0% found this document useful (0 votes)
37 views9 pages

Multiple Choice Past Paper 1

The document is a class test paper containing multiple-choice questions related to computer hardware, software, data management, and programming concepts. It includes questions on topics such as cloud storage, input devices, network types, and data validation techniques. The test aims to assess students' understanding of fundamental computer science principles.

Uploaded by

ultraprometheus
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views9 pages

Multiple Choice Past Paper 1

The document is a class test paper containing multiple-choice questions related to computer hardware, software, data management, and programming concepts. It includes questions on topics such as cloud storage, input devices, network types, and data validation techniques. The test aims to assess students' understanding of fundamental computer science principles.

Uploaded by

ultraprometheus
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

CXC Past Paper Questions Class Test: February 14, 2025

Paper 1
May / June 2020

1. Which of the following items are considered computer hardware?


(A) Database
(B) Programs
(C) Output devices
(D) Operating systems

2. Data that has been processed and has meaning is termed


(A) Information
(B) Database
(C) Storage
(D) Output

3. Which of the following can be termed 'application software'?


(A) DOS
(B) Linux
(C) Mac OS
(D) Internet Explorer

4. Which of the following activities would NOT be considered as cloud storage?


(A) Data stored on remote servers
(B) Data stored and accessible on a LAN
(C) Data back-up and storage devices on the Internet
(D) Data managed by storage providers or hosting companies

5. Which of the following could NOT be classified as a cloud-based application?


(A) Gmail
(B) Drop Box
(C) Google Drive
(D) Windows OS

6. The lights in a room turn on as soon as a person enters. Which input device MOST likely controls the lighting in
the room?
(A) Sensor
(B) Remote
(C) Scanner
(D) Keyboard

7. Which of the following devices is used to input data into the computer?
(A) Mouse
(B) Monitor
(C) USB flash drive
(D) External hard drive

8. For which of the following interface types is the user required to remember specific instructions and syntax?
(A) Menu-driven
(B) Graphical user
(C) Computer screen
(D) Command-driven

9. Item 9 refers to the following model of a globe.


The MOST suitable printer for creating the model of the globe is:
(A) A 3-D printer
(B) A laser printer
(C) An ink-jet printer
(D) A thermal printer

10. The RP Secondary School wants the administrative staff to have access to all student and teacher data. Which of
the following networks would be MOST suitable to enable such access?
(A) WLAN
(B) WAN
(C) MAN
(D) LAN

11. The symbol represents:

(A) LAN
(B) Wi-Fi (C) Hotspot
(D) Bluetooth

12. Unauthorized, real-time interception of a private communication on a computer network is referred to as:
(A) Propaganda
(B) Identity theft
(C) Industrial espionage
(D) Electronic eavesdropping

13. Double entry data verification involves:


(A) Different data entered once
(B) The data entered being copied to another device
(C) Different data entered once by two different persons
(D) The same data entered once then re-entered by another person

14. Part of a private network using Internet technology and public telecommunications that can be accessed by
business suppliers, vendors, customers, and partners is called an:
(A) Internet
(B) Intranet
(C) Extranet
(D) Ethernet

15. Which of the following shows an increase in computer memory capacity?


(A) Terabyte → Gigabyte → Megabyte
(B) Gigabyte → Kilobyte → Megabyte
(C) Megabyte → Terabyte → Gigabyte
(D) Megabyte → Gigabyte → Terabyte

16. Which of the following functions is performed by a modem?


(A) Analog and digital
(B) Digital and upload
(C) Analog and download
(D) Download and upload

17. In the URL http://www.shoes.com, 'shoes.com' stands for the:


(A) Extension
(B) Domain name
(C) Company name
(D) Internet company

18. Transferring data from a remote computer to your computer is referred to as:
(A) Browsing
(B) Uploading
(C) Data mining
(D) Downloading

19. Which of the following types of technologies is commonly used by banks to read data on cheques?
(A) POS
(B) OCR
(C) OMR
(D) MICR

20. Which of the following operations is considered a feature of a biometric system?


(A) Matching fingerprints
(B) Detecting irregular heartbeats
(C) Diagnosing medical symptoms
(D) Helping to lubricate skeletal joints

