Here are the key features of tables, queries, forms and reports in Microsoft Access:
A. Table
B. Query
C. Form
D. Report
2
A __________ extracts and
summarises information from one or
more tables.
A. Table
B. Query
C. Form
D. Report
3
A __________ provides an easy way
to view and enter information into a
database.
A. Table
B. Query
C. Form
D. Report
4
A __________ summarises
information from the database.
A. Table
B. Query
C. Form
D. Report
5
Tables store data
The clock speed of computers is usually measured in megahertz (MHz) or gigahertz (GHz). One megahertz (MHz) represents one million cycles per second, while one gigahertz (GHz) represents one billion cycles per second. A microprocessor that runs at 200 MHz would execute 200 million cycles per second. Faster clock speeds allow microprocessors to perform more instructions per second, making the computer run faster. However, other factors also influence a computer's overall speed.
This document provides instructions for completing a computer basics worksheet. It includes 12 sections covering topics like input/output devices, computer components, storage, programs, operating systems, and the Windows desktop. Learners are asked to review powerpoint presentations for each section and answer accompanying questions that test their understanding. The goal is to help students learn foundational computer concepts in a hands-on way through interactive study and assessment.
The document contains a multiple choice test with 60 questions about various topics related to computers and their history. The questions cover topics such as computer hardware components, software, programming languages, early computers, units of measurement, companies/founders, and applications. The key provided indicates the correct answer for each question.
This is the Continuous Assessment Test for SS2 DP with Test of Practicals included. It is accurately measured so that more than one students can get a copy from a single print out.
This document contains a set of multiple choice questions and answers related to data structures. There are 56 questions covering topics like hashing, graphs, trees, sorting algorithms, linked lists, stacks, queues, arrays, and more. The questions test knowledge of concepts like time complexity, operations on different data structures, representations of data like matrices and graphs, and algorithms that use common data structures.
The document provides information about MS Word shortcuts and features through multiple choice questions. It notes that Ctrl+Alt+T can be used to insert a trademark symbol, Ctrl+Alt+C can insert a copyright symbol, and Ctrl+Alt+B marks a citation. Microsoft Word was first launched on October 25, 1983.
This document contains a practice test with multiple choice questions about basic computer hardware, software, and concepts. Some of the questions test knowledge of computer components like monitors, hard drives, and operating systems. Other questions cover common computer tasks and applications like word processing, file management, and internet browsing. The test also includes questions about ergonomics, ethics, and the appropriate use of technology.
The clock speed of computers is usually measured in megahertz (MHz) or gigahertz (GHz). One megahertz (MHz) represents one million cycles per second, while one gigahertz (GHz) represents one billion cycles per second. A microprocessor that runs at 200 MHz would execute 200 million cycles per second. Faster clock speeds allow microprocessors to perform more instructions per second, making the computer run faster. However, other factors also influence a computer's overall speed.
This document provides instructions for completing a computer basics worksheet. It includes 12 sections covering topics like input/output devices, computer components, storage, programs, operating systems, and the Windows desktop. Learners are asked to review powerpoint presentations for each section and answer accompanying questions that test their understanding. The goal is to help students learn foundational computer concepts in a hands-on way through interactive study and assessment.
The document contains a multiple choice test with 60 questions about various topics related to computers and their history. The questions cover topics such as computer hardware components, software, programming languages, early computers, units of measurement, companies/founders, and applications. The key provided indicates the correct answer for each question.
This is the Continuous Assessment Test for SS2 DP with Test of Practicals included. It is accurately measured so that more than one students can get a copy from a single print out.
This document contains a set of multiple choice questions and answers related to data structures. There are 56 questions covering topics like hashing, graphs, trees, sorting algorithms, linked lists, stacks, queues, arrays, and more. The questions test knowledge of concepts like time complexity, operations on different data structures, representations of data like matrices and graphs, and algorithms that use common data structures.
The document provides information about MS Word shortcuts and features through multiple choice questions. It notes that Ctrl+Alt+T can be used to insert a trademark symbol, Ctrl+Alt+C can insert a copyright symbol, and Ctrl+Alt+B marks a citation. Microsoft Word was first launched on October 25, 1983.
This document contains a practice test with multiple choice questions about basic computer hardware, software, and concepts. Some of the questions test knowledge of computer components like monitors, hard drives, and operating systems. Other questions cover common computer tasks and applications like word processing, file management, and internet browsing. The test also includes questions about ergonomics, ethics, and the appropriate use of technology.
The document discusses the basic components and functions of a computer system. It defines key parts like the keyboard, CPU, and monitor. The CPU is described as the brain of the computer and consists of the control unit, arithmetic logic unit, and memory unit. Binary numerals using 0s and 1s are also mentioned. Common computer terms are defined, such as input, output, process, desktop icons, window controls, and functions like multitasking. Printers, storage, and other standard input/output devices are also covered at a high level.
This document contains 60 multiple choice questions with answers about computers and technology. The questions cover topics such as computer components, operating systems, software, hardware, file formats, networking, and internet terminology. The correct answers are provided for each question.
The document is a quiz on basic computer concepts. It contains 25 multiple choice questions testing knowledge of hardware components like hard disks, floppy disks, RAM and ROM. It also covers topics like operating systems, software, processors, and computer manufacturers. The questions have a single correct answer that is revealed after each question. The quiz covers foundational computer terminology and components from storage to processors to peripherals.
This document contains a mid-term examination paper for Class VIII students. It tests their knowledge in the subjects of Mathematics, Computer Science, and English.
The Mathematics section contains 20 multiple choice questions testing concepts like sets, square roots, radicals, number systems, and algebraic expressions. The Computer Science section has 12 multiple choice questions on topics such as hexadecimal conversion, binary addition, word processing functions, and programming basics.
The English section begins with 2 sample multiple choice comprehension questions. Sections B and C of each subject contain longer form questions to be answered in paragraphs, involving explanations, calculations, and problem solving. Students have 3 hours to complete the entire exam which is worth a total of 100 marks.
Students are to follow rules in the computer lab for safety and to prevent damage to equipment. They should sit properly at their assigned station, only use the computer as instructed by the teacher, and report any issues to the teacher. Students are not allowed to litter, remove cables or items from the lab, insert objects into computers, or bring food or drinks inside.
This is my first term examination for JSS3. It comprises of two parts, each part having 60 obj questions. This is intended to prepare them extensively for their upcoming BECE Examination. Which comprises of the things they have learnt from JS1 to JS3
This document provides an overview of Microsoft Office applications like Word, Excel, and PowerPoint as well as topics like the internet and multimedia. It discusses how to create and edit documents in Word, perform calculations and visualize data in Excel, create presentations in PowerPoint, and use the internet for email, information searching, communication, and more. It also defines multimedia as integrating different media types and lists its key components like text, images, animations, audio, and video.
1) A bit is the smallest unit of computer data and can have a value of 0 or 1. 8 bits form a byte.
2) Common units of computer data storage are the kilobyte (KB), megabyte (MB), gigabyte (GB), terabyte (TB), petabyte (PB), exabyte (EB), zettabyte (ZB), and yottabyte (YB), with each being 1024 times larger than the previous unit.
3) These units are used to measure and describe computer memory, storage, and data transmission speeds in bytes, kilobytes, megabytes etc. depending on the size of the data or storage being referred to
This document appears to be an exam for a Computer Studies class. It contains questions testing knowledge of computer and internet concepts. The exam has four sections - objectives with multiple choice questions, three theory questions requiring explanations of concepts, and a final section on responsible computer and internet use. Some of the concepts examined include the internet, websites, email, computer networks, data transmission, and abuses/responsible uses of technology.
This document contains a model question paper for the Grade 10 Information and Communication Technology (ICT) examination in Sri Lanka. It includes 45 multiple choice questions testing concepts related to data, information, computer hardware and software, networking, and the role of ICT in various fields such as education, healthcare, and government services. The questions cover topics ranging from the first generation of computers to the latest technologies.
This document provides information about Digitech Hardware Academy, including its address and contact details. It then outlines the table of contents for topics on basic computer programming, Microsoft Office programs, what is the internet, and MS-DOS. The document also includes sections about the definition of a computer, classifications of computers by size and generation, components of the computer system, and applications of computers.
This document contains a mid-term examination question paper for Class VI from Fazia Schools & Colleges. The paper tests students on their knowledge of mathematics, computer science, and English. It includes multiple choice and short answer questions assessing topics like sets, numbers, computers, grammar, and literature comprehension. The exam is divided into three sections and covers areas of the curriculum for these subjects at the sixth grade level.
This document appears to be a computer studies exam for JSS1 students covering topics like uses of computers, data processing, hardware components, and basic computer operations. It contains a 30 question multiple choice section and 4 essay questions requiring explanations of keyboard types, data processing methods, device classes, and booting/shutting down a computer system.
This questions are to prepare them for computer Studies BECE for both Neco and Junior Waec. The more you prepare with these questions the more they get ready for the actual Examination.
The document contains multiple choice questions and answers related to computers and operating systems. It tests knowledge about storage and memory, input/output devices, operating systems, file management, networking, and security. Some key topics covered include the functions of operating systems, components of computers like CPU and memory, file systems, basic networking concepts, and security threats.
J.S.S.1 Computer Studies 3rd Term ExaminationEjiro Ndifereke
The document is an examination instruction sheet for Queen Diana International Schools' third term JSS1 exams in Computer Studies. It instructs students that the exam will be 1 hour and 30 minutes, with Section A containing objective questions and Section B containing 5 theory questions of which they must answer 3. It notes that students should write clearly and indicate which questions they are answering to avoid losing marks.
This is my first term examination for SS3 D.P. It is well detailed as it covers every part of the scheme. It contains three parts namely; Objective, Theory, Test of Practical a normal standard WAEC Examination.
This is my first term Examination questions for Junior Secondary School One popularly known as JSS1. Each questions are detailed as it covers the whole scheme for the first term.
SS2 Data Processing Examination with Test of Practicals (Third Term)Ejiro Ndifereke
This document appears to be an exam for a Data Processing class covering topics related to presentation software, web design, and graphic design packages. It contains 40 multiple choice questions in Section A and instructions for answering 3 theory questions in Section B. The questions cover topics such as presentation views, slide layouts, transitions, animations, web design components and packages, HTML code, and graphic design packages. It provides students with an assessment of their knowledge on using software for presentations, building websites, and designing graphics.
