How To Exam?

a knowledge trading engine...


DOEACC Society 2007 Advanced Level Course In Computer Science A5-R3: STRUCTURED SYSTEM ANALYSIS

Thursday, 13 June 2013 12:35Web

1.8 Which of the subsequent is the most secure method of protecting sensitive data during transmission over a network?
A) public key encryption
B) private key encryption
C) access control matrix
D) parity check

1.9 All of the subsequent are stages in the systems life cycle EXCEPT:
A) creation
B) startup
C) change
D) maturity

1.10 Which of the subsequent is NOT a component of audit risk?
A) inherent risk
B) control risk
C) detection risk
D) management risk



















2. Each statement beneath is either actual or FALSE. select the most improper 1 and ENTER in the “tear-off” sheet attached to the ques. paper, subsequent instructions therein. (1 x 10)

2.1 To create an info system, developers follow a set of steps, called the systems development planning process.
2.2 In bottom-up design, developers begin with the large picture and move to the details.
2.3 CASE tools can help developers create computer software quickly and reliably.
2.4 Adding staff to a project to shorten the project’s length is usually a wise move, because adding staff normally translates into increased productivity.
2.5 In the development phase of the SDLC, programmers either create software from scratch or purchase commercially available software.
2.6 During the needs analysis phase, developers must determine what issues exist with the current system, then decide whether to proceed with development.
2.7 In a data flow diagram, arrows are used to represent data stores.
2.8 The system development lifecycle defines the temporal, causal and I/O relationships among the processes of the organization learned.
2.9 Participants at a Joint Application Development (JAD) workshop meeting identify system requirements.
2.10 An entity in an ER diagram is basically the identical as an entity in a DFD, the only difference being that in the former it stores data and in the latter it processes data.


































3. Match words and phrases in column X with the nearest related meaning/ word(s)/phrases in column Y. Enter your selection in the “tear-off” ans sheet attached to the ques. paper, subsequent instructions therein. (1 x 10)

X Y
3.1 In ER modeling, entities are depicted using A. Data Dictionary
3.2 A repository of info about a database that documents data elements of a database B. Triangles



( 0 Votes )

Add comment


Security code
Refresh

Earning:   Approval pending.
You are here: PAPER DOEACC Society 2007 Advanced Level Course In Computer Science A5-R3: STRUCTURED SYSTEM ANALYSIS