Anda di halaman 1dari 8

,'

~
TEST CODE

FORM TP 2014212
CARIBBEAN

02229010

MAY/JUNE 2014

EXAMINATIONS

COUNCIL

CARIBBEAN ADVANCED PROFICIENCY EXAMINATION


INFORMATION TECHNOLOGY- UNIT 2
Paper 01

1 hour 30 minutes

(13 JUNE 2014 (a.m.))


READ THE FOLLOWING INSTRUCTIONS CAREFULLY.
1.

This test consists of 45 items. You will have 1 hour and 30 minutes to answer them.

2.

In addition to this test booklet, you should have an answer sheet.

3.

Do not be concerned that the answer sheet provides spaces for more answers than there are
items in this test.

4.

Each item in this test has four suggested answers lettered (A), (B), (C), (D). Read each item
you are about to answer and decide which choice is best.

5.

On your answer sheet, find the number which corresponds to your item and shade the space
having the same Jetter as the answer you have chosen. Look at the sample item below.
Sample Item
Which of the following pairs represents general-purpose software tools?
Sample Answer
(A)
Word processor and accounting software
(B)
Spreadsheet and database software
(C)
Insurance processing and spreadsheet software
(D)
Student record system and database software

The best answer to this item is "spreadsheet and database software", so answer space (B)
has been shaded.

----------

--

6.

If you want to change your answer, be sure to erase it completely before you fill in your
new choice.

7.

When you are told to begin, turn the page and work as quickly and as carefully as you can.
If you cannot answer an item, omit it and go on to the next one. You may return to the
omitted item later. Your score will be the total number of correct answers.

8.

You may do any rough work in this booklet.

9.

You may use sih;nt, non-programmable calculators to answer questions.

DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO DO SO.


Copyright 2012 Caribbean Examinations Council
A 11

riohtc: rPc:Pn.rPrl

-2-

A foreign key is an attribute

1.

that uniquely identifies each row in


a table
in one table whose values must
either match the primary key in
another table or be null
used strictly for data retrieval
purposes
with a storage key in a table

(A)

(B)
(C)
(D)

Which of the following is NOT a database

5.

model?

(B)
(C)
(D)

The duplication of data in a database is


referred to as data

6.

(A)

Normal forms do NOT affect databases in

2.

Archival
Networked
Hierarchial
Object-oriented

(A)

(B)
(C)

terms of

(D)

(A)

(B)
(C)
(D)

integrity
security
consistency
performance

7.

integration
redundancy
inconsistency
documentation

A software application that regulates and


controls access to data stored in a shared
integrated computer structure is a

..

Data mining is the

3.

(A)

(B)

(C)
(D)

process of finding results using


queries
process of defining how a database
should organize data
term used to refer to automating
manual transaction processing
systems
process used with data warehouses
to find patterns and relationships
among data

(A)

(B)
(C)
(D)

8.

Which of the following features is NOT


required when choosing a storage device?
(A)
(B)

(C)
(D)

4.

data access system


information access system
database management system
information management system

Access method
Access speed
Volumes to be stored
Volumes to be processed

Which of the following is NOT a method


used to organize files?
(A)

(B)
(C)
(D)

Serial
Random
Direct Sequential
Indexed Sequential

GO ON TO THE NEXT PAGE


O'>'>'> QO 1 o/r

APF 2014

- 3Item 9 refers to the following table.

Name
A. West
0. North

Country
Trinidad and Tobago
Jamaica

Year

Amount Owed

2010
2012

23 000
48 000

2011
2011
2010
2011

I9 000
6 000
25 000
7 000

E. Santa
Q. Easy
J. Sprat
G. Locks

Guyana

B. Brown

Trinidad and Tobago

201I

20 000

E. Love

Barbados

2011

26 000

Barbados
Guyana
Trinidad and Tobago

- - ---

Query: Type Trinidad and Tobago under COUNTRY column, 20II under YEAR column and
> = 20 000 under AMOUNT OWED column.

9.

(A)

10.

(B)

0
1

(C)
(D)

STUDENT (StudentiD, Firstname,


Surname)
COURSE (CourseiD, CourseTitle,
Lecturer! D)
REGISTRATION (StudentiD, CourseiD,
Mark)
LECTURER (LectureriD, Lecturer)

When a fun<.~tion exists, the attribute on the


left hand side of the functional dependency
( ->) is called the
(A)
(B)
(C)
(D)

relation
identifier
dependence
determinant

,,

Item 11 refers to the information below.

