SlideShare a Scribd company logo
CONFIDENTIAL
2
PART A : 30 marks
INSTRUCTIONS : Answer ALL questions. Choose the most appropriate answer.
1. There are five types of column in Microsoft Word 2010.
A. True
B. False
2. This tool that can only be used to strikethrough text in a table created using
Microsoft Word.
A. True
B. False
3. Times New Roman, Calibri and Arial are called Font Styles.
A. True
B. False
4. Both Microsoft Word 2010 and Microsoft Excel 2010 can sort list of text or number in
ascending or descending order.
A. True
B. False
5. By holding CTRL key while moving pressing either ← or → key, you will be able to
select text as you move.
A. True
B. False
6. is a tool in Microsoft Word that cannot be used to delete a strikethrough text.
A. True
B. False
7. Middle alignment is one of the four types of horizontal alignment in Font Group in
Microsoft Word 2010.
A. True
B. False
8. A user who wants to erase text backwards cannot use the Delete key.
A. True
B. False
9. Microsoft Word 2010 has no tab called Design.
CONFIDENTIAL
3
A. True
B. False
10. A user that applies a design template of a PowerPoint slides eventually change the look
of the slides without changing the contents.
A. True
B. False
11. Annie is editing her project report. She wants to edit the font size of text in the header
section. She could find the font size in Paragraph group.
A. True
B. False
12. When you enter a formula in a cell in Microsoft Excel 2010, you cannot leave the equal
sign at the beginning of a formula
A. True
B. False
13. Slide transition is a special effect used to introduce a slide in a slide show
A. True
B. False
14. You could use this tool to make a bullet list such as a book list.
A. True
B. False
15. Microsoft Excel 2010 has bullet tool in one of the tabs.
A. True
B. False
16. SUMIF is a basic function in Microsoft Excel 2010 that can be found by navigating in
the following order : Editing -> AutoSum
A. True
B. False
17. Sam printed out 5 pages of lecture notes that have 6 slides on each page. We could say
that the Sam actually has 30 pages of notes.
A. True
B. False
CONFIDENTIAL
4
18. The title of Brian’s report is 20 points. This is the title’s Font Style.
A. True
B. False
19. Maria created a poster about AIDS in her college. She placed images in her poster by
using tools in Insert tab.
A. True
B. False
20. You can set the timing for each object animation in Microsoft PowerPoint slides by
following this order : Animation -> Advanced Animation
A. True
B. False
21. The intersection between a row and a column in Microsoft Excel 2010 is called Excel
Box.
A. True
B. False
22. Each time you add a new object in Microsoft PowerPoint 2010, there’ll be added tab(s)
appear next to View tab.
A. True
B. False
23. You could only change paper margin to normal if the paper layout is A4.
A. True
B. False
24. You could not use this tool to reverse your actions should you make a mistake.
A. True
B. False
25. Fonts in Microsoft Word 2010 and Microsoft PowerPoint 2010 are measured in Points,
except for Microsoft Excel 2010.
A. True
B. False
26. It is possible to add a column to a table that you have already created and entered
information into.
A. True
B. False
CONFIDENTIAL
5
27. Page Border cannot be added by using Border tool in Home tab.
A. True
B. False
28. You could use this tool to take pictures from the internet and put it in your
document for a project report.
A. True
B. False
29. “Save As” command can only be used in Microsoft Word 2010 and Microsoft Excel
2010.
A. True
B. False
30. This tool cannot be used to change the highlighter colour when want to highlight a
text.
A. True
B. False
CONFIDENTIAL
6
PART B : 30 marks
INSTRUCTIONS : Answer ALL questions. Choose the most appropriate answer.
31. Features of a personal computer include ………………
A. Input, Computer system, Storage.
B. Input, Output, Process, Storage.
C. Hardware, Software, Application system, Storage, Output.
D. Speed, Reliability, Storage capability, Productivity, Decision making, Reduction in
cost.
32. ……………… is located in a computer case that is used to place Microprocessor for a
personal computer.
