You are on page 1of 9

---- cffE

tl.J"a ,^F ltaL,'


^
, Fl C I't }

-2-
Item L refers to the following partial 4. Data mining is the process of
spreadsheet.
(A) finding results using queries
A B C D E (B) defining how a database should
1 10 organize data
2 20 (C) automating manual transaction
processing systems
J 30
4 40
(D) using data warehouses to find
pattems and relationships among
5 50
data
6
7
5. The files at a company are stored on
magnetic tape in no parlicular order. Which
method can be BEST used to access the
1. Which of the following is the MOST fi1es?
efficient formula to use when calculating
the sum of the numbers shown in column (A) Serial
A? (B) Random
(C) Sequential
(A) : SUM (A1: ,A.5) (D) Indexed sequential
(B) : SI-IM (10 : 50)
(c) :10+20+30+40+50
(D) :A1 +A2 +A3 +A4 +A5 6. Which of the following is NOT a type of
database organization model?
I

(A) Archival
) Normal forms do NOT affect databases in (B) Network
terms of (C) Relational
(D) Hierarchical
(A) integrity
(B) security
(C) consistency 7. The duplication of data in a database is
(D) performance referred to as data

(A) integration
3. Which of the following storage devices is (B) redundancy
capable of holding the largest amount of (c) inconsistency
data, allows a user to write on the disk once (D) documentation
and read (play) it many times?

(A) CD-ROM
(B) CD-RW
(c) DVD+R
(D) DVD-RW

GO ON TO THE NEXT PAGE


022290t0lcAPE 2011
-3 -

8. Which of the following will consist of tables that are ALL in 3NF given that EACH student does
several courses and EACH course can be taken by several students?

(A) STIIDENT(StudentNumber, StudentName,DOB,CourseNumber, CourseName,


Mark, Grade)

(B) STTIDENT (StudentNumber,StudentName,DOB)


REGISTER (StudentNumber, CourseNumber, Mark, Grade, CourseName)

(C) STUDENT (StudenlNumber,StudentName,DOB)


RESULT (StuaettNumb%CourseNumber,Mark,Grade)
COURSE (gous+h4obet,CourseName)

(D) STUDENT (StudeuAtE0be!,StudentName,DOB)


SCORE (StudentNumber,CourseNumber,MarD
COURSE (esurgq}fulab9r, CourseName)
GRADE (Ma.rk, Grade)

Ilem 9 refers to the following table.

NAME COUNTRY YEAR AMOUNT


OWED
A. Best Trinidad and Tobago '.J 2007 r 23000
O. Wilson Jamaica 2AA9 ; 48 000
W Santa Guyana 2008 + 19 000
Q. Ali Barbados 2008 : 6 000
L. Smith Trinidad and Tobago J 2007 ; 25 000
G. Locks Trinidad and Tobago '".i 2008 -; 7 000
B. Watts Guyana 2008 r .: 20 000
E. Taitt Barbados 2008 *.; ,j 26 000

Query: Type Trinidad and Tobago under COUNTRy


column,2008 underYEAR column and
>:20000 under AMOLINT,OWED column.

9. Using the query and data in the table above, how many records will be extracted when the query
is executed?

(A) 0
(B) 1

(c) 2
(D) 4

GO ON TO THE NEXT PAGE


022290|0ICAPE 2011
-4-
Item 10 refers to the information below.

STUDENT (StudentlD, Forename, Surname)


COURSE (CourselD, CourseTitle, LecturerlD)
REGISTRATION (Student ID, CourselD, MarD
LECTURER (LecturerlD, Lecturer)

10. The registration entity is the result of a relationship between the STUDENT and COURSE entities.
For any ONE student, this relationship is MOST likely to be

(A) i-+1
(B) 1-+M
(C) M-+M
(D) M+l

lL The absence of complete and timely 12. In a student record management system,
information could impact a Caribbean which of the fotrlowing are MOST likely
company in which of the following ways? to be calculated fields?

I. Close its office onNewYear's Day I. Age


II. Fail to find the reason why II. Height
customers have stoppedbuying III Date of Birth
its most popular brand IV. Grade PointAverage
m. Implement an information system
that meets only 50o/o of user (A) I and II only
requirements (B) I and IV only
IV. Capitalise on opportunities to (C) II and III only
launch new products (D) II and tV only

(A) II and III only


(B) III and fV only
(C) [,III and IV only
(D) I, [, III and [V

GO ON TO THE NEXT PAGE


02229010/CAPE 2011
5-

EglJ refers to the diagram below which represents a banking process that maintains customers'
accounts.

Account

13. Customers can withdraw or deposit funds, request information about their account and update their
accounts directly. The calculations requited to keep customers'accounts correct are represented by
which of the following symbols?

