0% found this document useful (0 votes)
37 views10 pages

CSEC IT MayJune P1 2022 Answer

The document contains a series of multiple-choice questions related to computer hardware, software, networking, and programming concepts. It covers topics such as application software, cloud storage, data transfer, and algorithm design. Additionally, it includes questions on spreadsheet functions, data entry devices, and programming syntax.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
37 views10 pages

CSEC IT MayJune P1 2022 Answer

The document contains a series of multiple-choice questions related to computer hardware, software, networking, and programming concepts. It covers topics such as application software, cloud storage, data transfer, and algorithm design. Additionally, it includes questions on spreadsheet functions, data entry devices, and programming syntax.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 10
ee Whichofthefollowingitemsareconsidered 6. Software which is modified to perform computer hardware? specific tasks fora particularuser is referred toas (A) Data Programs (A) _ general purpose and special soft- ware perating systems (B) general purpose and customized software (©) special purpose and custom written ‘The process of scrambling messages at the software sending end and unscrambling them at the receiving end is called (A) coding espiona; 7. The RP Secondary School wants the administrative staff to have access to all eavesdropping student and teacher data. Which of the following networks would be MOST suitable to enable such access? Which of the following can be termed ‘application software"? (A) Dos (B) Linux (©) Mac OS Which of the following activities would NOT be considered cloud storage? (A) stored on remote (C) Data back-up and storage device: ‘on the Internet, 10. i. 12. 13. Item 10 refers to the following symbol. = The symbol represents ® LAN (©) Hotspot (D) Bluetooth Which of the following countermeasures can ONLY be implemented as a software measure, tomitigate the effects of identified threats to a computer system? i) Pea n of data (©) Backup and recovery (D) _ Intrusion detection system Unauthorized, real-time interception of a private communication on a computer network is referred to as A) propaganda (B) _ identity theft ~ © industrial espionage Double entry data verific 15. 16. Part of a private network using Internet technology and public telecommunications that can be accessed by business suppliers, vendors, customers and partners is called an (A) __ Internet (B) __ Intranet (D) Ethernet Telecommuting can be BEST described as (A) __ using the computer while commut- ing (B) _ using thetelephone whilecommut- ing (D) working from the office after establishing connection athome Which of the following functions is performed by a modem? 18, 19. Eran Transferring data from a remote computer to your computer is referred to as (A) browsing (B) —_uploadi (©) Bade Which of the following types of technolo- gies is commonly used by banks to read data on cheques? (A) POS (B) OCR S oye Items 20 and 21 refer to the following information. Customers log in to an online application using a username and password to submit a record of their ir a utility company. for the file of all customers each. ~ 4A) — Serial 22. 23. 24. In order to use a program stored on a flash drive, the program must be transferred into (A) M « OM. (D) EPROM Which of the following is NOT a hardware component of a computer system? (B) ame: memory (C) Peripheral device (D) Central processing unit A system that analyses data and that uses rules and previous information to deliver possible decisions is called A robot machine. Oa ymetric machine 27. ae Which of the following examples describe a denial-of-service (DOS) attack? I. Sudden excessive increase in amount, of junk emails II. Inability to reach regular websites because of too many requests Ill. Decrease in network performance because ofa flood of transactions (A) Land Ionly (B) Land II only a : Land Il only Which of the following protocols is used to ensure that all web pages and servers communicate with each other? (A) iP @) FIP “© VolP ©) HTIP Which of the following is true of accessing files sequentially? in any (©) Starts with the largest data field Starts with the smallest data field 30. 