You are on page 1of 87

Software Engineering

10

11

12

13

15

16
18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33
34

35

36

37

38

39

40

41

42

43

44

45

46

47

48
49

50

51

52

53

54

55

56

57

58

59

60

61

62

63

64

65
66

67

68
69

70

71

72

73

74

75

76

77
Software Engineering
is commonly defined as a set of instructions, or a set of modules or procedures, that allow for a certain type of computer
operation.

an engineering branch associated with the development of software product using well-defined scientific principles, methods a
procedures. The outcome of software engineering is an efficient and reliable software product.

In this phase, one or more designs are developed, with which the project result can apparently be achieved. Depending on the
subject of the project, the products of this phase can include dioramas, sketches, flow charts, site trees, HTML screen designs,
prototypes, photo impressions and UML schemas.

In this phase, the requirements that are associated with a project result are specified as clearly as possible. This involves
identifying the expectations that all of the involved parties have with regard to the project result.

This is the beginning of the project. In this phase, the idea for the project is explored and elaborated. The goal of this phase is t
examine the feasibility of the project.

Although it is extremely important, this phase is often neglected. During this phase, everything is arranged that is necessary to
bring the project to a successful completion.

This phase involves the construction of the actual project result. Programmers are occupied with encoding, designers are invol
in developing graphic material, the actual reorganization takes place. It is during this phase that the project becomes visible to
outsiders, to whom it may appear that the project has just begun.

In this phase, everything that will be needed to implement the project is arranged. This phase is complete when implementatio
is ready to start.

describes how the framework activities and the actions and tasks that occur within each framework activity are organized with
respect to sequence and time.

executes each of the five framework activities in sequence, beginning with communication and culminating with deployment.

focuses on the theoritical practices in software. is the study of processes that interact with data and that can be represented a
data in the form of programs. It enables the use of algorithms to manipulate, store, and communicate digital information.

A process flow that executes the activities in a “circular” manner. Each circuit through the five activities leads to a more comple
version of the software.

A process flow that repeats one or more of the activities before proceeding to the next.

executes one or more activities in parallel with other activities (e.g., modeling for one aspect of the software might be execute
parallel with construction of another aspect of the software

are older programs and have been continually modified to meet changes in business requirements and computing platforms
is a part of a computer system that consists of data or computer instructions, in contrast to the physical hardware from which t
system is built. In computer science and software engineering, _____ is all information processed by computer
systems, programs and data.

wrote an outline (algorithm) for what would have been the first piece of software. However, neither the Analytical Engine nor a
software for it were ever created.

proposed the first theory about software in his 1935 essay “Computable Numbers with an Application to the
Entscheidungsproblem (decision problem).”

is a collection of activities, actions, and tasks that are performed when some work product is to be created.

A software that resides within a product or system and is used to implement and control features and functions for the end use
and for the system itself.

1. a software that uses the computer system to perform special functions or provide entertainment functions beyond the ba
operation of the computer itself.

a software that directly operates the computer hardware, to provide basic functionality needed by users and other software, a
to provide a platform for running application software.

1. has been characterized by “number crunching” algorithms. Applications range from astronomy to volcanology, from
automotive stress analysis to space shuttle orbital dynamics, and from molecular biology to automated manufacturing.

A software that is developed to harm and disrupt computers. As such, malware is undesirable. is closely associated with
computer-related crimes, though some malicious programs may have been designed as practical jokes.

this network-centric software category spans a wide array of applications. In their simplest form, It can be little more than a se
linked hypertext files that present information using text and limited graphics.

This software is designed to provide a specific capability for use by many different customers. this software can focus on a limit
and esoteric marketplace (e.g., inventory control products) or address mass consumer markets (e.g., word processing,
spreadsheets, computer graphics, multimedia, entertainment, database management, and personal and business financial
applications).

A software that makes use of nonnumerical algorithms to solve complex problems that are not amenable to computation or
straightforward analysis. Applications within this area include robotics, expert systems, pattern recognition (image and voice),
artificial neural networks, theorem proving, and game playing.

The process of distributing requirements, resources, or other entities among the components of a system or program.

is the overall process for developing information systems from planning and analysis through implementation and
maintenance.

An SDLC phase that involves establishing a high-level plan of the intended project and determining project goals. The activities
to Identify and select the system for development. Assess project feasibility and Develop the project plan.

An SDLC phase that involves analyzing end-user business requirements and refining project goals into defined functions and
operations of the intended system. Gather business requirements. Create process diagrams. Perform a buy versus build analysi
An SDLC phase that involves describing the desired features and operations of the
system including screen layouts, business rules, process diagrams, pseudo code, and
other documentation.

involves taking all of the detailed design documents from


the design phase and transforming them into the actual system. Develop the IT infrastructure. Develop the database and
programs.

involves bringing all the project pieces together into a special


testing environment to test for errors, bugs, and interoperability, in order to verify
that the system meets all the business requirements defi ned in the analysis phase.

involves placing the system into production so users


can begin to perform actual business operations with the system. This phase
phase is also referred to as ‘delivery’. System Training

involves performing changes, corrections, additions, and upgrades to ensure the system continues to meet the business goals.
phase continues for the life of the system because the system must change as the business evolves and its needs change,
demanding constant monitoring, supporting the new system with frequent minor changes (for example, new reports or
information capturing), and reviewing the system

Is a factor that is critical to an organization’s success. To determine which system to develop, an organization tracks all the
proposed systems and prioritizes them by business impact. This allows the business to prioritize which problems require
immediate attention and which problems can wait.

determines if the proposed solution is feasible and achievable from a financial, technical, and organizational standpoint.

are the detailed set of business requests that the system must meet to be successful.

is the process of identifying, documenting, communicating, tracking, and managing project requirements as well as changes to
those requirements.

illustrates the movement of information between external entities and the processes and data stores within the system

are software suites that automate systems analysis, design, and development. Process models and data flow diagrams can prov
the basis for the automatic generation of the system if they are developed using this

is a technique for documenting the relationships between entities in a database environment

is the interface to an information system. This screen design is the ability to model the information system screens for an entire
system using icons, buttons, menus, and submenus.

represent a formal way to express data relationships to a database management system

This details how to use the system


An independent examination of a work product or set of work products to assess compliance with specifications, standards,
contractual agreements, or other criteria.

