95% found this document useful (43 votes)
50K views11 pages

Csec Information Technology Paper 1 2023

The document discusses computer hardware, software, storage and networking concepts. It provides multiple choice questions to test understanding of these topics, including types of computer components, uses of storage devices, networking protocols and security risks. The questions cover a wide range of foundational IT concepts.

Uploaded by

Nick Johnson
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
95% found this document useful (43 votes)
50K views11 pages

Csec Information Technology Paper 1 2023

The document discusses computer hardware, software, storage and networking concepts. It provides multiple choice questions to test understanding of these topics, including types of computer components, uses of storage devices, networking protocols and security risks. The questions cover a wide range of foundational IT concepts.

Uploaded by

Nick Johnson
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

- 2 -

W h i c ho f t h e f o l l o w i n g is the B E S T reason
1. Which o f the following are considered 5. for using cloud storage instead o f local
computer hardware? storage?

@ o e , im) c o t
ci
(c) Output devices Cepacity
(D) Operating systems (D) ofuse

2 To use a program stored onaf l a s h drive, following diaer:


i
Item_6 refers to the fo lowing diagram
the program must be transferred into h i c h shows the basic operations o f a

{A) ROM general purpose computer system.


(B) RAM
(C) PROM

3. Which o f the following devices is MOST f J


likely to be used with a point of sale (POS)

system? [ 2 ]
I Touch-screen
IL Barcode reader
Ill. Optical mark reader 6. W h i c h o f the f o l l o w i n g f u n c t i o n s is carried
out in Box Z?
{A) Land I] only
(B) Land I I only (A) Input
(C) Mand I f only (B) Output
(D) I, Wand I l (C) Storage
(D) Processing

4 Which o f the f o l l o w i n g would N O T be . .

considered cloud storage? 7, W h i c h o ft h e f o l l o w i n g devices is used to


Ted input data into a computer?
(A) Data stored on remote servers

(B) Data stored and accessible on a (A) Mouse


LAN (B) Speaker
(C) Data back-up and storage devices (C) USB flash drive
on the Internet (D) External hard drive
(D) Data managed by storage providers
o r hosting companies

0122901 0/MIJ/CSEC 2023 GO ON TO T H E N E X T PAGE


- 3 -

I n w h i c h o f t h e f o l l o w i n gt y p e so f i n t e r f a c e s Item 11 refers to the f o l l o w i n g symbol.


is the user r e q u i r e d t o r e m e m b e r specific
instructions and syntax?

(A)
(B)
(C)
(D)
Menu-driven
G r a p h i c a l user
C o m p u t e r screen
Command-driven
>
The symbol represents

{A) LAN
ltem_ 9 refers to the f o t l o w i n g m o d e l of a
(B) Wi-Fi
globe.
(c) WAN
(D) ?_ B l u e t o o t h

12. Unauthorized, real-time i n t e r c e p t i o n o f


@ private c o m m u n i c a t i o n on a c o m p u t e r
network is referred to as

(A) propaganda
(B) identity theft
The p r i n t e r M O S T suitable for creating the (C} industrial espionage
m o d e l o f the g l o b e above is (D) _ electronic eavesdropping

(A) ? a 3 - D printer
(B) a laser printer 13. Double-entry data verification i n v o l v e s
(C) an ink-jet printer
(D) a thermal printer (A) different data entered once
(B) the data entered being copied to
another device
10. W h i c h o f the f o l l o w i n g p r o t o c o l s is used (Cc) different data entered once by t w o
to ensure that w e b b r o w s e r s and servers different persons
c o m m u n i c a t e w i t h each other? (D) the same data entered once then
re-entered by another person
(A) IP
(B) FTP
(C) VoIP 14, A w e b developer is important to a c o m p a n y
(D) HTTP because this person

(A) is responsible for the company?s


website
(B} assigns w e b addresses t o all users
in a company
(cy backs up w e b files a n d stores the
disks at another location
(D) M o n i t o r s the s h u t t i n g d o w n o f
competitors? websites

G O O N TO T H E N E X T PAGE
01229010/MJ/CSEC 2023
- 4 -

15, Data that has been processed and that has


W h i c h o f the f o l l o w i n g sequences s h o w s 20.
)@ an increase in c o m p u t e r m e m o r y capacity? meaning is termed
-

(A) Megabyte?Terabyte?Gigabyte (A) _ information


(B) Mcgabyte?-Gigabyte?Terabyte (B) database
(C) ? Terabyte?+Gigabyte?Megabyte (c) storage
(D) ? G i g a b y t e ? K i l o b y t e ? M e g a b y t e (D) output

