You are on page 1of 5

December 2011 CommonTest Section A 1. Which of the following is NOT an Operating System of a device?

a) Android b) Adobe Photoshop c) Linux d) Microsoft Windows 7 2. The advantage(s) of Cloud Computing for small businesses is(are) to ______ a) Reduce cost b) Improve security c) Provide more storage space d) All of the above 3. In Microsoft Access, which of the following data type is preferred for storing email address in the following format Thomas@hotmail.com ? a) AutoNumber b) Number c) Hyperlink d) Text 4. Which type of computer network is best to describe the network connections for Ngee Ann Polytechnic? a) LAN (Local area network) b) CAN (Campus area network) c) MAN (Metropolitan network) d) WAN (Wide area network) 5. What type of application software would allow users to store and retrieve vast amount of data? a) Word processing b) Spreadsheet c) Database d) Graphics design 6. What is NOT true for Google Doc? a) It is a free software b) It allows users to create and edit documents online while collaborating in real-time with other users c) It is a web-based software suite d) It is a vertical application software 7. What is true about RAM? a) One can read and over-write data in RAM b) It is a form of permanent data storage

c) d)

It is the place for loading the operating system only It is a block of memory for temporary storage for data likely to be used again

8. Which of the following is NOT a component of a Local Area Network (LAN)? a) Telephone line b) Network interface card c) Switch d) MAC address 9. Primary value chain activities include the following, except ____ a) Inbound logistics b) Technology development c) Operations d) Marketing and sales 10. The main reason for adopting a cost leadership strategy is ______ a) To provide a wide range of products b) To attract price sensitive customers c) Lower customer loyalty d) To offer cheaper services to all customers 11. The _____ is a collection of programs that interact with the computer and application hardware, creating a layer of insulation between the two. a) Off-the-shelf software b) Vertical market software c) Open-source program d) Operating system 12. A competitive strategy consists of moves to ___ a) Attract customers b) Withstand competitive pressures c) Strengthen an organizations market position d) All of the above 13. In a Microsoft Access datasheet, what does each row represent? a) Field b) Database c) Table d) Record 14. The first step in preparing an IT budget for your department is to ___ a) Determine the base requirements b) Find out the preferences of laptops for users c) Access your employees performance

d)

Determine the future growth of the company

15. A collection of computer servers usually maintained by an enterprise to accomplish server needs far beyond the capability of one machine, is called ____ a) A server farm b) Cloud computing c) Grid computing d) A mainframe 16. An example of a realistic and measurable goal is ____ a) To increase the customer base by 20% every year b) To receive no complaints at the end of 3 years c) To improve customer service by 30% by deploying IT services d) To reduce operating costs by 5% annually 17. Trojan horse is a destructive program that ___ a) Replicates itself b) Masquerades as a useful application c) Consumes bandwidth of network d) Does not corrupt a target file 18. The difference between memory and storage is that memory is _____ and storage is ____ a) Temporary, permanent b) Permanent, temporary c) Slow, fast d) None of the above 19. Which of the following provides faster connection to Internet Service Providers? a) Dial-up access b) DSL/ADSL modem c) Optical Fibre Broadband connection d) Cable modem connection 20. In order for a laptop or mobile device to connect to a wireless LAN they must have a wireless ___ a) Network interface card. NIC b) Unshielded twisted pair UTP cable c) Virtual Private Network VPN d) Metropolitan Area Network MAN

Section B 1. Microsoft Access can be used for any application where there is a large amount of data and you want the ability to filter by different criteria. TRUE. 2. The device driver is the set of instructions that direct the computer to accomplish specific tasks such as presentation production and spreadsheet calculations. FALSE. 3. Antivirus software is a broad term that describes any program that is intended to cause harm or convey information to others without the owners permission. FALSE. 4. A thin client can make use of the processing, memory and other resources of a network to run software applications for users. TRUE 5. A firewall is a set of hardware concrete used to protect the resources of a private network from users in other networks. FALSE. 6. Microsoft Excel is a better application than Access to identify trends in business. TRUE. 7. As software vendors discover security holes in their products they continually issue modifications called plug in. FALSE 8. A protocol is a standard procedure and format that two data communication devices must understand, accept and use in order to talk to each other. TRUE 9. Cloud computing refers to the use and access of a single server-based computational resources via a digital network. FALSE 10. A VPN is a private network that uses a public network (usually the Internet) to connect remote sites or users together. TRUE Section C 1. List the Porters five competitive forces and sketch a diagram that relates the five forces (10 marks) 2. Mr. Tan, age 60, has just bought his first computer. He is very excited and has a few questions for you: a) He is afraid that his computer may be infected by virus. Advise Mr. Tan on how he can prevent computer virus. (8 marks) b) OpenOffice is a free alternative to products such as Microsoft Office Suite. Mr. Tan wonder why many companies preferred Microsoft Office to OpenOffice. Briefly explain to him. (6 marks) c) Mr. Tan thinks that Microsoft Windows 7 and Microsoft Office are the same. Briefly explain the difference to him. (6 marks) 3. A restaurant uses MS Access to store its customers, sales and menu information as follows: Customer Table Customer ID C00011 C00033 Customer Name Cheryl Charlie Customer Address 26, Bt Batok East Ave 2 6, Ang Mo Kio St. Contact Number 92245200 92520044 Email address Cheryl@mail.com Charlie@mail.com Privilege card member? Yes No

Sales Table Sales ID Customer ID Menu ID Sales person Branch Sales Date Sales Price

000001 000002 Menu Table Menu ID FC0011 SS0022

C0000011 C000027

F00011 S00022

Justin Michael

Toa Payoh Woodlands

23/10/11 01/01/11

$1000 $800

Menu Name Fish & Chips Sirloin Steak

Item Transaction Date 23/10/11 01/11/11

Item Price $60 $45

For each of the tables above, identify the following: i. Indicate the primary and foreign keys for the Sales table. (3 marks) ii. What MS Access tool/feature would you use to link the above 3 tables? Explain. (2 marks) iii. Based on menu table and customer table, what are the most appropriate data field types for Menu ID, Privilege Card Member?, Contact number, Item transaction date and Item Price respectively? (5 marks) iv. A database application contains a collection of forms, reports, queries, and application programs that process a database. Describe the primary use of forms, reports, and queries. (6 marks) v. Briefly discuss two advantages of using database for small and medium business. (4 marks) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ End of Paper ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

You might also like