34 Multiple choice questions, 3 points each t1. The practice of be.pdfarjuncorner565
34 Multiple choice questions, 3 points each t
1. The practice of becoming the largest purchaser of products from a given supplier is an
example of:
A. Cost leadership
B. Growth strategies
C. Differentiation
D. Locking in the supplier
2. Becoming a low-cost producer of products and services in an industry is an example of a(n):
A. Cost leadership strategy
B. Differentiation strategy
C. Innovation strategy
D. Growth strategy
3. Companies like Wal-Mart extend their networks to their customers and suppliers in order to
build innovative continuous inventory replenishment systems that would lock in their business.
This creates a(n) _______________ information system.
A. leveraged
B. inter-enterprise
C. intra-enterprise
D. locked-in
4. A serious problem of competitive advantage is that:
A. It normally doesn\'t last very long and it isn\'t sustainable over the long term
B. Competitors figure out how it was done and do the same thing
C. A competitive advantage can become a competitive necessity
D. All of the choices are correct.
5. Organizations are examples of _______________ systems because they interface and interact
with other systems in their environment.
A. linked
B. open
C. dependent
D. parallel
6. The majority of organizations today would be classified as _______________ systems.
A. open
B. closed
C. open adaptive
D. closed adaptive
7. Telecommunications networks consist of _______________.
A. computers, the Internet, intranets, and extranets
B. communications processors
C. devices interconnected by communication media and controlled by communications software
D. All of the choices are correct.
8. All of the following normally happens to data during a value-added process except:
A. Their useful life is determined
B. Their form is aggregated, manipulated, and organized
C. Their content is analyzed and evaluated
D. They are placed in a proper context for a human user
9. Which of the following is an advantage of RAID?
A. It provides virtually unlimited online storage
B. It provides high access speeds
C. It provides fault-tolerant storage capacity
D. All of the choices are advantages.
10. All of the following are considered characteristics of a desktop publishing package except:
A. Used to print newsletters and brochures
B. Imports text and graphic files from other programs
C. Used for business analysis and modeling
D. Used to print books and manuals
11. According to the text, spreadsheet packages are used by virtually every business for
_______________.
A. analysis, planning, and modeling
B. maintaining accounting records, such as a general ledger
C. keeping up-to-the-minute inventory records
D. tracking human resources
12. Cloud computing is not:
A. Grid computing
B. A style of computing users need not have knowledge, expertise, or control over the
technological infrastructure
C. A style of computing where resources are provided as a service over the Internet
D. A metaphor for the Internet
13. System management programs:
A. Manage the hardware, .
1. ________ occur(s) when data are isolated in separated informa.docxpaynetawnya
1. ________ occur(s) when data are isolated in separated information systems.
A.
Walled garden
B.
Information silos
C.
Scheduling
D.
System integration
2. Which of the following is true about personal information systems?
A.
Personal information systems that support a particular department are sometimes called departmental information systems.
B.
Because one is the sole user of the new system, if new procedures are required, one needs professional help to get the job done.
C.
Such systems have only one user and hence procedures need not be documented or formalized in any significant way.
D.
The solutions to problems in a personal information system usually involve more than one department.
3. Which of the following is an example of a personal information system?
A.
scheduling of groundskeeping
B.
contact manager
C.
charging of membership fees
D.
ordering of restaurant supplies from suppliers
4. A Web store front is an example of a(n) ________.
A.
interenterprise information system
B.
collaborative information system
C.
functional information system
D.
departmental information system
5. ________ are information systems that are shared by two or more independent organizations.
A.
Interenterprise information systems
B.
Workgroup information systems
C.
Enterprise information systems
D.
Personal information systems
6. Which of the following applications falls under the common departmental information system of sales and marketing?
A.
order tracking
B.
general ledger
C.
lead generation
D.
assessment
7. ________ is an application of the human resources department.
A.
Compensation
B.
Planning
C.
Financial reporting
D.
Lead tracking
8. Which of the following is a consequence of isolated information systems?
A.
Data cannot get duplicated.
B.
Business processes are coherent and efficient.
C.
Decision are made is union with other systems.
D.
There is a lack of integrated enterprise information.
9. ________ is the activity of altering and designing business processes to take advantage of new information systems.
A.
Business process management
B.
Business process reengineering
C.
Business process improvement
D.
Business process interoperability
10. Inherent processes are ________.
A.
time-consuming business processes and involve substantial investment.
B.
predesigned procedures for using the software products
C.
result from altering & designing business processes to take advantage of new information systems.
D.
preferred by employees due to the ease & structure they bring to functional applications.
11. B2B refers to e-commerce sales between:
A.
business and banks
B.
business and customers
C.
business and government
D.
businesses
12. E-commerce businesses dealing with sales between a supplier and a retail consumer are ________.
A.
B2C
B.
B2 ...
The document discusses the basic components and functions of a computer system. It defines key parts like the keyboard, CPU, and monitor. The CPU is described as the brain of the computer and consists of the control unit, arithmetic logic unit, and memory unit. Binary numerals using 0s and 1s are also mentioned. Common computer terms are defined, such as input, output, process, desktop icons, window controls, and functions like multitasking. Printers, storage, and other standard input/output devices are also covered at a high level.
This document contains 60 multiple choice questions with answers about computers and technology. The questions cover topics such as computer components, operating systems, software, hardware, file formats, networking, and internet terminology. The correct answers are provided for each question.
The document is a quiz on basic computer concepts. It contains 25 multiple choice questions testing knowledge of hardware components like hard disks, floppy disks, RAM and ROM. It also covers topics like operating systems, software, processors, and computer manufacturers. The questions have a single correct answer that is revealed after each question. The quiz covers foundational computer terminology and components from storage to processors to peripherals.
This document contains a mid-term examination paper for Class VIII students. It tests their knowledge in the subjects of Mathematics, Computer Science, and English.
The Mathematics section contains 20 multiple choice questions testing concepts like sets, square roots, radicals, number systems, and algebraic expressions. The Computer Science section has 12 multiple choice questions on topics such as hexadecimal conversion, binary addition, word processing functions, and programming basics.
The English section begins with 2 sample multiple choice comprehension questions. Sections B and C of each subject contain longer form questions to be answered in paragraphs, involving explanations, calculations, and problem solving. Students have 3 hours to complete the entire exam which is worth a total of 100 marks.
Students are to follow rules in the computer lab for safety and to prevent damage to equipment. They should sit properly at their assigned station, only use the computer as instructed by the teacher, and report any issues to the teacher. Students are not allowed to litter, remove cables or items from the lab, insert objects into computers, or bring food or drinks inside.
This is my first term examination for JSS3. It comprises of two parts, each part having 60 obj questions. This is intended to prepare them extensively for their upcoming BECE Examination. Which comprises of the things they have learnt from JS1 to JS3
This document provides an overview of Microsoft Office applications like Word, Excel, and PowerPoint as well as topics like the internet and multimedia. It discusses how to create and edit documents in Word, perform calculations and visualize data in Excel, create presentations in PowerPoint, and use the internet for email, information searching, communication, and more. It also defines multimedia as integrating different media types and lists its key components like text, images, animations, audio, and video.
1) A bit is the smallest unit of computer data and can have a value of 0 or 1. 8 bits form a byte.
2) Common units of computer data storage are the kilobyte (KB), megabyte (MB), gigabyte (GB), terabyte (TB), petabyte (PB), exabyte (EB), zettabyte (ZB), and yottabyte (YB), with each being 1024 times larger than the previous unit.
3) These units are used to measure and describe computer memory, storage, and data transmission speeds in bytes, kilobytes, megabytes etc. depending on the size of the data or storage being referred to
This document appears to be an exam for a Computer Studies class. It contains questions testing knowledge of computer and internet concepts. The exam has four sections - objectives with multiple choice questions, three theory questions requiring explanations of concepts, and a final section on responsible computer and internet use. Some of the concepts examined include the internet, websites, email, computer networks, data transmission, and abuses/responsible uses of technology.
This document contains a model question paper for the Grade 10 Information and Communication Technology (ICT) examination in Sri Lanka. It includes 45 multiple choice questions testing concepts related to data, information, computer hardware and software, networking, and the role of ICT in various fields such as education, healthcare, and government services. The questions cover topics ranging from the first generation of computers to the latest technologies.
This document provides information about Digitech Hardware Academy, including its address and contact details. It then outlines the table of contents for topics on basic computer programming, Microsoft Office programs, what is the internet, and MS-DOS. The document also includes sections about the definition of a computer, classifications of computers by size and generation, components of the computer system, and applications of computers.
This document contains a mid-term examination question paper for Class VI from Fazia Schools & Colleges. The paper tests students on their knowledge of mathematics, computer science, and English. It includes multiple choice and short answer questions assessing topics like sets, numbers, computers, grammar, and literature comprehension. The exam is divided into three sections and covers areas of the curriculum for these subjects at the sixth grade level.
This document appears to be a computer studies exam for JSS1 students covering topics like uses of computers, data processing, hardware components, and basic computer operations. It contains a 30 question multiple choice section and 4 essay questions requiring explanations of keyboard types, data processing methods, device classes, and booting/shutting down a computer system.
This questions are to prepare them for computer Studies BECE for both Neco and Junior Waec. The more you prepare with these questions the more they get ready for the actual Examination.
The document contains multiple choice questions and answers related to computers and operating systems. It tests knowledge about storage and memory, input/output devices, operating systems, file management, networking, and security. Some key topics covered include the functions of operating systems, components of computers like CPU and memory, file systems, basic networking concepts, and security threats.
J.S.S.1 Computer Studies 3rd Term ExaminationEjiro Ndifereke
The document is an examination instruction sheet for Queen Diana International Schools' third term JSS1 exams in Computer Studies. It instructs students that the exam will be 1 hour and 30 minutes, with Section A containing objective questions and Section B containing 5 theory questions of which they must answer 3. It notes that students should write clearly and indicate which questions they are answering to avoid losing marks.
This is my first term examination for SS3 D.P. It is well detailed as it covers every part of the scheme. It contains three parts namely; Objective, Theory, Test of Practical a normal standard WAEC Examination.
This is my first term Examination questions for Junior Secondary School One popularly known as JSS1. Each questions are detailed as it covers the whole scheme for the first term.
SS2 Data Processing Examination with Test of Practicals (Third Term)Ejiro Ndifereke
This document appears to be an exam for a Data Processing class covering topics related to presentation software, web design, and graphic design packages. It contains 40 multiple choice questions in Section A and instructions for answering 3 theory questions in Section B. The questions cover topics such as presentation views, slide layouts, transitions, animations, web design components and packages, HTML code, and graphic design packages. It provides students with an assessment of their knowledge on using software for presentations, building websites, and designing graphics.