16, T e l e c o m m u t i n g c a n b e B E S T d e s c r i b e d as
In the URL htup://www.shoes.com, 21.
?shoes.com? represents the
(A) using the computer while
(A) extension commuting
(B) domain name (B) using the telephone while
(C) company name commuting
(D) Internet c o m p a n y (C) working f r o m home b y connecting
home and office
(D) w o r k i n g f r o m the o f f i c e after
17. W h i c h o f the f o l l o w i n g statements about establishing a c o n n e c t i o n at
b i o m e t r i c s y s t e m s is F A L S E ? home

{A) ? A s m a l l a m o u n t o f m e m o r y is used
t o store data. 22, The process o f scrambling messages at the
@) T h e u s e r has t o be present t o use sending end and unscrambling them at the
t h e system. receiving end is called
(C) T h e p e r s o n a l d a t a c a p t u r e d is v e r y
intrusive. (A) coding
(D) T h e l e v e l o f a c c u r a c y is v e r y h i g h . (B) espionage
(C) encryption
(D) eavesdropping
W h i c h o f the f o l l o w i n g t y p e s o f t e c h n o l o -
g i e s is c o m m o n l y used b y banks to read
d a t a on cheques? 23. Which o f the f o l l o w i n g is N O T a hardware
component o f a computer system?
(A) POS
(B) OCR (A) Data file
(C) OMR
(B) Main memory
(D) MICR (C) Peripheral device
(D) Central processing unit

Transferring data from a remote computer


to a personal computer is referred to as 24,
Which o f the following can be termed
?application software??
(A) downloading
{B) ? data m i n i n g (A) DOS
(C) uploading (B) Linux
(D) browsing (C) Macos
(D) Google Chrome
55
G O O N T O T H E N E X T PAGE
01229010/MJ/CSEC 2023
25. Which o f the f o l l o w i n g functions is 29. Asystem that analyses data and uses rules
p e r f o r m e d by a m o d e m ? and previous information to deliver possible
decisions is called
(A) Regulatesanalog a n d d i g i t a l signals
(B) Modulates analog and d i g i t a l (A) a robot machine

signals (B) an expert s y s t e m


(C) Prevents analog and d i g i t a l signals (Cc) a biometric machine
from being uploaded (D) amainframe computer
{D) Prevents analog and d i g i t a l signals
from being downloaded
30. Anofficial o f C o mX s ep l l s ca o n fni d e nyt i a l
i n f o r m a t i o n about his c o m tpo Ca o mn p ayn y
26. W h i c h o f the f o l l o w i n g p r o v i d e p r o o f that Y. W h a t is the t e r m used f o r this t y p e o f
the e x t e n s i v e use o f I C T has had a p o s i t i v e i n f o r m a t i o n misuse?
i m p a c t o n the f i e l d o f business?
(A) Identify theft
I. E-commerce (B) C o m p u t e r fraud
il. E l e c t r o n i c p o i n t o f sale systems (C) I n d u s t r i a l espionage
Hl. Telecommuting (D) Electronic eavesdropping

(A) Land II o n l y
(B) a n d III only 3. W h i c h o f the f o l l o w i n g are N O T catego-
(Cc) U and II] only rized as system software?
@ ) ~~ I, M a n d I t
(A) Productivity tools
(B) ?Operating systems
27. W h i c h o f the f o l l o w i n g d e v i c e s can be used (c) Translators
f o r b o t h i n p u t and output? {D) Utilities

(A) Touch-screen
(B) B a r c o d e reader 32. W h i c h o f the f o l l o w i n g statements about
{C) Flatbed scanner the misuse o f c o m p u t e r systems is F A L S E ?
@ ) D o c u m e n t reader
(A) Unlaw f u l l y a c c e osn esc oim p
n u tge r
t r o m a n o t h e r is c o m p u t e r f r a u d .
28. W h i c h o f the f o l l o w i n g is true o f accessing (B) W r o n g t u l l y using another person's
files sequentially? p e r s o n a l d a t a is i d e n t i t y t h e t t .
(Cc) Trying to lure someone into
(A) O c c u r s in any order providing sensitive data is
(B) Starts w i t h the first record phishing.
{C) Starts w i t h the largest data field (D) Accessing a camputer security
(D) Starts w i t h the smallest data field system for i H i c t purposes ts
software piracy,

G O O N T O T H E N E X T PAGE
0 1 2 2 9 0 1 0 / M J / C S E C 2023
-6-

Item 37 refers to the f o l l o w i n g form.


33. B e f o r e p u r c h a s i n g a c o m p u t e r , James w a s
g i v e n a sheet w i t h the f o l l o w i n g h a r d w a r e
specifications.

