|
1 | |
Which of the following are advantages of implementing a small business system in a programming language?
1) the client gets a tailor-made system
2) requirements peculiar to the client organization can be built into the system
3) the software can be simpler and more compact than software developed with a commercial package
4) it should be relatively easy to make modifications to the system in the future
5) it is less expensive than implementing using a package |
| | A) | All of them |
| | B) | None of them |
| | C) | 1 only |
| | D) | 1,2,3 and 4 |
|
|
2 | |
Which of the following are advantages of implementing a small business system in a commercial database package?
1) Packages are a relatively inexpensive method of implementation
2) Using a package saves time and effort that would have to be spent on coding
3) Packages are designed to be portable
4) Packages have been tried and tested
5) With a commercial package, time can be saved on development and documentation |
| | A) | All of them |
| | B) | None of them |
| | C) | 1 only |
| | D) | 1,2,4 and 5 |
|
|
3 | |
Which of the following are features of a redundant data item?
1) It is never used
2) It is stored in more than one place in a system
3) It can be derived from other data stored in the system
4) It cannot be nornalised |
| | A) | 1,2, and 4 |
| | B) | 1 and 2 |
| | C) | 1,2 and 3 |
| | D) | 4 only |
|
|
4 | | The role of a database management system is to: |
| | A) | determine how the system as a whole is to be organized into smaller, more manageable components or subsystems |
| | B) | protect personal data held in a form that can be automatically processed and which concerns identifiable individuals |
| | C) | organise data items into groups in such a way that no redundant data items are stored |
| | D) | organise the inputting, manipulation, retrieval and outputting of the data |
|
|
5 | | A 1:many relationship, such as that between a doctor and his patients, can be implemented in a database by: |
| | A) | including the primary key of Doctor in the Patient table |
| | B) | including the primary key of Patient in the Doctor table |
| | C) | designing a separate table for the relationship |
| | D) | can’t be done |
|
|
6 | | A many:many relationship, such as that between students and coursework, can be implemented in a database by: |
| | A) | including the primary key of Student in the Coursework table |
| | B) | including the primary key of Coursework in the Student table |
| | C) | designing a separate table for the relationship |
| | D) | can’t be done |
|
|
7 | | A query is: |
| | A) | an expression in a language such as SQL for retrieving and manipulating data |
| | B) | a means of allowing the user to display, enter and modify data on screen |
| | C) | a user interface that is based on direct manipulation of features including icons, windows, pull-down and pop-up menus |
| | D) | a means of determining whether an item of data is redundant or not |
|
|
8 | |
Which of the following are sensible guidelines for designing the user interface?
1) highlighting should only be used to pick out important information, not to add decoration to the screen
2) the ways in which the user is expected to carry out various tasks should not be consistent
3) the manual should not be easy to understand, so that the user is encouraged to use online help
4) the screen should contain all the relevant information and no more
5) the overall design of the screens should be consistent
6) the screens should be as dramatic as possible, with full use of special effects |
| | A) | all of them |
| | B) | 1,4, and 5 |
| | C) | 2,3,and 6 |
| | D) | none of them |
|
|
9 | |
Which of the following may be used in a multimedia system?
1) text
2) graphics
3) sound
4) photographs
5) video |
| | A) | all of them |
| | B) | none of them |
| | C) | 2,4 and 5 |
| | D) | 2,3, and 5 |
|
|
10 | | A client-server system is one where: |
| | A) | the system is tested by the user once it has been installed on site |
| | B) | one computer accesses data which is held on another computer via a network |
| | C) | two or more computers are linked, thus allowing them to communicate, share data and applications and use the same peripherals |
| | D) | business is conducted electronically over the Internet |
|
|
11 | | A security-critical system is one where: |
| | A) | failure would cause loss of life or severe hardship |
| | B) | failure would cause loss of crucial information |
| | C) | the system has evolved over a number of years, but is still critical to the running of a business |
| | D) | the system operates in real time, i.e. as dictated by the real world |
|
|
12 | | A program written deliberately to corrupt data or otherwise cause trouble is called: |
| | A) | a disinfectant |
| | B) | a module |
| | C) | an operation |
| | D) | a virus |
|