100% found this document useful (2 votes)
131 views11 pages

Csec It 2023 P1

CSEC Information Technology Paper 1

Uploaded by

Shaheed Kadir
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
100% found this document useful (2 votes)
131 views11 pages

Csec It 2023 P1

CSEC Information Technology Paper 1

Uploaded by

Shaheed Kadir
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 11
2B. 8. Inwhichofthe following types ofinterfaces is the user required to remember specific instructions and syntax? (A) Menu-driven (B) Graphical user (C) Computer screen (D) — Command-driven Item 9 refers to the following model of a globe, 9, Theprinter MOST suitable for creating the model of the globe above is (A) a3-D printer (B) —_allaser printer (©) an ink-jet printer (D) thermal printer 10. Which of the following protocols is used to ensure that web browsers and servers communicate with each other? A Pp (B) FTP. (© oP (D) HTTP 01229010/MJ/CSEC 2023 uM. Item 11 refers to the following symbol. ee The symbol represents (A) LAN () WiFi (©) WAN (D) Bluetooth Unauthorized, rea me interception of a private com jon on a computer network is referred to as (A) _ propaganda (B) _ identity theft (C) industrial espionage (D) electronic esdropping Double-entry data verification involves (A) different data enter (B) the data ei another device (C) different data entered once by two different persons (D) the same data entered once then re-entered by another person Aweb developer is important to acompany because this person (A) _ is responsible for the company’s website (B) assigns web addresses to all users in a company (©) _ backs up web files and stores the disks at another location (D) monitors the shutting down of competitors’ websites GO ON TO THE NEXT PAGE me by connecting office after connection at the misuse ofcom Unlawfully accessing onecomputer from another is computer fraud. Wrongfillly using another person’s personal data is identity theft. Trying to lure someone into providing sensitive data is phishing. Accessing a computer security system for illicit purposes is software piracy. GO ON TO THE NEXT PAGE ‘What is the function of the small square labelled X? ig cells in a range the contents of the cell contents to other cells new Tow into the et chart which compares the average for each test, the ranges whi 1ich of the following sequences of steps 47. Which of the following activities have to e a record in a database table is take place for a user to follow a hyperlink to an email address and send an email? the delete row option. 1, The installed email software is the row to be deleted and loaded. right click. Il, The user will write the email. ‘Open table in design view. The user will then send the email. Choose yes to confirm deletion. Tand II only Tand III only Mand II only I, Tand 01 GO ON TO THE NEXT PAGE

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy