Corrrect Incorrect Short ans. DB design TOTAL
Introduction to Computer Science Fac. of Business Admin. and Manag. June, 2011. Ordinary Conv. Exam Type: A
Name: Surname: Group:
Multiple choice (6.5 points) Mark with a circumference the correct answer in the answers sheet (last page) Read carefully the statements and the options. There is only one correct answer Each correct question is worth ≃ 0,26 points Each erroneous answer takes away 1/3 of its value Please, mark your level of confidence in each response. It will not be taken into account in the grade. Mark Sure if you are quite sure of your answer and Unsure if you are not very sure about it. Leave it blank otherwise. 1. In which one of the following memory types data can not be written? (a)
ROM
(b)
RAM
(c)
CMOS
(d)
Flash
2. Mark the FALSE sentence: (a)
The mainboard is also called motherboard
(b)
RAM functions can be done by a ROM with higher processing capabilities
(c)
The CPU deals with the data of the programs
(d)
The instruction set of different CPUs from the same manufacturer can be different
3. A set of 8 bits is called: (a)
byte
(b)
Giga
(c)
Mega
(d)
Tera
4. The speed of the internal clock in the CPU is measured in: (a)
bytes
(b)
bits
(c)
hertzs
(d)
bauds
5. One of these brands is not a CPU’s manufacturer. Mark it (a)
Intel
(b)
Motorola
(c)
Linux
(d)
AMD
6. Mark the correct order in capacity magnitudes (a)
Kb - Tb - Mb - Gb
(b)
Kb - Mb - Gb - Tb
(c)
Pb - Mb - Gb - Tb
(d)
Mb - Kb - Gb - Tb
7. How many different values can be represented in the binary system (a)
Zero
(b)
One
(c)
Two
(d)
Infinite
8. To represent at least 125 different vales in binary, how many bits we need? (a)
7 bits
(b)
8 bits
(c)
9 bits
(d)
10 bit
9. The very first instructions during the computer start up are executed in (a)
the RAM
(b)
the CPU
(c)
the ROM
(d)
the hard disk
10. Records in a database are stored in (a)
tables
(b)
fields
(c)
keys
(d)
relationships
11. The code written in natural language that describe a sequence os stpes to solve a problem is called (a)
algorithm
(b)
source code
(c)
program
(d)
binary code
12. The operative system (a)
is used through some application software exclusively
(b)
needs an external storage unit to work
(c)
optimize the CPU usage
(d)
can not manage the execution of severl processes
13. Small programs that able I/O devices to communicate with the computer are (a)
installers
(b)
operative systems
(c)
booters
(d)
drivers
14. The opposite philosophy to store inforation in warehouses is to use (a)
real-time databases
(b)
multimedia databases
(c)
object-oriented datbases
(d)
distributed databases
15. Mark the FALSE statement about application software (a)
Some updates are available in Internet
(b)
Manages the devices
(c)
Some examples are web browsers and text processord
(d)
Not always can be installed in any computer
16. The license that allows users to use a program for a period of time is called (a)
freeware
(b)
shareware
(c)
addware
(d)
firmware
17. The interconnection network element sends the messages to their destination is the (a)
bridge
(b)
gateway
(c)
router
(d)
backbone
18. Computers in Internet (a)
are identified by their domains
(b)
are addressed by 4 numbers seperated by periods
(c)
are addressed by TCP addresses
(d)
are not identified. Only LANs do that
19. The majority of computer crimes are committed by (a)
intruders
(b)
company insiders
(c)
hackers
(d)
crackers
20. From the following URL http://www.dsic.upv.es/asignaturas/fade/inf/es/index.html, we can affirm that (a)
we are downloading a file called index.html
(b)
we are connecting to a server whose access path is www.dsic.upv.es
(c)
we are using a FTP protocol to access the file
(d)
it is a https secure connection
21. A DoS (Denial of Service) attack consist of: (a)
Disable the computer with a virus
(b)
Disable the computer with a trojan
(c)
Disable a web server
(d)
Disable a email account changing its password
22. Which one of the following measures is effective to keep a system secure? (a)
Log all the operations executed in the system
(b)
Annotate all the passwords to avoid them to get lost
(c)
To disconect the com,puter from the network when it is not used
(d)
Reinstall again the operative system
23. Mark the FALSE statement (a)
