0% found this document useful (0 votes)
71 views83 pages

ICT Past Papers

The document is an examination paper for ATD Level I in Information Communication Technology, scheduled for December 5, 2024. It contains 50 multiple-choice questions, each worth 2 marks, covering various topics related to computer systems, software, and networking. Candidates are instructed to answer all questions without writing on the paper.

Uploaded by

Daisy chepkirui
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
71 views83 pages

ICT Past Papers

The document is an examination paper for ATD Level I in Information Communication Technology, scheduled for December 5, 2024. It contains 50 multiple-choice questions, each worth 2 marks, covering various topics related to computer systems, software, and networking. Candidates are instructed to answer all questions without writing on the paper.

Uploaded by

Daisy chepkirui
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 83

ATD LEVEL I

INFORMATION COMMUNICATION TECHNOLOGY

THURSDAY: 5 December 2024. Morning Paper. Time Allowed: 2 hours.

This paper consists of fifty (50) Multiple Choice Questions. Answer ALL questions by indicating the letter
(A, B, C or D) that represents the correct answer. Each question is allocated two (2) marks. Do NOT write anything
on this paper.

1. Virtual memory handles limited RAM by______________.


A. compressing data to fit into RAM
B. allocating only the necessary memory for running processes
C. expanding the physical memory capacity
D. replacing the need for physical memory (2 marks)

2. The storage area used to store data to compensate for the difference in speed at which different units can handle data
is known as______________.
A. memory
B. buffer

ke
C. accumulator

o.
i.c
D. address (2 marks)

op
.ch
w
w
3. An integrated circuit is_____________.

w
A. a complicated circuit
B. an integrating device
C. costlier than a single transistor
D. fabricated on a tiny silicon chip (2 marks)

4. Which one of the following refers to a collection of hyper linked document on the internet?
A. WWW
B. Html
C. Email
D. Internet (2 marks)

5. Which one of the following network devices is used to connect two dissimilar types of network?
A. Hub
B. Switch
C. Bridge
D. Gateway (2 marks)

6. Which one of the following network devices is used to boost-up weak signal?
A. Repeater
B. Modem
C. Router
D. Switch (2 marks)

7. Data moves in and out of the Central Processing Unit (CPU) through embedded wires called____________.
A. bus
B. electronic wires
C. lines
D. cables (2 marks)

AD14 Page 1
Out of 6
8. Which one of the following component is used to measure the speed of a Central Processing Unit (processor)?
A. Processing speed
B. Unit
C. Coprocessor
D. Clock speed (2 marks)

9. Which one of the following devices instructs the computer hardware on what to do and how to do it?
A. Hardware
B. Operating system
C. Software
D. Device driver (2 marks)

10. Which one of the following application software can be used to create, edit and print documents?
A. Spreadsheet
B. Word processing
C. Database software
D. Desktop publishing (DTP) (2 marks)

11. Which one of the following types of software is an accounting package?


A. System Software
B. Application Software
C. Utility Software
D. Basic Software (2 marks)

12. The PowerPoint view that displays each slide of the presentation as a thumb nail and is useful for rearranging slides
is known as____________.
A. slide master
B. slide show
C. slide sorter
e
.k
D. notes page (2 marks)
.co
13. Which one of the following is NOT an essential function of a word processing software package?
A. Indexing
B. Saving
pi

C. Editing
D. Formatting (2 marks)
ho

14. A numeric data analysis tool that allows one to create a computerised ledger is referred to as_________________.
C

A. word processing package


B. spreadsheet package
C. graphics package
D. mathematical package (2 marks)

15. The type of system that enables many people located at various terminals to use a particular computer system at the
same time is known as________________.
A. batch operating system
B. multitasking operating system
C. time-sharing operating system
D. distributed operating system (2 marks)

16. Which one of the following terms refers to the heart of an operating system?
A. Thread
B. Virtual memory
C. Semaphore
D. Kernel (2 marks)

17. Which one of the following is a type of system software?


A. Special purpose
B. Public domain software
C. Device driver
D. Application software (2 marks)

AD14 Page 2
Out of 6
18. Which one of the following statements is an advantage of sharing a computer file?
A. Increases infection of malware and viruses
B. Eliminates multiple file versions
C. Increases chance of unauthorised access
D. Possible copyright and plagiarism (2 marks)

19. Most of the system software are developed using a programming language known as______________.
A. machine
B. assembly
C. high level
D. fourth generation (2 marks)

20. Identify the name of the output device below:

A. Printer
B. Plotter
C. Projector

ke
o.
D. Microfilm (2 marks)

i.c
op
.ch
21. The utility in windows operating system, that is used to draw, create and edit graphics is known as____________.

w
w
A. paint

w
B. notepad
C. wordPad
D. CorelDraw (2 marks)

22. Which one of the following is part of a computer microprocessor?


A. ROM
B. CMOS
C. RAM
D. Cache (2 marks)

23. The main function of an operating system is that it _____________.


A. turns digital data into printed media
B. communicates with the computer user
C. manages business processes
D. enhances the computer's functionality by adding features and capabilities (2 marks)

24. Which one of the following is a disadvantage of application software?


A. Immediately available
B. Long-term cost implication
C. Well documented
D. Quick and easy to implement (2 marks)

25. The method of exchanging messages between digital computers through the internet is known as_____________.
A. uniform Resource Locator
B. World Wide Web
C. electronic Mail
D. E-Commerce (2 marks)

AD14 Page 3
Out of 6
26. Which one of the following factors should be considered when choosing an appropriate accounting package for a
business?
A. Speed of the processor
B. Size of business
C. Size of computer available
D. Capacity of read only memory available (2 marks)

27. A text modifying feature in Microsoft Word, that includes effects such as shadows, outlines, colours, gradients and
3D effects that can be added to a word or phrase is known as _______________.
A. Word wrap
B. Drop cap
C. WordArt
D. Thesaurus (2 marks)

28. Which one of the following is an example of a category of application software that allows users to create a
presentation of ideas by stringing together text, images and audio/video?
A. PowerPoint
B. CorelDraw
C. PageMaker
D. AutoCAD (2 marks)

29. The following are characteristics of a type of a network.


 It is the smallest network of computers
 Bluetooth or other infrared-enabled devices could be used to connect devices
 Enables a single person's personal devices to connect with each other

Which one of the following networks is described above?


A. Personal Area Network (PAN)
B. Local Area Network (LAN)
e
.k
C. Metropolitan Area Network (MAN)
.co
D. Wide Area Network (WAN) (2 marks)

30. Which one of the following statements BEST describes a router?


pi

A. High-speed device that receives and redirects data packets on a Local Area Network (LAN)
B. Hardware component that converts analogue signals to digital data and vice versa
ho

C. Networking device that forwards data packets between computer networks


D. Network node or device that connects two networks that use different transmission protocols (2 marks)
C

31. Which one of the following network topology combines two or more different network topologies?
A. Star
B. Hybrid
C. Ring
D. Mesh (2 marks)

32. Which one of the following statements is TRUE about a computer folder?
A. It occupies a certain amount of memory
B. It cannot be shared on a network
C. It does not have extension
D. It is a collection of data (2 marks)

33. Which one of the following statements BEST describes integrity in security?
A. Protecting information from unauthorised access and misuse
B. Process of determining whether a user or entity has the necessary rights
C. Protection of system data from intentional or accidental unauthorised changes
D. Process of verifying whether someone (or something) is what it is declared to be (2 marks)

34. Which one of the following types of user interface is BEST described as one that uses a list of options to navigate a
program or website?
A. Speech user interface
B. Menu driven interface
C. Graphical user interface
D. Command line interface (2 marks)
AD14 Page 4
Out of 6
35. The purpose of a file system in an operating system is to_____________.
A. control the input and output devices
B. allocate and deallocate system memory
C. manage and organise files on storage devices
D. provide a user interface for applications (2 marks)

36. In a networked environment, which one of the following statements refers to the purpose of assigning user
permissions during the account creation process?
A. To limit the number of user accounts
B. To increase system performance
C. To control what actions and resources a user can access
D. To improve network security (2 marks)

37. The importance of having customisable data entry screens in computerised accounting software is to___________.
A. make the system harder to use and prevent unauthorised access
B. ensure the screens match specific needs and workflows of a business
C. limit the flexibility of data capture
D. enforce a single standard for all businesses (2 marks)

38. The feature that allow users to create a pre-formatted document for various purposes, such as resumes or reports is
known as _______________.
A. styles
B. templates
C. themes
D. macros (2 marks)

39. The purpose of Random Access Memory (RAM) in a computer is to _______________.


A. permanently store user files and documents

ke
B. hold data temporarily for quick access by the CPU

o.
i.c
C. enhance the audio output of the computer

op
.ch
D. cool down the internal components of the computer (2 marks)

w
w
w
40. The difference between a Hard Disk Drive (HDD) and a Solid State Drive (SSD) in terms of data storage
technology is that ____________.
A. HDD uses magnetic storage, while SSD uses integrated circuits
B. HDD enhances the computer’s audio capabilities, while SSD improves video quality
C. HDD is used for data backup only, while SSD is used for primary storage
D. HDD is a type of display technology, while SSD is a type of processor (2 marks)

41. The function of a graphics card in a computer system is to_______________.


A. process and render visual data to display images on the monitor
B. increase the storage capacity of the computer
C. enhance the speed of the internet connection
D. serve as the primary input device for user commands (2 marks)

42. An IP address in network communication________________.


A. serves as a unique identifier for devices on a network
B. acts as a password for secure online transactions
C. enhances the graphics quality of online games
D. increases the storage capacity of cloud services (2 marks)

43. Which one of the following statements differentiates between “volatile memory” and “non-volatile memory” based
on their characteristics?
A. Volatile memory retains data without power; non-volatile does not
B. Volatile memory loses data without power; non-volatile retains it
C. Both types of memory retain data without power
D. Both types of memory lose data without power (2 marks)

AD14 Page 5
Out of 6
44. Which one of the following statements is the appropriate action to safely remove a USB drive from a Windows’
computer?
A. Eject through the “My Computer” window
B. Pull out the USB drive without any prior action
C. Disable the USB port from Device Manager
D. Turn off the computer and then remove the USB drive (2 marks)

