0% found this document useful (0 votes)
14 views11 pages

Inf1505 201 2018

This document contains the solutions for Assignment 01 for the course Introduction to Business Information Systems (INF1505) for Semester 1, detailing the due date, unique assignment number, and submission procedure. It includes 50 questions covering various topics in information systems, such as database management, security measures, and data processing. The assignment is crucial for examination admission, emphasizing the importance of submission.

Uploaded by

ashnay57
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views11 pages

Inf1505 201 2018

This document contains the solutions for Assignment 01 for the course Introduction to Business Information Systems (INF1505) for Semester 1, detailing the due date, unique assignment number, and submission procedure. It includes 50 questions covering various topics in information systems, such as database management, security measures, and data processing. The assignment is crucial for examination admission, emphasizing the importance of submission.

Uploaded by

ashnay57
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Assignment 01

Assignment 01 Solutions

Introduction to Business Information


Systems
INF1505

Semester 1

School of Computing

IMPORTANT INFORMATION:
This tutorial letter contains Assignment 01 solution for
Semester 1
Solutions to Assignment 01 TOTAL MARKS (50x2 = 100)]
Assignment 01 Semester 1
Due Date 20th March 2018
Unique Assignment number 860987
Study Material Chapters 1-7
Submission Procedure Mark-reading sheet or electronically via myUNISA
Number of Questions 50
WARNING: IF YOU DO NOT SUBMIT THIS ASSIGNMENT YOU WILL NOT BE
ALLOWED EXAMINATION ADMISSION!

Question 1

As an HRIS specialist at your local IT Company. What is your job description?


1. Aid in the development and testing of product designs, and often includes cad
2. Manage information about customers, past purchases, interests, and more
3. Controls information technology devices of the company such as wireless network devices
and other hardware
4. Manage one or more administrative human resources functions, such as maintaining and
managing employee benefits, schedules, and payroll

Question 2

You have taken a temporary position as an IT consultant for a large firm with a variety of
database solutions that you and your team are working to consolidate into one enterprise-wide
solution. You are currently in the process of gathering information about where things stand with
each of the individual database solutions. You need to speak with the person responsible for
creating the data dictionary. Who do you contact?

1. Database analyst
2. Data developer
3. Database administrator
4. Web analytics expert

Question 3

The purpose of an information system’s _____ component is generating the most useful type of
information for making decisions.
1. process
2. database
3. internal data
4. external data

Question 4

The four Ms of resources are .


1. management, motivation, manpower, and monitoring
2. materials, money, modeling, and monitoring

2
Assignment 01 Semester 1

3. manpower, machinery, materials, and money


4. manpower, monitoring, movement, and modeling

Question 5

The control programs managing computer hardware and software perform the ____ function to
control and prioritize tasks performed by the CPU.
1. Application management
2. Resource allocation
3. Data management
4. Job management

Question 6

The term RAID stands for .


1. random access for independent disks
2. redundant access for independent devices
3. random array of independent drives
4. redundant array of independent disks

Question 7

Future progress in _____ includes further development in natural language processing that
should make information systems easier to use.
1. artificial intelligence
2. computer literacy
3. personal computing power
4. computer criminals

Question 8

Microsoft Access is an example of _____ in an information system.


1. internal data
2. external data
3. database management system
4. knowledge base management system

Question 9

A ____ is the size of a character.


1. bit
2. byte
3. word
4. nibble

3
Question 10

An operating system (OS) is:


1. a set of programs for controlling and managing computer hardware and software.
2. a computer and all the software for managing network resources and offering services to a
network.
3. is a collection of disk drives used for fault tolerance, typically in large network systems.
4. the main circuit board containing connectors for attaching additional boards.

Question 11

memory, which is nonvolatile, holds data when the computer is off or during the course of
a program’s operation.
1. Secondary
2. Replicated
3. Open
4. Raw

Question 12

CD-ROMs and DVDs are examples of .


1. optical discs
2. main memory
3. magnetic tapes
4. RAM

Question 13

Managers could use a _____ to assess the effect on final product costs of a nine percent
increase in raw materials.
1. human resource information system
2. manufacturing information system
3. marketing information system
4. financial information system

Question 14

Which of the following is true of a database?


1. Complex requests can be difficult to handle.
2. More storage space is required.
3. Programs and data are interdependent.
4. More information can be generated from the same data.

Question 15

A data ____ stores definitions, such as data types for fields, default values, and validation rules
for data in each field.
1. mine
2. mart
4
Assignment 01 Semester 1

3. dictionary
4. warehouse

Question 16

The ____ in a database model defines the boundaries of a database, such as maximum and
minimum values allowed for a field.
1. data structure
2. file structure
3. set of integrity rules
4. set of operation rules

Question 17 (Ignore the question)

Which of the following is true of a flat file system?


1. Data management is improved.
2. Data redundancy is eliminated or minimized.
3. More sophisticated security measures cannot be used.
4. A variety of relationships among data can be easily maintained.

Question 18

Which of the following is a source of internal data?


1. Tax records
2. Sales records
3. Distribution networks
4. Economic indicators

Question 19

Business analytics uses ____ to support decision-making activities.


1. dashboards
2. query reports
3. data mining tools
4. OLAP

Question 20

A common type of _____ is WORM disc.