Modems transmit information using analogic signals
(b)
Direct connections are created using a modem and a phone line
(c)
The bandwidth is measured in kilobits or megabits per second
(d)
In the peer to peer model, nodes are clients and servers simultaneously
24. The media used for data transmission that is more limited regarding to distances is (a)
infrared
(b)
coaxial cable
(c)
Fiber optic
(d)
twisted pair
25. Time-shiting is a property of: (a)
e-mail that allows communitacion without wait the other speaker to be available
(b)
networks meaning that the communitacion is immediate
(c)
instant messaging allowing communication at any time
(d)
e-mail that makes communication less intrusive
Short Answer (1.5 points) – Answer each question in the marked space. – Approximate extension: 50 words. 26. Describe the time-sharing technique, used in mainframes. (0.5 points)
27. Define the system software and enumerate the programs that belong to this category. (0.5 points)
28. Enumerate and put examples of the measures that prevent the access to computers using physical access restrictions. (0.5 points)
DB Design (2 points) 29. We want to create a database to keep track of our contacts and appointments. About contacts, we need to know their names, nicks, addresses, phone noumbers and emails. Besides, the type of the relationship is stored too (friend, work, family and other). Another functionality is to keep track of the diferent appointments with those people, which take place at a date and time. Appointments have a comment associated and a group can attend them. Appointments are arrenged in places, which have a name, an address, a type and their GPS coordinates. The system allows people to check-in when they arrive, storing the date and time they checked (a person can check only once a day). Create the conceptual and the logical models for these requirements.
1.2.3.4.5.6.7.8.9.10.-
a a a a a a a a a a
d d d d d d d d d d
11.12.13.14.15.16.17.18.19.20.-
a a a a a a a a a a
d d d d d d d d d d
21.22.23.24.25.-
a a a a a
d d d d d
Unsure
Answer b c b c b c b c b c
Sure
Unsure
Answer b c b c b c b c b c b c b c b c b c b c
Sure
Unsure
Answer b c b c b c b c b c b c b c b c b c b c
Sure
Answers Sheet
Answer Key for Exam A Multiple choice (6.5 points) Mark with a circumference the correct answer in the answers sheet (last page) Read carefully the statements and the options. There is only one correct answer Each correct question is worth ≃ 0,26 points Each erroneous answer takes away 1/3 of its value Please, mark your level of confidence in each response. It will not be taken into account in the grade. Mark Sure if you are quite sure of your answer and Unsure if you are not very sure about it. Leave it blank otherwise. 1. In which one of the following memory types data can not be written? (a)
ROM
(b)
RAM
(c)
CMOS
(d)
Flash
2. Mark the FALSE sentence: (a)
The mainboard is also called motherboard
(b)
RAM functions can be done by a ROM with higher processing capabilities
(c)
The CPU deals with the data of the programs
(d)
The instruction set of different CPUs from the same manufacturer can be different
3. A set of 8 bits is called: (a) byte (b)
Giga
(c)
Mega
(d)
Tera
4. The speed of the internal clock in the CPU is measured in: (a)
bytes
(b)
bits
(c)
hertzs
(d)
bauds
5. One of these brands is not a CPU’s manufacturer. Mark it (a)
Intel
(b)
Motorola
(c)
Linux
(d)
AMD
6. Mark the correct order in capacity magnitudes (a)
Kb - Tb - Mb - Gb
(b)
Kb - Mb - Gb - Tb
(c)
Pb - Mb - Gb - Tb
(d)
Mb - Kb - Gb - Tb
7. How many different values can be represented in the binary system (a)
Zero
(b)
One
(c)
Two
(d)
Infinite
8. To represent at least 125 different vales in binary, how many bits we need? (a)
7 bits
(b)
8 bits
(c)
9 bits
(d)
10 bit
9. The very first instructions during the computer start up are executed in (a)
the RAM
(b)
the CPU
(c)
the ROM
(d)
the hard disk
10. Records in a database are stored in (a) tables (b)
fields
(c)
keys
(d)
relationships
11. The code written in natural language that describe a sequence os stpes to solve a problem is called (a) algorithm (b)
source code
(c)
program
(d)
binary code
12. The operative system (a)
is used through some application software exclusively
(b)
