100% found this document useful (1 vote)
790 views3 pages

2023 B7 End of Term 3 Exams - Computing 1

Uploaded by

rei311213
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
790 views3 pages

2023 B7 End of Term 3 Exams - Computing 1

Uploaded by

rei311213
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

2023 B7 END OF TERM 3 EXAMS – COMPUTING 1

PAPER 1
OBJECTIVE TEST
45 Minutes
Answer All Questions
Each question is followed by four options lettered A to D. Find out the correct option for each question
and shade in pencil on your answer sheet the answer space which bears the same letter as the option
you have chosen. Give only one answer to each question.
1. Which of the following tools is used to 7. If the date a webpage was published is
get synonyms of words in PowerPoint? missing, the information on that webpage
A. Proofing lacks ………
B. Thesaurus A. currency.
C. Design B. coverage.
D. Template C. objectivity.
D. authority
2. The process of creating a set of instruction
8. Which of the following below is an
that tells the computer how to perform a
example of open leaning websites?
task is called ……
A. Facebook
A. testing.
B. Amazon
B. engineering.
C. Alibaba
C. programming.
D. Coursera
D. tasking.
9. A task that is performed in the background
3. Which of the following should a user
without the users of the software’s awareness
bypass before accessing an email?
A. Gmail and password is termed as………
A. frontend.
B. Yahoo and username
B. backend.
C. Username and password
C. compilation.
D. Computer name and password
D. program.
4. A program terminating without any
information is termed as ……… 10. Who is the principal architect in
A. abend. the development of Facebook?
B. error. A. Ellon Musk
C. code. B. Mark Zuckerberg
D. bug. C. Bill Gates
5. The step-by-step way of solving a problem D. Reid Hoffman
in programming is termed as ………. 11. A data type that can store up to 64bits of
A. decomposition. data is called ……
B. algorithm. A. double
C. iteration. B. floats
D. abstraction. C. date
6. The term used to describe the act of D. integer
taking someone’s work or idea and 12. The period of fourth generation computers
was from ……
claiming it as your own is ………
A. 1940 - 1970
A. copyright.
B. 1959 - 1965
B. piracy.
C. 1971 - 1980
C. plagiarism. D. 1945 – 1956
D. patent. 13. People who write computer programs are
called….
A. teachers
B. programmers
C. engineers
D. operators
14. “Hello” is an example of which type of 21. The type of technology used in
data type? third generation computers was
A. Date A. integrated circuits.
B. String B. transistors.
C. Boolean C. vacuum tubes.
D. Data D. microprocessors.
15. Which of the following consists of one
or more characters which includes 22. How many types of robots do we have
letters, numbers and other characters? in design?
A. Double A. 1
B. Floats B. 2
C. Integer C. 3
D. String D. 4
23. What is the name or symbol used to
Dim mynumber As Interger identify manufacturers or distributors of
mynumber = 5 products and services?
If mynumber > 0 Then A. Patient
B. Copyright
MsgBox “The condition
C. Trademark
evaluates to true.”
D. Piracy
End If 24. One of the reasons for using robots in
16. The code above is an example of …… schools is to ……….
A. decomposition. A. replace teachers.
B. algorithm. B. learns for students.
C. abstraction. C. teach algorithms.
D. iteration. D. prevent exams failure.
17. RSI stands for………… 25. If an e-mail message is being sent to multiple
A. Resistance Strain Illness. recipients, which of the following characters is
B. Repetitive Skull Injury. used to separate the e-mail addresses of the
C. Resistance Stomach Illness. recipients?
D. Repetitive Strain Injury. A. Colon
18. When a programmer hides details of a B. Semi-colon
program from the user is called C. Full stop
………. D. Forward slash
A. decomposition.
26. The situation whereby machines become smart
B. algorithm.
and are able to solve a task intelligently like
C. abstraction.
humans is termed as………….
D. iteration.
A. machine intelligence.
19. The fourth-generation computers used the……
B. natural intelligence.
technology.
C. artificial intelligence.
A. integrated circuit.
D. virtual reality.
B. transistor.
27. The physical or logical arrangement
C. vacuum-tube.
D. microprocessor. of network is…………
20. A machine programmable by a computer and A. topology.
capable of carrying out complex tasks B. routing.
automatically is called a/an………. C. networking.
A. laptop. D. intranet.
B. programmer.
C. robot.
D. intelligence.
28. Which of the following technologies is 35. Selecting ignore once when using the proofing
used by smart self-driving cars? option in a word processing document
A. Machine learning
will……
B. Neural network
A. overlook all instances of the spelling error.
C. Artificial intelligence
B. overlook the current instance of
D. All the above
the spelling error.
29. The use of digital visual elements to
enhance the real physical world is known as C. add new word to the dictionary.
……….. D. delete the spelling error.
A. augmented reality. 36. Which social media platform allows users
B. virtual reality. to share small content items such as short
C. artificial intelligence. sentences, images or video links?
D. artificial neural network. A. Twitter
30. The button that opens a dialog box for users B. Facebook
to create an email message is ……… C. Pinterest
A. back. D. YouTube
B. compose. 37. The name given to each cell according to
C. create. its column label and row number is called
D. refresh. A. cell formula.
31. A humanoid robot is an example of …….. B. active cell.
A. mobile robot. C. highlighted cell.
B. fixed robot. D. cell reference.
C. programable robot. 38. Any program instruction that repeats same
D. controlled robot. statement is known as ……………
32. Computer systems that are designed to A. decomposition.
simulate how the human brain analyzes and B. algorithm.
process information is known as……….. C. abstraction.
A. machine learning. D. iteration.
B. virtual reality. 39. Identify this image.
C. artificial intelligence. A. Joystick
D. artificial neural network. B. Webcam
33. Files or folders that are sent along with an C. Light pen
e- mail message is termed as………. D. Scanner
A. attachment.
B. carbon copy. 40. In Excel, columns are labelled as…………..
C. email files. A. A, B, C, D
D. mail files. B. 1,2,3,4,5,6
34. Which of these is a demerit of using robots? C. A1, A2, A3
A. They are efficient. D. $A$1, $A$2, $A$3
B. They are costly.
C. They are safe.
D. They perform repetitive tasks.

END OF PAPER

You might also like