Professional Documents
Culture Documents
Department of
Management Accounting
EXAMINATION INFORMATION
Dear student
Define tomorrow
2
DEAR STUDENT
In this study letter attention will be given to the following aspects:
1. The 2016 examination.
2. Information regarding the May/June 2016 examination paper.
3. Note on previous examination papers and a paper that can serve as an example.
We wish you all the best and every success with your studies.
Mrs. A. McGee Mr. N.J. Booyse
mcgeea@unisa.ac.za booysnj@unisa.ac.za
(012) 429 4421 (012) 429 8931
1. Examination information
For the purpose of preparing for the examination in May/June 2016 the following
information is available:
Students need to study topics 1-9 in the MO document for AIN1501. (Or the
learning units on myUnisa)
Students should make sure that they have worked through the study guide and
ensure that they are able to answer all the self-assessment activities.
Students will be allowed to answer the paper in either Afrikaans or English in full
not depending on registration preference. Refer to the included old examination
paper.
Duration of paper: 2 hours
Total marks: 100
It will be to your advantage to get actively involved in your allocated e-tutor
group.
Indicate whether the following statements are “TRUE” or “FALSE”. Only write the word
TRUE or FALSE next to the relevant question number. Each correct answer counts one
(1) mark.
Dui aan of die volgende stelling “WAAR” of “VALS” is. Skryf slegs die woord WAAR of
VALS langs die relevante vraagnommer neer. Elke korrekte antwoord tel een (1) punt.
1.1 Data is the raw material available for processing into information.
Data is die roumateriaal wat beskikbaar is om te verwerk na inligting.
1.2 A closed system is affected by its environment and it, in turn, affects its
environment.
ʼn Geslote stelsel word deur sy omgewing beïnvloed en beïnvloed weer sy
omgewing.
1.3 Touch screens can double as both input and output devices.
Aanraakskerms kan gebruik word vir inset- en uitsetapparatuur.
1.4 Most organisations use electronic funds transfer (EFT) to secure sensitive data
transmitted via their website.
Meeste organisasies maak gebruik van elektroniese fondsoordragte “EFT” om
sensitiewe data te beveilig wat via hulle webtuiste gestuur word.
4
1.5 Expert systems (ES) allow only expert users in the field to benefit from the available
knowledge.
Kundigheidstelsels (KS) laat slegs kundige gebruikers toe om voordeel te trek uit
die beskikbare kennis.
1.6 In changing from an old to a new system, pilot running involves running both the old
and the new systems for a specific period.
As daar van ʼn ou stelsel na ʼn nuwe stelsel oorgeskakel word, behels die
proeflopiemetode die bedryf van beide die ou stelsel en die nuwe stelsel, saam vir ʼn
spesifieke periode.
1.7 Economic feasibility determines whether the hardware, software and other systems
components can be acquired or developed.
Ekonomiese uitvoerbaarheid bepaal of die hardeware, sagteware en ander
stelselkomponente verkry of ontwikkel kan word.
1.9 A rootkit is malicious software that grants an attacker continuous full access to a
computer while hiding its presence.
ʼn “Rootkit” is kwaadwillige sagteware wat aan die aanvaller deurlopend volle
toegang verleen tot die rekenaar, terwyl die bestaan hiervan weggesteek word.
1.10 The application layer is the highest layer in the Open Systems Interconnection
framework (OSI).
Die toepassingslaag is die hoogste laag in die Oopstelselinterverbindingsraamwerk
(OIV).
[10]
________________________________________________________________________
Match column B with column A. Write down A1 to A10 underneath each other and then
write the relevant correct answer from column B next to the corresponding number from
column A. Each correct answer counts one (1) mark.
Pas kolom B by kolom A. Skryf A1 tot A10 ondermekaar neer en skryf die relevante
korrekte antwoord vanuit kolom B daarnaas. Elke korrekte antwoord tel een (1) punt.
