE tool upperCASE tool! is one that assists with which phases of software development" Requirements, specification, and design
A good architectural design of a software s#stem promotes which of the following" I and III only
A module that either returns the information re$uested or returns appropriate hard-coded values for given input is called a stub
A program that helps the user construct data-flow diagrams is an e%ample of which of the following" I and II only
A single CASE tool assists in how man# aspects of software production" Just one
A software fault that occurs rarel#, has low user productivit# impact, and is e%pensive to fi% should be given low priority but eventually be fixed
A software-versioning tool helps an organi&ation manage which of the following"I and II only
A thorough documentation process emphasi&es that I and II only
A wa# of minimi&ing the impact of a software fault that is too e%pensive or time consuming to fi% is to use a woraround
Acceptance testing can be performed b# which of the following" I, II, and III
Adaptive maintenance occurs in response to which of the following" !hanges in the client"s computing facilities and environment
Advantages of structural testing include which of the following" II only
After a product has undergone changes during maintenance, the process of testing that the changes have not negativel# impacted other functionalit# is called
regression testing
An online interface checker is an e%ample of a coding tool
An open modular architecture for software is a re$uirement of the incremental model
Application frameworks and code frameworks are wa#s of reusing design
Assembl# languages are also called _____ and the#_____. second#generation languages, reflect the architecture of the processor
'aselines and access control s#stems are used for what purpose" $o eep programmers from changing the same module%s& simultaneously
'lack-bo% testing techni$ues are so named because testing is performed without examining any code
'lack-bo% testing techni$ues include which of the following' I and III only
'ranch coverage testing consists of ensuring that each branch in the code has been executed at least once
'# assigning less skilled programmers to maintenance, management is perpetuating the bad reputation of maintenance programming
CASE tools can help in which of the following aspects of software production" I, II, and III
CASE tools can help the documentation process for a software product in which of the following wa#s" I, II, and III
CASE tools that are particularl# useful in the maintenance phase include which of the following" II and III only
Coding tools include which of the following" I, II, and III
Consider implementing an algorithm for division and testing code with the values (, ), *, -), and -(. +hich of the following techni$ues is are! being applied" II
and III only
Constants should be used for values that will never change
Criteria used for prioriti&ing software faults include which of the following' I, II, and III
,eliberate reuse is better than an# other kind of reuse because components are likel# to be which of the following" I, II, and III
,ocumentation in a module should be placed in which of the following places" I and III only
,ocumentation of testing should be produced in which of the following phases of software development" I, II, and III
,rawbacks of fourth-generation languages -./s! include which of the following" II only
,uring a design review, which of the following issues concerning the detailed design is are! considered" I, II, and III
,uring code inspection of several modules for a software pro0ect, an inspection of other modules is warranted when a significant number of faults of a
particular type are found while inspecting more than one of the modules
,uring product testing, which of the following techni$ues should be used to verif# that the product satisfies its output specifications" II only
1or a software development pro0ect, a good wa# of making sure that the client2s needs are met is to use the rapid prototyping model
1or a software development pro0ect, what does it mean for specifications to be traceable" (very statement in the specifications document is lined to a
statement in the requirements document)
1or a software development pro0ect, where should documentation for module interfaces and the dataflow among modules appear"*ith general documentation
for the system
1or a software development pro0ect, who participates in design phase testing" $he developer"s +,- group and the design team
1or software development, which of the following indicates the order in which three kinds of integration testing should be carried out" Integration testing,
product testing, acceptance testing
1re$uent integration testing is a feature of the synchroni.e#and#stabili.e model
.lass-bo% testing includes which of the following" I, II, and III
3ow should nonrepeatable faults that occur sporadicall# be handled' $hey should be reported even without test data)
4f a decision b# a programmer results in a violation of coding standards, the programmer should chec with the manager to determine whether the code can
stand as is
4f a programmer violates coding standards, the manager should respond in a way that balances the benefit of the standards with the burden they put on the
programmer
4f the software product is replacing an e%isting product, the new product should be run in parallel with the existing product until the client is satisfied that the
new product is satisfactory
4mpediments to functional testing of even a moderate si&e program include which of the following" II and III only
4mpediments to structural testing in even a moderate si&e program include which of the following' I and II
4mprovements in which of the following occurs! when modularit# of code is used instead of a single e$uivalent block of code" I, II, and III
4n a software development conte%t, tool integration means that all tools communicate via the same data format
4n a software development pro0ect, acceptance testing is performed b# the client on the client"s hardware with actual data
4n a software development pro0ect, it is important to keep track of the rationale underl#ing design decisions for which of the following reasons" I and III only
4n a software testing activit#, a driver refers to which of the following" - module that has yet to be coded but passes the appropriate values to the module
being tested)
4n choosing a language for the final product, which of the following factors should be considered" 4.+hether the language supports coincidental
cohesion44.+hether the language supports informational cohesion444.+hether the language is ob0ect-oriented II and III only
4n choosing a language for the final product, which of the following factors should be considered" 4.5he client2s e%perience with, and tools for, the language44.5he
language2s suitabilit# for the application444.5he costs, benefits, and risks of using the language I, II, and III
4n contract software, the issues that might limit reuse of code include which of the following" I and II
4n data-oriented design, the architecture of the s#stem is based on which of the following" II only
4n general, a maintenance release for a software product should include only one type of maintenance per release
4n general, reliabilit# testing of a software product checks which of the following" I and II only
4n most situations, the languages! used for rapid protot#ping and final product development should be different languages
4n none%ecution-based testing of software, an important product of the inspections process is the number of faults found, raned by severity
4n none%ecution-based testing of software, code inspection is a formal process that consists of five steps/ overview, preparation, inspection, rewor, follow#up
4n none%ecution-based testing of software, the inspections team consists of three to six people, including representatives from the current and future phases
4n none%ecution-based testing of software, the inspections team includes which of the following roles" I and III only
4n ob0ect-oriented s#stems small self#contained ob0ects facilitate reuse, but other problems complicate it
4n responsibilit#-driven programming the called module checs input to ensure that it has not been called with inappropriate input
4n software development, product testing includes performance testing, _____, _____, and documentation testing robustness testing, installation testing
4n software development, what is integration testing" $esting whether the software modules interface correctly together
4n software development, which of the following testing approaches are used in integration testing" I, II, and III
4n statement coverage, which of the following is true" (ach statement in the code has been executed at least once)
4n the Cleanroom techni$ue, e%ecution-based testing is used only after nonexecution#based testing
4n the conte%t of software development, a correctness proof is a mathematical proof that some code satisfies its specifications
4n which of the following places should the interface to a module be documented" III only
4nheritance in ob0ect-oriented s#stems makes maintenance harder because definitions may be spread out all over the code
4nstallation testing is performed during which of the following kinds of testing' II only
4nstallation testing of a software product checks to verif# that it wors with the client"s other software
4nstaller6administrator documentation for a software product includes instructions about which of the following" I and III only
4nstructions for both the installation of the product and procedures for initiali&ation are included in which of the following" Installer1administrator
documentation
4ssues that arise with testing ob0ect-oriented code include which of the following" I and III only
4t is possible to reuse components from _____ phases of the software process, but _____ reuse is most common. all, module
4t ma# be worth redesigning and recoding a module from scratch under which of the following conditions" Many more faults are found in that module than in
any other module)
7aintenance activities that remove residual faults in the software product are called corrective maintenance
7aintenance is normall# re$uired in almost all software products
7anagement integration refers to a CASE environment that supports which of the following" I only
7easures of reliabilit# of a software product include which of the following" I and III only
8ested if statements can be simplified b# using 2oolean combinations
8one%ecution-based testing techni$ues can be applied to which of the following' I, II, and III
9b0ect-oriented design techni$ues include which of the following kinds! of diagrams' I and III only
9f the following coding st#le practices, which best facilitates future maintenance" Maing variable names meaningful to persons other than the code"s author
9f the following software life-c#cle models, which has the most danger of not meeting the client2s re$uirements" $he waterfall model
9ne life-c#cle model that incorporates features of all other models is the model
9ther names for black-bo% testing techni$ues include which of the following' I, II, and III
9ther names for glass-bo% testing techni$ues include which of the following" I, II, and III
:roblem reporting s#stems can help manage the workflow of software maintenance b# which of the following" I and II only
:roduct testing for contract software includes which of the following" I and II only
:roduct testing for contract software should include which of the following' I, II, and III
:rogramming-in-the-large refers to which of the following" +oftware development at the module level, including architectural design
:rogramming-in-the-man# refers to which of the following" +oftware production by a team, either at the module level or at the code level
:rogramming-in-the-small refers to which of the following" !oding at the level of the code of a single module
;egression testing for a software development pro0ect is testing to determine whether a component that was unchanged during changes to other components
still performs correctly
;eliabilit# anal#sis is based on which of the following ideas" II only
;eliabilit# anal#sis is used for which of the following purposes" It is used to help determine how long to test in order to guarantee that the product"s fault
rate satisfies specification)
;esponsibilit#-driven programming is better than defensive programming for which of the following reasons" II only
;estructuring is the process of improving the product without changing its functionality
;eusing an application framework usuall# means reusing control logic instead of specific code routines
Software maintenance is difficult for which of the following reasons" It incorporates aspects of all other phases of development)
Structural testing is _____ and structured testing is _____. glass#box testing, blac#box testing
5esting each procedure or function in a module is called functional testing
5he architectural design document for a software development pro0ect contains a description of the modules in the system, their interface, and the data and
control flow among them
5he architectural design of a software s#stem is used during which of the following phases of software construction' II and III only
5he basic idea behind the use of comple%it# metrics is that the more complex a module is, the more liely it is to contain faults
5he best time to develop a correctness proof is while the code is being written
5he code walkthrough team should include representatives of which of the following' I, II, and III
5he decisions that management will have to make regarding testing include which of the following' I, II, and III
5he disadvantages of none%ecution-based techni$ues include which of the following" II and III only
5he documentation that must be prepared before delivering a software product to a client includes which of the following" I and II only
5he fragile-class problem comes about because of which of the following" III only
5he ideal order for module testing and integration testing is given b# which of the following" $hey should be done together)
5he languages 1ortran, :ascal, C9'9/, and C<< are e%amples of which generation of programming languages" third
5he life-c#cle model that supports both iteration within phases and parallelism between phases is the 3#3 model
5he main criterion for choosing a language for rapid protot#ping should be how quicly development can be accomplished with that language
5he manager of the S=A group should run integration testing because I, II, and III
5he metrics that are useful during the maintenance phase of software development include which of the following" I and II
5he modules of a s#stem with an optimal modular design have high cohesion and low coupling
5he primar# difference between code inspections and code walkthroughs is that inspections are more formal and have more steps
5he primar# purpose of careful code la#out is to improve readability
5he primar# $ualities tested during acceptance testing are robustness and which of the following' !orrectness, performance, and documentation
5he primar# use of comple%it# metrics is to determine which modules need attention
5he reasons for documenting software development as earl# and completel# as possible include which of the following" I, II, and III
5he results of appl#ing the Cleanroom techni$ue have been encouraging/ the resulting code has had very few faults per 453! or has been fault free
5he robustness of a product is tested b# presenting it with illegal output
5he strategies of top-down, bottom-up, and sandwich integration are suited to both ob0ect#oriented and non#ob0ect#oriented systems
5he testing fault rate used in the Cleanroom techni$ue computes the number of faults detected per thousand lines of code during the execution#based testing that
follows nonexecution#based testing
5he time limit on an effective walkthrough or code-review session is two hours
5he ultimate responsibilit# for verif#ing the correctness of modules rests with the developer"s +,- group
5he validation measure concerned with the e%tent to which the product meets the customer2s needs is called utility testing
5here is no documentation activit# in which of the following phases of the software life c#cle" III only
5o make the process of developing and maintaining documentation for a software product as efficient as possible, the developer2s organi&ation should use which of
the following" I and III only
5wo properties of ob0ect-oriented software that make it easier to maintain are encapsulation and information hiding
5#picall#, the bulk of the time spent in software maintenance is for which of the following kinds"II only
>nder which of the following conditions are two modules said to be data-coupled" I and II only
>se of which of the following can be considered forms of code reuse" II and III only
>seful metrics for tracking fault reports include which of the following" I, II, and III
>ser interface integration usuall# refers to an environment that provides tools having the same visual appearance and functional interface
>ser training materials should cover which of the following" -ll ma0or functionalities of the system with a gradual introduction of detail
>tilit# of a software product includes which of the following" I, II, and III
+hat are the contents of the detailed design document for a software development pro0ect" - description of the data structures and algorithms for each
module
+hat is the most important reason for producing documentation for program code for a software product" $he people who maintain the code need
documentation to understand it.