45. Which one of the following is a formula in a spreadsheet to calculate the sum of cells, A1 through A10?
A. =SUM (A1:A10)
B. =ADD (A1:A10)
C. =TOTAL (A1:A10)
D. =COMBINE (A1:A10) (2 marks)

46. Which one of the following statements explains the difference between solid-state drives (SSD) and hard disk drives
(HDD) in terms of data retrieval speed?
A. SSDs are slower because they have no moving parts
B. HDDs are faster because they use spinning disks
C. SSDs are faster because they access data electronically without moving parts
D. There is no difference in speed between SSDs and HDDs (2 marks)

47. Which one of the following statements would construct a user-friendly interface for a mobile banking application
that ensures security and ease of use?
A. Use complex navigation menus, require multiple logins for each action
B. Implement biometric authentication, clear navigation and quick access to common tasks
C. Provide no security features, prioritise aesthetic design over functionality
D. Require users to write code to perform transactions (2 marks)

48. Which one of the following statements correctly appraises the effectiveness of using a mesh network in a large
office compared to a traditional Wi-Fi network?
e
.k
A. Mesh networks are less effective due to increased complexity
.co
B. Traditional Wi-Fi networks are always superior regardless of office size
C. Mesh networks provide better coverage and reliability in large spaces
D. There is no difference in effectiveness between mesh and traditional Wi-Fi networks (2 marks)
pi

49. The primary form of data input for first generation computers is_______________.
ho

A. punch cards
B. magnetic tape
C

C. floppy disks
D. optical discs (2 marks)

50. Which one of the following type of printer does not use ink or toner to create images on paper?
A. Dot matrix printer
B. Inkjet printer
C. Laser printer
D. Thermal printer (2 marks)

………………………….…………………………………

AD14 Page 6
Out of 6
ATD LEVEL I

INFORMATION COMMUNICATION TECHNOLOGY

THURSDAY: 22 August 2024. Morning Paper. Time Allowed: 2 hours.

This paper consists of fifty (50) Multiple Choice Questions. Answer ALL questions by indicating the letter
(A, B, C or D) that represents the correct answer. Each question is allocated two (2) marks. Do NOT write anything
on this paper.

1. Which one of the following statements is an advantage of computerisation?


A. Reduces employee’s productivity
B. Increases paper work
C. Leads to digital divide
D. Creates employment for skilled personnel (2 marks)

2. A system software component responsible for performing common tasks is known as _________________.
A. utility program
B. language translator
C. operating system

ke
D. device driver (2 marks)

o.
i.c
op
3. A computer component that acts as a connection point or interface between a computer and external or internal

.ch
w
device is known as _____________.

w
w
A. device controller
B. device driver
C. computer port
D. expansion slot (2 marks)

4. A feature that enables a user to send a similar letter or document to multiple recipients is found in an application
called _______________.
A. word processor
B. spreadsheet
C. presentation
D. database (2 marks)

5. A high-speed device that receives incoming data packets and redirects them to their destination on a Local Area
Network (LAN) is known as ______________.
A. switch
B. gateway
C. bridge
D. router (2 marks)

6. Which one of the following statements is a disadvantage of sharing a computer file?


A. Saves time
B. Eliminates multiple file versions
C. Increases risk of infection
D. Saves money (2 marks)

7. Which one of the following statements is an advantage of a word processing software?


A. You need to have access to a computer which has word processing software installed
B. It takes time to learn to use the program effectively
C. Easier to use due to automated features
D. People can become reliant on using the word processor and their handwriting skills can deteriorate
(2 marks)
AD14 Page 1
Out of 6
8. A word processor feature where the first character of a paragraph is made larger, taking up several lines of text is
known as ______________.
A. word wrap
B. drop cap
C. wordart
D. thesaurus (2 marks)

9. The following are components of a computer:


Register;
Port;
Bus;
RAM.

The two components which are contained in a computer processor are:


A. Register and port
B. Register and bus
C. Port and bus
D. Port and RAM (2 marks)

10. A type of an operating system which allows a single Central Processing Unit (CPU) to execute what appears to be
more than one program at the same time is known as _________________.
A. multiprocessing
B. multiprogramming
C. multi-user
D. multitasking (2 marks)

11. Which one of the following statements refers to an advantage of Information Communication Technology (ICT) in
education sector?
A.
e
When used in the classroom it can be a distraction
B. Detracts students from social interactions
.k
C. Its use motivates learning
.co
D. Can foster cheating
(2 marks)
pi

12. The name of a computer network where electronic devices within an individual person's workspace are
interconnected is called ______________.
ho

A. Personal Area Network (PAN)


B. Metropolitan Area Network (MAN)
C. Wide Area Network (WAN)
C

D. Virtual Private Network (VPN) (2 marks)

13. A high-performance computer system that is designed for a single user and has advanced graphics capabilities,
large storage capacity and a powerful processor is known as _____________.
A. mainframe
B. server
C. workstation
D. supercomputer (2 marks)

14. An information security control measure that is used to transform usable information into a form that renders it
unusable by anyone other than an authorised user is known as _________________.
A. intrusion detector
B. firewall
C. biometric
D. cryptography (2 marks)

15. Which one of the following statements BEST describes the function of Magnetic Ink Character Recognition
(MICR) method of capturing data?
A. Converts the physical action to be measured into an electrical equivalent and processes it so that the
electrical signals can be easily sent and further processed
B. Verifies the legitimacy or originality of paper documents, especially bank cheques
C. Converts an image of text into a machine-readable text format
D. Scans and captures the optical marks on such documents as the multiple-choice scoring sheets (2 marks)

AD14 Page 2
Out of 6
16. Which one of the following statements BEST describes the function of a slide master view?
A. It shows the layout of your presentation as it is printed out on paper
B. It allows to change the layout for every single note section in your project
C. It allows a colourful presentation to be shown
D. It allows you edit and create your own layouts (2 marks)

17. A financial organisational tool that provides an index of every account in an accounting system is called a
______________.
A. general ledger
B. chart of accounts
C. customers’ ledger
D. suppliers’ ledger (2 marks)

18. The following are features of a programming language:


• It the machine dependent
• Execution speed is high
• Mnemonics are used as programming code

The above statements describe features of _____________ programming language.


A. machine
B. assembly
C. high level
D. fourth generation (2 marks)

19. The term animation can BEST be defined as ___________________.


A. the effect that takes place when you advance from one slide to the next
B. an item that you create or a graphic that you import from another source
C. the file containing the collection of slides

ke
D. visual or sound effect accompanying text or graphics (2 marks)

o.
i.c
op
.ch
20. Which one of the following factors is NOT necessary in determining the speed of a computer processor?

w
A. Operating system installed

w
w
B. Bus size
C. Number of cores available
D. Capacity of main memory (2 marks)

21. Which one of the following statements is TRUE about a twisted pair cable?
A. It supports high bandwidth levels
B. It carries signals over longer distances
C. It is relatively easy to implement and terminate
D. It offers better reliability (2 marks)

22. The process of verifying the identity of a user, process or device before allowing access to resources in an
information system is known as _______________.
A. authorisation
B. automation
C. authentication
D. non-repudiation (2 marks)

23. The type of an operating system design that allows multiple users or processes to concurrently share the same
system resources is known as ______________.
A. batch system
B. distributed system
C. multiprocessing system
D. time sharing system (2 marks)

24. The type of an application software created to execute one particular task is known as _____________.
A. bespoke
B. special purpose
C. general purpose
D. customised (2 marks)

AD14 Page 3
Out of 6
25. Input devices includes ____________________.
A. monitor and printer
B. keyboard and mouse
C. CPU and RAM
D. hard disk and CD-ROM (2 marks)

26. The basic components of a computer network are ___________________.


A. server, client, transmission medium and NIC
B. router, switch, hub and firewall
C. internet, intranet, extranet and VPN
D. LAN, WAN, MAN and PAN (2 marks)

27. The MOST appropriate device to read the information set on a barcode of a product is a ______________.
A. printer
B. scanner
C. keyboard
D. monitor (2 marks)

28. The formula used to calculate the average of the values in cells A1 to A10 is ________________.
A. =AVERAGE(A1:A10)
B. =SUM(A1:A10)
C. =MEAN(A1:A10)
D. =AVER(A1:A10) (2 marks)

29. Which one of the following steps would you take when sharing a file with another computer on the same network?
A. Right-click the file, select share, choose the computer you want to share with and click OK
B. Drag the file to the appropriate folder, open the network folder on the other computer and copy the file
C. Email the file to the other computer, open the email on the other computer and download the file
D.
e
Using share point, right click on the file, on the context menu, choose the destination computer (2 marks)
.k
30. The computer network components responsible for directing data packets between networks is known as a
.co
_______________.
A. server
pi

B. client
C. route
ho

D. switch (2 marks)

31. Which one of the following storage devices provides the FASTEST access to data in a computer system?
C

A. Solid State Drive (SSD)


B. Optical Disc Drive (ODD)
C. Magnetic Tape Drive (MTD)
D. Floppy Disk Drive (FDD) (2 marks)

32. The volatile memory type that loses its data when the power is turned off is known as ________________.
A. hard disk
B. ram (random access memory)
C. ssd (solid state drive)
D. flash memory (2 marks)

33. Which one of the following components is responsible for managing and coordinating the activities of all
hardware components in a computer system?
A. Motherboard
B. Power supply
C. Hard drive
D. Graphics card (2 marks)

34. The purpose of an operating system in a computer is to ________________.


A. store files and folders
B. control and manage hardware resources
C. connect to the internet
D. create graphic designs (2 marks)

AD14 Page 4
Out of 6
35. The type of software that serves as an intermediary between the operating system and the computer hardware,
managing the flow of data and instructions is known as _______________.
A. device drivers
B. application software
C. system utilities
D. firmware (2 marks)

36. Which one of the following types of software is responsible for managing computer’s hardware components and
providing a platform for application software to run?
A. Application software.
B. Atility software
C. System software
D. Middleware (2 marks)

