Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
IMIS DIPLOMA QUALIFICATIONS Using ICT in an Organisational Environment (D3) Wednesday 3rd June 14:00hrs – 17:00hrs DURATION: 3 HOURS Candidates should answer ALL the questions in Part A and THREE of the five questions in Part B. Part A carries 40% of the marks available and Part B carries 60%. Candidates should allocate their time accordingly. No reference material of any kind may be taken into the examination. [Turn over] © Institute for the Management of Information Systems – Page 1 of 9 PART A. Answer ALL questions in this section. Question A1 Explain the term System Software and its importance. (5 marks) Answer System Software is software that helps the computer to perform the essential tasks. It is important because it controls the computer, loads device drives, and runs application software. 3 marks for an explanation and 2 marks for its importancea Question A2 Explain the term workstation and describe why a business would use one. (5 marks) Answer There are two responses to this question Firstly – it is a work station is a unit that allows the user to perform complex scientific calculations without ‘commandeering’ a large machine. As a dedicated machine it would use all of its resources to the task without having to share its resources with others. Secondary – it is a machine that performs basic/essential tasks such as verification/validation of data prior to data being entered into the main machine for processing. A business would use it as it would reduce the number of errors being processed. Also it would save time on the main machine to perform more demanding/important tasks. 3 marks for an explanation and 2 marks for why a business would use one Question A3 A company may wish to have some web documents ‘linked’. Explain the term linked and describe why a business would use this function. (5 marks) Answer name and address, current balance, etc. A business would use this function as the document would be linked to a unique point knowing that there is only one link and that link would have the most up to date data. 3 marks for an explanation and 2 marks for why a business would use this function © Institute for the Management of Information Systems – Page 2 of 9 Question A4 Explain the term Spyware and name TWO kinds of spyware. LO4 Chp 2 p103 (5 marks) Answer Spyware is deceitful softw confidential information. The following are acceptable as kinds of software: Adware or pop-up generators Browser hijackers Search hijackers Key loggers Etc 3 marks for a term and 2*2 marks for a name to a maximum of 5 marks Question A5 When a common set of tasks have to be run frequently a macro may be created to execute these tasks. Explain the term macro and describe TWO reasons why a company would agree to use a macro to execute the tasks? (5 marks) Answer A macro is a keyboard shortcut that will execute a set of instructions to perform a specific task. A company would use a macro for the following reasons: It has already been tested. The results are always correct. It will save time and money for the company. The only input required, if necessary, is the parameters. Etc 2 marks for an explanation and 2*2 marks for why a company would use one to a maximum of 5 marks Question A6 Explain the term Identity Theft and TWO ways in which Identity Theft can be prevented. (5 marks) Answer Identity Theft is when a person hijacks a person’s name and identity and uses their good credit rating to obtain either cash or to buy products. Any TWO of the following are suitable: A business could monitor the following: Check credit card statement Keep passwords etc private/secret Install suitable software to protect personal details Etc 2 marks for the description and 2*2 marks for prevention to a maximum of 5 marks © Institute for the Management of Information Systems – Page 3 of 9 Question A7 Secondary storage hardware is frequently used by companies to store data. Explain describe the term Secondary storage and describe TWO reasons why Secondary storage hardware is used. (5 marks) Answer Secondary storage is a device that permanent holds data and information as well as programs. Any TWO of the following are suitable: It can be used as an archive. It can be used as a backup mode. Data is not lost when power is switched off. Enable large amounts of data to be transferred from one place to another. Etc 2 marks for a term and 2*2 marks for a reason to a maximum of 5 marks Question A8 Printers can be classified under two categories; non impact and impact. Describe BOTH categories and ONE preference of using one of the categories in an open plan office. (5 marks) Answer An impact printer forms characters using a striking mechanism against an ink ribbon to form an image on paper. A non-impact printer forms characters without direct physical contact between the printer and the paper, or by heat transference. I would recommend a non-impact printer because it is quieter to run. I could recommend an impact printer because it is cheaper to buy and for its consumables. 2 marks for each term and 1 mark for either preference, maximum 5 marks. © Institute for the Management of Information Systems – Page 4 of 9 PART B. Answer any THREE of the following FIVE questions. Question B9 It is well known that computer users at work use their computers for personal use during lunch breaks. Give and describe FOUR safeguards that you, as the IT manager, would implement to ensure that there are no computer or communications security breaches by your staff. LO6 AC6.2 p470-476 (20 marks) Answer Any FOUR of the following are acceptable, plus unique responses: Enforcement of computer policy – staff passwords, changing passwords frequently, etc. Blocking of various sites – restricting staff to the access of sites that are purely for work functions, using Employment Internet Management (EIM) software, etc. Enforcement of logging off outside working hours – ensuring that computers are Ensure that computers switch on to sleep mode after non-use for say 5 – 10 minutes so that no one can use another person’s machine to detract usage. Spyware checking software – ensure that spyware/virus/etc software is installed and kept up to date. Logging of transactions – should the need arise the log can be checked an incident come to light to find the ‘culprit’. Etc 4*(2 for a safeguard + 3 for a prevention) to a maximum of 20 marks Question B10 Databases are very important in helping to make decisions especially in the digital economy. To ensure that the information on the database is of high quality there are FIVE criteria that the data must meet. Describe FOUR of the five criteria and for each of the criteria a process that must be in place to ensure that correct decisions can be made. (20 marks) Answer Any FOUR of the following are acceptable, plus unique responses: Correc and verifiable – that is the information must be accurate and checkable. The process to be in place is verification/validation checks. Complete yet concise – complete means information must include all relevant data, and concise means that it only includes relevant data. The process to be in place is that the input forms, when created, are checked to ensure that only relevant data is requested and is not ‘long winded’. Cost effective –the information is efficiently obtained and understandable. The process