We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5
Test 4: 21 October 2024
SUBJECT : INFORMATION SYSTEMS 1 Extended year 2
SUBJECT CODE : IS15WOB QUALIFICATION : DIPLOMA IN ICT IN APPLICATION DEVELOPMENT
EXAMINERS : MS. M. MOKOKA
MODERATOR : Dr. K. Koranteng
DURATION : 1 hour and 20 minutes MARKS : 50 NUMBER OF PAGES : 5 (incl. cover page)
INSTRUCTIONS:
DO NOT TURN THE PAGE OVER UNTIL TOLD TO DO SO!!!!!
No student is allowed to borrow equipment from another student Questions must be referred to the invigilator or subject lecturer only All questions should be answered on the answer sheet provided Smartphones must be switched off or on silent (not vibrate) Question 1 [22 MARKS] Multiple Choice – choose one corresponding correct answer 1. A(n) ________ refers to the combination of hardware, software, data transformation, people, and procedures collaborating to generate information and knowledge. A. Computer system B. Knowledge system C. Information systems D. Database system 2. Which of the following is not a type of Microsoft access database object? A. Table B. Forms C. Worksheet D. Macros 3. Which type of information, when free and mistaken, can result in inaccurate decisions? A. Accessible B. Organised C. Timely D. Accurate 4. ______________ is not a valid data type in MS Access. A. Auto number B. Currency C. Memo D. Picture 5. A(n) _________ integrates with the information flow across an organisation to manage and coordinate the ongoing activities of the enterprise. A. Manager B. Environment C. Transactional Processing Systems D. Enterprise Resource Planning 6. What is the maximum length a text field can be? A. 175 B. 64 C. 255 D. 265 7. In Access, ___________ are used to store data. A. Form B. Query C. Report D. Table 8. Any system or systems that interact with information systems to aid decision- makers in addressing ill-structured problems by providing analytical models and access to databases. A. Decision making B. Systematic C. Cognitive D. Decision support systems 9. A(n) _________ enables and manages the publishing, modification, organisation, and access of various forms of documents and other files. A. Management Information System B. Document Management System C. Expert Systems D. Content Management System 10.Which tool do you use to create a query object? A. Table query wizard B. Simple query wizard C. Simple filer wizard D. Database wizard 11.Database access levels are specified so as to define who can access what in a database, it is identified through A. User ID B. Password C. Status D. All of these 12.Listing of the names and addresses of all the employees for an organisation would be an example of a ___________ report. A. Detailed B. Summary C. Contacts D. None of the above 13.The checking operation performed on input data is called the A. Control of data B. Validation of data C. Cross check D. Verification of data 14.Management information systems will enhance the ___________. A. Facilitate the creation and sharing of documents that assist in daily office operations. B. Capture and replicate the expertise of a skilled problem solver. C. Utilise transaction data to generate the information required by managers for effective business management D. None of the options mentioned above 15.This form displays multiple records, one per row, in the form window A. Justified B. Columnar C. Tabular D. Datasheet 16.What is personal data? A. Information that relates to a specific person B. It cannot be accessed by unauthorised persons C. Both A and B D. None of the above mentioned 17.The following work together to create an effective information system, except – A. Data B. People C. Procedures D. Organization 18.When sensitive data falls into the hands of someone who is unauthorised persons, it is A. Data breach B. Data Access C. Data Control D. None of the above 19.The columns in a MS Access table are called as _______________ A. Fields B. Macro C. Columns D. Records 20.A(n) _______uses analytics and other Big Data techniques to interpret a company’s data from a variety of sources to better understand its performance, make recommendations for improvement, and predict future outcomes. A. Data Scientist B. Data Administrator C. System Analyst D. IT Consultant 21.To create queries in MS Access A. You can drag and drop fields on query builders B. You can type the SQL command in SQL view C. You can use query wizard or design view D. All the above 22.Information privacy, Individual privacy and communication privacy is the three pillars of: A. Digital integrity B. Digital protection C. Digital secrecy D. Digital privacy 23.A(n)________ is an information system that captures and knowledge of human experts and then imitates human reasoning and decision making. A. Expert Systems B. Decision Support Systems C. Artificial Intelligent D. Robotics 24.The data on the hard drive were erased by a corrupted file that had been attached to an email message. Which software would be used to prevent this? A. Productivity B. Utility C. Virus checker D. Encryption 25.The most secure model of signatures used in information systems is____________. A. Digital signature B. Electronic signature C. Digitized signature D. There is no difference in the level of security between these models Question 2 [22 MARKS] State whether the following are True or False. 1. Accessible information has meaning to the person who receives it. 2. A typical organization consists of a wide variety of departments, sections, divisions, and centres. 3. You can enter data into a table in Design view. 4. Content Management System are popular in a large part because of their ease of use; Content Management System operators need minimal technical skills. 5. Apps developed for a specific mobile platform or device generally work on any other device without modification. 6. A database is like a container because it can hold several types of objects, including tables, forms, reports and report. 7. Most professionals have the experience, and skill sets to take a certification exam without preparation. 8. Tables are composed of records. 9. Cookies are considered a type of spyware. 10.You cannot modify the size of a field in Design view. 11.Augmented reality apps do not require the use of special viewer devices to display a 360 -degree images or videos. 12.Forms cannot be used to enter data in tables. 13.A power management app will turn off Internet connectivity when your battery runs low. 14.Datasheet view is used to precisely determine the characteristics of each field. 15.With spreadsheet software, user runs queries to calculate data. 16.Text, Number, and Currency are examples of data types. 17.Career planning websites are only useful to new job seekers. 18.Upskilling yourself through certification requires time and money. 19.Telecommuters typically works fewer hours than those who are physically at work. 20.With batch processing, the computer processes each transaction as it is entered. 21.Today’s technology allows technicians to diagnose and repair software problems from a remote location. 22.The Query Design grid is where you define a query. 23.Hackers are individuals who want to attack computers but lack the knowledge of computers and networks needed to do so. 24.A bot is a program that performs a repetitive task on a network. 25.Digital forensics involves the examination of a media, programs, data and log files on computers, mobile devices, servers, networks.
Knight's Microsoft Business Intelligence 24-Hour Trainer: Leveraging Microsoft SQL Server Integration, Analysis, and Reporting Services with Excel and SharePoint