needs an external storage unit to work
(c)
optimize the CPU usage
(d)
can not manage the execution of severl processes
13. Small programs that able I/O devices to communicate with the computer are (a)
installers
(b)
operative systems
(c)
booters
(d)
drivers
14. The opposite philosophy to store inforation in warehouses is to use (a)
real-time databases
(b)
multimedia databases
(c)
object-oriented datbases
(d)
distributed databases
15. Mark the FALSE statement about application software (a)
Some updates are available in Internet
(b)
Manages the devices
(c)
Some examples are web browsers and text processord
(d)
Not always can be installed in any computer
16. The license that allows users to use a program for a period of time is called (a)
freeware
(b)
shareware
(c)
addware
(d)
firmware
17. The interconnection network element sends the messages to their destination is the (a)
bridge
(b)
gateway
(c)
router
(d)
backbone
18. Computers in Internet (a)
are identified by their domains
(b)
are addressed by 4 numbers seperated by periods
(c)
are addressed by TCP addresses
(d)
are not identified. Only LANs do that
19. The majority of computer crimes are committed by (a)
intruders
(b)
company insiders
(c)
hackers
(d)
crackers
20. From the following URL http://www.dsic.upv.es/asignaturas/fade/inf/es/index.html, we can affirm that (a) we are downloading a file called index.html (b)
we are connecting to a server whose access path is www.dsic.upv.es
(c)
we are using a FTP protocol to access the file
(d)
it is a https secure connection
21. A DoS (Denial of Service) attack consist of: (a)
Disable the computer with a virus
(b)
Disable the computer with a trojan
(c)
Disable a web server
(d)
Disable a email account changing its password
22. Which one of the following measures is effective to keep a system secure? (a)
Log all the operations executed in the system
(b)
Annotate all the passwords to avoid them to get lost
(c)
To disconect the com,puter from the network when it is not used
(d)
Reinstall again the operative system
23. Mark the FALSE statement (a)
Modems transmit information using analogic signals
(b)
Direct connections are created using a modem and a phone line
(c)
The bandwidth is measured in kilobits or megabits per second
(d)
In the peer to peer model, nodes are clients and servers simultaneously
24. The media used for data transmission that is more limited regarding to distances is (a)
infrared
(b)
coaxial cable
(c)
Fiber optic
(d)
twisted pair
25. Time-shiting is a property of: (a)
e-mail that allows communitacion without wait the other speaker to be available
(b)
networks meaning that the communitacion is immediate
(c)
instant messaging allowing communication at any time
(d)
e-mail that makes communication less intrusive
Short Answer (1.5 points) – Answer each question in the marked space. – Approximate extension: 50 words. 26. Describe the time-sharing technique, used in mainframes. (0.5 points) Answer: Assign the CPU to each user for a short period, changing quickly among them. Define the system software and enumerate the programs that belong to this category. (0.5 points) 27. Answer: Set of programs that hide the hardware details to users. It is formed bythe operative system, device drivers and utility programs 28. Enumerate and put examples of the measures that prevent the access to computers using physical access restrictions. (0.5 points) Answer: something you have, something you know, something you do and something about you
DB Design (2 points) 29. We want to create a database to keep track of our contacts and appointments. About contacts, we need to know their names, nicks, addresses, phone noumbers and emails. Besides, the type of the relationship is stored too (friend, work, family and other). Another functionality is to keep track of the diferent appointments with those people, which take place at a date and time. Appointments have a comment associated and a group can attend them. Appointments are arrenged in places, which have a name, an address, a type and their GPS coordinates. The system allows people to check-in when they arrive, storing the date and time they checked (a person can check only once a day). Create the conceptual and the logical models for these requirements.
