IT1103 - Information Systems & Technologies: University of Colombo School of Computing
IT1103 - Information Systems & Technologies: University of Colombo School of Computing
Important Instructions:
• The duration of the paper is 2 (Two) hours.
• Each question will have 5 (five) choices with one or more correct answers.
• The mark given for a question will vary from 0 to +1 (All the correct
choices are marked & no incorrect choices are marked).
• Mark the correct choices on the question paper first and then transfer them
to the given answer sheet which will be machine marked. Please
completely read and follow the instructions given on the other side
of the answer sheet before you shade your correct choices.
1
1) Which of the following resources is used by a computer based information system to perform input,
processing, output, storage and control activities which transform data resources into information products?
(a) A system is a group of interrelated components working together towards the attainment of a
common goal.
(b) A system accepts outputs and produces inputs in an organized transformation
process.
(c) A system that evaluates the feedback and makes necessary adjustments
to the input and processing components to ensure that a proper output is
produced.
(d) The human body is not an open system since it has limited abilities to interact with the
environment.
(e) Human body is an example of a system which is adaptive whereas a building is an example of
a non-adaptive system.
4) Which of the following statements is/are correct about input and output devices?
(a) Point-Of-Sale (POS) terminals can include bar-code scanners which read and enter
codes into computer systems.
(b) Automated Teller Machines (ATMs) are terminals with keyboards used for
transactions.
(c) Joysticks allow users to activate a command, enter handwritten notes and draw objects
and figures.
(d) The quality of a display monitor is determined by the size, colour and resolution.
(e) Printers and scanners are popular output devices.
(i) Registers hold data and instructions given to the Central Processing Unit (CPU) and it is
the workspace of the CPU.
(ii) The control unit controls the flow of information and instructs the computer how to carry out
program instructions.
(iii) The control unit only directs the movement of data between the registers and the Arithmetic/Logic
Unit (ALU).
(a) Only (i) & (ii) (b) Only (i) & (iii)
(c) Only (ii) & (iii) (d) All
(e) Only (i)
2
6) The following are statements containing the expression “Management Information Systems (MIS)”.
(i) Typically, Management Information Systems (MISs) are designed to support all phases of
decision-making, but they do not replace the decision maker.
(ii) Management Information Systems (MISs) use internal data resources generated by
transaction processing systems to develop reports with fixed and standard formats.
(iii) Management Information Systems (MISs) are typically designed to carry out repetitive
information processing and handle large volumes of data than a Transaction Processing
System (TPS).
(a) Only (i) and (ii) (b) Only (i) and (iii) (c) Only (ii) and (iii)
(d) Only (iii) (e) All
7) Which of the following statements containing the expression Group Support Systems (GSSs) is/are correct?
(a) Some GSSs support anonymity that encourages participation of all members of the
group, independent of their status.
(b) GSSs can allow the exchange of information and expertise among people
with or without direct face-to-face interaction.
(c) GSSs allow documents to be shared over a network to carry out face to face
discussions and to schedule meetings.
(d) An effective GSS must have the capability to support executive decisions
with components such as strategic planning, organizing and crisis
management.
(e) In a GSS, nominal group techniques use voting to take the final decision.
8) Which of the following statements is/are correct in relation to data, information and databases?
(a) Information can be defined as known primary facts or objects which have meaning in
the user’s environment for recording.
(b) A database is designed, built and populated with data or information for a specific
purpose.
(c) A list of students who have scored more than fifty can be recognised as a set of data.
(d) A data dictionary allows database designers and users to understand what data exist, what
the data means and its limitations.
(e) A sales person may include in his database, photographic images of customers and
video clips of discussions he has had with the customer.
9) Which of the following is/are true with respect to a Data Manipulation Language (DML)?
3
10) The Value Chain concept developed by Michael Porter can be used to
11) A company can survive and succeed in the long run only if it successfully develops strategies to gain
advantage in the global market over the competitive forces. Identify these competitive forces.
12) The following statements are based on the activities performed by a computer based information system.
