1
3.
Which ofthe following itemsare considered
computer hardware?
(A) Data
(B) Programs
Ay Output devices
(D) Operating systems
Data that has been processed and has
‘meaning is termed
AAS information
(B) database
© storage
©) ouput
Which of the following can be termed
“application software"?
(A) Dos
(B) Linux
(©) Mac Os
DF Internet Explorer
Which of the following activities would
NOT be considered as cloud storage?
(A) Data stored on remote servers
@y Data stored and accessible on a
LAN
(©) Data back-up and storage devices
on the Internet
Datamanaged by storage providers
or hosting companies
(D)
Which of the following could NOT be
classified as a cloud-based application?
(A) Gmail
(B) Drop Box
(C) Google drive
(Py Windows OS
01229010/MJ/CSEC 2020
ib
The lights in a room turn on as soon as
person enters. Which input device Mos
likely controls the lighting in the room,
ABS Sensor
(B) Remote
(©) Scanner
(D) Keyboard
Which of the following devices is used tp
input data into the computer?
LAS Mouse
(B) Monitor
(©) USB flash drive
(D) —_ Extemal hard drive
For which of the following interface types
is the user required to remember specific
instructions and syntax?
(A) Menu-driven
(B) Graphical user
(©) Computer screen
Command-driven
tem 9 refers 1o the following model of a
‘lobe.
The MOST suitable printer for creating the
model of the globe is
4 a3-D printer
B) laser printer
© —anink-jet printer
(D) — athermal printer
GO ON TO THE NEXT PAGE
/d to
lofa
sg, the
is
40, The RP Secondary School wants the
administrative staff to have access to all
student and teacher data, Which of the
following networks would be MOST
suitable to enable such access?
(A) WLAN
) WAN
(MAN
(p) LAN
tem 11 refers to the following symbol.
~
e
‘1. The symbol represents
(A) LAN
Wi-Fi
(©) Hotspot
(D) Bluetooth
‘is referred to as
(A) propaganda
fe identity theft
)_ industrial espionage
{BY electronic eavesdropping
Double entry data verification involves
different data entered once
another device
different persons
Fe-entered by another person
Inauthorized, real-time interception of
4 ‘communication on a computer
the data entered being copied to
4ifferent data entered once by two
_the same data entered once then
14,
15,
16.
a7
18.
Part of a private network using Intemet
technology and public telecommunications
that can be accessed by business suppliers,
vendors, customers and partners is called
an
(A) Internet
(B) Intranet
ey — Extranet
(D) Ethernet
Which of the following shows an increase
in computer memory capacity?
(A) Terabyte— Gigabyte Megabyte
(B) — Gigabyte—Kilobyte Megabyte
(©) Megabyte— Terabyte Gigabyte
{(B) Megabyte» Gigabyte — Terabyte
Which of the following functions is
performed by amodem?
(4) Analog and digital
(B) Digital and upload
(C) Analog and download
(D) Download and upload
Inthe URL http://www.shoes.com, ‘shoes.
‘com’ stands for the
(A) extension
BY — domain name
(©) company name
() _ Internet company
‘Transferring data from a remote computer
10 your computer is referred to as
(A) — browsing
(B) uploading
(©) data mining
downloading
GO ON TO THE NEXT PAGE19.
20.
z
21.
22.
oth!
mae
Which of the following types of technolo- 23.
akies is commonly used by banks to read
data on cheques?
(A) Pos.
(B) OCR
(c) OMR
MICR
24.
Which of the following operations is
considered a featureofa biometric system?
48) — Matching fingerprints
(B) Detecting imegular heartbeats
(C) Diagnosing medical symptoms
(D) Helping to lubricate skeletal joints
25.
‘Telecommuting can be BEST described as
(A) using the computer while
‘commuting
(B) using the telephone while
commuting
_{©}— working from home by connecting
home and office
(D) working from the office after
establishingaconnectionathome 26.
In order to use a program stored on a flash
drive, the program must be transferred into
prom
(p) EPROM
Which of the following is NOT a hardwe
component of a computer system?
(ay Data file
(B) Main memory
(©) Peripheral device
(D) Central processing unit
Which of the following checks is NOT a
validation technique?
