APRIL 2022 TIME: 3HOURS
INSTRUCTIONS: ANSWER ALL QUESTIONS.
QUESTION 1
A computer is known to be versatile meaning it is capable of performing almost any task. Among the following, identify a task which currently CANNOT be done by a computer.
A. Designing aircraft wings
B. Coming up with creative thoughts
C. Storing data for long periods
D. Carrying complex computations.
QUESTION 2
Which type of operating system is best described as the one which allows multiple users to access a single system with one operating system?
A. Multiuser
B. Multitasking
C. Multiprogramming
D. Multiprocessing
QUESTION 3
a computer refers to the process of powering on the computer and starting the operating system.
A. Scanning
B. Booting
C. Upgrading
D. Resetting
QUESTION 4
Which one of the following is NOT a computer application area in entertainment?
A. Computer aided learning
B. Playing video games
C. Keeping track of one’s location during camping or hiking trips.
D. GPS tracking devices are frequently used for nature walks
QUESTION 5
What is the octal equivalent of the following decimal number 462?
A. 617
B. 1CE
C. 716
D. 462
QUESTION 6
Which one of the following is NOT an input device?
A. Mouse
B. Sensor
C. Digital camera
D. Speaker
QUESTION 7
The following are commonly used high level languages, EXCEPT?
A. Python
B. Assembly
C. Java
D. C++
QUESTION 8
Which one of the following methods CANNOT be used to detect, prevent or remove malware?
A. Use antivirus software
B. Installing CCTV camera
C. Avoid suspicious emails, links, and sites
D. Keep software up to date
QUESTION 9
What is the hexadecimal equivalent of the following octal number 175?
A. 7D
B. 125
C. 175
D. 713
QUESTION 10
Which one of the following is a storage medium?
A. Scanner
B. Random access memory
C. Optical mark recognition
D. Digitiser
QUESTION 11
A device is any connected device that provides a computer with additional functionality.
A. peripheral
B. input
C. storage
D. output
QUESTION 12
Identify among the following that which is NOT a utility software?
A. Antivirus
B. File management
C. Language translator
D. Disk compression
QUESTION 13
The capacity of read only memory (ROM) is more than that of random-access memory (RAM).
A. True
B. False
QUESTION 14 What is defined as the running of two or more programs or sequences of instructions simultaneously by a computer with more than one central processor?
A. Multiprocessing
B. Multiprogramming
C. Multitasking
D. Multiuser
QUESTION 15
Which of the following is NOT a coding scheme of representing data in a computer memory?
A. Binary coding decimal
B. American Standard Code for Information Interchange (ASCII)
C. Morse code
D. Extended Binary Coded Decimal Interchange Code(EBCDIC)
QUESTION 16
Which of the following is the operation carried out by a NOR gate?
A. Inversing
B. Reversing
C. Reverting
D. Converting
QUESTION 17
Identify the function of a control unit from among the following.
A. Transfers data from main memory to processor
B. Regulates and integrates the operations of the computer.
C. carries out arithmetic and logic operations on the operands in computer
D. accept, store, and transfer data and instructions that are being used immediately by the CPU
QUESTION 18
A is a networking device that allows communication between devices within a network, such as your local home network.
A. Gateway
B. switch
C. modem
D. router
QUESTION 19
Identify the BEST statement that gives the main purpose of file management system in an operating system.
A. To create a copy of data that can be recovered in the event of a primary data failure.
B. To enable users to create and store new files on a device.
C. To check and make corrections on the hard disk drive.
D. To move data blocks on the hard drive around to bring all the parts of a file together.
QUESTION 20
Which of the statements below BEST describes hardware?
A. Provides the low-level control for a device’s specific hardware
B. Collection of all the parts that are tangible.
C. Set of instructions for a computer to perform specific operations
D. Sends data to a computer, allowing you to interact with and control it.
QUESTION 21
Which one of the following is NOT a mobile operating system?
A. VMware
B. Android
C. Blackberry
D. Symbian
QUESTION 22
is the use of computers to create, process, store, retrieve, and exchange all kinds of electronic data and information.
A. Networking
B. Information technology
C. Databases
D. Processing
QUESTION 23
When creating a user account, the administrator should assign the following EXCEPT?
A. Access credentials
B. User role
C. User security profile
D. Workstation to use
QUESTION 24
Which of the following is NOT a characteristic of machine language?
A. Do not require translation
B. Uses binary codes
C. Slow to execute
D. Machine dependent
QUESTION 25
translates program codes into machine codes, instruction by instruction.
