0% found this document useful (0 votes)
248 views10 pages

CSEC 2020 IT Past Paper Mult Choice Answers

This document is an examination paper for the Caribbean Examinations Council's General Proficiency Information Technology test, consisting of 60 multiple-choice questions. Candidates are instructed to print their name, use the provided test code, and follow specific guidelines for answering the questions. The test duration is 1 hour and 15 minutes, and it covers various topics related to computer hardware, software, networking, and data management.

Uploaded by

beckfordmich
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
248 views10 pages

CSEC 2020 IT Past Paper Mult Choice Answers

This document is an examination paper for the Caribbean Examinations Council's General Proficiency Information Technology test, consisting of 60 multiple-choice questions. Candidates are instructed to print their name, use the provided test code, and follow specific guidelines for answering the questions. The test duration is 1 hour and 15 minutes, and it covers various topics related to computer hardware, software, networking, and data management.

Uploaded by

beckfordmich
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 10
‘CANDIDATE PLEASE NOTED PRINT your name on thetine below and vetwra | TEST CODE 01229010. {ais boklt with your tmwer set Fale FORM TP 2020086 | sm rit aisqatatin MAY/JUNE 2020 CARIBBEAN EXAMINATIONS COUNCIL Ns ‘CONDARY EDUCATION CERTIFIC! EXAMINATION CARIBBE. INFORMATION TE} HNOLOGY Paper 01 — General Proficiency T hour 15 minutes READ THE FOLLOWING INSTRUCTIONS CAREFULLY. 1, This test consists of 60 items. You will have 1 hour and 15 minutes to answer them, 2. In addition to this test booklet, you should have an answer sheet. Each item in this test has four suggested answers lettered (A), (B),(C), (D). Read each item you are about to answer and decide which ehoice is best 4. On your answer shee, find the number which corresponds to your item and shade the space havi the same letter as the answer you have chosen, Look at the sample item below ‘Sample lim Which of the following pairs represents general-purpose software tools? (A) Spreadsheet and database software Sample Answer (B) Word processor and accounting softwa mer (C) Student record system and database software @800 (D) Insurance processing and spreadsheet software The best answer to this item is “Spreadsheet and database software”, so (A) has been shaded, 5, Ifyou want o change your answer, criss it completely befine you fill in your new choice 6, When youare told to hegin, tum the page and work as quickly and as carefily as you can. Ifyou a anno’ answer an item goon the nest oe. You may retin o that hem nce DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO DO SO. Copyright © 2019 Caribbean Examinations Council All rights reserved. 01229010/MI/CSEC 2020, 1. Whichotthe followingitemsareconsidered computer hardware? w (B) oO Data that has been proces "meaning is termed SBD irvormation Data Programs. Output devices Operating systems "d and has (B) (©) storage (D) output Which of the follow “application software"? ccan be termed () Dos (B) Linus. (©) Mac Os Intemet Explorer 4. Which of the following activities would NOT be considered as cloud storage? Data stored on remote servers Data stored and accessible on a LAN (©) Data back-up and storage devices fon the Internet (D) _Datamanagedby storageproviders ‘or hosting companies Which of the following could NOT be Classified as a cloud-based application? (A) Gait (B) Drop Box (©) Google drive GP Winsows os i 01229010/MJ/CSEC 2020 6. “The lights in a room turn on as soon as a person enters, Which input device MOST likely controls the lighting in the room? En Remote © nner (D) Keyboard Which of the following devices is used to input data into the computer? SBD vou (B) Monitor (©) USB fash drive (D) External hard drive For which of the following interface types is the user required to remember specific instructions and syntax? ) ® Liem 9 refers to the following model of a be. Menu-driven