6/13/25, 11:44 AM Assessment 2: Attempt review
UNISA 2025 INF1505-25-Y Welcome Message Assessment 2
QUIZ
Started on Friday, 13 June 2025, 11:36 AM
State Finished
Completed on Friday, 13 June 2025, 11:44 AM
Time taken 8 mins 21 secs
Grade 25.00 out of 25.00 (100%)
Question 1
Correct
Mark 1.00 out of 1.00
Identify an advantage of centralized processing.
a. It helps in exercising tight control over system operations and applications.
b. It is highly responsive to users’ needs.
c. It has the highest fault tolerance.
d. It is highly compatible with organizational growth because workstations can be added easily.
LEARNING OBJECTIVES: MIS.10e.6.3
The correct answer is:
It helps in exercising tight control over system operations and applications.
Question 2
Correct
Mark 1.00 out of 1.00
In a centralized processing system, processing power is distributed among several locations.
True
False
LEARNING OBJECTIVES: MIS.10e.6.3
The correct answer is 'False'.
https://mymodules.dtls.unisa.ac.za/mod/quiz/review.php?attempt=27991168&cmid=1084352 1/10
,6/13/25, 11:44 AM Assessment 2: Attempt review
Question 3
Correct
Mark 1.00 out of 1.00
Fill in the missing word(s):
are generated by Web server software and record a user’s actions on a Web site.
a. Viruses
b. Junk e-mails
c. Worms
d. Log files
LEARNING OBJECTIVES: MIS.10e.4.1
The correct answer is:
Log files
Question 4
Correct
Mark 1.00 out of 1.00
Fill in the missing words:
is a high-speed carrier service that uses ordinary phone circuits to send and receive data.
a. An analog modem
b. Digital subscriber line
c. Code division multiple access
d. A cable modem
LEARNING OBJECTIVES: MIS.10e.6.2
The correct answer is:
Digital subscriber line
Question 5
Correct
Mark 1.00 out of 1.00
In the two-tier architecture of the client/server model:
a. the presentation logic is always on the client
b. the data management logic is always on the client
c. the application logic is always on the server
d. the application logic is always on the client
The correct answer is:
the presentation logic is always on the client
https://mymodules.dtls.unisa.ac.za/mod/quiz/review.php?attempt=27991168&cmid=1084352 2/10
,6/13/25, 11:44 AM Assessment 2: Attempt review
Question 6
Correct
Mark 1.00 out of 1.00
Which clause is included in the Health Insurance Portability and Accountability Act (HIPAA)?
a. Safeguarding patients’ billing information
b. Protecting patients’ computer records
c. Protecting patients’ credit information
d. Safeguarding conversations between patients and their families
LEARNING OBJECTIVES: MIS.10e.4.1
The correct answer is:
Safeguarding patients’ billing information
Question 7
Correct
Mark 1.00 out of 1.00
Which of the following statements is true of a worm?
a. It is usually hidden inside a popular program, but it is not capable of replicating itself.
b. It floods a network or server with service requests to prevent legitimate users’ access to the system.
c. It is an independent program that can spread itself without attaching itself to a host program.
d. It enables a system designer to bypass the security of a system and sneak back into the system later to access files.
LEARNING OBJECTIVES: MIS.10e.5.4
The correct answer is:
It is an independent program that can spread itself without attaching itself to a host program.
https://mymodules.dtls.unisa.ac.za/mod/quiz/review.php?attempt=27991168&cmid=1084352 3/10
, 6/13/25, 11:44 AM Assessment 2: Attempt review
Question 8
Correct
Mark 1.00 out of 1.00
Which principle states that Internet service providers (ISPs) and government agencies should treat all data on the Internet equally?
a. Internet censorship
b. Net neutrality
c. Internet security
d' Free Basics
LEARNING OBJECTIVES: MIS.10e.4.4
The correct answer is:
Net neutrality
Question 9
Correct
Mark 1.00 out of 1.00
Fill in the missing words:
Mpho, a software programmer at Gamma Inc., develops a program that spreads Trojan viruses to the organization’s network. When
Previn, his manager, discovers that Mpho had intentionally spread the virus, he immediately fires Mpho. In this scenario, Previn’s
behavior is considered .
a. illegal and unethical
b. legal, but unethical
c. illegal, but ethical
d. legal and ethical
LEARNING OBJECTIVES: MIS.10e.4.4
The correct answer is:
legal and ethical
https://mymodules.dtls.unisa.ac.za/mod/quiz/review.php?attempt=27991168&cmid=1084352 4/10
UNISA 2025 INF1505-25-Y Welcome Message Assessment 2
QUIZ
Started on Friday, 13 June 2025, 11:36 AM
State Finished
Completed on Friday, 13 June 2025, 11:44 AM
Time taken 8 mins 21 secs
Grade 25.00 out of 25.00 (100%)
Question 1
Correct
Mark 1.00 out of 1.00
Identify an advantage of centralized processing.
a. It helps in exercising tight control over system operations and applications.
b. It is highly responsive to users’ needs.
c. It has the highest fault tolerance.
d. It is highly compatible with organizational growth because workstations can be added easily.
