CAPE Info Tech Unit 2 P1 2015 and 2016 | PDF
(BD)
GO ON TO THE NEXT PAGEItem 18 refers to the following table.
order according to score, it will appear as
A B Cc D
1 First Name | Last Name | Gender | Score
2 Karen Richards | F 25
3__[Nicole [Smith _[F 50
4 John Adams M 32.
5 Don James M 38
18. After the spreadsheet has been sorted in descending
(A) A B Cc D
1_| First Name | Last Name | Gender | Score
2 Smith, F 50
3 James M 38
4 ‘Adams M 32
5 Richards F 25
@) A B c D
1 _| First Name | LastName | Gender | Score
2_ [John ‘Adams M 32
3__[Don James M 38
4 [Karen [Richards |" F 25
. S__|Nicole Smith F 50
© A B Cc D
1 [First Name [Last Name [Gender [Score
2 [Don James M 38
3_| John Adams M_ | 32
4 [Karen Richards F_ | 25
5_| Nicole Smith F 50
(D) A B iC D
1_| First Name | LastName | Gender | Score
2_|Karen Richards Ls 25
3 [Tohn ‘Adams M 32
4 |Don James M 38
3 [Nicole [Smith F 50.
0222901 0/CAPE 2015
GO ON TO THE NEXT PAGE19.
20.
21.
22.
A large batch of files is to be transferred
to a location. Which of the following
protocols would be MOST appropriate to
complete the transfer?
(A) FTP
(B) Telnet
(©) Internet
(D) Hypertext transfer
A MAJOR advantage of Internet telephony
is the
(A) enhanced reliability
(B) superior sound quality
(©) reduced cost of long-distance calls
(D) ease of access to emergency
services
Which of the following codes creates a
horizontal line across a page in an HTML
document?
(A)
®)
(Q
*@)
Individuals who attempted to visit a
school’s website using a hyperlink were
unsuccessful. They each received the same
error message, namely, “The page cannot
be displayed.”
Which of the following is NOT a reason
for this ertor message?
(A) Invalid URL entered.
®B) Server not connected to Internet
backbone.
(©) Programming or scripting error on
Page.
(D) Internet connection speed is too
fast.
02229010/CAPE 2015
23.
24,
25.
For which of the following are IT tools
typically used?
L Reducing human errors
I Speeding up the processing of
transactions
II. Storing large volumes of data
IV. Creating new products
(A) Land III only
(B) 1, Mand If only
(© Ui tand IV only
©) 1,11, Mandtv
The Chief Executive Officer wishes to
get a number of exception reports, cach
based on a different criterion, in order
to prepare for a meeting of the Board of
Directors. These reports are not available
from the current information system (IS).
The data will have to be imported from
the IS into another software application to
produce thereports. The MOST appropriate
productivity software application to use to
produce these reports is a
(A) database management system
(B) spreadsheet
(©) word processor
(D) desktop publishing package
Company XYZ has over 1500 employees in
eight branches across the country. At the
end of the week, the manager ofeach branch
sends the employees’ data (name and hours
worked) to the main office. The employee
paysheet is generated alphabetically by
sumame in ascending order from a master
file. What type of processing is MOST
suitable for generating the payslips?
(A) Batch
(®) Online
(C)_— Real time
(D) Transaction
GO ON TO THE NEXT PAGE26.
27.
28,
-T-
The principal of a high school will
be speaking to parents and guardians
about students’ performance in external
examinations over the past five years. The
MOST appropriate way forthe principal to
resent the information is by using
(A) tables
(B) ine graphs
(© pie charts
(D) text (paragraphs)
Mark gathered information from several
websites for his.assignment on “Sugar
Production in the Caribbean”. The criteria
that Mark should use to ensure that the
information used is accurate, complete
and reliable are authority, organization or
publishing body and
(A) currency, design, coverage
(B) currency, audience, design
(©) curreney, audience, objectivity
(©) currency, coverage, objectivity
As the use of the Internet becomes
more popular, organizations are gradually
introducing Internet policies. Which of the
following BEST describe components of an
Internet policy?
1. Staff monitoring procedures
Il Rules governing the use of messaging
services and chat roon
TI Rules governing the distribution
of company information on the
Internet
IV. Rules against purchasing and trading
online
(A) Tand If only
(B) Mandi only
(©) 1, Mand tf only
(@) 1,11, Mandiv
0222901 0/CAPE 2015,
29.
30.
31
The fifth form students at a college in Saint
Lucia have created a web page that can be
modified by anyone who accesses it. This
web page can be referred to asa
(A) wiki
(B) blog
© poral
(D) newsgroup
Item 30 refers to the following scenario,
A Form 3 student was explaining to his
teacher that to obtain the information for
his homework he went toa site from which
he could access many different services.