Answer: Conceptual Design
type email cname
phone
nick
CONTACTS
address
n n date
attend checkin
time
n
n
PLACES
date
n
1 pname
id
placed
APPOINT time
coor
comment address
type
Logical Design CONTACTS (cname, nick, address, phone, email, type) PK: cname PLACES (pname, coor, address, type) PK: pname APPOINT (id, date, time, comment, pname) PK: id FK: pname ->PLACES ATTEND (cname, id) PK: cname, id FK: cname ->CONTACTS FK: id ->APPOINT CHECKIN (cname, pname, date, time) CP: cname, pname, date FK: cname ->CONTACTS FK: pname ->PLACES
Corrrect Incorrect Short ans. DB design TOTAL
Introduction to Computer Science Fac. of Business Admin. and Manag. June, 2011. Ordinary Conv. Exam Type: B
Name: Surname: Group:
Multiple choice (6.5 points) Mark with a circumference the correct answer in the answers sheet (last page) Read carefully the statements and the options. There is only one correct answer Each correct question is worth ≃ 0,26 points Each erroneous answer takes away 1/3 of its value Please, mark your level of confidence in each response. It will not be taken into account in the grade. Mark Sure if you are quite sure of your answer and Unsure if you are not very sure about it. Leave it blank otherwise. 1. How many different values can be represented in the binary system (a)
Zero
(b)
One
(c)
Two
(d)
Infinite
2. The very first instructions during the computer start up are executed in (a)
the RAM
(b)
the CPU
(c)
the ROM
(d)
the hard disk
3. Mark the correct order in capacity magnitudes (a)
Kb - Tb - Mb - Gb
(b)
Kb - Mb - Gb - Tb
(c)
Pb - Mb - Gb - Tb
(d)
Mb - Kb - Gb - Tb
4. Mark the FALSE sentence: (a)
The mainboard is also called motherboard
(b)
RAM functions can be done by a ROM with higher processing capabilities
(c)
The CPU deals with the data of the programs
(d)
The instruction set of different CPUs from the same manufacturer can be different
5. In which one of the following memory types data can not be written? (a)
ROM
(b)
RAM
(c)
CMOS
(d)
Flash
6. One of these brands is not a CPU’s manufacturer. Mark it (a)
Intel
(b)
Motorola
(c)
Linux
(d)
AMD
7. A set of 8 bits is called: (a)
byte
(b)
Giga
(c)
Mega
(d)
Tera
8. To represent at least 125 different vales in binary, how many bits we need? (a)
7 bits
(b)
8 bits
(c)
9 bits
(d)
10 bit
9. The speed of the internal clock in the CPU is measured in: (a)
bytes
(b)
bits
(c)
hertzs
(d)
bauds
10. The license that allows users to use a program for a period of time is called (a)
freeware
(b)
shareware
(c)
addware
(d)
firmware
11. The operative system (a)
is used through some application software exclusively
(b)
needs an external storage unit to work
(c)
optimize the CPU usage
(d)
can not manage the execution of severl processes
12. The code written in natural language that describe a sequence os stpes to solve a problem is called (a)
algorithm
(b)
source code
(c)
program
(d)
binary code
13. Mark the FALSE statement about application software (a)
Some updates are available in Internet
(b)
Manages the devices
(c)
Some examples are web browsers and text processord
(d)
Not always can be installed in any computer
14. The opposite philosophy to store inforation in warehouses is to use (a)
real-time databases
(b)
multimedia databases
(c)
object-oriented datbases
(d)
distributed databases
15. Small programs that able I/O devices to communicate with the computer are (a)
installers
(b)
operative systems
(c)
booters
(d)
drivers
16. Records in a database are stored in (a)
tables
(b)
fields
(c)
keys
(d)
relationships
17. The interconnection network element sends the messages to their destination is the (a)
bridge
(b)
gateway
(c)
router
(d)
backbone
18. Mark the FALSE statement (a)
Modems transmit information using analogic signals
(b)
Direct connections are created using a modem and a phone line
(c)
The bandwidth is measured in kilobits or megabits per second
(d)
In the peer to peer model, nodes are clients and servers simultaneously
19. Time-shiting is a property of: (a)
e-mail that allows communitacion without wait the other speaker to be available
(b)
networks meaning that the communitacion is immediate
(c)
instant messaging allowing communication at any time
(d)
e-mail that makes communication less intrusive
20. The majority of computer crimes are committed by (a)
intruders
(b)
company insiders
(c)
hackers
(d)
crackers
21. A DoS (Denial of Service) attack consist of: (a)
Disable the computer with a virus
(b)
Disable the computer with a trojan
(c)
Disable a web server
(d)
Disable a email account changing its password
22. The media used for data transmission that is more limited regarding to distances is (a)
