Question 1
Question
A business with more than 100 employees tests its disaster recovery strategy by simulating a fi re and power failure. A criterion to evaluate the effectiveness of the strategy to protect the integrity of customer data would be to ask
Answer
-
are all back-up copies of customer records up-to-date and complete?
-
can the back-up copies of customer data be quickly accessed?
-
is the customer data restored within 30 minutes of power returning?
-
are all appropriate software companies contacted within 60 minutes?
Question 2
Question
When a medical clinic in country Victoria implements its new information system, the managers select and delete all the patient fi les from the hard disks before donating the old computers to the local primary school. In doing this, the managers have
Answer
-
done all that is required under the Health Records Act 2001.
-
not met their legal obligations under the Health Records Act 2001.
-
prevented a threat to confidential data by unauthorised users.
-
followed the correct procedure for the disposal of data under the Information Privacy Act 2000.
Question 3
Question
The primary purpose of a proxy server is to
Answer
-
connect multiple devices together to act as a single network.
-
forward data between computer networks.
-
keep an organisation’s network secure.
-
accept requests from clients seeking resources from other servers.
Question 4
Question
New employees use photocopy USER IDENTITIES from 999 to 1999. Test data to display an ‘INVALID USER IDENTITY’ message would be
Answer
-
998 and 2000
-
1000 and 1998
-
999 and 1999
-
999 and 1998
Question 5
Question
Analysing the needs of an online community involves
Answer
-
determining what results are expected from test data.
-
monitoring users’ complaints about the existing system
-
interviewing community members to determine evaluation criteria.
-
observing the results of sample data used to test the new system
Question 6
Question
Which one of the following is the best validation technique for the Country field?
Answer
-
a range check
-
an input mask
-
a required fi eld
-
a dropdown box
Question 7
Question
A security protocol to protect the privacy of individuals entering their data on this form would be
Answer
-
encrypting all data before it is communicated.
-
stating a shipping and returns policy
-
banning users who exceed their purchase limit.
-
accepting orders only from customers who tick the acceptance box.
Question 8
Question
What is the best data type for the box labelled ‘I have read and accept the conditions of purchase’?
Answer
-
Image
-
Text
-
Number
-
Boolean
Question 9
Question
The appearance of a website can be enhanced by having
Answer
-
consistent font types.
-
important information underlined
-
minimum contrast between font and background colours.
-
navigation buttons of different sizes.
Question 10
Question
Which one of the following would be a non-technical constraint on the design of a school’s new website?
Answer
-
It must run on the existing classroom laptops
-
New and existing fi le formats must be compatible
-
Students’ examination results and attendance reports must be kept private.
-
The size of video files used by teachers for online class presentations must be limited.
Question 11
Question
Sunny Tennis Club is updating its website to attract new members. It is making decisions about what
information will be available for the general public (open) and what will be for members only (closed).
Which diagram represents the best decision for the club?
Question 12
Question
A solution developer wants to test the effi ciency of using the date convention of mm/dd/yyyy for an online
sales form to be used in a global market. He tracks the results of 100 users who were required to enter the
current date using this convention
Answer
-
how quickly each user enters the date.
-
the percentage of users who enter complete dates.
-
the number of users who accurately enter the current date.
-
the number of error messages received by users to indicate incorrect date order.
Question 13
Question
A physical device that can help prevent unauthorised access to data and information on a network is
Answer
-
a PIN.
-
a swipe card.
-
a thumb print.
-
an encryption key
Question 14
Question
A local library wants to update its website so that new users can easily access the online catalogue.
The most suitable form of user documentation would be a
Answer
-
quick start guide
-
table of contents.
-
technical manual
-
Help Desk email contact
Question 15
Question
Evaluating a solution involves
Answer
-
determining the evaluation criteria
-
testing whether the solution does what it was intended to do
-
reporting on the extent to which the solution meets the requirements of the user
-
determining what information the solution has to provide and what data is needed to produce it
Question 16
Question
When Old Time Gardeners decides to re-landscape a suburban parkland, it sets up a website so that local
residents can view each stage of the construction.
This type of online community is best described as
Answer
-
social.
-
collaboration
-
project-based.
-
knowledge-sharing.
Question 17
Question
The primary key in the Movie table ensures that
Answer
-
a movie has a unique identity.
-
a director has a unique identity
-
two directors cannot have the same LastName
-
a director cannot be credited with the wrong movie.
Question 18
Question
The relationship the owner has created between the primary key in the Director table and the foreign key in
the Movie table is needed if fans using the website want to
Answer
-
sort the movies in order of release date.
