Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 24

No.

ASK ANSWER
It is when a data is present in more than one table (file) in a data model.
1 What is Data Redundancy?

2 What is data inconsistency?


It is when a data is not updated in all the tables or files in which it is present.
It is the graphic representation of the data of an organization, or of a problem of
3 What is a Data Model?
this
What databases have the SQL Language
4
incorporated? All current databases have built-in SQL to work directly with the database
Standard Query Language and in some texts it also appears as a structured
5 What does SQL mean?
query language
When there is redundancy of data and relationships, when normal forms have
When is it said that a data model is not
6 not been applied, when repeated data, repetitive data and many-to-many
Normalized?
relationships are present
It is the identifying attribute of the table, this is unique for each occurrence
7
In a data table that is the Primary Key (record or row) of the table
In a data table that is the Foreign Key or Foreign It is an attribute that is a primary key in another table and is used to validate
8
Key relationships between tables.

9 What is a relational data base? It is one in which the information is stored in the form of tables, which are
logically related through common fields (attributes, columns).

It is a special database that contains summarized information from other


10 What is a Data-WareHouse or data warehouse? information systems, which is strategically ordered to support the management
and decision-making processes of the organization.

What does it mean that a relationship between It means that an occurrence (or record) of one entity is related to only one
11
two entities is ONE to ONE? occurrence of another entity and vice versa.
What does it mean that a relationship between It means that one occurrence (or record) of one entity is related to several one
12
two entities is ONE to MANY? occurrences of another entity.
What does it mean that a relationship between It means that several occurrences (or records) of one entity are related to
13
two entities is MANY to MANY? several occurrences of another entity.
It is the centralized set of logical attributes that specify the identification and
14 What is the Data Dictionary? characteristics of the data that is managed in the Database.

What sources of information can be used to


Interviews, forms, description of processes, requirements, functions,
15
design a data model? procedures, etc.
THE DATA ARE FACTS RELATED TO PEOPLE, OBJECTS, EVENTS OR
OTHER ENTITIES IN THE REAL WORLD, IT COMES FROM VARIOUS
DEVELOP THE DIFFERENCE BETWEEN DATA SOURCES WITHIN THE ORGANIZATION. INFORMATION IS DATA THAT
16
AND INFORMATION HAS BEEN ORGANIZED OR PREPARED IN AN APPROPRIATE FORM TO
SUPPORT DECISION MAKING.

IT IS A SET OF RELATED DATA, WHICH ALLOWS TO SATISFY THE


17 DEFINE WHAT A DATABASE IS INFORMATION NEEDS OF AN ORGANIZATION

AGGREGATION APPROACH AND DATABASE APPROACH. IN THE


DATA PROCESSING PRESENTS TWO
AGGREGATION APPROACH IT IS RELATED TO THE PROCESSING OF
18 APPROACHES, MENTION BOTH AND
DATA BY DEPARTMENT WHILE IN THE DATABASE APPROACH THE DATA
DEVELOP ONE OF THEM
IS VIEWED AS A RESOURCE THAT SHOULD BE SHARED BETWEEN
DIFFERENT USERS.

MENTION FIVE DISADVANTAGES OF THE REDUNDANCY, INCONSISTENCY, LOW POSSIBILITY OF DATA SHARING,
19
AGGREGATION APPROACH IN DATA INFLEXIBILITY, POOR STANDARDIZATION, LOW PROGRAMMER
PROCESSING PRODUCTIVITY, EXCESSIVE MAINTENANCE.
THE MAIN FEATURE IS THE INDEPENDENCE OF THE DATA WITH
RESPECT TO THE PROGRAM THAT USES THEM, THERE IS CENTRALIZED
MENTION THE MAIN FEATURE OF THE
20 CONTROL OF THE PROTECTION, ENTRY, MODIFICATION, DELETION AND
DATABASE APPROACH
RECOVERY OPERATIONS OF DATA.

ONE OF THE ELEMENTS OF THE DATABASE DATA BASE MANAGEMENT SYSTEM OR DATABASE MANAGEMENT
21 APPROACH IS THE DBMS, EXPLAIN SUCH SYSTEM IS A SOFTWARE THAT ALLOWS YOU TO MANAGE ONE OR
ELEMENT MORE DATABASES AND ALSO THE DATA DICTIONARY.

EVERY DATABASE MANAGEMENT SYSTEM DATA DEFINITION FUNCTION, DATA MANIPULATION FUNCTION AND
22
HAS THREE MAIN FUNCTIONS, MENTION DATA SECURITY FUNCTION.
THESE FUNCTIONS
DEFINE THE DATA MANIPULATION IT ALLOWS YOU TO STORE, MODIFY, DELETE AND RECOVER DATA
FUNCTION PRESENTED IN EVERY FROM THE DATABASE, THIS IS ACHIEVED THROUGH THE DATA
23 DATABASE MANAGEMENT SYSTEM OR MANIPULATION LANGUAGE -DATA MANIPULATION LANGUAGE OR DML-
DBMS
ACCESS IS NOT DEFINED AS A DATABASE MANAGEMENT SYSTEM OR
EXPLAIN WHY IT IS ESTABLISHED THAT
DBMS BECAUSE IT DOES NOT PRESENT THE FUNCTION OF DATA
24 ACCESS IS NOT A SYSTEM
DATABASE ADMINISTRATOR SECURITY, IT ONLY PRESENTS THE FUNCTIONS OF DATA DEFINITION
AND MANIPULATION.

IT ALLOWS YOU TO SPECIFY THE TYPE OF DATA THAT WILL GO IN THE


DEFINE THE DATA DEFINITION FUNCTION DATABASE, ITS LOGICAL STRUCTURE, THE RELATIONSHIPS BETWEEN
25 PRESENTED IN EVERY DATABASE THE DATA AND PHYSICAL CHARACTERISTICS ON ORGANIZATION AND
MANAGEMENT SYSTEM OR DBMS ACCESS. THIS CAN BE DONE THROUGH THE DATA DEFINITION
LANGUAGE - DATA DEFINITION LANGUAGE OR DDL -

THE DATA DICTIONARY IS THE PLACE WHERE THE DATA DEFINITIONS,


ONE OF THE ELEMENTS OF THE DATABASE
SCREEN AND REPORT FORMATS AND DEFINITIONS OF OTHER
APPROACH IS THE DATA REPOSITORY OR
26 SYSTEMS OF THE ORGANIZATION ARE, IT IS A KEY TOOL IN THE
DICTIONARY, EXPLAIN WHAT THIS ELEMENT
MANAGEMENT OF THE DATA RESOURCE IN THE ORGANIZATION.
CORRESPONDS TO

AUTOMATED TOOL THAT SUPPORT SOFTWARE DEVELOPMENT,


ESPECIALLY REGARDING DATABASE DESIGN AND ITS APPLICATION
PROGRAMS, HELPING THE DATA MANAGER IN DATABASE PLANNING
27 EXPLAIN WHAT IT IS A CASE TOOL
AND DESIGN AND SYSTEM DEVELOPERS, ANALYST AND
PROGRAMMERS IN THE ANALYSIS OF REQUIREMENTS AND DESIGN OF
PROGRAMS.

MENTION THE THREE STAGES PRESENT


DATA MODELING, CREATION OF THE DATABASE AND USE OF THE
28 IN THE IMPLEMENTATION OF THE DATABASE
DATABASE.
APPROACH
MINIMUM DATA REDUNDANCY, DATA CONSISTENCY, DATA
INTEGRATION, DATA SHARING, STANDARDIZATION, FACILITATES
MENTION FIVE BENEFITS OF THE DATABASE APPLICATION DEVELOPMENT, SECURITY-PRIVACY- AND INTEGRITY
29
APPROACH CONTROLS, FLEXIBILITY IN ACCESS, DATA INDEPENDENCE, REDUCTION
OF PROGRAM MAINTENANCE.

MENTION THE RISKS OR COSTS


SPECIALIZED PERSONNEL, NEED FOR BACKUPS, PROBLEMS WHEN
30 PRESENTED BY HANDLING DATA UNDER
SHARING DATA, ORGANIZATIONAL CONFLICT.
THE DATABASE APPROACH

TO DESCRIBE A DATA, THREE LEVELS OF


ABSTRATION OR STATES MUST BE
31 REALITY, METADATA AND DATA
CONSIDERED, MENTION THESE LEVELS

IT IS INFORMATION ABOUT AN ORGANIZATION'S DATA.


IT IS USED TO DEVELOP LOGIC MODELS OF THE ENTITIES AND
32 DEFINE THE CONCEPT METADATA ASSOCIATIONS OF AN ORGANIZATION, THE METADATA IS STORED AND
MAINTAINED IN THE DATA DICTIONARY OR REPOSITORY OF AN
ORGANIZATION.

AN ENTITY IS A PERSON, OBJECT OR EVENT ABOUT WHICH THE


ORGANIZATION DECIDES TO COLLECT AND STORE DATA. AN ENTITY
33 DEFINE THE CONCEPT ENTITY MAY BE TANGIBLE SUCH AS AN EMPLOYEE, A PRODUCT, A COMPUTER
OR A CUSTOMER OR INTANGIBLE SUCH AS A BANK ACCOUNT

IT IS A PROPERTY OF AN ENTITY THAT YOU WANT TO STORE, FOR


34 DEFINE THE CONCEPT ATTRIBUTE EACH ENTITY THERE IS A SET OF ATTRIBUTES OF INTEREST FOR THE
ORGANIZATION, FOR EXAMPLE FOR THE EMPLOYEE ENTITY SOME
ATTRIBUTES OF INTEREST WOULD BE: RUT, NAME, ADDRESS, PHONE.
EACH ENTITY MUST HAVE AT LEAST ONE ATTRIBUTE OR A
DEFINE THE CONCEPT KEY OR PRIMARY COMBINATION OF THEM, THAT DISTINGUISHES IT FROM OTHER
35
KEY ENTITIES, THIS ATTRIBUTE IS CALLED PRIMARY KEY, FOR EXAMPLE,
THE RUT FOR THE EMPLOYEE ENTITY.
MENTION THE POSSIBLE ASSOCIATIONS
ONE-TO-ONE ASSOCIATION (PATIENT-BED), ONE-TO-MANY
BETWEEN TWO ENTITIES, IN BOTH
36 ASSOCIATION (EMPLOYEE-LOAD) AND MANY-TO-MANY ASSOCIATION
DIRECTIONS AND PROVIDE AN EXAMPLE OF
(STUDENT-SUBJECT)
THEM
NUB ENTITY: THE M:N ASSOCIATION IS INTERSECTED WITH A NEW
WHAT NAME DOES THE ENTITY, WHICH GENERATES TWO 1:M ASSOCIATIONS, WHICH CARRIES
37 TRANSFORMATION OF A MANY-TO-MANY A KEY OR COMPOSITE PRIMARY KEY, FORMED WITH THE TWO PRIMARY
ASSOCIATION AND WHAT IT CONSISTS OF KEYS OF THE ENTITIES THAT WERE ASSOCIATED WITH M :N

DEVELOP A PARTNERSHIP EMPLOYEE ENTITY, THERE ARE EMPLOYEES WHO ARE MARRIED
38 RECURSIVE ONE-TO-ONE TYPE AMONG THEM, THAT IS, THEY HAVE A ONE-TO-ONE ASSOCIATION
IT IS DEFINED AS AN ABSTRACT DESCRIPTION OF DATA ABOUT
39 DEFINE THE CONCEPT DATA MODEL ENTITIES AND EXISTING ASSOCIATIONS BETWEEN THEM, A DATA
MODEL EXACTLY AND COMPLETELY REPRESENTS THE DATA
REQUIRED IN THE ORGANIZATION AND IS EASY TO UNDERSTAND.

