‘CANDIDATE PLEASE NOTED
PRINT your name on thetine below and vetwra | TEST CODE 01229010.
{ais boklt with your tmwer set Fale
FORM TP 2020086 | sm rit aisqatatin MAY/JUNE 2020
CARIBBEAN EXAMINATIONS COUNCIL
Ns
‘CONDARY EDUCATION CERTIFIC!
EXAMINATION
CARIBBE.
INFORMATION TE}
HNOLOGY
Paper 01 — General Proficiency
T hour 15 minutes
READ THE FOLLOWING INSTRUCTIONS CAREFULLY.
1, This test consists of 60 items. You will have 1 hour and 15 minutes to answer them,
2. In addition to this test booklet, you should have an answer sheet.
Each item in this test has four suggested answers lettered (A), (B),(C), (D). Read each item you
are about to answer and decide which ehoice is best
4. On your answer shee, find the number which corresponds to your item and shade the space havi
the same letter as the answer you have chosen, Look at the sample item below
‘Sample lim
Which of the following pairs represents general-purpose software tools?
(A) Spreadsheet and database software Sample Answer
(B) Word processor and accounting softwa mer
(C) Student record system and database software @800
(D) Insurance processing and spreadsheet software
The best answer to this item is “Spreadsheet and database software”, so (A) has been shaded,
5, Ifyou want o change your answer, criss it completely befine you fill in your new choice
6, When youare told to hegin, tum the page and work as quickly and as carefily as you can. Ifyou
a anno’ answer an item goon the nest oe. You may retin o that hem nce
DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO DO SO.
Copyright © 2019 Caribbean Examinations Council
All rights reserved.
01229010/MI/CSEC 2020,1. Whichotthe followingitemsareconsidered
computer hardware?
w
(B)
oO
Data that has been proces
"meaning is termed
SBD irvormation
Data
Programs.
Output devices
Operating systems
"d and has
(B)
(©) storage
(D) output
Which of the follow
“application software"?
ccan be termed
() Dos
(B) Linus.
(©) Mac Os
Intemet Explorer
4. Which of the following activities would
NOT be considered as cloud storage?
Data stored on remote servers
Data stored and accessible on a
LAN
(©) Data back-up and storage devices
fon the Internet
(D) _Datamanagedby storageproviders
‘or hosting companies
Which of the following could NOT be
Classified as a cloud-based application?
(A) Gait
(B) Drop Box
(©) Google drive
GP Winsows os
i
01229010/MJ/CSEC 2020
6.
“The lights in a room turn on as soon as a
person enters, Which input device MOST
likely controls the lighting in the room?
En Remote
© nner
(D) Keyboard
Which of the following devices is used to
input data into the computer?
SBD vou
(B) Monitor
(©) USB fash drive
(D) External hard drive
For which of the following interface types
is the user required to remember specific
instructions and syntax?
)
®
Liem 9 refers to the following model of a
be.
Menu-driven
Graphical user
Computer sereen
‘Command-driven
‘The MOST suitable printer for creating the
‘mode! of the globe is
EB as prince
(B) a laser primer
(©) anink-jet printer
(D) thermal printer
GO ON TO THE NEXT PAGEsae
‘The RP Secondary School wants the
administrative staff to have access to all
student and teacher data. Which of the
following networks would be MOST
Suitable to enable such access?
Ny
@)
c
Mem 1 refers to the following symbol
=
WLAN
WAN
MAN
LAN
11. The symbol represents
A) LAN.
Wi-Fi
(©) Hotspot
(D) Bluetooth
12, Unauthorized, real-time interception of
8 private communication on a computer
network is referred to as
(A) propaganda
(B) identity then
(©) industrial espionage
GP electronic eavesdropping
13. Double entry data verification involves
(A) different data entered once
(B) the data entered being copied to
‘another device
(©) different data entered once by two,
different persons
the same data entered once then
re-entered by another person
(01229010/MJ/CSEC 2020
Part of a private network using Internet
technology and publictelecommunications
that can be aceessed by business suppliers,
vendors, customers and partners is called
(A) Intemet
Intranct
xtranet
(D)Fthernet
15, Which of the following shows an increase
in computer memory capacity?
