BIS521S - BUSINESS INFORMATION SYSTEMS 1B - 2 ND OPP - JAN 2020


BIS521S - BUSINESS INFORMATION SYSTEMS 1B - 2 ND OPP - JAN 2020



1 Pages 1-10

▲back to top


1.1 Page 1

▲back to top


NAMIBIA UNIVERSITY
OF SCIENCE AND TECHNOLOGY
FACULTY OF MANAGEMENT SCIENCES
DEPARTMENT OF MANAGEMENT
QUALIFICATION: Bachelor of Business and Information Administration
QUALIFICATION CODE: O7BBIA
LEVEL: 5
COURSE CODE: BIS521S
COURSE NAME: Business Information Systems 1B
SESSION: January 2020
PAPER: Theoretical Paper
DURATION: 2 Hours
MARKS: 100
SECOND OPPORTUNITY/SUPPLEMENTARY EXAMINATION MEMORANDUM
EXAMINER(S) | Deoni Olivier
MODERATOR: Godwin Kaisara
INSTRUCTIONS
You have to answer ALL the questions.
Read questions carefully before answering.
Please number your answers clearly.
Make sure your student number appears on the answering script.
PERMISSIBLE MATERIALS
1. Pen, pencil, ruler and eraser
THIS QUESTION PAPER CONSISTS OF 7 PAGES (Including this front page)

1.2 Page 2

▲back to top


QUESTION 1 - MULTIPLE CHOICE
(10 MARKS)
Please read all the questions carefully and then select one answer from the list given below. E.g. 1. A)
1H
A collection of instructions that enable the user to interact with a computer, its hardware, or
perform tasks is called?
a) Information
b) Data
c) Instructions
d) Software ~~
This layout was created to reduce finger movement when typing and to produce faster typing
speeds.
a) Azerty
b) Byer
c) Qwerty
d) Barack
What type of device is a microphone?
a) Input device a
b) Output device
c) Storage device
d) Communication device
What type of device is this?
a) Output device C4
b) Input device
c) Communication device
d) Storage device
Uses of voice input include:
internet messaging that supports voice conversations,
VOIP - enables users to make calls over the internet. To make a call, a telephone is connected
to a network cable, rather than a phone line or a call is made over a computer. Skype is a
popular example.
video calls,
all of the above. \\~
cables are used for audio/video transmission.

1.3 Page 3

▲back to top


3
scanners identify a person by taking measurements of a person’s ........eseseeeeee For
example, the distance between the person’s chin, eyes, nose, and mouth. What is the missing
word?
Hand
Face ew
Nose
Mouth
This is called a?
Barcode reader
Flatbed scanner
RFID reader
None of the above
The most common method of entering text and numerical data into a computer system is
through the use of a
a) Plotter
b) Printer
c) Keyboard x
d) Scanner
Which type of device is touch screen technology used on?
a) Tablet computers
b) Smartphones
c) Newer model laptop and desktop computers
d) Allofthe above :~

1.4 Page 4

▲back to top


QUESTION 2 — ABBREVIATIONS
Please complete the following abbreviations in full:
(10 MARKS)
2.1
VOIP - Voice Over Internet Protocol —
2.2 DVI - Digital Video Interfaceva
2.3
OCR - Optical Character Recognition La
2.4
QR Code - Quick Response Code Ca
2.5
TFT - Thin-film Transistor UZ
2.6 HDMI - High Definition Multi-Media Interface La
2.7
CCFL - Cold Cathode Fluorescent Lamp UY
2.8
OLED - Organic Light Emitting Diode
2.9 GUI - Graphical User Interface x
2.10 PPM - Pages Per Minute ae
QUESTION 3 - TRUE AND FALSE
Please answer the following questions and indicate whether it is true or false.
(10 MARKS)
3.1
A touchpad is a small, hard, square pointing device that’s sensitive to pressure and motion. false
3.2
Another name for a quick response code is a 2-D bar code. True
3:3
An interactive whiteboard is an instructional tool that allows computer images to be displayed onto
a board using an image projector. false
Audio includes music, speech or any other sound. True iL
Cable-connected speakers are also considered as input peripheral devices of a computer system, as
the input is sound or audio. false
A digital camera is a hardware device that takes pictures like a regular camera but stores the image
as data instead of printing it to film. true
3
With motion input, users can guide on-screen elements using ground gestures. false
3.8 The Nintendo's Wii game is blue tooth enabled. true
3.9. als the process of capturing full-motion images and storing them on acomputer or mobile device’s
wre osl storagemedium. T=rue L~
3.10 A mobile printer is a big heavy, battery-powered printer that allows a mobile user to print from a
laptop, smartphone, or other mobile device while travelling. False | ~

