You are on page 1of 6

REPUBLIQUE DU CAMEROUN REPUBLICOF CAMEROON

PAIX – TRAVAIL – PATRIE

A
PEACE – WORK – FATHERLAND
………………….. …………………..

MINISTERE DES ENSEIGNEMENTS MINISTRY OF SECONDARY


SECONDAIRES EDUCATION
………………….. …………………..
REGION DE CENTRE
CENTRE REGION

SUBJECT CODE PAPER


NUMBER NUMBER
CENTRE REGIONAL MOCK EXAMINATION 796 1

INFORMATION AND
CANDIDATE NAME: ……………………………………… COMMUNICATION
CANDIDATE NUMBER: …………………………………… TECHNOLOGY
CENTRE NUMBER: …………………………………………

ADVANCED LEVEL DATE: Tuesday13 April 2021

Time Allowed: One and a half hours


INSTRUCTIONS TO CANDIDATES
Read the following instructions carefully before you start answering the questions in this paper.

Make sure you have a soft HB pencil and eraser for this examination.
1. Use a soft HB pencil throughout the examination
2. Do not open the booklet until you are told to do so.

Before the examination


3. Check that this questions paper is headed ‘Advanced Level INFO AND COMMUNICATION TECHNOLOGY P1 796’
4. Insert the information required in the space provided.
5. Without opening the booklet, pull out your answer sheet carefully form inside the front cover of this booklet. Take care that
you do not erase or fold the answer sheet or make any mark on it other than those asked for in this instructions.
6. Insert the information required in the space provided on the answer sheet using your HB pencil.

Candidate Name, Centre Number and Name, Candidate Number, Subject Code Number and Paper Number.
7. Answer all the 50 questions in the examination. All question carry equal marks.
8. Non-programmable calculators are allowed.
9. Each question has FOUR suggested answers: A, B, C and D . Decide on which answer is correct. Find the number of the
question on the sheet and draw a horizontal line across the letter to join the square brackets for the answer you have chosen.
For example if B is your correct answer, mark as shown below:
[A] [B] [C] [D]
10. Mark only one answer for each question. If you mark more than one answer, you will score a zero for that question. If you
change your mind about an answer, erase that mark carefully, then mark your new answer.
11. Avoid spending too much time on any one question. You can come to these questions later.
12. Do all rough work in this booklet, using where necessary, and the blank spaces in the question booklet.
13. Mobile phones are not allowed in the examination room.
14. You must not take this booklet out of the examination room. All question booklets and answer sheets will be collected at the
end of the examination.

02A/0796/VC_03/
©2021 / CSC / 0796/ /P1 /CRM Turn over
Page 1 of 4
This document is the property of CRM and should not be reproduce without the permission of the author
A group of software that enable the computer The use of face recognition is a
system to run from start-up to shut down; characteristics of Artificial Intelligence,
A Application software which of the computer generation brings
forth this innovation;
B Bespoke software
C System software A Second generation
D Microsoft office word
B Third generation
A prototype model built to show real life C Fourth generation
concept and a _____________is done to D Fifth generation
investigate the relationships between the
concept and the environment. For a working relational database, it’s
important to organize the fields and table in
A Modelling a way to minimize redundancy and
B Simulation dependency. This process can be referred to
C Run as;
D Automation
A Database management
The predictable time calculated by project B Data security
manager to give the estimated duration of an C Normalization
entire project is; D Data integrity
A Lead time Resources and hardware that people build
B Lag time to manage and control an organisation is
C Slack time referred to as;
D Early start time A SDLC
B Information system
Questions 4 and 6 are based on the text below
C Control system
A security officer working at the boarder of
the country collects information from D Hardware
immigrants using the following ICT tools and Which of the following application
devices: Barcode reader, Keyboard, biometric packages would be the most appropriate for
machine, voice recognition and face representing information on charts and
recognition machine performing calculations;
Which of the devices is NOT an automatic data
entry; A Presentation packages
A Keyboard B Database packages
B Barcode reader C Word processing packages
C Biometric machine D Spreadsheet packages
D Face detection machine Technology is growing rapidly and some
companies prefer Robots to carry out
Which of the devices make use of finger common task, this can lead to;
print as a feature of input
A Poor production
A Keyboard B Robots may delay an activity due poor
B Voice recognition design
C Biometric machine C Robot may increase the unemployment
D Face detection machine rate
D Robots can be deteriorated easily

02A/0796/VC_03/
©2021 / CSC / 0796/ /P1 /CRM Turn over
Page 2 of 4
This document is the property of CRM and should not be reproduce without the permission of the author
A networking device that select the best path A Mouse
for a data packet from one network to B Keyboard
another is;
C Touch screen
D Printer
A Switch
B Bridge Which of the following is NOT a major
C Router approach to reduce CVS;
D Hub A The use of screen glares on our screen
A computer that share resources to another B The use of LCD monitors over CRT
computer on a network is; monitors
C Sitting 35-40 cm away from the
A Client computer computer screen
B Server computer D Placing your document on a document
C Peer-to-peer carrier before typing
D A WAN computer A gate that serves as a STOP or PASS for
resources between an intranet and an
The Cameroon government intends to connect extranet is;
all her universities in the country on a network, A A gateway
which of the network type will best suit for B Firewall
this; C Switch
A E-connecting D Loader
B MAN The acronym OSI stands for;
C LAN
A Open System Interconnection
D PAN
B Office System Interconnections
Making payment using credit card with e- C Open Source Internet
commerce, is a drawback in that; D Office System Internet
A It exposes your information to scammers
The results of the binary arithmetic
B It may lead to Denial of Services (DOS) 1101002 – 1012 =( )2 ;
C It exposes your information to hackers A 110000
D It may promote desktop forgery B 110101
Though with the increase in computer C 101111
technology some regions in the world no D 110111
little or nothing concerning computers or
the use of modern ICT tools, this can best
be described as; The viewing of video stored in a remote
machine online, that decodes small packets
A Technology underrate at a given time for the user, is known as;
B Underdeveloped
C Digital divide A Remote viewing
D Less advancement B Internet videoing
C Streaming
Which of the following device CANNOT D Video filtering
be used to control a video games;
The GCE registration and payment of fees
is done online using special software, this
can be described as;

©2021 / ICT / 0796/ /P1 /CRM Page 3 of 6


This document is the property of the CRM and should not be reproduced without the permission of the author
A e-commerce
B e- payment At which line order will the Tecno
C e- management company stop the production of the model
D e- registration Camon 16 Pro to a new model;

Study the algorithm bellow and answer A The 2nd line order
questions 23, 24, and 25 B The 3rd line order
The Tecno Company uses an Arithmetic
C The 4th line order
progression to control the production of its finest
products in the market, the Tecno Camon 16 Pro. D The 5th line order
If the sales of the cartons ordered reaches 50 or
above, they will switch to a new model by the What is the value obtained at the line
formula order in (26) above that will stop the
Pn = a + (n-1)d production of Tecno Camon 16 pro;
The common difference between advancement (d)
is constant =3 A 50
The demand for this first advancement (a) = 2 B 55
Where (n) = the demand of carton(s) ordered. C 60
And β is the number of order.
D 65
The order receive from the market (demand) is;
Line 1st 2nd 3rd 4th 5th Which of the following is NOT correct
Order no concerning a table in the First Normal
β 1 5 2 3 7 From(1NF);
A Table should hold only atomic values
B Values stored in a given field should be
of the same data type
C The table must have a define primary key
D There should be no partial dependency

Which of the following does NOT


define a primary key in DBMS;

A It accepts only Numbers as data type


B Never accepts duplicated values
C Uniquely identify a record in a DBMS
table
D Never accept a Null value
__________ and _________ are
information system found at the bottom
and top of the triangular organogram of an
information system respectively.
A EIS and TPS
What is the algorithm construct use in the B TPS and EIS
above algorithm; C MIS and TPS
D DSS and TPS
A Sequence
B Condition In SDLC, which of the activity below is
C Selection not carried out in the Design Phase;
D Loop

©2021 / ICT / 0796/ /P1 /CRM Page 4 of 6


This document is the property of the CRM and should not be reproduced without the permission of the author
A Running the old system and the new A Some wireless LAN transmit a lot of
system simultaneously viruses
B Writing an algorithm for the project B Adding a new computer to a wireless
C The use of prototyping tools network using long Wi-Fi password is a
D The use of ‘What If’ statement to little complicated
evaluate the created model making sure it C Wireless LAN uses radio signals; other
reaches expectation devices around uses the same signals to
operate hence there is Interference:
A project manager takes a contract to build a D The speed of transmission could be very
football stadium, which of the following will slow
NOT be his major challenge; An extension of the waterfall model in
SDLC that makes use of verification and
A Estimate the budget and manpower
validation for which each phase is tested
needed and estimate duration
and developed is known as the;
B Analyses the risk for the proposed site
C Relocate the population away during A Iteration model
the construction to acquire a noise free B Spiral Model
environment C V-shape model
D Report project status D Prototype model
Which of the HTML tags does NOT occur Which of the activities in the machine
in pair; cycle is handle exclusively by the Control
Unit;
A <b>
A Fetching and decoding of instruction
B <br>
C <em> B Fetching and executing of instruction
D <head> C Decoding and executing of instructions
D Executing instructions only
The use of a clock to monitor and control
the movement of signals between terminals A software used by engineers to design
at each interval of sampling is referred to the possible outcome of a project is known
as; as;
A Serial transmission A CAD
B Synchronous transmission B CAM
C Asynchronous transmission C MIS
D Full duplex transmission D GISTech

The todays Core I5 , I7 and Xeon are A new printer was brought in an office,
good example of ______architecture unfortunately the secretariat was unable to
print an urgent document needed by the
A MISD manager, what could be the possible problem;
B MIMD
A The mark of the printer did not match
C Intel Pentium 4 the mark of the system unit
D SISD B The printer probably does not print
document with high resolution images
Which of the reasons explains why some C The document could not be in a right
companies prefer wired LAN instead of format and needed modification
Wireless LAN; D The device drivers are needed to be
installed
The quality of images from the monitor is
determine by the:

©2021 / ICT / 0796/ /P1 /CRM Page 5 of 6


This document is the property of the CRM and should not be reproduced without the permission of the author
A The capacity of the RAM The main memory is described as
B The capacity of the processor primary storage block because;
C The capacity of the video card A All the memory devices store data
D The size of the monitor in inches temporally
B All the memory devices are volatile
C It is used to create Virtual memory storage
The operation BEAC16- CCA16 gives;
D It is directly accessible by the CPU
A B1B216
B E1C216 In a relational Database management
C B1C216 System, a key in a second table that enable
D B1E216 a point of connection between the two table
from a table already assigned with a
In Last -in- First- Out order a linear list whose Primary key is known as
element are inserted and deleted accordingly is; A Secondary key
A Stack B Candidate key
B Hash table C Foreign key
C Queue D Connection key
D Hash table
A device that transmit suitable signal
The highest in order of size in the hierarchy of towards a telephone line
a database organisation is a(n);
A Demodulator
A Field B Modulator
B Database C Multiplexer
C Data field D Demultiplexer
D Index file
The MTN company carried out the
Installing a software that assist a secretary to following in a DBMS to locate a customer;
play or read the character that has been entered using numbers ending with ‘7961’, who are
in a given field from a loud speaker, can be male, living in Douala, in Bonaberri . this
termed as; is achieved by the use of;
A Data conformity
A Search
B Data validation
B Browsing
C Data verification
C Queries
D Data integrity
D FTP
The file extension .TIF reads _____ files Which of the following is NOT a
A Images files function of a web browser
B Document
A Present User Interface
C Video files
B Interpret HTML codes
D Audio files
C Request for web pages
In C programming writing expression Printf D Edit HTML codes
beginning in Uppercase is considered as:

A Syntax error
B Semantics error
C Runtime error
D Latent error

©2021 / ICT / 0796/ /P1 /CRM Page 6 of 6


This document is the property of the CRM and should not be reproduced without the permission of the author

You might also like