You are on page 1of 9
5 1, Whichofthe followingitemsareconsidered 6. computer hardware? (A) Data (B) Programs +E} — Output devices (D) Operating systems 2. Data that has been processed and has ‘meaning is termed 1. TA information (B) database ©) storage (D) output Which of the following can be termed ‘application software"? 8 (A) Dos (B) Linux (©) Mac Os “A Intemet Explorer 4. Which of the following activities would NOT be considered as cloud storage? (A) Data stored on remote servers 4BY Data stored and accessible on a LAN (©) Data back-up and storage devices on the Internet (D) Data managed by storage providers or hosting companies Which of the following could NOT be classified as a cloud-based application? (A) Gmail (B) Drop Box (C) Google drive (@D) Windows OS 01229010/MJ/CSEC 2020 The lights in @ room turn on as soon as person enters. Which input device Mos likely controls the lighting in the roony Sensor (B) Remote (©) Scanner (D) Keyboard Which of the following devices is used tp input data into the computer? 447 Mouse (B) Monitor (©) USB flash drive (D) —_ Extemal hard drive For which of the following interface types is the user required to remember specific instructions and syntax? : (A) Menu-driven (B) Graphical user (©) Computer screen ©) — Command-driven tem 9 refers to the following model of a ‘lobe. The MOST suitable printer for creating the model of the globe is “A 43-D printer (B) laser printer ©) an ink-jet printer (D) a thermal printer GO ON TO THE NEXT PAGE d to lofa sgh 10. is The RP Secondaty School wants the administrative staff to have access to all student and teacher data, Which of the following networks would be MOST suitable to enable such access? ) fe MAN {D). LAN tem 11 refers to the following symbol. ~ e ‘The symbol represents (A) LAN Wi-Fi (C) Hotspot (D) Bluetooth jnauthorized, real-time interception of ‘communication on a computer referred to as (A) propaganda (B) identity theft (C) industrial espionage — D). electronic eavesdropping Double entry data verification involves different data entered once the data entered being copied to another device different data entered once by two different persons _the same data entered once then Te-entered by another person 14, 15, 16. a 18. Part of a private network using Intemet technology and public telecommunications that can be accessed by business suppliers, vendors, customers and partners is called an (A) Internet (B) Intranet a Extranet (D) Ethernet Which of the following shows an increase in computer memory capacity? (A) Terabyte Gigabyte—Megabyte (B) — Gigabyte Kilobyte—Megabyte (©) Megabyte— Terabyte— Gigabyte “(D)__ Megabyte Gigabyte— Terabyte Which of the following functions is performed by amodem? “€4)- Analog and digital (B) Digital and upload (C) Analog and download (D) Download and upload Inthe URL http://www.shoes.com, ‘shoes. ‘com’ stands for the (A) extension (B)- domain name (C) company name () Internet company Transferring data from a remote computer to your computer is referred to as (A) browsing (B) uploading (©) data mining “®)— downloading GO ON TO THE NEXT PAGE 19. 20. 21. aa Which of the following types of technolo gies is commonly used by banks to read data on cheques? (A) POS (B) OCR (© OMR 42) MICR Which of the following operations is considered a featureofa biometric system? \@®) Matching fingerprints (B) Detecting imegular heartbeats (C) Diagnosing medical symptoms (D) Helping to lubricate skeletal joints ‘Telecommuting can be BEST described as (A) using the computer while ‘commuting (B) using the telephone while commuting (GO) working from home by connecting home and office (D) working from the office after establishing aconnectionathome In order to use a program stored on a flash drive, the program must be transferred into ROM RAM {) PROM (p) EPROM Which of the following is NOT a hardwe component of a computer system? CG) Data file (B) Main memory (C) Peripheral device (D) _ Central processing unit Which of the following checks is NOT a validation technique? (A) Range (B) _ Inconsistency ae Double entry })__Reasonableness ‘The process of scrambling messages at the