Professional Documents
Culture Documents
Questions and Answers
Questions and Answers
ASK ANSWER
It is when a data is present in more than one table (file) in a data model.
1 What is Data Redundancy?
9 What is a relational data base? It is one in which the information is stored in the form of tables, which are
logically related through common fields (attributes, columns).
What does it mean that a relationship between It means that an occurrence (or record) of one entity is related to only one
11
two entities is ONE to ONE? occurrence of another entity and vice versa.
What does it mean that a relationship between It means that one occurrence (or record) of one entity is related to several one
12
two entities is ONE to MANY? occurrences of another entity.
What does it mean that a relationship between It means that several occurrences (or records) of one entity are related to
13
two entities is MANY to MANY? several occurrences of another entity.
It is the centralized set of logical attributes that specify the identification and
14 What is the Data Dictionary? characteristics of the data that is managed in the Database.
MENTION FIVE DISADVANTAGES OF THE REDUNDANCY, INCONSISTENCY, LOW POSSIBILITY OF DATA SHARING,
19
AGGREGATION APPROACH IN DATA INFLEXIBILITY, POOR STANDARDIZATION, LOW PROGRAMMER
PROCESSING PRODUCTIVITY, EXCESSIVE MAINTENANCE.
THE MAIN FEATURE IS THE INDEPENDENCE OF THE DATA WITH
RESPECT TO THE PROGRAM THAT USES THEM, THERE IS CENTRALIZED
MENTION THE MAIN FEATURE OF THE
20 CONTROL OF THE PROTECTION, ENTRY, MODIFICATION, DELETION AND
DATABASE APPROACH
RECOVERY OPERATIONS OF DATA.
ONE OF THE ELEMENTS OF THE DATABASE DATA BASE MANAGEMENT SYSTEM OR DATABASE MANAGEMENT
21 APPROACH IS THE DBMS, EXPLAIN SUCH SYSTEM IS A SOFTWARE THAT ALLOWS YOU TO MANAGE ONE OR
ELEMENT MORE DATABASES AND ALSO THE DATA DICTIONARY.
EVERY DATABASE MANAGEMENT SYSTEM DATA DEFINITION FUNCTION, DATA MANIPULATION FUNCTION AND
22
HAS THREE MAIN FUNCTIONS, MENTION DATA SECURITY FUNCTION.
THESE FUNCTIONS
DEFINE THE DATA MANIPULATION IT ALLOWS YOU TO STORE, MODIFY, DELETE AND RECOVER DATA
FUNCTION PRESENTED IN EVERY FROM THE DATABASE, THIS IS ACHIEVED THROUGH THE DATA
23 DATABASE MANAGEMENT SYSTEM OR MANIPULATION LANGUAGE -DATA MANIPULATION LANGUAGE OR DML-
DBMS
ACCESS IS NOT DEFINED AS A DATABASE MANAGEMENT SYSTEM OR
EXPLAIN WHY IT IS ESTABLISHED THAT
DBMS BECAUSE IT DOES NOT PRESENT THE FUNCTION OF DATA
24 ACCESS IS NOT A SYSTEM
DATABASE ADMINISTRATOR SECURITY, IT ONLY PRESENTS THE FUNCTIONS OF DATA DEFINITION
AND MANIPULATION.
DEVELOP A PARTNERSHIP EMPLOYEE ENTITY, THERE ARE EMPLOYEES WHO ARE MARRIED
38 RECURSIVE ONE-TO-ONE TYPE AMONG THEM, THAT IS, THEY HAVE A ONE-TO-ONE ASSOCIATION
IT IS DEFINED AS AN ABSTRACT DESCRIPTION OF DATA ABOUT
39 DEFINE THE CONCEPT DATA MODEL ENTITIES AND EXISTING ASSOCIATIONS BETWEEN THEM, A DATA
MODEL EXACTLY AND COMPLETELY REPRESENTS THE DATA
REQUIRED IN THE ORGANIZATION AND IS EASY TO UNDERSTAND.
BECAUSE THE NEED FOR SYSTEM SYSTEMS ANALYSIS AND DESIGN IS USED TO ANALYZE, DESIGN AND
ANALYSIS AND DESIGN IS CONSIDERED AS IMPLEMENT IMPROVEMENTS IN BUSINESS OPERATIONS THAT CAN BE
70 A CHARACTERISTICS OF THE ACHIEVED THROUGH THE USE OF COMPUTERIZED INFORMATION
DEVELOPMENT OF ANY INFORMATION SYSTEMS. THE INSTALLATION OF A SYSTEM WITHOUT PLANNING
SYSTEM
THE ANALYST NOT ONLY DEVELOPS TECHNICAL SOLUTIONS, BUT
REDEFINES THE CONFIGURATIONS, INTERACTIONS, ACTIVITIES OF THE
EXPLAIN WHY THE SYSTEMS ANALYST IS
71 POSITIONS AND THE POWER RELATIONSHIPS OF DIFFERENT
CONSIDERED AS AN AGENT OF CHANGE
INSTITUTIONAL GROUPS. THE ANALYST IS THE CATALYST FOR THE
ENTIRE CHANGE PROCESS AND
72 does not exist does not exist
What function does the Dhcp Server play in a It is used to automatically assign IP to the machines that connect to the network.
