Вы находитесь на странице: 1из 12

Information Technology

Test #1A 2013


Grade 11
Duration: 60 Minutes

Read the following instructions carefully.


1. This test is consists of 60 items. You will have 60 minutes to answer them.
2. Each item in this test has four suggested answers lettered a, b, c, d. Read each item you are about to answer and decide which is the
best.
3. On the question paper, circle the letter that corresponds with the answer of your choice.
4. Fill in the required information on the lines below:

Name: ________________________________________________________
Teacher: ______________________________________________________
Date: __________________________________

June 2010 (Paper 01)

~2~

Group: ________________

DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO DO SO

GO ON TO THE NEXT PAGE

June 2010 (Paper 01)

~4~
Which of the following devices is used to perform
input into the computer?
a)
b)
c)
d)

Monitor
Mouse
External hard drive
USB flash drive

1. Which of the following is NOT a part of a


diskette?
a)
b)
c)
d)

Track
Sector
Cylinder
Cluster

2. A diskette is divided into a number of concentric


circles called
a)
b)
c)
d)

sectors
cylinders
tracks
clusters

3. Which of the following devices is NOT used in


point of sales terminals?
a)
b)
c)
d)

Printer
Plotter
Bar code reader
Electronic register

4. Resolution determines the clarity of the image


displayed on a monitor. The term resolution
refers to the number of pixels
a)
b)
c)
d)

present horizontal on the screen


present vertically on the screen
present in a unit area of the screen
that makes up the colour

6. Which of the following is NOT an audio output


device?
a)
b)
c)
d)

7. The ones complement of 01010011 is


a)
b)
c)
d)

a)
b)
c)
d)

Laser, dot matrix, inkjet


Inkjet, don matrix, laser
Laser, inkjet, dot matrix
Dot matrix, inkjet, laser

11010011
01011111
10101100
11111111

8. In modern personal computer, the CPU speed is


measured in
a)
b)
c)
d)

Nanoseconds
Milliseconds
MHz
GHz

9. The storage capacity of a floppy disk is


a)
b)
c)
d)

1.44MB
1.44GB
1440KB
1440MB

10. The process of preparing a floppy disk to store


data from a computer is called
a)
b)
c)
d)

deleting
easing
formatting
archiving

11. An example of a point and draw device is a


a)
b)
c)
d)

5. Identify the list that is arranged starting from the


BEST to WORST print quality.

Microphone
Earphone
Headphone
Speakers

keyboard
joystick
mouse
scanner

12. An application in which scanners are commonly


used is
a) publishing
b) billing
c) printing report
GO ON TO THE NEXT PAGE

~5~
d) cheque processing
13. Which of the following does NOT provide serial
access?
a)
b)
c)
d)

Reel to reel tape


Microfilm
Microfiche
Cartridge tape

14. Which of the following provides transmission of


data in BOTH directions at the SAME time?
a)
b)
c)
d)

Half Duplex
Full Duplex
Null Duplex
Simplex

15. In the URL http://www.shoes.com, shoes.com


stands for the
a)
b)
c)
d)

extension
company name
domain name
internet company

c) downloading
d) data mining
19. Scrambling of messages at the sending end and
unscrambling them at the receiving end is called
a)
b)
c)
d)

espionage
encryption
coding
eavesdropping

20. The acronym HTTP stands for


a)
b)
c)
d)

Hyper Text Transfer Protocol


Hyper Text Transmission Protocol
Higher Text Transmission Protocol
Higher Text Transfer Protocol

21. E-mail is the transmission of message and files


via computer network. E-mail is short for
a)
b)
c)
d)

Encrypted mail
Emerging mail
Entertainment mail
Electronic mail

16. Google is an example of


a)
b)
c)
d)

Item 23 refers to the icon below

the Internet Explorer


a Web browser
a search engine
the World Wide Web

17. A new employee at a financial company has been


asked to set a password on her computer. She has
tried setting the password on several occasions
but gets an error message which says password
not effective. The problem can be corrected by
entering a password that is
a) made up of several numbers
b) a relatives name
c) composed of at least six upper case
characters
d) a mixture of mixed case and alphanumeric
characters
18. Transferring data from a remote computer to your
computer is referred to as
a) upload
b) browsing

22. In an e-mail program the icon above is used to


a)
b)
c)
d)

send a file
forward a file
create a file
attach a file

23. Which of the following is NEITHER a validation


NOR a verification check?
a)
b)
c)
d)

Storage media check


Inconsistency check
Data-type check
Range check

24. Advantages of information processing include


a) retraining of staff
GO ON TO THE NEXT PAGE

~6~
b) less human intervention
c) increase the amount of equipment needed
d) reduction of face-to-face interaction
25. Which of the following statements is true of a
transaction file?
a)
b)
c)
d)

It is the most complete and up-to-date file


It is used as a back-up copy
It is used for real-time processing
It is used to update the master file

b) Batch processing
c) Transaction processing
d) Online processing
27. Data verification is checking for
a)
b)
c)
d)

particular data types


data in a specific range
transcription errors
correct relationships between files

26. Which type of processing system will use


sequential file organization?
a) Real-time processing

GO ON TO THE NEXT PAGE

~7~
Items 29 30 refer to the document below which shows a water bill.

