2023 B8 End of Term 3 Exams - Computing 1
2023 B8 End of Term 3 Exams - Computing 1
PAPER 1
OBJECTIVE TEST 45 Minutes
Answer All Questions
Each question is followed by four options lettered A to D. Find out the correct option for each question and
shade in pencil on your answer sheet the answer space which bears the same letter as the option you have
chosen. Give only one answer to each question.
1. Fifth generation of computers used …… 9. Network fabrication attacks the …….of the system.
A. microprocessor. A. confidentiality
B. artificial intelligence. B. integrity
C. vacuum tube based C. authenticity
D. integrated circuit based. D. security
2. A cartoon avatar that represents you is called 10. Which of the following hackers use their
A. Emoji. knowledge to hack to check their own security
B. bitmoji. system to make it more hack-proof?
C. filter. A. White hat hacker
D. Flickr. B. Black hat hacker
3. A special photo overlays which are used to dress up C. Grey hat hacker
a snap is referred to as D. Red hat hacker
A. stickers. 11. The type of threat in which an attacker floods the
B. emojis. server resources and exhausts the network
C. geo-filters. bandwidth is known as
D. pinboard. A. network delivered threat.
4. Which of the following is true about quantum B. data extortion.
computing? Quantum computers….. C. blackhole attack.
A. calculateswith cubits. D. data security.
B. have high error rates. 12. The term used to describe a group of individuals
C. are well-suited for data analysis. who scam users is termed as
D. calculates in transistors. A. plagiarism.
5. To upload images on the photo sharing website, B. phishing.
firstl ………..them so that it is easy to find them C. virus.
while uploading. D. malware.
A. remove 13. Google uses automated programs known as ………
B. organize which finds pages on the web.
C. create A. crawlers
D. delete B. meta search
6. Posting a picture or a video in Pinterest is known as C. finders
………….. D. searcher
A. pinning. 14. Which one of these is used to raise one value to the
B. snapping. power of second value and calculates it?
C. tweeting. A. Exponentiation
D. living. B. Modulus
7. One of the commonly used photo sharing website is C. Division
………….. D. Multiplication
A. Facebook lives 15. Logical note takes only ……….operand(s).
B. TikTok A. zero
C. Google Photos B. one
D. Pinterest C. two
8. To defraud someone or an organization by creating D. three
fake documents or modifying an existing document 16. The errors that occur in MS Excel when the text in
is called the formula is not recognized is ……
A. forgery. A. #### Error
B. vandalism. B. #REF! Error
C. plagiarism. C. #NUM! Error
D. piracy. D. #NULL! Error
17. In programming, the flowchart symbol for D. Numbers code scanner
processing symbol is……… 26. The image is used to …………
A. rectangular. A. identify location on maps.
B. diamond. B. access email account.
C. oval. C. access the web.
D. square. D. identify products in stores.
18. Visual impairment refers to the categories of people 27. 3+4*5// This expression when being run which
who are not able to ……….. operator is the considered first in order of operation
A. blind. precedence?
B. deaf. A. +
C. dumb. B. *
D. walk. C. //
19. When a computer program runs, a value that does D. 3
not change is termed as…. 28. The device used to feed your hand-made drawings
A. variable. into a computer is called……..
B. constant. A. graphic tablet.
C. expression. B. magnetic card reader.
D. statement. C. optical card reader.
20. All the listed below are examples of sites use for D. QR code reader.
sharing video except …………. 29. Constants are used in …….ways.
A. Facebook Live. A. 1
B. Vimeo. B. 2
C. YouTube. C. 3
D. Instagram. D. 4
21. Pi=3.14159 is an example of a constant in which 30. Sitting in front of a computer for long hours with
programming language? no physical activity is a major contributing factor to
A. Java …………
B. C++ A. cancer.
C. Python B. diabetes.
D. Visual Basic C. obesity.
22. All data entry devices are…….devices. D. fever.
A. output 31. Print “Hello, world” is an example of….
B. input A. variable.
C. storage B. constant.
D. processing C. expression.
23. Which type of expression is x + y, 10.75? D. statement.
A. relational expression.
B. floating expression. 32. The name of the symbol is ……
C. Boolean expression. A. decision.
D. logical expression. B. annotation.
Use this image to answer questions 24 to 26 C. start and stop.
D. predefined process.
33. The function is used to count number of cells that
meet certain criteria is………… .
A. COUNT( )
B. COUNTA( )
24. The image is a/an ………… C. COUNTIF( )
A. QR code D. IFCOUNT( )
B. barcode
C. line code 34. How many elements are used to develop programs
D. number code in computing?
25. Which device is used to read the image? A. One
A. Line code reader B. Two
B. QR code scanner C. Three
C. Barcode reader D. Five
37. A storage device that combines a conventional hard
35. The name of this symbol is….. disk drive and a solid-state flash module for data
storage is called………….
A. hard disk drive.
B. solid state drive.
A. decision. C. hybrid hard drive.
B. annotation. D. flash memory chips.
C. start and stop. 38. What does QR code stand for?
D. predefined process. A. Quite Reading
36. A hardware device which is used to print vector B. Quiet Response
graphics is…………. C. Quick Rite
A. printer. D. Quick Response
B. plotter. 39. Desktop publishing software which is used to
C. scanner. produce complex page layouts in WYSIWYG
D. barcode reader. formats is known as …………
A. QuarkXPress.
B. Adobe In Design.
C. MS Publisher.
D. MS Word.
40. All the following are uses of quantum computing
except………….
A. playing video games.
B. weather forecasting.
C. database searching.
D. molecular modelling.
END OF PAPER