Pastpaper2006-Bn1160 I.T for Business

Published on February 2018 | Categories: Documents | Downloads: 20 | Comments: 0 | Views: 397
of 8
Download PDF   Embed   Report

Comments

Content

2006 FIRST YEAR EXAMINATION PAPER BN1160 INFORMATION TECHNOLOGY FOR BUSINESS

ASTON UNIVERSITY

BSc with Honours in Accounting for Management BSc with Honours in Business and Management BSc with Honours in Business Computing and IT BSc with Honours in Economics and Management BSc with Honours in Human Resource Management BSc with Honours in International Business and Management BSc with Honours in International Business and Economics BSc International Business and Modern Languages BSc with Honours in Marketing BSc with Honours in Managerial and Administrative Studies BSc Combined Honours Business Administration

2006 FIRST YEAR EXAMINATION

BN1160 INFORMATION TECHNOLOGY FOR BUSINESS Friday 12th May 2006

14.00hrs

2 HOURS

CLOSED BOOK There are three sections to this paper:Section A (20 marks) Answer ALL multiple choice questions on the separate answer sheet provided. Please ensure that you enter your CANDIDATE number at the top of the sheet. Section B (30 marks) Answer ALL questions in this section Section C (50 marks) Answer TWO questions from a choice of three. Each question is equally weighted.

Page 1 of 8

2006 FIRST YEAR EXAMINATION PAPER BN1160 INFORMATION TECHNOLOGY FOR BUSINESS SECTION A - Multiple Choice Attempt all questions on the separate answer sheet provided. Each Question carries 1 mark (Each question has only one correct answer, a,b,c,d or e) 1. System design includes: a. b. c. d. e.

input design output design database design module design none of the above

2. With regard to methods of controlling computer-based information system, firewalls, passwords and user validation routines are examples of... a. Physical Protection b. Biometric Controls c. Telecommunications Controls d. Failure Controls e. Auditing 3. A uniform resource locator refers to the a. b. c. d. e.

template for designing Web pages unique address for a Web page pointer from one page to the next consecutive page library of active Web sites across the world home page for a Web site

4. Which category of computer-based information system might be used by senior management to select, retrieve and manage information that can be used to support the achievement of an organisation's business objectives? a. b. c. d. e.

a transaction processing system a decision support system an expert system an information reporting system an executive information system

5. To communicate with each other, two machines must follow the same a. b. c. d. e.

protocol bit map instruction set model rule set

Page 2 of 8

2006 FIRST YEAR EXAMINATION PAPER BN1160 INFORMATION TECHNOLOGY FOR BUSINESS 6. Which of the following travels independently over computer networks, seeking out uninfected workstations to occupy? a. b. c. d. e.

worm logic bomb Trojan horse Virus Macro virus

7. The low-cost, low maintenance machines that allow workers to access critical network information without the overhead of a PC or workstation are called a. b. c. d. e.

enterprise computing networks thin clients distributed computing information systems

8. The systems analysis process is primarily about a. b. c. d. e.

Determining how the new system is to be implemented Determining what the new system is to do Deciding whether the system as envisaged is feasible Identifying which package to buy Discovering the best way of implementing the new system

9. Which of the following is a type of management information system? a. b. c. d. e.

Executive information systems Office automation systems Process control systems Functional area information systems All of the above

10. The feasibility study is created during which stage of the systems development cycle? a. b. c. d. e.

systems analysis systems design initiation systems implementation systems maintenance

11. In data flow diagrams a circle represents a. b. c. d. e.

External source Data flow Process Data store Manual operation

Page 3 of 8

2006 FIRST YEAR EXAMINATION PAPER BN1160 INFORMATION TECHNOLOGY FOR BUSINESS 12. This command is used to move text from one document to another. a. b. c. d. e.

replace edit format search and replace cut-and-paste

13. The term that defines the size and style of the typeface is the _____ a. b. c. d. e.

points font character embellishment size

14. Discovering and extracting hidden predictive information from large databases is called ______. a. b. c. d. e.

searching finding data retrieving data mining data discovery

15. Private intra-organisational networks based on Internet technology are referred to as a. networks b. LANs c. WANs d. Intranets e. Extranets 16. Software programs designed to allow several networked users to work on the same document at the same time are a. b. c. d. e.

