APRIL 2022 TIME: 3HOURS
INSTRUCTIONS: ANSWER ALL QUESTIONS.
A computer is known to be versatile meaning it is capable of performing almost any task. Among the following, identify a task which currently CANNOT be done by a computer.
A. Designing aircraft wings
B. Coming up with creative thoughts
C. Storing data for long periods
D. Carrying complex computations.
Which type of operating system is best described as the one which allows multiple users to access a single system with one operating system?
a computer refers to the process of powering on the computer and starting the operating system.
Which one of the following is NOT a computer application area in entertainment?
A. Computer aided learning
B. Playing video games
C. Keeping track of one’s location during camping or hiking trips.
D. GPS tracking devices are frequently used for nature walks
What is the octal equivalent of the following decimal number 462?
Which one of the following is NOT an input device?
C. Digital camera
The following are commonly used high level languages, EXCEPT?
Which one of the following methods CANNOT be used to detect, prevent or remove malware?
A. Use antivirus software
B. Installing CCTV camera
C. Avoid suspicious emails, links, and sites
D. Keep software up to date
What is the hexadecimal equivalent of the following octal number 175?
Which one of the following is a storage medium?
B. Random access memory
C. Optical mark recognition
A device is any connected device that provides a computer with additional functionality.
Identify among the following that which is NOT a utility software?
B. File management
C. Language translator
D. Disk compression
The capacity of read only memory (ROM) is more than that of random-access memory (RAM).
What is defined as the running of two or more programs or sequences of instructions simultaneously by a computer with more than one central processor?
A. Multiprocessing B. Multiprogramming
Which of the following is NOT a coding scheme of representing data in a computer memory?
A. Binary coding decimal
B. American Standard Code for Information Interchange (ASCII)
C. Morse code
D. Extended Binary Coded Decimal Interchange Code(EBCDIC)
Which of the following is the operation carried out by a NOR gate?
Identify the function of a control unit from among the following.
A. Transfers data from main memory to processor
B. Regulates and integrates the operations of the computer.
C. carries out arithmetic and logic operations on the operands in computer
D. accept, store, and transfer data and instructions that are being used immediately by the CPU
A is a networking device that allows communication between devices within a network, such as your local home network.
Identify the BEST statement that gives the main purpose of file management system in an operating system.
A. To create a copy of data that can be recovered in the event of a primary data failure.
B. To enable users to create and store new files on a device.
C. To check and make corrections on the hard disk drive.
D. To move data blocks on the hard drive around to bring all the parts of a file together.
Which of the statements below BEST describes hardware?
A. Provides the low-level control for a device’s specific hardware
B. Collection of all the parts that are tangible.
C. Set of instructions for a computer to perform specific operations
D. Sends data to a computer, allowing you to interact with and control it.
Which one of the following is NOT a mobile operating system?
is the use of computers to create, process, store, retrieve, and exchange all kinds of electronic data and
A. Networking B. Information technology
When creating a user account, the administrator should assign the following EXCEPT?
A. Access credentials
B. User role
C. User security profile
D. Workstation to use
Which of the following is NOT a characteristic of machine language?
A. Do not require translation
B. Uses binary codes
C. Slow to execute
D. Machine dependent
translates program codes into machine codes, instruction by instruction.
A. A compiler
B. An interpreter
C. An assembler
D. A loader
Dot matrix printers are generally more cost effective and cheaper compared to Laser printers.
Which of the following is NOT an important factor that need to be considered when selecting an application software for a business?
A. The developer
B. Cost of the software
C. Learning curve for the staff
D. Customer support services
Which of the following is Not an example of information?
A. Mark sheet of students
B. Number of items sold
D. Pay slip of employees
Which type of software is defined as the combination of text, audio, images, animation, or video to produce interactive content”?
What is the name given to the table which shows possible combinations of inputs for an output?
A. Truth table
B. Flipflop Table
C. Gate table D. System circuit table
The following are characteristics of programming languages
I. Require translation
II. Machine dependent
III. Easier to read, write and maintain
IV. Fast in execution
Select three characteristics of high-level languages?
A. I, II & III
B. 1, II & IV
C. I, III & IV
D. I, III & V
Which of the following is NOT a primary storage?
A. Read only memory
B. Random access memory
C. Caçhe memory
D. Flash disk
A is the interconnection of information technology devices within the range of an individual person, typically within a range of 10 meters.
