Sei sulla pagina 1di 20

Part 1

1. _______ allow(s) users to interactively send instructions (such as printing


and closing a window) to a computer using graphical icons.
A. Commands
B. GUI
C. Printer
D. Keyboard
2. How would you represent the decimal value of 30 in Hexadecimal?
A. 1E
B. 30
C. 1C
D. 11010
3. How is data represented inside the computer?
A. Logical System
B. Byte system
C. Binary system
D. Hexadecimal system
3. Which of the following storage devices allows access to information in a
sequential mode?
A. CD-R
B. DVD
C. Hard disk
D. Magnetic tape
4. Which statement is NOT a special care to ensure that data saved on
your CD/DVD is preserved?
A. Do not expose your CD/DVD to extreme temperature
B. Store them in their casing any scratch makes it difficult to read
through the reflective coating
C. Clean the CD/DVD with a brush, in an outward direction from the
centre of the disk, avoiding circular movements, to remove dust
D. Do not write on the reflective coating of the CD/DVD and use only
recommended marker for any labelling on the label side

5. Which one is best suited for use with paper of large size and for complex
drawings in Computer Aided Design?
A. Dot-Matrix printer
B. Laser printer
C. Pen plotter
D. Ink-Jet printer
6. Testing a program for any syntax or logic errors is known as
A. double checking
B. editing
C. debugging
D. decoding

7. In programming, converting high level language into machine language is


done by
A. drivers
B. service programs
C. converters
D. translators
8. Which of the following is not an output device?
A. Monitor
B. Touchscreen
C. Printer
D. Plotter
9. Which of the following printers are known to press characters or dots
against an inked ribbon onto a paper by means of a mechanical head of
retracting pins?
A. Dot-matrix
B. Ink-Jet
C. Laser
D. Thermal
10. Which of the following types of mouse is a battery-powered device that
transmits data using wireless technology such as radio waves or infrared
light waves?
A. Mechanical Mouse
B. Optical Mouse
C. Cordless Mouse
D. Trackball
11. Which of the following is NOT a 3rd generation programming language?
A. ADA
B. Assembly Language
C. FORTRAN
D. Java
12. Which of the following is NOT a type of testing?
A. Manual Testing with sample data
B. Testing sample data on the computer
C. Testing by a group of users
D. Sample Checking
13. How many bits are there in a KiloByte?
A. 1024
B. 1000
C. 8024
D. 8192

14. Which of the following is NOT a feature of a word processor?


A. Borders and shading
B. Mail Merge and letter assistant
C. Macros
D. Sending email
15. In which category of computers do desktop computers, notebooks
(laptops) and Personal Digital Assistants (PDAs) fall?
A. Supercomputers
B. Mainframe computers
C. Mini computers
D. Micro computers
16. The purpose of an address book in an email package is:
A. To attach an email signature to an email
B. To attach a file like a word document to a message
C. To keep a list of all contacts and their email addresses
D. To keep a list of previously visited URLs
17. Which of the following is NOT a function of the Operating System?
A. Process management
B. Memory management
C. Disk management
D. Database management
18. The BIOS stands for Basic Input Output System. It is found in the
__________ of the computer and is the first piece of software that is run by
the computer.
A. RAM
B. ROM
C. CMOS
D. MBR
19. The translator that converts high-level languages, one statement at a time
into machine code, before the programme is executed is
A. BASIC
B. interpreter
C. query language
D. compiler

20. Current trends in the field of IT aim at providing wireless services to


people while improving on the speed and storage space of existing
computer systems. The term wireless services means
A. Reduction in cost of computers
B. Reduction in the size of computers
C. Increase of the memory of the computer
D. Without cables

