You are on page 1of 8
1. The feature of a datatuse that arrow | Is pointing to is a (A) field (B) query (©) report (D) record 2 Arrow 2 is MOST likely indicating a (A) field (B) record (C) relationship (D) primary key A software application that regulates and Controls access to dain stored in related tables is called (A) a data access system (8) an information access system (C) database management system (©) aninformation management system Normal forms do NOT affect databases in terms of (A) integrity ) security (C) consistency (D) performance MO/CAPE 2013 5 6 Ham £4 refer 10 the Foowiny day table, hay First Name Last Name Text Date of Birth Date/Time Salar r would MOST likely One problem a user would M have with this database table is that queries involving calculated fields (A) Saaeh ator ie ions , (B) the date would be in the wrong format . - (C) the ID field would contain duplicate values . aoe (D) persons prefer to keep their salaries confidential Which of the following changes would improve the database? (A) Reduce the number of fields to make it efficient. (8) Change the data type for salary to currency, (©) Change the data type for date of birth to number, (D) Adda calculated field to the table, The duplication of data i i refered toan dane’ “it? i” & database is (A) integration (B) inconsistency (C) redundaney (D) documentation OG ica: 10. n. age Which storage device is capable of holding the LARGEST amount of data, allows auser to write on the disk once and read (play) it many times? (A) CD-ROM (B) CD-RW (©) DVD#R (D) DVD-RW Susie purchased music from an online store and had problems downloading the music because ofa particular set of rules that were necessary for the files to be obtained. This problem is MOST likely associated with (A) telnet (B) FTP (C) _ Internet telephony (D) ___ the browser Which of the following is NOT a type of database organization model? (A) Archival (B) Network (C)__ Relational (D) Hierarchical Normalization is used to 1. save storage space II, minimize data redundancy I. _ increase security (A) Lonly (B)_ Monly (©) Land I only (D) Mand Ill only Item 12 refers to the following tables. BOOKS TABLE Field Name | Data Type | Description Book ID Number Book Title | Text ‘Author 1D | Number ‘Num pages | Number AUTHORS TABLE Field Name | Data Type | Description ‘Author 1D | Number Firstname Text Lastname | Text Biography | Text Email ‘Text 2 ‘The field “Author ID” in the Books table isa (A) primary key (B) candidate key (©) __ foreign key (D) secondary key 13. 14. 15. qer Tyo, ww o deposit funds, request i Customers can witha ofthe following SYM their accounts directly. keep customers’ accounts correct? (A) Process (B) Data flow «) Data store (Dd) Extemal entity vane that maintains customery a banking process accounts and update eulations required to @ n about thei vation shai the cal ibols represents Database managementsystemsallowusers 16. to organize and store data as wells query =. and retrieve tables in a database. Which of the following is MOST appropriate for making queries? . 1. "* Structured query language Il. Data definition language IIL, Hyper text mark up language IV. Query by example (A) Land only (B)_— Tand IV only (C)__ Mand II only (dD) 1, 111 and IV only In‘a relational database, which of the * following features must be enabled when updates and deletions are effective? (A) _ Activating macros (B) © Providing multiple views (C) Writing SQL statements (D), Enforcing referential integrity 17. For which of the following tasks are IT tools typically used? 1. Reducing human errors * dl. Speeding up the processing of transactions Ill, Storing large volumes of data 1V. Creating new products (A) Land Il only : (B) 1, and 111 only (C) I, Mand 1V only (@) Land Iv Oncadvantage of an automated information system over a manual one is that it (A) _ is more time consuming ®) feces the jobs of workers results in increased productiyi (D) _ ismiore cost effective 1o ine Item 18 refers to the following table. A B c D 1 First Name | Last Name | Gender Score 2_|Karen Richards F 25, i 3__[Nicole | Smith F 30 4 | John Adams M 32, * 3_|[Don James M 38 ‘After the