90% found this document useful (10 votes)
13K views9 pages

IT CSEC P1 June 2021 (Answers)

Uploaded by

Morana Beharry
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
90% found this document useful (10 votes)
13K views9 pages

IT CSEC P1 June 2021 (Answers)

Uploaded by

Morana Beharry
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 9
‘CANDINATES PLEASE NOTED Puistyerneneon eis xox ndeatre [TEST CODE 01229010 ames MAY/JUNE 2021 ‘oom may res FORM TP 2021086 CARIBBEAN EXAMINATIONS COUNCIL CARIBBEAN SECONDARY EDUCATION CERTIFICATE® EXAMINATION INFORMATION TECHNOLOGY Paper 01 — General Proficiency Thour 15 minutes READ THE FOLLOWING INSTRUCTIONS CAREFULLY. 1. This test consists of 60 items. You will have | hour and 15 minutes to answer them. 2. _Inaddition to this test booklet, you should have an answer sheet, Each item in this test has four suggested answers lettered (A), (B), (C), (D). Read each item you Fea winesret neds which choice is best, 4, Onyouranswer sheet, find the number which corresponds to your item and shade the space having the same letter as the answer you have chosen, Look et the sample item below. Sample Item Which of the following pairs represents general-purpose software tools? (A) Spreadsheet and database software Sample Answer (©) Start ocd sytem an dsb sofware @8O00 (D) Insurance processing and spreadsheet software The best answer to this item is “Spreadsheet and database software”, 50 (A) has been shaded. 5. Ifyou want to change your answer, erase it completely before you fil in your new choice. 6, When you are told to begin, tum the page and work as quickly and as carefully as you can. Ifyou cannot answer an item, go on to the next one, You may return to that item later. DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO DO SO. Copyright © 2020 Caribbean Examinations Council All rights reserved, fash drive, the ol dona th vse. program sored 0 2 10 7 bivenits Hee ranted ito ROM RAM PROM {p) EPROM 3 Which of the following operations is aedened a feature ofa biometric system? Matching fingerprints (B) Detecting irregular heartbeats (C)__ Diagnosing medical symptoms (D) Lubricating skeletal joints 4. Which of the following would NOT be considered cloud storage? (A) Data stored on remote servers ri) Data stored and accessible on a LAN (C) Data back-up and storage devices on the Internet (D) _ Datamanaged by storage providers or hosting companies Which of the following could NOT be classified as a cloud-based application? (A) Gmail (B) Dropbox (C}_ Google Drive Windows OS “the lights in a room tum on as g personenters, Which inputdevicg; ist? Rrely used to control the lighting WOST room? i in gy @ Sensor )) — Remote (C) Scanner (D) Keyboard Which of the following devices ig y input data into the computer? © Q Mouse Speaker (C)__ USB flash drive (D) External hard drive In which of the following interface types is the user required to remember specific instructions and syntax? (A) Menu-driven Graphical user Computer screen ( Command-driven Item 9 refers to the following model of a globe. The MOST suitable printer forcreatingthe model of the glabe above is a3-D printer ( a laser printer (C) an ink-jet printer (D) a thermal printer cee WENT PAGE ‘Scanned th canseamnet -3- 10, Which of the following protocols is used 14. to ensure that all web pages and servers communicate with each other? (A) IP (B) FTP. VolP ® ute Item 11 refers to the following symbol. — 15. The symbol represents ) LAN Wi-Fi (©) Hotspot ia (D) — Bluctooth 12, Unauthorized, real-time interception of a private communication on a computer network is referred to as. (A) propaganda (B) identity theft ') industrial espionage 17, electronic eavesdropping 13. Double-entry data verification involves (A) different data entered once (B) the data entered being copied to another device (C) different data entered once bytwo 8. different persons the same data entered once then re-entered by another person A120MI AMAICSE 271 @ {A developer is important to 2 company because he/she je for the company’s is respo website (B) assigns web address ina company (C) backs up files and stores the disks at another location (D) monitors the shutting down of competitors’ websites s to all users Which of the fallowing shows an increase in computer memory capacity? (A) Megabyte— Terabyte Gigabyte ® Megabyte— Gigabyte Terabyte | Terabyte—» Gigabyte—+ Megabyte (D) — Gigabyte— Kilobyte—+ Megabyte In the URL hitp://www.shoes.com, ‘shoes.com’ stands for the extension company name domain name Internet company (Ay Which of the following checks is NOT a validation technique? Range @ Double entry (C) Inconsistency (D) _ Reasonableness Which of the followingtypesof technology is commonly used by banks to read data on cheques? (A) POS (B) OCR (Cc) OME MICR GO ON TO THE NEXT PAGE 20, Data tha 21. 22. sa froma remote computer 0 ferring dat Tener rete 10.8 Ay) browsing (B) 1 has been processed and that has meaning is termed information d database (©) storage (D) output ‘Telecommuting can be BEST described as (A) using the computer while commuting (B) using the telephone while commuting working from home by connecting a home and office (D) working from the office after establishingaconnectionathome The process of scrambling messages at the sending end and unscrambling them at the receiving end is called (A) coding B espionage encryption (D) eavesdropping 23. 24, 25. 