0% found this document useful (0 votes)
9 views

ICT 2016

The document consists of a series of multiple-choice questions related to computer science concepts, including machine cycles, memory types, data processing, software, and project management. It covers topics such as operating systems, data integrity, programming structures, and network protocols. Each question presents four options, requiring the reader to select the correct answer.

Uploaded by

obenbless0
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

ICT 2016

The document consists of a series of multiple-choice questions related to computer science concepts, including machine cycles, memory types, data processing, software, and project management. It covers topics such as operating systems, data integrity, programming structures, and network protocols. Each question presents four options, requiring the reader to select the correct answer.

Uploaded by

obenbless0
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

1.

The two activities of the machine cycle that take place in the control unit are

A Decode-execute

B Fetch-decode

C Decode-store

D Execute- store

2. The memory location with the fastest access rate is

A ROM

B RAM

C Register

D Cache

3. The resolution of the printout of a printer is measured in

A Pages per minute

B Dots per inch

C Pixels density

D Dot pitch

4. Which of the following provides a mechanism that can be used to convert scanned
text into editable text?

A OCR

B MICR

C OMR

D Digitizer

5. A document that states in writing how a company plans to protect its physical and
data assets.

A Data protection act

B Copyright

C Data dictionary

D Security policy

6. What type of backup should be performed prior to an upgrade?

A Di erential
B Sequential

C Procedure

D Full

7. Which of the following is NOT a function of the operating system?

A Deciding which instructions stay in the RAM.

B Program interaction

C Decode instructions in a computer.

D Making hardware ready for application use.

8. The integrity of data can be assured by

A Creating several backups of the same data.

B Data verification

C Proper antivirus protection

D Use of passwords

9. Which of the following can be used to describe the term spooling

A queue of data in a computer for printing.

B Input information into the printer online.

C Simultaneous processing and storage online.

D Direct conversion of speech into print format.

10. A term used to describe the process of discovering patterns in data that can lead to
predictions about the future.

A data mining

B verification

C Normalization

D data processing

11. The software that enables the operating system to recognize a newly connected
device is known as

A utility software

Ba driver

C an interpreter
D a device manager

12. Third generation digital electronic computers use _______ for the design of its
electronic circuits.

A Transistors

B logic gates

C vacuum tubes

D integrated circuits

13. Which of the following is NOT a system software?

A File manager

B Anti-virus software

C Productivity software

D File compression software

14. A transaction processing system is concerned with

A the operational day-to-day activities.

B the strategic decision-making support.

C a large database of specialised knowledge.

D daily update of database

15. A finance system that predicts future business situation is an example of a

A predictive system

B executive support system

C knowledge based system

D management information system

16. A method of processing that cumulates data to process it after a period of time is
called processing.

A batch

B Online

C distributed

D periodic

17. Which of the following is not a benefit of ICT in business today?


A Accurate results

B Size of business

C Instant response

D Speed of processing

18. The word size of a computer processor refers to the

A number of instructions processed at a time.

B number of bits the CPU can process simultaneously

C number of characters it can allow in the database field

D maximum number of words that can stay in the RAM for processing

19. A protocol which enable the functioning of global network of computers is

A FTP

B Internet Protocol

C HTTP

D TCP/IP

20. A company writes a computer program to carry out a specific job. This type of
program is called;

A custom software

B o -the-shelf software

C general-purpose software

D special-purpose software

21. A spreadsheet formula is given as =SUM(A1:D2). Two cell addresses involve in the
formula are

A B2 and C1

B A3 and B2

C A2 and B3

D B3 and D1

22. A system of programs and data structures that approximates the operation of the
human brain is

A embedded system
B modelling and simulation

C genetic programming

D artificial intelligence

23. Which of the following memories is found in the CPU?

A RAM

B BIOS

C ROM

D Register

24. What is true about mobile networks is that they

A cannot be intercepted.

B are not accessible everywhere.

C are available only on mobile phones.

D cannot be intercepted by walls.

25. A huge collection of electronic pages containing information about many di erent
subjects is called

A Google

B Facebook

C world wide web

D search engine

26. Uploading or downloading data to or from a remote computer on the Internet is


done by

A FTP

B SMTP

C POP

D TCP/IP

27. Teleworking is getting normal o ice work done by working

A from a telephone company.

B away from the o ice.

C online out of the o ice.


D on the Internet while in the o ice.

28. At which stage of a SDLC do we check and modify the system to ensure that it
continues to meet changing business need?

A System investigation

B System design

C System analysis

D System maintenance and review

29. Which of the following is an activity in the implementation phase of a new system?

A Determining test items.

B Training of users

C Writing algorithms

D Writing codes

30. The order of execution of instructions in high level programming language is


determined by

A Sequence

B Syntax

C Semantics

D Control structure

31. The method used by organization to completely do away with the old system to use
a new system is known as implementation.

A direct

B parallel

C Phased

D Complete

32. Software that can convert codes written by programmers in high level languages into
machine code is

A compiler

B assembler

C decoder
D operating system

33. A milestone in project management indicates the

A completion of the fist stage of the project

B passing of 50% of the time allocated to the project.

C completion of an important stage of a project.

D conclusion of a stage of a project with a zero-time lag.

34. When a program fails to compile because a statement separator such as a


semicolon is missing in the program, this type of error is known as a

A lexical error.

B syntax error.

C logic error.

D semantic error.

35. A program that provides a way to look at and interact with the information on the
World Wide Web is a

A HTML editor

B search engine.

C browser.

D web crawler.

36. A field in a database table which appears as a primary key in another database table
is called a

A candidate key.

B secondary key.

C foreign key.

D primary key.

37. The process of determining whether someone is, in fact, who he/she is declared to
be is

A authentication.

B identification.

C confidentiality.
D privacy.

38. The type of software that reduces file size in storage without a ecting the content of
the file is

A trojan

B defragmenter.

C driver software.

D utility software.

39. Which of the following is a data security measure that can be used to prevent
external threat in a network?

A Use of firewall.

B defragmenter

C Biometric Systems.

D Debugging software.

40. Which of the following statements is NOT true about a primary key?

A It does not contain a blank value.

B It is a unique identifier of records.

C It is always in text form.

D It should be the first field in a table.

41. Concerning e-banking, what is the advantage of ATM to a banker?

A To withdraw money at any time.

B Serve many people at a time.

C Control the amount of money paid to customers.

D To save customers time

42. To do research, buy and sell stocks online is known as:

A e-banking.

B e-marketing

C e-commerce.

De-trading.
43. A programmer who requires solving a problem that makes logical decision based on
a condition would use________ control structure.

A sequence

B Selection

C Repetitive

D iterative

44. A study method in which the user receives study material and takes examination
online is known as:

A electronic mailing.

B computer aided learning.

C videoconferencing.

D electronic learning.

45. A graphical representation of an algorithm is known as

A pseudo code.

B logic structure

C flow chart

D Flow diagram

46. The paradigm in which the programmer designs programs by outlining steps to be
followed to solve a problem is called:

A top-down programming

B procedural programming

C stepwise programming

D object-oriented programming

47. At which stage of project management is it possible for a decision to be taken to


cancel the project?

A Initiation.

B Planning.

Implementation.

D Termination.
48. Which of the following is not a project management constraint?

A Critical path.

B Time.

C Cost.

D Scope.

49. Which communication technique transmits many signals simultaneously over a


single channel?

A Duplexing

B Half duplexing

C Channelling

D Multiplexing

50. What is the output of the algorithm below?

1. Set i to 1

2. Set total to 1

3. Do steps 4 and 5 until i > 3

4. total = total* i

5. i=i+1

6. Output: total

A 24

B 20

C3

D 15

You might also like