In software engineering, computer instructions and data definitions expressed in a


programming language or in a form output by an assembler, compiler, or other translator. (2) To
express a computer program in a programming language.

A standard that describes the characteristics of a set of moral principles


dealing with accepted standards of conduct by, within, and among professionals.

In software engineering, the process of expressing a computer program in a


programming language.

The estimated cost to perform a stipulated task or acquire an item. 2.The product
of a cost-estimation method or model.

a representation of facts, concepts, or instructions in a


manner suitable for communication, interpretation, or processing by humans or by automatic means.

a term referring to systems offering users an


interface that blocks the majority of file handling details.

is a multidisciplinary activity that applies the knowledge, derived from psychology and technology, to specify and design high
quality human-machine interfaces.

It is a process of collecting and interpreting facts, identifying the problems, and decomposition of a system into its components

is a software development methodology that uses minimal planning in favor of rapid prototyping.

encompasses a set of tasks that produce a major work product

focuses on a small, but well-defined objective (e.g., conducting a unit test) that produces a tangible outcome.

establishes the foundation for a complete software engineering process by identifying a small number of framework activities t
are applicable to all software projects, regardless of their size or complexity.

is anyone who has a stake in the successful outcome of the project—business managers, end users, software engineers, suppo
people

Is an approach of software development that advocates adaptive planning, evolutionary development, early delivery,
and continual improvement, and it encourages rapid and flexible response to change.

a framework for the activities, actions, and tasks that are required to build high-quality software.

a process model tha is also called the linear sequential life cycle model. illustrates the software development process in a linea
sequential flow. This means that any phase in the development process begins only if the previous phase is complete.
were originally proposed to bring order to the chaos of software development.

A process model that applies linear sequences in a staggered fashion as calendar time progresses. Each linear sequence produ
deliverable “increments” of the software in a manner that is similar to the increments produced by an evolutionary process flo

are iterative. They are characterized in a manner that enables you to develop increasingly more complete versions of the softw

is the process that results in the removal of the error.


A process model that starts with a simple implementation of a subset of the software requirements and iteratively enhances th
evolving versions until the full system is implemented. At each iteration, design modifications are made and new functional
capabilities are added.
is a risk-driven process model. software is developed in a series of evolutionary releases. During early iterations, the release mi
be a model or prototype. During later iterations, increasingly more complete versions of the engineered system are produced.

A process model that refers to building software application prototypes which displays the functionality of the product under
development, but may not actually hold the exact logic of the original software.

A process model that is an extension of the waterfall model and is based on the association of a testing phase for each
corresponding development stage. This means that for every single phase in the development cycle, there is a directly associat
testing phase. This is a highly-disciplined model and the next phase starts only after completion of the previous phase.
A process model that are iterative. They are characterized in a manner that
enables you to develop increasingly more complete versions of the software.

is a software development model that uses minimal planning in favor of rapid prototyping. A prototype is a working model tha
functionally equivalent to a component of the product.

is a process model where we do not follow any specific process. The development just starts with the required money and effo
as the input, and the output is the software developed which may or may not be as per customer requirement.

A process model that focus on process adaptability and customer satisfaction by rapid delivery of working software product. Th
method break the product into small incremental builds. These builds are provided in iterations.
Answers ANSWER