34 Multiple choice questions, 3 points each t1. The practice of be.pdfarjuncorner565
34 Multiple choice questions, 3 points each t
1. The practice of becoming the largest purchaser of products from a given supplier is an
example of:
A. Cost leadership
B. Growth strategies
C. Differentiation
D. Locking in the supplier
2. Becoming a low-cost producer of products and services in an industry is an example of a(n):
A. Cost leadership strategy
B. Differentiation strategy
C. Innovation strategy
D. Growth strategy
3. Companies like Wal-Mart extend their networks to their customers and suppliers in order to
build innovative continuous inventory replenishment systems that would lock in their business.
This creates a(n) _______________ information system.
A. leveraged
B. inter-enterprise
C. intra-enterprise
D. locked-in
4. A serious problem of competitive advantage is that:
A. It normally doesn\'t last very long and it isn\'t sustainable over the long term
B. Competitors figure out how it was done and do the same thing
C. A competitive advantage can become a competitive necessity
D. All of the choices are correct.
5. Organizations are examples of _______________ systems because they interface and interact
with other systems in their environment.
A. linked
B. open
C. dependent
D. parallel
6. The majority of organizations today would be classified as _______________ systems.
A. open
B. closed
C. open adaptive
D. closed adaptive
7. Telecommunications networks consist of _______________.
A. computers, the Internet, intranets, and extranets
B. communications processors
C. devices interconnected by communication media and controlled by communications software
D. All of the choices are correct.
8. All of the following normally happens to data during a value-added process except:
A. Their useful life is determined
B. Their form is aggregated, manipulated, and organized
C. Their content is analyzed and evaluated
D. They are placed in a proper context for a human user
9. Which of the following is an advantage of RAID?
A. It provides virtually unlimited online storage
B. It provides high access speeds
C. It provides fault-tolerant storage capacity
D. All of the choices are advantages.
10. All of the following are considered characteristics of a desktop publishing package except:
A. Used to print newsletters and brochures
B. Imports text and graphic files from other programs
C. Used for business analysis and modeling
D. Used to print books and manuals
11. According to the text, spreadsheet packages are used by virtually every business for
_______________.
A. analysis, planning, and modeling
B. maintaining accounting records, such as a general ledger
C. keeping up-to-the-minute inventory records
D. tracking human resources
12. Cloud computing is not:
A. Grid computing
B. A style of computing users need not have knowledge, expertise, or control over the
technological infrastructure
C. A style of computing where resources are provided as a service over the Internet
D. A metaphor for the Internet
13. System management programs:
A. Manage the hardware, .
1. ________ occur(s) when data are isolated in separated informa.docxpaynetawnya
1. ________ occur(s) when data are isolated in separated information systems.
A.
Walled garden
B.
Information silos
C.
Scheduling
D.
System integration
2. Which of the following is true about personal information systems?
A.
Personal information systems that support a particular department are sometimes called departmental information systems.
B.
Because one is the sole user of the new system, if new procedures are required, one needs professional help to get the job done.
C.
Such systems have only one user and hence procedures need not be documented or formalized in any significant way.
D.
The solutions to problems in a personal information system usually involve more than one department.
3. Which of the following is an example of a personal information system?
A.
scheduling of groundskeeping
B.
contact manager
C.
charging of membership fees
D.
ordering of restaurant supplies from suppliers
4. A Web store front is an example of a(n) ________.
A.
interenterprise information system
B.
collaborative information system
C.
functional information system
D.
departmental information system
5. ________ are information systems that are shared by two or more independent organizations.
A.
Interenterprise information systems
B.
Workgroup information systems
C.
Enterprise information systems
D.
Personal information systems
6. Which of the following applications falls under the common departmental information system of sales and marketing?
A.
order tracking
B.
general ledger
C.
lead generation
D.
assessment
7. ________ is an application of the human resources department.
A.
Compensation
B.
Planning
C.
Financial reporting
D.
Lead tracking
8. Which of the following is a consequence of isolated information systems?
A.
Data cannot get duplicated.
B.
Business processes are coherent and efficient.
C.
Decision are made is union with other systems.
D.
There is a lack of integrated enterprise information.
9. ________ is the activity of altering and designing business processes to take advantage of new information systems.
A.
Business process management
B.
Business process reengineering
C.
Business process improvement
D.
Business process interoperability
10. Inherent processes are ________.
A.
time-consuming business processes and involve substantial investment.
B.
predesigned procedures for using the software products
C.
result from altering & designing business processes to take advantage of new information systems.
D.
preferred by employees due to the ease & structure they bring to functional applications.
11. B2B refers to e-commerce sales between:
A.
business and banks
B.
business and customers
C.
business and government
D.
businesses
12. E-commerce businesses dealing with sales between a supplier and a retail consumer are ________.
A.
B2C
B.
B2 ...
(New) final exam for bis 219 all correct answers 100%liamSali
This document provides the questions and multiple choice answers to a sample business information systems final exam. It contains 30 multiple choice questions covering topics like the characteristics of the modern business environment, definitions of key IS and business terms, data management challenges, ERP systems, supply chain management, and more. The document encourages leaving positive feedback if the questions are helpful and wishes the reader good luck on their exam.
(New) final exam for bis 219 bis 219 all correct answers 100%ri0908O0o
This document provides the questions and multiple choice answers to a sample business information systems final exam. It contains 30 questions testing knowledge of topics like business environments, data vs. information vs. knowledge, information systems capabilities, databases, data management, data warehousing, data integrity, e-commerce models, enterprise resource planning systems, supply chain management, and Toyota's lean production system. The document encourages leaving positive feedback if the questions helped study for the exam.
Bis 219 final exam mcq`s correct answers 100%Austing_3
This document provides the questions and multiple choice answers to a sample business information systems final exam. It contains 30 multiple choice questions covering topics like the characteristics of the modern business environment, definitions of key information systems concepts, data management challenges at companies like Panasonic and International Game Technology, ERP systems, Toyota's lean production system, and supply chain management goals. It also provides a brief note at the top requesting the reader to leave positive feedback if the questions were helpful in studying for their exam.
(New) final exam for bis 219 all correct answers 100%quikly11
This document provides the questions and multiple choice answers to a sample business information systems final exam. It contains 30 multiple choice questions covering topics like the characteristics of the modern business environment, definitions of key IS and business terms, data management challenges, ERP systems, supply chain management, and more. The document encourages leaving positive feedback if the questions are helpful and wishes the reader good luck on their exam.
Bis 219 final exam mcq`s correct answers 100%liamSali
This document provides the questions and multiple choice answers to a sample business information systems final exam. It contains 30 multiple choice questions covering topics like the characteristics of the modern business environment, definitions of key IS and business terms, data management challenges and solutions, ERP systems, supply chain management, and Toyota's lean production practices. The document encourages leaving positive feedback if the provided questions are helpful for studying.
Final Examination1INFORMATION MANAGEMENTMultiple C.docxmydrynan
Final Examination
1
INFORMATION MANAGEMENT
Multiple Choice Questions (Enter your answers on the enclosed answer sheet)
1. The fundamental set of assumptions, values, and ways of doing things, that
has been accepted by most of a company’s members is called its:
a. culture.
b. environment.
c. atmosphere.
d. values.
2. Business processes:
a. include informal work practices.
b. are used primarily for sales and accounting functions.
c. are governed by information technology.
d. are logically related tasks used primarily by operational personnel.
3. Data management technology consists of:
a. the physical hardware and media used by an organization for storing
data.
b. the detailed, pre-programmed instructions that control and coordinate
the computer hardware components in an information system.
c. the software governing the organization of data on physical storage me-
dia.
d. the hardware and software used to transfer data.
4. The hardware and software used to transfer data in an organization is called:
a. data management technology.
b. networking and data management technology.
c. data and telecommunications technology.
d. networking and telecommunications technology.
5. An intranet uses:
a. mainframe technology.
b. infrared telecommunications systems.
c. the telecommunications capacities of fiber optic networks.
d. Internet technology within the boundaries of the firm.
2
Final Examination
INFORMATION MANAGEMENT
6. The first step in the four-step model of business problem solving is:
a. agreeing that a problem exists.
b. identifying the problem.
c. outlining the problem’s causes.
d. assigning the problem to a problem solver.
7. Inadequate database capacity is an example of the _______dimension of
business problems.
a. technology
b. organizational
c. people
d. management
8. Legal and regulatory compliance is an example of the _______ dimension of
business problems.
a. management
b. organizational
c. people
d. technology
9. The term “management information systems” designates a specific category
of information systems serving:
a. integrated data processing throughout the firm.
b. transaction process reporting.
c. employees with online access to historical records.
d. middle management functions.
10. Management information systems support the:
a. long-range planning activities of senior management.
b. knowledge and data workers in an organization.
c. administrative activities of middle managers.
d. day-to-day processes of production.
11. These systems are designed to ...
This document contains a chapter about business processes, information, and information systems. It includes multiple choice and fill in the blank questions about these topics. The questions cover topics like the definition of information, characteristics of good information, components of information systems, and examples of manual vs automated systems.
1. An accounting information system (AIS) collects and processes data into useful information for management decision making, provides controls to safeguard assets, and reviews past business transactions.
2. Key aspects that influence AIS design include organizational culture, information technology, business strategy, and the legal environment.
3. The five major business processes are the procurement cycle, revenue/receipts cycle, expenditure/payment cycle, production/conversion cycle, and the financing cycle.
The document contains a chapter about how information systems are used in business. It includes multiple choice questions that test understanding of the core components of an information system like hardware, software, data, and procedures. It also covers key concepts such as how MIS (management information systems) helps businesses achieve goals and how information technology enables competitive advantages when used properly in a business context.
S3 DATA PROCESSING FIRST TERM PRE-WAEC (2ND HALF EXAMINATION)Ejiro Ndifereke
This document contains a 50 question multiple choice exam on data processing and computer concepts. The exam covers topics such as database security, social media, spreadsheets, word processing, computer hardware, operating systems, software, computer networks, and computer ethics. It also includes practical questions involving the use of Microsoft Word and Excel to complete tasks like creating tables and calculating values.
This document contains multiple choice and true/false questions about management information systems. The questions cover topics such as the history of computers, Moore's law, MIS models, artificial intelligence, decision support systems, ERP software, strategic planning levels, and functions of management. The document tests knowledge of concepts addressed in the 9th edition of a management information systems textbook.
This document contains multiple choice and true/false questions about management information systems. It tests knowledge on topics like early computers, Moore's law, MIS models, artificial intelligence, personal productivity systems, ERP software, management levels, and decision making. The questions cover a wide range of concepts from the 9th edition of the textbook "Management Information Systems".