Part 2

1. When a computer is working on given instructions it is called?


a. Output
b. Storage
c. Processing
d. Input
2. Hexadecimal has a base value of?
a. 6
b. 8
c. 16
d. 18
3. Which of the following is NOT a function of the control unit?
a. Read instructions
b. Interpret instruction
c. Direct operation
d. Execute instructions
4. The unit of storage used to represent a character is?
a. Bit
b. Byte
c. Word
d. Kilobyte
5. Which of the following storage media provides sequential access only?
a. Floppy disk
b. Magnetic disk
c. Magnetic tape
d. Optical Disk
6. Which of the following storage media used laser technology to store data
a. Floppy disk
b. Magnetic tape
c. CD-ROM
d. Hard disk
7. The technology used to read pencil or pen marks on a multiple choice answer sheet is?
a. OCR
b. OMR
c. POS
d. MICR

8. The MOST suitable device for the output of architectural drawing is a?


a. Plotter
b. Laser printer
c. Graphics tablet
d. Lightpen
9. Which of the following output is an example of a hardcopy?
a. An oral speech delivered by a speaker
b. A bill produced from the printer
c. The display on a monitor
d. A picture on a wall produced from a multimedia projector
10. The decimal equivalent of 000011112 is?
a. 8
b. 12
c. 15
d. 28
11. The BCD representation of (-15) is?
a. 100000011111
b. 101100101111
c. 000000011111
d. 101100010101
12. In modern computers, the CPU speed is measured in?
a. Kilohertz
b. gigabytes
c. kilobytes
d. gigahertz
13. Which of the following is not application software?
a. WordProcessor
b. Spreadsheets
c. Windows
d. SmartDraw
14. Which of the following is not a function of the operating system?
a. Control input/output operations.
b. Provides security
c. Perform calculation
d. Provide a friendly interface
15. An example of multitasking is?
a. Doing a background save while typing a document
b. Allowing many users to use the same program
c. Allowing one user to use one program
d. Operating one program by many users

16. Quality Developers is a company that writes programs to do specific jobs for other companies.
These programs are called?
a. General-purpose software
b. Special-purpose software
c. Custom-purpose software
d. Off-the-shelf software
17. Which of the following is not a type of software interface?
a. Command Driven
b. Touch screen
c. Menu-Driven
d. Graphical User Interface(GUI)
18. An airline reservation system is an example of
a. Batch processing
b. Real time processing
c. Interactive processing
d. Distributed processing
19. The name of the interface used by blind persons to perform operation on a computer is
a. Sensor
b. Icon
c. Braille
d. Touch screen
20. Which of the following is NOT a type of transmission medium?
a. Coaxial
b. Twisted pair
c. Modem
d. Microwave
21. Persons at a downtown caf realized that they were able to access the internet on their laptop
computers. The caf could be considered as a?
a. Metropolitan area network
b. Hotspot
c. Local area network
d. Satellite
22. Which of the following technologies does NOT facilitate the transferring of data between
computers in adjacent buildings
a. Fibre optic
b. Bluetooth
c. Twisted pair
d. Microwave
23. A group of persons who share common interests and communicate by posting messages and
replies on the internet is called a/an?
a. Podcast
b. Newsgroup
c. Uploader
d. Surfer

24. Uploading or downloading data to or from a remote computer is done using?


a. File transfer protocol
b. Inter relay chat
c. Blogging
d. Instant messaging
25. Each website on the Internet can be accessed by entering a unique address. This address is
referred to as?
a. HTTP
b. HTML
c. FTP
d. URL
26. Which of the following items cannot be sent via email?
a. Text document
b. Parcels
c. Sound files
d. Graphics images
27. Which of the following pair of items is used to create webpage?
a. Homepage and Website
b. HTML and authoring tool
c. ISP and web browser
d. Internet and URL
28. Which one of the following statements BEST describes the term information?
a. It is raw facts
b. It is meaningful
c. It is not the result of processing
d. It does not have any value
29. Which of the following actions is NOT considered to be a computer crime?
a. Encryption
b. Piracy
c. Industrial Espionage
d. Hacking
30. Which of the following is NOT a physical restriction with respect to data security
a. Firewall
b. Locking up the hardware
c. Fireproof cabinets
d. Biometric Systems
31. In word processing, an efficient way to move the 3rd paragraph to place it after the 5th paragraph
is?
a. Copy and paste
b. Copy, cut and paste
c. Cut, copy and paste
d. Cut and paste

