A business with more than 100 employees tests its disaster recovery strategy by simulating a fi re and power failure. A criterion to evaluate the effectiveness of the strategy to protect the integrity of customer data would be to ask
are all back-up copies of customer records up-to-date and complete?
can the back-up copies of customer data be quickly accessed?
is the customer data restored within 30 minutes of power returning?
are all appropriate software companies contacted within 60 minutes?
When a medical clinic in country Victoria implements its new information system, the managers select and delete all the patient fi les from the hard disks before donating the old computers to the local primary school. In doing this, the managers have
done all that is required under the Health Records Act 2001.
not met their legal obligations under the Health Records Act 2001.
prevented a threat to confidential data by unauthorised users.
followed the correct procedure for the disposal of data under the Information Privacy Act 2000.
The primary purpose of a proxy server is to
connect multiple devices together to act as a single network.
forward data between computer networks.
keep an organisation’s network secure.
accept requests from clients seeking resources from other servers.
New employees use photocopy USER IDENTITIES from 999 to 1999. Test data to display an ‘INVALID USER IDENTITY’ message would be
998 and 2000
1000 and 1998
999 and 1999
999 and 1998
Analysing the needs of an online community involves
determining what results are expected from test data.
monitoring users’ complaints about the existing system
interviewing community members to determine evaluation criteria.
observing the results of sample data used to test the new system
Which one of the following is the best validation technique for the Country field?
The appearance of a website can be enhanced by having
consistent font types.
important information underlined
minimum contrast between font and background colours.
navigation buttons of different sizes.
Which one of the following would be a non-technical constraint on the design of a school’s new website?
It must run on the existing classroom laptops
New and existing fi le formats must be compatible
Students’ examination results and attendance reports must be kept private.
The size of video files used by teachers for online class presentations must be limited.
Sunny Tennis Club is updating its website to attract new members. It is making decisions about what
information will be available for the general public (open) and what will be for members only (closed).
Which diagram represents the best decision for the club?
A solution developer wants to test the effi ciency of using the date convention of mm/dd/yyyy for an online
sales form to be used in a global market. He tracks the results of 100 users who were required to enter the
current date using this convention
how quickly each user enters the date.
the percentage of users who enter complete dates.
the number of users who accurately enter the current date.
the number of error messages received by users to indicate incorrect date order.
A physical device that can help prevent unauthorised access to data and information on a network is
a swipe card.
a thumb print.
an encryption key
A local library wants to update its website so that new users can easily access the online catalogue.
The most suitable form of user documentation would be a
quick start guide
table of contents.
Help Desk email contact
Evaluating a solution involves
determining the evaluation criteria
testing whether the solution does what it was intended to do
reporting on the extent to which the solution meets the requirements of the user
determining what information the solution has to provide and what data is needed to produce it
When Old Time Gardeners decides to re-landscape a suburban parkland, it sets up a website so that local
residents can view each stage of the construction.
This type of online community is best described as
The stage of the problem-solving methodology where the solution requirements are determined is
The best electronic validation technique for ensuring that an online data entry form is complete is
a data type check.
a data range check.
a required field check.
graphic image recognition (CAPTCHA).
The manager of a graphic art studio wants to use cloud computing instead of an external hard drive to store
image data. One criterion that can be used to evaluate the effectiveness of this decision would be to ask
is it cheaper to use the cloud than the external hard drive?
is the upload time to the cloud faster than saving to the external hard drive?
do staff find it quicker to retrieve images from the cloud than from the external hard drive?
do the images have the same resolution when retrieved from the cloud as when retrieved from the
external hard drive?
The best design tool to show the structure of a database solution is
a site map.
a mock-up of the input form.
an entity-relationship (ER) diagram
an input-process-output (IPO) chart.
A relational database management system (RDBMS) developer is creating a new table within a database.
The most effi cient name and data type for a fi eld containing phone numbers, such as (03) 456 5667, is
name: cpn, data type: number
name: custPn#, data type: text
name: custPhNum, data type: text
name: customer phone number, data type: number
A farmer has hired you to develop a new stock management solution.
During development, to ensure that the new solution does what it is intended to do, you should
enter a lot of data to make sure the stock numbers are correct.
read the quick start guide to make sure it is logical and efficient.
create a set of evaluation criteria to judge if the requirements were met.
check the system in three to six months to make sure it is working as intended.
A government school has decided to store all parents’ credit card information in a text fi le on the school’s
The school has a legal obligation to change this information management strategy because
parents might get angry
human error might occur when the credit card numbers are entered.
sensitive data should be stored safely and text files are too easily read.
expired credit cards may still be in the system, resulting in a lack of data integrity
Barry received a three-monthly report showing that the number of complaints about orders being delivered to
the wrong addresses had increased. He decides that all stages of the order delivery process will be completely
computerised in three years.
Strategies for evaluating the new solution are best carried out
as soon as the solution is in use.
immediately before the solution is in use.
six months after the solution has been in use.
The best procedure to dispose of a data file and make it extremely diffi cult to retrieve is to
overwrite it with specialty software
move it to the trash and empty the trash.
encrypt it with licensed software and save it to the cloud.
Drivers are insured for mountain track driving if they pass a special driving course (SDC), have a car with
roll bars (RB) and are without any convictions (C) for dangerous driving.
The design for a query to identify drivers who can receive insurance is
Insured = SDC or RB and C
Insured = SDC and RB and C
Insured = SDC or RB and not C
Insured = SDC and RB and not C
An operating system is designed to
provide online help to new users
manage file access and application software.
provide user-friendly filenames for shared files
encrypt fi les that are leaving and entering the network
A text box on a data entry form has this validation rule applied to it: 2999 < Postcode < 4000.
The most suitable data to test the rule is
3336, 3337, 3999
2050, 3050, 4050
2999, 4000, 4001
3000, 3999, 4050
A telecommunications company has more than 2000 employees across Australia with 24-hour access to the
company intranet. The human resource manager wants to make sure that employees can check their holiday
entitlements at any time.
The most effi cient method of achieving this would be to
email all employees whenever any entitlements change.
upload new entitlement information to the home page on the company intranet.
send new entitlement information to the relevant employees’ company mobile phones
provide each employee with a written copy of their entitlements whenever there is a change.
The database table below shows the most popular songs during the decade 2000 to 2010, as voted by an
online music community in 2011. The query Artist = The Black Eyed Peas OR Year < 2009 will display records