Identify the correct statement(s).
(a) Generating audible signals to indicate proper entry of sales data is an example of the control
activity.
(b) By using bar code scanners at a point-of-sale terminal, the efficiency of the output activity can
be improved.
(c) Information in various forms is transmitted to end users and made available to them in the
output activity.
(d) Storage is the information system activity in which data and information are retained in an
organized manner for later use.
(e) Calculating employee pay, taxes and payroll deductions are examples of the output activity.
13) The following statements are based on the components of a computer based information system.
(i) Secondary storage such as magnetic tapes and disks can be used to store data and
information in an organized manner for later use.
(ii) A Local Area Network (LAN) is a network which is spread over a small
geographical area, whereas, the Internet is a wide area network.
(iii) Microsoft Windows and Microsoft Word are examples of application and system
software respectively.
14) “Rapid organizational change is inevitable in today's business environment but the risks associated with
managing change poorly are often overlooked. Part of the reason for the failure of many organizational
changes is the employee resistance to change”.
Which of the following may cause possible resistance from employees?
4
15) There are five basic competitive strategies which a firm can use to counter the threats of competitive forces.
Which one of the following strategies is concerned with working with two or more companies which involve
the joint production and distribution of goods and services?
16) Computer based information systems facilitate many activities in an organisation. The following statements
are about these activities performed by different information systems.
(i) In a retail store, a Transaction Processing System (TPS) can be used to facilitate the
purchasing activity and produce the receipts to the customer.
(ii) Although Transaction Processing Systems (TPSs) support operational level activities,
competitive advantage cannot be gained by using these systems.
(iii) Management Information Systems (MISs) focus only on the top level management
and do not support activities which support middle level management.
17) Following statements refer to the storage devices of a computer. Identify the incorrect
statement(s).
(a) Tapes must be read sequentially, and they are well suited for backup due to their speed
and reliability.
(b) Retrieving data from magnetic disks takes more time than retrieving data from
magnetic tapes.
(c) Magnetic disks consist of tracks and sectors.
(d) Optical disks use the direct access method whereas floppy disks use the sequential
access method.
(e) Floppy disks are suitable to be used when the storage medium needs to be portable.
18) There are different types of computer systems with varying features and capabilities available to the end user.
The following statements are based on these different types of computer systems. Identify the correct
statement(s).
(a) Micro computers were designed as single user systems. However, the capabilities of
micro computers have improved over the years.
(b) Network computers rely on a centralized control which is a kind of disadvantage of
network computers.
(c) A the thin client is a diskless, inexpensive computer used for accessing server-
based applications and the Internet.
(d) Personal Digital Assistants (PDAs) are hand held micro computer devices which are much
more useful to employees who work in one office than those who are mobile.
(e) Mainframe systems are the most suitable to carry out high volume transaction
processing in banks and airlines.
19) Which of the following is/are (a) device(s) suitable to connect networks built on different architectures?
5
20) Suppose there is a company having 2 offices in 2 distant towns. If each of these offices runs its own network,
which of the following communication medium/media is/are suitable to connect them together?
21) What is/are the major security control(s) which should be established in an enterprise?
22) Identify the false statement(s) regarding Intrusion Detection Systems (IDSs)?
(a) Two types of IDS Systems are Host-Based and Network-Based IDSs.
(b) Host-Based IDS have a negative impact on system performance.
(c) Host-Based IDS always notice a network-based attack such as denial of service.
(d) Many Host-based IDS have a negative impact on System stability.
(e) If an attack signature is spread across a multiple packet, then Network-based IDS cannot
detect that attack because IDS cannot reassemble all packets.
(a) The process of system development includes all aspects ranging from the problem to
be solved to the implementation of solution.
(b) Information system Planning transforms organizational goals outlined in the strategic
plan into specific system development activities.
(c) System Analysts are professionals who specialize in analyzing, designing and
developing business systems.
(d) System Developers are specialists who are responsible for modifying or developing
programs according to user requirements.
