Introduction to Computer Science

Corrrect Incorrect Short ans. DB design TOTAL Introduction to Computer Science Fac. of Business Admin. and Manag. June, 2011. Ordinary Conv. Exam Typ...
Author: Clifton Hall
3 downloads 3 Views 127KB Size
Corrrect Incorrect Short ans. DB design TOTAL

Introduction to Computer Science Fac. of Business Admin. and Manag. June, 2011. Ordinary Conv. Exam Type: A

Name: Surname: Group:

Multiple choice (6.5 points) Mark with a circumference the correct answer in the answers sheet (last page) Read carefully the statements and the options. There is only one correct answer Each correct question is worth ≃ 0,26 points Each erroneous answer takes away 1/3 of its value Please, mark your level of confidence in each response. It will not be taken into account in the grade. Mark Sure if you are quite sure of your answer and Unsure if you are not very sure about it. Leave it blank otherwise. 1. In which one of the following memory types data can not be written? (a)

ROM

(b)

RAM

(c)

CMOS

(d)

Flash

2. Mark the FALSE sentence: (a)

The mainboard is also called motherboard

(b)

RAM functions can be done by a ROM with higher processing capabilities

(c)

The CPU deals with the data of the programs

(d)

The instruction set of different CPUs from the same manufacturer can be different

3. A set of 8 bits is called: (a)

byte

(b)

Giga

(c)

Mega

(d)

Tera

4. The speed of the internal clock in the CPU is measured in: (a)

bytes

(b)

bits

(c)

hertzs

(d)

bauds

5. One of these brands is not a CPU’s manufacturer. Mark it (a)

Intel

(b)

Motorola

(c)

Linux

(d)

AMD

6. Mark the correct order in capacity magnitudes (a)

Kb - Tb - Mb - Gb

(b)

Kb - Mb - Gb - Tb

(c)

Pb - Mb - Gb - Tb

(d)

Mb - Kb - Gb - Tb

7. How many different values can be represented in the binary system (a)

Zero

(b)

One

(c)

Two

(d)

Infinite

8. To represent at least 125 different vales in binary, how many bits we need? (a)

7 bits

(b)

8 bits

(c)

9 bits

(d)

10 bit

9. The very first instructions during the computer start up are executed in (a)

the RAM

(b)

the CPU

(c)

the ROM

(d)

the hard disk

10. Records in a database are stored in (a)

tables

(b)

fields

(c)

keys

(d)

relationships

11. The code written in natural language that describe a sequence os stpes to solve a problem is called (a)

algorithm

(b)

source code

(c)

program

(d)

binary code

12. The operative system (a)

is used through some application software exclusively

(b)

needs an external storage unit to work

(c)

optimize the CPU usage

(d)

can not manage the execution of severl processes

13. Small programs that able I/O devices to communicate with the computer are (a)

installers

(b)

operative systems

(c)

booters

(d)

drivers

14. The opposite philosophy to store inforation in warehouses is to use (a)

real-time databases

(b)

multimedia databases

(c)

object-oriented datbases

(d)

distributed databases

15. Mark the FALSE statement about application software (a)

Some updates are available in Internet

(b)

Manages the devices

(c)

Some examples are web browsers and text processord

(d)

Not always can be installed in any computer

16. The license that allows users to use a program for a period of time is called (a)

freeware

(b)

shareware

(c)

addware

(d)

firmware

17. The interconnection network element sends the messages to their destination is the (a)

bridge

(b)

gateway

(c)

router

(d)

backbone

18. Computers in Internet (a)

are identified by their domains

(b)

are addressed by 4 numbers seperated by periods

(c)

are addressed by TCP addresses

(d)

are not identified. Only LANs do that

19. The majority of computer crimes are committed by (a)

intruders

(b)

company insiders

(c)

hackers

(d)

crackers

20. From the following URL http://www.dsic.upv.es/asignaturas/fade/inf/es/index.html, we can affirm that (a)

we are downloading a file called index.html

(b)

we are connecting to a server whose access path is www.dsic.upv.es

(c)

we are using a FTP protocol to access the file

(d)

it is a https secure connection

21. A DoS (Denial of Service) attack consist of: (a)

Disable the computer with a virus

(b)

Disable the computer with a trojan

(c)

Disable a web server

(d)

