You are on page 1of 18

Progress Test 2

Question 1
Question text
Apart from volume, what another aspect of Big data?

a. Terabytes
b. Volume
c. Unaffordable
d. Velocity
Feedback
Your answer is correct.
The correct answers are:
Velocity,
Volume

Question 2
Question text
What is the binary equivalence of 126?

a. 11101101
b. 01111110
c. 00111010
d. 1111100
Feedback
Your answer is correct.
The correct answer is:
01111110

Question 3
Question text
Business continuity is the process of getting the entire business back to normal and to
full functionality.

Select one:
True
False
Feedback
Correct
The correct answer is 'True'.
Question 4
Question text
An employee of Kgalagadi Breweries, a company bottling alcohol, resigns from the
company and joins Truworths Stores. The employee has the right to have his data taken
and given to the new company. True/False

Select one:
True
False
Feedback
Correct
The correct answer is 'True'.

Question 5
Question text
As Pearl reviews the Accounts payable IT system, what source of information can be
found?

a. Amount received from the customer


b. Stock available
c. Invoice amount to be paid
d. Supplier paid amount
Feedback
Your answer is correct.
The correct answer is:
Supplier paid amount

Question 6
Question text
What risk can be managed using Big Data in relation to supply market and suppliers?

a. Reputation
b. Competition
c. Location
d. Contract terms compliance
Feedback
Your answer is correct.
The correct answers are:
Contract terms compliance,
Reputation
Question 7
Question text
Select all that could be origins of Big Data

a. Purchase Requisitions
b. Motion Sensors
c. Computers
d. Servers
Feedback
Your answer is correct.
The correct answers are:
Motion Sensors,
Purchase Requisitions

Question 8
Question text
Encryption is a secure way of transmitting data about electronic transactions.

Select one:
True
False
Feedback
Correct
The correct answer is 'True'.

Question 9
Question text
Which technology makes use of large data sets to generate robust patterns, trends, and
connections?

a. Internet of Things (IoT)


b. Machine Learning
c. Algorithms
d. Big Data
Feedback
Your answer is correct.
The correct answer is:
Big Data
Question 10
Question text
The Department of Tertiary Education and Financing (DTEF) carries out data processing
operations on student personal data. Which element is not part of the data cycle for
DTEF?

a. Acquisition
b. Procuring
c. Storing
d. Processing
e. Reporting
Feedback
Your answer is correct.
The correct answer is:
Procuring

Question 11
Question text
To help computers work faster and store more data, Chip designers reduced the power
and increased size

Select one:
True
False
Feedback
The correct answer is 'False'.

Question 12
Question text
Which aspect of the computer setup is responsible for managing
computer resources like CPU?

a. RAM
b. Keyboard
c. Operating System
d. Hard Drive
Feedback
Your answer is correct.
The correct answer is:
Operating System
Question 13
Question text
The component of a quality management process whereby the output of the processing
is compared against established standards is known as _____

a. Quality control
b. Standardisation
c. None of the above
d. Quality standards
e. Quality acquisition
Feedback
Your answer is correct.
The correct answer is:
Quality control

Question 14
Question text
In database terminology, an attribute can also be referred to as a _____.

a. Table
b. Record
c. Array
d. field
e. Row
Feedback
Your answer is correct.
The correct answer is:
field

Question 15
Question text
Shoprite Stores would like to collect data about its customers in order to carryout
targeted marketing activities. At what point should it ask for consent to use that data?

a. Before collection
b. During collection
C. After collection
d. If there is need
Feedback
Your answer is correct.
The correct answer is:
Before collection
Question 16
Question text
Intellectual property rights can only be owned by an organisation.

Select one:
True
False
Feedback
Correct
The correct answer is 'False'.

Question 17
Question text
Testing is one of the control measures an organisation can take that are unique to IT
systems. There are various ways in which these IT systems for procurement can be
tested. Choose 3 correct types of tests.

a. Unite testing
b. Impact testing
c. Volume testing
d. Validation testing
e. Software testing
Feedback
Your answer is correct.
The correct answers are:
Unite testing,
Validation testing,
Volume testing

Question 18
Question text
Logic gates taken outputs, process them and give outputs.

