Data B 3 Information Systems example essay topic

1,740 words
TOPIC: INTRODUCTION TO INFORMATION SKILLS AND SYSTEMS Circle the most appropriate answer in the following multiple choice questions. 1) Authors spend considerable time and effort creating their work. The set of laws which govern the rights of authors as far as protecting their ownership of material they produce is called A. Common laws. Data protection. Copy protection. Copyright laws D 2) Information systems contain a number of processes.

One of these is "Collecting", which of the following best describes the processes involved in Collecting. A. Defines the required data, identifies the source for the data, saves data for later use, gathers the data. Defines the required data, identifies the source for the data, determines how the data will be gathered, gathers the data. Defines the required data, determines the format in which the data will be represented, determines how the data will be gathered, gathers the data. Defines the required data, identifies the source for the data, determines how the data will be gathered, manipulates the data B 3) Information systems contain a number of processes. One of these is "Processing", which of the following best describes the process involved in Processing? A. Interprets the data, transforming it into information. Decides the form in which the information will be displayed.

Manipulates data and informationD. Determines the format in which data will be represented in the information C 4) Information systems contain a number of processes. One of these is "Organising", which of the following best describes the process involved in Organising? A. Decides the form in which the information will be displayed. Determines the format in which data will be represented in the informationC. Interprets the data, transforming it into informationD. Manipulates data and information B 5) The largest and most powerful computers are known as A. Mini computers.

Personal computers. Super computersD. Main frames C 6) Using 8 bits and two's component arithmetic, 103 (base 10) would be represented as; A. 01100111 B. 10011000 C. 11100111 D. 10011001 D 7) System software is A. Only used to boot the machines. Necessary to run the machines. Only required by mainframe computersD. Loaded into ROM when the system is booted B 8) How many binary digits are generally required to represent a 2 digit hexadecimal number? A. 8 B. 16 C. 12 D. 4 A 9) A computer uses 8 bits and two's complement arithmetic to perform 89 (base 10) - 63 (base 10).

This is most likely becauseA. Information technology is what controls the economics of nations. The power of nations is now linked to its information technology resources rather than the nation's natural resources. B. Information is the raw material for silicon based technology. The term "Information Age" really refers to our ability to use computers that based on silicon chips. C. The amount of available information is growing exponentially. Our ability to access this information has become a major commodity. Computers have become so powerful that they are beginning to take over from human thought processes.

C 11) Information systems contain a number of processes. One of these is "Transmitting and Receiving", which of the following best describes the process involved in Transmitting and Receiving? A. Determines the format in which data will be represented in the information systemB. Interprets the data, transforming it into informationC. Sends and gets data and information, within and beyond the information systems. D 12) One major problem for software developers is that software can quite easily be copied and the copy will be identical to the original. This illegal copying is know asA.

Bunking B. Imaging. Software piracy D. Hacking C 13) The binary number 100111 is equivalent to which of the following decimal number. 39 B. 32 C. 4 D. 71 A 14) Application software is A. Computer hardware necessary to carry out a task. Programs designed to carry out a particular task.

A reply to a job advertisement. Programs controlling the operation of the computer B 15) Which of the following lists correctly contains the seven information processes contained within an information system. Collecting, organising, analyzing, processing, transmitting / receiving, displaying. Collecting, organising, analyzing, storing / retrieving, processing, transmitting / receiving, displaying. Collecting, organising, analyzing, storing, retrieving, transmitting / receiving, displaying.

Collecting, organising, analyzing, storing, retrieving, processing, receiving, displaying B 16) Many cases of computer crime go unreported. Companies do not want it known that their system is fallible B. Usually the effects are too trivial to warrant prosecution C. It is virtually impossible to stop this type of crime. The crime itself was not noticed b the company A 17) It is relatively easy to publish information on the internet. This means that a large amount of information is available, however the downside is that he accuracy of information on the internet is often too difficult to assess. The best method of assessing the accuracy of information on the internet is toA.