A. System Unit
B. Transistors
C. Motherboard.
D. Information
33. Which of these OS is based on UNIX?
A. Windows 8.
B. Windows XP.
C. Android.
D. Windows Vista.
34. Which of these statements is false for Network Media?
A. Infrared Wave is a type of unguided media.
B. Fiber Optic cable is only suitable for LAN.
C. It is divided into two types.
D. Twisted Pair cable is cheaper than Coaxial cable.
35. Computer security is usually dealing with three types of issues. Which of the following
does not fall into any of the types?
A. Internet.
B. Data loss.
C. Confidentiality.
D. Standalone.
CONFIDENTIAL
7
36.
The statements above are likely describing computers from ……………… generation
where it placed the chip on ………………
A. Third, Integrated Circuit
B. Fourth, Printed Circuit Boards.
C. Fourth, Microprocessor.
D. Third, Printed Circuit Boards.
37.
Figure 1
Figure XX shows the diagram for the components of Microprocessor. Choose the
appropriate component names for each component labelled as A, B, C, D and E.
A. Control Unit, Arithmathematic Logic Unit, Registers, Instruction Cache, Data Cache
B. Control Unit, Arithmathematic Logic Unit, Cache, Instruction Registers, Data
Registers
C. Control Unit, Arithmetic Logic Unit, Registers, Data Cache, Instruction Cache.
D. Control Unit, Arithmetic Logic Unit, Registers, Instruction Cache, Data Cache.
 Carry out billionth of instructions per second
 Cost is lowered considerably with such large
number of transistors in a single chip
The Microprocessor
C
A B
D
E
CONFIDENTIAL
8
38. How an Operating System manages a processor?
A. By determining when and how much time each process gets.
B. By managing how much memory each process gets.
C. By controlling where each process should be placed in a hard drive.
D. By executing the instructions in each process.
39.
The statements above can be used to describe ………………
A. Advantages of Satellite.
B. Advantages of Computer.
C. Advantages of Computer Networking.
D. Advantages of Information.
40. “In August 2013, Stephen bought three books from MPH Bookstore website. He provided
all personal details that are required in order for him to buy the books from the website
including his Identification Card number and his security number from his credit card.
After a month, he received his credit card bill and surprised that the amount is more than
what he spent earlier. He then decided not to reveal any other personal information online
in the future.”
From the event that is described above, which of the following should be best practiced
by the MPH Bookstore website developer to avoid the recurrence of such incident?
A. Ensure the e-commerce site continues to function as intended.
B. Ensure the ability to control the use of information about oneself.
C. Ensure the ability to ensure e-commerce participants do not deny their online
auctions.
D. Ensure the ability to identify identity of a person with whom the participant is
dealing with.
 Share different types of resources
 Can view, modify and copy files stored on a
different compute.
CONFIDENTIAL
9
41. Hannah works as a technical support personnel for IT department in XYZ Enterprise. She
is requested to perform backup for Finance Department. She could perform backup on
………………
I. Files
II. Systems
III. Hardcopy
IV. Information
A. I and II.
B. III and IV.
C. I, II and IV.
D. All of the above.
42. The following items show the four primary functions of CPU. Arrange the functions in
sequence.
I. Execute
II. Fetch
III. Decode
IV. Store
A. I, II, III and IV
B. II, III, I and IV
C. II, I, III and IV
D. IV, I, III and II
CONFIDENTIAL
10
43. Operating system is used as an intermediary between software and hardware. It could
also manage processes. One of the examples of Operating System is Real Time
Operating System (RTOS). Choose the true statement(s) regarding RTOS.
I. It has two types, which are Single-tasking and Multi-tasking.
II. It is often used in Air Traffic Control.
III. There can only be one user at certain point of time.
IV. It is usually use for slow response application to avoid downtime.
A. II only.
B. II and IV
C. II, III and IV
D. All of the above
44.
Figure 2
Choose the true statements that describe Figure 2.
I. It’s a type of unguided network media.
II. It is usually transmit data using the light wave.
III. It cannot transmit more information as compared to twisted pair cable.
IV. It is use in WAN.
A. I Only.
B. I and II.
C. I, III and IV.
D. None of the above.
CONFIDENTIAL
11
45. Michael registered as a member of an online shopping website. As a member, he should
have the privilege to enter the member pages in the website. However, he’s unable to
open the member pages in the website. He is probably facing which of the following
taxonomy issue?
A. Access control
B. Availability
C. Privacy
D. Authentication
46. Storage devices are used to store files or documents. Which of the following(s) best
describe Storage Devices?
I. Random Access Memory is a non-permanent memory
II. There are two types of storage devices which are ROM and RAM
III. External hard disk is not a type of Secondary Storage
IV. Computers uses ROM as the memory
A. I and IV.
B. I, II and IV.
C. I, III and IV.
D. None of the above.
47. Which of the following memory is not inside the Microprocessor?
A. RAM.
B. L2 Cache.
C. Translation Lookaside Buffer (TLB).
D. L1 Instruction Cache.
48. Stephanie works as a freelance researcher, which requires her to deal with number of
running applications at the same time in order to find information. Which of the
following could be the type of the Operating System that manages all the applications?
A. Real-Time Operating System.
B. Distributed Operating System.
C. Single User, Multi-Tasking.
D. Multi User, Multi-Tasking.
CONFIDENTIAL
12
49. ……………… is more of a concept than an actual tangible entity. It relies on a physical
infrastructure that connects networks to other networks.
A. Modem.
B. Internet.
C. Router.
D. Network Interface Card.
50. A hardware or software solution that enforce security policies that permits only
authorized users to access the internet is also known as ………………
A. Encryption.
B. Firewall.
C. Nonrepudiation
D. Antivirus software.
51.
Figure 3
Choose the most appropriate device types for all devices labelled as A, B, C, and D
shown in Figure XX.
A. Peripheral, Input, Primary Storage, Output
B. Processing, Input, Primary Storage, Output
C. Processing, Input, Secondary Storage, Output
D. Peripheral, Input, Secondary Storage, Output
CONFIDENTIAL
13
52. Which of the following statement(s) is (are) most likely describing Microprocessor?
I. Gigahertz denotes the processor’s speed which show that computer could carries out
millions of instructions per second.
II. Computer that is running more one CPU is called multitasking.
III. Microprocessor speed is measured through the system clock speed by counting how
many electric pulses the clock produces per second.
IV. Cache is the storage location that holds inputs and outputs for the ALU.
A. I and IV
B. III and IV
C. I, III and IV
D. All of the above.
53. Which of the following resources that are managed by Microprocessor?
I. External Hard Disk.
II. Microsoft Office.
III. Hard Disk.
IV. Wireless Mouse.
A. I, II and III
B. II, III and IV
C. None of the above
D. All of the above.
54. This device is used to connect network segments. Which of the following devices that
perform this function?
A. Modem
B. Router
C. NIC
D. Switches
55. ……………… does not prevent hacking but rather reduces the likelihood that the hacker
will be able to read the data.
A. Firewall.
B. Router.
C. Encryption.
D. Switches.
CONFIDENTIAL
14
56. Which of the following is (are) true statement(s) regarding the 4th generation computer?
I. It could do all processing of a full-scale computer.
II. It integrates thousands of transistors.
III. More calculation can be performed due to thousands of transistors in one single
chip.
IV. Computer becomes faster because the size of the chip is small.
A. I and IV.
B. I, II and III.
C. I, III and IV.
D. All of the above.
57. The simultaneous processing of two or more CPU by a single computer is ………………
A. Multitasking.
B. Multicore.
C. Time – sharing.
D. None of these.
58. Which of the following is not among the computer users?
A. Teacher.
B. Internet.
C. Servers.
D. Factory machine.
59. The internet is a global network connecting millions of computers. Choose the true
statement(s) regarding Internet.
I. Yahoo Mail is the example of Internet Service Provider (ISP).
II. Users could share information freely through Internet.
III. It is a massive public spider web of computer connection.
IV. It able to prevent computer from being attacked by computer viruses.
A. I and IV.
B. II and III.
C. II, III and IIV.
D. All of the above.
CONFIDENTIAL
15
60. ……………… may hack into a computer system for the sole purpose of notifying the
administrator that a system has a security flaws.