1.5 Page 5

▲back to top


QUESTION 4 - STRUCTURED QUESTIONS
(22 MARKS)
4.1 Name and explain the three (3) different ways of shutting down your PC.
(6)
A eee can turn the PC off pamnesely,
B sleep It uses very little power, your PC starts up faster, and you’re instantly back to where you
left off. You don’t have to worry that you'll lose your work because of your battery draining, (__~
because Windows automatically saves all your work and turns off the PC if the battery is too low
C Hibernate — This option was designed for laptops and might not be available for all PCs.
“Hibernate” uses less power than sleep and when you start up the PC again, you’re back to where
you left off (though not as fast as “sleep”).
Define the following terms: Resolution and Dot Pitch.
(4)
Resolution: Screen resolution refers to how clearly text and images are displayed on your screen. It
indicates the number of pixels displayed horizontally and vertically on your screen.
Dot Pitch: This measurement describes the sharpness of a oe
between the pixels used to display the image on the screen.
Ge
display. It measures the distance
Define what an operating system is and list the types of operating systems.
(5)
An operating sistenlie-cofenare that forms the foundation or platform forany other softwareae to
run on your computer. Types: Desktop operating system, Server eee
operating systems~.
te and Mobile
Briefly discuss the Input Process Diagram and map out a picture diagram to aid your
explanation.
Data goes to the memory of the computer/device, \\-~
Data is interpreted by the CPU.
The CPU processes the instructions (data) to transform this into information. ee
This instruction or data received from the user can be aeons forms. It can be in the
form of software (programs or applications), commands and user responses.

1.6 Page 6

▲back to top


QUESTION 5 - STRUCTURED QUESTIONS
5.1. Differentiate between personal printer and network printer.
(20 MARKS)
(5)
Personal printers support individual users and may be connected to only a single computer for
home or small business use.
Networked or shared printers are used for high-volume, high-speed printing. These printers are
shared by many users on a network.
List the display quality aspects you should consider when selecting a display device.
Resolution oe
Response Time L=
Brightness -~
Dot Pitch U~
Contrast Ratio!
Give five (5) characteristics of a mobile printer.
(5)
A mobile printer is a small igBeMeiben Gatton powered printer that allows a mobile user to print
from a laptop, smartphone, or other mobile device while travelling.
Mobile printers fit easily in a briefcase alongside a laptop
Mobile printers mainly use ink-jet or thermal technology. ue
Many connect to a USB port. Ca
Others have a built-in wireless port through which they communicate with the device.
List the uses of voice input.
Internet messaging that supports voice conversations, a
Chat rooms that support voice chats, Le
Video calls, © .—<—~
Video conferencing, —~
2
VoIP and voice recognition a
QUESTION 6 - STRUCTURED QUESTIONS
(28 MARKS)
6.1
Briefly explain what is encryption, and what methods of encryption are common? Also draw a
simple diagram to illustrate the encryption process.
(10)
Encryption ensures information protection, allowing only authorised parties to view it. This
includes files stored on the computer or op-a network, as well as data transferred over
wireless networks and the internet.
Encryption also provides authentication - the origin of a message can be verified.
It ensures integrity, i.e. proof that the contents of a message have not been changed since it
was sent.
The sender of a message cannot deny sending the message. ae

1.7 Page 7

▲back to top


7
Data can be encrypted by using two main types of encryption: asymmetric encryption (also
called public-key,encryption) and symmetric encryption (also called private or secret key
encryption). ig
ee Bob
ier
qa
|e
v7
Secret key
-— Decrypt
Briefly list and explain the five (5) biometric devices used for authentication or
Verification in any given company.
(10)
oe
Face scanner - face scanners identify a person by taking measurements of a person face.
For example,the distance between the persons chin, eyes, nose, and mouth.
Hand scanner - the palm of your hand is also unique to you. A biometric hand scanner will
identify the person by the palm of their hand.
Finger scanner - a biometric finger scanner identifies the person by their fingerprint.
These can be asecure method of identifying a person.
Retina or iris scanner - A biometric retina or iris scanner identifies a person by scanning
the iris or retina of their eyes.
Voice scanner - a voice analysis scanner will mathematically break down a person's voice
to identify them.
By means of a eee indicate the detail and flow of the booting process.
(6)
Ca
Switch power on
cCoPnUtaifniindnsg RBO!0MS
peee as
OS loads hardware
device drivers, executes
application and user
configuration
OS takes over boot
process
Bootstrap loader finds
os
Give two examples of how you can protect your computer from digital security risks.
(2)
_ fnetalia firewall.
- Install anti-virus software LU

1.8 Page 8

▲back to top


NAMIBIA UNIVERSITY
OF SCIENCE AND TECHNOLOGY
FACULTY OF MANAGEMENT SCIENCES
DEPARTMENT OF MANAGEMENT
QUALIFICATION: Bachelor of Business and Information Administration
QUALIFICATION CODE: O7BBIA
LEVEL: 5
COURSE CODE: BIS521S
COURSE NAME: Business Information Systems 1B
SESSION: January 2020
PAPER: Theoretical Paper
DURATION: 2 Hours
MARKS: 100
SECOND OPPORTUNITY/SUPPLEMENTARY EXAMINATION QUESTION PAPER
EXAMINER(S) | Deoni Olivier
moperAToR: | C°¢Win Kaisara
INSTRUCTIONS
You have to answer ALL the questions.
Read questions carefully before answering.
Please number your answers clearly.
Make sure your student number appears on the answering script.
PERMISSIBLE MATERIALS
1. Pen, pencil, ruler and eraser
THIS QUESTION PAPER CONSISTS OF 5 PAGES (Including this front page)