73
network.
1,- Shared folder permissions are applicable to folders, however NTFS are
Name 1 differences between shared folder applicable to folders and files. 2.- Ntfs Permissions are applicable only on ntfs
74
permissions and ntfs volumes, however, shared folder permissions are applicable on fat and ntfs
volumes
DNS and wins are name resolution methods. The difference between these 2
What is the main difference between DNS and
75 methods is that wins does not support hierarchy of DNS differences, that is why
Wins?
DNS is the internet resolution method.
Name the layers of the OSI model in ascending 1,- Physical Layer 2,- Data Link Layer 3,- Network Layer 4,- Transport Layer, 5 -
81
order Session Layer, 6 - Presentation Layer 7- Application Layer
The components of this type of architecture are 3:
1. Client: He is the one who sends a service request. In this context we refer to
the
What are the components of a client/server browser or examiner.
82 architecture oriented to the development of web 2. Server: process that passively waits for communication.
pages. 3. Communication protocols:
– Defines the communication rules between the client and the server.
– Within these protocols we have TCP-IP as a standard protocol on the WEB.
The most useful protocols are HTTP, FTP and, TELNET or SSH:
** HTTP: (Hyper Text Transfer Protocol) Protocol used in the World Wide Web
PORT 80.
Uses of HTTP
• Allows communication between a client and a web server.
The components of this type of architecture are 3:
1. Client: He is the one who sends a service request. In this context we refer to
the
Specify which protocols are useful for the browser or examiner.
development, implementation and maintenance 2. Server: process that passively waits for communication.
86
of a Website. 3. Communication protocols:
– Defines the communication rules between the client and the server.
– Within these protocols we have TCP-IP as a standard protocol on the WEB.
1 It is based on the exchange of text.
The Hypertext Transfer Protocol is the set of rules for exchanging files (text,
graphic images, sound, video and other multimedia files) over the "Word Wide
Web." In relation to the TCP/IP protocol suite (which are the basis for the
exchange of information within the network), HTTP is an application for this
protocol.
2 * FTP Fil Tr nfr Pr tl Pr tl drl tr nfrnidrih
What does it mean and what relationship does an ISP means Internet Service Provider ("Internet Service Provider"), as its name
89
ISP have on the Internet. indicates, ISP is the service provided by the companies that provide us with the
Internet, in Chile the best known are terra, entel, vtr, etc.
Description of the Webpay System.
The Webpay service is based on a computer system, developed to allow
cardholders to make payments with Credit Cards over the Internet,
under the concept of online authorization and capture transactions.
To use the Webpay service, the client (companies and merchants affiliated with
Transbank),
must integrate into their website, a connection software provided by Transbank,
called
90 How the WebPay Service works "Commerce Connection Kit (KCC)". This will allow them to accept payments
online.
Once the user has selected the products they want to buy and decides to pay
with Card
of Credit, the company or Commerce, through the KCC, will establish a
connection with a Transbank server of the Webpay service, which will display a
form that
will ask the user to enter their Credit Card information, which will then travel to
the
central computer, which will authorize or reject the transaction.
If the transaction is approved, the response will be accompanied by rn or d
Receives authorization requests for transactions carried out via the Internet
by cardholders, and sends them a response through the same Internet network.
Processes approved transactions and pays them the total sales, minus
commissions,
the sale cancellations and the charges generated for the collection and the
others that the
91 What is the Service Provided by TransBank
company or Commerce authorizes.
Provides the client with information on the transactions carried out through the
system, generating
online, a detail file with the total of the transactions, which includes the result
informed by Transbank ("Approval", "Rejection" or "Not processed").
96 What communications characteristic defines the The bandwidth of the transmission medium and its signal-to-noise ratio.
transmission capacity of the link in bps.
A HUB in an Ethernet network has the main
97 It acts as a multiport repeater, defining collision domains.
characteristic.
A Switch in an Ethernet network has the main
98 Perform microsegmentation by defining diffusion domains
characteristic.
Tell the difference between FTP and TFTP layer
99 FTP is connection-oriented and TFTP is disconnection-oriented.
7 protocol
A Router is an interconnection device designed Perform packet routing based on logical addressing and perform switching
100
to. between its ports.
What is the difference between an IP address The IP address falls into a logical addressing scheme, while the MAC uses a flat
104
and a MAC address? physical addressing scheme.
106 In the TCP/IP model, which protocol performs TCP, transport layer protocol.
packet segmentation and sequencing?
Indicate the name that the first partition should
107 SWAP partition
have in Linux
How much space is recommended to allocate to Double the ram memory with a cap of 256 MB.
108
the SWAP partition in Linux? If the PC has 64 MB of Ram, it must assign 128 MB of SWAP
How many consoles can you work on
109 6 plus the center console
simultaneously in Linux?