infrared
(b)
coaxial cable
(c)
Fiber optic
(d)
twisted pair
23. From the following URL http://www.dsic.upv.es/asignaturas/fade/inf/es/index.html, we can affirm that (a)
we are downloading a file called index.html
(b)
we are connecting to a server whose access path is www.dsic.upv.es
(c)
we are using a FTP protocol to access the file
(d)
it is a https secure connection
24. Computers in Internet (a)
are identified by their domains
(b)
are addressed by 4 numbers seperated by periods
(c)
are addressed by TCP addresses
(d)
are not identified. Only LANs do that
25. Which one of the following measures is effective to keep a system secure? (a)
Log all the operations executed in the system
(b)
Annotate all the passwords to avoid them to get lost
(c)
To disconect the com,puter from the network when it is not used
(d)
Reinstall again the operative system
Short Answer (1.5 points) – Answer each question in the marked space. – Approximate extension: 50 words. 26. Describe the time-sharing technique, used in mainframes. (0.5 points)
27. Define the system software and enumerate the programs that belong to this category. (0.5 points)
28. Enumerate and put examples of the measures that prevent the access to computers using physical access restrictions. (0.5 points)
DB Design (2 points) 29. We want to create a database to keep track of our contacts and appointments. About contacts, we need to know their names, nicks, addresses, phone noumbers and emails. Besides, the type of the relationship is stored too (friend, work, family and other). Another functionality is to keep track of the diferent appointments with those people, which take place at a date and time. Appointments have a comment associated and a group can attend them. Appointments are arrenged in places, which have a name, an address, a type and their GPS coordinates. The system allows people to check-in when they arrive, storing the date and time they checked (a person can check only once a day). Create the conceptual and the logical models for these requirements.
1.2.3.4.5.6.7.8.9.10.-
a a a a a a a a a a
d d d d d d d d d d
11.12.13.14.15.16.17.18.19.20.-
a a a a a a a a a a
d d d d d d d d d d
21.22.23.24.25.-
a a a a a
d d d d d
Unsure
Answer b c b c b c b c b c
Sure
Unsure
Answer b c b c b c b c b c b c b c b c b c b c
Sure
Unsure
Answer b c b c b c b c b c b c b c b c b c b c
Sure
Answers Sheet
Answer Key for Exam B Multiple choice (6.5 points) Mark with a circumference the correct answer in the answers sheet (last page) Read carefully the statements and the options. There is only one correct answer Each correct question is worth ≃ 0,26 points Each erroneous answer takes away 1/3 of its value Please, mark your level of confidence in each response. It will not be taken into account in the grade. Mark Sure if you are quite sure of your answer and Unsure if you are not very sure about it. Leave it blank otherwise. 1. How many different values can be represented in the binary system (a)
Zero
(b)
One
(c)
Two
(d)
Infinite
2. The very first instructions during the computer start up are executed in (a)
the RAM
(b)
the CPU
(c)
the ROM
(d)
the hard disk
3. Mark the correct order in capacity magnitudes (a)
Kb - Tb - Mb - Gb
(b)
Kb - Mb - Gb - Tb
(c)
Pb - Mb - Gb - Tb
(d)
Mb - Kb - Gb - Tb
4. Mark the FALSE sentence: (a)
The mainboard is also called motherboard
(b)
RAM functions can be done by a ROM with higher processing capabilities
(c)
The CPU deals with the data of the programs
(d)
The instruction set of different CPUs from the same manufacturer can be different
5. In which one of the following memory types data can not be written? (a)
ROM
(b)
RAM
(c)
CMOS
(d)
Flash
6. One of these brands is not a CPU’s manufacturer. Mark it (a)
Intel
(b)
Motorola
(c)
Linux
(d)
AMD
7. A set of 8 bits is called: (a) byte (b)
Giga
(c)
Mega
(d)
Tera
8. To represent at least 125 different vales in binary, how many bits we need? (a)
7 bits
(b)
8 bits
(c)
9 bits
(d)
10 bit
9. The speed of the internal clock in the CPU is measured in: (a)
bytes
(b)
bits
(c)
hertzs
(d)
bauds
10. The license that allows users to use a program for a period of time is called (a)
freeware
(b)
shareware
(c)
addware
(d)
firmware
11. The operative system (a)
is used through some application software exclusively
(b)
needs an external storage unit to work
(c)
optimize the CPU usage
(d)
can not manage the execution of severl processes
12. The code written in natural language that describe a sequence os stpes to solve a problem is called (a) algorithm (b)
source code
(c)
program
(d)
binary code
