Multiple Choice Past Paper 1
Multiple Choice Past Paper 1
Paper 1
May / June 2020
6. The lights in a room turn on as soon as a person enters. Which input device MOST likely controls the lighting in
the room?
(A) Sensor
(B) Remote
(C) Scanner
(D) Keyboard
7. Which of the following devices is used to input data into the computer?
(A) Mouse
(B) Monitor
(C) USB flash drive
(D) External hard drive
8. For which of the following interface types is the user required to remember specific instructions and syntax?
(A) Menu-driven
(B) Graphical user
(C) Computer screen
(D) Command-driven
10. The RP Secondary School wants the administrative staff to have access to all student and teacher data. Which of
the following networks would be MOST suitable to enable such access?
(A) WLAN
(B) WAN
(C) MAN
(D) LAN
(A) LAN
(B) Wi-Fi (C) Hotspot
(D) Bluetooth
12. Unauthorized, real-time interception of a private communication on a computer network is referred to as:
(A) Propaganda
(B) Identity theft
(C) Industrial espionage
(D) Electronic eavesdropping
14. Part of a private network using Internet technology and public telecommunications that can be accessed by
business suppliers, vendors, customers, and partners is called an:
(A) Internet
(B) Intranet
(C) Extranet
(D) Ethernet
18. Transferring data from a remote computer to your computer is referred to as:
(A) Browsing
(B) Uploading
(C) Data mining
(D) Downloading
19. Which of the following types of technologies is commonly used by banks to read data on cheques?
(A) POS
(B) OCR
(C) OMR
(D) MICR
22. In order to use a program stored on a flash drive, the program must be transferred into:
(A) ROM
(B) RAM
(C) PROM
(D) EPROM
25. The process of scrambling messages at the sending end and unscrambling them at the receiving end is called:
(A) Coding
(B) Encryption
(C) Espionage
(D) Eavesdropping
26. There are many software restrictions used by computers to protect data and maintain data integrity. Which of the
following entities are software restriction media?
I. Viruses
II. Passwords
III. Encryption
27. Which of the following devices can be used for both input and output?
(A) Touchscreen
(B) Barcode reader
(C) Flatbed scanner
(D) Document reader
30. An official of Company X sells confidential information about his company to Company Y. What is the term
used for this type of information misuse?
(A) Identity theft
(B) Computer fraud
(C) Industrial espionage
(D) Electronic eavesdropping
32. Which part of the central processing unit (CPU) coordinates its activities?
(A) Register
(B) Control unit
(C) Main memory
(D) Arithmetic logic unit
33. Before purchasing a computer, James was given a sheet with the following hardware specifications:
The word use of the computer is
(A) 2 GB Intel Pentium IV 64 bit
(B) 64 bit 3.6 GHz 2 GB 533 MHz
(C) 533 MHz 50 RAM 160 GB SATA
(D) 3.6 GHz HDD 7200 rpm
34. Which type of interface allows the user to communicate with the computer system by keying in instructions?
(A) Menu driven
(B) Graphical user
(C) Touch sensitive
(D) Command-driven
37. Which of the following types of software should be used for applications that involve repetitive numerical
calculations?
(A) Database
(B) Presentation
(C) Spreadsheet
(D) Word processing
40. In creating a query, a student entered the following criteria for the date field:
>=05/11/2017 and <=05/14/2017
The output will show days
(A) after 14 May 2017 only
(B) from 11 to 14 May 2017
(C) before 11 May and after 14 May 2017
(D) between 14 May and 5 November 2017
42. Which of the following buttons can be used to fully justify text?
(A)
(B)
(C)
(D)
Item 43 refers to the following table containing data on three countries, A, B, and C, for 2018 and 2019.
Country 2018 2019
A 300 600
B 500 800
C 500 600
43. Which of the following types of charts is NOT suitable for representing the data?
(A) Pie
(B) Bar
(C) Line
(D) Column
44. The field that uniquely identifies a record in a database is called the
(A) foreign key
(B) primary key
(C) alternate key
(D) secondary key
45. Which of the following sequences of steps is correct for deleting a field in a database table?
(A) 1. Choose the delete row option. (C) 1. Select row to be deleted and right-click.
2. Select row to be deleted and right-click. 2. Open table in design view.
3. Open table in design view. 3. Choose the delete row option.
4. Choose yes to confirm deletion. 4. Choose yes to confirm deletion.
(B) 1. Open table in design view. (D) 1. Select row to be deleted and right-click.
2. Select row to be deleted and right-click. 2. Choose the delete row option.
3. Choose the delete row option. 3. Open table in design view.
4. Choose yes to confirm deletion. 4. Choose yes to confirm deletion.
H050 Hammer 20
H040 Hammer 40
FK030 Fork 40
FK020 Fork 45
FK015 Fork 35
49. Which security feature offers the LEAST protection to a Word document?
(A) Restricting editing
(B) Adding a digital signature
(C) Encrypting with a password
(D) Saving as compatible with the appropriate software version
50. If the formula in Cell B8 is copied to the shaded cell, C8, then the formula in Cell C8 would be
(A) =SUM(B2:B6)
(B) =SUM(B3:B7)
(C) =SUM(C2:C6)
(D) =SUM(C3:C7)
53. When implementing a program, which of the following steps comes after executing?
(A) Linking
(B) Compiling
(C) Maintaining
(D) Interpreting
57. A computer programmer is coding an algorithm that calculates the class average for a given exam. He
creates a variable called class_avg. Which data type should he specify when declaring this variable?
(A) Real
(B) Integer
(C) Boolean
(D) Character
58. Which of the following options, in the correct order, can be used to replace I, II and III in the algorithm?
(A) Read, write, prompt
(B) Write, read, prompt
(C) Prompt, read, write
(D) Read, prompt, write
59. Which of the following types of software would be the MOST appropriate for showing information in tables
and reports?
(A) Database
(B) Spreadsheet
(C) Presentation
(D) Word processing