(A) Process
(B) Data flow
(C) Data store
(D) External entity

14. Examine the following table which is represented in standard notation.

COURSE (Course ID, Course Name, Lecturer ID, Lecturer Name)

In which normal form is the table?

(A) ONF
(B) 2NF
(c) 3NF
(D) 4NF

Item 15 refers to the three tables below which were selected from a PROPERTY Developers
database.

SALESMAN (salesmanNumber- SalesmanName. Sal esArea)

PROPERTY (Proge$Ahrmbq, ProperfyType, SalesArea)

CUSTOMER (CustomerNumber, CustomerName, CustomerAddress, SalesmanNumber)

15. Which of the following attributes is a foreign key?

(A) PropertyNumber in the table PROPERTY


(B) SalesArea in the table SALESMAN
(C) SalesmanNumber in the table SALESMAN
(D) SalesmanNumber in the table CUSTOMER

GO ON TO THE NEXT PAGE


022290101CAPE 2011
6-

16. For which of the following tasks are IT 19. Which of the followiti gisoftware packages
tools typically used? is used to store vast amountS ofdatir; provide
multiple views ofthe same data andproduce
I. Reducing human errors multiple reports?
II. Speeding up the processing of
transactions (A) Word processing
m. Storing large volumes of data (B) Spreadsheet
IV. Creating new products (C) Database management
(D) Desktop publishing
(A) I and III only
(B) I, II and III only
20. Which of the following codes creates a
(c) II, III and IV only
horizontal line across apage in an HTML
(D) I, II, UI and IV
document?

17. Databasemanagementsystemsallowusers
(A) <HR>
to organize and store data as well as query
(B) <HL>
and retrieve tables in a database. Which
(c) <TrrLE>
of the following is MOST appropriate for
(D) <HGAD>
making queries?
21. A text, image or icon that provides a
I. Structured query language connection to another web page is called
II. Data definition language
m. Hlper text mark up language (A) an email
IV. Query by example (B) a browser
(C) a hyperlink
(A) I and II only (D) a home page
(B) I and fV only
(C) II and III only
(D) I, III and fV only , 'r) 1,

The MOST suitable graphical representation


ofthe average height ofyour classmates by
gender is a
18. Which of the following communication
technologies facilitate e-learning? (A) pie chart
(B) bar chart
I. Internet (C) line chart
II. CD-ROM (D) scatter graph
m. Video conferencing .
IV. Telecommuting
23. Your friend has to submit an essay for
(A) I and III only homework. You have read the essay and
(B) II and IV only made corrections. Which word processing
(C) I,II and III only feature will allow your friend to be aware
(D) I, III and fV only ofyour corrections?

(A) Auto correct


(B) Auto format
(c) Track changes
(D) Reveal formatting

GO ON TO THE NEXT PAGE


02229010/CAPE 2011
-7 -

24. The Chief Executive Officer wishes to get irz*i Mark gathered information from several web-
rl

a nurnber ofexception reports, each based sites for his assignment on I'Sugar Production
on a different criterion, in order to prepare in the Caribbean:'. The criteria that Mark
for a meeting of the Board of Directors. should use to ensure that the information
These reports are not available from the used is accurate, complete and reliable are
current inforrnation system (IS). The data authority, organization or publishing body
will have to be imported from the IS into and,
another soflware application to produce
the reports. The MOST appropriate (A) currency, design, coverage
productivity software application to use to (B) curency, audience, design
produce these reports is a (C) currency,audience,objectivity
(D) curency,coverage,objectivity
(A) database management system
(B) spreadsheet
(C) word processor 28. The terrn used to describe a predefined
(D) desktop publishing package operation that performs a calculation ,or
generates a value such as today's date is a

Which of the following pairs of software (A) formula


tools is especially designed 16 panipulate (B) tunction
numeric data? (C) process
(D) parameter
(A) Spreadsheet and statistical tools
,,.1-
(B) Word processor and spreadsheet ;!J
(C) Spreadsheet and data.base ri2e."; As the ,use of the Internet becomes more
management system popular, organizations are gradually
(D) Word processor and database introducing Internet policies. Which of
management system the following BEST describe components
of an Internet policy?

26. Some sfudents have created a web page that I. Staffmonitoringprocedures


can be modified by anyone who accesses II. Rules governing the use of
it. This web page can be referred to as a messaging services and chat
rooms
(A) blog III. Rules governing the distribution
(B) portal of company information on the
(C) wiki Internet
(D) newsgroup IV. Rules against purchasing and
trading online