21. Telecommuting can be BEST described as:


(A) Using the computer while commuting
(B) Using the telephone while commuting
(C) Working from home by connecting home and office
(D) Working from the office after establishing a connection at home

22. In order to use a program stored on a flash drive, the program must be transferred into:
(A) ROM
(B) RAM
(C) PROM
(D) EPROM

23. Which of the following is NOT a hardware component of a computer system?


(A) Data file
(B) Main memory
(C) Peripheral device
(D) Central processing unit

24. Which of the following checks is NOT a validation technique?


(A) Range
(B) Inconsistency
(C) Double entry
(D) Reasonableness

25. The process of scrambling messages at the sending end and unscrambling them at the receiving end is called:
(A) Coding
(B) Encryption
(C) Espionage
(D) Eavesdropping

26. There are many software restrictions used by computers to protect data and maintain data integrity. Which of the
following entities are software restriction media?
I. Viruses
II. Passwords
III. Encryption

(A) I and II only


(B) I and III only
(C) II and III only
(D) I, II, and III

27. Which of the following devices can be used for both input and output?
(A) Touchscreen
(B) Barcode reader
(C) Flatbed scanner
(D) Document reader

28. Which of the following is true of accessing files sequentially?


(A) Occurs in any order
(B) Starts with the first record
(C) Starts with the largest data field
(D) Starts with the smallest data field

29. Which of the following is a hardware user interface?


(A) GUI
(B) Icon
(C) Sensor
(D) Touchscreen

30. An official of Company X sells confidential information about his company to Company Y. What is the term
used for this type of information misuse?
(A) Identity theft
(B) Computer fraud
(C) Industrial espionage
(D) Electronic eavesdropping

31. Which of the following are NOT categorized as system software?


(A) Productivity tools
(B) Operating systems
(C) Translators
(D) Utilities

32. Which part of the central processing unit (CPU) coordinates its activities?
(A) Register
(B) Control unit
(C) Main memory
(D) Arithmetic logic unit

33. Before purchasing a computer, James was given a sheet with the following hardware specifications:
The word use of the computer is
(A) 2 GB Intel Pentium IV 64 bit
(B) 64 bit 3.6 GHz 2 GB 533 MHz
(C) 533 MHz 50 RAM 160 GB SATA
(D) 3.6 GHz HDD 7200 rpm

34. Which type of interface allows the user to communicate with the computer system by keying in instructions?
(A) Menu driven
(B) Graphical user
(C) Touch sensitive
(D) Command-driven

35. A webmaster is important to the company because he/she


(A) is responsible for the company’s website
(B) assigns web addresses to all users in a company
(C) backs up files and stores the disks at another location
(D) monitors the shutting down of competitors’ websites

36. Which of the following is an example of a correctly formatted e-mail address?


(A) Lana.happy@net
(B) @lana.happy.net
(C) lana@happy@net
(D) [email protected]

37. Which of the following types of software should be used for applications that involve repetitive numerical
calculations?
(A) Database
(B) Presentation
(C) Spreadsheet
(D) Word processing

38. Selecting or highlighting a paragraph creates a


(A) file
(B) block
(C) merge
(D) document

39. The following formula is located in position B6 of a spreadsheet. =B3+B4+$B$5


What would be the resulting formula if the initial formula was copied to the position located immediately on
the left?
(A) C3 + C4 + C5
(B) A3 + A4 + A5
(C) A3 + A4 + $B$5
(D) C3 + C4 + $B$5

40. In creating a query, a student entered the following criteria for the date field:
>=05/11/2017 and <=05/14/2017
The output will show days
(A) after 14 May 2017 only
(B) from 11 to 14 May 2017
(C) before 11 May and after 14 May 2017
(D) between 14 May and 5 November 2017

41. Spreadsheet formulae use


(A) values or labels
(B) labels or cell addresses
(C) values, labels or cell addresses
(D) numbers, labels or cell addresses

42. Which of the following buttons can be used to fully justify text?
(A)

(B)

(C)

(D)

Item 43 refers to the following table containing data on three countries, A, B, and C, for 2018 and 2019.
Country 2018 2019

