Sample questions and answers for Prelim IPT - IPT2011-12

advertisement

IPT Preliminary Mid-course exam 2010 has:

15 multiple choice worth 1 mark each total 15

8 Questions worth varying indicated on paper marks each total 35

For 1.5 hours

Possible questions for Preliminary exams:

Multiple-choice questions

INTRODUCTION OT INFORMATION SYSTEMS

1.

Data entry operators are primarily involved in which information process? a.

Organising b.

Storing c.

Displaying d.

Collecting

ANSWER: D

2.

“I’m going to be late for school” is an example of (I), “The time is 9:25 AM” would be an example of (II) and “0925” would be (III). (I), (II) and (III) respectively could be best be replaced with the words: a.

Data, information, knowledge. b.

Information, knowledge, data c.

Knowledge, information, data d.

Knowledge, data, information

ANSWER: C

3.

Participants in an information system commonly include all of the following: a.

Managers, end-users, programmers, engineers and data entry operators b.

Direct users, indirect users, managers and data entry operators c.

Managers, direct users, system administrators, engineers and data entry operators d.

Managers, end=users, system administrators, network personnel and data entry operators.

ANSWER: C

4.

The purpose of an information system: a.

Is the reason for the system’s existence b.

Is to fulfil some need or needs c.

Should be clear and achievable d.

All of the above

ANSWER: D

5.

Activities that coordinate resources to achieve the system’s purpose are known as: a.

Information technologies b.

Information activities c.

Information resources d.

Information processes

ANSWER: D

6.

Which term defines the line between what is and what is not part of a system? a.

Users b.

Boundary c.

Information technology d.

Information processes

Set 1B

7.

A business that is unable to explain why they are collecting personal information is in breach of the: a.

Copyright Act 1968 b.

Occupational health and Safety act 2000 c.

Privacy Act 1988 d.

None of the above, they are just being unethical

ANSWER: C

8.

Passwords can be used to: a.

Increase security b.

Protect the privacy of sensitive information c.

Stop unauthorised copying of files d.

All of the above

ANSWER: D

9.

Restoring files after the complete failure of a file server can only happen if which of the following has occurred: a.

Anti-virus software was installed and regularly upgraded b.

All files have password protection c.

An audit trail is maintained by the system d.

Regular backups have been made

ANSWER: D

10.

Automation of many tasks traditionally undertaken by manual labour has resulted in: a.

High unemployment within the total population b.

A decline in jobs available within goods producing industries c.

An increase in jobs within knowledge and person based service industries d.

Manual labourers now working in knowledge and person based industries

ANSWER: B

11.

Ergonomics is concerned with: a.

Furniture design and placement b.

Reducing work place injuries c.

The total work environment d.

Ensuring OHS principles are enforced.

ANSWER: C

12.

For copyright law to apply, works must: a.

Display the copyright symbol © b.

Be copied and distributed for profit c.

Contain original ideas or information d.

None of the above

ANSWER: C

13.

The term ‘Global Knowledge Economy’ has arrived as a consequence of: a.

The increase in knowledge and person based service jobs compared to those in other industries b.

Automation within goods producing industries resulting in lowered manufacturing costs c.

The widespread implementation of computer-based technologies across the globe d.

The ability to code and share information across the world at high-speed and low coast

ANSWER: D

Chapter Review

14.

Information processes include: a.

Participants, data, information and information technology b.

Environment, purpose, resources and participants c.

Collecting, organising, analysing, storing, processing and displaying d.

Data, information and knowledge

ANSWER: C

15.

A system that is itself an integral part of another system is called a(n): a.

Information system b.

System resource c.

Sub-system d.

Information technology

ANSWER: C

16.

When assessing data quality, which of the following should be considered? a.

Accuracy, timeliness, accessibility b.

Privacy, security, copyright c.

Text, numbers, images, audio, video

ANSWER: A d.

Users, participants, developers

17.

Privacy of the individual is primarily concerned with: a.

Protecting an individual’s personal information b.

Ensuring all individuals have access to their personal information c.

Making sure personal data held is accurate d.

Enforcing the 10 National Privacy Principles specified in the Privacy Act 1988

ANSWER: A

18.

Systems that maintain an audit trail are doing so to ensure: a.

Fair and equitable access to information b.

All transactions can be traced to their sources c.

Copyright is respected at all times d.

Employee’s actions can be observed and monitored

ANSWER: B

19.

All information systems: a.

Contain participants, data/information and information technology b.

Process data into information; this is their primary purpose c.

Operate within an environment which influences, and is influenced, by the information system d.

All of the above

ANSWER: D

20.

Jack downloads some images from the web to include on a commercial website. Apparently, the images do not include any sort of copyright notice or license agreement.

Which of the following is true? a.

As there is no copyright mark, notice or license agreement; Jack is free to use the images as he pleases. b.

Images cannot be copyrighted, so it is legal for Jack to use the images c.

The images may or may not be covered by copyright, but as there is no copyright notice and the images were found on the web then it is reasonable to assume they are in the public domain. d.

