INFORMATION SYSTEMS SUPPORT AND INTEGRATION DECEMBER 2022 PAST PAPER

MONDAY: 5 December 2022. Afternoon Paper. Time Allowed: 2 hours.

Answer ALL questions by indicating the letter (A, B, C or D) that represents the correct answer. This paper is made
up of fifty (50) Multiple Choice Questions. Each question is allocated two (2) marks.

1. The component of the central processing unit that fetches data from the main memory and executes the data is referred to as?

A. Input unit
B. Control unit
C. Main memory unit
D. Arithmetic and logic unit

2. The device that converts the AC power to DC power is referred to as?

A. Rectifier
B. Transformer
C. Transistor
D. Resistor

3. Which of the following logic gates will give a high output when either or all the inputs are high?

A. AND
B. OR
C. NOT
D. NAND

4. Which of the following is NOT a safety precaution to be observed when using a computer laptop?

A. Periodically check the laptop battery for its performance
B. Keep the laptop in a well ventilated area
C. Use the laptop in DC with battery removed
D. Keep all liquids away from the laptop

5. Which of the following is NOT a type of electronic waste?

A. Fridges
B. Computer monitor
C. Solar panel
D. Window panel

6. All of the following are tools needed for assembling a computer EXCEPT?

A. Screwdriver
B. Cable ties
C. Static kit
D. Heat sink compound

7. Which of the following is a standard interface for IBM computers that was first developed by Western Digital and Compaq in 1986 for compatible hard drives and CD or DVD drives?

A. ATA Ribbon
B. SCSI
C. SATA
D. IDE

8. Which is the computer generation whose circuit design is based on the large-scale integration (LSI) and very large- scale integration (VLSI) of IC circuitry and its microprocessor combined all the circuitry of the control unit and

Arithmetic and logic unit (ALU) on a single chip?
A. Second generation
B. First generation
C. Fourth generation
D. Fifth generation

9. Printers that provide relatively poor-quality printouts by their printing head element coming into contact with the stationery against an inked ribbon are referred to as:

A. Non-impact printers
B. Poor quality printers
C. Impact printers
D. Line printers

10. Which of the following is a permanent memory that stores instructions and data required for booting the computer system?

A. Read only memory
B. Registers
C. Random Access Memory
D. Cache Memory

11. Which type of motherboard includes advanced control facilities, where the BIOS program continually checks the CPU temperature and voltages, the cooling fans RPM, among others?

A. Mini-ITX
B. ATX
C. Micro-ATX
D. STX

12. The software that provides basic machine instructions to allow the hardware to function and communicate with other software running on a device is known as?

A. Assembly language programs
B. Firmware
C. Liveware
D. Flowchart instructions

13. The process of joining software and hardware modules into one cohesive infrastructure, enabling all pieces to work as a whole is called?

A. Software architecture
B. Enterprise integration
C. System architecture
D. System integration

14. The process of starting a computer that is off by pressing the on-off switch is known as?

A. White booting
B. Black booting
C. Cold booting
D. Warm booting

15. The moral rules or code of behavior applied to the online environment is referred to as?
A. Normative ethics
B. Cyber ethics
C. Cyber security
D. Summative ethics

16. Which of the following computer memories can be classified as volatile?

A. Hard disk
B. Flash disk
C. RAM
D. ROM

17. Which of the following is NOT a cause of hard disk errors?

A. Power outages
B. Software failures
C. Poor system maintenance
D. Computer virus

18. Which of the following terms BEST describes the systematic approach to problem solving that is often used to find and correct issues with complex machines, electronics and computers?

A. Diagnostics
B. Troubleshooting
C. Fault analysis
D. Problem solving

19. A malfunction that occurs when data is being accessed from memory for use by a program is known as?

A. Memory write
B. Memory read
C. Hard disk write
D. Hard disk read

20. Which of the following is the utility that allows computer users to edit, delete, zip, upload, download and copy files?

A. Disk manager
B. File editor
C. File manager
D. Disk editor

21. Which of the following cannot be classified as a monthly disk maintenance activity?

A. Check for and install any operating system updates.
B. Empty the Recycle Bin.
C. Backup any data or important files.
D. Delete all temporary files

22. Which of the following is a Power- on Self-Test (POST) message?

A. Off screen text messages.
B. Audio codes.
C. Octal numeric codes.
D. Data codes

23. Which of the following is the process that communicates with different services, gathers data and proceeds with further steps based on the desired action?

A. Electronic data interchange
B. Data integration
C. Enterprise application integration.
D. Electronic application integration.