A. A compiler
B. An interpreter
C. An assembler
D. A loader
QUESTION 26
Dot matrix printers are generally more cost effective and cheaper compared to Laser printers.
A. True
B. False
QUESTION 27
Which of the following is NOT an important factor that need to be considered when selecting an application software for a business?
A. The developer
B. Cost of the software
C. Learning curve for the staff
D. Customer support services
QUESTION 28
Which of the following is Not an example of information?
A. Mark sheet of students
B. Number of items sold
C. Reports
D. Pay slip of employees
QUESTION 29
Which type of software is defined as the combination of text, audio, images, animation, or video to produce interactive content”?
A. Presentation
B. Multimedia
C. Graphics D. Spreadsheet
QUESTION 30
What is the name given to the table which shows possible combinations of inputs for an output?
A. Truth table
B. Flipflop Table
C. Gate table
D. System circuit table
QUESTION 31
The following are characteristics of programming languages
I. Require translation
II. Machine dependent
III. Easier to read, write and maintain
IV. Fast in execution
V. Portable
Select three characteristics of high-level languages?
A. I, II & III
B. 1, II & IV
C. I, III & IV
D. I, III & V
QUESTION 32
Which of the following is NOT a primary storage?
A. Read only memory
B. Random access memory
C. Caçhe memory
D. Flash disk
QUESTION 33
A is the interconnection of information technology devices within the range of an individual person, typically within a range of 10 meters.
A. local area network (LAN)
B. personal area network (PAN)
C. campus area network (CAN)
D. metropolitan area network (MAN)
QUESTION 34
Select a statement that BEST describes the function of a network operating system.
A. To transfer control automatically from one job to the next job without intervention of the computer operator.
B. To create and manage network user accounts.
C. To processes data and events that have critically defined time constraints D. To allow smartphones, tablets, PDAs and other handheld devices to run applications and programs.
QUESTION 35
Which of the following is a disadvantage of computers?
A. Enhance productivity
B. Reduce operation costs
C. Reduce storage space
D. Require skilled operators
QUESTION 36
The following are transmission media. Identify the odd one out.
A. Coaxial
B. Bluetooth
C. Twisted pair
D. Optical fibre
QUESTION 37
Which of the following is NOT a feature of an operating system?
A. Security Management
B. Process Management
C. Storage and Memory Management
D. Preparing standard documents
QUESTION 38
Which one of the following is NOT a type of malware?
A. Viruses
B. Ransomware
C. Spam
D. Spyware
QUESTION 39
Among the following, which one is NOT a networking device?
A. Hub
B. Modem
C. Glove
D. Bridge
QUESTION 40
An output device is a piece of computer hardware that receives data from a computer and then translates that data into another form. Output is either hard copy or soft copy. Which of the following output devices produces hard copy of output?
A. Speaker
B. Plotter
C. Monitor
D. Projector
QUESTION 41
A software program that allows a user to locate, access, and display web pages is known as?
A. web browser
B. world wide web
C. electronic mail
D. hypermedia
QUESTION 42
Computers can be classified based on type. Which of the following computers are in this class?
A. Microcomputers
B. General purpose
C. Hybrid
D. Dedicated
QUESTION 43
In computing, acronym URL stands for?
A. Uniform Resource List
B. Uniform Requirement Location
C. Uniform Resource Locator D. Uniform Registration Language
QUESTION 44
Secondary storage is more expensive in terms of cost per byte than primary storage.
A. True
B. False
QUESTION 45
Which one of the following is NOT a service offered by an internet service provider (ISP)?
A. Internet access
B. Web hosting
C. Email services
D. Computer repairs
QUESTION 46
Which one of the following is NOT a service provided by an operating system?
A. Program Execution
B. Manipulation of File System
C. Error Detection and Handling
D. Preparing financial statements
QUESTION 47
The following are some common web browsers for mobile devices, EXCEPT?
A. Safari
B. Chrome
C. Opera
D. DOS
QUESTION 48
Which of the following is a characteristic of a wide area network?
A. Serves a single organization
B. File transfer and recovery are more manageable
C. It has very few data transmission errors.
D. Data transmission speed is sometimes slow or even very fast
QUESTION 49
Which one of the following is NOT an operating system?
A. Windows
B. Sage
C. Linux
D. Dos
QUESTION 50
A secondary storage device is also known as an auxiliary storage device or external storage. Which of the is NOT a secondary storage device?
A. Digital versatile disk (DVD)
B. Read only memory
C. Zip drive
D. Blu-ray
QUESTION 51
Which of the following is NOT a type of cloud?
