0% found this document useful (0 votes)
14 views

Question Paper - November 2010

VB.Net

Uploaded by

inkingayomuntu
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
14 views

Question Paper - November 2010

VB.Net

Uploaded by

inkingayomuntu
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 14
higher education & training Department: Higher Education and Training REPUBLIC OF SOUTH AFRICA NATIONAL CERTIFICATE (VOCATIONAL) INTRODUCTION TO INFORMATION SYSTEMS NQF LEVEL 2 NOVEMBER 2010 (10041002) 22 November (X-Paper) 09:00 - 12:00 This question paper consists of 12 pages. Copyright reserved Please turn over (10041002) 2 NC1220(E\(N22)V TIME: 3 HOURS MARKS: 200 INSTRUCTIONS AND INFORMATION 17 Answer ALL the questions. 2. Read ALL the questions carefully. 3. Number the answers according to the numbering system used in this question paper. 4. Write neatly and legibly Copyright reserved Please turn over (10041002) SECTION A QUESTION 1 141 es NC1220(E)(N22)V Various options are provided as possible answers to the following questions. Choose the correct answer and write only the letter (A — D) next to the question number (1.1.1 — 1.1.10) in your ANSWER BOOK. 1.4.4 An organisation is a group of people working together in a ... way to achieve a common goal. networked democratic ‘structured disorganised vom> ... are integrated systems which help managers to make informed decisions within an organisation. A. Information systems B Subsystems C Business systems D_ Communication systems The likelihood of a threat appearing when it is expected, is regarded as a ... expectation. shock. function. tisk. vow> +. would be minimised if profit margins were reduced so prices on original goods could be dropped. A. Copyright B Piracy C Sabotage D_ Disruptions Electromechanical devices combine electrical and mechanical parts. These devices include (an) ... RO eke (10041002) 1.1.6 1.1.10 Copyright reserved “A NC1220(E)\(N22)V Input hardware refers to devices which ... A receive a radio signal. B enter information into a computer. C are used for virus detection. D_ compute values. Hardware which does not require keystrokes to enter information on a computer, is referred to as ... hardware. A. straight-entry B direct-entry C keyless-entry D_ automatic-entry A peripheral that can copy, fax, scan and print is called a ... A photocopier. B_ image scanner. C_ multifunction printer. D daisy wheel printer. A computer screen consists of tiny dots which together make up the screen's ... A resolution. B_ width. C length. D_ model. Data on a computer can be stored and organised by saving it to ae. folder. address. file. location. vow (10) Please turn over (10041002) 1.2 NC1220(6)(N22)V Choose an item from COLUMN B to match the description in COLUMN A. Write only the letter (A — J) next to the question number (1.2.1 — 1.2.10) in your ANSWER BOOK. processing unit that will be lost COLUMN A COLUMN B 1.2.1 Anemployer who has full control | A spread of a virus and does not give employees a chance to contribute B special purpose super- computer 1.2.2 Communication from staff will ensure that management is C primary storage aware of day-to-day problems D CTRL + right arrow key 1.2.3 Acomputer program which can load itself to a computer without | E information system design the owner's knowledge factors 1.2.4 Sharing files and folders ona | F multifunction printer network can lead to contamination of uninfected files | G autocratic leadership 1.2.5 High-performance computing | H mainframe devices aimed at dealing with a | specific problem 1 impact printer 1.2.6 Alarge system that canhandle | J virus numerous users and process transactions at a very high rate | 1.2.7 Move the cursor one word to the right 1.2.8 Aprinter which uses a type of | hammering to produce a hard | copy 1.2.9 Ifone component breaks, the entire machine has to be sent in for repairs 1.2.10 Memory available to the central (10041002) & NC1220(E)(N22)V 1.3 1.4 Copyright reserved Give ONE word/term for each of the following descriptions by choosing a word/term from the list below. Write only the word/term next to the question number (1.3.1 — 1.3.10) in the ANSWER BOOK. byte; dumb; scanner; data; hardcopy; Nortan; strategic; Celeron; mainframe; decentralised 1.34 Data is stored in the secondary storage as a file. The file size can be measure in units called 1.3.2 Raw facts or figures are called 1.33... can be defined as shared or distributed information systems. 1.3.4... is information printed on paper. 1.3.5 The INTEL ... processor has a smaller cache memory and slower bus speed. 1.3.6 Top management is responsible for making ... decisions. 1.3.7 A... terminal cannot do its own processing. 1.3.8 _... computers can handle large numbers of users at once. 1.3.9 A... is an example of a hand-held direct-input device. 1.3.10 antivirus protection can be downloaded as a trial version or can e purchased to access all features. Indicate whether the following statements are TRUE or FALSE. Write only ‘true’ or ‘false’ next to the question number (1.4.1 — 1.4.10) in your ANSWER BOOK. 1.4.4 Management is responsible for directing staff. 1.4.2 Without people there would be no use for an information system. 1.4.3 Adefragmentor can be used to disinfect viruses from files. 