Computer Program 0

software engineering 0

Design Phase 0

Definition Phase 0

Initiation Phase 0

Maintenance Phase 0

Implementation Phase 0

Development Phase 0

Software Process Flow 0

Linear Process Flow 0

Computer Science 0

EVOLUTIONARY PROCESS FLOW 0

ITERATIVE PROCESS FLOW 0

PARALLEL PROCESS FLOW 0

legacy software 0
SOFTWARE 0

ADA LOVELACE 0

ALAN TURING 0

process 0

Embedded Software 0

Application Software 0

System Software 0

Engineering/Scientific Software 0

Malicious Software 0

Web application software 0

Product Line Software 0

Artificial Intelligence Software 0

allocation 0

SDLC 0

Planning 0

Analysis 0
Design 0

Development 0

Testing 0

Implementation 0

Maintenance 0

Critical Success Factor 0

Feasibility Study 0

Business Requirements 0

Requirement Management 0

Data Flow Diagram 0

Case tools 0

Entity Relationship Diagram 0

Graphical User Interface 0

Data Model 0

User Documentation 0
audit 0

code 0

code of ethics standard 0

coding 0

cost estimate 0

data 0

data management 0

human-engineering 0

Systems Analysis 0

Rapid Application Development 0

action 0

task 0

process framework 0

stakeholder 0

Agile software development 0

SOFTWARE PROCESS 0

Waterfall Model 0
Prescriptive process models 0

Incremental process model 0

Evolutionary process model 0


Debugging 0

Iterative Model 0

Spiral Model 0

Prototyping Model 0

V model 0

Evolutionary Model 0

RAD Model 0

Big Bang Model 0

Agile Process Model 0


0
Data Structure

1 0.4

2 0.8

3 0.3

4 0.4

5 0.5

6 0.5

7 0.3

8 0.5

9 1

10 0.3

11 0.1

12 0.8

13 0.7

14 0.8

15 0.6

16 0.3

17 0.5
18 0.6

19 0.5

20 0.4

21 0.6

22 0.7

23 0.2

24 0.4

25 0.1

26 0.4

27 0.9

28 0.4

29 0.6

30 0.1

31 0.1

32 0.1

33 0.5

34 0.3

35 0.5

36 0.4
37 0.1

38 0.1

39 0.6

40 0.6

41 0.7

42 0.2

43 0.4

44 0.4

45 0.7

46 0.2

47 0.9

48 0.5

49 0.1

50 0.7

51 0.9

52 0.2

53 0.7

54 0.4

55 0.8
56 0.4

57 0.3

58 0.8

59 0.1

60 0.2

61 0.4
Data Structure
To store multiple values of a given type in a single collection variable./is a container object that holds a fixed number of values
a single type.

refers to performing manual memory management for dynamic memory allocation in the C programming language via a group
functions in the C standard library, namely malloc, realloc, calloc and

o Allocates requested size of bytes and returns a pointer first byte of allocated space

o Allocates space for an array elements, initializes to zero and then returns a pointer to memory

deallocate the previously allocated space

o Change the size of previously allocated space

allows operations at one end only. For example, we can place or remove a card or plate from the top of the stack only. - This
feature makes it LIFO data structure

(storing) an element on the stack. Adds item to the top.

Removing (accessing) an element from the stack. Removes item to the top.

get the top data element of the stack, without removing it.

check if stack is full.

check if stack is empty.

is an abstract data structure. follows First-In-First-Out methodology. One end is always used to insert data and the other is used
remove data.

o add (store) an item to the queue.

remove (access) an item from the queue

o Gets the element at the front of the queue without removing it.

Checks if the queue is full.


Checks if the queue is empty.

is a collection of nodes connected by directed (or undirected) edges. is a nonlinear data structure

has a special condition that each node can have a maximum of two children.

refers to the sequence of nodes along the edges of a tree.

The node at the top of the tree.

Any node except the root node has one edge upward to a node

The node below a given node connected by its edge downward

The node which does not have any child node

represents the descendants of a node

means passing through nodes in a specific order.

is a pictorial representation of a set of objects where some pairs of objects are connected by links.

are data type defined by its behavior from the point of view of a user of the data, in terms

Is a data organization, management and storage format that enables efficient access and modification of data.

an algorithm that works by sequentially iterating through the whole array from one and until the specified element is found.

An algorithm that works by halving the number of elements to look through in each iteration, hence reducing the number of
elements to be searched

Is a compoun data type. IT is used for grouping simple data types or other compound data types under a common data type

Is a linear collection of data elements where data is not stored in continuous memory locations. Instead, each element of the li
points to the next item's location forming a sequence.

The data elements stored in a linked list are called _____.

Is the simplest type of linked list in which every node contains some data and a pointer to the next node. Allows traversal of da
only in one way.
Is a more complex type of linked list which contains a pointer to the next as well as the previous node in the sequence. This allo
reverse traversal anywhere in the list

In this Linked list, the last node contains a ponter to the first node of the list, forming a loop while traversing in a circular linked
list, we can begin at any node and traverse the list in any direction.

Is a linear data structure which stores its elements in order. Follows LIFO(Last In First Out).

Is a linear data structure that is open at both ends. It follows the FIFO (First In First Out) principle.

Simulates a hierarchical tree structure, with a root value and the subtrees as children, represented as a set of linked nodes.

The first node in the tree. Only one kind of this node may exist.

The predecessor of any node. Is the node which has branch from it to any other node.

Is the descendant of any node. All nodes except the root is called ____.

is a node that does not ave a child node. Also known as external or terminal node.

The total number of children of a node.

A special type of tee in which evey node can have a maximum of 2 children.

Is a specialized tree based data structure that satisfies the heap property.

is a simple algorithm which is used to sort a given set of n elements provided in form of an array with n number of elements. It
compares all the element one by one and sort them based on their values.

This algorithm will first find the smallest element in the array and swap it with the element in the first position, then it will find
second smallest element and swap it with the element in the second position, and it will keep on doing this until the entire arr
sorted.

To sort unordered list of elements, we remove its entries one at a time and then insert each of them into a sorted part (initially
empty):

follows the rule of Divide and Conquer to sort a given set of numbers/elements, recursively, hence consuming less time.

This sql clause is used to combine rows from two or more tables, based on a related column between them.