Name at least 3 desktops that you can start Linux
110 GNOME, KDE, WINDOW MAKER
with
Indicate how to enter or with what instruction you You must enter the command line as root and then type the following instruction
113
should call the graphical window where the in lowercase: linuxconf
network, users and work groups are configured.
On the command line how is the network The network administrator (root) will appear with a # sign, while a user will
115
administrator different from the users? appear with a $ sign
-ftp: Used to connect 2 or more PCs and transfer files from the server to the
Tell the difference between an ftp and nfs server
116 client. '-nfs: Used to transfer or export files from any PC that mounts the partition
in Linux
to be shared to another PC.
-Linux is a free program and Windows is not -In Linux the same distribution for
the home is used to build a corporate network In
Name 3 differences between the OS Linux and
118 Windows licenses are paid. '-Windows is insecure because of its
Windows.
code
flat, on the other hand, Linux is binary code so it is safe and not vulnerable to
What Data Provider does VB use to connect viruses, etc.
119 client server with MSaccess97 or lower? Microsoft Jet 3.51 OLE DB Provider
120 What Data Provider does VB use to connect Microsoft Jet 4.0 OLE DB Provider
client server with Msaccess 2000, XP or higher?
To handle errors within a program there are - On Error Resume Next '- On Error Goto
125 "ErrorHandlerName" OBJECT Err: -
instructions, name one
Err.Number, Err.Description, Err.Source
In a B engine. D., for which the ODBC data It is used to provide information on how to connect to a specific provider or data
126
manager is used. source.
What type of project should you use to make an
127 Activex Control
OCX control in VB?
If you are developing a program and the data
provider for the data engine that is going to be
128 connected does not appear in your list of The standard ODBC provider
components or references, what provider do you
use?
Keypress, Click, DbClick, Change, MouseUp, MouseDown, GotFocus, Validate,
129
Name at least any 5 events in VB Load, Activate, DragDrop, etc.
Name 3 types of projects that can be developed -Standard exe projects '-ActiveX Exe Project
130 '-ActiveX Control Project '-ActiveX DLL Project
in VB
'-Active Document Project
Standard Forms (.frm), Standard Modules (.bas), Class Modules (.cls), ActiveX
Name 4 types of forms or files that a VB project
131 Documents (.dob), ActiveX Designer Files (.dsr), User Control Modules (.ctl),
can include
etc.
133 Which data access methods are currently used ADO: Activate Data Object
and default with SQL Server?
Name the components of an ADO object model - Connection Object - Command Object
134
(SQL) - Recordset object
135 What aspects are taken into consideration when Project type, duration, methodology, risk, user, available resources.
choosing a Project Life Cycle Model?
• Relevant
What are the characteristics of the information • Timely
139 • Reliable
provided by a control system?
• Flexible
• Economic
Plan + calendar: • When a calendar for execution is added to the detailed plan,
In the context of project management, what is a
140 you have a program that indicates when each of the activities should be
schedule?
executed.
• To estimate the resource requirements of each activity, the productivity of
each resource is used.
• Standard or average productivity of each resource for the proposal, detail
productivity for the project detail plan.
• Productivity of human resources is a function of: qualification, experience,
141 Opinion on resource productivity
motivation, machine support.
• Machinery productivity is a function of: technological level, quality and quantity
of maintenance, type of material, age.
• Project manager must choose work methods that minimize cost and duration
while maximizing the quality of work.
• An alternative is to compare:
• The Costs you will incur.
• The benefits you will get.
The benefits can be of two types:
Tangibles:
• Easy to evaluate economically
• How much will the computer cost (PC, WS)...
How can the benefits of using information
144 • Reduction quantity in stock.
technologies be estimated? Intangibles:
• Difficult to evaluate economically.
• Loss of customers...
• Greater competitiveness...
• By comparing physical progress with expenses and time you have an idea of
147 What comparisons are made to get an idea of the
how efficient the execution has been and can be projected into the future.
efficiency of the project?
• Technical skills
n Knowledge and training in: Methods, processes and Procedures.
• Human Skills
n Is skilled at working with people
n facilitates cooperative work
n train and lead teams
n creates an environment in which subordinates feel safe and free to express
their opinions.
149 What are the skills of a Project Manager?
• Conceptual Skills
n Has a global vision.
n Ability to recognize the significant elements in a situation
n Understand the relationship between elements.
• Design Skills
n Solve problems so that the organization benefits.
n Generate practical solutions to problems.
n It is a fundamental skill in senior management.
Insurance: Free and exempt from all damage or risk. Firm, not in danger of
missing or falling.
Data: Any method used to protect data stored on external storage devices from
access by unauthorized persons.
150 Define System Security Security is the probability (which can be estimated or deduced from empirical
evidence) that an attack of a given type can be repelled.
Administrative elements
Defining a security policy
Organization and division of responsibilities
Physical security
151 What does system security cover? Disaster control
Personnel Safety Practices
Technical elements and procedures
Security systems (equipment, systems, data, files, DB, networks, etc.)
Role of internal and external auditors
Contingency plans.
