You are on page 1of 20
tion 4 : ore and briefly explain the keywords ina SELECT statement. Smks b) What is DBMS query? 3mks ; c) Write an SQL statement to list down the names and ages of the students in the table below with age above 10 and below 23 and give the result. 4mk: [ld Name age [1 Moses 23 7 Ondiek Te 6 Gilbert 10 (a) Instance S of Students Question 5 a) Write an SQL incorporating Union statement to find the names of sailors who hav reserved a red or a green boat (or both) 6m b) Why do you think many organizations are using DBMS? 2ml c) A transaction is the DBMS’s abstract view of a user program, a sequence of reads writes. State and explain four important properties of transactions thata DBMS — 4m ensures. Question 6 2) What is a schedule as used in a database system? 2m b) What is the role of Security Policy in DBMS? 4m ‘A schedule is a potential execution sequence of a set of transactions which descrit actions as seen by the DBMS using two transactions of your own choice show ho 6m ©) Describe two main approaches to access control as used in DBMS >) Draw an Entity relation Diagram from the following External schema. in Hospital (pid: string, ailment: string, medicine: string, Doctor: string, inoutpatient: Price: real) (mark each) J Write an SQL Statement to create a view presents the name, and age of have reserved a boat, and the day of the reservation. But it does not show % bid of the reserved boat. Also, it only shows sailors with rating bigger than 9) schedule works. Question 7 |ON A ANSWER BOTH QUESTIONS (24 MARKS) mint = Define the following i) A data model. ae ji) Aschema jj). Give an example of Relational Data Model. iv) A Database Management System or DBMS hat are the advantages of DBMS compat s ‘a a Basic form of a SQL Query. pared to file systems? eae What are the main responsibilities of a Database administrator in DBMS? 4mks Write code to add a record to a clients table using your own fields and values for at Jeast four fields. ais jestion 2 ‘What is an ER Diagram as used in DBMS? 2mks Draw a diagrammatic example of an entity. 3mks 2mks What is a Domain Constraint as used in Database System? Write an SQL statement to create a table called employees containing six fields of Smks your choice. SECTION B ANSWER ANY THREE QUESTION (36 MARKS) uestion 3 Describe two Key Constraints used in DBMS. - 2mks i) One-to-many: an entity is related to many other entities, but each of these entities can only be related to one entity i : ii) Many-to-many: an entity is related to many other entities, and vice-versa ) Explain two types of participation constraints for an entity in a relationship. oa Explain briefly the following as used in DBMS. a i) Union i) Intersection ii) Set Difference iv) Cross Product 4mks Perform R1 x R2 on two tables of your own choice. ition 4 . Gee briefly explain the keywords in a SELECT statement. Stas i mks What is DBMS query? 3 ’ ql Write an SQL statement to list down the names and ages of the students in the table below with age above 10 and below 23 and give the result. 4mks [i Name age 1 Moses 2, [2 Ondiek Me B Gilbert 10 (a) Instance $ of Students Question 5 a) Write an SQL incorporating Union statement to find the names of sailors who have reserved a red or a green boat (or both) 6mks b) Why do you think many organizations are using DBMS? 2mks c) A transaction is the DBMS’s abstract view of a user program, a sequence of reads and writes. State and explain four important properties of transactions that a DBMS ensures. 4mks Question 6 a) What is a schedule as used in a database system? 2mks b) What is the role of Security Policy in DBMS? 4mks c) A schedule is a potential execution sequence of a set of transactions which describes actions as seen by the DBMS using two transactions of your own choice show how a schedule works. 6mks Question 7 «| Describe two main approaches to access control as used in DBMS. 2mks b) Draw an Entity relation Diagram from the following External schema. 