Header Ads Widget

Ticker

6/recent/ticker-posts

LIKELY END OF SEM: INFO MANAGEMENT SYSTEM

 LIKELY END OF SEM: INFO MANGEMENT SYSTEM



CLICK HERE THRICE TO JOIN OUR SECRET GROUP


MARKING SCHEME

INFORMATION SYSTEM MANAGEMENT          

           

Answer ALL the questions.

[20 MARKS]

 

 

For items 1 to 10, write the appropriate responses in the spaces provided.

 

1. Interrelated component (subsystems) that work towards the achievement of a set goal is called

System.

 

2. A set of interrelated components that collect (or retrieve), process, store, and distribute    information to support decision making and control in an organization is known as  

information System

 

3. A collection of raw facts such as numbers, words, measurements, observations or just descriptions of things is known as Data

 

4. Conducting business via the Internet is known as e-business   

 

5. Acceptable network etiquette is termed as  Netiquette

 

6. Electronic commerce that is conducted between businesses and individual consumers is referred to as Business-to-Consumer

 

7. Problems associated with the file-based system are resolved by database/DBMS

 

8. One component of database environment is Hardware/Software/Database/Liveware/ procedure/people/etc.

 

9. A shared collection of logically related data, and their descriptions designed to meet the information needs of an organization is called Database

 

10. A system that interacts freely with its environment, taking inputs and influences from the environment and returning outputs and influences to the environment is called Open System

  

Items 11 to 20 are stems followed by four options lettered A to D. Read each item carefully and circle the letter of the correct or best option.

 

11. The person whose job is to maintain and provide authorization of access to database is called database ……………

A. administrator.

B. designer.

C. end-user.

D. manager.

 

12. Redundancy of data is associated with ……………

A. Data management system.

B. Database management system.

C. SQL command.

D. Traditional file-based system.

 

13. The study of physical relationship between people and their tools, such as the computer to avoid its harmful effect and also make the users more productive is known as ……………

A. ergonomics.

B. netiquette.

C. plagiarism.

D. privacy.

 

14. One of the following is not a core principle of computer security.

A. Authentication.

B. Availability.

C. Confidentiality.

D. Integrity.

 

15. One of the following is usually not a form of payment in e-business.

A. Digital Cash.

B. E-Cash.

C. Mobile Payment/Money.

D. Physical Cash.

 

16. One of the following is not an advantage associated with e-business.

A. Convenient.

B. Easiness.

C. Fast.

D. Risky.

 

17. A self-replicating malware is called ……………

A. spam.

B. trojan horse.

C. virus.

D. worm.

 

18. The exclusive control you have over a software you have developed is called ……………

A. copyright.

B. piracy.

C. plagiarism.

D. privacy.

19. If you copy a solution to an assignment from the Internet and present it as your own it is   

     referred to as ……………

A. copyright.

B. piracy.

C. plagiarism.

D. privacy.

 

20. The process of verifying your identity on a network or whilst using an ATM is called ………

A. authentication.

B. conformation.

C. passwording.

D. verification.

 

 


CLICK ON THE IMAGE TO ENSURE CLARITY








Post a Comment

0 Comments