spreadsheet has been sorted in descending order according to score, it will appear as A B c D A) 1 | First Name | Last Name | Gender | Score 2 [Nicole | Smith F 50 3, [Don James M_ | 38 4 |John Adams M 32, 3 [Karen [Richards | F | 25 a A B c D (wy [1 [FirstName LastName | Gender | Seore 2 | John | Adams 1M 32, 3_[Don. James M_| 38 4 [Karen [Richards | F 25 5 [Nicole [Smith F 50. A B c [D (© [1 [FirstName [Last Name [Gender [Score 2 [Don James M_| 38 3 [John ‘Adams M_|_32 4 [Karen Richards F_ | 25 3 [Nicole [Smith |. F | 50 A B c D (0) [1 [First Name [LastName | Gender [Score 2_|Karen Richards ¥ 25 3_|John ‘Adams M 32 4 |Don James M 38 . 3 [Nicole | Smith F 50 E GO ON TO THE NEXT PAGE, 19. 20. 21. 22. 6- Which of the ¢ following rsa ie lowes items are examples 1. Object Ml. Boolean Ml. Attribute WV. Hyperlink (A) Land Hl only (B) Wand Ill only (©) __ 1, Mand IV only (D) —_U, Mand IV only Which of the following codes crea\es inigontal line across a page in an HTML document? (A) (D) ‘A text, image of icon that provides @ Connection to another web PAB? is called (A) an email (B) a browser (C)_ abyperlink (D) __ahome page individuals who attempted visit school’s website using @ hyperlink were tinsuocessful. They each received the same terror message, namely: Which of the following is NOT a reason For this error message? “A Invalid ‘URL entered. (B) Server not connected to Internet ‘backbone. (©) _ Programmning or scripting error on page. (py. Internet connection speed is too fast. 24. 25. Which of the following communication technologies facilitate E - learning? 1. Internet i, CD-ROM * IM, _ Video conferencing IV, Telecommuting (A) Land LV only (B) Leland ff only (©) iland IV only (D)__ blll and IV only “The Chief Exeoutive Officer wishes f0 8° TMs ber of exception reports, each based aa ferent criterion, in order to PrePwe on a Umecting of the Board of Direcior™. Rese reports are not avaible from the Tees «information system (IS), The G2 cn pave to be imported from the (Ske wil per software application to produce the reports. The MOST “appropriate productivity software application to use 10 produce these reports i5 © (A)___ spreadsheet 5 (B)__ word processor (C)__ desktop publishing packaBe (D) database management syste Company XYZ has over 1500 employees fa eight branches across the County the end of the week, the manager ‘of each reach sends the employee’s date (name + and hours worked) to the main office. ‘the employee paysheet is generated alphabetically by sumame in ascending see from a masterfile. | What (YP of processing ‘MOST suitable for generating the payslips? (A) Batch (B) Online (C)__ Realtime (D) Transact : GO ON FO THE NEXT PAGE ~~ y anenail oA May 21. 28. 29. Which of the following lines of HTML code will label “My Page” on the bar of the webpage? (A) My Page (B) — My Page (©) My Page (D)

My Page

Mark gathered information from several web- sites for his assignment on “Sugar Production in the Caribbean®. The criteria that Mark should use to ensure that the information used is accurate, complete and reliable are authority, organization or publishing body and (A) currency, design, coverage (B) currency, audience, design (C) currency, audience, objectivity (D) currency, coverage, objectivity The term used to describe a predefined operation that performs a calculation or generates a value such as today’s date is a (A) formula (B) process (©) function (©) parameter tem 29 refersto the following information. MrJacobshasa PDA that performs personal organizer functions. He is able to schedule appointments, maintain a list of addresses and manage his personal finances. ‘What is the primary input device ofa PDA? (A) Stylus (B) Keyboard (C) Digital pen (D) Handheld controller (nunchuk) 30. 31. 32. 