Disable a email account changing its password

22. Which one of the following measures is effective to keep a system secure? (a)

Log all the operations executed in the system

(b)

Annotate all the passwords to avoid them to get lost

(c)

To disconect the com,puter from the network when it is not used

(d)

Reinstall again the operative system

23. Mark the FALSE statement (a)

Modems transmit information using analogic signals

(b)

Direct connections are created using a modem and a phone line

(c)

The bandwidth is measured in kilobits or megabits per second

(d)

In the peer to peer model, nodes are clients and servers simultaneously

24. The media used for data transmission that is more limited regarding to distances is (a)

infrared

(b)

coaxial cable

(c)

Fiber optic

(d)

twisted pair

25. Time-shiting is a property of: (a)

e-mail that allows communitacion without wait the other speaker to be available

(b)

networks meaning that the communitacion is immediate

(c)

instant messaging allowing communication at any time

(d)

e-mail that makes communication less intrusive

Short Answer (1.5 points) – Answer each question in the marked space. – Approximate extension: 50 words. 26. Describe the time-sharing technique, used in mainframes. (0.5 points)

27. Define the system software and enumerate the programs that belong to this category. (0.5 points)

28. Enumerate and put examples of the measures that prevent the access to computers using physical access restrictions. (0.5 points)

DB Design (2 points) 29. We want to create a database to keep track of our contacts and appointments. About contacts, we need to know their names, nicks, addresses, phone noumbers and emails. Besides, the type of the relationship is stored too (friend, work, family and other). Another functionality is to keep track of the diferent appointments with those people, which take place at a date and time. Appointments have a comment associated and a group can attend them. Appointments are arrenged in places, which have a name, an address, a type and their GPS coordinates. The system allows people to check-in when they arrive, storing the date and time they checked (a person can check only once a day). Create the conceptual and the logical models for these requirements.

1.2.3.4.5.6.7.8.9.10.-

a a a a a a a a a a

d d d d d d d d d d

11.12.13.14.15.16.17.18.19.20.-

a a a a a a a a a a

d d d d d d d d d d

21.22.23.24.25.-

a a a a a

d d d d d

Unsure

Answer b c b c b c b c b c

Sure

Unsure

Answer b c b c b c b c b c b c b c b c b c b c

Sure

Unsure

Answer b c b c b c b c b c b c b c b c b c b c

Sure

Answers Sheet

Answer Key for Exam A Multiple choice (6.5 points) Mark with a circumference the correct answer in the answers sheet (last page) Read carefully the statements and the options. There is only one correct answer Each correct question is worth ≃ 0,26 points Each erroneous answer takes away 1/3 of its value Please, mark your level of confidence in each response. It will not be taken into account in the grade. Mark Sure if you are quite sure of your answer and Unsure if you are not very sure about it. Leave it blank otherwise. 1. In which one of the following memory types data can not be written? (a)

ROM

(b)

RAM

(c)

CMOS

(d)

Flash

2. Mark the FALSE sentence: (a)

The mainboard is also called motherboard

(b)

RAM functions can be done by a ROM with higher processing capabilities

(c)

The CPU deals with the data of the programs

(d)

The instruction set of different CPUs from the same manufacturer can be different

3. A set of 8 bits is called: (a) byte (b)

Giga

(c)

Mega

(d)

Tera

4. The speed of the internal clock in the CPU is measured in: (a)

bytes

(b)

bits

(c)

hertzs

(d)

bauds

5. One of these brands is not a CPU’s manufacturer. Mark it (a)

Intel

(b)

Motorola

(c)

Linux

(d)

AMD

6. Mark the correct order in capacity magnitudes (a)

Kb - Tb - Mb - Gb

(b)

Kb - Mb - Gb - Tb

(c)

Pb - Mb - Gb - Tb

(d)

Mb - Kb - Gb - Tb

7. How many different values can be represented in the binary system (a)

Zero

(b)

One

(c)

Two

(d)

Infinite

8. To represent at least 125 different vales in binary, how many bits we need? (a)

7 bits

(b)

8 bits

(c)

9 bits

(d)

