Está en la página 1de 8

i;.

-21. 7'I:e following list gives the layers in the OSI S.


network model ( in random order).

I. Physical Layer 4
II. Session Layer
III. Network Layer
IV. Data Link Layer.
V. Presentation Layer
VI. Transport Layer
VII. Application Layer
The Group that shows the OSI model in the
CORRECT order (Layer I to Layer 7) is

2.

(A) how much data can be Accessed


(B) how fast data can be accessed
(C) how fast data can be processed
(D) how much data can be processed

6. In an attempt to update his computer system,


John increased his RAM . This would make
the computer ,
(A)

(A)
(B)

I, IV, III, VI, II, V, VII


I,V, III, II , IV, VI, VII

(B)

(C)
(D)

II, V, IV, VI, VII, I, III


III , V, VI, VII, IV, II, I

(D)

(C)

7.

faster and more efficient


have better resolution

able to store more files permanently


input data faster

Select the option that identifies the MAIN


states that a process can be in.

Which type OfcOmPanY Provides people with


access tq the Internet?

(A?

(A)
(B)
(C)
(D)

(B)

(C)
(D)

Blocked, running, ready


Blocked, moving, standing
Standing, running, blocked
Moving, blocked, ready

3. When a process . is in the ready state, this


means that it
(A) is executed to completion
(B) can use the CPU if available
(C) can change in priority
(D) is waiting to continue

4. Which of the following devices allows


workstation connectivity to the Internet within
a network?

One benefit of a CD-ROM is that it is a direct


access media . Direct access would affect

(A) Modem
(B) Hub
(C) Router
(D) NIC

TCP
IP
ISP
NIC

8. A sales company has branches throughout the


country. The CEO wants information to be
shared among all branches within the
company. Which type of network is BEST
suited for this purpose?
(A) Local Area Network
(B) Internet
(C) Extranet
(D) Intranet

9. A company has two' different network


topologies in use - a star in the accounts
department and a bus in the sales department.
Which device would be BEST suited to
connect the accounts and sales departments
to allow sharink of data?

(A) Hub
(B) NIC card
(C) Bridge
(D) Gateway
0211 50 1 0/CAPE2008

GO ON TO THE NEXT PAGE

3-"'any bytes would a 32-bit computer 14.


transfer at a tune?

(A) 4 bytes

(B) 8 bytes
(C) 16 bytes
(D) 32 bytes

I1.

A computer network is BEST described as a


system of
(A) internet based personal computers
(B) computer systems, terminals and
communication links
(C) interconnected nodes in a widely
dispersed geographical area
(D) hardware, - software and
communication channels that
connect devices on local premises

12. Which of the following occurrences can


include deliberate attempts to corrupt
computers and computer systems?
I. Human error
II. Natural disaster
III. Cracking
IV. Software errors
V. Data diddling
(A) I and V only
(B) III and V only
(C) I, III and V only ,
(D) III, N and V only

13. Which of the following may be used to


prevent unauthorized access to data
transmitted between internetworked
businesses?

A language translator as it relates to


computer science is software that changes
(A)
B)
(C)
(D)

English-like statements to machine


code
a foreign language to English
language
a forei gn l anguage to machine code
machine language to English-like
statements

15. An IT professional wishes to offer private


tuition in Information Technology at his home
and has decided to set up a LAN. Which of
the following sets of transmission media is
the MOSTLIKELY option available to him?
(A) Coaxial, microwave
(B) Twisted pair, coaxial
(C) Fiber optic, satellite
(D) Radiowaves, microwaves

16. Which device converts digital signals into


analog signals for transmission over telephone
lines?
(A) Router
(B) , Gateway
(C) Modem
(D) Client-Server

17. Which of the following pairs of transmission


media can be used to establish a wireless
network?
(A) Twisted pair, satellite
(B) Microwave, fiber optic
(C) Microwave; telephone lines
(D) Microwave, satellite

I. Firewall
ll. Biometric security
III. Encryption
IV. Fibre optic cable
(A) I and II only
(B) I and III only
(C) I, II and III only
(D) I, II, III and IV

021 1 50 1 0/CAPE2008

GO ON TO THE NEXT PAGE

-4-

Item i8 refers to the following list.


