ICT Past Papers
ICT Past Papers
This paper consists of fifty (50) Multiple Choice Questions. Answer ALL questions by indicating the letter
(A, B, C or D) that represents the correct answer. Each question is allocated two (2) marks. Do NOT write anything
on this paper.
2. The storage area used to store data to compensate for the difference in speed at which different units can handle data
is known as______________.
A. memory
B. buffer
ke
C. accumulator
o.
i.c
D. address (2 marks)
op
.ch
w
w
3. An integrated circuit is_____________.
w
A. a complicated circuit
B. an integrating device
C. costlier than a single transistor
D. fabricated on a tiny silicon chip (2 marks)
4. Which one of the following refers to a collection of hyper linked document on the internet?
A. WWW
B. Html
C. Email
D. Internet (2 marks)
5. Which one of the following network devices is used to connect two dissimilar types of network?
A. Hub
B. Switch
C. Bridge
D. Gateway (2 marks)
6. Which one of the following network devices is used to boost-up weak signal?
A. Repeater
B. Modem
C. Router
D. Switch (2 marks)
7. Data moves in and out of the Central Processing Unit (CPU) through embedded wires called____________.
A. bus
B. electronic wires
C. lines
D. cables (2 marks)
AD14 Page 1
Out of 6
8. Which one of the following component is used to measure the speed of a Central Processing Unit (processor)?
A. Processing speed
B. Unit
C. Coprocessor
D. Clock speed (2 marks)
9. Which one of the following devices instructs the computer hardware on what to do and how to do it?
A. Hardware
B. Operating system
C. Software
D. Device driver (2 marks)
10. Which one of the following application software can be used to create, edit and print documents?
A. Spreadsheet
B. Word processing
C. Database software
D. Desktop publishing (DTP) (2 marks)
12. The PowerPoint view that displays each slide of the presentation as a thumb nail and is useful for rearranging slides
is known as____________.
A. slide master
B. slide show
C. slide sorter
e
.k
D. notes page (2 marks)
.co
13. Which one of the following is NOT an essential function of a word processing software package?
A. Indexing
B. Saving
pi
C. Editing
D. Formatting (2 marks)
ho
14. A numeric data analysis tool that allows one to create a computerised ledger is referred to as_________________.
C
15. The type of system that enables many people located at various terminals to use a particular computer system at the
same time is known as________________.
A. batch operating system
B. multitasking operating system
C. time-sharing operating system
D. distributed operating system (2 marks)
16. Which one of the following terms refers to the heart of an operating system?
A. Thread
B. Virtual memory
C. Semaphore
D. Kernel (2 marks)
AD14 Page 2
Out of 6
18. Which one of the following statements is an advantage of sharing a computer file?
A. Increases infection of malware and viruses
B. Eliminates multiple file versions
C. Increases chance of unauthorised access
D. Possible copyright and plagiarism (2 marks)
19. Most of the system software are developed using a programming language known as______________.
A. machine
B. assembly
C. high level
D. fourth generation (2 marks)
A. Printer
B. Plotter
C. Projector
ke
o.
D. Microfilm (2 marks)
i.c
op
.ch
21. The utility in windows operating system, that is used to draw, create and edit graphics is known as____________.
w
w
A. paint
w
B. notepad
C. wordPad
D. CorelDraw (2 marks)
25. The method of exchanging messages between digital computers through the internet is known as_____________.
A. uniform Resource Locator
B. World Wide Web
C. electronic Mail
D. E-Commerce (2 marks)
AD14 Page 3
Out of 6
26. Which one of the following factors should be considered when choosing an appropriate accounting package for a
business?
A. Speed of the processor
B. Size of business
C. Size of computer available
D. Capacity of read only memory available (2 marks)
27. A text modifying feature in Microsoft Word, that includes effects such as shadows, outlines, colours, gradients and
3D effects that can be added to a word or phrase is known as _______________.
A. Word wrap
B. Drop cap
C. WordArt
D. Thesaurus (2 marks)
28. Which one of the following is an example of a category of application software that allows users to create a
presentation of ideas by stringing together text, images and audio/video?
A. PowerPoint
B. CorelDraw
C. PageMaker
D. AutoCAD (2 marks)
A. High-speed device that receives and redirects data packets on a Local Area Network (LAN)
B. Hardware component that converts analogue signals to digital data and vice versa
ho
31. Which one of the following network topology combines two or more different network topologies?
A. Star
B. Hybrid
C. Ring
D. Mesh (2 marks)
32. Which one of the following statements is TRUE about a computer folder?
A. It occupies a certain amount of memory
B. It cannot be shared on a network
C. It does not have extension
D. It is a collection of data (2 marks)
33. Which one of the following statements BEST describes integrity in security?
A. Protecting information from unauthorised access and misuse
B. Process of determining whether a user or entity has the necessary rights
C. Protection of system data from intentional or accidental unauthorised changes
D. Process of verifying whether someone (or something) is what it is declared to be (2 marks)
34. Which one of the following types of user interface is BEST described as one that uses a list of options to navigate a
program or website?
A. Speech user interface
B. Menu driven interface
C. Graphical user interface
D. Command line interface (2 marks)
AD14 Page 4
Out of 6
35. The purpose of a file system in an operating system is to_____________.
A. control the input and output devices
B. allocate and deallocate system memory
C. manage and organise files on storage devices
D. provide a user interface for applications (2 marks)
36. In a networked environment, which one of the following statements refers to the purpose of assigning user
permissions during the account creation process?
A. To limit the number of user accounts
B. To increase system performance
C. To control what actions and resources a user can access
D. To improve network security (2 marks)
37. The importance of having customisable data entry screens in computerised accounting software is to___________.
A. make the system harder to use and prevent unauthorised access
B. ensure the screens match specific needs and workflows of a business
C. limit the flexibility of data capture
D. enforce a single standard for all businesses (2 marks)
38. The feature that allow users to create a pre-formatted document for various purposes, such as resumes or reports is
known as _______________.
A. styles
B. templates
C. themes
D. macros (2 marks)
ke
B. hold data temporarily for quick access by the CPU
o.
i.c
C. enhance the audio output of the computer
op
.ch
D. cool down the internal components of the computer (2 marks)
w
w
w
40. The difference between a Hard Disk Drive (HDD) and a Solid State Drive (SSD) in terms of data storage
technology is that ____________.
A. HDD uses magnetic storage, while SSD uses integrated circuits
B. HDD enhances the computer’s audio capabilities, while SSD improves video quality
C. HDD is used for data backup only, while SSD is used for primary storage
D. HDD is a type of display technology, while SSD is a type of processor (2 marks)
43. Which one of the following statements differentiates between “volatile memory” and “non-volatile memory” based
on their characteristics?
A. Volatile memory retains data without power; non-volatile does not
B. Volatile memory loses data without power; non-volatile retains it
C. Both types of memory retain data without power
D. Both types of memory lose data without power (2 marks)
AD14 Page 5
Out of 6
44. Which one of the following statements is the appropriate action to safely remove a USB drive from a Windows’
computer?
A. Eject through the “My Computer” window
B. Pull out the USB drive without any prior action
C. Disable the USB port from Device Manager
D. Turn off the computer and then remove the USB drive (2 marks)
45. Which one of the following is a formula in a spreadsheet to calculate the sum of cells, A1 through A10?
A. =SUM (A1:A10)
B. =ADD (A1:A10)
C. =TOTAL (A1:A10)
D. =COMBINE (A1:A10) (2 marks)
46. Which one of the following statements explains the difference between solid-state drives (SSD) and hard disk drives
(HDD) in terms of data retrieval speed?