26. Which of the following is Nor a, component of a computer systenna’¥ate @ (Cc) (D) Data file Main memory Peripheral device Central processing unit Which of the following can be ‘application software"? termed (A) DOS (B) Linux Mac Os «© @ Internet Explorer Which of the following functions is performed by a modem? ‘A) Regulates analogand digital signals B)) Modulates analog and digital signals (C) Prevents analog and digital signals from being uploaded (D) Prevents analog and digital signals from being downloaded ‘There are many software restrictions used by computers to protect data and maintain data integrity. Which of the following entities are software restriction media? L Viruses Il. Passwords Il. Encryptions (A) land only Land III only Mand II] only I, Mand It 8 -5- 27, Whichofthe followingdevicescanbeused 32. for both input and output? Touchseres % ) Barcode reader (C) Flatbed seanner (D) Document reader 28, Whichof the following istruc ofaccessing 33. files sequentially? & Starts with the first record ¢ Starts with the largest data field (D) Starts with the smallest data field Oceurs in any order 29. Which of the following is a hardware user interface? @ GUI ( Icon (©) Sensor (D) Touchscreen 30. Anofficial of Company X sells confidential information abouthis company to Company Y. What is the term used for this type of 34, information misuse? (A) Identity theft (B) Computer fraud 6 Industrial espionage (io) Electronic eavesdropping 31, Whichofthe followingare NOT categorized as system software? [A Productivity tools (B) — Operating systems (C) Translators (D) Utilities 35. 0122901 0/MJ/CSEC 2021 Which part of the central pracessing unit (CPU) coordinates its activities? ) Register fs Control unit Main memory (D) Arithmetic logic unit Before purchasing a computer, James was given a sheet with the following hardware specifications, Intel Pentium 1V 64 bit 3.6.GIz 2GB 933 MHz, 50 RAM 160GB SATA HDD. 7200 rpm ‘The processing speed of the central processing unit (CPU) is (A) 2GB 3.6 Gllz (C) 7200 rpm (D) 533 Miz The part ofa private network using Internet technology and public telecommunications that can be accessed by business suppliers vendors, customers, partners is called an (A) Intemet Intranet © Extranet Ethernet Which of the following pairs are hardware devices with a user interface? (A) Keyboard/monitor (B) — Optical drive/hard drive 8 Magnetic/optical character reader Touchscreen/specialized keyboard GOON TO THE NEXT PAGE 36. 37. 38. 39. -6- of he following is an example ofa which s mp Whit ly formatted e-mail address Jana@happy.net @lana.happy.net (C)__ lana.happy@ net (D)_lana@happy@net Which of the following types of software 4g, should be used for applications thatinvolve e numerical calculations? repel (A) Database Presentation C) Spreadsheet (D) Word processing Selecting or highlighting a paragraph Al. creates a (A) file B)) block merge (D) document 42. The following formulais located inposition B6 of a spreadsheet. =B3+B4 + SBS5 If the formula is copied to the position located immediately on the left, what would be the resulting formula? (A) C3 +C4+C5 3) AB FAST AS A3+A4+SBS5 (D) C3+C4+SBSS em 40 refers a to the follows containing data on three coon ing table and C, for 2020 and 2021. AB Country 2020 202 A 300 600 8 500 800 500 600 Which of the followin, 1 , LEAST suitable for reprecening nas above? representing the data Pie (B) Bar (C) Line (D) Column Spreadshee! formulae use (A) values or labels & labels or cell addresses values, ranges or cell addresses (D) values, labels or cell addresses Which of the following buttons can be used to fully justify text? C8) (8) © WAY AU ahh -7- In creating a query, a student entered the following criteria for the date field. >= 05/11/2021 and < = 05/14/2021 ‘The output will show days after 14th May 2021 only from {1th and 1th May 2021 (2) before [1th May and afer 14th May 2021 (p) between 14th May and Sth November 2021 ‘The field that uniquely identifies a record 4 ; ina database is called the foreign key primary key (alternate key (D) secondary key tem 45 refers to the following database table Tiem No. _| Item Desc. [ Quantity 1050 Hammer [20 HO40 Hammer [40 FKO030 Fork 35 FK020 Fork 40 FKOIS Fork 45 45. The database table above shows records soried by (A) Quantity in ascending order (B) — Quantity in descending order C) Item No. in ascending order Item No. in descending order 91229010/MJ/CSEC 2021 46. 47. 48. Which of the following sequences of ‘tens for deleting a record in a database taPIe 1. Choose the delete row option. HH. —Select the row to be deteted and right click. Hi, Open table in design vie IV. Choose yes ta confirm deletion. (A) ATIAV GG LILLiv (C) WAIL LAV (D) 1, 1, 1, TV Which of the following clearly identify a hyperlink in an HTML document? 1. Alink to an email address Il, A link (o another webpage I. A link to another location within the webpage {A) {and Il only (B) Land {I only a Mand 11 only 1 Uand UL Which of the following content controls would be useful when creating a fillable electronic form for online use? 1. Date picker I. Cheek box I, Drop-down list (A) (B) @ Vand IL only Iand [ll only Mand Il only 1, and 111 GO ON TO THE NEXT PAGE. 49. 50. following features allows the Which ofthe M ividual names ina primary user to insert document? (A) Footer 8 Header Mail merge Search and replace Which of the following steps is required to cenire text across & range of cells ina spreadsheet? (A) Selectand copy the text across the cells. (B) Select and cenire the text and then merge the cells. Select the text across the cells, then merge and centre. (D) Type the text in the middle of the selected cells. Item 51 refers to the following algorithm. Read (A, B) IfA

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy