INSTRUCTIONS: ANSWER ALL QUESTIONS.
In the list below, what would be the first logical step when troubleshooting a computer?
A. Call the vendor
B. Define the circumstances of the problem
C. Check the computer CMOS
D. Define what applications are being used
Mr. Tekino while working on a client’s computer saw the message “invalid media device” after installing a new hard drive. Advise him on the best action to take.
A. Add operating system to the hard drive
B. Compress the hard drive
C. Partition the hard drive
D. Format the hard drive
is suitable to clean different components of a computer without leaving scratches or debris.
A. Soft cloth
B. Cable ties
C. Compressed air
D. Parts organizer
Which one of the following access controls entails users assigning access rights based on rules user specify?
A. Mandatory access control (MAC)
B. Attribute Based Access Control (ABAC)
C. Role based Access Control (RBAC)
D. Discretionary access control (DAC)
Application integration is crucial in modern business. There are a number of application integration challenges that businesses face today. Which of the following is NOT a valid way to overcome these challenges?
A. Have easy-to-use, web-based, graphical integration design that business application owners can drive on their own. B. Self-documenting interface with the ability to track changes and restore old versions if something goes wrong.
C. Opt for multiple, smaller integrations over large, more complex ones.
D. Training all users to become application integration experts so that they have the required skills.
Is define as any electrical or electronic equipment that’s been discarded.
A. Faulty hardware
D. Waste electronic equipment
Which one of the following converts the formats of electricity pulled from power sources to match the format required by
the machines they power?
A. ROM BIOS Chip
B. CMOS RAM
C. Hard Drive
D. Power Supply
Which of the following best describes the characteristics of the information that is required by top level executives in an
A. It is sourced from internal sources and external sources, highly detailed and relevant to the long term
B. It is sourced from external sources, highly summarized and relevant to the short term C. It is sourced from internal and external sources, highly summarized and relevant to the entire organization
D. It is sourced from internal sources, highly summarized and relevant to the long term
Security of computer hardware and its components is also necessary for the overall protection of data. Which one of the following does NOT entail security of computer hardware and its component?
A. Internal components
B. Locks and cables
D. Cloud Computing.
The device that tests computer ports basic functionality is known as .
A. digital multimeter
B. Loopback adapter
C. toner probe
D. port tester
During computer assembly, the processor is mounted onto the ZIF socket. After processor mounting, the will be attached on top of the processor.
A. processor fan
B. processor bay
C. heat fan
D. heat sink
Which one of the following refers to the process of replacing a product with a newer version of the same product?
A point of contact within the organization meant to cater for internal technical ICT queries is referred to as .
A. ICT guide center
B. ICT Help desk
C. ICT queries point
D. ICT data center
____________________is used to describe devices that work with a computer system as soon as they are connected.
A. Standard hotub
C. Universal Serial Bus
D. High Definition Multimedia Interface
Which one of the following is a cyber-attack that entails stealing smaller amounts of money from thousands of bank accounts at once?
A. Data diddling
B. Salami attack
C. Password attack
D. Cross-site Scripting
Which of the following is NOT components of an information system?
D. Arithmetic and logic unit
What is the name given to a hardware device or software program used to convert data from one format into another?
D. Flip flop
____________describes security measures that are designed to deny unauthorized access to facilities, equipment and
resources and to protect personnel and property from damage or harm.
A. Network Security
B. Physical Security
C. Information Security
D. Database Security
Acronym RSI stands for?
A. Repetitive Standing Injury
B. Real Strain Injury
C. Repeated Standing Injury
D. Repetitive Strain Injury
What is the name of the physical docking point where an external device can be connected to the computer?
C. Port D. Socket
Identify the type of cybercrime attack initiated by cybercriminals to masquerade as a senior player at an organization and directly target senior or other important individuals of a given organization.
QUESTION 22 What is defined as an integrated set of components for collecting, storing, and processing data and for providing information, knowledge, and digital products?
A. Information system
B. Computerized system
C. Data system
D. Digital system
The type of system integration that supports the expanding of the functionality of the existing system is referred to as.
A. Business-to-business integration
B. Enterprise application integration
C. Third-party system integration
D. Legacy system integration
Which one of the following refers to the abuse of computers and high-technology appliances to undermine computing resources of an adversary?
A. Information Warfare
B. Electronic Warfare
C. Cyber Crime
D. Cyber Reconnaissance
Which of the following is not a power on- self- test (POST) output message?
A. Audio codes
B. onscreen text messages
C. hexadecimal numeric codes
D. Video codes
Disaster response is the reaction and activity involved in helping people who have involved in some kind of catastrophe. Among the following, identify number one priority of disaster response.
