Csec Information Technology Paper 1 2023

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

- 2 -

W h i c ho f t h e f o l l o w i n g is the B E S T reason
1. Which o f the following are considered 5. for using cloud storage instead o f local
computer hardware? storage?

@ o e , im) c o t
ci
(c) Output devices Cepacity
(D) Operating systems (D) ofuse

2 To use a program stored onaf l a s h drive, following diaer:


i
Item_6 refers to the fo lowing diagram
the program must be transferred into h i c h shows the basic operations o f a

{A) ROM general purpose computer system.


(B) RAM
(C) PROM

3. Which o f the following devices is MOST f J


likely to be used with a point of sale (POS)

system? [ 2 ]
I Touch-screen
IL Barcode reader
Ill. Optical mark reader 6. W h i c h o f the f o l l o w i n g f u n c t i o n s is carried
out in Box Z?
{A) Land I] only
(B) Land I I only (A) Input
(C) Mand I f only (B) Output
(D) I, Wand I l (C) Storage
(D) Processing

4 Which o f the f o l l o w i n g would N O T be . .

considered cloud storage? 7, W h i c h o ft h e f o l l o w i n g devices is used to


Ted input data into a computer?
(A) Data stored on remote servers

(B) Data stored and accessible on a (A) Mouse


LAN (B) Speaker
(C) Data back-up and storage devices (C) USB flash drive
on the Internet (D) External hard drive
(D) Data managed by storage providers
o r hosting companies

0122901 0/MIJ/CSEC 2023 GO ON TO T H E N E X T PAGE


- 3 -

I n w h i c h o f t h e f o l l o w i n gt y p e so f i n t e r f a c e s Item 11 refers to the f o l l o w i n g symbol.


is the user r e q u i r e d t o r e m e m b e r specific
instructions and syntax?

(A)
(B)
(C)
(D)
Menu-driven
G r a p h i c a l user
C o m p u t e r screen
Command-driven
>
The symbol represents

{A) LAN
ltem_ 9 refers to the f o t l o w i n g m o d e l of a
(B) Wi-Fi
globe.
(c) WAN
(D) ?_ B l u e t o o t h

12. Unauthorized, real-time i n t e r c e p t i o n o f


@ private c o m m u n i c a t i o n on a c o m p u t e r
network is referred to as

(A) propaganda
(B) identity theft
The p r i n t e r M O S T suitable for creating the (C} industrial espionage
m o d e l o f the g l o b e above is (D) _ electronic eavesdropping

(A) ? a 3 - D printer
(B) a laser printer 13. Double-entry data verification i n v o l v e s
(C) an ink-jet printer
(D) a thermal printer (A) different data entered once
(B) the data entered being copied to
another device
10. W h i c h o f the f o l l o w i n g p r o t o c o l s is used (Cc) different data entered once by t w o
to ensure that w e b b r o w s e r s and servers different persons
c o m m u n i c a t e w i t h each other? (D) the same data entered once then
re-entered by another person
(A) IP
(B) FTP
(C) VoIP 14, A w e b developer is important to a c o m p a n y
(D) HTTP because this person

(A) is responsible for the company?s


website
(B} assigns w e b addresses t o all users
in a company
(cy backs up w e b files a n d stores the
disks at another location
(D) M o n i t o r s the s h u t t i n g d o w n o f
competitors? websites

G O O N TO T H E N E X T PAGE
01229010/MJ/CSEC 2023
- 4 -

15, Data that has been processed and that has


W h i c h o f the f o l l o w i n g sequences s h o w s 20.
)@ an increase in c o m p u t e r m e m o r y capacity? meaning is termed
-

(A) Megabyte?Terabyte?Gigabyte (A) _ information


(B) Mcgabyte?-Gigabyte?Terabyte (B) database
(C) ? Terabyte?+Gigabyte?Megabyte (c) storage
(D) ? G i g a b y t e ? K i l o b y t e ? M e g a b y t e (D) output

16, T e l e c o m m u t i n g c a n b e B E S T d e s c r i b e d as
In the URL htup://www.shoes.com, 21.
?shoes.com? represents the
(A) using the computer while
(A) extension commuting
(B) domain name (B) using the telephone while
(C) company name commuting
(D) Internet c o m p a n y (C) working f r o m home b y connecting
home and office
(D) w o r k i n g f r o m the o f f i c e after
17. W h i c h o f the f o l l o w i n g statements about establishing a c o n n e c t i o n at
b i o m e t r i c s y s t e m s is F A L S E ? home

