You are on page 1of 8

,'


TEST CODE 02229010
FORM TP 2014212 MAY/JUNE 2014
CARIBBEAN EXAMINATIONS COUNCIL
CARIBBEAN ADVANCED PROFICIENCY EXAMINATION®
INFORMATION TECHNOLOGY- UNIT 2

Paper 01
1 hour 30 minutes

(13 JUNE 2014 (a.m.))

READ THE FOLLOWING INSTRUCTIONS CAREFULLY.

1. This test consists of 45 items. You will have 1 hour and 30 minutes to answer them.
2. In addition to this test booklet, you should have an answer sheet.
3. Do not be concerned that the answer sheet provides spaces for more answers than there are
items in this test.
4. Each item in this test has four suggested answers lettered (A), (B), (C), (D). Read each item
you are about to answer and decide which choice is best.
5. On your answer sheet, find the number which corresponds to your item and shade the space
having the same Jetter as the answer you have chosen. Look at the sample item below.

Sample Item

Which of the following pairs represents general-purpose software tools?


Sample Answer
(A) Word processor and accounting software
(B)
(C)
Spreadsheet and database software
Insurance processing and spreadsheet software
®e©©
(D) Student record system and database software

The best answer to this item is "spreadsheet and database software", so answer space (B)
has been shaded.

6. If you want to change your answer, be sure to erase it completely before you fill in your

l
new choice.
7. When you are told to begin, turn the page and work as quickly and as carefully as you can.
If you cannot answer an item, omit it and go on to the next one. You may return to the
omitted item later. Your score will be the total number of correct answers.

---
--
--
8.
9.
You may do any rough work in this booklet.
You may use sih;nt, non-programmable calculators to answer questions.

------ DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO DO SO.

-- Copyright © 2012 Caribbean Examinations Council


A 11 riohtc: rPc:Pn.rPrl
-2-

Which of the following is NOT a database


5.
1. A foreign key is an attribute model?

(A) that uniquely identifies each row in Archival


(A)
a table (B) Networked
in one table whose values must Hierarchial
(B) (C)
either match the primary key in Object-oriented
(D)
another table or be null
used strictly for data retrieval
(C)
purposes The duplication of data in a database is
with a storage key in a table
6.
(D) referred to as data

(A) integration
Normal forms do NOT affect databases in redundancy
2. (B)
terms of (C) inconsistency
(D) documentation
(A) integrity
(B) security
(C) consistency A software application that regulates and
7.
(D) performance controls access to data stored in a shared
integrated computer structure is a
~ ..

3. Data mining is the (A) data access system


1 (B) information access system

I (A) process of finding results using database management system


(C)
queries (D) information management system
(B) process of defining how a database
! should organize data
l (C) term used to refer to automating
8.
Which of the following features is NOT
manual transaction processing required when choosing a storage device?
systems
(D) process used with data warehouses Access method
(A)
to find patterns and relationships Access speed
(B)
among data (C) Volumes to be stored
(D) Volumes to be processed

Which of the following is NOT a method


4.
used to organize files?

(A) Serial
(B) Random
(C) Direct Sequential
(D) Indexed Sequential

GO ON TO THE NEXT PAGE

O'>'>'> QO 1 o/r APF 2014


- 3-

Item 9 refers to the following table.

Name Country Year Amount Owed

A. West Trinidad and Tobago 2010 23 000


0. North Jamaica 2012 48 000
E. Santa Guyana 2011 I9 000
Q. Easy Barbados 2011 6 000
J. Sprat Guyana 2010 25 000
G. Locks Trinidad and Tobago 2011 7 000
B. Brown Trinidad and Tobago 201I 20 000
E. Love Barbados - - ---
2011 26 000

Query: Type Trinidad and Tobago under COUNTRY column, 20II under YEAR column and
> = 20 000 under AMOUNT OWED column.

