INSTRUCTIONS TO CANDIDATES
Answer all questions
Select correct answers in the questions below
1. Which of following technologies was used in the first generation of computers?
a. Vaccum tubes and magnetic drum
b. Integrated circuits
c. Magnetic tape
2. The series of repeatable steps taken by a team to achieve business goal is known as?
a. Business intelligence
b. Business process
c. Quality process
d. Business process re-engineering
3. Choose a programming language that is in the category of low level
a. Procedural language
b. Assembly language
c. Machine language
d. Logic programming
4. In which layer of the client computing architecture does the business logic lie?
a. 1st Tier
b. 2nd Tier
c. 3rd Tier
d. 4th tier
5. Which of the following data processing mode is suitable for data that is required for immediate decision making?
a. Batch processing
b. Electronic data processing
c. Realtime processing
6. Which of the following is used to link devices of different topology?
7. Which of the following is NOT a task in system analysis stage of system development life cycle?
b. Problem formulation
c. Creating functional requirements.
d. Creating flowcharts
8. Which of the following is stored in flash memory chip?
b. Operating system
d. Application software
9. In which category does android software belong?
a. Application software
b. Firm ware
c. Operating system
10. Choose the layer in which Simple Mail Transfer Protocol (SMTP) is found in the TCP/IP protocol?
a. Transport layer
b. Internet layer
c. Network layer
d. Application layer
11. Select from the following a set of processes and procedures that transform data into information.
a. Information system
b. Knowledge system
c. Expert system
d. Operating system
12. Which of the following computers will be the most appropriate for intensive mathematical and scientific application?
a. Mainframe computers
b. Super computers
c. Hybrid computers
d. Mini computers
13. Which of the following programming languages is an Object-Oriented programming language?
14. Which of the following is NOT a technological impact of Covid-19 lock down?
a. Increased eLearning
c. More use of video conferencing
d. Closure of schools
15. Which of the following is used to design computer programs?
16. Identify the challenges of ring topology in a network.
b. Any node failure affects the entire network
17. What is the name given to a document used when a company goes outside its organization to develop a new system?
a. Request for expression of interest
b. Request for invoice
c. Request for proposal
d. Request for comments
18. What is equivalent of 5KB into bytes?
a. 1000 bytes
b. 5000 bytes
c. 5120 bytes
d. 40 bytes
19. Which of the following is a programming methodology?
a. Event driven
20. Which of the following is NOT an ethical concern in computer networking?
a. Hardware failure.
21. Which of the following is an advantage of programming using low level languages?
a. Easy to learn
c. Fast processing
22. Which of the following determines the speed of a computer?
a. Bus width
23. Identify an input device captures data directly from the source
c. Optical character recognition
d. Touch screen
24. Which part of the motherboard allows users to add new devices and capabilities to a computer system?
a. Expansion slots
25. Which of the following is a short-range wireless connectivity technology?
26. Which of the following statements correctly defines Sequential file organization technique?
a. Method of storing records in contiguous blocks according to a key
b. Storing records sequentially but using an index to locate records
c. Using an index for each key type
d. Having records placed randomly throughout the file
27. Which of the following is NOT used in a Local Area Network?
d. Logical Address
28. Which of the following is NOT a system investigation technique?
c. Review previous studies
29. A compiler is used to convert the source code written in mnemonics into object code.
30. Software that prevents unauthorized access to a network located between a private network and an outer
network on the Internet restricting Internet traffic in, out or within a private network is referred to as?
31. What is the name given to the mechanism of protecting critical systems and sensitive information from digital attacks?