MENTION THE THREE TYPES OF DATA


40 EXTERNAL MODELS, CONCEPTUAL MODEL AND INTERNAL MODEL
MODELS OR ABSTRACTION LEVELS

IT REFERS TO WHAT THE USER VISUALIZES OF THE REALITY THAT IS


OF THE THREE DATA MODELS OR REPRESENTED, IT IS THROUGH EXTERNAL MODELS THAT USERS
41 ABSTRACTION LEVELS, DEVELOP THE EXPLAIN THEIR REQUIREMENTS TO THE ANALYST. THEY ARE
EXTERNAL MODEL INDEPENDENT MODELS OF THE TECHNOLOGY OR DBMS, THEY ARE
ALSO CALLED USER VIEWS.

MENTION TWO OF THE INDEPENDENT DATA


ENTITY-RELATIONSHIP DATA MODEL AND OBJECT-ORIENTED DATA
MODELS OF THE
42 MODEL, ARE CALLED INDEPENDENT BECAUSE THEY ARE NOT DATA
TECHNOLOGY AND EXPLAIN WHY ITS
MODELS PROCESSABLE BY ANY DBMS, THEY HAVE BEEN DEVELOPED
INDEPENDENCE FROM TECHNOLOGY
TO REPRESENT EXTERNAL AND CONCEPTUAL MODELS
MENTION THREE DATA MODELS HIERARCHICAL DATA MODEL, NETWORK DATA MODEL AND RELATIONAL
DEPENDENT ON TECHNOLOGY AND DATA MODEL. THEY ARE CALLED DEPENDENT BECAUSE THEY ARE
43
EXPLAIN WHY THIS DEPENDENCE ON MODELS PROCESSABLE BY SOME DBMS, USED AT THE INTERNAL
TECHNOLOGY MODEL LEVEL
THE RELATIONAL DATA MODEL HAS ITS OWN TERMINOLOGY; USES
PRIMARY AND FOREIGN KEYS TO REPRESENT THE ASSOCIATIONS OR
RELATIONSHIPS BETWEEN TWO FILES OR TABLES; NORMALIZATION
MENTION AND DEVELOP TWO THEORY WHICH CONSISTS OF A SET OF PROPERTIES OR RULES THAT
44 CHARACTERISTICS OF THE RELATIONAL DATA MUST MEET TO ACHIEVE A DATABASE DESIGN FREE OF
DATA MODEL DEPENDENCIES; THERE ARE SIMPLE LANGUAGES TO ACCESS
RELATIONAL DATABASES, WHICH ALLOW TO MANIPULATE DATA.

EACH COLUMN HAS A SIMPLE VALUE OR ATOMIC DATA; EACH COLUMN


CONTAINS VALUES THAT BELONG TO THE SAME DOMAIN; EACH
COLUMN HAS A DIFFERENT NAME AND THE ORDER OF THE COLUMNS
MENTION THREE PROPERTIES OF THE TWO- HAS NO IMPORTANCE; EACH ROW IS DIFFERENT, THAT IS, A TABLE
45 DIMENSIONAL TABLES OF THE RELATIONAL CANNOT HAVE DUPLICATE ROWS, SO EACH ROW HAS AN IDENTIFIER
DATA MODEL FIELD THAT FORM ITS PRIMARY KEY; THE ORDER OF THE ROWS HAS
NO IMPORTANCE; ALL ROWS ARE THE SAME TYPE.

IT IS FORMED BY A SET OF TABLES, WHICH ARE ASSOCIATED OR


46 HOW A RELATIONAL DATABASE IS FORMED RELATED TO EACH OTHER, THROUGH COLUMNS THAT THEY HAVE IN
COMMON.
AS A SET OF VALUES COMPOSING A ROW OF A TABLE, A TUPLE IS
HOW TUPLE IS DEFINED IN THE RELATIONAL
47 EQUIVALENT TO THE OCCURRENCE OF A RECORD WITHIN A TABLE
DATA MODEL

THIS PROCESS AIMS TO OBTAIN, FROM USER VIEWS OR CURRENT AND


FUTURE INFORMATION REQUIREMENTS, A DATABASE AND THE
EXPLAIN WHAT THE DATABASE DESIGN APPLICATION PROGRAMS NECESSARY TO HANDLE IT. FOR THIS, A
48
CONSISTS OF PROCESS OF NORMALIZATION OF THE VIEWS IS CARRIED OUT UNTIL A
CONCEPTUAL DATA MODEL IS OBTAINED, EXPRESSED AS A SET OF
TABLES IN THIRD NORMAL FORM.

IT IS A SUBSET OF DATA USED BY A CERTAIN USER TO MAKE A


DECISION OR TAKE AN ACTION. IT CORRESPONDS TO FORMAL
49 EXPLAIN WHAT A USER VIEW IS
SOURCES OF INFORMATION SUCH AS DOCUMENTS, FORMS, REPORTS,
FOLDERS, FILES, SCREENS, ETC. OR INFORMAL SOURCES SUCH AS
PHONE CALLS, PERSONAL CONTACTS, ETC.

PROCESS THAT ANALYZES THE DEPENDENCIES BETWEEN THE


EXPLAIN WHAT THE STANDARDIZATION
50 ATTRIBUTES OF A VIEW IN SUCH A WAY TO COMBINE THE ATTRIBUTES,
PROCESS CONSISTS OF
INTO LESS COMPLEX AND SMALLER ENTITIES AND ASSOCIATIONS. IT
CONSISTS OF A SET OF RULES CALLED NORMAL FORMS.
1FN-> DELETE REPEATING GROUPS OF NON-NORMALIZED ENTITY; 2FN-
DEVELOP THE NORMALIZATION PROCESS > ELIMINATE PARTIAL DEPENDENCIES OF ENTITIES STANDARDIZED IN
51 1FN; 3FN->DELETE
UNTIL THE THIRD NORMAL FORM
TRANSITIVE DEPENDENCIES OF ENTITIES IN 2NF
IT IS WHEN ONE OR MORE ATTRIBUTES THAT ARE NOT A PRIMARY KEY,
EXPLAIN WHAT PARTIAL DEPENDENCE ARE ONLY DEPENDENT ON PART OF THE COMPOSITE PRIMARY KEY,
52
CONSISTS OF OR IN OTHER WORDS, WHEN PART OF THE PRIMARY KEY DETERMINES
A NON-KEY ATTRIBUTE.

WHEN A NON-PRIMARY KEY ATTRIBUTE DEPENDS ON OTHER NON-


EXPLAIN WHAT TRANSITIVE DEPENDENCY
53 PRIMARY KEY ATTRIBUTES, THAT IS, IT DOES NOT DEPEND ON THE
CONSISTS OF
PRIMARY KEY DIRECTLY.
THEY ARE PEOPLE FROM THE ORGANIZATION WHO ADD, DELETE AND
MODIFY DATA IN THE DATABASE AND WHO CONSULT OR RECEIVE
54 DEVELOP THE CONCEPT: END USERS INFORMATION FROM THE DATABASE.
THEY CORRESPOND TO EXECUTIVES, ACCOUNTANTS, SECRETARIES,
ETC.

THIS IS A WAREHOUSE WHERE THE ORGANIZATION CAN DEPOSIT ALL


DEVELOP THE CONCEPT: DATA DATA OF CRITICAL IMPORTANCE FOR DECISION MAKING. DATA
55
WAREHOUSE WAREHOUSE IS A CONCEPT THAT TRYES TO SOLVE THE PROBLEM
THAT COMPANIES HAVE IN THE RAPID ANALYSIS OF SITUATIONS.

AN INFORMATION SYSTEM IS DEFINED AS THE SYSTEMATIC AND


DEFINE WHAT AN INFORMATION SYSTEM IS FORMAL SET OF COMPONENTS, CAPABLE OF PERFORMING DATA
56 AND MENTION THE OBJECTIVES IT PROCESSING OPERATIONS WITH THE FOLLOWING PURPOSES: FILL
PURSUES DATA PROCESSING NEEDS, Provide information to managers, in support of
planning activities, control and decision making. Produce a wide variety of
reports.
AN INFORMATION SYSTEM EXECUTES THREE GENERAL ACTIVITIES,
MENTION AND CONCEPTUALLY DEVELOP FIRSTLY, IT RECEIVES DATA FROM INTERNAL OR EXTERNAL SOURCES
THE THREE ELEMENTS THAT ARE OF THE COMPANY AS INPUT ELEMENTS. THEN, ACT ON THE DATA TO
57
EXECUTED IN EVERY INFORMATION PRODUCE INFORMATION. FINALLY, THE SYSTEM PRODUCES THE
SYSTEM INFORMATION FOR THE FUTURE USER

THE INFORMATION PRODUCED BY EVERY ACCESSIBILITY, UNDERSTANDABILITY, ACCURACY, OWNERSHIP,


58 INFORMATION SYSTEM PRESENTS CERTAIN TIMELINESS, CLARITY, FLEXIBILITY, VERIFIABILITY, IMPARTIALITY,
CHARACTERISTICS, MENTION 4 OF THEM QUANTIFICABILITY.