sending end and unscrambling them at the receiving end is called (A) coding @ encryption ) espionage (D) eavesdropping ‘There are many software restrictions used by computers to protect data and maintain data integrity. Which of the following: entities are software restriction mec 1. Viruses I, Passwords Il Eneryptions (A) Land Il only (B) Land 11 only © Mandl only (D) 1, Wand iit GO ON TO THE NEXT PAGE Which part of th © (CPU) coordinates jg meeting uit Sits activities? (A) Register Controt unit (©) Main memory (©) Arithmetic logic unit 33. Before purchasing a computer, James was given a sheet with the following hardware specifications. Intel Pentium IV 64 bit 3.6GHz 2GB 533 MHz SO0RAM 160GB SATA HDD _72001pm “Starts with the largest data field ‘Starts with the smallest data field eS at the ae mathe of the following is a hardware user ee (A) 2GB —TRy 64 bit (© 7200—pm (D) 533 MHz Which type of interface allows the user to Sei lof Company X sells confidential ‘communicate with the computer system by jabout his company to Company keying in instructions? oe “What is the term used for this type of Aas ‘misuse? (A) Menu driven (B) Graphical user (C) Touch sensitive > Commanddrven ia? 3, Awebmaster is important to the company because he/she “Which ofthefollowingare NOT categorized a is responsible for the ‘company's _as system software? is respor website (B) assigns web addresses to all users ses ae the disks (C)__ backs up files and stores the ‘at another location monitors the shutting ©) icompetirs’ websites down of race 4 Go ONTO THE NEXT ‘which of ate correctly forms (ay tmanapry@ne GB) @iana happ.ne’ Jann@hapy Lana@hanPY net o @net software rtbatinvol¥e which ofthe following 9 types of Should beused for applicant sesmerical calculation Database Presentation Spreadsheet ‘Word processing oe © ) “The following formulaislocatedin position 6 of a spreadsheet. =B3+B4+SBS5 ‘What would be the resulting formula if the initial formula was copied to the position Jocated immediately on the left? (a) C3+C4+65 (B) AS +A4+AS 4Q) AS +A4+SBS5 (D) C3+C4+SBS5 a query. student enter jteria for the date field in creating the following _ = 95/11/2017 and <= 05/14/2017 qe ousput will show days after 14 May 2017 only from 11 to 14 May 2017 pefore 11 May and after 14g 2017 between 14 May and 5 Noven 2017 Ww Sd © @) ‘spreadsheet formulae use (A) ___ values or labels (B) _ labels or cell addresses values, ran 1 addres (D) _values, labels or ¢ Which ofthe followis to fully justify text? a) ©) Lin Col The field tt in a databa: (a) (B) © (0) fore prit alte sec Hen SMe refers 10 the following table 45. lg Mating data on three countries, A, B Neng sp C, for 2018 and 2019. Country | 2018 2019 x 300 600 only B 500 800 2017 c 500. 600 after 14, | which of the following types of charts nd 5 Novente js NOT suitable for representing the data above? A) Pie @) Bar © bine {b) Column ‘A. The field that uniquely identifies a record ina database is called the buttons canbe (A) foreign key 4B. primary key (©) alternate key (D) secondary key 46. Which of the following sequences of steps is correet for deleting a field in a database table? Choose the delete row option. Select row to be deleted and right click. Open table in design view. Choose yes to confirm deletion. “ (Open table in design view. Select row to be deleted and right click. , Choose the delete row option. Choose yes to confirm deletion. Select row to be deleted and right click. Open table in design view. Choose the delete row option Choose yes to confirm deletion. © Select row to be deleted and right lick. ‘Choose the delete row option. Open table in design view ‘Choose yes to confirm deletion. ) the following database table al ‘Quan 20 tem 46 refers to Trem Dese Ttem No. 71050 1040 FKo30__| Fork __ Frxo20 | FKOIS Fork [rxors [Fon — hove shows r=? Hammer [ Hammer _1— ‘The database table sorted by ascending ord" Quantity 80 ingore Quant ecemtine Item No. in a5 ing w ® © o n de {tem No. * ext PAGE goonTo™ eB pom SL whichofthe fllowingisused forexecy, (8. ; panyispatese “7 yTML coe? . ne i cient? read (A. ich of gg TM ca) Aparie fa

You might also like