IT1105 - Information Systems & Technology: 14 March, 2015
IT1105 - Information Systems & Technology: 14 March, 2015
Important Instructions :
The duration of the paper is 2 (two) hours.
The medium of instruction and questions is English.
The paper has 50 questions and 13
pages.
All questions are of the MCQ (Multiple Choice Questions)
type.
All questions should be answered.
Each question will have 5 (five) choices with one or more
correct answers.
All questions will carry equal marks.
There will be a penalty for incorrect responses to discourage
guessing.
The mark given for a question will vary from 0 (All the
incorrect choices are marked & no correct choices are
marked) to +1 (All the correct choices are marked & no
incorrect choices are marked).
Answers should be marked on the special answer sheet
provided.
Note that questions appear on both sides of the paper.
If a page is not printed, please inform the supervisor
immediately.
Mark the correct choices on the question paper first and
then transfer them to the given answer sheet which will
be machine marked. Please completely read and
follow the instructions given on the other side of
the answer sheet before you shade your correct
choices.
1
1) Which of the following can be considered only as an input device?
2) Which of the following create new channels for interactive communications between a company and its customers?
(i) Systems controls considered during system design can help prevent computer misuse as well as crime
and fraud done by managers and employees.
(ii) Two key aspects of system design are logical and physical design.
(iii) Interface Design is a key aspect considered during system design and it determines backups
and their frequencies.
(a) Only (ii) (b) Only (i) (c) Only (i) & (ii)
(d) Only (iii) (e) Only (ii) & (iii)
4) Following statements are about the ‘testing phase’ of the system development life cycle. Identify the TRUE
statement(s).
(a) Testing of all the programs taken together is known as volume testing.
(b) The system is tested with the end users during acceptance testing.
(c) Integration testing is done after integrating the different modules of the system.
(d) System testing ensures the capability of the system to handle large volumes of data.
(e) Testing is carried out immediately after the design phase in the waterfall method.
(a) Waterfall method does not support system modifications while they are being developed.
(b) Use of prototyping is ideal when user requirements are not clear.
(c) The best approach for any systems development requirement is the Traditional approach/Waterfall
method.
(d) There is less documentation in RAD than the Waterfall approach to systems development.
(e) In the Traditional approach, various tools are used to increase the speed of development.
2
6) Consider the following statements about systems development.
(i) Systems development can be carried out internally or through an external organization.
(ii) Systems development can be initiated due to the desire to exploit new technologies.
(iii) Alignment of business objectives with IT/IS capabilities is important for successful systems
development.
(a) Only (i) (b) Only (ii) (c) Only (i) and (iii)
(d) Only (iii) (e) (i), (ii) & (iii)
7) Following statements are based on different types of Decision Support Systems (DSS) and Management Information
Systems (MIS). Identify the FALSE statement(s).
(a) Some of the MIS may have features such as brain storming and nominal group technique.
(b) Some of the Artificial Intelligence (AI) systems can learn from experience and apply the
knowledge acquired from experience to solve problems.
(c) Executive Support Systems (Executive Information Systems) has the ability to support strategic
planning.
(d) Expert Systems and Neural Networks are some application areas of AI.
(e) Robots are useful to carry out dangerous and repetitive tasks.
8) Swarna who is an architect set up her own business at her residence with three employees. She bought new equipment as
well as computer hardware and software to facilitate architectural drawings, connect to the internet as well as to share
peripheral devices with her co-workers.
Which of the following hardware devices is/are most useful for Swarna’s business to carry out architectural printing as
well as to draw sketches on the computer respectively?
9) Swarna intends to set up a network between the computers as well as different peripheral devices.
This network
(i) will enable the workers to share the peripheral devices such as printers.
(ii) is known as a Wide Area Network (WAN).
(iii) will help the organization to reduce costs.
(a) Only (i) (b) Only (ii) (c) Only (i) and (iii)
(d) Only (iii) (e) Only (ii) and (iii)
3
10) The following statements are based on the components of a Decision Support System (DSS).
(i) A model-base supports all aspects of communication between the user and the hardware
and software that constitute the DSS.
(ii) The Database Management System allows managers and decision makers to perform
qualitative analysis on the data.
(iii) The dialogue manager allows managers and decision makers to perform quantitative
analysis on both internal and external data.
(a) Only (i) (b) Only (ii) (c) Only (i) and (iii)
(d) Only (iii) (e) Only (ii) & (iii)
(a) may handle large amounts of data from internal and external data sources.
(b) that supports repetitive decisions are addressed by an institutional DSS.
(c) is capable of performing complex and sophisticated analysis than Transaction Processing Systems.
(d) cannot support unstructured questions.
(e) does not support strategic level managers.
13) The following statements are based on the components of a Computer Based Information Systems (CBIS).
(a) Only (i) (b) Only (ii) (c) Only (i) and (iii)
(d) Only (iii) (e) Only (ii) and (iii)
4
14) Which of the following statements is/are TRUE about Management Information Systems (MIS)?
(a) Organizations can achieve competitive advantage by effectively using the information generated by an
MIS.
(b) An input to an MIS can include internal as well as external data sources.
(c) A Marketing MIS may include sub systems such as marketing research, promotion, advertising and
product pricing.
(d) Output of an MIS directly provides data to Transaction Processing Systems (TPS) and Expert
Systems.
(e) Quality control reports could be an output generated by a Marketing MIS.
16) Consider the following statements which are about the components of a system.
(i) Input to a system could take a manual or automated method.
(ii) ‘Processing’ component is important as it supports to improve the quality of the input.
(iii)The output of a system could become an input of another system.
(a) Only (i) (b) Only (ii) (c) Only (i) and (iii)
(b) Only (iii) (e) Only (ii) & (iii)
17) Following statements relate to the components of a Computer Based Information Systems (CBIS).
(i) The only type of memory available in a newly purchased computer is known as RAM.
(ii) By using systems software, end users can develop personal documents as well as presentations.
(iii) Operating systems helps to share peripheral devices in a network.
(a) Only (i) (b) Only (ii) (c) Only (i) and (ii)
(d) Only (iii) (e) Only (ii) & (iii)
5
(a) their reputation may be lost.
(b) privacy of customers and or employees may be violated.
(c) the business can be disrupted.
(d) sales and competitive advantage may be lost.
(e) there will be no direct financial loss.
19) Which of the following (is) an /are application software that is being used at an Enterprise Level?
(a) Only (i) (b) Only (ii) (c) Only (i) and (iii)
(d) Only (iii) (e) Only (ii) & (iii)
22) The following statements are about the components of a Computer Based Information Systems (CBIS).
(i) System software is not required to carry out a printing of a report on a printer.
(ii) The Central Processing Unit consists of the RAM.
(iii) Procedures and policies are developed only to protect CBIS from security threats.
(a) Only (i) (b) Only (ii) (c) (i), (ii) and (iii)
(d) Only (iii) (e) Only (ii) & (iii)
6
23) Which of the following is/are TRUE about Transaction Processing Systems (TPS)?
(a) Typically automated TPS used in organisations such as banks capture large volumes of data and
produce a variety of documents related to routine business activities.
(b) A warehouse management system integrated with Radio Frequency Identification (RFID)
technology can reduce labour hours as well as improve accuracy related to inventory management.
(c) TPS cannot be used to achieve competitive advantage.
(d) TPS can be considered as the backbone of any organization’s information system.
(e) Relocation to alternate work places and use of alternate equipment are some tasks related to
business continuity planning,
Relational databases
27) Which of the following is a/are data model(s) which help(s) to define relationships between data?
7
28) Which of the following Transaction Processing Systems (TPS) support different business functions such as
Sales/Marketing, Finance/Accounting, Manufacturing and Human Resources in the correct order?
(a) Pricing System, Material Resource Planning System, Payroll, General Ledger
(b) Pricing System, General Ledger, Material Resource Planning System, Payroll
(c) Material Resource Planning System, General Ledger, Pricing System, Payroll
(d) Payroll, Material Resource Planning System, General Ledger, Pricing System
(e) Payroll, Pricing System, Material Resource Planning System, General Ledger
30) Consider the following statements about organizational structures and competitive advantage.
(i) A virtual organization uses information technology to link people, organizations, assets and
ideas.
(ii) Some companies try to create new knowledge, disseminate it widely throughout the
organization and use it to produce innovative products.
(iii) Agile companies do not have virtual organizational structures.
(a) Only (i) (b) Only (ii) (c) Only (i) and (ii)
(d) Only (iii) (e) Only (ii) & (iii)
(a) is economical.
(b) matches the needs of the user with regard to its usage.
(c) is the latest in the market.
(d) is always small in size.
(e) has the ability to integrate easily with the existing technical environment.
8
32) Complete the following sentences.
In order to avoid unauthorized people entering its data centre physically, an organization may use
(a) a firewall.