MANAGEMENT INFORMATION SYSTEMS, TRANSACTION PROCESSING


INFORMATION SYSTEMS ARE GENERALLY SYSTEMS, DECISION SUPPORT SYSTEMS, SYSTEMS FOR REPORTING
59 CLASSIFIED INTO SIX DIFFERENT CLASSES, MANAGEMENT, OFFICE INFORMATION SYSTEMS AND STRATEGIC
MENTION THREE OF THEM INFORMATION SYSTEMS.

THE LIFE CYCLE FOR SYSTEMS DEVELOPMENT CONSISTS OF A SET OF


DEFINE THE LIFE CYCLE OF AN ACTIVITIES THAT ANALYSTS, DESIGNERS AND USERS CARRY OUT TO
60
ADMINISTRATIVE INFORMATION SYSTEM DEVELOP AND IMPLEMENT AN INFORMATION SYSTEM. THIS METHOD
CONSISTS OF THE FOLLOWING PARTS: RESEARCH

THE PRELIMINARY INVESTIGATION BEGINS WITH THE REQUEST OF A


EXPLAIN WHAT PRELIMINARY RESEARCH PERSON, ADMINISTRATOR OR SYSTEMS SPECIALIST. ITS OBJECTIVE IS
61 CONSISTS OF IN THE TRADITIONAL LIFE TO RECEIVE THE HELP OF AN INFORMATION SYSTEM TO SOLVE A
CYCLE FOR THE DEVELOPMENT OF AIS PROBLEM. WHEN THE APPLICATION IS FORMED THE INVESTIGATION
BEGINS

THE FEASIBILITY STUDY IS PART OF THE RESULT OF THE PRELIMINARY


EXPLAIN WHAT THE FEASIBILITY STUDY RESEARCH, IT IS CARRIED OUT BY A SMALL GROUP OF PEOPLE AND
62 CONSISTS OF IN THE DEVELOPMENT OF AN DETERMINES WHETHER THE ORGANIZATION IS IN A CONDITION TO
AIS CARRY OUT THE PROJECT. GENERALLY THE STUDY CAN BE
TECHNICAL, Legal and operational.

TECHNICAL FEASIBILITY: WITH CURRENT EQUIPMENT, AVAILABLE


MENTION THE TYPES OF STUDIES THAT
SOFTWARE TECHNOLOGY AND PERSONNEL, CAN THE PROJECT BE
SHOULD BE CARRIED OUT IN THE
63 CARRIED OUT? IF A NEW TECHNOLOGY IS REQUIRED, WHAT IS THE
FEASIBILITY ANALYSIS AND CONCEPTUALLY
POSSIBILITY OF DEVELOPING IT? ECONOMIC FEASIBILITY : THE
DEVELOP ONE OF THEM
BENEFITS THAT WILL BE OBTAINED

AT THIS STAGE YOU MUST UNDERSTAND ALL THE IMPORTANT FACETS


EXPLAIN WHAT IT CONSISTS OF OF THE PART OF THE COMPANY THAT IS UNDER STUDY. THE
64 DETERMINATION OF THE PROCESSES OF A COMPANY SHOULD BE STUDY TO UNDERSTAND THE
SYSTEM REQUIREMENTS FOLLOWING QUESTIONS: WHAT IS DONE?, HOW IS IT DONE?, WITH
WHAT?
HERE IS ESTABLISHED THE FORM AND DETAILS WITH WHICH THE
SYSTEM WILL MEET THE REQUIREMENTS OF THE ANALYSIS STAGE. IN
EXPLAIN WHAT THE SYSTEM DESIGN STAGE
65 THE DESIGN STAGE IT IS SUBDIVIDED INTO TWO STAGES CALLED:
CONSISTS OF IN THE LIFE CYCLE
LOGICAL DESIGN AND PHYSICAL DESIGN. IN LOGICAL DESIGN IT IS
IDENTIFIED WHAT IS WHAT

THE ACTIVITIES OF THIS STAGE MAINLY CONSISTS OF CREATING


EXPLAIN WHAT SOFTWARE PROGRAMMING CUSTOMIZED PROGRAMS, ACCORDING TO THE DESIGN
66 OR DEVELOPMENT CONSISTS OF IN THE REQUIREMENTS. SOFTWARE PURCHASED FROM THIRD PARTIES MAY
LIFE CYCLE ALSO BE INSTALLED OR MODIFIED. THE CHOICE DEPENDS ON THE
COST OF EACH ALTERNATE

AT THIS STAGE THE SYSTEM IS EXPERIMENTALLY TESTED TO MAKE


EXPLAIN WHAT THE SYSTEM TEST STAGE SURE IT IS FAILURE-FREE, THAT IS, IT WORKS ACCORDING TO
67
CONSISTS OF, IN THE LIFE CYCLE SPECIFICATIONS AND AS USERS EXPECT. THE TESTS OF THE SYSTEM
WILL BE WITH USERS OF DIFFERENT LEVELS OF

THE IMPLEMENTATION CONSIDERS THE CHANGE OF THE OLD SYSTEM


EXPLAIN WHAT THE IMPLEMENTATION AND FOR THE NEW SYSTEM, THIS IMPLEMENTATION CAN BE IN VARIOUS
68 EVALUATION OF THE SYSTEM CONSISTS OF, WAYS DEPENDING ON THE SIZE OF THE
IN THE LIFE CYCLE ORGANIZATION AND RISK ASSOCIATED WITH THE USE OF THE SYSTEM,
FOR EXAMPLE: PARALLEL IMPLEMENTATION,

DEPENDING ON THE CHANGES THAT OCCUR IN THE ORGANIZATION


EXPLAIN WHAT THE MAINTENANCE AND WITH THE PASSAGE OF TIME, THE SYSTEM MUST BE MAINTAINED,
69 EVALUATION OF SYSTEMS IN THE LIFE CHANGES AND MODIFICATIONS WILL BE MADE IN THE SOFTWARE,
CYCLE CONSISTS OF FILES OR PROCEDURES TO MEET THE NEW NEEDS OF THE USERS.

BECAUSE THE NEED FOR SYSTEM SYSTEMS ANALYSIS AND DESIGN IS USED TO ANALYZE, DESIGN AND
ANALYSIS AND DESIGN IS CONSIDERED AS IMPLEMENT IMPROVEMENTS IN BUSINESS OPERATIONS THAT CAN BE
70 A CHARACTERISTICS OF THE ACHIEVED THROUGH THE USE OF COMPUTERIZED INFORMATION
DEVELOPMENT OF ANY INFORMATION SYSTEMS. THE INSTALLATION OF A SYSTEM WITHOUT PLANNING
SYSTEM
THE ANALYST NOT ONLY DEVELOPS TECHNICAL SOLUTIONS, BUT
REDEFINES THE CONFIGURATIONS, INTERACTIONS, ACTIVITIES OF THE
EXPLAIN WHY THE SYSTEMS ANALYST IS
71 POSITIONS AND THE POWER RELATIONSHIPS OF DIFFERENT
CONSIDERED AS AN AGENT OF CHANGE
INSTITUTIONAL GROUPS. THE ANALYST IS THE CATALYST FOR THE
ENTIRE CHANGE PROCESS AND
72 does not exist does not exist
What function does the Dhcp Server play in a It is used to automatically assign IP to the machines that connect to the network.
73
network.

1,- Shared folder permissions are applicable to folders, however NTFS are
Name 1 differences between shared folder applicable to folders and files. 2.- Ntfs Permissions are applicable only on ntfs
74
permissions and ntfs volumes, however, shared folder permissions are applicable on fat and ntfs
volumes

DNS and wins are name resolution methods. The difference between these 2
What is the main difference between DNS and
75 methods is that wins does not support hierarchy of DNS differences, that is why
Wins?
DNS is the internet resolution method.

A set of computers connected to each other in order to share resources such as


76 What is a network?
printers, documents, etc.
1.- Multiple access method by carrier detection by collision detection
77 Name 2 media access methods.
(CSMA/CD) 2.- Witness passing (token)

The purpose of the OSI model is to structure the problem of communications in


78 What is the purpose of the OSI Model? layers, in order to reduce the complexity of communications, ensuring the
interoperability of the technology.

It is a set of rules that are established in order to regulate communications


79 Define Protocol
between devices on a network, for example it may be the language in which
they will communicate, the transmission and reception times.
1,- Physical layer2,- Data link 3,- Network 4.-Transport 5,- session 6,-
80
Name osi model layers in ascending order Presentation 7,- Application

Name the layers of the OSI model in ascending 1,- Physical Layer 2,- Data Link Layer 3,- Network Layer 4,- Transport Layer, 5 -
81
order Session Layer, 6 - Presentation Layer 7- Application Layer
The components of this type of architecture are 3:
1. Client: He is the one who sends a service request. In this context we refer to
the
What are the components of a client/server browser or examiner.
82 architecture oriented to the development of web 2. Server: process that passively waits for communication.
pages. 3. Communication protocols:
– Defines the communication rules between the client and the server.
– Within these protocols we have TCP-IP as a standard protocol on the WEB.

Steps to create a Website:


• 1. Determination of the scope of the project, what are the objectives and
market (demand).
• 2. Investigation of direct competition.
83 What are the steps in creating a website • 3. Choice of domain name and registration in the respective entities.
• 4. Design, development and implementation of the website.
• 5. Determination of the hosting or housing provider.
• 6. Internal measurement and external audit of the website.
• 7. Website maintenance.
• 8. Marketing and promotion of the website.

What is the difference between Hosting and


84 Hosting comes from the term ("Hosting") is renting a part (measured in MB) of a
Housing
We server; while Housing is the use of its own Web server.
Features of a Website:
• It has an associated IP and port.
• Points to a physical directory.
• It has a name associated with it.
85 What are the Characteristics of a Website. • It has assignable permissions and users.
• Has control information about the site.
• It has an associated default document.
• Several sites can exist on the same server.