A. Resuming transaction processing.
B. Protecting the hardware.
C. Protecting the software.
D. Personnel safety
___________________ refers to group of computers are linked together so they can work as a single entity.
An attempt by attacker to take control of computer system, programs and network communication can be referred to as .
B. Session hijacking
C. Cyber hijacking
D. Cyber Attacks
Glorix Ltd sells both new and refurbished computers and their accessories. Mrs Clarax bought a new computer recently and has lodged a complaint with respect to how her computer has become very slow. Which of the following is NOT a possible cause for this?
A. Too many startup programs.
B. Processor has become obsolete.
C. Many applications installed that are rarely used
D. Low hard disk storage capacity.
A decision that is made by a proprietor of an organization using the experience acquired and documented rules can be
referred to as?
A. Structured decision
B. Semi structured decision
C. Unstructured decision
D. Complete decision
_________relates to copying of physical or virtual files or databases to a secondary site for preservation in case of equipment failure or another catastrophe.
is a cross-functional organizational backbone that integrates and automates many internal business processes and information systems within the sales and distribution, production, logistics, accounting, and human resources.
A. Enterprise Resource Planning
B. Payroll Management System
C. Customer Relationship Management
D. Human Resource Management
Who among the following are referred to as nefarious hackers and their sole objective is for financial gains?
A. Amateur hackers
B. Black hat hackers
C. White hat hackers
D. Gray hat hackers
Ergonomics is an applied science concerned with designing and arranging things people use so that the people and things interact most efficiently and safely. Identify from the following what a user should NOT do.
A. Sit in the same position for more than an hour
B. Use a speaker phone or headset, as needed.
C. Keep your computer monitor at or below eye level.
D. Use wrist and palm supports to rest in between tasks.
What tool is used to safely and quickly remove integrated circuits (ICs) from their sockets? A. All-purpose cleaner
B. Chip extractor
C. Compressed air
D. Wet cloth
Which of the following is an advantage of system integration?
A. Realization of all organization’s goals
B. Increased productivity
C. Better security of data
D. Development of viable systems
___________is the term that relates to weakness exhibited in system or network.
One of the hard drive types is the , which is a storage drive composed entirely of memory chips, rather than rotating magnetic disks in traditional hard disks.
A. serial ATA (SATA)
B. small computer system interface (SCSI)
C. solid state drives (SSD)
D. parallel ATA (PATA)
Which of the following statements listed below is NOT a good reason why web services must be tested?
A. The web services and client applications communicate over the world wide web, and there are abundant chances of a security breach.
B. The host maintains and improves the services periodically therefore development team must put in regular effort to improve the product, which involves changes through different builds and releases.
C. Webservices are small applications that have specific functionality therefore, a test is necessary to validate the functionality and quality of these services.
D. In order for the services providers to show their superiority and expertise in offering those services to their clients.
Mr. Zlate found out his computer is running perfectly after he powered it up, the longer he used it the slower it became. What could be the problem with the computer.
A. A non-bootable floppy disk is in the floppy-disk drive and you should remove it
B. The hard-drive has failed and you should replace it
C. RAM has failed and you should replace it
D. A key on the keyboard is stuck and the keyboard should be replaced
is an information system that supports the capturing, processing, storage of transactions and production of a variety of documents related to routine business activities
A. Transaction processing systems
B. Decision support system
C. Executive support systems
D. Management information system
Identify from the following, an Extensible Markup Language (XML) related technology.
A. XTML B. XSave
Which of the following commands will high-level format drive C, write the hidden operating system files in the first part of the partition, and prompt for the entry of a volume label to be stored on the disk?
A. Format C: /S/D
B. Format C: /D/S
C. Format C: /S/V
D. Format C: /V/S
Which of the following is a public network scam undertaken by cyber-criminals where the user is made to consent digitally to provide confidential information?
A. Man-in-the-Middle Attack
B. Denial-of-Service (DOS) Attack
C. Phishing Attack
D. Password Attack
The following are keyboard challenges;
I. Hard to press keys
II. The keyboard not attached to the PC
III. Dusty keys
IV. The keyboard failure
V. Sticky keys
Among those listed above, choose two that are likely to result to an error message “Keyboard error” being displayed on a computer screen.
A. I & II
B. I & III
C. II & IV
D. II & V
Which one of the following relates to safe and responsible use of Information and Communication Technologies (ICT)?
A. Cyber ethics
B. Cyber security
C. Cyber safety
D. Computer ethics
_________is the area where the computer stores its configuration information.
B. CMOS RAM
D. Flash Memory
Businesses, governments, and individuals can experience huge complications from having sensitive information exposed. Identify among the following a step not undertaken by cybercriminals in Data breaching.
C. Fixing virus
D. System attacks
Which of the following cannot be classified as a weekly disk maintenance activity?
