You are on page 1of 8
2 The term used to describe akey thatis made up of two or more attributes is (A) co-joined ®) candidate (C) composed @) concatenated Company ABC has decided to upgrade its manual filing system toan electronic filing system. The company’s IT expert proposes a database management system, DBMS. Which of the following is NOT an advantage of a DBMS? (A) __Inputerrors can be reduced using a variety of checks. ® The amount of data stored is Po (©) Customer information can be retrieved easily. (D) Customer information can be - maintained accurately. Radio buttons, check boxes, drop-down lists and combo boxes are useful objects that are included on web pages and other user interfaces. These: objects help minimize, data entry errors and aid in data 7 @) validation (B) verification (C) encryption (D) security ‘Ata large supermarket the frozen chicken parts have been moved from the frozen foods Fection and placed near the beer. This tactic is the result of an analysis done using the 's databases which include data from the cash registers. The supermarket has MOST likely employed the use of data (A) mining (B) smarts (©) warehouses @) stores 6. Which of the following is NOT a type of database organization model? (A) Hierarchical (B) Relational Archival (D) Network In modeling databases there are some established conventions. Underlined attributes denote : (A) candidate keys (B) foreign keys © primary keys (D) __ secondary keys Which of the following statements isNOTa + property ofarelation? Each tuple represents single entity. B) __Allattibyte valuesare atomic. (©) Thereareno duplicate tuples. (D) Attributes are unordered, lefttoright. ‘Arelational table is said to existexclusively + in FirstNormal Form (INF) when 1. allofthekey attributes are defined. TL. all attributes are dependent on the ‘key. I, allatrributesarerepeated. = TV. there areno repeating groups in the table, (A) Wandittonly @) ‘Mand only (C)_‘I,dandIV only ) LU, end TV a3) Queries issued by end.users of a database Atem 10 refers to the followi can be in the form of SQL code. Which of spreadsheet, pe betel the following statements about-SQL is oe FALSE? (A) SQL means Structured Query Language. (B) — SQLis @ procedural language used to manipulate data in a database. (C) SQL enables users to create database and table structures. @) SQ commands can réstore a database table to its original SJoyalalels|- eee 10. Which of the followingis the MOST efficient formula to use when calculating the sum of the numbers shown in column A? (A) =AL+A2+A3+A4+A5 (B) = SUM (10:50) (Cc) =10+20+30+40+50 @) = =SUM(AI:A5) tem 11 refers to the information below. ID, Forename, Sumame) COURSE (anual, C CourseTitle, LectureID) REGISTRATION (Student ID, CourselD, Mark) ionshi COURSE entities. ‘The registration entity is the result of relationship between ve STUDENT and For any ONE student, this relationship is MOST LIKELY to be (A) 14M & isl © MoM @) Mal 14. rae Data Flow Diagrams (DFD) are used to model the flow of data through asystem. Giventhat[ ] represents an entity, represents 8 process, ‘which of the following data flows are illegal? represents a data store, wv BP Fi (A) ImddLealy 3) Land I only ‘and Ml only ©) and IVonly ‘Databases are used in organisations toreduce of eliminate the duplication of dat. The duplication of data in a database is called (A) Gataimoonsisteacy (data, allows a user to write on the disk once ‘and read (play) it many times? (A) CDROM RW ® So DYD-RW recordings of many weddings, parties and ‘Tepresents ‘between the photographer (P) and the videos ow fol 16 17. 18. 19. Enisiicing antics iris MOST: insert the formatting HTML, the following tag pairs tags between (A) 9 }} « = . © <*00m> When entering data in a database ‘"uanag=ment system (DBMS), a check that detects if any data are in error or incomplete is referred two as @ vita @) miegtty | (©) verification (D) authentication Achat room is an example of (A) aballetin board system B) — ane-mail system (© anniling list ‘an interactive online service The combination of text, graphics, animation, sound and video would represeat (A) word processing software ® ishing software ©) ics packages @) mallimedia sutooring w00le Seadents at Queen’s College have done their written School-Based Assessment in Geography. The MOST appropriate format in which to present their SBA information would be @) text, graphics, tables, charts (B) text, graphics, memo, charts (©) _autio, video, animation, tables 22. Visual Arts students attendi school wersinvied to dilnincren a ly atthe school savard functor, sulted othe eon ppctionsisNOT (A) nn (©) Presentation () — Graphics ‘The fifth form students in acollege in St. Lucia have created a web page that can be modified ‘by anyone who accesses it. This web page can be referred to asa (A) blog @) —poatal © wiki (D) newsgroup Persons can have online, real time conversations using @ = :)emmall (© mailist (D) _bulletinboard Paul is interested in designing a web page 10 advestise his small bose. He decides 0 design the webpage himself but he Is not fanilac with HTML. Which ofthe follows can Paull use to assist in the design of his web page? (A) + Message boards Telnet services ‘Authoring tools Internet portals 25. 