You are on page 1of 8
2- Which ofthe folowing devices is usedto 6 input data into the computer? (A) Monitor (@) Mouse (©) External bard drive {D) USB fash drive Scanning an item at a computerized checkout station in a supermarket is en example of 1 (A) input (B) ouput (©) storing (D) processing [A diskette is divided into number of concent circles called 8 (A) sectors (®) cylinders (©) wacks (©) clusters ‘The primary storage device that holds the data curently being processed by the computer is known as the (A) Read Only Memory (ROM) (B) Random Access Memory (RAM) (C) Programmable ROM (PROM) (0) _Enasableand Programmable ROM (EPROM) “The hardware device that allows the user 10. to see the results eter processing isthe (A) monitor (8) camera (©) scanner (D) webcam ‘What type of management occurs when the operating system undertakes ‘communication between a printer andthe system unit? Ww File (B) Process ©) Memory (D) _Tnpuvourput Which ofthe following bas he rest data sorage capacity? (A) Optical drive (B) USB Flash drive (©) Flash memory card (©) Harddrive In which of the following interface types is the user required to remember specific intrutions and syatax? (A) Meou-driven interface (8) Computer seen interface (©) Commmand-driven interface (D) Graphical use interface In modern personal computers the CPU speed is measured in (A) nanoseconds ®) milliseconds (©) Miz (D) Giz Which of the following is NEITHER a validation NOR a verification check? (A) Storage media check 'B) Inconsistency check {C) Datatype check. {D) Range checke Go ON TO THE NEXT PAGE um 1B. 15, <3. ‘An exemple of operating system software s wa @) © © Microsoft Windows Microsoft Oftice Microsoft Word Microsoft Excel Advantages of electronic information Processing include (A) retining of stat () _lesshuman intervention (©) increased amount of equipment (©) less savings on hardcopies Which of the following represents a hhexadecimal?| sc, ® 10, © 15, ©) 23 ‘The twos complement of binary number is formed by (A) changing alt zeros to twos (B) changing all ones to twos (finding he ones complement wice rio) ‘Addingone tothe ones complement Which of the following provides transmission of data BOTH directions atthe same time? w ®) © © Half Duplex Full Duplex ‘Null Duplex Simplex. ing: 16. 1" In the URL hilhnwsshossom, ‘shoes con’ represents forthe (A) extension @) company name (C) domain name }intemet company ‘Which of the following is NOT required to suocessflly implement teleconferencing? (a) senor ®) Mocen (©) Speaker (©) Meroptone Which type of processing system will use sequential ile organtzation? (A) Real time processing (B) Batch processing (©) Transaction processing (D) Online processing Transfering data from a remote computer to your computer i refered to as (A) uplosding 8) browsing (©) downloading ©) dam mining Scrambling of messages atthe sendicgend and unscramblingthematthereceivingend Isealed (A) espionage (B) encryption © coang (D) eavesdropping GO ON TO THE NEXT PAGE mae 21, The introduction of communication by 26. The iegal copying, distribution or sale of means of computers has reduced the proprietary software is known as employment of which of the following sroups? (A) computer fraud (B) computer thet (A) Messengers and postal workers (©) software fraud (B) Analysts and programmers (D) sofware pracy (©) Software testers and eines {D) Webmasters and developers 27. Wireless transmission media do NOT 22, A webmaster is important to the company fchode aa (A) conxial . we ee 8 cen (B) monitors the shutting down of competitors’ websites. (©) assigns web addresses to all users 3. Which of the following represents the ‘ina company th of the following represents the (D) is responsible for the company caaoaereeoeey wees (A) Digital and upload (B) Analog and digial 23, Working from home and linking to the (©) Analog and download office computer system to submit work is (©) Download and upload described as (A) teleconferencing 29, Which ofthe following computer crimes, (B) telecommuting coceurs when someone gathers coofidetil (©) telemarketing {information about another individual and (©) teleworking then impersonates tat individual in order ‘commit fraud? 