32. Which of the following is an example of a control structure? a. Arrays
c. For loop
33. Given that x=2, what is the answer expected from x>5? a. True
34. Which of the following is the first to be done to a variable? a. Declaration
35. Choose the location where a programmer may NOT choose to store program data. a. Text files
36. Match the programs with their functions
a. C-> y, E->z, d->y
37. Which of the following is the smallest piece of information in data processing? a. 6 bits
38. Which of the follow technology provides the fastest secondary storage? a. Magnetic storage
b. Optical storage
d. Flash memory
39. Which of the following is NOT a type of software testing? a. Smoke
40. Choose the name of the software produced by a proprietary company when testing software. a. Open source
d. End user agreement
41. Which of the following technologies was the first to be widely affected by ICT technology? a. Mailing
c. Weather forecasting
d. Mineral exploitation
42. Below are reasons why companies create new programming languages, which one is not? a. Better performance
b. Increase development costs
c. Security of their software
d. To fit their needs
43. Which of the following is the role of a database administrator in an organization? a. Debugging
b. Set and maintain database standards
c. Creating database programs.
d. Designing software application
44. Why do organizations opt for tailor made software instead of off the shelf software? a. Precise requirements
b. Better documentation
c. Less errors
d. Costs less
45. What is the danger of locating an organization server on a cloud location? a. Availability
46. Which of the following is LEAST likely to be caused by using a computer? a. Backache
b. Strain Injury
c. Eye problems
d. Hearing problems
47. Which of the following command is used in network troubleshooting? a. Dir
48. Which of the following is a CASE tool?
a. Diagramming tool
c. Word processor
d. Corel draw
49. Which of the following tool is the most suitable for prototyping? a. Oracle
c. Visual Basic
50. Which of the following is the MAJOR concern among parents on ICT? a. Time saving
b. Cyber bullying
c. Loss of gadgets
51. Which level of management uses decision support systems? a. Transaction managers
c. Strategic managers
52. Which of the following is a part of an expert system? a. Inference engine
b. An expert
c. A database
53. Which of the following is NOT a type of programming error?
54. The process of contracting a certain project or an entire business task to an external service provider that specializes in the service is called______________.
55. Select the type of information system that stores knowledge from a specific domain
a. Expert system
b. Decision Support System
c. Knowledge Worker System
d. Management of Information System
56. Which one of following is a characteristic of Online Analytical Processing (OLAP)?
a. It allows both read and write operation
b. It allows only read and hardly write operations
c. OLTP employs traditional DBMS
d. It holds current operational data
57. Select the application that is used at the operational level of an information system
a. Payroll system
b. Logistics systems
c. Group decision support systems
d. Budgeting systems
58. Which of following is NOT a problem-solving tool in programming?
a. Decision tree
b. Decision table
d. Pivot tables
59. A graphical representation of an algorithm is known as a?
a. Work flow diagram
60. The translator that coverts source code written in a high-level language to the object code by translating all the code at once is called?
61. ___________ is the programming paradigm that focuses on the logic of computation while neglecting the control.
62. Select the name of the condition caused by excessive use of the computer causing a series of eye problems due to staring at the monitor of a computer for a long period of time.
a. Repetitive Strain Injury
b. Carpal Tunnel Syndrome
c. Computer Vision Syndrome
63. Select the type of testing that takes place at the end users’ site by the end users to validate the usability, functionality and compatibility of software.
a. Unit testing
b. Stress testing
c. Beta testing
d. Alpha testing
64. The problem-solving technique, that is concerned with the breaking down a task into smaller manageable tasks that are easier to debug is referred to as?
65. Which programming control structure is used for executing repetitive statements in programming?
66. The study of the sitting posture when using computers is known as?
67. The application area of computing that tries to mimic the reasoning of a human being in problem solving is known as?
a. Virtual reality
b. Artificial intelligence
c. Augmented reality
d. Machine learning
68. The system program that takes the object code of a program as input and prepares it for execution is called?
69. Which of the following can cause eye strains when using computers monitors?
a. Use of antiglare screen
b. Using computers with flickers
c. Use a wrist rest
d. Using adjustable chairs
70. Which of the following is the correct steps for program life cycle?
a. Analysis- Coding -Design- Testing-Maintenance
c. Analysis-Design- Maintenance -Coding-Testing
d. Analysis- Maintenance -Design-Coding-Testing
71. Working from a location other than an office using modern technology and telecommunications to remain in touch with your employer is called?
72. The diagram below represents a typical computer network.
Suggest the name of the part labeled I on the diagram.