The document contains a 30 question multiple choice exam on topics related to information systems and technology. It covers subjects like enterprise systems, end-user computing, expert systems, privacy and security issues, databases, e-commerce models, wireless networking standards, spreadsheet formulas, project feasibility analysis, presentation software, intranets, the internet, and social media.
The document contains a 30 question multiple choice exam on topics related to information systems and technology. It covers subjects like enterprise systems, end-user computing, expert systems, privacy and security issues, databases, e-commerce models, wireless networking standards, spreadsheet formulas, project feasibility analysis, presentation software, intranets, the internet, and social media.
The document contains a 30 question multiple choice exam on topics related to information systems and technology. It covers subjects like enterprise systems, end-user computing, expert systems, privacy and data issues, databases, network applications, e-commerce models, wireless networking standards, spreadsheet formulas, presentation software, intranets, the internet, and social media.
This document provides an overview of information technology and its role in business. It discusses the basic components of a computer including hardware, software, and data. It defines key terms like data, information, and how information technology can help businesses through communication, inventory management, management information systems, and customer relationship management. The document is intended to educate readers on the basics of information technology and its growing importance in business applications and management.
The document contains questions about computer systems and technology that cover topics such as users, storage devices, processing units, application and system software. It tests knowledge on the definition of key terms, the information processing cycle, and it features pictures of common computer devices that must be correctly matched to their names. The document contains multiple choice, true/false, and short answer questions assessing understanding of fundamental computer concepts.
Bis 220 final exam mcq`s correct answers 100%Austing_3
This document provides answers to a 30 question multiple choice exam on information systems topics. It notes that the questions will be randomly selected from a large set, so the answers provided may not match exactly. It asks for positive feedback if the answers were helpful and wishes the user good luck on the exam.
The document is an assessment checklist form used to evaluate a student's presentation on the impact of information and communication technology (ICT) on society. It assesses the student based on criteria such as locating information from multiple sources, presenting the information in 5 to 10 slides covering the topic, content, and conclusion with sources referenced. The student is also evaluated on cooperation by listing group members and verification from them or the assessor's observation. The maximum total mark for the assessment is 10.
This document provides the criteria and instructions for a group presentation on the impact of information and communication technology (ICT) on society. Students must:
1. Locate information from more than one source on one of seven topics related to ICT and society.
2. Present the information in a 5-10 slide presentation covering the topic, content, and conclusions.
3. Submit a soft or hard copy of the presentation and display cooperation by including the names of group members or getting verbal confirmation from them.
Teknologi komputer mengancam privasi individu melalui pengumpulan data peribadi tanpa izin seperti alamat, umur, dan status perkahwinan untuk membentuk profil elektronik yang boleh dijual. Ancaman ini termasuk cookies, spyware, spam, dan pengiklanan berprofil tinggi. Undang-undang privasi dan perisian keselamatan perlu dilaksanakan untuk melindungi hak privasi pengguna.
Dokumen tersebut memberikan definisi tentang harta intelektual, maklumat, komunikasi, teknologi, dan ICT. ICT dijelaskan sebagai teknologi yang diperlukan untuk memproses maklumat dengan menggunakan peranti elektronik, komunikasi, dan aplikasi perisian untuk menukar, menyimpan, melindungi, memproses, menghantar, dan mengambil maklumat dari mana-mana tempat dan masa. Undang-undang harta intelektual
1) Ukuran keselamatan komputer seperti data backup, kriptografi, antivirus, anti-spyware dan firewall digunakan untuk melindungi sistem komputer dan maklumat daripada ancaman seperti virus, hacker, dan kecurian.
2) Ancaman komputer termasuk kod jahat, hacker, bencana alam, dan kecurian komputer atau maklumat. Langkah-langkah perlu diambil untuk mengawal akses, mengesan virus, dan mencegah kecurian.
The document summarizes the five generations of computers from the 1940s to present. The 1st generation (1940-1956) used vacuum tubes, were large and unreliable. The 2nd generation (1956-1963) introduced transistors which were smaller and more reliable than vacuum tubes. The 3rd generation (1964-1971) saw the development of silicon chips and microprocessors. The 4th generation (1971-present) brought personal computers from companies like Apple and IBM that were smaller and more powerful due to hardware advances. The 5th generation (present and beyond) involves new technologies like robotics, virtual reality, and artificial intelligence.
Dokumen tersebut membahas tentang etika komputer dan kode etika yang sesuai atau tidak sesuai. Kode etika yang sesuai meliputi memberikan peringatan tentang virus, meminta izin sebelum mengirim iklan, dan menggunakan informasi dengan izin. Kode etika yang tidak sesuai meliputi memodifikasi informasi tanpa izin, menjual informasi tanpa izin, dan mencuri perangkat lunak.
This document outlines topics related to computer systems, including definitions of key concepts like input, processor, output, and storage. It describes the basic information processing cycle and data representation at the bit and byte level. Measurement units for data, clock speed, and types of hardware components like CPUs, memory, storage devices, input/output devices are defined. The document also discusses operating systems, application software, and utility programs. Finally, it addresses assembling computer systems, partitioning and formatting storage, and installing software.
This document discusses information and communication technology (ICT) and its impact on society. It covers topics such as the definition and evolution of ICT, computer ethics and legal issues like intellectual property and privacy, computer security threats and measures, and both the positive and negative impacts of ICT on society. The document provides an overview of key concepts and issues relating to the role of ICT in modern society.
This document outlines topics related to computer networks and communications. It covers basic concepts such as defining networks and communications, types of networks including LAN, MAN and WAN, network architectures like client/server and peer-to-peer, and network topologies including bus, ring and star. The document also discusses hardware requirements for networking including devices like NICs, modems, hubs and routers, as well as cabling and wireless transmission media. Software requirements cover network operating systems and client software. Additional sections provide information on setting up network facilities and current/future developments in networking technology.
The document provides guidelines for assessing coursework for the ICT subject in the SPM examination. It outlines 13 constructs and 15 aspects that will be assessed across 6 learning areas. Candidates will be assessed on their practical skills and knowledge of current and future developments in areas like computer security, networking, multimedia, programming and information systems. Teachers are responsible for conducting assessments using various instruments like demonstrations, presentations, written assignments and projects. Candidates must submit portfolios as evidence and will be penalized for late or repeated submissions.
a. DBMS membolehkan pengguna mengurus dan mengakses maklumat dalam pangkalan data
b. Kunci primer dan asing membolehkan hubungan antara jadual dan mengenal pasti rekod unik
c. Objek pangkalan data seperti jadual, pertanyaan, borang dan laporan memudahkan manipulasi dan persembahan maklumat
Dokumen tersebut membincangkan bahasa pengaturcaraan terkini seperti bahasa generasi kelima yang tertumpu kepada penyelesaian masalah, bahasa tabii yang menggunakan bahasa Inggeris biasa, dan pustaka grafik terbuka (OpenGL) yang menentukan standard untuk aplikasi grafik 3D dan 2D.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
GridMate - End to end testing is a critical piece to ensure quality and avoid...
Cd ict-worksheet-la6-form-5
1. LESSON 41
Data, Information And Information Systems
1. Data is_____________
A. a collection of facts
B. useful if it is organised
C. a collection of information
D. useful if it is not organised
C. video
D. photo
9. Collecting and processing data are among
the functions of an information
__________.
A. file
B. system
C. storage
D. component
2. Information is______________ that is
valuable and meaningful to a specific user.
A. raw data
B. picture data
C. primary data
D. organised data
3.
video
picture
document
multimedia
When ______ is arranged and organised in
a meaningful way, it becomes information.
A. file
B. data
C. folder
D. document
5.
10. When data is arranged in a
_________way, it becomes information.
A. top down
B. ascending
C. descending
D. meaningful
Output is usually in the form of ________
A.
B.
C.
D.
4.
SCORE
Which of the following is NOT an example
of audio data?
A. Voice
B. Tones
C. Sound
D. Numerical
11. Which of the following is NOT a component
of information system?
A. collect data
B. process data
C. transfer data
D. provide information
12. W is in the form of documents. What is
“W”?
A. Input
B. Output
C. Process
D. Input device
6. An information system is a set of related
components that
I. collects data
II. processes data
III. provides information
IV. makes strategies for company
A. I, II and III
B. I, II and IV
C. II, III and IV
D. I, III and IV
13. Process involves ________________ data.
I. storing
II. printing
III. calculating
IV. comparing
7. Which data type consists of sentences and
paragraphs?
A. Text
B. Audio
C. Image
D. Alphanumeric
14. When ____________ is arranged together,
they can be put into a meaningful
relationship.
A. data
B. video
C. image
D. information system
8.
A.
B.
C.
D.
I, II and III
I, II and IV
I, III and IV
II, III and IV
Data consisting of moving images are
known as _________________data.
A. text
B. audio
1
ICT WORKSHEET, FORM 5
2. LESSON 42
Usage of Information Systems in
Various Fields
1. We can use_____________to keep track of
student statistics.
A. Office Systems
B. Payroll Systems
C. Student Information Systems
D. Learning Management Systems
2. Learning Management Systems are used to
help students and teachers in online______
A. copying and writing
B. booking and learning
C. learning and discussion
D. gaming and entertainment
3. In retail companies, information systems are
used in online
I. buying
II. selling
III. chatting
IV. repairing
A.
B.
C.
D.
I and II
II and III
II and IV
III and IV
4. In the transportation industry, information
systems are used to __________________.
A. attract customers
B. receive customer feedbacks
C. organise the records of employees
D. plan the delivery of goods and services
SCORE
A. transportation industry
B. marketing management
C. manufacturing management
D. human resource management
8. Which of the following uses information
system to buy and sell online?
A. Retail company
B. Learning management
C. Transportation industry
D. Human resource management
9. In marketing management, information
systems are used to
A. analyse products and services.
B. answer complaints and feedbacks.
C. accept online requests and suggestions.
D. ask for information and communications.
10. Information systems are used in the areas
of ___________, business andmanagement.
A. enquiries
B. education
C. examination
D. entertainment
11. Which of the following uses information
system in online learning and discussion?
A. Learning Strategies Class
B. Learning Strategies System
C. Learning Management Course
D. Learning Management System
5. In __________ management, information
systems are used to analyse products and
services.
A. student
B. learning
C. marketing
D. human resource
12. In __________________, information
systems are used to process customer orders.
A. business courses
B. marketing studies
C. learning management
D. manufacturing management
6. In _____________ management,
information systems are used to see
employees' records.
