MONDAY: 1 August 2022. Afternoon paper. Time Allowed: 2 hours.
Answer ALL questions. Each question is allocated two (2) marks.
1. A printer is an external hardware output device that takes the electronic data stored on a computer or other device and generates a hard copy. Which of the following is a feature of impact printer?
A. are more expensive than laser printers
B. use optical technology
C. include ink jet and thermal devices
D. strike a ribbon against the paper to produce character images
2. A computer understands which type of language?
A. C Language
B. Assembly Language
C. Binary Language
D. BASIC
3. Which of the following is the brain of a computer containing all the circuitry needed to process input, store data, and output results?
A. Central Processing Unit
B. Memory
C. Arithmetic and Logic unit
D. Control unit
4. Operations of a computer is controlled by which type of software?
A. Firmware
B. Application Software
C. System Software
D. Utility Software
5. Which of the following is an input device purposely used to convert maps, pictures, and drawings into digital form for storage in computers?
A. Image Scanner
B. Digitizer
C. MICR
D. Scanner
6. Miss Wayne wants to use personal computers to restore and retrieve their personal information. Which of the following package can be used?
A. Personal assistance package
B. Graphics package
C. Spreadsheet package
D. Animation package
7. A computer is an electronic device that processes data according to a set of instructions. Which of the following is NOT a type of computer on the basis of operation?
A. Digital
B. Analog
C. Hybrid
D. Remote
8. Which of the following invention gave birth to the much cheaper microcomputers?
A. PDAs
B. Microprocessors
C. Microcomputers
D. Mainframes
9. Which one of the following is a global computer network providing a variety of information and communication using standardized communication protocols?
A. Intranet
B. Internet
C. Arpanet
D. LAN
10. Internet was evolved from the basic ideas of Advanced Research Project Agency Network (ARPANET)
A) TRUE
B) FALSE
11. Which of the following is a service that allows a user to log in into another computer somewhere on the public network.
A. Telnet
B. FTP
C. E-mail
D. UseNet
12. Which of the following is NOT an objective of network security?
A. Identification
B. Authentication
C. Access control
D. Lock
13. Which of the following are used for solving complex application?
A. Super Computers
B. Public computers
C. Mobile computers
D. Hybrid computers
14. Which one of the following is responsible for creating a process from a series of coded software instructions to control the operation of a computer?
A. OS
B. Web
C. Internet
D. Firewall
15. The symbol + in Boolean is determined by which operator
A. AND
B. OR
C. ADD
D. SUMMATION
16. 2FA is considered a valid hexadecimal number.
A) TRUE
B) FALSE
17. Which of the following is NOT a positional number system?
A. Roman Number System
B. Octal Number System
C. Binary Number System
D. Hexadecimal Number System
18. What is the binary equivalent of the decimal number being 10?
A. 0010
B. 10
C. 1010
D. 010
19. Part of a computer that allows a user to put information into the computer is called ______________.
A. Output Device
B. Software
C. Operating System
D. Input Device
20. Which of the following allows a CPU to execute a particular set of machine instructions?
A. Instruction Set
B. Registers
C. Sequence Set
D. User instructions
21. Which of the following is NOT a visible register?
A. General Purpose Register
B. Address Register
C. Status Register
D. Memory Address Register
22. To communicate across a network system, entities within the system need to be able to identify one another.
Which of the following is a part of network identification?
A. UserID
B. Password
C. OTP
D. Fingerprint
23. An output device is any device that is used to transmit a computer’s data between devices or client. Which of the following is NOT a function of the Output Unit?
A. It produces results that can be easily understood by the user
B. It accepts the results produced by the computer
C. It supplies the data and instructions to the outside world
D. It supplies the data and instructions to the computer for further processing
24. Which one among the following is NOT an example of system software?
A. Language Translator
B. Utility Software
C. Communication Software
D. Word Processors
25. File organisation enhances identification and access to any specific record. Which of the following is NOT an appropriate criterion for file organisation?