A. SSDs are slower because they have no moving parts
B. HDDs are faster because they use spinning disks
C. SSDs are faster because they access data electronically without moving parts
D. There is no difference in speed between SSDs and HDDs (2 marks)
47. Which one of the following statements would construct a user-friendly interface for a mobile banking application
that ensures security and ease of use?
A. Use complex navigation menus, require multiple logins for each action
B. Implement biometric authentication, clear navigation and quick access to common tasks
C. Provide no security features, prioritise aesthetic design over functionality
D. Require users to write code to perform transactions (2 marks)
48. Which one of the following statements correctly appraises the effectiveness of using a mesh network in a large
office compared to a traditional Wi-Fi network?
e
.k
A. Mesh networks are less effective due to increased complexity
.co
B. Traditional Wi-Fi networks are always superior regardless of office size
C. Mesh networks provide better coverage and reliability in large spaces
D. There is no difference in effectiveness between mesh and traditional Wi-Fi networks (2 marks)
pi
49. The primary form of data input for first generation computers is_______________.
ho
A. punch cards
B. magnetic tape
C
C. floppy disks
D. optical discs (2 marks)
50. Which one of the following type of printer does not use ink or toner to create images on paper?
A. Dot matrix printer
B. Inkjet printer
C. Laser printer
D. Thermal printer (2 marks)
………………………….…………………………………
AD14 Page 6
Out of 6
ATD LEVEL I
This paper consists of fifty (50) Multiple Choice Questions. Answer ALL questions by indicating the letter
(A, B, C or D) that represents the correct answer. Each question is allocated two (2) marks. Do NOT write anything
on this paper.
2. A system software component responsible for performing common tasks is known as _________________.
A. utility program
B. language translator
C. operating system
ke
D. device driver (2 marks)
o.
i.c
op
3. A computer component that acts as a connection point or interface between a computer and external or internal
.ch
w
device is known as _____________.
w
w
A. device controller
B. device driver
C. computer port
D. expansion slot (2 marks)
4. A feature that enables a user to send a similar letter or document to multiple recipients is found in an application
called _______________.
A. word processor
B. spreadsheet
C. presentation
D. database (2 marks)
5. A high-speed device that receives incoming data packets and redirects them to their destination on a Local Area
Network (LAN) is known as ______________.
A. switch
B. gateway
C. bridge
D. router (2 marks)
10. A type of an operating system which allows a single Central Processing Unit (CPU) to execute what appears to be
more than one program at the same time is known as _________________.
A. multiprocessing
B. multiprogramming
C. multi-user
D. multitasking (2 marks)
11. Which one of the following statements refers to an advantage of Information Communication Technology (ICT) in
education sector?
A.
e
When used in the classroom it can be a distraction
B. Detracts students from social interactions
.k
C. Its use motivates learning
.co
D. Can foster cheating
(2 marks)
pi
12. The name of a computer network where electronic devices within an individual person's workspace are
interconnected is called ______________.
ho
13. A high-performance computer system that is designed for a single user and has advanced graphics capabilities,
large storage capacity and a powerful processor is known as _____________.
A. mainframe
B. server
C. workstation
D. supercomputer (2 marks)
14. An information security control measure that is used to transform usable information into a form that renders it
unusable by anyone other than an authorised user is known as _________________.
A. intrusion detector
B. firewall
C. biometric
D. cryptography (2 marks)
15. Which one of the following statements BEST describes the function of Magnetic Ink Character Recognition
(MICR) method of capturing data?
A. Converts the physical action to be measured into an electrical equivalent and processes it so that the
electrical signals can be easily sent and further processed
B. Verifies the legitimacy or originality of paper documents, especially bank cheques
C. Converts an image of text into a machine-readable text format
D. Scans and captures the optical marks on such documents as the multiple-choice scoring sheets (2 marks)
AD14 Page 2
Out of 6
16. Which one of the following statements BEST describes the function of a slide master view?
A. It shows the layout of your presentation as it is printed out on paper
B. It allows to change the layout for every single note section in your project
C. It allows a colourful presentation to be shown
D. It allows you edit and create your own layouts (2 marks)
17. A financial organisational tool that provides an index of every account in an accounting system is called a
______________.
A. general ledger
B. chart of accounts
C. customers’ ledger
D. suppliers’ ledger (2 marks)
ke
D. visual or sound effect accompanying text or graphics (2 marks)
o.
i.c
op
.ch
20. Which one of the following factors is NOT necessary in determining the speed of a computer processor?
w
A. Operating system installed
w
w
B. Bus size
C. Number of cores available
D. Capacity of main memory (2 marks)
21. Which one of the following statements is TRUE about a twisted pair cable?
A. It supports high bandwidth levels
B. It carries signals over longer distances
C. It is relatively easy to implement and terminate
D. It offers better reliability (2 marks)
22. The process of verifying the identity of a user, process or device before allowing access to resources in an
information system is known as _______________.
A. authorisation
B. automation
C. authentication
D. non-repudiation (2 marks)
23. The type of an operating system design that allows multiple users or processes to concurrently share the same
system resources is known as ______________.
A. batch system
B. distributed system
C. multiprocessing system
D. time sharing system (2 marks)
24. The type of an application software created to execute one particular task is known as _____________.
A. bespoke
B. special purpose
C. general purpose
D. customised (2 marks)
AD14 Page 3
Out of 6
25. Input devices includes ____________________.
A. monitor and printer
B. keyboard and mouse
C. CPU and RAM
D. hard disk and CD-ROM (2 marks)
27. The MOST appropriate device to read the information set on a barcode of a product is a ______________.
A. printer
B. scanner
C. keyboard
D. monitor (2 marks)
28. The formula used to calculate the average of the values in cells A1 to A10 is ________________.
A. =AVERAGE(A1:A10)
B. =SUM(A1:A10)
C. =MEAN(A1:A10)
D. =AVER(A1:A10) (2 marks)
29. Which one of the following steps would you take when sharing a file with another computer on the same network?
A. Right-click the file, select share, choose the computer you want to share with and click OK
B. Drag the file to the appropriate folder, open the network folder on the other computer and copy the file
C. Email the file to the other computer, open the email on the other computer and download the file
D.
e
Using share point, right click on the file, on the context menu, choose the destination computer (2 marks)
.k
30. The computer network components responsible for directing data packets between networks is known as a
.co
_______________.
A. server
pi
B. client
C. route
ho
D. switch (2 marks)
31. Which one of the following storage devices provides the FASTEST access to data in a computer system?
C
32. The volatile memory type that loses its data when the power is turned off is known as ________________.
A. hard disk
B. ram (random access memory)
C. ssd (solid state drive)
D. flash memory (2 marks)
33. Which one of the following components is responsible for managing and coordinating the activities of all
hardware components in a computer system?
A. Motherboard
B. Power supply
C. Hard drive
D. Graphics card (2 marks)
AD14 Page 4
Out of 6
35. The type of software that serves as an intermediary between the operating system and the computer hardware,
managing the flow of data and instructions is known as _______________.
A. device drivers
B. application software
C. system utilities
D. firmware (2 marks)
36. Which one of the following types of software is responsible for managing computer’s hardware components and
providing a platform for application software to run?
A. Application software.
B. Atility software
C. System software
D. Middleware (2 marks)
37. The primary purpose of a Graphical User Interface (GUI) in computer systems is to ___________________.
A. manage file storage and organisation
B. provide a visual way for users to interact with a computer
C. allocate system memory for applications
D. establish network connections between devices (2 marks)
38. Which one of the following statements explains the function of the "taskbar" in a graphical user interface?
A. Manage file permissions
B. Provide a space for organising desktop icons
C. Display open applications and facilitate quick access
D. Control the computer's hardware components (2 marks)
39. The function of a file extension in the context of file management is to ________________.
A. indicate the type of file and the program that can open it
ke
B. determine the file's location on the computer
o.
i.c
C. manage file permissions
op
D. allocate system memory for the file (2 marks)
.ch
w
w
w
40. The purpose of the “copy” function in file management is to _______________.
A. create a duplicate of a file in the same location
B. move a file from one location to another
C. permanently delete a file from the system
D. open and view the contents of a file (2 marks)
43. Which one of the following features in a computerised accounting software allows automatic calculation of
financial data based on predefined formulas?
