Professional Documents
Culture Documents
Csec Information Technology Paper 1 2023
Csec Information Technology Paper 1 2023
Csec Information Technology Paper 1 2023
W h i c ho f t h e f o l l o w i n g is the B E S T reason
1. Which o f the following are considered 5. for using cloud storage instead o f local
computer hardware? storage?
@ o e , im) c o t
ci
(c) Output devices Cepacity
(D) Operating systems (D) ofuse
system? [ 2 ]
I Touch-screen
IL Barcode reader
Ill. Optical mark reader 6. W h i c h o f the f o l l o w i n g f u n c t i o n s is carried
out in Box Z?
{A) Land I] only
(B) Land I I only (A) Input
(C) Mand I f only (B) Output
(D) I, Wand I l (C) Storage
(D) Processing
(A)
(B)
(C)
(D)
Menu-driven
G r a p h i c a l user
C o m p u t e r screen
Command-driven
>
The symbol represents
{A) LAN
ltem_ 9 refers to the f o t l o w i n g m o d e l of a
(B) Wi-Fi
globe.
(c) WAN
(D) ?_ B l u e t o o t h
(A) propaganda
(B) identity theft
The p r i n t e r M O S T suitable for creating the (C} industrial espionage
m o d e l o f the g l o b e above is (D) _ electronic eavesdropping
(A) ? a 3 - D printer
(B) a laser printer 13. Double-entry data verification i n v o l v e s
(C) an ink-jet printer
(D) a thermal printer (A) different data entered once
(B) the data entered being copied to
another device
10. W h i c h o f the f o l l o w i n g p r o t o c o l s is used (Cc) different data entered once by t w o
to ensure that w e b b r o w s e r s and servers different persons
c o m m u n i c a t e w i t h each other? (D) the same data entered once then
re-entered by another person
(A) IP
(B) FTP
(C) VoIP 14, A w e b developer is important to a c o m p a n y
(D) HTTP because this person
G O O N TO T H E N E X T PAGE
01229010/MJ/CSEC 2023
- 4 -
16, T e l e c o m m u t i n g c a n b e B E S T d e s c r i b e d as
In the URL htup://www.shoes.com, 21.
?shoes.com? represents the
(A) using the computer while
(A) extension commuting
(B) domain name (B) using the telephone while
(C) company name commuting
(D) Internet c o m p a n y (C) working f r o m home b y connecting
home and office
(D) w o r k i n g f r o m the o f f i c e after
17. W h i c h o f the f o l l o w i n g statements about establishing a c o n n e c t i o n at
b i o m e t r i c s y s t e m s is F A L S E ? home
{A) ? A s m a l l a m o u n t o f m e m o r y is used
t o store data. 22, The process o f scrambling messages at the
@) T h e u s e r has t o be present t o use sending end and unscrambling them at the
t h e system. receiving end is called
(C) T h e p e r s o n a l d a t a c a p t u r e d is v e r y
intrusive. (A) coding
(D) T h e l e v e l o f a c c u r a c y is v e r y h i g h . (B) espionage
(C) encryption
(D) eavesdropping
W h i c h o f the f o l l o w i n g t y p e s o f t e c h n o l o -
g i e s is c o m m o n l y used b y banks to read
d a t a on cheques? 23. Which o f the f o l l o w i n g is N O T a hardware
component o f a computer system?
(A) POS
(B) OCR (A) Data file
(C) OMR
(B) Main memory
(D) MICR (C) Peripheral device
(D) Central processing unit
(A) Land II o n l y
(B) a n d III only 3. W h i c h o f the f o l l o w i n g are N O T catego-
(Cc) U and II] only rized as system software?
@ ) ~~ I, M a n d I t
(A) Productivity tools
(B) ?Operating systems
27. W h i c h o f the f o l l o w i n g d e v i c e s can be used (c) Translators
f o r b o t h i n p u t and output? {D) Utilities
(A) Touch-screen
(B) B a r c o d e reader 32. W h i c h o f the f o l l o w i n g statements about
{C) Flatbed scanner the misuse o f c o m p u t e r systems is F A L S E ?
@ ) D o c u m e n t reader
(A) Unlaw f u l l y a c c e osn esc oim p
n u tge r
t r o m a n o t h e r is c o m p u t e r f r a u d .
28. W h i c h o f the f o l l o w i n g is true o f accessing (B) W r o n g t u l l y using another person's
files sequentially? p e r s o n a l d a t a is i d e n t i t y t h e t t .
(Cc) Trying to lure someone into
(A) O c c u r s in any order providing sensitive data is
(B) Starts w i t h the first record phishing.