Jack should assume the images are covered by copyright. It would be wise to contact the website and find out the copyright status of the images before using them.

ANSWER: D

DEVELOPING INFORMATION SYSTEMS

Set 10A

21.

A person who determines the requirements for a new system is called a:

ANSWER: A a.

Systems analyst b.

Developer c.

Programmer d.

Project manager

22.

An interview is completed: a.

In person b.

Over the phone c.

On paper d.

Either (a) or (b)

ANSWER: D

23.

Context diagrams are used when understanding the problem to: a.

Define how the requirements will be developed b.

Defined the data entering and leaving the existing system c.

Determine all the information processes used by the existing system d.

Identify how the data is transformed into information by the system

ANSWER: B

24.

Which of the following is true of all system requirements? a.

They must be verifiable b.

They specify information technology c.

They must describe the behaviour of the system d.

They must describe a user need

ANSWER: A

25.

Writing down each step a participant performs to complete a task is part of : a.

Developing a participant survey b.

Creating a system model c.

Ensuring tasks are completed d.

Task analysis

ANSWER: D

26.

A software application that is suitable for use within a new information solution will not be upgraded in the future. This will be considered when examining the solution’s: a.

Technical feasibility b.

Economic feasibility c.

Schedule feasibility d.

Operational feasibility

ANSWER: B

Free-response questions

INTRODUCTION OT INFORMATION SYSTEMS

Set 1A

1.

Make a list of all the different types of information technology you use every day. Which of these utilise computer-based technologies to operate?

ANSWER

Lists could include:

Personal computers – including hardware devices and software

Automatic Teller Machines (ATMs)

Electronic funds transfer point of sale (EFTPOS)

School attendance system

Library system

Automatic garage door

Mobile phones – including SMS, MMS

Presumably all will include computer-based technologies

2.

Think of the kitchen in your home as a system. What is its purpose? List all the resources used by this system? What processes are used in the kitchen?

ANSWER

The purpose of the kitchen system is to prepare meals. This system uses various resources such as oven, cook top, refrigerator, dishwasher, sink, microwave oven, plates, cutlery, glasses, cups, food, drink, dishwashing liquid, garbage bin, recipe books and people. These resources are used to perform processes such as cooking meals, serving meals, cleaning up, maintaining food, storing food and removing waste.

3.

Open a new document in a word processor with which you are familiar. Examine each of the menu items and classify each item as collecting, organising, analysing, storing and retrieving, processing, transmitting and receiving, or displaying.

ANSWER

Collecting – All items on the insert menu, paste

Organising – Open, save, save as, most items on the format menu.

Analysing – find, word count, spelling and grammar

Storing and retrieving – Open, save, save as ...

Processing – Spelling and grammar, replace

Transmitting and receiving – Open, save, save as ...

Displaying – Print, print preview, page setup, mail merge, most items on the format and view menu

Set 1B

4.

Consider each of the following scenarios. For each, describe suitable methods available for rectifying the situation: a.

A number of data entry operators are experiencing muscle strain, particularly in their wrists. b.

A software developer discovers that one of their products is being distributed illegally over the Internet. c.

You continue to receive spam mail from a company despite informing them to remove you from their mailing list. d.

A business continues to send you an invoice for products you never ordered or received. They are now threatening legal action.

ANSWER

(a) Alter the work routine so that operators perform other tasks apart from data entry – perhaps including rest breaks. Ensure the furniture and equipment is ergonomically sound and that operators know how to adjust the equipment correctly

(b) The software developer could ensure their product is secured using passwords that are only provided to licensed users. The software is covered by copyright and hence they could utilise the legal system to prosecute both the distributor and also those who download and use the product.

(c) The most common solution is to block all mail from the offending email address. You could check if the company has an information use policy to see if they are not complying.

Currently no legislation is in place to stop such spam mail, however the Australian government is considering introducing such measures. It is unlikely the new legislation will cover spam mail from other countries.

(d) This sounds like a data integrity error – a case of mistaken identity. It is up to the business to prove that you received the goods. It is not up to you to prove you did not. Under the

Privacy Act 1988 you are entitled to view all personal information held on you by the business. This information may well highlight the problem.

5.

A number of legal documents are discussed in the text. Make a list of these documents and briefly describe their purpose.

ANSWER

Privacy Act 1988 – Sets the standards organisations are required to meet when dealing with personal information.

Occupational Heals and Safety Act 2000, Occupational Health and Safety Regulations 2001 – Outline the rights and responsibilities of employers and employees in regard to workplace health and safety issues.

6.

Doctors hold much private information on each of their patients. It is therefore crucial that their patient files and record are kept secure and the information is used appropriately. List and describe a number of techniques suitable for ensuring this occurs.

ANSWER

Possible techniques include:

Passwords – to ensure only authorised users can access patient records

Firewalls – to protects against hackers

Data encryption – so data is unreadable should a breach occur.

Physical barriers – machines are physically locked away.

Policies for correct use and access to private information.