32. Presentation software allows the user to


a. Track changes
b. Design tables
c. Enhance public speaking
d. Develop graphs to report on sales data
33. The pair of files used to produce merged letters during a mail merge is?
a. Primary document and data source
b. Primary document and merged letters
c. Data source and merged letters
d. Primary document and current letter
34. Text entered into a spreadsheet is aligned towards the left by default. These entries are called
a. values
b. labels
c. formulae
d. functions
35. Which of the following formatting features is unique to numbers in spreadsheet?
a. Bold
b. Custom
c. Italics
d. Indent
36. To center the title rows of a spreadsheet across the column
a. Center align the title rows
b. Center align the title columns
c. Merge and center the title rows
d. Merge and center the title columns
37. Formulae in a spreadsheet involve
a. Cell addresses, values and labels
b. Cell addresses, values and mathematical operators
c. Cell addresses and labels
d. Cell addresses and values
38. Which of the following statements is NOT true of primary keys?
a. They do not contain blank value
b. They are unique identifiers
c. They are always in text form
d. They may be composed of one or more attributes

39. The shortcut key that can be used to activate or open the find and replace screen is
a. CtrlG
b. CtrlH
c. AltG
d. AltH

40. Footers are found at the ..of a document.


a. Bottom of every page
b. Top of every page
c. End of a page
d. end
41. Susan is using the Find and Replace feature of a word processing tool, to search for the word
DELL, in a document that she is typing. Which word or words can be found if she has the
Match case option disabled?
a. dell
b. Dell
c. DELL
d. DeLL
e. All of the above
42. The following words could be found in the document that Susan typed
sad
set
star
street
Susan performed a Find and Replace action with the Find what entry set to s?t and the Use
wildcard option selected. Which string from the list above would be found?
a. sad
b. set
c. star
d. street
43. Software piracy involves
a. The authorized copying, use or selling of software that is copyrighted.
b. The authorized copying, use or selling of software that is not copyrighted.
c. The unauthorized copying, use or selling of software that is copyrighted.
d. The unauthorized copying, use or selling of software that is not copyrighted.
44. The purpose of the icon is to
a. Move data to the clipboard
b. Insert a sum formula on the worksheet
c. Access the chart wizard
d. Provide on-screen help
45. A field in a table appears as a match of the primary key in another table is called a
a. Candidate key
b. Secondary key
c. Foreign key
d. Composite key

46. Given the following algorithm


J=5
K< J
J> J+K
K= J-3
Display K
The value displayed for K is?
a. 10
b. 11
c. 2
d. 4
47. The following variables s, t and u have been assigned the values shown
S=5
T=6
U=3
Which of the following statements does NOT evaluate to TRUE?
a. U>7 and T <=7
b. S< T or U < S 2
c. U 2 >= 1
d. T <> 4 or s = 5

48. Which of the following algorithms satisfies the requirement of asking the user to input two
numbers, calculate the average and displaying the result
a. Display Enter two numbers
Input a, b
C=(a+b)/2
Display C
b. Input a, b
C=(a+b)/2
Display c
c.

