TOPIC : INTRODUCTION TO INFORMATION SKILLS AND SYSTEMSCircle the most appropriate answer in the following multiple choice questions.1) Authors spend considerable time and effort creating their work. The set of laws which govern the rights of authors as far as protecting their ownership of material they produce is calledA.
Common lawsB. Data protectionC. Copy protectionD. Copyright lawsD2) Information systems contain a number of processes. One of these is Collecting, which of the following best describes the processes involved in Collecting.
A. Defines the required data, identifies the source for the data, saves data for later use, gathers the dataB. Defines the required data, identifies the source for the data, determines how the data will be gathered, gathers the dataC.
Defines the required data, determines the format in which the data will be represented, determines how the data will be gathered, gathers the dataD. Defines the required data, identifies the source for the data, determines how the data will be gathered, manipulates the data B3) Information systems contain a number of processes. One of these is Processing, which of the following best describes the process involved in Processing?A. Interprets the data, transforming it into informationB. Decides the form in which the information will be displayedC. Manipulates data and informationD.
Determines the format in which data will be represented in the informationC4) Information systems contain a number of processes. One of these is Organising, which of the following best describes the process involved in Organising?A. Decides the form in which the information will be displayedB. Determines the format in which data will be represented in the informationC. Interprets the data, transforming it into informationD. Manipulates data and informationB5) The largest and most powerful computers are known as A.
Mini computersB. Personal computersC. Super computersD. Main framesC6) Using 8 bits and twos component arithmetic, 103 (base 10) would be represented as ;A. 01100111B.
10011000C. 11100111D. 10011001D7) System software is A.
Only used to boot the machineB. Necessary to run the machineC. Only required by mainframe computersD. Loaded into ROM when the system is bootedB8) How many binary digits are generally required to represent a 2 digit hexadecimal number?A. 8B. 16C.
12D. 4A9) A computer uses 8 bits and twos complement arithmetic to perform 89 (base 10) 63 (base 10). The two binary numbers to be added together are:A.
00111111 (base 2) and 10100111 (base 2)B. 01011001 (base 2) and 11000001 (base 2)C. 01011001 (base 2) and 00111111 (base 2)D. 00111111 (base 2) and 10100110 (base 2)B10) Often the society we live today is known as The Information Age. This is most likely becauseA. Information technology is what controls the economics of nations. The power of nations is now linked to its information technology resources rather than the nations natural resources.
B. Information is the raw material for silicon based technology. The term Information Age really refers to our ability to use computers that based on silicon chips.C. The amount of available information is growing exponentially. Our ability to access this information has become a major commodityD.
Computers have become so powerful that they are beginning to take over from human thought processes.C11) Information systems contain a number of processes. One of these is Transmitting and Receiving, which of the following best describes the process involved in Transmitting and Receiving?A. Determines the format in which data will be represented in the information systemB. Interprets the data, transforming it into informationC. Manipulates data and informationD.
Sends and gets data and information, within and beyond the information systems.D12) One major problem for software developers is that software can quite easily be copied and the copy will be identical to the original. This illegal copying is know asA. BunkingB. ImagingC. Software piracyD.
HackingC13) The binary number 100111 is equivalent to which of the following decimal numberA. 39B. 32C. 4D.
71A14) Application software is A. Computer hardware necessary to carry out a taskB. Programs designed to carry out a particular taskC. A reply to a job advertisementD. Programs controlling the operation of the computerB15) Which of the following lists correctly contains the seven information processes contained within an information systemA. Collecting, organising, analysing, processing, transmitting/ receiving, displayingB.
Collecting, organising, analysing, storing/retrieving, processing, transmitting/ receiving, displayingC. Collecting, organising, analysing, storing, retrieving, transmitting/receiving, displayingD. Collecting, organising, analysing, storing, retrieving, processing, receiving, displaying B16) Many cases of computer crime go unreported. This is most likely becauseA. Companies do not want it known that their system is fallibleB. Usually the effects are too trivial to warrant prosecutionC.
It is virtually impossible to stop this type of crimeD. The crime itself was not noticed b the company A17) It is relatively easy to publish information on the internet. This means that a large amount of information is available, however the downside is that he accuracy of information on the internet is often too difficult to assess. The best method of assessing the accuracy of information on the internet is toA. Assume the information in inaccurate unless you personally have experience with the contentB. Download the information and have a knowledgeable person check itC.
