796 Ict P1 Mock Questions 2024
796 Ict P1 Mock Questions 2024
ICT A/L
CANDIDATE NAME
Subject Title
…………………………………………………..………….………….
CANDIDATE NUMBER Information and
…………………………….………………………………..………….. Communication Technology
CENTRE NUMBER
…………………………………………………………………………..
DATE
ADVANCED LEVEL 22/03/2024
(MORNING)
INSTRUCTIONS TO CANDIDATES:
1. USE A SOFT HB PENCIL THROUGHOUT THIS EXAMINATION.
2. DO NOT OPEN THIS BOOKLET UNTIL YOU ARE TOLD TO DO SO.
Before the Examination begins:
3. Check that this question booklet is headed “Advanced Level – 0796 Information and Communication Technology, Paper 1”.
4. Insert the information required in the spaces provided above.
5. Without opening the booklet, pull out the answer sheet carefully from inside the front cover of this booklet. Take care
that you do not crease or fold the answer sheet or make any marks on it other than those asked for in these instructions.
6. Insert the information required in the spaces provided on the answer sheet using your HB pencil:
Candidate Name, Centre Number, Candidate Number, Subject Code Number and Paper Number.
How to answer questions in this examination:
7. Answer ALL the 50 questions in this examination. All questions carry equal marks.
8. Non-programmable calculators are allowed.
9. For each question there are four suggested answers, A, B, C, and D. Decide which answer is correct. Find the number of
the question on the Answer sheet and draw a horizontal line across the letter to join the square brackets for the answer
you have chosen. For example, if C is your correct answer, mark C as shown below:
A B C D
10. Mark only one answer for each question. If you mark more than one answer, you will score zero for that question. If you
change your mind about an answer, erase the first mark carefully, and then mark your new answer.
11. Avoid spending much time on any question. If you find a question difficult, move to the next question. You can come
back to this question later.
12. Do all rough work in this booklet using, where necessary, the blank spaces in the question booklet.
13. Mobile phones are NOT ALLOWED in the examination room.
14. You must not take this booklet and answer sheet out of the examination room. All question booklets and answer sheets
will be collected at the end of the examination.
©TRU/RPI CSC/SWATICT/ICT 796/P1/MOCK 2024. This document is the property of the TRU and the Inspectorate of
Pedagogy and should not be reproduced without the permission of the authors Page 1 of 4
1. The three arguments of spreadsheet IF function is stated 11 Which information system can you advise a manager to
as use in creating reports for short term decision making of
A. Logical test, value if false, value if true. a company?
B. Value if true, value if false, logical test. A. TPS.
C. Logical test, value if true, value if false. B. DSS.
D. Value if false, logical test, value of true. C. EIS.
2. The concept attribute in a database describes an instance D. MIS.
in 12 The practice whereby an organization allows its workers
A. a file. to work from home through computer network is:
B. a field. A. distance Working.
C. a database. B. telecommuting.
D. An entity. C. teleconferencing.
3 The top domain name for the website “www.minesec- D. e-working.
distancelearning.cm” is 13 Which of the following is correct in Boolean logic?
A. www. A. 0 AND 1=1.
B. .minesec-distancelearning. B. 1 AND 0=1.
C. .cm. C. 0 OR 1 =1.
D. www.minesec D. 1 OR 0= 0.
4 Undeclared variable is identified by a compiler as 14 When analyzing a project, the project manager found that
A. run time error. task X, task Y, and task Z had zero float time. The
B. semantic error. implication of this to the manager is that these tasks are
C. syntax error. A. slack tasks.
D. logic error. B. dependent tasks.
5 Which of the following utility software facilitates C. critical tasks.
communication between a modem and a computer D. dummy tasks.
system? 15 Which of the following is an application of Geographical
A. Defragmenter. Information system?
B. Device driver. A. Flight reservation system.
C. Operating system. B. Urban planning system.
D. Network. C. Embedded system.
6 A software that converts handwritten document into D. Stock Control system.
digital text is known as 16 Which of the following determines whether a project
A. OCR. should be carried out or not?
B. MICR. A. System evaluation.
C. Scanning. B. System design.
D. OMR. C. System analysis.
7 The components of a processor communicate through D. Feasibility studies.
A. NIC. 17 ______ is the technological basis on which the third-
B. RAM. generation computers were built.
C. Register. A. Transistors.
D. Bus. B. Vacuum tube.
8 Which of the following is an example of a non-Volatile C. Microprocessors.
memory? D. Integrated circuit.
A. Virtual memory. 18 Study the algorithm below
B. Memory card. 1. Start,
C. Cache memory. 2. Give two integers, N and M
D. Register 3. If N is greater than M
9 The computer converts human programming language 4. Set M to M-2
into machine executable code using 5. Otherwise
A. Compiler. 6. Set M to N+3
B. Processor. 7. EndIF
C. Editor. 8. Print M.
D. Linker. 9. Stop.
10 The hexadecimal equivalence of the binary number Given the inputs values; N=5, M=7, what is the output of
111110 is the algorithm?
A. 3E. A. 15.
B. F2. B. 8.
C. 76. C. 13.
D. D3. D. 5.
©TRU/RPI CSC/SWATICT/ICT 796/P1/MOCK 2024. This document is the property of the TRU and the Inspectorate of Pedagogy and
should not be reproduced without the permission of the authors Page 2 of 4
19 Software designed to meet the needs of a particular 29 With reference to the operating system which of the
organization is called? following is a description of a program in execution?
A. Generic. A. Software.
B. Off-the-shelf. B. Process.
C. Integrated. C. Data.
D. Bespoke. D. Instructions.
20 A linear list whose elements are inserted and deleted in a 30 In digital electronics, a structure that shows the output for
Last-In-First-Out order is a each combination of inputs is known as.
