0% found this document useful (0 votes)
99 views11 pages

Csec It p1 2023 June

Uploaded by

tomaspereztt
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
99 views11 pages

Csec It p1 2023 June

Uploaded by

tomaspereztt
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 11
2B. 8. Inwhichofthe following types ofinterfaces is the user required to remember specific instructions and syntax? (A) Menu-driven (B) Graphical user (C) Computer screen (D) — Command-driven Item 9 refers to the following model of a globe, 9, Theprinter MOST suitable for creating the model of the globe above is (A) a3-D printer (B) —_allaser printer (©) an ink-jet printer (D) thermal printer 10. Which of the following protocols is used to ensure that web browsers and servers communicate with each other? A Pp (B) FTP. (© oP (D) HTTP 01229010/MJ/CSEC 2023 uM. Item 11 refers to the following symbol. ee The symbol represents (A) LAN () WiFi (©) WAN (D) Bluetooth Unauthorized, rea me interception of a private com jon on a computer network is referred to as (A) _ propaganda (B) _ identity theft (C) industrial espionage (D) electronic esdropping Double-entry data verification involves (A) different data enter (B) the data ei another device (C) different data entered once by two different persons (D) the same data entered once then re-entered by another person Aweb developer is important to acompany because this person (A) _ is responsible for the company’s website (B) assigns web addresses to all users in a company (©) _ backs up web files and stores the disks at another location (D) monitors the shutting down of competitors’ websites GO ON TO THE NEXT PAGE

You might also like