A. marketing
B. transportation
C. manufacturing
D. human resource
13. In the ____________________,
information systems are used to help plan the
delivery of goods and services.
A. business magazines
B. advertising brochures
C. transportation industry
D. manufacturing factories
7. “Information systems used to process
customer orders and organise production
times.”
This statement refers to
3. LESSON 43 SCORE
Information System Components
SCORE
Information systems personnel
Computer peripherals
Guidelines
Processed information
Operating system
End users
1.
A _______________ monitors database security and solves errors.
A. Computer systems
user
Organised facts
B. system analyst
C. system designer
User manuals
D. Application software
database administrator
2.
A ________analyses the customer's needs by providing specifications to customers.
A. user
B. system analyst
C. system designer
D. database administrator
3.
A __________designs database according to the specifications given by system analysts.
A. system analyst
B. system designer
C. system manager
4. D. system programmer
4. End users are people who use information systems. They can be
I. clerks
II. customers
III. managers
IV. system analysts
A.
B.
C.
D.
I, II and III
I, II and IV
I, III and IV
II, III and IV
5. Information system personnel are
I. system analyst
II. system designer
III. multimedia developer
IV. database administrator
A. I, II and
III
B. I, II and
IV
C. I, III and
IV
D. II, III
and IV
6. The hardware component in an information system means all
A. compact discs, storage devices and various computer program.
B. computer equipment used to perform input, processing and output functions.
C. computer equipment and components sold in a computer hardware shop.
D. computer devices, data media and other materials such books, manuals and guides.
7.
Hardware can be divided into
A. computer desktops only.
B. computer equipments and media.
C. computer programs and accessories.
D. hardware devices and computer software.
8 The
A.
B.
C.
D.
___________ component in an information system consists of programs for the computers.
data
people
software
hardware
9 There are two types of software : system software and ______software.
A. testing
B. apparatus
C. application
D. human resource
10.
Operating system programs are examples of _______________ software.
A. startup
B. backup
C. system
D. transactions
5. 11. Procedures are operating instructions. They are made up of
A. software and hardware.
B. guidelines in user manuals.
C. data processing and output.
D. systems control and performance.
12. Hardware resources include all data media on which data are recorded, such as
A. paper, notebook and servers.
B. paper, hard drives and hard covers.
C. paper, floppy disks and compact discs.
D. paper, keyboards and compact disc players.
13. An information system is a set of related components that ______________.
I. collect data
II. process data
III. provide information
IV. make multimedia presentation
A.
B.
C.
D.
I, II and III
I, II and IV
I, III and IV
II, III and IV
6. LESSON 44
Types Of Information Systems
SCORE
Transaction Processing System
to store knowledge and make logical
suggestions for the user
Executive Information System
to provide regular Information to managers
Decision Support System
to record business transactions
Management Information
System
to help top-level management in a business
company
Expert System
to help managers make right decisions in
important areas of business
1. Management Information System is to help
managers make the processes and
activities of a business to__________.
A. react to situations
B. run more efficiently
C. behave in a smooth way
D. operate at the highest cost
5. Executive Information Systems are used to
support ____________by top-level
executives.
A. preparation
B. participation
C. documentation
D. planning strategies
2. Transaction Processing System is used to
__________ business transactions.
A. repeat
B. record
C. reprint
D. register
6. Expert System stores knowledge and makes
________suggestions.
A. logical
B. systematic
C. qualitative
D. quantitative
3. Decision Support System is used to help
managers ____ in important areas of business.
A. make right decisions
B. manage people in a company
C. receive payment over the Internet
D. call important people with the telephone
7. Which of the following can be used to
forecast future trends?
A. Expert System
B. Executive Information System
C. Transaction Processing System
D. Management Information System
4. Online banking is the example of
A. Decision Support System
B. Executive Information System
C. Transaction Processing System
D. Management Information System
8. Executive Information System is used to
________ future trends.
A. decide
B. change
C. manage
D. forecast
7. LESSON 45
Hierarchy Of Data
A record
SCORE
consists of eight bits and represents a character.
A field
the smallest unit of meaningful information in
the database.
A byte
the smallest unit of data stored in the computer.
A bit
a collection of related records.
A file
a collection of related fields.
SCORE
8. LESSON 46
Database
1. A __________ is a structured collection of
information on specific subject.
A. file
B. data
C. database
D. document
2. We can think of a database as an
___system.
A. an electronic filing
B. a decision support
C. a receive information
D. an analyse information
3. A __________ is an example of database.
A. calculator
B. video games
C. telephone book
D. computer device
4. A database allows its contents to be easily
I. stored
II. updated
III. accessed
IV. formatted
A. I, II and III
B. I, II and IV
C. I, III and IV
D. II, III and IV
5. To access information from a database, you
need a
A. an Accounting System.
B. a Parts Inventory System.
C. a School Registration System.
D. a Database Management System.
6. Database Management System is a program
that enables you to __________ information
from a database.
I. store
II. modify
III. format
IV. extract
A. I, II and III
B. I, II and IV
C. I, III and IV
D. II, III and IV
7. Database Management System provides an
interface between the database and the
______.
A. file
B. text
C. user
D. hardware
8. Examples of DBMS are
I.
Oracle
II. SQL Server
III. Microsoft Word
IV. Microsoft Access
A. I, II and III
B. I, II and IV
C. I, III and IV
D. II, III and IV
9. A DBMS is a ____________ that accesses
information from a database.
A. script
B. program
C. hardware
D. component
10. The collection of organised information
refers to _____________.
A. file
B. data
C. folder
D. database
11. The_____________ allows its contents to
be easily accessed, updated, stored and
retrieved.
A. field
B. records
C. database
D. management
12. Where does a Database Management
System access information from?
A. File
B. Folder
C. Database
D. Management file
13. W allows contents to be retrieved and
used. What is “W”?
A. Data
B. DBMS
C. Database
D. Input devices
9. LESSON 47
Benefits of Using Database
1. One of the benefits of database is to _____
A. transform data to other format
B. access information easier
C. differentiate software and hardware
credits
D. develop the application software based
on run-time
2. Most data items are stored in __________ .
A. one file
B. two files
C. four files
D. three files
3.
4.
A database _____________.
A. duplicates the data
B. improves data integrity
C. causes data to be formatted
D. provides an interface to user
With a __________ , there is no need to
repeat recording the same data.
A. file
B. repor
t
C. folde
r
D. data
base
5. The benefits of database are:
I.minimises data redundancy
II.makes information access easier
III.allows data formatting
IV.ensures that data is correct for all files
A.
B.
C.
D.
I, II and III
I, II and IV
I, III and IV
II, III and IV
6. The advantages of database are the
following EXCEPT _______________.
A. data can be formatted
B. makes information access easier
C. having to record details only once
D. data can be shared over a network
7. Ensuring that data is correct for all files are
called data __________.
A. sharing
B. integrity
C. checking
D. correction
SCORE
8. When a user modifies data in the database,
automatically the same data will ____ in all
files.
A. create
B. change
C. improve
D. remain the same
9. Which of the following is a benefit of data
integrity?
A. Records can be shared
B. Easy information access
C. Ensures the data is correct
D. Minimises data redundancy
10. Data integrity causes the modification of
data in one file to be ____changed in other
files.
A. manually
B. randomly
C. selectively
D. automatically
11. Why does database make information
access easy?
A. Faster data deletion
B. Random data correction
C. Data sharing over the network
D. Data can be formatted over the network
12. These are the overall benefits of database
EXCEPT ___________ .
A. sharing data
B. formatting data
C. accessing data
D. correcting data
13. "A school database would record a
student’s name, address and other details only
once" refers to the benefit of
_______________.
A. ensuring data integrity
B. accessing information easily
C. minimising data redundancy
D. ensuring data is correct for all files
14. “The data of an account department can
be shared by the marketing department” is
under the benefits of _________________.
A. ensuring data integrity
B. minimising data redundancy
C. ensuring data is correct for all files
D. sharing database over the network
10. LESSON 48
Features of Microsoft Access
1.Which objects can be found in Objects
bar?
I. Forms
II. Queries
III. Reports
IV. Datasheet
A. I, II and IV
B. I, II and III
C. I, III and IV
D. II, III and IV
2. What are the examples of the Database
objects?
I. Tables
II. Queries
III. Design View
IV. Datasheet View
A. I and II
B. II and III
C. I and IV
D. II and IV
3. The Menu Bar contains a group of
related
A. texts
B. documents
C. commands
D. database objects
4. The Database Title Bar displays the
_______ of the open database.
A. form
B. table
C. name
D. document
5. The Database Toolbar contains
________ that you click to carry out
commands.
A. files
B. keys
C. buttons
SCORE
D. objects
6. You can use Microsoft Access to store a
large collection of ____________.
A. programs
B. information
C. documents
D. presentations
7. A __________ summarises information
from the database.
A. Form
B. Table
C. Query
D. Report
8. Microsoft Access is _________program.
A. a text
B. an audio
C. a database
D. a multimedia
9. You can use __________to store
information in a database.
A. Chart
B. Tables
C. Diagram
D. Database Toolbar
10. A __________ provides an easy way
to view and enter information into a
database.
A. Form
B. Table
C. Query
D. Report
11. Reports are one of the Database
________ in Microsoft Access.
A. lists
B. files
C. objects
D. properties
11. LESSON 49
Features of Table, Query, Form and Report
1
A __________ stores a collection
of information about a specific topic.
A. line
B. table
C. folder
D. column
2 A __________ is a request of a specific data
from a database
A. task
B. query
C. report
D. worksheet
3. What are the examples of database
objects?
I. Forms
II. Books
III. Queries
I. Records
A.
B.
C.
D.
I and II
I and III
II and III
III and IV
SCORE
4. A __________ is an interface to enter
information in the database.
A. form
B. table
C. report
D. document
5
In a Table, each row shows the information
for __________.
A. one file
B. one field
C. one query
D. one record
6
A __________ summarises the information
from the database.
A. Form
B. Table
C. Query
D. Report
7 Which method is fast and easy to use when
creating a form?
A. Design
B. Wizard
C. Preview
D. Datasheet
12. SCORE
LESSON 50
Relationship Between Field, Record and File
1. Field is a specific category of_____ in a
table.
A. row
B. column
C. information
D. relationship
2. Which is a collection of fields about a
person, place or thing in a table?
A. File
B. Folder
C. Record
D. Relation
3. Tuple is an alternative name for
__________.
A. file
B. table
C. record
D. relation
4. The __________ consist of several data
types such as text, date or numerical data.
A. files
B. books
C. folders
D. records
5. File is a set of ______ arranged in rows and
columns.