The most useful protocols are HTTP, FTP and, TELNET or SSH:
** HTTP: (Hyper Text Transfer Protocol) Protocol used in the World Wide Web
PORT 80.
Uses of HTTP
• Allows communication between a client and a web server.
The components of this type of architecture are 3:
1. Client: He is the one who sends a service request. In this context we refer to
the
Specify which protocols are useful for the browser or examiner.
development, implementation and maintenance 2. Server: process that passively waits for communication.
86
of a Website. 3. Communication protocols:
– Defines the communication rules between the client and the server.
– Within these protocols we have TCP-IP as a standard protocol on the WEB.
1 It is based on the exchange of text.
The Hypertext Transfer Protocol is the set of rules for exchanging files (text,
graphic images, sound, video and other multimedia files) over the "Word Wide
Web." In relation to the TCP/IP protocol suite (which are the basis for the
exchange of information within the network), HTTP is an application for this
protocol.
2 * FTP Fil Tr nfr Pr tl Pr tl drl tr nfrnidrih

The Program would have to be coded again, since there is no compatibility


Problem: Your system is made in ASP dynamic
between them, in addition, different web servers would have to be used,
page languages with connection to the SQL
transferring from IIS or PWS (Internet Information Server or Personal Web
Server database engine and the company wants
Server) to Apache or another that supports said language. In relation to the
to change it to another language such as PERL
87 Database engine, everyone will manage the same script so there would be no
or PHP with the Mysql database engine (or vice
problem. The differences that exist between these alternatives are due to the
versa), what should it do? you in aspects of
number of records supported by the database engines, with SQL being superior
programming and hosting services, also explain
to the other mentioned. In relation to the differences in web servers, Apache has
differences between them?
less vulnerability than IIS.

The steps are the following:


1- Registration is done in NIC.CL, an organization of the University of Chile.
2- Check for the existence and availability of the domain.
What are the steps to follow when renting a CL
88 3- If it does not exist, register indicating the ID and owner information.
point domain. How long is it and what is the cost?
4- Indicate the primary and secondary "DNS" name server to which it should be
directed (to which Web server it is directed).
5- Make payment of 20,000 pesos (This payment is for 2 Years).

What does it mean and what relationship does an ISP means Internet Service Provider ("Internet Service Provider"), as its name
89
ISP have on the Internet. indicates, ISP is the service provided by the companies that provide us with the
Internet, in Chile the best known are terra, entel, vtr, etc.
Description of the Webpay System.
The Webpay service is based on a computer system, developed to allow
cardholders to make payments with Credit Cards over the Internet,
under the concept of online authorization and capture transactions.
To use the Webpay service, the client (companies and merchants affiliated with
Transbank),
must integrate into their website, a connection software provided by Transbank,
called
90 How the WebPay Service works "Commerce Connection Kit (KCC)". This will allow them to accept payments
online.
Once the user has selected the products they want to buy and decides to pay
with Card
of Credit, the company or Commerce, through the KCC, will establish a
connection with a Transbank server of the Webpay service, which will display a
form that
will ask the user to enter their Credit Card information, which will then travel to
the
central computer, which will authorize or reject the transaction.
If the transaction is approved, the response will be accompanied by rn or d

are the following:


Affiliates the clients (companies and businesses) that join this system and
delivers
a software that allows them to access the Webpay service from their websites.

Receives authorization requests for transactions carried out via the Internet
by cardholders, and sends them a response through the same Internet network.

Processes approved transactions and pays them the total sales, minus
commissions,
the sale cancellations and the charges generated for the collection and the
others that the
91 What is the Service Provided by TransBank
company or Commerce authorizes.

Provides the client with information on the transactions carried out through the
system, generating
online, a detail file with the total of the transactions, which includes the result
informed by Transbank ("Approval", "Rejection" or "Not processed").

Deliver transaction settlement to the client at least monthly


with details of movements paid, withheld, pending payment or other relevant
information
for the company or trade.

Identify the programming techniques and specify


92 Programming techniques: Procedural, Modular, Object Oriented, etc.
which one the system under development is
within. Argue considering the tool used.
Identify and describe at least 3 Sorting or Search
93 Insert, Selection, Bubble, Shell, Sort, Binary, etc.
Methods.

The most significant potentials are:


*Platform independent: Java is a cross-platform language, meaning it can be
developed to run equally well on Microsoft Windows, Macintosh Applet, and
most UNIX versions.
94 Identify what potential the JAVA language has. *Small: Programs are faster to download from a page.
*Secure: Prevents people from writing programs that wreak havoc on users'
browsers.

State the purpose of a layered communications


95
model. Standardize protocols and interfaces, achieving interoperability at all levels.

96 What communications characteristic defines the The bandwidth of the transmission medium and its signal-to-noise ratio.
transmission capacity of the link in bps.
A HUB in an Ethernet network has the main
97 It acts as a multiport repeater, defining collision domains.
characteristic.
A Switch in an Ethernet network has the main
98 Perform microsegmentation by defining diffusion domains
characteristic.
Tell the difference between FTP and TFTP layer
99 FTP is connection-oriented and TFTP is disconnection-oriented.
7 protocol
A Router is an interconnection device designed Perform packet routing based on logical addressing and perform switching
100
to. between its ports.

Indicate the maximum length of horizontal wiring


101 90 meters
in the EIA/TIA 568 standard (A or B)

In the TCP/IP model, mention two protocols


102 connection-oriented TCP Disconnection Oriented UDP
associated with transport.

In Ethernet and Token Ring networks, from the


Ethernet is probalistic and Token Ring is deterministic. CSMA/CD and Token
103 point of view of access to the medium, what is
Passing.
the main characteristic that differentiates them?

What is the difference between an IP address The IP address falls into a logical addressing scheme, while the MAC uses a flat
104
and a MAC address? physical addressing scheme.

It is the Address Resolution Protocol, which allows an IP address to be assigned


105 What is the purpose of the ARP protocol?
to a MAC address.

106 In the TCP/IP model, which protocol performs TCP, transport layer protocol.
packet segmentation and sequencing?
Indicate the name that the first partition should
107 SWAP partition
have in Linux
How much space is recommended to allocate to Double the ram memory with a cap of 256 MB.
108
the SWAP partition in Linux? If the PC has 64 MB of Ram, it must assign 128 MB of SWAP
How many consoles can you work on
109 6 plus the center console
simultaneously in Linux?
Name at least 3 desktops that you can start Linux
110 GNOME, KDE, WINDOW MAKER
with

111 You must first mount the CD: mount /mnt/cdrom


Indicate how to read the contents of a CD Second you must enter the CD: cd /mnt/cdrom
First you must mount the diskette format type, in this case it is windows type
How can you read a windows formatted floppy
112 (FAT): mount -t vfat /mnt/fd0
disk on Linux?
/mnt/floppy

Indicate how to enter or with what instruction you You must enter the command line as root and then type the following instruction
113
should call the graphical window where the in lowercase: linuxconf
network, users and work groups are configured.

What is the name of the first file that Linux loads


114 Bootloader
when the machine starts and loads all its drivers?

On the command line how is the network The network administrator (root) will appear with a # sign, while a user will
115
administrator different from the users? appear with a $ sign

-ftp: Used to connect 2 or more PCs and transfer files from the server to the
Tell the difference between an ftp and nfs server
116 client. '-nfs: Used to transfer or export files from any PC that mounts the partition
in Linux
to be shared to another PC.

On Linux, a samba server is used for that.


117 To access Windows files and devices from Linux.

-Linux is a free program and Windows is not -In Linux the same distribution for
the home is used to build a corporate network In
Name 3 differences between the OS Linux and
118 Windows licenses are paid. '-Windows is insecure because of its
Windows.
code
flat, on the other hand, Linux is binary code so it is safe and not vulnerable to
What Data Provider does VB use to connect viruses, etc.
119 client server with MSaccess97 or lower? Microsoft Jet 3.51 OLE DB Provider

120 What Data Provider does VB use to connect Microsoft Jet 4.0 OLE DB Provider
client server with Msaccess 2000, XP or higher?

What tool does VB come with by default to


121 In Packaging and Distribution Wizard: Pack in Deployment Wizards
package and distribute an application?

In the connection string of VB with SQL, which


122
line can never be missing. -Initial Catalog ; It is used to mention the Database to connect.
It is used to contain other forms and load them automatically as soon as the
123 What is the MDI ern VB Form used for?
application is started.
In VB what is the difference between a standard The Standard Module returns code as a response and the Class Module returns
124
module and a class module an object as a response.

To handle errors within a program there are - On Error Resume Next '- On Error Goto
125 "ErrorHandlerName" OBJECT Err: -
instructions, name one
Err.Number, Err.Description, Err.Source
In a B engine. D., for which the ODBC data It is used to provide information on how to connect to a specific provider or data
126
manager is used. source.
What type of project should you use to make an
127 Activex Control
OCX control in VB?
If you are developing a program and the data
provider for the data engine that is going to be
128 connected does not appear in your list of The standard ODBC provider
components or references, what provider do you
use?
Keypress, Click, DbClick, Change, MouseUp, MouseDown, GotFocus, Validate,
129
Name at least any 5 events in VB Load, Activate, DragDrop, etc.

Name 3 types of projects that can be developed -Standard exe projects '-ActiveX Exe Project
130 '-ActiveX Control Project '-ActiveX DLL Project
in VB
'-Active Document Project
Standard Forms (.frm), Standard Modules (.bas), Class Modules (.cls), ActiveX
Name 4 types of forms or files that a VB project
131 Documents (.dob), ActiveX Designer Files (.dsr), User Control Modules (.ctl),
can include
etc.

Adding an Error Handler: On Error Goto


132 How can you intercept an error in the execution
"ErrorHandler" ErrorHandler: .......................
of your code and send them to an error handler?

133 Which data access methods are currently used ADO: Activate Data Object
and default with SQL Server?
Name the components of an ADO object model - Connection Object - Command Object
134
(SQL) - Recordset object

135 What aspects are taken into consideration when Project type, duration, methodology, risk, user, available resources.
choosing a Project Life Cycle Model?

136 What are the "Dimensions of Development"?


People Processes Product Technology

• Engineering (extensive knowledge)


What are the areas of responsibility and authority • Cost and cash flow management
137 • Contractual legislation (know the contract)
of a Project Manager?
• Negotiation (customers, suppliers, subcontractors)
• Planning (schedule and define phases of work)
What elements will you consider relevant to
138 Time, cost, progress and trend
control in any project?