A type of JOIN that Returns records that have matching values in both tables

Return all records from the left table, and the matched records from the right table
Return all records from the right table, and the matched records from the left table

Return all records when there is a match in either left or right table
Answers ANSWER

Array 0

Dynamic memory allocation 0

malloc() 0

calloc() 0

free() 0

realloc() 0

Stacks 0

push() 0

pop() 0

peek() 0

isFull() 0

isEmpty() 0

Queues 0

enqueue() 0

dequeue() 0

peek() 0

isfull() 0
isempty() 0

tree 0

Binary Tree 0

Path 0

Root Node 0

Parent Node 0

Child Node 0

Leaf Node 0

Subtree 0

Traversing 0

Graphs 0

Abstract Data Type 0

Data Structure 0

Linear search 0

Binary Search 0

Structure 0

Linked List 0

Node 0

Singly Linked List 0


Doubly Linked List 0

Circular Linked List 0

Stacks 0

Queues 0

Tree 0

Root 0

Parent Node 0

Child Node 0

Leaf node 0

Degree 0

Binary Tree 0

Heap 0

Bubble Sort 0

Selection Sort 0

Insertion Sort 0

Merging Sort 0

JOIN 0

INNER JOIN 0

LEFT OUTER JOIN 0


RIGHT OUTER JOIN 0

FULL OUTER JOIN 0

1
Networking

1 0

2 0.7

3 0.8

4 0.5

5 0.1

6 0.4

7 0

8 0.1

9 0.7

10 0.6

11 0.4

12 1

13 0.2

14 0.4

15 0.3

16 0.9

17 0.7

18 0.3
19 0.8

20 0.1

21 0.2

22 0.7

23 0.1

24 0.4

25 0.9

26 0.6

27 0.2

28 0.3

29 0.3

30 0.4

31 0.1

32 0.7

33 0.9

34 0.9

35 0.5

36 0.5

37 0.7

38 0.2

39 1

40 0.6
41 0.3

42 0.5

43 0.7

44 0.3

45 0.9
46 0.7

47 0.2

48 0.5

49 0.4

50 0.3

51 0.6

52 0.7
53 0.7

54 0.3

55 0.9

56 0.8

57 0.2
58 0.5

59 0.4

60 0.7

61 0.6

62 0.1
62 0.8
63 0.1

64 0.9
65 0.2

66 0

67 0.9

68 0.7

69 0.2

70 0.5
0.2
0.7
Networking
Is a term used to refer to a private connection of LANs and WANs that belongs to an organization. Is designed to be accesible o
by the organization's members, or others with authorization

A model that defines a networking framework to implement protocols in seven layers.

connects network devices over a relatively short distance. A networked office building, school, or home

A network thatspans a large physical distance(ie. Internet)

•A LAN based on wireless network technology

A network spanning a physical area larger than a LAN but smaller than a WAN, such as a city. is typically owned and operated b
single entity such as a government body or large corporation.

•A network spanning multiple LANs but smaller than a MAN, such as on a university or local business campus.

•Connects servers to data storage devices through a technology like Fibre Channel.

•Links high-performance computers with high-speed connections in a cluster configuration.

•is an intranet that is accessible to some people from outside the company, or possibly shared by more than one organisation.

a set of rules governing the format of data sent over the Internet or other network.

class of ip addressing(1-126) for multicasting

class of ip addressing(128-191) for multicasting

class of ip addressing(192-223) for data communication

class of ip addressing(224-239) for multicasting

class of ip addressing(240-255) for experimentation

how many bytes does ipv4 have?

how many bytes does ipv6 have?


The class A network number that is called the “loopback” function

are used to radiate and receive EM waves

A dataflow that is unidirectional, Only one of the two devices on a link can transmit; the other can only receive. Keyboards and
traditional monitors are examples of this.
A data flow that each station can both transmit and receive, but not at the same time. :
When one device is sending, the other can only receive, and vice versa

A dataflow where both stations can transmit and receive simultaneously


refers to the movement of data in form of bits between two or more digital devices. This transfer of data takes place via some
form of transmission media

the various bits of data are transmitted serially one after the other and is used for long distance communication.

is a suite of communication protocols used to interconnect network devices on the internet.

the most basic unit that is transfered over a network. are the envelopes that carry your data (in pieces) from one end point to t
other.

can refer to any kind of software interface to networking hardware.

is an address on a single machine that can be tied to a specific piece of software. It is not a physical interface or location, but it
allows your server to be able to communicate using more than one application.

is a program that decides whether traffic coming into a server or going out should be allowed.

It is a means of connecting separate LANs through the internet, while maintaining privacy.

is a numerical address that corresponds to your computer on a network. When a computer wants to connect to another
computer, it connects to that computer’s _________.
is a combination of hardware and software that sends data from one location
to another

is a multinational body dedicated to worldwide agreement on international standards.

is the company that provides you with your Internet connection.

is a device that passes traffic back and forth. It connects the different network segments. It switches the data packets between
those networks which are either located in the different logical segments or built with the different network layer protocols.

A Physical Layer device which restores, amplifies, re-clocks or otherwise improves a network signal that it receives on one of its
ports and transmits the improved signal without buffering or interpreting it.
Any hardware resource used by a computer that is external to a computer’s enclosure case that is accessed by serial or parallel
connections, or bus architectures such as SCSI, MIDI or VME.

A discrete chunk of communication in a pre-defined format.

Standardized data link layer address that is required for every port or device that connects to a LAN. Also known as a hardware
address or a Physical Address
A test packet sent by a network adapter with a destination address equal to the adapter’s own hardware address. The purpose
this test is typically to establish that the adapter is connected to a network that is functional enough to support a data
transmission.

the delay in transmission time that occurs while information remains in a device’s buffered memory (such as a bridge or router
before it can be sent along its path.

International organization that is responsible for a wide range of standards, including those relevant to networking
Routing technique that allows IP traffic to be propagated from one source to a number of destinations or from many sources to
many destinations.
The worldwide system of linked networks that is capable of exchanging mail and data through a common addressing and nami
system based on TCP/IP protocols.
consisting of over 80 working groups responsible for developing Internet standards.

is a network hardware device for connecting multiple Ethernet devices together and making them act as a single network
segment.
User environment that uses pictorial as well as textual representations of the input and output of applications and the hierarch
or other data structure in which information is stored.
Router or access server, or several routers or access servers, designated as a buffer between any connected public networks an
private network.