A. Config function
B. General ledger
C. Formula editor
D. Automatic reconciliation (2 marks)
44. The primary purpose of creating user accounts in a computer system is to _______________.
A. enhance the computer's processing speed
B. manage and control access to system resources
C. uninstall software applications
D. organise files and folders (2 marks)
AD14 Page 5
Out of 6
45. The memory technique used to increase main memory capacity beyond the limits of physical memory is known as
_______________.
A. virtual memory
B. cache memory
C. register memory
D. flash memory (2 marks)
46. An example of a printer commonly used for printing labels and barcodes is a(n) ____________________.
A. inkjet printer
B. laser printer
C. dot-matrix printer
D. thermal printer (2 marks)
47. Which one of the following statements BEST describes first generation programming languages?
A. Platform-independent
B. Easy to understand for humans
C. Translatable by a compiler
D. Executable directly by the CPU (2 marks)
48. The type of network topology where failure of a single device result in the failure of the entire network is known
as _______________.
A. star
B. ring
C. bus
D. mesh (2 marks)
49. Which one of the following data transmission line is MOSTLY associated with the "RJ-45" connector?
A. Coaxial cable
B. Fiber optic cable
e
C. Twisted pair cable
.k
D. Ethernet cable (2 marks)
.co
50. Which one of the following is both an input and an output device?
pi
A. LED Printer
B. Touch screen
ho
C. Stylus pen
D. Wireless keyboard (2 marks)
C
………………………….……………………….……………………………….
AD14 Page 6
Out of 6
ATD LEVEL I
This paper is made up of fifty (50) Multiple Choice Questions. Answer ALL questions by indicating the letter
(A, B, C or D) that represents the correct answer. Each question is allocated two (2) marks. Do NOT write anything
on this paper.
1. What is the name of the application software that is user-specific and does a specific task?
A. Special purpose
B. General purpose
C. Bespoke
D. Customised (2 marks)
2. The following are reasons for setting up a computer network in an organisation, EXCEPT___________.
A. Provides best way of business communication
B. Effective resource sharing
ke
C. Cut costs on hardware and software
o.
i.c
D. To keep in step with emerging trends (2 marks)
op
.ch
w
3. Which of the following is FALSE about Random Access Memory (RAM)?
w
w
A. It is also called the working memory
B. Content of the RAM can be written, modified and deleted
C. Its capacity cannot be increased unless by the computer manufacturer
D. Its capacity ranges from 4GB to 32GB or higher for modern computers (2 marks)
4. In a presentation software, what is a predefined set of colours, fonts and visual effects that is applied to slides for a
unified professional look?
A. Template
B. Animation
C. Transition
D. Theme (2 marks)
5. What is the name of the text-based user interface used to run programs, manage computer files and interact with
the computer?
A. Voice user interface
B. Graphical user interface
C. Command line interface
D. Menu driven interface (2 marks)
AD14 Page 1
Out of 6
7. Which is the topology where all the devices in the network are connected to a single cable or line?
A. Ring
B. Mesh
C. Bus
D. Star (2 marks)
8. Which of the statements below clearly describes the purpose of a register in computer memory?
A. To provide extra storage space for data
B. To supplement the processor
C. To arrange, organise and sort data awaiting processing
D. To store small amounts of data needed during processing (2 marks)
9. In spreadsheet program, the feature that displays the cell that is currently selected in the worksheet is known as
__________.
A. Status bar
B. Menu bar
C. Name box
D. Formula bar (2 marks)
10. Which of the following is NOT a characteristic of a Wide Area Network (WAN)?
A. It connects computers over a small geographical area
B. The range of the network is enormous to transfer data
C. The speed of the data transmission is sometimes fast and sometimes slow
D. It allows users to share resources with other users on the internet (2 marks)
15. A copy of computer data taken and stored elsewhere so that it may be used to restore the original after a data loss
event is known as _____________.
A. Disaster plan
B. Backup
C. Recovery
D. License (2 marks)
19. A part of a computer program that usually causes the computer to malfunction; often corrected using patches or
updates to the program is known as ____________.
A. Bug
B. Virus
C. POST
D. BIOS (2 marks)
20. Which of the following is NOT a reason why it is important to manage computer files?
A. To improve organisation
B. To centralise document location
C. To increase typing speed
D. To reduce filing errors (2 marks)
21. The utility used to create a bitmapped image file in Windows Operating System is known as __________.
A. Paint
B. Notepad
ke
o.
C. Control panel
i.c
op
D. Scandisk (2 marks)
.ch
w
w
22. Which one of the following components is NOT necessary when setting up a local area network in an office?
w
A. Switch
B. Bridge
C. Twisted pair cable
D. Computers (2 marks)
24. Which of the following statements BEST describe the function of a slide master view?
A. It allows a user to edit and create own layouts
B. It shows the layout of a presentation as it is printed out on paper
C. It allows user to change the layout for every single note section in the project
D. It allows a colourful presentation to be shown (2 marks)
25. The following are features of a graphical user interface (GUI), EXCEPT _________.
A. They are much easier to use for beginners
B. They enable you to easily exchange information between software using cut and paste or “drag and drop”
C. Commands must be typed correctly and in the right order or the command will not work
D. They use a lot of memory and processing power (2 marks)
26. Which ONE of the following is neither an input nor an output device?
A. Scanner
B. Speaker
C. Inkjet
D. Flash disk (2 marks)
AD14 Page 3
Out of 6
27. In a Word processing program, landscape refers to _________________.
A. Page Layout
B. Paper Size
C. Page Orientation
D. A Font Style (2 marks)
28. _____________is a PowerPoint feature that allow a user to create a presentation quickly.
A. Animations
B. Chart Wizard
C. Transition Wizard
D. AutoContent Wizard (2 marks)
30. Which type of user interface is MOST suitable to somebody with a visual impairment?
A. Graphical User Interface
B. Speech and Sound Interface
C. Command Line Interface
D. Menu Interface (2 marks)
31. Identify the file format that is commonly used to compress multiple files into a single archive.
A. .zip
B. .gif
C. .mp3
e
D. .txt
.k (2 marks)
.co
32. What is the purpose of a device driver?
A. To connect hardware devices to the system
B. To manage memory allocation
pi
33. Which of the following is an advantage of using a command line interface (CLI)?
C
34. Which function of an operating system ensures that each application gets a fair share of the CPU time?
A. Process scheduling
B. Memory management
C. File management
D. Security and authentication (2 marks)
35. A type of port used to connect a printer, keyboard and mouse to a computer is known as _________.
A. USB
B. HDMI
C. Ethernet
D. VGA (2 marks)
AD14 Page 4
Out of 6
37. Which feature of accounting software allows you to automatically import bank statements and reconcile them with
your financial records?
A. Data capture
B. Auto-tax calculation
C. Bank reconciliation
D. Financial reporting (2 marks)
38. Which network resource is used to control access to specific folders and files, ensuring that only authorised users
can view or modify them?
A. Printer
B. Router
C. File permissions
D. Modem (2 marks)
39. Which programming language is often used for web development and can run on both the client and server sides?
A. Java
B. Python
C. JavaScript
D. C++ (2 marks)
40. What is a key advantage of using accounting software for data capture compared to manual bookkeeping?
A. Lower cost
B. More flexibility
C. Reduced human error
D. Better communication (2 marks)
41. A small amount of fast temporary memory within the processor where data is stored and values needed to execute
instructions are changed is called__________.
ke
o.