• Relevant
What are the characteristics of the information • Timely
139 • Reliable
provided by a control system?
• Flexible
• Economic
Plan + calendar: • When a calendar for execution is added to the detailed plan,
In the context of project management, what is a
140 you have a program that indicates when each of the activities should be
schedule?
executed.
• To estimate the resource requirements of each activity, the productivity of
each resource is used.
• Standard or average productivity of each resource for the proposal, detail
productivity for the project detail plan.
• Productivity of human resources is a function of: qualification, experience,
141 Opinion on resource productivity
motivation, machine support.
• Machinery productivity is a function of: technological level, quality and quantity
of maintenance, type of material, age.
• Project manager must choose work methods that minimize cost and duration
while maximizing the quality of work.

• The “responsibility matrix” is used to define in great detail the project


organization, the key people and their respective responsibilities.
142 What is the Responsibility Matrix? • The matrix identifies, on the one hand, the activities necessary to execute the
project and, on the other hand, the people are identified, either by position or
name, who have some degree of engineering, decision or responsibility in its
execution.
n Unique, definable purpose, product or result, new or improved capability for an
organization (technical scope).
n Process organized, directed or executed to obtain, achieve or develop the
above.
n Temporary activity that has a clearly identifiable beginning and end.
143 Characterization of what a Project is n It involves a cost for the organization that requires its acquisition.
n It involves uncertainty and risk, so planning is essential. n Idea you have about
something you plan to do and how to do it.
n Set of writings, calculations and drawings that are made to give an idea of
what a work of architecture, engineering, etc. should look like and what it should
cost.

• An alternative is to compare:
• The Costs you will incur.
• The benefits you will get.
The benefits can be of two types:
Tangibles:
• Easy to evaluate economically
• How much will the computer cost (PC, WS)...
How can the benefits of using information
144 • Reduction quantity in stock.
technologies be estimated? Intangibles:
• Difficult to evaluate economically.
• Loss of customers...
• Greater competitiveness...

• Collect information periodically


• Produce comprehensive reports
• Coherent reports but with different levels of detail intended for different levels
145 What are the characteristics of a control system?
of administration
• Consistency must be ensured based on a single source of information

• By comparing physical progress with scheduled progress you have an idea of


146 What comparisons are made to get an idea of
how the execution of the project has evolved.
how the project works?

• By comparing physical progress with expenses and time you have an idea of
147 What comparisons are made to get an idea of the
how efficient the execution has been and can be projected into the future.
efficiency of the project?

What are the responsibilities of a project - Assume: achievements/failures of the group.


148
manager? - Group effectiveness: Achieving objectives.
- Group efficiency:
Use the minimum resources to achieve the goal.

• Technical skills
n Knowledge and training in: Methods, processes and Procedures.
• Human Skills
n Is skilled at working with people
n facilitates cooperative work
n train and lead teams
n creates an environment in which subordinates feel safe and free to express
their opinions.
149 What are the skills of a Project Manager?
• Conceptual Skills
n Has a global vision.
n Ability to recognize the significant elements in a situation
n Understand the relationship between elements.
• Design Skills
n Solve problems so that the organization benefits.
n Generate practical solutions to problems.
n It is a fundamental skill in senior management.

Insurance: Free and exempt from all damage or risk. Firm, not in danger of
missing or falling.
Data: Any method used to protect data stored on external storage devices from
access by unauthorized persons.
150 Define System Security Security is the probability (which can be estimated or deduced from empirical
evidence) that an attack of a given type can be repelled.
Administrative elements
Defining a security policy
Organization and division of responsibilities
Physical security
151 What does system security cover? Disaster control
Personnel Safety Practices
Technical elements and procedures
Security systems (equipment, systems, data, files, DB, networks, etc.)
Role of internal and external auditors
Contingency plans.

It involves identifying risks, quantifying their probability and impact, and


analyzing measures to eliminate them (which is generally impossible) or to
reduce the probability of the events occurring or mitigate the impact. Risk must
be managed.
152 What is Risk Assessment? From the perspective of the security auditor, it is necessary to review whether
the threats have been considered, or evaluate them: errors and negligence in
general, natural disasters, failures in facilities or fraud or crimes, and which can
result in damage to: people, programs, networks, facilities, or other assets, and
lead to worse service to internal or external users.

The auditor must pursue:


Obtain detailed knowledge of the program's operations and its relationship with
What should the auditor pursue within computer
153 other programs
applications?
Detect errors in the interpretation of functional specifications. Guarantee the
existence and operation of adequate controls.

What activities should be carried out if If errors are detected during the audit, it will be necessary:
Study in detail the repercussions
154 errors/inconsistencies are detected during the Evaluate or estimate the economic impact
audit? Determine the causes of the error (be careful with related controls)
Propose and recommend the measures to be taken
What do "Previous Reports" consist of and in Previous reports: are applied in the case of detection of significant irregularities
155
what cases are they used? (errors or fraud) and where immediate actions are required.

All existing methodologies used in auditing and computer control can be


grouped into two large families:
What do you understand by an Audit Quantitative: Based on a numerical mathematical model that helps carry out the
156
methodology? work.
Qualitative: Based on human judgment and reasoning capable of defining a
work process, to select based on accumulated experience.

Form of Protection that organizations have.


Why is it said that Audits are one of the forms
157 • Protection of accounting processes.
that protection organizations have? • It is related to business efficiency.
• Orientation to administration policies.

Causes that justify auditing.


• Authorization Issues
158 Mention 4 causes that justify computer audits. • Processing and Classification of Actions
• Physical Safeguard
• Verification and Evaluation
• Protection of the Organization's Interests

159 What approach can data protection take?


Confidentiality Availability Integrity.
Systems analysis is a review, classification and interpretation of facts allowing a
160 What is systems analysis? diagnosis of problems and with the information resulting from this, recommending
improvements. (It is the study of what is going to be)

System design is the process of planning, replacing or complementing, it is what


establishes how to achieve the objective, this is achieved as long as the old system is
161 What is systems design?
fully known since it would be difficult to design a system without knowing all the
operations without knowing all the information that has been handled previously.
The purpose of a systems study is to search for the best use of the current system and the
solution to the problems if they exist. The following must participate: The systems
analyst since he recommends the appropriate solution.

- The Managers of the organization since they are the ones who direct it
What is the purpose of a systems study?
162 Who should participate in it? What results are
- The employees of the organization since they are the ones who interact directly with
expected from this study?
the failures or weaknesses of the system.

The result is detecting system failures or weaknesses and providing possible solutions to
it.

The existing strategies are:

- Life cycle method for systems development.


- Method of developing structured analysis.
What strategies exist for systems development? Why - System prototype method.
163
are there different strategies?
Why it exists; It is because each of these strategies addresses the
characteristics of the method and the conditions under which the organization is
likely to obtain the greatest benefit.
It is characterized by the use of elements such as graphic symbols, data flow
diagrams and a centralized dictionary of these and allows people to visualize the
What are the characteristics that distinguish the
164 system through the aforementioned elements.
structured analysis development method?

A tool is any device that, when used appropriately, improves the performance of a task.

There are the following tools:

Within the context of systems analysis and design, 1 .Tools for analysis.
165
what are tools? What types of tools exist? 2.Tools for design.
3 .Tools for he
development.

Transaction processing systems: Improve the routine activities of the organization. They
also provide speed and accuracy, being programmed to follow routines without any
variation. Replaces manual procedures with computer-based ones. Deals with well-
structured routine processes.

A transaction is any event or activity that affects the entire company. The most common
What are transaction processing systems? What is a transactions include. invoicing, delivery of merchandise, payment of salaries and deposit
166
transaction? of checks.

Transaction processing is the set of procedures for managing transactions that includes
calculations, classification, ordering, storage and retrieval, generation of summaries.

It is a critical examination that is carried out in order to evaluate the efficiency


and effectiveness of a section and organization.
The computer audit must always keep in mind
167 What is meant by computer audit? the concepts of authorization, processing and classification of transactions, as
well as those of physical safeguarding, verification and evaluation of equipment
and information.

An audit is carried out not only when there are errors or failures but when
168 When is an audit justified? control, evaluation of processes, tasks, verification of correct operation, etc. are
required. That is, internal control.
An operating system is a set of programs that make hardware usable. The
operating system is a manager of resources: cpu, I/O devices, memory, data.
169 What is an Operative System?
Functions.-
The functions of the operating system are:
170 What are the functions of an operating system? 1. User interface
2. Share information between users
3. Share hardware
4. Recover from errors Etc.

Running program.
1 .Execution: whether it is running.
171 What is a process and what are its states? 2 .New or ready: if it has just been created.
3 .Wait: If you are stopped and waiting to use the CPU again
4.Stopped.
5.Dead: definitively detained.
multiprogramming, that is, the processor is working continuously. It consists of
dividing the memory space into several parts, being able to have a program in
each of those parts. When there is an I/O process the SSOO starts another job.
172 What is multiprogramming?

It reads a separate stream of data, each with control flags that define what each
job does.
173 Explain :Batch operating system
The telltale characteristic of a batch system is the absence of interconnection
between the user and the job while it is running.

1 .Logical extension of multiprogramming


What are the characteristics of a time sharing
174 2 .The CPU executes the various tasks alternating between them.
system?
3 Due to the frequent changes that its tasks experience, it allows users to
interact with the programs while they are running.
Each server is implemented as one or more processes, so that each process
waits for some client (an application program or another operating system
One of the characteristics that Windows NT has
175 module) to make a request for one of its services. This request is made by
is its client/server architecture. Explain
sending a message to the server, which performs the requested operation and
responds with another message.
It is a combination of hardware and software support that allows the computer
176 What does the term plug & play mean? system to recognize and adapt changes in hardware configuration with little or
no user intervention.

The word multitasking describes the ability to run many programs at the same
The Linux operating system is characterized by
time without stopping the execution of each application. Another feature is the
177 being a Multitasking and Multiuser operating
ability to allocate microprocessor time simultaneously to several applications,
system. Explain.
allowing services to be offered to various users at the same time, each of them
executing one or more applications at the same time.
set of routines whose mission is to manage the processor. The memory and the
178 What is the operating system kernel?
rest of the resources available in the installation
It is characterized because it shares a few resources, usually disks and printers,
What are the characteristics of a network
179 through a network with other machines connected to each other.
operating system?