A. local area network (LAN)
B. personal area network (PAN)
C. campus area network (CAN)
D. metropolitan area network (MAN)
Select a statement that BEST describes the function of a network operating system.
A. To transfer control automatically from one job to the next job without intervention of the computer operator.
B. To create and manage network user accounts.
C. To processes data and events that have critically defined time constraints
D. To allow smartphones, tablets, PDAs and other handheld devices to run applications and programs.
Which of the following is a disadvantage of computers?
A. Enhance productivity
B. Reduce operation costs
C. Reduce storage space
D. Require skilled operators
The following are transmission media. Identify the odd one out.
C. Twisted pair
D. Optical fibre
QUESTION 37 Which of the following is NOT a feature of an operating system?
A. Security Management
B. Process Management
C. Storage and Memory Management
D. Preparing standard documents
Which one of the following is NOT a type of malware?
Among the following, which one is NOT a networking device?
An output device is a piece of computer hardware that receives data from a computer and then translates that data into another form. Output is either hard copy or soft copy. Which of the following output devices produces hard copy of output?
A software program that allows a user to locate, access, and display web pages is known as?
A. web browser
B. world wide web
C. electronic mail
Computers can be classified based on type. Which of the following computers are in this class?
B. General purpose
In computing, acronym URL stands for?
A. Uniform Resource List
B. Uniform Requirement Location
C. Uniform Resource Locator
D. Uniform Registration Language
Secondary storage is more expensive in terms of cost per byte than primary storage.
Which one of the following is NOT a service offered by an internet service provider (ISP)?
A. Internet access
B. Web hosting C. Email services
D. Computer repairs
Which one of the following is NOT a service provided by an operating system?
A. Program Execution
B. Manipulation of File System
C. Error Detection and Handling
D. Preparing financial statements
The following are some common web browsers for mobile devices, EXCEPT?
Which of the following is a characteristic of a wide area network?
A. Serves a single organization
B. File transfer and recovery are more manageable
C. It has very few data transmission errors.
D. Data transmission speed is sometimes slow or even very fast
Which one of the following is NOT an operating system?
A secondary storage device is also known as an auxiliary storage device or external storage. Which of the is NOT a secondary storage device?
A. Digital versatile disk (DVD)
B. Read only memory
C. Zip drive
Which of the following is NOT a type of cloud?
Which of the following is NOT an application software?
is a technology of connecting computers together in a local area network or LAN.
C. Ecommerce D. World wide web.
A is a web-based platform that collects information from different sources into a single user interface and presents users with the most relevant information for their context.
Which of the following allows the expansion cards to fit parallel to the motherboard, usually to maintain a small form factor?
C. System unit
D. Expansion slot
Which of the following type of interface is only suitable for professional users?
A. Graphical User Interface(GUI)
B. Menu Drive
C. Command Line Interface(CLI)
D. Form based
Which one of the following is NOT a computer port?
What is describe as a private computer network that functions over a public network and usually utilizes data encryption to provide secure access to something?
A. Virtual private network (VPN)
B. Personal area network (PAN)
C. Local area network (LAN)
D. Wide area network (WAN)
is a protocol that transfer files from a local computer to a remote computer.
One of the components below is NOT housed in the system unit. Which one?
A. DVD drive
B. Power supply unit,
D. CPU fan
Email is still among the most widely used communication tools in the workplace today. Which of the following is an advantage of email for internal communications?
A. Email is accessible from anywhere
B. Email lacks a personal touch.
C. Email should be kept short and brief.
D. Email requires timely responses
A computer is any loophole that can harm a user’s information on a computer.
Which one of the following is NOT an important characteristic of information?
What is the binary equivalent of the following octal number 637?
What is the of the process of reducing the type of a file on disk using different algorithms and mathematical calculations?
B. Disk clean up
C. Disk Partitioning
Which of the following is NOT an instant messaging application?
A. Facebook Messenger
B. Microsoft Teams
C. WhatsApp Messenger
D. Opera Mini
Identify the device which is used to connect and transfer data and information between computers, routers, switches and storage area networks.
C. Network cable
What is the result in the truth table using the logical and operator with two inputs true AND false.
Which of the following is NOT a computer crime?
A. Child pornography
C. Misusing computer time
Identify among the following a component which is NOT part of the processor
B. Control unit C. Port
Which of the following statements BEST describes cyber security threat?
