You are on page 1of 10

GLENMUIR HIGH SCHOOL

SUMMER TERMINAL EXAMINATION


INFORMATION TECHNOLOGY
Paper 1 - CAPE- Multiple Choice
Form 6A
TIME: 1 hour
February 20, 2012
READ THE FOLLOWING INSTRUCTIONS CAREFULLY
Each item in this test has four suggested answers lettered (A), (B), (C), (D).
Read each item you are about to answer and decide which choice is BEST.
Answer ALL questions
1.

2.

Which of the following are examples of manual information systems?


I.
II.
III.
IV.
V.

Pages of a story book


A collection of folders in a filing cabinet
A payroll database management system
A catalogue of cards in a library
A slide presentation using a projector and transparencies

a)
b)
c)
d)

I, III, and IV only


II, III and IV only
II, IV and V only
III, IV and V only

Based on your knowledge of analogue and digital signals, which of the


following statements is true.
a)
b)
c)
d)

3.

John is browsing the web looking for information to complete his


research project. Which is MOST appropriate source of information for
him?
a)
b)
c)
d)

4.

A computer is digital and human speech is digital


Human speech is digital but a computer is analogue
Human speech is analogue but a computer is digital
A computer is analogue and human speech is analogue

Blogs
Wikis
Online journals
Chatrooms

Which of the following factors BEST represents characteristics to be


considered when assessing sources of information?
a)

Availability, cost and attractiveness

b)
c)
d)
5.

Availability, reliability and format


Format, cost and criticality
Format, quality and organization

Item 5 refers to the following list.


I.
II.
III.
IV.

Flowchart
Audio
Video
Entity box

Which of the following groups represents a complete list of data items?


a)
b)
c)
d)

6.

A journalist, while conducting research on the influence of sport on the


lives of teenagers in the region, also collected information on their
academic achievements. This information on academic achievements
can be classified as.
a)
b)
c)
d)

7.

essential
desirable
extraneous
cosmetic

Which of the following items are NOT information sources?


a)
b)
c)
d)

8.

I and II only
II and III only
II, III and IV only
I, II, III and IV

Journals
Websites
Magazines
Online surveys

Sharon has a list of numbers representing her expenses by category


for the month. Which of the following represent valid methods for
converting the list of numbers into information on her monthly
expenses?
I.
II.
III.
IV.
a)

Totalling them and writing the values in a ledger


Organizing these data into columns with headings representing
the name of the expense and totaling the columns
Arranging all the numbers in ascending order in a worksheet and
producing a line chart
Typing them into a spreadsheet and printing the spreadsheet
selection
I and II only

b)
c)
d)
9.

Students at a school in Jamaica were surprised to learn that the


webpage they had created and were viewing with their browser, was
not yet available on the World Wide Web(WWW). They were equally
surprised to learn that in order to be accessible on the WWW, the
website must first be registered with an
a)
b)
c)
d)

10.

Service Provider
Online Services
Web Portal
Standard Organization

Presentation software
Word processing software
Graphics package
Spreadsheet software

Information is valuable, hence computers use numerous physical and


software access restrictions to protect and secure information. Which
of the following statements about physical and software access
restrictions is FALSE?
a)
b)
c)
d)

12.

Internet
Internet
Internet
Internet

Janice has been asked to prepare a research paper on new


technologies. The paper must include diagrams and photos to illustrate
the technology. The software tool that is MOST appropriate for Janice to
use is.
a)
b)
c)
d)

11.

II and III only


I, II and III only
I, II, III and IV

Password and encryption are software access restrictions while


installation keys are physical access restrictions
Passwords and firewalls are software access restrictions while
surveillance cameras are physical access restrictions
Firewall and surveillance cameras are physical access restrictions
while passwords are software access restrictions
Installation keys and passwords are software access restrictions
while firewall is a physical access restriction

Gail is a Marketing Manager who lives in Jamaica and has recently been
offered a contract with a firm in India. The firm has indicated that she
will work from home and communicate with the office in India using the
Internet and telephone.
Which of the following terms BEST describes this arrangement?
a)
b)
c)
d)

Teleworking
Telecommunicating
Telecommuting
Telemarketing

13.

Which of the following sketches illustrates the function of a MODEM


where devices labeled X are MODEMS and devices labeled Y are
computers?

14.

Which of the following is a true statement regarding the SDLC phases?


a)
b)
c)
d)

The life cycle is a sequentially ordered set of phases.


It is not possible to complete some activities in one phase in
parallel with those of another phase.
The SDLC is not iterative.
The life cycle can be thought of as a circular process in which the
end of the useful life of one system leads to the beginning of
another project to develop a new version of or replace an
existing system.

15.

The second phase of the SDLC in which system requirements are


studied and structured best defines:
a)
b)
c)
d)

16.

The output for the analysis phase is the:


a)
b)
c)
d)

17.

hardware, input devices, users and software


input devices, output devices, software and network
hardware, software, users and output devices
hardware, software, network and users

A scanner is used to read printed matter and.


a)
b)
c)
d)

20.

analysis
implementation
maintenance
physical repair

The components of an information technology system are


a)
b)
c)
d)

19.

description of the alternative solution


physical system specifications
work plan for the project
priorities for systems and projects proposal

The phase of the SDLC in which an information system is


systematically repaired and improved is referred to as:
a)
b)
c)
d)

18.

planning
analysis
design
implementation

convert
convert
convert
convert

to text
to graphics
to human readable format
into computer readable format

Someone has asked for your advice on buying a suitable printer for
home use. Which of the following questions would you need to ask the
person, before giving your advice?
I.
I.
I.