(A) Range
(B) _ Inconsistency
{0° Double entry
(D) _ Reasonableness
‘The process of scrambling messages at the
sending end and unscrambling them at the
receiving end is called
(A) coding
encryption
(©) espionage
(D) _ eavesdropping
‘There are many software restrictions used
by computers to protect data and maintain
data integrity. Which of the following:
entities are software restriction me
1. Viruses
I, Passwords
Il Eneryptions
(A) Land Ionly
(B) Land Ill only
(ef Mand Ik only
(D) 1, Mand tit
GO ON TO THE NEXT PAGE32. Which
Part of the cen
(CPU coordinates it acto Ht
oe Register
y/ Contot ua
©) Mainwenccy
(D) Arithmetic logic unit
33,
Before purchasing a com
: puter, James was
given a sheet with the following hardware
specifications.
Intel Pentium IV 64 bit
3.6GHz 2GB 533 MHz
SORAM 160GB SATA
HDD __72001pm
The word use of the computer is
(A) 2GB
By 64 bit
(© 7200:pm
(D) 533MHz
. Which type of interface allows the user to
jof Company X sells confidential communicate with the computer system by
about his company to Company keying in instructions?
s used
me the term used for this type of
io nae (A) Menu driven
i (B) Graphical user
(CL Touch sensitive
A Command-driven
35, _ Awebmaster is important to the company
beoause he/she
& is responsible for te company’s
website
(B) assigns web addresses to all users
Eine os the disks:
(C) backs up files and stores
‘at another location
monitors the shutting
©) competitors’ websites
down of
Go ON TO THE NEXT‘which of
ate
correctly form
Lana nape @net
@iana.happy.ne!
[email protected]
Ab) Langhans net
)
@)
software
1 following OP ove
which of th
Should beused for applica
orsmnerical calculations
Database
Presentation
Spreadsheet
‘Word processing
Br
©
)
‘The following formulaislocatedin position
6 of a spreadsheet.
=B3+B4+SBS5
‘What would be the resulting formula if the
initial formula was copied to the position
ocated immediately on the left?
(a) 03404465
(B) A3+A4+AS
A3+A4+SBS5
(D) C3+C4+SBS5
a query. student ented
Fe ewing eerie forthe date i
| = 95/11/2017 and <= 05/14/2017
qe ousput will show days
(a) ater 14 May 2017 only
{py from 11 t0 14 May 2017
He) before 11 May and afer 14 Ng
2017
(py __ between 14 May and 5 Noven
2017
‘spreadsheet formulae use
(A) ___ values or labels
(B) __ labels or cell addresses
values, ran I addres
(D) _ values, labels or ©
Which ofthe followis
to fully justify text?
(a)
©)
Lin
Col
The field tt
in a databa:
(a)
(B)
©
0)
fore
prit
alte
secven
fay refers to the following table 45.
oy Meng data on three countries, Ay B
nana sig C, for 2018 and 2019.
Country | 2018 2019
x 300 600
only B 500 800
2017 Cc 300 600.
N after 14,
] wish of the following types of chars
4 5 Novenye NOT suitable for representing the data
above?”
wr Pie
@) Bar
© bine
{b) Column
44. The field that uniquely identifies a record
ina database is called the
buttons antes (A) foreign key
£85 primary key
(©) alternate key
(D) secondary key
46.
259
HM/CSEC 2020
Which of the following sequences of steps
is correet for deleting a field in a database
table?
(A) Choose the delete row option.
Select row to be deleted and right
click.
Open table in design view.
Choose yes to confirm deletion.
(Open table in design view.
Select row to be deleted and right
click. ,
Choose the delete row option.
Choose yes to confirm deletion.
Select row to be deleted and right
click.
Open table in design view.
Choose the delete row option
Choose yes to confirm deletion.
©
Select row to be deleted and right
lick.
‘Choose the delete row option.
pen table in design view
‘Choose yes to confirm deletion.
©)
the following database table
ral
‘Quantiy,
20
Item 46 refers
Dee
Ttem No. [tte
11050 Hammer
1040
FKO30_| Fork _—p
FKO20—
FROIS
Fok
[rxors___ [FO —
ove shows r=?
| Hammer _1—
‘The database table
sorted by
Quant descend ‘order
Guan in Se
ar, No. in a5 on
ae
item No. i
“w
@
©
wo
NEXTPAGE
goonTom™ rEpom SL
whichofthe followingisused forexecy,
48 rTML code?
Read (A,
» Ayener 1fA