What activities should be carried out if If errors are detected during the audit, it will be necessary:
Study in detail the repercussions
154 errors/inconsistencies are detected during the Evaluate or estimate the economic impact
audit? Determine the causes of the error (be careful with related controls)
Propose and recommend the measures to be taken
What do "Previous Reports" consist of and in Previous reports: are applied in the case of detection of significant irregularities
155
what cases are they used? (errors or fraud) and where immediate actions are required.
- The Managers of the organization since they are the ones who direct it
What is the purpose of a systems study?
162 Who should participate in it? What results are
- The employees of the organization since they are the ones who interact directly with
expected from this study?
the failures or weaknesses of the system.
The result is detecting system failures or weaknesses and providing possible solutions to
it.
A tool is any device that, when used appropriately, improves the performance of a task.
Within the context of systems analysis and design, 1 .Tools for analysis.
165
what are tools? What types of tools exist? 2.Tools for design.
3 .Tools for he
development.
Transaction processing systems: Improve the routine activities of the organization. They
also provide speed and accuracy, being programmed to follow routines without any
variation. Replaces manual procedures with computer-based ones. Deals with well-
structured routine processes.
A transaction is any event or activity that affects the entire company. The most common
What are transaction processing systems? What is a transactions include. invoicing, delivery of merchandise, payment of salaries and deposit
166
transaction? of checks.
Transaction processing is the set of procedures for managing transactions that includes
calculations, classification, ordering, storage and retrieval, generation of summaries.
An audit is carried out not only when there are errors or failures but when
168 When is an audit justified? control, evaluation of processes, tasks, verification of correct operation, etc. are
required. That is, internal control.
An operating system is a set of programs that make hardware usable. The
operating system is a manager of resources: cpu, I/O devices, memory, data.
169 What is an Operative System?
Functions.-
The functions of the operating system are:
170 What are the functions of an operating system? 1. User interface
2. Share information between users
3. Share hardware
4. Recover from errors Etc.
Running program.
1 .Execution: whether it is running.
171 What is a process and what are its states? 2 .New or ready: if it has just been created.
3 .Wait: If you are stopped and waiting to use the CPU again
4.Stopped.
5.Dead: definitively detained.
multiprogramming, that is, the processor is working continuously. It consists of
dividing the memory space into several parts, being able to have a program in
each of those parts. When there is an I/O process the SSOO starts another job.
172 What is multiprogramming?
It reads a separate stream of data, each with control flags that define what each
job does.
173 Explain :Batch operating system
The telltale characteristic of a batch system is the absence of interconnection
between the user and the job while it is running.
The word multitasking describes the ability to run many programs at the same
The Linux operating system is characterized by
time without stopping the execution of each application. Another feature is the
177 being a Multitasking and Multiuser operating
ability to allocate microprocessor time simultaneously to several applications,
system. Explain.
allowing services to be offered to various users at the same time, each of them
executing one or more applications at the same time.
set of routines whose mission is to manage the processor. The memory and the
178 What is the operating system kernel?
rest of the resources available in the installation
It is characterized because it shares a few resources, usually disks and printers,
What are the characteristics of a network
179 through a network with other machines connected to each other.
operating system?
File System: The structure of a file system is in the form of a tree. The file
system is the files and directories. The functions are creating and deleting files,
sharing files to exchange information, grouping files in a way convenient to the
181 What is meant by file systems? user, backup and recovery, user access to information without the need to know
the physical location (knowing only the symbolic names).
Strictly speaking, processes are said to be concurrent if they exist in the same
From the computational point of view when time interval, that is, they are active simultaneously.
182 talking about concurrent processes and parallel On the other hand, it is said that the processes act in parallel if they exist at the
processes same moment, which implies that they must be executed on separate
processors.
The use of prototypes will be necessary when within the organization the
information requirements are not always well defined, in addition, prototypes allow
186
evaluating extraordinary situations where those in charge of the system do not have
enough information and lack experience, in addition, the prototype is used as a pilot,
with this the design evolves with use,
Describe the process of building a systems prototype. 1.1 identify the information requirements that the user knows along with the
What role do analysts and end users have in this necessary characteristics of the system.
process? 2. Develop a working prototype.
3. Use the prototype, noting the needs for changes and improvements. This expands the
list of known system requirements.
4. Review the prototype based on the information obtained through the user experience.
5. Repeat the previous steps as many times as necessary, until you obtain a satisfactory
system.
187
The role that analysts and end users play in this process is that through the use and
experience of the systems, an optimal prototype can be developed and its functionality is
the responsibility of the systems analyst.
188 How can software engineering be defined? It is a discipline that integrates methods, tools and procedures for the
development of computer software.
189 What is Software? (1) computer instructions that when executed provide the desired function and
behavior, (2) data structures that make it easy for programs to properly
manipulate information, and (3) documents that describe the operation and use
of programs.
190 What do management software consist of? The processing of management information has constituted, almost since the
beginning of computing, the largest application area of computers. These
programs use large amounts of information stored in databases in order to
facilitate business transactions or decision making. In addition to conventional
data processing tasks, in which processing time is not critical and errors can be
corrected a posteriori, they include interactive programs that support commercial
transactions.