A. Register
i.c
op
B. Bus
.ch
C. Control unit
w
w
D. Arithmetic and Logic unit (2 marks)
w
42. Memory used by the computer to store the information temporarily during processing is referred to as________.
A. Random Access Memory (RAM)
B. Read only Memory (ROM)
C. Write once read Many (WORM)
D. Flash Memory (2 marks)
43. Which of the following is the most common modern type of personal computer monitor?
A. Cathode Ray Tube
B. Liquid Crystal Display
C. Thin Film Transistor
D. Gas Plasma Display (2 marks)
45. The process of restoring data that has been lost, accidentally deleted, corrupted or made inaccessible is known
as____________.
A. Disaster plan
B. Backup
C. Recovery
D. Retrieval (2 marks)
AD14 Page 5
Out of 6
46. Which of the following is a source document input device?
A. Voice entry
B. Mouse
C. Keyboard
D. Bar code reader (2 marks)
48. Which programming language is OFTEN used to develop mobile applications for Android devices?
A. Swift
B. Kotlin
C. Objective-C
D. Java (2 marks)
50. In the context of software licensing, what is the main characteristic of open-source software?
A. It is developed exclusively for commercial purposes
B. Its source code is freely available for modification and redistribution
C. It cannot be modified or distributed by users
e
D. It is proprietary and closed to public access
.k (2 marks)
.co
………………………….……………………………………………….
pi
ho
C
AD14 Page 6
Out of 6
ATD LEVEL I
This paper is made up of fifty (50) Multiple Choice Questions. Answer ALL questions by indicating the letter
(A, B, C or D) that represents the correct answer. Each question is allocated two (2) marks. Do NOT write anything
on this paper.
1. ___________ is responsible for converting the data received from the user into a computer understandable format.
A. Output Unit
B. Input Unit
C. Memory Unit
D. Arithmetic & Logic Unit (2 marks)
ke
o.
D. Web Server (2 marks)
i.c
op
.ch
3. ________________ is NOT a form of data storage media.
w
w
w
A. A database
B. Magnetic tape
C. Magnetic disc
D. Optical disc (2 marks)
6. When discussing technology, which of the following statement best describes a hot spot?
A. A small overheated area on a CPU
B. A place served by public wireless access
C. Jargon for an X-rated Web site
D. A faulty area in the programming code (2 marks)
7. A computer virus that actively attacks an anti-virus program in an effort to prevent detection is known as _______.
A. Worm
B. Retrovirus
C. Trojan
D. Ghost virus (2 marks)
AD14 Page 1
Out of 6
8. What is World Wide Web?
A. A computer game
B. A software program
C. The part of the Internet that enables information-sharing via interconnected pages
D. Another name for the Internet (2 marks)
11. _____________ refers to the period of time that a computer spends processing a job.
A. Execution Time
B. Real Time
C. Delay Time
D. Waiting Time (2 marks)
12. Which of the following term can be used to refer to a Landscape in context of word processing program?
A. A font style
e
B. Paper size .k
C. Page layout
D. Page orientation (2 marks)
.co
15. A new Laptop comes with various characteristics: weighs less, is smaller and uses less power than
previous Laptop models. Which of the following technologies has been used to accomplish this feature?
A. Universal Serial Bus Mouse
B. Faster Random Access Memory
C. Blu Ray Drive
D. Solid State Hard Drive (2 marks)
AD14 Page 2
Out of 6
18. Which program translates an entire set of instructions written in a higher-level language into machine language
before the instructions can be executed?
A. Interpreter
B. Assembler
C. Compiler
D. Debugger (2 marks)
22. What is defined as a large capital letter used as a decorative element at the beginning of a paragraph or section
where it is made larger, taking up several lines of text or the first few sentences?
A. Word wrap
ke
o.
B. Word art
i.c
op
C. Drop cap
.ch
D. Typeface (2 marks)
w
w
w
23. Which of the following is NOT a characteristic of impact printers?
A. Cheap to buy
B. Slow when printing
C. Relatively poor quality printout
D. Quiet when printing (2 marks)
25. The statement “covers an entire city”, describes which type of a network?
A. LAN
B. CAN
C. MAN
D. WAN (2 marks)
26. What is the name of the networking hardware which provides the physical connection between the network and
the computer workstation?
A. Network interface card
B. Router
C. Multiplexer
D. Gateway (2 marks)
29. The following are important objectives of computer networks, EXCEPT ____________.
A. Resource sharing
B. Increase reliability
C. Security of resources
D. Communication (2 marks)
30. A collection of related fields that can be treated as a unit by an application program is called a _______________.
A. Field
B. Record
C. File
D. Database (2 marks)
e
C. Transition Wizard .k
D. AutoContent Wizard (2 marks)
.co
33. Which type of topology is best suited for large businesses which must carefully control and coordinate the
operation of distributed branch outlets?
A. Ring
pi
B. Local area
C. Hierarchical
ho
D. Star (2 marks
C
34. Which of the following is NOT a process associated with an accounting information system?
A. Auditing existing data
B. Collecting and recording data
C. Providing information to users
D. Analysing and managing data (2 marks)
A. Printer
B. Projector
C. Plotter
D. Scanner (2 marks)
AD14 Page 4
Out of 6
37. What is the name of the feature in a spreadsheet software that automatically applies formatting, such as font colour
or bolding, to a cell when the data in that cell meets specific criteria?
A. Relative referencing
B. Filtering
C. Conditional formatting
D. Freezing (2 marks)
38. Network topology refers to the way in which computers and computing devices are linked together. Which of the
following factor is NOT important when choosing a topology?
A. Desired reliability of the system
B. Size of the system
C. Availability of communication lines
D. Skills of the personnel (2 marks)
39. The term that includes various forms of technologies that are used to create, display, store, process, transmit, share
or exchange information by electronic means is known as ______________.
A. Information system
B. Information Communication Technology
C. Internet
D. Computer network (2 marks)
41. The type of main memory which is extremely fast and of small capacity and its access time is closer to the
ke
o.
processor speed is known as ______________.
i.c
op
A. Virtual
.ch
B. Cache
w
w
C. RAM
w
D. Bubble (2 marks)
42. In the context of presentation software, what is the name of the boxes that are included in a slide layout to hold
specific types of content, such as text, images or charts?
A. Placeholders
B. Master slides
C. Slide shows
D. Design templates (2 marks)
44. In a spreadsheet program, a workbook holds a number of worksheets, and each worksheet is made up of cells. A
cell can hold the following, EXCEPT _______________.
A. Text
B. A formula
C. A file
D. A chart (2 marks)
AD14 Page 5
Out of 6
45. Which type of network topology is shown by the figure below?
A. Ring
B. Bus
C. Star
D. Tree (2 marks)
46. Presentation templates are good resource for anyone looking to improve the quality of presentations made using a
presentation software. The following are reasons why presentation templates are preferred, EXCEPT _________.
A. To increase the speed of running professional presentations
B. To customise templates in order to build bespoke presentations
C. To achieve consistency for a more professional style
D. To help make the content more visual
48. During the second generation, the size of computers was decreased by replacing vacuum tubes with________.
e
A. ICs .k
B. Semiconductors
C. Transistors
.co
D. Microprocessor (2 marks)
49. A computer on a network that requests files from another computer is known as__________.
pi
A. A client
B. A host
ho
C. A router
D. A web server (2 marks)
C
………………………….……………………………………………….
AD14 Page 6
Out of 6
ATD LEVEL I
PILOT PAPER
Answer ALL questions by indicating the letter (A, B, C, or D) that represents the correct answer. This paper is
made up of (50) multiple choice questions. Each question is allocated two (2) marks.