24 Which of the following actions must be (A) entity thet taken to get to record Number 50 of 100 (B) Software piracy records ona floppy disk? (©) Computer fraud (D) Electronic eavesdropping (A) Convertto tape. (B) _Fastforwardtorecord 00,andthen read backward 30, Whichofthe following statementsisTRUE (©) First read records 1 through 49. about accessing files sequentially? (D) _ Godirecly to record 50. (A) Occurs in any order (B) Starting with the first record 25, Which ofthe following is detected by the (C) Starting with the largest data eld use ofa pressure sensor? (D) Staring wide smallestdataild (a) Motion (B) Light (©) Weight Heneicgge — (D)— Warmth GO ON TO THE NEXT PAGE 31, Which of the following is NOT « method ‘of making text stand ou in a document? (A) Bold (B) Subscript (©) Undertine (D) Enlarging font size 32. While ryping in document sing a word procestor, Susan made the followingerrors. “I beard that Sanday was the last day for the shew. ‘The fenture ofthe software tha allows her to locate and correct such errors i the (A) spell check (B) grammar check (©) consistency check (D) reasonableness check 33. While typing 2 document it may be necessary to change the height of the ‘characters. Which feature in Microsoft Word would be used? (A) Letersize (B) Peper size (©) Pagesize (D) Fontsize 34. Theimersceton ofa row and «column ia a spreadsheet is called a cell (B) label © range ©) value 35. In PowesPoin the view that permits the inseron of slides i the (A) normal (B) note page (©) slide show (D) presenter a 39. ‘Which ofthe following is NOT valid data type in Microsoft Access? (A) Text (B) Auto-number (©) Dateline ©) Character Which of the following is the default justification of numbers in spreadsheets? Leh ®) Full (©) Centred ©) Rishe Which ofthe following types of software should be used for applications that involve ‘repetitive numerical ealeulatons? (A) Database (B) Operating system (©) Spreedsheer (D) Word processing ‘Spreadsheet formulae use (A) values, labels cell address (B) values, mathematical operators ot cell addresses (©) labels or cell addresses (D) values orcelladdresses In creating a query, «student entered the following criteria forthe date fel. >= 05/11/2011 snd <= 05/14/2011, The output will show days (A) afer 14th May 2011 only (B) between IIthand 14th May 2011 (©) before IlthMayandafter14thMay 2011 (D) between the 14th May and Sth ‘November 2011 GO ON TO THE NEXT PAGE a ro 4s. Which of the following characteristics must two database tables have in order for them tobe linked? (A) At least one common attribute (B) Composite keys. (©) At least owo tuples inthe table. (©) Thesame data inal tuples. ‘You cresed «spreadsheet with 7 columns and wish to enter the text “WEEKLY REPORT" to appear atthe middle of the space used bythe 7 columns. Which ofthe following spreadshest features wil enable this to be done? (A) Contre the text (B) Merge the columns (C)_ndent the cells (D) Merge and Centre ‘Which of the following is normally used for website-website connection? (&) Modem (B) Monitor (©) Hyperlink () Hyperiext, “The object that is used to produce a list of records that meets a particular criterion is (A) form ®) table (©) module (D) query ‘Which ofthe followingisthe BEST feature ouseta dieplay the seme text atthe bottom of exch page of a multipage document? (A) Footer (B) Header (©) Foomote ©) Endnote a. 4. ‘Consider the following lgoritn. an bao anb- beard Write a,b “The output ofthis algorithm is w 29 @ 20 © 79 © 7 In the Pascal programming language, which of the following is NOT an lementary date type? (A) Amy (B) Character (©) Real @) Integer Program debugging should be performed (A) daring the design phase (B) during the esting phase (C) before compiling the program (D) before identifying ny test deta Jn representing algorithms, which ofthe following statements would be placed in the flowchart box shown below? (A) Read A, @) 25 (©) Cot coune +1 (©) Outpurc GO ON TO THE NEXT PAGE Item80referstothefollowinginformation. $3, Which of the following isa valid Pascal data ype? The steps involved in problem-solving include (A) Numeric ®) Real 1. developing an lgoritn (©) Number UL defining the problem ©) Leer TL testing the solution 50. Whatistheconectorderofthestepslisied $4. The ascelcode varx,y would generatean ed we Taman aaa uum ® i,m ey ‘run time error © ihm ‘execution error ©) m0 (©) logical error 3 saee Iams S152 woe 0 the flowin information * Mem$5 refers tothe following pseudocode, ea =e ne eee i 2 Sa i ee Bait See Boe SS canes So eee ‘Suep 8 ‘Stop ‘5S. What is printed by the pseudocode if the Taken apt 5. Sepdateabvespsiomiswcamle ng of (B) 12 82 eae © 4 ome © ga ®% mas “ oer 52 Wckottesep nestvesiaitm «(Stee recess rec Saat ee & eager are @ jms ren eens ‘60 ON TO THE NEXT PAGE am... 57. Which of the following tasks does the 59. algorithm listed below perform? Read (A,B) IfA

You might also like