4mks Hospital (pid: string, ailment: string, medicine: string, Doctor: string, inoutpatient: string Price: real) (mark each) “) Write an SQL Statement to create a view presents the name, and age of sailors who have reserved a boat, and the day of the reservation. But it does not show the sid, or bid of the reserved boat. Also, it only shows sailors with rating bigger than 6. 61 (i) Radix sort {3 mark: (ii) Quick sort tt a 3 ror athe [Smark —p)For each method above give the corresponding order of complexity. [4 marks] (eae Q4.a) Given a string P of length r and a text string T of length n an algorithms for finding ifP exists in T. [4 marks] =~ 4 (b) If C(n) is a funetion that takes n and returns the number of [3 mark sons for the algorithm in terms n and r ,what is this function? [4 marks] [Sma © Determine the maximum value of C(n). [4 marks] Q5. (a) What is a graph? [2 marks} [4 marl 1p) State Warshalls formula for finding : ( (i) path matrix of a graph. [2 marks] {4 mari Gi) shortest path in a graph [2 marks] © A graph with: vertices vi,v2,v3, and va has the following adjacency matrix: it ? at Give the path matrix for this graph= (6 marks] rtustrte thease of Linear seamen 2nd Dinar search methods in locating the 6 eg in the following i ofan 68238 16 18 22 23 26 29 >» Of AUN nese = t a target integer im & 3 jam igaerine the most suitable method on 3. are 03. )ENplain the following methods of sorting: QI.(a)Explain the significance of analysis of algorithms e (b) A Random Access Machine and Random Acess stored Machine “Order of | Complexity” (@) (ithe order of complexity of an algorithm is O(n log n),determine the si problem that this algorithm can solve in 1000 time units. © Explain the term (ii) Find the problem size ifthe order of complexity is O2") (©) By use examples explain the following concepts (i) Recursion (ii) Divide and conquer Q2.Give the following algorithm provide a RAM program to implement it. begin read rl if r1=0 then write 0 else begin <1 while r1>0 do begin r2=r2*r1 rl=rl-1 end write 12 end end (a) Provide a RAM program to implement it, (b) Determine the output of this program. a number n is input. c) Determi i (©) Determine the time and space complexities of this algorithm com 310 comPur®" ~~ gu/0? INSTRUCTIONS TO CANDIDATEs UESTION ONE and ANY THREE on; Fit QUESTION ONE («) Briefly explain what is meant by computer aie : r aks) (b) State the basic computational models that are used in computer architecture design, of! feoais, (©) Explain the meaning of” basic items of computation”. (2 marks) the ‘ he memory of a computer and its significance, (4) Explain clearly the (4 marks) (¢) Explain clearly bus protocol and its importance, (3 marks) UESTION TW Q ° i) Briefly € (2) Outline the register-addressing mode of an instnuolion set of # COMPUT: (marks) (b) State the components of abstract jon of a computational model (6) State th traction in the intenpretallon (Gmarks) is fional model (©) Using a suitable diagram outline the relationship between the mas marks) amming | and architecture QUESTION THREE e ; xz, (5 marks) main function s of a central processing unit of , (2 marks) 8 computer bus rks) (©) State and exp - explain the functions ofthe varia gaa QUESTION FOUR ule of @) Using as. ements O° 8 com, i le block diagram describe the sHueume ofan MPH (6 marks) ute (B) State the m oe F ‘tcgories of functions of ait INP! 310 COMPUTER ARCHITECTURE What are the characteristics of a computer memory system? (3 marks) ESTION FIVE Outline the design issues of cache memory of a computer. (8 marks) Briefly explain the meaning of "virtual memory " of a computer. (2. marks) ‘What is the significance of the virtual memory? (2 marks) s % ION SIX sh between abstract architecture and concrete architecture of the processo (6 marks) in the basis of Flynn's taxonomy of parallel computer architectures. (2'marks) categories of ‘architectures of processors created by Flynn's taxonomy. (4 marks) COM 312: Main ei i THER questions. ANY THREE OTHER ‘ UESTION ONE and Att 3 others carry 12 marks each. Question One 24 pee ao (a) (@) Consider a Coit ements constitute this system? a What erin following pes of problems encountered in cliciting system requirements Scope problems © Understanding problems Volatility problems ac least four checklist questions against which sequirements in a formal technical review fi ments engineering process describ fb) (bo) Develo} — should be checked h (©) (©) With reference to software require what is meant by () Normal requirements. i) Expected requirements. (ii) Exciting requirements. (@ @ Distinguish berween the closed ended and the open ended approach to prototyping (i) Describe one tool that may be used for rapid prototyping. (©) Instructuted inalysis. the information domaia looks at data and control. Describe three views of representing this domain y be the following software design architectutes @ — Calland return (i) Object orientation (g) @ Whatis CASE (i) Describe any four categories of CASE tools © Question Two (12 Mark (a) The diagram below shows a system context diagram for-a conveyer line sorting system. In which of the boxes/de6 would you place the following: items of the system @ Barcode reader. @ —— Conveyer line. ii) Sorting station operator. @v) Sorting mechanism, (*) Mainframe COM 312 Question Five (12 Marks) (@ @ __ Describe the design model in structured (Mag What inputs from the analysis model prod design model design luce the dat design in the duce the data desig avail data flow diagram above ¢ the DFD has transform or transaction fl i) Determine whi characteristics Gi) Draw the architecture that results from first level factoring 1 ae (ii) Draw the architecture that results from second level fac fi pea actoring 3 Matks . co Question Six (12 Marks) ny four principles of us ce the user in control”, 4 Marks co educes the users memory load 4 Macks ository in -CASE er interface design that (a) Deseribe @ Gi) (b) State describe roles of the rep 4 Marks ay 1. Mark system flow diagram produced from a system context diagram : 2Marks How isa { __ Whatis the use of traceability tables in requirements ‘management i fi) Using the information below, develop a souree traceability table for : the requirements R1- R4 and sources S1 to $6 wad Requirement sources Ri Si, $2 R2 $2, $3, $4 R3 $3,86 R4 $4, $5 estion Three (12 Marks) @) State the tasks involved in software zequirements engineering. avis ) Compare the basic principles of software requirements engincesing using @ Structured methods Gi) Object oriented methods. ae (©) Assume that you have visited a potential eustomer and have had a process initiation meeting, propose two questions you would ask to « @ Identify stakeholders. 7 @) Gauge the effectiveness of the meeting, Question Four (12 Marks) ( Consider the nazzative below ASEHOME software enables the homeowner to configure the security system when it is installed, moniters ali sensors connected to the security system, and interacts with the homeowaer through a keypad and funetion contained in the SAFEHOME control panel. During installation, the SAFEHOME control panel is used fo “program” and configure the system. Each i Tmber and type, @ master password is programmed for arming and disarming the system, and telephone number(s) are input for dialing when a sensor event occurs. When a sensor event is recognized, the ‘software invokes an audible alarm attached to the after a delay time that is specified ‘by the homeowner during system configuration es, the software dials a telephone number of a monitoring service, provides information aa it ee tocationg sepaing ce Hau meleTenE a. Se been detected. The telephone oo ea ccalateal every 20 aeconsamg! ‘nlephinns cotnestine i) abtaiaegy ae ee pith HOMEOWNER is managed by a user-inferaction subsystems that reads input provided through the keypad function keys, displays prompting messages on the LCD display, display system status information on the LCD display. Keypad interaction takes the following form a Represent Using data flow diagrams the information flow in the ® system Partition the functional domain of the system. TION THREE (iSmarks) QUE 4) Citing relevant examples describe the entrepreneurial process. (8 marks). }) A growing number of individuals now days are dissatisfied with paid employment. Explain with reasons (3marks).. ¢) ‘Business planning is critical to both entrepreneurs and lenders’, Discuss (marks) QUESTION FOUR (15marks) (7marks) a) Explain the importance of