+hat possible t#pes of testing might be needed as a result of changes made in the maintenance phase of the software life c#cle" I, II, and III
+hen and where is contract software validation performed" It is performed during product testing at the developer"s site)
+hen code is confusing, it should be rewritten
+hen the onl# documentation available for a software code is the code itself, the process of reconstructing the design and specifications is called reverse
engineering
+hich of the following activities are t#picall# used to elicit re$uirements for a software pro0ect from a client" I, II, and III
+hich of the following activities ma# be performed during maintenance' I, II, and III
+hich of the following are advantages of bottom-up integration" II and III only
+hich of the following are advantages of sandwich integration" I, II, and III
+hich of the following are advantages of top-down integration testing of software' I and III only
+hich of the following are coding tools" II and III only
+hich of the following are disadvantages of bottom-up integration" II only
+hich of the following are disadvantages of top-down integration testing of software" I only
+hich of the following are goals of the re$uirements phase of the software development c#cle"I and III only
+hich of the following are measures of code comple%it#" I, II, and III
+hich of the following are part of the s#stem design phase of software development" I, II, and III
+hich of the following are possible documents that could be included in the maintainer2s documentation" II and III only
+hich of the following are produced during the implementation phase of software development" I, II, and III
+hich of the following are reasons wh# pol#morphism and d#namic binding make ob0ect-oriented software more difficult to understand' I only
+hich of the following are true of one-of-a-kind software product development" I only
+hich of the following are t#pes of maintenance" I and III only
+hich of the following are updated after enhancements have been added to a software product" I, II, and III
+hich of the following are valid approaches when creating training materials for the first-time or novice end users of a software product" II and III only
+hich of the following artifacts serve as documentation for the anal#sis and specification phase" II and III only
+hich of the following belong in the specification document for a software pro0ect"I and II only
+hich of the following changes are t#picall# carried out during the maintenance phase of the software life c#cle" I, II, and III
+hich of the following characteri&es the binar# machine code instructions processed b# computers" - first#generation language
+hich of the following defines traceabilit# of the design document" (ach design choice, except choices of low#level detail, must be lined to statements in the
specifications document, and each statement in the specification document must be reflected in some aspect of the design
+hich of the following factors contribute to limiting software reuse" II and III only
+hich of the following indicates the order in which four of the phases in the software life c#cle should be carried out" Requirements, specifications, design, and
implementation
+hich of the following is are! among the possible contents of the user $uick reference for a software product' I, II, and III
+hich of the following is are! considered a validation activit#" I only
+hich of the following is are! considered a verification activit#" I and II only
+hich of the following is are! part of inline documentation" I and III only
+hich of the following is are! true about a build tool for software development" I and III only
+hich of the following is are! true about a product when it is undergoing updates during maintenance" I and II only
+hich of the following is are! true about documentation standards" I and II only
+hich of the following is are! true about documentation standards for software products" I and II only
+hich of the following is are! true about perfective maintenance of a software product" I only
+hich of the following is are! true about specific classes in the ?ava class hierarch# that derive their code from classes higher up in the hierarch#" I, II, and III
+hich of the following is are! true about the techni$ue known as all-definition-use path coverage' I only
+hich of the following is are! true in a module with high cohesion" I and II only
+hich of the following is are! true in a module with informational cohesion" I, II, and III
+hich of the following is are! true in a module with low cohesion" II and III only
+hich of the following is are! true of maintaining uniformit# in documentation for a software product" II and III only
+hich of the following is are! true of maintenance of a software product" I, II, and III
+hich of the following is are! true of modules that perform the characteristic functions of a software product' I and II only
+hich of the following is an important trade-off that must be kept in mind during the design phase of software development" 6enerality vs) complexity
+hich of the following is not a part of the software pro0ect management plan" Rapid prototyping
+hich of the following is the term for reuse of code made possible because someone reali&ed that the code of a previousl# developed component could be reused"
-cidental reuse
+hich of the following is true about coding st#le guidelines" $hey are language specific)
+hich of the following is true about defensive programming' $he calling module checs input to the called module to ensure that the input is appropriate)
+hich of the following is true about maintenance for ob0ect-oriented software" It has its own challenges, even though it is easier in some ways than
maintenance for non#ob0ect#oriented software)
+hich of the following is true about ob0ect-oriented design' (qual emphasis is given to the structure of the data and the actions operating on the data
+hich of the following is true about self-documenting code" It exists but is extremely rare)
+hich of the following is true in top-down integration testing of software" 5ogic modules are coded and tested first with lower modules as stubs)
+hich of the following is true of a logic module" I and III only
+hich of the following is true of a specification document for a software pro0ect" It is a contract between the client and the developer)
+hich of the following is true of alpha and beta testing of a shrink-wrapped software product" 2oth occur at potential future customers" sites
+hich of the following is true of maintenance in software development" It is an integral part of the software process
+hich of the following is true of none%ecution-based techni$ues" $hey can find most faults in the design and implementation phases)
+hich of the following is true of the re$uirements document for a software pro0ect" It is a basis for the specification document)
+hich of the following is true when a sandwich integration strateg# is applied to integration testing" I and II only
+hich of the following is true when an inspection finds that @ percent or more of a module must be reworked" $he inspection team must reinspect the module
fully after it has been rewored)
+hich of the following is true when bottom-up integration is used" 3perations modules are coded and tested first with higher modules as drivers)
+hich of the following kinds of changes to a software product characteri&es maintenance of the product" !hanges made after it has passed the acceptance test
+hich of the following kinds of documentation should be produced as part of the implementation phase of software development" II and III only
+hich of the following kinds of integration is associated with an environment that supports a specific software process" 7rocess integration
+hich of the following participate in a formal review of the specifications document for a software pro0ect" I, II, and III
+hich of the following problems afflict hard-and-fast coding standards' II and III
+hich of the following ranks three structural testing techni$ues from weakest to strongest" +tatement coverage, branch coverage, path coverage
+hich of the following should be avoided in a specification document for a software pro0ect" I and III only
+hich of the following should be present in a module prologue" I, II, and III
+hich of the following statements are true of problem identification" I only
+hich of the following statements is are! applicable to a situation where the client keeps wanting changes made after the product is delivered' I, II, and III
+hich of the following statements is are! true of correctness proofs" II only
+hich of the following statements is are! true of testing techni$ues" I and II only
+hich of the following statements is are! true of third generation languages"I and II only
+hich of the following steps is are! t#picall# performed in a code walkthrough" I and II only
+hich of the following techni$ues create fault statistics' I, II, and II
+hich of the following t#picall# occurs! during a code walkthrough" II and III only
+hich of the following t#picall# takes the responsibilit# of emphasi&ing the priorit# of allocating proper resources to the documentation of a software product"
$he developer
+ho is most likel# to make changes to the software product during maintenance" $he developer
+ho should be involved in re$uirements testing for a software pro0ect" $he developer"s +,- group, the client, and the user
). +hich of the following data t#pes correspondent to the valuesA BnamesCarra#D?onE, D7elindaE, DAle%E!; o 8umeric arra#
(. +hich of the following functions will report to date, which was three da#s ago" o 5ime!-F; 7a# be!
F. +hich of the following arra#s include data of B_.E5 and B_:9S5"o B_;E=>ES5
-. +hich of the following functions will displa# file on a browser"o 1open
@. 5o e%ecute concatenation operation it is necessar# to use ne%t s#mbolA.