Refers to the collection of system software routines that managesand accesses files located on a computer’s storage volumes.

The process of placing one protocol inside of another. Usuallyimplies that the encapsulated protocol was not originally intende
its designers to be carried by the encapsulating protocol.

connect devices to host computers and allow large numbers of these devices to share a limited number of ports.
are protocol-dependent devices that connect sub-networks or divide a very large network into smaller sub-networks.

use regeneration and retiming to ensure that signals are transmitted clearly through all network segments.

are used to interconnect local or remote networks. They centralize network administration.

can interconnect networks with different, incompatible communications protocols.

connect nodes and send and receive signals. They are sometimes called medium access units (MAU).
A network topology in which every computer and network device is connected to single cable.

A network topology that forms a ring as each computer is connected to another computer, with the last one connected to the
first. Exactly two neighbours for each device.

In this type of topology all the computers are connected to a single hub through a cable. This hub is the central node and all
others nodes are connected to the central node.

A network topology that is a point-to-point connection to other nodes or devices. All the network nodes are connected to each
other.

A network topology that has a root node and all other nodes are connected to it forming a hierarchy. It is also called hierarchic
topology. It should at least have three levels to the hierarchy.
It is two different types of topologies which is a mixture of two or more topologies. For example if in an office in one departme
ring topology is used and in another star topology is used, connecting these topologies will result in this particular topology
A network topology in which every computer and network device is connected to single cable with two end points.

is a family of computer networking technologies commonly used in local area networks (LAN), metropolitan area networks (MA
and wide area networks (WAN), enabling devices to communicate with each other via a protocol
Refers to the materials used to transmit data from its source to its destination.
Is composed of two intertwined copper wires. Each wire is coated with plastic and they are bound together in another layer of
plastic insulation. Also called as unshielded twisted pair(UTP) wire.
Is widely used in cable TV. There are two conductors found in this, one is a single piece of wire in the center of the cable and th
other one is a shield that sorrounds the first wire with an insulator in between. Can carry more data.

A cable that Instead of transmitting frequencies, it transmits beams of light. Since light travels much faster than electricity.
Data transmission of this means make us of the principle of line of sight wherein the radio signals travel in a direct line from on
repeater station to the next until it reaches its destination.
Are placed into orbit and they act like repeater stations. Permits the communications satellite to maintain a fixed position relati
to the surface of the earth.
ANSWER
IT Fundamentals

10

11

12

13

14

15
16
17

18
19

20

21
22

23

24

25
26
27

28
29

30
31
32
33

34

35
36

37

38
39
40
41
42
43

44

45
46
47
48
49
50
51
52
53
54
55
56
IT Fundamentals

Is the study of Theoritical and practical aspects of the design and use of computers

Is an electronic, programmable device that can retrieve, store and process data.

is raw unprocessed facts.

Processed data

Is a mechanical counting device that was invented in china at around 500 bc

Used gear driven counting wheels to do addition. Invented by Blaise Pascal in 1642

A device that is controlled by cards in which holes are strategically punched. Invented by Joseph Marie Jacquard.

Invented by Charles Babbage. Is capable of computing mathematical tables.

Known as the first programmer, presented the idea that punch cards could be used to instruct babbage's engine

was a proposed mechanical general-purpose computer designed by English mathematician and computer pioneer Charles
Babbage.

the first functional electronic digital computer. A special purpose computer

the first functional general-purpose computer

is a solid state circuit component. Also called a resistor. It can function as an amplifier, switch and an oscillator

Concidered the first modern PC

Is a small chunk of silicon semiconductor material that contains hunders of thousands of electronic device which isplaced ina
n are the size of a postage stamp. Was created by Jack St. Claib kilby
The Decimal Number system is called a ______ system
The Binary System is a _____ system

is a broad term for one of the fastest computers currently available. are very expensive and are employed for specialized
applications that require immense amounts of mathematical calculations (number crunching). For example, weather
forecasting requires this. can execute programs as fast as possible
is a very large and expensive computer capable of supporting hundreds, or even thousands, of users simultaneously. Can
execute many programs concurrently.

It is a midsize computer. is a multiprocessing system capable of supporting from up to 200 users simultaneously.

It is a type of computer used for engineering applications (CAD/CAM), desktop publishing, software development, and other
types of applications that require a moderate amount of computing power and relatively high quality graphics capabilities.
is a computer designed to be used by one user at a time. Also known as personal computers
is a form of computer that uses continuous physical phenomena such as electrical, mechanical, or hydraulic quantities to
model the problem being solved.
A computer that performs calculations and logical operations with quantities represented as digits, usually in the binary
number system
A combination of computers those are capable of inputting and outputting in both digital and analog signals. It offers a cost
effective method of performing complex simulations.
Developed many logic ideas. And is credited with laying the foundations for the information age.
Refers to a program in execution