180 Socket corresponds to a slot to mount a processor

File System: The structure of a file system is in the form of a tree. The file
system is the files and directories. The functions are creating and deleting files,
sharing files to exchange information, grouping files in a way convenient to the
181 What is meant by file systems? user, backup and recovery, user access to information without the need to know
the physical location (knowing only the symbolic names).

Strictly speaking, processes are said to be concurrent if they exist in the same
From the computational point of view when time interval, that is, they are active simultaneously.
182 talking about concurrent processes and parallel On the other hand, it is said that the processes act in parallel if they exist at the
processes same moment, which implies that they must be executed on separate
processors.

183 What is meant by compaction?


The memory distribution to convert all free areas into a contiguous space.

It is to present itself to its users as a traditional uniprocessor system, although it


184 What is the function of a distributed system?
is composed of multiple processors,

It is an operating system technique that allows you to improve memory


185 Explain what the term swapping consists of. utilization by making swaps from main memory to fast secondary storage
devices.
What is a systems prototype? When is it most The prototype corresponds to the experimental part of the system, with this system
appropriate to use the prototyping method? analysts can develop all types of tests, both calculation and producing information,
whether printed or presented on a screen.

The use of prototypes will be necessary when within the organization the
information requirements are not always well defined, in addition, prototypes allow
186
evaluating extraordinary situations where those in charge of the system do not have
enough information and lack experience, in addition, the prototype is used as a pilot,
with this the design evolves with use,

Describe the process of building a systems prototype. 1.1 identify the information requirements that the user knows along with the
What role do analysts and end users have in this necessary characteristics of the system.
process? 2. Develop a working prototype.
3. Use the prototype, noting the needs for changes and improvements. This expands the
list of known system requirements.
4. Review the prototype based on the information obtained through the user experience.
5. Repeat the previous steps as many times as necessary, until you obtain a satisfactory
system.
187
The role that analysts and end users play in this process is that through the use and
experience of the systems, an optimal prototype can be developed and its functionality is
the responsibility of the systems analyst.

188 How can software engineering be defined? It is a discipline that integrates methods, tools and procedures for the
development of computer software.

189 What is Software? (1) computer instructions that when executed provide the desired function and
behavior, (2) data structures that make it easy for programs to properly
manipulate information, and (3) documents that describe the operation and use
of programs.
190 What do management software consist of? The processing of management information has constituted, almost since the
beginning of computing, the largest application area of computers. These
programs use large amounts of information stored in databases in order to
facilitate business transactions or decision making. In addition to conventional
data processing tasks, in which processing time is not critical and errors can be
corrected a posteriori, they include interactive programs that support commercial
transactions.

191 Explain what embedded software consists of Embedded software is software that is installed in other industrial products, such
as consumer electronics, providing these products with an increasingly greater
degree of intelligence. It is applied to all types of products, from a home video to
an atomic-headed missile, including some automobile control systems, and
performs very diverse functions, which can range from complicated calculations
in real time to simple interactions with the user. facilitating the handling of the
device that incorporates them. They share characteristics with systems
software, real-time software, engineering and scientific software, and personal
computer software.

192 Describe the concept of Reengineering Software reengineering not only recovers information about the design of an
existing program but uses this information to restructure or reconstruct the
existing program, with a view to adapting it to a change, expanding it or
improving its overall quality, with the aim of achieving a greater ease of
maintenance in the future (this is what is called preventive maintenance).
193 What is reverse engineering? Reverse engineering consists of analyzing a program in an effort to represent it
at a higher level of abstraction than the source code, so that information is
extracted from its data design, architecture and procedural detail, in order to
understand it.

194 What does the classic life cycle consist of? It requires a systematic and sequential approach to software development. It is
made up of the following stages:
1.System Engineering and Analysis: The software is part of a larger system,
therefore the requirements and elements of the system must be identified.
2.Software Requirements Analysis: The requirements gathering process
focuses on the software. What interfaces, nature of the specific applications to
be built, the information scope of the software.
3.Design: Software Design includes 4 steps: the data structure, the software
architecture, the procedural detail and the characterization of the interface.
4.Coding: The design must be translated in a form readable by the computer
(instructions-language), this translation can be mechanical and/or automatic
5.Test: Logic and consistency tests of the coded algorithms, system integrity.
6.Maintenance: Software update due to changes in the environment;
modifications due to errors, etc.

195 Indicate disadvantages of the classical 1. Projects do not always follow a sequential flow according to the model.
methodology
2. The Client or user does not always manage to clearly establish their requirements at
the beginning of the project as required by this methodology.

3. There is a "wait" until the last stage to see the software product. An error not detected
until the program is running can be disastrous.

196 What is meant by software metrics?


refers to a broad range of measurements for computer software. It is applied
with the intent of improving it on a continuous basis. The engineer may use
measurement to help evaluate the quality of a technical work product and to
assist in making of tactical decisions as the project evolves.
197 Indicate advantages and disadvantages of Advantages
construction by prototypes. Fast and cheap (compared to the life cycle method).
It works when the requirements are uncertain.
High level of interface (interrelationship) with the user (ensures that they are
given what they want)
Disadvantages:

Unsuitable for large and complex systems.


It can be superficial and skip important steps in analysis, documentation and
testing.

198 Indicate advantages and disadvantages of Advantages:


purchasing software packages (sw standard) Shorter development time. (Very little design, no programming, no testing if it
has a history).
Reduces internal maintenance costs (external maintenance contracts)
The third party used for the purchase is generally efficient and effective,
BECAUSE IT IS THEIR BUSINESS.
Disadvantages:
Adaptability requirements versus provision.
Non-availability of sources (is it really a disadvantage? And if I have them,
what?).
Modification alternatives. Facade and backyard programs
Initial price = final cost? (hidden implementation costs).
If modifications are requested to the original version, do I still have the
advantages of a soft purchase or not?
199 What is meant by paradigms? Definition: “A set of rules and regulations (written or unwritten) that does two
things: establish or define limits, and indicate how to behave within those limits
to be successful, which is measured by problem-solving ability” Joel Arthur
Barkeren

200 What is meant by CASE tools?


Computer-aided software engineering.
It provides the engineer with the ability to automate manual activities and
improve their overall engineering vision. CASE tools help ensure that quality is
designed before the product is built.
201 What does the incremental model consist of and The incremental model applies linear sequences, in the same way that time
when is its development considered useful? progresses on the calendar, each linear sequence produces an increment of the
software.
It is particularly useful when staffing is not available and deadlines must be met.

202 Describe what function the Report object fulfills. They are lists that can be output by printer, displayed on the screen or selected
for output through a file.
203 Describe what function the TRN object fulfills. They are the ones that will allow us interactively, through the screen, to carry out
the application database maintenance process.
204 Describe what function the work Panel object They are with which interactive queries can be defined to the database.
fulfills
205 Describe what function the Procedures object It defines all non-interactive database update processes and general-purpose
fulfills. subroutines.
206 What is the process of creating and maintaining Reorganization
the Database called.
207 Name three types of visual control applicable to Combo Box, Check Box, List Box
an attribute in the Form of a transaction

208 Name at least four Programming Languages Visual Basic, Visual Fox-Pro, Java, COBOL
supported by GeneXus
209 Name at least three Databases with which Oracle, SQL, Informix
Genexus works.
210 How do I identify the primary key of a table in a It is identified by an asterisk or a key next to the attribute.
Transaction?
211 How does GeneXus evaluate the order of It evaluates them with respect to when the action of the rule is fulfilled, not in the
execution of the rules? order in which they are written.
212 In what event is the data loading of a Subfile in the load event.
carried out?
213 What is a user event? A user event is one that is defined and created by the user and is not predefined
by genexus.
214 What is a SUBFILE? This is what will allow us to deploy data and manipulate it, either through queries
or transaction management.
215 In the procedures, is there referential integrity In the procedures there is no referential integrity, that is, it eliminates the data
control? regardless of whether it is related to other data in other tables.
216 Explain the concept of normalization

The design of schemes to generate relational databases must consider the


objective of storing information without unnecessary redundancy, but at the
same time allowing us to easily retrieve information. One technique is to design
schematics that have a suitable normal form.
The undesirable properties that a bad design brings are basically:
- Repetition of information
- Inability to represent certain information
- Loss of information
Normal forms, defined in relational theory, allow us to prevent these undesirable
properties from appearing in a database based on a poorly designed schema. A
schematic must be in at least third normal form to be acceptable.
It must be considered that normalization rules are aimed at preventing update
anomalies and inconsistencies in data.
217 Explain what the 1st normal form consists of. A relationship is said to be in 1NF when each attribute takes only one value from
Exemplify. the underlying simple domain. That is, there are no repetitive groups.
The first normal form is a restriction inherent to the relational model, so its
compliance is mandatory for every relationship.
218 Explain the Pure Cascade life cycle model In a waterfall model, a project progresses through an ordered sequence of steps
from the initial software concept to system testing (stages: software concept,
requirements analysis, overall design, detailed design, coding and debugging,
testing of the system). At the end of each stage, a review of the project is carried
out to decide whether to move to the next stage or remain there until it is ready.
The main product that is passed from stage to stage are the documents.

219 Explain the Spiral life cycle model The Spiral model is a risk-oriented life cycle model that divides a project into
mini projects. Each mini project focuses on one or more important risks until all
of these are controlled.
Basically, you start from a small scale in the middle of the spiral, locate the risks,
generate a plan to manage the risks, and then establish an approach to the next
iteration. The model can be combined with other life cycle models in two
different ways: reducing risks to an acceptable level and ending with another life
cycle model or including another model in some iteration. One of the most
important advantages of the spiral model is that as costs increase, risks
decrease.

220 Explain the Evolutionary Prototyping life cycle Evolutionary prototyping is a life cycle model in which the system concept is
model developed as the project progresses. Normally one begins by developing the
most visible aspects of the system. You can present the system part to the client
and then continue developing the prototype based on the feedback you receive.
At some point it is agreed that the prototype is good enough and the prototype is
delivered as the final product. It is especially used when requirements change
rapidly, when the customer is reluctant to specify the set of requirements, or
when neither you nor the customer properly identify the application area.