A. Backup any data or important files. B. Delete all temporary files
C. Empty the Recycle Bin.
D. Check for and install any operating system updates.
Which program runs first after booting the computer and loading the graphical user interface (GUI)?
A. Desktop Manager
B. File Manager
C. Windows Explorer
The is a pathway composed of cables and connectors used to carry data between a computer microprocessor and the main memory.
A. System bus
B. Expansion bus
D. Interrupt request (IRQ)
Which of the following represents the correct order in which you should install components into the case after disassembling a computer?
A. Power supply, motherboard, drives, cards
B. Drives, motherboards, cards, power supply
C. Cards, motherboard, power supply, drives
D. Motherboard, drives, cards, power supply
Which of the following is NOT a cause of blue screen in computers?
A. Faulty memory card
B. Faulty hardware drivers
C. Faulty system software
D. Faulty sound card
Which one of the following is a program designed to help users’ detect a computer virus and avoid them?
Which of the following is software testing type, in which the testing is performed on each individual component separately without integrating with other components?
A. Acceptance testing
B. Component testing
C. System testing
D. Integration testing
Among the statements below, identify the best describing how simple object access protocol (SOAP) is used.
A. It is used for the exchange of information throughout platforms, languages and operating systems.
B. It provides communication and connectivity between the devices and the internet for API-based tasks.
C. It is used to create Web pages and tells the browser how to display them.
D. It is the protocol where encrypted HTTP data is transferred over a secure connection such as Transport Layer Security or Secure Sockets Layer.
QUESTION 57 A customer reported that upon booting up his computer, the message: Invalid drive configuration,” was displayed. What could be the problem?
A. The hard drive power cable within the system unit is faulty
B. The hard drive is not properly connected
C. The hard drive has not been formatted
D. The hard drive cylinder is faulty
Evolution of technology has evolved and shaped the way we communicate, learn, and work. In view of the above, which of the following relates to exploring appropriate ethical behaviors in respect to public network usage?
A. Cyber Law
B. Cyber Operations
C. Cyber Ethics
D. Cyber Security
is the name given to the processor’s characteristic that offers some protection against overheating.
Which of the following ICT enabled services, is defined as the usage of Information and Communication Technology (ICT) by the government to provide and facilitate government services, exchange of information, communication transactions and integration of various standalone systems and services?
B. Mobile ticketing
C. Social networking
Which of the following is NOT a feature of expert systems?
A. Expert systems can be expensive to develop
B. Expert systems can deal with mixed knowledge
C. Expert systems can explain how and why a decision or solution was reached
D. Expert systems can provide portable knowledge
A client called saying that a printer is not working. The printer was brought for repairs. What is the first thing you could do after receiving it?
A. Run MSD diagnostics
B. Attach it to a PC and print something
C. Check the cable
D. Unbox it and examine it for physical damage
Which of the following is crucial for organizational development and success and makes an employee become more efficient and productive?
A. Finding system defects.
B. Training employees.
C. Penetration testing.
D. Computer testing
Which of the following adheres to the principle of keeping sensitive information highly classified?
_________________hardware device used for direct memory access.
A. Power supply
B. ROM BIOS
C. Direct Memory Access controller
D. Hard drive or controller
Which of the following is NOT a feature of web services?
B. Supports Exchange of Documents
C. Reliable Messaging
D. Security and privacy
What type of maintenance defined as “the regular and routine maintenance of equipment and assets in order to keep them running and prevent any costly unplanned downtime from unexpected equipment failure”?
A. Corrective Maintenance
B. Adaptive Maintenance
C. Preventive Maintenance
D. Perfective Maintenance
Code of Conduct is regarded as a set of rules pertaining to the use of participatory media. A digital code of conduct forms the basis for user and content moderation. In view of the above, which one among the following is not part of the code of ethics.
provides backup power when your regular power source fails or voltage drops to an unacceptable level.
A. High-graded multi-meter
B. Spike protector
C. Uninterruptible power supply
D. Power supply unit
Which of the following is defined as an attempt by individual to send anonymous messages to Bluetooth-enabled devices within a certain radius.
A. Cyber attack
Internal components are devices that are connected to computer’s motherboard or built-in to the motherboard. Among the following which one is NOT an internal component of a computer?
B. Hard disk
C. Power supply unit
D. Memory card
Point-to-Point connection between devices can be connected to a single cable with a minimum of four wires. Identify this cable among the following.
B. ATA Ribbon
A temporary storage location inside the computer central processing unit (CPU) that stores data and addresses is known as
A. Control unit
B. Arithmetic and logic unit
D. Input/output unit
User Integration is designed to manage the organizational changes companies are challenged with on a daily basis. Which of the following is NOT regarded as proper aspect of user integration?
