100%(1)100% found this document useful (1 vote) 3K views9 pages2018 June CSEC IT P1 (Solutions)
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
FORM TP 2018081
1
Wrst cove 01229010
MAY/UNE 2018
CARIBBEAN EXAMINATIONS COUNCIL
CARIBBEAN SECONDARY EDUCATION ¢ ERTIFICATE*
EXAMINATION
INFORMATION TECHNOLOGY
Paper 01 — General Proficiency
T hour 30 minutes,
Gowiay 2018p. )
READ THE FOLLOWING INSTRUCTIONS CAREFULLY.
This vest consists of 60 items. You will have 1 hour and ‘0 minutes to answer them.
In addition to this test booklet, you shoud have an answer sheet.
Each item in this test has four suggested answers lettered (A), (B), (C), (D). Read each iter:
‘you are about to answer and decide whic choiee is best
(On your answer sheet, find the number which correspors's to your item and shade the space
having the same letter as the answer you have chosen. 70k at the sample item below.
‘Sample Item
Which of the following pairs represents general-purpose software tools?
(A) Spreadsheet and database software ‘Sample Answer
(B) Word processor and accounting software
(C) Student record system and database software @®O®
(D) _ Insurance processing and spreadsheet software
The best answer to thi
item is “Spreadsheet and database software”, so (A) has been shaded
Ifyou want'to change your answer, eras: it completely before you fill in your new choice.
When you ate told to begin, turn the page and work as quickly and as carefully as you can. 11
you eannot answer an item, go on to tive next one. You may return to that item later.
DO NOT TURN THIS PAG!
OO SSS
Copyright © 2016
All rights reserved.
01229010/F 20187are
Which of the following itemsareconsidered
computer hardware?
(A) Data
(B) Programs
Ko Output devices
) Operating systems
Scanning an item at a computerized
checkout station in a supermarket is an
example of data
(A) input
(B) output
(©) storing
(D) processing
Access time for magnetic disks is the time
taken by the read/write head to find the
(A) _ buffer
(B)) sector
(C), cluster
(D) cylinder
The binary equivalent of the decimal
number 7 is,
(A) 100,
(B) 101,
(110,
(D)) 1,
The primary storage device that holds
the data currently being processed by the
computer is known as the
(A) __ read only memory (ROM)
( programmable ROM (PROM)
random access memory (RAM)
erasable and programmable ROM
(EPROM)
Item 6 refers to the following specification
recessor for a laptop.
Intel Pentium V 64-bit 3.6 GZ
The 64-bit in this specification means that
the processor can
(A) _ process 4 characters at one time
((B)) _ process 8 characters at one time
(Cy access 8 characters it one time
(D) access 4 characters st one time
Which of the following devices is used to
input data into the computer?
(A) Mouse
(B) Monitor
{©l__ USB flash drive
\@)| External hard drive
In which of the following interface type:
is the user required to remember specific
instructions and syntax?
(A) Menu-driven
(B) Graphical user
(C) Computer screen
Command-driven
“Which of the following components is use
by the CPU to temporarily store data?
(A) Track
Sector
Buffer
Cylinder10.
nu
13,
14.
In order to use a program stored on a flash
‘drive, the program must be transferred inte
A) ROM
3) RAM
TT) PROM
(0) BPROWL
Which of the following tasks is NOT a
function of the control unit (CU)?
(A)) Performing arithmetic operations
(B) Reading and interpreting mach ne
instructions
(C) Coordinating the operation of the
internal registers
(D) Controlling the sequencing of
machine instructions
The two's complement of a binary number
is formed by
(A) changing all zeros to twos
(B) changing all ones to twos
(C) finding theone's complement t
(D)) addingoneto the one’s complement
Which of the following terms represents a
hexadecimal?
(A)
(B)
(Cc)
(D)
‘A hard deve with one read/write head per
disk is called a
(A) SCSI
(B) SATA
iC) fixed head
(D) + moving head
15,
16.
17.
19.
Which of the following systems prov ides
trensmission of data in BOTH direc'ions
at the same time?
(2). Simple
e) Full duplex
(© Half duplex
(D) Null duplex.
Which of the following functions is
porfomed by a modem?
()) Analog and digital
03) Digital and upload
(©) Analog and download
() Download and upload
Which of the following devices is NOT
required to successfully implement
teleconferencing?