Would you need to print duplicates using carbon paper or


multipart stationery?
How much money he is willing to spend?
How often would he be printing?

a)
b)
c)

I only
II only
II and III only

d)
21.

I, II. and III

Examples of Operating Systems for personal computers (PCs) are


a)
b)
c)
d)

Windows, Linux, Mac OS


Windows, MS Office, LInux
Windows, Unix, Symbian OS
Windows CE, Unix, Solaris

22.

The physical layout of a network is called the


a)
network design
b)
network topology
c)
network implementation
d)
network presentation

23

The following table shows a list of transmission media. Each media


type has been classified as wired or wireless. Which transmission
medium is NOT classified correctly?

(a)
(b)
(c)
(d)

Transmission
Medium
Microwave
Coaxial Cable
Fibre Optic
Radiowave

Wired

Wirele
ss
YES
YES

YES
YES

Items 24-25 refer to the following information.


Mitsy has a coffee shop. Many of her patrons use their laptops and
smartphones to work while having coffee and donuts. Several of the
patrons have suggested that she establish the coffee shop as a
hotspot.
24.

Which of the following statements BEST describes a hotspot?


a)
A shop that offers hot food to patrons while they use technology
b)
An area in which the Internet can be accessed by plugging into
an outlet
c)
A company that offers access to the Internet via any means
d)
An area in which the Internet can be accessed without using
wires

25.

Identify the MOST appropriate transmission medium to use when


implementing the hotspot at Mitsys coffee shop.
a)
b)

Coaxial cable
Satellite

c)
d)

Microwave
Unshielded twisted pair

26. The field of Human Computer Interaction involves the use of


technology to
a)
b)
c)
d)

initiate human behaviour


provide user interface for computers
provide user interfaces with icons and menus
influence behavior in humans

27. Which statements below BEST describe a Graphical User Interface


(GUI)?

28.

.I
I.
I.

Easy to use when communicating with the computer


Allows the use of menus, icons and pointers
More attractive than the older interfaces

a)
b)
c)
d)

I and II only
I and III only
II and III only
I, II and III

Mark is developing an interface for users who are not proficient in the
use of technology. The software is quite powerful with over two
hundred features. The MOST appropriate user interface would be.
a)
b)
c)
d)

29.

Jamaica is hosting the next Under 20 football competition. Players and


visitors from various parts of the world are expected on the island
during the two week period. Which of the following tools is the MOST
appropriate to show the planning and scheduling processes that will
characterize that period in Jamaica
a)
b)
c)
d)

30.

command line user interface


human computer interface
graphical user interface
easy learn user interface

PERT chart
GANTT chart
hierarchical chart
System chart

The health club healthy bodies is developing a web site to be used to


market itself and for allowing members to make payment and purchase
products online. Which of the following is the MOST appropriate
domain name for the health clubs website?
a)
b)

www.healthybodies.net
www. healthybodies.com

c)
d)
31.

Which of the following accurately represents a correct sequence of


three events that should take place as part of the problem-solving
process?
a)
b)
c)
d)

32.

www.healthybodies. edu
www.healthbodies.org

Define the problem. Analyse the problem, Identify and evaluate


possible solution
Define the problem, analyse the problem, implement
Define the problem, implement, analyse the problem
Define the problem, identify and evaluate possible solutions,
analyse the solution

Which of the following is NOT a stage in the computerization of a


system?
a)
b)
c)
d)

Analysis
Implementation
Testing
Documentation

33.

Which of the following is NOT a characteristic of information?


a)
Distortion
b)
Acceptance
c)
Timeliness
d)
Lifespan

34.

Which of the following is not a sub-discipline of computing?


a)
b)
c)
d)

35.

Which of the following is NOT a major component of an Information


Technology system?.
a)
b)
c)
d)

36.

Computer Science.
Information Systems
Software engineering.
Computer Architecture

Hardware
Network
Freeware
Software

In which phase of the Software Engineering process are techniques


such as observation, , investigation, interview, questionnaire
a)
b)
c)

Analysis
Design
Development

d)
37.

Maintenance

Every site on the Internet has an address known as the ?


a) WWW
b) URL
c) XML
d) HTML

38.

A vendor sells green mangoes at $50 each. Into what type of


information category can the price of the mangoes be placed
a)
b)
c)
d)

39.

Which technology would be used to mark Multiple Choice Papers?


a)
b)
c)
d)

40.

Optical Mark Recognition


Magnetic Ink Character Recognition
Optical Character Recognition
Barcode reading

When confronted with a problem the first step in tackling the problem
is to
a)
b)
c)
d)

41.

Desirable
Essential
Extraneous
Cosmetic

identify the problem


analyse the problem
generate solution
represent the problem as an algorithm

Corporate networks that use the infrastructure standards of the


Internet are called a/an?
a)
b)
c)
d)

extranet
intranet
virtual port network
world wide web

42. The method of putting messages into secret codes to safeguard it


privacy is called:

a)
b)
c)
d)
43.

Allan father is a stock broker. The MOST important characteristics of


information source for his job is:?
a)
b)
c)
d)

44.

currency of information
amount of detail
cost of the information
breadth of coverage

Which of the following cannot be sent using email


a)
b)
c)
d)

45.

validation
encryption
integrity
verification

MP# and WAV files


Graphic images
Text documents
Cash

Before the program is tested and documented, how should the


following four phases be organized in the Program Development Life
Cycle?
I.
II.
III.
IV.

Define
Analyse
Implement
Validate

a)
b)
c)
d)

I, II, III, and IV


I, II, IV, and III
II, I, III, and IV
IV, II, I and III
END OF EXAM

You might also like