Diploma in Financial Management with Public Finance Cohort: DFM/09/PT – Year 1 Examinations for 2009 Semester I MODULE: ICT IN ORGANISATION MODULE CODE: MMIS 1208 Duration: 2 Hours Instructions to Candidates: 1. This question paper consists of Section A, Section B and Section C. 2. All questions from Section A and Section B are compulsory. 3. Answer any three questions from Section C. 4. Always start a new question on a fresh page. 5. Total Marks: 100 This question paper contains 6 questions and 9 pages. Page 1 of 9 SBMF9 SECTION A: COMPULSORY QUESTION 1:MCQ (25 MARKS) 1. Which of the following is part of being computer literate? A. Avoiding hackers and viruses B. Protecting your computer from being stolen C. Being able to build a computer D. All of the above 2. In Nuclear Power plants, delicate and dangerous operations are done by manipulating devices through computers instead of manually. This technology is known as: A. forecasting. B. computer forensics. C. simulation. D. robotics. 3. Computers are very good at _____________ data into information. A. making B. producing C. processing D. entering 4. The _____________ language consists of just two digits: 0 and 1. A. computer programming B. binary C. base 10 D. decimal 5.The box that contains the central electronic components of the computer is the: A. motherboard. B. system unit. C. peripheral unit. D. input unit. Page 2 of 9 SBMF9 6.Software that runs the computer and coordinates instructions is called: A. application software. B. system software. C. device software. D. utility software. 7.In a spreadsheet, the columns and a rows form individual boxes called: A. intersects. B. addresses. C. worksheets. D. cells. 8.Which type of software is used at colleges to keep track of student records? A. system software B. presentation software C. database software D. word-processing software 9.CD ripping refers to: A. stealing songs off the Internet. B. encoding CDs to MP3 format. C. creating your own CDs from your MP3 collection. D. erasing content on a CD. 10.Which of the following was the first operating system installed in personal computers? A. Symbian OS B. Microsoft Windows C. Linux D. MS-DOS Page 3 of 9 SBMF9 11. C: My Documents\Spring 2007\CIS 101\Term Paper\Computer Technology is an example of a: A. file extension. B. file trail. C. file list. D. file path. 12.The greatest nonvolatile storage capacity in the computer system is found in the: A. CPU. B. RAM. C. hard disk. D. cache. 13.____________ are fast becoming the most preferred means of portable storage. A. CDs B. DVDs C. Floppy disks D. Flash drives 14.Before upgrading your video subsystem, you should evaluate all of the following EXCEPT: A. monitor type. B. monitor size. C. video card memory. D. Dolby digital compatibility. 15.The most common port on new computers today is the ____________ port. A. serial B. parallel C. Universal Serial Bus D. MIDI Page 4 of 9 SBMF9 16.A computer network is defined as two or more computers connected via ____________________ so that they can communicate with each other. A. the Internet B. software C. hardware D. software and hardware 17. Which transmission media is able to transmit data the fastest? A. Twisted pair cable B. Coaxial cable C. Fiber optic cable D. Wireless 18. Public places at which you can wirelessly connect to the Internet are known as: A. links. B. hotspots. C. wired spots. D. gateways. 19.____________ was put into use in 1945 and took up 1,800 square feet of floor space. A. PNG B. ARPA C. DOS D. ENIAC 20. ALU stands for: A. Arithmetic Logic Unit. B. Adding Logic and Usability. C. Alter, Load, and Use. D. Alternate Load Usage. Page 5 of 9 SBMF9 21.The Internet is: A. an internal communication system for a business. B. a large network of networks. C. a communication system for the U.S. government. D. the same as the Web. 22. All of the following are ways to communicate on the Internet EXCEPT: A. instant messaging. B. e-mail. C. hyperlinks. D. chat rooms. 23. Facebook, MySpace, and Friendster are considered: A. phishing Web sites. B. e-commerce Web sites. C. business-to-business Web sites. D. social networking Web sites. 24. The Internet has its roots in a project started by: A. the U.S. military. B. higher education. C. Microsoft. D. a not-for-profit organization. 25.When data is sent over a network by two computers at the same time, a __________ can occur. A. data interruption B. data collision C. data crash D. data clash Page 6 of 9 SBMF9 SECTION B: COMPULSORY QUESTION 2: Fill in the Blanks (15 MARKS) 1._____________ are small handheld devices sometimes used in museums to enhance tours. 