You are on page 1of 9
R [CANDIDATE PLEASE NOTED HPRINT soe neme on the ine below and retuta| ts bookie with your ansver sheet. Failure o| TEST CODE 01229010 do so may result in eioqualiiction, MAYIJUNE 2018 FORM TP 2018081 CARIBBEAN EXAMINATIONS COUNCIL CARIBBEAN SECONDARY EDUCATION CERTIFICATE® EXAMINATION INFORMATION TECHNOLOGY Paper 01 — General Proficiency J hour 30 minutes 29 MAY 2018 ( READ THE FOLLOWING INSTRUCTIONS CAREFULLY. 1. This test consists of 60 items. You will have 1 hour and 30 minutes to answer them. 2. In addition to this test booklet, you should have an answer sheet. 3 Each item in this test has four suggested answers lettered (A), (B), (C), (D). Read each item you are about to answer and decide which choice is best. 4. On your answer sheet, find the number which corresponds to your item and shade the space having the same letter as the answer you have chosen. Look at the sample item below. Sample Item Which of the following pairs represents general-purpose software tools? (A) Spreadsheet and database software Sample Answer (B) Word processor and accounting software - - (©) Stucent record system and database software . JOLOIO) (D) Insurance processing and spreadsheet sofware The best answer to this item is “Spreadsheet and database software”, so (A) has been shaded. 5. Tf you want to change your answer, erase it completely before you fill in your new choice. 6. When you are told to begin, turn the page and work as quickly and as carefully as you can, If you cannot answer an item, go on to the next one. You may return to that item later, DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO DO SO. Copyright © 2016 Caribbean Examinations Council All rights reserved. -2 Whichof the following itemsareconsidered computer hardware? A (B) (D) Data Programs Output devices 6. Operating systems Scanning an item at a computerized checkout station in a supermarket is an example of data (B) © (D) input output 7. storing processing Access time for magnetic disks is the time taken by the read/write head to find the © (D) buffer sector 8. cluster cylinder The binary equivalent of the decimal number 7 is (A) 100, @) 101, e 110, 9 il, ‘The primary storage device that holds the data currently being processed by the computer is known as the (a) read only memory (ROM) programmable ROM (PROM) random access memory (RAM) erasable and programmable ROM (EPROM) Item 6 refers to the following specification of a processor for a laptop. Intel Pentium V 64-bit 3.6 GHZ. ‘The 64-bit in this specification means that the processor can process 4 characters at one time process 8 characters at one time access 8 characters at one time access 4 characters at one time Which of the following devices is used to input data into the computer? @ Mose (B) Monitor (©) USB flash drive (D) External hard drive In which of the following interface types is the user required to remember specific instructions and syntax? (A) Menu-driven (B) — Graphical user ig Computer screen Command-driven Which ofthe following components is used by the CPU to temporarily store data? (A) Track (B) Sector @ Butter () Cylinder GO ON TO THE NEXT PAGE 10. £2. 14, -3- In order to use a program stored on a flash drive, the program must be transferred into (A) ROM @ RAM (©) PROM (D) EPROM Which of the following tasks is NOT a function of the control unit (CU)? @® Performing arithmetic operations (B) Reading and interpreting machine instructions (©) Coordinating the operation of the internal registers (D) Controlling the sequencing of machine instructions ‘The wo's complement of a binary number is formed by (A) changing all zeros to twos (B) changing all ones to twos (C) finding theone's complement twice @® acdingonetotheone'scomplement Which of the following terms represents a hexadecimal? @ «, (B) 10, ©) 158, @) 23 A hard drive with one read/write head per disk is called a (A) SCSI (B) SATA (C) fixed head @@® moving head 15. 16. 17. 18, 19. Which of the following systems provides transmission of data in BOTH directions at the same time? (A) Simplex Full duplex, (©) Half duplex (D) Null duplex Which of the following functions is perfomed by a modem? @® Analog and digital (B) Digital and upload (C) Analog and download (D) Download and upload Which of the following devices is NOT required to successfully implement teleconferencing? @® sensor (B) Modem (C) Speaker (D) Microphone Programs that duplicate the knowledge and diagnostic skills displayed by humans performing specialized tasks are referred toas virtual systems expert systems (C) knowledge systems (D) engineering systems Transferring data from a remote computer to your computer is referred to as (A) _ browsing (B) uploading & data mining downloading GO ON TO TUR NEXT PAC 20. 21, 22, 23, 24, -4- Which of the following operations is 25. considered feature ofa biometric system? Matching fingerprints (B) Detecting irregular heartbeats (C) Diagnosing medical symptoms (D) Helping to lubricate skeletal joints ‘Telecommuting can be BEST described as 26. (A) usingthecomputer while commuting, (B) using the telephone whilecommuting, @ working from home by connecting home and office (D) working from the office after establishing a connection athome A webmaster is important to a company because he/she @® is responsible for the company’s website (B) assigns web addresses to all users ina company (©) monitors the shutting down of competitors’ websites (D) backs up files and stores the disks at another location The task of keeping a company’s data files and software organized through the cataloguing and storing of tapes and disks is that of the (A) IT manager file librarian (C) systems analyst (D) database administrator ” Which of the following checks is NOT a validation technique? (A) Range B) Inconsistency Double entry (D) __ Reasonableness The process of scrambling messages at the sending end and unscrambling them at the receiving end is called (A) coding (B) encryption (©) espionage (D) eavesdropping There are many software restrictions used by computers to protect data and maintain data integrity. Which of the following entities are software restriction media? 1 Viruses I. Passwords UI. Encryptions (A) Land Il only (B) Land Iii only (©) Wand Hil only (0) I, Mand Ul Item 27 refers to the following diagram which shows a form being completed. The data from the form shown above is captured by (A) USB (B) OCR OMR, (D) MICR 28, 29. 30. 31. 32, -5- Which of the following statements is true of accessing files sequentially? (A) Occurs in any order @® Starts with the first record (C) Starts with the largest data field (D) Starts with the smallest data field A graph is stored and sent to another user. When the user opens the file he understands the graph he receives. This graph is a form of (A) discussion (B) facilitation (C) calculation @ information Which of the following activities is NOT anexampleot commercial data processing? (A) Budgeting (B) Invoice processing (C)__ Payroll processing @® Forecasting hurricanes ‘The following formulais locatedin position 6 of a spreadsheet. What would be the resulting formula if it was copied to the position located immediately on the left? =B3+B4+SBS5 (A) C3+C4 +05 (B) AB +A4 +A DD 43+ Ass spss (D) C3 +C4+SBs5 Spreadsheet formulae use (A) values or labels (B) labels or ceil addresses (C) values, labeis or cell addresses values, ranges or cell addresses 34. 34, 35. 36. 37, ‘The intersection of a row and a column in a spreadsheet is called a @ cl (B) label (C) range (D) value Which ofthe following would MOST likely be placed above a graph? @ tite (B) Legend (©) Gridline (D) Data label In Microsoft PowerPoint, a single page shown on a screen to display information is called a (A) field (B) table @ sic (D) presentation Which of the following is NOT a valid data type in Microsoft Access? (A) Text Character Date/time (D) Auto number Which of the following facilities is normally used for website-to-website connections? (A) Modem. B) Monitor Hyperlink (D) Hypertext = 6s Item 38 refers to the following spreadsheet. Al B c D E F G HL 1 2 3 Mon | ‘Tue | Wed | Thur Fri Total 4 Games [195 657 200 100) 700, Sum(C4:G) 3 Pool _[ 290 410 31 150 300) Sumi(C5:G5) 38. ‘If Column A is deleted, the existing formulae would (A) remain the same (B) result in an error being reported be automatically corrected because absolute addressing is used be automatically corrected because relative addressing is used 39. Which of the following functions are 41. performed by spreadsheets? J. Performingautomaticre-calculation when values have been updated IL Applying formulae to numerical data to determine values