221 Explain the life cycle model Staged Delivery The staged delivery model is another lifecycle model in which software is
delivered to the customer in successively refined stages. Unlike the evolutionary
prototyping model, when you use staged delivery, you know exactly what you
are going to build when you proceed to build it. What differentiates the staged
delivery model is that the software is not delivered at the end of the project in
one go. It is delivered in successive stages throughout the project (also known
as “incremental implementation”). The software concept, requirements analysis
and global design activities are carried out at the beginning of the project, to
later carry out the detailed design, coding, debugging and testing within each
stage. The main advantage is that it delivers useful functionality before
delivering 100% of the project at the end of it.

222 Explain the Design by Planning life cycle model The design-by-plan life cycle model is similar to the staged delivery life cycle
model, in which the product is planned to be developed in successive stages.
The difference is that it is not always known at the beginning whether the
product will be available for the last delivery. This life cycle model ensures that a
product is ready to be delivered on a certain date. One of the critical elements of
this life cycle model is to prioritize features and plan their stages so that the first
ones contain the highest priority features. Low priority features are left for later.
If the delivery date is reached before all stages have been completed, it is not
advisable to leave critical features undone because implementation time has
been spent on less critical features.

223 Explain the Evolutionary Delivery life cycle model Evolutionary delivery is a lifecycle model that falls between evolutionary
prototyping and staged delivery. A version of the product is developed, shown to
the customer, and the product is refined based on customer feedback. The
similarity between evolutionary delivery and evolutionary prototyping really
depends on the extent to which planning is carried out to accommodate
customer requests. If planned to accommodate the majority of requests,
evolutionary delivery will be more like evolutionary prototyping. If planned to
accommodate few change requests, evolutionary delivery will approximate
staged delivery. The main differences between evolutionary prototyping and
evolutionary delivery are more of emphasis than fundamental approach. In
evolutionary prototyping the initial emphasis is on the visible aspects of the
system, then it goes back and fills in the gaps in the foundations of the system.
In evolutionary delivery, the initial emphasis is placed on the core of the system,
which is made up of functions of
224 In the context of life cycle models applicable to a The phrase “incremental development techniques” refers to development
project, explain what incremental development methods that allow a program to be created and delivered in stages.
techniques consist of. Incremental techniques reduce risk by breaking the project into a series of
smaller subprojects. Completing small subprojects can be easier than
completing a single monolithic project. Incremental development techniques
increase visibility of progress by providing completed and operational modules
of an extensive system before the entire system is operational. These
techniques offer greater ability to make mid-stream modifications, because the
system is ready to ship many times during its development; You can use any of
the ready-to-deliver versions as a starting point instead of waiting until the end.
Life cycle models that support incremental development include spiral models,
evolutionary prototyping, staged delivery, and evolutionary delivery.

225 Explain what the essential model is and its The essential model of the system is a model of what the system must do to
components satisfy the user's requirements, saying as little as possible (preferably nothing)
about how it will be implemented. This model assumes the existence and
availability of perfect technology that can be obtained easily and at no cost. The
essential model consists of two main components: environmental model and
behavioral model. The environmental model defines the boundary between the
system and the rest of the world (i.e., the environment in which the system
exists). It consists of a context diagram, a list of events, and a brief description
of the purpose of the system. Additionally it may require initial data dictionary
that defines all flows and external stores, and entity-relationship model of
external stores. The behavioral model describes the behavior that is required for
the system to successfully interact with the environment. It consists of data flow
diagrams, entity-relationship diagram, state transition diagram, data dictionary
and process specifications.

226 What are the aspects to consider when treating An effective strategy to deal with risks must consider three aspects: Risk
the risks of a project? reduction, monitoring and management (RMMM or RM3) · Risk avoidance.
o Develop a risk reduction plan.
o The action that must be taken depends on each risk.
· Monitor risk.
o The project manager checks factors that indicate whether the risk is becoming
more or less probable.
o The action that must be taken depends on each risk.
· Manage risk and propose contingency plans. Here it is assumed that the risk
reduction plans have failed and these have been presented. Plans must be
proposed to deal with the consequences of the risks.

227 What is the general objective of the ISO The main objective of the ISO Organization (International Satandar
organization? Organization) is to establish standardization standards in various productive and
service areas, such as communications (ISO Model), electrical standards, SIAS
construction, etc.
228 In general terms, what is understood by Any process in which two well-defined agents are distinguished, in which one
Client/Server architecture? requests services (CLIENT), and another (SERVER) that captures such
requests, executes the necessary processes and sends the results obtained to
the client.
229 What advantages does using a SABD offer?
The use of a SABD offers the following benefits: security management, data
backup and recovery, performance statistics, design facilities, etc.
230 What is object-oriented programming? It consists of using objects where instructions are ENCAPSULATED to respond
to MESSAGES received from the external medium; For example, the
programming of a button in Basic visual language, where the response to a click
or double click must be programmed.
231 What advantages does using a relational Basically the main advantage is the guarantee of INTEGRITY of the data, data
database offer? that is related cannot be deleted by mistake.
232 Define the role of a project manager The project manager is a person who has the responsibility of planning,
controlling and directing the activities of the project. Many times these
responsibilities involve the coordination and integration of activities across
organizational units.
233 What is a DFD? A DFD is a network diagram that represents the flow of data and the
transformations that are applied to it as it moves from the input to the output of
the system. It is used to model system functions and the data that flows
between them at different levels of abstraction.
234 What is meant by a data dictionary?
We can define a data dictionary (DD) as an organized list of the data used by
the system that is graphically represented by the flows and stores present on
the set of DFDs.
235 What are decision trees? A decision tree is a model of a discrete function in which the value of a variable
is determined and an action is carried out based on its value.

236 What is the general goal of a structured design? The general objective of structured design is to develop the program structure,
as well as the relationships between the elements, called modules, that make up
this structure. The data flow-oriented design allows the transition from the data
flow diagram to a description of the program structure.

237 To correct errors or anomalies in the different stages of a Computer System or


What is the importance of the Computer Audit? Project.
238 What is the importance of graphs in networks Creation of Network Maps; Cable Savings, Network Speed, Traffic Optimization,
etc.
239 What advantages does a wireless network have Shorter installation time, Greater Adaptability to changes.
over a wired one?
240 Difference between procedure and function in Procedure: You can modify the value of a variable through a sequence of
programming instructions.
Function: Returns a value to a variable or field.
241 MS-Project, Data Arquitec, Process Analysis
What tools would you use to manage a project?
242 What is SWOT analysis? It is one of the analytical tools that allows you to work with all the information
that has been collected and provides an objective and precise diagnosis of the
current situation of the organization. And it consists of identifying Strengths,
Opportunities, Weaknesses and Threats.

243 Relate Porter's forces According to Porter, the ability of an organization to compete in a given market
is determined by the technical and economic resources of the organization, as
well as by five environmental forces, each of which threatens the organization
and drives it into a new market. .
- Rivalry between competitors
- Threat of new competitors
- Supplier bargaining power
- Bargaining power of clients or buyers
- Threat of substitute products or services.

244 What is a DNS Server used for?


A DNS (Domain Name System) server is used to provide user (client)
computers with a name equivalent to IP addresses. The use of this server is
transparent to users when it is properly configured.
245 What is a domain on the Internet? A domain is the registration of a commercial name or brand on the Internet, it
can have several endings:
.com (commercial), .net (networks, communications and internet), .org
(organizations) and .info (information, it is very similar to .com)
246 What does a SABD represent? A SABD is a database management system, which aims to control the
administration, recurrence and control of all data.-As a SABD we have Oracle,
Informix and Sybase among others.-

247 Define what a DBMS is. It represents a Database Management System, which has the logical and
physical scheme of the data for the operations of insertion, query and deletion of
data.
248 What is the fundamental difference between the The fundamental difference is that the classic approach operates on files while
classical approach and the database approach? the database model demands and requires a logical and physical model of the
data in order to represent the existing reality.

249 Explain what Biometrics is, mention an example. Authentication technique, based on measurements of biological characteristics
for the use of passwords. Ex: voice study, body temperature, iris analysis,
fingerprint, etc.
250 Explain who makes up the IT committee and their It should be made up of a few people and chaired by the most senior director or
functions manager within the company, responsible for information technologies. In
addition to the manager or head of IT, Finance, etc. The functions of the
committee are
- Create the IT Plan
- Approve the Strategic Information Systems Plan.
-Approval of large investments in information technologies.
-Setting priorities among large IT projects.
-Discussion vehicle between IT and its users.
-Monitor and monitor the activity of the IT Department.

251 Mention the most used empirical software cost COCOMO, (Constructive Cost Model) where object types are analyzed v/s
estimation model in the Software Engineering weight of complexity
industry.
252 Indicate the factors that determine the quality of Correctness, reliability, efficiency, integrity, ease of use, flexibility, ease of
the Software testing, portability, ease of interoperation.

253 What is the white box test? White box testing is a test case design method that uses the procedural design
control structure to derive test cases. Through white box testing methods, the
software engineer can obtain test cases that guarantee that at least one of the
independent paths of each module are exercised, exercising all logical decisions
in their true and false aspects.

254 List 2 advantages and disadvantages of using ADVANTAGES: The person who answers the questionnaire has greater
questionnaires as data collection techniques. anonymity which can make their answers more honest. Standardized questions
allow for more reliable data to be provided.
DISADVANTAGE: Although the questionnaire can be applied to many people,
100% of the requested responses will not be obtained. The person who
prepares the questionnaire cannot observe the expressions or reactions of
those who respond to the questionnaires.

255 In which Layer of the OSI model do the segments Transport


work?
256 Name the layers of the TCP/IP model Application, Transportation, Internet, Physics.
257 What layer of the OSI model does the Switch Layer 2 Data Link
work on?
258 What is the Bang Metric used for? It is used to develop an indication of the size of the software to be implemented
as consequences of the analysis model.
259 What is a domain controller in Windows 2000 It is a Windows 2000 Server computer that stores a complete replica of the
Server domain directory.
260 What Are The 5 Most Common Models Or Network Model, Hierarchical Model, Relational Model, Object-Oriented Model
Approaches Used In Databases? And Specify
Each Of Them.

261 What is a case tool? Mention 2 that you know


and use. It is a development tool to integrate system construction analysis and design.-
(powerbuilder-dataarchitect+genexus and other programs)
262 Mention the stages in the management process
of a computer project Project start, Project estimate, Risk analysis, Monitoring, Control
263 What is the difference between corrective and
preventive maintenance?
264 What are the quality metrics (measurable in
software)
265 REGARDING QUALITY, WHAT DOES ISO9000
STANDARDS HAVE TO DO WITH SW
ENGINEERING?

