Download as pdf
Download as pdf
You are on page 1of 9
1 3. Which ofthe following itemsare considered computer hardware? (A) Data (B) Programs Ay Output devices (D) Operating systems Data that has been processed and has ‘meaning is termed AAS information (B) database © storage ©) ouput Which of the following can be termed “application software"? (A) Dos (B) Linux (©) Mac Os DF Internet Explorer Which of the following activities would NOT be considered as cloud storage? (A) Data stored on remote servers @y Data stored and accessible on a LAN (©) Data back-up and storage devices on the Internet Datamanaged by storage providers or hosting companies (D) Which of the following could NOT be classified as a cloud-based application? (A) Gmail (B) Drop Box (C) Google drive (Py Windows OS 01229010/MJ/CSEC 2020 ib The lights in a room turn on as soon as person enters. Which input device Mos likely controls the lighting in the room, ABS Sensor (B) Remote (©) Scanner (D) Keyboard Which of the following devices is used tp input data into the computer? LAS Mouse (B) Monitor (©) USB flash drive (D) —_ Extemal hard drive For which of the following interface types is the user required to remember specific instructions and syntax? (A) Menu-driven (B) Graphical user (©) Computer screen Command-driven tem 9 refers 1o the following model of a ‘lobe. The MOST suitable printer for creating the model of the globe is 4 a3-D printer B) laser printer © —anink-jet printer (D) — athermal printer GO ON TO THE NEXT PAGE / d to lofa sg, the is 40, The RP Secondary School wants the administrative staff to have access to all student and teacher data, Which of the following networks would be MOST suitable to enable such access? (A) WLAN ) WAN (MAN (p) LAN tem 11 refers to the following symbol. ~ e ‘1. The symbol represents (A) LAN Wi-Fi (©) Hotspot (D) Bluetooth ‘is referred to as (A) propaganda fe identity theft )_ industrial espionage {BY electronic eavesdropping Double entry data verification involves different data entered once another device different persons Fe-entered by another person Inauthorized, real-time interception of 4 ‘communication on a computer the data entered being copied to 4ifferent data entered once by two _the same data entered once then 14, 15, 16. a7 18. Part of a private network using Intemet technology and public telecommunications that can be accessed by business suppliers, vendors, customers and partners is called an (A) Internet (B) Intranet ey — Extranet (D) Ethernet Which of the following shows an increase in computer memory capacity? (A) Terabyte— Gigabyte Megabyte (B) — Gigabyte—Kilobyte Megabyte (©) Megabyte— Terabyte Gigabyte {(B) Megabyte» Gigabyte — Terabyte Which of the following functions is performed by amodem? (4) Analog and digital (B) Digital and upload (C) Analog and download (D) Download and upload Inthe URL http://www.shoes.com, ‘shoes. ‘com’ stands for the (A) extension BY — domain name (©) company name () _ Internet company ‘Transferring data from a remote computer 10 your computer is referred to as (A) — browsing (B) uploading (©) data mining downloading GO ON TO THE NEXT PAGE 19. 20. z 21. 22. oth! mae Which of the following types of technolo- 23. akies is commonly used by banks to read data on cheques? (A) Pos. (B) OCR (c) OMR MICR 24. Which of the following operations is considered a featureofa biometric system? 48) — Matching fingerprints (B) Detecting imegular heartbeats (C) Diagnosing medical symptoms (D) Helping to lubricate skeletal joints 25. ‘Telecommuting can be BEST described as (A) using the computer while ‘commuting (B) using the telephone while commuting _{©}— working from home by connecting home and office (D) working from the office after establishingaconnectionathome 26. In order to use a program stored on a flash drive, the program must be transferred into prom (p) EPROM Which of the following is NOT a hardwe component of a computer system? (ay Data file (B) Main memory (©) Peripheral device (D) Central processing unit