1. You visited an ICT museum during an academic trip and came across the various computers arranged according
to their evolution per generation. Which of the following computer generation is characterised by integrated
circuits that allowed for the development of smaller and more powerful computers?
A. First
B. Second
C. Third
D. Fifth (2 marks)
ke
2. The powerful computers designed for managing and receiving requests from other computers in a network
o.
environment is known as _________________________.
i.c
op
A. Mainframes
.ch
w
B. Servers
w
w
C. Data Centers
D. Supercomputers (2 marks)
3. When the computer is started, it undergoes some diagnostic tests to ensure the basic functionality of essential
computer hardware components are working properly before the operating system is loaded. This process is
referred to as _________________________.
A. Boot Loading
B. System Diagnostics
C. Memory Diagnostics
D. Power On Self-Test (2 marks)
4. Ted, a computer student would like to acquire software for study purposes. However, he is financially challenged
to buy the software. Which of the following software category would you recommend to Ted because they do not
require license to use and allows the users to access, view, modify, and distribute the source code freely?
A. Proprietary software
B. Open-source
C. On-shelf software
D. Off-shelf software (2 marks)
5. Communication media links network node together in a computer network. Identify the type of the
communication media, which falls under the unguided transmission media category.
A. Coaxial
B. Fiber optic
C. Infrared
D. Twisted (2 marks)
6. ICT has revolutionised the way traditional businesses operated and has become the backbone of major business
operations. Start-up companies may not need to invest heavily in the ICT computing resources, such as servers,
storage, databases, software, and networking. Which technology would you recommend for a start-up company,
to allow them to utilise these resources on a pay-as-you-go basis?
AD14 Page 1
Out of 8
A. Blockchain
B. Virtualisation
C. Visualisation
D. Cloud computing (2 marks)
7. Information centers can play a major role in reducing the digital divide in the developing nations. Which of the
following services CANNOT be offered at the information centers?
A. Medical imaging
B. Research
C. Knowledge sharing
D. Education (2 marks)
8. You would like to do data analysis and summarise some financial data using spreadsheet package excel. Select
the best data summarisation spreadsheet tool, that you would perform the task?
A. Goal seek
B. Filter
C. Pivot table
D. What if analysis (2 marks)
9. You would like to purchase a computer for the finance department for payroll processing. Which of the following
is NOT a factor that you would consider to determine the processing power of the computer to purchase?
A. RAM capacity
B. Storage capacity
C. Processor speed
D. The number of cores (2 marks)
e
.k
.co
pi
Figure 1
ho
A. LAN
B. MAN
C
C. PAN
D. WAN (2 marks)
12. Identify the file organisation technique where each record is assigned a specific physical address enabling a quick
retrieval from the desired location.
A. Direct file organisation
B. Sequential file organisation
C. Index file organisation
D. Hashed file organisation (2 marks)
13. Which of the following type of computer file contains non-textual data, such as images, videos, executable, and
compressed files?
A. Dataset file
B. Text file
C. Binary file
D. Temporary file (2 marks)
AD14 Page 2
Out of 8
14. Identify which PowerPoint feature is used to give life to text during the presentation?
A. Transition
B. Animation
C. Customisation
D. Templates (2 marks)
15. Spreadsheets are the super calculators used to perform computations involving rows and columns. Which one of
the following is NOT a spreadsheet application?
A. Excel
B. Lotus 1-2-3
C. Oracle
D. Quattro Pro (2 marks)
16. Select the component of the computer system that is used for data validation and security measures to protect the
system and its data from unauthorised access?
A. Feedback
B. Password
C. Biometric
D. Control (2 marks)
17. Which of the following type of an information system is the ODD one, considering the level of management used
in information systems ?
A. CRM (Customer Relationship Management)
B. MIS (Management Information Systems)
C. DSS (Decision Support Systems)
D. EIS (Executive Information Systems) (2 marks)
18. Computer network is the interlinking of computers and devices to facilitate communication and resource sharing.
Which of the following is a challenge of computer networking?
ke
o.
A. Collaboration
i.c
op
B. Compatibility
.ch
C. Centralised management
w
w
D. Reduced operational costs (2 marks)
w
19. The type of utility software used to reduce the size of files for easier storage and transfer is called
_________________________.
A. File managers
B. File shredders
C. File archives
D. File compression (2 marks)
20. Identify the type of operating system designed for use for critical mission areas such as astronomy and medical
research.
A. Multi-user OS
B. Multi-tasking OS
C. Real-Time OS
D. Embedded OS (2 marks)
21. Embedded computers are everywhere in our households from cars, fridges, microwaves, TVs among others. What
is the name given to the non-volatile software, written directly on the embedded computers to provide the low
level operation needed?
A. Kernel
B. Firmware
C. Library
D. Loader (2 marks)
22. Which of the following is NOT an element of a computer file stored on a hard disk or a solid states device?
A. Database
B. Metadata
C. File extension
D. File format (2 marks)
AD14 Page 3
Out of 8
23. The World Wide Web has vast amount of information that is useful in the business growth and strategy. What is
the name given to the software that is used for finding information over the internet?
A. Browser
B. chatGPT
C. Search Engine
D. Hypermedia (2 marks)
24. ABC Bank customer care department would like to serve its customers efficiently and effectively through
interactive human conversation with its clients. Which of the following interne t service is best suited to achieve
their goal?
A. World Wide Web
B. Instant Messaging
C. Internet
D. Intranet (2 marks)
25. The widespread adoption of ICT by the companies, organisations and individuals, has had a profound impact on
our society today. Which of the following technologies has revolutionized healthcare?
A. IoT
B. Video conferencing
C. Artificial intelligence
D. Telemedicine (2 marks)
26. The feature integrated in word processing software that provides users with the synonyms and the antonyms of
words is called?
A. Thesaurus
B. Kerning
C. Translate
D. Macros (2 marks)
27.
e
XYZ Ltd. has approached you for advise on how to manage and track money owed by customers. Suggest an
.k
accounting module which the company could use for automating invoicing, tracking payments and managing
.co
overdue accounts.
A. Account payables
B. Account receivables
pi
C. General ledger
D. Bank feeds (2 marks)
ho
28. State the name given to the ICT technology that combine different forms of media, such as text, graphics, audio
C
and video.
A. Multiplexing
B. Internet
C. Hybrid
D. Multimedia (2 marks)
29. The type of technology that allows organisations’ devices to connect to the internet over a local network without
requiring physical cables is referred to as _________________________.
A. Wireless Fidelity
B. Broadband
C. Baseband
D. Tethering (2 marks)
30. Which of the following is NOT a major factor to consider when acquiring a new Operating System for an
organisation’s computers?
A. Usability
B. Compatibility
C. Size
D. Support (2 marks)
31. Identify the type of computer hardware which is used to capture data that originates in audio form.
A. Headset
B. Microphone
C. Scanner
D. Speaker (2 marks)
AD14 Page 4
Out of 8
32. ___________________ is the process of restarting a computer that was initially on, to help improve overall
system performance.
A. Refreshing
B. Loading
C. Cold booting
D. Warm booting (2 marks)
33. Given the URL, “https://www.kasneb.or.ke”, identify the Top-Level Domain of the URL.
A. ke
B. https
C. kasneb
D. or (2 marks)
34. Which of the following emerging technology do the users use a headset to immerse them in a computer-generated
world that you can explore like the real world?
A. Machine Learning
B. Deep Learning
C. Augmented reality
D. Artificial Intelligence (2 marks)
35. The process of concealing sensitive data when being transmitted over the communication network to ensure
protection if intercepted by illegitimate persons is referred to as _________________________.