{A) ? A s m a l l a m o u n t o f m e m o r y is used
t o store data. 22, The process o f scrambling messages at the
@) T h e u s e r has t o be present t o use sending end and unscrambling them at the
t h e system. receiving end is called
(C) T h e p e r s o n a l d a t a c a p t u r e d is v e r y
intrusive. (A) coding
(D) T h e l e v e l o f a c c u r a c y is v e r y h i g h . (B) espionage
(C) encryption
(D) eavesdropping
W h i c h o f the f o l l o w i n g t y p e s o f t e c h n o l o -
g i e s is c o m m o n l y used b y banks to read
d a t a on cheques? 23. Which o f the f o l l o w i n g is N O T a hardware
component o f a computer system?
(A) POS
(B) OCR (A) Data file
(C) OMR
(B) Main memory
(D) MICR (C) Peripheral device
(D) Central processing unit

Transferring data from a remote computer


to a personal computer is referred to as 24,
Which o f the following can be termed
?application software??
(A) downloading
{B) ? data m i n i n g (A) DOS
(C) uploading (B) Linux
(D) browsing (C) Macos
(D) Google Chrome
55
G O O N T O T H E N E X T PAGE
01229010/MJ/CSEC 2023
25. Which o f the f o l l o w i n g functions is 29. Asystem that analyses data and uses rules
p e r f o r m e d by a m o d e m ? and previous information to deliver possible
decisions is called
(A) Regulatesanalog a n d d i g i t a l signals
(B) Modulates analog and d i g i t a l (A) a robot machine

signals (B) an expert s y s t e m


(C) Prevents analog and d i g i t a l signals (Cc) a biometric machine
from being uploaded (D) amainframe computer
{D) Prevents analog and d i g i t a l signals
from being downloaded
30. Anofficial o f C o mX s ep l l s ca o n fni d e nyt i a l
i n f o r m a t i o n about his c o m tpo Ca o mn p ayn y
26. W h i c h o f the f o l l o w i n g p r o v i d e p r o o f that Y. W h a t is the t e r m used f o r this t y p e o f
the e x t e n s i v e use o f I C T has had a p o s i t i v e i n f o r m a t i o n misuse?
i m p a c t o n the f i e l d o f business?
(A) Identify theft
I. E-commerce (B) C o m p u t e r fraud
il. E l e c t r o n i c p o i n t o f sale systems (C) I n d u s t r i a l espionage
Hl. Telecommuting (D) Electronic eavesdropping

(A) Land II o n l y
(B) a n d III only 3. W h i c h o f the f o l l o w i n g are N O T catego-
(Cc) U and II] only rized as system software?
@ ) ~~ I, M a n d I t
(A) Productivity tools
(B) ?Operating systems
27. W h i c h o f the f o l l o w i n g d e v i c e s can be used (c) Translators
f o r b o t h i n p u t and output? {D) Utilities

(A) Touch-screen
(B) B a r c o d e reader 32. W h i c h o f the f o l l o w i n g statements about
{C) Flatbed scanner the misuse o f c o m p u t e r systems is F A L S E ?
@ ) D o c u m e n t reader
(A) Unlaw f u l l y a c c e osn esc oim p
n u tge r
t r o m a n o t h e r is c o m p u t e r f r a u d .
28. W h i c h o f the f o l l o w i n g is true o f accessing (B) W r o n g t u l l y using another person's
files sequentially? p e r s o n a l d a t a is i d e n t i t y t h e t t .
(Cc) Trying to lure someone into
(A) O c c u r s in any order providing sensitive data is
(B) Starts w i t h the first record phishing.
{C) Starts w i t h the largest data field (D) Accessing a camputer security
(D) Starts w i t h the smallest data field system for i H i c t purposes ts
software piracy,

G O O N T O T H E N E X T PAGE
0 1 2 2 9 0 1 0 / M J / C S E C 2023
-6-

Item 37 refers to the f o l l o w i n g form.


33. B e f o r e p u r c h a s i n g a c o m p u t e r , James w a s
g i v e n a sheet w i t h the f o l l o w i n g h a r d w a r e
specifications.