(A) Terabyte —+Gigabyte—+ Megabyte
(B) Gigabyte Kilobyte— Megabyte
(©) Megabyte Terabyte —- Gigabyte
legabyte + Gigabyte Terabyte
16. Which of the following functions is
performed by a modem?
EW. rates ana cigitat
(B) Digital and upload |
(©) Analog and downtoad
(D) Download and upload
17. Inthe URL hutp:/www shoes.com, ‘shoes,
‘com’ stands for the
extension
domain name
(©) company name
() Internet company
18, ‘Transferring data from a remote computer
to your computer is referred to as
(A) browsing
(B) uploading
data mining
downloading
GO ON TO THE NEXT PAGE,19. Which of the following types of technolo- 23. Which ofthe following is NOT a hardware
ies is commonly used by banks to read component of a computer system?
data on cheques?
B® dws
(A) Pos (B) Main memory
(B) ocr (©) Peripheral device
(©_ or (D) Cental processing unit
20, Which of the following operations is validation technique?
considereda feature ofa biomettiesystem?
Range
5 @ dering ingens B)Tncorsisency
ey Uakesing ae stig Double entry
(©). » Diagnoetag medial gmptoms (Dy Rensonableness
(D) Helping to lubricate skeletal joints
28, The process of scrambling messages atthe
ymmuting can be BEST described as sending end and unscrambling them at the
receiving end is called
2 Tele
(A) using the computer while
a coding
@ using the telephone white QB) ener tion
ees 1 cpus
GEE wrest or tome by connecting (D) eavesdropping
hhome and office
(D) working from the office after
establishingaconnectionathome 26. ‘There are many software restrictions used
by computers to protect data and maintain
data integrity. Which of the following
22. Inorderfo use a program stored on a flash entities are software restriction media?
drive, the program must be transferred into
Lvs
nom th, Sree
@® an ML Eneryptions
(PROM
apron Land tonly
(©) and tttony
tani
a
GO ON TO THE NEXT PAGE.
(01229010/MN/CSEC 202027,
28,
29,
30.
Mu
o1229010MU/C
Which ofthe following devices can be used
for both input and output?
EBD touchscreen
(B) Barcode reader
(©) Flatbed scanner
(D) Document reader
Which ofthe followingis tue of acces
files sequentially?
‘Occurs in any order
Stats with the first record
(C) Starts with the largest data
)
eld
‘Starts with the smallest data field
of the following is a hardware user
terface?
GUI
(B) Icon
(© __ Sensor
© Touchscreen
Anofficial of Company X sells confidential
information abouthiscompany toCompany
YY. What is the term used for this type of
information misuse?
om: thet
‘omputer fraud
(©) Industrial espionage
(D) Electronic eavesdropping
WhichofthefollowingareNOTeategorized
as system software?
Productivity tools
(8) Operating systems
(©) Translators
(D) Utilities
2020
32. Which part of the central processing unit
(CPU) coordinates its activities?
(A) Register
Rey
(D) Arithmetic logie unit
33, Before purchasing a computer,
‘given a sheet with the following hardware
specifications.
Tntel Pentium IV 64 bit
3.6GHz 2GB $33MHz
SORAM 160GB_ SATA
HDD___7200 pm
‘The word use of the computer is
(A) 2GB
64 bit
(C) 7200 pm
(D) 533 MHz
34. Which type of interface allows the user 10
‘communicate with the computer system by
keying in instructions?
Menu driven
Graphical user
‘Touch sensitive
Command-driven
Os)
(B)
oO
ons
| és responsibie for the company’s
weit
assigns web adresses ol users
ina company
(©) backs up flv and stores the disks
at ancther location
monitors the shutting down of
competitors’ websites
@)
)
GO ON TO THE NEXT PAGE36.
