Download Using ICT in an Organisational Environment (D3) IMIS DIPLOMA QUALIFICATIONS

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Piggybacking (Internet access) wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

IEEE 1355 wikipedia , lookup

Computer security wikipedia , lookup

Airborne Networking wikipedia , lookup

Transcript
IMIS DIPLOMA QUALIFICATIONS
Using ICT in an Organisational Environment
(D3)
Wednesday 3rd June 14:00hrs – 17:00hrs
DURATION: 3 HOURS
Candidates should answer ALL the questions in Part A and THREE of the five
questions in Part B. Part A carries 40% of the marks available and Part B
carries 60%. Candidates should allocate their time accordingly.
No reference material of any kind may be taken into the examination.
[Turn over]
© Institute for the Management of Information Systems –
Page 1 of 9
PART A. Answer ALL questions in this section.
Question A1
Explain the term System Software and its importance.
(5 marks)
Answer
System Software is software that helps the computer to perform the essential tasks.
It is important because it controls the computer, loads device drives, and runs
application software.
3 marks for an explanation and 2 marks for its importancea
Question A2
Explain the term workstation and describe why a business would use one.
(5 marks)
Answer
There are two responses to this question
Firstly – it is a work station is a unit that allows the user to perform complex scientific
calculations without ‘commandeering’ a large machine. As a dedicated machine it
would use all of its resources to the task without having to share its resources with
others.
Secondary – it is a machine that performs basic/essential tasks such as
verification/validation of data prior to data being entered into the main machine for
processing.
A business would use it as it would reduce the number of errors being processed.
Also it would save time on the main machine to perform more demanding/important
tasks.
3 marks for an explanation and 2 marks for why a business would use one
Question A3
A company may wish to have some web documents ‘linked’.
Explain the term linked and describe why a business would use this function.
(5 marks)
Answer
name and address, current balance, etc. A business would use this function as the
document would be linked to a unique point knowing that there is only one link and
that link would have the most up to date data.
3 marks for an explanation and 2 marks for why a business would use this function
© Institute for the Management of Information Systems –
Page 2 of 9
Question A4
Explain the term Spyware and name TWO kinds of spyware. LO4 Chp 2 p103
(5 marks)
Answer
Spyware is deceitful softw
confidential information.
The following are acceptable as kinds of software:
 Adware or pop-up generators
 Browser hijackers
 Search hijackers
 Key loggers
 Etc
3 marks for a term and 2*2 marks for a name to a maximum of 5 marks
Question A5
When a common set of tasks have to be run frequently a macro may be
created to execute these tasks.
Explain the term macro and describe TWO reasons why a company would
agree to use a macro to execute the tasks?
(5 marks)
Answer
A macro is a keyboard shortcut that will execute a set of instructions to perform a
specific task.
A company would use a macro for the following reasons:
 It has already been tested.
 The results are always correct.
 It will save time and money for the company.
 The only input required, if necessary, is the parameters.
 Etc
2 marks for an explanation and 2*2 marks for why a company would use one to a
maximum of 5 marks
Question A6
Explain the term Identity Theft and TWO ways in which Identity Theft can be
prevented.
(5 marks)
Answer
Identity Theft is when a person hijacks a person’s name and identity and uses their
good credit rating to obtain either cash or to buy products.
Any TWO of the following are suitable:
A business could monitor the following:
 Check credit card statement
 Keep passwords etc private/secret
 Install suitable software to protect personal details
 Etc
2 marks for the description and 2*2 marks for prevention to a maximum of 5 marks
© Institute for the Management of Information Systems –
Page 3 of 9
Question A7
Secondary storage hardware is frequently used by companies to store data.
Explain describe the term Secondary storage and describe TWO reasons why
Secondary storage hardware is used.
(5 marks)
Answer
Secondary storage is a device that permanent holds data and information as well as
programs.
Any TWO of the following are suitable:
 It can be used as an archive.
 It can be used as a backup mode.
 Data is not lost when power is switched off.
 Enable large amounts of data to be transferred from one place to another.
 Etc
2 marks for a term and 2*2 marks for a reason to a maximum of 5 marks
Question A8
Printers can be classified under two categories; non impact and impact.
Describe BOTH categories and ONE preference of using one of the categories
in an open plan office.
(5 marks)
Answer
An impact printer forms characters using a striking mechanism against an ink ribbon
