0% found this document useful (0 votes)
47 views5 pages

A'l Ict P1

REVISION QUESTION

Uploaded by

Fonyuy Carl
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views5 pages

A'l Ict P1

REVISION QUESTION

Uploaded by

Fonyuy Carl
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

MINISTRY OF SECONDARY EDUCATION

Regional Delegation of Littoral MINISTRY OF SECONDARY EDUCATION


Regional Delegation of Littoral
Divisional Delegation of Wouri
Departmental Delegation of Wouri
WISDOM COMPREHENSIVE BILINGUAL CAPACITY THE GREAT COMPREHENSIVE
INSTITUTE BILINGUAL INSTITUTE
Tél: 674 87 22 31/ 675 31 77 24/ 679 23 34 91 Tél: 699 47 15 16/670 64 99 49/675 70 12 96
[email protected]

SUBJECT
PAPER
WISDOM-CAPACITY STAFF -DOUALA CODE
NUMBER
NUMBER
1
0796
PRE-MOCK EXAMINATION Subject Title and Syllabus
I.C.T
December : 2024 session
ADVANCED LEVEL DURATION::30 Minutes

CANDIDATE NAME____________________________________ FOR OFFICE


______________________________________________________ USE ONLY
CANDIDATE IDENTIFICATION NUMBER__________________ FOR
EXAMINERS
CANDIDATE SIGNATURE: _______________________________ USE ONLY

Mobile phones are NOT allowed in the examination room


Time Allowed : One Hour Thirty Minutes (1H:30M)
INSTRUCTIONS TO CANDIDATES
Read the following information carefully before you start answering the questions in the answer paper. Make
sure you have a soft HB pencil and an eraser for this examination
1 USE A SOFT HB PENCIL THROUGHOUT THE EXAMINATION
2 DO NOT OPEN THIS BOOKLET UNTIL YOU ARE TOLD TO DO SO
Before the examination begins
3 Check that this question booklet is headed “0595 – COMPUTER SCIENCE 1”
4 Insert the information required in the space provided above
5 Insert the information required in the spaces provided in the answer sheets using your HB pencil:
Candidate Name, Centre Number and Name, Subject Code Number and Paper Number
How to answer the questions in this examination
6 Answer ALL the 50 questions in this Examination. All Questions carry equal marks
7. Non-programmable calculators may be used
8. Each question has FOUR suggested answers A, B, C, D) Decide on which answer is correct, find the number
of the question on the Answer Sheet and Draw a horizontal line across the corresponding letter to join the
square brackets for the answer you have chosen. For example, if your correct answer is D, mark D as shown
below
[A] [B] [C] [D]
9. Mark only one answer for each question. If you mark more than one answer, you will score a zero for that
question. If you change your mind about answer, erase the first mark carefully and then mark your new answer.
10. Avoid spending too much time on any one question. If you find a question difficult, move on to the next
question. You can come back to the question later.
11. Do all rough work in this booklet, using, where necessary, the blank spaces in the question booklet.
1/5
1. Components in the CPU communicates 8. The term that provides simultaneous
through; data processing tasks are____________.
A. BUS A. Parallel Processing.
B. RAM B. Array Processing.
C. REGISTER C. Vector Processing.
D. NIC D. Distributed Processing
2. Cache memory is intended to provide 9. A data type that can take only one of the
memory access; two values TRUE or FALSE is known as;
A. Fastest A. Boolean
B. Slow B. Character
C. Very slow C. Integer
D. Comparatively fast D. Binary
3. Which of the following is a generic name 10. _________ involves the immediate
given to software that cause harbor in a implementation of the new system
computer system? replacing the old system.
A. Illegalware A. Phase conversion
B. Badware B. Pilot implementation
C. Malware C. Parallel conversion
D. maliciosware D. Direct implementation
4. A ________ is a directed graph that 11. Which logic gate does the following
describes the flow of execution control truth table represent?
of the program. A B OUTPUT
A. Flowchart 0 0 0
B. Flow graph 0 1 1
C. Complexity curve 1 0 1
D. Algorithm 1 1 0
5. Which of the following is a decision
statement? A. AND
A. IF..ELSE B. NAND
B. DO WHILE C. XOR
C. WHILE D. NOR
D. DO 12. Character-recognition technology or
6. The language made up of binary coded scanner technology used mainly by the
instructions. banking industry to ease the processing
A. Machine and clearance of cheques and other
B. C documents.
C. BASIC A. MICR (Magnetic Ink Character
D. High level Recognition)
7. A method that can prevent illegal access B. Magnetic trip technology
to computers through networks is; C. OMR (Optical Mark Recognition)
A. Encryption D. OCR (Optical Character recognition)
B. Firewall
C. Anti-virus software 13. A computer system that provides
D. Achieving unspecified reports and supports