G. +hich of the following options is post-increment operator"%<<
H. +hich of the following options is pre-increment operator" << %
I. +hich of the following options is pre-decrement operator"- - %
J. +hich of the following options is post-decrement operator"% - -
)*. +hich of the following operations define remainder after dividing"7odulus
)). +hich of the following e%amples define not identical operator" % KCC #
)(. +hich of the operators corresponds to the following descriptionA L5rue if either % and # is true L " % MM #
)F. +hich of the operators corresponds to the following descriptionA L5rue if either % and # is true, but not both L " % %or #
)-. +hich of the operators corresponds to the following descriptionA L5rue if both % and # are trueN " % OO #
)@. +hich of the arra# operators corresponds to the following descriptionA L5rue if % and # have the same ke#6value pairs in the same order and of the same
t#pesN "% CCC #
)G. +hich of the arra# operators corresponds to the following descriptionA L5rue if % and # have the same ke#6value pairs N " % CC #
)H. +hich of the statements corresponds to the following descriptionA L>se this statement to e%ecute some code if a condition is true and another code if the
condition is falseN " if...else statement
)I. Specif# which of the following descriptions corresponds to the valueA BfamiliesP2.riffin2QP(Q " 7ultidimensional arra#sE element
)J. +hich of the looping statements corresponds to the following descriptionA L/oops through a block of code once, and then repeats the loop as long as a
specified condition is trueN"do...while
(*. Specif# which of the following modes is met descriptionA RAppend. 9pens and writes to the end of the file or creates a new file if it doesn2t e%istR" a
(). Specif# which of the following modes is met descriptionA R ;ead6+rite. Creates a new file. ;eturns 1A/SE and an error if file alread# e%ists R" S<
((. +e have two classesA house and room. Bhome C new 3ouse. Specif# which of the following ob0ects is enclosed ob0ect" BkichCnew ;oom!;
(F. +e have ob0ect BctCnew mammalRcatR!.Specif# which of the following codes use propert#" Bct-Tname;
(-. /et the Blink defines a connection to a database, B$uer# is a s$l-$uer# and BresultCm#s$li_$uer#Blink,B$uer#!. Specif# which of the following functions
calculate the $uentit# of records in the result of the s$l-$uer#" m#s$li_num_rowsBresult!;
(@. /et the variable Blink C m#s$li_connectRlocalhostR, >SE;8A7E, :ASS+9;,, ,'8A7E! defines a connection to a database. ,etermine which of the
following definitions corresponds to the string value RlocalhostR"url
(G. +hich of the following definitions right" S7/ was designed to transport and store data
(H. +hich of the following definitions are comments in %ml " UK-- 5his is a comment --T
(I. +hat is an S7/ Element" An S7/ element is ever#thing from including! the element2s start tag to including! the element2s end tag
(J. +hich of these definitions is not true" S7/ attribute values must not be $uoted
F*. +hich of the following definitions right" +ith SS/5 #ou can transport an S7/ document
F). +hich of the following tags define the namespace" Uhtml %slAversionCR).*R %mlnsA%slCRhttpA66www.wF.org6)JJJ6SS/65ransformRT
F(. +hat does S7/ stand for" eStensible 7arkup /anguage
FF. +hat is the correct s#nta% of the declaration which defines the S7/ version" U"%ml versionCR).*R"T
F-. +hich is not a correct name for an S7/ element" U)dollarT
F@. +hich is not a correct name for an S7/ element" Ufirst nameT
FG. +hich is not a correct name for an S7/ element" All F names are incorrect
FH. +hat does SS/ stand for" eStensible St#lesheet /anguage
FI. +hat is a correct wa# of referring to a st#lesheet called Rm#st#le.%slR " U"%ml-st#lesheet t#peCRte%t6%slR hrefCRm#st#le.%slR "T
FI. 1or what part of %ml tree is this templateA U%slA template matchCRVstarsRT UiTU%slAvalue-of selectCR.R6TUiT U6%slA templateT " o Attribute
FJ. +hat is the correct wa# to include the file Rtime.incR " U"php re$uireRtime.incR!; "T
-*. +hat does 357/ stands for" 3#per 5e%t 7arkup /anguage
-). +hat organi&ation is responsible for making web standards" +orld +ide +eb Consortium
-(. Choose the correct 357/ tag for the largest headingUh)T
-F. +hat is the correct 357/ tag for inserting the line break" Ubr 6T
--. +hat is a correct wa# for adding a background color in 357/" Ubod# st#le C Lbackgroundcolor-colorA#ellowNT
-@. 3ow #ou could make #our te%t in 357/ bold"UbTU6bT
-G. 3ow #ou could make #our te%t italic" UiTU6iT
-H. +hat is the correct wa# for adding link in 357/" Ua hrefCwww.google.k&T.oogleU6aT
-I. 3ow #ou can create an email link" Ua hrefCNmailtoA%%%V###NT
-J. 3ow #ou can open a link in a new browser tab" Ua hrefCNurlN targetCN_blankNT
@*. +hich of these tags are referred to the table tags" UtableTUtrTUtdT
@). Chose the correct 357/ to align the content inside the tableA Utd alignCleftT
@(. 3ow can #ou make a list that lists the items with numbers" UolT
@F. 3ow can #ou make a list that lists the items with bullets" UulT
@-. +hat is the correct 357/ for making a checkbo%" Uinput t#peCRcheckbo%R 6T
@@. +hat is the correct 357/ for making a te%t input field" Uinput t#peCRte%tR 6T
@G. +hat is the correct 357/ for making a drop-down list" UselectT
@H. +hat is the correct 357/ for making a te%t area" Ute%tareaT
@I. +hat is the correct 357/ for inserting an image" Uimg srcCRimage.gifR altCR7#4mageR 6T
@J. +hat is the correct 357/ for inserting a background image" Ubod# backgroundCRbackground.gifRT
G*. 3ow to make an image as a h#perling" Ua hrefC>;/TUimg srcCimage.gif6TU6aT
G). 3ow to align an image" Uimg srcCNimage.gifN alignCLleftNT Uimg srcCNimg.gifN alignCLleftNT
G(. 3ow to map #our image with clickable regions" Uimg srcCNimage.gifN usemapCNWplanetmapN6T Umap nameCNplanetmapNTU6mapT
GF. +hat is the correct wa# for adding link in 357/" Ua hrefCwww.google.k&T.oogleU6aT
G-. +hat is the difference between C/ASS and 4, in CSS" Class specifies parameters for multiple elements, while 4, for a single
G@. 3ow #ou could determine the color for the bod# background tag in CSS" bod# Xbackground-colorAcolorY
GG. +ho is making the +eb standards" 5he +orld +ide +eb Consortium
GH. Choose the correct 357/ tag for the largest heading Uh)T
GI. +hat is the correct 357/ for creating a h#perlink" Ua hrefCRhttpA66www.wFschools.comRT+FSchoolsU6aT
GJ. +hich of these tags are all UtableT tags" UtableTUtrTUtdT
H*. Choose the correct 357/ to left-align the content inside a table cell MM Utd alignCRleftRT
H). +hat does CSS stand for" Cascading St#le Sheets
H(. +hat is the correct 357/ for referring to an e%ternal st#le sheet" Ulink relCRst#lesheetR t#peCRte%t6cssR hrefCRm#st#le.cssRT
HF. +here in an 357/ document is the correct place to refer to an e%ternal st#le sheet" 4n the UheadT section
H-. +hich 357/ tag is used to define an internal st#le sheet" Ust#leT
H@. +hich 357/ attribute is used to define inline st#les" st#le
HG. +hich is the correct CSS s#nta%" o bod# XcolorA blackY
HH. 3ow do #ou insert a comment in a CSS file" 6Z this is a comment Z6
HI. +hich propert# is used to change the background color" background-colorA
HJ. 3ow do #ou add a background color for all Uh)T elements" h) Xbackground-colorAW111111Y
I*. 3ow do #ou change the te%t color of an element" colorA
I). +hich CSS propert# controls the te%t si&e" font-si&e
I(. +hat is the correct CSS s#nta% for making all the UpT elements bold" p Xfont-weightAboldY
IF. 3ow do #ou displa# h#perlinks without an underline" a Xte%t-decorationAnoneY
I-. 3ow do #ou make each word in a te%t start with a capital letter" te%t-transformAcapitali&e
I@. 3ow do #ou convert all letters in a te%t to uppercase"te%t-transformAuppercase
IG. 3ow do #ou change the font of an element" font-famil#A
IH. 3ow do #ou make the te%t bold" font-weightAbold
II. 3ow do #ou displa# a border like thisA the top border C )* pi%els, the bottom border C @ pi%els, the left border C (* pi%els, the right border C )pi%el" 'order-
widthA)*p% )p% @p% (*p%
IJ. 3ow do #ou change the left margin of an element" margin-leftA
J*. +hat does :3: stand for"o :3:A 3#perte%t :reprocessor
J). :3: server scripts are surrounded b# delimiters, which" U"php["T
J(. 3ow do #ou write R3ello +orldR in :3:" echo R3ello +orldR;
JF. All variables in :3: start with which s#mbol" B
J-. +hat is the correct wa# to end a :3: statement" ;
J@. 5he :3: s#nta% is most similar toA :erl and C
JG. 3ow do #ou get information from a form that is submitted using the RgetR method" B_.E5PQ;
JH. +hen using the :9S5 method, variables are displa#ed in the >;/A 1alse
JI. 4n :3: #ou can use both single $uotes 2 2 ! and double $uotes R R ! for stringsA 5rue
JJ. 4nclude files must have the file e%tension R.incR 5rue
)**. +hat is the correct wa# to include the file Rtime.incR " U"php re$uireRtime.incR!; "T
)*). +hat is the correct wa# to create a function in :3:" function m#1unction!
)*(. +hat is the correct wa# to open the file Rtime.t%tR as readable" fopenRtime.t%tR,RrR!;
)*F. +hat is the correct wa# to connect to a 7#S=/ database" m#s$l_connectRlocalhostR!;
)*-. +hat is the correct wa# to add ) to the Bcount variable" Bcount<<;
)*@. +hat is a correct wa# to add a comment in :3:" UK--[--T
)*G. 4n :3:, the die! and e%it! functions do the e%act same thing. 5rue
)*H. +hich one of these variables has an illegal name" Bm#-\ar
)*I. +hat does S=/ stand for" Structured =uer# /anguage
)*J. +hich S=/ statement is used to e%tract data from a database" SE/EC5
))*. +hich S=/ statement is used to update data in a database" >:,A5E
))). +hich S=/ statement is used to delete data from a database" ,E/E5E
))(. +hich S=/ statement is used to insert new data in a database" 48SE;5 4859
))F. +ith S=/, how do #ou select a column named R1irst8ameR from a table named R:ersonsR" SE/EC5 :ersons.1irst8ame
))-. +ith S=/, how do #ou select all the columns from a table named R:ersonsR" SE/EC5 Z 1;97 :ersons
))@. +ith S=/, how do #ou select all the records from a table named R:ersonsR where the value of the column R1irst8ameR is R:eterR" SE/EC5 Z 1;97
:ersons +3E;E 1irst8ameC2:eter2
))G. +ith S=/, how do #ou select all the records from a table named R:ersonsR where the value of the column R1irst8ameR starts with an RaR" SE/EC5 Z
1;97 :ersons +3E;E 1irst8ame /4]E 2a^2
))H. +ith S=/, how do #ou select all the records from a table named R:ersonsR where the R1irst8ameR is R:eterR and the R/ast8ameR is R?acksonR"
SE/EC5 Z 1;97 :ersons +3E;E 1irst8ameC2:eter2 A8, /ast8ameC2?ackson2
))I. +hich S=/ ke#word is used to sort the result-set" 9;,E; '_
))J. +ith S=/, how can #ou return all the records from a table named R:ersonsR sorted descending b# R1irst8ameR" SE/EC5 Z 1;97 :ersons 9;,E; '_
1irst8ame ,ESC
)(*. +ith S=/, how can #ou insert a new record into the R:ersonsR table" 48SE;5 4859 :ersons \A/>ES 2?imm#2, 2?ackson2!
)(). +ith S=/, how can #ou insert R9lsenR as the R/ast8ameR in the R:ersonsR table" 48SE;5 4859 :ersons /ast8ame! \A/>ES 29lsen2!
