0% found this document useful (0 votes)
34 views4 pages

December 2010 TC4Q

This document contains instructions and questions for an accounting technician examination on information systems. It outlines that candidates will have 3 hours to answer 5 of 8 questions, each worth 20 marks. The questions cover topics such as defining information system terms, implementing new systems, assessing local area networks, software categories and types, data security measures, using personal computers as terminals, program documentation, spreadsheets, and selecting a computer bureau.

Uploaded by

kalowekamo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views4 pages

December 2010 TC4Q

This document contains instructions and questions for an accounting technician examination on information systems. It outlines that candidates will have 3 hours to answer 5 of 8 questions, each worth 20 marks. The questions cover topics such as defining information system terms, implementing new systems, assessing local area networks, software categories and types, data security measures, using personal computers as terminals, program documentation, spreadsheets, and selecting a computer bureau.

Uploaded by

kalowekamo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Examination No.

______________________

THE PUBLIC ACCOUNTANTS EXAMINATION COUNCIL


OF MALAWI

2010 EXAMINATIONS

ACCOUNTING TECHNICIAN PROGRAMME

PAPER TC 4: INFORMATION SYSTEMS

MONDAY 6 DECEMBER 2010 TIME ALLOWED: 3 HOURS


2.00 PM - 5.00 PM

INSTRUCTIONS

1. You are allowed 15 minutes reading time before the examination begins during which
you should read the question paper and, if you wish, make annotations on the question
paper. However, you are not allowed, under any circumstances, to open the answer
book and start writing or use your calculator during this reading time.

2. Number of questions on paper - 8.

3. FIVE questions ONLY to be answered.

4. Each question carries 20 marks.

5. Begin each answer on a fresh page.

6. DO NOT OPEN THIS PAPER UNTIL YOU ARE INSTRUCTED BY THE


INVIGILATOR.

This question paper contains 3 pages

This question paper must not be removed from the examination hall.
1

1. (a) Explain the meaning of the following terms as applied in information systems.

(i) Field
(ii) Record
(iii) Block
(iv) File
(v) Transaction file
10 Marks

(b) Describe the important activities that should take place during systems
implementation to ensure a successful conversion from the existing to a new
system. 10 Marks
(TOTAL: 20 MARKS)

2. The present computing system of a medium sized commercial organisation consists


of several stand alone personal computers carrying out a heavy workload comprising
stock control and accounting routines. You are a member of a study team that has
been set up to examine the possibility of introducing a local area network (LAN).

Required:

(i) Mention the three main areas/sections that you would critically look at in
order to form a LAN. 3 Marks

(ii) Prepare a list of items for each of the three main areas/sections which would
assist prospective suppliers to assess the suitability of their LAN products.
17 Marks
(TOTAL: 20 MARKS)

3. (a) (i) Define the term ‘software”. 4 Marks

(ii) Mention two major categories into which software may be classified.
2 Marks
(iii) Describe each of the two software categories mentioned in (ii) above.
6 Marks

(b) What type of software are the following? Give reasons for your answer.

(i) DOS;
(ii) Spreadsheets. 8 Marks
(TOTAL: 20 MARKS)

Continued/……
2

4. Security of data and equipment is one of the important aspects in a computer system
environment.

Required:

(a) Mention two measures that should be taken to secure data against each of the
following:

(i) virus;
(ii) corruption;
(iii) hacking;
(iv) theft;
(v) unauthorized access. 10 Marks

(b) Mention two measures that should be taken to secure the environment against
each of the following:

(i) power failures;


(ii) fire;
(iii) water. 6 Marks

(c) How would you secure your hardware against:

(i) theft;
(ii) unauthorized access?
4 Marks
(TOTAL: 20 MARKS)

5. A Personal Computer (PC) is a complete computer on its own. However, it can also
be attached to a file server as a terminal.

Required:

(a) Describe a computer terminal. 2 Marks


(b) Describe how a PC can be attached to a file server as a terminal. 8 Marks
(c) Mention four advantages of attaching a PC to a file server. 8 Marks
(d) What is the disadvantage of attaching a PC to a file server? 2 Marks
(TOTAL: 20 MARKS)

6. Program documentation is one of the stages in software development.

Required:

(a) Mention eight items that a program documentation must contain. 16 Marks

(b) State four other stages that are found in software development. 4 Marks
(TOTAL: 20 MARKS)

Continued/……
3

7. (a) (i) What is a spreadsheet? 4 Marks

(ii) Describe a range of features that you would expect to find in a typical
spreadsheet package. 8 Marks

(b) Identify:

(i) the potential benefits of spreadsheets to a business organisation.


4 Marks
(ii) the possible areas of spreadsheet use. 4 Marks
(TOTAL: 20 MARKS)

8. Anybody or organisation offering any service related to computing, either as a main


line of business or a sideline, can be considered as a computer bureau.

Required:

(a) Describe any three types of services that are provided by a computer bureau.
6 Marks
(b) State four disadvantages of using a computer bureau. 4 Marks

(c) Mention ten steps that should be followed when selecting a computer bureau.
10 Marks
(TOTAL: 20 MARKS)

END

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy