2013 HSC IPT
Quiz by Benjamin
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
20 questions
Show answers
- Q1An organisation employs a project team to update a system. Which of the following techniques could the team use to understand the needs of the organisation?Interviewing the participantsRefining the prototypeTesting the solutionScheduling the tasks to be completed30s
- Q2This context diagram represents an online retailer. Which row in the table identifies a process and an external entity in the diagram?ABCD30s
- Q3A company is considering implementing a new system. Which of the following should be included in the feasibility study?A working model of the new systemAn operation manualResults from testing the new systemRisks associated with the new system30s
- Q4A worker uses a handheld device to scan the barcodes of items in a warehouse. Which information process best describes the activity of scanning?CollectingDisplayingStoringTransmitting30s
- Q5The diagram shows a household network. Which network topology is represented in this diagram?StarBusHybridWireless30s
- Q6Which of the following converts analog sound into digital data?OLAPTCPVOIPRSS30s
- Q7Which of the following would be LEAST effective in identifying problems in an existing system?Surveying usersInterviewing participantsWriting a troubleshooting guide for usersObserving participants using the system30s
- Q8A new EFTPOS method of payment for purchases requires customers to simply place an enabled credit card close to a terminal at the checkout. Which of these is used to transfer data from the credit card to the EFTPOS terminal?3GRadioNICInfared30s
- Q9In a transmission system, when the message ‘TOP MARKS’ was sent as a secured message it appeared as ‘XSTDQEVON’. Which security measure was used?ChecksumModulationEncryptionSynchronisation30s
- Q10Who would receive this email without all the other recipients knowing?Brian ClarksonKerrin JacobsonFred StevensonPatricia Jones, James Nguyen and Kevin Wang30s
- Q11What may raise concerns as to whether the email message is legitimate?The message is being sent to three recipients.The attachment may contain a virus.There are obvious spelling mistakes in the messageIt is signed by a person who does not own the email account.30s
- Q12A prospective employer asks a job applicant for their ‘social network’ login details. The applicant should consider this request asa breach of the applicant’s ownership of data.an invasion of privacya freedom of information request.the employer's legal right.30s
- Q13A database developer would create different data views for users to showthe data structures.the metadata.data relevant to their workdata in response to their queries.30s
- Q14This is part of the PRODUCT table in a relational database. Which of the following would be valid data types for the fields Price and Supplier_ID?BDAC30s
- Q15This HTML code is found in the source of a web page. Which of the following words would NOT locate this web page when entered into a search engine?title2013filmsmovies30s