A. Public
B. Private
C. Hybrid
D. Intranet
QUESTION 52
Which of the following is NOT an application software?
A. Excel
B. AutoCAD
C. QuickBooks
D. Unix
QUESTION 53
is a technology of connecting computers together in a local area network or LAN.
A. Ethernet
B. Network
C. Ecommerce
D. World wide web.
QUESTION 54
A is a web-based platform that collects information from different sources into a single user interface and presents users with the most relevant information for their context.
A. portal
B. blog
C. usernet
D. vblog
QUESTION 55
Which of the following allows the expansion cards to fit parallel to the motherboard, usually to maintain a small form factor?
A. Daughterboard
B. Motherboard
C. System unit
D. Expansion slot
QUESTION 56
Which of the following type of interface is only suitable for professional users?
A. Graphical User Interface(GUI)
B. Menu Drive
C. Command Line Interface(CLI)
D. Form based
QUESTION 57
Which one of the following is NOT a computer port?
A. Serial
B. USB
C. HDMI
D. Monitor
QUESTION 58
What is describe as a private computer network that functions over a public network and usually utilizes data encryption to provide secure access to something?
A. Virtual private network (VPN)
B. Personal area network (PAN)
C. Local area network (LAN)
D. Wide area network (WAN)
QUESTION 59
is a protocol that transfer files from a local computer to a remote computer.
A. HTTP
B. FTP
C. UDP
D. TCP
QUESTION 60
One of the components below is NOT housed in the system unit. Which one?
A. DVD drive
B. Power supply unit,
C. Keyboard
D. CPU fan
QUESTION 61
Email is still among the most widely used communication tools in the workplace today. Which of the following is an advantage of email for internal communications?
A. Email is accessible from anywhere
B. Email lacks a personal touch.
C. Email should be kept short and brief.
D. Email requires timely responses
QUESTION 62
A computer is any loophole that can harm a user’s information on a computer.
A. threat
B. risk
C. vulnerability
D. bug
QUESTION 63
Which one of the following is NOT an important characteristic of information?
A. Complete
B. Flexible
C. Concise
D. Reliable
QUESTION 64
What is the binary equivalent of the following octal number 637?
A. 110011111
B. 11011111
C. 1111110
D. 111011110
QUESTION 65
What is the of the process of reducing the type of a file on disk using different algorithms and mathematical calculations?
A. Encryption
B. Disk clean up
C. Disk Partitioning
D. Compression
QUESTION 66
Which of the following is NOT an instant messaging application?
A. Facebook Messenger
B. Microsoft Teams
C. WhatsApp Messenger
D. Opera Mini
QUESTION 67
Identify the device which is used to connect and transfer data and information between computers, routers, switches and storage area networks.
A. Modem
B. Switch
C. Network cable
D. Repeater
QUESTION 68
What is the result in the truth table using the logical and operator with two inputs true AND false.
A. True
B. False
QUESTION 69
Which of the following is NOT a computer crime?
A. Child pornography
B. Cracking
C. Misusing computer time
D. Vishing
QUESTION 70
Identify among the following a component which is NOT part of the processor
A. Register
B. Control unit
C. Port
D. Bus
QUESTION 71
Which of the following statements BEST describes cyber security threat?
A. It refers to any possible malicious attack that seeks to unlawfully access data, disrupt digital operations or damage information.
B. It is any incident that results in unauthorized access to computer data, applications, networks or devices.
C. It involves the use of security policies and processes to reduce the overall risk.
D. It is a safeguard or countermeasure prescribed for an information system or an organization, which is designed to protect the confidentiality.
QUESTION 72
Which one of the following is NOT a type of computer keyboard?
A. Portable
B. Ergonomic
C. Wireless
D. Optical
QUESTION 73
What is defined as the method of collecting raw data and translating it into usable information?
A. Extraction
B. Data processing
C. Data input
D. Information
QUESTION 74
provides the necessary instructions for how a device communicates with the other computer hardware.
A. Firmware
B. Software
C. User
D. Input
QUESTION 75
A Spam is any unsolicited messages that is sent by email. These emails are usually sent in bulk batches and therefore may drain an organisation’s time since employees have to constantly sift through and delete them to get to actual important emails. The methods listed below can be used to stop spam emails, except?
A. Set Up Spam Filters
B. Unsubscribe to stop receiving marketing email C. Protecting emails using passwords
D. Don’t Respond to Spam Emails
QUESTION 76
What name is given to the process of starting a machine which was initially off?
