Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

1. What happens in the Analysis Stage?

a) Place the new system into the company for b) Create the new system and test it
use

c) Decide how well the new system is working d) Look at the existing system and find areas to
improve

2. Which stage comes after Design?

a) Evaluation b) Documentation

c) Design d) Development and Testing

3. What happens in the Development and Testing Stage?

a) Plan the proposed system b) Decide how well the new system is working

c) Place the new system into the company for d) Create the new system and test it
use

4. User Manuals and Technical guides are created in which stage of the System Analysis and Design?

a) Documentation b) Design

c) Analysis d) Evaluation

5. "I asked questions verbally to all the employees of the accounts department at Greensteds School,
to find out how their systems work." What research method is described above?

a) Observation b) Interviews

c) Collecting Documents d) Questionnaires

Page 1 of 3
6. "While at the supermarket, one of the workers gave me a handout containing questions that I had
to answer and return. " Which research method is described above

a) Handouts b) Evaluation

c) Receipt d) Questionnaire

7. A strong password is one that is difficult for a hacker to guess.

a) True b) False

8. What is hacking?

a) People access your car b) none of the above

c) People access computer system without d) People access your valet


permission

9. You receive an e-mail from a well-known company & the name of the sender is misspell you
should...

a) reply to e-mail, pointing out the misspelling b) report it as a possible phishing scam

c) log in where requested to change your d) forward the e-mail to your friends
password

10. You receive an e-mail from a well-known company & the name of the sender is misspell you
should...

a) report it as a possible phishing scam b) log in where requested to change your


password

c) reply to e-mail, pointing out the misspelling d) forward the e-mail to your friends

11. What does E-Safety mean?

a) How we can stay safe when using any b) How we can stay safe online
electronic item

c) How we can stay safe

Page 2 of 3
12. __________________ uses secret key that has capability of altering the characters in a message.

a) Cypher key b) Decryption

c) Encryption d) plain text

13. What's pharming?

a) scam through fake websites b) scams through phone calls

c) scams through emails d) scams through text messages

14. The sending of fraudulent emails appearing to come from legitimate companies in order to steal
passwords is known as ...

a) Smishing b) Pharming

c) Vishing d) Phishing

15. Redirecting users to a bogus website that looks authentic is known as ...

a) Smishing b) Pharming

c) Phishing d) Vishing

Page 3 of 3

You might also like