1. Magnetic storage
2. Optical storage
3. RAM
4. ROM

5
Question 21

In a data warehouse, ____ means collecting data from a variety of sources and converting it
into a format that can be used in transformation processing.
1. transformation
2. aggregation
3. extraction
4. loading

Question 22

Which of the following is NOT an advantage of virtual organizations:


1. The time needed to develop new products is increased.
2. Companies can respond to customers faster and more efficiently.
3. Products can be customized more to respond to customers’ needs.
4. Each participating company can focus on what it does best, thus improving the ability to
meet customers’ needs.

Question 23

_______ generated by Web server software, record a user’s actions on a Web site.
1. Viruses
2. Log files
3. Spam mails
4. Image maps

Question 24

Which of the following is a small text file that a web server stores on a user’s hard drive?
1. spike
2. cookie
3. worm
4. payload

Question 25

Grouping objects along with their attributes and methods into a class is called ______.
1. replication
2. allocation
3. encapsulation
4. normalization

Question 26

Replacing meetings over computer networks with actual face-to-face meetings is one of the
goals of green computing.
1. True
2. False
6
Assignment 01 Semester 1

Question 27

Dell, Microsoft, and Unisys Corporation created a partnership to design a voting system for
several U.S. states. This is an example of ____.
1. cybersquatting
2. the digital divide
3. a virtual organization
4. telecommuting

Question 28

In the context of the important concepts regarding Web and network privacy, _____ is a method
for binding all the parties to a contract.
1. phishing
2. cybersquatting
3. nonrepudiation
4. synchronous communication

Question 29

Job ____ occurs when skilled labor is eliminated by high technology or when a job is
downgraded from a skilled to a semiskilled or unskilled position.
1. reskilling
2. deskilling
3. Mobility
4. Divide

Question 30

Which of the following is a nonbiometric security measure?


1. firewalls
2. passwords
3. electronic trackers
4. signature analysis

Question 31

The following table shows a grid that can be used for assessing whether an action is legal
and/or ethical.
Legal Illegal
Ethical I II
Unethical III IV
Where would the following situation fall in the above table: You make two copies of a software
package you just bought and sell one to a friend?
1. Quadrant I
2. Quadrant II
3. Quadrant III
4. Quadrant IV
7
Question 32

In symmetric encryption, the same key is used to encrypt and decrypt the message.
1. True
2. False

Question 33

Level 3 security involves ____.


1. back-end systems
2. physical security
3. front-end servers
4. corporate networks

Question 34

Which of the following is considered an intentional threat?


1. Floods
2. User’s accidental deletion of data
3. Social engineering
4. Power outages

Question 35

The main function of the ____ model is to provide information on security incidents, including
information systems’ vulnerabilities, viruses, and malicious programs.
1. CIRC
2. CERT
3. Sarbanes-Oxley
4. McCumber cube

Question 36

Typically, an organization leases the media used for a VPN on a(n) ____ basis.
1. yearly
2. 10-year
3. monthly
4. as-needed

Question 37

____ are usually placed in front of a firewall and can identify attack signatures and trace
patterns.
1. Biometric security measures
2. Intrusion detection systems
3. Physical security measures
4. Proxy servers

8
Assignment 01 Semester 1

Question 38

The main advantage of asymmetric encryption is that it is faster and requires only a small
amount of processing power.
1. True
2. False

Question 39

In ____ processing, each department has its own computer for performing processing tasks.
1. decentralized
2. centralized
3. distributed
4. modular

Question 40

A hierarchical topology is also called a ____ topology.


1. layered
2. mixed
3. tree
4. vertical

Question 41

The Transmission Control Protocol (TCP) operates at the OSI model’s ____ layer.
1. Data link
2. Transport
3. Physical
4. Network

Question 42

The process of deciding which path the data takes on a network is called ____.
1. routing
2. roaming
3. divergence
4. convergence

Question 43

Within the ____ technique for wireless security, a user’s computer and the AP use a master key
to negotiate for a key that will be used for a session.
1. Wi-Fi Protected Access
2. Wi-Fi Protected Access 2
3. Wired Equivalent Privacy
4. Service Set Identifier

9
Question 44

In data communication, ____ refers to integrating voice, video, and data so that multimedia
information can be used for decision making.
1. spoofing
2. convergence
3. telepresence
4. teleprocessing

Question 45

Which of the following is true of the Internet?


1. It has a limited geographical scope.
2. It is usually faster than an intranet.
3. It has less security measures than an intranet.
4. It can be accessed by approved users only.

Question 46

Google.com, Bing.com, and Ask.com are examples of ____.


1. Directories
2. search engines
3. navigational tools
4. Web applications

Question 47

A(n) ____ is a journal or newsletter that is updated frequently and intended for the general
public.
1. podcast
2. RSS feed
3. blog
4. wiki

Question 48

Which of the following protocols is used for retrieving messages?


1. SMTP
2. POP
3. HTTP
4. VoIP

Question 49

Symmetric DSL usually has an upstream rate of ____ Mbps.


1. 0.5
2. 1.5
3. 24
4. 100
10
Assignment 01 Semester 1

Question 50

A blog is a journal or newsletter that is updated frequently and intended for the general public.
1. True
2. False

11

You might also like