37. The primary purpose of a Graphical User Interface (GUI) in computer systems is to ___________________.
A. manage file storage and organisation
B. provide a visual way for users to interact with a computer
C. allocate system memory for applications
D. establish network connections between devices (2 marks)

38. Which one of the following statements explains the function of the "taskbar" in a graphical user interface?
A. Manage file permissions
B. Provide a space for organising desktop icons
C. Display open applications and facilitate quick access
D. Control the computer's hardware components (2 marks)

39. The function of a file extension in the context of file management is to ________________.
A. indicate the type of file and the program that can open it

ke
B. determine the file's location on the computer

o.
i.c
C. manage file permissions

op
D. allocate system memory for the file (2 marks)

.ch
w
w
w
40. The purpose of the “copy” function in file management is to _______________.
A. create a duplicate of a file in the same location
B. move a file from one location to another
C. permanently delete a file from the system
D. open and view the contents of a file (2 marks)

41. The purpose of slide transitions in a presentation is to _________________.


A. change the color scheme of the slides
B. add animation effects to text and images
C. control the flow between one slide and the next
D. insert hyperlinks to external websites (2 marks)

42. The primary purpose of a computerised accounting software is __________________.


A. managing inventory in a business
B. tracking and recording financial transactions
C. designing marketing campaigns
D. creating graphic designs for promotional materials (2 marks)

43. Which one of the following features in a computerised accounting software allows automatic calculation of
financial data based on predefined formulas?
A. Config function
B. General ledger
C. Formula editor
D. Automatic reconciliation (2 marks)

44. The primary purpose of creating user accounts in a computer system is to _______________.
A. enhance the computer's processing speed
B. manage and control access to system resources
C. uninstall software applications
D. organise files and folders (2 marks)
AD14 Page 5
Out of 6
45. The memory technique used to increase main memory capacity beyond the limits of physical memory is known as
_______________.
A. virtual memory
B. cache memory
C. register memory
D. flash memory (2 marks)

46. An example of a printer commonly used for printing labels and barcodes is a(n) ____________________.
A. inkjet printer
B. laser printer
C. dot-matrix printer
D. thermal printer (2 marks)

47. Which one of the following statements BEST describes first generation programming languages?
A. Platform-independent
B. Easy to understand for humans
C. Translatable by a compiler
D. Executable directly by the CPU (2 marks)

48. The type of network topology where failure of a single device result in the failure of the entire network is known
as _______________.
A. star
B. ring
C. bus
D. mesh (2 marks)

49. Which one of the following data transmission line is MOSTLY associated with the "RJ-45" connector?
A. Coaxial cable
B. Fiber optic cable
e
C. Twisted pair cable
.k
D. Ethernet cable (2 marks)
.co

50. Which one of the following is both an input and an output device?
pi

A. LED Printer
B. Touch screen
ho

C. Stylus pen
D. Wireless keyboard (2 marks)
C

………………………….……………………….……………………………….

AD14 Page 6
Out of 6
ATD LEVEL I

INFORMATION COMMUNICATION TECHNOLOGY

THURSDAY: 25 April 2024. Morning Paper. Time Allowed: 2 hours.

This paper is made up of fifty (50) Multiple Choice Questions. Answer ALL questions by indicating the letter
(A, B, C or D) that represents the correct answer. Each question is allocated two (2) marks. Do NOT write anything
on this paper.

1. What is the name of the application software that is user-specific and does a specific task?
A. Special purpose
B. General purpose
C. Bespoke
D. Customised (2 marks)

2. The following are reasons for setting up a computer network in an organisation, EXCEPT___________.
A. Provides best way of business communication
B. Effective resource sharing

ke
C. Cut costs on hardware and software

o.
i.c
D. To keep in step with emerging trends (2 marks)

op
.ch
w
3. Which of the following is FALSE about Random Access Memory (RAM)?

w
w
A. It is also called the working memory
B. Content of the RAM can be written, modified and deleted
C. Its capacity cannot be increased unless by the computer manufacturer
D. Its capacity ranges from 4GB to 32GB or higher for modern computers (2 marks)

4. In a presentation software, what is a predefined set of colours, fonts and visual effects that is applied to slides for a
unified professional look?
A. Template
B. Animation
C. Transition
D. Theme (2 marks)

5. What is the name of the text-based user interface used to run programs, manage computer files and interact with
the computer?
A. Voice user interface
B. Graphical user interface
C. Command line interface
D. Menu driven interface (2 marks)

6. In a spreadsheet, a function is a calculation or operation that returns a result.

What is the name given to the inputs in a function?


A. Labels
B. Arguments
C. Values
D. Data (2 marks)

AD14 Page 1
Out of 6
7. Which is the topology where all the devices in the network are connected to a single cable or line?
A. Ring
B. Mesh
C. Bus
D. Star (2 marks)

8. Which of the statements below clearly describes the purpose of a register in computer memory?
A. To provide extra storage space for data
B. To supplement the processor
C. To arrange, organise and sort data awaiting processing
D. To store small amounts of data needed during processing (2 marks)

9. In spreadsheet program, the feature that displays the cell that is currently selected in the worksheet is known as
__________.
A. Status bar
B. Menu bar
C. Name box
D. Formula bar (2 marks)

10. Which of the following is NOT a characteristic of a Wide Area Network (WAN)?
A. It connects computers over a small geographical area
B. The range of the network is enormous to transfer data
C. The speed of the data transmission is sometimes fast and sometimes slow
D. It allows users to share resources with other users on the internet (2 marks)

11. A computer's memory is measured in _______________.


A. Bytes
B. Hertz
e
C. Watts
.k
D. Volts (2 marks)
.co

12. The following are advantages of a custom-built application software, EXCEPT___________.


pi

A. Tailor-made to the specific needs of the user


B. Increased productivity
ho

C. Increased development costs


D. Dependable technical support (2 marks)
C

13. The following are characteristics of a mainframe computer, EXCEPT__________.


A. Higher memory capacity
B. Smallest in size
C. Runs many applications at the same time
D. Supports multiprocessing (2 marks)

14. Which of the following is NOT a component of system software?


A. Utilities
B. Translators
C. Device drivers
D. Database (2 marks)

15. A copy of computer data taken and stored elsewhere so that it may be used to restore the original after a data loss
event is known as _____________.
A. Disaster plan
B. Backup
C. Recovery
D. License (2 marks)

16. Which of the following is an advantage of sharing a computer file?


A. Offers security
B. Eliminates multiple file versions
C. Risk of infection
D. Increased data integrity (2 marks)
AD14 Page 2
Out of 6
17. Which of the following is NOT an important feature of a presentation software?
A. Different slide layouts
B. Animation effects
C. Spell checker
D. Transition effects (2 marks)

18. Which one of the following is NOT a function in a spreadsheet application?


A. Value
B. Esc
C. Label
D. If (2 marks)

19. A part of a computer program that usually causes the computer to malfunction; often corrected using patches or
updates to the program is known as ____________.
A. Bug
B. Virus
C. POST
D. BIOS (2 marks)

20. Which of the following is NOT a reason why it is important to manage computer files?
A. To improve organisation
B. To centralise document location
C. To increase typing speed
D. To reduce filing errors (2 marks)

21. The utility used to create a bitmapped image file in Windows Operating System is known as __________.
A. Paint
B. Notepad

ke
o.
C. Control panel

i.c
op
D. Scandisk (2 marks)

.ch
w
w
22. Which one of the following components is NOT necessary when setting up a local area network in an office?

w
A. Switch
B. Bridge
C. Twisted pair cable
D. Computers (2 marks)

23. Which of the following is NOT a characteristic of impact printers?


A. It’s noisy
B. Slow in printing
C. Break easily
D. Quiet when printing (2 marks)

24. Which of the following statements BEST describe the function of a slide master view?
A. It allows a user to edit and create own layouts
B. It shows the layout of a presentation as it is printed out on paper
C. It allows user to change the layout for every single note section in the project
D. It allows a colourful presentation to be shown (2 marks)

25. The following are features of a graphical user interface (GUI), EXCEPT _________.
A. They are much easier to use for beginners
B. They enable you to easily exchange information between software using cut and paste or “drag and drop”
C. Commands must be typed correctly and in the right order or the command will not work
D. They use a lot of memory and processing power (2 marks)

26. Which ONE of the following is neither an input nor an output device?
A. Scanner
B. Speaker
C. Inkjet
D. Flash disk (2 marks)

AD14 Page 3
Out of 6
27. In a Word processing program, landscape refers to _________________.
A. Page Layout
B. Paper Size
C. Page Orientation
D. A Font Style (2 marks)

28. _____________is a PowerPoint feature that allow a user to create a presentation quickly.
A. Animations
B. Chart Wizard
C. Transition Wizard
D. AutoContent Wizard (2 marks)

29. The main folder on a storage device is called________________.


A. Device driver
B. Root directory
C. Interface
D. Platform (2 marks)

30. Which type of user interface is MOST suitable to somebody with a visual impairment?
A. Graphical User Interface
B. Speech and Sound Interface
C. Command Line Interface
D. Menu Interface (2 marks)

31. Identify the file format that is commonly used to compress multiple files into a single archive.
A. .zip
B. .gif
C. .mp3
e
D. .txt
.k (2 marks)
.co
32. What is the purpose of a device driver?
A. To connect hardware devices to the system
B. To manage memory allocation
pi

C. To process user input


ho

D. To convert source code into machine code (2 marks)

33. Which of the following is an advantage of using a command line interface (CLI)?
C

A. It provides more intuitive and user-friendly interaction


B. It allows for faster and more efficient execution of commands
C. It offers a graphical representation of data and information
D. It requires minimal technical knowledge for operation (2 marks)

34. Which function of an operating system ensures that each application gets a fair share of the CPU time?
A. Process scheduling
B. Memory management
C. File management
D. Security and authentication (2 marks)

35. A type of port used to connect a printer, keyboard and mouse to a computer is known as _________.
A. USB
B. HDMI
C. Ethernet
D. VGA (2 marks)

36. Which of the following is an example of open-source software?


A. Microsoft Office
B. Adobe Acrobat
C. Linux operating system
D. AutoCAD (2 marks)

AD14 Page 4
Out of 6
37. Which feature of accounting software allows you to automatically import bank statements and reconcile them with
your financial records?
A. Data capture
B. Auto-tax calculation
C. Bank reconciliation
D. Financial reporting (2 marks)

