Csec It Paper1

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

1. Which of the following is NOT an example 10.

When a floppy disk is formatted, all data is


of a peripheral device _____
a. Printer a. Copied to the disk
b. Mouse b. Deleted from the disk
c. Memory c. Read from the disk
d. Keyboard d. Saved to the disk

2. Which of the following is NOT an output 11. A concentric ring on a hard disk is referred
device to as a
a. Microfilm a. Buffer
b. Modem b. Cylinder
c. Monitor c. Sector
d. Mouse d. Track

3. Which of the following does NOT describe 12. A type of utility used to reduce the size of
the functions of a mouse files is
a. Has a set of keys a. file compression program
b. Is a pointing device b. troubleshooting program
c. Has a rubber ball underneath c. antivirus program
d. Left button is used to select text d. uninstall program

4. A _______________ is an example of a 13. What is the corresponding decimal value of


direct data entry device 1111 (base 2)
a. Barcode reader a. 15 b.4 c. 64 d.32
b. Keyboard
c. Mouse 14. What is the corresponding decimal value of
d. Plotter the octal number 44
a. 32 b.36 c. 97 d.21
5. An inkjet printer is best described as
a. An output device
b. An input device 15. The term BCD represents
c. A storage device a. Byte Code Decimal
d. A memory device b. Binary Coded Decimal
c. Basic Coding Design
6. Which of the following devices is most d. Binary Coded Design
suitable for signaling that there is smoke in
the area 16. A network ____
a. A sensor a. Organizes data among computers
b. A mouse b. Allows users to obtain data from a
c. An OCR Reader central computer
d. A thermometer c. Receives data from one computer
d. Enables two or more computers to
7. The two kinds of main memory are communicate
a. Primary and secondary
b. Random and sequential 17. There are ____ stable states in a bistable
c. ROM and RAM environment.
d. Hard and soft a. two
8. Which of the following is TRUE about b. three
writing custom software c. four
a. It is much cheaper than using an off d. five
the shelf package
b. It does not take a long time to 18. System utilities:
produce a. include features such as webpage
c. It may not have all of the features design
that are required b. are loaded before the operating
d. Many other companies will have this system
same software c. have to be accessed through the
Internet
9. Which type of cable is used for cable TV? d. perform functions such as checking
a. Aluminum-alloy disk space
b. Coaxial
c. Fiber-optic 19. A popular computer interface is
d. Twisted-pair a. monitor
b. Command-line
c. GUI
d. Menu-driven
20. An electronically identified interface for 28. A computer virus is
getting information into and out of a a. software written with malicious
computer is called a(n) intent to cause annoyance or damage
a. Bay b. a method of encoding a message
b. Interface c. small device that scans the messages
c. Port on your computer
d. Expansion card d. tool that monitors your email

29. A _______ moves through networks and


21. Application software does NOT include operating systems by attaching itself to
a. Presentation software different programs and databases.
b. Web browser software a. Firewall
c. Word processing software b. Password
d. Systems software c. Worm
d. Virus
22. What is the name of the folder that houses
the Web page in the fictitious URL given 30. In a ______network, all notes are connected
below? to a central hub
a. Bus
http://www.oup.com/itforcsec/index.htm b. Star
c. Ring
a. http d. Local
b. www.oup.com
c. itforcsec 31. When saving a single document, a file name,
d. index.htm the drive and folder in which to store the
document must be specified
23. Tashera is much more interested in a. Only when using the Save command
computer hardware and circuit design. She b. Only when using the Save As
may want to consider a career in command
a. End-user support c. Every time the Save command is
b. Systems engineering used, and every time the Save As
c. Electrical engineering command is used
d. Computer science d. The first time the Save command is
used, and every time the Save As
24. A file with extension .xls is most likely command is used
associated with a
a. database 32. The minimum number of rows and columns
b. web page in a word table is
c. picture a. Zero
d. spreadsheet b. 2 rows and 1 column
c. 2 rows and 2 column
25. An example of a presence check is d. 1 row and 1 column
a. Examining whether or not a field is
the required type in a date field 33. What type of software is used for creating
b. Requiring a user to enter his or her e- letters and other documents?
mail address twice a. Database
c. Testing that only letters are entered b. Word Processor
in a name field c. Spreadsheet
d. Ensuring that numbers are positive in d. Operating Program
a quantity ordered field
34. To create a table for 5 people, containing the
26. The Exit command is located in the headings name, address and a reference
_____menu number at the top, you will need
a. File a. 5 rows, 3 columns
b. Window b. 3 rows, 5 columns
c. Tools c. 6 rows, 3 columns
d. Shutdown d. 3 rows, 6 columns