)((. 3ow can #ou change R3ansenR into R8ilsenR in the R/ast8ameR column in the :ersons table" o >:,A5E :ersons SE5 /ast8ameC28ilsen2 +3E;E
/ast8ameC23ansen2
)(F. +ith S=/, how can #ou delete the records where the R1irst8ameR is R:eterR in the :ersons 5able" ,E/E5E 1;97 :ersons +3E;E 1irst8ame C
2:eter2
)(-. +ith S=/, how can #ou return the number of records in the R:ersonsR table" SE/EC5 C9>85Z! 1;97 :ersons
)(@. 5here is a line of :3: codeA Bresult C Bm#s$li-T$uer#B$uer#!. 5he ob0ect Bm#s$li is created b# classA o m#s$li-stmt
)(G. 5here2s a line of :3: code ABresult C Bm#s$li-T$uer#B$uer#!. 5he ob0ect Bresult is created b# classA m#s$li-result
)(H. 5here2s a line of :3: codeABstmt C Bm#s$li-TprepareR48SE;5 4859 countries \A/>ES ", "!R!. 5he ob0ect Bstmt is created b# classA m#s$li-stmt
)(I. .iven line of :3: codeA B result C B m#s$li-T $uer# B $uer#!. +hat is the $uer#" 7ethod
)(J. .iven line of :3: code A B result C B m#s$li-T $uer# B $uer#!. +hat is the B$uer#" 9b0ect
)F*. .iven line of :3: code A B result C B m#s$li-T $uer# B $uer#!. +hat is the Bm#s$li" 9b0ect
)F). .iven line of :3: code A ABstmt C Bm#s$li-TprepareR48SE;5 4859 countries \A/>ES ", "!R!. +hat is the Bstmt" 9b0ect
)F(. .iven line of :3: codeA B result C B m#s$li-T $uer# B $uer#!. +hat is the Bresult" 9b0ect
)FF. .iven line of :3: codeABstmt C Bm#s$li-TprepareR48SE;5 4859 countries \A/>ES ", "!R!. +hat is the Bm#s$li" 9b0ect
)F-. .iven line of code :3:A Bstmt C Bm#s$li-TprepareR48SE;5 4859 countries \A/>ES ", "!R!. +hat is a prepare" 7ethod
)F@. .iven line of code :3:A Bm#s$li C new m#s$li2localhost2, 2root2, 2secret2, 2firma2!;. +hat is the Bm#s$li" 9b0ect
)FG. .iven line of :3: codeA Bm#s$li C new m#s$li2localhost2, 2root2, 2secret2, 2firma2!;. +hat is the m#s$li" Class
)FH. .iven line of code :3:A Bm#s$li C new m#s$li2localhost2, 2root2, 2secret2, 2firma2!;. +hat is DsecretE" password
)FI. .iven line of code :3:A Bm#s$li C new m#s$li2localhost2, 2root2, 2secret2, 2firma2!;. +hat is DlocalhostE" url
)FJ. .iven line of code :3:A Bm#s$li C new m#s$li2localhost2, 2root2, 2secret2, 2firma2!;. +hat is DrootE" login
)-*. .iven line of code :3:A Bm#s$li C new m#s$li2localhost2, 2root2, 2secret2, 2firma2!;. +hat is DfirmaE" ,ata base name
)-). .iven line of :3: codeA Bm#s$li C new m#s$li2)(H.*.*.)2, 2root2, 2secret2, 2firma2!;. +hat is the D2)(H.*.*.)E" url
)-(. .iven line of :3: code A Brow C Bresult-Tfetch_row! . +hat is a fetch_row! " 7ethod
)-F. .iven line of :3: code A Brow C Bresult-Tfetch_row! . +hat is the Brow " 8umeric arra#
)--. .iven line of :3: code A Brow C Bresult-Tfetch_row! . +hat is a Bresult " 9b0ect
)-@. .iven line of :3: code A Brow C Bresult-Tfetch_assoc! . +hat is the Brow " Associative arra#
)-G. .iven line of :3: code A Bstmt-Tbind_param2ss2, Bname, Bdescription!; . +hat is Bstmt " 9b0ect
)-H. .iven line of :3: code A Bstmt-Tbind_param2ss2, Bname, Bdescription!; . +hat is 2ss2 " ,ata t#pes
)-I. .iven line of :3: code A Bstmt-Tbind_param2ss2, Bname, Bdescription!; . +hat is a Bname " variable
)-J. .iven line of :3: code A Bstmt-Tbind_param2ss2, Bname, Bdescription!; . +hat is Bdescription " variable
)@*. .iven line of :3: code A Bstmt-Tbind_param2ss2, Bname, Bdescription!; . +hat are the values of Bname and Bdescription for a method bind_param!" o
:arameters
)@). .iven line of :3: code A Bstmt-Tbind_param2ss2, Bname, Bdescription!; . +hat is a bind_param! " 7ethod
)@(. .iven line of :3: code A Br C Bresult-Tfetch_assoc! . +hat is Br " Associative arra#
)@F. .iven line of :3: code A Brow C Bresult-Tfetch_assoc! . +hat is the Bresult " 9b0ect
)@-. .iven line of :3: code A Brow C m#s$li_fetch_assocBresult!. +hat is a Brow " Associative arra#
)@@. .iven line of :3: code A Brow C Bresult-Tfetch_assoc! . +hat is a fetch_assoc!" 7ethod
)@G. .iven line of code :3:A BresultCm#s$li_$uer#Blink,B$uer#!; . +hat is B$uer#" s$l-$uer#
)@H. .iven line of code :3:A BresultCm#s$li_$uer#Blink,B$uer#!; . +hat is Blink" Coonection descriptor
)@I. .iven line of code :3:A BresultCm#s$li_$uer#Blink,B$uer#!; . +hat is m#s$li_$uer#" function
)@J. .iven line of code :3:A BresultCm#s$li_$uer#Blink,B$uer#!;. +hat is a Bresult" variable
)G*. .iven line of code :3:A Brows C m#s$li_num_rowsBresult!; . +hat is the Brows" \ariable of number of rows
)G). .iven line of code :3:A Brows C m#s$li_num_rowsBresult!; . +hat is Bresult" 5he result of the s$l-$uer#
)G(. 5here is a line of code :3:A Bn C m#s$li_num_rowsBresult!; . +hat is Bn" \ariable of number of rows
)GF. .iven line of code :3:A Brows C m#s$li_num_rowsBresult!; . +hat is m#s$li_num_rows!" function
)G-. 5here is line of code :3:A Brows C m#s$li_num_rowsBresult!;. +hat is a m#s$li_num_rows!" function
)G@. .iven line of code :3:A Bn C Bm#s$li-Tnum_rows; . +hat is a Bm#s$li" ob0ect
)GG. .iven line of code :3:A Bn C Bm#s$li-Tnum_rows; . +hat is Bn" number of rows
)GH. .iven line of code :3:A Bn C Bm#s$li-Tnum_rows; . +hat is num_rows" :ropert# for number of rows
)GI. .iven line of code :3:A Bn C Bm#s$li-Tnum_rows; . +hat is a Bm#s$li" ob0ect
)GJ. 5here is a line of code :3:A Bn C Bm#s$li-Tnum_rows; . +hat is the Bn" \ariable of number of rows
)H*. 5here is a line of code :3:A Bn C Bm#s$li-Tnum_rows;. +hat is the num_rows " :ropert# for number of rows
)H). .iven line of code :3:A Brow C Bresult-Tfetch_arra#7_S=/4_'953! ; . +hat is a Bresult " ob0ect
)H(. .iven line of code :3:A Brow C Bresult-Tfetch_arra#7_S=/4_'953! ; . +hat is a Brow " A;;A_
)HF. .iven line of code :3:A Brow C Bresult-Tfetch_arra#7_S=/4_'953! ; . +hat is fetch_arra#7_S=/4_'953! " method
)H-. .iven line of code :3:A Brow C Bresult-Tfetch_arra#7_S=/4_'953! ; . +hat is 7_S=/4_'953 " parameter
)H@. 5here is a line of code :3:A Brow C Bresult-Tfetch_arra#7_S=/4_ASS9C! ; . +hat is the 7_S=/4_ASS9C " parameter
)HG. .iven line of code :3:A Brow C Bresult-Tfetch_arra#7_S=/4_8>7! ; . +hat is a 7_S=/4_8>7 " parameter
)HH. .iven line of :3: code A BA; C Bresult-Tfetch_arra#7_S=/4_'953!;.+hat is BA; " A;;A_
)HI. 5here is a line of :3: codeA Bstmt-Taffected_rows. 5he result of this code is A 5he number of rows inserted into database table
)HJ. 5here is a line of :3: codeA Bstmt-Taffected_rows. 5he affected_rows is aA :ropert#
)I*. 5he result of application of this templateA U%slAtemplate matchCR6RT UhtmlTUheadT U6headT Ubod#TU6bod#T U6htmlT U6%slAtemplateT is that MM
UhtmlTUheadT U6headT Ubod#TU6bod#T U6htmlT
)I). 5he result of application of this templateA U%slAtemplate matchCRmovieRT U%slAvalue-of selectCRtitleR6T U6%slAtemplateT is that MM content of the title
element
)I(. 5he result of application of this templateA U%slAtemplate matchCRmovies66actorRT U%slAvalue-of selectCR.R6TU6%slAtemplateT is that MM content of the actor
element
)IF. 5here is part of %ml codeA U%slAst#lesheet versionCR).*R %mlnsA%slCRhttpA66www.wF.org6)JJJ6SS/65ransformRTU%slAtemplate matchCR66nameRT. +hich of
the following strings can be specified as a name of name spacesA o Ssl in %slChttpA66www.wF.org6)JJJ6SS/65ransform
)I-. <<% can be specified as aA :re-increment operator
)I@. %<< can be specified as aA :ost-increment operator
)IG. - - % can be specified as aA :re-decrement operator
)IH. - - % can be specified as aA :re-decrement operator
)II. +hich of the statements corresponds to the following descriptionALuse this statement to e%ecute some code onl# if a specified condition is true N " if statement
)IJ. which of the statements corresponds to the following descriptionAL use this statement to select one of several blocks of code to be e%ecutedN " if...elseif....else
statement
)J*. +hich of the statements corresponds to the following descriptionAL use this statement to select one of man# blocks of code to be e%ecutedN" switch statement
)J). +hich of the looping statements corresponds to the following descriptionA Lloops through a block of code while a specified condition is trueN" +hile
)J(. +hich of the looping statements corresponds to the following descriptionA Lloops through a block of code a specified number of timesN" for
)JF. +hich of the looping statements corresponds to the following descriptionA Lloops through a block of code for each element in an arra#N" foreach
)J-. /et the Blink defines a connection to a database, B$uer# is a s$l-$uer# and BresultCm#s$li_$uer#Blink,B$uer#!. Specif# which of the following functions
create the connection to the database" m#s$li_connectBresult!;
)J@. /et the Blink defines a connection to a database, B$uer# is a s$l-$uer# and BresultCm#s$li_$uer#Blink,B$uer#!. Specif# which of the following functions
create the numeric arra#" m#s$li_fetch_rowBresult!;
)JG. /et the Blink defines a connection to a database, B$uer# is a s$l-$uer# and BresultCm#s$li_$uer#Blink,B$uer#!. Specif# which of the following functions
create the associative arra#" m#s$li_fetch_assocBresult!;
)JH. +hich of the following operations define opposite for some value" 8egation
)JI. +hich of the following operations define $uotient of two values" ,ivision
)JJ. +hich of the following operations define difference of two values" Subtraction
). 5he file s#stem permits users to create data collections, called files, with desirable properties, such as ZZZ` 1ield, ;ecord, 1ile, ,atabase
(. 1or terms are in common use when discussing filesA ZZZ` 1ield, ;ecord, 1ile, ,atabase
F. +hat is a field" ZZZ`4t is the basic element of data
-. +hat is a record"ZZZ` 4t is a collection of related fields that can be treated as a unit b# some application program
@. +hat is a file" ZZZ`4t is a collection of similar records.