Select one:
True
False
Feedback
The correct answer is 'False'.
Question 19
Question text
metadata is descriptive information about data collected by an organisation. Metadata
can include the following. Choose one piece of information which does not form part of
metadata.

a. Data of creation of the data


b. Intended use of the data
c. Time of creation of the data
d. File size
e. The author of the data
Feedback
Your answer is incorrect.
The correct answer is:
Intended use of the data

Question 20
Question text
Bank of Baroda (BoB) in Botswana is a bank which complies with the Payment Card
Industry Data Security Standards (PCI DSS). Select the 3 steps required to comply with
this standard.

a. Do nothing
b. Assess
c. Report
d. Repair
e. Install firewall
Feedback
Your answer is correct.
The correct answers are:
Assess,
Repair,
Report
Question 21
Question text
Botswana Accountancy College (BAC)can assure that student results are protected
through an information assurance process. Choose one element which is not part of
information assurance process for BAC.

a. Availability
b. Authorisation
c. Authentication
d. Integrity
e. Confidentiality
Feedback
Your answer is correct.
The correct answer is:
Authorisation

Question 22
Question text
Text is structured and this makes it simple to analyze .

Select one:
True
False
Feedback
The correct answer is 'False'.

Question 23
Question text
The impact and likelihood of data disruption can be identified and measures are then
put in place to control and manage risks and protect against disruption of data.
Choose one measure that is not applicable.

a. Reduce
b. Transfer
c. Accept
d. Eliminate
e. Ignore
Feedback
Your answer is correct.
The correct answer is:
Ignore
Question 24
Question text
Coca Cola (Pty) is a limited liability company which manufactures the Fanta Orange drink.
A patent is the form of legal protection enables them to be the only manufacturer of this
named drink. True/False

Select one:
True
False
Feedback
Correct
The correct answer is 'True'.

Question 25
Question text
In a database, which of these are data?

a. Name
b. Phone Number
c. Address
d. Age
e. All of these are correct
Feedback
Your answer is correct.
The correct answer is:
All of these are correct

Question 26
Question text
The purpose of ISO/IEC 27001:2013 is to preserve the following elements of an
organisation’s data. Choose the correct

a. Integrity
b. Reliability
c. Confidentiality
d. Security
e. Availability
Feedback
Your answer is correct.
The correct answers are:
Confidentiality,
Integrity,
Availability
Question 27
Question text
What latest technology of computers paved way for Big Data processing?

a. Integrated Circuits
b. Artificial Intelligence
Speed

c. Programme
d. Peripherals
Feedback
Your answer is incorrect.
The correct answer is:
Integrated Circuits

Question 28
Question text
Data that describes data which has been collected and stored by an organisation is
known as ___________

a. None of the above


b. Database
c. Matadata
d. Data dictionary
e. Exploratory data
Feedback
Your answer is incorrect.
The correct answer is:
Matadata

Question 29
Question text
Data-enabled business models use recommender systems which use data about the
characteristics of a client and also the interactions with other clients to make
recommendations about products. True/False

Select one:
True
False
Feedback
Incorrect
The correct answer is 'False'.
Question 30
Question text
What process involves finding and interpreting patterns in data set?

a. Computation
b. Analytics
c. Programming
d. Datafication
Feedback
Your answer is correct.
The correct answer is:
Analytics

Question 31
Question text
The objective of any Data Resilience strategy is to put in place plans that include
measures to manage risk. Identify the stage that is not part of the stages of the data
resilience strategy process.

a. Impact awareness
b. Discovery
c. Identifying risk
d. All of the above
e. Control measures
Feedback
Your answer is incorrect.
The correct answer is:
All of the above

Question 32
Question text
What external data can be used in forecasting spent model?

a. Supplier lead times


b. Purchase Requisition
c. Sales forecast
d. Price inflation
Feedback
Your answer is correct.
The correct answer is:
Price inflation
Question 33
Question text
A data controller needs to make decisions concerning data that would be useful for an
enterprise to make decisions. Choose one that does not apply.

a. What data to acquire


b. When to use data
c. Purpose and manner of data processing
d. How much the data costs
e. How data should be processed
Feedback
Your answer is correct.
The correct answer is:
How much the data costs

Question 34
Question text
Amazon is a Cloud-based services company based in the United States of America (USA).
many companies have decided to manage risks relating to data resilience by outsourcing
their IT system hosting and their data storage to suppliers such as Amazon. Which of the
following are Cloud service models. Choose 3

a. Software-as-a-service
b. Infrastructure-as-a-service
c. Platform-as-a-service
d. Network-as-a-service
e. Computer-as-a-service
Feedback
Your answer is correct.
The correct answers are:
Software-as-a-service,
Infrastructure-as-a-service,
Platform-as-a-service
Question 35
Question text
The Botswana Accountancy College (BAC) performs sets of operations on student data
and this is known as data processing. True/False

Select one:
True
False
Feedback
Correct
The correct answer is 'True'.