9. Using the query and data in the table above, Item 11 refers to the information below.
how many records will be extracted when
the query is executed? STUDENT (StudentiD, Firstname,
Surname)
(A) 0 COURSE (CourseiD, CourseTitle,
(B) 1 Lecturer! D)
(C) 2 REGISTRATION (StudentiD, CourseiD,
(D) 4 Mark)
LECTURER (LectureriD, Lecturer)

10. When a fun<.~tion exists, the attribute on the 11. The registration entity is the result of a
left hand side of the functional dependency relationship between the STUDENT and
( ->) is called the COURSE entities. For any ONE student,
this relationship is MOST likely to be
(A)
(B)
(C)
relation
identifier
dependence
. (A)
(B)
I~M
I~ I
(D) determinant (C) M~M
(D) M~I

,, 12. Which ofthe following fields would MOST


likely be validated by a range check?

(A) Student ID
(B) Student Age

l
(C) Student Name
(D) Student Address
GO ON TO THE NEXT PAGE
022290IO/CAPE 20I4
-4-

13. Radio buttons, check boxes, drop-down lists 18. The term used to describe a predefined
and combo boxes are useful objects that operation that performs a calculation or
are included on web pages and other user generates a value such as today's date is a
interfaces. These objects help minimize
data entry errors and aid in data (A) formula
(B) function
(A) validation (C) process
(B) verification (D) parameter
(C) encryption
(D) security
19. Which ofthe following software packages is
used to store vast amounts of data, provide
14. Which of the following storage devices is multiple views ofthe same data and produce
capable of holding the LARGEST amount multiple reports?
of data, allows a user to write on the disk
once and read (play) it many times? (A) Spreadsheet
(B) Word processing
(A) CD-ROM (C) Database management
(B) CD-RW (D) Desktop publishing
(C) DVD+R
(D) DVD-RW
20. While researching for a Social Studies
project using the Internet, Jim encounters
15. A 'data mart' is BEST described as a subset a website he wishes to store for future
of the reference. The MOST efficient way of
doing this is to
(A) database
(B) data miner (A) save it on his flash drive
(C) data warehouse (B) write it on a piece of paper
(D) data processing unit (C) add itto 'Favorites' or 'Bookmarks'
(D) copy the URL into a Word document

16. Which of the following tools is MOST


appropriate for implementing an application
form?

(A) Statistical
(B) Presentation
(C) Database management
(D) Word processing

17. Persons can have online, real time


conversations using

(A) IRC
(B) email
(C) maillist'
(D) bulletin board

GO ON TO THE NEXT PAGE


tVV''I'"'0010 / r'ADJ:.' "()l.d.
- 5-

Items 21-22 refer to the following diagram. 24. Paul is interested in designing a web page
to advertise his small business. He decides
y to design the web page himself but he is
not familiar with HTML. Which of the
following can Paul use to assist in the design

~ile
112!
Edit Vie~ T 1-lclxl of his web page?

(A) Telnet services


(B) Internet portals
(C) Message boards
(D) Authoring tools

25. When entering data in a database


X management system (DBMS), a check that
detects if any data are in error or incomplete
21. The control identified by X in the diagram, is referred to as
where user messages are displayed, is the
(A) validation
(A) status bar (B) integrity
(B) tool bar (C) verification
(C) window title (D) authentication
(D) scroll bar

Item 26 refers to the following scenario.


22. The control identified by Yin the diagram
is called the A Form 3 student was explaining to
his teacher that in order to obtain the
(A) menu bar information for his homework he went to
(B) task bar a site from which he could access many
(C) sizing bar different services. The site was so complete,
(D) title bar he reported, that he did tiot have to look
anywhere else. All he had to do was click
on the buttons and words and they took him
23. The correct syntax for adding the colour to almost anything he needed.
orange to the background of an HTML
document is 26. The mechanism that was activated when he
clicked on some words or buttons is MOST
(A) <body bgcolor = "orange"> likely a
(B) <background body= "orange">
(C) < b a c kg round> or an g e <I (A) menu
background> (B) portal
(D) <body style = "background- (C) web icon
color:orange"> (D) hyperlink

GO ON TO THE NEXT PAGE


02229010/CAPE 2014
-6-

27. Mark gathered information from several 31. Sabotage is one of the possible rebellious
websites for his assignment on "Sugar acts of disgruntled employees. Which of
Production in the Caribbean". The criteria the following is an act of sabotage?
that Mark should use to ensure that the
information used is accurate, complete (A) Breaking into a system for fun
and reliable, are authority, organization or (B) Accessing the net during lunch time
publishing body and (C) Accessing private data for financial
gain
(A) currency, design, coverage (D) Destroying computer hardware or
(B) currency, audience, design software
(C) currency, audience, objectivity
(D) currency, coverage, objectivity
32. Blue Ribbons Inc. is an Internet-based
company that sells its goods and services
28. Database management systemsallow users directly to its customers. They are engaging
to organize and store data as well as query m
and retrieve tables in a database. Which
of the following are MOST appropriate (A) e-billing
for making queries? (B) e-business
(C) e-shopping
I. Structured query language (D) e-commerce
II. Data definition language
III. Hyper text mark up language

! IV.

(A)
Query by example

I and II only
33. Mr Taitt had his computer system plugged
into a device that offered protection to his'
PC. While working at home on the machine
(B) I and IV only one day, he did not realize that there was an
(C) II and III only electrical outage until he attempted to turn
(D) I, III and IV only on the television. Which of the following
devices did Mr Taitt MOST likely have his
computer system plugged in to?
29. Which of ~he following codes creates a
horizontal line across a page in an HTML (A) UPS
document? (B) Surge protector
(C) Voltage regulator
(A) <HGAD> (D) Power strip
(B) <HR>
(C) <TITLE>
(D) <HL> 34. A businesswoman received an email from
her bank requesting that she email her
personal data to them since her file could
30. Some students have created a web page that not be located. She should be very careful
can be modified by anyone who accesses since this could be a classic case of
it. This web page can be referred to as a
(A) piracy
(A) blog (B) viruses
(B) portal (C) phishing
(C) wiki • (D) hacking
(D) news group

GO ON TO THE NEXT PAGE


022290 10/CAPE 2014
-7-

35. Miracle Bank & Trust is preparing to 39. Which of the following health risks is
upgrade its mitigation strategies to counter NOT generally associated with the use of
security issues that have been identified computers?
..
recently. Which of the following is NOT
an example of a security measure? (A) Eye strain
(B) Backache
' (A) Firewalls (C) Elbow sprain
[ (B)
(C)
Encryption
Data logging
(D) Carpal tunnel syndrome

(D) Biometric access


40. Which of the following terms refers to
environmentally sustainable computing?
36. Kim is a fashion designer who routinely
makes purchases online. Which of the (A) Cloud
following functions is NOT possible with (B) Green
online purchasing? (C) Therapy
(D) Ergonomic
(A) Ability to shop despite time
constraints
(B) ~bility to determine the quality of 41. Which of the following would be used by a
products company to identify a product that has been
(C) Ability to make purchases without officially registered and might be used only
leaving home by the owner or the manufacturer?
(D) Ability to access products that are
unavailable locally (A) Patent
(B) Trademark
(C) Copyright
37. Which of the following measures are used (D) Intellectual property
to prevent unauthorized personnel from
PHYSICALLY entering sensitive areas?
42. Which of the following is NOT a threat
(A) Grills, locks and keys, audit logs posed by the Internet?
(B) Passwords, usernames, firewalls
(C) Security guards, grills, usernames (A) Hacking
(D) Biometric devices, locks and keys, (B) Cyber terrorism
swipe cards (C) Damage to hardware
(D) Exposure to viruses

38. Your organization wants to transmit


information over the Internet. Which of 43. A security feature that automatically records
the following methods is MOST suitable operations performed by all users is called
for securing the data that is sent?
(A) a transaction
(A) Password (B) a roll back
(B) Biometric media (C) an audit trail
(C) Authentication

(D) a firewall
(D) Encryption

GO ON TO THE NEXT PAGE


02229010/CAPE 2014
,'

- 8-

44. Which of the following is NOT an ethical 45. Which of the following software can be
consideration related to the handling of shared with other users for the modification
enterprise assets? of source code?

(A) Filing a lawsuit (A) Trial


(B) Invasion of privacy (B) Freeware
(C) False representation (C) Shareware
(D) Misuse of information (D) Open source

ENDOFTEST

IF YOU FINISH BEFORE TIME IS CALLED, CHECK YOUR WORK ON THIS TEST.

0222901 0/CAPE 2014

You might also like