Example / Voorbeeld: A1 – B2
A2 – B18
5 AIN1501/102
Column A / Kolom A
Column B / Kolom B
Application software
B1
Toepassingssagteware
Pilot running
B2
Proeflopie
Systems analysis
B3
Stelselanalise
Biometric readers
B4
Biometriese lesers
Flash memory
B5
Flitsgeheue
Computers
B6
Rekenaars
System
B7
Stelsel
Firewalls
B8
Brandmure
Operating system
B9
Bedryfstelsel
Rental
B10
Huur
Interpreters
B11
Interpreteerders
Data dictionary
B12
Datawoordeboek
Modem
B13
Modem
Network operating system
B14
Netwerkbedryfstelsel
Malicious code
B15
Kwaadwillige kode
Local area network
B16
Lokale area netwerk
The King III report
B17
Die King III verslag
Disaster planning
B18
Rampbeplanning
Session layer
B19
Sessielaag
Prototyping
B20
Prototipering
[10]
7 AIN1501/102
Organisations use highly integrated information systems that influence all aspects of the
business. Without effective and efficient systems, organisations cannot operate, manage
or plan properly to achieve their goals.
REQUIRED / GEVRA:
3.1 List five (5) advantages of an enterprise resource planning system (ERP).
Lys vyf (5) voordele van ‘n ondernemingshulpbronbeplanningstelsel (OHB). (5)
3.2 Mention the five (5) steps in the decision-making process. (The problem-solving
process)
Noem vyf (5) stappe in die besluitnemingsproses. (Die probleemoplossingsproses)
(5)
[10]
_________________________________________________________________________
The electronic environment levels the playing field between small and big organisations as
it allows small organisations instant access to the global marketplace in which they can
compete effectively.
REQUIRED / GEVRA:
[10]
_________________________________________________________________________
8
All software consists of a series of instructions (called a program) used to instruct the
hardware of a computer system.
Alle sagteware bestaan uit ʼn reeks instruksies (verwys na as ʼn program), wat instruksies
aan die hardeware van ʼn rekenaarstelsel gee.
REQUIRED / GEVRA:
5.1 List the three (3) components of the central processing unit (CPU) of a computer
and briefly explain the functions of each of these components.
Lys die drie (3) komponente van die sentrale verwerkingseenheid (SVE) van ‘n
rekenaar en verduidelik kortliks elkeen se funksie. (6)
5.2 List four (4) factors to consider when selecting an operating system.
Lys vier (4) faktore wat oorweeg moet word wanneer ʼn bedryfstelsel gekies moet
word. (4)
[10]
_________________________________________________________________________
The specific technology, policies and manual procedures implemented for protecting
assets as well as to ensure accuracy and reliability of the information systems are called
controls.
6.1 Differentiate by referring to the purpose, between input controls and processing
controls.
[10]
_________________________________________________________________________
ʼn Onderneming funksioneer in ʼn oop omgewing waar dit deurlopend beïnvloed word deur
veranderinge wat ook weer ʼn effek het op die inligting wat deur die inligtingstelsel
voortgebring word.
REQUIRED / GEVRA:
8.1 List six (6) reasons why information systems sometimes need to be replaced.
Noem ses (6) redes waarom inligtingstelsels soms vervang moet word. (6)
8.2 List four (4) alternative methods for the development of an information system.
Noem vier (4) alternatiewe metodes vir die ontwikkeling van ʼn inligtingstelsel. (4)
[10]
________________________________________________________________________
10
The internet broadened the information world but also opened the door to new types of
crime and misuse.
Die internet het die inligtingswêreld verbreed, maar het ook deure oopgemaak vir nuwe
tipe misdaad en misbruik.
REQUIRED / GEVRA:
9.1 Distinguish between vulnerabilities, threats and risks.
Onderskei tussen kwesbaarhede, bedreigings en risiko’s. (6)
[10]
________________________________________________________________________
Most information supplied to internal users is used to assist them to perform their tasks
more effectively.
Die meeste inligting wat aan interne gebruikers verskaf word, word deur hulle gebruik om
hulle te help om hulle take meer effektief uit te voer.
REQUIRED / GEVRA:
10.1 List three (3) internal users of information and briefly explain their internal
information needs.
Noem drie (3) interne gebruikers van inligting en verduidelik kortliks hulle interne
behoefte aan inligting. (6)
10.2 List four (4) characteristics that determine the value of information for specific users
in specific situations.
Noem vier (4) eienskappe wat die waarde van inligting vir spesifieke gebruikers in
spesifieke omstandighede bepaal. (4)
[10]
©
UNISA 2016