Graphical user Computer sereen ‘Command-driven ‘The MOST suitable printer for creating the ‘mode! of the globe is EB as prince (B) a laser primer (©) anink-jet printer (D) thermal printer GO ON TO THE NEXT PAGE sae ‘The RP Secondary School wants the administrative staff to have access to all student and teacher data. Which of the following networks would be MOST Suitable to enable such access? Ny @) c Mem 1 refers to the following symbol = WLAN WAN MAN LAN 11. The symbol represents A) LAN. Wi-Fi (©) Hotspot (D) Bluetooth 12, Unauthorized, real-time interception of 8 private communication on a computer network is referred to as (A) propaganda (B) identity then (©) industrial espionage GP electronic eavesdropping 13. Double entry data verification involves (A) different data entered once (B) the data entered being copied to ‘another device (©) different data entered once by two, different persons the same data entered once then re-entered by another person (01229010/MJ/CSEC 2020 Part of a private network using Internet technology and publictelecommunications that can be aceessed by business suppliers, vendors, customers and partners is called (A) Intemet Intranct xtranet (D)Fthernet 15, Which of the following shows an increase in computer memory capacity? (A) Terabyte —+Gigabyte—+ Megabyte (B) Gigabyte Kilobyte— Megabyte (©) Megabyte Terabyte —- Gigabyte legabyte + Gigabyte Terabyte 16. Which of the following functions is performed by a modem? EW. rates ana cigitat (B) Digital and upload | (©) Analog and downtoad (D) Download and upload 17. Inthe URL hutp:/www shoes.com, ‘shoes, ‘com’ stands for the extension domain name (©) company name () Internet company 18, ‘Transferring data from a remote computer to your computer is referred to as (A) browsing (B) uploading data mining downloading GO ON TO THE NEXT PAGE, 19. Which of the following types of technolo- 23. Which ofthe following is NOT a hardware ies is commonly used by banks to read component of a computer system? data on cheques? B® dws (A) Pos (B) Main memory (B) ocr (©) Peripheral device (©_ or (D) Cental processing unit 20, Which of the following operations is validation technique? considereda feature ofa biomettiesystem? Range 5 @ dering ingens B)Tncorsisency ey Uakesing ae stig Double entry (©). » Diagnoetag medial gmptoms (Dy Rensonableness (D) Helping to lubricate skeletal joints 28, The process of scrambling messages atthe ymmuting can be BEST described as sending end and unscrambling them at the receiving end is called 2 Tele (A) using the computer while a coding @ using the telephone white QB) ener tion ees 1 cpus GEE wrest or tome by connecting (D) eavesdropping hhome and office (D) working from the office after establishingaconnectionathome 26. ‘There are many software restrictions used by computers to protect data and maintain data integrity. Which of the following 22. Inorderfo use a program stored on a flash entities are software restriction media? drive, the program must be transferred into Lvs nom th, Sree @® an ML Eneryptions (PROM apron Land tonly (©) and tttony tani a GO ON TO THE NEXT PAGE. (01229010/MN/CSEC 2020 27, 28, 29, 30. Mu o1229010MU/C Which ofthe following devices can be used for both input and output? EBD touchscreen (B) Barcode reader (©) Flatbed scanner (D) Document reader Which ofthe followingis tue of acces files sequentially? ‘Occurs in any order Stats with the first record (C) Starts with the largest data ) eld ‘Starts with the smallest data field of the following is a hardware user terface? GUI (B) Icon (© __ Sensor © Touchscreen Anofficial of Company X sells confidential information abouthiscompany toCompany YY. What is the term used for this type of information misuse? om: thet ‘omputer fraud (©) Industrial espionage (D) Electronic eavesdropping WhichofthefollowingareNOTeategorized as system software? Productivity tools (8) Operating systems (©) Translators (D) Utilities 2020 32. Which part of the central processing unit (CPU) coordinates its activities? (A) Register Rey (D) Arithmetic logie unit 33, Before