A. data
B. folder
C. relation
D. document
6. In a database________ consists of records.
A. text
B. file
C. folder
D. document
7. Relation is another alternative name for
____.
A. file
B. tuple
C. record
D. column
8. A file must have _______ and _________.
I. table
II. fields
III. records
IV. relations
A. I and II
B. I and III
C. II and III
D. III and IV
9. The components of a _______ are rows and
columns.
A. field
B. data
C. table
D. record
10. A record is also known as the____ or
_____.
I. row
II. field
III. tuple
IV. column
A. I and II
B. I and III
C. II and III
D. II and IV
11. Y is also known as a table or relation. What
is “Y”?
A.
File
B.
Field
C.
Record
D.
Document
12. What is a record made up of?
A. Files
B. Fields
C. Forms
D. Formats
13. What is a record?
A. A collection of files
B. A coIIection of discs
C. A collection of fields
D. A collection of documents
14. A field is also known as ____________.
A. row
B. table
C. column
D. relation
15. What is a file made up of?
13. A.
B.
Lines and rows
Rows and records
C. Fields and records
D. Relation and database
LESSON 51
Primary Key and Foreign Key
1. Primary key must not have________ values.
A. null
B. single
C. double
D. character
2. A primary key is the field that __________
represents each record in a table.
A. uniquely
B. generally
C. commonly
D. individually
3. A foreign key is the field that __________
the primary key in another table.
A. inserts
B. deletes
C. merges
D. matches
4. Each __________in the database can have
at least one primary key.
A. form
B. table
C. report
D. relationship
5. While ________ must have unique values,
__________ may have duplicate values.
A. foreign keys, foreign keys
B. primary keys, foreign keys
C. foreign keys, primary keys
D. primary keys, primary keys
6. Why is the primary key so important in the
table?
I. It contains null values.
II. It helps to avoid duplicate records.
III. It prevents null values being entered in
the unique field.
IV. It ensures data integrity by uniquely
representing each record.
A. I, II and III
B. I, III and IV
C. II, III and IV
D. I, II, and IV
7. A primary key ensures _________ by
uniquely representing each record.
A. input integrity
B. data integrity
SCORE
C. data correction
D. record modification
D. record modification
8. The importance of a primary key is to
I. do analysis
II. make calculations
III. avoid duplicate records
IV. prevent null values in the unique field
A. I and II
B. I and IV
C. II and IV
D. III and IV
9. P matches the primary key in another table.
What is "P"?
A. Foreign key
B. Unique field
C. Common key
D. Unique identifier
10. Which of the following best describes the
primary key?
A. Column or row in a table.
B. Table that matches other data.
C. Value equals to another foreign key.
D. Field that uniquely represents each record
in a table.
11. Which of the following does NOT apply to
primary key?
A. It ensures data integrity.
B. It helps to open locked files.
C. It helps to avoid duplicate records
D. It prevents null values in the unique field.
12. The importance of the primary key:
I.
prevents null values
II. ensures data integrity
III. improves data format
IV. causes duplicated records
A. I and II
B. I and III
C. II and IV
D. III and IV
13. Q is the field which uniquely identifies each
record in a table.
What is "Q"?
A.
B.
Primary key
Foreign key
15. LESSON 52
Relationship between Primary Key
and Foreign Key
1. Connections between fields of
related tables having common
values are called_____________
A.
B.
C.
D.
2.
3.
families
relatives
interactions
relationships
A __________ prevents repeating
data in a table.
A. primary key
B . general key
C. identical key
D. common key
A relationship works by matching
data in __________ fields, usually a
field with the same name in both
tables.
A.
B.
C.
D.
key
same
common
separate
4 The matching fields are the
__________ key from one table and
a foreign key in the other table.
A. foreign
B. genera
l
C. primar
y
D. second
ary
SCORE
5. Select the importance of
relationship between the primary &
foreign key
I. Ensures the data consistency
from table to table
II. Makes creating queries, forms
and reports more difficult.
II. Reduces the need to repeatedly
enter the same data item.
III. IV. A primary key in a table can
be a foreign key of the other
table.
A.
B.
C.
D.
6.
I, II and III
I, II and IV
I, III and IV
II, III and IV
A ____________ in a table can be
a __________ of the other table.
A.
B.
C.
D.
primary key, foreign key
foreign key, general key
primary key, secondary key
secondary key, foreign key
7. X improves data performance by
relating smaller tables into meaningful
database.
What is "X"?
A.
B.
C.
D.
Foreign key
Primary key
Common key
Secondary key
8. What are the connections between
fields of related tables having
common values?
A. Interactions
B. Partnerships
C. Relation files
17. SCORE
LESSON 53
Database Object-Table
1. Tables are one of the Database
__________ in Microsoft Access.
A. files
B. icons
C. objects
D. properties
2.
Which of these are the database objects?
I. Forms
II. Reports
III. Queries
IV. Records
A.
B.
C.
D.
I, II and IV
I, III and IV
I, II and III
II, III and IV
3.
The text data type can only contain
_______ characters.
A. 245
B. 250
C. 255
D. 256
4.
All databases in Microsoft Access contain at
least __________ table.
A. z
e
r
o
B. o
n
e
C. t
w
o
D. t
h
r
e
e
5. Tables can be created by using any of
these three methods which are:
I. Wizard
II. Datasheet
III. Layout View
IV. Design View
A.
B.
C.
D.
I, II and III
I, II and IV
I, III and IV
II, III and IV
6. Which of the data type that accepts
RM25.50?
A. Text
B. Memo
C. Currency
D. Hyperlink
7.
The ______________ data type will
automatically number each record for the
user.
A. Text
B. Currency
C. Hyperlink
D. AutoNumber
8. In ____________ you can customise your
fields name and data types.
A. AutoForm
B. Design View
C. Table Wizard
D. Datasheet View
9. You can change the field size of a selected
field from the __________.
A. Field list
B. Field view
C. Field properties
D. Field application
10. The data type determines the kind of data
you can enter into a _________.
A. file
B. field
C. design
D. document
11. The Table Wizard offers many tables for
both business and __________ use.
A. personal
B. account
C. marketing
D. administration
12. AutoNumber is a_____ number assigned
automatically and in sequence to each new
record.
A. unique
B. general
C. common
D. document
18. 13. The acronym OLE stands for ___________.
A. Object Linking and Electronic
B. Object Layout and Embedding
C. Object Linking and Embedding
D. Object Limited and Embedding
19. LESSON 54
Database Object-Query
1. You can create new Queries using
_______ and __________.
SCORE
D. Structured Query Language, Design
View
6. When creating a query using the
Wizard, you need to select the _________
for the query.
A. file
B. key
C. field
D. record
A _______ is a database object that
retrieves specific information from a
database.
A. Form
B. Query
C. Report
D. Request
7. You can switch between Datasheet and
Design View of Queries by clicking on the
_____.
A. Edit button
B. View button
C. Menu button
D. Window button
A. Design View, Wizard
B. Layout View, Wizard
C. Print preview, Design View
2.
3. We can use ___________ to perform
calculations on selected records.
A. Form
B. Table
C. Report
D. Queries
8. The _________ shows only the selected
fields that meets the criteria.
A. Hyperlink
B. Form layout
C. Query results
D. Report results
4. Queries can be created by using two
methods which are:
9. We can perform sorting either in
ascending or ___________ order.
A. searching
B. increasing
C. decreasing
D. descending
I.
II.
III.
IV.
A.
B.
C.
D.
Wizard
Query View
Design View
Datasheet View
I and II
I and III
II and IV
III and IV
5. When creating a Query using Wizard,
you have to specify the __________
that you want included in the query.
A. Forms
B. Fields
C. Tables
D. Reports
10. After a query is saved, it will be
displayed in the ___________.
A. SQL window
B. Table window
C. Query window
D. Database window
11. A query gathers information from a
__________ that fulfill the user's criteria.
A. view
B. Table
C. document
D. presentation
20. SCORE
LESSON 55
Database Object-Form
1. A ________ is a database object that
allows users to add, modify and view
information.
A. Form
B. Table
C. Query
D. Report
8 Columnar, Tabular, Datasheet and Justified
are used to determine the ____________ of
the information on the Form.
A. layout and design
B. colour and design
C. number and symbol
D. arrangement and position
D. arrangement and position
2.
9. You can click on __________ of the Form,
which effects its formatting and final
appearance.
A. file
B. link
C. style
D. sheet
You can create new Forms using ________
A. Design View
B. Filter by form
C. Datasheet View
D. Structured Query Language
3. X is another method of creating Forms,
besides using Design View. What is "X"?
A. Wizard
B. Datasheet View
C. Form Properties
D. Structured Query Language
4. We can use __________ View to change
the design of a Form.
A. Layout
B. Report
C. Design
D. Datasheet
5. When you add new data into forms, you
are __________ adding the data into the
table.
A. manually
B. Increasingly
C. deacreasingly
D. automatically
6. You need to key in the __________ of the
Form before you save it.
A. file
B. field
C. name
D. document
7. To create a Form, you can use
__________.
A. File or Report
B. Table or Query
C. Table or Report
D. Query or Report
10. We can select __________ from Tables or
Queries to create a new Form.
A. files
B. fields
C. records
D. database
11. In Design View, ___ the field to the
location in the Form where you want it to
appear..
A. drag
B. insert
C. release
D. remove
12. We can create new controls as needed by
clicking the suitable ___________ icon.
A. File
B. Edit
C. Menu
D. Toolbox
13. A Form is an organised and formatted
view of selected fields from
I. File
II. Tables
III. Papers
IV. Queries
A.
B.
C.
D.
I and II
I and III
II and III
II and IV
14. What does this icon refer to?
A. create new Form
21. B. create new Table
C. create new Report
D. create new Query
22. LESSON 56
Database Object-Report
1. A __________ is a database object
that summaries information from the
database.
A. Form
B. Table
C. Query
D. Report
2. Besides using Design View, you can
use___________ to create new report.
A. Wizard
B. Report View
C. Datasheet View
D. Structured Query Language
3. Which of the following allows us to
change the layout of a Report?
A. Report View
B. Design View
C. Datasheet View
D. Print Preview View
4. Reports can be created by using any of
these methods which are:
I. Wizard
II. Design view
III. Layout view
IV. Datasheet view
A.
B.
C.
D.
I and II
I and IV
II and III
III and IV
5. You need to indicate the ________ of
the Report either Portrait or Landscape.
A. print style
B. layout style
C. document style
D. orientation style
6. We can select Report on the Objects
bar in the ________________.