A. Larger access time
B. Ease of update
C. Simple maintenance
D. Economy of storage
26. ____________is a unique type of file that contains only the information needed to access files.
A. Logical file
B. Record
C. Database
D. Directory
27. Which of the following is NOT a part of the file directory?
A. Attributes
B. Protocol
C. Location
D. Ownership
28. _____________ is any kind of unwanted, unsolicited digital communication that gets sent out in bulk
A. Spam
B. Spoof
C. Sniffer script
D. Spool
29. _____________are attempts by individuals to obtain confidential information from you by falsifying their identity
A. Phishing trips
B. Computer viruses
C. Phishing scams
D. Spyware scams
30. Which one of the following is a characteristics of read-only memory (ROM)?
A. ROM information can be easily updated
B. Data in ROM is nonvolatile, that is, it remains there even without electrical power
C. ROM provides very large amounts of inexpensive data storage
D. ROM chips are easily swapped between different brands of computers
31. One Gigabyte is equivalent to how many bytes?
A. 1000 bytes
B. 10002 bytes
C. 10003 bytes
D. 10004 bytes
32. Which of the following is a function of Basic Input Output System(BIOS)?
A. Initialise the system hardware components
B. Update the system
C. Ensure system performance
D. Save the system from crashing
33. An electronic tool that allows information to be input, processed, and output is called _______________.
A. Operating system
B. Motherboard
C. Computer
D. CPU
34. ___________is the act of looking through a set of information quickly, without a specific sense of purpose.
A. Browsing
B. Attaching
C. Downloading
D. Uploading
35. Which one of the following is a hardware device and NOT part of a computer system?
A. clip art
B. highlight
C. execute
D. peripherals
36. Which one of the following is NOT an Operating System?
A. SQL
B. Linux
C. Unix
D. Mac OS
37. Which of the following is a small, portable flash memory card that plugs into a computer’s USB port and functions as a portable hard drive.
A. DVD-ROM
B. FLASH DRIVE
C. CD-ROM
D. CD-RW
38. _____________is a unit that decodes and translates each instruction and generates the necessary signals for ALU and other units.
A. ALU
B. Control Unit
C. CPU
D. Logical Unit
39. Which of the following reads data by reflecting pulses of laser beams on the surface?
A. Magnetic disk
B. Optical disk
C. Floppy disk
D. ROM
40. Input/output describes any operation, program, or device that transfers data to or from a computer. User programs interact with I/O devices through?
A. Operating System
B. Hardware
C. Buses
D. Processor
41. Which system was used extensively by early mini computers?
A. Binary number
B. Decimal number
C. Hexadecimal number
D. Octal number
42. Binary number is defined as a number that is expressed in the binary system or base 2 numeral system. Three bit binary numbers can be represented by?
A. Binary number
B. Decimal number
C. Hexadecimal number
D. Octal number
43. Which type of memory is assembled between main memory and CPU ?
A. Primary Memory
B. Secondary Memory
C. Registers
D. Cache Memory
44. A network consists of two or more computers that are linked in order to share resources. A network of computers and other devices that is confined to a relatively small space is known as?
A. Wide Area Network
B. Local Area Network
C. Global Network
D. Peer-to-Peer Network
45. A memory that can be refreshed many times is known as?
A. Static RAM
B. Dynamic RAM
C. EPROM
D. ROM
46. Which of the following is a technology that allows telephone calls to be made over computer networks like the Internet.
A. VoIP
B. GSM
C. Modem
D. CDMA
47. The fourth-generation computers are based on which of the following?
A. Transistor
B. Integrated circuit
C. VLSI microprocessor
D. ULSI microprocessor
48. Which of the following is the BEST way to protect hard drive data?
A. Scanning
B. Backup
C. Defragmentation
D. Delete junk
49. Which device is used to connect two systems using different protocols?
A. Modem
B. Repeater
C. Gateway
D. Bridge
50. Which of the following is a network device that performs the functions of a switch as well as that of a router at incredibly fast speeds.
A. Layer 2 Switch
B. Hub
C. Layer 3 Switch
D. Modem