A. Eavesdropping
B. Encryption
C. Authentication
D. Authorisation (2 marks)
36. Which of the following issue is becoming a significant concern in the digital age, with the rise of social media
ke
platforms?
o.
i.c
A. Cyber security
op
.ch
B. Cyber terrorism
w
w
C. Misinformation
w
D. Gene editing (2 marks)
37. What type of information system, mimic the reasoning of a domain specialists to solve complex problems by
applying rules and logic?
A. Expert systems
B. Decision support systems
C. Knowledge based systems
D. Business intelligence systems (2 marks)
38. A state-of-the-art type of storage device that uses flash memory to store data with no moving parts, making them
faster, more durable, and less prone to mechanical failure compared to Hard Disk Drives (HDD) is known as?
A. USB Flash Drive
B. Optical Discs
C. Network Attached Storage (NAS)
D. Solid State Drive (SSD) (2 marks)
39. Which of the following functions of the Operating System is used for creating, deleting and renaming folders in a
computer system?
A. Memory management
B. Process management
C. File management
D. User Interface (2 marks)
40. Select the type of interface that uses visual elements such as icons, windows, buttons, menus, and other graphical
elements to represent commands.
A. GUI
B. WIMP
C. CLI
D. DOS (2 marks)
AD14 Page 5
Out of 8
41. The computer networking device that is used to amplify the signal as it travels over long distance to reduce
attenuation is called _________________________.
A. Router
B. Switch
C. Hub
D. Repeater (2 marks)
42. Which of the following type of processor is used for parallel processing, making them highly efficient for tasks
like gaming, video editing, and scientific simulations?
A. Central Processing Unit (CPU)
B. Tensor Processing Unit (TPU)
C. Graphics Processing Unit (GPU)
D. Quantum Processor (2 marks)
43. The interconnection of computers within two different organisations that do business together for communication
purpose is known as?
A. Extranet
B. Internet
C. Intranet
D. Hybrid (2 marks)
44. Programming languages are classified into different categories. Determine the category of the programming
language which uses mnemonic or symbolic codes to represent machine instructions.
A. High level language
B. Domain specific language
C. Assembly language
D. Machine language (2 marks)
45.
e
The type of software that is used to manage the systems resources such as the processor, memory and storage is
.k
referred to as _________________________.
.co
A. Utility software
B. Debugger
C. Translator
pi
46. Each file on a computer system has authorised user rights and permissions for security reasons. Which of the
following is NOT a type of user rights and permissions for a file?
C
A. Read
B. Audit
C. Write
D. Execute (2 marks)
47. Which of the following file organisation technique does the order of the records determine the order in which they
were created or modified?
A. Sequential
B. Serial
C. Indexed sequential
D. Clusters file organisation (2 marks)
48. The collection of interrelated components that work together to achieve a common goal as used in information
systems is called _________________________.
A. Graph
B. Network
C. Link
D. System (2 marks)
49. A mode of transmission where many bits flow together simultaneously from one computer to another computer is
referred to _________________________.
A. Serial transmission
B. Parallel transmission
C. Simplex mode
D. Full duplex (2 marks)
AD14 Page 6
Out of 8
50. Client/server architecture allows the network to centralise functions and applications in one or more dedicated file
servers. Which of the following is a client/server characteristic that allows a new technology to be easily
integrated into system?
A. Flexibility
B. Interoperability
C. Scalability
D. Accessibility (2 marks)
ke
o.
i.c
op
.ch
w
w
w
AD14 Page 7
Out of 8
ATD LEVEL I
This paper is made up of fifty (50) Multiple Choice Questions. Answer ALL questions by indicating the letter
(A, B, C or D) that represents the correct answer. Each question is allocated two (2) marks. Do NOT write anything
on this paper.
1. __________________ computers are lower than mainframe computers in terms of speed and storage capacity.
A. Macro
B. Hybrid
C. Mini
D. Super (2 marks)
A. 1st
pi
B. 2nd
3rd
ho
C.
D. 4th (2 marks)
C
4. _______________are used for interconnecting dissimilar networks that use different communication protocols.
A. Switches
B. Gateways
C. Routers
D. Bridges (2 marks)
5. _____________________is a type of a printer that prints one line at a time and has a predefined set of characters.
A. Laser
B. Drum
C. Inkjet
D. Impact (2 marks)
6. Output devices are key resources in a computer system. Which of the following is NOT a function of an output
unit?
AD14 Page 1
Out of 6
7. _________________enables you to calculate numbers related to rows and columns.
A. Window program
B. Spreadsheet program
C. Graphics program
D. Word program (2 marks)
8. _________________ acts as an intermediary between a computer user and the computer hardware.
A. Operating system
B. User thread
C. Superuser thread
D. Application program (2 marks)
9. In computer development, Integrated Circuit (IC) has played a crucial role. The use of IC in a computer has
_____________________.
A. Increased the amount of heating
B. Reduced the size and cost of computers
C. Reduced the peripheral devices to be used
D. Reduced the performance capacity of the computer (2 marks)
11. _______________is a device that can be used for both input and output processes.
A. Monitor
B. Speaker
ke
o.
C. Scanner
i.c
op
D. Modem (2 marks)
.ch
w
w
12. _________________is a word processing feature that catches most random typographical errors.
w
A. Grammar checker
B. Spell checker
C. Word checker
D. Find and replace (2 marks)
13. __________________refers to a temporary storage area that compensates for differences in data rate and data flow
between devices.
A. Buffer
B. Bus
C. Channel
D. Modem (2 marks)
14. In a CPU, choose the part that interprets a program’s instructions to initiate the control operations.
A. Logic unit
B. Control unit
C. Storage unit
D. Input (2 marks)
15. _________________refers to a collection of two or more computers that are located within a limited distance of
each other and are connected to each other directly or indirectly.
A. Internet
B. Intranet
C. Local Area Network
D. Wide Area Network (2 marks)
18. ___________________ refers to a network whose elements may be separated by some distance. It usually
involves two or more small networks and dedicated high-speed telephone lines.
19. In word processing, a document’s background color cannot be seen in which of the following view?
A. Web layout view
B. Print Preview
C. Reading View
D. Print Layout view (2 marks)
21. ________________feature enables us to send the same letter to different persons in word processing application.
e
A. Mail join .k
B. Mail copy
C. Mail insert
.co
D. Mail merge (2 marks)
A. Conditional formatting
B. IF statements
ho
C. Mail merge
D. VLOOKUP (2 marks)
C
24. A device that allows multiple computers to communicate with each other over a network is known as__________.
A. Network hub
B. Repeater
C. Modem
D. Network cable (2 marks)
25. Which of the following application software is capable of organising, storing and analysing data in tabular form?
A. Spreadsheet
B. Database
C. Word processing
D. Accounting (2 marks)
AD14 Page 3
Out of 6
26. Which of the following is TRUE about sharing a computer file?
A. Saves processing time
B. Increases storage space
C. Risk of infection is high
D. Increases its integrity (2 marks)
27. What is defined as a set of rules that governs communication between computers on a network?
A. Port
B. Protocol
C. Channel
D. Router (2 marks)
30. ________________ is the operating speed of a computer or its microprocessor, expressed in cycles per second?
A. Bus speed
B. Clock speed
ke
C. RAM speed
o.
i.c
D. Pulse speed (2 marks)
op
.ch
w
w
31. When setting up a local area network in an office, which of the following components is NOT necessary?
w
A. Switch
B. Repeater
C. Twisted pair cable
D. Computers (2 marks)
32. In a presentation software, what is the name of a predefined set of colours, fonts, and visual effects that you apply
to your slides for a unified, professional look?