A. Ethical Hackers.
B. Crackers.
C. Grey Hat Hackers.
D. Computer Theft.
CONFIDENTIAL
16
PART C : 20 marks
INSTRUCTIONS : Answer ALL questions
1. State the two main objectives of Real-time Operating System. (2 marks)
2. State the shortcut keys for the following actions :
a) Save
b) Open new document
c) Undo
d) Redo
(4 marks)
3. Define Data and Information and provide 1 example for each term. (4 marks)
4.
Figure 4.
Figure 3 shows one of the groups that can be found in Microsoft PowerPoint.
Name all tools labelled as A, B, C, and D.
(4 marks)
5. Identify 2 categories of output and provide 1 example of each type. (4 marks)
6. State 2 steps that computer users can do to avoid viruses. (2 marks)
- END OF QUESTION SHEETS -

More Related Content

PPTX
WAEC BECE EXAMS in ICT FOR Junior High Schools Ghana
PDF
Users manual
PDF
Ms excel
DOC
Class vii unit test-ii
PDF
Guide to Online International Non-Proprietary Name (INN) Electronic Name Subm...
PDF
Detailed_Design
PPTX
Revision week 2
WAEC BECE EXAMS in ICT FOR Junior High Schools Ghana
Users manual
Ms excel
Class vii unit test-ii
Guide to Online International Non-Proprietary Name (INN) Electronic Name Subm...
Detailed_Design
Revision week 2

Similar to Exam question sample IT (20)

PPTX
Revision week 2
PPTX
LS6 ELEM A&E REVIEWER...................
DOCX
SS2 Data Processing Examination with Test of Practicals (Third Term)
DOCX
Bece 2012
PPTX
Revision week
PDF
INTRODUCTION TO COMPUTING.pdf
DOC
Mcq+questions+cxc+it
DOCX
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)
DOC
Set1 ict-question
DOCX
S3 DATA PROCESSING FIRST TERM PRE-WAEC (2ND HALF EXAMINATION)
DOCX
SS3 DATA PROCESSING EXAMINATION (FIRST TERM)
PDF
000 012
DOCX
Abc and w7.
DOCX
Bis 220 final exam university of phoenix final exams study guide 1 two info...
DOCX
JS3 COMPUTER STUDIES FIRST TERM C.A 2
PDF
EE0-600 Exam Questions
DOCX
Bis 220 final exam
DOCX
Bis 220 final exam
DOCX
Bis 220 final exam
Revision week 2
LS6 ELEM A&E REVIEWER...................
SS2 Data Processing Examination with Test of Practicals (Third Term)
Bece 2012
Revision week
INTRODUCTION TO COMPUTING.pdf
Mcq+questions+cxc+it
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)
Set1 ict-question
S3 DATA PROCESSING FIRST TERM PRE-WAEC (2ND HALF EXAMINATION)
SS3 DATA PROCESSING EXAMINATION (FIRST TERM)
000 012
Abc and w7.
Bis 220 final exam university of phoenix final exams study guide 1 two info...
JS3 COMPUTER STUDIES FIRST TERM C.A 2
EE0-600 Exam Questions
Bis 220 final exam
Bis 220 final exam
Bis 220 final exam
Ad

Recently uploaded (20)

PDF
Hazard Identification & Risk Assessment .pdf
PDF
advance database management system book.pdf
PDF
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
PDF
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
Trump Administration's workforce development strategy
PDF
Complications of Minimal Access Surgery at WLH
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PPTX
Digestion and Absorption of Carbohydrates, Proteina and Fats
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PDF
Indian roads congress 037 - 2012 Flexible pavement
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PDF
RMMM.pdf make it easy to upload and study
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PPTX
Introduction to Building Materials
Hazard Identification & Risk Assessment .pdf
advance database management system book.pdf
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
History, Philosophy and sociology of education (1).pptx
Trump Administration's workforce development strategy
Complications of Minimal Access Surgery at WLH
UNIT III MENTAL HEALTH NURSING ASSESSMENT
LDMMIA Reiki Yoga Finals Review Spring Summer
Digestion and Absorption of Carbohydrates, Proteina and Fats
Orientation - ARALprogram of Deped to the Parents.pptx
Indian roads congress 037 - 2012 Flexible pavement
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
RMMM.pdf make it easy to upload and study
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
Introduction to Building Materials
Ad

Exam question sample IT

  • 1. CONFIDENTIAL 2 PART A : 30 marks INSTRUCTIONS : Answer ALL questions. Choose the most appropriate answer. 1. There are five types of column in Microsoft Word 2010. A. True B. False 2. This tool that can only be used to strikethrough text in a table created using Microsoft Word. A. True B. False 3. Times New Roman, Calibri and Arial are called Font Styles. A. True B. False 4. Both Microsoft Word 2010 and Microsoft Excel 2010 can sort list of text or number in ascending or descending order. A. True B. False 5. By holding CTRL key while moving pressing either ← or → key, you will be able to select text as you move. A. True B. False 6. is a tool in Microsoft Word that cannot be used to delete a strikethrough text. A. True B. False 7. Middle alignment is one of the four types of horizontal alignment in Font Group in Microsoft Word 2010. A. True B. False 8. A user who wants to erase text backwards cannot use the Delete key. A. True B. False 9. Microsoft Word 2010 has no tab called Design.
