mmis 1208 - University of Technology, Mauritius

advertisement
Diploma in Financial Management with Public
Finance
Cohort: DFM/09/PT – Year 1
Examinations for 2009 Semester I
MODULE: ICT IN ORGANISATION
MODULE CODE: MMIS 1208
Duration: 2 Hours
Instructions to Candidates:
1.
This question paper consists of Section A, Section B and
Section C.
2.
All questions from Section A and Section B are compulsory.
3.
Answer any three questions from Section C.
4.
Always start a new question on a fresh page.
5.
Total Marks: 100
This question paper contains 6 questions and 9 pages.
Page 1 of 9
SBMF9
SECTION A: COMPULSORY
QUESTION 1:MCQ (25 MARKS)
1. Which of the following is part of being computer literate?
A. Avoiding hackers and viruses
B. Protecting your computer from being stolen
C. Being able to build a computer
D. All of the above
2. In Nuclear Power plants, delicate and dangerous operations are done by manipulating
devices through computers instead of manually. This technology is known as:
A. forecasting.
B. computer forensics.
C. simulation.
D. robotics.
3. Computers are very good at _____________ data into information.
A. making
B. producing
C. processing
D. entering
4. The _____________ language consists of just two digits: 0 and 1.
A. computer programming
B. binary
C. base 10
D. decimal
5.The box that contains the central electronic components of the computer is the:
A. motherboard.
B. system unit.
C. peripheral unit.
D. input unit.
Page 2 of 9
SBMF9
6.Software that runs the computer and coordinates instructions is called:
A. application software.
B. system software.
C. device software.
D. utility software.
7.In a spreadsheet, the columns and a rows form individual boxes called:
A. intersects.
B. addresses.
C. worksheets.
D. cells.
8.Which type of software is used at colleges to keep track of student records?
A. system software
B. presentation software
C. database software
D. word-processing software
9.CD ripping refers to:
A. stealing songs off the Internet.
B. encoding CDs to MP3 format.
C. creating your own CDs from your MP3 collection.
D. erasing content on a CD.
10.Which of the following was the first operating system installed in personal computers?
A. Symbian OS
B. Microsoft Windows
C. Linux
D. MS-DOS
Page 3 of 9
SBMF9
11. C: My Documents\Spring 2007\CIS 101\Term Paper\Computer Technology is an
example of a:
A. file extension.
B. file trail.
C. file list.
D. file path.
12.The greatest nonvolatile storage capacity in the computer system is found in the:
A. CPU.
B. RAM.
C. hard disk.
D. cache.
13.____________ are fast becoming the most preferred means of portable storage.
A. CDs
B. DVDs
C. Floppy disks
D. Flash drives
14.Before upgrading your video subsystem, you should evaluate all of the following
EXCEPT:
A. monitor type.
B. monitor size.
C. video card memory.
D. Dolby digital compatibility.
15.The most common port on new computers today is the ____________ port.
A. serial
B. parallel
C. Universal Serial Bus
D. MIDI
Page 4 of 9
SBMF9
16.A computer network is defined as two or more computers connected via
____________________ so that they can communicate with each other.
A. the Internet
B. software
C. hardware
D. software and hardware
17. Which transmission media is able to transmit data the fastest?
A. Twisted pair cable
B. Coaxial cable
C. Fiber optic cable
D. Wireless
18. Public places at which you can wirelessly connect to the Internet are known as:
A. links.
B. hotspots.
C. wired spots.
D. gateways.
19.____________ was put into use in 1945 and took up 1,800 square feet of floor space.
A. PNG
B. ARPA
C. DOS
D. ENIAC
20. ALU stands for:
A. Arithmetic Logic Unit.
B. Adding Logic and Usability.
C. Alter, Load, and Use.
D. Alternate Load Usage.
Page 5 of 9
SBMF9
21.The Internet is:
A. an internal communication system for a business.
B. a large network of networks.
C. a communication system for the U.S. government.
D. the same as the Web.
22. All of the following are ways to communicate on the Internet EXCEPT:
A. instant messaging.
B. e-mail.
C. hyperlinks.
D. chat rooms.
23. Facebook, MySpace, and Friendster are considered:
A. phishing Web sites.
B. e-commerce Web sites.
C. business-to-business Web sites.
D. social networking Web sites.
24. The Internet has its roots in a project started by:
A. the U.S. military.
B. higher education.
C. Microsoft.
D. a not-for-profit organization.
25.When data is sent over a network by two computers at the same time, a __________
can occur.
A. data interruption
B. data collision