G. 4n choosing a file organi&ation, several criteria are importantA ZZZ` Short access time, Ease of update, Econom# of storage, Simple maintenance, ;ealibilit#
H. 5o understand the re$uirements for a file structure, it is helpful to consider the t#pes of operations that ma# be performed on the director#A ZZZ` Search, ,elete,
Create, /ist ,irector#, >pdate ,irector#
I. +hat is a Search" ZZZ` +hen a user or application references a file, the director# must be searched to find the entr# corresponding to that file.
J. +hat is a Create file" ZZZ`+hen a new file is created, an entr# must be added to the director#
)*. +hat is a ,elete file" ZZZ` +hen a file is deleted, an entr# must be removed from the director#
)). +hat is a /ist ,irector#" ZZZ` All or a portion of the director# ma# be re$uested.
)(. +hat is a>pdate ,irector#" ZZZ` 'ecause some file attributes are stored in the director#, a change in one of these attributes re$uires a change in the
corresponding director# entr#.
)F. At the Secondar# storage management what is a \olume" ZZZ` A collection of addressable sectors in secondar# memor# that an 9S or application can use for
date storage
)-. At the 14/E S_S5E7 SEC>;45_ what is a Sub0ect" ZZZ` An entit# capable of accessing ob0ects
)@. At the 14/E S_S5E7 SEC>;45_ what is an 9b0ect" ZZZ` An#thing to which access is controlled
)G. At the 14/E S_S5E7 SEC>;45_ what is an Access right" ZZZ` 5he wa# in which an ob0ect is accessed b# a sub0ect
)H. At /inu% \irtual 1ile S#stem Concept, 5he four primar# ob0ect t#pes in \1S are as followsA ZZZ` Superblock ob0ect, inode ob0ect, dentr# ob0ect, file ob0ect
)I. +hat is an E7'E,,E, S_S5E7S" ZZZ` combination of computer hardware and software, and perhaps additional mechanical or other part, designed to
perform a dedicated function
)J. C3A;AC5E;4S54CS 91 E7'E,,E, 9:E;A548. S_S5E7S, .ive definition to ;eal-time operationA ZZZZ` 4n man# embedded s#stems, the correctness
of a computation depends, in part, on the time at which it is delivered
(*. .ive the correct wa# to L/oading an eCos ConfigurationNA ZZZ` .8> make utilit#TTApplication source codeTT.8> cross compilerTT.8>
linkerTTE%ecutable file
(). Choose the correct choice of the LeCos /a#ered StructureN from bottom- to- top" ZZZ` 3ardware abstraction la#er, ]ernel, 469 s#stem, Standard C librar#, >ser
application code
((. 3ow man# implemented separate modules has 5he 3A/" ZZZ` F
(F. 3ow man# main ob0ectives has 5he eCos ]ernel was designed to satisf#" ZZZ` -
(-. +hat does L548_9SN mean" ZZZ` ;epresents a significant departure from other embedded operating s#stems
(@. 5hree abstractions for resources are used in 5in#9SA ZZZ` ,edicated, \irtuali&ed, Shared
(G. +hat is a Computer Securit#" ZZZZ` 5he protection afforded to an automated information s#stem in order to attain the applicable ob0ectives of preserving the
integrit#, availabilit# and confidentialit# of information resources
(H. 5his definition introduces three ke# ob0ectives that are at the heart of computer securit#A ZZZ` Confidentialit#, 4ntegrit#, Availabilit#
(I. Although the use of the C4A triad to define securit# ob0ects is well established, some in the securit# field feel that additional concepts are needed to present a
complete picture. 5wo of the most commonl# mentioned are as followsA ZZZ` Authenticit#, Accountabilit#
(J. 8etwork securit# attacks can be classified asA ZZZ` :assive and active attacks
F*. 4n an important earl# stud# of intrusion, AndersonPA8,EI*Q identified three classes of intrudersA ZZZZ` 7as$uerader, misfeasor, clandestine user
F). +hat is a \irus" ZZZZ` 7alware that, when e%ecuted, tries to replicate itself into other e%ecutable code
F(. +hat is a +orm" ZZZZ` A computer program that can run independentl# and can propagate a complete working version of itself onto other hosts on a network
FF. +hat is a /ogic bomb" ZZZZ` A program inserted into software b# an intruder
F-. +hat is a 5ro0an horse" ZZZZ` A computer program that appears to have a useful function, but also has a hidden and potentiall# malicious function that evades
securit# mechanisms, sometimes b# e%ploiting legimate authori&ations of a s#stem entit# that invokes the 5ro0an horse program
F@. +hat is a 'ackdoor trapdoor!" ZZZZ` An# mechanisms that b#passes a normal securit# check; it ma# allow unauthori&ed access to functionalit#
FG. +hat is a 7obile code" ZZZZ` Software e.g., script, macro, or other portable instruction! that can be shipped unchanged to a heterogeneous collection of
platforms and e%ecute with identical semantics
FH. +hat is aE%ploits" ZZZZ` Code specific to a single vulnerabilit# or set of vulnerabilities.
FI. +hat is a ,ownloaders" ZZZZ` :rogram that installs other items on a machine that is under attack
FJ. +hat is an Auto-rooter" ZZZZ` 7alicious hacker tools used to break into new machines remotel#
-*. +hat is a ]it virus generator!" ZZZZ` Set of tools for generating new viruses automaticall#
-). +hat is a Spammer programs" ZZZZ` >sed to send large volumes of unwanted e-mail.
-(. +hat is a 1looders" ZZZZ` >sed to attack networked computer s#stems with a large volume of traffic to carr# out a denial-of-service ,oS! attack
-F. +hat is a ]e#loggers" Z-ZZZ` Captures ke#strokes on a compromised s#stem
--. +hat is a ;ootkit" ZZZZ` Set of hacker tools used after attacker has broken into a computer s#stem and gained root-level access
-@. +hat is a aombie, bot" ZZZZ` :rogram activated on an infected machine that is activated to launch attacks on other machines
-G. +hat is a Sp#ware" ZZZZ` Software that collects information from a computer and transmits it to another s#stem
-H. +hat is aAdware" ZZZZ` Advertising that is integrated into software
-I. +hat is a4nfection mechanism" ZZZZ` 5he means b# which a virus spreads, enabling it to replicate
-J. A virus classification b# target includes the following categories,+hat is a 1ile infector" ZZZZZ` 4nfects files that the operating s#stem or shellconsider to be
e%ecutable
@*. +hat is a 7ultiplatform" ZZZZ` 8ewer worms are not limited to +indows machines but can attack a variet# of platforms, especiall# the popular varieties of
>84S
@). >ses of 'ots, +hat does mean Spamming " ZZZZ` +ith the help of a botnet and thousands of bots, an attacker is ableto send massive amounts of bulk e-mail
spam!
@(. A rootkitma#be" ZZZZZ ` :ersistent, 7emor# based,>ser mode, ]ernel mode
@F. 7emor# based, rootkit" ZZZZZZ` 3as no persistent code and therefore cannot survive a reboot
@-. +hat is a Authentication" ZZZZZ ` is the basis for mostt#pes of access control and for user accountabilit#
@@. An authentication process consists of two stepsA ZZZZZ ` 4dentificationstep, \erificationstep
@G. Among the potential drawbacks are the following P84S5J@QA ZZZZ ` ;e$uires special reader, 5oken loss, >ser dissatisfaction
@H. Access control policies are generall# grouped into the following categoriesA ZZZZZZ ` ,iscretionar# access control, 7andator# access control, ;ole-based
access control
@I. 5he following definitions from ;1C (I(I 4nternet Securit# .lossar#! are relevant to our discussionA -ZZZZZ ` Securit#intrusion, 4ntrusiondetection
@J. 3ow man# 4,Ss can be classifiedA ZZZZZ @
G*. 4,Ss can be classified as followsA ZZZZZ ` 3ost-based 4,S, 8etwork-based 4,S, Sensors, Anal#&ers, >ser interface
G). 7alware ,efense. Antivirus Approaches. 5he ne%t best approach is to be able to do the followingA ZZZZ ` ,etection, 4dentification, ;emoval
G(. 4f we sa# about .eneric ,ecr#ption, what we are meaning of \irus signature scannerA ZZZZ ` A module that scans the target code looking for known virus
signatures
GF. At .eneric Client6Server Architecture Client workstation! show correct wa# from bottom-to-top" ZZZZ ` 3ardware platform, Client operating s#stem,
Communications software, Application logic, :resentation services
G-. P';E+JHQ lists four benefits that can be achieved with clustering. 5hese can also be thought of as ob0ectives or design re$uirementsA ZZZZZ ` Absolute
scalabilit#, 4ncremental scalabilit#, 3igh availabilit#, Superior price6performance
G@. :aralleli&ing Computation, 4n some cases, effective use of a cluster re$uires e%ecuting software from a single application in parallel. P]A::**Q lists three
general approaches to the problemA ZZZZ ` :aralleli&ing compiler, :aralleli&ed application, :arametric computing
GG. 5he +indows Cluster Server design makes use of the following conceptsA ZZZ ` Cluster Service, ;esource, 9nline, .roup
GH. 5he ma0or components of Sun Cluster areA ZZZZZ ` 9b0ect and communication support, :rocess management, 8etworking, .lobal distributed file s#stem
GI. +hat is a Server" ZZZZ ` is a computer program running to serve the re$uests of other programs, the RclientsR.
GJ. Show incorrect choice, when we mean t#pes of ServerA ZZZZ ` Cooking server
H*. 5he Sun Cluster networking subs#stem has how man# ke# elements" ZZZZ ` F
H). +hich of the following is not a function of the C:>" ZZZZ ` :rocessing video displa# data
H(. 5he main principle underl#ing the design of operating s#stems is ZZZZ ` Abstraction
HF. +hich of the following is not considered to be internal part of the computer" ZZZZ` Communication device network card, modem, etc!
