INTRODUCTION TO COMPUTING SYSTEMS APRIL 2022 PAST PAPER

APRIL 2022 TIME: 3HOURS

INSTRUCTIONS: ANSWER ALL QUESTIONS.

QUESTION 1
A computer is known to be versatile meaning it is capable of performing almost any task. Among the following, identify a task which currently CANNOT be done by a computer.
A. Designing aircraft wings
B. Coming up with creative thoughts
C. Storing data for long periods
D. Carrying complex computations.

QUESTION 2
Which type of operating system is best described as the one which allows multiple users to access a single system with one operating system?
A. Multiuser
B. Multitasking
C. Multiprogramming
D. Multiprocessing

QUESTION 3
a computer refers to the process of powering on the computer and starting the operating system.
A. Scanning
B. Booting
C. Upgrading
D. Resetting

QUESTION 4
Which one of the following is NOT a computer application area in entertainment?
A. Computer aided learning
B. Playing video games
C. Keeping track of one’s location during camping or hiking trips.
D. GPS tracking devices are frequently used for nature walks

QUESTION 5
What is the octal equivalent of the following decimal number 462?
A. 617
B. 1CE
C. 716
D. 462

QUESTION 6
Which one of the following is NOT an input device?
A. Mouse
B. Sensor
C. Digital camera
D. Speaker

QUESTION 7
The following are commonly used high level languages, EXCEPT?
A. Python
B. Assembly
C. Java
D. C++

QUESTION 8
Which one of the following methods CANNOT be used to detect, prevent or remove malware?
A. Use antivirus software
B. Installing CCTV camera
C. Avoid suspicious emails, links, and sites
D. Keep software up to date

QUESTION 9
What is the hexadecimal equivalent of the following octal number 175?
A. 7D
B. 125
C. 175
D. 713

QUESTION 10
Which one of the following is a storage medium?
A. Scanner
B. Random access memory
C. Optical mark recognition
D. Digitiser

QUESTION 11
A device is any connected device that provides a computer with additional functionality.
A. peripheral
B. input
C. storage
D. output

QUESTION 12
Identify among the following that which is NOT a utility software?
A. Antivirus
B. File management
C. Language translator
D. Disk compression

QUESTION 13
The capacity of read only memory (ROM) is more than that of random-access memory (RAM).
A. True
B. False

QUESTION 14
What is defined as the running of two or more programs or sequences of instructions simultaneously by a computer with more than one central processor?
A. Multiprocessing                                                                                                                                                                                                              B. Multiprogramming
C. Multitasking
D. Multiuser

QUESTION 15
Which of the following is NOT a coding scheme of representing data in a computer memory?
A. Binary coding decimal
B. American Standard Code for Information Interchange (ASCII)
C. Morse code
D. Extended Binary Coded Decimal Interchange Code(EBCDIC)

QUESTION 16
Which of the following is the operation carried out by a NOR gate?
A. Inversing
B. Reversing
C. Reverting
D. Converting

QUESTION 17
Identify the function of a control unit from among the following.
A. Transfers data from main memory to processor
B. Regulates and integrates the operations of the computer.
C. carries out arithmetic and logic operations on the operands in computer
D. accept, store, and transfer data and instructions that are being used immediately by the CPU

QUESTION 18
A is a networking device that allows communication between devices within a network, such as your local home network.
A. Gateway
B. switch
C. modem
D. router

QUESTION 19
Identify the BEST statement that gives the main purpose of file management system in an operating system.
A. To create a copy of data that can be recovered in the event of a primary data failure.
B. To enable users to create and store new files on a device.
C. To check and make corrections on the hard disk drive.
D. To move data blocks on the hard drive around to bring all the parts of a file together.

QUESTION 20
Which of the statements below BEST describes hardware?
A. Provides the low-level control for a device’s specific hardware
B. Collection of all the parts that are tangible.
C. Set of instructions for a computer to perform specific operations
D. Sends data to a computer, allowing you to interact with and control it.

QUESTION 21
Which one of the following is NOT a mobile operating system?
A. VMware
B. Android
C. Blackberry
D. Symbian

QUESTION 22
is the use of computers to create, process, store, retrieve, and exchange all kinds of electronic data and
information.
A. Networking                                                                                                                                                                                                                        B. Information technology
C. Databases
D. Processing

QUESTION 23
When creating a user account, the administrator should assign the following EXCEPT?
A. Access credentials
B. User role
C. User security profile
D. Workstation to use

QUESTION 24
Which of the following is NOT a characteristic of machine language?
A. Do not require translation
B. Uses binary codes
C. Slow to execute
D. Machine dependent

QUESTION 25
translates program codes into machine codes, instruction by instruction.
A. A compiler
B. An interpreter
C. An assembler
D. A loader

QUESTION 26
Dot matrix printers are generally more cost effective and cheaper compared to Laser printers.
A. True
B. False

QUESTION 27
Which of the following is NOT an important factor that need to be considered when selecting an application software for a business?
A. The developer
B. Cost of the software
C. Learning curve for the staff
D. Customer support services

QUESTION 28
Which of the following is Not an example of information?
A. Mark sheet of students
B. Number of items sold
C. Reports
D. Pay slip of employees

QUESTION 29
Which type of software is defined as the combination of text, audio, images, animation, or video to produce interactive content”?
A. Presentation
B. Multimedia
C. Graphics
D. Spreadsheet

QUESTION 30
What is the name given to the table which shows possible combinations of inputs for an output?
A. Truth table
B. Flipflop Table
C. Gate table                                                                                                                                                                                                                           D. System circuit table

QUESTION 31
The following are characteristics of programming languages
I. Require translation
II. Machine dependent
III. Easier to read, write and maintain
IV. Fast in execution
V. Portable
Select three characteristics of high-level languages?
A. I, II & III
B. 1, II & IV
C. I, III & IV
D. I, III & V

QUESTION 32
Which of the following is NOT a primary storage?
A. Read only memory
B. Random access memory
C. Caçhe memory
D. Flash disk

QUESTION 33
A is the interconnection of information technology devices within the range of an individual person, typically within a range of 10 meters.
A. local area network (LAN)
B. personal area network (PAN)
C. campus area network (CAN)
D. metropolitan area network (MAN)

QUESTION 34
Select a statement that BEST describes the function of a network operating system.
A. To transfer control automatically from one job to the next job without intervention of the computer operator.
B. To create and manage network user accounts.
C. To processes data and events that have critically defined time constraints
D. To allow smartphones, tablets, PDAs and other handheld devices to run applications and programs.

QUESTION 35
Which of the following is a disadvantage of computers?
A. Enhance productivity
B. Reduce operation costs
C. Reduce storage space
D. Require skilled operators

QUESTION 36
The following are transmission media. Identify the odd one out.
A. Coaxial
B. Bluetooth
C. Twisted pair
D. Optical fibre

QUESTION 37                                                                                                                                                                                                                     Which of the following is NOT a feature of an operating system?
A. Security Management
B. Process Management
C. Storage and Memory Management
D. Preparing standard documents

QUESTION 38
Which one of the following is NOT a type of malware?
A. Viruses
B. Ransomware
C. Spam
D. Spyware

QUESTION 39
Among the following, which one is NOT a networking device?
A. Hub
B. Modem
C. Glove
D. Bridge

QUESTION 40
An output device is a piece of computer hardware that receives data from a computer and then translates that data into another form. Output is either hard copy or soft copy. Which of the following output devices produces hard copy of output?
A. Speaker
B. Plotter
C. Monitor
D. Projector

QUESTION 41
A software program that allows a user to locate, access, and display web pages is known as?
A. web browser
B. world wide web
C. electronic mail
D. hypermedia

QUESTION 42
Computers can be classified based on type. Which of the following computers are in this class?
A. Microcomputers
B. General purpose
C. Hybrid
D. Dedicated

QUESTION 43
In computing, acronym URL stands for?
A. Uniform Resource List
B. Uniform Requirement Location
C. Uniform Resource Locator
D. Uniform Registration Language

QUESTION 44
Secondary storage is more expensive in terms of cost per byte than primary storage.
A. True
B. False

QUESTION 45
Which one of the following is NOT a service offered by an internet service provider (ISP)?
A. Internet access
B. Web hosting                                                                                                                                                                                                                       C. Email services
D. Computer repairs

QUESTION 46
Which one of the following is NOT a service provided by an operating system?
A. Program Execution
B. Manipulation of File System
C. Error Detection and Handling
D. Preparing financial statements

QUESTION 47
The following are some common web browsers for mobile devices, EXCEPT?
A. Safari
B. Chrome
C. Opera
D. DOS

QUESTION 48
Which of the following is a characteristic of a wide area network?
A. Serves a single organization
B. File transfer and recovery are more manageable
C. It has very few data transmission errors.
D. Data transmission speed is sometimes slow or even very fast

QUESTION 49
Which one of the following is NOT an operating system?
A. Windows
B. Sage
C. Linux
D. Dos

QUESTION 50
A secondary storage device is also known as an auxiliary storage device or external storage. Which of the is NOT a secondary storage device?
A. Digital versatile disk (DVD)
B. Read only memory
C. Zip drive
D. Blu-ray

QUESTION 51
Which of the following is NOT a type of cloud?
A. Public
B. Private
C. Hybrid
D. Intranet

QUESTION 52
Which of the following is NOT an application software?
A. Excel
B. AutoCAD
C. QuickBooks
D. Unix

QUESTION 53
is a technology of connecting computers together in a local area network or LAN.
A. Ethernet
B. Network
C. Ecommerce                                                                                                                                                                                                                        D. World wide web.