A. Warm booting
B. Cold booting
C. Restarting
D. POST
QUESTION 77
Computers have changed the way we work. They play an important role in every field. Which of the following is NOT an important application of computers in education?
A. Computers are a brilliant aid in teaching.
B. Computers have changed how teaching is done.
C. Computer, hard drives and storage devices are an excellent way to store data
D. Quick communication between students, teachers and parents
QUESTION 78
What is the decimal equivalent of the following binary number 11001011?
A. 203
B. 313
C. 302
D. 3023
QUESTION 79
In the context of networking, a _______refers to any group of users, workstations, devices, printers, computers and database servers that share different types of data via network resources.
A. Proxy
B. Internet
C. Web
D. Domain
QUESTION 80
The following are basic actions done using a computer mouse, EXCEPT?
A. Right click
B. Scroll
C. Typing
D. Drag & drop
QUESTION 81
One of the major services offered through internet is communication. The following are communication services, Except?
A. Electronic Mail
B. Web hosting
C. Newsgroup
D. Instant Messaging
QUESTION 82
A security exploit is a code that takes advantage of a software vulnerability or security flaw.
A. True
B. False
QUESTION 83
Which task is activated when a user holds down CTRL key and then presses P on the keyboard? A. Paste
B. Print
C. Undo
D. Select all
QUESTION 84
is a message that is sent from one person to another over the Internet by the use of applications
A. Simple mail
B. Junk mail
C. Electronic mail
D. Instant messaging
QUESTION 85
Which one of the following is a type of a computer monitor?
A. Liquid crystal display (LCD)
B. Mechanical
C. Optical
D. Ergonomic
QUESTION 86
Identify the computer hardware that capture data that originates in audio form
A. Headset
B. Gloves
C. Microphone
D. Speaker
QUESTION 87
A is a set of rights and restrictions that can be associated with a user or group of users.
A. security profile
B. user credential
C. user account
D. security policy
QUESTION 88
Crackers are people who hack a system by breaking into it and violating it with some bad intentions. Which of the following is NOT a good reason for malicious activities?
A. Data theft
B. Data manipulation
C. To proof themselves
D. Spreading malware
QUESTION 89
A microcomputer functioning as a terminal, that can process data files stored on mass storage devices is known as _________terminal.
A. Dumb
B. Intelligent
C. Workstation
D. Server
QUESTION 90
Why are application software such as word processing and spreadsheets also known as productivity software?
A. They enable end users to complete their tasks faster
B. They are easy to use
C. They can be duplicated faster
D. They increase the production of manufactured goods.
QUESTION 91
Which part of the central processing unit is responsible for controlling the transfer of data and instructions among other units of a computer?
A. Arithmetic unit
B. Register
C. Control unit
D. Logic unit
QUESTION 92
Amongst the following computers, which one is used to carry out complex calculations in a very short time, has more than one processor and has very high processing speed?
A. Minicomputer
B. Micro computer
C. Mainframe
D. Super computer
QUESTION 93
Which of the following memory is best described as a chip-based computer component that makes retrieving data from the computer’s memory more efficient?
A. Cache memory
B. Read only memory
C. Flash memory
D. Hard disk
QUESTION 94
There are several types of security controls that can be implemented to protect hardware, software, networks, and data from actions and events that could cause loss or damage. Among the Physical security controls, EXCEPT?
A. Perimeter fencing
B. Guards
C. Firewall
D. Biometric access control
QUESTION 95
Computer security refers to protecting and securing computers and their related data, networks, software, hardware from unauthorized access, misuse, theft, information loss, and other security issues. Which of the following is NOT a goal of computer security?
A. Confidentiality
B. Integrity
C. Availability
D. Compatibility
QUESTION 96
The countermeasure of scrambling of data in transit or at rest is called?
A. Encryption
B. Cryptography
C. Decryption
D. Compression
QUESTION 97
Which one of the following is NOT a feature of the fourth-generation computers?
A. Hand-held computer devices became more popular and affordable
B. Storage of memory and other storage devices has increased in big amount.
C. Technology used was integrated circuit.
D. Processing power or speed has increased enormously.
QUESTION 98
Which networking device that enables a user to share Internet connection with dissimilar networks?
A. Hub
B. Router
C. Gateway
D. Modem
QUESTION 99
What is name given to a commercial type computer that stores information and provides access to that information across a network known as?
A. Client
B. Terminal
C. Workstation
D. Server
QUESTION 100
A group of adjacent binary digits that a computer processes as a unit to form a character is known as?
A. Byte
B. Field
C. Bit
D. File