You are on page 1of 10
‘CANDIDATE PLEASE NOTED PRINT your name on thetine below and vetwra | TEST CODE 01229010. {ais boklt with your tmwer set Fale FORM TP 2020086 | sm rit aisqatatin MAY/JUNE 2020 CARIBBEAN EXAMINATIONS COUNCIL Ns ‘CONDARY EDUCATION CERTIFIC! EXAMINATION CARIBBE. INFORMATION TE} HNOLOGY Paper 01 — General Proficiency T hour 15 minutes READ THE FOLLOWING INSTRUCTIONS CAREFULLY. 1, This test consists of 60 items. You will have 1 hour and 15 minutes to answer them, 2. In addition to this test booklet, you should have an answer sheet. Each item in this test has four suggested answers lettered (A), (B),(C), (D). Read each item you are about to answer and decide which ehoice is best 4. On your answer shee, find the number which corresponds to your item and shade the space havi the same letter as the answer you have chosen, Look at the sample item below ‘Sample lim Which of the following pairs represents general-purpose software tools? (A) Spreadsheet and database software Sample Answer (B) Word processor and accounting softwa mer (C) Student record system and database software @800 (D) Insurance processing and spreadsheet software The best answer to this item is “Spreadsheet and database software”, so (A) has been shaded, 5, Ifyou want o change your answer, criss it completely befine you fill in your new choice 6, When youare told to hegin, tum the page and work as quickly and as carefily as you can. Ifyou a anno’ answer an item goon the nest oe. You may retin o that hem nce DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO DO SO. Copyright © 2019 Caribbean Examinations Council All rights reserved. 01229010/MI/CSEC 2020, i Whichofthe following temsare considered computer hardware? (A) Data (B) Pro, © (D) “Operating systems Data that has been proces "meaning is termed (©) storage (D) output "d and has Which of the follow “application software"? ccan be termed () Dos (B) Linus. roy ‘ wD) Which of the following activities would NOT be considered as cloud storage? (A) Data stored on remote servers B (©) Data back-up and storage devices fon the Internet (D) _Datamanagedby storage providers ‘or hosting companies Which of the following could NOT be Classified as a cloud-based application? (A) Gait (B) Drop Box (©) Google drive (©) @inds05 01229010/MJ/CSEC 2020 6. “The lights in a room turn on as soon as a person enters, Which input device MOST likely controls the lighting in the room? o © nner (D) Keyboard Which of the following devices is used to input data into the computer? «) GR (8) Monitor (©) USB fash drive (D) —Extemal hard drive For which of the following interface types is the user required to remember specific instructions and syntax? (A) Menue-driven (B) Graphical user (©) Computer sereen ) Liem 9 refers to the following model of a be. ‘The MOST suitable printer for creating the ‘mode! of the globe is . aE 5 == (©) anink-jet printer (D) thermal printer GO ON TO THE NEXT PAGE sae ‘The RP Secondary School wants the administrative staff to have access to all student and teacher data. Which of the following networks would be MOST Suitable to enable such access? o Mem 1 refers to the following symbol Is, oe 11. The symbol represents (A) LAN (B) oo = Spot (D) Bluetooth 12, Unauthorized, real-time interception of 8 private communication on a computer network is referred to as - (A) propaganda (B) identity then (by eectonic easing 13. Double entry data verification involves (A) ditferent data entered once ie (B) the data entered being copied to ‘another device (©) different data entered once by two diferent persons (0) (01229010/MJ/CSEC 2020 Part of a private network using Internet technology and publictelecommunications that can be accessed by business suppliers, vendors, customers and partners is called (A) Intemet (B) Intranet oO (D) Ethernet Which of the following shows an increase in computer memory capacity? (A) Terabyte—+Gigabyte—+Megabyte (B) — Gigabyte—+Kilobyte— Megabyte (©) Megabyte— Terabyte —- Gigabyte () Which of the following functions is performed by a modem? (a) (B) Digital and upload | (©) Analog and download (D) Download and upload Inthe URL hitp:/www.shoes.com, “shoes. ‘com’ stands for the (A) extension @ (C) “company name (D) Internet company ‘Transferring data from a remote computer to your computer is referred to as (A) browsing (B) uploading (damn (©) ing GO ON TO THE NEXT PAGE, 19. Which of the following types of technolo- 23. Which ofthe following is NOT a hardware ) Cae (Pos Oe (B) OCR (C) Peripheral device © 20 (D) Cental processing unit ) 24, Which of the following checks is NOT a 20, Which of the following operations is validation technique? considereda feature ofa biomettiesystem? (A) Range 5 (CSTR (®) _nconssteney (B) Detecting irregular heartbeats © (©) Diagnosing medical symptoms (D)_“Reasonableness (D) Helping to lubricate skeletal joints 28, The process of scrambling messages atthe ymmuting can be BEST described as sending end and unscrambling them at the