to form an image on paper.
A non-impact printer forms characters without direct physical contact between the
printer and the paper, or by heat transference.
I would recommend a non-impact printer because it is quieter to run.
I could recommend an impact printer because it is cheaper to buy and for its
consumables.
2 marks for each term and 1 mark for either preference, maximum 5 marks.
© Institute for the Management of Information Systems –
Page 4 of 9
PART B. Answer any THREE of the following FIVE questions.
Question B9
It is well known that computer users at work use their computers for personal
use during lunch breaks.
Give and describe FOUR safeguards that you, as the IT manager, would
implement to ensure that there are no computer or communications security
breaches by your staff. LO6 AC6.2 p470-476
(20 marks)
Answer
Any FOUR of the following are acceptable, plus unique responses:
 Enforcement of computer policy –
staff passwords, changing passwords frequently, etc.
 Blocking of various sites – restricting staff to the access of sites that are purely for
work functions, using Employment Internet Management (EIM) software, etc.
 Enforcement of logging off outside working hours – ensuring that computers are
 Ensure that computers switch on to sleep mode after non-use for say 5 – 10
minutes so that no one can use another person’s machine to detract usage.
 Spyware checking software – ensure that spyware/virus/etc software is installed
and kept up to date.
 Logging of transactions – should the need arise the log can be checked
an incident come to light to find the ‘culprit’.
 Etc
4*(2 for a safeguard + 3 for a prevention) to a maximum of 20 marks
Question B10
Databases are very important in helping to make decisions especially in the
digital economy. To ensure that the information on the database is of high
quality there are FIVE criteria that the data must meet.
Describe FOUR of the five criteria and for each of the criteria a process that
must be in place to ensure that correct decisions can be made. (20 marks)
Answer
Any FOUR of the following are acceptable, plus unique responses:
 Correc and verifiable – that is the information must be accurate and checkable.
The process to be in place is verification/validation checks.
 Complete yet concise – complete means information must include all relevant
data, and concise means that it only includes relevant data. The process to be in
place is that the input forms, when created, are checked to ensure that only
relevant data is requested and is not ‘long winded’.
 Cost effective –the information is efficiently obtained and understandable. The
process to be in place is that the stages to collect the data are both ‘short and
sweet’.
© Institute for the Management of Information Systems –
Page 5 of 9
 Current – current means timely yet also time sensitive, based on historical,
present, or future information needs. The process to be in place is that periodical
checks are completed to ensure that the data is up to date and still relevant.
 Accessible – this means that the information is quickly and easily obtainable. The
process to be in place is that when designing the database that there are ample
ways of accessing the data, and is not just based on a person’s name.
5 marks for each of the 4 descriptions else pro rata to a maximum of 20 marks
4*(3 for a description + 2 for a process) to a maximum of 20 marks
Question B11
An E-Commerce information system must be made available to all on the
internet, and consequently is open to the risk of viruses and the likes.
As the E-Commerce manager describe FOUR ways in which the E-Commerce
information system can be infected and ONE precaution for EACH of the FOUR
ways that must be taken to prevent the E-Commerce information system and
the data from being corrupt. LO4 AC4.3 Ch6 p344-352
(20 marks)
Answer
Any FOUR of the following are acceptable, plus unique responses:
The E-commerce IS can be infected by:
 By allowing non organisational (possibly infected) CD, floppies, other portable
media. This can be prevented by using either a sheep-dip, on-line virus checker,
or by not allowing them to be used.
 By opening unknown email attachments. This can be prevented by scanning the
attachment prior to its opening, and by deleting the email immediately.
 By staff clicking on infected websites. This can be prevented by using appropriate
software to scan the website before accessing it, and by using suitable virus
checkers that can verify the originality of the website.
 By staff clicking on infiltrated Wi-Fi hot spots. This can be prevented by using
appropriate software to scan the hot spot activity before accessing it, and by
using suitable virus checkers that can verify the originality of the website.
 etc.
4*(3 for a mode of infection + 2 for a precaution) to a maximum of 20 marks
© Institute for the Management of Information Systems –
Page 6 of 9
Question B12
Below there are THREE scenarios describing how a company will allow a user
