You are on page 1of 10
5D. Which ofthe followingitemsareconsidered 6. computer hardware? (A) Data (B) Programs (C) Output devices (D) Operating systems ‘The process of scrambling messages at the sending end and unscrambling them at the receiving end is called (A) coding (B) espionage a (©) encryption (D) eavesdropping Which of the following can be termed ‘application software"? (A) DOs () Linux (©) Mac OS (D) Microsoft Edge Which of the following activities would NOT be considered cloud storage? (A) _ Data stored on remote servers (B) Data stored and accessible on a Software which is modified to perform specific tasks fora particular user isreferred toas (A) general purpose and special soft- ware (B) general purpose and customized software (©) special purpose and custom written software (D) customized software and custom written software The RP Secondary School wants the administrative staff to have access to all student and teacher data. Which of the following networks would be MOST suitable to enable such access? 10. i. 12. Item 10 refers to the following symbol. 14. a The symbol represents (A) (B) (C) Hotspot fa (D) Bluetooth S. Which of the following countermeasures can ONLY be implemented as a software measure, tomitigate the effects of identified threats to a computer system? (A) _ Firewall -(B) Encryption of data (©) Backup and recovery (D) _ Intrusion detection system ee Unauthorized, real-time interception of a private communication on a comp network isreferedtoas A) @) © Part of a private network using Internet technology and public telecommunications that can be accessed by business suppliers, vendors, customers and partners is called an (A) Internet (B) Intranet (C) Extranet (D) Ethernet Telecommuting can be BEST described as (A) __ using the computer while commut- ing (B) _usingthetelephone while commut- ing (C) working from home by connecting, home and office (D) working from the office after nga connectionathome Which of the following functions is performed by a modem? (A) Modulates analog and digital jignals 18. 19. Eran ‘Transferring data from a remote computer to your computer is referred to as (A) browsing (B) uploading (C) data mining (D) downloading Which of the following types of technolo- gies is commonly used by banks to read data on cheques? (A) POS (B) OCR (©) OMR (D) MICR Items 20 and 21 refer to the following information. Customers log in to an online application using a username and a record of their a utility compan Which file o aa 23. 24. In order to use a program stored on a flash drive, the program must be transferred into (A) ROM (B) RAM (©) PROM (D) EPROM Which of the following is NOT a hardware component of a computer system? (A) Data file (B) Main memory (C) Peripheral device (D) Central processing unit ‘A system that analyses data and that uses rules and previous information to deliver possible decisions is called (A) arobot machine (B)__ anexpert system c machine 27. ase Which of the following examples describe a denial-of-service (DOS) attack? I. Sudden excessive increase in amount, of junk emails II. Inability to reach regular websites because of too many requests II. Decrease in network performance because ofa flood of transactions (A) Land Ionly (B) Land II only (© Mand Il only ©) 1 Mandi Which of the following protocols is used to ensure that all web pages and servers communicate with each other? (IP () FIP “© VoIP (@) HTTP Which of the following is true of accessing files sequentially? Occurs in any order Starts with the first record (A) @) “(C) Starts with the largest « ©) 30. 31. sae A webmaster is important to the company because he/she (A) _ is responsible for the company’s website (B) assigns web addresses to all users ‘a.company (C)__ backs up files and stores the disks at another location (D) monitors the shutting down of competitors’ websites Which of the following are NOT categorized as system software? (A) Utilities (B) Translators (©) Productivity tools (D) Operating systems The order of connecting the hardware components of a LAN, starting from the ISP’s telecommunication line, to a desktop computer is 34. 