QUESTION 54
A is a web-based platform that collects information from different sources into a single user interface and presents users with the most relevant information for their context.
A. portal
B. blog
C. usernet
D. vblog

QUESTION 55
Which of the following allows the expansion cards to fit parallel to the motherboard, usually to maintain a small form factor?
A. Daughterboard
B. Motherboard
C. System unit
D. Expansion slot

QUESTION 56
Which of the following type of interface is only suitable for professional users?
A. Graphical User Interface(GUI)
B. Menu Drive
C. Command Line Interface(CLI)
D. Form based

QUESTION 57
Which one of the following is NOT a computer port?
A. Serial
B. USB
C. HDMI
D. Monitor

QUESTION 58
What is describe as a private computer network that functions over a public network and usually utilizes data encryption to provide secure access to something?
A. Virtual private network (VPN)
B. Personal area network (PAN)
C. Local area network (LAN)
D. Wide area network (WAN)

QUESTION 59
is a protocol that transfer files from a local computer to a remote computer.
A. HTTP
B. FTP
C. UDP
D. TCP

QUESTION 60
One of the components below is NOT housed in the system unit. Which one?
A. DVD drive
B. Power supply unit,
C. Keyboard
D. CPU fan

QUESTION 61
Email is still among the most widely used communication tools in the workplace today. Which of the following is an advantage of email for internal communications?
A. Email is accessible from anywhere
B. Email lacks a personal touch.
C. Email should be kept short and brief.
D. Email requires timely responses

QUESTION 62
A computer is any loophole that can harm a user’s information on a computer.
A. threat
B. risk
C. vulnerability
D. bug

QUESTION 63
Which one of the following is NOT an important characteristic of information?
A. Complete
B. Flexible
C. Concise
D. Reliable

QUESTION 64
What is the binary equivalent of the following octal number 637?
A. 110011111
B. 11011111
C. 1111110
D. 111011110

QUESTION 65
What is the of the process of reducing the type of a file on disk using different algorithms and mathematical calculations?
A. Encryption
B. Disk clean up
C. Disk Partitioning
D. Compression

QUESTION 66
Which of the following is NOT an instant messaging application?
A. Facebook Messenger
B. Microsoft Teams
C. WhatsApp Messenger
D. Opera Mini

QUESTION 67
Identify the device which is used to connect and transfer data and information between computers, routers, switches and storage area networks.
A. Modem
B. Switch
C. Network cable
D. Repeater

QUESTION 68
What is the result in the truth table using the logical and operator with two inputs true AND false.
A. True
B. False

QUESTION 69
Which of the following is NOT a computer crime?
A. Child pornography
B. Cracking
C. Misusing computer time
D. Vishing

QUESTION 70
Identify among the following a component which is NOT part of the processor
A. Register
B. Control unit                                                                                                                                                                                                                       C. Port
D. Bus

QUESTION 71
Which of the following statements BEST describes cyber security threat?
A. It refers to any possible malicious attack that seeks to unlawfully access data, disrupt digital operations or damage information.
B. It is any incident that results in unauthorized access to computer data, applications, networks or devices.
C. It involves the use of security policies and processes to reduce the overall risk.
D. It is a safeguard or countermeasure prescribed for an information system or an organization, which is designed to protect the confidentiality.

QUESTION 72
Which one of the following is NOT a type of computer keyboard?
A. Portable
B. Ergonomic
C. Wireless
D. Optical

QUESTION 73
What is defined as the method of collecting raw data and translating it into usable information?
A. Extraction
B. Data processing
C. Data input
D. Information

QUESTION 74
provides the necessary instructions for how a device communicates with the other computer hardware.
A. Firmware
B. Software
C. User
D. Input

QUESTION 75
A Spam is any unsolicited messages that is sent by email. These emails are usually sent in bulk batches and therefore may drain an organisation’s time since employees have to constantly sift through and delete them to get to actual important emails. The methods listed below can be used to stop spam emails, except?
A. Set Up Spam Filters
B. Unsubscribe to stop receiving marketing emails
C. Protecting emails using passwords
D. Don’t Respond to Spam Emails

QUESTION 76
What name is given to the process of starting a machine which was initially off?
A. Warm booting
B. Cold booting
C. Restarting
D. POST

