Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

Read the following instruction carefully before you start answering the questions in this paper.

Make sure you have


a soft HB pencil and an eraser for this examination.
1. USE A SOFT HB PENCIL THROUGHOUT THE EXAMINATION.
2. DO NOT OPEN THIS BOOKLET UNTIL YOU ARE TOLD TO DO SO.
Before the examination begins:
3. Check that this question booklet is headed “Advanced Level – 0796 ICT 1”
4. Fill in the information required in the spaces above.
5. Fill in the information required in the spaces provided on the answer sheet using your HB pencil:
Candidate Name, Exam Session, Subject Code, Centre Number and Candidate Identification Number. Take care that you do not
crease or fold the answer sheet or make any marks on it other than those asked for in these instructions.
How to answer the questions in this examination
6. Answer ALL the 50 questions in this examination. All questions carry equal marks.
7. Each question has FOUR suggested answers: A, B, C and D. Decide on which answer is correct. Find the number of the question on
the Answer Sheet and draw a horizontal line across the letter to join the square brackets for the answer you have chosen.
For example, if B is the correct answer, mark B as shown below:
[A] [B] [C] [D]
8. Mark only one answer for each question. If you mark more than one answer, you will score a zero for that question. If you change your
mind about an answer, erase the first mark carefully, and then mark your new answer.
9. Avoid spending too much time on any one question. If you find a question difficult, move on to the next question. You can come back
to this question later.
10. Calculators are allowed.
11. Do all rough work in this booklet, using, where necessary, the blank spaces in the question booklet.
12. At the end of the examination, the invigilator shall collect the answer sheet first and then the question booklet. DO NOT
ATTEMPT TO LEAVE THE EXAMINATION HALL WITH ANY.

01/0796/ICT P1 A/L
©TRC/RPI/0796/1/SOREMEX/2024 Page 1
1. The correct order of the stages of a system 7. The paradigm in which the programmer
development life cycle is; designs programs by outlining steps to be
[A] Analysis, Feasibility study, followed to solve problem is called:
implementation, Design [A] Top-down programming
[B] Feasibility study, Analysis, Design, [B] Declarative programming
implementation [C] Procedural programming
[C] Analysis, Design, Feasibility study, [D] Objected-oriented programming
implementation
8. An algorithm that compares two adjacent
[D] Feasibility study, Analysis,
items and then swaps them, is
implementation, Design [A] Insertion sort
2. The principle of the Data Protection Act [B] Selection sort
(1998) is; [C] Merge sort
[A] Data should be processed immediately [D] Bubble sort
[B] Data should be valuable
9. In project management, the amount of time
[C] Data should not be stolen
a task can be delayed without delaying the
[D] Data should be kept up to date
project is called:
3. A program at the time of execution is [A] Lead time
known as ______ [B] Critical time
[A] Thread [C] Lag time
[B] Algorithm [D] Slack time
[C] Instruction set
10. The file format JPEG stands for:
[D] Process [A] Joint Picture Experts Group
4. The following are possible health hazards of [B] Joint Pictures Experts Graphics
prolonged use of computer system except [C] Joint Photographic Experts Group
[A] Back to neck pains [D] Joint Photographic Experts Graphics
[B] Eye strain
11. The correct spreadsheet formula for the
[C] Tuberculosis
average of two cells A1 and A2 where A1 is
[D] Wrist pains
possibly blank is:
5. _______ is the protocol suite for the [A] = (A1:A2)/2
Internet. [B] average(A1+A2)
[A] TCP/IP [C] AVERAGE((A1+A2)/2)
[B] OSI [D] average(A1,A2)
[C] ISP
12. An information system that does NOT
[D] HTML
directly assist in the management of an
6. The following are constraints of a project organization is:
Except [A] Management Information System
[A] Scope [B] Geographic Information System
[B] Resources [C] Health Information System
[C] Team [D] Decision Support System
[D] Budget

01/0796/ICT P1 A/L
©TRC/RPI/0796/1/SOREMEX/2024 Page 2
13. A 32-bit computer can access how many 19. A switching technique in which a dedicated
bytes at a time? communication path is established,
[A] 4 maintained and terminated for each
[B] 2 communication session is:
[C] 8 [A] Circuit switching
[D] 16 [B] Message switching
[C] Packet switching
14. How many CDs of 700MB capacity can
[D] Logic switching
contain 100 newsletters from a digital
library assuming that the average number 20. An example of a mono tasking operating
of characters of each newsletter is 1000? system is:
[A] 10 [A] Windows
[B] 11 [B] Macintosh
[C] 1 [C] MS DOS
[D] 70 [D] Linux
15. Which of the following devices has the 21. Which of the following is not a reason for
largest storage capacity? using ICT in education
[A] Digital Versatile Disc [A] ICT tools increase learner motivation and
[B] Compact Disc engagement
[C] Floppy disk [B] ICT tools facilitate that acquisition of
[D] Hard disk basic skills in subject area.
[C] ICT tools enhance teaching through the
16. A service which can be used by the state of
use of presentation software
Cameroon to provide online services to its
[D] ICT tools force students to learn at others’
citizens is known is __
pace.
[A] E-mail
[B] Web routing 22. Transferring data from a remote computer
[C] Legislation to a local computer is referred to as
[A] Uploading
[D] E-government
[B] Downloading
17. It is a situation in which a process can never [C] Transferring
terminate because it cannot get the resource [D] Downlinking
it needs to continue execution.
[A] Deadlock 23. Spooling is necessary because
[A] It is a more secure method of accessing
[B] Livelock
data
[C] Mutual exclusion
[B] Print jobs go more smoothly with less stop
[D] Process synchronization
and go
18. A baseband communication system [C] The computer is released to do other things
transmits signals in ______ while still printing
[A] Wave form [D] It enables the operating system to function
[B] Electromagnetic form properly
[C] Analogue form
[D] Digital form

01/0796/ICT P1 A/L
©TRC/RPI/0796/1/SOREMEX/2024 Page 3
24. A method that can prevent illegal access to 30. The intersection of the 8th row and the 7th
computer systems through networks is: column in a spreadsheet application will
[A] Encryption of files give the cell reference
[B] Use of firewall [A] 8G
[C] Use of antivirus software [B] G8
[D] Archiving [C] 7H
[D] H7
25. Below is the correct format of an email
address: 31. Which of the following data structures is
[A] User_name@DomainName. referred to as a LIFO (Last In First Out)
[B] user_name@Website.com/info. abstract data type?
[C] user_nametAVesite.info [A] List
[D] markjohn@yahoo.com [B] Queue
[C] Stack
26. A functional requirements report indicates [D] Tree
the work done in the __________ phase of
SDLC. 32. Which of the following cables is the fastest
[A] Development channel of communication in computer
[B] Analysis networks?
[C] Design [A] Fiber optic
[D] Investigation [B] Coaxial cable
[C] Unshielded twisted pair
27. In writing codes in a programming [D] Shielded twisted pair
language, the programmer must follow the
rules of the language called: 33. Which of the following is most suitable for
[A] Syntax analyzing large quantities of data such as in
[B] Protocol weather forecasting?
[C] Semantics [A] Minicomputer
[D] Lexeme [B] PC
[C] Supercomputer
28. It is the process of trying to predict what [D] Mainframe computer
will happen in a real life situation from a
model of that situation. 34. Which device sends information only to
[A] Simulation requesting computers in a network?
[B] Monitoring [A] Switch
[C] Modeling [B] Node
[D] Prototyping [C] Server
[D] Hub
29. Which of the following software can be used
to enhance teaching and learning through 35. It is a database language concerned with the
the use of pictures, video and sound? definition of the whole database structure
[A] Multimedia software and schema.
[B] Network software [A] DDL
[C] Programming software [B] DML
[D] Utility software [C] DCL
[D] SQL

01/0796/ICT P1 A/L
©TRC/RPI/0796/1/SOREMEX/2024 Page 4
36. In low level programming languages, 42. Which of the following is NOT an
[A] Code are written in a form that the integrated software package?
computer can easily execute [A] OpenOffice
[B] Programmers easily write codes using [B] Lotus Smart Suite
them [C] Microsoft Access 2007
[C] Programs are cheaper to design [D] Microsoft Office 2010
[D] Codes can be used to write programs for
43. Which of the following registers keeps track
difficult tasks.
of where an instruction is kept in main
37. The number 4683 is not a possible number memory?
in base 8 because: [A] Memory Address Register
[A] It does not contain binary digits [B] Memory Data Register
[B] It contains only four digits [C] Instruction Register
[C] It is not divisible by 8 [D] Program Counter
[D] It contains the digit 8
44. Software available free of charge but
38. The binary equivalent of the hexadecimal requires the user to pay a fee for its
number F2E is: upgrade is:
[A] 001011110000 [A] Shareware
[B] 111100101110 [B] Firmware
[C] 111100100111 [C] Freeware
[D] 010111101111 [D] Public domain
39. Which of the following is true about 45. A network that gives access to some users
multitasking systems? outside the organization is known as:
[A] Several CPUs are needed to process a task
[A] The internet
at a time [B] Extranet
[B] Several users can access the same task at a [C] Intranet
time [D] Inter-networking
[C] A CPU can process several tasks at a time
[D] Several CPUs with each processing a 46. A field in a database table which appears as
different task a primary key in another database table is
40. The collection of principles that judge called a
people’s actions whether they are right or [A] Candidate key
wrong is called: [B] Secondary key
[A] Legislation [C] Foreign key
[B] Data Protection Act [D] Primary key
[C] Ergonomics 47. Virtual memory is:
[D] Ethics [A] An extremely large main memory
41. Communication between the keyboard and [B] An illusion of an extremely larger main
the CPU involves __________ memory
[A] Simplex [C] An extremely large secondary memory
[B] Half-duplex [D] A type of memory used in supercomputers
[C] Full-duplex
[D] Self-duplex

01/0796/ICT P1 A/L
©TRC/RPI/0796/1/SOREMEX/2024 Page 5
48. The measurement of things such as 49. Which of the following loops will be
fingerprints and retinal scans used for executed at least once?
security access is called: [A] While loop
[A] Biometrics [B] Do…while loop
[B] Bio-measurement [C] For loop
[C] Computer security [D] All of the above
[D] Smart weapon machinery
50. It refers to rules about acceptable behavior
when communicating online.
[A] Computer ethics
[B] Code of conduct
[C] Protocol
[D] Netiquette

END

STOP
GO BACK AND CHECK YOUR WORK

01/0796/ICT P1 A/L
©TRC/RPI/0796/1/SOREMEX/2024 Page 6

You might also like