Which of the following checks is NOT a validation technique? (A) Range (B) _ Inconsistency {0° Double entry (D) _ Reasonableness ‘The process of scrambling messages at the sending end and unscrambling them at the receiving end is called (A) coding encryption (©) espionage (D) _ eavesdropping ‘There are many software restrictions used by computers to protect data and maintain data integrity. Which of the following: entities are software restriction me 1. Viruses I, Passwords Il Eneryptions (A) Land Ionly (B) Land Ill only (ef Mand Ik only (D) 1, Mand tit GO ON TO THE NEXT PAGE 32. Which Part of the cen (CPU coordinates it acto Ht oe Register y/ Contot ua ©) Mainwenccy (D) Arithmetic logic unit 33, Before purchasing a com : puter, James was given a sheet with the following hardware specifications. Intel Pentium IV 64 bit 3.6GHz 2GB 533 MHz SORAM 160GB SATA HDD __72001pm The word use of the computer is (A) 2GB By 64 bit (© 7200:pm (D) 533MHz . Which type of interface allows the user to jof Company X sells confidential communicate with the computer system by about his company to Company keying in instructions? s used me the term used for this type of io nae (A) Menu driven i (B) Graphical user (CL Touch sensitive A Command-driven 35, _ Awebmaster is important to the company beoause he/she & is responsible for te company’s website (B) assigns web addresses to all users Eine os the disks: (C) backs up files and stores ‘at another location monitors the shutting ©) competitors’ websites down of Go ON TO THE NEXT ‘which of ate correctly form Lana nape @net @iana.happy.ne! fana@bapry.net Ab) Langhans net ) @) software 1 following OP ove which of th Should beused for applica orsmnerical calculations Database Presentation Spreadsheet ‘Word processing Br © ) ‘The following formulaislocatedin position 6 of a spreadsheet. =B3+B4+SBS5 ‘What would be the resulting formula if the initial formula was copied to the position ocated immediately on the left? (a) 03404465 (B) A3+A4+AS A3+A4+SBS5 (D) C3+C4+SBS5 a query. student ented Fe ewing eerie forthe date i | = 95/11/2017 and <= 05/14/2017 qe ousput will show days (a) ater 14 May 2017 only {py from 11 t0 14 May 2017 He) before 11 May and afer 14 Ng 2017 (py __ between 14 May and 5 Noven 2017 ‘spreadsheet formulae use (A) ___ values or labels (B) __ labels or cell addresses values, ran I addres (D) _ values, labels or © Which ofthe followis to fully justify text? (a) ©) Lin Col The field tt in a databa: (a) (B) © 0) fore prit alte sec ven fay refers to the following table 45. oy Meng data on three countries, Ay B nana sig C, for 2018 and 2019. Country | 2018 2019 x 300 600 only B 500 800 2017 Cc 300 600. N after 14, ] wish of the following types of chars 4 5 Novenye NOT suitable for representing the data above?” wr Pie @) Bar © bine {b) Column 44. The field that uniquely identifies a record ina database is called the buttons antes (A) foreign key £85 primary key (©) alternate key (D) secondary key 46. 259 HM/CSEC 2020 Which of the following sequences of steps is correet for deleting a field in a database table? (A) Choose the delete row option. Select row to be deleted and right click. Open table in design view. Choose yes to confirm deletion. (Open table in design view. Select row to be deleted and right click. , Choose the delete row option. Choose yes to confirm deletion. Select row to be deleted and right click. Open table in design view. Choose the delete row option Choose yes to confirm deletion. © Select row to be deleted and right lick. ‘Choose the delete row option. pen table in design view ‘Choose yes to confirm deletion. ©) the following database table ral ‘Quantiy, 20 Item 46 refers Dee Ttem No. [tte 11050 Hammer 1040 FKO30_| Fork _—p FKO20— FROIS Fok [rxors___ [FO — ove shows r=? | Hammer _1— ‘The database table sorted by Quant descend ‘order Guan in Se ar, No. in a5 on ae item No. i “w @ © wo NEXTPAGE goonTom™ rE pom SL whichofthe followingisused forexecy, 48 rTML code? Read (A, » Ayener 1fA

You might also like