191 Explain what embedded software consists of Embedded software is software that is installed in other industrial products, such
as consumer electronics, providing these products with an increasingly greater
degree of intelligence. It is applied to all types of products, from a home video to
an atomic-headed missile, including some automobile control systems, and
performs very diverse functions, which can range from complicated calculations
in real time to simple interactions with the user. facilitating the handling of the
device that incorporates them. They share characteristics with systems
software, real-time software, engineering and scientific software, and personal
computer software.
192 Describe the concept of Reengineering Software reengineering not only recovers information about the design of an
existing program but uses this information to restructure or reconstruct the
existing program, with a view to adapting it to a change, expanding it or
improving its overall quality, with the aim of achieving a greater ease of
maintenance in the future (this is what is called preventive maintenance).
193 What is reverse engineering? Reverse engineering consists of analyzing a program in an effort to represent it
at a higher level of abstraction than the source code, so that information is
extracted from its data design, architecture and procedural detail, in order to
understand it.
194 What does the classic life cycle consist of? It requires a systematic and sequential approach to software development. It is
made up of the following stages:
1.System Engineering and Analysis: The software is part of a larger system,
therefore the requirements and elements of the system must be identified.
2.Software Requirements Analysis: The requirements gathering process
focuses on the software. What interfaces, nature of the specific applications to
be built, the information scope of the software.
3.Design: Software Design includes 4 steps: the data structure, the software
architecture, the procedural detail and the characterization of the interface.
4.Coding: The design must be translated in a form readable by the computer
(instructions-language), this translation can be mechanical and/or automatic
5.Test: Logic and consistency tests of the coded algorithms, system integrity.
6.Maintenance: Software update due to changes in the environment;
modifications due to errors, etc.
195 Indicate disadvantages of the classical 1. Projects do not always follow a sequential flow according to the model.
methodology
2. The Client or user does not always manage to clearly establish their requirements at
the beginning of the project as required by this methodology.
3. There is a "wait" until the last stage to see the software product. An error not detected
until the program is running can be disastrous.
202 Describe what function the Report object fulfills. They are lists that can be output by printer, displayed on the screen or selected
for output through a file.
203 Describe what function the TRN object fulfills. They are the ones that will allow us interactively, through the screen, to carry out
the application database maintenance process.
204 Describe what function the work Panel object They are with which interactive queries can be defined to the database.
fulfills
205 Describe what function the Procedures object It defines all non-interactive database update processes and general-purpose
fulfills. subroutines.
206 What is the process of creating and maintaining Reorganization
the Database called.
207 Name three types of visual control applicable to Combo Box, Check Box, List Box
an attribute in the Form of a transaction
208 Name at least four Programming Languages Visual Basic, Visual Fox-Pro, Java, COBOL
supported by GeneXus
209 Name at least three Databases with which Oracle, SQL, Informix
Genexus works.
210 How do I identify the primary key of a table in a It is identified by an asterisk or a key next to the attribute.
Transaction?
211 How does GeneXus evaluate the order of It evaluates them with respect to when the action of the rule is fulfilled, not in the
execution of the rules? order in which they are written.
212 In what event is the data loading of a Subfile in the load event.
carried out?
213 What is a user event? A user event is one that is defined and created by the user and is not predefined
by genexus.
214 What is a SUBFILE? This is what will allow us to deploy data and manipulate it, either through queries
or transaction management.
215 In the procedures, is there referential integrity In the procedures there is no referential integrity, that is, it eliminates the data
control? regardless of whether it is related to other data in other tables.
216 Explain the concept of normalization
219 Explain the Spiral life cycle model The Spiral model is a risk-oriented life cycle model that divides a project into
mini projects. Each mini project focuses on one or more important risks until all
of these are controlled.
Basically, you start from a small scale in the middle of the spiral, locate the risks,
generate a plan to manage the risks, and then establish an approach to the next
iteration. The model can be combined with other life cycle models in two
different ways: reducing risks to an acceptable level and ending with another life
cycle model or including another model in some iteration. One of the most
important advantages of the spiral model is that as costs increase, risks
decrease.
220 Explain the Evolutionary Prototyping life cycle Evolutionary prototyping is a life cycle model in which the system concept is
model developed as the project progresses. Normally one begins by developing the
most visible aspects of the system. You can present the system part to the client
and then continue developing the prototype based on the feedback you receive.
At some point it is agreed that the prototype is good enough and the prototype is
delivered as the final product. It is especially used when requirements change
rapidly, when the customer is reluctant to specify the set of requirements, or
when neither you nor the customer properly identify the application area.
221 Explain the life cycle model Staged Delivery The staged delivery model is another lifecycle model in which software is
delivered to the customer in successively refined stages. Unlike the evolutionary
prototyping model, when you use staged delivery, you know exactly what you
are going to build when you proceed to build it. What differentiates the staged
delivery model is that the software is not delivered at the end of the project in
one go. It is delivered in successive stages throughout the project (also known
as “incremental implementation”). The software concept, requirements analysis
and global design activities are carried out at the beginning of the project, to
later carry out the detailed design, coding, debugging and testing within each
stage. The main advantage is that it delivers useful functionality before
delivering 100% of the project at the end of it.
