Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

The answer is C - The sensor (could be

output devices like a motion sensor)


printer, monitor, speaker, would tell when the person
etc. enters the room and then
switch on the lights.

Correct answer is A -sensor

Programs cannot be run


from secondary storage
like your flash drive. They - mouse is only input device.
first have to be transferred - output device
into B - RAM. From RAM - secondary storage
the instructions in the program - also secondary
can be carried out. storage.
The answer is A - mouse.

Correct answer
D command-driven
Biometrics - the measurement/ analysis of people's
unique physical characteristics. The answer is A -
matching
fingerprints. A command-driven interface such as used
by MS DOS requires you to remember
specific instructions and syntax.

The answer is B where the data is stored


on the LAN - Local Area Network and so
is not in the cloud.

Only a 3-D printer


can create a model
of the globe above.
The Windows OS is based on a particular Answer is A - a 3-D
desktop/ laptop and is therefore not cloud printer.
based. The answer is D.
The answer is D - HTTP
Hyper-text transfer protocol.

A - is responsible for the company's website

Answer is B - megabyte, gigabyte, terabyte

kilobyte, megabyte, gigabyte, terabyte

Of course the anwser is Wi-Fi.


Answer is D -
Internet company.

shoes.com would be the internet company

Answer is B - Double entry.


D - Electronic eavesdropping.
validation check
verification check
validation check
Correct validation check
answer Remember double entry is a verification check and
-D NOT a validation check

Answer is C - MICR

Verification is checking for transcription errors when Point of Sale used in retail
entering data from the source document to the Optical character recognition
computer. There are two verification checks
1) Visual check 2) Dual input or double entry.
Magnetic ink character recognition
Dual input or double entry is where the same data
is entered again by another person and the two copies OMR - Optical mark recognition
of the data are compared. Any mistakes so detected are OMR used in multiple choice answer sheets.
then corrected OCR used in utility bills such as electricity
bill.
MICR used with bank cheques.
From a remote computer to Correct answer is
your computer is downloading. A - Data file.
Answer is D -
Downloading. From your computer to a remote
computer is uploading.
A data file is not hardware.
Example I have to upload your SBA from my computer to the CXC computer.
Example I can download past papers from CXC website

Correct answer is D - internet


Correct answer is A. Internet explorer.
Information is processed data. It is a browser which
means its application
software.

DOS, Linux and Mac Os are all operating


systems which is system software.

Answer is C
B -Working from home by connecting MODEM (MOdem, DEModulate).
home and office. Correct answer is A
B -- modulates
regulates analog
analogand
and
digital signals

Correct answer is
C - II and III Only.

Encryption is scrambling messages at the receiving end


and unscrambling them at the receiving end.

Viruses DO NOT protect data and maintian


data integrity. Anti virus software protects
data and maintains data integrity.
Passwords and Encryptions are both
software based methods that protect data
and maintain data integrity.
Correct answer B - Control
Obviously Unit
the touchscreen
can display output
and when you touch
it it is functioning
as an input device.
Correct answer is A - touchscreen.

Correct answer B

Sequential file access means you start from


the first record.

Correct answer is D - touchscreen.

Touchscreen is a hardware
Correct answer is B - 3.6 GHz
user interface.
- size of RAM

Circular speed of the hard drive


- speed of the memory
rpm means revolutions per minute which in this
case is how fast the hard drive rotates.

Intranet is a private company


network. When a company
allows suppliers, customers,etc
Correct answer is C - Industrial Espionage. access
to theirto
limited their to
intranet
access intranet
ittheir it iscalled
is then thenit
intranet
Espionage means spying. called
anthen
is an extranet.
extranet.
called an extranet.

Correct answer C - Extranet

Operating systems, Translators and utilities are


all examples of system software. Productivity
tools would be used to perform tasks for the user
and would fall under application software Correct answer is D - Touchscreen/specialized
keyboard because its hardware with a user
interface (which is the touchscreen)
Correct answer is A
- lana@happy.net

My email is shivaclarence@hotmail.com
Compare the two.

Database (Access) is to store/ retrieve data


Presentation software (Powerpoint) is to do presentations
Spreadsheet (Excel) is to do repetitive, Correct answer A - Pie chart
numerical calculations. Pie charts are best when you
Wordprocessing (Word) is to do up have one set of data and you
letters, documents such as need to show percentages
Social studies SBA, etc. out of 100%. The pie chart
will not be able to show the
Correct answer C -Spreadsheet
data for the three countries and the two years.

Correct answer is
B - block

Correct answer D - values, labels and cell


addresses.

Correct answer C

This is an example of both relative and absolute cell referencing.


With relative cell referencing the cells referenced in the formula Correct answer D
change accordingly. So B3 and B4 change to A3 and A4. This
makes sense because you will now be adding the numbers in
column A.
With absolute cell referencing, the cell references remain fixed on
that particular cell and do not change. This is achieved by putting the With full justification both edges of the
dollar sign character in the cell reference for $B$5 so the cell reference text will be straight as shown above.
remains the same. It does not change.
1. Open table in design view
2. Select row to delete
3. Right click and select delete
row option
4. Confirm deletion
Correct answer B
Correct answer B

A candidate key is an attribute


(field) or set of attributes that
you can consider as a primary
key.
A candidate key not selected
as a primary key is called a
secondary or alternate key.
All of the choices are
Correct answer B - primary key.
correct.
Correct answer D

All of the choices are


useful when creating
an online fillable form.
Correct answer D

Correct answer D

Ascending order with numbers means the numbers


are in increasing order i.e., smallest to largest.
Ascending order with text or letters means the data
is in alphabetic order i.e., starting with a and moving
down to a.
Descending order with numbers means the numbers
are in decreasing order i.e., largest to smallest.
Descending order with text means the data is in
reverse alphabetic order i.e., starting with z and
moving up to a
With mailmerge there is a primary document
and a data file. The names and any other
Correct relevant data can then be inserted from
answer - the data file into the one primary
C document. It is an easy way to create
and send many documents using Correct answer A - IF THEN ELSE.
one primary document. Example - If mathsmark > 60 Then Print "Pass"
This is useful for say a secretary in a school who has to send Else Print "Fail"
a letter out to parents of all form 1 children. She only has
to type up
one primary document.
Correct answer C
Maintaining a program is
making any required
changes to the program.
Maintaining a program
is not making changes to correct errors. For
example if its a tax program and the tax laws
change. Then program maintenance is needed.

1st gen - machine language


2nd gen - assembly language
3rd gen - high level languages
Correct answer C. Merge and centre is useful to format 4th gen
the MAIN HEADING of a table in excel. NOT THE COLUMN 5th gen
HEADINGS. Correct answer D - assembly
C, Pascal and Java are all 3rd gen i.e., high
level languages

Variable names which are


names for your data used
in a program can have
numbers in them but the
variable names cannot start
with a number. 2count is not
a valid variable name.
Correct answer - D

Correct answer D
Correct answer B - the decision box will show
the test to be carried out.
Correct answer A - Constant

- number with a fraction part 40.345


- whole number 40, 2, 3012, etc
- true or false value
- single character such as
"F" for female or "M" for male.

Remember to understand the algorithm better you


can simply replace the arrow with an equal sign.
The processing (calculating)
would be Vat = price * 15%
Correct answer C - Prompt, read, process. Therefore correct answer is C - line 3
Example:
Prompt person at keyboard to enter two numbers
Read two numbers
Add two numbers.

You might also like