You are on page 1of 3

A3-2

What is a computer worm?


1) Software that attaches itself to files and can reproduce itself
2) Software that replicates itself until it interrupts the operation of networks and computer systems
3) Software that burrows into other software to make it perform slower
4) Hardware used to detect problems in a network

B2-3
What is an expert system shell?
1) An expert system application that analyzes sea shells
2) The component of the expert system that surrounds the knowledge base
3) A collection of software packages and tools used to develop an expert system
4) A technique to develop expert systems using multiple experts

C2-4
Who are two of the key participants in developing an expert system?
1) Knowledge programmer, knowledge analyst
2) Knowledge engineer, knowledge software programmer
3) Knowledge base designer, knowledge engineer
4) Knowledge user, knowledge domain expert

D4-1
What are two stages of the general problem-solving approach?
1) Intelligence, implementation
2) Monitoring, analysis
3) Implementation, feasibility
4) Choice, review

E3
F2
G1
H4
I3
J1
K2
L3
M1-4
What is the distributed processing strategy used in organizations?
1) Various locations have processing facilities that are independent of the others
2) All processing occurs at a single location or facility
3) All processing is done on end users’ computers
4) Processing is done at limited locations where it is deemed to be most effective

N4-2
What are three network topologies?
1) Ring, star, web
2) Bus, hierarchical, hybrid
3) Bus, star, intranet
4) Extranet, intranet, Internet

O1
P3
Q4
R2
S2-1
What is the logical design of a system?
1) A design that describes the functional requirements of a system
2) A design that describes how tasks are accomplished
3) A design that describes the specific logic of the software
4) A design that describes the data and detailed controls on the data

T3
13/20

The purpose of an index field is to speed up searching and sorting in a table. An index field does not
have to be a primary key but a primary key must be an index field. Any field in a table can be an index
field.

Kinds of information to make a query in MS-Access:


1. The list of data fields to be printed out
2. The scope of records to be searched (all or just a few records)
3. The conditions on which the selection is made (that is, the criteria for record selection, such as
“fees billed greater than $500”)

There are three types of internal controls that small firms can apply to information systems. One of
these is systems development controls. Identify and briefly describe two other types of internal
controls that OMD should implement on this system.

Administrative controls: These controls are used to make sure the system is managed properly.
These controls include segregation or rotation of duties and monitoring of operators to ensure they
do their job properly and to control access to the data files.
2. Procedural controls: These are controls over the specific transaction processes that make up an
information system. These are controls over master files such as the client file and any
transactions files. These are controls over the rights, processing, storage, and outputs of a system.

The main difference between an audit trail in a batch system environment and in an online
environment is that in a batch environment the trail is relatively simple because the use of
grandparent-parent-child files allows current data to be easily created, hence, creating the audit trail.
In an online environment, with use of disks as the file medium and occasional “dumps” of the files for
backup, the audit trail becomes more complex and it is more difficult to recover from system crashes
and other errors. This means that the audit trail is more difficult to recreate.

Other major tasks that e-commerce software should handle:


1. Product configuration: This software helps buyers design and build the product that they want.
2. Shopping cart: This software enables shoppers to add items to buy, change them, and build their
total order. The software also handles order completion and payment information.
3. E-commerce transaction processing: This software handles the transaction processes between
trading partners. It calculates all costs and handles the logistics of shipping.
4. Web traffic data analysis: This software analyzes all the data in a web log so that management can
assess the effectiveness of its e-commerce applications.

The purpose of the TCP/IP protocol is to verify the correct delivery of data from sender to
receiver and to move packets of data from node to node in the network.
(1) ii) A router is a device or software in a network that determines the next network point to which a
data packet should be sent.
Four possible data collection techniques used during the analysis of an existing system:
1. Interviews: This is where the analyst asks users about the existing system. Interviews are used when
detailed information is needed by relatively few people in one or two locations.
2. Questionnaires: This is when the analyst develops and sends out a questionnaire (either web-based or
hardcopy) to users of the existing system. Questionnaires are used when a relatively large number of
users need to be questioned and these users are in a variety of locations.
3. Direct observation: This is when the analyst directly views the existing system in actual operation.
Direct observation is used when details about users’ actual work procedures and data flows are
needed.
4. Statistical sampling: This is where a random sample of data is collected regarding processes and
analyzed. Statistical sampling is used when it is too time consuming to analyze a large number of
pieces of data.

Data is stored on the surface of a magnetic hard disk. A magnetic hard disk contains several platters of
disk surface. The recording surface of each platter is organized into tracks. The platters are stacked on
top of each other. Each track on each platter is lined up with the other one above and below, forming a
cylinder of tracks.

1. Sequential file organization: Each record is stored in a predetermined sequence, such as


alphabetically or numerically. Data must be sorted into the desired sequence prior to being stored.
Magnetic tape and magnetic disk can be used for sequential file organization.
2. Direct access file organization: This allows the user to read and write any records without a
predetermined order. The operating system assigns a random address to the key field of each
record so that each record can be located. Diskettes and hard disks are used to support direct
access field organization. Magnetic tape is not used.
3. Indexed sequential file access organization: This stores the data in a predetermined sequence but
employs an index file to provide faster access to the data. Only diskettes and hard disks can be
used for indexed sequential organization and not magnetic tape.

You might also like