receiving end is called 2 Tele (A) using the computer while ‘commun (A) cod (B) using the telephone while (8) Geen ‘comm (©) “espionage © [ow (D) eavesdropping (©) working from the office after cstablishingaconnectionathome 26, There are many software restritions used by computers to protect data and maintain data integrity. Which of the following 22. Inorderfo use a program stored on a flash entities are software restriction media? drive, the program must be transferred into a 1. Viruses - A) ROM Passwords ® aM IIL Eneryptions (D) EPROM (A) Land I only ® © (D) land ttt a GO ON TO THE NEXT PAGE. (01229010/MN/CSEC 2020 27, 28, 29, 30. Mu o1229010MU/C Which ofthe following devices can be used for both input and output? CO) CD (B) Barcode reader (C) Flatbed scanner (D) Document reader Which ofthe followingis tue of acces files sequentially? A) Ose ‘ @B) (©) Starts withthe largest data field (D) Starts with the smallest data field of the following is a hardware user terface? GUI (B) Icon © Sensor ) Anofficial of Company X sells confidential information abouthiscompany toCompany YY. What is the term used for this type of information misuse? (A) Identity then (B) Computer fraud WhichofthefollowingareNOTeategorized as system software? “ (B) Operating systems (©) Translators (D) Utilities 2020 Rm 3 MM. 35. Which part of the central processing unit (CPU) coordinates its activities? A) Re B) «) Mai (D) Arithmetic logie unit Before purchasing a computer, ‘given a sheet with the following hardware specifications. Tntel Pentium IV 64 bit 3.6GHz 2GB $33MHz SORAM 160GB_ SATA HDD___7200 pm ‘The word use of the computer is 208 cB ) SiMe Which type of interface allows the user to ‘communicate with the computer system by keying in instructions? (A) Menu driven (B) Graphical user Fo Caschacrating ‘A webmaster is important to the company because he/she “wy (B) assigns web addresses to all users ina company (©) backs up files and stores the disks at another location (D) monitors the shutting down of ‘competitors’ websites coowromenexreace $3 | 36. . 38, 29, -6- Which of he following is an example ofa 40, correctly formatted e-mail address? Gy Lasknemane o omnes © asa > should beused for applications that involve repetitive numerical caleulations? © ate (D) Word processing Selecting orhighlighting aparagraphreates ©) dig ® (©) merge (D) document ‘The following formulaislocatedin position B6 ofa spreadsheet = B3 + Ba + SBS What would be the resulting formula if the initial formula was copied to the position located immediately on the left? A cHHCHCS (RB) Ad+Ade As © ) 01229010MI/CSEC 2020 In creating a query, a student entered the following eriteria for the date field (05/11/2017 and <= 05/14/2017 ‘The output will show days 18) fom 08 My 2007 (D) between 14 May and 5 November 2017 “w @) © (D) values, labels or eel! addresses Which ofthe following butions can be used to fully justify text? “ ® © GO ON TO THE NEXT PAGE ag em 43 refers to the following table containing data on three counties, A, 1 and C, for 2018 and 2019, Country [2008 2019 A 300, 600. B 500) 800) c 500, 600) Which of the following types of charts is NOT suitable for representing the data 3@ (D) Column, in a database is called the (A) foreign ke; «B) © (D) secondary key 01229010) MJ/CSEC 2020 45, 46. Which of the following sequences of steps is correct for deleting a field in a database table? (A) Choose the delete row option. Select row to be deleted and right click. Open table in design view. Choose yes to confirm deletion. Open table in design view. Select row to be deleted and right click ‘Choose the delete row option. Choose yes to confirm deletion. (© Select row to be deleted and right click. Open table in design view. Choose the delete row option, Choose yes to confirm deletion. (D) Select row to be deleted and right click. ‘Choose the delete row option Open table in design view Choose yes to confirm del {Hem 46 refers tothe following database table tem No. [Ttem Dese._ | Quantity HOS, Hammer [20 Hoa) Hammer [40 FKO30 | Fork 3 FKO20 | Fork 40 FKOIS | Fork 5 The database table above shows records sorted by (A) Quantity in ascending order (B) Quantity in descending order © ) GO ON TO THE NEXT PAGE ae 47. Which of the following clearly idemtifiesa 48, Whichofthe followingisused forexecuting hyperlink on an HTML document? HTML code? 1. Alink to an email address (A) _Aparser I. A fink to another webpage (B) qua ML A Tink to another location within (© “Anas the webpage (D)—Aninterpreter (A) Land It only (B) Land tit only 49. Which security feature offers the LEAST >) ei (A) Restricting editing (B) Adding a digital signature (©) Encrypting with a password o ‘em $0 refers to the following spreadsheet =sumi(B2::B6) 50, Ifthe f ‘mula in Cell BS is copied to the shaded eell, C8, then, the formula in Cell C8 would be (A) ~sum(B2:B6) ‘© eee GO ON TO THE NEXT PAGE (01229010/MI/CSEC 2020 si. 52. 53. 5.58 Item 51 refers to the following algorithm. Read (A, B) IfA

You might also like