-
search for all directors born in the 20th century.
-
sort the directors’ last names in alphabetical order.
-
search for movies in a particular language by a director.
Question 19
Question
In which position would PatientID be best represented?
Question 20
Question
What does position ‘y’ represent?
Answer
-
MedicationID
-
doctor gives patient medication
-
doctor diagnoses patient’s condition
-
name of medication given to patient
Question 21
Question
The stage of the problem-solving methodology where the solution requirements are determined is
Answer
-
design.
-
analysis.
-
evaluation
-
development.
Question 22
Question
The best electronic validation technique for ensuring that an online data entry form is complete is
Question 23
Question
The manager of a graphic art studio wants to use cloud computing instead of an external hard drive to store
image data. One criterion that can be used to evaluate the effectiveness of this decision would be to ask
Answer
-
is it cheaper to use the cloud than the external hard drive?
-
is the upload time to the cloud faster than saving to the external hard drive?
-
do staff find it quicker to retrieve images from the cloud than from the external hard drive?
-
do the images have the same resolution when retrieved from the cloud as when retrieved from the
external hard drive?
Question 24
Question
The best design tool to show the structure of a database solution is
Answer
-
a site map.
-
a mock-up of the input form.
-
an entity-relationship (ER) diagram
-
an input-process-output (IPO) chart.
Question 25
Question
A relational database management system (RDBMS) developer is creating a new table within a database.
The most effi cient name and data type for a fi eld containing phone numbers, such as (03) 456 5667, is
Answer
-
name: cpn, data type: number
-
name: custPn#, data type: text
-
name: custPhNum, data type: text
-
name: customer phone number, data type: number
Question 26
Question
A farmer has hired you to develop a new stock management solution.
During development, to ensure that the new solution does what it is intended to do, you should
Answer
-
enter a lot of data to make sure the stock numbers are correct.
-
read the quick start guide to make sure it is logical and efficient.
-
create a set of evaluation criteria to judge if the requirements were met.
-
check the system in three to six months to make sure it is working as intended.
Question 27
Question
A government school has decided to store all parents’ credit card information in a text fi le on the school’s
computer system.
The school has a legal obligation to change this information management strategy because
Answer
-
parents might get angry
-
human error might occur when the credit card numbers are entered.
-
sensitive data should be stored safely and text files are too easily read.
-
expired credit cards may still be in the system, resulting in a lack of data integrity
Question 28
Question
Barry received a three-monthly report showing that the number of complaints about orders being delivered to
the wrong addresses had increased. He decides that all stages of the order delivery process will be completely
computerised in three years.
Strategies for evaluating the new solution are best carried out
Answer
-
during testing.
-
as soon as the solution is in use.
-
immediately before the solution is in use.
-
six months after the solution has been in use.
Question 29
Question
The best procedure to dispose of a data file and make it extremely diffi cult to retrieve is to
Answer
-
delete it.
-
overwrite it with specialty software
-
move it to the trash and empty the trash.
-
encrypt it with licensed software and save it to the cloud.
Question 30
Question
Drivers are insured for mountain track driving if they pass a special driving course (SDC), have a car with
roll bars (RB) and are without any convictions (C) for dangerous driving.
The design for a query to identify drivers who can receive insurance is
Answer
-
Insured = SDC or RB and C
-
Insured = SDC and RB and C
-
Insured = SDC or RB and not C
-
Insured = SDC and RB and not C
Question 31
Question
An operating system is designed to
Answer
-
provide online help to new users
-
manage file access and application software.
-
provide user-friendly filenames for shared files
-
encrypt fi les that are leaving and entering the network
Question 32
Question
A text box on a data entry form has this validation rule applied to it: 2999 < Postcode < 4000.
The most suitable data to test the rule is
Answer
-
3336, 3337, 3999
-
2050, 3050, 4050
-
2999, 4000, 4001
-
3000, 3999, 4050
Question 33
Question
A telecommunications company has more than 2000 employees across Australia with 24-hour access to the
company intranet. The human resource manager wants to make sure that employees can check their holiday
entitlements at any time.
The most effi cient method of achieving this would be to
Answer
-
email all employees whenever any entitlements change.
-
upload new entitlement information to the home page on the company intranet.
-
send new entitlement information to the relevant employees’ company mobile phones
-
provide each employee with a written copy of their entitlements whenever there is a change.
