You are on page 1of 8
v ~~, S J ‘The term used to describe a key that is made up of two or more attributes is (A) cojjoined (B) candidate (C) composed (D) concatenated Company ABC has decided to upgrade its ‘manual filing system to an electronic filing system. The company’s IT expert proposes a database management system, DBMS. Which of the following is NOT an advantage of a DBMS? (A) Inputerrors can be reduced using a variety of checks. (B) The amount of data stored is unlimited. (C) Customer information can be retrieved easily. (D) Customer information can be ‘maintained accurately. Radio buttons, check boxes, drop-down lists and combo boxes are useful objects that are included on web pages and other user interfaces. These objects help minimize data entry errors and aid in data (A) validation (B) verification (©) encryption (D) security Ata large supermarket the frozen chicken parts have been maved from the frozen foods “~ Gjit-lhd- nu I-").010 Which of the following is NOT a type of database organization model? (A) Hierarchical (B) Relational (C) Archival (D) Network In modeling databases there are some established conventions. Underlined attributes denote (A) candidate keys (B) foreign keys (C) primary keys (D) secondary keys Which of the following statements is NOT a property of a relation? (A) Each tuple represents a single entity. (B) _Allattribute values are atomic. (C)_ Thereare no duplicate tuples. (D) Attributes are unordered, leftto right. A relational table is said to exist exclusively in First Normal Form (INF) when all of the key attributes are defined. TI. all attributes are dependent on the primary key. IIL. allattributes are repeated. IV, there are no repeating groups in the table, (A) Hand ifonly (B) J, Mand IT only section and placed near the beer. This tactic (©) Llland iV only is the result of an analysis done using the (D) 1H, Mand IV supermarket’s databases which include data from the cash registers. The supermarket has MOST likely employed the use of data (A) mining he (B) mans or (C) warehouses CAMPERDOWN HIGH SCH (D) stores LIBRARY GOON TO THE NEXT PAGE 0222901 0/CAPE 2010 Shs Ter -3- 9. Queries issued by end users of a database Item 10 refers to the following partial can be in the form of SQL code. Which of spreadsheet. wing statements about SQL i: = = an muse ae [A“[e Te To | (A) SQL means Structured Query 2 [20 fae Language. 330] (B) SQL is a procedural language used 4140 i to manipulate data in a database, [s_Ts0 | (© SQL enables users to create Vreczeleeee [ee] aca database and table structures. (D) SQL commands can restore a database table to its original condition 10... Which of the followingisthe MOST efficient formula to use when calculating the sum of the numbers shown in column A? S| (A) =AL+A2+A3+A4 +A (B) =SUM(10: 50) (©) =10+20+30+40+50 (D) =SUM(AI:A5) Item L1 refers to the information below. - STUDENT (StudentID, Forename, Surmame) COURSE (CourselD, CourseTitle, LecturerID) REGISTRATION (Student [D, CourselD, Mark) LECTURER (LecturerID, Lecturer) IL. The registration entity is the result of a relationship between the STUDENT and COURSE entities. Forany ONE student, this relationship is MOST LIKELY to be (A) 13M (®) Ist (© M>M (@) Mo! GO ON TO THE NEXT PAGE 02229010/CAPE2010 . : i A 4 aus al tect ie ae 12. 13. 14. ae Data Flow Diagrams (DFD) are used to mode! the flow of data through a system. Given that which of the following data flows are illegal? represents a data store, L Bi} | nu [BE PI {2 | m.— [pre |}-_ [Ji wv. [BI ; PI DSI (A) Land only (B) Land Ill only (C) Wand ttl only (D) Hand IV only Databases are used in organisations to reduce or eliminate the duplication of data. The uplication of data ina database is called (A) data inconsistency (B) — dataintegration (C) data documentation (D) data redundancy Which of the following storage devices is capable of holding the LARGEST amount of data, allows a user to write on the disk once and read (play) it many times? (A) CD-ROM (B) CDRW (C) DYDIR (D) DVD-RW 02229010/CAPE2010 oN) (B) © () Kim is a photographer. She has video recordings of many weddings, parties and other social events. Which of the following diagrams BEST represents the relationship between the photographer (P) and the videos (vy? P v z v P v P v GOON TO THE NEXT PAGE -S- 16. When formatting a web page with colour, 21 boldfacing and italics, itis MOST appropriate to insert the formatting HTML tags between the following tag pairs (A) = (B) — (© ~— (D) When entering data in a database ‘management system (DBMS), a check that 22. + detects ifany data are in error or incomplete “is referred to as (A) validation (B) integrity (©) verification (D) authentication 18. Achatroomis an example of 23. (A) abulletin board system (8) ane-mail system (C) — amailing list (D) _aninteractive online service 19. Thecombination of text, graphics;animation, sound and video would represent 24, (A) word processing software (B) desktop publishing software (C) graphics packages (D) multimedia authoring tools 20. Students at Queen’s College have done their written School-Based Assessment in Geography. The MOST appropriate format in which to present their SBA information would be (A) text, graphics, tables, charts (B) _text,graphies, memo, charts (C) audio, video, animation, tables (D) animation, memo, logical, description 02229010/CAPE2010 Visual Arts students attending a secondary school were invited to display their artwork electronically atthe school’s award function, Which of the following applications is NOT suited to the required task? (A) Desktop publishing (B) Word processing, (©) Presentation (D) Graphics ‘The fifth form students ina college in St. Lucia have created a web page that can be modified by anyone who