purchasing a computer, ‘given a sheet with the following hardware specifications. Tntel Pentium IV 64 bit 3.6GHz 2GB $33MHz SORAM 160GB_ SATA HDD___7200 pm ‘The word use of the computer is (A) 2GB 64 bit (C) 7200 pm (D) 533 MHz 34. Which type of interface allows the user 10 ‘communicate with the computer system by keying in instructions? Menu driven Graphical user ‘Touch sensitive Command-driven Os) (B) oO ons | és responsibie for the company’s weit assigns web adresses ol users ina company (©) backs up flv and stores the disks at ancther location monitors the shutting down of competitors’ websites @) ) GO ON TO THE NEXT PAGE 36. . 38, 29, -6- Which of the following is an example of a correctly formatted e-mail address? (A) Lana.happy@net (B)— @lanahappy.net ‘Which of the following types of software should beused for applications that involve repetitive numerical caleulations? Spreadsheet Word processing Selecting orhighlighting aparagraphreates A) file (B) block (©) merge EQIP cument ‘The following formulaislocatedin position B6 ofa spreadsheet = B3 + Ba + SBS What would be the resulting formula if the initial formula was copied to the position located immediately on the left? ( caveases B)ASeAtoAS @ BINS ss tb) Choces oss 01229010MI/CSEC 2020 40, ate 2. In creating a query, a student entered the following eriteria for the date field (05/11/2017 and <= 05/14/2017 ‘The output will show days (A) after 14 May 2017 only @ from 11 10 14 May 2017 before 1 May and after 14 May 2017 (D) between 14 May and 5 November 2017 (A) values or labels (B) labels or cell addresses (©) values, ranges or cell addresses (D) values, labels or cell addresses Which ofthe following butions can be used to fully justify text? “ ® © GO ON TO THE NEXT PAGE ag em 43 refers to the following table containing data on three counties, A, 1 and C, for 2018 and 2019, Country [2008 2019 A 300, 600. B 500) 800) c 500, 600) Which of the following types of charts is NOT suitable for representing the data above? @Dr (B) Bar © Line (B) Column “OT jeld that uniquely idemifies @ record base is called the (A) foreign key Brn key alternate key (D) secondary key 01229010) MJ/CSEC 2020 45, 46. Which of the following sequences of steps is correct for deleting a field in a database table? (A) Choose the delete row option. Select row to be deleted and right click. Open table in design view. Choose yes to confirm deletion. ©) © Soesthisincesa view Select row to be deleted and right click ‘Choose the delete row option. Choose yes to confirm deletion. (© Select row to be deleted and right click. Open table in design view. Choose the delete row option, Choose yes to confirm deletion. (D) Select row to be deleted and right click. ‘Choose the delete row option Open table in design view Choose yes to confirm del {Hem 46 refers tothe following database table tem No. [Ttem Dese._ | Quantity HOS, Hammer [20 Hoa) Hammer [40 FKO30 | Fork 3 FKO20 | Fork 40 FKOIS | Fork 5 The database table above shows records sorted by (A) Quantity in ascending order (B) Quantity in descending order (C) Item No. in ascending order lem No. in descending order GO ON TO THE NEXT PAGE ae 47. Which of the following clearly idemtifiesa 48, Whichofthe followingisused forexecuting hyperlink on an HTML document? HTML code? 1. Alink to an email address A) A parser I. A fink to another webpage A browser ML A Tink to another location within (C)_ Anassembler the webpage (D)—Aninterpreter (A) Land It only (B) Land tit only 49. Which security feature offers the LEAST C) Hand It only protection to a Word document? tnd tt (A) Restricting editing (B) Adding a digital signature (©) Encrypting with a password QD Swirg 25 compatible with the appropriate software version ‘em $0 refers to the following spreadsheet =sumi(B2::B6) 50, Ifthe f ‘mula in Cell BS is copied to the shaded eell, C8, then, the formula in Cell C8 would be (A) ~sum(B2:B6) B) GO ON TO THE NEXT PAGE (01229010/MI/CSEC 2020 si. 52. 53. (GDP Reads two mumbers and 5.58 Item 51 refers to the following algorithm. Read (A, B) IfA

You might also like