10 bit

9. The very first instructions during the computer start up are executed in (a)

the RAM

(b)

the CPU

(c)

the ROM

(d)

the hard disk

10. Records in a database are stored in (a) tables (b)

fields

(c)

keys

(d)

relationships

11. The code written in natural language that describe a sequence os stpes to solve a problem is called (a) algorithm (b)

source code

(c)

program

(d)

binary code

12. The operative system (a)

is used through some application software exclusively

(b)

needs an external storage unit to work

(c)

optimize the CPU usage

(d)

can not manage the execution of severl processes

13. Small programs that able I/O devices to communicate with the computer are (a)

installers

(b)

operative systems

(c)

booters

(d)

drivers

14. The opposite philosophy to store inforation in warehouses is to use (a)

real-time databases

(b)

multimedia databases

(c)

object-oriented datbases

(d)

distributed databases

15. Mark the FALSE statement about application software (a)

Some updates are available in Internet

(b)

Manages the devices

(c)

Some examples are web browsers and text processord

(d)

Not always can be installed in any computer

16. The license that allows users to use a program for a period of time is called (a)

freeware

(b)

shareware

(c)

addware

(d)

firmware

17. The interconnection network element sends the messages to their destination is the (a)

bridge

(b)

gateway

(c)

router

(d)

backbone

18. Computers in Internet (a)

are identified by their domains

(b)

are addressed by 4 numbers seperated by periods

(c)

are addressed by TCP addresses

(d)

are not identified. Only LANs do that

19. The majority of computer crimes are committed by (a)

intruders

(b)

company insiders

(c)

hackers

(d)

crackers

20. From the following URL http://www.dsic.upv.es/asignaturas/fade/inf/es/index.html, we can affirm that (a) we are downloading a file called index.html (b)

we are connecting to a server whose access path is www.dsic.upv.es

(c)

we are using a FTP protocol to access the file

(d)

it is a https secure connection

21. A DoS (Denial of Service) attack consist of: (a)

Disable the computer with a virus

(b)

Disable the computer with a trojan

(c)

Disable a web server

(d)

Disable a email account changing its password

22. Which one of the following measures is effective to keep a system secure? (a)

Log all the operations executed in the system

(b)

Annotate all the passwords to avoid them to get lost

(c)

To disconect the com,puter from the network when it is not used

(d)

Reinstall again the operative system

23. Mark the FALSE statement (a)

Modems transmit information using analogic signals

(b)

Direct connections are created using a modem and a phone line

(c)

The bandwidth is measured in kilobits or megabits per second

(d)

In the peer to peer model, nodes are clients and servers simultaneously

24. The media used for data transmission that is more limited regarding to distances is (a)

infrared

(b)

coaxial cable

(c)

Fiber optic

(d)

twisted pair

25. Time-shiting is a property of: (a)

e-mail that allows communitacion without wait the other speaker to be available

(b)

networks meaning that the communitacion is immediate

(c)

instant messaging allowing communication at any time

(d)

e-mail that makes communication less intrusive

Short Answer (1.5 points) – Answer each question in the marked space. – Approximate extension: 50 words. 26. Describe the time-sharing technique, used in mainframes. (0.5 points) Answer: Assign the CPU to each user for a short period, changing quickly among them. Define the system software and enumerate the programs that belong to this category. (0.5 points) 27. Answer: Set of programs that hide the hardware details to users. It is formed bythe operative system, device drivers and utility programs 28. Enumerate and put examples of the measures that prevent the access to computers using physical access restrictions. (0.5 points) Answer: something you have, something you know, something you do and something about you

DB Design (2 points) 29. We want to create a database to keep track of our contacts and appointments. About contacts, we need to know their names, nicks, addresses, phone noumbers and emails. Besides, the type of the relationship is stored too (friend, work, family and other). Another functionality is to keep track of the diferent appointments with those people, which take place at a date and time. Appointments have a comment associated and a group can attend them. Appointments are arrenged in places, which have a name, an address, a type and their GPS coordinates. The system allows people to check-in when they arrive, storing the date and time they checked (a person can check only once a day). Create the conceptual and the logical models for these requirements.