Using the query and data in the table above,


how many records will be extracted when
the query is executed?

11.

The registration entity is the result of a


relationship between the STUDENT and
COURSE entities. For any ONE student,
this relationship is MOST likely to be

(A)

12.

I~M

(B)

I~

(C)
(D)

M~M
M~I

Which ofthe following fields would MOST


likely be validated by a range check?
(A)
(B)
(C)
(D)

Student ID
Student Age
Student Name
Student Address
GO ON TO THE NEXT PAGE

022290IO/CAPE 20I4

-413.

Radio buttons, check boxes, drop-down lists


and combo boxes are useful objects that
are included on web pages and other user
interfaces. These objects help minimize
data entry errors and aid in data
(A)
(B)
(C)

(D)

18.

(A)
(B)

validation
verification
encryption
security

(C)

(D)

19.

14.

Which of the following storage devices is


capable of holding the LARGEST amount
of data, allows a user to write on the disk
once and read (play) it many times?
(A)
(B)
(C)

(D)

CD-ROM
CD-RW
DVD+R
DVD-RW

A 'data mart' is BEST described as a subset


of the
(A)
(B)
(C)
(D)

16.

(C)

(D)

Spreadsheet
Word processing
Database management
Desktop publishing

While researching for a Social Studies


project using the Internet, Jim encounters
a website he wishes to store for future
reference. The MOST efficient way of
doing this is to
(A)
(B)
(C)
(D)

save it on his flash drive


write it on a piece of paper
add itto 'Favorites' or 'Bookmarks'
copy the URL into a Word document

Which of the following tools is MOST


appropriate for implementing an application
form?
(A)
(B)
(C)
(D)

17.

database
data miner
data warehouse
data processing unit

formula
function
process
parameter

Which ofthe following software packages is


used to store vast amounts of data, provide
multiple views ofthe same data and produce
multiple reports?
(A)
(B)

20.
15.

The term used to describe a predefined


operation that performs a calculation or
generates a value such as today's date is a

Statistical
Presentation
Database management
Word processing

Persons can have online, real time


conversations using
(A)

(B)
(C)
(D)

IRC
email
maillist'
bulletin board
GO ON TO THE NEXT PAGE

tVV''I'"'0010 / r'ADJ:.'

"()l.d.

- 5Items 21-22 refer to the following diagram.

24.

~ile

112!

Edit

Vie~

1-lclxl

Paul is interested in designing a web page


to advertise his small business. He decides
to design the web page himself but he is
not familiar with HTML. Which of the
following can Paul use to assist in the design
of his web page?
(A)
(B)
(C)
(D)

25.

X
21.

The control identified by X in the diagram,


where user messages are displayed, is the
(A)
(B)

(C)
(D)

When entering data in a database


management system (DBMS), a check that
detects if any data are in error or incomplete
is referred to as
(A)
(B)
(C)
(D)

status bar
tool bar
window title
scroll bar

Telnet services
Internet portals
Message boards
Authoring tools

validation
integrity
verification
authentication

Item 26 refers to the following scenario.

22.

The control identified by Yin the diagram


is called the
(A)
(B)
(C)
(D)

23.

menu bar
task bar
sizing bar
title bar

The correct syntax for adding the colour


orange to the background of an HTML
document is
(A)
(B)
(C)
(D)

A Form 3 student was explaining to


his teacher that in order to obtain the
information for his homework he went to
a site from which he could access many
different services. The site was so complete,
he reported, that he did tiot have to look
anywhere else. All he had to do was click
on the buttons and words and they took him
to almost anything he needed.

<body bgcolor = "orange">


<background body= "orange">
< b a c kg round> or an g e <I
background>
<body style = "backgroundcolor:orange">

26.

The mechanism that was activated when he


clicked on some words or buttons is MOST
likely a
(A)
(B)
(C)
(D)

menu
portal
web icon
hyperlink

GO ON TO THE NEXT PAGE


02229010/CAPE 2014

-6-

27.

Mark gathered information from several


websites for his assignment on "Sugar
Production in the Caribbean". The criteria
that Mark should use to ensure that the
information used is accurate, complete
and reliable, are authority, organization or
publishing body and
(A)
(B)

(C)
(D)

31.

(A)
(B)
(C)
(D)

currency, design, coverage


currency, audience, design
currency, audience, objectivity
currency, coverage, objectivity

32.
28.

