ICT SHS 1 END OF TERM EXAMINATION
1. A bit can take the form of ….. A. 0,1 B. D. Both a and b
0,0 C. 1,2 D. 1,1 15. Which device converts human-
2. Internet fraud and identity theft are understandable data and programs into a
examples of a. anti-malware b. computer form that computers can understand and
process? A. Output B. Monitor C. Input D.
utility c. cybercrime d. ethical hacking
All of the above
3. The page orientation that prints a 16. One billion bytes is approximately
document in a horizontal position is one…. A. gigabyte B. kilobyte C.
referred to as a. portrait b. landscape c. megabyte D. terabyte
page setup d. line spacing 17. What is the meaning of “backing up
4.__________ is an example of volatile data” on the computer? A. Copy the data to
memory. A. RAM B. ROM C. CMOS D. all another device/location to save it for future
of the above use B. Saving the computer from a virus
5. In which of the following are the storage C. Inserting SD card to the computer device
devices arranged on the basis of lowest to D. Connecting Personal computer to a
the highest capacity? A. CD, DVD, Floppy network
Disk and Hard Disk B. Floppy Disk, Hard 18. Secondary storage memory is
Disk, DVD and CD C. Floppy Disk, CD, basically….. A. Volatile memory B.
DVD and Hard Disk D. Floppy Disk, DVD, nonvolatile memory C. backup memory D.
CD and Hard Disk impact memory
6. The main storage medium within the 19. Main memory is also called as… A.
system unit of the computer is the A. CD- immediate access store B. auxiliary storage
ROM B. FDD C. HDD D. USB C. secondary storage D. backing store
7. …………. is the process of retrieving 20.FDD stands for? (a) Floppy Drive Disk
information from a storage device. A. (b) Floppy Disk Drive (c) Floppy Digital
Writing B. removing C. reading D. deleting Disk (d) Floppy Digital Drive
8. …………. is the process of storing 21. What is the permanent memory built into
information on a storage device. A. Writing your computer called? (a) RAM (b) ROM
B. removing C. reading D. deleting (c) CPU (d) CD-ROM
9. A byte is a group of …. A. 4 bits B. 8 bits
22. RAM is an example of …………..(a)
C. 2 bits D. 6 bits
10. A bit can hold only one of these two Secondary memory (b) Primary memory (c)
values, A. 0 or 1 B. 1 or 2 C. 0 or 2 D. 2 or 0 Main memory (d) Both (a) and (b)
11. Storage capacity is measured in … A. 23. A command that takes what has been
meters B. centimeters C. bytes D. bites typed into the computer and can be seen on
12. Bit stands for ……. A. Binary unit B. the screen and sends it to the printer for
Binary limit C. binary digit D. Binary output on paper______. (a) print (b) return
13. A device that allows users to feed data
(c) jump (d) attention
into a computer for analysis and storage and
to give commands to the computer is 24. RAM stands for ………..(a) Read
called…. A. Output device B. Input device Access Memory (b) Random Access
C. Memory D. Both a and b Memory (c) Random Assigned Memory (d)
14. User communicates with a computer None of these
with the help of which devices? 25. All of the following are examples of
A. Input device B. Output device C. storage devices except …..(a) Hard disk
Software device
PAGE \* MERGEFORMAT 1
drives (b) Printers (c) USB drive (d) DVD popularly known as …. (a) QWERTY (b)
drives QOLTY (c) ALTER (d) UCLIF
26. ____ is any part of the computer that you 37. Computers that are portable and
can physically touch.(a) Hardware (b) A convenient for users who travel are known
device (c) A peripheral (d) An application as ……… (a) Super computers (b) Laptops
27. A keyboard is this kind of device …….. (c) Mini computers (d) File servers
(a) black (b) input (c) output (d) word 38. BIOS stands for : (a) Basic Input Output
Processing System (b) Basic Instruction Output System
28. The ______, also called the “brains” of (c) Basic Interface Output System (d) All of
the computer, is responsible for processing these
data. (a) motherboard (b) memory (c) RAM 39. The CPU and memory are located on
(d) Central Processing Unit (CPU) the: (a) expansion board (b) motherboard (c)
29. During the boot process, the storage device (d) output device
____________ looks for the system files. (a) 40. LCD stands for : (a) Liquid Crystal
CD (b) BIOS (c) CPU (d) DVD Display (b) Laser Crystal Display (c) Light
30. _______ is an output device that lets you Crystal Display (d) All of these
see what the computer is doing. 41. Which of the following is used to
(a) disk drive (b) monitor-screen (c) shift indicate the location on the computer
key (d) printer monitor? (a) Mouse (b) Cursor (c) Keyboard
31. All of the following are examples of (d) None of the above
storage devices EXCEPT: (a) hard disk 42. Such types of printers, in which the
drives(b) printers (c) floppy disk drives(d) printing head contacts with the paper in
USB drive printing process, are called as : (a) Impact
32. Which of the following is an example of Printer (b) Non-Impact Printer (c) Laser
an input device?(a) scanner (b) speaker (c) Printer (d) All of these
CD (d) printer 43. The term that we use to describe
33. The barcode which is used on all types physical components of a computer (a)
of items is read by a scanning device Hardware (b) Input (c) Software (d)
directly into the computer. What is the name Operating System
of this scanning device? (a) Laser scanner 44. Which part of the computer helps to
(b) Wand (c) OCR (d) MICR store information? (a) Disk drive(b)
34. A computer’s hard disk is ......... (a) an Keyboard (c) Monitor(d) Printer
arithmetic and logical unit (b) computer 45. This component is required to process
software (c) an operating system (d) data into information and consists of
computer hardware integrated circuits.
35. Surgeons can perform delicate (a) Hard disk (b) RAM (c) CPU (d) ROM
operations by manipulating devices through 46. What is object of UPS? (a) Using for
computers instead of manually. This storage (b) To increase the speed of a
technology is known as: (a) robotics (b) computer (c) Provides backup power(d) All
computer forensics (c) simulation (d) of the above
forecasting 47. One main difference between a register
36. Most of the commonly available and main memory is that the a. register is
personal computers/laptops have a keyboard removable while main memory is not
removable b. registers are bigger in capacity
PAGE \* MERGEFORMAT 1
than main memory c. register is auxiliary HTTP://WWW.WAECGH.ORG/GBCE/
memory while the main memory is primary REGISTRATION
memory d. central processing unit has 56. The name of the format below is
faster access to data in register than main A. e-mail address B. world wide web C.
memory uniform resource locator D. spam address
48. Which among the following is the fastest 57.The part HTTP refers to:
memory in a computer that holds A. website address B. domain name C.
information? protocol types D. name of server
(a) Register (b) Cache (c) Main memory 58. The part WAECGH.ORG refers to the
(d) RAM A. protocol type B. domain name C. second-
49. Acronym of HDD?(a) Hard Disk Drive level domain D. third-level domain
(b) Hard Drive Disk (c) Hard Drive Disc (d) 59. The part ORG refers to A. protocol B.
Hard Disc Drive domain type C. domain name D. third-level
50. Which of the following is not hardware? domain
(a) Processor chip (b) Printer (c) Mouse 60. Which of the following is not a
(d) Java component of a decision support system? A.
Which of the following is temporary storage Corporate database B. Decision database C.
used to hold data that is used for arithmetic Model database D. Planning languages
and logical operations and storing its 61. Which of the following options is not
results? (a) ALU (b) PC (Program counter) common between computer files and
(c) Accumulator (d) IR (Instruction manual files? (a)They can both be accessed
Register) (b) be retrieved (c) store video (d) be
51. Which of the following are not input arranged
devices? (a) Keyboard, trackball, light pen 62. The act of gaining unauthorized access
(b) Barcode reader, OMR, OCR, MICR (c) to a restricted computer facility is called a.
Biometric sensor, scanner, Mic (d) Plotter, flaming b. hacking c. hijacking d.
projector, headphones spamming
52. To facilitate quick data access, the 63. The time lapse between an enquiry and
appropriate storage medium to use is a. feedback is called a. average time b. real
magnetic disk b. magnetic tape c. optical time c. response time d. transit time
disk d. streaming tape 64. Buying and offering of services on the
53. Which of the following is not a web is called a. e-business b. e-mail
characteristic of a computer? A. accuracy c.internet buying d. internet sales
b. visibility c.automatic d. storage 65. One quality of good information is a.
54. The process of copying data from a accuracy b. ambiguity c. redundancy d.
memory location is called a. downloading versatility
b.controlling c. reading d. wirting 66. A simultaneous two-way video audio
55. An accumulator in computer hardware transmission to multiple location is called
can also be called a. register b. hardware a. conference call b. telecommuting c.
unit c. sequential logic d. finite state television d. video conferencing
machine 67. E-commerce is an integral part of a. e-
Use the format below to answer questions business b. e-governance c. e-learning d.
56 to 59 e-mail
PAGE \* MERGEFORMAT 1
68. The computer operation that involves activities d. uses transactions data to
computation of business transaction is produce information needed by managers.
called a. inputting b. input-output c. 78. A group of computers used by business
outputting d. processing organisations to interact with allies across
69. A fraudulent act designed to trick the world through communication link is
individuals into spending their time or referred to as a.extranet b. intanet c.
money for little or no return is called internet d. world wide web
A. Phish b. scam c. sniff d. spoof 79. To create files for the world wide web,
70. Information overload refers to a. use a. Archie b. File Transfer Protocol c.
complete information b. consise Hypertext Mark-up Language d. Hypertext
information c. reliable information d. Transfer Protocol
unusable information 80. Intruders are prevented from getting
71. Which of the following is not a access to an organisation’s corporate
cybercrime? A. encryption b. hacking c. network by the use of a. antivirus b.
phising d. identity theft authority level c.firewall d. user code
72. A feature of an application that allows 81. The process of copying a file from a
users to have fast and flexible access to webserver onto a microcomputer is a.
information in large documents is a. downloading b. fragmenting c.upgrading
hypertext b. multimedia c. subscript d. d. uploading
superscript 82. Which of the following copies itself into
74. False information dissemination in the memory or onto a disk until no more space
broadcast of information must have come is left ? a. antiviral agent b. trojan c.
from a. wrong input selection b. virus d.worm
inadequate power supply c. low capacity of 83. An address that points to specific
the memory resource on the web is called a. gopher b.
75. Health harzards associated with the use home page c. uniform resource locator d.
of ICT include: electronic data interchange
I. Repetive -Strain Injury II.Carpal Tunnel 84. Decision makers who are concerned
Syndrome III. IV. Magnetic Resonance with short term operational problems and
Imaging decision making are referred to as a.
Which of the following is correct? supervisors b. executive managers c.
a. I, II and III only b. II, III and IV only c. middle managers d. strategic managers
I, II and IV only d.I, III and IV only 85. Which of the following tools is used by
76. In describing whose jobs involve engineering designers? A. Computer
sponsoring and funding the project to Assisted Learning b. Computer Assisted
develop, operate and maintain the Manufacturing c. Computer Aided Design
information, the term used is a. system d. Computer Based Testing
owner b. system builder c. information 86. Another name for information is a.
worker d. internal system user. input data b. meaningful data c. output
77. A management information system a. data d. raw data
processes business b. captures and 87. A collection of linked documents stored
reproduces the knowledge of an expert on millions of computers and distributed
programmer c. creates and shares across the world is called a. browser b.
documents that support day-to-day office hyperlink c. internet d. world wide web
PAGE \* MERGEFORMAT 1
88. Which of the following statements is not well-reasoned decisions b.store massive
a goal of transaction processing system? A. amounts of information. c. solve complex
Capture, process and store transaction. B. mathematical problems in a second d.
Produce standard reports used for recall information stored in a split second.
management decision making. C. Reduce 97. The motherboard is regarded as the most
manual effort associated with processing important component of the computer
business transactions D. produce a variety because it a. the largest component b. is
of documents related to routine business the most expensive component c. connects
activities all other components of the computer
89. The application used to view web pages together d. stores all the information and
is a. Notepad b. Spreadsheet c. word configurations in the computer.
processor d. web browser 98. The following devices are used to
90. The technology used in the control of capture graphics, sound or video into the
machine tools by computer is called a. computer except a. microphone b. webcam
Computer Assisted Learning b. Computer c. digital camera d. game pad
Assisted Manufacturing c. Computer Aided 99. Tatical information is needed for a.
Design d. Computer Based Testing long range planning b. short range planning
91. Which of the following is not a c. governtment taxation day-today
technology driver for an information operations
system? a. Enterprise applications b. 100. Which of the following is an impact
networks and the internet c. collaborative printer? a. daisy wheel b. inkjet c.laser
technologies d. knowledge asset d. thermal
management
92. The real business and competitive value
of information technology lies in the a.
software applications that are used by many
companies. b. capabilities of the hardware
and the speed at which it processes
information c. infrastructure of hardware,
networks and other I.T. facilities that are
commonly used d. capablities of the
software and value of the information a
business acquires and uses
93. Reading through pages on the internet
can simply be described as a. chatting b.
pinging c. surfing d. twiting
94. Which of the following types of memory
is EEPROM a. dynamic b. non-volatile c.
static d. volatile
95. The smallest piece of information stored
on the computer is called a. bit b. byte c.
cell d. nibble
96. In what aspect is a computer not smarter
than a human being? Ability to a. make
PAGE \* MERGEFORMAT 1
PAGE \* MERGEFORMAT 1