Professional Documents
Culture Documents
Grade 9 British Baseline Test
Grade 9 British Baseline Test
a) Place the new system into the company for b) Create the new system and test it
use
c) Decide how well the new system is working d) Look at the existing system and find areas to
improve
a) Evaluation b) Documentation
a) Plan the proposed system b) Decide how well the new system is working
c) Place the new system into the company for d) Create the new system and test it
use
4. User Manuals and Technical guides are created in which stage of the System Analysis and Design?
a) Documentation b) Design
c) Analysis d) Evaluation
5. "I asked questions verbally to all the employees of the accounts department at Greensteds School,
to find out how their systems work." What research method is described above?
a) Observation b) Interviews
Page 1 of 3
6. "While at the supermarket, one of the workers gave me a handout containing questions that I had
to answer and return. " Which research method is described above
a) Handouts b) Evaluation
c) Receipt d) Questionnaire
a) True b) False
8. What is hacking?
9. You receive an e-mail from a well-known company & the name of the sender is misspell you
should...
a) reply to e-mail, pointing out the misspelling b) report it as a possible phishing scam
c) log in where requested to change your d) forward the e-mail to your friends
password
10. You receive an e-mail from a well-known company & the name of the sender is misspell you
should...
c) reply to e-mail, pointing out the misspelling d) forward the e-mail to your friends
a) How we can stay safe when using any b) How we can stay safe online
electronic item
Page 2 of 3
12. __________________ uses secret key that has capability of altering the characters in a message.
14. The sending of fraudulent emails appearing to come from legitimate companies in order to steal
passwords is known as ...
a) Smishing b) Pharming
c) Vishing d) Phishing
15. Redirecting users to a bogus website that looks authentic is known as ...
a) Smishing b) Pharming
c) Phishing d) Vishing
Page 3 of 3