Answer: Conceptual Design

type email cname

phone

nick

CONTACTS

address

n n date

attend checkin

time

n

n

PLACES

date

n

1 pname

id

placed

APPOINT time

coor

comment address

type

Logical Design CONTACTS (cname, nick, address, phone, email, type) PK: cname PLACES (pname, coor, address, type) PK: pname APPOINT (id, date, time, comment, pname) PK: id FK: pname ->PLACES ATTEND (cname, id) PK: cname, id FK: cname ->CONTACTS FK: id ->APPOINT CHECKIN (cname, pname, date, time) CP: cname, pname, date FK: cname ->CONTACTS FK: pname ->PLACES

Corrrect Incorrect Short ans. DB design TOTAL

Introduction to Computer Science Fac. of Business Admin. and Manag. June, 2011. Ordinary Conv. Exam Type: B

Name: Surname: Group:

Multiple choice (6.5 points) Mark with a circumference the correct answer in the answers sheet (last page) Read carefully the statements and the options. There is only one correct answer Each correct question is worth ≃ 0,26 points Each erroneous answer takes away 1/3 of its value Please, mark your level of confidence in each response. It will not be taken into account in the grade. Mark Sure if you are quite sure of your answer and Unsure if you are not very sure about it. Leave it blank otherwise. 1. How many different values can be represented in the binary system (a)

Zero

(b)

One

(c)

Two

(d)

Infinite

2. The very first instructions during the computer start up are executed in (a)

the RAM

(b)

the CPU

(c)

the ROM

(d)

the hard disk

3. Mark the correct order in capacity magnitudes (a)

Kb - Tb - Mb - Gb

(b)

Kb - Mb - Gb - Tb

(c)

Pb - Mb - Gb - Tb

(d)

Mb - Kb - Gb - Tb

4. Mark the FALSE sentence: (a)

The mainboard is also called motherboard

(b)

RAM functions can be done by a ROM with higher processing capabilities

(c)

The CPU deals with the data of the programs

(d)

The instruction set of different CPUs from the same manufacturer can be different

5. In which one of the following memory types data can not be written? (a)

ROM

(b)

RAM

(c)

CMOS

(d)

Flash

6. One of these brands is not a CPU’s manufacturer. Mark it (a)

Intel

(b)

Motorola

(c)

Linux

(d)

AMD

7. A set of 8 bits is called: (a)

byte

(b)

Giga

(c)

Mega

(d)

Tera

8. To represent at least 125 different vales in binary, how many bits we need? (a)

7 bits

(b)

8 bits

(c)

9 bits

(d)

10 bit

9. The speed of the internal clock in the CPU is measured in: (a)

bytes

(b)

bits

(c)

hertzs

(d)

bauds

10. The license that allows users to use a program for a period of time is called (a)

freeware

(b)

shareware

(c)

addware

(d)

firmware

11. The operative system (a)

is used through some application software exclusively

(b)

needs an external storage unit to work

(c)

optimize the CPU usage

(d)

can not manage the execution of severl processes

12. The code written in natural language that describe a sequence os stpes to solve a problem is called (a)

algorithm

(b)

source code

(c)

program

(d)

binary code

13. Mark the FALSE statement about application software (a)

Some updates are available in Internet

(b)

Manages the devices

(c)

Some examples are web browsers and text processord

(d)

Not always can be installed in any computer

14. The opposite philosophy to store inforation in warehouses is to use (a)

real-time databases

(b)

multimedia databases

(c)

object-oriented datbases

(d)

distributed databases

15. Small programs that able I/O devices to communicate with the computer are (a)

installers

(b)

operative systems

(c)

booters

(d)

drivers

16. Records in a database are stored in (a)

tables

(b)

fields

(c)

keys

(d)

relationships

17. The interconnection network element sends the messages to their destination is the (a)

bridge

(b)

gateway

(c)

router

(d)

backbone

18. Mark the FALSE statement (a)

Modems transmit information using analogic signals

(b)

Direct connections are created using a modem and a phone line

(c)

The bandwidth is measured in kilobits or megabits per second

(d)

In the peer to peer model, nodes are clients and servers simultaneously

19. Time-shiting is a property of: (a)

e-mail that allows communitacion without wait the other speaker to be available

(b)

networks meaning that the communitacion is immediate

(c)

instant messaging allowing communication at any time

(d)

e-mail that makes communication less intrusive

20. The majority of computer crimes are committed by (a)

intruders

(b)

company insiders

(c)

hackers

(d)

crackers

21. A DoS (Denial of Service) attack consist of: (a)

Disable the computer with a virus

(b)

Disable the computer with a trojan

(c)

Disable a web server

(d)

Disable a email account changing its password

22. The media used for data transmission that is more limited regarding to distances is (a)

infrared

(b)

coaxial cable

(c)