Procedures for ensuring patient records are only divulged to autrhorised persons and with the patient’s consent.

Chapter Review

7.

Define each of the following terms: a.

System b.

Information c.

Environment d.

Purpose e.

Information technology f.

Information processes

ANSWER:

(a) Any organised assembly of resources and processes united and regulated by interaction or interdependence to accomplish a common purpose.

(b) The meaning that a human assigns to data. Data is processed by information systems into information. Knowledge is acquitted when information is received.

(c) The circumstances and conditions that surround an information system. Everything that influences or is influenced by the system.

(d) The aim or objective of the system and they reason the system exists. The purpose fulfils the needs of those for whom the system is created.

(e) The hardware and software used by an information system to carry out its information processes.

(f) What needs to be done to transform the data into useful information? These actions coordinate and direct the system’s resources to achieve the system’s purpose.

8.

Describe three factors that should be considered when assessing the quality of data.

ANSWER

Accuracy: Ensuring the stored data matches its source. Accuracy can be improved using data validation checks as the data is collected. Accuracy can be verified using data verification checks at the time of collection and also at a later time to detect changes to the data source, such as changed phone numbers and addresses.

Timeliness: Changes to data should be reflected throughout the system and made available to other systems as soon as possible.

Accessibility: Data should be available and it should also be organised in such a way that it is readily usable to the system and other systems that process the data.

9.

Consider the following:

The gas company read each of their customer’s meters every 3 months.

These meter readings are used to calculate total consumption for the period and hence to generate accounts

In about 10% of cases it is not possible to read the customer’s meter. When this occurs a notice is sent to the customer requesting them to do a “self read” of the meter. If no response is received within 14 days then an estimate of consumption is made based on the previous year’s consumption

Sometimes a problem is revealed as a consequence of the meter reading. These problems are referred to the troubleshooting team for further investigation. Some examples of problems include:

 The reading is identical to the previous one, seemingly indicating there has been no consumption.

 The reading indicates consumption is radically different to previous years.

 The reading is excessively high. a.

Describe the data used by this system and the information generated by the system. b.

List the different groups of participants within this information system. Describe the tasks performed by each of these groups. c.

Each team of meter readers is allocated particular suburbs and towns. Their performance is monitored by head office in terms of total meters read and percentage of successfully read meters. Suggest possible problems that could emerge if performance is measured solely on these statistics.

ANSWER

(a) Data –Meter readings, customer self readings, customer name and address details, previous years consumption.

Information – Customer accounts, consumption estimates, referrals to troubleshooting team.

(b) Meter readers – physically read each customer’s meter.

Customers – when performing self read of meter.

Data entry operators – entering meter readings.

Other water company employees who initiate printing accounts, notices for self read, and referrals to trouble shooting team.

(c) Some areas have high-density housing whilst others will have much lower densities. It will take much longer to read each meter in low-density areas. The terrain will also affect the speed of meter reading. Hilly areas will be slower than flat areas. Also properties with security fences cannot be read unless someone is home, hence such areas are likely to have lower read percentages. On the hand, industrial areas will have high read percentages as they are open during the day when meter readers are working.

If no attempt is made to take into account issues such as those discussed above then some meter readers are likely to be unfairly reprimanded for poor performance.

DEVELOPING INFORMATION SYSTEMS

Set 10A

10.

Define each of the following terms: a.

Survey b.

Interview c.

Requirement d.

Gantt chart e.

Feasible f.

Systems analyst

ANSWER

(a) Surveys are a collection of questions in either paper or electronic form. Often the responses must be within a given range and are anonymous.

(b) Interviews are conducted either in person or by telephone. A series of questions is asked and the responses noted. Interviews commonly allow for more open ended responses.

(c) A verifiable feature, property or behaviour a system must have to achieve its purpose.

(d) A project management tools for scheduling and assigning tasks. A horizontal bar chart where each bar represents a task and the width of the bar indicates when the task commences and ends.

(e) Capable of being achieved using the available resources such that the system meets the requirements.

(f) A person who designs and manages the development of a new system.

11.

Describe strategies and techniques for determining and confirming all the requirements for a new information system.

ANSWER

Strategies and techniques include:

Determining needs by interviewing and/or surveying users, management and participants.

Task analysis whereby participants are observed performing the systems processes. Such observation helps to understand the existing system, the significance of different processes and identify areas that require improvement.

Based on the above the analyst formulates a list of needs which are agreed upon in consultation with the client.

The system analyst creates system models to describe the existing system and its interactions and data movements.

The needs are refined into verifiable requirements.

The list of requirements is developed in close consultation with the client and with ongoing input from system participants.

12.

Suggest types of information technology that could be used to assist in the delivery of surveys and interviews. Use specific examples to illustrate your responses.

Examples could include:

Word processors, DTP software and printers for creating and printing surveys.

Email software, database software and Internet connections for delivering surverys to respondents.

Database entry forms for collecting responses during telephone interviews and after face-toface interviews.

ANSWERS:

1.

D

Download