A. File window
B. Edit window
C. Modify window
D. Database window
SCORE
7. When designing a Report, you have to
consider the audience and the level of
___________ they need.
A. input
B. layout
C. process
D. information
8. The Microsoft Access reports are based
on the Tables or _________.
A. Rows
B. Queries
C. Columns
D. Datasheet
9. You need to specify the __________
that you want to include in the report.
A. fields
B. theme
C. layout
D. grouping
10. You need to indicate the ________ of
the Report either Columnar, Tabular or
Justified.
A. print style
B. layout style
C. document style
D. orientation style
11. In ____________, you can create
label as needed by clicking the suitable
toolbox button.
A. Design view
B. Report wizard
C. Datasheet view
D. Layout preview View
12. The order of records can be sorted
according to
I. increasing order
II. ascending order
III. decreasing order
IV. descending order
A.
B.
C.
D.
I and II
I and III
II and IV
III and IV
23. LESSON 57
Data Manipulation
1. The _______ operation is used for
changing data in a database Table.
A. Insert
B. Delete
C. Search
D. Update
2. An Insert operation is used for _________
records to a database Table.
A. adding
B. deleting
C. updating
D. changing
3.
The
I.
II.
III.
IV.
A.
B.
C.
D.
basic operations of data manipulation
Delete
Format
Update
Calculation
I and II
I and III
II and III
III and IV
4. The ________operation can change the
order that records appear in a Table.
A. Sort
B. Data
C. Insert
D. Delete
5. Sorting Text in ascending order will sort
text in _________order.
A. numerical
B. descending
C. alphabetical
D. date and time
6. Sorting Number according to________
order will sort number from smallest to largest
value.
A. ascending
B. descending
C. alphabetical
D. date and time
7. We can find some records that contain
specific information in the database by using
______operation.
A. Insert
B. Delete
C. Search
D. Update
SCORE
8. The Find and __________ features are
ideal when you want to make the same
changes to many records.
A. Add
B. View
C. Delete
D. Replace
9. We can use a ______ to find some specific
records in a database.
A. Form
B. Table
C. Query
D. Report
10. “It displays only those records that match
specifications.”Which type of operation is this
statement referring to?
A. Filter
B. Insert
C. Delete
D. Update
11. The __________ operation is used when
the user wants to find or locate specific data.
A. Sort
B. Delete
C. Search
D. Update
12. To arrange the records in ascending or
descending order, we use__________
operation.
A. Sort
B. Insert
C. Delete
D. Update
13. The __________ operation is used for
removing records from a database Table.
A. Insert
B. Delete
C. Search
D. Update
14. You must state the _______ to find
specific records in your database.
A. wizard
B. criteria
C. method
D. calculation
24. LESSON 58
Phases of System Development
SCORE
1. In Analysis Phase, the system developers
will identify the __________for a system.
A. programming
B. manual design
C. system performance
D. input, process and output
6. During __________, the system developers
will design an Entity Relationship Diagram.
A. Design phase
B. Testing phase
C. Analysis phase
D. Documentation phase
2. In ____________, system developers will
identify the needs of target users.
A. Design Phase
B. Testing Phase
C. Analysis Phase
D. Documentation Phase
7. Which of the following phase allows
system developer to create database?
A. Design Phase
B. Testing Phase
C. Analysis Phase
D. Implementation Phase
3. When errors are detected, the system
developers will have to fix the system in ____.
A. Design Phase
B. Testing Phase
C. Analysis Phase
D. Documentation Phase
8. The system developers continue to provide
support during the __________ Phase.
A. Test
B. Design
C. Analysis
D. Maintenance
4. The following items will be considered in
Analysis Phase EXCEPT
A. Input
B. Output
C. Process
D. Entity Relationship Diagram
9. In ____________, the system developers
need to monitor system performance.
A. Design Phase
B. Testing Phase
C. Maintenance Phase
D. Implementation Phase
5. In Maintenance Phase, system developers
have to consider the __________.
A. program design
B. system performance
C. needs of the target users
D. documentation of the program
10. In Implementation Phase, system
developers create the information system using
.
A. spreadsheet
B. word processing
C. database software
D. presentation software
25. SCORE
LESSON 59
Analysis Phase
1. In Analysis Phase, system developers have
to define the ___ of the system they
developed.
A. layout
B. design
C. pattern
D. purpose
2.
I.
II.
III.
IV.
Who are involved in Analysis Phase?
Technician
Target users
Network engineers
System developers
A. I and II
B. II and IV
C. III and IV
D. I and IV
D. program Flow Chart
8. Which of the following is NOT a task in
Analysis Phase?
A. Interview the target users.
B. Analyse the needs of target users.
C. Determine the design of the program.
D. Define problems faced by target users.
9. Which of the following is done by system
developers in Analysis Phase?
A. Define the design of the system.
B. Define the purpose of the system.
C. Describe what the system must test.
D. Implement the database design of the
system.
3. During Analysis Phase, the needs of
__________ are analysed.
A. designers
B. target users
C. system developers
D. hardware engineers
10. The followings are true about Analysis
Phase EXCEPT
A. define the purpose of the system.
B. analyse the needs of target users.
C. define problems faced by target users.
D. design user interface using database
software.
4. "Create a database to keep track the
school’s resource" is the________ of database.
A. logic
B. purpose
C. planning
D. learning outcome
11. When you analyse problems, which of the
following do you need to consider?
I. Input
II. Output
III. Process
IV. Performance
5. Which of the following needs to be done by
a system developer during Analysis Phase?
A. Define the purpose of the system.
B. Analyse the design of the program.
C. Define program errors faced by target
users.
D. Solve all the problems related to the
program.
6. What is the purpose of problem analysis in
Analysis Phase?
A. Define the design of the system.
B. Understand the needs of target users.
C. Define the planning of the system
design.
D. Define program errors faced by target
users.
7. The system developers need to identify the
input, ________and output of the system.
A. process
B. performance
C. programming
A.
B.
C.
D.
I, II and III
I, II and IV
I, III and IV
II, III and IV
12. By conducting an analysis, the system
developers would have to _________.
A. test the functionality of the system
B. implement database design of the
system
C. understand the requirements of target
user
D. design user interface using database
software
13. Which of the following is NOT true
regarding the Analysis Phase?
A. Focus of the system can be set.
B. The last phase of system development.
C. Input, process and output are identified.
D. Involves system developer and target
user.
26. LESSON 60
Design Phase
1. In the __________ phase of system
development, system developers use diagrams
to design the system.
A. first
B. third
C. fourth
D. second
SCORE
8. Entity Relationship Diagram uses
__________ to describe the system.
A. symbols
B. languages
C. simple English
C. simple English
D. Input, Process and Output
D. Input, Process and Output
Diagrams used in Design Phase is
A. Flow Chart
B. Input, process and output
C. Structural Query Language
D. Entity Relationship Diagram
9. In School Resource System, ____________
will be used in the Design Phase.
A. Data Flow Diagram
B. Input, process and output
C. Structural Query Language
D. Entity Relationship Diagram
3. The ______________ refers to the
planning of the design in the system to be
developed.
A. Design Phase
B. Analysis Phase
C. Implementation Phase
D. Documentation Phase
10. X graphically shows the tables in a system
and how they relate to one another. What is
X"?
A. Flow Chart
B. Pseudo Code
C. Structural Query Language
D. Entity Relationship Diagram
4. The __________ describes how tables are
organised and related to one another.
A. Data Flow diagram
B. Input, Process and Output
C. Structural Query Language
D. Entity Relationship Diagram
11. In the Design Phase, system developers
seek to provide input and output __________.
A. reports
B. systems
C. interfaces
D. information
5. What do you need to do after forming an
Entity Relationship Diagram?
A. Name the tables
B. Define target users’ need
C. Match the design of tables
D. Create relationships within tables
12. Who is responsible to provide user
Interfaces?
A. User
B. System developer
C. System technician
D. System programmer
6. After creating relationships between tables
in an Entity Relationship Diagram, we must
____.
A. Create primary keys
B. Create duplicate keys
C. name the relationships
D. rearrange the relationships
13. Entity Relationship Diagram graphically
shows how _______ are organised and related
to one another.
A. forms
B. tables
C. queries
D. reports
7. What do you need to do after creating the
primary key in Entity Relationship Diagram?
A. Create foreign keys
B. Create multiple forms
C. Delete all relationships
D. Draw arrows to match relationships
14. What is the usage of Entity Relationship
Diagram (ERD)?
A. Design schedule
B. Assign foreign key
C. Draw graphics and animation
D. Describe the relationship within tables
2.
27. 15. We need to classify _________ into tables
before forming an Entity Relationship Diagram.
A. Program design
LESSON 61
Implemetation Phase
1. In the _________ Phase, system
developers will convert a design plan such as
Entity Relationship Diagram into a computer
system.
A. Design
B. Analysis
C. Maintenance
D. Implementation
2. System developer uses __________ as the
development tool to create a database system.
A. spreadsheet
B. word processing
C. database software
D. presentation software
3.
In the __________ phase of system
development, system developers use
database software to produce the system.
A. first
B. third
C. fourth
D. second
B. Program analysis
C. Program interface
D. Project requirements
SCORE
D. Identify the design of computer system.
8. In Implementation Phase, system developer
converts the design using __________
software such as Microsoft Access.
A. testing
B. system
C. database
D. processing
9. We can use the primary key to form a
__________ between the tables.
A. folder
B. sharing
C. relationship
D. partnership
10. We can use ___ to store data in a
database.
A. Tables
B. documents
C. relationships
D. primary keys
4. We need to convert the_____ into a
computer system.
A. outlines
B. design plan
C. program plan
D. documentation files
11. We need to establish the relationships
between Tables in a____________.
A. file
B. data
C. folder
D. database
5. We need to assign the _____________
between Tables in a database.
A. relation
B. properties
C. inner join
D. relationships
12. Which of the following is NOT a task in
Implementation Phase?
A. Creating Tables
B. Creating a database
C. Integrate the system
D. Assigning Table relationships
6. The following tasks will be carried out in
Implementation Phase EXCEPT
A. creating Forms.
B. creating a database.
C. creating Entity Relationship Diagram.
D. assigning relationship between Tables.
13. The ______________Phase is the phase
where a system is created.
A. Design
B. Testing
C. Implementation
D. Documentation
7. Which of the following is a task in
Implementation Phase?
A. Assigning table relationships.
B. Analyse the needs of target users.
C. Define problems faced by target users.
14. Which of the following is NOT true
regarding Implementation Phase?
