2021 WASSCE INFO & COMM TECH PAPER ONE
1. A report which calls attention to out of the ordinary is referred to as
A. adhoc report
B. demand report
C. exception report
D. periodic report
2. Buying and offering of services on the web is called
A. e-business
B. e-mail
C. internet buying
D. internet sales
3. Mixing a primary colour and a secondary colour in a desktop publishing application produces
A. shade
B. colour triad
C. tertiary colour
D. split complimentary
4. A feature in spreadsheet application that displays only the specified data in columns
according to a given criteria is
A. Filter
B. Formula
C. Pivot
D. Sort
5. Which of the following types of memory is EEPROM?
A. Dynamic
B. Non-volatile
C. Static
D. Volatile
6. The communication path between a central processor and other devices is called
A. Bus
B. Cache
C. Channel
D. Network
7. The utility program used in freeing space on the hard disk is called
A. Check disk
B. Disk cleanup
C. Format disk
D. Defragmenter
8. The device used within the computer that conducts and draws heat away from the processor
is called
A. Radiator
B. Heat Sink
C. Thermostat
D. Air conditioner
9. The computer keyboard combinations which enables users to start the process of warm
booting is
A. Ctrl + K
B. Shift + F
C. Ctrl + Alt + Del.
D. Crtl + Shift + Esc
10. The term computer program is also referred to as
A. Procedure
B. Software
C. Topology
D. Utility
11. A programming language that is used to write source codes that are independent of a
particular type of a computer is called
A. Assembly language
B. High-level language
C. Low-level language
D. Machine language
12. The programming language C++ was developed by
A. Charles Babbage
B. Bill Gate
C. David Filo
D. Bjarne Strudsteup
13. Which of the following QBASIC commands is used to assigned values to variables?
A. DATA
B. INPUT
C. LET
D. PRINT
14. Flowchart is a pictorial representation of
A. Algorithm
B. Charts
C. Data types
D. Mnemonics
15. The symbol used to represent branching in a flowchart is
A. Circle
B. Diamond
C. Rectangle
D. Triangle
16. A network topology in which the nodes connect to a common medium to form a closed loop
is called
A. Bus
B. Mesh
C. Ring
D. Star
17. The linking of computers with a communication system is called
A. Assembling
B. Networking
C. Pairing
D. Routing
18. The combination of one or more related characters a user accesses in a database is called
A. Field
B. File
C. Form
D. Record
19. A database program is made up of primary components called
A. Commands
B. Items
C. Objects
D. Properties
20. Each row of a table in a database is called
A. Character
B. Field
C. Key
D. Record
21. If base 10 is called decimal number system then base 8 is
A. Binary number
B. Duodecimal number
C. Hexadecimal number
D. Octal number
22. The real business and competitive value of information technology lies in the
A. Software applications that are used by many companies
B. Capabilities of the hardware and the speed at which it processes information.
C. Infrastructure of hardware, networks and other I.T facilities that are commonly used.
D. Capabilities of the software and value of the information a business acquires and uses.
23. Which of the following is not a technology driver for an information system?
A. Enterprise applications
B. Networks and the internet
C. Collaborative technologies
D. Knowledge asset management
24. Which of the following terms are related to cybercrimes?
I. Flamming
II. Hacking
III. Scamming
IV. Spamming
A. I and II only
B. II and III only
C. III and IV only
D. I, II and IV only
25. When a designer raises an item into a higher hierarchy in an outline in a desktop publishing
application, the term used is
A. Contracting
B. Demoting
C. Expanding
D. Promoting
26. Which of the following formulas will display the current seconds past the minute of the
clock in a spreadsheet application?
A. =SECOND()
B. =SECOND(NOW( ))
C. =SECOND(YEAR( ))
D. =SECOND(HOUR ( ))
27. Which if the following options retain its information when power to the computer system is
turned off?
A. RAM
B. ROM
C. DIMM
D. DRAM
28. Which of the following devices is not used to read and image into a computer?
A. Bar code scanner
B. Flat bed scanner
C. Infrared pointer
D. Smart phone
29. Which of the following programs is not an operating system?
A. Linus
B. Opera
C. Unix
D. Windows
30. The major function of operating system is
A. Arrangement of files
B. Collection of files
C. Resource management
D. Organization of the data
31. The following connectors are typically associated with computer mouse except
A. PS/2 connector
B. Serial comnnector
C. Parallel connector
D. Bus interface
32. Missing slot covers on a computer case can cause
A. Overheating
B. Power surge
C. Electromagnetic emission
D. Incomplete path for electrostatic discharge
33. A software distributed or downloaded free for use for a limited period of time is referred to
as
A. Adware
B. Freeware
C. Shareware
D. Trialware
34. Which of the following characters is allowed in a file name?
A. ?
B. *
C. –
D. :
35. An example of an application software is
A. Device driver
B. Microsoft Excel
C. Ubuntu
D. Windows 7
36. Which of the following QBASIC commands should be used when printing the sum
of two integer variables?
A. PRINT Z=X+Y
B. PRINT “Z=X+Y”
C. PRINT X+Y
D. PRINT SUM(X,Y)
37. The HTML tag <table bgcolor= “yellow”> means the
A. Border of the cell is yellow
B. Border of the table is yellow
C. Content of the row is yellow
D. Background of the table is yellow
38. Which of the following media is a guided communication?
A. Coaxial cable
B. Microwave
C. Radio
D. Satelite
39. The computer network topology that uses the least amount of cabling is
A. Bus topology
B. Mesh topology
C. Ring topology
D. Star topology
40. Which of the following addresses is the same as [Link] when typed in the address
bar of a web client?
A. [Link]
B. [Link]
C. [Link]
D. [Link]
41. Figure 1 represents which type of topology?
A. Hybrid topology
B. Mesh topology
C. Ring topology
D. Star topology
42. The form which is created by computer program developers in database application is
A. Optional to use in place of a report.
B. Used to take printout of a form from tables.
C. Used for storing special data other than text.
D. An input screen for viewing and entering data
43. Which of the following data types creates a drop down list of values?
A. Memo
B. Hyperlink
C. OLE Object
D. Lookup Wizard
44. Which of the following options is not a benefit for teachers using information and
communications technology (ICT)?
A. Creating flexibility
B. Sharing of resources
C. Gains in technology literacy
D. Increase knowledge of children learning.
45. ICT tools for education does not include
A. Blog
B. Group class
C. Whatsapp group
D. Wikis
46. The QBASIC codes given below have an error:
FOR 1=1 TO 12
READ B(1)
NEXT B
DATA 1,2,3,4,5,6,7,8,9,10,11,12
Select the code in the options provided that will correct this error.
A. NEXT I
B. READ B(I)
C. READ B$(I)
D. FOR I = 1 TO 12
47. If 5 is in cell A1, 10 is in cell A2, and 20 is in cell A3, the function to compute the sum of the
numbers is
A. =A1+A2+A3
B. =SUM(A1:A3)
C. =SUM([Link])
D. =A1, A2, A3
48. To find product of the numbers 10, 20, 30, 40 and 50 in a spreadsheet, which of the
following formulas is correct?
A. =PRODUCT(10,20,30,40,50)
B. =10x20x30x40x50
C. =MULTIPLY (10:50)
D. =PRODUCT(10x20x30x40x50)
49. Which of the following formulas represent an absolute cell reference in a spreadsheet
application?
A. =!A$1
B. =$A$1
C. =A1
D. =$A1
50. The octal representation of the binary number 1001102 is
A. 26
B. 38
C. 46
D. 212