38. Which network resource is used to control access to specific folders and files, ensuring that only authorised users
can view or modify them?
A. Printer
B. Router
C. File permissions
D. Modem (2 marks)

39. Which programming language is often used for web development and can run on both the client and server sides?
A. Java
B. Python
C. JavaScript
D. C++ (2 marks)

40. What is a key advantage of using accounting software for data capture compared to manual bookkeeping?
A. Lower cost
B. More flexibility
C. Reduced human error
D. Better communication (2 marks)

41. A small amount of fast temporary memory within the processor where data is stored and values needed to execute
instructions are changed is called__________.

ke
o.
A. Register

i.c
op
B. Bus

.ch
C. Control unit

w
w
D. Arithmetic and Logic unit (2 marks)

w
42. Memory used by the computer to store the information temporarily during processing is referred to as________.
A. Random Access Memory (RAM)
B. Read only Memory (ROM)
C. Write once read Many (WORM)
D. Flash Memory (2 marks)

43. Which of the following is the most common modern type of personal computer monitor?
A. Cathode Ray Tube
B. Liquid Crystal Display
C. Thin Film Transistor
D. Gas Plasma Display (2 marks)

44. Which of the following is used for primary storage in a computer?


A. Flash disk
B. Cache memory
C. Compact disk
D. Magnetic tape (2 marks)

45. The process of restoring data that has been lost, accidentally deleted, corrupted or made inaccessible is known
as____________.
A. Disaster plan
B. Backup
C. Recovery
D. Retrieval (2 marks)

AD14 Page 5
Out of 6
46. Which of the following is a source document input device?
A. Voice entry
B. Mouse
C. Keyboard
D. Bar code reader (2 marks)

47. Which of the following is a characteristic of third generation computers?


A. Use magnetic core as primary storage medium
B. Use high-level programming languages in developing software
C. Generated a lot of heat
D. Use transistors as switching devices (2 marks)

48. Which programming language is OFTEN used to develop mobile applications for Android devices?
A. Swift
B. Kotlin
C. Objective-C
D. Java (2 marks)

49. What is the purpose of a motherboard in a computer system?


A. To process data and execute instructions
B. To store data permanently
C. To provide temporary storage for the CPU
D. To connect and coordinate various hardware components (2 marks)

50. In the context of software licensing, what is the main characteristic of open-source software?
A. It is developed exclusively for commercial purposes
B. Its source code is freely available for modification and redistribution
C. It cannot be modified or distributed by users
e
D. It is proprietary and closed to public access
.k (2 marks)
.co
………………………….……………………………………………….
pi
ho
C

AD14 Page 6
Out of 6
ATD LEVEL I

INFORMATION COMMUNICATION TECHNOLOGY

THURSDAY: 7 December 2023. Morning Paper. Time Allowed: 2 hours.

This paper is made up of fifty (50) Multiple Choice Questions. Answer ALL questions by indicating the letter
(A, B, C or D) that represents the correct answer. Each question is allocated two (2) marks. Do NOT write anything
on this paper.

1. ___________ is responsible for converting the data received from the user into a computer understandable format.
A. Output Unit
B. Input Unit
C. Memory Unit
D. Arithmetic & Logic Unit (2 marks)

2. Which of the following ICT resources can access a server?


A. Web Client
B. User
C. Web Browser

ke
o.
D. Web Server (2 marks)

i.c
op
.ch
3. ________________ is NOT a form of data storage media.

w
w
w
A. A database
B. Magnetic tape
C. Magnetic disc
D. Optical disc (2 marks)

4. An example of a browser software is____________.


A. Microsoft Word
B. Notepad
C. Internet navigator
D. Microsoft Edge (2 marks)

5. In computer architecture, the cache memory works between _____________.


A. ROM and CPU
B. RAM and ROM
C. CPU and RAM
D. Random and secondary memory (2 marks)

6. When discussing technology, which of the following statement best describes a hot spot?
A. A small overheated area on a CPU
B. A place served by public wireless access
C. Jargon for an X-rated Web site
D. A faulty area in the programming code (2 marks)

7. A computer virus that actively attacks an anti-virus program in an effort to prevent detection is known as _______.
A. Worm
B. Retrovirus
C. Trojan
D. Ghost virus (2 marks)

AD14 Page 1
Out of 6
8. What is World Wide Web?
A. A computer game
B. A software program
C. The part of the Internet that enables information-sharing via interconnected pages
D. Another name for the Internet (2 marks)

9. Which of the following forms the foundation of fifth-generation computers?


A. Artificial Intelligence
B. Vacuum tubes
C. VVLSI
D. Transistors (2 marks)

10. Which computer generation saw the introduction of the microprocessor?


A. First Generation
B. Fourth Generation
C. Second Generation
D. Third Generation (2 marks)

11. _____________ refers to the period of time that a computer spends processing a job.
A. Execution Time
B. Real Time
C. Delay Time
D. Waiting Time (2 marks)

12. Which of the following term can be used to refer to a Landscape in context of word processing program?
A. A font style

e
B. Paper size .k
C. Page layout
D. Page orientation (2 marks)
.co

13. What is a “folder” as applied in operating system?


A. A catalogue for files stored on the hard disk of a computer
pi

B. A package of instruction that causes the computer to do something


C. Storage of all files which are deleted
ho

D. A disk used to store bulk data (2 marks)


C

14. The product of data processing is referred to as______________.


A. Information
B. Data
C. Software Program
D. System (2 marks)

15. A new Laptop comes with various characteristics: weighs less, is smaller and uses less power than
previous Laptop models. Which of the following technologies has been used to accomplish this feature?
A. Universal Serial Bus Mouse
B. Faster Random Access Memory
C. Blu Ray Drive
D. Solid State Hard Drive (2 marks)

16. The data storage hierarchy consists of:


A. Bits, bytes, fields, records, files and databases
B. Bits, bytes, records, fields, files and databases
C. Bits, bytes, fields, files, records and databases
D. Bytes, bits, fields, records, files and databases (2 marks)

17. Which one of the following is NOT an operating system?


A. Android Donut
B. Unix
C. Linux
D. Microsoft Word (2 marks)

AD14 Page 2
Out of 6
18. Which program translates an entire set of instructions written in a higher-level language into machine language
before the instructions can be executed?
A. Interpreter
B. Assembler
C. Compiler
D. Debugger (2 marks)

19. Which one of the following is NOT an advantage of computerisation?


A. Becomes outdated quickly
B. Reduced costs
C. Reduced space requirements
D. Provides information to management (2 marks)

20. Which one of the following is NOT a part of system software?


A. Device drivers
B. Word processing
C. Utility programs
D. Operating system (2 marks)

21. Which one of the following is NOT an example of a utility software?


A. Disk defragmenters
B. Antivirus software
C. Word Processing
D. Backup software (2 marks)

22. What is defined as a large capital letter used as a decorative element at the beginning of a paragraph or section
where it is made larger, taking up several lines of text or the first few sentences?
A. Word wrap

ke
o.
B. Word art

i.c
op
C. Drop cap

.ch
D. Typeface (2 marks)

w
w
w
23. Which of the following is NOT a characteristic of impact printers?
A. Cheap to buy
B. Slow when printing
C. Relatively poor quality printout
D. Quiet when printing (2 marks)

24. Which of the following is NOT a type of a Chart in a spreadsheet software?


A. Pie
B. Combo
C. Area
D. Flow (2 marks)

25. The statement “covers an entire city”, describes which type of a network?
A. LAN
B. CAN
C. MAN
D. WAN (2 marks)

26. What is the name of the networking hardware which provides the physical connection between the network and
the computer workstation?
A. Network interface card
B. Router
C. Multiplexer
D. Gateway (2 marks)

27. The following are characteristics of a microcomputer computer, EXCEPT _________.


A. Small size and low cost
B. Low computing power
C. Runs many applications at the same time
D. Easy to use (2 marks)
AD14 Page 3
Out of 6
28. A set of digits that represents the release date and specific changes to a computer software is known as _________.
A. Release
B. Version
C. Deployment
D. Configuration (2 marks)

29. The following are important objectives of computer networks, EXCEPT ____________.
A. Resource sharing
B. Increase reliability
C. Security of resources
D. Communication (2 marks)

30. A collection of related fields that can be treated as a unit by an application program is called a _______________.
A. Field
B. Record
C. File
D. Database (2 marks)

31. Virtual memory is___________.


A. An illusion of a large main memory
B. A large main memory
C. A large secondary memory
D. A large backing storage (2 marks

32. _______ feature allows a user to create a simple presentation quicker.


A. Animations
B. Chart Wizard

e
C. Transition Wizard .k
D. AutoContent Wizard (2 marks)
.co
33. Which type of topology is best suited for large businesses which must carefully control and coordinate the
operation of distributed branch outlets?
A. Ring
pi

B. Local area
C. Hierarchical
ho

D. Star (2 marks
C

34. Which of the following is NOT a process associated with an accounting information system?
A. Auditing existing data
B. Collecting and recording data
C. Providing information to users
D. Analysing and managing data (2 marks)

35. What is the name of the output device shown below?

A. Printer
B. Projector
C. Plotter
D. Scanner (2 marks)

36. Which of the following BEST describes the term multiprocessing?


A. The technique of utilising several programs concurrently in a single processor
B. Running of several programs simultaneously by a computer with several processors
C. System that allows more than one person to access and use it at the same time
D. This is a technique that allows multiple tasks to share a processor (2 marks)

AD14 Page 4
Out of 6
37. What is the name of the feature in a spreadsheet software that automatically applies formatting, such as font colour
or bolding, to a cell when the data in that cell meets specific criteria?
A. Relative referencing
B. Filtering
C. Conditional formatting
D. Freezing (2 marks)

38. Network topology refers to the way in which computers and computing devices are linked together. Which of the
following factor is NOT important when choosing a topology?
A. Desired reliability of the system
B. Size of the system
C. Availability of communication lines
D. Skills of the personnel (2 marks)

39. The term that includes various forms of technologies that are used to create, display, store, process, transmit, share
or exchange information by electronic means is known as ______________.
A. Information system
B. Information Communication Technology
C. Internet
D. Computer network (2 marks)

40. Which of the following is an example of a programming language?


A. A++
B. B++
C. C++
D. D++ (2 marks)

41. The type of main memory which is extremely fast and of small capacity and its access time is closer to the

ke
o.
processor speed is known as ______________.

i.c
op
A. Virtual

.ch
B. Cache

w
w
C. RAM

w
D. Bubble (2 marks)

42. In the context of presentation software, what is the name of the boxes that are included in a slide layout to hold
specific types of content, such as text, images or charts?
A. Placeholders
B. Master slides
C. Slide shows
D. Design templates (2 marks)

43. Which of the following is a pointing input device?


A. Keyboard
B. Sensor
C. Trackpad
D. Digital camera (2 marks)

44. In a spreadsheet program, a workbook holds a number of worksheets, and each worksheet is made up of cells. A
cell can hold the following, EXCEPT _______________.
A. Text
B. A formula
C. A file
D. A chart (2 marks)

AD14 Page 5
Out of 6
45. Which type of network topology is shown by the figure below?

