Professional Documents
Culture Documents
Business Statistics and Information Technology November 2020 Suggsested Solutions & Marking Guide
Business Statistics and Information Technology November 2020 Suggsested Solutions & Marking Guide
ADMINISTRATORS IN ZIMBABWE
SUGGESTED SOLUTIONS:
NOVEMBER 2020
1+1+16+4+25+4+1 52
= = 6 = 8.67 to 2 decimal places
6
c)
i) Proportion of the workers getting wages between $12.75 and $13.69 an hour.
X = wage
12.75−13.25
Z1 = = -0.83333
0.6
13.69−13.25
Z2 = = 0.73333
0.6
= 0.298 + 0.268
= 0.566
_____________________________________________________________________________________
Business Statistics and Information Technology Suggested Solutions: November 2020 Page 2 of 9
The minimum wage of the highest 5%.
𝑥−13.25
= 1.645
0.6
x = 14.237
QUESTION 2
a)
x y x2 y2 Xy
1 85 1 7225 85
0 80 0 6400 0
2 70 4 4900 140
6 55 36 3025 330
4 90 16 8100 360
3 90 9 8100 270
3 95 9 9025 285
∑ 𝑥 = 19 ∑ 𝑦 = 565 ∑ 𝑥 2 = 75 ∑ 𝑦 2 = 46775 ∑ 𝑥𝑦 = 1470
𝑛 ∑(𝑥𝑦)−(∑ 𝑥)(∑ 𝑦)
r=
√𝑛 ∑ 𝑥 2 −(∑ 𝑥)2 ∗𝑛 ∑ 𝑦 2 −(∑ 𝑦)2
7∗ 1470−19∗565
=
√(7∗75− (19)2 )∗ (7∗46775−(565)2 )
−445
= 1159.66
r = -0.38
There is a weak negative correlation between the study time and the
final examination mark since r is closer to 0 than to -1.
_____________________________________________________________________________________
Business Statistics and Information Technology Suggested Solutions: November 2020 Page 3 of 9
b)
Sales Advertisement Rank for Rank for d =x– y d2
(xi) (xi) Sales (dx) Advertisement
(dy)
90 7 2 2 0 0
85 6 3 3 0 0
68 2 8 7 1 1
75 3 6 6 0 0
82 4 4 5 -1 1
80 5 5 4 1 1
95 8 1 1 0 0
70 1 7 8 -1 1
Total - - - 0 4
6 ∑ 𝑑2
𝑖
rR = 1 - 𝑛(𝑛2 −1)
6∗4
= 1 - 8∗ (64−1)
24
= 1 - 504
= 1 – 0.0476
= 0.95
c)
_____________________________________________________________________________________
Business Statistics and Information Technology Suggested Solutions: November 2020 Page 4 of 9
i) There is no relationship in this data.
ii) It is not possible to draw a line of best fit because the data doesn’t
have a relationship.
iii) We cannot make predictions based on data without a relationship.
QUESTION 3
a)
Item Rate unit Price (1995) Price (2004)
Wheat per 10kg 100 140
Rice per 10kg 200 250
Flour per 10kg 250 350
Sugar per kg 14 20
Cooking Oil per litre 40 50
604 810
∑𝑃
Simple aggregative index = ∑ 𝑃1 * 100
0
810
= 604 ∗ 100
= 134.1
b)
10 000
Sales of 10 000 units annually divided equally over the 4 seasons is = 2 500.
4
4 000
1st Quarter = 1.6
2 500
3 000
2nd Quarter = 1.2
2 500
2 000
3rd Quarter = 0.8
2 500
1 000
4th Quarter = 0.4
2 500
_____________________________________________________________________________________
Business Statistics and Information Technology Suggested Solutions: November 2020 Page 5 of 9
c) Attributes of high quality information.
Understandability - Since information is already in a summarized form, it must be
understood by the receiver so that he will interpret it correctly. He must be able to
decode any abbreviations, shorthand notations or any other acronyms contained in
the information.
Relevance - Information is good only if it is relevant. This means that it should be
pertinent and meaningful to the decision maker and should be in his area of
responsibility.
Completeness - It should contain all the facts that are necessary for the decision
maker to satisfactorily solve the problem at hand using such information. Nothing
important should be left out. Although information cannot always be complete,
every reasonable effort should be made to obtain it.
a)
A star topology is designed with each node (file server, workstations, and peripherals)
connected directly to a central network hub, switch, or concentrator.
_____________________________________________________________________________________
Business Statistics and Information Technology Suggested Solutions: November 2020 Page 6 of 9
Data on a star network passes through the hub, switch, or concentrator before continuing
to its destination. The hub, switch, or concentrator manages and controls all functions of
the network. It also acts as a repeater for the data flow.
b)
Antivirus and security software - for the security of files and
applications, e.g., Malwarebytes, Microsoft Security Essentials, and
AVG.
Disk defragmentation software - to organize scattered files on the
drive. Examples include Disk Defragmenter, Perfect Disk, Disk Keeper,
Comodo Free Firewall, and Little Snitch.
File Compression software - to optimize disk space such as WinRAR,
Winzip, and 7-Zip.
c)
i) Access time - An SSD has faster access speed than the conventional
storage devices which means programs can run more quickly, which is
very significant, especially for programs that access large amounts of
data often like your operating system.
ii) Power - The SSD uses less power than the conventional storage
devices, which means a lower energy bill over time and for laptops, an
increase in battery life.
_____________________________________________________________________________________
Business Statistics and Information Technology Suggested Solutions: November 2020 Page 7 of 9
Access and availability of information can be increased and program development
and maintenance costs can be reduced because users and programmers can
perform ad hoc queries of data in the database.
The DBMS enables the organization to centrally manage data, their use, and
security.
QUESTION 5
a)
Local exposure – Loss of control and visibility of the enterprise data which is being
transmitted, stored, and processed on a personal device. One of the inherent downsides
to BYOD.
Data leakage – Potential data leakage or disclosure of enterprise data from an
unsecured device
Public exposure – Susceptibility to man-in-the-middle attacks and eavesdropping at
public wifi hotspots often used by remote workers. Connecting to personal area
networks, e.g. using Bluetooth, poses similar security risks.
Insecure usage – Unacceptable use of a BYOD by a third party, e.g. friends or family at
home.
Rogue apps – By gaining root access to mobile devices, there’s a risk that users (aka
“rogue employees”) can bypass security restrictions. In some cases, they may install
rogue apps.
b)
i) Software controls
Monitor the use of system software and prevent unauthorized access
of software programs, system software, and computer programs.
System software is an important control area because it performs
overall control functions for the programs that directly process data
and data files.
_____________________________________________________________________________________
Business Statistics and Information Technology Suggested Solutions: November 2020 Page 8 of 9
easily specified in advance. They address problems where the
procedure for arriving at a solution may not be fully predefined in
advance. DSS have more analytical power than other systems. They
use a variety of models to analyze data, or they condense large
amounts of data into a form in which they can be analyzed by decision
makers. DSS are designed so that users can work with them directly;
these systems explicitly include user-friendly software. DSS are
interactive; the user can change assumptions, ask new questions, and
include new data.
_____________________________________________________________________________________
Business Statistics and Information Technology Suggested Solutions: November 2020 Page 9 of 9