(b) an intrusion detection software.
(c) encryption.
(d) a biometric input device.
(e) a virus guard.
33) Information Technologies are used to support business strategies in order to gain competitive advantage. Complete the
following table by filling in the blanks appropriately. In the table given below, the left column lists different strategies
used for competitive advantage and the right column lists how IT is used to achieve these strategies.
Strategies Use of IT
Cost X
leadership
Y Make radical changes to business processes with IT that dramatically cut costs,
improve quality, efficiency or customer service, or shorten time to market.
Alliances Z
Identify X, Y, Z correctly.
(a) X- Use IT to substantially reduce the cost of business processes, Y- Use IT to create virtual
organizations of business partners, Z- Differentiation
(b) X- Use IT to substantially reduce the cost of business processes, Y- Differentiation, Z- Use IT to create
virtual organizations of business partners
(c) X- Use IT to create virtual organizations of business partners, Y- Differentiation, Z- Use IT to
substantially reduce the cost of business processes
(d) X- Differentiation, Y- Use IT to create virtual organizations of business partners, Z- Use IT to
substantially reduce the cost of business processes
(e) X- Use IT to create virtual organizations of business partners, Y- Use IT to substantially reduce the cost
of business processes, Z- Differentiation
9
34) ‘Student’ is one of the files in a relational database that contains personal data of students in a college.
Which of the following statements is/are TRUE about the ‘Student’ file?
(a) The attributes of the student file could be 1105, Dulmith, Ekanayaka, 30 Temple Lane, Nawala.
(b) The primary key of this file could be the student number.
(c) Each row of the file will have data of two students.
(d) A collection of different attributes are represented by a column.
(e) The ‘Name of a Student’ could be represented by alpha numeric data type.
Application Software
36) Which of the following can be a security threat (data/information related) to an organization?
Typical outputs (reports and updated databases) of a Financial Management Information System directly provide
support for
38) Which of the following components can be found in a Transaction Processing Systems (TPS) that support the customer
order processing business process?
10
39) Identify the types of systems which can support diagnosis of an illness, mining of data to find out purchase patterns of
customers as well as provide support for long-term planning, in the correct order from the answers given below.
40) Fill the blanks in the following statements with appropriate words.
(i) The control Unit, directs the movement of data and instructions between the main memory and the
……………………………. (X).
(ii) .……….. (Y) store very small amounts of data and instructions for short periods of time.
(iii) Two methods of accessing data in the ………………… (Z) is the direct and sequential
access method.
(i) Although system components have independent functionalities, they work together to achieve
a specific goal.
(ii) In a system such as a school, the department of education is considered as a component which
is out of the system boundary.
(iii) A dynamic system undergoes rapid and constant change over time.
(a) Only (i) (b) Only (ii) (c) Only (i) and (iii)
(d) Only (iii) (e) (i), (ii) & (iii)
11
42)* The following statements are about data in an information system. Which of the following is/are
FALSE?
(a) Only (i) (b) Only (ii) (c) Only (i) and (iii)
(d) Only (iii) (e) Only (ii) & (iii)
44) Which of the following statements is/are TRUE about hardware of a computer system?
12
46) Which of the following statements is/are TRUE about privacy and security of information systems?
(a) Due to the use of computers, violation of privacy of customers has increased.
(b) Phishing is an act of creating a virus to destroy data.
(c) Password and user-id can be used as a user authentication mechanism.
(d) Access control is a mechanism used for data protection.
(e) Encryption is a technique that can be used to ensure privacy of data.
48) Following statements are about organsations and value chains. Which of the following is/are FALSE?
(a) An organization can be considered as a system that has a goal, components, inputs, processing and
outputs.
(b) The value chain concept shows how organizations can add value to their products and services.
(c) Primary processes of a value chain include technology development, administrative support
services, human resources management and procurement of resources.
(d) Support processes of a value chain include inbound logistics, outbound logistics, services, sales and
marketing and operations.
(e) Resources are the inputs to an organization.
(a) improve relationships with customers and suppliers in aspects of their interface
with the organization.
(b) eliminate threats from external entities completely.
(c) remove bottle necks and delays in the processes.
(d) increase competitive advantage by producing differentiated products/services.
(e) support decision making by producing meaningful information.
13
50) The following table shows different types of IT Applications used in different business processes.
Inbound Logistics X
Operations Use Computer aided
manufacturing
Sales/Marketing Z
Y Employee training
*********
14