26. 262 ‘You are asked to design yearbook which is to be issued to each graduate at the school’s graduation function. The yearbook must entain a picture, as Wellas an article on each student. Which pair of applications would be BEST suited for your task? (A) Graphics editing and word processing () Word processing and database management (©)__ Database management and desktop @ _ Graphics editing and desktop publishing ‘The principal of a high school will be speaking to parents and guardians about students’ performance in external ‘examinations over the past five years. The MOST appropriate way for the principal to present the information is ® tables : 3) ‘line graphs © __ piecharts D)_text(paragraphs) 21. 28. 29. ems 27=28.efer tothe following diagram. ‘The control identified in the diagram by X, ‘phere user messages are displayed, is called the @ — stausbar (B) toolbar (© window ttle (D) scrollbar ‘The control identified in the diagram by Y is called the (A), menubar (B) taskbar 8 sizing bar »)—titlebar tomennconventions, which of the + Spllowing indicates that 2 dialog box will ‘open? i @ ellipsis « @) wow? (©) checkmark Y (D) navigation button ica 30, 31. 32. -1- ‘The buttons below are used when creating forms and rey f ports. Which bution BEST illustrates the features of a list box?” “w ®) @ =| =T¥| oO \= = ‘Sabotage is one of the possiblerebellions acts of disgruntled employees. Which of the following is an actofsabotage? “A Breaking into a system for fan @) “Accessing the net during lunch time (©) Accessing private data for financial gain @) __ Destroying computer hardware or software ‘Acsecurity feature that automatically records ‘operations performed by all users is called a! an (A) transaction 3) rollback sandittrail (D) firewall * 33. 34. 36. ‘Which of the following are NOT consi natural disasters? eee (A) Earthquake’ and volcanoes (8) Hurricanes and tomados (©) Firesand floods @ _ Riotsandstrikes The failure to secure data has serious consequences. Which of the following [BEST represent the LIKELY consequences? 1, Financialloss IL. * Lossofreputation TIL, Legal consequences TV. Social consequences (A) Tand Ilonly (B) Tend TV only (C) J, Hand I only )) 1, Wand IV Individuals who engage in the illegel reproduction of copyrighted software are MOSTLIKELY guilty of software (A) infringement 3) piracy (C) _seourity (D) development “Which of the following activites conducted ‘on the Internet does NOT pertain to e-commerce? (A) Payment of utility bills ) + Buying and seling of oR We © Conduoting research on 8 topic ©) Applying for copies of a birth certificate 37. 38. 39. 40. 8 Which of the following users would be LEAST LIKELY to have access to a company’s Virtual Private Network? (A) Clients (B) Suppliers (C) Mobile users @) Landline users Which of the following threats to Information Technology systems may result from a hurricane? (A) Fires @) Riots § Power surges ) Floods Miracle Bank & Trust is preparing to upgrade its mitigation strategies to counter security issues that have been identified recently. ‘Which of the following is NOT an example ofa security measure? (A) Firewalls (B) Encryption ) Data logging (D) Biometric access Monique wants to buy an office suite forher option for Monique is (A) sitelicense (B) enterprise license (©) shrink wrap @) _ singlewserlicense 41, 42. 43. Computer orime is defined as an illegal act involvingacomputer. Which of the following is NOT an example ofa computer crime? (A) Industrial espionage ) Filesharing (C) Propaganda (D) _ Industrial sabotage Which of the following does NOT represent a major benefit for a company using telecommauting? @) __ increase in communication (B) _ Increase in productivity (C) _ Reduction of office space (D) Hiring of staff based on productivity ‘A company usesa freeware operating system (O/S) on one of its database servers. One month ago, the company provided Internet access to staff. One morning, the system administrator discovered that someone had hacked into the database residing on the server with the freeware O/S. Investigations reveal n0 other database ‘server was affected, and a patch existed to prevent a repeat of such damage. This exposure isa result of computer (A) counter measure , vulnerability . g faulttolerance (D) _brownout “9. 44. Which of the following gare examples of green ‘computing stratégi 45. — Thedifferences| ies? ; rns annie ie cad ], Turning computers offovernight 1 , IL Turing off the monitor and printer . Trojan Horées duplicate themselves ‘whennot in use ee ae i, Telecommuting a upline ‘themselves and TV. Recycling paper i Trojan aaeeene roan Heres weaved he (A) Land Honly a programs and Worms ® 1, and Ii oply IV. Worms are triggered by the use of 8 Tland IV only specific programs and Trojan ) oll, Hand IV Horsesarenot (A) Vand UL only Tand IV only and ll only (D) Hand IV only srvroastier0ns TEICAILED CHRERYOTR VON

You might also like