Account Number

Meter Number

Section A
Account Number
Bill Date
111222-3
2009/12/04
TOTAL
DATE DUE
$25.41
2009/12/29

Bill Date

Mr. Tom Bill


21 Hill Top View
ST. MICHAEL
B. Post cheque to:
PO Box 1206 Bridgetown

28. Customers tear off Section A of the bill and


return the section and their payment to the
company. The document above is BEST
described as

29. Which type of technology is the information


shown as B in the document MOST likely printed
in?
a)
b)
c)
d)

OCR
OMR
POS
MICR

a) an automated document
b) a turnaround document
c) a source document
d) transaction document
____________________________________________________________________________________________
30. Slide design in a presentation software is used to
a)
b)
c)
d)

create a background for the slide


create your own design for the slide
create a layout for the slide
create a style for a slide

31. Which of the following are uses of a typical


presentation software?
I.
II.
III.
IV.
a)
b)
c)
d)

To enhance public speaking


To store records in a structural fashion
To create graphs of sales
To deliver lectures
I and II only
I and IV only
1, II and IV only
I, II, III and IV

GO ON TO THE NEXT PAGE

~8~
Items 33 34 refer to the diagram below which shows a section of the Standard Toolbar of a word
processing package.

1
32. The name of the icon labeled 1 is
a)
b)
c)
d)

33. The purpose of the icon labeled 2 is to

undo
repeat
word wrap
text alignment

a) align text on the left and right margin


b) increase the indentation of the selected
paragraph(s)
c) increase column in documents
d) display the grid to select columns and rows
____________________________________________________________________________________________
Item 35 refers to the diagram shown below.

a)
b)
c)
d)

value formulate
headings
labels
values

36. Which of the following is the default justification


of numbers in spreadsheets?
a)
b)
c)
d)

Left
Full
Center
Right

37. When a cell from a spreadsheet is absolute


referenced,
a)
b)
c)
d)

its value become constant


its cell address becomes constant
its label becomes constant
its cell value changes automatically

34. The diagram above is called the


a)
b)
c)
d)

page setup dialog box


paragraph dialog box
clipboard task plane
format dialog box

35. The term used to describe text in a spreadsheet


that is aligned towards left by default is

38. Spreadsheet formulae use


a) values, labels or cell addresses
b) values, mathematical operators or cell
addresses
c) labels or cell addresses
d) values or cell addresses

GO ON TO THE NEXT PAGE

~9~
39. Which of the following is NOT involved in
extraction or filtering of records in spreadsheet?
a)
b)
c)
d)

A=7
B=9
A=BA
B = A+ B
Write A, B

Values range
Criteria range
List range
Copy to range

40. Which of the following characteristics must two


database tables have in order for them to be
linked?
a)
b)
c)
d)

45. Consider the following algorithm

At least on common attribute name


Composite keys
At least two tuples in the table
The same data in all tuples

The output of this algorithm is


a)
b)
c)
d)

46. Consider the following algorithm

41. The term used to describe an attribute that can


function like a primary key is a
a)
b)
c)
d)

candidate key
secondary key
foreign key
composite key

42. Which of the following is/are true of secondary


keys?
I.
II.
III.
IV.
a)
b)
c)
d)

They are used strictly for data retrieval


purposes.
They are always in text form.
They do not contain null values.
They do the same function as a foreign key
1 only
II and III only
III and IV only
I, II, III and IV

43. The object that is used to produce a list of records


that meet a particular criterion is a
a)
b)
c)
d)

form
table
module
query

44. In a relational database, tables are also called


a)
b)
c)
d)

tuples
files
relations
entity

2, 9
2, 11
7, 9
7, 11

Sum 0
Read a, b
Sum a + b
Write Sum
In the above algorithm, sum 0 represents
a)
b)
c)
d)

a declaration
a computation
an initialization
an assignment

47. In the programming language Pascal, which of


the following is NOT a standard data type?
a)
b)
c)
d)

Floating point
Char
Boolean
Integer

48. Which of the following structures is most


commonly used to implement a post-test loop in
Pascal?
a)
b)
c)
d)

For do
While do
If then
Repeat until

49. Which of the following statements would be


placed in the flowchart box shown below?
a) Read A
GO ON TO THE NEXT PAGE

~ 10 ~
b) A > 25
c) Count count + 1
d) Output C

d) syntax error

50. The purpose of comments in program code is to


I.
II.
III.
a)
b)
c)
d)

allow persons who read it to follow the


processes
know the purpose of the program
generate code
I and II only
I and III only
II and III only
I, II and III

51. Which of the following are true about the use of


indentation in programming?
I.
II.
III.
IV.
a)
b)
c)
d)

To make the layout of the code attractive


For compiler/interpreter to identify errors
easily
For easy understanding of the order of code
For easy correction of syntax errors
I, II and III only
I, III and IV only
II, III and IV only
I, II, III and IV

52. Which of the following is NOT a third-generation


language?
a)
b)
c)
d)

Assembly
COBOL
C
PASCAL

53. The Pascal code var x, y would generate an error.


The term used to describe this type of error is
a) run time error
b) execution error
c) logical error
GO ON TO THE NEXT PAGE

Item 55 refers to the following pseudocode


Read A, B
If A < 2
C2
Else
C6
Endif
DC*B+2
Write D
54. What is printed by the pseudocode if the input
values are 5 and 2 respectively?
a)
b)
c)
d)

6
12
14
24

55. A compiler is software that converts the


a)
b)
c)
d)

source code to assembly code


source code to machine code
program to output
program to object code one instructions at a
time

56. The result of the expression 3 mod 4 is


a) 0
b) 1
c) 2
d) 4
57. Which of the following symbols is used to
perform assignments in the programming
language Pascal?
a)
b)
c)
d)

:=
==

58. The variable total is assigned the value 12.


Which output shows the CORRECT display
when the Pascal code writeln(total = ); is
executed?
a)
b)
c)
d)

total =
12
total = 12
total =

59. Which of the following identifiers is a valid


variable name?
a)
b)
c)
d)

Begin
iCount
Num-1
5Sum

END OF TEST

Вам также может понравиться