0% found this document useful (0 votes)
15 views

Case Study Set 2 - Marking Guide

The document outlines the examination structure for the Higher National Diploma (HND) in Software Engineering, including sections on algorithms, programming, databases, web design, and networking. It provides specific questions and topics to be covered in each section, along with marking guides and examples. The examination aims to assess students' knowledge and skills in various aspects of computer engineering and programming.

Uploaded by

hdsfbwj694
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views

Case Study Set 2 - Marking Guide

The document outlines the examination structure for the Higher National Diploma (HND) in Software Engineering, including sections on algorithms, programming, databases, web design, and networking. It provides specific questions and topics to be covered in each section, along with marking guides and examples. The examination aims to assess students' knowledge and skills in various aspects of computer engineering and programming.

Uploaded by

hdsfbwj694
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

REPUBLIQUE DU CAMEROUN REPUBLIC OF CAMEROON

Paix-Travail-Patrie Peace-Work-Fatherland

MINISTERE MINISTRY
DE l’ENSEIGNMENT SUPERIEUR OF HIGHER EDUCATION

COMMISSION NATIONALE D’ORGANISATION NATIONAL COMMISSION FOR THE ORGANISATION


DE EXAMENS OF THE EXAMS

HIGHER NATIONAL DIPLOMA (HND)

JUNE 2020 SESSION Examination Date: ………………………………….

OPTION SOFTWARE ENGINEERING


SPECIALTY COMPUTER ENGINEERING
COURSE TITLE CASE STUDY
TYPE OF EXAMINATION WRITTEN
CREDIT VALUE 12
MARKING GUIDE

Instructions: Answer all questions. You are authorized to use only non-programmable
calculator.

SECTION A: ALGORITHM AND PROGRAMMING. (50marks)


I. DATA STRUCTURES AND ALGORITHMS (10 MARKS)
1.

First, we shall determine half of the array by using this formula −

mid = low + (high - low) / 2


Here it is, 0 + (9 - 0 ) / 2 = 4 (integer value of 4.5). So, 4 is the mid of the array.
Now we compare the value stored at location 4, with the value being searched, i.e. 31. We find
that the value at location 4 is 27, which is not a match. As the value is greater than 27 and we
have a sorted array, so we also know that the target value must be in the upper portion of the
array.

We change our low to mid + 1 and find the new mid value again.

low = mid + 1
mid = low + (high - low) / 2
Our new mid is 7 now. We compare the value stored at location 7 with our target value 31.

The value stored at location 7 is not a match, rather it is more than what we +are looking for.
So, the value must be in the lower part from this location.

Hence, we calculate the mid again. This time it is 5.

We compare the value stored at location 5 with our target value. We find that it is a match.

We conclude that the target value 31 is stored at location 5.


I. EVENT PROGRAMMING (10 MARKS)

1. console.writeline() prints the results on the screen and causes the cursor to move to the ne xt
line while console.write() prints the output to the screen and causes the cursor to remain on the
same line.
2. console.readkey() prevents the console from disappearing almost immediately when printing
the results.
3. syntax error – grammatical programming error like omitting a semicolon

Semantic or logical error – wrong use of logic like using = instead of = =


Run time error – occurs at run time for instance dividing by zero.
4. char, Dim, As, int, string.
5. - always comments codes
- use proper indentations for particular blocks to ensure readability.
III. STRUCTURED PROGRAMMING (15 MARKS)

1. There are the following advantages of C functions.


o By using functions, we can avoid rewriting same logic/code again and again in a
program.
o We can call C functions any number of times in a program and from any place in
a program.
o We can track a large C program easily when it is divided into multiple functions.
o Reusability is the main achievement of C functions.
2. FIXED SIZE
3. The program is shown below.
#include <stdio.h>
void main ()
{
int arr[3][3],i,j;
for (i=0;i<3;i++)
{
for (j=0;j<3;j++)
{
printf("Enter a[%d][%d]: ",i,j);
scanf("%d",&arr[i][j]);
}
}
printf("\n printing the elements ....\n");
for(i=0;i<3;i++)
{
printf("\n");
for (j=0;j<3;j++)
{
printf("%d\t",arr[i][j]);
}
}
}
SECTION B: DATABASE (20marks)
1. a) What is meant by normalization in database? (1mark)
ans: Normalization is a formal framework for analyzing given relation schemas based
on their FDs and primary keys to achieve desirable properties of minimizing
redundancy and anomalies
b) State and explain the different norm form (3marks)
- 1NF: Defined to disallow multivalued and/or composite attributes or their
combinations
- 2NF: A relation schema is in second normal form (2NF) if it is in 1NF and
there are no functional dependencies with a proper subset of a candidate key
on the left hand side.
- 3NF: This normal form is based on the concept of transitive dependency.
- BCNF
c) For the figure below state weather it is normalize or not. If not, state the norm form
and normalize the table. (3marks)

Ans: it is not normalize. Because the attribute DLOCATION contain multivalue.


It is not in 1NF. It can be normalized by breaking the multivalued attributes
(there are other methods) as shown below.
d) What is functional dependency (1mark)
Ans: Functional dependency (FD) is a restriction on combination of tuples that can
appear in a relation. X -> A (X functionally determines A)

2. Give examples of DDL, DCL and DML as used in SQL (2marks)


Ans: DDL: CREATE, DROP, ALTER, RENAME DCL: GRANT,
REVOKE DML: SELECT, INSERT, UPDATE, DELETE
3. The questions below concerns the table below
a) What is the cardinality and degree of the relation (2marks)
Ans: cardinality: 4 degree: 3
b) List the attributes and choose a suitable primary key attribute for the relation (1mark)
Ans: attributes: StudentID, Name, gpa. Suitable primary key is StudentID
c) Write an SQL command to create the table below. The table name should be
student_info (2mark)
CREATE table student_info(
-> StudentID char(6) primary key,
-> Name varchar(20),
-> gpa int
-> );
d) Write an SQL command to select all students with gpa greater than 2.7 (1.5mark)
Ans: SELECT* FROM student_info WHERE gpa>2.7;
e) Write an SQL command to select names of all the students (1mark)
Ans: SELECT* FROM student_info;
f) Write an SQL command to add a fifth record to the table with ID ST002, Name
John, gpa 3.0 (1.5mark)
Ans: insert into student_info(StudentID,Name,gpa) values(ST002, 'John', 3.0);
g) Write an SQL command to change the gpa of Suzy from 3.2 to 3.4 (1mark)
Ans: UPDATE student_info set gpa=3.4 WHERE gpa=3.2;
SECTION C: WEB DESIGN (15marks)
1. To enbed video and audio:-
For Video:
Example to Embed a video in HTML5 is shown below.
1 <!DOCTYPE html>
2 <html>

3 <body>
4 <video width = “300” height = “250” controls>

5 <source src = “MyMovie.mp4” type = “video/mp4”>


6 </video>

7 </body>
8 </html>

For Audio:
Example to Embed an Audio in HTML5 is shown below.
1 <!DOCTYPE html>
2 <html>

3 <body>
4 <audio controls>
5 <source src = “song.mp3” type = “audio/mpeg”>
6 </audio>
7 </body>
8 </html>
2. Most frequectly used API
o Media API
o Data Transfer API
o Application Cache API
o User Interaction
o History API
o Constraint Validation API
o Command API
o Text Track API

3. Formatting tags in html5 (any 4 will do.)


o Marked text: Represents highlighted text for Reference purposes. We can
use <marks> tags for text highlight.
o Deleted text: Specifies the deleted block of text. We can use <del> tags to implement
a deleted text.
o Emphasized text: Defines the emphasized text. We can use <em> tags to implement
an emphasized text.
o Inserted text: Inserts a block of text into a document. We can use <ins> tags to
implement an inserted text.
o Small text: Display inserted text in a small size. We can use <small> tags to
implement a small text.
o Superscript text: This is a superscripted text. We can use <sup> tags to implement a
superscript text.
o Subscript text: This is a subscripted text. We can use <sub> tags to implement a
superscript text.

SECTION D: NETWORKING. (15marks)


SECTION D: NETWORKING
1. It is the interconnection of one or more things, devices, objects aimed are ensuring that they
should communicate
2. It is the interconnection of one or more computers aimed at communicating and sharing
resources
3. - Microsoft windows 7 ultimate OS on both computer
-Microsoft windows server 2008 ultimate OS on the central computer
4. - crimping tool
- RJ-45 Network connectors
- Network cable tester
- Cat 4,5,5E,6 or 7 network cables
- A pair of scissors
5. A server computer
6. Client computers
7. Standard B
8. – interconnecting the computers with network cables
- Assigning an alpha numeric password respecting a standard password nature
- Installing active directory services using dcpromo.exe
- Assigning IP addresses on the computers
- Enabling and disabling firewalls
- Installing roles and services such as file sharing
- Ipconfig to see all the ips of all computers on the network
- Using the ip of each computer on the network and pinging it from a different computer e.g
ping 192.168.1.2

You might also like