PS Exam

  • Full Screen
  • Wide Screen
  • Narrow Screen
  • Increase font size
  • Default font size
  • Decrease font size

Set - 1 - Information System Analysis and Design

E-mail Print PDF

Information Technology: IT Applications

The following questions have been taken from the Cambridge Checkpoints 2007 – VCE IT Applications – Potts.   (Also check out the online quizzes at www.cambridge.edu.au/checkpoints)


Question 1
A transaction processing system is concerned with

  1. Operational day-to-day activities.
  2. Strategic decision-making support.
  3. A large database of specialised knowledge.
  4. Support for an organisation’s management needs.

 

Question 2
A store manager of Red Fried Chicken only makes operational decisions based on daily reports.
An example of a decision the manager would make is

  1. Changing the type of products sold.
  2. Reducing the price of unsold chickens.
  3. Implementing a national TV campaign.
  4. Opening a new store in a nearby suburb.

 

Question 3
Which of the following could not be considered an organisational goal?

  1. Increase company profit margin.
  2. Expand customer base.
  3. Provide quality service.
  4. Complete backups every Friday.



Question 4
An organisation’s goal is to ‘improve the communication of events to members’.  Which of the following strategies would best achieve this aim?

  1. Reduce labour costs.
  2. Produce a regular newsletter.
  3. Make sure all membership information is accurate.
  4. Use a spreadsheet to keep track of finances.

 

Question 5
The profile of an audience can include its

  1. Employment category, income level and average age.
  2. Employment category, favourite colour and average age.
  3. Tax file number, income level and years of employment.
  4. Educational level, Medicare number and name of doctor.

 

Question 18
Which of the following is not a component of an information system?

  1. Equipment
  2. End-user
  3. Organisational goals
  4. Procedures

 

Question 19
Which of the following would not be considered an end-user of an information system?

  1. A student who accesses information on a website.
  2. A programmer who writes code for a software module.
  3. A customer who uses a credit card in an EFTPOS machine.
  4. A sales assistant in a video shop who searches a database for a specific title.

 

Question 20
Which of the following would improve the effectiveness of a system?

  1. Install a barcode reader to reduce the time needed to enter data.
  2. Make it easier for employees to access information by developing a database.
  3. Allow management to make timely decisions by providing up-to-date information in a spreadsheet.
  4. Automate a manual process to reduce salaries.

 

Question 28
The correct order of steps to solve a problem is

  1. Analyse, design, develop, test, evaluate, implement, document.
  2. Analyse, design, test, develop, document, implement, evaluate.
  3. Design, analyse, develop, document, implement, test, evaluate.
  4. Analyse, design, develop, test, document, implement, evaluate.

 

Question 29
A sales assistant needs to record a sale by manually completing a form in a docket book.  What is a likely problem that this practice could lead to?

  1. It takes too long for sales to be recorded and processed.
  2. The sales assistant is under-qualified for the task.
  3. The use of a docket book is old fashioned.
  4. The information in the docket book is not timely.

 

Question 34
A milestone in project management indicates

  1. The passing of 50% of the time allocated to the project.
  2. The completion of the project.
  3. The conclusion of an important stage of a project and has zero time duration.
  4. The conclusion of an important stage of a project and has a time duration equal to the sum of the time durations for each step of that stage.

 

Question 35
A project has a critical path of 21 days. The ‘testing the solution’ task has a slack time (or lag time) of three days.  What is the minimum time the project can be completed?

  1. 18 days
  2. 21 days
  3. 24 days
  4. Depends on whether the ‘testing the solutio’ task lies on the critical path.

 

Question 40
Which of the following is a primary source of data?

  1. A student reads the voltage across a lamp using a voltmeter.
  2. The meaning of a word is read from a dictionary.
  3. A website provides information on the cost of air flights.
  4. A sales brochure indicates what items are on special.

 

Question 41
A database of patient information for a medical clinic is to be developed.  From the patient’s data below, which is the least important?

  1. Patient’s name
  2. Patient’s age
  3. Patient’s allergies
  4. Patient’s credit rating

 

Question 42
Constraints on data to be used in a presentation include

  1. Copyright restrictions, trademarks, validation techniques.
  2. Copyright restrictions, trademarks, privacy regulations.
  3. Copyright, privacy regulations, validation techniques.
  4. Proofreading, validation techniques, testing the message.

 

Question 44
Which design tool would be most appropriate for a website?

  1. Layout diagrams
  2. Nassi-Schneidermann diagram
  3. Storyboard
  4. Data flow diagram

 

Question 45
A web-based solution has been developed and needs to be tested.  Which attributes should be tested?

  1. Useability, functionality, spelling.
  2. Useability, spelling, presentation.
  3. Useability, functionality, presentation.
  4. Spelling, functionality, presentation.

 

Question 62
A patient’s medical records are found at the tip.  Which of the following is true?

  1. This is a breach of the Health Records Act 2001.
  2. This is a breach of the Privacy Amendment (Private Sector) Act 2000.
  3. This is embarrassing but is not actually in breach of any law. 
  4. The owner of the tip is liable for damages.

 

Question 64
One way to secure data for transmission over a network is to

  1. Validate the data
  2. Encrypt the data
  3. Decrypt the data
  4. Archive the data

 

Question 65
A disaster recovery plan should include

  1. Biometric technology replacement plan, backup plan, recovery plan, test plan.
  2. Biometric technology replacement plan, emergency plan, backup plan, recovery plan.
  3. Biometric technology replacement plan, emergency plan, backup plan, test plan.
  4. Emergency plan, backup plan, recovery plan, test plan.

 

Question 66
Accidental damage to an information system can be caused by

  1. User error.
  2. Failure to follow file management procedures.
  3. Failure of hardware components.
  4. All of the above.

 

 

 

 

Subscribe

Wish to get contents in your Email?

Enter your email address:

Who's Online

We have 65 guests online

Sharing Enriches!

You are here: MCQ Bank Information System Analysis and Design Set - 1 - Information System Analysis and Design