1.44 Computer processing saves time as corrections can be done on the screen before printing, 1.4.5 Astored program contains a sequence of instructions and data. (10) Please tum over (10041002) 15 14.6 1.4.7 1.4.8 1.4.9 1.4.10 7 NC1220(E)(N22)V Computer programs have spelling and grammar checks to ensure that data entry is accurate. The numeric keypad can be accessed by pressing the ‘Scroll lock’ button. Output devices such as headphones are used to extract information from a computer. Portable media such as external hard drives have high resistance to heat and are therefore very versatile. Backups are vital as they are a source of retrieved critical data, should something happen to the original. Choose the correct word(s) from those given in brackets. Write only the word(s) next to the question number (1.5.1 — 1.5.10) in your ANSWER BOOK. 1.5.1 1.5.2 15.3 1.5.4 1.5.5 1.5.6 15.7 15.8 15.9 1.5.10 The (manager/coordinator) should participate in deciding how the company does things. (Information/Knowledge) is derived from collected data. Managers rely on information produced by computers to make (responsible/adventurous) decisions. Software (borrowing/piracy) is when copyrighted software is duplicated illegally. ‘A computer's (inputs/outputs) are sent to the central processing unit for processing. ‘AJAn (optical/3D) scanner is used to analyse real world objects. A (cathode-ray tubelliquid crystal display) uses a vacuum tube which consists of one or more electrons. AJAn (speaker/amplifier) is regarded as an audio output device. Hard disks have a (larger/smaller) storage capacity than a 3% inch floppy. A file can be reduced in size through a technique called data \ ae (10) any (10041002) & NC1220(E)(N22)V SECTION B QUESTION 2 2.1 Define the term organisation. 2) 22 Identify the THREE levels of management within an organisation (A - C) in the diagram below. ©) LEVELS OF MANAGEMENT 23 Describe the type of decisions that would be made at B. (1) 24 Atwhich level would day-to-day operational decisions be made? (1) 25 Name the steps that a manager would take to solve a problem within an organisation. ©) 115) QUESTION 3 3.1 Explain the difference between data, information and knowledge. @) 3.2 Explain the term information system. 2) 3.3. _List and explain FIVE basic elements of an information system. « 9) Copyright reserved Please tun over (10041002) 2 NC1220(E)(N22)V QUESTION 4 4.1 You work at the VFS Visa Centre. You do biometric (biological data) scans of people applying for foreign visas. The information from each scan is unique to the individual it is taken from. No two people can have the same information. This information is required to prevent a person's identity from being stolen and to ensure that his/her application is authenticated. All the information that you capture is stored on a central database server. Other departments share this information via remote access through a communication network. 4.1.1 State THREE benefits of a centralised information system. 3) 4.1.2 State TWO advantages of a decentralised information system. @ 4.4.3 Which type of scan would you use to obtain biometric information? (2) 414 State the benefits of the type of scan in QUESTION 4.1.3. (1 x 2) (2) 4.1.5 State the advantages of storing information on a computer compared to writing it down on paper. (2x2) (4) 4.2 Differentiate between a Trojan Horse and a dialler program. (4) 4.3. Identity THREE ways in which viruses could be spread, (3) 4.4 Describe ONE method in which a file may be disinfected. (2) 45 Why should antivirus software be up to date? (2) 46 Explain how modern-day smartphones play a role in today's economy. (1 x 2) (2) 4.7 Explain what you understand by the term software piracy. 2) 4.8 Recommend ONE way to combat software piracy. (2) [30] (10041002) -10- NC1220(E\(N22)V QUESTION 5 Study the diagram below and answer the questions that follow. Stored data and programs ‘Secondary storage vt Sendsdatetothe |g Central processing unit > hates processed central processing unit information available Input | A B Output Memory Processing 5.1 The central processing unit consists of two major parts. ‘A’ is regarded as the brain of the computer and 'B' performs calculations. 5.1.1 Identify part A. 2) 5.1.2 Identify part B. (2) 5.2 Summarise the function of part A. (3) 5.3. Summarise the function of part B. @) 5.4 _ Define the role of Random Access Memory. 8) 5.5 Identify THREE categories of peripheral devices. x2) 6) 5.6 Give ONE example of each of the THREE categories in QUESTION 5.5. 3) [22] Copyright reserved Please turn over (10041002) aM NC1220(E)(N22)V QUESTION 6 6.1 Define the term input hardware. 6.2 List any THREE types of input devices. 6.3 _ Differentiate between keyboard-entry and direct-entry hardware. (2x2) 6.4 Explain the function of the F1 key on the keyboard. 65 List any FIVE types of scanners. 6.6 List any THREE types of sensors. 6.7 Explain why input control is necessary. x1) 68 Name TWO types of input control. QUESTION 7 7.1 Identify TWO categories of output devices and give ONE example of each. 7.2 Identify TWO types of printer classifications. 7.3 State TWO benefits of a dot matrix printer. 7.4 Give reasons why you would recommend the use of a multifunction printer in a small to medium-sized business, instead of individual devices. (4x1) 7.5 Plotters can be used to produce high quality and accurate drawings on a large scale or to cut material on a large scale. 7.5.1 Explain the purpose of a pen plotter. 7.5.2 Explain the purpose of a cutter plotter. 7.5.3 Explain the purpose of a drawing plotter. 7.5.4 State TWO advantages of using plotters in a business. 7.5.5 State TWO disadvantages of using plotters in a business. (2) (3) (4) (1) (5) (3) (3) (2) [23] (4) (2) (2) (2) (2) (2) (2) (2) (10041002) 12 NC1220(E\N22)V QUESTION & Study the diagrams below and answer the questions that follow. 8.1 8.2 83 84 85 86 87 88 89 8.10 USB Memory Stick Compact Disk External Hard Drive Random Access Memory @ es ad Differentiate between primary storage and secondary storage. Identify the largest unit of measurement for a hard drive's storage capacity. List THREE precautions to be taken when using portable storage media such as a USB Memory Stick. Name TWO uses for optical storage disks such as a compact disk (CD) Describe the difference between a Bluray DVD and a standard DVD. Explain what the acronym RAID stands for. Briefly describe the concept of RAID. Explain why a compact disk can hold more 'MP3' files than "WAV files. State TWO practical uses for data compression. Identify THREE advantages of using data compression. TOTAL SECTION B: GRAND TOTAL: Copyright reserved (4) (1) (3) (2) (2) (1) (3) (2) (2) (3) [23] 150 200

You might also like