I Capturing, displaying and manipulating text data Land Il only 2 (B) [and Ii only (C) Mand Il only (@) Mand il 40. Increating a query, a student entered the following criteria for the date field > = 05/11/2017 and < = 05/14/2017 43, The output will show days A) after 14 May 2017 only from 11 to 14 May 2017 (©) before 11 May and after 14 May 2017 (D) between 14 May and 5 November 2017 Information produced from queries and tablesinaspecific format thatean be printed from a database is called A) afile areport (C) — abinary (D) — anobject The slide sorter can be used to (A) create a slide master (8B) modity custom animations (C) add sound effects to a presentation show thumbnails of the entire slide show Which of the following features canbe in a spreadsheet to copy the result multiple rows ina single column’? (A) Cell (B) Label (C) Cursor (D) — Funetion e RO ON Tr) THE NI DAC 45, 46. ats In a spreadsheet, the column titles will always be visible when you scroll the spreadsheet if you first @ tteeze the top row (B) lock the last column (C) lock the spreadsheet (D) freeze the first column Which of the following sequences of steps is correct for deleting a field in a database table? (A) Choose the delete row option. Select row to be deleted and right click. Open table in design view, Choose yes to confirm deletion. 47. Open table in design view. Select row to be deleted and right click. Choose the delete row option. Mg, Choose yes to confirm deletion. (©) Select row to be deleted and right click, Open table in design view. Choose the delete row option. Choose yes to confirm deletion. (D) Select row to be deleted and right click. Choose the delete row option. Open table in design view. 49 Choose yes to confirm deletion, Which of the following Pascal statements reads data into a variable, N, and places the cursor on the next line? (A) Read (N) Write (N) é Readin (N) (BD) Writein (N) Item 47 refers to the following pseudocode and trace table. ac? bel Forn <1 to3 do aebil beatb a a b 7 1 1 2 x 2 4 7 3 8 15, What is the value of X? @ ; B®) 8 © 9 (D) 14 ‘The integer variables a, b and c are given the values 6, 10 and 2 respectively. What is the result of the following expression a MULT (b DIV c)? (A) 0 (B) 20 @ » (D) 120 In representing algorithms, which of the following statements would be placed in the flow chart box shown below? —— —— (A) A>25 (B) Read A 3 Output C Count + count + 1 GO ON TO THE NEXT PAGE 50. 51. 52. = 1B In an algorithm, item price isa variable used to store the price ofa grocery item. The MOST appropriate data type used for item price is real (B) integer (©) boolean (D) character Item 51 refers to the following algorithm, Read (A , B) IfA-1 DO (4) n -1 6) Printn (6) Endwhile Which of the following series of numbers represents the correct output when the number 3 is input? ‘The Pascal code varx, y would generate an error. The term used to describe this type of error is 9 syntax logical (C) run time (D) execution Which of the following terms is an invalid variable name? ( Sum @ rom (GC) Vatls (D) Count The following commands are examples of computer programming instructions: Sort customer by last name Total income by department To which generation of programming language do these examples belong? (A) First (B) Second Third Fourth GO ON TO THE NEXT PAGE. -9- 57. Which of the following symbols is usedto 59. perform assignments in the programming language Pascal? Item 58 refers to the following algorithm. I users for length, width Hl —_Iength, width area — length * width 60. MT "Area of rectangle is", area Which of the following options can be used to replace I, I] and IIT in the algorithm? (A) Read, write, prompt B) Write, read, prompt Prompt, read, write (D) Read, prompt, write END OF TEST Algorithm testing is BEST described as @ executing the program manually with inputvalues to see theresulis, (B) running the program using sample data to identify errors in the program (c) reading each line of code from beginning to end to search for errors () checking that all documentation is included in the program What is the MOST appropriate control structure to be used in calculating the total of ten numbers? (A) Iftthen-else (B) —_Repeat-until C) — While-do For-do IF YOU FINISH BEFORE TIME IS CALLED, CHECK YOUR WORK ON THIS TEST.

You might also like