placeholder image to represent content

2013 HSC IPT

Quiz by Benjamin

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
20 questions
Show answers
  • Q1
    An organisation employs a project team to update a system. Which of the following techniques could the team use to understand the needs of the organisation?
    Interviewing the participants
    Refining the prototype
    Testing the solution
    Scheduling the tasks to be completed
    30s
  • Q2
    This context diagram represents an online retailer. Which row in the table identifies a process and an external entity in the diagram?
    Question Image
    A
    B
    C
    D
    30s
  • Q3
    A company is considering implementing a new system. Which of the following should be included in the feasibility study?
    A working model of the new system
    An operation manual
    Results from testing the new system
    Risks associated with the new system
    30s
  • Q4
    A worker uses a hand­held device to scan the barcodes of items in a warehouse. Which information process best describes the activity of scanning?
    Collecting
    Displaying
    Storing
    Transmitting
    30s
  • Q5
    The diagram shows a household network. Which network topology is represented in this diagram?
    Question Image
    Star
    Bus
    Hybrid
    Wireless
    30s
  • Q6
    Which of the following converts analog sound into digital data?
    OLAP
    TCP
    VOIP
    RSS
    30s
  • Q7
    Which of the following would be LEAST effective in identifying problems in an existing system?
    Surveying users
    Interviewing participants
    Writing a troubleshooting guide for users
    Observing participants using the system
    30s
  • Q8
    A new EFTPOS method of payment for purchases requires customers to simply place an enabled credit card close to a terminal at the checkout. Which of these is used to transfer data from the credit card to the EFTPOS terminal?
    3G
    Radio
    NIC
    Infared
    30s
  • Q9
    In a transmission system, when the message ‘TOP MARKS’ was sent as a secured message it appeared as ‘XSTDQEVON’. Which security measure was used?
    Checksum
    Modulation
    Encryption
    Synchronisation
    30s
  • Q10
    Who would receive this email without all the other recipients knowing?
    Question Image
    Brian Clarkson
    Kerrin Jacobson
    Fred Stevenson
    Patricia Jones, James Nguyen and Kevin Wang
    30s
  • Q11
    What may raise concerns as to whether the email message is legitimate?
    Question Image
    The message is being sent to three recipients.
    The attachment may contain a virus.
    There are obvious spelling mistakes in the message
    It is signed by a person who does not own the email account.
    30s
  • Q12
    A prospective employer asks a job applicant for their ‘social network’ login details. The applicant should consider this request as
    a breach of the applicant’s ownership of data.
    an invasion of privacy
    a freedom of information request.
    the employer's legal right.
    30s
  • Q13
    A database developer would create different data views for users to show
    the data structures.
    the metadata.
    data relevant to their work
    data in response to their queries.
    30s
  • Q14
    This is part of the PRODUCT table in a relational database. Which of the following would be valid data types for the fields Price and Supplier_ID?
    Question Image
    B
    D
    A
    C
    30s
  • Q15
    This HTML code is found in the source of a web page. Which of the following words would NOT locate this web page when entered into a search engine?
    Question Image
    title
    2013
    films
    movies
    30s

Teachers give this quiz to your class