ICT 2016
ICT 2016
The two activities of the machine cycle that take place in the control unit are
A Decode-execute
B Fetch-decode
C Decode-store
D Execute- store
A ROM
B RAM
C Register
D Cache
C Pixels density
D Dot pitch
4. Which of the following provides a mechanism that can be used to convert scanned
text into editable text?
A OCR
B MICR
C OMR
D Digitizer
5. A document that states in writing how a company plans to protect its physical and
data assets.
B Copyright
C Data dictionary
D Security policy
A Di erential
B Sequential
C Procedure
D Full
B Program interaction
B Data verification
D Use of passwords
10. A term used to describe the process of discovering patterns in data that can lead to
predictions about the future.
A data mining
B verification
C Normalization
D data processing
11. The software that enables the operating system to recognize a newly connected
device is known as
A utility software
Ba driver
C an interpreter
D a device manager
12. Third generation digital electronic computers use _______ for the design of its
electronic circuits.
A Transistors
B logic gates
C vacuum tubes
D integrated circuits
A File manager
B Anti-virus software
C Productivity software
A predictive system
16. A method of processing that cumulates data to process it after a period of time is
called processing.
A batch
B Online
C distributed
D periodic
B Size of business
C Instant response
D Speed of processing
D maximum number of words that can stay in the RAM for processing
A FTP
B Internet Protocol
C HTTP
D TCP/IP
20. A company writes a computer program to carry out a specific job. This type of
program is called;
A custom software
B o -the-shelf software
C general-purpose software
D special-purpose software
21. A spreadsheet formula is given as =SUM(A1:D2). Two cell addresses involve in the
formula are
A B2 and C1
B A3 and B2
C A2 and B3
D B3 and D1
22. A system of programs and data structures that approximates the operation of the
human brain is
A embedded system
B modelling and simulation
C genetic programming
D artificial intelligence
A RAM
B BIOS
C ROM
D Register
A cannot be intercepted.
25. A huge collection of electronic pages containing information about many di erent
subjects is called
A Google
B Facebook
D search engine
A FTP
B SMTP
C POP
D TCP/IP
28. At which stage of a SDLC do we check and modify the system to ensure that it
continues to meet changing business need?
A System investigation
B System design
C System analysis
29. Which of the following is an activity in the implementation phase of a new system?
B Training of users
C Writing algorithms
D Writing codes
A Sequence
B Syntax
C Semantics
D Control structure
31. The method used by organization to completely do away with the old system to use
a new system is known as implementation.
A direct
B parallel
C Phased
D Complete
32. Software that can convert codes written by programmers in high level languages into
machine code is
A compiler
B assembler
C decoder
D operating system
A lexical error.
B syntax error.
C logic error.
D semantic error.
35. A program that provides a way to look at and interact with the information on the
World Wide Web is a
A HTML editor
B search engine.
C browser.
D web crawler.
36. A field in a database table which appears as a primary key in another database table
is called a
A candidate key.
B secondary key.
C foreign key.
D primary key.
37. The process of determining whether someone is, in fact, who he/she is declared to
be is
A authentication.
B identification.
C confidentiality.
D privacy.
38. The type of software that reduces file size in storage without a ecting the content of
the file is
A trojan
B defragmenter.
C driver software.
D utility software.
39. Which of the following is a data security measure that can be used to prevent
external threat in a network?
A Use of firewall.
B defragmenter
C Biometric Systems.
D Debugging software.
40. Which of the following statements is NOT true about a primary key?
A e-banking.
B e-marketing
C e-commerce.
De-trading.
43. A programmer who requires solving a problem that makes logical decision based on
a condition would use________ control structure.
A sequence
B Selection
C Repetitive
D iterative
44. A study method in which the user receives study material and takes examination
online is known as:
A electronic mailing.
C videoconferencing.
D electronic learning.
A pseudo code.
B logic structure
C flow chart
D Flow diagram
46. The paradigm in which the programmer designs programs by outlining steps to be
followed to solve a problem is called:
A top-down programming
B procedural programming
C stepwise programming
D object-oriented programming
A Initiation.
B Planning.
Implementation.
D Termination.
48. Which of the following is not a project management constraint?
A Critical path.
B Time.
C Cost.
D Scope.
A Duplexing
B Half duplexing
C Channelling
D Multiplexing
1. Set i to 1
2. Set total to 1
4. total = total* i
5. i=i+1
6. Output: total
A 24
B 20
C3
D 15