Refers to signals from the I/O devices to the CPU which indicate that the transfer of data needed by a program is complete
Involves switching the processor from one task to another as appropriate.
Involves interpreting the signal that an I/O transfer is complete hence and hence that the task wich requested the tranfer
can now resume execution..
Is the designation of the computer's resources to tasks as required.
Involves ensuring that no task can access any resource which has not been allocated to it.
Involves deciding which task to select for execution after some task finishes.
Is a portion of an opering system that defines the interface between the operating system and the users. The primary
function of this is to communicate with the users of the machine.
The internal part of an operating system. It consists of software components used to perform the basic function needed by
the computer.
Is responsible for coordinating the use of the machine's mass storage devices.
are software units that are used to directly or indirectly communicate with different devices in order to carry out operations
on the machine's peripheral devices.
is defined as a range within a band of frequencies or wavelengths.It is also the amount of data that can be transmitted in a
fixed amount of time.
Its function is to convert the computer's digital signals to the telephone's analog signals and vice-versa
The process of converting digital signal to audio signals
Is a world wide collection of computer networks
Is the protocol used to transmit Web pages from the Web server being accessed to your computer.
Is a unique identifier of every web page.

is used to illustrate the combination of logical and binary input signals which yield a binary output for a specific gate.
Refers to a complex computer information system, its people and certain procedures that work with the company to achieve
its goals.
Answers ANSWER

Computer Science 0

computer 0

data 0

information 0

abacus 0

Pascaline 0

Jacquard Weaving Loom 0

Difference Engine 0

Ada Lovelace 0

Analytical Engine 0

ENIAC 0

UNIVAC 0

transistor 0

Altair 8800 0

IC chip 0
Base 10 0
Base 2 0

SuperComputer 0
Mainframe 0

Minicomputer 0

Workstations 0
Microcomputer 0
Analog Computer
0

Digital Computer 0

Hybrid Computer 0
George Bool 0
Process 0

Interrupt 0
Dispatching 0

Interrupt handling 0
Resource Allocation 0
Resource Protection 0
Scheduling 0

Shell 0

Kernel 0
File Manager 0

Device Manager 0

Bandwidth 0
Modem 0
Modulation 0
Internet 0
HTTP 0
URL 0

truth table 0

MIS 0
1
1
1
1
1
1
1
1
1
1
1
DBMS

10

11

12

13

14

15

16

17
18

19

20
21
22

23
24

25

26

27

28

29

30

31
32
33
34
35
36

37
38

39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
DBMS
the logical structure of the database. refers to the organization of data as a blueprint of how the database is constructed.

is a collection of related data and data is a collection of facts and figures that can be processed to produce information.

stores data in such a way that it becomes easier to retrieve, manipulate, and produce information.

maintain the DBMS and are responsible for administrating the database. They are responsible to look after its usage and by
whom it should be used.

are the group of people who actually work on the designing part of the database. They keep a close watch on what data
should be kept and in what format.

are those who actually reap the benefits of having a DBMS. They can range from simple viewers who pay attention to the
logs or market rates to sophisticated users such as business analysts.

A set of attributes (one or more) that collectively identifies an entity in an entity set.

A minimal super key. An entity set may have more than one key.

The column or group of columns whose values uniquely identify each row of that table

defines the number of entities in one entity set, which can be associated with the number of entities of other set via
relationship set.

One entity from entity set A can be associated with at most one entity of entity set B and vice versa.

One entity from entity set A can be associated with more than one entities of entity set B however an entity from entity set
B, can be associated with at most one entity.

More than one entities from entity set A can be associated with at most one entity of entity set B, however an entity from
entity set B can be associated with more than one entity from entity set A.

One entity from A can be associated with more than one entity from B and vice versa.

is a systematic way of ensuring that a database structure is suitable for general-purpose querying and free of certain
undesirable characteristics—insertion, update, and deletion anomalies that could lead to loss of data integrity.

is a database in which storage devices are not all attached to a common processor. It may be stored in multiple computers,
located in the same physical location; or may be dispersed over a network of interconnected computers.

is a system used for reporting and data analysis, and is considered a core component of business intelligence. are central
repositories of integrated data from one or more disparate sources.
is a process used by companies to turn raw data into useful information. By using software to look for patterns in large
batches of data, businesses can learn more about their customers and develop more effective marketing strategies as well as
increase sales and decrease costs.

are a collection of conceptual tools for describing data, data relationships, data semantics and data constraints.

A table is a 2-dimensional representation of data consisting of one or more columns, andzero or more rows.
Database Concepts and Definition of TermsDatabase Concepts and Definition of Terms

When a value in a column matches exactlyanother value in the same column


A column or group of columns that is a primary key elsewhere
is a distinct object (a person, placeor thing, concept or event) in the organization that is to be represented in the database.

A qualifier of an entity or a relation describingits character, quantity, degree or extent iscalled an attribute.
is a database computer language designed for managing
data in relational database management systems

manages table and index structure. The most common examples are DDL are the CREATE, ALTER, RENAME and DROP
statements

is the subset of SQL used to add, update and delete data

are used to limit the type of data that can go into a table.

This constraint uniquely identifies each record in a database table.

A constraint that is in one table points to a PRIMARY KEY in another table.

are the rules enforced on the data columns of a table. These are used to limit the type of data that can go into a table. This
ensures the accuracy and reliability of the data in the database.

This sql clause is used to combine rows from two or more tables, based on a related column between them.
A type of JOIN that Returns records that have matching values in both tables
Return all records from the left table, and the matched records from the right table
Return all records from the right table, and the matched records from the left table
Return all records when there is a match in either left or right table
is used to join a table to itself as if the table were two tables, temporarily renaming at least one table in the SQL statement.

is the term used to represent a missing value.