Intel Pentium I V 64 bit

3.6 G H z 2GB RAM Date of Birth


Day/Month/Vear
160 G B SATA H D D 7200 rp

The C P U speed o f the computer is


37. Which of the followingt a b l e editing features
(A) 2GBRAM was applied to the shaded cells i n the form?
( B ) = 64 bit
(C) 7200 rpm (A) Merge
(D) 3.6 G H z (B) = Split
(C) Shift
(D) Insert
T h e p a r t o fa p r i v a t e n e t w o r k u s i n g I n t e r n e t
t e c h n o l o g y and p u b l i c telecommunications
t h a t c a n be accessed b y b u s i n e s s s u p p l i e r s , I t e m 3 8 refers to t h e f o l l o w i n g f i g u r e f o u n d
v e n d o r s , c u s t o m e r s a n d partners is c a l l e d an in a spreadsheet.

(A) Internet
(B) Intranet
(C) ? Extranet
(D) Ethernet a X

35, Which o f the f o l l o w i n g types o f networks 38. W h a t i s the function o f the small square
Must 4 user access in order to surf the
labelled X ?
Intermet on a tablet from a hotspot on a
beach?
(A) Selecting celts i n ar a n g e
(B) D e l e t i n g t h e c o n t e n t s o f t h e cell
(A) LAN {C) C o p y i n g the contents to other cells
(B) MAN (D) Inserting a new row into the
(Cc) WAN
worksheet
(D) WLAN

W h i c h o f t h e f o l l o w i n g is an e x a m p l e o f a
c o r r e c t l y f o r m a t t e d e - m a i l address?

(A) lana@happy.net
(B) @lana.happy.net
(C) _ _ lana-happy@net
(@) _lana@happy@net

G O O N T o T H E N E X T PAGE
0122901 0/MI/CSEC 2023
- 7 .

39. The following formula is located in position B6 o f a spreadsheet.

= B3 + B4 + $BSS

I f the f o r m u l a is c o p i e d to the position located i m m e d i a t e l y on the left, w h a t w o u l d be the resulting


formula?

(A) C3+C4+C5
(B) A3+A4+A5
(C) A3+A4+$B$5
(D) C3+C4+$BS5

e m s 40 and 41 refer to the following database table.

DATE AMOU
NT

HEINZX 11/11/2019 | s1000 |

T h e m a n a g e r wants to f i n d the names o f the suppliers w h o received their product orders. W h i c h


fields w o u l d be used in the query?

(A) ? S u p p l i e r and Received


(B) Product I D and Supplier
(C) Product I D and Received
( D ) ? S u p p l i e r and A m o u n t O w e d

41. T w o fields that can be selected as part o f a calculation are

{A) S u p p l i e r and Received


(B) Product I D and Supplier
(C) Product I D and Received
(D) Date Ordered and A m o u n t O w e d

:
G O ON TO T H E N E X T PAGE
42. A primary key must uniquely identify a record in a table.

Which o f the following would qualify as a primary key?

IL A single field
Hi. A n y group o f fields
Hi. A g r o u po f c o n c a t e n a t e d f i e l d s

(A) Tonly
(B) ~~? H o n l y
(C) Land I l only
(D) I and I l i only

Items 43 a n d 4 4 refer t o the f o l l o w i n g w o r k s h e e t s h o w i n g students? m a r k s i n f o u r tests.

43. i f the data in C e l l E 4 is changed. this w o u l d M O S T l i k e l y a f f e c t C e l l

(A) ES
(B) FS
(C) G4
(D) H4

In o r d e r to create a spreadsheet chart w h i c h c o m


would be used are P pares the average f o r each test, the ranges whi

(A) A I : F 1 and A7:F7


(B) ? CI:F1 and C7:F7
(C) C2:F2 and C6:F6
(D) <A2:F2 and A 6 : F 6

A N m a w e .
Item 45 refers to the following table.

[Appliance [ M a n u[Serial
f a cNumber
t u [Price
rer
[store |
C o n s
c12312 o l 499
14599 ] ]
[Microwave |S a m s56324 u n | g7899] ]
$20051_
[Refiigerator [ S a m s u n |g ] ]
[
[stove G e oes ] [5460
[Washing machine
| Samsung
[ 3 3 4 9 $3500 5]
4s. The criteria that M U S T be used in a database query to select A L L appliances manufactured by
Samsung that cost more than $3000 is

(A) M a n u f a c t u r e r = ?Samsung? and ( p r i c e > 3000)


(B) M a n u f a c t u r e r = ?Samsung? o r (price > 3 0 0 0 )
(Cc) M a n u f a c t u r e r = ?Samsung? and (price < 3000)
(D) = M a n u f a c t u r e r = ?Samsung? o r (price < 3 0 0 0 )

W h i c h o f the f o l l o w i n g sequences o f steps 47. ? W h i c h o f the f o l l o w i n g activities have to


f o r deleting a record in a database table is take place for a user to f o l l o w a h y p e r l i n k
correct? to an email address and send an email?