2. Scientists are using _____________, or models, to study tornadoes and to re-create the ruins of Pompeii. 3. ____________ devices, such as monitors, modems, and printers, are devices that are externally connected to the computer. 4.____________ keys sometimes perform different functions for different software packages. 5. Moodle, Blackboard, and WebCT are examples of __________________ software. 6.__________________ programs are free to use on the condition that any changes you make to improve the source code also must be distributed for free. 7.Scattered pieces of files on the hard drive can be regrouped into sequential order using the ________________ utility. 8.In a GUI, the pictures that represent a software application or a folder are called ________________. 9.The time it takes a storage device to locate stored data and make it available for processing is called ______________________ time. 10. The most common form of memory found on personal computers is ______________________. 11.The interface through which external devices are connected to your computer is a(n) _________________. 12. The best defense against viruses is to install _________________, which is software specifically designed to detect viruses and protect your computer. 13. The combination of the processor and the operating system is referred to as the computer’s ____________. 14.Integrated circuits have enabled computer designers to create small yet powerful ____________, which are the chips that contain a CPU. 15.___________________ is a popular collaborative online encyclopedia. Page 7 of 9 SBMF9 SECTION C: ANSWER ANY THREE QUESTIONS QUESTION 3: (20 MARKS) (a) Give four types of computer systems and briefly describe each one. (6 marks) (b) With the help of example, explain the difference between open source (6 marks) software, freeware and shareware. (c) Nowadays many people, whether at home or in business, make use (4 marks) of applications software to facilitate their lives. Describe two productivity software and for each one, define its purpose. (d) A port is a connecting socket on the outside of the system unit. (4 marks) Differentiate between the serial port and parallel port, give examples for their uses. QUESTION 4: (20 MARKS) (a) Program instructions and data are brought into memory first, in order (5 marks) to be executed. Explain how the CPU enables an instruction to be executed? (b) Describe Intellectual Property and the reasons behind Fair usage (5 marks) policy. (c) Describe three health and safety issues to consider when using a (3 marks) computer. (d) Differentiate between worms and boot-sector viruses, and how each (3 marks) one can invade computer systems and programs. (e) Briefly explain the techniques used for security purposes on the (4 marks) Internet. Page 8 of 9 SBMF9 QUESTION 5: (20 MARKS) (a) Briefly explain how the functionality of the WWW has been enhanced, (4 marks) after its birth at CERN site. Use examples to illustrate your answer. (b) Many modern computers are being sold without floppy disk drives. (3 marks) State two reasons why floppy disk drives are no longer considered necessary. (c) Differentiate between sequential access and direct access when (3 marks) referring to a secondary storage device. Give one example of each. (d) Briefly describe the four factors that affect the performance of a (4 marks) monitor. (e) Computer security is often divided into three distinct master (6 marks) categories (controls): physical, technical and administrative. Explain what you understand by these different controls, giving examples to support your answer. QUESTION 6: (20 MARKS) (a) What do you understand by the term ‘LAN’? How is a LAN different (3 marks) from a WAN? (b) Describe three types of cables which are commonly used with LANs. (3 marks) (c) Three common networking topologies are the Star, the Ring and the (6 marks) Linear Bus. Give one advantage and one disadvantage of each of the above topologies. (d) The program specification phase of the programming process defines (2 marks) five tasks. List four of them. (e) (a) Explain the meaning of the following terms : Expert Systems. Robotics. Virtual Reality. (6 marks) Give examples of these fields in business and everyday life. ***END OF QUESTION PAPER*** Page 9 of 9 SBMF9