(A) I and II only


(B) II and III only
(c) I, II and III only
(D) I, [, III and IV

GO ON TO THE NEXT PAGE


022290t0tcAPE 2011
8-

A local radio station received information The'health''andi safety,"6fficer has recom-


concerning an alleged terrorist plot. Which mended several'improvements to the
ofthe following characteristics shouldNOT Information Technolory"system' to ensure
be considered, as the radio station evaluates Liquil Bank meets the health standards of
the information? the country. Which of the followiag would
be the MOST reoommended improvements
(A) Currency r' to the bank?
(B) Criticality
'(C) Reliability ,i I. Increase the quality of lighting
(D) Availability throughout the bank
II. Utilise anti-glare screen filters on
monitors
31. Blue Ribbons Inc. is an Internet-based III. Utilise ergonomic keyboards and
company that sells its goods and services mice
directlyto its customers. They are engaging IV. Provide iafetymanuals forall staff
in
(A) I and fV only
(A) e-billing (B) I, II and III only
(c) II, UI and fV only tl:
(B) e-business
(c) e-shopping (D) !,II,II{ and IV
(D) e-cofilmerce

34. Which of the following health:risks is


Which of the following represents a NOT genera,l,ly associated withthe use of
security feature that automatically records computers?
operations performed by all users?
(A) Eye strain i

(A) Firewall (B) Backaehe


(B) Roll back (C) Fractured wrist
Ycl Audit trail (D) Carpal tunnel syndrome
(D) Transaction I

35. Which of the following threats to


Information Technology systems is MOST
likely to result directly from a hurricane?

(A)' Fires
(B) " fuots
(C) "' Floods
(D)"' Power surges

GO ON TO THE NEXT PAGE


022290t0/cAPE 2011
-9-
36. Which of the following BEST describes 39. Your friend, Thane, downloaded a free
the term'Green Computing'? waterfall screen saver to your PC. Whenever
the screen saverprogramis executed, rather
(A) Conserving energy with your than seeing a waterfall screen saver on
computer, paper and toner your deslctop, you hear musical sounds.
cartridges usage, disposal of You realise that malicious software had
old computer equipment, and been installed on your computer. This is
purchasing decisions when an example of a
considering new computer
equipment (A) logic bomb
(B) Conserving energy with your (B) worrn
computer, paper and toner (C) trojan horse
cartridges usage, and disposal (D) back door
of old computer equipment
(C) Paper and toner cartridges usage, 1^
disposal of old computer FO) A university, located on three campuses in
equipment, and purchasing'*' threedifferentterritories,willbeupgrading
decisionswhenconsideringnew its office automation suite. Mindful of
computer equipment the laws governing the use of copyrighted
(D)' Conserving energy with your softwareandtheneedtocontaincostswhile
computer and disposal of old allowing access to all users, which type
computer equipment of software license should the university
purchase?

37. Sabotage is one of the possible rebellious (A) Site


acts of disgruntled employees. Which of (B) Enterprise
the following is an act of sabotage? (C) Shrink wrap
(D) Multiple Single User Licenses
(A) Breaking into a system for fun
(B) Accessing the netduring lunch time
(C) Accessing private data for financial
gam
r r (D) Destroying computer hardware or
software

38. Which of the following measures are used


to prevent unauthorised personnel from
physically entering sensitive areas?

(A) Grills, lock and key, audit log


(B) Passwords, user names, firewalls
(C) Security guards, grills, user names
(D) Biometric devices, lock and key,
swipe card

GO ON TO THE NEXT PAGE


022290r0tcAPE 2011
- 10-
Items 41- 43 referto the following scenario. 44. AsoftwaredeveloperdiScoveredthataretail
firm was reprodueing,hiS soft,ware,for sale.
A photograph showed Mohandas Gandhi He reported the matter to the police and the
(October 2, LB69 - January 30, 1948), and store owner was arrested. Which law did
Martin Luther King Jr (January 15,1929 - the store owner MOST likely violate?
April 4, 1968), participating in a civil rights
march in 1963. The photograph appeared (A) Antitrust
in a reputable national newspaper, in an (B) Copyright
article on Dr King during Black History (C) PrivacyAct
month. It was discovered after extensive (D) Tax
investigation that the photograph was
rlioit4lly manipulated by an employee.
45. Kim is a fashion designer who routinely
41. The employee's action is an example of makes purchases online. Which of the
following functions is NOT possible with
(A) hacking online purchasing?
(B) plagiarism
(C) breaehof informationprivacy (A) Ability to shop despite time
(D) misrepresentation of inf,ormation constraints
(B) Ability to deterrnine the quality of
products
42. To prevent the reoccurrence ofpublishing (C) Ability to make purchases without
a digitally altered photograph, the leaving home
management of the newspaper should (D) Access to products that are
, unavailable locally
(A) enact IT legislation
--(B) develop an IT policy
(C) publish an apology
(D) monitor employees' use of
computers

r r 43. Thedilemma,asillustratedinthe scenario,


is BEST described as

(A) legal
(B) social
(C) ethical
(D) personal

IF YOU FINISH BEFORE TIME IS CALLED, CIIECK YOUR WORK ON THIS TEST.

02229010|CAPE 2011

You might also like