IT1106_2023
IT1106_2023
IT1106_2023
Important Instructions
• Each question will have 5 (five) choices with ONLY ONE correct answer.
• This paper consists of 100 marks and all the questions will carry equal marks.
• Note that questions appear on both sides of the paper. If a page or part of a page is not printed,
please inform the supervisor/invigilator immediately.
• Mark the correct choices on the question paper first and then transfer them to the given answer
sheet which will be machine marked. Please completely read and follow the instructions
given on the other side of the answer sheet before you shade your correct choices.
• Any electronic device capable of storing and retrieving text, including electronic dictionaries,
smartwatches, and mobile phones, is not allowed.
• All Rights Reserved. This question paper can NOT be used without proper permission from
the University of Colombo School of Computing.
1) Which of the following is NOT a computing device?
5) Consider the network types listed under column A and the descriptions provided in column B.
A B
I. IoE I. Enables sharing information and working collaboratively with
II. IoT members within an organization.
III. Intranet II. Enables connecting devices, systems as well as people to a
network.
III. Enables connecting any device with an on/off switch to a
network.
Which of the following correctly matches the information systems given in column A with their
descriptions in column B?
2
6) Which of the following is NOT a common component of an Information system?
(a) Wide Area Networks are usually built with twisted-pair cables.
(b) A Wide Area Network connects computer systems and devices in an office building.
(c) In a Bus Network, all network devices connect to one another through a single central device.
(d) A Local Area Network can be used by a small business to share their files and hardware devices.
(e) A server can be any computer that sends messages requesting service from a client on the network.
8) Even though information systems play different roles in a business, they CANNOT,
9) Organizations with a strategic focus on customer value NEVER use information technology to,
10) The primary business processes of a firm’s value chain do NOT include,
11) e-Commerce can bring lots of benefits to an organization. But still, it CANNOT,
3
12) Consider the e-commerce types listed under column A and the descriptions provided in column B.
A B
I. B2B I. It facilitates new organizations to apply for necessary business
licenses and permits and everyone to submit tax returns online.
II. B2C
II. It enables business partners to get connected in a virtual supply
III. B2G
chain to cut resupply times and the associated costs.
III. It assists firms to use social media sites to reach potential
customers and offer them personalized services.
Which of the following correctly matches the e-commerce types listed under column A with their
descriptions in column B?
“Organizations selling garments via m-commerce or e-commerce platforms focus on reducing the price of
garments by_______________________.”
15) Consider the following statements regarding Credit, Charge, Debit, and Smart Cards.
I. Visa cards and Master cards are credit cards.
II. Charge cards do not have a preset spending limit.
III. Smart cards operate like cash or personal cheques
IV. Owners of Debit cards have to bear an extra charge per each transaction they make.
4
16) Consider the functional information systems(IS)s listed under column A and the Functions provided in
column B.
A B
I. Marketing and Sales IS I. Develops production schedules, controls inventory levels, and
monitors product quality.
II. Finance and
Accounting IS II. Forecasts revenues and expenses and determines the best sources
and uses of funds.
III. Manufacturing IS
III. Conducts product analysis, promotion analysis, and price
analysis.
Which of the following correctly matches the information systems given in column A with their descriptions
in column B?
5
21) Which of the following is INCORRECT regarding ERP systems?
23) Online analytical processing (OLAP) involves basic operations such as,
(a) Drill down, Roll up, Slice and Dice. (b) Cut, Paste, Copy, Duplicate.
(c) Create, Read, Update and Delete. (d) Find, Replace, Edit and Select.
(e) Write, Erase, Append and Insert.
24) A manager received or engaged in creating the following reports. Which one of them can be considered as
an Exception Report?
(a) The manager created a report with the information that he selected.
(b) The manager can see the real-time sales records in a prespecified format.
(c) The manager received a scheduled report automatically with the daily sales records.
(d) The manager searched and analyzed some sales records and generated reports as required.
(e) The manager received an alert and a report with some information related to an unexpected
incident which required immediate action.
6
26) Which of the following is NOT a component of a typical Expert System?
28) Productivity Paradox related to Information Systems and Technology (IS & IT) refers to,
(a) difficulty in getting the expected work done from the IT and IS specialists on time.
(b) the issue of not being able to find the real causes of poor investments in IT and IS.
(c) lowering employee productivity and getting the work done by the automated systems.
(d) the fear and dissatisfaction caused by the displacement of jobs with the establishments of IS and
IT.
(e) the issue of not achieving the productivity enhancements as expected from the IT and IS
investments.
29) Which of the following techniques is NOT used in information technology investment evaluation?
(a) displays how the system works and what issues are there.
(b) describes how the company's business processes are to be conducted.
(c) is a blueprint including both computer and noncomputer components of the system.
(d) describes how information flows and how users can access the required information.
(e) displays how each component of the system has been integrated to handle different data formats.
7
32) The Prototyping Cycle in the information development process includes,
33) Which of the following is NOT included in the Four Principles of Technology Ethics?
34) Consider the following hacking methods to attack companies through networks listed under column A and
the descriptions provided in column B.
A B
I. Packet Sniffer I. The act of sending email, WhatsApp or SMS messages or giving
phone calls to trick receivers into sharing their critical
II. Trojan Horse
information such as personal data, passwords or credit card
III. Spoofing numbers
II. A malware that appears to be useful and harmless or enters the
computer systems as a part of legitimate software and enables
attackers to enter the system
III. A technique of collecting confidential data that travels through an
unencrypted computer network for malicious purposes. However,
this can be used as a useful tool for network administrators to
identify network issues and fix them.
Which of the following correctly matches the hacking methods listed under column A with their descriptions
in column B?
35) Cyber-Warfare is the action of_____________________________. (Select the most appropriate option.)
(a) invading cyberspace with virus attacks for damaging data belongs to competitive organizations.
(b) attacking computers and information systems of an organization or a country to gain financial
advantages.
(c) one country or nation to enter the computers or networks of another country to cause damage or
disruption.
(d) using computers and networks to steal confidential information to sell it to another organization or
set up a competing company.
(e) sending messages with fake evidence and fabricated stories to arouse the anger of the general
public and gain political advantage.
8
Consider the following description to answer the questions 36 to 40.
A tuition master running an institute has expanded his services by implementing an online learning platform
(OLP). The students can make monthly payments online and access the tuition master’s learning resources
through the OLP. The students who do not have the required infrastructure to access the online learning
resources can use a computer laboratory at the institute with an additional payment.
(a) share their passwords with the tuition master to get them recovered easily.
(b) write the password on a piece of paper and bring it to the laboratory every day.
(c) use a strong password with capital letters, simple letters, numbers and special characters.
(d) help peer students who cannot make the class fees by sharing the OLP’s login details and
materials.
(e) use the student’s name as the password so that they will not forget the password to access the
system.
38) The tuition master has created his learning materials by copying lecture notes from freely accessible websites
and learning platforms without getting written permission from the owners of the materials. This activity of
the tuition master CANNOT be considered,
39) Some students complained that they got neck and shoulder pain after working with the computers at the
laboratory. The tuition master should advise them to,
9
40) To protect the privacy of the students, the tuition master instructed the students NOT to,
******
10