  • 2. CONFIDENTIAL 3 A. True B. False 10. A user that applies a design template of a PowerPoint slides eventually change the look of the slides without changing the contents. A. True B. False 11. Annie is editing her project report. She wants to edit the font size of text in the header section. She could find the font size in Paragraph group. A. True B. False 12. When you enter a formula in a cell in Microsoft Excel 2010, you cannot leave the equal sign at the beginning of a formula A. True B. False 13. Slide transition is a special effect used to introduce a slide in a slide show A. True B. False 14. You could use this tool to make a bullet list such as a book list. A. True B. False 15. Microsoft Excel 2010 has bullet tool in one of the tabs. A. True B. False 16. SUMIF is a basic function in Microsoft Excel 2010 that can be found by navigating in the following order : Editing -> AutoSum A. True B. False 17. Sam printed out 5 pages of lecture notes that have 6 slides on each page. We could say that the Sam actually has 30 pages of notes. A. True B. False
  • 3. CONFIDENTIAL 4 18. The title of Brian’s report is 20 points. This is the title’s Font Style. A. True B. False 19. Maria created a poster about AIDS in her college. She placed images in her poster by using tools in Insert tab. A. True B. False 20. You can set the timing for each object animation in Microsoft PowerPoint slides by following this order : Animation -> Advanced Animation A. True B. False 21. The intersection between a row and a column in Microsoft Excel 2010 is called Excel Box. A. True B. False 22. Each time you add a new object in Microsoft PowerPoint 2010, there’ll be added tab(s) appear next to View tab. A. True B. False 23. You could only change paper margin to normal if the paper layout is A4. A. True B. False 24. You could not use this tool to reverse your actions should you make a mistake. A. True B. False 25. Fonts in Microsoft Word 2010 and Microsoft PowerPoint 2010 are measured in Points, except for Microsoft Excel 2010. A. True B. False 26. It is possible to add a column to a table that you have already created and entered information into. A. True B. False
  • 4. CONFIDENTIAL 5 27. Page Border cannot be added by using Border tool in Home tab. A. True B. False 28. You could use this tool to take pictures from the internet and put it in your document for a project report. A. True B. False 29. “Save As” command can only be used in Microsoft Word 2010 and Microsoft Excel 2010. A. True B. False 30. This tool cannot be used to change the highlighter colour when want to highlight a text. A. True B. False
  • 5. CONFIDENTIAL 6 PART B : 30 marks INSTRUCTIONS : Answer ALL questions. Choose the most appropriate answer. 31. Features of a personal computer include ……………… A. Input, Computer system, Storage. B. Input, Output, Process, Storage. C. Hardware, Software, Application system, Storage, Output. D. Speed, Reliability, Storage capability, Productivity, Decision making, Reduction in cost. 32. ……………… is located in a computer case that is used to place Microprocessor for a personal computer. A. System Unit B. Transistors C. Motherboard. D. Information 33. Which of these OS is based on UNIX? A. Windows 8. B. Windows XP. C. Android. D. Windows Vista. 34. Which of these statements is false for Network Media? A. Infrared Wave is a type of unguided media. B. Fiber Optic cable is only suitable for LAN. C. It is divided into two types. D. Twisted Pair cable is cheaper than Coaxial cable. 35. Computer security is usually dealing with three types of issues. Which of the following does not fall into any of the types? A. Internet. B. Data loss. C. Confidentiality. D. Standalone.