Compare a number of different sourcesD. Make sure the data is stored on a reliable computer.C18) Device that scan finger prints or signatures or a persons eyes are known asA. Identity check devicesB. Security devicesC.
ScannersD. Biometric devicesD19) A new computer based information system is introduced into a local hardware store. This new system accurately tracks stock levels for each item sold. As a result the shop assistants now have no need to manually count the number of each item remaining on the shelves. The social issue involved in this case is one of A.
Appropriate use of technologyB. Changing nature of workC. Job redundancyD. Advances in technologyB20) Your school sends around a sheet to each student that contains all their personal details (eg. Name, address, phone number, etc). Students are asked to check this data and make changes as necessary.
This process is known asA. Data validationB. A data security checkC. Data encryptionD. A data integrity checkD21) The five basic function performed by computer hardware areA. Addition, comparison, storage, input outputB.
Wordprocessing, Spreadsheets, Databases, Communication, GraphicsC. Hardware, Software, Processing, People, ProceduresD. Input, Output, Processing, Storage, ControlD22) Which of the following lists contains ONLY different types of dataA. Image, video, audio, text, numbersB.
Keyboard, mouse, CPU, text, numbersC. Hardware, software, people, informationD. Baud rate, parity, data bitsA23) The computer produces A. Data B. Input C. Process D.
Information D24) The environment of an information system can be best described as:A. Anything not contained within the system itself. However the environment can affect the systems operations in various unforseen ways.B.
Everything that influences, and is influenced by the information system and its purposeC. Anything that is created from naturally occurring circumstancesD. A sub-system that influences the system in unpredictable ways. B25) The smallest unit of data a compute can store is a A. Byte B. Nibble C. Character D.
Bit D26) A computer hacker is a person whoA. Causes damage to a computer system by accessing it via a modemB. Writes viruses that cause damage to computer systemsC. Is addicted to surfing the internetD. Illegally gains access to a computer systemD27) The dividing line between a system and its environment is know asA.
A boundaryB. The systems limitsC. An interfaceD. A sub-systemC28) Software that can be freely copied, used and distributed is known asA.
Public domain softwareB. Application softwareC. Shareware D. System softwareA29) The process of checking data as it is entered into an information system to make sure it is of the correct type and is within reasonable ranges is known asA.
Data verificationB. Data encryptionC. Data validationD.
Data integrity C30) A possible description of Information could be A. The output from an information systemB. The input to an information systemC. Known facts together with audio, video and/or imagesD.
The processing that takes place on dataA31) If A is represented by 65 in ASCII, what value is used to represent the character F?A. 70B. 68C. 69D. 71A32) ATMs or automatic teller machines are commonly used to access bank accounts.
The people involved in writing the software operating in an ATM could be best described as which of the following?A. Technician B. User C. Maintainer D. Programmer D33) EBCDIC is a system of representing characters on large IBM systems What does EBCDICA. Extended Binary Coded Decimal Interchange CodeB.
Exchanged Binary Coded Decimal Interchange CodeC. Extended Binary Coded Decimal International CodeD. Extended Binary Coded for Decimal Interchange Characters A34) A computer design to be used by one user is known as a A.
Main frameB. Mini computerC. Super computerD. Personal computerD35) Information systems contain a number of processes. One of these is Analysing, which of the following best describes the process involved in Analysing?A.
Determines the format in which data will be represented in the information systemB. Manipulates data and informationC. Decides the form in which the information will be displayedD. Interprets the data, transforming it into informationD36) Often the same piece of software is installed on a number of different machines at the same location.
Rather than purchasing multiple copies of the product a ___________ is purchased.A. Network B.
File server C. Copy programD. Site licenseD37) Data validation would pick up which of the following errorsA. State entered as Vic instead of NSWB. Date of birth entered as 10/4/79 rather than 4/10/79C. Surname entered as Davis rather than FendallD. Date of birth entered as 9/13/78 instead of 13/9/78D38) The binary number 100111 is equivalent to which of the following decimal numberE.
39F. 32G. 4H. 71AWords/ Pages : 1,592 / 24