Database management systemsallow users


to organize and store data as well as query
and retrieve tables in a database. Which
of the following are MOST appropriate
for making queries?
I.
II.
III.
IV.

Structured query language


Data definition language
Hyper text mark up language
Query by example

(A)
(B)

I and II only
I and IV only
II and III only
I, III and IV only

(C)
(D)

29.

Sabotage is one of the possible rebellious


acts of disgruntled employees. Which of
the following is an act of sabotage?

Blue Ribbons Inc. is an Internet-based


company that sells its goods and services
directly to its customers. They are engaging
m

(A)
(B)
(C)
(D)

33.

Which of ~he following codes creates a


horizontal line across a page in an HTML
document?

(C)
(D)

30.

<HGAD>
<HR>
<TITLE>
<HL>

(A)
(B)

Some students have created a web page that


can be modified by anyone who accesses
it. This web page can be referred to as a
(A)
(B)

(C)
(D)

blog
portal
wiki

news group

(D)

34.

e-billing
e-business
e-shopping
e-commerce

Mr Taitt had his computer system plugged


into a device that offered protection to his'
PC. While working at home on the machine
one day, he did not realize that there was an
electrical outage until he attempted to turn
on the television. Which of the following
devices did Mr Taitt MOST likely have his
computer system plugged in to?

(C)
(A)
(B)

Breaking into a system for fun


Accessing the net during lunch time
Accessing private data for financial
gain
Destroying computer hardware or
software

UPS
Surge protector
Voltage regulator
Power strip

A businesswoman received an email from


her bank requesting that she email her
personal data to them since her file could
not be located. She should be very careful
since this could be a classic case of
(A)
(B)

(C)
(D)

piracy
viruses
phishing
hacking
GO ON TO THE NEXT PAGE

022290 10/CAPE 2014

-735.
..

'

Miracle Bank & Trust is preparing to


upgrade its mitigation strategies to counter
security issues that have been identified
recently. Which of the following is NOT
an example of a security measure?
(A)
(B)

(C)
(D)

39.

(A)
(B)

(C)

Firewalls
Encryption
Data logging
Biometric access

(D)

40.
36.

Which of the following health risks is


NOT generally associated with the use of
computers?

Kim is a fashion designer who routinely


makes purchases online. Which of the
following functions is NOT possible with
online purchasing?

Which of the following terms refers to


environmentally sustainable computing?
(A)
(B)

(C)
(D)

(A)
(B)

(C)
(D)

Ability to shop despite time


constraints
~bility to determine the quality of
products
Ability to make purchases without
leaving home
Ability to access products that are
unavailable locally

41.

(A)
(B)
(D)

Which of the following measures are used


to prevent unauthorized personnel from
PHYSICALLY entering sensitive areas?
42.

(A)
(B)

(C)
(D)

Grills, locks and keys, audit logs


Passwords, usernames, firewalls
Security guards, grills, usernames
Biometric devices, locks and keys,
swipe cards

Your organization wants to transmit


information over the Internet. Which of
the following methods is MOST suitable
for securing the data that is sent?

(A)
(B)

(C)

(A)
(B)

(C)
(D)

Password
Biometric media
Authentication

Encryption

43.

Patent
Trademark
Copyright
Intellectual property

Which of the following is NOT a threat


posed by the Internet?

(D)
38.

Cloud
Green
Therapy
Ergonomic

Which of the following would be used by a


company to identify a product that has been
officially registered and might be used only
by the owner or the manufacturer?

(C)
37.

Eye strain
Backache
Elbow sprain
Carpal tunnel syndrome

Hacking
Cyber terrorism
Damage to hardware
Exposure to viruses

A security feature that automatically records


operations performed by all users is called
(A)
(B)

(C)
(D)

a transaction
a roll back
an audit trail
a firewall

GO ON TO THE NEXT PAGE


02229010/CAPE 2014

,'

- 8-

44.

Which of the following is NOT an ethical


consideration related to the handling of
enterprise assets?
(A)
(B)
(C)
(D)

45.

Which of the following software can be


shared with other users for the modification
of source code?
(A)
(B)

Filing a lawsuit
Invasion of privacy
False representation
Misuse of information

(C)

(D)

Trial
Freeware
Shareware
Open source

ENDOFTEST

IF YOU FINISH BEFORE TIME IS CALLED, CHECK YOUR WORK ON THIS TEST.

0222901 0/CAPE 2014