A. Database software is used.
B. Network technicians are involved.
C. Technical and design plans are
converted.
28. D. It is the third phase of system
development.
LESSON 62
Testing Phase
1. The Testing Phase involves_____ and
users.
A. accountants
B. internet providers
C. system developers
D. hardware personnel
2. The purpose of testing is to ensure
______.
A. problems are analysed
B. well designed program
C. system runs correctly and is error free
D. mistakes are corrected automatically
3. The ___________ is the person who tests
the database program.
A. technician
B. system developer
C. security personnel
D. hardware personnel
4. Before testing the ___________, data
must be entered into the tables.
A. data
B. number
C. symbol
D. graphic
5. The system developers will run a series of
tests ________________.
A. to analyse the problems
B. to increase database speed
C. to ensure the quality of database
D. to ensure database is well designed
6. Whole _______ of the system must be
tested to complete the testing.
A. text
B. folder
C. document
D. functionality
7. You can do ________ to verify that each
database object is functioning.
A. design
B. testing
C. analysis
D. implementation
SCORE
8. After data is keyed in a table, we can then
create the following.
I. Form
II. Paper
III. Query
IV. Report
A.
B.
C.
D.
I, II and III
I, III and IV
I, II and IV
II, III and IV
9. What is the objective of conducting a test in
information system development?
A. Detect any error present.
B. Help user to use the system.
C. Design a database program.
D. Train a new system developer.
10. Testing on the functionality of the system
is to ensure __________.
A. well designed of interfaces
B. documentation is identified
C. the whole system works properly
D. mistakes are corrected automatically
11. Who are involved in a Testing Phase?
A. System analyst and user
B. System engineer and user
C. System developer and user
D. Office administrator and user
12. What is the main purpose of testing?
A. Confirm that the data can be edited.
B. Ensure a correct and error free system.
C. Check that the results matches the
manual.
D. Confirm that the design of program is
correct.
13. The following on Testing Phase is correct
EXCEPT
A. data must be entered into tables.
B. it involves system developer and user.
C. it is the fifth phase of system
development.
D. it ensures the system runs correctly and
is error free.
29. 14 The following refers to Testing Phase
EXCEPT
A. Testing Phase involves system
developers and users.
B. testing helps design the user interface
of the system.
C. Testing Phase is the fourth stage of
system development.
D. whole functionality of the system must
be tested to complete the testing.
30. LESSON 63
Documentation Phase
1. Documentation in system development
refers to the __________ material generated
throughout all phases of system development.
A. audio
B. video
C. written
D. graphical
2. The Technical Documentation is used to
explain a ________ to a system developer.
A. system
B. graphic
C. symbol
D. Presentation
3. “How to run the system” is in the
________.
A. Design Plan
B. User Manual
C. Design Documentation
D. Technical Documentation
4. Documentation is very important when the
system requires______in the future.
A. designs
B. pictures
C. changes
D. animations
5. Which of the following is NOT related to the
Documentation Phase?
A. User Manual
B. Corrective Maintenance
C. Input, process and output
D. Entity Relationship Diagram
6.
The User Manual should cover
I.
how to save
II.
how to format system
III.
how to run the system
IV.
how to design the system
A.
B.
C.
D.
I and II
I and III
II and IV
III and IV
7. Entity Relationship Diagram is generated
during _____________.
A. Design Phase
B. Testing Phase
C. Analysis Phase
D. Implementation Phase
SCORE
8. Y is the written materials generated during
Analysis Phase. What is "Y"?
A. User Manual
B. Technical Documentation
C. Input, process and output
D. Entity Relationship Diagram
9. The __________ helps to reduce the
amount of time a new system developer
spends
learning about existing programs.
A. testing
B. analysing
C. maintenance
D. documentation
10. The two types of documentations which
are User Manual and _______________.
A. Technical Manual
B. Design Documentation
C. Manual Documentation
D. Technical Documentation
11. Input, process and output is in the ______
Documentation.
A. Text
B. User
C. Graphic
D. Technical
12. Documentation tells ______________
what was done in the program.
A. Salesman
B. System computers
C. System developers
D. office administrator
13. P is used to explain a system to a system
developer. What is "P"?
A. Report
B. User Manual
C. Design Documentation
D. Technical Documentation
14. What is the Technical Documentation used
for?
A. Delete data.
B. Overcome errors.
C. Train a new salesman.
D. Help to improve the system.
31. LESSON 64
Maintenance Phase
1. The ____ are involved in Maintenance
Phase.
A. technician
B. target users
C. store supervisors
D. system developers
2. There are __________ types of
maintenance in information system
development.
A. four
B. five
C. three
D. seven
3. Maintenance refers to the changes in the
system by fixing or enhancing its __________.
A. functionality
B. documentation
C. program design
D. problem analysis
4. Setting a password to the system avoids
possible future problems, is related to ______.
A. Normal Maintenance
B. Perfective Maintenance
C. Corrective Maintenance
D. Preventive Maintenance
5. "Add in new field to rectify the system
design" refers to
A. Normal Maintenance
B. Perfective Maintenance
C. Corrective Maintenance
D. Preventive Maintenance
6. System maintenance involves the following
EXCEPT
A. changing
B. checking
C. formatting
D. enhancing
7. The following on Maintenance Phase is
correct EXCEPT
A. it is the last phase in system
development.
B. it checks that the design matches the
user interface.
C. system developers are involved in the
Maintenance Phase.
D. maintenance refers to the changes in
the system by fixing or enhancing its
functionality.
SCORE
8. System maintenance helps to _________.
A. analyse the problem
B. plan the program design
C. improve system performance
D. implement the database design
9. What is the aim of Preventive Maintenance?
A. Prevent automatic correction.
B. Improve a computer program.
C. Repair an error in system design.
D. Prevent future breakdowns and failures.
10. Perfective Maintenance is done when the
__________ require changes in the interfaces.
A. users
B. system analysts
C. system developers
D. mechanical engineers
11. What is used to prevent unauthorised
access to confidential information in Preventive
Maintenance?
A. Key
B. Lock
C. Message
D. Password
12. What is the function of Corrective
Maintenance?
A. Creates duplicate data.
B. Repair the design's error.
C. Overwrites the correct data.
D. Prevents unnecessary mistakes
13. Maintenance refers to changes in the
system by __________ and __________ its
functionality.
I.
fixing
II. deleting
III. formatting
IV. enhancing
A.
B.
C.
D.
I and II
II and IV
III and IV
I and IV
14. Which is the function of Preventive
Maintenance?
A. Repair its design.
B. Detect programming mistakes.
C. Avoid possible future problems.
D. Add new feature to improve
performance.
32.
33. LESSON 65
Develop a Database Project
1. In ______________, we need to identify
our needs before planning a database system.
A.
Design Phase
B.
Analysis Phase
C.
Implementation Phase
D.
Documentation Phase
2. A _______ helps us to organise and manage
our data.
A.
program listing
B.
program design
C.
program layout
D.
database system
3. What is P?
P
H o w to ru n th e s y s te m
H o w to e n te r d a ta
H o w to m o d ify d a ta
H o w to s a v e
H o w to tr o u b le s h o o t
P r in t r e p o r ts
A.
B.
C.
D.
User Manual
Database system
Technical Documentation
Input, process and output
SCORE
D
Analysis Relationship Diagram
7. From the database and Tables created, you
can do test retrieval of the data entered
using the following EXCEPT ____________.
A Forms
B Reports
C Queries
D Documents
8. Throughout the process of database
development, you should keep a ______ of
your work.
A sequence
B alignment
C arrangement
D documentation
9. Documentation would be useful if your
system requires _______ in the future.
A test
B analysis
C changes
D advertisements
10. We produced the Entity Relationship
Diagram in X. What is "X"?
A. Design Phase
B. Maintenance Phase
C. Documentation Phase
D. Implementation Phase
4. We need to determine the _______ for the
Tables created in database.
A.
files
B.
fields
C.
records
D.
properties
11. We gathered all the written materials in Z.
What is "Z"?
A. Testing Phase
B. Maintenance Phase
C. Documentation Phase
D. Implementation Phase
5. After
need to
Tables.
A.
B.
C.
D.
12. We classify project requirements into
Tables during _________.
A. Design Phase
B. Testing Phase
C. Documentation Phase
D. Implementation system
we create tables in a database, we
establish their ________ between
relation
relationship
relation model
database model
6. Relationship between Tables can be shown
graphically using the ____________.
A Entity Relationship Diagram
B Cross Relationship Diagram
C Match Relationship Diagram
13. In Implementation Phase, first we have to
create a_________.
A. form
B. database
C. foreign key
D. primary key
34. LESSON 66
Web-based application
1. Web-based applications are delivered to
users by using the ___________.
A. file
B. internet
C. transistor
D. laboratory
2. Which of the following is NOT a Web-based
application?
A. Web mail
B. Online auctions
C. Microsoft Access
D. Online retail sales
3. Global Data Monitoring Information System
is a __________ information system.
A. Web-based
B. Science-based
C. Knowledge-based
D. Geography-based
4. Which of the following are the usage of
Web-based applications?
I. Web mail
II. Postal mail
III. Online auctions
IV. Customer billing system
A.
B.
C.
D.
I, II and III
I, II and IV
I, III and IV
II, III and IV
5. The _____________ is a Web-based
disaster information management system.
A. Global Resource Centre
B. Millennium Development Goals
C. Global Data Monitoring Information System
D. Global Disaster Alert and Coordination
System
6. Which of the following are examples of
database system for Web-based applications?
I. Oracle
II. Microsoft Word
III. Microsoft Excel
IV. Microsoft SQL Server
A.
B.
C.
D.
I and II
II and IV
III and IV
I and IV
SCORE
7. “A Web-based information system that is
interested in developing human resources for
health.”
This statement refers to
A.
B.
C.
D.
Global Resource Centre
Millennium Development Goals
Global Data Monitoring Information System
Global Disaster Alert and Coordination
System
8. Global Data Monitoring Information System
helps many countries overcome problems of
I. health
II. poverty
III. education
IV. entertainment
A.
B.
C.
D.
I, II and III
I, II and IV
I, III and IV
II, III and IV
9. "Data collected on Malaria disease in Africa"
is the project of
A. Global Resource Centre
B. Millennium Development Goals
C. Global Data Monitoring Information System
D. Global Disaster Alert and Coordination
System
10. "eBay" is an example of _____________.
A. Web mail
B. online blog
C. online retail sales
D. customer billing system
11. Which of the following is a global
information system?
A. Global Web Centre
B. Global Resource Centre
C. Global Economy Centre
D. Global Communication Centre