QUESTION 77
Computers have changed the way we work. They play an important role in every field. Which of the following is NOT an important application of computers in education?
A. Computers are a brilliant aid in teaching.
B. Computers have changed how teaching is done.
C. Computer, hard drives and storage devices are an excellent way to store data
D. Quick communication between students, teachers and parents

QUESTION 78
What is the decimal equivalent of the following binary number 11001011?                                                                                                             A. 203
B. 313
C. 302
D. 3023

QUESTION 79
In the context of networking, a _______refers to any group of users, workstations, devices, printers, computers and database servers that share different types of data via network resources.
A. Proxy
B. Internet
C. Web
D. Domain

QUESTION 80
The following are basic actions done using a computer mouse, EXCEPT?
A. Right click
B. Scroll
C. Typing
D. Drag & drop

QUESTION 81
One of the major services offered through internet is communication. The following are communication services, Except?
A. Electronic Mail
B. Web hosting
C. Newsgroup
D. Instant Messaging

QUESTION 82
A security exploit is a code that takes advantage of a software vulnerability or security flaw.
A. True
B. False

QUESTION 83
Which task is activated when a user holds down CTRL key and then presses P on the keyboard?
A. Paste
B. Print
C. Undo
D. Select all

QUESTION 84
is a message that is sent from one person to another over the Internet by the use of applications
A. Simple mail
B. Junk mail
C. Electronic mail
D. Instant messaging

QUESTION 85
Which one of the following is a type of a computer monitor?
A. Liquid crystal display (LCD)
B. Mechanical
C. Optical
D. Ergonomic

QUESTION 86
Identify the computer hardware that capture data that originates in audio form
A. Headset
B. Gloves                                                                                                                                                                                                                                    C. Microphone
D. Speaker

QUESTION 87
A is a set of rights and restrictions that can be associated with a user or group of users.
A. security profile
B. user credential
C. user account
D. security policy

QUESTION 88
Crackers are people who hack a system by breaking into it and violating it with some bad intentions. Which of the following is NOT a good reason for malicious activities?
A. Data theft
B. Data manipulation
C. To proof themselves
D. Spreading malware

QUESTION 89
A microcomputer functioning as a terminal, that can process data files stored on mass storage devices is known as _________terminal.
A. Dumb
B. Intelligent
C. Workstation
D. Server

QUESTION 90
Why are application software such as word processing and spreadsheets also known as productivity software?
A. They enable end users to complete their tasks faster
B. They are easy to use
C. They can be duplicated faster
D. They increase the production of manufactured goods.

QUESTION 91
Which part of the central processing unit is responsible for controlling the transfer of data and instructions among other units of a computer?
A. Arithmetic unit
B. Register
C. Control unit
D. Logic unit

QUESTION 92
Amongst the following computers, which one is used to carry out complex calculations in a very short time, has more than one processor and has very high processing speed?
A. Minicomputer
B. Micro computer
C. Mainframe
D. Super computer

QUESTION 93
Which of the following memory is best described as a chip-based computer component that makes retrieving data from the computer’s memory more efficient?
A. Cache memory
B. Read only memory
C. Flash memory
D. Hard disk

QUESTION 94
There are several types of security controls that can be implemented to protect hardware, software, networks, and data from actions and events that could cause loss or damage. Among the Physical security controls, EXCEPT?
A. Perimeter fencing
B. Guards
C. Firewall
D. Biometric access control

QUESTION 95
Computer security refers to protecting and securing computers and their related data, networks, software, hardware from unauthorized access, misuse, theft, information loss, and other security issues. Which of the following is NOT a goal of computer security?
A. Confidentiality
B. Integrity
C. Availability
D. Compatibility

QUESTION 96
The countermeasure of scrambling of data in transit or at rest is called?
A. Encryption
B. Cryptography
C. Decryption
D. Compression

QUESTION 97
Which one of the following is NOT a feature of the fourth-generation computers?
A. Hand-held computer devices became more popular and affordable
B. Storage of memory and other storage devices has increased in big amount.
C. Technology used was integrated circuit.
D. Processing power or speed has increased enormously.

QUESTION 98
Which networking device that enables a user to share Internet connection with dissimilar networks?
A. Hub
B. Router
C. Gateway
D. Modem

QUESTION 99
What is name given to a commercial type computer that stores information and provides access to that information
across a network known as?
A. Client
B. Terminal
C. Workstation
D. Server

QUESTION 100
A group of adjacent binary digits that a computer processes as a unit to form a character is known as?
A. Byte
B. Field
C. Bit
D. File

(Visited 136 times, 1 visits today)
Share this:

Written by