Tuesday, January 29, 2013

soal dan jawaban ujian sistem informasi manajemen

Berikut saya berikan contoh soal dan jawaban UAS sistem informasi manajemen






Final Test,MIS
 
D3 INTERNATIONAL BUSINESS



Name  : Muhmammad Khadziq Julianto
NIM     : C0D010017
Class    : Bisnis Internasional



QUESTION
1.  Brief explain the term below:
a.  Data attribute
b.  Data field
c.  Entity
d.  Record
e.  Table
f.  Database
2.  What is difference of primary key and secondary key.
3.  Please explain the problems according to:
a.  Data redundancy
b.  Data inconsistency
c.  Data isolation
d.  Data security
e.  Data  integrity 
4.  What is difference of dedicated line and switched line network connection.
5.  There are four strategies for application installation. Explain each of the four strategies.
6.  What are steps of an application development by combining prototyping and SDLC?



ANSWER
1.  Brief explain the term below:
a.  Data attribute              : Each characteristic or quality describing a particular. 
b.  Data field                       : A logical grouping of characters into a word, a small group of     words, or a complete number.
c.  Entity                               : A person, place, thing, or event about which information is maintained in a record.
d.  Record                            : A logical grouping of related fields.
e.  Table                               :  is a set of data elements (values) that is organized using a model of vertical columns (which are identified by their name) and horizontal rows. A table has a specified number of columns, but can have any number of rows.

f.  Database                        : A  logical group of related files that stores data and the associations among them.

2.  The difference of primary key and secondary key.
                Primary Key :
1) Is used for Unique Identification of Rows
2) We have only one Primary Key per table
3) A Primary Key is one of the Candidate Keys or you can say one of the irreducible super key, depends on database designer which one he needs.

            Secondary Key  :
1) Is used for Identification of Rows but not usually Unique
2) We can have multiple Secondary Key per table
3) Attribute used for Secondary key are not the ones used for Super Key i.e. Secondary Key is not even be one of the Super Key.
3.  Please explain the problems according to:
a.  Data redundancy        :  Data redundancy is a data organization issue that allows the unnecessary duplication of data within your Microsoft Access database.
b.  Data inconsistency    :  Data inconsistency exists when different and conflicting versions of the same data appear in different places. Data inconsistency creates unreliable information, because it will  be difficult to determine which version of the information is correct.
c.  Data isolation               :  In database systems, isolation is a property that defines how/when the changes made by one operation become visible to other concurrent operations. Isolation is one of the ACID(Atomicity, Consistency, Isolation, Durability) properties. In database systems, isolation is a property that defines how/when the changes made by one operation become visible to other concurrent operations.
d.  Data security                :   Data security is the means of ensuring that data is kept safe from corruptionand that access to it is suitably controlled. Thus data security helps to ensure privacy.
e.  Data  integrity              : Data Integrity in its broadest meaning refers to the   trustworthiness of system resourcesover their entire life cycle. In more analytic terms, it is "the representational faithfulness of information to the true state of the object that the information represents, where representational faithfulness is composed of four essential qualities or core attributes: completeness, currency/timeliness,accuracy/correctnessand validity/authorization.
4.  What is difference of dedicated line and switched line network   connection.
Dedicated line is a communications cable or other facility dedicated to a specific application, in contrast with a shared resource such as the telephone network or the Internet.In the other hand,A switched SDLC line between two NCPs can be used to connect two VTAM domains. One or more of switched lines can be defined as a switched line group in an NCP major node definition. Associated with each line in the NCP major node definition is a PU definition statement to represent a port for the actual physical unit that can be connected to the NCP on that line. The actual physical units must be defined to VTAM in the switched major node.
5.  There are four strategies for application installation. Explain each of the four strategies.
Ø  INSTALLATION: Four strategies
1.       Parallel: Run old & new systems for awhile to check validity. Safe
2.       Pilot: Install in one part of organization at a time. Learn and adapt
3.       Phased: In large system change one function at a time (e.g., order entry)
4.       Cutover: Start using entire system. Can be dangerous if errors exist

6. What are steps of an application development by combining prototyping and SDLC?
COMBINING PROTOTYPING & SDLC :
ü  PROTOTYPING/PILOTING PHASE:
·         DETERMINE BASIC REQUIREMENTS
·         PROTOTYPE SYSTEM
·         PILOT PROTOTYPE
ü  SDLC CONSTRUCTION PHASE:
·         SYSTEM BUILDING
·         SYSTEM TESTING
ü  SDLC IMPLEMENTATION PHASE:
·         INSTALLATION
·         OPERATIONS
·         MAINTENANCE

No comments:

Post a Comment