(e) Studying the existing system and identifying the strengths, weaknesses, opportunities and
threats for improvement, are activities done during the problem definition phase
of the Systems Development Life Cycle.
24) Which of the following is/are not (an) ongoing activity(ies) of system design?
(a) Creating a technical solution that satisfies the functional requirements of the system
(b) Assessing the ability of the ultimate users to design a system based on the current
operations of the organization
(c) Developing steps and procedures which can prevent, detect and correct errors in using
the system
(d) Identifying existing system problems and new opportunities related to the goals of the
organization
(e) Translating the operational needs of the organizational entities into technical
specifications which can be used as the input to system implementation
6
26) Which of the following is/are suitable for an Internet facility of a school?
28) The following statement(s) is/are about Decision Support System (DSS).
(i) The focus of a DSS is to support managerial decision-making effectively when faced with
structured or semi-structured business problems.
(ii) Model management software assists with communication between the user and the DSS .
(iii) A model driven DSS utilises vast stores of information contained in the corporate database and
primarily performs qualitative data analysis.
30) Two key aspects of system design are logical and physical design. Which of the following is/are not
identified during logical design?
7
32) A website intentionally displays information which imposes a danger to society. If this issue
needs immediate action, which of the following is/are appropriate in order to control the situation early?
(a) Informing the Service Provider about the website and its danger
(b) Hacking the website and changing the information as soon as possible
(c) Requesting the recognized computer societies to take necessary action
(d) Making an offcial complaint to the nearest Police Station
(e) Communicating with database users
33) In addition to database management software the other possible types of software which a database system
will have are
(a) languages used for coding user interfaces and application programs.
(b) presentation software for documenting the design of the database.
(c) computer-aided software engineering tools (CASE).
(d) a fourth generation language such as Embedded Structured Query Language.
(e) user administration tools provided by the operating system for managing users of the
database.
35) Suppose there is a company web server that satisfies HTML requests by customer computers. In which
architecture do the computers operate?
36) Which of the following statements is/are correct in relation to data warehousing?
37) The following statements are based on the hardware of a computer system. Identify the incorrect
statement(s).
(a) Secondary storage is less volatile and has larger capacity than memory.
(b) Input and output devices allow users to feed data and instructions to the computer for
processing and storage.
(c) The relative clock speed of two Central Processing Units (CPUs) from different
manufacturers is a good indicator of their relative processing speed.
(d) Output devices provide information in different forms, such as print and digital sound
format.
(e) Cache memory is a type of high-speed memory that the Central Processing
Unit (CPU) can access more rapidly than Random Access Memory (RAM).
8
(i) A Gantt chart is a simple horizontal bar chart that shows project tasks against a calendar.
(ii) JAD emphasizes participative development among users and others involved with the
system.
(iii) Decision tables are used for planning, monitoring and coordinating projects.
Which of the above statements is/are correct?
(a) Only (i) (b) Only (i) & (ii) (c) Only (i) & (iii)
(d) Only (ii) & (iii) (e) All
39) Which of the following is/are (an) example(s) of an application(s) of Transaction Processing Systems (TPSs).
(a) Keeping track of customer contacts during a sales cycle
(b) Tracking receipts of materials from suppliers
(c) Processing credit card payments
(d) Generating weekly production report by product and operation
(e) Video conferencing to coordinate manufacturing and sales efforts
40) Which of the following (is) a/are valid component(s) of user interface?
(a) icons (b) function keys
(c) cascading menus (d) pop-up menus
(e) scroll bars
41) A recently started business utilises a printer, fax machine and several laptops. What is/are the possible
network type(s) which can be formed by connecting these devices together?
(a) Personal Area Network (PAN) (b) wireless network
(b) enterprise network (d) peer-to-peer network
(e) client-server network
9
43) The following statements are based on specialized information systems.
(a) Only (i) & (iii) (b) Only (i) & (ii)
(c) Only (ii) & (iii) (d) Only (ii)
(e) All
****
10