1. Easy and inexpensive to install
II. Ifone cable fails the network will not
be affected

III. No need for a server


IV. Easy to add new workstations
18. Which of the above is/are an advantage of a
ring network?
(A) III only
(B) I and II only
(C) III and IV only
(D) I, II, III and IV

19. A company uses a monitoring and control


system in its Production Line. The BEST
definition of such a system is one that
(A)
(B)
(q'
(D)

checks how much is produced by the


Production Line
controls speed ofprocessing by the
Production Line
checks the time of production
tracks processes and takes certain
actions

20. Data mining is when


(A)
(B)
(C)
(D)

data is stored in a database/data


warehouse
data in a database /data warehouse
is analysed
a specific piece of data is searched
for in a database
a database / dita warehouse is
created

21. Which of the following systems can a doctor


use to diagnose an illness in a patient?
(A) A monitoring and control system
(B) A database management system
(C) An expert system
(D) A communication system

22. Security of data is a major concern to a


company. ONE example of a physical
security method is using
(A) passwords
(B) biometrics
(C) anti-virus software
(D) a firewall

23. To reduce the effects of data loss or data


corruption , the MOST suitable option a
company can take is to
(A) back-up the data
(B). encrypt the data
(C) print the data
(D) secure the data

24. In a company's administration office,


automation may BEST be used to improve
the
(A) quality of products
(B) speed of data entry
(C) speed of production
(D) design of products

GO ON TO THE NEXT PAGE

-525. The middle manager in a company needs


access to information to make decisions.
Which of the following systems can BEST
assist the manager?
(A) A Transaction Processing System
(B) An Executive Support System
(C) A Decision Support System
(D) A Management Information System

26. In order to improve security and assess


worker performance , the manager of a
company has configured the computers to
gather information on workers ' activities when
they are at their computers . This is
COMMONLY referred to as
(A)
(B)
(C)
(D)

computer matching
computer monitoring
data skimming
data surveillance

27. Which of the following BEST protects against


electronic eavesdropping?
(A)
(B)
(C)
(D)

Parity bits
Validation checks
Encryption
Roll back procedures

Item 28 refers to the following table.


Information System

Feature

1. Management
Information Systems
2. Decision Support
Systems
3. Transaction Processing
Systems

P: Analytical models and


data analysis tools
Q: Generates summary
transaction data
R: Data from day-to-day
business operations

29. To reduce its overhead, the ABCXYZ


Company has offered its workers the option
of working full-time at home while maintaining
a constant contact with the office. This shift
in the way people work is referred to as
(A) teleconferencing
(B) telemarketing
(C) telecommuting
(D) telecommunications

30. A computer programmer employed with a


bank modified the computerised savings
system to withdraw a small amount from each
account held by the bank and deposit it in his
own account. This is an example of
(A) hacking
(B) privacy violation
(C) computer fraud

(D) cdpyright infringement

3.1. A car manufacturing plant replaces humans


with robots on one assembly line. However,
the spray painting process continues to be
done by humans.
If the assembly process increases
production without hiring new staff, which of
the following is an initial effect on the spray
painting personnel?
(A) Retraining
(B) Extra work to do
(C) Retrenchment
(D) Resistance to change

28. Match the information systems above with


a feature of that system.
(A)

IP

2R

(B)

IR

2Q

3P

(C)
(D)

lQ
IQ

2R
2P

3P
3R

021 1 50 1 0/CAPE2008

3Q

GO ON TO THE NEXT PAGE

-632. Which of the following statements is true


about expert systems?
(A) Expert systems will replace
professionals on the job in the near
future.
(B) Expert systems are great at solving
a range of problems in a broad
domain oflmowledge.
(C) Expert systems may be difficult and
costly to develop and maintain
properly.
Expert systems are ableto. leam and
(D)
develop on their own without the
need for human intervention.

33. Harry was fired from his company. A month


later, he was able to access important company
files from his computer at home. This is an
example of
(A) logical access controls being violated
(B) physical access controls being
violated
(C) unauthorized disclosure of company
information
(D) administrative controls being violated

34.

Which of the following is the result of a hacker


accessing a computer system and altering
customers' records?
(A)
(B)
(C)
(D)

Data loss
Data misuse
Data security
Data corruption

02115010/CAPE2008

35. A transaction processing system is MOST


used by the following employees.
(A) Sales Personnel
(B) Middle manager
(C) CEO
(D) Head Accountant

36. In the event of data loss due to natural


disaster, which of the following security
strategies is the LEAST effective?
(A) Standby systems .
(B) Real time updating of files
(C) Levels of security
(D) Systems backup and archiving

37. Why would you MOST likely choose a


spreadsheet package to keep track of
quantities of goods sold and the cost of these
goods?
(A) It can perform calculations easily.
(B) It can give reports easily.

(C) It can store data easily.


(D) It camfmd data easily.
38.

When the currency of information is of


priority, which of the following is the BEST
source?
(A)

Television
Books

(B)
(C)

CD-Rom

(D)

Magazines

GO ON TO THE NEXT PAGE

-739. Arrange the following information sources in


order of the LEAST current source to the
MOST current source.
(A) Magazine, book, television,
newspaper
(B) Book, magazine, television,
newspaper
(C) Newspaper, book, television,
magazine
(D) Book, magazine, newspaper,
television

40. The MOST likely reason for the Internet to


be considered a good source of information
is that it
is up to date
is easy to access
has a wide range of information
is inexpensive to use

41. Place the following teens in CORRECT


order, to represent the stages of the problemsolving process.
1. Select best option
II. Design solution .,
III. Investigate and understand problem
IV Implement solution
V. Define and analyse problem
(A) I, II, III, IV and V
(B) III, IV,II,IandV
(C) V, II, I, III and IV
(D) V, III, I, II and IV

02115010/CAPE 2008

Items 42 - 43 refer to the following situation.


