You are on page 1of 8
2 The term used to describe akey thatis made up of two or more attributes is (A) co-joined ®) candidate (C) composed (D) concatenated Company ABC has decided to upgrade its manual filing system toan electronic filing system. The company’s IT expert proposes a database management system, DBMS. Which of the following is NOT an advantage of a DBMS? (A) __Inputerrors can be reduced using a variety of checks. (B) The amount of data stored is Po (©) Customer information can be retrieved easily. (D) Customer information can be - maintained accurately. Radio buttons, check boxes, drop-down lists and combo boxes are useful objects that are included on web pages and other user interfaces. These objects help minimize data entry errors and aid in data (A) validation (B) verification (C) encryption (D) security ‘Ata large supermarket the frozen chicken parts have been moved from the frozen foods section and: neat the beer. This tactic is the result of an analysis done using the 's databases which include data from the cash registers. The supermarket has MOST likely employed the use of data (A) mining @®) mans (©) warehouses @) stores Which of the following is NOT a type of database organization model? (A) Hierarchical (B) Relational (C) Archival (D) Network In modeling databases there are some established conventions. Underlined attributes denote : (A) candidate keys (B) foreign keys (©) primary keys (D) secondary keys Which of the following statements isNOTa + property ofarelation? (A) __ Each tuple representsa single entity. B) __Allantibyte valuesare atomic. (©) Thereareno duplicate tuples. (D) Attributes are unordered, left toright. ‘A relational table is said to exist exclusively + in FirstNormal Form (INF) when 1. allofthekey attributes are defined. TL. all attributes are dependent on the ‘key. I, allatrributesarerepeated. = TV. there areno repeating groups in the table. (A) and ITonly @) ‘Mand only (©) LMandtvonly ©) LU, Tend IV a3) Queries issued by end.users of a database Atem 10 refers to the followi can be in the form of SQL code. Which of spreadsheet, pe betel the following statements about-SQL is oe FALSE? (A) SQL means Structured Query Language, (B) — SQLis @ procedural language used to manipulate data in a database. (C) SQL enables users to create database and table structures. (D) SQL commands can réstore a database table to its original SJoyalalels|- condition. 10. Which of the followings the MOST efficient formula to use when calculating the sum of the numbers shown in column A? (A) =AL+A2+A3 +A4+AS (B) = SUM(10:50) (C) =10+20+30+40+50 (D) =SUM(AI:A5) Jtem Il refers to the information below. ID, Forename, Sumame) COURSE (anual, C CourseTitle, LectureID) REGISTRATION (Student ID, CourselD, Mark) ionshi COURSE entities. ‘The registration entity is the result of relationship between ve STUDENT and For any ONE student, this relationship is MOST LIKELY to be () 19M ®) 131 © MoM @) Mal 14. rae Data Flow Diagrams (DFD) are used to model the flow of data through asystem. Giventhat[ ] represents an entity, represents 8 process, ‘which of the following data flows are illegal? represents a data store, 1 BI B2 |__| . &}— 18} i i {Bl | cee DSi we [BL PI DSI (A) ImdTlonly (8) Land Ilonly (C) Wand Mlonly @) aendIVonly ‘Databases are used in organisations toreduce of eliminate the duplication of dat. The duplication of data in a database is called (A) data inconsistency (B) © dataintegration (©) catadocamentation - (D) data redundancy ‘Which of the following ceviens (data, allows a user to write on the disk once ‘and read (play) it many times? (A) CDROM Ge RW (DVDR () DYDRW 15. recordings 16 17. 18. 19. Seeing eines iis MOST. ‘insert the formaning HTML the following tag pairs tags between () @®) = (Q @) <™> When entering data in a database ‘"uanag=ment system (DBMS), a check that detects if any data are in error or incomplete is referred two as (A) validation @) miegtty | (OQ) _ verification (D) authentication Achat room is an example of (A) bulletin board system B) memailsysiem (© amuiling fist - (D) —awinseractive online service The combination of text, graphics, animation, sound and video would represeat A) — word processing software (B) —_desisop publishing softwase paphics (D) —emibtimedia authoring tools ‘Students at Queen’s College have done their written School-Based Assessment in Geography. The MOST appropriate format in which to present their SBA information would be (A) text, graphics, tables, charts Ss audio, video, animation, tables oan 22. Visual Arts students attendi school wersinvied to dilnincren a ly atthe school savard functor, Which ofthe following apol sulted othe eon ppctionsisNOT (A) Desktop publishing (8) Wordpress (©) Presentation (D) — Graphics ‘The fifth form students in college in St Lucia have created a web page that can be modified bby anyone who accesses it. This web page can be referred to asa (A) blog @) patel ©) wid (D) newsgroup Persons can have online, real time conversations using @ Re @) email (maillist (D) bulletin board Pau is interested in designing a web page 10 advestise his small bose. He decides 0 design the webpage himself but he Is not fanilac with HTML. Which ofthe follows can Paull use to assist in the design of his web page? (B) Telnetservices (©) Asoring tools Internet portals 25. 