accesses it. This web page can be referred to asa (A) blog (B) portal © wiki (D) newsgroup Persons can have online, real time conversations using (A) IRC (B) email (C) maillist (D) _balletinboard Paul is interested in designing a web page to advertise his small business. He decides to design the webpage himself but he is not familiar with HTML. Which of the following can Paul use to assist in the design of his web page? (A) Message boards (B) —Telnetservices (©) Authoringtoots (D)__Intemetportals GOON TO THE NEXT PAGE -6- 28. ? Youare asked to design a yearbook which is, Items 27 - 28 refer to the following diagram, to be issued to each graduate at the school’s graduation function. The yearbook must Y contain picture, as well as an article on each t student. Which pair of applications would be a ER BEST suited for your task? Fte_eat_View (A) Graphics editing and word processing (B) Word processing and database ‘management (©) Database management and desktop publishing (D) Graphics editing and desktop x publishing 5 27. The control identified in the diagram by X, 26. Ths princigal offa:highl schol ll be, where user messages are displayed, is called speaking to parents and guardians about a students’ performance in external examinations over the past five years. The A) statusbar MOST appropriate way for the principal to q . Sea present the information is coe (A) tables io ee 28. Thecontrol identified in the diagram by Y is B called the (D) text (paragraphs) (A) menubar (B) task bar (©) sizing bar (D) titlebar 29, According to menu conventions, which of the following indicates that a dialog box will open? (A) ellipsis... (B) arrow > (©) checkmark ¥ (D) navigation button | > * | GO ON TO THE NEXT PAGE 0222901 0/CAPE2010 30.() The buttons below are used when creating 31 32. ~~ forms and reports. Which button BEST illustrates the features of alist box? (A) = (B) © =~ =ly ©) ‘Sabotage is one of the possible rebellious acts of disgruntled employees. Which of the following is an act of sabotage? (A) Breaking into a system for fun (B) Accessing the net during lunch time (©) Accessing private data for financial gain (D) Destroying computer hardware or software A security feature that automatically records operations performed by all users is called a/ (A) transaction (B) rollback (©) audittrail (D) firewall 02229010/CAPE2010 33. 34. 36, Which of the following are NOT considered natural disasters? (A) __ Earthquakes and volcanoes (B) Hurricanes and tornados (©) Fires and floods (D) Riots and strikes ‘The failure to secure data has serious consequences. Which of the following BEST represent the LIKELY consequences? 1. Financial loss TI Loss of reputation IIL Legal consequences TV. Social consequences (A) Land Ionly (B) Land IV only (C) 1, Hand ll only (D) 1,1, Mand IV Individuals who engage in the illegal reproduction of copyrighted software are MOST LIKELY guilty of software (A) _ infringement (B) piracy (C) security (D) development Which of the following activities conducted on the Internet does NOT pertain to e-commerce? (A) Payment of utility bills (B) Buying and selling of software (C) Conducting research on a topic (D) Applying for copies of a birth GOON TO THE NEXT PAGE 37. 38. 39. 40. Which of the following users would be 41. LEAST LIKELY to have access to a company’s Virtual Private Network? (A) Clients (B) Suppliers (©) Mobile users (D) Landline users Which of the following threats to Information 42 Technology systems may result from a hurricane? (A) Fires (B) Riots (C) Power surges (D) Floods Miracle Bank & Trustis preparingtoupgrade 43. mitigation strategies to counter security issues that have been identified recently. Which of the following is NOT an example ofa security measure? (A) Firewalls (B) Encryption (C) — Datalogeing (D) Biometric access Monique wants to buy an office suite for her home personal computer. The BEST licensing ‘option for Moniqu (A) sitelicense (B) enterprise license (C) shrink wrap (D) single-user license 02229010/CAPE2010 ‘Computer crime is defined as an illegal act involving a computer. Which of the following is NOT an example of a computer crime? (A) _ Industrial espionage (B) Filesharing (C) Propaganda (D) Industrial sabotage Which of the following does NOT represent a major benefit for a company using telecommuting? (A) Increase in communication (B) Increase in productivity (C) Reduction of office space (D) Hiring of staff based on productivity ‘A.company uses a freeware operating system (O/S) on one of its database servers. One month ago, the company provided Internet access to staff. One morning, the system administrator discovered that someone had hacked into the database residing on the server with the freeware O/S. Investigations reveal no other database server was affected, and a patch existed to prevent a repeat of such damage. This aresult of computer (A) countermeasure (B) vulnerability (C)_ faulttolerance (D) —_drownout GO ON TO THE NEXT PAGE -9- 44. Which of the following are examples of green ‘computing strategies? 1. Turning computers offovernight . I, Turing offthe monitorand printer when not in use HL, Telecommuting IV. Recycling paper (A) Vand itl only (B) 1, Hand 111 only (C) and 1V only (D) 1.1, Wand IV ‘The differences between a Trojan Horse and a Worm is that 1 it UL IV, (a) (B) «© (D) ‘Trojan Horses duplicate themselves and Worms do not Worms duplicate themselves and Trojan Horses do not Trojan Horses are activated by the use of specific programs and Worms are not ‘ Worms are triggered by the use of specific programs and Trojan Horses are not | and III only Land IV only Mand fl only Wand IV only IF YOU FINISH BEFORE TIME IS CALLED, CHECK YOUR WORK ONTHIS TEST. 02229010/CAPE2010

You might also like