electronic mail groupware video conferencing bulletin boards shareware

17. Which of the following statements is TRUE a. The WWW is the internet b. The WWW existed before the Internet c. Important Internet applications existed long before the World Wide Web was invented d. Important Web applications existed long before the Internet was invented e. None of the above is true

Page 4 of 8

2006 FIRST YEAR EXAMINATION PAPER BN1160 INFORMATION TECHNOLOGY FOR BUSINESS 18. A secret numerical code that is applied so a message can be transmitted or stored as an indecipherable garble of characters is a(n) a. b. c. d. e.

electronic combination digitised key encryption key encoded key password

19. A cookie is a. b. c. d. e.

a piece of information about a web session an image in an HTML document another name for a web page a plug-in added to a browser a program for remote access to email

20. The illegal duplication of software is software _______ a. b. c. d. e.

piracy plagiarism patent infringement hacking copying

Page 5 of 8

2006 FIRST YEAR EXAMINATION PAPER BN1160 INFORMATION TECHNOLOGY FOR BUSINESS SECTION B Answer all parts of the following question. The question carries 30 marks Inspect the following spreadsheet and answer questions a to h.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22

A B C £million sold to customers Quarter 1 Quarter 2 Advent 4000 3900 Break 4500 45000 Cascade 4300 3500 Dedicate 4033 3500 Effort 4300 430 Faraway 4500 3400 Total 25633 59730 Salesman for Advert (£million) Quarter 1 Quarter 2 Adam 1000 1200 Bert 1000 790 Cary 1000 810 Dan 1000 1100 Total 4000 3900

D

E

F

Quarter 3 4900 4990 4000 3900 4400 3800 25990

Quarter 4 3400 4500 4100 3890 4350 3500 23740

Total 16200 58990 15900 15323 13480 15200 135093

Quarter 3 900 1200 1000 1800 4900

Quarter 4 1200 800 700 700 3400

Total 4300 3790 3510 4600 16200

Lookup Number of customers >£4000 in Quarter 3 Highest sales for Dan in any quarter Number of customers Number of customers

a. Identify, and name the co-ordinates of, three named ranges in this spreadsheet. The ranges you identify should be used for quite different purposes. Explain how, and when, each range might be used in a formula. b. You intend to use the LOOKUP function to identify the sales for Cary in Quarter 1. Write the precise formula that you would enter into A18. Your answer should use the following cell references (lookup value, lookup array). c. You want to count the number of customers who bought more than £4000 in Quarter 3. Write the precise formula which you would type into A19. Also, what will be the answer to this formula? d. What formula would you write into A20 to find the highest sales which Dan has achieved in any of the four Quarters? e. You intend to use the data in column A to find the number of customers you currently have. Once written into A21, you intend to copy this formula down into A22. What formula would you write into A21 to perform this calculation correctly in both A21 and A22 (when copied)?

Page 6 of 8

2006 FIRST YEAR EXAMINATION PAPER BN1160 INFORMATION TECHNOLOGY FOR BUSINESS f. With reference to the above spreadsheet, precisely describe five ways in which you would improve its presentation, and why. g. Discuss how you might use the autofilter function in this spreadsheet. h. Without repeating anything mentioned in the above questions (e.g. autofilter), precisely describe five ways in which you would improve the usability of this spreadsheet for a business person, and why.

Page 7 of 8

2006 FIRST YEAR EXAMINATION PAPER BN1160 INFORMATION TECHNOLOGY FOR BUSINESS SECTION C Answer 2 questions only Each question carries 25 marks

1. Identify and explain the three main methods of application software acquisition. (25 marks)

2. Identify and explain the use of two system analysis diagramming tools. (25 marks)

3. What are the main threats to the security of an information system and what threats are particularly related to internet services? (25 marks)

END OF PAPER

Page 8 of 8

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close