33. A local radio station received information concerning an alleged terrorist plot. Which ofthe following characteristics should NOT beconsidered, as the radio station evaluates the information? > (A) (8) © () Blue Ribbons Inc. is an Internet-based company that sells its goods and services directly to its customers. The company is engaged in (A) ebilling (B) e-business (©) e-shopping (D) e-commerce Which of thefollowingisNOTa component of knowledge management? (A) Indexing (B) Archiving (C) Converting (B) Data collection MrT had his computer system plugged into a device that offered protection to his PC. While working at home on the machi one day, he did not realize that there was an electrical outage until he attempted to turn on the television. Which of the following devices did Mr T MOST likely have his computer system plugged in to? (A) ups (B) Surge protector (C) Voltage regulator (D) Power strip GO ON TO THE NEXT PAGE 34. Whi . hi Mi et io the following health risks is erally associated with the use of ‘computers? (A) By i ye strain (B) Backache ( (C) Fractured wrist (D) Carpal tunnel syndrome 35. Riverside Enterprises recently acquired new computer systems and is planning to donate their old computer systems to the commu centre. Which of the following is the BEST action otake before disposingof the computer systems? (A) Change passwords (B) Reformat the drives (©) _ Install new software (D)- Contact the government 36. Which of the following BEST describes the term ‘Green Computing’? (A) Conserving energy with Your ‘computer, paper and toner cartridge usage and disposal of ‘old computer equipment. (B) Designing and manufacturing modern computer equipment to replace the old obsolete equipment. (C)__ Disposing of old computers and printers to purchase new, more powerful and more modern equipment on a regular basis. (D) Manufacturing computers and printers that have more features and using recycled paper. o2229010/C APE 2013, 37. 38. 39. 40. Toperformabackupofadocumentereated during the day, it is BEST to perform a partial backup of (A) all files onthe system (B) all files changed during the day (C)_ all files changed during that week (D) all program files changed during the day Which of the following measures are used to prevent unauthorised personnel from PHYSICALLY entering sensitive areas? (A)__ Grills, lock and key, audit log (B) Password, username, firewalls (C)__ Security guards, grills, user names (D) Biometric devices, lock and key. swipe card . Which of the following is an example of anti-virus software commonly used in the Caribbean? (A) McAfee (B) Mozilla (C) AutoCAD (D) Adobe Dreamweaver Hill Top Business Solutions has assessed its current disaster recovery plan and realised it is inadequate. What components are fundamental to a new recovery plan? 1. Test plan II, Contingeney plan III, Back-up of data that is stored off site IV. Communication facilities. hardware, software and contact details of employees (A) Land [11 only (B) Mand Illonly . (©) Ayltland 1V only (D) UM and 1V only GO ONTO THE NEXT PAGE 41. 42. Mtems41-43 refertothe following scenario. 43. __‘Thedilemma,asillustrated inthe scenario, is BEST described as A photograph showed Mohandas Gandhi (2 October 1869-30 January 1948), and (A) legal Martin Luther King Jr(15 January 1929-4 (B) social April 1968), participating in a civil rights (©) ethical march in 1963. The photograph appeared (D) personal in a reputable national newspaper, in an ; article on Dr King during Black History month. It was discovered after extensive 44. software developer discovered hata retail investigation that the photograph was firm was reproducing his software for sale. digitally manipulated by an employee. He reported the matter to the police and the store owner was arrested. Which law did The employee's action is an example of the store owner MOST likely violate? (A) hacking (A) Antitrust (8) plagiarism (B) Copyright (C) breach of information privacy (C) Privacy Act @) isrepresentation of information (D) Tax To prevent the reoccurrence of publishing 45. Which of the following is a destructive a digitally altered photograph, the Program that on entering a computer management of the newspaper should network replicates itself without human intervention? (A) enact IT legislation (B) develop an IT policy . (A) Worm (©) publish an apology (B) Virus (D) monitor employees? use of (©) Malware computers (D) Trojan horse END OF TEST IF YOU FINISH BEFORE TIME IS CALLED, CHECK YOUR WORK ON THIS TEST. 0222901 0/CAPE 2013

You might also like