A. Stack. A. logic diagram.
B. Queue. B. Boolean expression.
C. Harsh table. C. Truth table.
D. Binary tree. D. Logics circuit.
21 To set a table from 2NF to 3NF. 31 Every algorithmic problem is composed of three basic
A. We perform normalization. statements. Identify them.
B. We eliminate partial dependency. A. Input, output and control statements.
C. We eliminate redundancy. B. Input, output, and assignment statements.
D. We eliminate transitive dependency. C. Input, output, and loop statements.
22 The control structure that executes a set of instructions a D. Input, output, and direction statements.
number of times based on a condition is called 32 The portability of a software refers to
A. Logic. A. Its ability to be carried from place to place.
B. Choice. B. Its ability to resist minor faults.
C. Loop. C. Its ability to run on different computing
D. Sequence. platforms.
23 Evaluate 101002 - 11012. D. Its ability to be upgraded to another version.
A. 00101. 33 In medical field an expert system with collection of
B. 00100. surgeon knowledge has the capacity to
C. 00111. A. Provide surgeon’s schedule.
D. 00011. B. monitor and prescribe medication for patients.
24 An internet application that format and display webpages C. pay patients hospital bill.
requested by users is called. D. keep the surgical room clean.
A. Google. 34 What is the equivalent of 8MB to KB in technical term?
B. Browser. A. 8192 MB.
C. Search engine. B. 8000 MB.
D. Internet explorer. C. 8192 KB.
25 The method used by organizations to completely discard D. 8000 KB.
the old system before using a new system is known as 35 With regard to Cameroon government governance system
A. Plunge conversion. Which of the following is not an E-government service in
B. Phase conversion. Cameroon? Communication between
C. Piece meal conversion. A. Government to Citizen (G2C).
D. Pilot conversion. B. Government to Individual (G2I).
26 A communication circuit that transmits data in both C. Government to Business (G2B).
directions but a single direction at a time is called D. Government to Employees (G2E).
A. Simplex mode. 36 Which one of the following pairs of html tags will
B. Half-duplex. generate a numbered list item?
C. Serial transmission mode. A. <ol>…</ol>.
D. Full duplex. B. <ul>…</ul>.
27 Which of the following DOES NOT determine the C. <b>…</b>.
deadline of a project? D. <li>…</li>.
A. Project deadline Gantt. 37 The simplified form of the Boolean expression
B. Project life cycle. AB+ABC:
C. Critical path analysis. A. AB
D. PERT. B. A(B+C)
28 In the memory hierarchy, the fastest memory is. C. AB+AC.
A. RAM. D. ABC.
B. Cache.
C. CPU register.
D. Virtual memory.
©TRU/RPI CSC/SWATICT/ICT 796/P1/MOCK 2024. This document is the property of the TRU and the Inspectorate of Pedagogy and
should not be reproduced without the permission of the authors Page 3 of 4
38 Striking an ESC key while a program is being installed 47 ______ is network topology in which a node is directly
cancels the installation procedure. This activity causes connected to all other nodes by separate cable.
the CPU to: A. Ring.
A. finish executing the current instruction and move B. Star.
to the interrupt. C. Mesh.
B. immediately move to the interrupt service routine D. Hybrid.
without completing current instruction. 48 Eyestrain can be reduced by
C. completely stop the running program. A. reducing room light intensity.
D. makes any peripheral device that requested the B. using CRT monitor.
interrupt to wait for a fixed interval of time. C. using LCD monitor.
39 The resolution of a print out from a printer is measured in D. avoid breaking eye contacts with monitor.
terms of 49 Express exchange Ltd uses firewall to prevent
A. pages per minutes. unauthorized access to its data on the network. This type
B. dots per minute. of network is called
C. dots per inch. A. Internet.
D. pixel density. B. Extranet.
40 One popular file format supported by most video players C. Ethernet.
is D. Intranet.
A. .MP3. 50 The total number of cables needed to wire a full mesh
B. .MP4. can be obtain from the formula___________
C. .JPEG. A. n2(n-1)(1/2).
D. .TIFF. B. n(n+1)(1/2).
41 One way to avoid RSI is to C. n(n-1)(1/2).
A. use LCD monitors. D. n!(n)(1/2).
B. avoiding eye contacts with monitor.
C. use lenses. STOP.
D. use adjustable chairs. GO BACK AND CHECK YOUR WORK.
42 The octal equivalent of the hexadecimal code F3A1 is
A. 171641.
B. 176541.
C. 176451.
D. 178661.
43 The HTML tag <TD> xxxx </TD> defines
A. the contents of a table.
B. the contents of one cell of a column.
C. the contents of a row.
D. the contents of one cell of a row.
44 Which of the following are data validation techniques?
A. Proof reading and presence check.
B. Range check and double entry.
C. Type check and format check.
D. Validation and verification check.
45 As device management techniques used by the operating
system interrupt and polling have one common feature
A. Both are hardware and software triggered
signals.
B. Both check the status of a device if it needs the
CPU.
C. Both occur at any point in time.
D. Both cause the CPU to pause it current executing
task for another task of higher priority.
46 The main purpose for acceptance testing design in V-
shape system development model is to
A. Ensure the quality of final product is good.
B. Ensure users’ specifications are made.
C. Ensure the system is error-free.
D. Ensure ability to operate the system.
©TRU/RPI CSC/SWATICT/ICT 796/P1/MOCK 2024. This document is the property of the TRU and the Inspectorate of Pedagogy and
should not be reproduced without the permission of the authors Page 4 of 4