You are on page 1of 4

1. Mr. Awa needs to save data worth 500GB in D.

nano technology
his laptop which he is intending to buy.
Which of the features should he consider 7. Which technology is used in a CD ROM
before buying the laptop? drive?
A. RAM A. mechanical
B. processor B. electromechanical
C. Hard disk C. optical
D. ROM D. fiber optical

2. Network cables are used to link two distant 8. Which of the following is a low level
areas but the signal quality is poor. Which language?
network device can be used to amplify the A. assembly
signal so that the quality becomes good? B. visual basic
A. router C. java
B. switch D. c++
C. repeater
D. hub 9. Data is represented in the computer system
in the form of -------------
3. Which of the following device is used to A. 2 and 3
mark MCQ paper 1 in the GCE? B. 0 and 1
A. OMR C. 4 and 5
B. barcode reader D. all of the above
C. OCR
D. MICR 10. If a secondary school wants to come up
with its own website, who should be contacted
4. ------------is NOT an example of a file by the school for this task?
extension A. programmer
A. xls B. web engineer
B. wma C. software engineer
C. png D. network engineer
D. dos
11. What type of data control is involved when
5. Mrs. Saraphine needs to make a decision Mr. Chi types his password twice when
whether to go to work when rain is falling. creating his email before proceeding?
Which symbol will she use in case she wants A. presence check
to represent it in a flow chart? B. double entry
C. proof reading
D. range check

12. If the binary code 01100011 is equivalent


to 63 in the decimal, what is 01100101
equivalent to?
A. 61
6. Which technology is concerned with the B. 65
second generation of computer system? C. 64
A. vacuum tube D. 62
B. integrated circuit
C. transistor
13. Which component of the central B. compiler
processing unit is responsible for executing all C. loader
arithmetic and logical operations? D. interpreter
A. ALU
B. control unit 20. ------------- is used to combine object codes
C. register modules together to make a complete program
D. memory A. linker
B. bridge
14. Which if the following is an example of an C. connector
automatic input device? D. debugger
A. MICR
B. monitor 21. In an information system organizational
C. mouse pyramid structure, which of the management
D. keyboard skill is found at top?
A. tactical
15. The concentric circle around the spindle of B. operational
a platter of a hard disk is known as: C. strategical
A. track D. technical
B. sectors
C. cylinder 22. In MS EXCEL, in order to write a formula
D. clusters in the formular bar, alwys begin with---------
sign
16. Which type of ROM permits its contents to A. =
be programmed and erased using special B. –
electrical impulses? C. &
A. PROM D. ()
B. EEPROM
C. EPROM 23. A personal computer (PC) is a -----------
D. EEEPROM computer.
A. super
17. An example of utility software is: B. mainframe
A. MS excel C. mini
B. operating system D. micro
C. tailors made software
D. antivirus 24. Which type of data communication exists
in radio communication?
18. -----------is a software offered free of A. full duplex
charge for a trial period but the user needs to B. simplex
pay for it at the end of the trial period to C. half-simplex
purchase it. D. half-duplex
A. shareware
B. freeware 25. Which of the following units is used for
C. software measuring computer speed?
D. trial ware A. bits
B. bytes
19. ------------- is a program that converts and C. hertz
executes instructions one line at a time D. meters per second
A. linker
26. What is the name of the largest electronic C. internet service provider
circuit in a microcomputer? D. internet service provision
A. video board
B. graphic board 33. -----is NOT an example of a
C. motherboard telecommunication company in Cameroon
D. central processing unit A. MTN
B. ORANGE
27. Which of the following devices is best C. NEXUS
suited for producing drawing such as maps and D. NEXTEL
curves?
A. printers 34. ----------protects the computer from
B. scanners computer viruses.
C. plotters A. password
D. speakers B. firewall
C. encrypting
28. Which of the following exists as a module D. antivirus
in MS ACCESS?
A. cell 35. Which of the following is an example of
B. chart validation check?
C. graph A. presence check
D. table B. proof reading check
C. double entry checks
29. Which of the following application D. piracy check
software is generally used as a tool for
presentation in conferences? 36. The network topology in which each
A. MS PowerPoint computer must be linked to all other
B. MS Excel computers in a network is known as
C. MS Access A. ring
D. MS Publisher B. full mesh
C. partial mesh
30. The rectangular block that gives rise to D. star
images on screen is generally referred to
as---------- 37. Which of the following is not an operating
A. pixel system?
B. icons A. LINUX
C. menu B. Office
D. pointer C. Windows
D. UNIX
31. The protocol used to dynamically assign IP
address is known as 38. The first steps in the system development
A. DHCP life cycle (SDLC) is:
B. DNS A. analysis
C. TCP B. design
D. DCP C. preliminary investigation
D. development and documentation
32. The full meaning of the acronym ISP is:
A. internet serial provider 39. What is computer ethics?
B. intranet service provider
A. an honest, moral code that a should be
followed when on the computer 46. The science of designing, manufacturing,
B. a computer program about honesty using and disposing of computing devices to
C. a computer that fits on or under a desk reduce effects on environment is known as:
D. a list of commandments in the bible A. green computing
B. ergonomics
40. The process to properly define the database C. ethics
tables to provide flexibility, minimize D. recycling
redundancy, and ensure data integrity is called:
A. class diagram 47. In file extension, the data file name and the
B. data normalization file extension is separated by which symbol?
C. database design A. .
D. design rationalization B. ,
C. ;
41. How are data organized in a spreadsheet? d.:
A. lines and spaces
B. layers and planes 48. Which of the following parts in not
C. rows and columns attached directly to the motherboard
D. height and width A. CMOS battery
B. processor
42. The relational model uses some unfamiliar C. flash drive
terminology. A tuple is equivalent to a: D. RAM
A. record
B. field 49. In an information system, which
C. file component deals with the description of how
D. database things are done, given the steps for the
accomplishment
43. ----------- is an operating system that can A. software
run many tasks at a time B. hardware
A. multi-task OS C. procedure
B. multi-user OS D. people
C. mono-task OS
D. mono-user OS 50. The line(s) of code(s) that are NOT
executed in the running of a program is known
44. Which of the following devices is used to as:
produce softcopy? A. statement
A. printer B. variable
B. speaker C. comment
C. scanner D. constant
D. OMR

45. The exclusive rights granted to someone


for an intervention or discovery that was not
copied
A. copyright
B. legislation
C. ethics
D. patent

You might also like