Fiber optic

(d)

twisted pair

23. From the following URL http://www.dsic.upv.es/asignaturas/fade/inf/es/index.html, we can affirm that (a)

we are downloading a file called index.html

(b)

we are connecting to a server whose access path is www.dsic.upv.es

(c)

we are using a FTP protocol to access the file

(d)

it is a https secure connection

24. Computers in Internet (a)

are identified by their domains

(b)

are addressed by 4 numbers seperated by periods

(c)

are addressed by TCP addresses

(d)

are not identified. Only LANs do that

25. Which one of the following measures is effective to keep a system secure? (a)

Log all the operations executed in the system

(b)

Annotate all the passwords to avoid them to get lost

(c)

To disconect the com,puter from the network when it is not used

(d)

Reinstall again the operative system

Short Answer (1.5 points) – Answer each question in the marked space. – Approximate extension: 50 words. 26. Describe the time-sharing technique, used in mainframes. (0.5 points)

27. Define the system software and enumerate the programs that belong to this category. (0.5 points)

28. Enumerate and put examples of the measures that prevent the access to computers using physical access restrictions. (0.5 points)

DB Design (2 points) 29. We want to create a database to keep track of our contacts and appointments. About contacts, we need to know their names, nicks, addresses, phone noumbers and emails. Besides, the type of the relationship is stored too (friend, work, family and other). Another functionality is to keep track of the diferent appointments with those people, which take place at a date and time. Appointments have a comment associated and a group can attend them. Appointments are arrenged in places, which have a name, an address, a type and their GPS coordinates. The system allows people to check-in when they arrive, storing the date and time they checked (a person can check only once a day). Create the conceptual and the logical models for these requirements.

1.2.3.4.5.6.7.8.9.10.-

a a a a a a a a a a

d d d d d d d d d d

11.12.13.14.15.16.17.18.19.20.-

a a a a a a a a a a

d d d d d d d d d d

21.22.23.24.25.-

a a a a a

d d d d d

Unsure

Answer b c b c b c b c b c

Sure

Unsure

Answer b c b c b c b c b c b c b c b c b c b c

Sure

Unsure

Answer b c b c b c b c b c b c b c b c b c b c

Sure

Answers Sheet

Answer Key for Exam B Multiple choice (6.5 points) Mark with a circumference the correct answer in the answers sheet (last page) Read carefully the statements and the options. There is only one correct answer Each correct question is worth ≃ 0,26 points Each erroneous answer takes away 1/3 of its value Please, mark your level of confidence in each response. It will not be taken into account in the grade. Mark Sure if you are quite sure of your answer and Unsure if you are not very sure about it. Leave it blank otherwise. 1. How many different values can be represented in the binary system (a)

Zero

(b)

One

(c)

Two

(d)

Infinite

2. The very first instructions during the computer start up are executed in (a)

the RAM

(b)

the CPU

(c)

the ROM

(d)

the hard disk

3. Mark the correct order in capacity magnitudes (a)

Kb - Tb - Mb - Gb

(b)

Kb - Mb - Gb - Tb

(c)

Pb - Mb - Gb - Tb

(d)

Mb - Kb - Gb - Tb

4. Mark the FALSE sentence: (a)

The mainboard is also called motherboard

(b)

RAM functions can be done by a ROM with higher processing capabilities

(c)

The CPU deals with the data of the programs

(d)

The instruction set of different CPUs from the same manufacturer can be different

5. In which one of the following memory types data can not be written? (a)

ROM

(b)

RAM

(c)

CMOS

(d)

Flash

6. One of these brands is not a CPU’s manufacturer. Mark it (a)

Intel

(b)

Motorola

(c)

Linux

(d)

AMD

7. A set of 8 bits is called: (a) byte (b)

Giga

(c)

Mega

(d)

Tera

8. To represent at least 125 different vales in binary, how many bits we need? (a)

7 bits

(b)

8 bits

(c)

9 bits

(d)

10 bit

9. The speed of the internal clock in the CPU is measured in: (a)

bytes

(b)

bits

(c)

hertzs

(d)

bauds

10. The license that allows users to use a program for a period of time is called (a)

freeware

(b)

shareware

(c)

addware

(d)

firmware

11. The operative system (a)

is used through some application software exclusively

(b)

needs an external storage unit to work

(c)

optimize the CPU usage

(d)

can not manage the execution of severl processes

12. The code written in natural language that describe a sequence os stpes to solve a problem is called (a) algorithm (b)

source code

(c)

program

(d)

binary code

13. Mark the FALSE statement about application software (a)

Some updates are available in Internet

(b)