266 Define what a Database is. Collection or repository of integrated data, stored on disk and with controlled
redundancy. The data, which must be shared by different users and
applications.
267 Name and explain at least 3 advantages of using Independence of the data with respect to the treatments. This means that a
a Database. change in the treatment of the data should not impose a new design of the
database.
Data consistency.
Since the information in the database is collected and stored only once, the
same data is used in the treatments, which is why its results are said to be
consistent.
Better data availability for all users.
Since the information is in one place. Each user is no longer the owner of the
data, since it is shared by all applications. Greater informative value.
Since the database is a faithful reflection of the real world, it contains all the
interrelationships between the data, which is why it has the greatest informative
value. Greater efficiency in the collection, validation and introduction of data into
the system.
Since data is collected and validated only once, the performance of all pre-
storage processes increases.
Reduced storage space
Since redundancy does not exist or has disappeared, it leads to less disk
occupancy

268 What are the features of the Bios on a PC? When you turn on a PC, the integrated circuit or chip that takes control of the
entire device is the BIOS, Basic Input Output System, a type of special memory
that contains a series of basic programs and codes that control the
motherboard, They check the IDE hard drives, the video card, the memory
chips, the processor, the floppy drive, date, time, etc. It is also the link between
the operating system installed on the computer (MS-DOS, Windows, Linux, etc.)
and the different components installed and connected to the motherboard.

269 What is the default network protocol in Windows The default protocol is TCP/IP because Active Directory based works directly
2000 Server and Windows 2003 Server? Justify with DNS, and the latter is part of the TCP/IP suite
your answer

270 From the following statement: At the presentation It is false because the network cables and Nic are located at the physical layer.
layer of the OSI model, there are network cables On the other hand, the presentation layer includes code conversion, data
and NICs. Indicate if the above is true or false? encryption, and data compression.
Justify your answer

271 What is NTFS? NTFS (New Technology File System) is a file system designed specifically for
Windows NT, with the goal of creating an efficient, robust file system with built-in
security from the ground up. It also supports native file compression and
encryption (the latter only from Windows 2000). NTFS allows you to define the
size of the cluster, starting at 512 bytes (minimum size of a sector)
independently of the size of the partition. It is a system suitable for the large
partitions required on high-performance workstations and servers. It can handle
disks up to 2 Terabytes.
The drawbacks it poses are:
It requires a good amount of hard disk space, so its use on disks smaller than
400 MB is not recommended.
It is not compatible with MS-DOS, Windows 95 or Windows 98. Conversion to
NTFS is one-way.
If you choose to upgrade the drive, you will not be able to convert it back to FAT.

272 What elements are essential for the development Needs, Processes, Product and Technology
of an information system?
273 What is UML? It is a general-purpose language for object-oriented modeling. This language
combines previous modeling such as: object-oriented, data, components,
workflows.
274 Why does the UML standard have an object-
oriented methodology? Improves the capture and validation of requirements.
It brings the problem space and the solution space closer together.
Facilitates construction, maintenance and reuse
Facilitates the transition between different phases
Promotes iterative development of the system
Dispel the barrier between “what” and “how”
275 Indicate the factors that determine the quality of Correctness, reliability, efficiency, integrity, ease of use, flexibility, ease of
the Software. testing, portability, ease of interoperation.

276 What is a Hot Fix? It is a minipatch, the set of these forms a Servipack.
277 What layer of the OSI Model do browsers work At layer 7 of application.
on?
278 What are APIs? Give an example. Interface for application programming. Example: ADO, ODBC.

279 What are Web Services used for? For communication between applications on different platforms.
280 What are the minimum requirements for installing • Intel Pentium or compatible, minimum 166 MHz,
SQL Server 2000? • 64 MB of RAM (128 MB recommended).
• 95-270 MB of free disk space, depending on the type of installation (given the
large size of the download file and its extraction, in total you will need about
1GB of free disk space).
281 Indicate the levels of Testing in the development Unit Test: It is the testing of each module, which is normally carried out by the
of an SI development staff themselves in their environment.
Integration Test: With the software design outline, the tested modules are
integrated to check their interfaces working together. Validation Testing: The
fully assembled software is tested as a whole to check whether it meets the
functional and performance requirements, maintainability, error recovery, etc.
System test: the sw. Once validated, it is integrated with the rest of the system
(performance, security, recovery and resistance).
Acceptance test: the user checks in his own operating environment whether he
accepts it as it is or not.

282 What are LAN networks?


It is a high-speed communications system that connects microcomputers or PCs
that are nearby, usually within the same building. A LAN consists of network
hardware and software and serves to connect PCs that are isolated; It gives the
possibility of sharing programs, information and resources, disk communities,
directories and printers among themselves.
283 does it mention that it is a wan network? It is a wide coverage network that serves to interconnect several man networks,
as well as man networks to interconnect them, usually require special hardware,
wan networks also include satellite links, optical fibers, infrared ray and laser
devices. The computer network that comprises the Internet is connected to form
a WAN.

284 What is a bus topology? It is configured, at least logically with branches, that extend from a central
system, when a signal passes through the bus or collector usually a coaxial
cable, each and every one of the connections listens to the signal that carries
with it an address designation, it is easy To install, any PC can be the server,
due to distribution they are placed at the ends, it is the most used, it uses cable,
terminators and t-connectors.

285 does it mention the concept of star topology? In a star topology, each PC is connected to a centrally located concentrator or
hub. The hub is a hardware device with multiple ports and you can plug a
network cable connector into one of them.

286 what is a protocol?


It is a set of rules that defines the way network communications should be
structured, including format, sequencing, timing, review, and error correction.
287 what is a standard? It is the adopted network specification, which includes guides and rules that
refer to the type of components that should be used, the way to connect; as well
as the communication protocols that must be used.

288 what is network topology? It is the physical form of interconnection between network devices.
289 What is the physical topology of a network? It is the current physical layout of the network, the way the nodes are connected
to each other.
290 What are the characteristics of coaxial cable? Supports distances of 200 to 500 meters. It has a conductor, an insulator, a
shield and a protective cover. The conductor is made of copper and can be
single or multi-wire. The most used coaxial cables are RG-8 50 or thick coaxial,
RG-58 50 and RG-59 75.

291 Describe the characteristics of twisted pair or Its main use is the telephone line, it is also known as 10 base t, there are 2
multipair cable? types: shielded (stp) and unshielded (utp), they should not be on the walls
because they are fragile, it is the oldest and is very Sure, depending on the
signal the speed is 2km or 6km, with amplifiers.

292 What are the characteristics of fiber optics?


It has a bandwidth of 50 MHz. It uses light pulses, it is thinner than a hair, the
maximum distances obtained for local networks are 200 meters. From node to
node, it has a bandwidth of 200 mbits per second.
293 what is bandwidth? It is the space on the frequency axis of the electromagnetic spectrum used by a
transmitter, its transmission speed is measured in bits per second.
294 What is hall duplex transmission mode?
Communication is established in turns in one direction or another, each of the
participating elements acting in turn as transmitter or receiver on the same link.
295 It is transmitted in both directions simultaneously.
What is full duplex transmission mode?
296 .- What is the objective of the osi model? Formalize the different levels of interaction for the connection of computers, thus
enabling computer system communication regardless of manufacturer, location
and operating system.
297 .- What are the layers of the osi model?
It is made up of 7 layers: physical layer, data link layer, network layer, transport
layer, session level, presentation level and operation layer.
298 What are the session level functions of the osi Provides for the services used for the organization and synchronization of the
model? dialogue between users and the management and exchange of data,
establishes the beginning and end of a section, recovers a section, controls the
dialogue, gives a reference to devices by name and not by address, allows you
to write programs that will run on any network installation.
It is a variation since in it a bit with a value of 1 is indicated by the absence of
transmission at the beginning of the interval while a bit with a value of 0 is
indicated by the presence of a transmission.

299 What is an Operative System ? An operating system is a program that acts as an interface between the
computer user and its physical components (hardware). Its main objective is to
facilitate the use of the computer system by using the hardware efficiently.

300 What is a computer system? A computer system is defined as the relationships between the media
(equipment, hardware), data and information necessary for decision making
from the point of view of an integrated system.
301 What can you comment about an interface An operating system acts as an interface between hardware and user. This
between hardware and user, such as interface will be more efficient the easier it is to use and vice versa.
advantages/disadvantages?
The range and extent of services provided by a so It depends on several
factors. Among other things: the user-visible functions of a system They are
largely determined by the needs and characteristics of the target environment
that the system It is meant to endure. For example, a so Intended for program
development in an interactive environment may have a different set of calls and
commands than the OS. Designed for runtime support of a dedicated real-time
application, such as controlling a car engine.

The more efficient the interface is, the more resources it will need and vice
versa.

302 Based on what idea can the operating system be The operating system is said to act as a resource allocator because it is
considered a resource manager? responsible for assigning each of the resources (hardware and software) to
each of the specific programs and users, according to the needs so that the
system can perform its tasks as best as possible. The operating system is
responsible for collecting each of the resource requests and assigning each
request to each resource so that the computer system works efficiently.

The ability to run a program with different input/output devices is called device
independence.

Device independence is possible by making the OS Determine which device a


program uses when it needs I/O. Programs are written to use logical
input/output devices. Control cards or other commands indicate how logical
devices should be mapped to physical devices.
303 What does buffering entail, what advantages and It is a solution to slow input/output devices. This tries to keep both the cpu and
disadvantages does it present? the Like I/O devices. The idea is simple, once the data has been read and the
cpu If you start the operation with them, the input device is instructed to
immediately start the next reading. the cpu And the input device remain busy.
Hopefully when the cpu Be free for the next set of data, the input device will
have finished reading it.

In practice, buffering rarely keeps the CPU busy all the time. And input/output
devices.

Disadvantages: Buffering is complicated and difficult to program. One of the


problems lies in detecting as soon as possible that an I/O device has completed
an operation.

304 What is a precedence graph? It is an oriented acyclic graph whose nodes correspond to individual sentences.
An arc joining the si node to the sj node means that the sj statement can be
executed after the si statement has been completed. It is also a useful tool for
defining process constraints between points of a computation.

You might also like