1.9 Page 9

▲back to top


QUESTION 1 - MULTIPLE CHOICE
(10 MARKS)
Please read all the questions carefully and then select one answer from the list given below. E.g. 1. A)
1.1
A collection of instructions that enable the user to interact with a computer, its hardware, or
perform tasks is called?
a) Information
b) Data
c) Instructions
d) Software
1.2
This layout was created to reduce finger movement when typing and to produce faster typing
speeds.
a) Azerty
b) Dvorak
c) Qwerty
d) Barack
1.3
What type of device is a microphone?
a) Input device
b) Output device
c) Storage device
d) Communication device
1.4
What type of device is this?
a) Output device
b) Input device
c) Communication device
d) Storage device
1.5
Uses of voice input include:
a) internet messaging that supports voice conversations,
b) VOIP - enables users to make calls over the internet. To make a call, a telephone is connected
to a network cable, rather than a phone line or a call is made over a computer. Skype is a
popular example.
c) video calls,
d) all of the above.
1.6 8
———aecsssseesessssssrcrenctsnstentteaces cables are used for audio/video transmission.

1.10 Page 10

▲back to top


V7
aeeesteeseeanes scanners identify a person by taking measurements of a person’s .......cc0eeees For
example, the distance between the person’s chin, eyes, nose, and mouth. What is the missing
word?
a) Hand
b) Face
c) Nose
d) Mouth
1.8
This is called a?
a) Barcode reader
b) Flatbed scanner
c) RFID reader
d) None of the above
1.9
The most common method of entering text and numerical data into a computer system is
through the use of a
a) Plotter
b) Printer
c) Keyboard
d) Scanner
1.10
Which type of device is touch screen technology used on?
a) Tablet computers
b) Smartphones
c) Newer model laptop and desktop computers
d) Allofthe above

2 Pages 11-20

▲back to top


2.1 Page 11

▲back to top


QUESTION 2 — ABBREVIATIONS
Please complete the following abbreviations in full:
(10 MARKS)
21.
VOIP
2.2
DVI
23
OCR
2.4
QR Code
2.5
TFT
2.6
HDMI
2.7
CCFL
2.8
OLED
2.9
GUI
2.10 PPM
QUESTION 3 - TRUE AND FALSE
(10 MARKS)
Please answer the following questions and indicate whether it is true or false.
3.1
A touchpad is a small, hard, square pointing device that’s sensitive to pressure and motion.
3.2
Another name for a quick response code is a 2-D bar code.
3.3
An interactive whiteboard is an instructional tool that allows computer images to be displayed onto
a board using an image projector.
3.4
Audio includes music, speech or any other sound.
3.5
Cable-connected speakers are also considered as input peripheral devices of a computer system, as
the input is sound or audio.
3.6
A digital camera is a hardware device that takes pictures like a regular camera but stores the image
as data instead of printing it to film.
3.7
With motion input, users can guide on-screen elements using ground gestures.
3.8
The Nintendo's Wii game is blue tooth enabled.
3:9
Voice input is the process of capturing full-motion images and storing them on acomputer or
mobile device’s storage medium.
3.10 Amobile printer is a big heavy, battery-powered printer that allows a mobile user to print from a
laptop, smartphone, or other mobile device while travelling.
QUESTION 4 - STRUCTURED QUESTIONS
(22 MARKS)
4.1
Name and explain the three (3) different ways of shutting down your PC.
(6)
4.2
Define the following terms: Resolution and Dot Pitch.
(4)

2.2 Page 12

▲back to top


4.3
Define what an operating system is and list the types of Operating systems.
4.4
Briefly discuss the Input Process Diagram and map out a picture diagram to aid your
explanation.
(7)
QUESTION 5 - STRUCTURED QUESTIONS
(20 MARKS)
5.1
Differentiate between personal printer and network printer.
(5)
5.2
List the display quality aspects you should consider when selecting a display device.
(5)
5.3
Give five (5) characteristics of a mobile printer.
(5)
5.4
List the uses of voice input.
(5)
QUESTION 6 - STRUCTURED QUESTIONS
(28 MARKS)
6.1
Briefly explain what is encryption, and what methods of encryption are common? Also draw a
simple diagram to illustrate the encryption process.
(10)
6.2
Briefly list and explain the five (5) biometric devices used for authentication or
Verification in any given company.
(10)
6.3
By means of a diagram, please indicate the detail and flow of the booting process.
(6)
6.4
Give two examples of how you can protect your computer from digital security risks.
(2)
TOTAL MARKS: 100