Student Number:
Information Processes and Technology Revision
-1-
SECTION I 20 marks Attempt Questions 1–20 Allow about 35 minutes for this section Use the multiple-choice answer sheet. Select the alternative A, B, C or D that best answers the question. Fill in the response oval completely. Sample: 2 + 4 =
(A) 2 A
(B) 6 B
(C) 8 C
(D) 9 D
If you think you have made a mistake, put a cross through the incorrect answer and fill in the new answer. A
B
C
D
If you change your mind and have crossed out what you consider to be the correct answer, then indicate the correct answer by writing the word correct and drawing an arrow as follows. Correct A
B
C
D
-1-
SECTION I 20 marks Attempt Questions 1 – 20 Allow about 35 minutes for this section Use the multiple choice answer sheet. Write your number on the top of the answer sheet.
1. Which of the following contains only components of an Information System? (A) Hardware, Participants, Users (B) Purpose, Participants, Environment (C) Environment, Users, Information Processes (D) Purpose, Participants, Information Processes 2. What is the purpose of an information system? (A) To solve a specific need (B) To analyse problems and decide on the best solution to use (C) To meet the needs of a specific set of users (D) To make the best use of technology 3. What term refers to everything that influences and is influenced by an information system? (A) Environment (B) Information System (C) Users (D) Participants 4. What term refers to how the collecting of false data effects the display process? (A) Snowball effect (B) Interdependency effect (C) Rollover effect (D) Validation
-2-
5. Which of the following contains only correctly named information processes? (A) Organising, analysing, storage (B) Organising, storage, transmitting (C) Collecting, storage and retrieval, displaying (D) Collecting, organising, printing 6. An information system is classified as either group or personal, depending on which factor? (A) The amount of money the information system cost to create (B) The quantity of data that is being collected (C) The number of participants (D) The end user(s) 7. Which of the information processes includes conducting surveys of user opinions? (A) Collecting (B) Organising (C) Analysing (D) Storage and Retrieval 8. Which of the following contains only participants of an information system? (A) Managers, programmers, engineers and data entry operators (B) Users, managers and data entry operators (C) Managers, programmers and data entry operators (D) Managers, system administrators and network personnel 9. What term refers to a system that is an integral part of another system? (A) Information system (B) System resource (C) Sub-system (D) Information technology
-3-
10. Which information process is the only one allowed to alter the actual data? (A) Collecting (B) Processing (C) Analysing (D) Organising 11. What is the most common way of digitally storing text in a computer device? (A) Hexadecimal (B) Binary (C) Bits (D) ASCII 12. Bitmapped graphics can be created using which type of program? (A) MS PowerPoint (B) Paint shop pro (C) CAD or CAM (D) MS Word 13. Which term refers to the morals for right conduct or practice? (A) Ethics (B) Validation (C) Privacy (D) Human computer interaction 14. Which of the following is the most appropriate way to prevent virus attacks? (A) Changing your password regularly (B) Only open emails that come from recognisable senders (C) Backing up your hard disk every night (D) Using the same password for all of your accounts
-4-
15. Which of the following best describes data integrity? (A) The accuracy of data (B) The validity of data (C) The ability of the system to update its data (D) How often the data needs to be analysed for errors 16. What term means ensuring that only numerical data can be entered into a date field? (A) Data validation (B) Data integrity (C) Data masking (D) Data verification 17. Collecting data and information contained in formally published books is generally more accurate than data sourced from the Internet. Why is this the case? (A) The Internet is susceptible to viruses that can easily corrupt data (B) Formally publishing a book requires significantly more effort (C) The Internet relies on information from a variety of sources (D) An authors credentials are listed in a book 18. It is a generally accepted practice to include instructions for completing paperbased forms. Where should these instructions be located? (A) At the start of the form (B) Where they are needed within the form (C) In a separate reference document (D) At both the start and the end of the form 19. What has been the result of automation of traditional manual labour tasks? (A) High unemployment within the total population (B) A decline in jobs available within goods producing industries (C) An increase in jobs within knowledge and person based industries (D) Manual labourers now working in knowledge and person based industries
-5-
20. When is the only time that the selling of a database containing individual’s personal information is legal? (A) If the individuals have been informed of the organisations who will purchase the data (B) If none of the data is of a sensitive nature (C) If the company selling the database collected the information directly from the individuals (D) If the data is crucial to the functioning of the purchasing company
-6-