Document Code No.
SURIGAO STATE COLLEGE FM-SSCT-ACAD-004
Revision No. 00
OF TECHNOLOGY Effective Date
01 January 2019
Page No. 1 of 4
COLLEGE OF ENGINEERING AND INFORMATION TECHNOLOGY Second
Semester, AY 2020-2021
JERIC C. REYES
BSCS-2A
Final Examination in ITE 221 – Information Management
Instruction: Use the answer sheet provided, write your answers eligibly, and avoid erasures.
1. The universal-relation approach of a single schema defines the interaction of database
along with
a. Users
b. Systems
c. Applications
d. Both A and C
Answer: D. Both A and C
2. The term that is considered as a basis for most robust authentication schemes, is said to
be
a. Identification
b. Registration
c. Encryption
d. Refine information
Answer: C. Encryption
3. The functional dependencies are used for
a. Testing instances of relations
b. Specify constraints on legal relations
c. Both A and B
d. Specifying Domain
Answer: C. Both A and B
4. A method that uses two independent pieces/processes of information to identify a
user is known as
a. Authentication through encryption
b. Password-method authentication
c. Two-method authentication
d. Two-factor authentication
Answer: D. Two-factor authentication
5. The method that supports high transaction rates, is known as
a. Presentation pooling
b. Queue pooling
c. Connection pooling
d. Buffer pooling
Answer: C. Connection pooling
6. A data model called the Entity Data Model is developed by
a. Microsoft
b. SQL
c. Oracle
d. Apple
Answer: A. Microsoft
7. The schema for relation r, with ‘R’ denoting the set of attributes, can be expressed by
the notation
a. r c. r(R)
b. R d. R(r)
Answer: C. r(R)
8. In the asymmetric-key encryption process, the key used to encrypt the data is known
as
a. Public key c. Modulation key
b. Private key d. Encryption key
Answer: A. Public key
9. The process of creation of an E-R design trends to generate
a. 2NF designs c. 4NF designs
b. 3NF designs d. 5NF designs
Answer: C. 4NF designs
10. Multivalued dependencies help in eliminate of some of ____________________.
a. 2NF designs c. 4NF designs
b. 3NF designs d. 5NF designs
Answer: B. 3NF designs
(11-13) here’s a relation (R), its attributes and its functional dependencies (F):
R(A, B, C, D, E)
CD→B
A→D
E→C
11. Which of the following sets of relations maintain the lossless join property?
a. R1(ABCDE), R2(ABCD) c. R1(AB), R2(BCDE)
b. R1(AD), R2(ABCE) d. R1(CD), R2(ABCE)
Answer: A. R1(ABCDE), R2(ABCD)
12. Which of the following sets of relations are entirely in Boyce-Codd Normal Form?
a. R1 (ABCDE) c. R1(CDB), R2(ACDE)
b. R1(AD), R2(ABCE) d. R1(CDB), R2(AD), R3(CE), R2(AE)
Answer: B. R1(AD), R2(ABCE)
13. Which of the following sets of relations are dependencies preserving?
a. R1(ABCDE) c. R1(CDB), R2(ACDE)
b. R1(AD), R2(ABCE) d. R1(CDB), R2(AD), R3(CE), R2(AE)
Answer: D. R1(CDB), R2(AD), R3(CE), R2(AE)
14. Which of the following gives a logical structure of the database graphically?
a. Entity-relationship diagram c. Database diagram
b. Entity diagram d. Architectural representation
Answer: A. Entity-relationship diagram
15. The entity relationship set is represented in E-R diagram as:
a. Double diamonds c. Dashed lines
b. Undivided rectangles d. Diamond
Answer: D. Diamond
16. The Rectangles divided into two parts represents
a. Entity set c. Attributes of a relationship set
b. Relationship set d. Primary key
Answer: A. Entity set
17. An entity set that does not have sufficient attributes to form a primary key is termed
a __________.
a. Strong entity set c. Weak entity
b. Variant set set
d. Variable set
Answer: C. Weak entity set
18. For a weak entity set to be meaningful, it must be associated with another entity set,
called the _______________.
a. Identifying set c. Neighbour set
b. Owner set d. Strong entity set
Answer: A. Identifying set
19. What term is used to refer to a specific record in your music database; for instance;
information stored about a specific album?
a. Relation c. Table
b. Instance d. Column
Answer: B. Instance
20. A __________ is a special kind of a store procedure that executes in response to certain
action on the table like insertion, deletion or updation of data.
a. Procedures
b. Triggers
c. Functions
d. None of the mentioned
Answer: B. Triggers
21-30. Draw a use case diagram for an ATM machine for withdrawing cash. Make the
usecase simple yet informative; only include the major features. (10 points)
31–40. Draw a use case diagram for a vending machine that sells beverages and snacks.
Make use of inclusion and extension associations, mark multiplicities and
remember that a vending machine may need technical assistance from time to
time. (10 points)
(Rubric in item 21 – 40)
Poor (1 point) Use cases don’t cover any of the desired features mentioned
in the requirements.
Average (2-4 points) Use cases cover some of the desired features mentioned in
the requirements document.
Good (5--7 points) Use cases cover most of the desired features mentioned in
the requirements but doesn’t provide a great understanding
of the functionality.
Excellent (8-10 points) Use cases cover all the desired features mentioned in the
requirements document and provide a great understanding
of the functionality.
Prepared by: JESSICA ROSE E. FERNANDEZ,Ph.EdD
Instructor I
Checked by: ALMA CHRISTIE C. REYNA, MBA, MSIT
Program Chair, BSIT