University of the South Pacific School of Computing, Information and Mathematical Sciences IS121 – Introduction to Information Systems Semester 1 2019 Short Test Two ________________ First Name: ________________ Last Name: ________________ Tutorial Day: ________________ Tutorial Time: ________________ ar stu ed d vi y re aC s o ou urc rs e eH w er as o. co m Student ID: Possible Marks: 50 Weight: 7.5% Time Allowed: 50 minutes Pages: 10 (including this page) Instructions ~GOOD LUCK~ sh Th is 1. All questions are compulsory. 2. Write answers to multiple choice questions in the space provided beside the question itself. 3. For all other questions, use the space provided to write out your answers. 4. Use the spare blank page at the end if you need an extra page. This study sourceIS121 was downloaded by 100000797139299 - Semester 1 2019 from CourseHero.com on 05-18-2021 22:37:15 GMT -05:00 https://www.coursehero.com/file/68105304/IS121-T2-Solutions-S12019pdf/ Page 1 of 9 Section A: Multiple Choice Instructions: (15marks) Write answers to multiple choice questions in the space provided beside the question. There is only one possible answer for each question. ____ 1. The first digital computers were built during World War II for ____. a. census taking c. communication b. code breaking d. troop placement ____ 2. ____ tools cloak a person’s identity online. a. Anonymizer c. ID free b. Free ID d. Cloaking ____ 3. Storage is typically expressed as ____. a. bits b. bytes ar stu ed d vi y re aC s o ou urc rs e eH w er as o. co m c. hertz d. none of the above 4. The ____ houses all essential chips and provides connecting circuitry between them. a. system board c. circuit breaker b. housing structure d. chip set ____ 5. In terms of an authentication protocol, the phrase ‘something a person is’ refers to a(n) ____. a. password c. biometric device b. ID card d. none of the above ____ 6. Overclocking is a technique for increasing the speed of a computer component, such as ____. It can be very risky. a. the processor c. memory b. a graphics card d. all of the above ____ 7. Dot pitch is the distance in millimeters between like-colored ____ the small dots of light that form an image. a. pixels c. points b. picas d. icons ____ 8. Word ____ determines how your text flows from line to line by automatically moving words down to the next line as you reach the right margin in a word processing document. a. placement c. format b. wrap d. authoring sh Th is ____ This study sourceIS121 was downloaded by 100000797139299 - Semester 1 2019 from CourseHero.com on 05-18-2021 22:37:15 GMT -05:00 https://www.coursehero.com/file/68105304/IS121-T2-Solutions-S12019pdf/ Page 2 of 9 ar stu ed d vi y re aC s o ou urc rs e eH w er as o. co m Figure 1 ____ 9. The item shown in the accompanying figure 1 is ____. a. purchased separately from the software b. really pirated software c. displayed on-screen when you first install software d. licensed only to as many as one dozen separate computers At the ACME Widget Company, the computers have started behaving weirdly. Chris noticed that his directory had some files that he didn’t remember putting on his computer. Lesley noticed her computer was beginning to run very slowly, and Kim realized she was getting replies to emails she had not sent. The owner of the ACME Widget Company has contacted you to see if their company might have a computer security problem.ACME Widget Company is concerned it may have a ____, which is a self-replicating program designed to carry out some unauthorized activity on a victim’s computer. sh Th ____11. is ____ 10. ____ is typically available as a trial version. a. Freeware c. Demoware b. Open source software d. Shareware a. virus b. worm c. Trojan horse d. bot This study sourceIS121 was downloaded by 100000797139299 - Semester 1 2019 from CourseHero.com on 05-18-2021 22:37:15 GMT -05:00 https://www.coursehero.com/file/68105304/IS121-T2-Solutions-S12019pdf/ Page 3 of 9 ____ 12. A Linux ____ contains the Linux kernel, system utilities, GUI, applications, and installation routine. a. set c. distribution b. group d. push ____ 13. An optional file identifier that is separated from a main file name by a period is a ____. a. file convention c. file path b. file extension d. file folder ____ 14. A group of sectors is called a ____. a. file system b. cluster c. track d. folder Cindy is trying to understand operating systems. You tell her you just took an OS course and you will be glad to answer any of her questions. sh Th is ar stu ed d vi y re aC s o ou urc rs e eH w er as o. co m ____ 15. Cindy wants to know where the kernel is stored. You tell her that it stays in ____ all the time your computer is on. a. RAM c. boot mode b. ROM d. restore mode This study sourceIS121 was downloaded by 100000797139299 - Semester 1 2019 from CourseHero.com on 05-18-2021 22:37:15 GMT -05:00 https://www.coursehero.com/file/68105304/IS121-T2-Solutions-S12019pdf/ Page 4 of 9 Section B – Completion (15 marks) Complete each sentence or statement by writing the missing word or words in the space given on the special answer booklet by choosing one work from the word list. Each question in this section is worth 1 mark. Word List: capacitor, code, pits, operand, processes, RAM, eight , Program, ROM, attack, sectors, proprietary, component, tracks, crash, suite, algorithm, spyware, security, medium, application, widget, operating system, requirements, Safe mode, machine, binary, resolution, formatting, Word, argument, paradigm 1. In RAM, a microscopic electronic part called a(n) ______ capacitor ______________ is used to hold a bit. In RAM, a group of ________ form a byte. eight____________ bits is grouped together to 3. The instructions that your computer performs when it is first turned on are permanently stored in _____ ROM _______________. 