0% found this document useful (0 votes)
54 views5 pages

Information Systems 1B Test 4

IS
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views5 pages

Information Systems 1B Test 4

IS
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Test 4: 21 October 2024

SUBJECT : INFORMATION SYSTEMS 1 Extended year 2


SUBJECT CODE : IS15WOB
QUALIFICATION : DIPLOMA IN ICT IN APPLICATION
DEVELOPMENT

EXAMINERS : MS. M. MOKOKA

MODERATOR : Dr. K. Koranteng


DURATION : 1 hour and 20 minutes
MARKS : 50
NUMBER OF PAGES : 5 (incl. cover page)

INSTRUCTIONS:

 DO NOT TURN THE PAGE OVER UNTIL TOLD TO DO SO!!!!!


 No student is allowed to borrow equipment from another student
 Questions must be referred to the invigilator or subject lecturer only
 All questions should be answered on the answer sheet provided
 Smartphones must be switched off or on silent (not vibrate)
Question 1 [22 MARKS]
Multiple Choice – choose one corresponding correct answer
1. A(n) ________ refers to the combination of hardware, software, data
transformation, people, and procedures collaborating to generate information
and knowledge.
A. Computer system
B. Knowledge system
C. Information systems
D. Database system
2. Which of the following is not a type of Microsoft access database object?
A. Table
B. Forms
C. Worksheet
D. Macros
3. Which type of information, when free and mistaken, can result in inaccurate
decisions?
A. Accessible
B. Organised
C. Timely
D. Accurate
4. ______________ is not a valid data type in MS Access.
A. Auto number
B. Currency
C. Memo
D. Picture
5. A(n) _________ integrates with the information flow across an organisation to
manage and coordinate the ongoing activities of the enterprise.
A. Manager
B. Environment
C. Transactional Processing Systems
D. Enterprise Resource Planning
6. What is the maximum length a text field can be?
A. 175
B. 64
C. 255
D. 265
7. In Access, ___________ are used to store data.
A. Form
B. Query
C. Report
D. Table
8. Any system or systems that interact with information systems to aid decision-
makers in addressing ill-structured problems by providing analytical models
and access to databases.
A. Decision making
B. Systematic
C. Cognitive
D. Decision support systems
9. A(n) _________ enables and manages the publishing, modification,
organisation, and access of various forms of documents and other files.
A. Management Information System
B. Document Management System
C. Expert Systems
D. Content Management System
10.Which tool do you use to create a query object?
A. Table query wizard
B. Simple query wizard
C. Simple filer wizard
D. Database wizard
11.Database access levels are specified so as to define who can access what in a
database, it is identified through
A. User ID
B. Password
C. Status
D. All of these
12.Listing of the names and addresses of all the employees for an organisation
would be an example of a ___________ report.
A. Detailed
B. Summary
C. Contacts
D. None of the above
13.The checking operation performed on input data is called the
A. Control of data
B. Validation of data
C. Cross check
D. Verification of data
14.Management information systems will enhance the ___________.
A. Facilitate the creation and sharing of documents that assist in daily office
operations.
B. Capture and replicate the expertise of a skilled problem solver.
C. Utilise transaction data to generate the information required by managers
for effective business management
D. None of the options mentioned above
15.This form displays multiple records, one per row, in the form window
A. Justified
B. Columnar
C. Tabular
D. Datasheet
16.What is personal data?
A. Information that relates to a specific person
B. It cannot be accessed by unauthorised persons
C. Both A and B
D. None of the above mentioned
17.The following work together to create an effective information system, except

A. Data
B. People
C. Procedures
D. Organization
18.When sensitive data falls into the hands of someone who is unauthorised
persons, it is
A. Data breach
B. Data Access
C. Data Control
D. None of the above
19.The columns in a MS Access table are called as _______________
A. Fields
B. Macro
C. Columns
D. Records
20.A(n) _______uses analytics and other Big Data techniques to interpret a
company’s data from a variety of sources to better understand its
performance, make recommendations for improvement, and predict future
outcomes.
A. Data Scientist
B. Data Administrator
C. System Analyst
D. IT Consultant
21.To create queries in MS Access
A. You can drag and drop fields on query builders
B. You can type the SQL command in SQL view
C. You can use query wizard or design view
D. All the above
22.Information privacy, Individual privacy and communication privacy is the
three pillars of:
A. Digital integrity
B. Digital protection
C. Digital secrecy
D. Digital privacy
23.A(n)________ is an information system that captures and knowledge of human
experts and then imitates human reasoning and decision making.
A. Expert Systems
B. Decision Support Systems
C. Artificial Intelligent
D. Robotics
24.The data on the hard drive were erased by a corrupted file that had been
attached to an email message. Which software would be used to prevent
this?
A. Productivity
B. Utility
C. Virus checker
D. Encryption
25.The most secure model of signatures used in information systems
is____________.
A. Digital signature
B. Electronic signature
C. Digitized signature
D. There is no difference in the level of security between these models
Question 2 [22 MARKS]
State whether the following are True or False.
1. Accessible information has meaning to the person who receives it.
2. A typical organization consists of a wide variety of departments, sections,
divisions, and centres.
3. You can enter data into a table in Design view.
4. Content Management System are popular in a large part because of their
ease of use; Content Management System operators need minimal technical
skills.
5. Apps developed for a specific mobile platform or device generally work on
any other device without modification.
6. A database is like a container because it can hold several types of objects,
including tables, forms, reports and report.
7. Most professionals have the experience, and skill sets to take a certification
exam without preparation.
8. Tables are composed of records.
9. Cookies are considered a type of spyware.
10.You cannot modify the size of a field in Design view.
11.Augmented reality apps do not require the use of special viewer devices to
display a 360 -degree images or videos.
12.Forms cannot be used to enter data in tables.
13.A power management app will turn off Internet connectivity when your
battery runs low.
14.Datasheet view is used to precisely determine the characteristics of each
field.
15.With spreadsheet software, user runs queries to calculate data.
16.Text, Number, and Currency are examples of data types.
17.Career planning websites are only useful to new job seekers.
18.Upskilling yourself through certification requires time and money.
19.Telecommuters typically works fewer hours than those who are physically at
work.
20.With batch processing, the computer processes each transaction as it is
entered.
21.Today’s technology allows technicians to diagnose and repair software
problems from a remote location.
22.The Query Design grid is where you define a query.
23.Hackers are individuals who want to attack computers but lack the knowledge
of computers and networks needed to do so.
24.A bot is a program that performs a repetitive task on a network.
25.Digital forensics involves the examination of a media, programs, data and log
files on computers, mobile devices, servers, networks.

You might also like