Question 34
Question
The database table below shows the most popular songs during the decade 2000 to 2010, as voted by an
online music community in 2011. The query Artist = The Black Eyed Peas OR Year < 2009 will display records
Answer
-
5, 7
-
1, 5, 7
-
2, 3, 4, 6, 8, 9
-
2, 3, 4, 5, 6, 7, 8, 9
Question 35
Question
A non-technical constraint on using company logos for promotions on a website is
Answer
-
breach of copyright
-
the storage capacity of the server
-
the fi le format of the company logo
-
the data and fi le processing capabilities available to users.
Question 36
Question
Determining the scope of a solution includes
Answer
-
identifying the functions the solution has to provide.
-
determining what the solution can and cannot do.
-
identifying the constraints of the solution
-
planning the appearance of the solution.
Question 37
Question
The efficiency of the information architecture of a website can be measured by
Answer
-
the number of clicks required to get to the relevant information
-
whether all links go to relevant information
-
the number of different font colours used
-
the readability of the links.
Question 38
Question
To protect the rights of individuals and organisations that are supplying data on a website, a host company is
legally required to include on its website a policy statement regarding
Answer
-
shipping and returns.
-
human rights.
-
privacy.
-
spam.
Question 39
Question
A complete disaster recovery strategy involves
Answer
-
preparing a backup plan for stored data and determining the cause of the disaster.
-
practising the procedures for shutting down the computer system and recovering data
-
purchasing preventative equipment and documenting the procedures for managing risk
to an organisation’s data.
-
undertaking a risk assessment, and documenting and practising the procedures for managing risk
to an organisation’s data and employees.
Question 40
Question
Developing a prototype website involves
Answer
-
conducting tests and recording results.
-
determining what benefits the solution will bring to users.
-
considering the constraints and conditions that need to be met.
-
deciding what measures will be used to judge whether or not the solution requirements have been met.
Question 41
Question
What are the three sub headings of Analysis in the Problem-Solving Methodology?
Answer
-
Solution Analysis, Evaluation Criteria and Solution Design
-
Solution Requirements, Solution Constraints and Scope of Solution
-
Report, Strategy and Solution Documentation
-
Solution Design, Solution Documentation and Scope of Solution
Question 42
Question
What are the two boxes that fall under the Design phase of the Problem-Solving Methodolgy?
Answer
-
Solution Design and Evaluation Criteria
-
Analysis Solution and Validation Criteria
-
Scope of Solution and Documentation
-
Testing and Solution Report
Question 43
Question
What are the four activities listed during the Development stage of the Problem-Solving Methodology?
Answer
-
Strategy, Report, Solution and Validation
-
Solution Criteria, Evaluation Method, Scope of Solution and Testing
-
Manipulation, Validation, Testing and Reporting
-
Manipulation, Validation, Testing and Documentation
Question 44
Question
What are the two steps of Evaluation in the Problem-Solving Methodology?
Question 45
Question
Acronym for the steps of the Problem-Solving Methodology?
Answer
-
ADDR
-
ADDD
-
EDDA
-
ADDE
-
DDDA
-
DEDA
-
ADED
Question 46
Question
The four steps of the Problem-Solving Methodology are?
Answer
-
Analysis, Design, Development and Evaluation
-
Analysis, Design, Development and Documentation
-
Design, Development, Documentation and Requirements
-
Design, Discussion, Documentation and Evaluation
Question 47
Question
All are examples of Design Tools:
Answer
-
Flowcharts, Layout Diagrams, Site Maps and Excel Spreadsheet
-
Storyboards, Hierarchy charts, Flowcharts and User Documentation
-
Online Tutorial, User Documentation, Context Diagrams and Flowcharts
-
Entity-Relationship Diagram, Flowcharts, Storyboards and Layout Diagrams
Question 48
Question
Define Efficiency?
Answer
-
How little time, cost and/or effort is applied/required to achieve intended results
-
A measure of how well something works - Attractiveness, clarity, accuracy, communication, relevance, etc
-
A way in which information should be treated and organised on screen
-
How well information abides by the legal obligations set
Question 49
Question
Define Effectiveness?
Answer
-
A measure of how well something works - Attractiveness, clarity, accuracy, communication, relevance, etc
-
How well information abides by the legal obligations set.
-
A way in which information should be treated and organised on screen
-
How little time, cost and/or effort is applied/required to achieve intended results
Question 50
Question
Privacy Act _____
Question 51
Question
Information Privacy Act ______
Question 52
Question
Health Records Act _______
Question 53
Question
Spam Act __________
Question 54
Question
Copyright Act ______
Question 55
Question
Charter of Human Rights and Responsibilities _______