31. ae A webmaster is important to the company because he/she (B) assigns web addresses to all users. ‘a.company (C) backs up files and stores the disks at another location (D) monitors the shutting down of competitors’ websites Which of the following are NOT categorized as system software? (A) Utilities B ranslator (D) _ Operating systems The order of connecting the hardware components of a LAN, starting from the ISP’s telecommunication line, to a desktop computer is 34. 35. 37. Which type of interface allows the user to ‘communicate with the computer system by keying in instructions? (A) Menu-driven (B) Graphical user (©) Tah a Which of the following devices is used for ‘manual data entry into a computer system? Smart card (©) Document scanner (D) Optical mark reader Which of the following is an example of a correctly formatted e-mail address? a peleatarexiats (C) _ Lana.happy@net (D) © Lana@happy@net Which of the following types of software should be used for applications that involve repetitive numerical calculations? ~ (A) Database 39. 40. The following formulais located in position B6 of a spreadsheet. = B3 + B4 + SBS5 What would be the resulting formu initial formula was copied to the position located immediately on the left? (A) C3 +C4+05 (B) A3+A4+A5 (D) C3 +C4+$B35 In creating a query, a student entered the following criteria for the date field. > = 05/11/2022 and < = 05/14/2022 The output will show days 2022 only 2 before 11 May and after 14 May 2022 (D) _ between 14 May and 5 November 2022 35. =62 Which type of interface allows the user to. 39. ‘communicate with the computer system by keying in instructions? (A) Menu-driven (B) Graphical user (©) Touch sensitive (DP) Command-driven Which of the following devices is used for manual data entry into a computer system? (A) Smart card (B) Barcode reader (©) __ Document scanner 40. () Optical mark reader Which of the following is an example of a correctly formatted e-mail address? (A) [email protected] @) © ©) The following formulais located in position B6 of a spreadsheet. =B3 + B4 + $BS5 What would be the resulting formula if the initial formula was copied to the position located immediately on the left? (A) C3+C4+C5 (B) AB +A4+AS (C) A3+A4+SBS5 (D) C3 +C4+$BS5 In creating a query, a student entered the following criteria for the date field. > = 05/11/2022 and <= 05/14/2022 The output will show days (A) afler 14 May 2022 only from 11 to 14 May 2022 e 11 May and after 14 May Items 43 and 44 refer to the following sentence. Whih the high is ready to lay her eggs, then and only then will the hen find a secluded spot to la: them. When using the Find and Replace editing feature in a word processing program, without usi the ‘whole words only’ option, how many occurrences of “hen” would be found in the sentence above? (A) (B) «C) ©) Which of the following features would be LEAST efficient when using the Find and Replace dialogue box to replace all occurrences of the word “hen” with the word “duck” (A)__ Skippifngto each individual occurrence ae oe Hems 45 and 46 refer to the following spreadsheet. A 8 E D eae G [1] Firstname | Lastname [Birth date [Gender | Married] Phone _| Exercise 2 | Roy SINGH 02-Jan-97 |M___| TRUE] 688-4444 | 020 3 [Jamilla JOHNSON 22-Mar-82 [F False | 720-9123 | 020 4 | tyson BARRINGTON _ | 23-Mar-96 | M TRUE | 630-1234 | S[ Dennis [RAMPERSAD __[oaul78 _[M FALSE | 456-7890 | 050 6|Micheal__| BAPTISTE 23-May-99 |[M FALSE] 456-6676 | 030 7 [Joelle BROWN 18-Jun-00 | F TRUE | 620-0190 | 040 8 | Smith JONES 20-0ec97 [M TRUE| 640-2823 | 020 9|Micheat___|JoNes 18-Jun-96 [M TRUE | 640-4929 | 050 10 | Denise CLEMENT 18-Jun-02 [F FALSE | 640-9989 | 030 Exercise No 45. Which of the following formulas will display the exercise name “Zumba” in any cell where the formila is placed? ‘ (B) oon @ z 9 22, ara ise (C) ‘VLOOKUP (G4, AI8 : C22, 3, FALSE) .@) — =VLOOKUP G10, A18 ; C22, 2, FALSE) Which of the follo in Column D? (A) =COUNT(D! 47. 49. -9- What type of cell referencing will replicate a formula that uses fixed cells? a Relative I. Absolute Tl. Mixed $1. (A) Land Ionly (B) Land III only (©) Mand Ill only @) 1, Mand II Which of the following features would give you the old and new versions of a previously saved document when using a word processor? (A) SAVEAS with file extension (B) _ SAVEAS with the old filename (©)__SAVE AS with a new file type (©) SEAS witha Henne 52. The field that uniquely identifies a record in a database is called the : (A) @) foreign key primary key ‘Item 51 refers to the following algorithm. Read (A, B) IfA

You might also like