Uploaded by Abhishek Prasad

IS121 T2 Solutions S12019.pdf

advertisement
University of the South Pacific
School of Computing, Information and
Mathematical Sciences
IS121 – Introduction to Information Systems
Semester 1 2019
Short Test Two
________________
First Name:
________________
Last Name:
________________
Tutorial Day:
________________
Tutorial Time:
________________
ar stu
ed d
vi y re
aC s
o
ou urc
rs e
eH w
er as
o.
co
m
Student ID:
Possible Marks: 50
Weight: 7.5%
Time Allowed: 50 minutes
Pages: 10 (including this page)
Instructions
~GOOD LUCK~
sh
Th
is
1. All questions are compulsory.
2. Write answers to multiple choice questions in the space provided beside the question
itself.
3. For all other questions, use the space provided to write out your answers.
4. Use the spare blank page at the end if you need an extra page.
This study sourceIS121
was downloaded
by 100000797139299
- Semester
1 2019 from CourseHero.com on 05-18-2021 22:37:15 GMT -05:00
https://www.coursehero.com/file/68105304/IS121-T2-Solutions-S12019pdf/
Page 1 of 9
Section A: Multiple Choice
Instructions:


(15marks)
Write answers to multiple choice questions in the space provided beside the
question.
There is only one possible answer for each question.
____
1. The first digital computers were built during World War II for ____.
a. census taking
c. communication
b. code breaking
d. troop placement
____
2. ____ tools cloak a person’s identity online.
a. Anonymizer
c. ID free
b. Free ID
d. Cloaking
____
3. Storage is typically expressed as ____.
a. bits
b. bytes
ar stu
ed d
vi y re
aC s
o
ou urc
rs e
eH w
er as
o.
co
m
c. hertz
d. none of the above
4. The ____ houses all essential chips and provides connecting circuitry between them.
a. system board
c. circuit breaker
b. housing structure
d. chip set
____
5. In terms of an authentication protocol, the phrase ‘something a person is’ refers to a(n)
____.
a. password
c. biometric device
b. ID card
d. none of the above
____
6. Overclocking is a technique for increasing the speed of a computer component, such as
____. It can be very risky.
a. the processor
c. memory
b. a graphics card
d. all of the above
____
7. Dot pitch is the distance in millimeters between like-colored ____ the small dots of light
that form an image.
a. pixels
c. points
b. picas
d. icons
____
8. Word ____ determines how your text flows from line to line by automatically moving
words down to the next line as you reach the right margin in a word processing
document.
a. placement
c. format
b. wrap
d. authoring
sh
Th
is
____
This study sourceIS121
was downloaded
by 100000797139299
- Semester
1 2019 from CourseHero.com on 05-18-2021 22:37:15 GMT -05:00
https://www.coursehero.com/file/68105304/IS121-T2-Solutions-S12019pdf/
Page 2 of 9
ar stu
ed d
vi y re
aC s
o
ou urc
rs e
eH w
er as
o.
co
m
Figure 1
____
9. The item shown in the accompanying figure 1 is ____.
a. purchased separately from the software
b. really pirated software
c. displayed on-screen when you first install software
d. licensed only to as many as one dozen separate computers
At the ACME Widget Company, the computers have started behaving weirdly.
Chris noticed that his directory had some files that he didn’t remember putting on his
computer. Lesley noticed her computer was beginning to run very slowly, and Kim
realized she was getting replies to emails she had not sent. The owner of the ACME
Widget Company has contacted you to see if their company might have a computer
security problem.ACME Widget Company is concerned it may have a ____, which is a
self-replicating program designed to carry out some unauthorized activity on a victim’s
computer.
sh
Th
____11.
is
____ 10. ____ is typically available as a trial version.
a. Freeware
c. Demoware
b. Open source software
d. Shareware
a. virus
b. worm
c. Trojan horse
d. bot
This study sourceIS121
was downloaded
by 100000797139299
- Semester
1 2019 from CourseHero.com on 05-18-2021 22:37:15 GMT -05:00
https://www.coursehero.com/file/68105304/IS121-T2-Solutions-S12019pdf/
Page 3 of 9
____ 12. A Linux ____ contains the Linux kernel, system utilities, GUI, applications, and
installation routine.
a. set
c. distribution
b. group
d. push
____ 13. An optional file identifier that is separated from a main file name by a period is a ____.
a. file convention
c. file path
b. file extension
d. file folder
____ 14. A group of sectors is called a ____.
a. file system
b. cluster
c. track
d. folder
Cindy is trying to understand operating systems. You tell her you just took an OS course
and you will be glad to answer any of her questions.
sh
Th
is
ar stu
ed d
vi y re
aC s
o
ou urc
rs e
eH w
er as
o.
co
m
____ 15. Cindy wants to know where the kernel is stored. You tell her that it stays in ____ all the
time your computer is on.
a. RAM
c. boot mode
b. ROM
d. restore mode
This study sourceIS121
was downloaded
by 100000797139299
- Semester
1 2019 from CourseHero.com on 05-18-2021 22:37:15 GMT -05:00
https://www.coursehero.com/file/68105304/IS121-T2-Solutions-S12019pdf/
Page 4 of 9
Section B – Completion
(15 marks)
Complete each sentence or statement by writing the missing word or words in the space
given on the special answer booklet by choosing one work from the word list. Each
question in this section is worth 1 mark.
Word List:
capacitor, code, pits, operand, processes, RAM, eight , Program, ROM, attack, sectors,
proprietary, component, tracks, crash, suite, algorithm, spyware, security, medium,
application, widget, operating system, requirements, Safe mode, machine, binary,
resolution, formatting, Word, argument, paradigm
1. In RAM, a microscopic electronic part called a(n) ______ capacitor ______________
