You are on page 1of 7
Item 1 Which meets '© the following diagram male fePFesents a banking system that can wine Somers" accounts, Customers infor seta °F deposit funds and request ation about their accounts. Which of the following symbols shows the calculations required to keep customers’ accounts correct? (A) Process (B) _ Data Store (©) Data Flow (D) External Entity Company ABC has decided to upgrade its manual filing system to an electronic filing system. The company’s IT expert proposes a database management system, DBMS. Which of the following is NOT an advantage of using a DBMS? (A) __ Inputerrors can be reduced using a variety of checks. (B) The amount of data stored is unlimited. (©) Customer information can be retrieved easily. (D) Customer information can be ‘maintained accurately. ‘A foreign key is an attribute (A) ___thatuniquely identifies each row in a table (©) in one table whose values must either match the primary key in another table or be null (©) _wsed strictly for data retrieval ‘purposes @) with a storage key in a table ‘Ata large supermarket the frozen chicken have been moved from the frozen Foods section and placed near the beer, ‘This tactic is the result of an analysis done ing the supermarket's databases which include data from the cash registers. The supermarket has MOST likely employed the use of data (A) mining (B) arts (C)__ warehouses (D) _ stores Which of the following is NOT a type of database organization model? (A) Archival (B) Network (C)__ Relational (D) Hierarchical In modeling databases there are some established conventions. Underlined attributes denote (A) candidate keys (B) foreign keys (© primary keys (D) secondary keys ‘The duplication of data in a database is referred to as data (A) integration (B) redundancy (C) _ inconsistency @) — documentation Which of the following systems describes software application that regulates and controls access to data stored in a shared integrated computer struc end-user data? areas ates (A) Data access system ® ion access system (C) Database management system () Information: nmap ay 10. u. Items 2-10 refer tothe following table which shows the feld and data type in database Field ‘Data Type Item Number __| Number Name ‘Text Cost ‘Text ‘Number In Stock _| Number Which of the fields in the database does NOT have an appropriate data type? (A) Cost (B) ‘Name (©) _ Item Number (D) Number In Stock ‘At which of the following stages will the absence of an appropriate datatype MOST likely be detected? (A) Data entry @) Query (C) Report ‘Item 11 refers to the information below. STUDENT (StudentID, Firstname, Surname) COURSE (CourselD, CourseTitle, LecturerID) REGISTRATION (StudentID, CourselD, Mark) LECTURER (LecturerID, Lecturer) The registration entity is the result ofa relationship between the STUDENT and COURSE entities. For any ONE student, this relationship is MOST likely to be @ 15M @) 1-1 ( M—-M @) M-l 12, 13. 14. a oie ‘ through #8} Flow Diagrams (DED) are used to mode! the low oF 8 a data store, = FD) represents rere an ey [reams Which of the following data flows are illegel? . oy [Br _. } 2) mf ]_———> ~ SP} (A) Land Monly @®) Land Monly (© Hand only @) ~~ DandIVonly ‘The purpose of normalisation is to produce @ Which of the following groups of features. 15. set of relations is exclusive to a database management system? (A) _ with repeating groups of attributes (A) Fields, cells, tables that facilitates fast access (B) Tables, search, range (8) _ with limited potential for data (©) Cells, range, worksheet anomalies (D) Forms, queries, modules (C) ___ thatcontains relationships between all pairs of relations stein aca (D) that contains attributes that are jich of the following storage devices is artially dependent capable of holding the LARGEST amount Feld cca of data, allows-a user to write on the disk ‘once and read (play) it many times? 16. When formatting a web page with CD-ROM a ia @ aw colour, boldfacing and italics, it is MOST (CQ) DVDIR —— to insert the formatting HTML @) DVDRW : igs between the following tag pairs (4) ®) Se © = © ae Yn. 18, 19. 20. Persons can have online, real time A 21, Your friend has to write an essay fOr Conversations using { homework using # word processing package. You have reud the essay and _ (A) IRC made corrections, Which word processing BL Rea ON HUE feature would allow your friend to be aware (© maillist of your corrections? @) bulletin board (A) Auto correct (B) Auto format Which of the following types of graphs (©) Track changes is the MOST appropriate for representing (D) Reveal formatting the average height of your classmates by gender? 