A. Ring
B. Bus
C. Star
D. Tree (2 marks)

46. Presentation templates are good resource for anyone looking to improve the quality of presentations made using a
presentation software. The following are reasons why presentation templates are preferred, EXCEPT _________.
A. To increase the speed of running professional presentations
B. To customise templates in order to build bespoke presentations
C. To achieve consistency for a more professional style
D. To help make the content more visual

47. The following are applications of a spreadsheet software, EXCEPT _____________.


A. Tracking profits and losses in corporations
B. Managing household budgets by individuals
C. Creating, editing, saving and printing documents
D. Budgeting and spending help (2 marks)

48. During the second generation, the size of computers was decreased by replacing vacuum tubes with________.

e
A. ICs .k
B. Semiconductors
C. Transistors
.co
D. Microprocessor (2 marks)

49. A computer on a network that requests files from another computer is known as__________.
pi

A. A client
B. A host
ho

C. A router
D. A web server (2 marks)
C

50. A filename without path information is known as_________.


A. File name
B. Complete filename
C. Directory name
D. Relative filename (2 marks)

………………………….……………………………………………….

AD14 Page 6
Out of 6
ATD LEVEL I

PILOT PAPER

INFORMATION COMMUNICATION TECHNOLOGY

August 2023. Time Allowed: 2 hours.

Answer ALL questions by indicating the letter (A, B, C, or D) that represents the correct answer. This paper is
made up of (50) multiple choice questions. Each question is allocated two (2) marks.

1. You visited an ICT museum during an academic trip and came across the various computers arranged according
to their evolution per generation. Which of the following computer generation is characterised by integrated
circuits that allowed for the development of smaller and more powerful computers?
A. First
B. Second
C. Third
D. Fifth (2 marks)

ke
2. The powerful computers designed for managing and receiving requests from other computers in a network

o.
environment is known as _________________________.

i.c
op
A. Mainframes

.ch
w
B. Servers

w
w
C. Data Centers
D. Supercomputers (2 marks)

3. When the computer is started, it undergoes some diagnostic tests to ensure the basic functionality of essential
computer hardware components are working properly before the operating system is loaded. This process is
referred to as _________________________.
A. Boot Loading
B. System Diagnostics
C. Memory Diagnostics
D. Power On Self-Test (2 marks)

4. Ted, a computer student would like to acquire software for study purposes. However, he is financially challenged
to buy the software. Which of the following software category would you recommend to Ted because they do not
require license to use and allows the users to access, view, modify, and distribute the source code freely?
A. Proprietary software
B. Open-source
C. On-shelf software
D. Off-shelf software (2 marks)

5. Communication media links network node together in a computer network. Identify the type of the
communication media, which falls under the unguided transmission media category.
A. Coaxial
B. Fiber optic
C. Infrared
D. Twisted (2 marks)

6. ICT has revolutionised the way traditional businesses operated and has become the backbone of major business
operations. Start-up companies may not need to invest heavily in the ICT computing resources, such as servers,
storage, databases, software, and networking. Which technology would you recommend for a start-up company,
to allow them to utilise these resources on a pay-as-you-go basis?
AD14 Page 1
Out of 8
A. Blockchain
B. Virtualisation
C. Visualisation
D. Cloud computing (2 marks)

7. Information centers can play a major role in reducing the digital divide in the developing nations. Which of the
following services CANNOT be offered at the information centers?
A. Medical imaging
B. Research
C. Knowledge sharing
D. Education (2 marks)

8. You would like to do data analysis and summarise some financial data using spreadsheet package excel. Select
the best data summarisation spreadsheet tool, that you would perform the task?
A. Goal seek
B. Filter
C. Pivot table
D. What if analysis (2 marks)

9. You would like to purchase a computer for the finance department for payroll processing. Which of the following
is NOT a factor that you would consider to determine the processing power of the computer to purchase?
A. RAM capacity
B. Storage capacity
C. Processor speed
D. The number of cores (2 marks)

10. Identify the type of computer network depicted in figure 1.

e
.k
.co
pi

Figure 1
ho

A. LAN
B. MAN
C

C. PAN
D. WAN (2 marks)

11. What is the purpose of network protocols in a computer network?


A. To manage computer hardware components
B. To provide power to network devices
C. To optimise computer network performance
D. To define the rules for communication and data exchange (2 marks)

12. Identify the file organisation technique where each record is assigned a specific physical address enabling a quick
retrieval from the desired location.
A. Direct file organisation
B. Sequential file organisation
C. Index file organisation
D. Hashed file organisation (2 marks)

13. Which of the following type of computer file contains non-textual data, such as images, videos, executable, and
compressed files?
A. Dataset file
B. Text file
C. Binary file
D. Temporary file (2 marks)

AD14 Page 2
Out of 8
14. Identify which PowerPoint feature is used to give life to text during the presentation?
A. Transition
B. Animation
C. Customisation
D. Templates (2 marks)

15. Spreadsheets are the super calculators used to perform computations involving rows and columns. Which one of
the following is NOT a spreadsheet application?
A. Excel
B. Lotus 1-2-3
C. Oracle
D. Quattro Pro (2 marks)

16. Select the component of the computer system that is used for data validation and security measures to protect the
system and its data from unauthorised access?
A. Feedback
B. Password
C. Biometric
D. Control (2 marks)

17. Which of the following type of an information system is the ODD one, considering the level of management used
in information systems ?
A. CRM (Customer Relationship Management)
B. MIS (Management Information Systems)
C. DSS (Decision Support Systems)
D. EIS (Executive Information Systems) (2 marks)

18. Computer network is the interlinking of computers and devices to facilitate communication and resource sharing.
Which of the following is a challenge of computer networking?

ke
o.
A. Collaboration

i.c
op
B. Compatibility

.ch
C. Centralised management

w
w
D. Reduced operational costs (2 marks)

w
19. The type of utility software used to reduce the size of files for easier storage and transfer is called
_________________________.
A. File managers
B. File shredders
C. File archives
D. File compression (2 marks)

20. Identify the type of operating system designed for use for critical mission areas such as astronomy and medical
research.
A. Multi-user OS
B. Multi-tasking OS
C. Real-Time OS
D. Embedded OS (2 marks)

21. Embedded computers are everywhere in our households from cars, fridges, microwaves, TVs among others. What
is the name given to the non-volatile software, written directly on the embedded computers to provide the low
level operation needed?
A. Kernel
B. Firmware
C. Library
D. Loader (2 marks)

22. Which of the following is NOT an element of a computer file stored on a hard disk or a solid states device?
A. Database
B. Metadata
C. File extension
D. File format (2 marks)

AD14 Page 3
Out of 8
23. The World Wide Web has vast amount of information that is useful in the business growth and strategy. What is
the name given to the software that is used for finding information over the internet?
A. Browser
B. chatGPT
C. Search Engine
D. Hypermedia (2 marks)

24. ABC Bank customer care department would like to serve its customers efficiently and effectively through
interactive human conversation with its clients. Which of the following interne t service is best suited to achieve
their goal?
A. World Wide Web
B. Instant Messaging
C. Internet
D. Intranet (2 marks)

25. The widespread adoption of ICT by the companies, organisations and individuals, has had a profound impact on
our society today. Which of the following technologies has revolutionized healthcare?
A. IoT
B. Video conferencing
C. Artificial intelligence
D. Telemedicine (2 marks)

26. The feature integrated in word processing software that provides users with the synonyms and the antonyms of
words is called?
A. Thesaurus
B. Kerning
C. Translate
D. Macros (2 marks)

27.
e
XYZ Ltd. has approached you for advise on how to manage and track money owed by customers. Suggest an
.k
accounting module which the company could use for automating invoicing, tracking payments and managing
.co
overdue accounts.
A. Account payables
B. Account receivables
pi

C. General ledger
D. Bank feeds (2 marks)
ho

28. State the name given to the ICT technology that combine different forms of media, such as text, graphics, audio
C

and video.
A. Multiplexing
B. Internet
C. Hybrid
D. Multimedia (2 marks)

29. The type of technology that allows organisations’ devices to connect to the internet over a local network without
requiring physical cables is referred to as _________________________.
A. Wireless Fidelity
B. Broadband
C. Baseband
D. Tethering (2 marks)

30. Which of the following is NOT a major factor to consider when acquiring a new Operating System for an
organisation’s computers?
A. Usability
B. Compatibility
C. Size
D. Support (2 marks)

31. Identify the type of computer hardware which is used to capture data that originates in audio form.
A. Headset
B. Microphone
C. Scanner
D. Speaker (2 marks)
AD14 Page 4
Out of 8
32. ___________________ is the process of restarting a computer that was initially on, to help improve overall
system performance.
A. Refreshing
B. Loading
C. Cold booting
D. Warm booting (2 marks)

33. Given the URL, “https://www.kasneb.or.ke”, identify the Top-Level Domain of the URL.
A. ke
B. https
C. kasneb
D. or (2 marks)