A. Slide show
B. Animation
C. Transition
D. Theme (2 marks)
AD14 Page 4
Out of 6
36. When creating user accounts on a computer network, which factor is typically used for authentication?
A. Username and password
B. IP address and subnet mask
C. MAC address and hostname
D. Password and server name (2 marks)
37. Which network resource is commonly used for storing and organising files in a computer network?
A. Folders
B. Files
C. Printers
D. Servers (2 marks)
38. Which category of computer software includes programs that provide additional functionality to the operating
system, such as antivirus software or file compression tools?
A. System software
B. Application software
C. Utility programs
D. Operating software (2 marks)
39. Identify the best comparison and contrast of Local Area Network (LAN) and Wide Area Network (WAN) from the
statements below.
A. LAN covers a small area, while WAN covers a large geographic area
B. LAN typically has higher speed compared to WAN
C. LAN offers local accessibility, while WAN offers remote accessibility
D. WAN covers a larger area and has slower speed compared to LAN (2 marks)
40. The component in the Central Processing Unit (CPU), which sends out regular electrical pulses and keeps time for
all the components is known as_________________.
e
.k
A. Bus
B. Register
.co
C. Clock
D. Port (2 marks)
pi
A. It is volatile in nature
B. It is less costly in comparison to primary memory
C
43. In an operating system, which is the user account with the highest privilege?
A. Super user
B. Local user
C. Guest user
D. Remote user (2 marks)
44. An operating system which allows many users to share computer resources simultaneously is referred to as?
A. Batch system
B. Time sharing system
C. Distributed system
D. Multiuser system (2 marks)
AD14 Page 5
Out of 6
45. What is the name of the input device shown below?
A. Digital tablet
B. Light pen
C. Joystick
D. Barcode reader (2 marks)
ke
o.
centre goes down (2 marks)
i.c
op
.ch
48. The following are some reasons for renaming a file, EXCEPT______________.
w
w
A. To back up files to be used later in the recovery process in case of damage
w
B. To correct obvious errors in filenames, including misspelled proper nouns, incorrect dates, and
misidentified objects
C. To harmonise the names of a set of images so that only one part of all names differs
D. To change from a meaningless or ambiguous name to a name that describes what the image particularly
displays (2 marks)
49. A modification to a program to improve its security, performance, or other feature is known as____________.
A. Software patch
B. Software version
C. Backup
D. Recovery (2 marks)
50. The following requirements are necessary when choosing an appropriate accounting package. Which one is NOT?
A. Size of business
B. Features available
C. Vendor support
D. Type of processor (2 marks
………………………….……………………………………………….
AD14 Page 6
Out of 6
ATD LEVEL I
Answer any FIVE questions. ALL questions carry equal marks. Do NOT write anything on this paper.
QUESTION ONE
(a) Explain the function of each of the following utility programs:
(b) Propose a reason that might necessitate the use of rehearse timing feature in a presentation program. (2 marks)
(c) Outline THREE circumstances that could necessitate the use of a light pen as a computer input device. (3 marks)
(d)
e
Bidii Society Ltd installed an electronic spreadsheet program for use in its operations.
.k
Outline THREE ways in which this program could be used. (3 marks)
.co
(e) Outline FOUR reasons that would necessitate an organisation to connect its computers to a Local Area Network
pi
(LAN). (4 marks)
ho
QUESTION TWO
(a) (i) Define the term “anchor cell” as used in a spreadsheet. (1 mark)
(ii) Using an illustration of a worksheet, explain how you would calculate and display total sales. (3 marks)
(b) Giving an example in each case, distinguish between a “minicomputer” and a “microcomputer”. (4 marks)
(c) Citing examples, differentiate between hard copy and soft copy types of outputs. (4 marks)
(d) Explain TWO reasons why Universal Serial Bus (USB) devices have become more popular with computer users.
(4 marks)
(e) Compare local user accounts and network user accounts in context of operating systems. (4 marks)
(Total: 20 marks)
QUESTION THREE
(a) John Ochola desires to acquire a computer for use in his hardware supplies shop.
(i) State TWO factors that he would need to look for when getting the computer, he will need to buy.
(2 marks)
(ii) Explain TWO types of system software that he may need to acquire. (4 marks)
(iii) Suggest with a reason in each case, the TWO application software that might be necessary. (4 marks)
AD14 Page 1
Out of 2
(b) Highlight FOUR challenges associated with the use of command line interface (CLI). (4 marks)
(c) Joyce Njenga intends to set up a local area network (LAN) to use in her small business premise.
Explain THREE networking hardware tools that she may require to carry out this task. (6 marks)
(Total: 20 marks)
QUESTION FOUR
(a) Highlight THREE disadvantages of a Wireless Network. (3 marks)
(b) Explain FOUR benefits of Quick Response (QR) codes over bar codes. (4 marks)
(c) Describe FIVE file management tasks of a computer operating system. (5 marks)
(d) Examine FOUR reasons why many organisations have embraced cloud storage. (8 marks)
(Total: 20 marks)
QUESTION FIVE
(a) (i) Outline THREE negative impacts of information communication technology on the environment.
(3 marks)
(ii) Describe THREE technology trends that pose ethical issues. (3 marks)
(c) Highlight FOUR circumstances under which the use of wireless communication would be preferred in data
communication. (4 marks)
ke
o.
(d) Examine SIX problems associated with using e-mail technology for communication. (6 marks)
i.c
op
(Total: 20 marks)
.ch
w
w
QUESTION SIX
w
(a) Explain the concept of scheduling in reference to operating systems. (2 marks)
(d) Using relevant examples, distinguish between a “formula” and “function” in the context of spreadsheet. (4 marks)
(e) Distinguish between “multi user” and “single user” operating systems as used in computing. (4 marks)
(f) Examine SIX factors that you could consider when selecting a computer programming language. (6 marks)
(Total: 20 marks)
QUESTION SEVEN
(a) Excellent college intends to purchase a computerised accounting software for students’ use.
Required:
State FOUR features of such applications. (4 marks)
(c) Outline FIVE challenges of coping with 3D printer’s technology trend in the market. (5 marks)
(d) Explain THREE positive impacts of the internet to business operations. (6 marks)
(Total: 20 marks)
………………………….……………………………………………….
AD14 Page 2
Out of 2
ATD LEVEL I
Answer any FIVE questions. ALL questions carry equal marks. Do NOT write anything on this paper.
QUESTION ONE
(a) (i) Identify TWO reasons why a menu driven interface is suitable for a novice user. (2 marks)
Summarise FOUR factors that ABC Ltd. would consider in confirming that the software is appropriate to XYZ
Company.
(4 marks)
(c) In a busy office environment, a non-impact printer may be better than an impact printer.
e
State THREE reasons to justify this statement.
.k (6 marks)
.co
(d) Application software can either be “off-the-shelf” or “bespoke”.
pi
Differentiate between the above two types of application software using the following features:
(i) Flexibility.
ho
(ii) Functionality.
C
QUESTION TWO
(a) Suggest THREE important features to consider when buying a computer keyboard. (3 marks)
(c) Highlight FIVE reasons why flash disks have become more popular than optical disks. (5 marks)
(d) Discuss FOUR salient features of computerised accounting software (CAS). (8 marks)
(Total: 20 marks)
QUESTION THREE
(a) Explain FOUR activities that are performed by an operating system during management of Input/output devices
and ports. (4 marks)
(b) Explain the purpose of a switch and a router in a wireless LAN (WLAN). (4 marks)
(c) Highlight THREE advantages and THREE disadvantages of network operating systems. (6 marks)
AD14 Page 1
Out of 2
QUESTION FOUR
(a) Outline THREE reasons why it is important to create different user accounts in a computer network. (3 marks)
(c) An accounting software is supposed to ensure security, integrity and confidentiality of data.
Describe THREE security features that an accounting software should have. (6 marks)
(d) Explain THREE reasons why you would recommend the use of a CAT 6 cable.