Manages the devices

(c)

Some examples are web browsers and text processord

(d)

Not always can be installed in any computer

14. The opposite philosophy to store inforation in warehouses is to use (a)

real-time databases

(b)

multimedia databases

(c)

object-oriented datbases

(d)

distributed databases

15. Small programs that able I/O devices to communicate with the computer are (a)

installers

(b)

operative systems

(c)

booters

(d)

drivers

16. Records in a database are stored in (a) tables (b)

fields

(c)

keys

(d)

relationships

17. The interconnection network element sends the messages to their destination is the (a)

bridge

(b)

gateway

(c)

router

(d)

backbone

18. Mark the FALSE statement (a)

Modems transmit information using analogic signals

(b)

Direct connections are created using a modem and a phone line

(c)

The bandwidth is measured in kilobits or megabits per second

(d)

In the peer to peer model, nodes are clients and servers simultaneously

19. Time-shiting is a property of: (a)

e-mail that allows communitacion without wait the other speaker to be available

(b)

networks meaning that the communitacion is immediate

(c)

instant messaging allowing communication at any time

(d)

e-mail that makes communication less intrusive

20. The majority of computer crimes are committed by (a)

intruders

(b)

company insiders

(c)

hackers

(d)

crackers

21. A DoS (Denial of Service) attack consist of: (a)

Disable the computer with a virus

(b)

Disable the computer with a trojan

(c)

Disable a web server

(d)

Disable a email account changing its password

22. The media used for data transmission that is more limited regarding to distances is (a)

infrared

(b)

coaxial cable

(c)

Fiber optic

(d)

twisted pair

23. From the following URL http://www.dsic.upv.es/asignaturas/fade/inf/es/index.html, we can affirm that (a) we are downloading a file called index.html (b)

we are connecting to a server whose access path is www.dsic.upv.es

(c)

we are using a FTP protocol to access the file

(d)

it is a https secure connection

24. Computers in Internet (a)

are identified by their domains

(b)

are addressed by 4 numbers seperated by periods

(c)

are addressed by TCP addresses

(d)

are not identified. Only LANs do that

25. Which one of the following measures is effective to keep a system secure? (a)

Log all the operations executed in the system

(b)

Annotate all the passwords to avoid them to get lost

(c)

To disconect the com,puter from the network when it is not used

(d)

Reinstall again the operative system

Short Answer (1.5 points) – Answer each question in the marked space. – Approximate extension: 50 words. 26. Describe the time-sharing technique, used in mainframes. (0.5 points) Answer: Assign the CPU to each user for a short period, changing quickly among them. Define the system software and enumerate the programs that belong to this category. (0.5 points) 27. Answer: Set of programs that hide the hardware details to users. It is formed bythe operative system, device drivers and utility programs 28. Enumerate and put examples of the measures that prevent the access to computers using physical access restrictions. (0.5 points) Answer: something you have, something you know, something you do and something about you

DB Design (2 points) 29. We want to create a database to keep track of our contacts and appointments. About contacts, we need to know their names, nicks, addresses, phone noumbers and emails. Besides, the type of the relationship is stored too (friend, work, family and other). Another functionality is to keep track of the diferent appointments with those people, which take place at a date and time. Appointments have a comment associated and a group can attend them. Appointments are arrenged in places, which have a name, an address, a type and their GPS coordinates. The system allows people to check-in when they arrive, storing the date and time they checked (a person can check only once a day). Create the conceptual and the logical models for these requirements.

Answer: Conceptual Design

type email cname

phone

nick

CONTACTS

address

n n date

attend checkin

time

n

n

PLACES

date

n

1 pname

id

placed

APPOINT time

coor

comment address

type

Logical Design CONTACTS (cname, nick, address, phone, email, type) PK: cname PLACES (pname, coor, address, type) PK: pname APPOINT (id, date, time, comment, pname) PK: id FK: pname ->PLACES ATTEND (cname, id) PK: cname, id FK: cname ->CONTACTS FK: id ->APPOINT CHECKIN (cname, pname, date, time) CP: cname, pname, date FK: cname ->CONTACTS FK: pname ->PLACES

Suggest Documents