IS 312 – Midterm #2 Sample Questions Important Note: This is NOT an all-inclusive list. These are only sample questions. You might see some of the following questions but there will also be some other questions on the test. Topic: Database Design 1. What is normalization? Normalization is a process for evaluating and correcting table structures to minimize data redundancies, thereby reducing the likelihood of data anomaly. 2. When is a table in 1NF? 1) All of the key attributes are defined. 2) There are no repeating groups in the table. 3) All attributes are dependent on the primary key. 3. When is a table in 2NF? 1) It is in 1NF, AND 2) It includes no partial dependencies; that is, no attribute is dependent on only a portion of the primary key. 4. When is a table in 3NF? When it is in 2NF and it contains no transitive dependencies. 5. When is a table in BCNF? When every determinant in a table is a candidate key. 6. What is a partial dependency? With what normal form is it associated? When an attribute is dependent on only a portion of the primary key. A partial dependency is when exists when there is a functional dependence in which the determinant is only part of the primary key. The 2NF would be associated with partial dependency. 7. What three data anomalies are likely to be the result of data redundancy? How can such anomalies be eliminated? Tables can contain insertion, update, or deletion anomalies. Normalizing the table structure will reduce the data redundancies. Splitting up tables to divide the information into separate relational groups reduces data redundancy. 8. Define and discuss the concept of transitive dependency When there are functional dependencies such that X → Y, Y → Z, and X is the primary key. X → Z is the transitive dependency because X determines the value of Z via Y. A transitive dependency will only occur when a functional dependence exists among nonprime attributes. A transitive dependency exists. 9. What is a surrogate key, and when should you use one? A surrogate key is a system-defined attribute generally created and managed by the DBMS. It is usually numeric, and its value automatically increments for each new row. Sometimes a IS 312 – Systems and Technologies for Managers Fall 2022 Midterm #2 Sample Question composite primary key may become too cumbersome to use as the number of attributes grows or it may simply have to, much descriptive content to be usable in which case a surrogate key is used. 10. Why is a table whose primary key consists of a single attribute automatically in 2NF when it is in 1NF? A dependency based on only a part of a composite primary key is called a partial dependency. Therefore, if the PK is a single attribute, there can be no partial dependencies, thus, it will automatically be in 2NF. 11. How would you describe a condition in which one attribute is dependent on another attribute when neither attribute is part of the primary key? This condition is known as a transitive dependency. A transitive dependency is a dependency of one nonprime attribute on another nonprime attribute. The problem with transitive dependencies is that they still yield data anomalies. 12. You are told that in a database design, “an attribute that is part of a composite primary key is also a candidate key”. How would you respond to that statement? This argument is incorrect if the composite PK contains no redundant attributes. If the composite primary key is properly defined, all the attributes that compose it are required to identify the remaining attribute values. By definition, a candidate key is one that can be used to identify all the remaining attributes, but it was not chosen to be a PK for some reason. In other words, a candidate key can serve as a primary key, but it was not chosen for that task for one reason or another. Clearly, a part of a proper (―minimal‖) composite PK cannot be used as a PK by itself. More formally, a candidate key can be described as a super key without redundancies, that is, a minimal super key. Using this distinction, note that a table might contain the composite key – for example: STU_NUM, STU_LNAME This composite key is a super key, but it is not a candidate key because STU_NUM by itself is a candidate key! The combination STU_LNAME, STU_FNAME, STU_INIT, STU_PHONE might also be a candidate key, as long as you discount the possibility that two students share the same last name, first name, initial, and phone number. If the student’s Social Security number had been included as one of the attributes in this example — e.g., named STU_SOCSECNUM — both it and STU_NUM would have been candidate keys because either one would uniquely identify each student. In that case, the selection of STU_NUM as the primary key would be driven by the designer’s choice or by end-user requirements. Note, incidentally, that a primary key is a super key as well as a candidate key. Fall 2022, CSUN Nazarian College of Business Page 2 Systems and Operations Management IS 312 – Systems and Technologies for Managers Fall 2022 Midterm #2 Sample Question Topic: Data Modeling Go over your modeling question in our MySQL Workbench class activity, your team’s design, and my feedback. Teams are encouraged to share the modeling questions, team designs, and the instructor’s feedback with each other to learn the nuts and bolts of the data modeling using ER diagram better. You will have at least one similar question in your midterm, that you must solve individually. Topic: Computer Networks and the Internet 1. In the client-server model, what is the primary protocol used for communication between a browser and web server? a. FTP b. TCP c. HTTP d. SSL 2. Which two encryption protocols might be used to provide secure transmissions for browser and web server communications? a. HTTP and HTTPS b. SSL and TLS c. SSL and HTTP d. TCP and UDP 3. Which email protocol allows an email client to download email messages to the local computer? a. IMAP4 b. SMTP c. TCP d. POP3 4. Which email protocol allows an email client to read mail stored on the mail server? a. IMAP4 b. SMTP c. TCP d. POP3 5. Which application embedded in Windows operating systems allows remote control of a computer and uses the RDP secure protocol for transmissions? a. Telnet b. Remote Desktop c. SFTP d. SSH 6. A network consists of five computers, all running Windows 10 Professional – No servers are connected to this network. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which networking model does the network use? a. Star-bus b. Ring Fall 2022, CSUN Nazarian College of Business c. Hybrid d. Peer-to-peer Page 3 Systems and Operations Management IS 312 – Systems and Technologies for Managers Fall 2022 Midterm #2 Sample Question 7. In question 6, suppose one computer is upgraded from Windows 10 Professional to Windows Server 2016. Which networking model can the network now support that it could not support without the upgrade? a. Hybrid b. Client-server c. Star-bus d. Ring 8. A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use? a. Hybrid b. Mesh c. Star-bus d. Star 9. In question 8, suppose a new switch is connected to the first switch by way of a network cable, and three computers are connected to the new switch. Which network topology is used? a. Hybrid b. Mesh c. Star-bus d. Star 10. Which portion of the destination address on the receiving segment is used at the Transport layer to identify the recipient application of that segment? a. IP address b. Port c. MAC address d. Protocol 11. Identify which of the following statements is correct. a. The approximate number of possible networks in class B IPv4 is 126. b. The first part of an IP4 address identifies the host, and the last part identifies the network. c. IPv4 is categorized into three classes. d. A 32-bit IPv4 address is organized into four groups of 8 bits each. 12. Which of the following ports are used by applications such as Telnet, FTP, and HTTP? a. Dynamic port c. Registered ports d. Private port b. Well-known ports 13. You realize that the California State University, Northridge (CSUN)’s DHCP server has given you the following IP address: 130.166.92.100. The assumption is that CSUN network administrators know their job and assign private IP addresses according to the existing standards. What IP class is CSUN assigned based on this information? a. Class A b. Class B Fall 2022, CSUN Nazarian College of Business c. Class C d. Insufficient information to determine the IP class. Page 4 Systems and Operations Management