H-. +hich of the following is an e%ample of input-output device" ZZZZ ` 8etwork card
H@. +hich of the following is not a la#er of the s#stem bus" ZZZZ ` Sound bus
HG. 3ow C:>Es status registers are also called" ZZZZ ` 1lags
HH. 3ow is C:>Es internal memor# called" ZZZ ` 1lags
HI. Stopping the current se$uencing of the processor is called ZZZZ ` 4nterrupt
HJ. 7ain reason for improving C:> utili&ation isA ZZZZ ` Slowness of 469 devices compared to C:>
I*. +hat are the correct t#pes of multiple interrupt handling" ZZZZ ` Se$uential and nested
I). +hat is stored in cache memor#" ZZZZ` Cop# of a portion of the main memor#
I(. +hat is the main principle underl#ing the design of caching s#stems" ZZZZ` :rinciple of localit#
IF. +hich of the following is not a la#er in 9S design" ZZZZ ` 469 level
I-. +hat is the most obvious solution to low C:> utili&ation problem" ZZZZ ` 7ultiprogramming
I@. A processis ZZZZ ` 4nstance of running program
IG. +hich of the following is not a principle of storage management responsibilities" ZZZZ` :rocess termination
IH. \irtual memor# takes advantage of ZZZZ ` /arge secondar# memor#
II. 4n a microkernel 9S the scheduler resides inA ZZZZ` ]ernel
IJ. 5hread isA ZZZ ` ,ispatchable unit of work
J*. +hich of the following cannot be interrupted" ZZZZ ` Atomic operation
J). 4n /inu%, the graphic subs#stem is located in ZZZZ ` >ser level
J(. +hich of the following is not considered to be a part of the process" ZZZZZ` 1ile structure
JF. 5race of the process isA ZZZZ ` /ist of instructions that are e%ecuted
J-. ,ispatcher isA ZZZZ ` Small program which switches the processor from one process to another
J@. 5he problem with two-state process model is ZZZZ ` Single $ueue
JG. :rocess spawning is ZZZZ ` Creation of child process
JH. A good reason for process suspension is ZZZZ ` Swapping
JI. +hich of the following is not a t#pe of 9S control table" ZZZZZ` 5ime table
JJ. Another term for spawning isA ZZZZ ` 1orking
)**. 1ile tables provide information aboutA ZZZZZ ` 1iles, their location, status
)*). :rocess control block consists of the following ZZZZZ ` :rocess 4,, state information, control information
)*(. 5wo modes of e%ecution most processors support isA ZZZZZ ` >ser mode and s#stem mode
)*F. +hich of the following is not a proper step in process creation" ZZZZZ ` Clearing the memor#
)*-. +hich of the following is not a reason to switch a process" ZZZZ ` ]ernel update
)*@. 5hree t#pes of operating s#stem kernel process designA ZZZZZ ` Separate kernel, 9S functions within user processes, 9S functions are separate processes
)*G. +hat thread approach did 7S-,9S use" ZZZZ ` 9ne process, one thread
)*H. +hat thread approach does ?ava run-time environment use" ZZZZ ` 9ne process, multiple threads
)*I. +hat thread approach does +indows use" ZZZZ ` 7ultiple processes, multiple threads per process
)*J. +hat controls the process in a single-threaded process model" ZZZZ` :rocess control block
))*. +hat controls the process in a multi-threaded process model" ZZZZZ ` :rocess control block
))). +hat controls the thread in a multi-threaded process model" ZZZZ ` 5hread control block
))(. 5hreade%ecutionstatesareA ZZZZZ ` Spawn, 'lock, >nblock, 1inished
))F. +hat relationship between threads and number of processes is used in old traditional >84S implementations" ZZZZZZ ` 9ne to one
))-. +hat relationship between threads and number of processes is used +indows 85, 9S6(, Solaris, /inu%" ZZZZ ` 7an# to one
))@. +hat relationship between threads and number of processes is used cloud computing" ZZZZZ ` 9ne to man#
))G. +hat relationship between threads and number of processes is used in 5;4S s#stems" ZZZZ ` 9ne to man#
))H. +hat t#pe of parallel processor architecture is used in .:> graphic cards! design" ZZZZZ ` S47,
))I. +hat t#pe of parallel processor architecture is used in multi-core processors" ZZZZ ` 747, shared memor#
))J. +hat t#pe of parallel processor architecture is used in clusters" ZZZZ ` 747, distributed memor#
)(*. 5wo main t#pes of 9S kernels areA ZZZZZ ` 7icrokernel and monolithic kernel
)(). :rocesses in +indows are implemented asA ZZZZZ ` 9b0ects
)((. A se$uence of one or more statements that appear to be indivisible isA ZZZZ ` Atomic operation
)(F. A section of code within a process that re$uires access to shared resources and that must not be e%ecuted while another operation is in a corresponding section
of code is calledA ZZZZ ` Critical section
)(-. A situation in which two or more processes are unable to proceed because each is waiting for one of the others to do something is calledA ZZZZZ `
,eadlock
)(@. A re$uirement that when one process is in a critical section that accesses shared resources no other operation ma# be in a critical section that accesses an# of
those shared resources is calledA ZZZZZ ` 7utual e%clusion
)(G. A situation in which a runnable process is overlooked intinitel# b# the scheduler, although it is able to proceed, it is never chosenA ZZZZ ` Starvation
)(H. +hat is a hardware wa# of handling mutual e%clusion" ZZZZ ` ,isabling interrupts
)(I. A simple integer value with a $ueue used for signaling among processes is called ZZZZZZ `Semaphore.
)(J. 5wo general categories of resources areA ZZZZ ` ;eusable and consumable
)F*. An e%ample of reusable resource isA ZZZZZ ` :rocessor
)F). +hich of the following is not one of the principles of dealing with deadlock" ZZZZZ ` 4nitiali&ation
)F(. Current allocation of resources to processes where there is at least one se$uence that does not result in deadlock is calledA ZZZZZ ` Safe state
)FF. Current allocation of resources to processes where there is no se$uence that does not result in deadlock is calledA ZZZZZ ` >nsafe state
)F-. Can #ou solve the ,ining :hilosophersE :roblem using monitors" ZZZZZZ` _es
)F@. A fi%ed-length block of main memor# is calledA ZZZZZ` 1rame
)FG. A fi%ed-length block of data in secondar# memor# is calledA ZZZZ ` :age
)FH. A variable-length block of data that resides in secondar# memor# is calledA ZZZZ ` Segment
)FI. +hen free memor# is split into man# unconnected pieces we call itA ZZZZ ` E%ternal fragmentation
)FJ. 7emor# partitioning algorithm that uses binar# tree as a data structure is calledA ZZZZ ` 'udd# s#stem
)-*. A state in which the s#stem spends most of its time swapping pieces rather than e%ecuting instructions is calledA ZZZZ ` 5hrashing
)-). Convert this number s#stemsA 3ES,JA! to ,EC" ZZZZ ` F-I(
)-(. Convert this number s#stemsA 3ES,,(! to ,EC"A ZZZZ` F@FI
)-F. Convert this number s#stemsA 3ES'AI! to ,EC" ZZZZZ ` (JI-
)--. Convert this number s#stemsA 3ESHIE! to ,EC" ZZZZ` )JF-
)-@. Convert this number s#stemsA 3ESA'1! to ,EC" ZZZZZ` (H@)
)-G. Convert this number s#stemsA 3ESCCA! to ,EC"A ZZZZZ` F(H-
)-H. Convert this number s#stemsA 3ES',1! to ,EC"A ZZZZ` F*FJ
)-I. Convert this number s#stemsA 3ES11A! to ,EC" ZZZZ` -*J*
)-J. Convert this number s#stemsA 9C5)(F-! to ,EC" ZZZZ` GGI
)@*. Convert this number s#stemsA 9C5-F()! to ,EC" ZZZZ` ((@H
)@). Convert this number s#stemsA 9C5@-HH! to ,EC" ZZZZ` (IHJ
)@(. Convert this number s#stemsA 9C5H)F(! to ,EC" ZZZZ` FGH-
)@F. Convert this number s#stemsA 9C5G@)(! to ,EC" ZZZZZ ` F-*(
)@-. Convert this number s#stemsA 9C5@G)-! to ,EC" ZZZZ` (J@G
)@@. Convert this number s#stemsA 9C5HH-@! to ,EC" ZZZZZ` -*GJ
)@G. Convert this number s#stemsA 9C5GHF-! to ,EC" ZZZZZ` F@-I
)@H. Convert this number s#stemsA '48)))***)))! to ,EC"A ZZZZ` -@@
)@I. Convert this number s#stemsA '48))**))**))! to ,EC" ZZZZ` I)J
)@J.Convert this number s#stemsA '48)*)*)*)*)*)! to ,EC"A ZZZ` )FG@
)G*. Convert this number s#stemsA '48))****))**! to ,EC"A ZZZ` HI*
)G). Convert this number s#stemsA '48))))***)))! to ,EC" ZZZ` JGH
)G(. Convert this number s#stemsA '48)*)*)*)*)*)! to ,EC"A ZZZ )FG@
)GF. Convert this number s#stemsA '48))****))**! to ,EC"A ZZZ` HI*
)G-. Convert this number s#stemsA '48))))***)))! to ,EC" ZZZZ` JGH
)G@. Convert this number s#stemsA ,EC@IHJ! to 3ES"A ZZZZ` )G1H
)GG. Convert this number s#stemsA ,ECGHJ)! to 3ES"A ZZZ6Z` )AIH
)GH. Convert this number s#stemsA ,ECH)(F! to 3ES" ZZZZ` )',F
)GI. Convert this number s#stemsA ,ECI)F-! to 3ES"A -Z-ZZZ` )1CG
)GJ. Convert this number s#stemsA ,ECJ)(F! to 3ES"A ZZZZZ` (FAF
)H*. Convert this number s#stemsA ,ECI@HH! to 3ES" ZZZZ` ()I)
)H). Convert this number s#stemsA ,ECJ@HI! to 3ES"A ZZZZ` (@GA
)H(. Convert this number s#stemsA ,ECJI-@! to 3ES"A ZZZZ` (GH@
)HF. Convert this number s#stemsA ,EC-@J)! to 9C5" ZZZZ` )*H@H
)H-. Convert this number s#stemsA ,EC@)(F! to 9C5"A ZZZ` )(**F
)H@. Convert this number s#stemsA ,EC-I)(! to 9C5"A --ZZZZ` ))F)-
)HG. Convert this number s#stemsA ,EC@)(J! to 9C5" ZZZZ` )(*))
)HH. Convert this number s#stemsA ,EC)-G@! to '48"A ZZZZ` )*))*)))**)
)HI. Convert this number s#stemsA ,EC)*I)! to '48"A ZZZZ` )****)))**)
)HJ. Convert this number s#stemsA ,ECJ-@! to '48" ZZZZ` )))*))***)
)I*. Convert this number s#stemsA 9C5GHF@! to 3ES"A ZZZZ` ,,,
)I). Convert this number s#stemsA 9C5H)(F! to 3ES"A ZZZZZ` E@F
)I(. Convert this number s#stemsA 9C5@HH)! to 3ES" ZZZZ` '1J
)IF. 3ow man# parts of 7emor# 3ierarch#" ZZZZZ F
)I-. 4n 7emor# 3ierarch#, at the 9utboard storage which of the following are includedA ZZZZ` 7agnetic disk
)I@. 4n 7emor# 3ierarch#, at the 9ff-line storage which of the following are includedA ZZZZ` 7agnetic tape
)IG. 4n 7emor# 3ierarch#, at the 4nboard memor# which of the following are includedA ZZZZZ`7ain memor#
)IH. Cache ,esign has these properties" ZZZZ` Si&e, block si&e, mapping function, replacement algorithm, write polic#
)II. 5hree techni$ues are possible for 469 operationsA ZZZZ` :rogrammed 469, 4nterrupt-driven 469, ,irect memor# access,7A!