.
38,
29,
-6-
Which of the following is an example of a
correctly formatted e-mail address?
(A) Lana.happy@net
(B)— @lanahappy.net
‘Which of the following types of software
should beused for applications that involve
repetitive numerical caleulations?
Spreadsheet
Word processing
Selecting orhighlighting aparagraphreates
A) file
(B) block
(©) merge
EQIP cument
‘The following formulaislocatedin position
B6 ofa spreadsheet
= B3 + Ba + SBS
What would be the resulting formula if the
initial formula was copied to the position
located immediately on the left?
( caveases
B)ASeAtoAS
@ BINS ss
tb) Choces oss
01229010MI/CSEC 2020
40,
ate
2.
In creating a query, a student entered the
following eriteria for the date field
(05/11/2017 and <= 05/14/2017
‘The output will show days
(A) after 14 May 2017 only
@ from 11 10 14 May 2017
before 1 May and after 14 May
2017
(D) between 14 May and 5 November
2017
(A) values or labels
(B) labels or cell addresses
(©) values, ranges or cell addresses
(D) values, labels or cell addresses
Which ofthe following butions can be used
to fully justify text?
“
®
©
GO ON TO THE NEXT PAGEag
em 43 refers to the following table
containing data on three counties, A, 1
and C, for 2018 and 2019,
Country [2008 2019
A 300, 600.
B 500) 800)
c 500, 600)
Which of the following types of charts
is NOT suitable for representing the data
above?
@Dr
(B) Bar
© Line
(B) Column
“OT
jeld that uniquely idemifies @ record
base is called the
(A) foreign key
Brn key
alternate key
(D) secondary key
01229010) MJ/CSEC 2020
45,
46.
Which of the following sequences of steps
is correct for deleting a field in a database
table?
(A) Choose the delete row option.
Select row to be deleted and right
click.
Open table in design view.
Choose yes to confirm deletion.
©) © Soesthisincesa view
Select row to be deleted and right
click
‘Choose the delete row option.
Choose yes to confirm deletion.
(© Select row to be deleted and right
click.
Open table in design view.
Choose the delete row option,
Choose yes to confirm deletion.
(D) Select row to be deleted and right
click.
‘Choose the delete row option
Open table in design view
Choose yes to confirm del
{Hem 46 refers tothe following database table
tem No. [Ttem Dese._ | Quantity
HOS, Hammer [20
Hoa) Hammer [40
FKO30 | Fork 3
FKO20 | Fork 40
FKOIS | Fork 5
The database table above shows records
sorted by
(A) Quantity in ascending order
(B) Quantity in descending order
(C) Item No. in ascending order
lem No. in descending order
GO ON TO THE NEXT PAGEae
47. Which of the following clearly idemtifiesa 48, Whichofthe followingisused forexecuting
hyperlink on an HTML document? HTML code?
1. Alink to an email address A) A parser
I. A fink to another webpage A browser
ML A Tink to another location within (C)_ Anassembler
the webpage (D)—Aninterpreter
(A) Land It only
(B) Land tit only 49. Which security feature offers the LEAST
C) Hand It only protection to a Word document?
tnd tt
(A) Restricting editing
(B) Adding a digital signature
(©) Encrypting with a password
QD Swirg 25 compatible with the
appropriate software version
‘em $0 refers to the following spreadsheet
=sumi(B2::B6)
50, Ifthe f
‘mula in Cell BS is copied to the shaded eell, C8, then, the formula in Cell C8 would be
(A) ~sum(B2:B6)
B)
GO ON TO THE NEXT PAGE
(01229010/MI/CSEC 2020si.
52.
53.
(GDP Reads two mumbers and
5.58
Item 51 refers to the following algorithm.
Read (A, B)
IfA