24. Which of the following is the correct binary equivalent of the octal code 7623?

A. 111110010011
B. 110111010011
C. 101011110111
D. 011010110111

25. The process of removing errors in a software code is called?

A. Testing
B. Debugging
C. Loading
D. Compiling

26. A group of 8 binary digits operated as a unit is referred to as:
A. A byte
B. A block
C. A bit
D. A nibble

27. Which of the following is the extension of a file created using Adobe reader

A. .txt
B. .xls
C. .pdf
D. .bmp

28. Which of the following is NOT a security goal that organisations must endeavour to achieve in order to retain a competitive advantage?

A. Confidentiality
B. Integrity
C. Accessibility
D. Availability

29 _______________________ devises plans for the restoration of computing and communications services after they have been disrupted by an event such as an earthquake, flood, or terrorist attack.

A. Business continuity planning
B. Disaster recovery planning
C. Data continuity planning
D. Troubleshooting

30. Which of the following can be classified as an integration strategy for integrating applications?

A. Vertical integration
B. Flat integration
C. Block integration
D. Fixed integration

31. Which type of maintenance involves changing a system with reference to a change in its functional environment?

A. Preventive
B. Perfective
C. Corrective
D. Adaptive

32. What type of injury is caused by repeated use of a body part, such as your shoulder, elbow, forearm, wrist or hand?

A. Repetitive eye injury
B. Repetitive stress injury
C. Repetitive body injury
D. Repetitive elbow injury

33. Which of the following is NOT a symptom of failed computer memory?

A. Black screen
B. Random rebooting
C. Distorted graphics on the computer screen
D. Failure of the computer to boot

34. Which of the following is a symptom of failed microprocessor?

A. Loss of stored data
B. Computer freezes
C. Distorted graphics on the computer screen
D. Blank screen

35. Which of the following will indicate an error with an error code on screen?

A. 1 short beep
B. 2 short beeps
C. 3 short beeps
D. 4 short beeps

36. In software development and software engineering, to modify the software, to fix bugs, add features or improve performance is referred to as?

A. Software updating
B. Software upgrading
C. Software maintenance
D. Software modification

37. What is defined as a series of stages that are interrelated and provide several cyclic iterations?

A. Application model
B. Software model
C. System model
D. Maintenance model

38. Which of the following is a symptom of software that is NOT working properly?

A. Software frequently restarting
B. Software producing incorrect answers
C. Software errors
D. Software not loading

39. Over a period of time, data on the disk gets disjoint and this slows down disk performance. Which of the following program in an operating system should be run regularly to avoid this problem?

A. Disk clean up
B. Disk formatter
C. Disk manager
D. Disk defragmenter

40. A _________________________ error code means that the self-test did not complete due to a timeout.

A. Memory
B. Hard drive
C. Processor
D. Expansion card

41. Which of the following is used to establish a barrier between the internal network and incoming traffic from external sources in order to block UDP traffic and malicious traffic like viruses and hackers?

A. Protocol
B. Firewall
C. Device driver
D. Digital signature

42. Which of the following is a component of the central processing unit (CPU) that transmits the location of stored information?

A. Control bus
B. Data bus
C. Address bus
D. Memory bus

43. Which of the following type of computers was characterised by fast processing speeds and parallel processing?

A. Mainframe computer
B. Supercomputer
C. Mini computer
D. Microcomputer

44. Which of the following software utility scans and removes bothersome and malicious adware, tracking cookies, Trojans, malware, spyware and keyloggers from an infected computer?

A. Anti-adware
B. Anti-virus
C. Anti-spyware
D. Spam blocker

45. The following printers use either a toner or ink while printing EXCEPT?

A. Impact
B. Inkjet
C. Laser
D. Thermal

46. Which of the following is computing device feature that allows users to control the amount of electrical power consumed by an underlying device, with minimal impact on performance?

A. Power Management
B. Disk Defragmenter
C. Disk compression
D. Uninterruptible power supply

47. Which of the following BEST describes when antistatic devices should be used?

A. Replacing hardware.
B. Lifting heavy equipment.
C. Updating software.
D. Cooling equipment.

48. Which one of the following markup language was developed to make html more extensible and increase inter operability with other data?

A. XTML
B. XHTML
C. XML
D. HTML

49. In which of the following network cable would RJ-45 connector be found?

A. Coaxial
B. USB
C. UTP
D. Fiber

50. Which of the following computer ports allows a PC to transmit or receive data one bit at a time?

A. Parallel
B. Serial
C. USB
D. VGA

(Visited 112 times, 1 visits today)
Share this:

Written by