35. Which type of interface allows the user to communicate with the computer system by keying in instructions? (A) Menu-driven (B) Graphical user (C) Touch sensitive (PD) Command-driven Which of the following devices is used for manual data entry into a computer system? (A) Smart card (B) Barcode reader (C) Document scanner (D) Optical mark reader Which of the following is an example of a correctly formatted e-mail address? (A) __lana@happy.net (B) — @lana.happy.net ©. 39. 40. The following formulais located in position B6 of a spreadsheet. = B3 + B4 + SBS5 What would be the resulting formula if the initial formula was copied to the position located immediately on the left? (A) C34+C4+C5 (B) A3+A4+A5 (©) A3+A4-+SBS5 (D) C3+C4+SB85 In creating a query, a student entered the following criteria for the date field. > = 05/11/2022 and <= 05/14/2022 The output will show days (A) afler 14 May 2022 only (B) from 11 to 14 May 2022 (©) before 11 May and after 14 May 35. 62 Which type of interface allows the user to. 39. ‘communicate with the computer system by keying in instructions? (A) Menu-driven (B) Graphical user (©) Touch sensitive (PD) Command-driven Which of the following devices is used for manual data entry into a computer system? (A) Smart card (B) Barcode reader (©) Document scanner 40. () Optical mark reader Which of the following is an example of a correctly formatted e-mail address? (A) lana@happy.net @) © ©) The following formulais located in position B6 of a spreadsheet. =B3+B4 + $BS5 What would be the resulting formula if the initial formula was copied to the position located immediately on the left? (A) €3+C44+C5 (B) A3+A4+AS (C) A3+A4+SBSS (D) C3 +C4+$BS5 In creating a query, a student entered the following criteria for the date field. > = 05/11/2022 and <= 05/14/2022 The output will show days (A) _ afler 14 May 2022 only from 11 to 14 May 2022 e I May and after 14 May Items 43 and 44 refer to the following sentence. When the hen is ready to lay her eggs, then and only then will the hen find a secluded spot to la: them. When using the Find and Replace editing feature in a word processing program, without usi the ‘whole words only’ option, how many occurrences of “hen” would be found in the sentence above? (A) () ©, @) Which of the following features would be LEAST efficient when using the Find and Replace dialogue box to replace all occurrences of the word “hen” with the word “duck” oe Mems 45 and 46 refer to the following spreadsheet. IE A 8 E D ea 6 1} FirstName | LastName | Birth date [Gender | Married| Phone _| Exercise 2| Roy SINGH o2tan-97 [M___| TRUE] 688-4444 [020 3 [Jamilla JOHNSON 22-Mar-82 | F fause| 720-9123 [020 _| 4| Tyson. BARRINGTON [23-Mar-96 [M TRUE | 630-1234 | 010 5 | Dennis RAMPERSAD | 04-Jul-78 Favse | 456-7890 [ 050 6| Micheal BAPTISTE 23-May-99 FALSE | 456-6676 | 030 7 [Joelle BROWN 18-Jun-00 TRUE | 620-0190 [040 JONES 9[ Micheal JONES 18-Jun-96 Denise CLEMENT 18-Jun-02 TRUE | 640-4929 | 050 Favse | 640-9989 | 030 M. M F 20-Dec-97 [M ‘TRUE | 640-2823 | 020 M F Exercise No | Exercise Name 45. Which of the following formulas will display the exercise name “Zumba” in any cell where the formula is placed? (A) =VLOOKUP (G4, A18 : C22, 2, FALSE) (B) =VLOOKUP (G5, A18 : C22, 2, FALSE) (©) =VLOOKUP (G4, A18 : C22, 3, FALSE) @) — =VLOOKUP G10, Al “7. 49. (D) secondary key =i9)= What type of cell referencing will replicate a formula that uses fixed cells? 1. Relative I. Absolute Ml. Mixed Sh (A) Land Ionly (B) Land Ill only (©) Mand Ill only @) 1, Mand IIT Which of the following features would give you the old and new versions of a previously saved document when using a word processor? (A) SAVEAS with file extension (B) _ SAVEAS with the old filename (© __ SAVE AS with anew file type @) SAVE AS with a new filename 52. The field that uniquely identifies a record in a database is called the . (A) foreign key (B) primary key (© alternate key Item 51 refers to the following algorithm. Read (A, B) IfA

You might also like