is used to hold a bit.
In RAM, a group of ________
form a byte.
eight____________ bits is grouped together to
3.
The instructions that your computer performs when it is first turned on are
permanently stored in _____ ROM _______________.
4.
A storage ____________ medium ________ is the disk, CD, DVD, tape, paper, or
other substance that contains data.
5.
A(n) head ____________ crash ________ can be triggered by jarring the hard disk
while it is in use.
ar stu
ed d
vi y re
aC s
o
ou urc
rs e
eH w
er as
o.
co
m
2.
6. In the accompanying figure 2, the dark, crater-like spots on the CD surface are called
Figure 2
________ Safe mode ____________ is a limited version of Windows that allows you
to use your mouse, screen, and keyboard, but no other peripherals.
sh
7.
Th
is
_______ pits _____________.
8.
The type of system software that acts as the master controller for all activities that
take place within a computer system is a(n) ____ operating
system________________.
9.
Activities competing for the attention of your computer’s microprocessor are called
_____ processes _______________.
This study sourceIS121
was downloaded
by 100000797139299
- Semester
1 2019 from CourseHero.com on 05-18-2021 22:37:15 GMT -05:00
https://www.coursehero.com/file/68105304/IS121-T2-Solutions-S12019pdf/
Page 5 of 9
10. The ability to use one computer to simulate the hardware and software of another is
called a virtual ______ machine ______________.
11. The process of creating equivalent electronic storage bins on a disk is ________
formatting ____________.
12. A way of conceptualizing and structuring the tasks a computer performs is a
programming _______ paradigm _____________.
13. A prewritten module typically designed to accomplish a specific task is a(n) ____
component _______________.
14. A set of steps for carrying out a task that can be written down and implemented is
a(n) _____________ algorithm _______.
sh
Th
is
ar stu
ed d
vi y re
aC s
o
ou urc
rs e
eH w
er as
o.
co
m
15. In Prolog, a(n) ___ argument _________________ represents one of the main
subjects that a fact describes.
This study sourceIS121
was downloaded
by 100000797139299
- Semester
1 2019 from CourseHero.com on 05-18-2021 22:37:15 GMT -05:00
https://www.coursehero.com/file/68105304/IS121-T2-Solutions-S12019pdf/
Page 6 of 9
Section C – Mixed Questions
(20 marks)
1. Explain the differences in installing local software, portable software, and Web apps.
[3 Marks]
ar stu
ed d
vi y re
aC s
o
ou urc
rs e
eH w
er as
o.
co
m
Local software is installed on the hard disk; under Windows it is included in the Windows
Registry.
Portable software can reside on the hard disk or any removable media (such as a USB flash
drive or CD), but it does not require any entries in the Windows Registry.
Web apps run from a Web server, usually within a browser, though some Web apps require
a local client.
1 mark each
2. What are authentication protocols and give some reasons why we need these protocols?
[2 Marks]
Authentication protocol refers to any method that verifies a person’s claimed identity.
(1m)
These methods are based on something the person knows, something the person has or
processes, or something about the person. (1m)
3. Describe five tasks for which you must interact directly with the operating system.
[5 Marks]
Launching (starting) a program.
Managing files: such as to copy, delete, move, or rename
Getting help
Customizing the user interface (from the Control Panel): such as the icons that appear on your
desktop, or the color and resolution of your desktop
5. Configuring equipment: such as installing a printer driver, or installing a modem
sh
Th
is
1.
2.
3.
4.
This study sourceIS121
was downloaded
by 100000797139299
- Semester
1 2019 from CourseHero.com on 05-18-2021 22:37:15 GMT -05:00
https://www.coursehero.com/file/68105304/IS121-T2-Solutions-S12019pdf/
Page 7 of 9
4. Describe the advantages and disadvantages of magnetic storage, optical storage, and
solid state storage using criteria such as versatility, durability, capacity, access
time, and transfer rate.
[4 Marks]
Disadvantages
Susceptible to environmental factors such as
dust, heat and magnetic fields; not very
durable
Optical
Storage
Less susceptible to environmental
damage, so more durable than
magnetic storage
Relatively slow when making changes.
Perhaps slightly more expensive; capacity is
typically lower than magnetic storage;
access time and transfer rate somewhat
slower than for magnetic media
Solid
state
Storage
Potentially faster access to data than
magnetic or optical storage, durable,
versatile as it can be easily plugged
into any computer with a USB port
Magnetic
Storage
ar stu
ed d
vi y re
aC s
o
ou urc
rs e
eH w
er as
o.
co
m
Advantages
Can be easily changed or deleted,
thus very flexible; fast transfer rate
and access time
Lower capacity than some hard disks,; more
costly than other storage types
4. Illustrate the following pseudocode using a flowchart
INPUT age
[5 Marks]
WHILE age < 18
is
DISPLAY “Can Not Vote”
Th
INPUT age
END WHILE
sh
DISPLAY “Can Vote”
This study sourceIS121
was downloaded
by 100000797139299
- Semester
1 2019 from CourseHero.com on 05-18-2021 22:37:15 GMT -05:00
https://www.coursehero.com/file/68105304/IS121-T2-Solutions-S12019pdf/
Page 8 of 9
ar stu
ed d
vi y re
aC s
o
ou urc
rs e
eH w
er as
o.
co
m
is
Th
sh
Spare blank page
END OF EXAM
This study sourceIS121
was downloaded
by 100000797139299
- Semester
1 2019 from CourseHero.com on 05-18-2021 22:37:15 GMT -05:00
https://www.coursehero.com/file/68105304/IS121-T2-Solutions-S12019pdf/
Powered by TCPDF (www.tcpdf.org)
Page 9 of 9
Download