An SQL syntax that is used to add, delete or modify columns in an existing table. This command is used to add and drop
various constraints on an existing table.
is used to delete complete data from an existing table(NOT THE TABLE STRUCTURE).
is the basis for SQL, and for all modern database systems. The data in an RDBMS is stored in database objects.
is basically a collection of related data entries and it consists of numerous columns and rows.
is a column in a table that is designed to maintain specific information about every record in the table.
is also called as a row of data is each individual entry that exists in a table.
Answers ANSWER

Schema 0

Database 0

database management system 0

Administrators 0

Designers 0

End Users 0

Super Key 0

Candidate Key 0

Primary Key 0

Cardinality 0

One to one 0

One to many 0

Many to one 0

Many to many 0

normalization 0

distributed database 0

data warehouse 0
Data mining 0

Data models 0

table 0
Duplicate Values 0
Foreign Keys 0

entity 0
Attribute 0

SQL 0

Data Definition Language 0

Data Manipulation Language 0

Constraints 0

PRIMARY KEY 0

FOREIGN KEY 0

Constraints 0
JOIN 0
INNER JOIN 0
LEFT JOIN 0
RIGHT JOIN 0
FULL JOIN 0

Self Join 0
Null 0

Alter Table 0
Truncate Table 0
RDBMS 0
Table 0
Field 0
Record 0
1
1
1
1
1
1
1
1
1
1
1
1
Multimedia
1 0.2

2 0.1

3 1

4 0

5 0.4

6 0.4

7 0

8 1

9 0.5

10 0

11 0.5

12 1

13 1

14 0

15 1

16 1

17 1

18 0

19 0.4

20 1
21 1

22 1

23 1

24 0.2

25 1

26 1

27 0

28 0.3

29 0.5

30 0

31 1

32 0.4

33 0.4

34 0.4

35 0

36 1

37 1

38 0.2
39 1

40 1

41 0.3

42 0

43 1

44 1

45 1

46 0.5

47 1

48 0.1

49 0.3

50 1

51 1
Multimedia
It involves changing the focal length of the lens to make the subject appear closer or further away in the frame.

Moving the camera up or down without changing its vertical or horizontal axis

is when you move the entire camera forwards and backwards, typically on some sort of track or motorized vehicle.

is when you move your camera horizontally; either left to right or right to left, while its base is fixated on a certain point. You a
not moving the position of the camera itself, just the direction it faces. These types of shots are great for establishing a sense o
location within your story.

is when you move the camera vertically, up to down or down to up, while its base is fixated to a certain point.

moving the camera from left to right instead of in and out. Again, it is best to do this using a fluid motion track that will elimina
any jerking or friction.

is moving the camera in circle around the subject

is the shot used to set the scene at the start of the film. Most commonly the shot is a wide landscape style of shot.

Normally shows the scene to scale. For example, a person would be fully in the scene with their head and feet coming close to
top and bottom edges of the screen.

An above-the-waist height. Focuses on between one to three people in a scene with a minimal background as the location has
previously been established

Tight view of a face, upper body or object. Very little of the background in focus. All the focus is on the one thing in the scene.

perched above the subject in the scene. Shows the subject and the ground. Often used for dramatic effect.

Shot at the eye level of the camera operator. Very standard and the most commonly used shot.

Shot from below looking up on a scene. Makes objects look larger.

Shot from a height to make people seem smaller in the scene. Often used to signify weakness.

Tilting the camera at an angle. Un-usual effect but it suggests that the world is crooked or messed up.

is the white, rectangular area of the Adobe Flash Professional CS6 workspace. Objects you
place on the Stage will appear in your published movie.

is where you control the images and sounds in your Flash document. Is
divided into frames. In this, you work with these frames to organize and control the content of your
document.

indicates a change occurring in the timeline. can indicate the moment at which a
graphic image appears or changes in the movie.

provide a way to organize the elements of your movie. It controls the stacking order of objects—the order moves
from top to bottom, so objects displayed in front are in the top layer, while objects displayed in back are in the bottom
layer. This allows you to place objects in front of or behind one another.
Is at the top of the Stage, lets you quickly navigate between different parts of your Flash document. It lets you switch between
scenes and symbols

provide easy access to controls that help you work with the content in your document

is a frame in which you define a change to an object’s properties for an animation.

let you draw, paint, select, and modify artwork, as well as change the view of the Stage

provides easy access to the most commonly used attributes of the current selection, either on the
Stage or in the timeline. You can make changes to the object or document attributes without
accessing the menus or other panels that also control these attributes.

is a reusable image, animation, graphic, movie clip, sound file, font or button that resides in the library.

Used for static images and animations that are tied to the main Timeline. Their icons look like a hazardous waste symbol. are
defined for various button states.

Responds to mouse clicks and other events. The symbol icon is a finger.

Reusable animations. They have their own Timelines that run independently of the main Timeline. They are like mini-movies th
run inside the main movie.
Answers ANSWER