A 300 600

B 500 800
C 500 600

43. Which of the following types of charts is NOT suitable for representing the data?
(A) Pie
(B) Bar
(C) Line
(D) Column

44. The field that uniquely identifies a record in a database is called the
(A) foreign key
(B) primary key
(C) alternate key
(D) secondary key

45. Which of the following sequences of steps is correct for deleting a field in a database table?

(A) 1. Choose the delete row option. (C) 1. Select row to be deleted and right-click.
2. Select row to be deleted and right-click. 2. Open table in design view.
3. Open table in design view. 3. Choose the delete row option.
4. Choose yes to confirm deletion. 4. Choose yes to confirm deletion.

(B) 1. Open table in design view. (D) 1. Select row to be deleted and right-click.
2. Select row to be deleted and right-click. 2. Choose the delete row option.
3. Choose the delete row option. 3. Open table in design view.
4. Choose yes to confirm deletion. 4. Choose yes to confirm deletion.

Item 46 refers to the following database table.


Item
Item Desc. Quantity
No.

H050 Hammer 20
H040 Hammer 40

FK030 Fork 40

FK020 Fork 45

FK015 Fork 35

46. The database table above shows records sorted by


(A) Quantity in ascending order
(B) Quantity in descending order
(C) Item No. in ascending order
(D) Item No. in descending order

47. Which of the following clearly identifies a hyperlink in an HTML document?

I. A link to an email address


II. A link to another webpage
III. A link to another location within the webpage

(A) I and II only


(B) I and III only
(C) II and III only
(D) I, II, and III

48. Which of the following is used for executing HTML code?


(A) A parser
(B) A browser
(C) An assembler
(D) An interpreter

49. Which security feature offers the LEAST protection to a Word document?
(A) Restricting editing
(B) Adding a digital signature
(C) Encrypting with a password
(D) Saving as compatible with the appropriate software version

Item 50 refers to the following spreadsheet.

50. If the formula in Cell B8 is copied to the shaded cell, C8, then the formula in Cell C8 would be

(A) =SUM(B2:B6)
(B) =SUM(B3:B7)
(C) =SUM(C2:C6)
(D) =SUM(C3:C7)

Item 51 refers to the following algorithm.


Algorithm:
Read (A , B)
If A < B Then
P r i n t ( A );
51. Which of the following tasks does the following algorithm perform?
(A) Reads two numbers and prints the first number
(B) Reads two numbers and prints the smaller number
(C) Reads two numbers and prints the first number if it is larger than the second number
(D) Reads two numbers and prints the first number if it is smaller than the second number

52. Which of the following is an example of a conditional construct?


(A) IF ... THEN ... ELSE
(B) FOR ... ENDWHILE
(C) WHILE ... ENDWHILE
(D) REPEAT ... UNTIL

53. When implementing a program, which of the following steps comes after executing?
(A) Linking
(B) Compiling
(C) Maintaining
(D) Interpreting

54. Which of the following is NOT a high-level programming language?


(A) C
(B) Java
(C) Pascal
(D) Assembly

55. Which of the following terms is an invalid variable name?


(A) Sum
(B) 2count
(C) Vat15
(D) Count

56. The decision box of a program flowchart shows the:


(A) Link to another page
(B) Test to be carried out
(C) Calculations to be done
(D) Input and output operators

57. A computer programmer is coding an algorithm that calculates the class average for a given exam. He
creates a variable called class_avg. Which data type should he specify when declaring this variable?
(A) Real
(B) Integer
(C) Boolean
(D) Character

Item 58 refers to the following algorithm.


I. Ask users for length and width
II. length, width
III. area  length * width
IV. “Area of rectangle is”, area

58. Which of the following options, in the correct order, can be used to replace I, II and III in the algorithm?
(A) Read, write, prompt
(B) Write, read, prompt
(C) Prompt, read, write
(D) Read, prompt, write

59. Which of the following types of software would be the MOST appropriate for showing information in tables
and reports?
(A) Database
(B) Spreadsheet
(C) Presentation
(D) Word processing

60. In what form is data stored in a database?


(A) Table
(B) Chart
(C) String
(D) Numeric

You might also like