{C) Starts w i t h the largest data field (D) Accessing a camputer security
(D) Starts w i t h the smallest data field system for i H i c t purposes ts
software piracy,
G O O N T O T H E N E X T PAGE
0 1 2 2 9 0 1 0 / M J / C S E C 2023
-6-
(A) Internet
(B) Intranet
(C) ? Extranet
(D) Ethernet a X
35, Which o f the f o l l o w i n g types o f networks 38. W h a t i s the function o f the small square
Must 4 user access in order to surf the
labelled X ?
Intermet on a tablet from a hotspot on a
beach?
(A) Selecting celts i n ar a n g e
(B) D e l e t i n g t h e c o n t e n t s o f t h e cell
(A) LAN {C) C o p y i n g the contents to other cells
(B) MAN (D) Inserting a new row into the
(Cc) WAN
worksheet
(D) WLAN
W h i c h o f t h e f o l l o w i n g is an e x a m p l e o f a
c o r r e c t l y f o r m a t t e d e - m a i l address?
(A) lana@happy.net
(B) @lana.happy.net
(C) _ _ lana-happy@net
(@) _lana@happy@net
G O O N T o T H E N E X T PAGE
0122901 0/MI/CSEC 2023
- 7 .
= B3 + B4 + $BSS
(A) C3+C4+C5
(B) A3+A4+A5
(C) A3+A4+$B$5
(D) C3+C4+$BS5
DATE AMOU
NT
:
G O ON TO T H E N E X T PAGE
42. A primary key must uniquely identify a record in a table.
IL A single field
Hi. A n y group o f fields
Hi. A g r o u po f c o n c a t e n a t e d f i e l d s
(A) Tonly
(B) ~~? H o n l y
(C) Land I l only
(D) I and I l i only
(A) ES
(B) FS
(C) G4
(D) H4
A N m a w e .
Item 45 refers to the following table.
[Appliance [ M a n u[Serial
f a cNumber
t u [Price
rer
[store |
C o n s
c12312 o l 499
14599 ] ]
[Microwave |S a m s56324 u n | g7899] ]
$20051_
[Refiigerator [ S a m s u n |g ] ]
[
[stove G e oes ] [5460
[Washing machine
| Samsung
[ 3 3 4 9 $3500 5]
4s. The criteria that M U S T be used in a database query to select A L L appliances manufactured by
Samsung that cost more than $3000 is
GO ON TO THE N E X T PAGE
0 1 2 2 9 0 1 0 / M I / C S E C 2023 wae
- 1 0 -
Which o f the following content controls [tem 51 refers to the following algorithm,
would be useful when creating a fillable
electronic form for online use? Read (A, B)
I f A < B Then
lL. Date picker Print(A);
H. Check box
II. ? Drop-down list 51. Inperforming this algorithm, the computer
reads two numbers and prints the
(A) Land II only
(B) Land Hil only (A) _ first number
(C) Mand III only (B) smaller number
(D) 1, Wand I (C) _ first number i f it is larger than the
second number
(D) _ firstnumber i f it is smaller than the
49, It is necessary to include the column titles second number
and row labels when creating a column
chart, to ensure that the
52. Which o f the following constructs will
(A) value on the x-axis is correct execute a sequence o f statements until a
(B) correct headings are displayed specific condition is false?
(C) _ legend for the y-axis is displayed
{ D ) __ totals displayed are correct (A) FORDO
(B) While Do
(C) Repeat Until
Which o f the following features would (D) If-then-Else
give you the old and new versions o f a
previously saved document when using a
word processor? 53. When implementing program, which of
a
GO ON TO THE N E X T PAGE
0122901 2023
W h i c h o f the f o l l o w i n g Programming A c o m p u t e r p r o g r a m m e r is c o d i n g a n
l a n g u a g e s is N O T c o n s i d e r e d to b e h i g h -
a l g o r i t h m w h i c h calculatest h e class average
level?
f o r a given exam. He creates a v a r i a b l e
c a l l e d class_avg. W h i c h data t y p e should
(A) Cc
he s p e c i f y w h e n d e c l a r i n g this variable?
(B) Java
(C) Pascal
(A) Real
(D) Assembly (B) Integer
(C) Boolean
(D) Character
I t e m _ 5 S refers to the f o l l o w i n g d i a g r a m
s h o w i n g steps to s o l v e a p r o b l e m that are
h o t i n c o r r e c t sequence.
I n w r i t i n g an a l g o r i t h m to i m p l e m e n t a
w h i l e t o o p that is t e r m i n a t e d b y the value
999, w h i c h o f the f o l l o w i n g c o n d i t i o n a l
statements s h o u l d be w r i t t e n ?
59, W h a t c o m p o n e n t o f ap r o b l e mt y p i c a l l y uses
W h i c h o f the steps s h o u l d be F I R S T ? the term ?print? to carry out an instruction?
information technology?
(A) Input
(B) Decision
(C) ? Start/Stop
(D) Process and O u t p u t
G O ON TO THE N E Y T p a c e
-12-
(A)
@)
(C)
(D)
END OF TEST
YOuR W o r K
ON THIS TEST.