to be in place is that the stages to collect the data are both ‘short and sweet’. © Institute for the Management of Information Systems – Page 5 of 9 Current – current means timely yet also time sensitive, based on historical, present, or future information needs. The process to be in place is that periodical checks are completed to ensure that the data is up to date and still relevant. Accessible – this means that the information is quickly and easily obtainable. The process to be in place is that when designing the database that there are ample ways of accessing the data, and is not just based on a person’s name. 5 marks for each of the 4 descriptions else pro rata to a maximum of 20 marks 4*(3 for a description + 2 for a process) to a maximum of 20 marks Question B11 An E-Commerce information system must be made available to all on the internet, and consequently is open to the risk of viruses and the likes. As the E-Commerce manager describe FOUR ways in which the E-Commerce information system can be infected and ONE precaution for EACH of the FOUR ways that must be taken to prevent the E-Commerce information system and the data from being corrupt. LO4 AC4.3 Ch6 p344-352 (20 marks) Answer Any FOUR of the following are acceptable, plus unique responses: The E-commerce IS can be infected by: By allowing non organisational (possibly infected) CD, floppies, other portable media. This can be prevented by using either a sheep-dip, on-line virus checker, or by not allowing them to be used. By opening unknown email attachments. This can be prevented by scanning the attachment prior to its opening, and by deleting the email immediately. By staff clicking on infected websites. This can be prevented by using appropriate software to scan the website before accessing it, and by using suitable virus checkers that can verify the originality of the website. By staff clicking on infiltrated Wi-Fi hot spots. This can be prevented by using appropriate software to scan the hot spot activity before accessing it, and by using suitable virus checkers that can verify the originality of the website. etc. 4*(3 for a mode of infection + 2 for a precaution) to a maximum of 20 marks © Institute for the Management of Information Systems – Page 6 of 9 Question B12 Below there are THREE scenarios describing how a company will allow a user to access their website. For each of the THREE scenarios describe a different type of company that would use that mode of access and explain TWO reasons why they would use that mode in preference to the other two. 1. Registering before you are allowed to access the website. 2. To have a paid membership. 3. A limited or temporary free access but requires payment after the free access period has been used up. (20 marks) Answer 1. To register before you are allowed to complete transactions on the website the most obvious is an e-commerce website. Here the seller will request your details for various reasons such as checking their credit rating, obtaining personal details to send cold emails at a later date should you not want to proceed with a purchase, etc. 2. A paid membership. The most obvious is a club or organisation which caters for special/specific interests. For example a company that sells information such as ‘Which?’. Other examples include on-line gaming, down loading of films, etc. Why, here it has cost money to collect, collated, and process the data into meaningful information. 3. Limited free access to everyone but require payment for further contents. Another example is company’s demo CD which only allows certain tasks to be performed or a maximum no of entries. Why, where there is a paid membership, but allowing the user to use limited access for a trial period as to whet their appetite and possible become a paid-up member at a later date without incurring up-front cost until satisfied that it is what the user wants. 3*(3 for a description of a company + 2*2 for why they prefer this method) to a maximum of 20 marks © Institute for the Management of Information Systems – Page 7 of 9 Question B13 The main types of networks are Ring, Bus, and Star networks. a) Using a diagram explain how each of the THREE networks function. (12 marks) b) For each of the THREE networks describe a situation where you would install that network in preference to the other two. (8 marks) Answer Ring Network: the ring topology is a type of computer network configuration where each network computer and device is connected to each other forming a large circle (or similar shape). Each packet is sent around the ring until it reaches its final destination. Today, the ring topology is seldom used. Because a ring topology provides only one pathway between any two nodes, ring networks may be disrupted by the failure of a single link. A node failure or cable break might isolate every node attached to the ring. http://techimind.blogspot.co.uk/2010/08/ring-topology.html#udssearch-results A good situation is where there is a client/server or peer-to-peer network. Bus Network In local area networks where bus topology is used, each machine is connected to a single cable. Each computer or server is connected to the single bus cable through some kind of connector. A terminator is required at each end of the bus cable to prevent the signal from bouncing back and forth on the bus cable. A signal from the source travels in both directions to all machines connected on the bus cable until it finds the MAC address or IP address on the network that is the intended recipient. If the machine address does not match the intended address for the data, the machine ignores the data. Alternatively, if the data does match the machine address, the data is accepted. http://techimind.blogspot.co.uk/2010/08/bus-topology.html A good situation is where you are setting up a classroom network where the desks are along the walls. Star networks are one of the most common computer network topologies. In its simplest form, a star network consists of one central switch, hub or computer, which acts as a conduit to transmit messages. The star topology reduces the chance of network failure by connecting all of the systems to a central node. When applied to a bus-based network, this central hub rebroadcasts all transmissions received from any peripheral node to all peripheral nodes on the network, sometimes including the originating node. All peripheral nodes may thus communicate with all others by transmitting to, and receiving from, the central node only. Data on a star network passes through the hub, switch, or concentrator before continuing to its destination. The hub, switch, or concentrator manages and controls all functions of the network. It is also acts as a repeater for the data flow. This configuration is common with twisted pair cable. However, it can also be used with coaxial cable or optical fibre cable. © Institute for the Management of Information Systems – Page 8 of 9 http://techimind.blogspot.co.uk/2010/09/star-toplogy.html A good situation is where data entry staff are entering data to a system, or where there is a need for maximum up-time in that if one machine goes down they remainder can still function. 3*(2 for a diagram + 2 for a description) 3* 3 for a situation to a maximum of 8 marks Total 20 marks END OF EXAMINATION © Institute for the Management of Information Systems – Page 9 of 9