22, The fifth form students in a college in St. Q) —_Barchart Lucia have created a web page that can be (®) Pie chart modified by anyone who accesses it. This (© Line chart web page can be referred to as a () Scatter graph (A) wiki ®) blog ‘One advantage of an automated information (C) portal system over a manual one is that it (D) newsgroup (A) is more time consuming (B) - secures the jobs of workers ‘tem 23 refers to the table below. (© _ ismore cost effective to set up ©) results in increased productivity Last Name] First Name | Form _| Mark Al Abmod 38 82 While researching for a Social Studies |Dillon__} Raj. 38 75 project using the Internet, Jim encounters [Murray _| Mike 3P 72. a website eae to ba for future John Alex 3N 70 ice. ¢ MOST efficient way of ‘oan pests y Peters | Shane 3P 6 a 23, The data shown above is an extract from a (A) save it on his flash . ® tet asa pha etna database table which has been sorted by }) adit to ‘Favorites’ or ‘Bookmarks’ : : z (A) mark in ascending order ©) copy he URLintoa Word document (B) mark in descending order yp aN © lastname in ascending order = a4 (@) _ lastname in descending order \t tO \ c ~ ™ GO ON TO THE NEXT PAGE | 24, U1 Biometric Scanner Optical Mark Reader Tonly Land Il only Mand Mi only I, Wand (A) B) (oy @) ‘Item 26 refers to the following scenario. A Form 3 student was explaining to his teacher that to obtain the information for his homework he went to a site from which he could access many different services. The site was so complete he reported that he did not have to look anywhere else, All he had to do was to click on the buttons and words and they tookhim to almost anything he needed. The mechanism that was activated when he clicked on some words or buttons is MOST likely a 26. menu portal web icon hyperlink (A) @®) © @) 27. 28. 29, tems 27-28 refer to the following diagram. Y te Bat View xo by X, ‘The control identified in the diagram where user messages are displayed, is called the (A) status bar (B) tool bar (© window title (D) scroll bar ‘The control identified in the diagram by ¥ is called the (A) menu bar @®) task bar © _ sizing bar ©) title bar Which of the following codes creates a horizontal line across a page in an HTML document? (A) @)
© (A) process ®) function © formula ©) parameter 31. 32. 33. 34. Sabotage i Ssbotag es ofthe posible bein gruntled empl i the following is an act ce atciaetis o w Breaking into a system for fu ©) Accesing tenet ding tins cessing private data for financial gain (D) Destroying computer hardware or software ‘A student copies a paragraph of text fom ‘Wikipedia for a school project without acknowledging his source. .Which of the following computer crimes has he committed? (A) Hacking ®) Phishing (©) Authoring (D) Plagiarism Ma "Tait hd his computer systom plugged Mfo a device that offered protection 19 his PC. While working at home on his Gomputer one day, he did not realise ‘that there was an electrical outage ‘until he .d to turn on the television. ‘Which ot the following devices did Me ‘Taitt MOST likely have his computer system, plugeed in to? (Ay UPS (B) Surge protector (©) _ Voltage regulator (D) Power strip ‘Abusiness woman received an email from ther bank requesting that she emails her ‘them since her file could Mat be located. She should be Very carefiil tince this could be a classic case of (a) piracy (B) viruses (© phishing (D) __ backing 35. 36. 31. 38. 39. “Which of the following is « physical acoess control that can be used to secure @ laptoP computer? (A) A firewall (B) Apassword (©) Aneneryption (D) Allock and key “Which of the following activities conducted - on the Internet does NOT pertain to e-commerce? (a) Payment of uility bills {B) Buying and selling of software Conducting research on 2 topic (@) Applying for copies of a birth certificate Which of the following is 2m example of malware? (A) Hacking (B)__ Release of a worm (©) Piracy (D) _ Information theft Which of the following is NOT * component of knowledge (A)__ Indexing (B) Archiving (©) Converting (D) _ Datacollection ‘which of the following beats risks is Nov generally associated with the use of computers? (a) Bye stain (B) Backache (C)__ Elbow sprain ©) Carpal tunnel syndrome Go ONTO ‘THE NEXT PAGE SET Seca 40, 41, 42. Yor OUF friend, The, Wat t ne, doy executed, rather T° 88Ver programs sp records operations performed by all users YOU desktop, yen ee waterfall on aaa St Tealise that malicion ctl sounds. (A) a transaction been installed on your con oftware had (B)— aroll back an example of a mputer. This is (©) anaudit tail 0" tins ©) «firewall ) back door ©) logic bomb 44, Which of the following actions does NOT ©) tojan horse represent a major benefit for « company using telecommuting? Computer crime is at f office space ; defined as an i (A) _ Reduction of pi act involving a computer. Which ot (B) Increase in productivity the following is NOT an example eer (C)__ Reduction in traffic congestion ‘computer crime? a (D) Increase in staff hired (A) Propaganda () File sharing 45. The differences between trojan horses and (©) _ Industrial sabotage worms are that (D) _Industrial espionage . 1 Trojanhorses duplicate themselves and worms do not A software developer discovered that a IL ‘Worms duplicate themselves and retail firm was reproducing his software for trojan horses do not sale, He reported the matter to the police Il. Trojan horses are activated by and the store owner was arrested. Which the use of specific programs and of the following laws did the store owner worms are not MOST likely violate? IV. Worms are triggered by the use of specific programs and trojan (A) Tax horses are not (B) Privacy Act (©) Antitrust (A) Tand Ii only (D) — Copyright (B) Land IV only (©) Wand only ©) Wand IV only END OF TEST IF YOU FINISH BEFORE TIME IS CALLED, CHECK YOUR WORK ON THIS TEST.

You might also like