4. A storage ____________ medium ________ is the disk, CD, DVD, tape, paper, or other substance that contains data. 5. A(n) head ____________ crash ________ can be triggered by jarring the hard disk while it is in use. ar stu ed d vi y re aC s o ou urc rs e eH w er as o. co m 2. 6. In the accompanying figure 2, the dark, crater-like spots on the CD surface are called Figure 2 ________ Safe mode ____________ is a limited version of Windows that allows you to use your mouse, screen, and keyboard, but no other peripherals. sh 7. Th is _______ pits _____________. 8. The type of system software that acts as the master controller for all activities that take place within a computer system is a(n) ____ operating system________________. 9. Activities competing for the attention of your computer’s microprocessor are called _____ processes _______________. This study sourceIS121 was downloaded by 100000797139299 - Semester 1 2019 from CourseHero.com on 05-18-2021 22:37:15 GMT -05:00 https://www.coursehero.com/file/68105304/IS121-T2-Solutions-S12019pdf/ Page 5 of 9 10. The ability to use one computer to simulate the hardware and software of another is called a virtual ______ machine ______________. 11. The process of creating equivalent electronic storage bins on a disk is ________ formatting ____________. 12. A way of conceptualizing and structuring the tasks a computer performs is a programming _______ paradigm _____________. 13. A prewritten module typically designed to accomplish a specific task is a(n) ____ component _______________. 14. A set of steps for carrying out a task that can be written down and implemented is a(n) _____________ algorithm _______. sh Th is ar stu ed d vi y re aC s o ou urc rs e eH w er as o. co m 15. In Prolog, a(n) ___ argument _________________ represents one of the main subjects that a fact describes. This study sourceIS121 was downloaded by 100000797139299 - Semester 1 2019 from CourseHero.com on 05-18-2021 22:37:15 GMT -05:00 https://www.coursehero.com/file/68105304/IS121-T2-Solutions-S12019pdf/ Page 6 of 9 Section C – Mixed Questions (20 marks) 1. Explain the differences in installing local software, portable software, and Web apps. [3 Marks] ar stu ed d vi y re aC s o ou urc rs e eH w er as o. co m Local software is installed on the hard disk; under Windows it is included in the Windows Registry. Portable software can reside on the hard disk or any removable media (such as a USB flash drive or CD), but it does not require any entries in the Windows Registry. Web apps run from a Web server, usually within a browser, though some Web apps require a local client. 1 mark each 2. What are authentication protocols and give some reasons why we need these protocols? [2 Marks] Authentication protocol refers to any method that verifies a person’s claimed identity. (1m) These methods are based on something the person knows, something the person has or processes, or something about the person. (1m) 3. Describe five tasks for which you must interact directly with the operating system. [5 Marks] Launching (starting) a program. Managing files: such as to copy, delete, move, or rename Getting help Customizing the user interface (from the Control Panel): such as the icons that appear on your desktop, or the color and resolution of your desktop 5. Configuring equipment: such as installing a printer driver, or installing a modem sh Th is 1. 2. 3. 4. This study sourceIS121 was downloaded by 100000797139299 - Semester 1 2019 from CourseHero.com on 05-18-2021 22:37:15 GMT -05:00 https://www.coursehero.com/file/68105304/IS121-T2-Solutions-S12019pdf/ Page 7 of 9 4. Describe the advantages and disadvantages of magnetic storage, optical storage, and solid state storage using criteria such as versatility, durability, capacity, access time, and transfer rate. [4 Marks] Disadvantages Susceptible to environmental factors such as dust, heat and magnetic fields; not very durable Optical Storage Less susceptible to environmental damage, so more durable than magnetic storage Relatively slow when making changes. Perhaps slightly more expensive; capacity is typically lower than magnetic storage; access time and transfer rate somewhat slower than for magnetic media Solid state Storage Potentially faster access to data than magnetic or optical storage, durable, versatile as it can be easily plugged into any computer with a USB port Magnetic Storage ar stu ed d vi y re aC s o ou urc rs e eH w er as o. co m Advantages Can be easily changed or deleted, thus very flexible; fast transfer rate and access time Lower capacity than some hard disks,; more costly than other storage types 4. Illustrate the following pseudocode using a flowchart INPUT age [5 Marks] WHILE age < 18 is DISPLAY “Can Not Vote” Th INPUT age END WHILE sh DISPLAY “Can Vote” This study sourceIS121 was downloaded by 100000797139299 - Semester 1 2019 from CourseHero.com on 05-18-2021 22:37:15 GMT -05:00 https://www.coursehero.com/file/68105304/IS121-T2-Solutions-S12019pdf/ Page 8 of 9 ar stu ed d vi y re aC s o ou urc rs e eH w er as o. co m is Th sh Spare blank page END OF EXAM This study sourceIS121 was downloaded by 100000797139299 - Semester 1 2019 from CourseHero.com on 05-18-2021 22:37:15 GMT -05:00 https://www.coursehero.com/file/68105304/IS121-T2-Solutions-S12019pdf/ Powered by TCPDF (www.tcpdf.org) Page 9 of 9