The site was so complete he reported that
he did not have to look anywhere else. All
he had to do was click on the buttons and
wordsand they took him toalmost anything
he needed.
‘The mechanism that was activated when he
clicked on some words or buttons is MOST.
likely a
(A) menu
(8) portal
(©) web icon
©) hyperlink
Blue Ribbons Inc. is an Intemet-based
company that sells its goods and services
directly to its customers. The company is
‘engaged in
(A) ebilling
(B) e-business
(©) e-shopping
©) e-commerce
GO ON TO THE NEXT PAGE38.
ea
| 40.
39,
Which of the following measures are used
to prevent unauthorized personnel from
PHYSICALLY entering sensitive areas?
(A) Grills, lock and key, audit log
(B) Password, username, firewalls
(©) Security guards, grills, user names
(D) Biometric devices, lock and key,
swipe card
Which of the following strategies, when
implemented, would be MOST effective
in helping a company recover documents
which were damaged as a result of a fire?
(A) Create several photocopies of the
documents
(B) Backup documents online
(©) Keep all computers connected to a
UPS
(D) Use a surge protector with all
‘computers
current disaster recovery plan and realized
it is inadequate. What components are
fundamental to a new recovery plan?
I. Test plan
T. Contingency plan
I, Backup of data that is stored off site
IV. Communication facilities,
hardware, software and contact
details of employees
(A) Land II only
(B) Hand I only
(©) 1, Mand IV only
©) UL ILand IV only
02229010/CAPE 2015
41.
2,
43.
Assecurity feature that automatically records
operations performed by all users is called
(A) atransaetion
(8) aroll back
(©) anaudit trail
(D) a firewall
item 42 refers to the following scenario,
A photograph showed Mohandas Gandhi
2 October 1869-30 January 1948), and
Martin Luther King Jr (15 January 1929-
4 April 1968), participating in a civil rights
march in 1963, The photograph appeared
a reputable national newspaper, in an
article on Dr King during Black History
month. It was discovered after extensive
investigation that the photograph was
digitally manipulated by an employee.
To prevent the reoccurrence of publishing
a digitally altered photograph, the
management of the newspaper should
(A) enact IT legislation
(B) develop an IT policy
(C) publish an apology
©) monitor employees’ use of
computers
Mr Singh has DVDs with movies that are
currently being shown inthe cinema. These
movies are not the original and are being
sold for lessmoney. Which of the following
laws will address this incident?
(A) Copyright
(B) Trademark
(©) Software piracy
(D) Patent
GO ON TO THE NEXT PAGE10%
44, Computer crime is defined as an illegal act 45,
involving acomputer. Which ofthe following
is NOT an example of a computer crime?
(A) Propaganda
B) File sharing
(©) Industrial sabotage
(D) Industrial espionage
END OF TEST
Which of the following are differences
between a Trojan Horse and a Worm?
1, Trojan Horses duplicate themselves
and Worms do not
I, Worms duplicate themselves and
‘Trojan Horses do not
II. Trojan Horses are activated by the
use of specific programs and
Worms are not
IV. Worms are triggered by the use of
specific programs and Trojan
Horses are not
(A) Land I only
®) Land IVonly
(©) Wand Ill only
(DB) Hand IV only
IF YOU FINISH BEFORE TIME IS CALLED, CHECK YOUR WORK ON THIS TEST.
0222901 0/CAPE 2015Z20ib CAPE UNETIE
“26
1. A foreign key is an attribute 3.
(A) that uniquely identifies each row in
atable
(B) _ in one table whose values must
either match the primary key in
another table or be null
(©) used strictly for data retrieval
purposes
(D) with a storage key in a table
4
2. At which of the following stages will the
absence of an appropriate data type MOST
likely be detected?
(A) Data entry
(B) Query
(© Report
(D) Relationship 5.
A table is said to be in first normal form if
(A) __itcontainsnonon-key dependencies
(B) _itcontains no partial dependencies
(C) every determinant in the relation is
a candidate key
(P) it contains no repeating attributes
or groups of attributes
Which of the following is NOT a method
used to organize files?
(A) Serial
(B) Random
(©) Direct Sequential
(D) Indexed Sequential
In modelling databases there are some
established conventions. Underlined
attributes denote
(A) foreign keys
(B) primary keys
(©) candidate keys
(D) secondary keys
Item 6 refers wo the following diagram,
Book name
Student Books
Book 5 4
6. The diagram above shows part of a library loaning system. The symbols 1, 2, 3, 4 represent,
respectively
(A) process, connector, data flow, output
(B) process, connector, data flow, data store
(C)__ external entity, process, data flow, data store
(D) data store, process, data fiow, external entity
0222901 0/CAPE 2016
GO ON TO THE NEXT PAGE7. A relational database is being created of
all the banks and their respective branches
in Saint Lucia. What kind of relationship
Which of the following features is NOT
required when choosing a storage device?