Intel Pentium I V 64 bit

3.6 G H z 2GB RAM Date of Birth


Day/Month/Vear
160 G B SATA H D D 7200 rp

The C P U speed o f the computer is


37. Which of the followingt a b l e editing features
(A) 2GBRAM was applied to the shaded cells i n the form?
( B ) = 64 bit
(C) 7200 rpm (A) Merge
(D) 3.6 G H z (B) = Split
(C) Shift
(D) Insert
T h e p a r t o fa p r i v a t e n e t w o r k u s i n g I n t e r n e t
t e c h n o l o g y and p u b l i c telecommunications
t h a t c a n be accessed b y b u s i n e s s s u p p l i e r s , I t e m 3 8 refers to t h e f o l l o w i n g f i g u r e f o u n d
v e n d o r s , c u s t o m e r s a n d partners is c a l l e d an in a spreadsheet.

(A) Internet
(B) Intranet
(C) ? Extranet
(D) Ethernet a X

35, Which o f the f o l l o w i n g types o f networks 38. W h a t i s the function o f the small square
Must 4 user access in order to surf the
labelled X ?
Intermet on a tablet from a hotspot on a
beach?
(A) Selecting celts i n ar a n g e
(B) D e l e t i n g t h e c o n t e n t s o f t h e cell
(A) LAN {C) C o p y i n g the contents to other cells
(B) MAN (D) Inserting a new row into the
(Cc) WAN
worksheet
(D) WLAN

W h i c h o f t h e f o l l o w i n g is an e x a m p l e o f a
c o r r e c t l y f o r m a t t e d e - m a i l address?

(A) lana@happy.net
(B) @lana.happy.net
(C) _ _ lana-happy@net
(@) _lana@happy@net

G O O N T o T H E N E X T PAGE
0122901 0/MI/CSEC 2023
- 7 .

39. The following formula is located in position B6 o f a spreadsheet.

= B3 + B4 + $BSS

I f the f o r m u l a is c o p i e d to the position located i m m e d i a t e l y on the left, w h a t w o u l d be the resulting


formula?

(A) C3+C4+C5
(B) A3+A4+A5
(C) A3+A4+$B$5
(D) C3+C4+$BS5

e m s 40 and 41 refer to the following database table.

DATE AMOU
NT

HEINZX 11/11/2019 | s1000 |

T h e m a n a g e r wants to f i n d the names o f the suppliers w h o received their product orders. W h i c h


fields w o u l d be used in the query?

(A) ? S u p p l i e r and Received


(B) Product I D and Supplier
(C) Product I D and Received
( D ) ? S u p p l i e r and A m o u n t O w e d

41. T w o fields that can be selected as part o f a calculation are

{A) S u p p l i e r and Received


(B) Product I D and Supplier
(C) Product I D and Received
(D) Date Ordered and A m o u n t O w e d

:
G O ON TO T H E N E X T PAGE
42. A primary key must uniquely identify a record in a table.

Which o f the following would qualify as a primary key?

IL A single field
Hi. A n y group o f fields
Hi. A g r o u po f c o n c a t e n a t e d f i e l d s

(A) Tonly
(B) ~~? H o n l y
(C) Land I l only
(D) I and I l i only

Items 43 a n d 4 4 refer t o the f o l l o w i n g w o r k s h e e t s h o w i n g students? m a r k s i n f o u r tests.

43. i f the data in C e l l E 4 is changed. this w o u l d M O S T l i k e l y a f f e c t C e l l

(A) ES
(B) FS
(C) G4
(D) H4

In o r d e r to create a spreadsheet chart w h i c h c o m


would be used are P pares the average f o r each test, the ranges whi

(A) A I : F 1 and A7:F7


(B) ? CI:F1 and C7:F7
(C) C2:F2 and C6:F6
(D) <A2:F2 and A 6 : F 6

A N m a w e .
Item 45 refers to the following table.

[Appliance [ M a n u[Serial
f a cNumber
t u [Price
rer
[store |
C o n s
c12312 o l 499
14599 ] ]
[Microwave |S a m s56324 u n | g7899] ]
$20051_
[Refiigerator [ S a m s u n |g ] ]
[
[stove G e oes ] [5460
[Washing machine
| Samsung
[ 3 3 4 9 $3500 5]
4s. The criteria that M U S T be used in a database query to select A L L appliances manufactured by
Samsung that cost more than $3000 is

(A) M a n u f a c t u r e r = ?Samsung? and ( p r i c e > 3000)


(B) M a n u f a c t u r e r = ?Samsung? o r (price > 3 0 0 0 )
(Cc) M a n u f a c t u r e r = ?Samsung? and (price < 3000)
(D) = M a n u f a c t u r e r = ?Samsung? o r (price < 3 0 0 0 )

W h i c h o f the f o l l o w i n g sequences o f steps 47. ? W h i c h o f the f o l l o w i n g activities have to


f o r deleting a record in a database table is take place for a user to f o l l o w a h y p e r l i n k
correct? to an email address and send an email?