2/5
complex decision-marking in an D. Long term management
organization is called 20. Some tasks can be extended for a
A. Management Information System number of days without affecting the
B. Distributed System finished day of a project. Such task is
C. Decision Support System known as:
D. Real-time Processing System A. Slack task
B. floating task
14. What is the decimal equivalent of the C. critical task
binary number 11011.011? D. extended task
A. 37.375 21. Which of the following logic is used to
B. 27.375 produce loops in program logic when
C. 27.125 one or more instruction may be
D. none executed several times depending on
15. Which of the following information some conditions?
systems analyses data on the A. Selection Logic
displacement of people and material B. Sequence Logic
resources in a given region? C. Iteration Logic
A. GIS D. Decision Logic
B. HIS 22. The following pseudo code is an
C. EIS example of _______structure:
D. MIS
16. The quality of the images viewed on the Get number
monitor is determined by; Get another number
If first number is greater than second then
A. Processor speed
Print first number
B. Size of monitor
Else
C. strength of video controller Print second number
D. Brightness of environment
17. Which of the following is not a concern A. Sequence
in project management? B. Decision
A. Building a project team C. Loop
B. Evaluating cost D. Nested
C. Lobbying for sponsors
D. Identifying tasks 23. Which of the following is a volatile
18. A software or hardware system that memory?
controls access to a network to control A. DVD
pages that enter the network is called? B. CD-ROM
A. Firewire C. RAM
B. Firewall D. Flash Drive
C. Antivirus 24. A technique of project planning that
D. Network controller analyses the time required for each
19. The level of management which activity in a project is known as;
provides an organization with overall A. Waterfall model technique
direction, guidance and long term B. Time sharing technique
planning is: C. Mile stone technique
A. Tactical management D. Gantt chart technique
B. Strategic management 25. Hackers;
C. Operational management A. All have the same motive
3/5
B. Break into other people's computers C. simulation
C. May legally break into computers as D. SDLC
long as they do not do any damage 33. The i7 laptop that is mostly used by
D. Are people who are allergic to students is classified as ---- computer.
computers A. 5th generation
26. Every statement in C program is to be B. 4th generation
terminated by a__________ C. 3rd generation
A. dot(.) D. 2nd generation
B. semi-colon(;) 34. An office door that is opened through
C. colon(:) eye scan is said to use;
D. Question mark(?) A. Automatic system
B. Biometric system
27. The size of the monitor is determined by C. Artificial intelligence
the --- of the monitor; D. CT
A. Vertical length 35. A system that can track the movement
B. Horizontal length of animals in a forest area is;
C. Diagonal length A. Animal control system
D. Vertical and horizontal length B. Knowledge based system
C. Geographic information system
28. A professional who gives advice on the D. Control system
set up of computers is a room is a/an; 36. Which of the following property is used
A. Database administrator to set the background image of an
B. Ergonomist element?
C. Maintenance technician A. background-color
D. System analyst B. background-image
29. Statistical calculations and preparation C. background-repeat
of tables and graphs can be done using D. background-position
A. Adobe Photoshop 37. The security measure that converts
B. Excel information to unreadable form is;
C. Notepad A. coding
D. Power Point B. encryption
30. Which function in Excel checks whether C. bugging
a condition is true or not? D. deciphering
A. SUM 38. What is the maximum length a text
B. COUNT field can be?
C. IF A. 75
D. AVERAGE B. 120
31. In Excel, which one denoted a range C. 255
from B1 through E5 D. 265
A. B1 - E5 39. The act of modifying data from a remote
B. B1:E5 position without authorization is known
C. B1 to E5 as;
D. B1$E5 A. Phishing
32. A development strategy in which a final B. Hacking
product is constructed from a model is; C. Network logging
A. Prototyping D. Scamming
B. modeling
4/5
40. Developing a system model and testing D. Sets
to make adjustments until an acceptable 47. An information system that manages
product is realized is known as: day-to-day transactions is known as?
A. Water Fall Model A. EIS
B. RAD B. DSS
C. Prototyping C. MIS
D. JAD D. TPS
41. Which of the following is a system 48. Encryption and decryption provides
development project management tool confidentiality but NOT
A. Diagrams A. Privacy
B. Gantt Chart B. Integrity
C. Reports C. Completeness
D. Milestones D. Authenticity
49. The use of digital resources by
educational institutions to deliver
lessons across geography boundaries is
called?
42. The expression of an EX-OR gate is A. Digitalization
____________ B. Online learning
A. A’B+AB’ C. Distance Education
B. AB+A’B’ D. All of the above
C. A+A.B 50. The situation in which users of the
D. A’+B’ internet work together in groups using
43. Which of the following are known as web cameras is called?
universal gates? A. Block working
A. NAND & NOR B. Distance Working
B. AND & OR C. Teleworking
C. XOR & OR D. Video conferencing
D. EX-NOR & XOR
44. Which of the following does not imply END
the presence of a virus in a computer? GO BACK AND CHECK YOUR WORK
A. Special software
B. The speed of the computer
C. The virus activities
D. File extension
45. A computer performance can be
improved by;
A. defragmentation
B. file deletion
C. hard disk upgrade
D. ROM upgrade
46. A programming language structured
data type whose items can be accessed
by an index is;
A. Records
B. Array
C. Files
5/5

You might also like