222 Explain the Design by Planning life cycle model The design-by-plan life cycle model is similar to the staged delivery life cycle
model, in which the product is planned to be developed in successive stages.
The difference is that it is not always known at the beginning whether the
product will be available for the last delivery. This life cycle model ensures that a
product is ready to be delivered on a certain date. One of the critical elements of
this life cycle model is to prioritize features and plan their stages so that the first
ones contain the highest priority features. Low priority features are left for later.
If the delivery date is reached before all stages have been completed, it is not
advisable to leave critical features undone because implementation time has
been spent on less critical features.
223 Explain the Evolutionary Delivery life cycle model Evolutionary delivery is a lifecycle model that falls between evolutionary
prototyping and staged delivery. A version of the product is developed, shown to
the customer, and the product is refined based on customer feedback. The
similarity between evolutionary delivery and evolutionary prototyping really
depends on the extent to which planning is carried out to accommodate
customer requests. If planned to accommodate the majority of requests,
evolutionary delivery will be more like evolutionary prototyping. If planned to
accommodate few change requests, evolutionary delivery will approximate
staged delivery. The main differences between evolutionary prototyping and
evolutionary delivery are more of emphasis than fundamental approach. In
evolutionary prototyping the initial emphasis is on the visible aspects of the
system, then it goes back and fills in the gaps in the foundations of the system.
In evolutionary delivery, the initial emphasis is placed on the core of the system,
which is made up of functions of
224 In the context of life cycle models applicable to a The phrase “incremental development techniques” refers to development
project, explain what incremental development methods that allow a program to be created and delivered in stages.
techniques consist of. Incremental techniques reduce risk by breaking the project into a series of
smaller subprojects. Completing small subprojects can be easier than
completing a single monolithic project. Incremental development techniques
increase visibility of progress by providing completed and operational modules
of an extensive system before the entire system is operational. These
techniques offer greater ability to make mid-stream modifications, because the
system is ready to ship many times during its development; You can use any of
the ready-to-deliver versions as a starting point instead of waiting until the end.
Life cycle models that support incremental development include spiral models,
evolutionary prototyping, staged delivery, and evolutionary delivery.
225 Explain what the essential model is and its The essential model of the system is a model of what the system must do to
components satisfy the user's requirements, saying as little as possible (preferably nothing)
about how it will be implemented. This model assumes the existence and
availability of perfect technology that can be obtained easily and at no cost. The
essential model consists of two main components: environmental model and
behavioral model. The environmental model defines the boundary between the
system and the rest of the world (i.e., the environment in which the system
exists). It consists of a context diagram, a list of events, and a brief description
of the purpose of the system. Additionally it may require initial data dictionary
that defines all flows and external stores, and entity-relationship model of
external stores. The behavioral model describes the behavior that is required for
the system to successfully interact with the environment. It consists of data flow
diagrams, entity-relationship diagram, state transition diagram, data dictionary
and process specifications.
226 What are the aspects to consider when treating An effective strategy to deal with risks must consider three aspects: Risk
the risks of a project? reduction, monitoring and management (RMMM or RM3) · Risk avoidance.
o Develop a risk reduction plan.
o The action that must be taken depends on each risk.
· Monitor risk.
o The project manager checks factors that indicate whether the risk is becoming
more or less probable.
o The action that must be taken depends on each risk.
· Manage risk and propose contingency plans. Here it is assumed that the risk
reduction plans have failed and these have been presented. Plans must be
proposed to deal with the consequences of the risks.
227 What is the general objective of the ISO The main objective of the ISO Organization (International Satandar
organization? Organization) is to establish standardization standards in various productive and
service areas, such as communications (ISO Model), electrical standards, SIAS
construction, etc.
228 In general terms, what is understood by Any process in which two well-defined agents are distinguished, in which one
Client/Server architecture? requests services (CLIENT), and another (SERVER) that captures such
requests, executes the necessary processes and sends the results obtained to
the client.
229 What advantages does using a SABD offer?
The use of a SABD offers the following benefits: security management, data
backup and recovery, performance statistics, design facilities, etc.
230 What is object-oriented programming? It consists of using objects where instructions are ENCAPSULATED to respond
to MESSAGES received from the external medium; For example, the
programming of a button in Basic visual language, where the response to a click
or double click must be programmed.
231 What advantages does using a relational Basically the main advantage is the guarantee of INTEGRITY of the data, data
database offer? that is related cannot be deleted by mistake.
232 Define the role of a project manager The project manager is a person who has the responsibility of planning,
controlling and directing the activities of the project. Many times these
responsibilities involve the coordination and integration of activities across
organizational units.
233 What is a DFD? A DFD is a network diagram that represents the flow of data and the
transformations that are applied to it as it moves from the input to the output of
the system. It is used to model system functions and the data that flows
between them at different levels of abstraction.
234 What is meant by a data dictionary?
We can define a data dictionary (DD) as an organized list of the data used by
the system that is graphically represented by the flows and stores present on
the set of DFDs.