)IJ. 3ow man# principles has ,eadlock"A ZZZZZ` F
)J*. +hich of the following principles has ,eadlock" ZZZZZ` :revention, Avoidance, ,etection
)J). 7uch of the work in securit# and protection as it relates to operating s#stems can be roughl# grouped into four categories" ZZZZ ` Availabilit#,
confidentialit#, data integrit#, authenticit#
)J(. 5he central themes of operating s#stem design are all concerned with the management of processes and threads" ZZZZ ` 7ultiprogramming, multiprocessing,
distributed processing
An integrated collection of related data constitutes a ZZZ database
4n a t#pical librar# database s#stem, integrit# constraints would include which of the following rules" ZZZ 44 and 444 onl#
4n S=/(, which of the following details can be provided when creating a database" ZZZ 4 and 444 onl#
4n S=/(, the default length of a bit string is ZZZ )
4n S=/, a view is built with the command _____ and is deleted with the command _____. ZZZ C;EA5E \4E+, ,;9: \4E+
4n S=/, a semantic integrit# constraint that involves specif#ing an action that is e%ecuted whenever a specified condition becomes true is known as an! ZZZ trigger
4n the S=/ ;E\9]E command, the _____ clause can be used to specif# that a granted privilege cannot be revoked if the privilege has been passed on to other
users ZZZ ;ES5;4C5
4n the Entit#-;elationship E;! model, ob0ects that e%ist independentl# in the real world are modeled as ZZZ entities
4n the conte%t of databases, the entit# on which a weak entit# depends is known as an! ZZZ identif#ing owner
4n the conte%t of databases, consider the relationship ;ESE;\EU7E7'E;,'99]T, which indicates that a librar# member has reserved a book. 4f this
relationship has a cardinalit# ratio of )A8, which of the following is true" ZZZ 7embers ma# reserve multiple books, but a book ma# be reserved b# onl# a single
member.
Consider a database table with the following functional dependencies.1,)A A -T C!1,(A XA, 'Y -T C4f both of these functional dependencies are true, then this
table contains a _____ dependenc#.! ZZZ partial
Consider a database relation schema with three atomic attributes, A, ', and C that have the following functional dependencies. ZZZ 4 and 44 onl#
+hich of the following is are! true regarding database tables" ZZZ44 onl#
4n Entit#-;elationship E;! modeling, an entit# is a _____, and an! _____ is a meaningful association between entities.ZZZ uni$uel# identifiable ob0ect with
independent e%istence, relationship
+hich of the following statements about functional dependencies is are! true" ZZZ 4, 44, and 444
A relational database schema is in 1irst 8ormal 1orm if ZZZ the domain of ever# attribute allows a single atomic value
+hich of the following settings is needed for transactions in a banking database where simultaneous accesses to an account record ma# cause transactions to
process inconsistent account balances" ZZZ A stricter isolation level
1actors to consider when programming with transactions include which of the following" ZZZ 4 and 444 onl#
4nde%ing a database table is likel# to _____ performance of _____ $ueries on the table. ZZZ impair, insert
4nde%ing a database table _____ improves! $uer# performance when the table has _____ $uantities of data.ZZZ might not, small
4nde%ing a database table has the greatest effectiveness when ZZZ column values are highl# selective
1or which of the following reasons is the relational model the most popular model for database s#stems" ZZZ 4 and 444 onl#
4n S=/, the _____ clause is used to filter out rows in a SE/EC5 statement. ZZZ +3E;E
4n S=/, which of the following clauses is are! mandator# in a SE/EC5 statement" ZZZ 444 onl#
4n two-phase locking protocols, a deadlock occurs when ZZZ two or more transactions are blocked because each holds locks on resources that another transaction
needs
+hich of the following recover# actions is are! re$uired for ensuring the durabilit# propert# of a database" ZZZ 44 onl# )**^
+hen referring to the performance of a hard disk drive, once the read6write head is at the appropriate track, the amount of time it takes to position the appropriate
disk block under the head is known as the ZZZ rotational latenc#
4n hash files that use the linear probing scheme of conflict resolution, if a bucket is full when adding a new record, which if the following is true" ZZZ A serial
search is performed to find the first available slot in another bucket.
A data file is called full# inverted if ZZZ each of its fields is associated with an inde%
+hich of the following is are! true regarding the arit# of database tables" ZZZ 4, 44, and 444
5he cardinalit# of an empt# database table is ZZZ *
4n database schemas, structural integrit# constraints are imposed b# the ZZZ relational model
+hich of the following relational algebra operations can be performed b# a single SE/EC5 statement in S=/" ZZZ 4, 44, and 444
4n S=/, a scalar sub$uer# returns ZZZ a single column and a single row
4n S=/ C;EA5E 5A'/E statements, it can be specified that a column must alwa#s contain a valid value b# using the _____ column specifier. ZZZ 895 8>//
4n embedded S=/, a statement that ma# be e%ecuted more than once can be d#namicall# built for later use with the _____ statement. ZZZ :;E:A;E
4f S and _ are attributes of a relation, S is functionall# dependent on _ if ZZZ each value of _ is associated with e%actl# one value of S
A table that contains one or more repeating groups is said to be in ZZZ >nnormali&ed 1orm
4n a relation ; where S, _, and a are attributes, if S is functionall# dependent on _ and _ is functionall# dependent on a, then ZZZ S is transitivel# dependent on
a
4n a recoverable schedule, if transaction S reads a data item previousl# written b# transaction 5, then the ZZZ commit operation of 5 must precede the commit
operation of S
4f a transaction has an! _____ lock on a data item, it can _____ the item. ZZZ shared, read but not update
5#pes of file organi&ations in which records are store in no particular order include which of the following" ZZZ 44 onl#
5he techni$ue of e%tendible hashing is a t#pe of ZZZ d#namic hashing
A data file can have ZZZ at most one primar# inde% or one clustering inde%
4n Entit#-;elationship E;! modeling, an entit# t#pe that is e%istence-dependent on some other entit# t#pe is known as a ZZZ weak entit# t#pe
4n Entit#-;elationship E;! modeling, the multiplicit# of a relationship is the ZZZ number of possible occurrences of an entit# t#pe that ma# relate to an associated
entit# t#pe in the relationship
A cluster inde% is an inde% defined on an ! _____ field. ZZZ ordering
A collision occurs in hashing when the bucket in which the record to be _____ ZZZ stored is full
A database is needed for which of the following application scenarios" ZZZ 4 and 44 onl#
A deadlock occurs when ZZZ ( or more transactions wait indefinitel# because each holds the data items of another
A deletion operation will _____ if the deletion leads to the violation of a referential integrit# constraint. ZZZ fail
A difference operation can be applied to tables that ZZZ are union compatible
A hori&ontal view allows users access to ZZZ onl# specific rows of the defining tables
A livelock occurs when ZZZ a transaction is aborted and restarted repeatedl#
A relational schema is in first normal form, if the domain of all of its ZZZ attributes can take on onl# atomic values
A shared lock on a data item represents permission to perform which of the operations, read and write, on the data item" ZZZ ;ead onl#
A star schema in a data warehouse conte%t refers to which of the following" ZZZ A central fact table and a number of dimension tables
A vertical view allows users access to ZZZ onl# specific columns of the defining tables
A weak entit# t#pe implies a ZZZ relationship with total participation constraint
All changes made b# a committed transaction can be recovered ZZZ onl# if there have been no software failures
An E-Commerce database contains data about customers, products, orders, s#stem response times, etc. +hich of the following can be specified as integrit#
constraints in an E-Commerce database s#stem" ZZZ 4 and 444 onl#
An E-Commerce s#stem consists of the following components. +hich of the same components must be included in a database management s#stem" ZZZ 44 onl#
An E-Commerce s#stem consists of the following components. +hich of these same components must be included in a database" ZZZ 4 onl#
An E-Commerce s#stem consists of the following components. +hich of these same components will constitute a database s#stem" ZZZ 4, 44, and 444
An e%clusive lock on a data item represents permission to perform which of the operations, read and write, on the data item" ZZZ 'oth read and write
An inde% file is usuall# used to inde% ______ of the data file. ZZZ one field
An insertion operation will _____ if the inserted primar# ke# has a 8>// value. ZZZ fail
An insertion operation will _____ if the insertion violates the uni$ueness propert# of a ke#. ZZZ fail
Consider a table with atomic attributes A, ', and C and the following functional dependencies. ZZZ 4 and 44 onl#
Consider the following functional dependenc#. XA, 'Y -T XCY ;egarding this dependenc#, which of the following statements is are! true" ZZZ 8one
,atabase design t#picall# consists of which of the following phases" ZZZ 4, 44, and 444
,,/ is used to ZZZ specif# the structure of a database
,7/ is used to ZZZ add6modif#6delete data in the database
,uring recover#, in which of the following wa#s are the before and after images used b# the undo and redo actions" ZZZ 4 and 444 onl#
1or a relation to be in (81, _____ attribute must be full# functionall# dependent on _____. ZZZ ever# non-primar#-ke#, the primar# ke#
1or a relation to be in F81, it should not contain _____ attribute that is transitivel# dependent on _____. ZZZ a non-primar# ke#, the primar# ke#
1or two tables to be union compatible, corresponding columns from each table should have which of the following" ZZZ the same domain
1or two tables to be union compatible, the tables should be the same with respect to which of the following" ZZZ degree
1orce propagation polic# _____ redo actions, and no-force propagation polic# _____ redo actions. ZZZ does not re$uire, re$uires
3ow does linear probing solve the problem of collisions in hashing" ZZZ A serial search is performed from the point of collision to find the first available slot.
4f S -T _, which of the following would make _ full# dependent on S" ZZZ S is a single attribute
4mmediate update polic# _____ undo actions, and deferred update polic# _____ undo actions. ZZZ re$uires, does not re$uire
4n a hierarchical database, a single tree can accommodate which of the following t#pes of binar# relationships" ZZZ 4 and 44 onl#
4n a hierarchical database, data records are represented using which of the following data structures" ZZZ 5rees
4n a network database, a binar# one-to-man# relationship is t#picall# represented using a ZZZ linked list
4n a network database, data records are represented using which of the following data structures" ZZZ .raphs
4n a network database, the first record of an ordered linked list that represents a one-to-man# relationship is called an ! ZZZ owner
4n a transaction, a ;9//'AC] is used to ZZZ discard all the updates including inserts, deletes, modifications! of a transaction from the database
4n a transaction, C97745 specifies that ZZZ all updates including inserts, deletes, modifications! of a transaction are to be made permanent in the database
4n a two-phase locking protocol, a transaction _____ downgrade a write lock to a read lock _____ ZZZ cannot, under an# circumstances
4n a two-phase locking protocol, what happens during the growing phase" ZZZ 5he transaction can ac$uire locks, but cannot release its locks.