L Choose the delete r o w option. L The installed email s o f t w a r e is


IL. Select the r o w to be deleted and loaded.
right c l i c k . tl. The user w i l l write the email.
It. O p e n table in design view. UL. The user w i l l then send the email.
IV. Choose yes to c o n f i r m deletion.
(A) Tand H o n l y
(A) 1, I I , 1 , I V (B) a n d I I only
(B) TH, 1 , TV (Cc) If a n d H I o n l y
(c) I l , U1, 1, 1 V (D) 1, H a n d 1
(D) IL, 1,10, 1V

GO ON TO THE N E X T PAGE
0 1 2 2 9 0 1 0 / M I / C S E C 2023 wae
- 1 0 -

Which o f the following content controls [tem 51 refers to the following algorithm,
would be useful when creating a fillable
electronic form for online use? Read (A, B)
I f A < B Then
lL. Date picker Print(A);
H. Check box
II. ? Drop-down list 51. Inperforming this algorithm, the computer
reads two numbers and prints the
(A) Land II only
(B) Land Hil only (A) _ first number
(C) Mand III only (B) smaller number
(D) 1, Wand I (C) _ first number i f it is larger than the
second number
(D) _ firstnumber i f it is smaller than the
49, It is necessary to include the column titles second number
and row labels when creating a column
chart, to ensure that the
52. Which o f the following constructs will
(A) value on the x-axis is correct execute a sequence o f statements until a
(B) correct headings are displayed specific condition is false?
(C) _ legend for the y-axis is displayed
{ D ) __ totals displayed are correct (A) FORDO
(B) While Do
(C) Repeat Until
Which o f the following features would (D) If-then-Else
give you the old and new versions o f a
previously saved document when using a
word processor? 53. When implementing program, which of
a

the following steps comes afterexecuting?


(A) S A V E A S w i t h f i l e extension
(B) S A V E A S w i t h the o l d f i l e n a m e
(A) Linking
(C) S A V E A S w i t h a n e w file type
(B) ? Compiling
(D) S A V E A S with a n e w filename
(C) Maintaining
(D) Interpreting

GO ON TO THE N E X T PAGE
0122901 2023
W h i c h o f the f o l l o w i n g Programming A c o m p u t e r p r o g r a m m e r is c o d i n g a n
l a n g u a g e s is N O T c o n s i d e r e d to b e h i g h -
a l g o r i t h m w h i c h calculatest h e class average
level?
f o r a given exam. He creates a v a r i a b l e
c a l l e d class_avg. W h i c h data t y p e should
(A) Cc
he s p e c i f y w h e n d e c l a r i n g this variable?
(B) Java
(C) Pascal
(A) Real
(D) Assembly (B) Integer
(C) Boolean
(D) Character
I t e m _ 5 S refers to the f o l l o w i n g d i a g r a m
s h o w i n g steps to s o l v e a p r o b l e m that are
h o t i n c o r r e c t sequence.
I n w r i t i n g an a l g o r i t h m to i m p l e m e n t a
w h i l e t o o p that is t e r m i n a t e d b y the value
999, w h i c h o f the f o l l o w i n g c o n d i t i o n a l
statements s h o u l d be w r i t t e n ?

(A) While number = 999 do


(B) W h i l e number < > 999 do
(Cc) W h i l e n u m b e r = 999 then
(D) W h i l e n u m b e r < > 999 then

59, W h a t c o m p o n e n t o f ap r o b l e mt y p i c a l l y uses
W h i c h o f the steps s h o u l d be F I R S T ? the term ?print? to carry out an instruction?

(A) G e t C X C certificate. (A) Input


(B) Write C X C examination. (B) Process
(Cc) Pass C X C e x a m i n a t i o n . (Cc) Storage
(D) L e a r n C X C subject content. (D) Output

What does the symbol < > represent in

information technology?

(A) Input
(B) Decision
(C) ? Start/Stop
(D) Process and O u t p u t

G O ON TO THE N E Y T p a c e
-12-

Item 60 refers to the following algorithm.

Write (?Enter price: ") (1)


Read (price) (2)
Vat: ? price * 15% Q)
Write Vat (4)

Which line contains a processing statement?

(A)
@)
(C)
(D)

END OF TEST

IF YOU FINISH BEFORE TIME IS CALLED, CHECK ?CK

YOuR W o r K
ON THIS TEST.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy