You are on page 1of 2

General diploma questions (from the field of study)

1st degree engineering studies

1. Discuss examples of applications of selected branches of mathematics (eg Statistics, Numerical


Methods, Discrete Mathematics) in the preparation and implementation of IT projects.
2. Characterize the properties of selected CMS (content management systems) and define the
basic areas of their applications.
3. Characterize selected tools for automating the testing of desktop programs and web
applications.
4. Compare the properties of the tools used for the needs of computer graphics and image
processing.
5. Discuss the basic properties and applications of distributed databases.
6. Describe the stages of constructing the use case model in the SI software design process and its
description in the SI project documentation.
7. Characterize the properties and purpose of UML diagrams.
8. Characterize the methods and tools used in practice for project management.
9. Characterize the properties and applications of distributed systems.
10. Characterize examples of applications of artificial intelligence in selected IT solutions (eg in
robotics).
11. Characterize electronic communication channels and perspectives of their applications and
further development.
12. Characterize the tools that should be used for the lawful management of information flow in the
electronic form.
13. Discuss the importance of Cloud Computing technology to the availability, scalability, security
and optimization of the costs of services provided.
14. Discuss cloud computing service models: SaaS (Software-as-a-Service), IaaS (Infrastructure as a
Service), PaaS (Platform as a Service).
15. Compare application areas and service properties in a private, public and mixed cloud model.
16. Characterize the "Four V" concept in relation to Big Data security.
17. Compare technologies: GSM, Bluetooth, Wi-Fi.
18. Characterize the properties and areas of application of WiFi-HotSpot systems and the rights of
their owners.
19. Characterize the techniques used in data centres to improve their energy efficiency (the so-
called green data centre).
20. Characterize network security technologies (Firewall and VPN systems).
21. Characterize the properties of the e-mail security tools used (Secure Mail).
22. Discuss the security threats on the Internet of Things.
23. Characterize the tools used to manage the security of applications for mobile
devices.
24. Characterize the security policy principles applied in enterprises (companies) of
various scale.
25. Characterize the principles of business continuity planning in the company (DRP -
Disaster Recovery Plan).
26. Discuss the security risks associated with the use of private mobile devices (BYOD:
Bring Your Own Device) for business purposes in the company.
27. Discuss operational support for computer security incidents.
28. Characterize tools for enterprises that enable safe cooperation of employees from
various departments.
29. Characterize the tools for mobile devices that allow you to maintain contact and
efficient work on the go for employees from various departments of the company.
30. Discuss the procedure for responding to IT security incidents in the company.

You might also like