‘would MOST likely exist between the bank (A) Access method
table and the branch table? (B) Access speed
(©) Volumes to be stored
(A) One-to-one (D) Volumes to be processed
(B) — One-to-many
(© Many-to-many
(PD) None-to-one
Item 9 refers to the following table and query.
Amount,
Name Country Year aa
A. West, Trinidad and Tobago 2010 23.000
O-North Jamaica 2012, 48000
E. Santa Guyana 2011 19 000
Q Easy Barbados 2011 6.000
I Sprat Guyana 2010 25 000
G. Locks Trinidad and Tobago 2011 7.000
B, Brown 2011 20000
E. Love 2011 26 000
Query: Type Trinidad and Tobago under COUNTRY column, 2011 under YEAR column and
>= 20.000 under AMOUNT OWED column.
9. Using the query and data in the table above, how many records will be extracted when the query
is executed?
(0
@) 1
© 2
@) 4
10. Which of the following is NOT a type of database organization model?
(A) Archival
{B) Network
(©) __ Relational
(D) Hierarchical
02229010/CAPE 2016
GO ON TO THE NEXT PAGEuw
12,
13.
0:
Item 11 refers to the information below.
STUDENT (StudentID, Firstname,
Surname)
COURSE (CourselD, CourseTitle,
LecturerID)
REGISTRATION (StudentID, CourseID,
Mark)
LECTURER (Lecturer[D, Lecturer)
The registration entity is the result of a
relationship between the STUDENT and
COURSE entities. For any ONE student,
this relationship is MOST likely to be
(A) 1>M
@® 1-1
© M>M
@) M1
Items 12-13 refer to the followingnarrative.
An Internet provider has an office in
which customers can pay their monthly
bills. When customers pay their bills, this
information is placed in a temporary file
that is used to update the customer record
at the end of the work day.
The temporary file mentioned in the
narrative is called
(A) amaster file
(B) an indexed file
(©) atransaction file
(D) sequential file
What type of transaction processing
described in the narrative?
(A) Batch
(B) Online
(©) Real-time
(PD) Sequenced
ONLOICAPE. 2016.
NIDPONINICAPE 2016
14,
15.
16.
Which of the following storage devices is
capable of holding the largest amount of
data, allows a user to write on the disk once
and read (play) it many times?
(A) CD-ROM
(B) CD-RW
(©) DVDIR
(D) DVD-RW
How many parent record types does a
child record type have in the hierarchical
database model?
(A) 0
(B) 1
© 2
(D) 3
Which of the following features
characterize the content of a wiki?
I. It grows rapidly,
I. Ttis written by many authors.
III. It typically reflects one opinion.
IV. The articles are continuously
updated.
(A) Land IIL only
(B) Mand M only
©), Mand IV only
©) L0,1,1v
GO ON TO THE NEXT PAGE
GO ON TO THE NEXT PAGE39.
40.
4.
42.
-8-
Whichof thefollowingactivitiesconducted 43.
on the Internet does NOT pertain to
e-commerce?
(A) Payment of utility bills
(B) Conducting research on a topic
(C) Buying and selling of software
(©) Applying for copies of a birth
44,
Which of the following terms refers to
environmentally sustainable computing?
(A) Cloud
(B) Green
(©) Therapy
(D) Ergonomic
Which of the following threats to
information technology systems are MOST
likely to result directly from a hurricane?
(A) Fires
B) Riots
(©) Floods
(D) Power surges
Whichof the followingisNOTacomponent 45.
of knowledge management?
(A) Indexing
(B) Archiving
(©) Converting
(D) Data collection
END OF TEST
Which of the following is NOT an ethical
consideration related to the handling of
enterprise assets?
(A) Filing a lawsuit
(B)_ Invasion of privacy
(©) __ False representation
(D) Misuse of information
Which of the following are differences
between a Trojan Horse and a Worm?
1. Trojan Horses duplicate themselves
and Worms do not.
II. Worms duplicate themselves and
Trojan Horses do not,
IIL Trojan Horses are activated by the
use of specific programs and
Worms are not.
IV. Worms are triggered by the use of
specific programs and Trojan
Horses are not.
(A) Land Il only
(B) Land IV only
(©) Wand 11! only
(D) Mand IV only
Which of the following software can be
shared with other users for the modification
of source code?
(A) Trial
(B) Freeware
(© Shareware
(D) Open source
IF YOU FINISH BEFORE TIME IS CALLED, CHECK YOUR WORK ON THIS TEST.
0222901 0/CAPE 2016You might also like
John AdamsJohn Adams
Rating: 4.5 out of 5 stars
4.5/5 (2409)
Yes PleaseYes Please
Rating: 4 out of 5 stars
4/5 (1898)
Steve JobsSteve Jobs
Rating: 4.5 out of 5 stars
4.5/5 (807)