13. Mark the FALSE statement about application software (a)
Some updates are available in Internet
(b)
Manages the devices
(c)
Some examples are web browsers and text processord
(d)
Not always can be installed in any computer
14. The opposite philosophy to store inforation in warehouses is to use (a)
real-time databases
(b)
multimedia databases
(c)
object-oriented datbases
(d)
distributed databases
15. Small programs that able I/O devices to communicate with the computer are (a)
installers
(b)
operative systems
(c)
booters
(d)
drivers
16. Records in a database are stored in (a) tables (b)
fields
(c)
keys
(d)
relationships
17. The interconnection network element sends the messages to their destination is the (a)
bridge
(b)
gateway
(c)
router
(d)
backbone
18. Mark the FALSE statement (a)
Modems transmit information using analogic signals
(b)
Direct connections are created using a modem and a phone line
(c)
The bandwidth is measured in kilobits or megabits per second
(d)
In the peer to peer model, nodes are clients and servers simultaneously
19. Time-shiting is a property of: (a)
e-mail that allows communitacion without wait the other speaker to be available
(b)
networks meaning that the communitacion is immediate
(c)
instant messaging allowing communication at any time
(d)
e-mail that makes communication less intrusive
20. The majority of computer crimes are committed by (a)
intruders
(b)
company insiders
(c)
hackers
(d)
crackers
21. A DoS (Denial of Service) attack consist of: (a)
Disable the computer with a virus
(b)
Disable the computer with a trojan
(c)
Disable a web server
(d)
Disable a email account changing its password
22. The media used for data transmission that is more limited regarding to distances is (a)
infrared
(b)
coaxial cable
(c)
Fiber optic
(d)
twisted pair
23. From the following URL http://www.dsic.upv.es/asignaturas/fade/inf/es/index.html, we can affirm that (a) we are downloading a file called index.html (b)
we are connecting to a server whose access path is www.dsic.upv.es
(c)
we are using a FTP protocol to access the file
(d)
it is a https secure connection
24. Computers in Internet (a)
are identified by their domains
(b)
are addressed by 4 numbers seperated by periods
(c)
are addressed by TCP addresses
(d)
are not identified. Only LANs do that
25. Which one of the following measures is effective to keep a system secure? (a)
Log all the operations executed in the system
(b)
Annotate all the passwords to avoid them to get lost
(c)
To disconect the com,puter from the network when it is not used
(d)
Reinstall again the operative system
Short Answer (1.5 points) – Answer each question in the marked space. – Approximate extension: 50 words. 26. Describe the time-sharing technique, used in mainframes. (0.5 points) Answer: Assign the CPU to each user for a short period, changing quickly among them. Define the system software and enumerate the programs that belong to this category. (0.5 points) 27. Answer: Set of programs that hide the hardware details to users. It is formed bythe operative system, device drivers and utility programs 28. Enumerate and put examples of the measures that prevent the access to computers using physical access restrictions. (0.5 points) Answer: something you have, something you know, something you do and something about you
DB Design (2 points) 29. We want to create a database to keep track of our contacts and appointments. About contacts, we need to know their names, nicks, addresses, phone noumbers and emails. Besides, the type of the relationship is stored too (friend, work, family and other). Another functionality is to keep track of the diferent appointments with those people, which take place at a date and time. Appointments have a comment associated and a group can attend them. Appointments are arrenged in places, which have a name, an address, a type and their GPS coordinates. The system allows people to check-in when they arrive, storing the date and time they checked (a person can check only once a day). Create the conceptual and the logical models for these requirements.
Answer: Conceptual Design
type email cname
phone
nick
CONTACTS
address
n n date
attend checkin
time
n
n
PLACES
date
n
1 pname
id
placed
APPOINT time
coor
comment address
type
Logical Design CONTACTS (cname, nick, address, phone, email, type) PK: cname PLACES (pname, coor, address, type) PK: pname APPOINT (id, date, time, comment, pname) PK: id FK: pname ->PLACES ATTEND (cname, id) PK: cname, id FK: cname ->CONTACTS FK: id ->APPOINT CHECKIN (cname, pname, date, time) CP: cname, pname, date FK: cname ->CONTACTS FK: pname ->PLACES