Question 36
Question text
A __________ enables Mokoka Bus Services to distinguish its buses from the other buses
belonging to other companies.

a. Speed
b. Trademark
c. Copyright
d. Patent
e. Color
Feedback
Your answer is correct.
The correct answer is:
Trademark

Question 37
Question text
The Botswana Government has adopted the UK Data Protection Act (DPA) in order to
ensure organisations act to preserve data integrity and protect security. There are 4 key
terms used in the DPA. Choose one that does not apply.

a. Data controller
b. Data
c. Data processing
d. Data subject
e. Database
Feedback
Your answer is incorrect.
The correct answer is:
Database
Question 38
SQuestion text
Which one is odd?

a. Greedy
b. Brute force
c. Blackbox
d. Backtracking
Feedback
Your answer is correct.
The correct answer is:
Blackbox

Question 39
Question text
Digital Signatures are an effective way to put in place authentication, integrity and non-
repudiation measures for information assurance, hence their use in different contexts.
Choose 3 contexts that apply.

a. Used to put in place a binding contract with supplier


b. Allow full access to data for members of the organisation
c. Provide a secure record that the signing has actually taken place
d. Used as a form of encryption to provide assurance that the data has integrity and
the sender is authentic
e. Enable backup and recovery operations
Feedback
Your answer is correct.
The correct answers are:
Used to put in place a binding contract with supplier,
Used as a form of encryption to provide assurance that the data has integrity and the
sender is authentic,
Provide a secure record that the signing has actually taken place
Question 40
Question text
What could the source text for analyzing?

a. Videos
b. Instant messages
c. Photos
d. Music
Feedback
Your answer is correct.
The correct answer is:
Instant messages

Question 41
Question text
The trusted computing group (TCG) was formed with the objective of enabling secure
computing through the development of open standards and specifications and provide
technology for organisations that protects data and systems that meets the TCG
specifications through a number of methods. Choose the incorrect method

a. User identity
b. Network integrity
c. Machine identity
d. All of the above
Feedback
Your answer is incorrect.
The correct answer is: All of the above

Question 42
Question text
Disaster recovery is the process where IT systems and access to data are restored
following a disruption.

Select one:
True
False
Feedback
Correct
The correct answer is 'True'.
Question 43
Question text
Mouse as a peripheral can be used to input data to the computer.

Select one:
True
False
Feedback
The correct answer is 'True'.

Question 44
Question text
How do computers ensure authentication of users?

a. Use of binary
b. Run out of storage space
c. Use of credentials
d. Freezing
Feedback
Your answer is correct.
The correct answer is:
Use of credentials

Question 45
Question text
The right to __________ requires that a customer of ABSA Bank be informed that their
account has been hacked as a result of a Cyberattack on their Banking systems.

a. All of the above


b. Be informed
c. Be notified
d. Be forgotten
e. Be given access
Feedback
Your answer is incorrect.
The correct answer is:
Be notified
Question 46
Question text
Which one is missing?
Fetch > _______ > Execute >Store

a. Chip
b. None
c. Logic
d. Decode
Feedback
Your answer is correct.
The correct answer is:
Decode

Question 47
Question text
In procurement, what could show the variety of Big Data?

a. Descriptive
b. Size
c. Asset log
d. Volume
Feedback
Your answer is correct.
The correct answer is:
Asset log

Question 48
Question text
ABC Inc. access their internet through telephone line. Which internet access technology
are they using?

a. DSL
b. Satellite
c. Mobile Network
d. Cable
Feedback
Your answer is incorrect.
The correct answer is:
DSL
Question 49
Question text
What process was Peo doing when converting pictures into soft copies?

a. Digitalization
b. Analyzing
c. Coding
d. Datafication
Feedback
Your answer is correct.
The correct answer is:
Digitalization

Question 50
Question text
The purpose of ISO/IEC 27002:2013 is a code of practice for information security controls
and provides. Choose the incorrect one

a. Policies
b. Cost
c. Hardware
d. Software
e. Procedures
Feedback
Your answer is correct.
The correct answer is:
Cost

You might also like