TOPIC : INTRODUCTION TO INFORMATION SKILLS AND SYSTEMS
Circle the most appropriate answer in the following multiple choice questions.


1) Authors spend considerable time and effort creating their work. The set of laws which govern the rights of authors as far as protecting their ownership of material they produce is called
A. Common laws
B. Data protection
C.

Copy protection
D. Copyright lawsD
2) Information systems contain a number of processes. One of these is "Collecting", which of the following best describes the processes involved in Collecting.
A. Defines the required data, identifies the source for the data, saves data for later use, gathers the data
B.

Defines the required data, identifies the source for the data, determines how the data will be gathered, gathers the data
C. Defines the required data, determines the format in which the data will be represented, determines how the data will be gathered, gathers the data
D. Defines the required data, identifies the source for the data, determines how the data will be gathered, manipulates the data B
3) Information systems contain a number of processes. One of these is "Processing", which of the following best describes the process involved in Processing?
A.

Interprets the data, transforming it into information
B. Decides the form in which the information will be displayed
C. Manipulates data and information
D. Determines the format in which data will be represented in the informationC
4) Information systems contain a number of processes. One of these is "Organising", which of the following best describes the process involved in Organising?
A.

Decides the form in which the information will be displayed
B. Determines the format in which data will be represented in the information
C. Interprets the data, transforming it into information
D. Manipulates data and informationB
5) The largest and most powerful computers are known as
A. Mini computers
B.

Personal computers
C. Super computers
D. Main framesC
6) Using 8 bits and two's component arithmetic, 103 (base 10) would be represented as ;
A. 01100111
B. 10011000
C.

11100111
D. 10011001D
7) System software is
A. Only used to boot the machine
B. Necessary to run the machine
C. Only required by mainframe computers
D. Loaded into ROM when the system is bootedB
8) How many binary digits are generally required to represent a 2 digit hexadecimal number?
A.

8
B. 16
C. 12
D. 4A
9) A computer uses 8 bits and two's complement arithmetic to perform 89 (base 10) - 63 (base 10). The two binary numbers to be added together are:
A. 00111111 (base 2) and 10100111 (base 2)
B.

01011001 (base 2) and 11000001 (base 2)
C. 01011001 (base 2) and 00111111 (base 2)
D. 00111111 (base 2) and 10100110 (base 2)B
10) Often the society we live today is known as "The Information Age". This is most likely because
A. Information technology is what controls the economics of nations. The power of nations is now linked to its information technology resources rather than the nation's natural resources.


B. Information is the raw material for silicon based technology. The term "Information Age" really refers to our ability to use computers that based on silicon chips.
C. The amount of available information is growing exponentially.

Our ability to access this information has become a major commodity
D. Computers have become so powerful that they are beginning to take over from human thought processes.C
11) Information systems contain a number of processes. One of these is "Transmitting and Receiving", which of the following best describes the process involved in Transmitting and Receiving?
A. Determines the format in which data will be represented in the information system
B.

Interprets the data, transforming it into information
C. Manipulates data and information
D. Sends and gets data and information, within and beyond the information systems.D
12) One major problem for software developers is that software can quite easily be copied and the copy will be identical to the original.

This illegal copying is know as
A. Bunking
B. Imaging
C. Software piracy
D. HackingC
13) The binary number 100111 is equivalent to which of the following decimal number
A.

39
B. 32
C. 4
D. 71A

14) Application software is
A.

Computer hardware necessary to carry out a task
B. Programs designed to carry out a particular task
C. A reply to a job advertisement
D. Programs controlling the operation of the computerB
15) Which of the following lists correctly contains the seven information processes contained within an information system
A. Collecting, organising, analysing, processing, transmitting/ receiving, displaying
B. Collecting, organising, analysing, storing/retrieving, processing, transmitting/ receiving, displaying
C.

Collecting, organising, analysing, storing, retrieving, transmitting/receiving, displaying
D. Collecting, organising, analysing, storing, retrieving, processing, receiving, displaying B
16) Many cases of computer crime go unreported. This is most likely because
A. Companies do not want it known that their system is fallible
B.

Usually the effects are too trivial to warrant prosecution
C. It is virtually impossible to stop this type of crime
D. The crime itself was not noticed b the company A
17) It is relatively easy to publish information on the internet. This means that a large amount of information is available, however the downside is that he accuracy of information on the internet is often too difficult to assess.

