A'l Ict P1
A'l Ict P1
SUBJECT
PAPER
WISDOM-CAPACITY STAFF -DOUALA CODE
NUMBER
NUMBER
1
0796
PRE-MOCK EXAMINATION Subject Title and Syllabus
I.C.T
December : 2024 session
ADVANCED LEVEL DURATION::30 Minutes
2/5
complex decision-marking in an D. Long term management
organization is called 20. Some tasks can be extended for a
A. Management Information System number of days without affecting the
B. Distributed System finished day of a project. Such task is
C. Decision Support System known as:
D. Real-time Processing System A. Slack task
B. floating task
14. What is the decimal equivalent of the C. critical task
binary number 11011.011? D. extended task
A. 37.375 21. Which of the following logic is used to
B. 27.375 produce loops in program logic when
C. 27.125 one or more instruction may be
D. none executed several times depending on
15. Which of the following information some conditions?
systems analyses data on the A. Selection Logic
displacement of people and material B. Sequence Logic
resources in a given region? C. Iteration Logic
A. GIS D. Decision Logic
B. HIS 22. The following pseudo code is an
C. EIS example of _______structure:
D. MIS
16. The quality of the images viewed on the Get number
monitor is determined by; Get another number
If first number is greater than second then
A. Processor speed
Print first number
B. Size of monitor
Else
C. strength of video controller Print second number
D. Brightness of environment
17. Which of the following is not a concern A. Sequence
in project management? B. Decision
A. Building a project team C. Loop
B. Evaluating cost D. Nested
C. Lobbying for sponsors
D. Identifying tasks 23. Which of the following is a volatile
18. A software or hardware system that memory?
controls access to a network to control A. DVD
pages that enter the network is called? B. CD-ROM
A. Firewire C. RAM
B. Firewall D. Flash Drive
C. Antivirus 24. A technique of project planning that
D. Network controller analyses the time required for each
19. The level of management which activity in a project is known as;
provides an organization with overall A. Waterfall model technique
direction, guidance and long term B. Time sharing technique
planning is: C. Mile stone technique
A. Tactical management D. Gantt chart technique
B. Strategic management 25. Hackers;
C. Operational management A. All have the same motive
3/5
B. Break into other people's computers C. simulation
C. May legally break into computers as D. SDLC
long as they do not do any damage 33. The i7 laptop that is mostly used by
D. Are people who are allergic to students is classified as ---- computer.
computers A. 5th generation
26. Every statement in C program is to be B. 4th generation
terminated by a__________ C. 3rd generation
A. dot(.) D. 2nd generation
B. semi-colon(;) 34. An office door that is opened through
C. colon(:) eye scan is said to use;
D. Question mark(?) A. Automatic system
B. Biometric system
27. The size of the monitor is determined by C. Artificial intelligence
the --- of the monitor; D. CT
A. Vertical length 35. A system that can track the movement
B. Horizontal length of animals in a forest area is;
C. Diagonal length A. Animal control system
D. Vertical and horizontal length B. Knowledge based system
C. Geographic information system
28. A professional who gives advice on the D. Control system
set up of computers is a room is a/an; 36. Which of the following property is used
A. Database administrator to set the background image of an
B. Ergonomist element?
C. Maintenance technician A. background-color
D. System analyst B. background-image
29. Statistical calculations and preparation C. background-repeat
of tables and graphs can be done using D. background-position
A. Adobe Photoshop 37. The security measure that converts
B. Excel information to unreadable form is;
C. Notepad A. coding
D. Power Point B. encryption
30. Which function in Excel checks whether C. bugging
a condition is true or not? D. deciphering
A. SUM 38. What is the maximum length a text
B. COUNT field can be?
C. IF A. 75
D. AVERAGE B. 120
31. In Excel, which one denoted a range C. 255
from B1 through E5 D. 265
A. B1 - E5 39. The act of modifying data from a remote
B. B1:E5 position without authorization is known
C. B1 to E5 as;
D. B1$E5 A. Phishing
32. A development strategy in which a final B. Hacking
product is constructed from a model is; C. Network logging
A. Prototyping D. Scamming
B. modeling
4/5
40. Developing a system model and testing D. Sets
to make adjustments until an acceptable 47. An information system that manages
product is realized is known as: day-to-day transactions is known as?
A. Water Fall Model A. EIS
B. RAD B. DSS
C. Prototyping C. MIS
D. JAD D. TPS
41. Which of the following is a system 48. Encryption and decryption provides
development project management tool confidentiality but NOT
A. Diagrams A. Privacy
B. Gantt Chart B. Integrity
C. Reports C. Completeness
D. Milestones D. Authenticity
49. The use of digital resources by
educational institutions to deliver
lessons across geography boundaries is
called?
42. The expression of an EX-OR gate is A. Digitalization
____________ B. Online learning
A. A’B+AB’ C. Distance Education
B. AB+A’B’ D. All of the above
C. A+A.B 50. The situation in which users of the
D. A’+B’ internet work together in groups using
43. Which of the following are known as web cameras is called?
universal gates? A. Block working
A. NAND & NOR B. Distance Working
B. AND & OR C. Teleworking
C. XOR & OR D. Video conferencing
D. EX-NOR & XOR
44. Which of the following does not imply END
the presence of a virus in a computer? GO BACK AND CHECK YOUR WORK
A. Special software
B. The speed of the computer
C. The virus activities
D. File extension
45. A computer performance can be
improved by;
A. defragmentation
B. file deletion
C. hard disk upgrade
D. ROM upgrade
46. A programming language structured
data type whose items can be accessed
by an index is;
A. Records
B. Array
C. Files
5/5