4n a two-phase locking protocol, what happens during the shrinking phase" ZZZ 5he transaction cannot ac$uire locks, but can release its locks.
4n an E; model, a derived attribute is one whose values ZZZ can be derived from the values of some other attributes
4n an E; model, the cardinalit# ratio of a relationship t#pe is ZZZ the number of relationships of that relationship t#pe in which an entit# can participate
4n an E; model, what is a recursive relationship t#pe" ZZZ 5he t#pe of relationship between entities of one entit# t#pe
4n an E; model, which of the following is true about a component attribute" ZZZ A component attribute can be a composite attribute
4n an E; model, which of the following is true about a composite attribute" ZZZ A composite attribute can be broken into more basic attributes
4n an 9b0ect-;elational model, which of the following data t#pes are supported" ZZZ 4 and 44 onl#
4n contrast to _____ tables, a view refers to _____ ZZZ base, a virtual table
4n EE; modeling, generali&ation is the process of generating ZZZ superclasses out of subclasses
4n EE; modeling, speciali&ation is the process of generating ZZZ subclasses out of superclasses
4n S=/, a database can be created b# which of the following" ZZZ the command C;EA5E SC3E7A
4n S=/, a database can be destro#ed b# which of the following" ZZZ the command ,;9: SC3E7A
4n S=/, one function of the AS operator is to ZZZ customi&e the names of columns in a $uer#Es result
4n S=/, the results of a _____ statement can be used to process a _____ statement ZZZ SE/EC5, 48SE;5
4n S=/, when destro#ing a database, the CASCA,E option removes ZZZ ever#thing in the specified databaseA the data, schema, etc.
4n S=/, when destro#ing a database, the ;ES5;4C5 option removes ZZZ the schema if the database has no data empt# tables!
4n S=/, which of the following clauses can be used to sort results in ascending or descending order of attribute values" ZZZ 9;,E; '_
4n S=/, which of the following operators are used to check for set membership in a SE/EC5 statement" ZZZ 48 and 895 48
4n S=/F, inheritance is specified using which of the following ke#words" ZZZ >8,E;
4n the Entit#-;elationship model, a derived attribute is one ZZZ whose value can be computed from the values of other attributes
4n the Entit#-;elationship model, properties that characteri&e entities and relationships are modeled as ZZZ attributes
4n the Entit#-;elationship model, the degree of a relationship specifies which of the following" ZZZ 5he number of entities that participate in the relationship
4n the relational model, which of the following is true about the data t#pe of a column" ZZZ 4t must be atomic and it cannot be an abstract data t#pe
Small, highl# focused databases at the departmental level that are used to build enterprise-wide data warehouses are known as ZZZZ data marts
Spatial data is _____-dimensional data. ZZZZZ multi
5he arit# of a table is the number of _____ in the table. ZZZZZ columns
5he cardinalit# of a table is the number of _____ in the table. ZZZZ rows
5he degree of a table is the number of _____ in the table. ZZZZ columns
5he 1, S -T _ is a full dependenc# in a relation ;, if there is _____ attribute A that can be _____ S and the dependenc# still holds. ZZZZ no, removed from
5he 1, S -T _ is a partial dependenc# in a relation ;, if there is _____ attribute A that can be _____ S and the dependenc# still holds. ZZZZZ at least one, removed
from
5he foreign ke# in a table 5) _____ the same _____ as the corresponding primar# ke# in table 5(.must have, name need not have, name must have, domain ZZZZ
44 and 444
5he functional dependenc# S -T _ is true if ZZZZ a value of S uni$uel# determines a value of _
5he ph#sical storage structure will be _____ to the application programmer in a database approach, and will be _____ to the application programmer in a file
s#stem approach. ZZZZ hidden, visible
5he result of a set difference operation r - s will be ZZZZ those tuples that are in r but not in s
5he S=/ clause to perform a set difference operation is ZZZZZ ESCE:5
5he S=/ clause to perform a set >8498 operation is ZZZZZ >8498
5he S=/ ke#word _____ makes the modifications of the transaction permanent, while the S=/ ke#word _____ discards the modifications of the transaction. ZZZZ
C97745, ;9//'AC]
5he strict two-phase locking protocol is _____ to implement ZZZZZ the easiest two-phase locking protocol
5he term ph#sical data independence refers to the abilit# to change ZZZZZ the ph#sical la#out of the data without changing the e%ternal schemas, the conceptual
schemas, or the application programs
5he term $uer# b# e%ample refers to ZZZZ a visual $uer# language developed b# 4'7
5he undo action undoes the effects of an ! _____ transaction, and the redo action redoes the effects of an ! _____ transaction. ZZZZZ aborted, committed
5hrough normali&ation, data redundanc# ZZZZ can be eliminated
5hrough normali&ation, update anomalies ZZZZZ can be eliminated
5o retrieve data from a hierarchical database, program logic for performing _____ must be available. ZZZZ navigation
+hat attributes does a subclass have" ZZZZ All the attributes of its superclass, and possibl# more
+hat can be specified in the selection condition of a SE/EC5 statement" ZZZZ a 'oolean operation
+hat does a pro0ection operation do" ZZZZ 4t selects columns from a table
+hat information is necessar# when specif#ing the structure of a table" ZZZZ the name of the table, the names of the table2s attributes, the data t#pes of attributes,
and the formats of attributes
+hat is a drill-down operation in a data warehouse application" ZZZZ ,eriving a fine-grained view, i.e., a disaggregated view along a particular dimension
+hat is a roll-up operation in a data warehouse application" ZZZZ ,eriving a coarse-grained view, i.e., a summari&ed view along a particular dimension
+hat is an alternate ke#" ZZZZ An# ke# that is not a primar# ke#
+hat is an identif#ing owner in an E; model" ZZZZ 5he entit# upon which a weak entit#2s e%istence depends
+hen a string whose length is strictl# less than n is entered as the value of a field whose S=/ data t#pe is C3A;n !, the s#stem responds b# ZZZZ storing the
string as is.
+hen is embedded S=/ referred to as d#namic S=/" ZZZZZ when the embedded S=/ is translated into ,'7S calls at run-time
+hen is embedded S=/ referred to as static S=/" ZZZZZ when the embedded S=/ is translated into ,'7S calls at compile-time
+hen mapping from an E; model to a relational model, a strong entit# is mapped into a ZZZZ table
+hen removing a table from the schema, using the CASCA,E option would ZZZZZ remove the table and all references to it
+hen removing a table from the schema, using the ;ES5;4C5 option would ZZZZZ remove the table if there are no references to it
+hen specif#ing a selection criterion in S=/, attributes can be renamed with which of the following operators" ZZZZZ AS
+hich concurrenc# control protocols perform best in all situations" ZZZZ none
+hich of the following are valid operations performed on spatial data" ZZZZ 4 and 44 onl#
+hich of the following collections allows duplicate elements" ZZZZ 44 and 444 onl#
+hich of the following commands can be used to give access permissions to a table" ZZZZ .;A85
+hich of the following commands can be used to remove access privileges associated with a table" ZZZZZ ;E\9]E
+hich of the following data models currentl# have the predominant market share ZZZZZ relational
+hich of the following is a propert# are properties! e%hibited b# good relational schemas" ZZZZ 444 onl#
+hich of the following is an ordered collection" ZZZZZ 44 onl#
+hich of the following is the predominant data t#pe that is encountered in 9/A: databases" ZZZZ multi-dimensional
+hich of the following is true about attributes in a relational model" Attributes can be multi-valued. Attributes can be composite. ZZZZ 8either 4 nor 44
+hich of the following is true about compensating transactions" ZZZZ 5he ,'7S cannot automaticall# write compensating transactions
+hich of the following is true about primar# ke#s and foreign ke#s holding 8>// value" ZZZZ A primar# ke# cannot hold a 8>// value and a foreign ke# can
hold a 8>// value
+hich of the following is true about storage for derived attributes" ZZZZ ,erived attributes are usuall# not stored because the# can be computed
+hich of the following is true about the effects of a transaction as seen b# an e%ternal user who does not participate in the transaction" ZZZZ 5ransactions either
complete, committing all changes to the ,'7S, or rollback, resetting the ,'7S to a state 0ust prior to a transaction2s e%ecution
+hich of the following is true about the growing phase and the shrinking phase of a strict two-phase locking protocol" ZZZ 5he growing phase ends 0ust before
commit
+hich of the following is true about the number of primar# ke#s and alternate ke#s with respect to a table" ZZZZ here can be onl# one primar# ke#, but man#
alternate ke#s
+hich of the following is true about the ph#sical storage of tables defined b# views" ZZZZZ 5here is no e%tra ph#sical storage needed to store tables that a view
defines
+hich of the following is true about the support for inheritance in 9b0ect-;elational models" ZZZZ 'oth single inheritance and multiple inheritance are supported
+hich of the following is true about transactions affecting the consistenc# of a database" ZZZ A transaction alwa#s leaves the database in a consistent state
+hich of the following is true about updateabilit# of views ZZZZ A view is not updateable if it involves aggregate functions and nested $ueries
+hich of the following is true about views being up to date" ZZZZ \iews are alwa#s up to date
+hich of the following is true regarding database tables" ZZZ A value ma# appear multiple times in a column
+hich of the following problems can be caused b# data redundanc# in a relational schema" ZZZZ 4, 44, and 444
+hich of the following referentiall# triggered actions are supported in S=/ when a referential integrit# constraint is violated" SE5 8>// ;E?EC5 CASCA,E
SE5 ,E1A>/5 ZZZZ 4, 444, and 4\ onl#
+hich of the following S=/ commands can be used to change, add, or drop column definitions from a table" ZZZ A/5E; 5A'/E
+hich of the following S=/ commands can be used to destro# and remove a table from the schema" ZZZZ ,;9: 5A'/E
+hich of the following S=/ statements can be used to add a row to a table" ZZZZ 48SE;5
+hich of the following S=/ statements can be used to create a relational table" ZZZ C;EA5E
+hich of the following S=/ statements can be used to modif# 0ust one row out of man# rows! in a table" >:,A5E
+hich of the following S=/ statements can be used to remove a row from a table" ZZZZ ,E/E5E
+hich of the following statements concerning normal forms is true" ZZZZ A relation that is in second normal form is also in first normal form
+hich of the following statements is are! t#picall# true of hierarchical databases" ZZZZ 4 and 44
+hich of the following t#pes of databases store data in tables and represent relationships using foreign ke#s" ZZZZZ ;elational databases
+hich of the following will a good hash function do" ZZZZ spread ke#s around the file as evenl# as possible
+ho can alwa#s give access permissions to a table" ZZZZZ the owner of the table
+ith =uer# '# E%ample, a user enters a $uer# b# ZZZZ filling in skeleton tables of the database with e%amples of what is to be retrieved
+ith respect to a relational table, what is a ke#" ZZZZ A minimal subset of columns that uni$uel# identifies a row in the table
_ is transitivel# dependent on S, if ZZZZ a! S -T A, ' and A -T _

You might also like