235 What are decision trees? A decision tree is a model of a discrete function in which the value of a variable
is determined and an action is carried out based on its value.
236 What is the general goal of a structured design? The general objective of structured design is to develop the program structure,
as well as the relationships between the elements, called modules, that make up
this structure. The data flow-oriented design allows the transition from the data
flow diagram to a description of the program structure.
243 Relate Porter's forces According to Porter, the ability of an organization to compete in a given market
is determined by the technical and economic resources of the organization, as
well as by five environmental forces, each of which threatens the organization
and drives it into a new market. .
- Rivalry between competitors
- Threat of new competitors
- Supplier bargaining power
- Bargaining power of clients or buyers
- Threat of substitute products or services.
247 Define what a DBMS is. It represents a Database Management System, which has the logical and
physical scheme of the data for the operations of insertion, query and deletion of
data.
248 What is the fundamental difference between the The fundamental difference is that the classic approach operates on files while
classical approach and the database approach? the database model demands and requires a logical and physical model of the
data in order to represent the existing reality.
249 Explain what Biometrics is, mention an example. Authentication technique, based on measurements of biological characteristics
for the use of passwords. Ex: voice study, body temperature, iris analysis,
fingerprint, etc.
250 Explain who makes up the IT committee and their It should be made up of a few people and chaired by the most senior director or
functions manager within the company, responsible for information technologies. In
addition to the manager or head of IT, Finance, etc. The functions of the
committee are
- Create the IT Plan
- Approve the Strategic Information Systems Plan.
-Approval of large investments in information technologies.
-Setting priorities among large IT projects.
-Discussion vehicle between IT and its users.
-Monitor and monitor the activity of the IT Department.
251 Mention the most used empirical software cost COCOMO, (Constructive Cost Model) where object types are analyzed v/s
estimation model in the Software Engineering weight of complexity
industry.
252 Indicate the factors that determine the quality of Correctness, reliability, efficiency, integrity, ease of use, flexibility, ease of
the Software testing, portability, ease of interoperation.
253 What is the white box test? White box testing is a test case design method that uses the procedural design
control structure to derive test cases. Through white box testing methods, the
software engineer can obtain test cases that guarantee that at least one of the
independent paths of each module are exercised, exercising all logical decisions
in their true and false aspects.
254 List 2 advantages and disadvantages of using ADVANTAGES: The person who answers the questionnaire has greater
questionnaires as data collection techniques. anonymity which can make their answers more honest. Standardized questions
allow for more reliable data to be provided.
DISADVANTAGE: Although the questionnaire can be applied to many people,
100% of the requested responses will not be obtained. The person who
prepares the questionnaire cannot observe the expressions or reactions of
those who respond to the questionnaires.
266 Define what a Database is. Collection or repository of integrated data, stored on disk and with controlled
redundancy. The data, which must be shared by different users and
applications.
267 Name and explain at least 3 advantages of using Independence of the data with respect to the treatments. This means that a
a Database. change in the treatment of the data should not impose a new design of the
database.
Data consistency.
Since the information in the database is collected and stored only once, the
same data is used in the treatments, which is why its results are said to be
consistent.
Better data availability for all users.
Since the information is in one place. Each user is no longer the owner of the
data, since it is shared by all applications. Greater informative value.
Since the database is a faithful reflection of the real world, it contains all the
interrelationships between the data, which is why it has the greatest informative
value. Greater efficiency in the collection, validation and introduction of data into
the system.
Since data is collected and validated only once, the performance of all pre-
storage processes increases.
Reduced storage space
Since redundancy does not exist or has disappeared, it leads to less disk
occupancy
268 What are the features of the Bios on a PC? When you turn on a PC, the integrated circuit or chip that takes control of the
entire device is the BIOS, Basic Input Output System, a type of special memory
that contains a series of basic programs and codes that control the
motherboard, They check the IDE hard drives, the video card, the memory
chips, the processor, the floppy drive, date, time, etc. It is also the link between
the operating system installed on the computer (MS-DOS, Windows, Linux, etc.)
and the different components installed and connected to the motherboard.
269 What is the default network protocol in Windows The default protocol is TCP/IP because Active Directory based works directly
2000 Server and Windows 2003 Server? Justify with DNS, and the latter is part of the TCP/IP suite
your answer
270 From the following statement: At the presentation It is false because the network cables and Nic are located at the physical layer.
layer of the OSI model, there are network cables On the other hand, the presentation layer includes code conversion, data
and NICs. Indicate if the above is true or false? encryption, and data compression.
Justify your answer
271 What is NTFS? NTFS (New Technology File System) is a file system designed specifically for
Windows NT, with the goal of creating an efficient, robust file system with built-in
security from the ground up. It also supports native file compression and
encryption (the latter only from Windows 2000). NTFS allows you to define the
size of the cluster, starting at 512 bytes (minimum size of a sector)
independently of the size of the partition. It is a system suitable for the large
partitions required on high-performance workstations and servers. It can handle
disks up to 2 Terabytes.