L Choose the delete r o w option. L The installed email s o f t w a r e is


IL. Select the r o w to be deleted and loaded.
right c l i c k . tl. The user w i l l write the email.
It. O p e n table in design view. UL. The user w i l l then send the email.
IV. Choose yes to c o n f i r m deletion.
(A) Tand H o n l y
(A) 1, I I , 1 , I V (B) a n d I I only
(B) TH, 1 , TV (Cc) If a n d H I o n l y
(c) I l , U1, 1, 1 V (D) 1, H a n d 1
(D) IL, 1,10, 1V

GO ON TO THE N E X T PAGE
0 1 2 2 9 0 1 0 / M I / C S E C 2023 wae
- 1 0 -

Which o f the following content controls [tem 51 refers to the following algorithm,
would be useful when creating a fillable
electronic form for online use? Read (A, B)
I f A < B Then
lL. Date picker Print(A);
H. Check box
II. ? Drop-down list 51. Inperforming this algorithm, the computer
reads two numbers and prints the
(A) Land II only
(B) Land Hil only (A) _ first number
(C) Mand III only (B) smaller number
(D) 1, Wand I (C) _ first number i f it is larger than the
second number
(D) _ firstnumber i f it is smaller than the
49, It is necessary to include the column titles second number
and row labels when creating a column
chart, to ensure that the
52. Which o f the following constructs will
(A) value on the x-axis is correct execute a sequence o f statements until a
(B) correct headings are displayed specific condition is false?
(C) _ legend for the y-axis is displayed
{ D ) __ totals displayed are correct (A) FORDO
(B) While Do
(C) Repeat Until
Which o f the following features would (D) If-then-Else
give you the old and new versions o f a
previously saved document when using a
word processor? 53. When implementing program, which of
a

the following steps comes afterexecuting?


(A) S A V E A S w i t h f i l e extension
(B) S A V E A S w i t h the o l d f i l e n a m e
(A) Linking
(C) S A V E A S w i t h a n e w file type
(B) ? Compiling
(D) S A V E A S with a n e w filename
(C) Maintaining
(D) Interpreting

GO ON TO THE N E X T PAGE
0122901 2023
W h i c h o f the f o l l o w i n g Programming A c o m p u t e r p r o g r a m m e r is c o d i n g a n
l a n g u a g e s is N O T c o n s i d e r e d to b e h i g h -
a l g o r i t h m w h i c h calculatest h e class average
level?
f o r a given exam. He creates a v a r i a b l e
c a l l e d class_avg. W h i c h data t y p e should
(A) Cc
he s p e c i f y w h e n d e c l a r i n g this variable?
(B) Java
(C) Pascal
(A) Real
(D) Assembly (B) Integer
(C) Boolean
(D) Character
I t e m _ 5 S refers to the f o l l o w i n g d i a g r a m
s h o w i n g steps to s o l v e a p r o b l e m that are
h o t i n c o r r e c t sequence.
I n w r i t i n g an a l g o r i t h m to i m p l e m e n t a
w h i l e t o o p that is t e r m i n a t e d b y the value
999, w h i c h o f the f o l l o w i n g c o n d i t i o n a l
statements s h o u l d be w r i t t e n ?

(A) While number = 999 do


(B) W h i l e number < > 999 do
(Cc) W h i l e n u m b e r = 999 then
(D) W h i l e n u m b e r < > 999 then

59, W h a t c o m p o n e n t o f ap r o b l e mt y p i c a l l y uses
W h i c h o f the steps s h o u l d be F I R S T ? the term ?print? to carry out an instruction?

(A) G e t C X C certificate. (A) Input


(B) Write C X C examination. (B) Process
(Cc) Pass C X C e x a m i n a t i o n . (Cc) Storage
(D) L e a r n C X C subject content. (D) Output

What does the symbol < > represent in

information technology?

(A) Input
(B) Decision
(C) ? Start/Stop
(D) Process and O u t p u t

G O ON TO THE N E Y T p a c e
-12-

Item 60 refers to the following algorithm.

Write (?Enter price: ") (1)


Read (price) (2)
Vat: ? price * 15% Q)
Write Vat (4)

Which line contains a processing statement?

(A)
@)
(C)
(D)

END OF TEST

IF YOU FINISH BEFORE TIME IS CALLED, CHECK ?CK

YOuR W o r K
ON THIS TEST.

You might also like