Display Enter two numbers


Input a,b
C=a+b/2
Display C

d. Input a, b
C=a+b/2
Display C

49. Which of the following algorithms does NOT display four consecutive numbers?
a. For v=2 to 5
Display v
b. H=
While h<5
Display h
hh+1
end while
c. for k=7 down to 4 step-1
display k
d. f=6
while f<3
display f
f=f-1
50. The variables h and s are assigned the following values, h=4 and s=3*h.
Display h+s*2 will show
a. 28
b. 30
c. 32
d. 38
51. Which of the following languages is ONLY understood by computers
a. 4GLs
b. Machine Languages
c. Natural Languages
d. Procedural languages
52. Which of the following languages is NOT a high-level language?
a. C
b. COBOL
c. ASSEMBLY
d. PASCAL
53. Errors that occur in a program when the rules of the programming languages are NOT obeyed are
called
a. Syntax errors
b. Logical errors
c. Execution errors
d. Run-time errors
54. Which of the following is NOT type of program error
a. Logic error
b. Syntax error
c. Run time error
d. Debug

55. Which of the following term is not a term used to describe the process of manually going through
a program looking for errors
a. Tracing
b. Dry run
c. Debugging
d. Documentation
56. Which of the following is an example of a conditional construct?
a. F-Next
b. If-then-else
c. While-endwhile
d. For-endfor
57. Which of the following reserved words in Pascal displays data and places the cursor on a new
line.
a. write
b. read
c. writeln
d. readln
58. Program implementation involves a number of steps. Which of the following steps is NOT
legitimate?
a. Executing
b. Bonding
c. Compiling
d. Linking
59. Which of the following identifiers is NOT a valid variable name?
a. Input
b. totalCost
c. 9Count
d. NumCount
60. The term used to describe a memory location whose value changes during program execution
a. Constant
b. Volatile
c. Variable
d. Dynamic

Part 3
1. Which of the following devices is used to perform input into the computer
(a) Monitor
(b) Mouse
(c)External hard drive
(d) USB flash drive
2. Which of the following is NOT part of a diskette?
(a) Track
(b) sector
(c)Cylinder
(d)Cluster
3. A diskette is divided into a number of concentric circles called
(a) sectors
(b) cylinders
(c) tracks
(d) clusters
4. Which of the following devices is NOT used in a point of sale terminal?
(a) Printer
(b) Plotter
(c)Bar code reader
(d) Electronic cash register
5. Resolution determines the clarity of the image displayed on a monitor. The term resolution refers
to the number of pixels
(a) present horizontally on the screen
(b) present vertically on the screen
(c)present in a unit area of the screen
(d) that make up the colour
6. Identify the list that is arranged starting from the BEST to WORST print quality.
(a) Laser, Dot matrix, Inkjet
(b) Inkjet, Dot matrix, Laser
(c) Laser, Inkjet, Dot matrix
(d) Dot matrix, Inkjet, Laser
7. Which of the following is NOT an audio output?
(a) Microphone
(b) Earphone
(c)Headphone
(d) Speakers
8. The ones complement of 01010011 is
(a) 11010011
(b) 01011111
(c) 10101100
(d) 11111111
9. In modern personal computers, the CPU speed is measured in
(a) nanoseconds
(b) milliseconds
(c) MHz
(d) GHz
10. The storage capacity of a floppy disk is
(a) 1.44 MB
(b) 1.44 GB
(c)1440 KB
(d) 1440 MB
11. The process of preparing a floppy disk to store data from a computer is called
(a) deleting
(b) easing
(c)formatting
(d) archiving
12. An example of a point and draw device is a
(a) keyboard
(b) joystick
(c)mouse
(d) scanner
13. An application in which scanners are commonly used is
(a) publishing
(b) billing
(c)printing reports
(d) cheque processing
14. Which of the following does NOT serial access?
(a) Reel to reel tape
(b) Microfilm
(c)Microfiche
(d) Cartridge tape
15. Which of the following provides transmission of data in BOTH directions at the SAME time?
(a) Half Duplex
(b) Full Duplex
(c) Null Duplex
(d) Simplex
16. In the URL http://www.shoes.com, shoes.com stands for the
(a) extension
(b) company name

(c) domain name


(d) internet company
17. Google is an example of
(a) the Internet Explorer
(b) a Web browser
(c)a search engine
(d) the World Wide Web
18. A new employee at a financial company has been asked to set a password on her computer. She has
tried setting the password on several occasions but gets an error message which says password not
effective. The problem can be corrected by entering a password that is
(a) made up of several numbers
(b) a relatives name
(c) composed of at least six upper case characters
(d) a mixture of mixed case and alphanumeric characters
19. Transferring data from a remote computer to your computer is referred to as
(a) uploading
(b) browsing
(c)downloading
(d) data mining
20. Scrambling of messages at the sending end and unscrambling them at the receiving end is called
(a) espionage
(b) encryption
(c) coding
(d) eavesdropping
21. The acronym HTTP stands for
(a) Hyper Text Transfer Protocol
(b) Hyper Text Transmission Protocol
(c) Higher Text Transmission Protocol
(d) Higher Text Transfer Protocol

22. E-mail is the transmission of messages and files via a computer network. E-mail is short for
(a) encrypted mail
(b) emerging mail
(c) entertainment mail
(d) electronic mail
Item 23 refers to the icon below.

23. In an e-mail program the icon above is used to


(a) send a file
(b) forward a file
(c) create a file
(d) attach a file
24. Which of the following is NEITHER a validation NOR a verification check?
(a) storage media check
(b) Inconsistency check
(c) Data-type check
(d) Range check
25. Advantages of information processing include
(a) retraining of staff
(b) less human intervention
(c) increasing the amount of equipment needed
(d) reduction of face-to-face interaction
26. Which of the following statements is true of a transaction file?
(a) It is the most complete and up-to-date data file
(b) It is used as a back-up copy
(c) It is used for real time processing
(d) It is used to update the master file

27. Which type of processing system will use sequential file organization?
(a) Real-time processing
(b) Batch processing
(c) Transaction processing
(d) Online processing

28. Data verification is checking for


(a) particular data types
(b) data in a specific range
(c) transcription errors
(d) correct relationship between files
Items 29-30 refer to the document below which shows a water bill.
SECTION A
Account
Number

Meter Number

Bill Days

Account
Number
1112 22-3
Total

Bill Date

$25.41

2009/12/29

2009/12/04
Due Date

Mr. Tom Bill


21 Hill Top View
ST MICHAEL
B. Post cheques to:
P.O. Box 1206 Bridgetown

29. Customers tear off Section A of the bill and return the section and their payment to the company. The
document above is BEST described as
(a) an automated document
(b) a turnaround document
(c) a source document
(d) a transaction document
30. Which type of technology is the information shown as B in the document MOST likely printed in?
(a) OCR
(b) OMR
(c) POS
(d) MICR
31. Slide design in a presentation software is used to
(a) create a background for the slide
(b) create your own design for the slide
(c) create a layout for the slide
(d) create a style for the slide
32. Which of the following are uses of a typical presentation software?
I. To enhance public speaking
II. To store records in a structural fashion
III. To create graphs of sales
IV. To deliver lectures
(a) I and II only
(b) I and IV only
(c) I, II and IV only
(d) I, II, III and IV

Items 33- 34 refer to the diagram below which shows a section of the standard Toolbar of a word
processing package

33. The name of the icon labeled 1 is


(a) undo
(b) repeat
(c) word wrap
(d) text alignment
34. The purpose of the icon labeled 2 is to
(a) align text on the left and right margin
(b) increase the indentation of the selected paragraphs
(c) increase the columns in documents
(d) display the grid to select columns and rows

Item 35 refers to the diagram shown below

35. The diagram above is called the


(a) page setup dialog box
(b) paragraph dialog box
(c) clipboard task pane
(d) format dialog box
36. The term used to describe text in a spreadsheet that is aligned towards the left by default is
(a) value formulae
(b) headings
(c) labels
(d) values
37. Which of the following is the default justification of numbers in spreadsheets?
(a) left
(b) Full
(c)Centred
(d) Right
38. When a cell from a spreadsheet is absolute referenced.
(a) its value becomes constant
(b) its cell address becomes constant
(c)its label becomes constant
(d) its cell value changes automatically
39. Spreadsheet formulae use
(a) values, labels or cell addresses
(b) values, mathematical operators or cell addresses
(c)labels or cell addresses
(d) values or cell addresses
40. Which of the following is NOT involved in extraction or filtering of records in spreadsheets?
(a) Value range
(b) Criteria range
(c)List range
(d) Copy to range
41. Which of the following characteristics must two database tables have in order for them to be linked?
(a) At least one common attribute name
(b) Composite keys
(c)At least two tuples in the table
(d) The same data in all tuples
42. The term used to describe an attribute that can function like a primary key is a
(a) candidate key
(b) secondary key
(c)foreign key
(d) composite key

43.Which of the following is/are true of secondary keys?


I. They are used strictly for data retrieval purposes
II. They are always in text form
III. They do not contain null values
IV. They do the same function as a foreign key
(a) I only
(b) II and III only
(c)III and IV only
(d) I,II,III and IV
44. The object that is used to produce a list of records that meet a particular criterion is a
(a) form
(b) table
(c) module
(d) query
45.In a relational database, tables are also called
(a) tuples
(c) relational

46. Consider the following algorithm


A=7
B= 9
A = B- A
B = A+B
Write A,B
The output of this algorithm is
(a) 2,9
(c) 7,9
47. Consider the following algorithm
Sum 0
Read a,b
Sum a+b
Write Sum
In the above algorithm, sum0 represents
(a) a declaration
(c) an initialization

(b) files
(d) entity

(b) 2,16
(d) 7,11

(b) a computation
(d) an assignment

48. In the programming language Pascal, which of the following is NOT a standard data type?
(a) Floating point
(b) Char
(c) Boolean
(d) Integer
49. Which of the following structures in most commonly used to implement a post test loop in Pascal?
(a) for do
(b) while-do
(c) if-then
(d) repeat until

50. Which of the following statements would be placed in the flow chart box shown below?

(a) Read A
(c) Count count +1
51. The purpose of comments in program code is to
I. allow persons to read it to follow the processes
II. know the purpose of the program
III. generate code
(a) I and II only
(c) II and III only

(b) A >25
(d) Output C

(b) I and III only


(d) I, II and III

52. Which of the following are true about the use of indentation in programming?
I. To make the layout of the code attractive
II. For compiler/interpreter to identify errors easily
III. For easy understanding of the order of code
IV. For easy correction of syntax errors
(a) I ,II and III only
(b) I, III and IV only
(c) II, III and IV only
(d) I,II, III and IV only
53. Which of the following is NOT a third generation language?
(a) Assembly
(b) COBOL
(c) C
(d) PASCAL
54. The Pascal code var x,y would generate an error. The term used to describe this type of error is.
(a) run time error
(b) execution error
(c) logical error
(d) syntax error
Item 55 refers to the following pseudocode
Read A,B
If A < 2
C2
Else
C 6
Endif
D C*B +2
Write D
55. What is printed by the pseudocode if the input values are 5 and 2 respectively?
(a) 6
(b) 12
(c)14
(d) 24
56. A compiler is software that converts the
(a) source code into assembly code
(b) source code into machine code
(c)program to output
(d) program to object code one instruction at a time

57. The result of the expression 3 mod 4 is


(a) 0
(c)3

(b) 1
(d) 4

58. Which of the following symbols is used to perform assignments in the programming language Pascal?
(a) =
(b)
(c):=
(d) = =
59. The variable total is assigned the value 12. Which output shows the CORRECT display when the
Pascal code Writeln(total =); is executed?
(a) total =
(b) 12
(c) total =12
(d) total =
60. Which of the following identifiers is a valid variable name?
(a) Begin
(b) icount
(c)Num1
(d) 5sum

Potrebbero piacerti anche