Login or Create an Account to view question mark schemes, comment, and download a PDF of this test
Question 1[1 Mark]
Consider the following incomplete data dictionary for the design of a security system’s software solution.
Question Image
The data types for ‘door_closed’ and ‘accessed’ are respectively
(a).
Boolean and integer.
(b).
character and integer.
(c).
Boolean and floating point.
(d).
character and floating point.
Question 2[1 Mark]
Which one of the following statements best describes a characteristic of the associative array data structure?
(a).
Associative arrays have integer indexes.
(b).
Elements stored in associative arrays are ordered.
(c).
Elements of associative arrays are composed of key value pairs.
(d).
Associative arrays are used when several different data types need to be stored together as a field.
Question 3[1 Mark]
A functional requirement for a software solution that collects the contact details of customers who dine at a restaurant could be
(a).
saving customer data to a file.
(b).
that the solution can be used on multiple devices.
(c).
that the solution can fail to take an order no more than once a month.
(d).
that the restaurant’s customers should be able to easily enter their details into the solution.
Question 4[1 Mark]
Which one of the following would be considered an information system goal?
(a).
to decrease the time taken to create resupply orders by 50%
(b).
to identify three low-selling products to highlight for sales each month
(c).
to improve communication with customers by cutting the time taken to reply to within 24 hours
(d).
to manage accounts with suppliers more efficiently by using a digital warehouse system
Question 5[1 Mark]
The best sequence of tests when validating data is
(a).
type, existence then range.
(b).
range, existence then type.
(c).
range, type then existence.
(d).
existence, type then range.
Question 6[1 Mark]
A characteristic of an efficient software solution includes the
(a).
usability of the solution.
(b).
speed of processing.
(c).
accuracy of a calculation.
(d).
readability of a screen layout.
Question 7[1 Mark]
To assess the effectiveness of a project plan, one should assess the project plan
(a).
against the project’s scope and timeline.
(b).
by applying relevant usability testing strategies.
(c).
by applying relevant software auditing strategies.
(d).
against the evaluation criteria developed in the design stage.
Question 8[1 Mark]
Lenny connects to the internet via a public unsecured wireless network to shop online. He creates a new account at a store and makes a purchase with a new credit card that has never been used. Later that day, he discovers unauthorised transactions on his credit card. What has happened to Lenny may be an example of
(a).
a data breach.
(b).
social engineering.
(c).
cross-site scripting.
(d).
a man-in-the-middle attack.

8 Questions8 MarksShared + Premium
1 Use58 Views0 Likes