0% found this document useful (0 votes)
212 views4 pages

HND 2020 System Analysis and Design

The document outlines the structure and content of the National Exam for Higher National Diploma in Cameroon, focusing on software engineering topics such as information systems, database administration, web programming, and mobile programming. It includes various exercises and questions related to object modeling, UML, database design, and security risks associated with mobile devices. Additionally, it emphasizes the importance of understanding programming languages and technologies relevant to web and mobile applications.

Uploaded by

Eugene Mbah Tebo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
212 views4 pages

HND 2020 System Analysis and Design

The document outlines the structure and content of the National Exam for Higher National Diploma in Cameroon, focusing on software engineering topics such as information systems, database administration, web programming, and mobile programming. It includes various exercises and questions related to object modeling, UML, database design, and security risks associated with mobile devices. Additionally, it emphasizes the importance of understanding programming languages and technologies relevant to web and mobile applications.

Uploaded by

Eugene Mbah Tebo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 4
[REPUBLIC OF CAMEROON Peace WorkeFatheriand 1ENTSUPERIEUR MuvistRY OF iii EDUCATION IIER NATIONAL COMMISSION FOR THE ORGANISATION OF COMMISSION NATION: IATIONALE YK NATIONAL DIPLOMA EXAM (HIND) EXAM NATIONAL f1ON DE L'EXAMEN LOMA EXAM (HIND) it ‘National Exam of Higher National Diploma-New program — 2020 Session sal Raper: System At Duration: 4 hours Software Enginecering iysi and Design SECTION A: INFORMATION SYSTEMS AND DATABASE (50 marks). J: OBJECT MODELING (25 marks). ! Exercise MCQ'S each question carries 1 mark (10 marks) 1. The detailed specification of how al the parts of a system will be implemented and coordinated is called. ‘A) programming —_B) paraphrasing ©)systemdesign —_D) structuring 2-The primary purpose of a good modeling techniques is to A) to promote communication 'B) increase functional cohesion C) reduce the need for structure D) reduce dependency between modules 3. The UML provides standard ways to do all of the following to business systems except them. A) construct B) document ©) describe D) destroy 4, The UML is commonly used to model all of the following except. ‘A) computer programs B) business activities ©) organizational processes D) software systems 5. The UML was intentionally designed to be ‘A) low-level, detail-oriented B) used with Visual Basic ©) nontechnical D) inexpensive 6. The UML diagrams that show how a business works from the perspective of those who actually interact with the business, such as employees or customers, are diagrams. ‘A)communication © B) use case ©) state machine D) class 7. Which of the following would be portrayed as an extend relationship in a use case diagram for a hospital? ~ ‘A) the relationship between the head nurse and the floor nurses B) admitting a patient who has never been admitted before. ) serving a meal. 1D) scheduling the monitoring of patients’ vital signs : 8. The people shown in use case diagrams are called A) workers B) clowns © actors D) relatives 9, One aspect of use case diagrams that makes them difficult to learn is that, ‘A) they require programming experience to understand — Page 10f 4 = ical vocabulary ) they use a technical ' 3 aoe single right answer FOF any CaSS: D)all of the above 10, The arithmetic association relationship between a college student and college cou be expressed as courses would be €xP! _ alo Bil Exercise 2 (15 MARKS) 1. 0) What is object? @ marks) - 'b) Discuss the main characteristics of the object with example from the real world. (marks) 2, Whatis: (4 marks) a) UML? b) Modeling 3, Explain two types of system development process of your choice. (marks) + Differentiate between aggregation and composition, (2marks) DATABASE ADMINISTRATION WITH MYSQL (25 marks), Draw an entity-relationship diagram for the following information system. ‘The Aereporier ‘Transport Services Company runs a limousine service that caries pussengers to and from the ‘Toronto airport to their homes or places of business. They maintain a database of customers on aPC in order to schedule pickups and also to keep their customers from having to repeat address information each time they call the limousine service. The database for the customers is accessed by customer telephone number, If a customer is picked up sometimes at their hhome and sometimes at their office, both home and office telephone numbers and addresses are stored in the database, The customer may also schedule a pickup fiom the airport when his ‘or her flight arrives or may call from the airport and reserve a limousine which will come in approximately five minutes. When a request fora pickup comes in, the dispatcher checks for tomer. Typically cars are assigned to the available drivers, calls one and assigns them to a cus driver each workday and often a driver will take a car home for an early moming pickup if needed. The relevant customer and driver attributes kept in the database for mansgin pickup and delivery is as follows: ‘Customer Name Customer Home Telephone Number Customer Home Address Customer Home Region : Customer Work Telephone Number Customer Work Address Customer Work City Region Date of Pickup ig the customer 1, Time of Pickup Driver assigned to Pickup Special Pickup Information Flight Number Air Carrier Arrival Time Customer Drop-off City Region Driver ID Driver Name Driver ‘Address Driver City Region Driver Phone Number Car ID Car Make Car License Number QUESTION 1. WEB PROGRAMING (25MARKS) 1, Give the full meaning ofthe following Acronyms (mks) + HTML b.W3C ©. CSS 4. HTTP oP £URL, g.DNS 4h. FTP 2. Match the technology or practice on the left with the problem it best addresses: Marks) “Technology | Problem __Progressive enhancement | a. Assistive reading and input devices | 2.__Server-side detection ‘|. Stow connection speeds 13. ___Responsive design |c-Allllevels of browser capabilities WALARIA 3. Give the function of each of the following programming languages: HTML, CSS, JavaScript, PHP. (Smarks) 4. List two software you can use to type a HTML program (2 marks) 5, What type of storage engine MySQL support (5 marks) QUESTION 2, MOBILE PROGRAMING @5MARKS) 1. What is mobile programming? (2marks) 2, What is an android software? (2marks) 3. What is a mobile terminals? @marks) 4. State the different types of mobile terminals that you know (marks) 5, What is an android operating system? (2marks) 6. State two examples of android operating system (2marks) 7, What isa web application? (2marks) Page 3 of 4 8. Protecting the Security and Privacy of Mobile Devices (10 =) ae As the number of smartphone and tablet devices increases, s pan hackers and computer criminals will target these devices. Since they were first introduced, certain mobile devices have been vulnerable to eavesdropping and fraudulent charges. In addition, many of them automatically track a user's location. The major ae risks associated with mobile devices include: Malware—Andt apps, in particular are vulnerable to malware because of the platform's openness. To guard against malware threats, users have to upload the most recent versions of the ‘operating system and use mobile security tools. Premium SMS billing—With their devices’ vulnerability to malware, smartphone users face an added risk of subscribing to premium text-messaging services that charge every time users interact with them, Most cell phone carriers allow subscribers to bléck premium SMS messaging, however. E-mail and SMS phishing —Because it is more difficult to establish a link’s legitimacy on a mobile device, mobile users are more likely to click on them, which is ‘phisher’s dream come true. Mobile users should therefore use a lot of caution when ‘using e-mail on these devices. Spyware—Commercially available software can be used by intruders to track and control the user’s mobile activities. Malicious Web sites—These could pose a threat in the future, given that many your mobile device unlocked, Never leave it unattended. Always protect it with a password. Answer the following questions: 8) What are some examples of security risks associated with a mobile device? b) How can these devices automatically track a user's location? ©) What are a couple of recommendations for protecting your mobile device against these threats? Page 4 of 4

You might also like