Mock Questions For Grade 12
Mock Questions For Grade 12
1. The following are destructive software except A. drivers B. worms C. trojan horses D. logic
4. A program designed to detect and prevent malicious programs from a computer system is
A. spyware B. passcode C. malware D. firewall
7. Routine check operations on computers in order to ensure its continued functioning is known
as computer A. services. B. repairs. C. maintenance. D. installation.
8. Which of the following is one of the tools used to maintain the computer? A. Blower. B.
Calliper. C. Cotton wool. D. Kerosene.
9. Which of the following is not a good computer maintenance practice? A. Blowing the system
unit with a blower. B. Blowing the keyboard with a blower. C. Cleaning the screen with a wet
cloth. D. Cleaning the CD-ROM.
10. Which of the following substance is used for cleaning the mouse ball? A. Distilled
water. B. Engine oil. C. Isopropyl alcohol. D. Kerosene
11. A computer system under use was found to be unusually slow, freezes often and very dusty.
What is needed to correct this problem? A. Hit the system unit with a blower. B. Delete
some files. C. Change the location of the computer. D. Perform maintenance procedure.
12. A student in the school hostel was able to upload some personal details on the school portal
via the school's WiFi .
The ISP and the hostel are both domiciled in the school premises.
What type of network is illustrated above? A. MAN B. WAN C. LAN D. PAN
13. Which of the following data elements ranks highest in size? A. Field. B. Byte. C. Record.
D. Bit.
14. A pointing device that controls cursor movement on the screen is A. trackball. B.
plotter. C. keyboard. D. monitor.
C. specimen. D. statistics.
D. antiglare.
19. The speed of access to files in a random access file compared to other file organization
methods is A. very slow. B. the same. C. relatively fast. D. slow.
20. The volume of data that can be sent from one point to another in a given time period is
called A. broadband. B. byte. C. baud. D. bandwidth.
21. A type of file organization that stores data in the order of their arrival is called
22. Which of the following computer types represents data as variable and continuous values?
A. Analogue computer. B. Mainframe computer. C. Microcomputer.
D. Digital computer.
23. The following feature are found in the toolbox of CorelDraw application except
24. The ruler feature in MS Word that is used to indent the second and subsequent lines of a
paragraph is A. right indent. B. hanging indent. C. left margin. D. left indent.
25. The database tool that allows the user to select and filter data from multiple tables is
referred to as A. Form. B. Table. C. Query. D. Report.
26. One of the major differences between WAN and MAN is that
A. WAN used routers while MAN uses switches.
27. An application of ICT which allows a person to participate in a meeting from a remote
location is called? A. Telepresence. B. Podcasting. C. Broadcasting. D. Blogging.
29. A desktop computer is switched on and the monitor displays an error message which reads:
No input signal. The likely cause of this error is
31. A file organization method that has reference which identifies a record in relation to other
records is called A. Sequential file organization. B. Serial file organization
32. One application of ICT in education is A. Optical Mark Reader. B. Electronic Fund
Transfer. C. Automated Teller Machine. D. Magnetic Ink Character Recognition.
33. The process of sending and receiving information from one place to another is called
information A. Synchronization. B. Transfer. C. Transmission. D. Technology.
34. The subdivision of tracks in a hard disk is called A. Record. B. Row. C. Sector.
D. Cluster.
35. Any meaningful fact and knowledge item that can be expressed in words and numbers is
called
36. Which of these measures would not secure data in a database? A. Encryption. B. Data
integration. C. Personal Identification Number. D. Username and password
37. The prevention of data from corruption and unauthorized access is a unction of data A.
security. B. secrecy. C. integrity. D. coding.
38. Maintaining the value and content of data is part of data A. coding. B. integrity. C.
secrecy. D. security.
39. The protection of database against compromise is known as A. data pass wording. B. data
protection. C. database encoding. D. database security.
40. Ensuring the correctess and consistency of data is referred to as data A. security. B.
reliability. C. productivity. D. integrity.
41. The following are examples of relational operators except A. < B. > C. = D. *
42. Which of the following is not a normal form in relational database? A. 1NF B. 2NF C. 3NF
D. BCNF
44. Which of the following is an audio-visual medium for receiving information? A. Fax B. Film
strip C. Flip chart D. Television
45. The following are examples of operating systems by Microsoft corporation except A. MS-
Dos B. Windows NT C. XP D. Vista
46. The feature that prevents accidental overwriting when values are entered and cells are
selected on a worksheet is called A. Automatic calculation B. Automatic recalculation
C. Dynamic update D. Locked cell
47. The feature in Word Processing which compares every word with an electronic dictionary is
A. HelpB. Page alignment C. Thesaurus D. Word count
48. Which of these is not a database security tip? A. Updating anti-malware software B.
Enforce restriction on internet access C. Fight off hacking attacks with intrusion detection
technology D. Regular backup of data on removable media
49. A computer store data in units called A. bit B. database C. field D. File
50. Multi-tasking allows the ______ to access several programs at the same time. A.
computer B.CPU C. RAMD. VDU
51. While typing, a series of letters were highlighted and the keyboard key combination "Ctrl +
B" was executed. The highlighted letters would be a. underlined b. italicized c. deleted
d. Bold
52. In Word Processing applications, the symbols B, I and U are commonly used buttons found
on the a. Standard toolbar b. Menu bar c. Formatting toolbar d. Drawing toolbar
53. A Word document can have any of these file extensions except a. .doc
b. .docx c. .jpg d. .rtf
55. Information that stimulates both the senses of hearing and sight is called A. audio
information B. audio-visual information C. video information D. visual information
56. Which of the following sources of information is received by the user in visual mode only?
A. Television B. Radio C. Photograph D. Computer
58. The unprocessed fact is called . A. Data B. Processing C. Information D. All of the
above
60. The lab should be kept at all time. A. Covered B. Clean C. Pure D. None of the above
THEORY