innovation to the success of a venture. (8 marks) b) Assess some of the most important characteristics of successful entrepreneurs QUESTION FIVE (15 marks) re to identify opportunities within the m arket exposes enterprises to risks. Explain ¢ = ‘ rnowledge on how he can protect his idea, .cholar be of assistance to him? ¢ i‘ Give sas Which the social-cultural environmental the co a sole proprietor, he lacks full k rerefore can you as an entrepreneurship s QUESTION SIX (15marks) | Jocks that can limit an individual’s creativity. you subjected yourself to one of Venture creation faces mental ituation in which uss the dimensions through ial-cul | the need for eniireprenieurahiia y=) a lobilizing funds, assembling the team are critical steps in Required (i) Write down the code’s output (3 Marks) (ii) Compute the running time of the individual elements of the algorithm (5 Marks) 5) Describe how the merge sort is carried out (4 Marks) SCHOOL OF BUSINESS AND MANAGEMENT SCIENCES DEPARTMENT OF BUSINESS MANAGEMENT BACHELOR OF BUSINESS MANAGEMENT ACADEMIC YEAR 2019/20 BSEN 311: ENTREPRENEURSHIP AND VENTURE CREATION a) Instructions: Time Allowed: 3 Hours ») Answer Questions ONE and ANY other THREE Questions wi °) Read the case below and answer the questions that follow Case--Discipling Nations: The Power of Truth to Transform Cultures al lawyers, pastors, journalists, writers, entertainers, and politicians. They then context for the common man. That is how History pivots on the debates & knowledge individuals. In the 1930s, Robert Hutchins*(1899-1977) and John Dewey* (1859-195: the proper philosophy of education. Hutchins, President of the University of Chicago, classic position that education’s purpose was to ‘prepare people for life.’ Dewey, and signer of the Humanist Manifesto, took the modern, secular position that purpose was to “prepare people for a job.’ Dewey won the debate, and his jus impacted not only education in America and in much of the rest of the world but of us live and work in our cultures. QUESTION ONE a) How different would the world have been had Hutchins won? ) In your view, how does inappropriate education impact the world °) what extent is the above debate in tandem with the Joseph Schumpeter’s repreneurship? 4) imagine what could have happened if-a scholar like you could have been Jebate, and share your contribution ©) Discuss the three interrelated and interconnected competence areas of nireprencurship Competence Framework to re-enforce the above QUESTION TWO (15 marks) a) Entrepy 'repreneurship isan important concept in national develo gard to Kenya's development b) Explain any three classifications of d each the types of entrepreneurs. SECTION A: ANSWER ALL QUESTIONS Question 1 (12 Marks} (a) (i) Define the following terms. (I) An algorithm's complexity (I) An algorithms worst case (ii) Describe what the big O notation 1s. (b) Describe how you convert a number from base 10 to ba stack (c) Describe how the insertion sort is carried out. Question 2 (12 Marks} (a) State the main advantage and the main limitation o} method over the linear search method. (b) Write the postfix equivalent of the following infix expre: ((A-B/C)+(D*B-F)"G) SCE i) (c) Show the steps of sorting the following list into asce the selection sort method (show the list after each step). 32, 26, 15,10, 5 (d) For each of the two operations below, state the situal (1) The best-case (11) The worst-case The operations are; (i) Searching for an element in a list and. returning element's first occurrence in the list, (i) The following C code. x=0; if (x<0) k=-1; else if (x>0) key to maintain Rear co (b) One method of implementing a queue is oD Using this method, and using the array a[b] as the queue, v algorithm to; (i) Initialize the queue (ii) Insert an element y s NB: Assume existing functions empty() and full) for checkt queue is empty or full respectively. (c) For part b(ii) above, compute the running time of the wor uestion 6 (12 Marks, (a) Consider the following algorithm (C++ code). int ele=4; int a=0; int b=0; for (int count=0;count<10;count++) if (x{count]ele) bt; int c=10-(a+b); cout<

You might also like