34. Which of the following emerging technology do the users use a headset to immerse them in a computer-generated
world that you can explore like the real world?
A. Machine Learning
B. Deep Learning
C. Augmented reality
D. Artificial Intelligence (2 marks)

35. The process of concealing sensitive data when being transmitted over the communication network to ensure
protection if intercepted by illegitimate persons is referred to as _________________________.
A. Eavesdropping
B. Encryption
C. Authentication
D. Authorisation (2 marks)

36. Which of the following issue is becoming a significant concern in the digital age, with the rise of social media

ke
platforms?

o.
i.c
A. Cyber security

op
.ch
B. Cyber terrorism

w
w
C. Misinformation

w
D. Gene editing (2 marks)

37. What type of information system, mimic the reasoning of a domain specialists to solve complex problems by
applying rules and logic?
A. Expert systems
B. Decision support systems
C. Knowledge based systems
D. Business intelligence systems (2 marks)

38. A state-of-the-art type of storage device that uses flash memory to store data with no moving parts, making them
faster, more durable, and less prone to mechanical failure compared to Hard Disk Drives (HDD) is known as?
A. USB Flash Drive
B. Optical Discs
C. Network Attached Storage (NAS)
D. Solid State Drive (SSD) (2 marks)

39. Which of the following functions of the Operating System is used for creating, deleting and renaming folders in a
computer system?
A. Memory management
B. Process management
C. File management
D. User Interface (2 marks)

40. Select the type of interface that uses visual elements such as icons, windows, buttons, menus, and other graphical
elements to represent commands.
A. GUI
B. WIMP
C. CLI
D. DOS (2 marks)

AD14 Page 5
Out of 8
41. The computer networking device that is used to amplify the signal as it travels over long distance to reduce
attenuation is called _________________________.
A. Router
B. Switch
C. Hub
D. Repeater (2 marks)

42. Which of the following type of processor is used for parallel processing, making them highly efficient for tasks
like gaming, video editing, and scientific simulations?
A. Central Processing Unit (CPU)
B. Tensor Processing Unit (TPU)
C. Graphics Processing Unit (GPU)
D. Quantum Processor (2 marks)

43. The interconnection of computers within two different organisations that do business together for communication
purpose is known as?
A. Extranet
B. Internet
C. Intranet
D. Hybrid (2 marks)

44. Programming languages are classified into different categories. Determine the category of the programming
language which uses mnemonic or symbolic codes to represent machine instructions.
A. High level language
B. Domain specific language
C. Assembly language
D. Machine language (2 marks)

45.
e
The type of software that is used to manage the systems resources such as the processor, memory and storage is
.k
referred to as _________________________.
.co
A. Utility software
B. Debugger
C. Translator
pi

D. System software (2 marks)


ho

46. Each file on a computer system has authorised user rights and permissions for security reasons. Which of the
following is NOT a type of user rights and permissions for a file?
C

A. Read
B. Audit
C. Write
D. Execute (2 marks)

47. Which of the following file organisation technique does the order of the records determine the order in which they
were created or modified?
A. Sequential
B. Serial
C. Indexed sequential
D. Clusters file organisation (2 marks)

48. The collection of interrelated components that work together to achieve a common goal as used in information
systems is called _________________________.
A. Graph
B. Network
C. Link
D. System (2 marks)

49. A mode of transmission where many bits flow together simultaneously from one computer to another computer is
referred to _________________________.
A. Serial transmission
B. Parallel transmission
C. Simplex mode
D. Full duplex (2 marks)
AD14 Page 6
Out of 8
50. Client/server architecture allows the network to centralise functions and applications in one or more dedicated file
servers. Which of the following is a client/server characteristic that allows a new technology to be easily
integrated into system?
A. Flexibility
B. Interoperability
C. Scalability
D. Accessibility (2 marks)

ke
o.
i.c
op
.ch
w
w
w

AD14 Page 7
Out of 8
ATD LEVEL I

INFORMATION COMMUNICATION TECHNOLOGY

THURSDAY: 24 August 2023. Morning Paper. Time Allowed: 2 hours.

This paper is made up of fifty (50) Multiple Choice Questions. Answer ALL questions by indicating the letter
(A, B, C or D) that represents the correct answer. Each question is allocated two (2) marks. Do NOT write anything
on this paper.

1. __________________ computers are lower than mainframe computers in terms of speed and storage capacity.
A. Macro
B. Hybrid
C. Mini
D. Super (2 marks)

2. ______________________ is NOT an example of a system software.


A. Language translator
B. Utility software
C. Communication software
e
D. Word processor
.k (2 marks)
.co
3. __________________ generation of computers used vacuum tubes as their basic components.

A. 1st
pi

B. 2nd
3rd
ho

C.
D. 4th (2 marks)
C

4. _______________are used for interconnecting dissimilar networks that use different communication protocols.

A. Switches
B. Gateways
C. Routers
D. Bridges (2 marks)

5. _____________________is a type of a printer that prints one line at a time and has a predefined set of characters.
A. Laser
B. Drum
C. Inkjet
D. Impact (2 marks)

6. Output devices are key resources in a computer system. Which of the following is NOT a function of an output
unit?

A. It produces results that can be easily understood by the user


B. It accepts the results produced by the computer
C. It supplies the data and instructions to the outside world
D. It supplies the data and instructions to a computer for further processing (2 marks)

AD14 Page 1
Out of 6
7. _________________enables you to calculate numbers related to rows and columns.
A. Window program
B. Spreadsheet program
C. Graphics program
D. Word program (2 marks)

8. _________________ acts as an intermediary between a computer user and the computer hardware.
A. Operating system
B. User thread
C. Superuser thread
D. Application program (2 marks)

9. In computer development, Integrated Circuit (IC) has played a crucial role. The use of IC in a computer has
_____________________.
A. Increased the amount of heating
B. Reduced the size and cost of computers
C. Reduced the peripheral devices to be used
D. Reduced the performance capacity of the computer (2 marks)

10. In computer development, the second-generation computer was based on ________________.


A. Transistor
B. Electron tube
C. Electron ray
D. Vacuum tube (2 marks)

11. _______________is a device that can be used for both input and output processes.
A. Monitor
B. Speaker

ke
o.
C. Scanner

i.c
op
D. Modem (2 marks)

.ch
w
w
12. _________________is a word processing feature that catches most random typographical errors.

w
A. Grammar checker
B. Spell checker
C. Word checker
D. Find and replace (2 marks)

13. __________________refers to a temporary storage area that compensates for differences in data rate and data flow
between devices.
A. Buffer
B. Bus
C. Channel
D. Modem (2 marks)

14. In a CPU, choose the part that interprets a program’s instructions to initiate the control operations.
A. Logic unit
B. Control unit
C. Storage unit
D. Input (2 marks)

15. _________________refers to a collection of two or more computers that are located within a limited distance of
each other and are connected to each other directly or indirectly.
A. Internet
B. Intranet
C. Local Area Network
D. Wide Area Network (2 marks)

16. https://www.kasneb.or.ke - is an example of:


A. A URL
B. An access code
C. A directory
D. A server (2 marks)
AD14 Page 2
Out of 6
17. Which of the following statement refers to a web browser?
A. A kind of spider
B. A computer that stores World Wide Web files
C. A person who likes to look at websites
D. A software program that allows you to access sites on the World Wide Web (2 marks)

18. ___________________ refers to a network whose elements may be separated by some distance. It usually
involves two or more small networks and dedicated high-speed telephone lines.

A. URL (Universal Resource Locator)


B. LAN (Local Area Network)
C. WAN (Wide Area Network)
D. World Wide Web (2 marks)

19. In word processing, a document’s background color cannot be seen in which of the following view?
A. Web layout view
B. Print Preview
C. Reading View
D. Print Layout view (2 marks)

20. The following statements are true about RAM EXCEPT__________________.


A. RAM is a temporary storage area
B. RAM is the same as hard disk storage
C. RAM is volatile
D. Information stored in RAM is gone when you turn off the computer (2 marks)

21. ________________feature enables us to send the same letter to different persons in word processing application.

e
A. Mail join .k
B. Mail copy
C. Mail insert
.co
D. Mail merge (2 marks)

22. Which of the following is NOT a feature of a spreadsheet software?


pi

A. Conditional formatting
B. IF statements
ho

C. Mail merge
D. VLOOKUP (2 marks)
C

23. The following are types of file attributes EXCEPT________________.


A. Read-only
B. Archive
C. Random access
D. Hidden (2 marks)

24. A device that allows multiple computers to communicate with each other over a network is known as__________.
A. Network hub
B. Repeater
C. Modem
D. Network cable (2 marks)

25. Which of the following application software is capable of organising, storing and analysing data in tabular form?
A. Spreadsheet
B. Database
C. Word processing
D. Accounting (2 marks)

AD14 Page 3
Out of 6
26. Which of the following is TRUE about sharing a computer file?
A. Saves processing time
B. Increases storage space
C. Risk of infection is high
D. Increases its integrity (2 marks)

27. What is defined as a set of rules that governs communication between computers on a network?
A. Port
B. Protocol
C. Channel
D. Router (2 marks)

28. Which of the following is NOT a feature of a presentation software?


A. Different slide layouts
B. Animation effects
C. Mail merge
D. Transition effects (2 marks)

29. Which of the following is NOT a function in a spreadsheet application?


A. Average
B. Mem
C. Rank
D. Sum (2 marks)

30. ________________ is the operating speed of a computer or its microprocessor, expressed in cycles per second?
A. Bus speed
B. Clock speed

ke
C. RAM speed

o.
i.c
D. Pulse speed (2 marks)

op
.ch
w
w
31. When setting up a local area network in an office, which of the following components is NOT necessary?

w
A. Switch
B. Repeater
C. Twisted pair cable
D. Computers (2 marks)

32. In a presentation software, what is the name of a predefined set of colours, fonts, and visual effects that you apply
to your slides for a unified, professional look?
A. Slide show
B. Animation
C. Transition
D. Theme (2 marks)

33. ______________________ is the extension of PowerPoint Show.