The best method of assessing the accuracy of information on the internet is to
A. Assume the information in inaccurate unless you personally have experience with the content
B. Download the information and have a knowledgeable person check it
C. Compare a number of different sources
D. Make sure the data is stored on a reliable computer.C
18) Device that scan finger prints or signatures or a person's eyes are known as
A.

Identity check devices
B. Security devices
C. Scanners
D. Biometric devicesD
19) A new computer based information system is introduced into a local hardware store. This new system accurately tracks stock levels for each item sold.

As a result the shop assistants now have no need to manually count the number of each item remaining on the shelves. The social issue involved in this case is one of
A. Appropriate use of technology
B. Changing nature of work
C.

Job redundancy
D. Advances in technologyB
20) Your school sends around a sheet to each student that contains all their personal details (eg. Name, address, phone number, etc). Students are asked to check this data and make changes as necessary. This process is known as
A. Data validation
B.

A data security check
C. Data encryption
D. A data integrity checkD
21) The five basic function performed by computer hardware are
A. Addition, comparison, storage, input output
B.

Wordprocessing, Spreadsheets, Databases, Communication, Graphics
C. Hardware, Software, Processing, People, Procedures
D. Input, Output, Processing, Storage, ControlD
22) Which of the following lists contains ONLY different types of data
A. Image, video, audio, text, numbers
B.

Keyboard, mouse, CPU, text, numbers
C. Hardware, software, people, information
D. Baud rate, parity, data bitsA
23) The computer produces
A. Data
B. Input
C.

Process
D. Information D

24) The environment of an information system can be best described as:
A. Anything not contained within the system itself. However the environment can affect the systems operations in various unforseen ways.


B. Everything that influences, and is influenced by the information system and its purpose
C. Anything that is created from naturally occurring circumstances
D. A sub-system that influences the system in unpredictable ways. B
25) The smallest unit of data a compute can store is a
A. Byte
B.

Nibble
C. Character
D. Bit D
26) A computer "hacker" is a person who
A. Causes damage to a computer system by accessing it via a modem
B. Writes viruses that cause damage to computer systems
C. Is addicted to "surfing" the internet
D.

Illegally gains access to a computer systemD
27) The dividing line between a system and its environment is know as
A. A boundary
B. The system's limits
C. An interface
D. A sub-systemC
28) Software that can be freely copied, used and distributed is known as
A. Public domain software
B.

Application software
C. Shareware
D. System softwareA

29) The process of checking data as it is entered into an information system to make sure it is of the correct type and is within reasonable ranges is known as
A. Data verification
B.

Data encryption
C. Data validation
D. Data integrity C
30) A possible description of Information could be
A. The output from an information system
B.

The input to an information system
C. Known facts together with audio, video and/or images
D. The processing that takes place on dataA
31) If "A" is represented by 65 in ASCII, what value is used to represent the character "F"?
A. 70
B. 68
C.

69
D. 71A
32) ATMs or automatic teller machines are commonly used to access bank accounts. The people involved in writing the software operating in an ATM could be best described as which of the following?
A. Technician
B.

User
C. Maintainer
D. Programmer D
33) EBCDIC is a system of representing characters on large IBM systems What does EBCDIC
A. Extended Binary Coded Decimal Interchange Code
B.

Exchanged Binary Coded Decimal Interchange Code
C. Extended Binary Coded Decimal International Code
D. Extended Binary Coded for Decimal Interchange Characters A

34) A computer design to be used by one user is known as a
A. Main frame
B.

Mini computer
C. Super computer
D. Personal computer D
35) Information systems contain a number of processes. One of these is "Analysing", which of the following best describes the process involved in Analysing?
A. Determines the format in which data will be represented in the information system
B.

Manipulates data and information
C. Decides the form in which the information will be displayed
D. Interprets the data, transforming it into informationD
36) Often the same piece of software is installed on a number of different machines at the same location. Rather than purchasing multiple copies of the product a ___________ is purchased.


A. Network
B. File server
C. Copy program
D. Site licenseD
37) Data validation would pick up which of the following errors
A. State entered as Vic instead of NSW
B.

Date of birth entered as 10/4/79 rather than 4/10/79
C. Surname entered as Davis rather than Fendall
D. Date of birth entered as 9/13/78 instead of 13/9/78D
38) The binary number 100111 is equivalent to which of the following decimal number
E. 39
F. 32
G. 4
H.

71A