0% found this document useful (0 votes)
153 views4 pages

FORM 5 Computer Science Paper 1-1

The document outlines a Form 5 Computer Science exam consisting of multiple-choice questions covering various topics such as operating systems, software types, data storage, and computer security. It includes questions on definitions, functions, and examples related to computer science concepts. The exam is timed for 1 hour and 30 minutes, with a total of 50 questions worth 1 mark each.

Uploaded by

larymarklary
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
153 views4 pages

FORM 5 Computer Science Paper 1-1

The document outlines a Form 5 Computer Science exam consisting of multiple-choice questions covering various topics such as operating systems, software types, data storage, and computer security. It includes questions on definitions, functions, and examples related to computer science concepts. The exam is timed for 1 hour and 30 minutes, with a total of 50 questions worth 1 mark each.

Uploaded by

larymarklary
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

AMERICAN SCHOOL NKOLBISSON-YAOUNDE

MOTTO: RIGOR – WORK – EXCELLENCE

TEL. 674 668 672/ 696 424 496/ 697 945 535/676 969 471

Form 5 – Computer Science Exam

Paper 1: Multiple Choice Questions (MCQs)


Time: 1 hour 30 minutes
Total Marks: 50 (1 mark per question)

1. Which of the following best defines an b) Data is organized in tables with rows
operating system? and columns
a) A physical part of the computer c) Data is processed using graphical icons
b) A system used to edit images d) Data is stored as unstructured content
c) Software that manages computer 6. Which term refers to unauthorized access
hardware and software resources to computer systems?
d) A program used for creating a) Malware
presentations b) Phishing
2. Which of these is an example of open- c) Hacking
source software? d) Encryption
a) Microsoft Office 7. What is the primary role of a firewall in
b) Linux computer security?
c) Adobe Photoshop a) Detecting viruses
d) Windows 11 b) Protecting against unauthorized
3. What is the primary function of RAM? network access
a) Permanent storage c) Managing system updates
b) Temporary data storage for active d) Encrypting files
programs 8. Which of these programming languages
c) Input and output control is object-oriented?
d) Displaying graphics a) HTML
4. Which of the following is not an input b) Python
device? c) SQL
a) Scanner d) CSS
b) Microphone 9. What is the full form of SQL?
c) Printer a) Sequential Query Language
d) Keyboard b) Standard Question Language
5. Which of the following is a characteristic c) Structured Query Language
of a relational database? d) System Query Language
a) Data is stored in a hierarchical format
10. Which of the following c) Differential backup
represents volatile memory? d) System backup
a) ROM 19. What does BIOS stand for?
b) Hard Drive a) Basic Input Output System
c) USB Drive b) Binary Integrated Operating System
d) RAM c) Basic Internal Operating Software
11. Which type of software is designed to help d) Built-In Operating System
users perform specific tasks? 20. Which of these is an example of
a) System software a proprietary operating system?
b) Application software a) Ubuntu
c) Utility software b) macOS
d) Firmware c) Linux
12. What does GUI stand for? d) Android
a) General User Integration 21. What is the primary function of a router in
b) Graphical User Interface a network?
c) General Utility Interaction a) Convert digital signals to analog signals
d) Graphic Utility Interpreter b) Connect devices within a local network
13. Which of the following is an example c) Forward data packets between different
of secondary storage? networks
a) RAM d) Provide power to connected devices
b) ROM 22. Which logic gate gives a HIGH output
c) Hard Drive when both inputs are HIGH?
d) Cache Memory a) AND
14. What is the primary role of the Control b) OR
Unit (CU) in the CPU? c) NOT
a) Perform arithmetic operations d) XOR
b) Manage system memory 23. What does HTTP stand for?
c) Direct the flow of instructions and data a) HyperText Transfer Protocol
d) Store frequently accessed data b) Hyper Terminal Text Processor
15. Which of the following is not an example c) High Transmission Transfer Protocol