27. A security buffer between a company’s 35. _____ software would be the MOST
private network and all external networks is appropriate for showing information in point
called a form on a large screen
a. Firewall a. Database
b. Password b. presentation
c. Printer c. Graphics
d. Virus d. Spreadsheet
Questions 36 to 38 are based on the spreadsheet c. Page layouts
below d. Color schemes

42. In the following diagram, transition effects


been set on slide(s)

(*** fig mcq ss ***)


36. Cell C4 contains
a. A formula
b. A function
c. A range
d. A graphic

37. If the contents in cell C4 are copied to cells


a. a 1 and 2
C5 through C7, then cell C7 contains
b. b 3 and 4
a. =B4*C1
c. c 1 and 3
b. =B4*C7
d. d 2 and 4
c. =B7*C1
d. =B7*C4
43. ______ is commonly used for Web
applications is:
38. The result in cell C4 is
a. C++
a. 2.7
b. COBOL
b. 27
c. HTML
c. 0.27
d. Lisp
d. 0
44. Tags used for formatting fonts in HTML are
Questions 39 and 40 are based on the graphic
I <B></B>
below:
II <I></I>
(***Fig emptyslide2***)
III <U></U>
IV <H1></H1>

a. I only
b. I and II
c. I, II and III
d. I, II, III, and IV
39. The graphic is called a
a. Picture 45. An advantage of using HTML to create a
b. Rectangle basic web page is that
c. Screen a. all word processors can display the
d. Slide document
b. all browsers can display the
40. To add a title ‘Introduction’: document
a. Double click on the long rectangle c. it will print better than a word
and type the word processing document
b. Double click on the small rectangle d. it is easier to write in HTML
and type the word
c. Click on the long rectangle and type 46. The part of a database that is used for easy
the word input of data is
d. Click on the small rectangle and type a. Forms
the word b. Queries
c. Reports
41. The objects in the diagram below illustrate d. Tables

47. _____ is NOT an example of a common data


type found in most databases
a. Date
b. Number
c. Text
d. Key

a. Slide layout
b. Animation settings
56. To assign 5 to the variable COUNT means
that COUNT should be
48. APPEND a. char
a. Adds records to the top of a database b. integer
table c. real
b. Deletes records from the top of a d. string
database table and opens the table
c. Adds record at the end of a database 57. Programming languages that are classified
table as low-level languages include
d. Deletes record from the end of a I BASIC
database table II Machine Code
III Pascal
49. Instead of using symbols to represent IV Assembly language
program logic, _____________________
uses statements that are English-like. a. I and IV
a. pseudocode b. I and III
b. machine language c. II and III
c. low-level languages d. II and IV
d. flowcharts
58. An interpreter
50. The only language that a computer directly a. Converts the program line by line
interprets is __________ language. b. Converts the entire program code in
a. assembly one step
b. machine c. Executes the program efficiently
c. nonprocedural d. Does not have any errors
d. procedural
59. The first step in solving a program is
51. IPO diagrams a. Develop the algorithm
a. Illustrate the structure of the program b. Evaluate solutions
b. Use symbols to present activities c. Specification and design
c. Specify the input to the program and d. Test the solution
the output produced
d. Specify the logic of the program 60. The term used to retrieve data from
keyboard entry is called
52. An if-then-else structure is part of: a. Write
a. sequence b. Print
b. repetition c. Read
c. selection d. Start
d. ordering

53. Repetitions include:


a. if-then-else
b. case
c. do-while
d. sequence

54. The following loop will be executed ______


times.

FOR count := 0 to 3 DO
writeln(‘*’);

a. 0
b. 3
c. 4
d. *

55. In Pascal, ‘initializing’ a variable means:


a. creating procedures to use the
variable
b. declaring the type of variable
c. giving the variable an start value
d. writing code that uses the variable.

You might also like