computer science paper1 2022
computer science paper1 2022
GWERU DIOCESE
Time 1 hour
INSTRUCTIONS TO CANDIDATES
There are forty questions in this paper .Answer all questions. For each
question, there are four possible answers, A, B, C and D. Choose one you
consider correct and record your choice.
Each correct answer will score one mark. A mark will not be deducted for a
wrong answer
1. Devices which are used to receive data from central processing unit are classified as
A. output/input devices
B. digital devices
C. signalled devices
D. output devices
2. Modern computers are all based on digital technology. This means that the data is
A. handled by varying the electrical voltage
B. stored as a set of decimal numbers
C. always stored using ASCII code
D. handled as on/off electrical signals
A. Y = (A + B) C
B. Y = AB + C
C. Y = A + B + C
D. Y = A + BC
6. A small computer is used in car to show how far the driver can expect to go before
needing to refuel. This type of computer system is
A. process control
B. a simulation
C. embedded system
D. interactive
2
C. a switch
D. a router
9. A company provides its users with a network that can be accessed from all its offices
Worldwide. This network is called
A. LAN
B. MAN
C. WAN
D. an Intranet
10. When a user on a network prints a file, it goes into print queue just before printing.
Where is this queue held?
A. on the server’s hard disk
B. in the server’s RAM
C. on the client’s hard disk
D. in the client’s RAM
11. Which one of the following errors will be handle by the operating system?
A. lack of paper in printer
B. connection failure in the network
B. power failure
C. all of the mentioned
13. An operating system lets the user group files together for convenience. This kind of
group is called
A. a sector
B. a cluster
C. a directory
D. a block
3
14. Which of these situations is most likely to require scheduling from the operating
system?
A. real time
B. single user
C. single program
D. multi-tasking
15. ________are the rights of the owner of information to decide how much information is
to be exchanged, shared or distributed.
A. Computer Ethics
B. Intellectual property rights
C. Cyber law
D. labour law
16. The security that is provided to protect a network from unauthorised access and risks
is called
A. copyright
B. firewalls
C. network security
D. patents
17. A network security system that manages and regulates the network traffic based on
some protocols is called
A. network security
B. integrity
C. internet security
D. firewalls
18. _______ means data is protected from unauthorised changes to ensure that it is correct
and reliable.
A. privacy
B. security
C. integrity
D. defence
19. Computer simulations are sometimes used to predict the performance of a real life
situation, such as the crush behaviours of cars. One reason for using computer in this
way is
A. computer-generated results are likely to more reliable
B. you can be sure that all relevant factors are taken into account
C. more variables can be investigated at the same time
D. much greater precision is possible
20. A biologist uses a computer to model the growth of an insect population.The main
advantage of using computer modelling in this case is
4
A. the results are likely to be very accurate
B. there are very few variables to take into account
C. more generations can be tested in a limited time
D. results will always be the same
23. Which of the following is not a factor in the failure of the systems development
project?
A. size of the company
B. inadequate user involvement
C. failure of systems integration
D. continuation of the project that should have been cancelled
24. A problem’s______will answer the question, What information the computer will need
to know in order to either print or display the output times?
A. input
B. output
C. processing
D. purpose
25. An ___ is defined as a set of well-defined instructions used to accomplish a particular
task.
A. algorithm
B. function
C. program
D. Procedure
5
27. In a flowchart, an input or output instruction is represented by _____?
A. a diamond
B. a rectangle
C. a parallelogram
D. a circle
28. The variable that does not change the value during the execution of a program is called
A. numeric
B. string
C. constant
D. none of the above
30. Variables are named storage locations in memory, the value of which does not change
during program ______
A. debug
B. design
C. execution
D. all of the above
31. The code in an application can be broken into logical components by ____ process.
A. modular
B. procedural
C. partitioning
D. declaration
32. Each of data files has a _______ that describe the way the data is stored in the file.
A. file structure
B. records
C. fields
D. database
33. The relational model uses some unfamiliar terminology. A tuple is equivalent to a
A. record
B. field
C. file
D. database
6
35. A recursive relationship is a relationship between an entity and
A. itself
B. a sub entity
C. an instance entity
D. an archetype entity
37. In SQL, which command is used to add a column/ integrity constraint to a table
A. ADD COLUMN
B. INSERT COLUMN
C. MODIFY TABLE
D. ALTER TABLE
39. To add a plain color background to your web page, use which of the following?
A. <body bgcolor= “36,24,35”>
B. <body color= “# FF000”>
C.<body bgcolor= “# FF000”>
D. All of the above
7
8