A. .pptx
B. .ppsx
C. .ppt
D. .ps (2 marks)

34. Excel workbook is a collection of ___________________.


A. Worksheets and charts
B. Graphs and images
C. Sheets and images
D. Video and audio (2 marks)

35. Computerised accounting software is specifically designed for?


A. Managing inventory in a warehouse
B. Creating 3D graphics and animations
C. Tracking financial transactions and generating financial reports
D. Conducting scientific research and data analysis (2 marks)

AD14 Page 4
Out of 6
36. When creating user accounts on a computer network, which factor is typically used for authentication?
A. Username and password
B. IP address and subnet mask
C. MAC address and hostname
D. Password and server name (2 marks)

37. Which network resource is commonly used for storing and organising files in a computer network?
A. Folders
B. Files
C. Printers
D. Servers (2 marks)

38. Which category of computer software includes programs that provide additional functionality to the operating
system, such as antivirus software or file compression tools?
A. System software
B. Application software
C. Utility programs
D. Operating software (2 marks)

39. Identify the best comparison and contrast of Local Area Network (LAN) and Wide Area Network (WAN) from the
statements below.
A. LAN covers a small area, while WAN covers a large geographic area
B. LAN typically has higher speed compared to WAN
C. LAN offers local accessibility, while WAN offers remote accessibility
D. WAN covers a larger area and has slower speed compared to LAN (2 marks)

40. The component in the Central Processing Unit (CPU), which sends out regular electrical pulses and keeps time for
all the components is known as_________________.
e
.k
A. Bus
B. Register
.co

C. Clock
D. Port (2 marks)
pi

41. The following are characteristics of secondary memory, EXCEPT_______________.


ho

A. It is volatile in nature
B. It is less costly in comparison to primary memory
C

C. The storage capacity is quite high and scalable


D. It is removable or fixed as per the requirement (2 marks)

42. Which of the following is NOT an example of a word processing software?


A. Ms Word
B. Word wrap
C. LibreOffice Writer
D. Google Docs (2 marks)

43. In an operating system, which is the user account with the highest privilege?
A. Super user
B. Local user
C. Guest user
D. Remote user (2 marks)

44. An operating system which allows many users to share computer resources simultaneously is referred to as?
A. Batch system
B. Time sharing system
C. Distributed system
D. Multiuser system (2 marks)

AD14 Page 5
Out of 6
45. What is the name of the input device shown below?

A. Digital tablet
B. Light pen
C. Joystick
D. Barcode reader (2 marks)

46. Why is it necessary to format a worksheet in a spreadsheet software?


A. To enable a worksheet to open faster
B. To distinguish one worksheet from another
C. To help improve the readability of a worksheet
D. To prove user’s artistic skills (2 marks)

47. Which of the following BEST describes cold booting?


A. It is a method of restarting a computer that is already on without completely turning it off
B. It is the process of starting a computer from shutdown and setting it to normal working condition
C. It is a backup facility that has the necessary electrical and physical components of a computer facility, but
does not have the computer equipment in place
D. It is a type of facility an organisation uses to recover its technology infrastructure when its primary data

ke
o.
centre goes down (2 marks)

i.c
op
.ch
48. The following are some reasons for renaming a file, EXCEPT______________.

w
w
A. To back up files to be used later in the recovery process in case of damage

w
B. To correct obvious errors in filenames, including misspelled proper nouns, incorrect dates, and
misidentified objects
C. To harmonise the names of a set of images so that only one part of all names differs
D. To change from a meaningless or ambiguous name to a name that describes what the image particularly
displays (2 marks)

49. A modification to a program to improve its security, performance, or other feature is known as____________.
A. Software patch
B. Software version
C. Backup
D. Recovery (2 marks)

50. The following requirements are necessary when choosing an appropriate accounting package. Which one is NOT?
A. Size of business
B. Features available
C. Vendor support
D. Type of processor (2 marks

………………………….……………………………………………….

AD14 Page 6
Out of 6
ATD LEVEL I

INFORMATION COMMUNICATION TECHNOLOGY

TUESDAY: 25 April 2023. Morning Paper. Time Allowed: 3 hours.

Answer any FIVE questions. ALL questions carry equal marks. Do NOT write anything on this paper.

QUESTION ONE
(a) Explain the function of each of the following utility programs:

(i) Device driver. (2 marks)

(ii) Disk formatter. (2 marks)

(b) Propose a reason that might necessitate the use of rehearse timing feature in a presentation program. (2 marks)

(c) Outline THREE circumstances that could necessitate the use of a light pen as a computer input device. (3 marks)

(d)
e
Bidii Society Ltd installed an electronic spreadsheet program for use in its operations.
.k
Outline THREE ways in which this program could be used. (3 marks)
.co

(e) Outline FOUR reasons that would necessitate an organisation to connect its computers to a Local Area Network
pi

(LAN). (4 marks)
ho

(f) State FOUR ways of acquiring a computer software. (4 marks)


(Total: 20 marks)
C

QUESTION TWO
(a) (i) Define the term “anchor cell” as used in a spreadsheet. (1 mark)

(ii) Using an illustration of a worksheet, explain how you would calculate and display total sales. (3 marks)

(b) Giving an example in each case, distinguish between a “minicomputer” and a “microcomputer”. (4 marks)

(c) Citing examples, differentiate between hard copy and soft copy types of outputs. (4 marks)

(d) Explain TWO reasons why Universal Serial Bus (USB) devices have become more popular with computer users.
(4 marks)
(e) Compare local user accounts and network user accounts in context of operating systems. (4 marks)
(Total: 20 marks)

QUESTION THREE
(a) John Ochola desires to acquire a computer for use in his hardware supplies shop.

(i) State TWO factors that he would need to look for when getting the computer, he will need to buy.
(2 marks)

(ii) Explain TWO types of system software that he may need to acquire. (4 marks)

(iii) Suggest with a reason in each case, the TWO application software that might be necessary. (4 marks)

AD14 Page 1
Out of 2
(b) Highlight FOUR challenges associated with the use of command line interface (CLI). (4 marks)

(c) Joyce Njenga intends to set up a local area network (LAN) to use in her small business premise.

Explain THREE networking hardware tools that she may require to carry out this task. (6 marks)
(Total: 20 marks)

QUESTION FOUR
(a) Highlight THREE disadvantages of a Wireless Network. (3 marks)

(b) Explain FOUR benefits of Quick Response (QR) codes over bar codes. (4 marks)

(c) Describe FIVE file management tasks of a computer operating system. (5 marks)

(d) Examine FOUR reasons why many organisations have embraced cloud storage. (8 marks)
(Total: 20 marks)

QUESTION FIVE
(a) (i) Outline THREE negative impacts of information communication technology on the environment.
(3 marks)

(ii) Describe THREE technology trends that pose ethical issues. (3 marks)

(b) State FOUR features of a user-friendly program. (4 marks)

(c) Highlight FOUR circumstances under which the use of wireless communication would be preferred in data
communication. (4 marks)

ke
o.
(d) Examine SIX problems associated with using e-mail technology for communication. (6 marks)

i.c
op
(Total: 20 marks)

.ch
w
w
QUESTION SIX

w
(a) Explain the concept of scheduling in reference to operating systems. (2 marks)

(b) Describe a CAT 6 cable. (2 marks)

(c) State TWO functions of the recycle bin. (2 marks)

(d) Using relevant examples, distinguish between a “formula” and “function” in the context of spreadsheet. (4 marks)

(e) Distinguish between “multi user” and “single user” operating systems as used in computing. (4 marks)

(f) Examine SIX factors that you could consider when selecting a computer programming language. (6 marks)
(Total: 20 marks)

QUESTION SEVEN
(a) Excellent college intends to purchase a computerised accounting software for students’ use.

Required:
State FOUR features of such applications. (4 marks)

(b) Highlight FIVE applications of spreadsheet program in business. (5 marks)

(c) Outline FIVE challenges of coping with 3D printer’s technology trend in the market. (5 marks)

(d) Explain THREE positive impacts of the internet to business operations. (6 marks)
(Total: 20 marks)
………………………….……………………………………………….

AD14 Page 2
Out of 2
ATD LEVEL I

INFORMATION COMMUNICATION TECHNOLOGY

TUESDAY: 6 December 2022. Morning Paper. Time Allowed: 3 hours.

Answer any FIVE questions. ALL questions carry equal marks. Do NOT write anything on this paper.

QUESTION ONE
(a) (i) Identify TWO reasons why a menu driven interface is suitable for a novice user. (2 marks)

(ii) Outline TWO application areas of a menu driven interface. (2 marks)

(b) ABC Ltd. sold a custom-built software to XYZ Company.

Summarise FOUR factors that ABC Ltd. would consider in confirming that the software is appropriate to XYZ
Company.
(4 marks)
(c) In a busy office environment, a non-impact printer may be better than an impact printer.

e
State THREE reasons to justify this statement.
.k (6 marks)
.co
(d) Application software can either be “off-the-shelf” or “bespoke”.
pi

Differentiate between the above two types of application software using the following features:
(i) Flexibility.
ho

(ii) Functionality.
C

(iii) Training. (6 marks)


(Total: 20 marks)

QUESTION TWO
(a) Suggest THREE important features to consider when buying a computer keyboard. (3 marks)

(b) Explain TWO basic components of a computer network. (4 marks)

(c) Highlight FIVE reasons why flash disks have become more popular than optical disks. (5 marks)

(d) Discuss FOUR salient features of computerised accounting software (CAS). (8 marks)
(Total: 20 marks)

QUESTION THREE
(a) Explain FOUR activities that are performed by an operating system during management of Input/output devices
and ports. (4 marks)

(b) Explain the purpose of a switch and a router in a wireless LAN (WLAN). (4 marks)

(c) Highlight THREE advantages and THREE disadvantages of network operating systems. (6 marks)

(d) Assess TWO application areas of spread sheets. (6 marks)


(Total: 20 marks)

AD14 Page 1
Out of 2
QUESTION FOUR
(a) Outline THREE reasons why it is important to create different user accounts in a computer network. (3 marks)

(b) List FIVE advantages of using 5G technology. (5 marks)

(c) An accounting software is supposed to ensure security, integrity and confidentiality of data.