LEARNING OBJECTIVES: MIS.10e.6.3
The correct answer is:
It helps in exercising tight control over system operations and applications.
Question 2
Correct
Mark 1.00 out of 1.00
In a centralized processing system, processing power is distributed among several locations.
True
False
LEARNING OBJECTIVES: MIS.10e.6.3
The correct answer is 'False'.
https://mymodules.dtls.unisa.ac.za/mod/quiz/review.php?attempt=27991168&cmid=1084352 1/10
,6/13/25, 11:44 AM Assessment 2: Attempt review
Question 3
Correct
Mark 1.00 out of 1.00
Fill in the missing word(s):
are generated by Web server software and record a user’s actions on a Web site.
a. Viruses
b. Junk e-mails
c. Worms
d. Log files
LEARNING OBJECTIVES: MIS.10e.4.1
The correct answer is:
Log files
Question 4
Correct
Mark 1.00 out of 1.00
Fill in the missing words:
is a high-speed carrier service that uses ordinary phone circuits to send and receive data.
a. An analog modem
b. Digital subscriber line
c. Code division multiple access
d. A cable modem
LEARNING OBJECTIVES: MIS.10e.6.2
The correct answer is:
Digital subscriber line
Question 5
Correct
Mark 1.00 out of 1.00
In the two-tier architecture of the client/server model:
a. the presentation logic is always on the client
b. the data management logic is always on the client
c. the application logic is always on the server
d. the application logic is always on the client
The correct answer is:
the presentation logic is always on the client
https://mymodules.dtls.unisa.ac.za/mod/quiz/review.php?attempt=27991168&cmid=1084352 2/10
,6/13/25, 11:44 AM Assessment 2: Attempt review
Question 6
Correct
Mark 1.00 out of 1.00
Which clause is included in the Health Insurance Portability and Accountability Act (HIPAA)?
a. Safeguarding patients’ billing information
b. Protecting patients’ computer records
c. Protecting patients’ credit information
d. Safeguarding conversations between patients and their families
LEARNING OBJECTIVES: MIS.10e.4.1
The correct answer is:
Safeguarding patients’ billing information
Question 7
Correct
Mark 1.00 out of 1.00
Which of the following statements is true of a worm?
a. It is usually hidden inside a popular program, but it is not capable of replicating itself.
b. It floods a network or server with service requests to prevent legitimate users’ access to the system.
c. It is an independent program that can spread itself without attaching itself to a host program.
d. It enables a system designer to bypass the security of a system and sneak back into the system later to access files.
LEARNING OBJECTIVES: MIS.10e.5.4
The correct answer is:
It is an independent program that can spread itself without attaching itself to a host program.
https://mymodules.dtls.unisa.ac.za/mod/quiz/review.php?attempt=27991168&cmid=1084352 3/10
, 6/13/25, 11:44 AM Assessment 2: Attempt review
Question 8
Correct
Mark 1.00 out of 1.00
Which principle states that Internet service providers (ISPs) and government agencies should treat all data on the Internet equally?
a. Internet censorship
b. Net neutrality
c. Internet security
d' Free Basics
LEARNING OBJECTIVES: MIS.10e.4.4
The correct answer is:
Net neutrality
Question 9
Correct
Mark 1.00 out of 1.00
Fill in the missing words:
Mpho, a software programmer at Gamma Inc., develops a program that spreads Trojan viruses to the organization’s network. When
Previn, his manager, discovers that Mpho had intentionally spread the virus, he immediately fires Mpho. In this scenario, Previn’s
behavior is considered .
a. illegal and unethical
b. legal, but unethical
c. illegal, but ethical
d. legal and ethical
LEARNING OBJECTIVES: MIS.10e.4.4
The correct answer is:
legal and ethical
https://mymodules.dtls.unisa.ac.za/mod/quiz/review.php?attempt=27991168&cmid=1084352 4/10