You are looking for information on the
Internet and have found a site that may
provide help. To evaluate this site you use
the following characteristics.
I. Credibility
H. Bias
III. Accuracy
IV. Curreny
V. Relevance

42. If you ask yourself the following questions:


Is the information presented objectively?
Are ALL sides of the issue represented?

Which characteristic are you checking?


(A) I otily
(B) II ony
(C) III only
(D) IVonly

43. You also ask yourself these questions:


Is there an author listed?
Does the information support your research?
Does the author have credentials listed?
Does the siteprovide the information needed?
Which characteristics are you checking?
(A) I and II only

(B) I and V only


(C) III and IV only
(D) III and V only

GO ON TO THE NEXT PAGE

44. A teacher at. your school has been given the


responsibility of tracking students'
performance. Students' personal information
as well as their grades in the various subjects
must also be stored . From this, reports must
be created including graphs showing student
performance in different subjects over periods
of time . Which two packages would be
MOST suitable?
(A)
(B)
(C)
(D)

Database software , spreadsheet


,software
Wordprocessing software,
spreadsheet sofiware.
-Database software, wordprocessing
software

(A) Type of storage


(B) Type ofretrieval-,
(C) Nature of solution
(D) Type of data

Presentation software , database


software

45. A bank needs to send out monthly statements


to customers on their credit card transactions
for that month. Which ofthe following is the
BEST type of processing for gen*rating the
monthly statements?
(A)
(B)
(C)
(D)

47. Joseph Bishop is a mechanic, and for the past


three (3) years he has been storing his sales
in a spreadsheet . He has now decided that
he will reward his most frequent customer
with a free oil change. However he is finding
it very difficult to determine from the
spreadsheet who is his most frequent
customer. What tool selection criterion was
MOST likely not considered when the
spreadsheet was chosen as the tool to record
sales?

Real-time processing
Batch processing
On-line processing
Off-line processing

46. A medical doctor attempts to dissuade a


patient from purchasing a brand of computer.
Which of the following should be the MAIN
basis for rejection of the information?

48. Anna has recently finished high school and


would like to find a job inherlocal community.
Which of the following information sources
is the MOST appropriate?
(A) library
(B) Radio
(C) Newspaper
(D) Internet

9.

Which of the.following characteristics of the


information regarding an approaching
hurricane is MOST critical? .
(A) Cost
(B) Currency
(C) Format
(D) Breadth of Coverage

(A) Bias
(B) Currency
(C) Completeness
(D) Authority

GO ON TO THE NEXT PAGE

02115010/CAPE2008

SO. You are accessing a website to gather 52.


information on statistics for a project on
computer literacy in your country . All of the
following are reasons to accept or reject the
information from this site EXCEPT it is
(A)
(B)
(C)
(D)

refereed
'current
biased
free to use

Item 51 refers to the following information.

(A)
(B)
(C)
(D)

53.

Missy Elworth received an e-mail listing the


social, environmental and health risks of a
proposed environmental smelter in her area.
She was shocked at the number of
drawbacks as she always thought the project
was good for development . She therefore
proceeded to peruse the e-mail but it was a
forwarded message and the original source
was not stated . However, she remembered
some of the points in the e - mail were exactly
those raised by a political activist.on a
television news report . The sources of his
information, however, were not confirmed by
independent analysts.
51. Which issues regarding the information
sources are raised in the above paragraph?
(A) Bias, accuracy, cultural context,
completeness
(B) Authority, bias, refereed v
unrefereed , accuracy
(C) Authority, relevance, refereed v
unrefereed, currency
(D) Bias, accuracy, authority, cultural
context

A manager wishes to present a report to the


board of directors concerning the financial
performance of a company over a three-year
period. What is the best software tool that
can be used for the presentation?
Spreadsheet
Word processor
Multimedia presentation software
Database management software

Which of the following activities are part of


the implementation phase of the systems
development life cycle?

1. Convert files to new systems


U. Acquire software and hardware
III. Test the system
IV. Decide best method to acquire
system
V. Process and system modelling
VI. Train the users
(A) I, II and III only
(B) I, II and V only
(C) I, III and IV only
(D) I, III and VI only

54.

Which of the following statements are true?


I. The Internet is always a very reliable
information source.
II. Journals are generally yery reliable
sources ofinformation.
III. Information from television is always
reliable. '

IV DVD-ROMs can store greater


amounts of information than CDROMs.
(A) I and II only
(B) II and III only
(C) II and IV only
(D) III and IV bnly

IF YOU FINISH BEFORE TIIVIE IS CALLED , CHECKYOUR WORK ON THIS TEST.

021 1 501 0/CAPE2008

También podría gustarte