Zoom 0

Pedestal 0

Dolly 0

Pan

Tilt 0

Truck 0
Arc 0

Establishing Shot 0

Long Shot 0

Medium Shot 0

Close Up 0
Birds Eye View 0
Eye Level 0
Low Angle 0

High angle 0

Oblique angle 0

Stage 0

Timeline panel 0

keyframe 0

Layers 0
edit bar 0

Panels 0

property keyframe 0

Tools panel 0

Properties panel 0

symbol 0

Graphic 0

Button 0

Movie Clip 0

1
1

1
Types of JOINS - SQL
1

Requirement Gathering Techniques


1 interviews

2 survey/questionaires

3 brainstorming

4 document analysis

5 interface analysis

6 focus group

7 reverse engineering

8 prototyping

9 observation

OSI Reference Model Layers


1

4
5

7 Layers of Software
1

Characteristics of Quality Software


1

Four Fundamental Characteristics in


Data Communication System
1

4
Components of a communication
system
1

Phases of SDLC(activities)
1

Data Representation
1

TCP/IP MODEL
1
2

Five Common Operating System


1

Phases of Project Management


1

Network Criterias
1

Network Connection Types


1
2

3 Schema Architecture

3 Types of Symbols in Flash


1

Classifications of Computers
1

Software Process Frameworks


1

(SDLC)Software Process Models


1

Camera Movements
1

7
Types of shots
1

Types of Linked List


1

Types of Network Topology


1

Types of Area Networks


1

5 Virtual Private Network

6 Enterprise Private Network

Phases of Software Engineering


1

Software Process Flows


1

Types of Software
1

2
3

Data Flows
1

3
Abbreviations Answers
American National Standards
1 ANSI Institute 0

2 APK Android Package 0


American Standard Code for
3 ASCII Information Interchange 0

4 BIOS Basic Input Output System 0

5 CAD Computer Aided Design 0

6 CAE Computer Aided Engineering 0


Computer Aided Software
7 CASE Engineering 0

8 CD Compact Disc 0

9 CLI Command Line Interface 0

10 CMOS Comp Metal Oxide Semiconductor 0


common business oriented
11 COBOL language 0
Conference On Data Systems
12 CODASYL Language 0

13 CPU Central Processing Unit 0

14 CRT Cathode Ray Tube 0

15 DDL Data Definition Language 0


Dynamic Host Configuration
16 DHCP Protocol 0

17 DML Data Manipulation Language 0

18 DNS Domain Name System 0

19 DVI Digital Video Interface 0

20 EIA Electronic Industries Association 0


Electronic Numerical Integrator
21 ENIAC And Calculator 0

22 FORTRAN Formula Translation 0


23 FTP File Transfer Protocol 0

24 GIF Graphical Interchange format 0

25 GPU Graphic Processing Unit 0

26 GUI Graphical User Interface 0

27 HTML Hyper Text Markup Language 0

28 HTTP Hyper Text Transfer Protocol 0

29 IBM International Business Machine 0

30 IC integrated Circuit 0

31 ICMP Internet Control Message Protocol 0


Integrated Development
32 IDE Environment 0
International Electrotechnical
33 IEC Commission 0
Institute of Electrical and
34 IEEE Electronics Engineering 0

35 IETF Internet Engineering Task Force 0

36 IP Internet Protocol 0
International Organization for
37 ISO Standardization 0

38 ISP Internet Service Provider 0

39 JPEG Joint Photographic Experts Group 0

40 LAN Local Area Network 0

41 LCD Liquid Crystal Display 0

42 LED Light Emitting Diode 0

43 MAC Media Access control 0

44 MIS Management Information System 0

45 NTFS New Technology File System 0

46 OSI Open System Interconnect 0


47 PDF Portable Document Format 0

48 PDP Program Data processor 0

49 PHP PHP: Hypertext Processor 0

50 PNG Portable Network Graphic 0

51 POST Power On Self Test 0

52 RAD Rapid Application Development 0

53 RAM Random Access Memory 0


Relational Database Management
54 RDBMS System 0

55 RFID Radio Frequency Identification 0

56 ROM Read Only Memory 0


Serial advanced technology
57 SATA attachment 0

58 SDLC Software Development Life Cycle 0

59 SEI Software Engineering Institute 0

60 SQL Structured Query Language 0

61 SRAM Static Random Access Memory 0

62 SSH secure shell 0

63 SSID Service Sent Identifier 0


Transmission Control
64 TCP/IP Protocol/Internet Protocol 0

65 UDP User Datagram Protocol 0


66 URL Uniform Resource Locator 0

67 USB Universal Serial Bus 0

68 VGA Video Graphics Array 0

69 VoIP Voice over internet protocol 0

70 WEP Wired Equivalent Privacy 0

71 WLAN Wireless Local Area Network 0


72 WPA Wifi Protected Access 0

73 www World Wide Web 0


0
Decimal to Binary Conversion Examples

STEPS Divisions Quotients Remainders

1 Divide the decimal number by 2 and record the remainder 120/2 60 0

Continue to divide by 2 as long as the resulting quotation is


2 not equal to 0 60/2 30 0

when the obtained quotient is equal to zero, the binary


equivalent of the number consists of the remainders listed
3 from right to left 30/2 15 0

Problem: 15/2 7 1

Convert 120(Base 10) to its binary equivalent 7/2 3 1

Answer 3/2 1 1
120(Base 10) is equivalent to 1111000(Base 2) 1/2 0 1
Decimal to Binary Conversion

Method:

1 Convert 101(Base 2) to its decimal Equivalent

101( Base 2) = 1x2^2 + 0x2^1 + 1x2 ^0

= 4+0+1

= 5(Base 10)
C Programs Code
1 Odd or Even #include <stdio.h>

void main()
{
int ival, remainder;
printf("Enter and integer: ");
scanf("%d", &ival);
remainder = ival % 2;

if (remainder == 0) {
printf("%d is an even integer\n",ival);
}
else{
printf("%d is an odd integer\n", ival);
}
}

2 Addition of 2 integers #include <stdio.h>


int main() 
   {
 int x, y, result;
    printf("\nInput the first integer: "); 
    scanf("%d", &x);
    printf("\nInput the second integer: ");
    scanf("%d", &y);
    result = x * y;
 printf("Product of the above two integers 
= %d\n", result);
}

10

11
12

13

14

15

16

You might also like