A. It refers to any possible malicious attack that seeks to unlawfully access data, disrupt digital operations or damage information.
B. It is any incident that results in unauthorized access to computer data, applications, networks or devices.
C. It involves the use of security policies and processes to reduce the overall risk.
D. It is a safeguard or countermeasure prescribed for an information system or an organization, which is designed to protect the confidentiality.
Which one of the following is NOT a type of computer keyboard?
What is defined as the method of collecting raw data and translating it into usable information?
B. Data processing
C. Data input
provides the necessary instructions for how a device communicates with the other computer hardware.
A Spam is any unsolicited messages that is sent by email. These emails are usually sent in bulk batches and therefore may drain an organisation’s time since employees have to constantly sift through and delete them to get to actual important emails. The methods listed below can be used to stop spam emails, except?
A. Set Up Spam Filters
B. Unsubscribe to stop receiving marketing emails
C. Protecting emails using passwords
D. Don’t Respond to Spam Emails
What name is given to the process of starting a machine which was initially off?
A. Warm booting
B. Cold booting
Computers have changed the way we work. They play an important role in every field. Which of the following is NOT an important application of computers in education?
A. Computers are a brilliant aid in teaching.
B. Computers have changed how teaching is done.
C. Computer, hard drives and storage devices are an excellent way to store data
D. Quick communication between students, teachers and parents
What is the decimal equivalent of the following binary number 11001011? A. 203
In the context of networking, a _______refers to any group of users, workstations, devices, printers, computers and database servers that share different types of data via network resources.
The following are basic actions done using a computer mouse, EXCEPT?
A. Right click
D. Drag & drop
One of the major services offered through internet is communication. The following are communication services, Except?
A. Electronic Mail
B. Web hosting
D. Instant Messaging
A security exploit is a code that takes advantage of a software vulnerability or security flaw.
Which task is activated when a user holds down CTRL key and then presses P on the keyboard?
D. Select all
is a message that is sent from one person to another over the Internet by the use of applications
A. Simple mail
B. Junk mail
C. Electronic mail
D. Instant messaging
Which one of the following is a type of a computer monitor?
A. Liquid crystal display (LCD)
Identify the computer hardware that capture data that originates in audio form
B. Gloves C. Microphone
A is a set of rights and restrictions that can be associated with a user or group of users.
A. security profile
B. user credential
C. user account
D. security policy
Crackers are people who hack a system by breaking into it and violating it with some bad intentions. Which of the following is NOT a good reason for malicious activities?
A. Data theft
B. Data manipulation
C. To proof themselves
D. Spreading malware
A microcomputer functioning as a terminal, that can process data files stored on mass storage devices is known as _________terminal.
Why are application software such as word processing and spreadsheets also known as productivity software?
A. They enable end users to complete their tasks faster
B. They are easy to use
C. They can be duplicated faster
D. They increase the production of manufactured goods.
Which part of the central processing unit is responsible for controlling the transfer of data and instructions among other units of a computer?
A. Arithmetic unit
C. Control unit
D. Logic unit
Amongst the following computers, which one is used to carry out complex calculations in a very short time, has more than one processor and has very high processing speed?
B. Micro computer
D. Super computer
Which of the following memory is best described as a chip-based computer component that makes retrieving data from the computer’s memory more efficient?
A. Cache memory
B. Read only memory
C. Flash memory
D. Hard disk
There are several types of security controls that can be implemented to protect hardware, software, networks, and data from actions and events that could cause loss or damage. Among the Physical security controls, EXCEPT?
A. Perimeter fencing
D. Biometric access control
Computer security refers to protecting and securing computers and their related data, networks, software, hardware from unauthorized access, misuse, theft, information loss, and other security issues. Which of the following is NOT a goal of computer security?
The countermeasure of scrambling of data in transit or at rest is called?
Which one of the following is NOT a feature of the fourth-generation computers?
A. Hand-held computer devices became more popular and affordable
B. Storage of memory and other storage devices has increased in big amount.
C. Technology used was integrated circuit.
D. Processing power or speed has increased enormously.
Which networking device that enables a user to share Internet connection with dissimilar networks?
What is name given to a commercial type computer that stores information and provides access to that information
across a network known as?
A group of adjacent binary digits that a computer processes as a unit to form a character is known as?