A)) Sensor
Modem
(C) Speaker
(D) Microphone
Programs that duplicate the knowledge
and diagnostic skills displayed by humans
performing specialized tasks are referred
loas
(A virtual systems
(B)) exper systems
e knowledge systems
(D) engineering systems
Transferring data from a remote computer
to your computer is referred to as,
uploading
® data mining
(D) downloading
browsing,20. Which of the following operations 18
considereda feature of a biometric system?
@)
B)
«©
(Dy
Matching fingerprints
Detecting irregular heartbeats
Diagnosing medical symptoms
Helping to lubricate skeletal joints
21. Telecommuting can be BEST described as
usingthe computer while commuting
usingthe telephone whilecommuting
working from home by connecting
home and office
working from the office after
establishing a connection at home
22, A webmaster is important to a company
because he/she
aN
(A)) _ is responsible for the company’s
website
(B) assigns web addresses to all users
in a company
(C) monitors the shutting down of
‘competitors’ websites
(D) backs up files and stores the disks
at another location
33, The task of keeping @ company’s data
files and software organized through the
cataloguing and storing of tapes and disks
is that of the
A) IT manager
B)) _ file librarian
systems analyst
(D) database administrator
24. Which of the following checks is NOT @
validation technique?
A) Range
(C) Double entry
(D) _ Reasonableness
28.
26.
21.
“The process of scrambling messages at th
sending end and unscrambling them at th:
receiving end is called
(Ay coding
((B)) encryption
“(C) espionage
(D) eavesdropping
There are many software restrictions used
by computers to protect data and mainia\a
data integrity, Which of the following
entities are software restriction media”
1. Viruses
TI. Passwords
111. Eneryptions
(A) Tand I only
(BL Land 11} only
(©) Wand Ill only
(by 1, Mand Il
Item 27 refers to the following diagram
which shows a form being completed.
‘The data from the form shown above 1S
captured by
(A) USB
(B), OCR
© OMR
MICR
GO ON TO THE NEXT PAGE
}28.
29.
30,
31.
32.
Which of the following statements is tue
of accessing files sequentially?
(D)
Occurs in any order
Starts with the first record
Starts with the largest data field
Starts with the smallest data field
A graph is stored and sent to another user.
‘When the user opens the file he understands
the graph he receives. This graph is a form
of
(A) discussion
(B) facilitation
calculation
information
©)
)
Which of the following activities is NOT
anexample of commercial data processin;
(A)
(B)
Budgeting
Invoice processing
Payroll processing
Forecasting hurricanes
The following formulais located in position
B6 of a spreadsheet. What would be the
resulting formula if it was copied to the
position located immediately on the left?
= B3+B4 + SBSS
(A) C3+C4+C5
(B) A3+A4+A5
A3 +A4 + $BS5
C3 + C4 + SBS5
Spreadsheet formulae use
(A)
®
values or labels
labels or cell addresses
values, labels or cell addresses
values, ranges or cell addresses
33.
34,
35.
36.
37.
The intersection of a row and aco umn in.
a spreadsheet 1s called a
(@) cell
“TRY label
(Cy range
(D) value
Which of the following would MOST likely
be placed above a graph?
Title’
Legend
(©) Gridline
(D) Data label
In Microsoft PowerPoint, a single page
shown on a screen to display information
is called a
(A) field
(B) table
slide
presentation
Which of the following is NOT a valid data
type in Microsoft Access?
‘ Text
Character
(Cy _Date’time
(D) Auto number
Which of the following facilitiesisnormally
used for website-to-website connections?
(A) Modem
Monitor
© Hyperlink
Hypertext
Nn ON TO THE NEXT PAGE38.
39.
40.
-6
Item 38 refers to the following spreadsheet.
A B c Dp | €£ F G
1 |
2
3 Mon Tue Wed Thur Fn
4 Games | 195 | 657 | 200 | 100 | 700
3 Poot | 290 [ 410 | 311 150 | 390
If Column A is deleted, the existing formulae would
remain the same
result in an error being reported
(C) be automatically corrected because absolute addressing is used
(D) be automatically corrected because relative addressing is used
Which of the following functions are 41.
performed by spreadsheets?
1, Performingautomaticre-calculation
when values have been updated
Il Applying formulae to numerical
data to determine values
MM. Capturing, displaying and
manipulating text data
(A) 1and ttonly 42.
(BY) Jand Il only
(C) Mand If only
(D) 1, Mand Itt
In creating a query, a student entered the
following criteria for the date field.
> = 05/11/2017 and < = 05/14/2017 43.
The output will show days
after 14 May 2017 only
[B)) from 11 to 14 May 2017
¢ before 11 May and after 14 May
2017
(D) _ between 14 May and 5 November
2017
Information produced from aueries encL.
tablesina specific formatrhatcan be prin« 2c.
from a database is called
(Ay a file
a report
© abinary
-(D) _ anobject
The slide sorter can be used to
create a slide master
(B) modify custom animations
(C) add sound effects to a presen: ats
4D) show thumbnails of the entire sli
show
Which of the following features can be us 6
in a spreadsheet to copy the result
multiple rows in a single column’?
(A) Cell
(B) Label
Cursor
Function
0 ON ra THe Aree T Ar!45.
7 ea)
In a spreadsheet, the column titles will
always be visible when you scroll the
spreadsheet if you first
%(A) freeze the toprow Pree a
(B) lock the last column 6 |
(C) lock the spreadsheet >
(D) freeze the first column!
‘Which of the following sequences of steps
is correct for deleting a field in a database
table?
(A) Choose the delete row option.
Select row to be deleted and right
click.
Open table in design view.
Choose yes to confirm deletion.
(@)
Open table in design view.
Select row to be deleted and right
click:
Choose the delete row option.
Choose yes to confirm deletion.
(C)_, Select row to be deleted and right
* click.
Open table in design view.
Choose the delete row option.
Choose yes to confirm deletion.
(D) Select row to be deleted and right
click.
Choose the delete row option.
Open table in design view.
Choose yes to confirm deletion.
Which of the following Pascal statements
reads data into a variable, N, and places the
cursor on the next line?
(A) Read (N)
Write (N)
© Readin (N)
Writeln (N)
47.
#48,
49,
Item 47 refers to the following pseudocode
and trace table,
a7
bel
Forn <1 to3 do
aebel
beatb
ua ec ler
o
i
2
3
‘Whaat is the value of X?
‘The integer variables a, b and c are given
the values 6, 10 and 2 respectiv ely. What
is the poi of the following expression
10D)
Smunr DIV)?”
aM 0 ex hiofrachsr
bd ‘ wa
30 DAV - ques val fa dmisiey
20 MOD - gives Yermaander
In representing algonthms, which of the
following statements would be placed in
the flow chart box shown below?
A>25
Read A
Output C
Count count + 1
GO ON TO THE NEXT PAGE50,
31.
$2.
In an algorithm, item_pric
variable used to store the price of a grocery
item. The MOST appropriate data type
used for item price is
@) real
BY integer
(©) boolean
(D) character
53
[tem S1 refers to the following algorithm.
Read (A, B)
If A-1 DO
(4) n=n- a4! >
(S) Print n
(6) Endwhile
Which of the following series of numbers
represents the correct output when the
number 3 is input?
The Pascal code varx,y would generate an
error. The term used to describe this type
of error is
(a) syntax
(BY logical
(©) runtime
(D) execution
Which of the following terms is an invalid
variable name?
(A) Sum
Loy 2count
Vat
(D) Count
The following commands are examples of
ccmputer programming instructions:
Sort customer by last name —-
Total income by department
To which generation of programming,
language do these examples belong?
(a) First
3) Second
0 ON TO THE NEXT PAGE$7. Which
Of the fe
Per ibols isusedto $9, Algorithm testing is BEST described as
(A) executing the programm manually
r - \ with input valuesto see the results
(B) ((B))) running the program using sample
¢ : ( ie 8
< data to identify etrors in the
(Dy == Program
(C) reading each line of code from
beginning to end to search for
Item $8 ref ae
Item $8 refers to the following algorithm. (D) checking that all documentation is
included in the program
1 users for length, width
MW Iength, width
area — length * width 60. What is. the MOST appropriate control
I "Area of rectangle is", area structure to be used in calculating the total
of ten numbers? ;
58. Which of the following options can be used (A) if-then-else
to replace I, Il and III in the algorithm? (B) — Repeat-until
While-do
(A) Read, write, prompt & For-do
(B) Write, read, prompt —/
(C)) Prompt, read, write
(D) Read, prompt, write
END OF TEST
IF YOU FINISH BEFORE TIME IS CALLED, CHECK YOUR WORK ON THIS TEST.