C. data crash
D. data clash
Page 6 of 9
SBMF9
SECTION B: COMPULSORY
QUESTION 2: Fill in the Blanks (15 MARKS)
1._____________ are small handheld devices sometimes used in museums to enhance
tours.
2. Scientists are using _____________, or models, to study tornadoes and to re-create the
ruins of Pompeii.
3. ____________ devices, such as monitors, modems, and printers, are devices that are
externally connected to the computer.
4.____________ keys sometimes perform different functions for different software
packages.
5. Moodle, Blackboard, and WebCT are examples of __________________ software.
6.__________________ programs are free to use on the condition that any changes you
make to improve the source code also must be distributed for free.
7.Scattered pieces of files on the hard drive can be regrouped into sequential order using
the ________________ utility.
8.In a GUI, the pictures that represent a software application or a folder are called
________________.
9.The time it takes a storage device to locate stored data and make it available for
processing is called ______________________ time.
10.
The
most
common
form
of
memory
found
on
personal
computers
is
______________________.
11.The interface through which external devices are connected to your computer is a(n)
_________________.
12. The best defense against viruses is to install _________________, which is software
specifically designed to detect viruses and protect your computer.
13. The combination of the processor and the operating system is referred to as the
computer’s ____________.
14.Integrated circuits have enabled computer designers to create small yet powerful
____________, which are the chips that contain a CPU.
15.___________________ is a popular collaborative online encyclopedia.
Page 7 of 9
SBMF9
SECTION C: ANSWER ANY THREE QUESTIONS
QUESTION 3: (20 MARKS)
(a)
Give four types of computer systems and briefly describe each one.
(6 marks)
(b)
With the help of example, explain the difference between open source
(6 marks)
software, freeware and shareware.
(c)
Nowadays many people, whether at home or in business, make use
(4 marks)
of applications software to facilitate their lives. Describe two
productivity software and for each one, define its purpose.
(d)
A port is a connecting socket on the outside of the system unit.
(4 marks)
Differentiate between the serial port and parallel port, give examples
for their uses.
QUESTION 4: (20 MARKS)
(a)
Program instructions and data are brought into memory first, in order
(5 marks)
to be executed. Explain how the CPU enables an instruction to be
executed?
(b)
Describe Intellectual Property and the reasons behind Fair usage
(5 marks)
policy.
(c)
Describe three health and safety issues to consider when using a
(3 marks)
computer.
(d)
Differentiate between worms and boot-sector viruses, and how each
(3 marks)
one can invade computer systems and programs.
(e)
Briefly explain the techniques used for security purposes on the
(4 marks)
Internet.
Page 8 of 9
SBMF9
QUESTION 5: (20 MARKS)
(a)
Briefly explain how the functionality of the WWW has been enhanced,
(4 marks)
after its birth at CERN site. Use examples to illustrate your answer.
(b)
Many modern computers are being sold without floppy disk drives.
(3 marks)
State two reasons why floppy disk drives are no longer considered
necessary.
(c)
Differentiate between sequential access and direct access when
(3 marks)
referring to a secondary storage device. Give one example of each.
(d)
Briefly describe the four factors that affect the performance of a
(4 marks)
monitor.
(e)
Computer security is often divided into three distinct master
(6 marks)
categories (controls): physical, technical and administrative. Explain
what you understand by these different controls, giving examples to
support your answer.
QUESTION 6: (20 MARKS)
(a)
What do you understand by the term ‘LAN’? How is a LAN different
(3 marks)
from a WAN?
(b)
Describe three types of cables which are commonly used with LANs.
(3 marks)
(c)
Three common networking topologies are the Star, the Ring and the
(6 marks)
Linear Bus. Give one advantage and one disadvantage of each of the
above topologies.
(d)
The program specification phase of the programming process defines
(2 marks)
five tasks. List four of them.
(e)
(a) Explain the meaning of the following terms :

Expert Systems.

Robotics.

Virtual Reality.
(6 marks)
Give examples of these fields in business and everyday life.
***END OF QUESTION PAPER***
Page 9 of 9
SBMF9
Download