Assume the information in inaccurate unless you personally have experience with the content. Download the information and have a knowledgeable person check itC. Compare a number of different sources. Make sure the data is stored on a reliable computer. C 18) Device that scan finger prints or signatures or a person's eyes are known asA.

Identity check devices. Security devices. Scanners. Biometric devices D 19) A new computer based information system is introduced into a local hardware store. This new system accurately tracks stock levels for each item sold. As a result the shop assistants now have no need to manually count the number of each item remaining on the shelves.

The social issue involved in this case is one of A. Appropriate use of technology. Changing nature of work. Job redundancy D. Advances in technology B 20) Your school sends around a sheet to each student that contains all their personal details (e.g. Name, address, phone number, etc). Students are asked to check this data and make changes as necessary. This process is known asA. Data validation B. A data security check.

Data encryption. A data integrity check D 21) The five basic function performed by computer hardware areA. Addition, comparison, storage, input output. Word processing, Spreadsheets, Databases, Communication, Graphics. Hardware, Software, Processing, People, Procedures. Input, Output, Processing, Storage, Control D 22) Which of the following lists contains ONLY different types of data.

Image, video, audio, text, numbers. Keyboard, mouse, CPU, text, numbers. Hardware, software, people, informationD. Baud rate, parity, data bits A 23) The computer produces A. Data B. Input C. Process D. Information D 24) The environment of an information system can be best described as: A. Anything not contained within the system itself. However the environment can affect the systems operations in various unforseen ways. B. Everything that influences, and is influenced by the information system and its purpose.

Anything that is created from naturally occurring circumstances. A sub-system that influences the system in unpredictable ways. B 25) The smallest unit of data a compute can store is a A. Byte B. Nibble C. Character D. Bit D 26) A computer "hacker" is a person whoA. Causes damage to a computer system by accessing it via a modem. Writes viruses that cause damage to computer systems. Is addicted to "surfing" the internet.

Illegally gains access to a computer system D 27) The dividing line between a system and its environment is know asA. A boundary. The system's limits. An interfaceD. A sub-system C 28) Software that can be freely copied, used and distributed is known asA. Public domain software.

Application software. Shareware D. System software A 29) The process of checking data as it is entered into an information system to make sure it is of the correct type and is within reasonable ranges is known asA. Data verification. Data encryption C. Data validation.

Data integrity C 30) A possible description of Information could be A. The output from an information systemB. The input to an information systemC. Known facts together with audio, video and / or images. The processing that takes place on data A 31) If "A" is represented by 65 in ASCII, what value is used to represent the character "F"? A. 70 B. 68 C. 69 D. 71 A 32) ATMs or automatic teller machines are commonly used to access bank accounts. The people involved in writing the software operating in an ATM could be best described as which of the following? A. Technician B. User C. Maintainer D. Programmer D 33) EBCDIC is a system of representing characters on large IBM systems What does EBCDIC A. Extended Binary Coded Decimal Interchange Coded.

Exchanged Binary Coded Decimal Interchange CodeC. Extended Binary Coded Decimal International CodeD. Extended Binary Coded for Decimal Interchange Characters A 34) A computer design to be used by one user is known as a A. Main frame. Mini computer. Super computer. Personal computer D 35) Information systems contain a number of processes.

One of these is "Analysing", which of the following best describes the process involved in Analysing? A. Determines the format in which data will be represented in the information systemB. Manipulates data and informationC. Interprets the data, transforming it into information D 36) Often the same piece of software is installed on a number of different machines at the same location. Rather than purchasing multiple copies of the product a is purchased. A. Network B. File server C. Copy programs. Site license D 37) Data validation would pick up which of the following errors A. State entered as Vic instead of NSW. Date of birth entered as 10/4/79 rather than 4/10/79 C. Surname entered as Davis rather than Fenda llD.

Date of birth entered as 9/13/78 instead of 13/9/78 D 38) The binary number 100111 is equivalent to which of the following decimal number. 39 F. 32 G. 4 H. 71 A.