The drawbacks it poses are:
It requires a good amount of hard disk space, so its use on disks smaller than
400 MB is not recommended.
It is not compatible with MS-DOS, Windows 95 or Windows 98. Conversion to
NTFS is one-way.
If you choose to upgrade the drive, you will not be able to convert it back to FAT.
272 What elements are essential for the development Needs, Processes, Product and Technology
of an information system?
273 What is UML? It is a general-purpose language for object-oriented modeling. This language
combines previous modeling such as: object-oriented, data, components,
workflows.
274 Why does the UML standard have an object-
oriented methodology? Improves the capture and validation of requirements.
It brings the problem space and the solution space closer together.
Facilitates construction, maintenance and reuse
Facilitates the transition between different phases
Promotes iterative development of the system
Dispel the barrier between “what” and “how”
275 Indicate the factors that determine the quality of Correctness, reliability, efficiency, integrity, ease of use, flexibility, ease of
the Software. testing, portability, ease of interoperation.
276 What is a Hot Fix? It is a minipatch, the set of these forms a Servipack.
277 What layer of the OSI Model do browsers work At layer 7 of application.
on?
278 What are APIs? Give an example. Interface for application programming. Example: ADO, ODBC.
279 What are Web Services used for? For communication between applications on different platforms.
280 What are the minimum requirements for installing • Intel Pentium or compatible, minimum 166 MHz,
SQL Server 2000? • 64 MB of RAM (128 MB recommended).
• 95-270 MB of free disk space, depending on the type of installation (given the
large size of the download file and its extraction, in total you will need about
1GB of free disk space).
281 Indicate the levels of Testing in the development Unit Test: It is the testing of each module, which is normally carried out by the
of an SI development staff themselves in their environment.
Integration Test: With the software design outline, the tested modules are
integrated to check their interfaces working together. Validation Testing: The
fully assembled software is tested as a whole to check whether it meets the
functional and performance requirements, maintainability, error recovery, etc.
System test: the sw. Once validated, it is integrated with the rest of the system
(performance, security, recovery and resistance).
Acceptance test: the user checks in his own operating environment whether he
accepts it as it is or not.
284 What is a bus topology? It is configured, at least logically with branches, that extend from a central
system, when a signal passes through the bus or collector usually a coaxial
cable, each and every one of the connections listens to the signal that carries
with it an address designation, it is easy To install, any PC can be the server,
due to distribution they are placed at the ends, it is the most used, it uses cable,
terminators and t-connectors.
285 does it mention the concept of star topology? In a star topology, each PC is connected to a centrally located concentrator or
hub. The hub is a hardware device with multiple ports and you can plug a
network cable connector into one of them.
288 what is network topology? It is the physical form of interconnection between network devices.
289 What is the physical topology of a network? It is the current physical layout of the network, the way the nodes are connected
to each other.
290 What are the characteristics of coaxial cable? Supports distances of 200 to 500 meters. It has a conductor, an insulator, a
shield and a protective cover. The conductor is made of copper and can be
single or multi-wire. The most used coaxial cables are RG-8 50 or thick coaxial,
RG-58 50 and RG-59 75.
291 Describe the characteristics of twisted pair or Its main use is the telephone line, it is also known as 10 base t, there are 2
multipair cable? types: shielded (stp) and unshielded (utp), they should not be on the walls
because they are fragile, it is the oldest and is very Sure, depending on the
signal the speed is 2km or 6km, with amplifiers.
299 What is an Operative System ? An operating system is a program that acts as an interface between the
computer user and its physical components (hardware). Its main objective is to
facilitate the use of the computer system by using the hardware efficiently.
300 What is a computer system? A computer system is defined as the relationships between the media
(equipment, hardware), data and information necessary for decision making
from the point of view of an integrated system.
301 What can you comment about an interface An operating system acts as an interface between hardware and user. This
between hardware and user, such as interface will be more efficient the easier it is to use and vice versa.
advantages/disadvantages?
The range and extent of services provided by a so It depends on several
factors. Among other things: the user-visible functions of a system They are
largely determined by the needs and characteristics of the target environment
that the system It is meant to endure. For example, a so Intended for program
development in an interactive environment may have a different set of calls and
commands than the OS. Designed for runtime support of a dedicated real-time
application, such as controlling a car engine.
The more efficient the interface is, the more resources it will need and vice
versa.
302 Based on what idea can the operating system be The operating system is said to act as a resource allocator because it is
considered a resource manager? responsible for assigning each of the resources (hardware and software) to
each of the specific programs and users, according to the needs so that the
system can perform its tasks as best as possible. The operating system is
responsible for collecting each of the resource requests and assigning each
request to each resource so that the computer system works efficiently.
The ability to run a program with different input/output devices is called device
independence.
In practice, buffering rarely keeps the CPU busy all the time. And input/output
devices.
304 What is a precedence graph? It is an oriented acyclic graph whose nodes correspond to individual sentences.
An arc joining the si node to the sj node means that the sj statement can be
executed after the si statement has been completed. It is also a useful tool for
defining process constraints between points of a computation.