to access their website.
For each of the THREE scenarios describe a different type of company that
would use that mode of access and explain TWO reasons why they would use
that mode in preference to the other two.
1. Registering before you are allowed to access the website.
2. To have a paid membership.
3. A limited or temporary free access but requires payment after the free
access period has been used up.
(20 marks)
Answer
1. To register before you are allowed to complete transactions on the website the
most obvious is an e-commerce website. Here the seller will request your details
for various reasons such as checking their credit rating, obtaining personal details
to send cold emails at a later date should you not want to proceed with a
purchase, etc.
2. A paid membership. The most obvious is a club or organisation which caters for
special/specific interests. For example a company that sells information such as
‘Which?’. Other examples include on-line gaming, down loading of films, etc.
Why, here it has cost money to collect, collated, and process the data into
meaningful information.
3. Limited free access to everyone but require payment for further contents. Another
example is company’s demo CD which only allows certain tasks to be performed
or a maximum no of entries. Why, where there is a paid membership, but allowing
the user to use limited access for a trial period as to whet their appetite and
possible become a paid-up member at a later date without incurring up-front cost
until satisfied that it is what the user wants.
3*(3 for a description of a company + 2*2 for why they prefer this method) to a
maximum of 20 marks
© Institute for the Management of Information Systems –
Page 7 of 9
Question B13
The main types of networks are Ring, Bus, and Star networks.
a) Using a diagram explain how each of the THREE networks function.
(12 marks)
b) For each of the THREE networks describe a situation where you would
install that network in preference to the other two.
(8 marks)
Answer
Ring Network: the ring topology is a type of computer network
configuration where each network computer and device is
connected to each other forming a large circle (or similar shape).
Each packet is sent around the ring until it reaches its final
destination. Today, the ring topology is seldom used. Because a ring
topology provides only one pathway between any two nodes, ring
networks may be disrupted by the failure of a single link. A node
failure or cable break might isolate every node attached to the ring.
http://techimind.blogspot.co.uk/2010/08/ring-topology.html#udssearch-results
A good situation is where there is a client/server or peer-to-peer
network.
Bus Network
In local area networks where bus topology is used, each machine is
connected to a single cable. Each computer or server is connected to
the single bus cable through some kind of connector. A terminator is
required at each end of the bus cable to prevent the signal from
bouncing back and forth on the bus cable. A signal from the source
travels in both directions to all machines connected on the bus cable
until it finds the MAC address or IP address on the network that is
the intended recipient. If the machine address does not match the
intended address for the data, the machine ignores the data.
Alternatively, if the data does match the machine address, the data
is accepted.
http://techimind.blogspot.co.uk/2010/08/bus-topology.html
A good situation is where you are setting up a classroom network
where the desks are along the walls.
Star networks are one of the most common computer network
topologies. In its simplest form, a star network consists of one
central switch, hub or computer, which acts as a conduit to transmit
messages. The star topology reduces the chance of network failure
by connecting all of the systems to a central node. When applied to
a bus-based network, this central hub rebroadcasts all transmissions
received from any peripheral node to all peripheral nodes on the
network, sometimes including the originating node. All peripheral
nodes may thus communicate with all others by transmitting to, and
receiving from, the central node only. Data on a star network passes
through the hub, switch, or concentrator before continuing to its
destination. The hub, switch, or concentrator manages and controls
all functions of the network. It is also acts as a repeater for the data
flow. This configuration is common with twisted pair cable. However,
it can also be used with coaxial cable or optical fibre cable.
© Institute for the Management of Information Systems –
Page 8 of 9
http://techimind.blogspot.co.uk/2010/09/star-toplogy.html
A good situation is where data entry staff are entering data to a
system, or where there is a need for maximum up-time in that if one
machine goes down they remainder can still function.
3*(2 for a diagram + 2 for a description)
3* 3 for a situation to a maximum of 8 marks Total 20 marks
END OF EXAMINATION
© Institute for the Management of Information Systems –
Page 9 of 9