of system software? d) Hyperlink Text Tracking Protocol
a) Microsoft Excel 24. Which of these best describes phishing?
b) Windows 11 a) Scanning a network for vulnerabilities
c) macOS b) Sending fraudulent emails to steal
d) Linux Kernel personal information
16. What is the purpose of device drivers? c) Gaining unauthorized access to a
a) Manage Internet connections computer system
b) Translate user commands into machine d) Encrypting data for secure transmission
language 25. What is the purpose of a task manager in
c) Enable communication between an operating system?
hardware and the operating system a) Organize user files
d) Protect the computer from malware b) Schedule calendar events
17. Which file extension is commonly c) Monitor and control running processes
associated with database files? d) Create new user accounts
a) .docx 26. Which of the following is
b) .xls an input/output device?
c) .mdb a) Printer
d) .jpg b) Touchscreen
18. What type of backup only saves changes c) Keyboard
made since the last full backup? d) Monitor
a) Full backup 27. Which component is responsible
b) Incremental backup for arithmetic and logic operations?
a) Control Unit
b) Memory Unit b) Managing hardware components
c) Arithmetic Logic Unit (ALU) c) Querying and managing data
d) Input Device d) Analyzing system performance
28. What is the term for a malicious 37. What is a primary key in a database?
program that replicates itself? a) A unique identifier for records
a) Virus b) A password for the database
b) Firewall c) The main folder in a database
c) Cache d) The first record in a table
d) Proxy 38. Which of the following is a cloud
29. Which software development phase storage service?
involves testing the software? a) Excel
a) Design Phase b) Google Drive
b) Implementation Phase c) Windows Defender
c) Verification Phase d) USB Flash Drive
d) Maintenance Phase 39. What is the purpose of defragmentation?
30. What is the smallest unit of data storage in a) Remove viruses
a computer? b) Reorganize fragmented data on a hard
a) Byte drive
b) Bit c) Backup user files
c) Kilobyte d) Update the operating system
d) Megabyte 40. What is an IP address used for?
31. Which of these is an example of open- a) Identifying software versions
source software? b) Tracking user activity
a) Windows c) Identifying devices on a network
b) Microsoft Word d) Protecting from malware
c) Mozilla Firefox 41. Which component connects the CPU
d) Adobe Photoshop to external devices?
32. What does IP in IP address stand for? a) ALU
a) Internal Program b) Bus
b) Internet Protocol c) Cache Memory
c) Integrated Path d) Power Supply
d) Information Package 42. What is the function of virtual memory?
33. Which of the following is an example a) Storing software permanently
of volatile memory? b) Increasing processor speed
a) Hard Drive c) Using hard drive space to extend RAM
b) SSD d) Protecting sensitive information
c) RAM 43. Which of the following is not a function
d) USB Flash Drive of an operating system?
34. What is the main function of a) Memory management
an antivirus program? b) Hardware control
a) Encrypt sensitive data c) Network security
b) Detect and remove malware d) Word processing
c) Manage hardware resources 44. Which device is non-volatile?
d) Facilitate data backups a) RAM
35. Which of these is an example of system b) Cache
software? c) Hard Disk
a) Web Browser d) Registers
b) Operating System 45. What does USB stand for?
c) Word Processor a) Universal Software Bus
d) Presentation Software b) Universal Serial Bus
36. In databases, SQL is used for: c) Unified Storage Block
a) Designing GUIs d) Unique System Bridge
46. Which of the following best
describes encryption?
a) Compressing files
b) Converting data into a secure format
c) Removing malware
d) Organizing databases
47. What is the main function of the BIOS?
a) Store user data
b) Execute applications
c) Initialize hardware during startup
d) Manage virtual memory
48. Which computer component executes
instructions?
a) Hard Drive
b) CPU
c) GPU
d) RAM
49. Which is an example of an output device?
a) Mouse
b) Scanner
c) Printer
d) Microphone
50. What does PDF stand for?
a) Portable Document Format
b) Program Data File
c) Professional Digital Form
d) Public Data Framework

You might also like