A. Physical Authorization
B. Employee Authentication
C. Access Control
D. User database representation.
Which of the following concepts describe the situation when a computer user runs the motherboard or processor at higher speed than the manufacturer specification?
D. Multi-core processing
Which of the following are the three types of motherboard form factors?
A. Mini-ITX, Micro-ATX and ATX.
B. Mini-ATX, Micro-ATX and ATX.
C. Mini-ITX, Macro-ATX and ATX.
D. Mega-ITX, Micro-ATX and ATX.
Which one of the following is a benefit of electronic waste management?
A. Existing facilities not designed to handle
B. Heavy, Bulky and complex Waste to process,
C. Requires special logistics and new handling facilities, with new e-waste processing Technology
D. Protects the surroundings
Which of the following conforms to the concept of protecting the functionality of support systems and ensuring data is fully accessible at any given point in time?
Which one of the following is an element to be used for security operations center?
B. Data centre
C. Database engine D. Internet Connection
Printers can be classified based on printing speed. How is the speed of a dot matrix printer expressed?
A. lines per second
B. lines per minute
C. characters per inch
D. characters per second
Which of the following end devices can bring external files and virus along with it to the internal systems?
B. Smart phone
Mr. Tumbili turned on his tablet and got a message displaying a message indicating that all of his files have been locked. In order to get the files unencrypted, he is supposed to send an email and include a specific ID in the email title. The message also includes ways to use blockchain as payment for the file decryption. After inspecting the message, the network analyst suspects a security breach occurred. What type of malware could be responsible?
A. Trojan horse
Never expose laser printer under direct sunlight as heat from sunlight would impact its performance. Identify the part of
the laser printer that should NOT be exposed to sunlight?
A. Transfer corona assembly
B. Printer PC
C. Primary corona wire
D. Toner cartridge
Which one of the following gives the assurance that the information is trustworthy and accurate?
Printdeal Ltd is a company dealing with a variety of printers. A customer reported that the print quality of a dot matrix printer acquired recently has changed from light to being dark. Identify the possible cause of this problem.
A. Paper slippage
B. Improper ribbon advancement
C. Paper thickness
D. Head position
Which one of the following is unwanted software designed to throw advertisements up on your screen, most often within a web browser?
C. Macro virus
D. Bootsector virus
QUESTION 87 Which one of the following refers to the abuse of computers and high-technology appliances to undermine computing resources of an adversary?
A. Information Warfare
B. Electronic Warfare
C. Cyber Crime
D. Cyber Reconnaissance
Which of the following is NOT a good proposal towards dealing with the challenges of e waste?
A. Discourage investment in this sector.
B. Promote recycling units to ease process and to encourage generators to have proper e-waste disposal.
C. Impart training to generators on e-waste handling.
D. Tax incentives for scrap dealers.
Which one of the following identifies the actual sender and recipient of a message alongside information such as date/time of transmission and intention of sender?
A. Database Forensics
B. Malware Forensics
C. Email Forensics
D. Network Forensics
________________is an updated system for booting computers that include support for 64bit systems.
What is the name of the term that describes a sudden increase in voltage that lasts for a short period and exceeds 100 percent of the normal voltage on a power line?
A. Power Surge
D. Serial ATA (SATA)
Miss Rahab a newly employed technician is installing a second SATA hard drive. Which section of the following sections on the motherboard can be used to connect the SATA cable?
A. SECTION D
B. SECTION A
C. SECTION B
D. SECTION C
____________________CPU architecture that uses a broad set of instructions, resulting in fewer steps per operation.
B. Complex Instruction Set Computer (CISC)
D. Safety Data Sheet (SDS)
Which one of the following uses NAND, a type of flash memory named after the NAND logic gate to hold some important data in solid state storage on a hard disk drive device?
A. Solid state Hybrid Drive (SSHD)
B. Hard Disk Drive (HDD)
C. Solid state Drive (SSD)
D. Nonvolatile memory express (NVMe)
Which one of the following best describes direct consequence of identity theft?
A. Your keyboard or mouse may stop working
B. Your email account may be accessed by someone else.
C. Your computer may take longer to start.
D. Your broadband connection may suffer from reduced speed
Which of the following is a type of electronic surveillance that is used in criminal investigations?
B. Network tapping
C. Switchport analyzer
D. Port Mirroring
Over time different technologies and solutions have been proposed to secure users’ information online or offline. Which one of the following is considered to be a traditional authentication method?
A. Secure socket layer
B. Transport Layer Protocol
C. Password-based authentication
D. Secure Socket Shell
Which of the refers to the use of ICT to introduce, reinforce, supplement and extend skills?
Which one of the following is not a technique used to obfuscate data?
D. Data Masking
Mr.Lidibwe downloaded a free game app for her daughter. He discovered a malware hidden inside that runs at the background of the device. Which type of security flow occurred to his device?