Inf1505 201 2018
Inf1505 201 2018
Assignment 01 Solutions
Semester 1
School of Computing
IMPORTANT INFORMATION:
This tutorial letter contains Assignment 01 solution for
Semester 1
Solutions to Assignment 01 TOTAL MARKS (50x2 = 100)]
Assignment 01 Semester 1
Due Date 20th March 2018
Unique Assignment number 860987
Study Material Chapters 1-7
Submission Procedure Mark-reading sheet or electronically via myUNISA
Number of Questions 50
WARNING: IF YOU DO NOT SUBMIT THIS ASSIGNMENT YOU WILL NOT BE
ALLOWED EXAMINATION ADMISSION!
Question 1
Question 2
You have taken a temporary position as an IT consultant for a large firm with a variety of
database solutions that you and your team are working to consolidate into one enterprise-wide
solution. You are currently in the process of gathering information about where things stand with
each of the individual database solutions. You need to speak with the person responsible for
creating the data dictionary. Who do you contact?
1. Database analyst
2. Data developer
3. Database administrator
4. Web analytics expert
Question 3
The purpose of an information system’s _____ component is generating the most useful type of
information for making decisions.
1. process
2. database
3. internal data
4. external data
Question 4
2
Assignment 01 Semester 1
Question 5
The control programs managing computer hardware and software perform the ____ function to
control and prioritize tasks performed by the CPU.
1. Application management
2. Resource allocation
3. Data management
4. Job management
Question 6
Question 7
Future progress in _____ includes further development in natural language processing that
should make information systems easier to use.
1. artificial intelligence
2. computer literacy
3. personal computing power
4. computer criminals
Question 8
Question 9
3
Question 10
Question 11
memory, which is nonvolatile, holds data when the computer is off or during the course of
a program’s operation.
1. Secondary
2. Replicated
3. Open
4. Raw
Question 12
Question 13
Managers could use a _____ to assess the effect on final product costs of a nine percent
increase in raw materials.
1. human resource information system
2. manufacturing information system
3. marketing information system
4. financial information system
Question 14
Question 15
A data ____ stores definitions, such as data types for fields, default values, and validation rules
for data in each field.
1. mine
2. mart
4
Assignment 01 Semester 1
3. dictionary
4. warehouse
Question 16
The ____ in a database model defines the boundaries of a database, such as maximum and
minimum values allowed for a field.
1. data structure
2. file structure
3. set of integrity rules
4. set of operation rules
Question 18
Question 19
Question 20
5
Question 21
In a data warehouse, ____ means collecting data from a variety of sources and converting it
into a format that can be used in transformation processing.
1. transformation
2. aggregation
3. extraction
4. loading
Question 22
Question 23
_______ generated by Web server software, record a user’s actions on a Web site.
1. Viruses
2. Log files
3. Spam mails
4. Image maps
Question 24
Which of the following is a small text file that a web server stores on a user’s hard drive?
1. spike
2. cookie
3. worm
4. payload
Question 25
Grouping objects along with their attributes and methods into a class is called ______.
1. replication
2. allocation
3. encapsulation
4. normalization
Question 26
Replacing meetings over computer networks with actual face-to-face meetings is one of the
goals of green computing.
1. True
2. False
6
Assignment 01 Semester 1
Question 27
Dell, Microsoft, and Unisys Corporation created a partnership to design a voting system for
several U.S. states. This is an example of ____.
1. cybersquatting
2. the digital divide
3. a virtual organization
4. telecommuting
Question 28
In the context of the important concepts regarding Web and network privacy, _____ is a method
for binding all the parties to a contract.
1. phishing
2. cybersquatting
3. nonrepudiation
4. synchronous communication
Question 29
Job ____ occurs when skilled labor is eliminated by high technology or when a job is
downgraded from a skilled to a semiskilled or unskilled position.
1. reskilling
2. deskilling
3. Mobility
4. Divide
Question 30
Question 31
The following table shows a grid that can be used for assessing whether an action is legal
and/or ethical.
Legal Illegal
Ethical I II
Unethical III IV
Where would the following situation fall in the above table: You make two copies of a software
package you just bought and sell one to a friend?
1. Quadrant I
2. Quadrant II
3. Quadrant III
4. Quadrant IV
7
Question 32
In symmetric encryption, the same key is used to encrypt and decrypt the message.
1. True
2. False
Question 33
Question 34
Question 35
The main function of the ____ model is to provide information on security incidents, including
information systems’ vulnerabilities, viruses, and malicious programs.
1. CIRC
2. CERT
3. Sarbanes-Oxley
4. McCumber cube
Question 36
Typically, an organization leases the media used for a VPN on a(n) ____ basis.
1. yearly
2. 10-year
3. monthly
4. as-needed
Question 37
____ are usually placed in front of a firewall and can identify attack signatures and trace
patterns.
1. Biometric security measures
2. Intrusion detection systems
3. Physical security measures
4. Proxy servers
8
Assignment 01 Semester 1
Question 38
The main advantage of asymmetric encryption is that it is faster and requires only a small
amount of processing power.
1. True
2. False
Question 39
In ____ processing, each department has its own computer for performing processing tasks.
1. decentralized
2. centralized
3. distributed
4. modular
Question 40
Question 41
The Transmission Control Protocol (TCP) operates at the OSI model’s ____ layer.
1. Data link
2. Transport
3. Physical
4. Network
Question 42
The process of deciding which path the data takes on a network is called ____.
1. routing
2. roaming
3. divergence
4. convergence
Question 43
Within the ____ technique for wireless security, a user’s computer and the AP use a master key
to negotiate for a key that will be used for a session.
1. Wi-Fi Protected Access
2. Wi-Fi Protected Access 2
3. Wired Equivalent Privacy
4. Service Set Identifier
9
Question 44
In data communication, ____ refers to integrating voice, video, and data so that multimedia
information can be used for decision making.
1. spoofing
2. convergence
3. telepresence
4. teleprocessing
Question 45
Question 46
Question 47
A(n) ____ is a journal or newsletter that is updated frequently and intended for the general
public.
1. podcast
2. RSS feed
3. blog
4. wiki
Question 48
Question 49
Question 50
A blog is a journal or newsletter that is updated frequently and intended for the general public.
1. True
2. False
11