  • 6. CONFIDENTIAL 7 36. The statements above are likely describing computers from ……………… generation where it placed the chip on ……………… A. Third, Integrated Circuit B. Fourth, Printed Circuit Boards. C. Fourth, Microprocessor. D. Third, Printed Circuit Boards. 37. Figure 1 Figure XX shows the diagram for the components of Microprocessor. Choose the appropriate component names for each component labelled as A, B, C, D and E. A. Control Unit, Arithmathematic Logic Unit, Registers, Instruction Cache, Data Cache B. Control Unit, Arithmathematic Logic Unit, Cache, Instruction Registers, Data Registers C. Control Unit, Arithmetic Logic Unit, Registers, Data Cache, Instruction Cache. D. Control Unit, Arithmetic Logic Unit, Registers, Instruction Cache, Data Cache.  Carry out billionth of instructions per second  Cost is lowered considerably with such large number of transistors in a single chip The Microprocessor C A B D E
  • 7. CONFIDENTIAL 8 38. How an Operating System manages a processor? A. By determining when and how much time each process gets. B. By managing how much memory each process gets. C. By controlling where each process should be placed in a hard drive. D. By executing the instructions in each process. 39. The statements above can be used to describe ……………… A. Advantages of Satellite. B. Advantages of Computer. C. Advantages of Computer Networking. D. Advantages of Information. 40. “In August 2013, Stephen bought three books from MPH Bookstore website. He provided all personal details that are required in order for him to buy the books from the website including his Identification Card number and his security number from his credit card. After a month, he received his credit card bill and surprised that the amount is more than what he spent earlier. He then decided not to reveal any other personal information online in the future.” From the event that is described above, which of the following should be best practiced by the MPH Bookstore website developer to avoid the recurrence of such incident? A. Ensure the e-commerce site continues to function as intended. B. Ensure the ability to control the use of information about oneself. C. Ensure the ability to ensure e-commerce participants do not deny their online auctions. D. Ensure the ability to identify identity of a person with whom the participant is dealing with.  Share different types of resources  Can view, modify and copy files stored on a different compute.
  • 8. CONFIDENTIAL 9 41. Hannah works as a technical support personnel for IT department in XYZ Enterprise. She is requested to perform backup for Finance Department. She could perform backup on ……………… I. Files II. Systems III. Hardcopy IV. Information A. I and II. B. III and IV. C. I, II and IV. D. All of the above. 42. The following items show the four primary functions of CPU. Arrange the functions in sequence. I. Execute II. Fetch III. Decode IV. Store A. I, II, III and IV B. II, III, I and IV C. II, I, III and IV D. IV, I, III and II
  • 9. CONFIDENTIAL 10 43. Operating system is used as an intermediary between software and hardware. It could also manage processes. One of the examples of Operating System is Real Time Operating System (RTOS). Choose the true statement(s) regarding RTOS. I. It has two types, which are Single-tasking and Multi-tasking. II. It is often used in Air Traffic Control. III. There can only be one user at certain point of time. IV. It is usually use for slow response application to avoid downtime. A. II only. B. II and IV C. II, III and IV D. All of the above 44. Figure 2 Choose the true statements that describe Figure 2. I. It’s a type of unguided network media. II. It is usually transmit data using the light wave. III. It cannot transmit more information as compared to twisted pair cable. IV. It is use in WAN. A. I Only. B. I and II. C. I, III and IV. D. None of the above.
  • 10. CONFIDENTIAL 11 45. Michael registered as a member of an online shopping website. As a member, he should have the privilege to enter the member pages in the website. However, he’s unable to open the member pages in the website. He is probably facing which of the following taxonomy issue? A. Access control B. Availability C. Privacy D. Authentication 46. Storage devices are used to store files or documents. Which of the following(s) best describe Storage Devices? I. Random Access Memory is a non-permanent memory II. There are two types of storage devices which are ROM and RAM III. External hard disk is not a type of Secondary Storage IV. Computers uses ROM as the memory A. I and IV. B. I, II and IV. C. I, III and IV. D. None of the above. 47. Which of the following memory is not inside the Microprocessor? A. RAM. B. L2 Cache. C. Translation Lookaside Buffer (TLB). D. L1 Instruction Cache. 48. Stephanie works as a freelance researcher, which requires her to deal with number of running applications at the same time in order to find information. Which of the following could be the type of the Operating System that manages all the applications? A. Real-Time Operating System. B. Distributed Operating System. C. Single User, Multi-Tasking. D. Multi User, Multi-Tasking.