26. 262 ‘You are asked to design yearbook which is to be issued to each graduate at the school’s graduation function. The yearbook must entain a picture, as Wellas an article on each student. Which pair of applications would be BEST suited for your task? (A) Graphics editing and word processing () Word processing and database management (©)__ Database management and desktop poblishing () Graphics editing and desktop publishing ‘The principal of a high school will be speaking to parents and guardians about students’ performance in external ‘examinations over the past five years. The MOST appropriate way for the principal to present the’ information is (A) tables ‘ cS © __ piecharts D)_text(paragraphs) 21. 28. 29. fer to the following diagram Items 27-2800! ‘The control identified in the diagram by X, ‘phere user messages are displayed, is called the (A) __ status bar (B) toolbar (© wingowtitle @) scroll bar ‘The control identified in the diagram by Y is called the (A), menubar @)' taskbar (©) sizingbar (D) _ titlebar tomennconventions, which of the + Spllowing indicates that 2 dialog box will ‘open? i (a) ellipsis « @ mw > (©) checkmark Y (D) navigation button ica 30, 31. \ 32. -1- ‘The buttons below are used when creating 33 forms and rey f ports. Which bution BEST illustrates the features of a list box?” “w 34, ®) © Eran = ©) 36, ‘Sabotage is one of the possiblerebellions acts of disgruntled employees. Which of the following is an actofsabotage? (A) Breaking into a system for fan (B) —Accessingthenetduringluncb ime (©) Accessing private data for financial win (D) Destroying computer hardware or software ‘Acsecurity feature that automatically records ‘operations performed by all users is called a! ey (A) transaction (B) rollback (© audit (D) firewall * ‘Which of the following are NOT considered naturel disasters? a (A) Earthquakes and volcanoes (B) _ Hurricanesand tomados (©) Firesand floods (@) —_Riotsandstrikes The failure to secure data has serious ~ consequences. Which of the following [BEST represent the LIKELY consequences? 1, Financialloss IL * Lossofreputation TIL, Legal consequences TV, _Sovial consequences (A) Tand Ilonly (B) TandIVonly (©) 1, Mandl only () LU, Wand IV Individuals who engage in the illegel reproduction of copyrighted software are MOST LIKELY guilty of software (A) iniringement B) piracy (©) __ security {D) development “Which of the following activites conducted ‘on the Internet does NOT pertain to e-commerce? (A) Payment of utility bills (B) ~ Buying and selling ofsoRw {C) Conducting research on 8 OP ©) Applying for copies of a birth certificate 37. 38. 39. 40. 8 Which of the following users would be LEAST LIKELY to have access to a company’s Virtual Private Network? (A) Clients (B) Suppliers (C) Mobileusers (D) Landline users Which of the following threats to Information Technology systems may result from a hurricane? (A) _ Fires @) Riots (©) Power surges (D) Floods Miracle Bank & Trust is preparing to upgrade its mitigation strategies to counter security issues that have been identified recently. ‘Which of the following is NOT an example ofa security measure? (A) Firewalls (8) Encryption (C) — Datalogging (©) Biometric access Monique wants to buy an office suite forher option for Monique is (A) sitelicense (B) enterprise license (©) shrink wrap (D) single-user license 41, 42. 43. Computer orime is defined as an illegal act involvingacomputer. Which of the following is NOT an example ofa computer crime? (A) Industrial espionage (B) Filesharing (C) Propaganda (D) Industrial sabotage Which of the following does NOT represent a major benefit for a company using telecommauting? (A) __ Increase in communication (B) Increase in productivity (©) __ Reduction of office space (D) Hiring ofstaff based on productivity ‘A company usesa freeware operating system (O/S) on one of its database servers. One month ago, the company provided Internet access to staff. One morning, the system administrator discovered that someone had hacked into the database residing on the server with the freeware O/S. Investigations reveal n0 other database ‘server was affected, and a patch existed to prevent a repeat of such damage. This exposure isa result of computer (A) counter measure ; ®) — wloerebilty : (C)__ fanlttolerance (D) __brownout “9. 44. Which of the following areexamples ; i ofgreen 45, Thediff computing strategies? / The liferenes betwen Tan Hore and ], Turing computers offovernight ees JL, Tuming off the monitor and printer ee ‘whennnot in use ee ae i, Telecommuting Norms doplicethmeaves sn TV. Recycling paper ojan Horses donot I. Mm. Trojan) Bere ‘are activated by the (A) Tend HLonly Sa a (B) 1, Wand only IV. Worms are triggered by the use of (©) HandiVonly ‘encfic proprens 2nd Trajan () 1.0L, Hand IV Horsesarenot (a) Land Ill only (B) Land IV only (©) Hand Ul only (D) Hand IV only _pvourmasinErORETIMESCALED CHEGLYO WORST TE

You might also like