Describe THREE security features that an accounting software should have. (6 marks)

(d) Explain THREE reasons why you would recommend the use of a CAT 6 cable.
(6 marks)
(Total: 20 marks)
QUESTION FIVE
(a) Highlight TWO factors to consider when choosing an operating system. (2 marks)

(b) Explain THREE criteria that should be considered when setting up a local area network. (6 marks)

(c) Evaluate SIX reasons why a business organisation may want to use PDF files. (6 marks)

(d) List SIX advantages of Conditional Formatting in a spreadsheet.


(6 marks)
(Total: 20 marks)
QUESTION SIX
(a) Define each of the following terms as used in computing:
(i) Information. (2 marks)

(ii) Booting. (2 marks)

ke
o.
i.c
(iii) Processing. (2 marks)

op
.ch
w
(iv) Virus. (2 marks)

w
w
(b) Joyce Wambua intends to connect all her computers to the internet.

Outline THREE hardware requirements she will need to accomplish this task. (3 marks)

(c) Explain FOUR file management activities that are done by the operating system. (4 marks)

(d) James Okoth was tasked with acquiring an application software for an organisation.

Explain FIVE features that he should consider when buying the software. (5 marks)
(Total: 20 marks)

QUESTION SEVEN
(a) Outline THREE benefits of using wireless fidelity technology for network connectivity. (3 marks)

(b) Highlight THREE advantages of using a word processor software over a type writer. (3 marks)

(c) State FOUR factors which may prevent computer users from using speech input devices. (4 marks)

(d) Outline FOUR reasons why a calculator is regarded as a computer. (4 marks)

(e) An operating system provides a standard interface between a computer user and the computer system for
communication.

Other than a menu driven interface, explain TWO types of interfaces citing their application areas. (6 marks)
(Total: 20 marks)
………………………….……………………………………………….

AD14 Page 2
Out of 2
C
ho
pi
.co
.k
e
w
w
w
.ch
op
i.c
o.
ke
ATD LEVEL I

PILOT PAPER

INFORMATION COMMUNICATION TECHNOLOGY

December 2021. Time Allowed: 3 hours.

Answer any FIVE questions. ALL questions carry equal marks.

QUESTION ONE
(a) Discuss five factors to be considered before acquiring an appropriate software for an organisation (10 marks)

(b) Explain five benefits in the acquisition of a bespoke software to an organisation. (10 marks)
(Total: 20 marks)
QUESTION TWO
(a) Explain five reasons why a computer system may fail to boot. (10 marks)

(b) State five ways of ensuring safety of data stored on CD-RW. (10 marks)
(Total: 20 marks)
QUESTION THREE
e
.k
A private organisation has decided to acquire a customised/tailor made software for its business operations.
.co

Required:
(a) Explain the term “customized/tailor made” software. (2 marks)
pi

(b) Summarize five advantages of acquiring the software in (3)(a) above. (10 marks)
ho

(c) Explain four factors that an organisation should consider when acquiring tailor made software. (8 marks)
(Total: 20 marks)
C

QUESTION FOUR
(a) Identify four input devices that could be used in a supermarket. (4 marks)

(b) Explain three ways of classifying computers. (6 marks)

(c) Discuss five phases in the information technology infrastructure evolution. (10 marks)
(Total: 20 marks)

QUESTION FIVE
(a) Differentiate between “system software” and “application software”. (8 marks)

(b) Discuss the functions of an operating software. (8 marks)

(c) Differentiate between “dynamic memory” and “static memory” (4 marks)


(Total: 20 marks)
QUESTION SIX
(a) Discuss four disadvantages of using the internet as a research tool. (8 marks)

(b) Explain three factors that a company could consider when choosing an online data storage. (6 marks)

(c) Describe three goals of networking computers in an organisation. (6 marks)


(Total: 20 marks)

AD14 Page 1
Out of 2
QUESTION SEVEN
(a) Explain five factors that could determine the processing power of a computer. (10 marks)

(b) List five external storage devices that could be used to transfer information from one computer to another.
(5 marks)
(c) State five household appliances that could use computer control system. (5 marks)
(Total: 20 marks)

ke
o.
i.c
op
.ch
w
w
w

AD14 Page 2
Out of 2
C
ho
pi
.co
.k
e
w
w
w
.ch
op
i.c
o.
ke
C
ho
pi
.co
.k
e
w
w
w
.ch
op
i.c
o.
ke
C
ho
pi
.co
.k
e
w
w
w
.ch
op
i.c
o.
ke
C
ho
pi
.co
.k
e
w
w
w
.ch
op
i.c
o.
ke
C
ho
pi
.co
.k
e
w
w
w
.ch
op
i.c
o.
ke
C
ho
pi
.co
.k
e
w
w
w
.ch
op
i.c
o.
ke
C
ho
pi
.co
.k
e
w
w
w
.ch
op
i.c
o.
ke
C
ho
pi
.co
.k
e
w
w
w
.ch
op
i.c
o.
ke
C
ho
pi
.co
.k
e
w
w
w
.ch
op
i.c
o.
ke
C
ho
pi
.co
.k
e
w
w
w
.ch
op
i.c
o.
ke
C
ho
pi
.co
.k
e
w
w
w
.ch
op
i.c
o.
ke
C
ho
pi
.co
.k
e
w
w
w
.ch
op
i.c
o.
ke
C
ho
pi
.co
.k
e
w
w
w
.ch
op
i.c
o.
ke
C
ho
pi
.co
.k
e
w
w
w
.ch
op
i.c
o.
ke
ATD LEVEL I

INFORMATION COMMUNICATION TECHNOLOGY


TUESDAY: 2 August 2022. Morning paper. Time Allowed: 3 hours.

Answer any FIVE questions. ALL questions carry equal marks. Do NOT write anything on this paper.

QUESTION ONE
(a) Differentiate between the terms “computer” and “computer system”. (4 marks)
(b) In each case, draw a diagram to illustrate:

(i) The three stages of computer processing. (3 marks)


(ii) The main components of a computer system. (5 marks)

(c) Explain the functions of each of the components in (b) (ii) above. (8 marks)
(Total: 20 marks)
QUESTION TWO
(a) Explain the difference between the following:
e
.k
(i) A mainframe computer and a super computer. (2 marks)
.co
(ii) Application software and system software citing examples. (4 marks)
(b) Suggest two reasons why a bank might wish to buy a mainframe computer. (2 marks)
pi

(c) State the technology used in each of the following generations of computers:
ho

(i) First generation. (1 mark)


C

(ii) Second generation. (1 mark)


(iii) Third generation. (1 mark)
(iv) Fourth generation. (1 mark)

(d) Discuss four factors that might affect the speed of the microprocessor. (8 marks)
(Total: 20 marks)
QUESTION THREE
(a) Highlight six safety rules for using computers. (6 marks)
(b) Citing the function in each case, state four types of special keys in a computer keyboard. (8 marks)

(c) Complete the table below by explaining the differences between a file and a folder in the context provided.
An example is given below with regard to space.
Context File Folder
Space A file takes up space in RAM A folder cannot take up space in RAM
(i) Container of files
(ii) Content (data)
(iii) Operations
(iv) Extensions
(v) Sharing on network
(vi) Copying data from one to
another
(6 marks)
(Total: 20 marks)
AD14 Page 1
Out of 3
QUESTION FOUR
(a) Describe the following types of optical storage devices:

(i) Compact disk-read only memory (CD-ROM). (2 marks)

(ii) Compact disk-recordable (CD-R) (2 marks)

(iii) Compact disk-rewritable (CD-RW). (2 marks)

(b) Describe the following types of graphics cards as used in computing:

(i) Hercules graphics card (HGC). (2 marks)

(ii) Colour graphics adapter (CGA). (2 marks)

(iii) Enhanced graphics adapter (EGA). (2 marks)

(c) Citing a reason in each case, describe the most appropriate type of printer for the output of:

(i) Customer invoices on multi-part stationery. (2 marks)

(ii) Letters to customers. (2 marks)

(iii) Detailed engineering designs. (2 marks)

(d) Highlight two advantages of mesh computer network topology. (2 marks)


(Total: 20 marks)

QUESTION FIVE

ke
(a) Describe the following spreadsheet components:

o.
i.c
op
.ch
(i) A worksheet. (2 marks)

w
w
w
(ii) A database function. (2 marks)
(iii) A chart. (2 marks)

(b) Evaluate four criteria to consider when choosing the type of local area network (LAN) to implement. (8 marks)

(c) Examine four advantages and two disadvantages of a computerised accounting system (CAS). (6 marks)
(Total: 20 marks)

QUESTION SIX
(a) In the context of presentation software, distinguish between the following:

(i) Slide layout and slide design. (4 marks)

(ii) Transition and animation. (4 marks)

(b) Using an example, differentiate between on-line storage and off-line storage. (4 marks)

(c) Mathiu has created a word processing document containing ten pages. He wishes to print two copies of this
document containing odd pages only.

Specifying the word processing packages used, suggest the steps he would follow to achieve this objective.
(4 marks)
(d) Using an example in each case, explain the following terms as used in a spreadsheet software:

(i) Absolute reference. (2 marks)

(ii) Conditional formatting. (2 marks)


(Total: 20 marks)

AD14 Page 2
Out of 3
QUESTION SEVEN
(a) Describe each of the following devices as used in computer networking:

(i) Switch. (2 marks)

(ii) Router. (2 marks)

(iii) Gateway. (2 marks)

(b) Miriam Sawe has the following files saved in her computer:
Miri.docx, Miri.rtf, Miri.xls, Miri.accdb

Required:
Identify the application software that she used to create each of the files above. (4 marks)

(c) Describe three advantages of Graphical User Interface (GUI) operating system. (6 marks)

(d) The market is flooded with emerging technologies in 3D printers.

Explain four challenges of coping with this trend. (4 marks)


(Total: 20 marks)
………………………….……………………………………………….

e
.k
.co
pi
ho
C

AD14 Page 3
Out of 3
w
w
w
.ch
op
i.c
o.
ke
C
ho
pi
.co
.k
e
w
w
w
.ch
op
i.c
o.
ke
C
ho
pi
.co
.k
e
w
w
w
.ch
op
i.c
o.
ke
C
ho
pi
.co
.k
e
w
w
w
.ch
op
i.c
o.
ke

You might also like