  • 11. CONFIDENTIAL 12 49. ……………… is more of a concept than an actual tangible entity. It relies on a physical infrastructure that connects networks to other networks. A. Modem. B. Internet. C. Router. D. Network Interface Card. 50. A hardware or software solution that enforce security policies that permits only authorized users to access the internet is also known as ……………… A. Encryption. B. Firewall. C. Nonrepudiation D. Antivirus software. 51. Figure 3 Choose the most appropriate device types for all devices labelled as A, B, C, and D shown in Figure XX. A. Peripheral, Input, Primary Storage, Output B. Processing, Input, Primary Storage, Output C. Processing, Input, Secondary Storage, Output D. Peripheral, Input, Secondary Storage, Output
  • 12. CONFIDENTIAL 13 52. Which of the following statement(s) is (are) most likely describing Microprocessor? I. Gigahertz denotes the processor’s speed which show that computer could carries out millions of instructions per second. II. Computer that is running more one CPU is called multitasking. III. Microprocessor speed is measured through the system clock speed by counting how many electric pulses the clock produces per second. IV. Cache is the storage location that holds inputs and outputs for the ALU. A. I and IV B. III and IV C. I, III and IV D. All of the above. 53. Which of the following resources that are managed by Microprocessor? I. External Hard Disk. II. Microsoft Office. III. Hard Disk. IV. Wireless Mouse. A. I, II and III B. II, III and IV C. None of the above D. All of the above. 54. This device is used to connect network segments. Which of the following devices that perform this function? A. Modem B. Router C. NIC D. Switches 55. ……………… does not prevent hacking but rather reduces the likelihood that the hacker will be able to read the data. A. Firewall. B. Router. C. Encryption. D. Switches.
  • 13. CONFIDENTIAL 14 56. Which of the following is (are) true statement(s) regarding the 4th generation computer? I. It could do all processing of a full-scale computer. II. It integrates thousands of transistors. III. More calculation can be performed due to thousands of transistors in one single chip. IV. Computer becomes faster because the size of the chip is small. A. I and IV. B. I, II and III. C. I, III and IV. D. All of the above. 57. The simultaneous processing of two or more CPU by a single computer is ……………… A. Multitasking. B. Multicore. C. Time – sharing. D. None of these. 58. Which of the following is not among the computer users? A. Teacher. B. Internet. C. Servers. D. Factory machine. 59. The internet is a global network connecting millions of computers. Choose the true statement(s) regarding Internet. I. Yahoo Mail is the example of Internet Service Provider (ISP). II. Users could share information freely through Internet. III. It is a massive public spider web of computer connection. IV. It able to prevent computer from being attacked by computer viruses. A. I and IV. B. II and III. C. II, III and IIV. D. All of the above.
  • 14. CONFIDENTIAL 15 60. ……………… may hack into a computer system for the sole purpose of notifying the administrator that a system has a security flaws. A. Ethical Hackers. B. Crackers. C. Grey Hat Hackers. D. Computer Theft.
  • 15. CONFIDENTIAL 16 PART C : 20 marks INSTRUCTIONS : Answer ALL questions 1. State the two main objectives of Real-time Operating System. (2 marks) 2. State the shortcut keys for the following actions : a) Save b) Open new document c) Undo d) Redo (4 marks) 3. Define Data and Information and provide 1 example for each term. (4 marks) 4. Figure 4. Figure 3 shows one of the groups that can be found in Microsoft PowerPoint. Name all tools labelled as A, B, C, and D. (4 marks) 5. Identify 2 categories of output and provide 1 example of each type. (4 marks) 6. State 2 steps that computer users can do to avoid viruses. (2 marks) - END OF QUESTION SHEETS -