(6 marks)
(Total: 20 marks)
QUESTION FIVE
(a) Highlight TWO factors to consider when choosing an operating system. (2 marks)
(b) Explain THREE criteria that should be considered when setting up a local area network. (6 marks)
(c) Evaluate SIX reasons why a business organisation may want to use PDF files. (6 marks)
ke
o.
i.c
(iii) Processing. (2 marks)
op
.ch
w
(iv) Virus. (2 marks)
w
w
(b) Joyce Wambua intends to connect all her computers to the internet.
Outline THREE hardware requirements she will need to accomplish this task. (3 marks)
(c) Explain FOUR file management activities that are done by the operating system. (4 marks)
(d) James Okoth was tasked with acquiring an application software for an organisation.
Explain FIVE features that he should consider when buying the software. (5 marks)
(Total: 20 marks)
QUESTION SEVEN
(a) Outline THREE benefits of using wireless fidelity technology for network connectivity. (3 marks)
(b) Highlight THREE advantages of using a word processor software over a type writer. (3 marks)
(c) State FOUR factors which may prevent computer users from using speech input devices. (4 marks)
(e) An operating system provides a standard interface between a computer user and the computer system for
communication.
Other than a menu driven interface, explain TWO types of interfaces citing their application areas. (6 marks)
(Total: 20 marks)
………………………….……………………………………………….
AD14 Page 2
Out of 2
C
ho
pi
.co
.k
e
w
w
w
.ch
op
i.c
o.
ke
ATD LEVEL I
PILOT PAPER
QUESTION ONE
(a) Discuss five factors to be considered before acquiring an appropriate software for an organisation (10 marks)
(b) Explain five benefits in the acquisition of a bespoke software to an organisation. (10 marks)
(Total: 20 marks)
QUESTION TWO
(a) Explain five reasons why a computer system may fail to boot. (10 marks)
(b) State five ways of ensuring safety of data stored on CD-RW. (10 marks)
(Total: 20 marks)
QUESTION THREE
e
.k
A private organisation has decided to acquire a customised/tailor made software for its business operations.
.co
Required:
(a) Explain the term “customized/tailor made” software. (2 marks)
pi
(b) Summarize five advantages of acquiring the software in (3)(a) above. (10 marks)
ho
(c) Explain four factors that an organisation should consider when acquiring tailor made software. (8 marks)
(Total: 20 marks)
C
QUESTION FOUR
(a) Identify four input devices that could be used in a supermarket. (4 marks)
(c) Discuss five phases in the information technology infrastructure evolution. (10 marks)
(Total: 20 marks)
QUESTION FIVE
(a) Differentiate between “system software” and “application software”. (8 marks)
(b) Explain three factors that a company could consider when choosing an online data storage. (6 marks)
AD14 Page 1
Out of 2
QUESTION SEVEN
(a) Explain five factors that could determine the processing power of a computer. (10 marks)
(b) List five external storage devices that could be used to transfer information from one computer to another.
(5 marks)
(c) State five household appliances that could use computer control system. (5 marks)
(Total: 20 marks)
ke
o.
i.c
op
.ch
w
w
w
AD14 Page 2
Out of 2
C
ho
pi
.co
.k
e
w
w
w
.ch
op
i.c
o.
ke
C
ho
pi
.co
.k
e
w
w
w
.ch
op
i.c
o.
ke
C
ho
pi
.co
.k
e
w
w
w
.ch
op
i.c
o.
ke
C
ho
pi
.co
.k
e
w
w
w
.ch
op
i.c
o.
ke
C
ho
pi
.co
.k
e
w
w
w
.ch
op
i.c
o.
ke
C
ho
pi
.co
.k
e
w
w
w
.ch
op
i.c
o.
ke
C
ho
pi
.co
.k
e
w
w
w
.ch
op
i.c
o.
ke
C
ho
pi
.co
.k
e
w
w
w
.ch
op
i.c
o.
ke
C
ho
pi
.co
.k
e
w
w
w
.ch
op
i.c
o.
ke
C
ho
pi
.co
.k
e
w
w
w
.ch
op
i.c
o.
ke
C
ho
pi
.co
.k
e
w
w
w
.ch
op
i.c
o.
ke
C
ho
pi
.co
.k
e
w
w
w
.ch
op
i.c
o.
ke
C
ho
pi
.co
.k
e
w
w
w
.ch
op
i.c
o.
ke
C
ho
pi
.co
.k
e
w
w
w
.ch
op
i.c
o.
ke
ATD LEVEL I
Answer any FIVE questions. ALL questions carry equal marks. Do NOT write anything on this paper.
QUESTION ONE
(a) Differentiate between the terms “computer” and “computer system”. (4 marks)
(b) In each case, draw a diagram to illustrate:
(c) Explain the functions of each of the components in (b) (ii) above. (8 marks)
(Total: 20 marks)
QUESTION TWO
(a) Explain the difference between the following:
e
.k
(i) A mainframe computer and a super computer. (2 marks)
.co
(ii) Application software and system software citing examples. (4 marks)
(b) Suggest two reasons why a bank might wish to buy a mainframe computer. (2 marks)
pi
(c) State the technology used in each of the following generations of computers:
ho
(d) Discuss four factors that might affect the speed of the microprocessor. (8 marks)
(Total: 20 marks)
QUESTION THREE
(a) Highlight six safety rules for using computers. (6 marks)
(b) Citing the function in each case, state four types of special keys in a computer keyboard. (8 marks)
(c) Complete the table below by explaining the differences between a file and a folder in the context provided.
An example is given below with regard to space.
Context File Folder
Space A file takes up space in RAM A folder cannot take up space in RAM
(i) Container of files
(ii) Content (data)
(iii) Operations
(iv) Extensions
(v) Sharing on network
(vi) Copying data from one to
another
(6 marks)
(Total: 20 marks)
AD14 Page 1
Out of 3
QUESTION FOUR
(a) Describe the following types of optical storage devices:
(c) Citing a reason in each case, describe the most appropriate type of printer for the output of:
QUESTION FIVE
ke
(a) Describe the following spreadsheet components:
o.
i.c
op
.ch
(i) A worksheet. (2 marks)
w
w
w
(ii) A database function. (2 marks)
(iii) A chart. (2 marks)
(b) Evaluate four criteria to consider when choosing the type of local area network (LAN) to implement. (8 marks)
(c) Examine four advantages and two disadvantages of a computerised accounting system (CAS). (6 marks)
(Total: 20 marks)
QUESTION SIX
(a) In the context of presentation software, distinguish between the following:
(b) Using an example, differentiate between on-line storage and off-line storage. (4 marks)
(c) Mathiu has created a word processing document containing ten pages. He wishes to print two copies of this
document containing odd pages only.
Specifying the word processing packages used, suggest the steps he would follow to achieve this objective.
(4 marks)
(d) Using an example in each case, explain the following terms as used in a spreadsheet software:
AD14 Page 2
Out of 3
QUESTION SEVEN
(a) Describe each of the following devices as used in computer networking:
(b) Miriam Sawe has the following files saved in her computer:
Miri.docx, Miri.rtf, Miri.xls, Miri.accdb
Required:
Identify the application software that she used to create each of the files above. (4 marks)
(c) Describe three advantages of Graphical User Interface (GUI) operating system. (6 marks)
e
.k
.co
pi
ho
C
AD14 Page 3
Out of 3
w
w
w
.ch
op
i.c
o.
ke
C
ho
pi
.co
.k
e
w
w
w
.ch
op
i.c
o.
ke
C
ho
pi
.co
.k
e
w
w
w
.ch
op
i.c
o.
ke
C
ho
pi
.co
.k
e
w
w
w
.ch
op
i.c
o.
ke