73. The following is a list of disadvantages of a Star topology. Which one is NOT?
a) Not easy to extend the network
b) Expensive to install
c) Extra hardware is required adding to the cost.
d) Requires more cable
74. Match each of the following types of computer files with their corresponding descriptions
a) I -W, II -X, III -Y, IV-Z
b) I-X, II -Y, III -Z, IV -W √
c) I -Z, II -Y, III -X, IV-W
d) I -Y, II -W, III -X, IV -Z
75. When is it necessary to use rapid application development method of information system development in an organization?
a) When there is no need to encourage customer feedback
b) When there is no need of increasing reusability of components
c) When there is scarcity of qualified designers.
d) When the system is required in a short duration
75. Given below are importance of Online Analytical Processing (OLAP) in a business data warehouse. Which one is NOT?
a) Finding some clusters and outlier data is easy
b) It avoids analyzing time series data which is not necessary to a business
c) Provides building blocks for business modeling tools
d) Quickly create and analyze ‘what if’ scenarios.
76. Below is a list of drawbacks of mobile commerce. Which one is NOT?
a) Data privacy concerns
b) Internet connectivity
c) Shipping costs
d) Size of the gadget
77. Information technology raises a number of legal and ethical issues. Which among the following is a legal issue raised by information technology?
a) Access right
b) Personal privacy
c) Trade Secrets
d) Data protection
78. The following is a list of types of decision support system. Which one is NOT?
79. Information and communication technologies (ICT) have impacted entertainment and leisure activities in different ways. Choose one entertainment and leisure activity from the list below.
a) Video production
b) Video conferencing
c) News editing
d) Swimming lessons
80. Which of the following types of file correctly matches with its corresponding application software
a) Kasneb.xlsx – Microsoft Text
b) Kasneb.txt – Notepad
c) Kasneb.pdf – Microsoft PowerPoint
d) Kasneb.pptx -Microsoft publisher
81. Which of the following is NOT an arithmetic operator in programming?
82. What is the result of the operation 5%2
83. Which of the following stores historical data?
b. Operational data
c. Data warehouse
d. Online database
84. Which of the following is NOT a system software?
b. Operating system
d. Language translator
85. A business professional who uses analysis and design techniques to solve business problems by using information technology and requires more in-depth technical knowledge is called?
a. Business analyst
b. System analyst
d. System Programmer
86. Which of the following is proprietary Operating System?
87. In a computer architecture, a bus is a group of wires that connects different components of the computer. Which of the following is a computer bus?
88. Computing system can be used as more general term to describe a system that is used to solve problems and interact with the environment. Which of the following is NOT a component of the computing system?
89. ____________is a diagram that depicts the interactions between the system and external system users
b. Activity diagram
90. The technology that superimposes information such as text, image, sound on the real world and enhances a part of the user’s physical world with computer-generated digital information is known as?
a. Virtual Reality
b. Computer Graphics
c. Augmented Reality
91. A type of software that is burnt into a hardware is called?
a. Operating system
92. The natural counting numbers are to base?
93. A network device that BEST broadcasts information to the correct network segment is called?
94. Which of the following is the main shortcoming of outsourcing ICT services?
d. Data security
95. Identify the correct statement about information systems
a. Different information systems types are used by different levels of management
b. All parts of an information system are used by any group of users
c. All information can be stored in any location.
d. Security is more important that access in a system
96. Which of the following application does NOT use artificial intelligence?
b. Face recognition
c. Natural language processing
d. Smart card authentication
97. Consider the code below
If x is 3, what is the output?
98. Which of the following displays has the LEAST favourable output?
a. Gas plasma
b. Cathode Ray Tube
c. Light Emitting Diode
d. Liquid Crystal Display
99. Identify the address that is inbuilt in a physical computing device?
a. IP address
b. Routing table
c. MAC address
d. Subnet mask
100.Which of the following is the MOST effective method of securing organization data?
a. Employing watchmen
b. Using firewalls
c. Using identification badges
d. Using grills on doors