Вы находитесь на странице: 1из 7

.

2
1. Which of the following devices is used to 6. W~ich of the following devices allows a
· input data into the computer? user to manipulate a cursor?

(A) Monitor (A) Plotter


(B) Mouse (B) Mouse
(C) External hard drive (C) Barcode reader
(D) USB flash drive (D) Optical Mark Reader

2. Which of the following are considered as 7. Which of the following lists is arranged
hardware? starting from BEST to WORST print
quality?
(A) Data
(B) Programs (A) Laser, dot matrix, inkjet
(C) Operating systems (B) Inkjet, dot matrix, laser
(D) Output devices (C) Laser, inkjet, dot matrix
(D) Dot matrix, ink jet, laser

3. A diskette is divided into a number of


concentric circles called 8. Which of the following is a type of user
interface?
(A) sectors
. (B) cylinders (A) !DE
(C) tracks (B) MIDI
(D) clusters (C) ASCII
(D) GUI

4. The storage capacity of a floppy disk is


9. In modern personal computers, the CPU
(A) 1.44MB speed is measured in
(B) 1.44 GB
(C) 1440 KB (A) nanoseconds
(D) 1440MB (B) milliseconds
(C) MHz
(D) GHz
5. The content ofwhich ofthe following types
of memory can be modified by a running
program? 10. Which of the following is used by the CPU
to temporarily store data?
(A) RAM (A) Buffer
(B) ROM (B) Track
(C) PROM (C) Sector
(D) EPROM (D) Cylinder


,.,.. MltY/'W~ 2.D/1 GO ON TO Tl IE NEX1' PAGE
01229010/F 2012
. 3

11. Which of the following statements is true 16. In the URL http://www.shoes.com,
about the Arithmetic/Logic Unit (ALlJ)'I 'shoes.com' stands for the

(A) It is a component in the CPU. (A) extension


(B) It is also called memory or main (B) company name
memory. (C) domain name
(C) It is a high-speed storage area. (D) internet company
(D) It decodes program instructions.

17. Google Chrome is an example of


12. To access record number 998 from a
'~ sequential file containing I 000 record1, (A) the Internet Explorer
you MUST (B) a Web browser
(C) a search engine
(A) convert to the file to direct access
(D) the World Wide Web
(B) go to record I 000, and then read
backward from there
(C) go directly to record 998 18. Which of the following is a feature of a
(D) first read records I through 997 utility program?

(A) It is unavailable to users.


13. Which of the following is TRUE of optical (B) It is part of an integrated package.
disks? (C) It is written by application users.
(A) Cannot store pictures. (D) It is considered to be systems soft-
Reading and writing is through laser ware.
(B)
beams.
(C) Information can be acces8ed faster 19. Transferring data from a remote computer
than from magnetic disks. to your computer is referred to as
(D) Can only store small amounts of
data. (A) uploading
(B) browsing
(C) downloading
14. Encryption is used to (D) data mining

(A) physkally prevent users from


accessing a computer 20. Scrambling of messages at the sending end
commit computer crime and unscrambling them at the receiving end
(B)
(C) disguise data and programs is called
(D) discard old equipment
(A) espionage
(B) encryption
15. Which of the following provides (C) coding
transmission of data in BOTH directions (D) eavesdropping
at the same time?
21. The acronym 'HTTP' stands for
(A) Half Duplex
(B) Full Duplex (A) Hyper Text Transfer Protocol
(C) Null Duplex (B) Hyper Text Transmission Protoce> I
(D) Simplex (C) Higher Text Transmission Protoce> I
(D) Hiaher Text Tnlllfer Plotoool

00 ON TO THE NEXT PAGE
01229010JP 2012
'7
~f ..
I . 4

22. Which of the following are the MAJOR 26. Identify the domain name in the fictitious
functions of a computer system? URL given below.

I. Output http://www.people.com/fun/index.htm
II. Input
III. Processing {A) fun
IV. Storage (B) com
(C) index.him
(A) III only (D) people.com
(B) I and II only
(C) I, II,and III only
(D) I, II, III, and IV 27. Which of the following is considered a
feature of a biometric system?

23. Which of the following is a feature of an (A) Diagnoses medical symptoms.


operating.system? {B) Matches fingerprints.
(C) Detects irregular heartbeats.
(A) Compresses files. (D) Is used to teach Biology.
(B) Scans data storage devices for
viruses.·
(C) Converts Programming Language 28. The MAIN function of a firewall is that it
instructions to Machine Language.
(D) Manages the fl.ow of information (A) is used by hackers to protect detec-
between the CPU and output tion
devices. (B) protects computers from fires
(C) prevents unauthorized access to n
computer on a network
24. Which of the following is a task performed (D) prott>.cts a stand-alone computer
by a systems programmer? from hackers

(A) Monitors the performance of the


computer system. 29. Which of the following should be used to
(B) Writes application pro11rams for connect computers ove1 short distances?
users.
(C) Provides end-user support. (A) Coaxial
(D) Repairs printers. (B) Fibre-optic
(C) Armored cable
(D) Twisted pair
ZS. Which of the following procedures checks
for typographical errors?
30. Which of the following may NOT be sent
(A) Double entry by e-mail?
(B) Range check
(C) Data type check (A) Pictures
(D) Reasonableness check (B) Video clip
(C) Cheques
(D) Text documents

00 ON TO THE NEXT PAGE


-.

• 5

31. Which of the following is NOT a method 36. ·Which of the following may NOT be
of making text stand out in a document'/ included in PowerPoint pre.sentations?

(A) Subscript (A) Photos


(B) Enlarging font size (B) Text
(C) Bold (C) Chat
(D) Underline (D) Sound

32. The number A157 entered into a cell ofa 37. Which of the following is the default
spreadsheet can be considered as what data justifkation of numbers in spreadsheets?
type?
(A) Left
(A) Label (B) Full
(B) Value (C) Centred
(C) Formula (D) Right
(D) Function

38. Which of the following is normally used


33. The text "UK" has to be changed to "United for website-to-website connection?
Kingdom" throughout a document. Which
word processing feature is BEST suited to (A) Modem
this task? (B) Monitor
( C) H yperlink
(A) Spell check (D) Hypertext
(B) Find and replace
(C) Mail-merge
(D) Block operation Item 39 refers to the following table.
.
A B c D E F -G
34. Which ofthe following is the correct process I
for inserting a repeated sentence in different
locations of a document? 2 17
3 35
(A) Copy, cut and paste 4 45
(B) Cut and paste
5 39
(C) Copy and paste
(D) Cut and copy 6
7

35. Which of the following PowerPoint 39. To add the values in cells 82 to BS, in the
featu!'l'S allows a user to run a presentation spreadsheet table aboy,e, which formula
automatically? should be placed in cell 86?

(A) Transition (A) ADD (82 : BS)


(B) Timing (B) SUM (B2: B6)
(C) Custom animation (C) COUNT (B2 : BS)
(D) Slide master (D) SUM (82 : BS)

00 ON TO THE NEXT PAOB


. Ii •

40. Which of the following pre-defined 45. Wliich of the following data types
functions in a spreadsheet can be used to CANNOT be entered into a database table?
indicate how a particular student performed
as compared to others? (A) Number
(B) Text
(A) RANK (C) Yes/no
(B) COUNT (D) Array
(C) VLOOKUP
(D) INDENTING
46. Consider the following algorithm.
41. Which ofthe following characteristics must
a=7
two database tables have in order for them
b=9
to be linked?
a=b-a
b=a+b
(A) At least one common attribute
Write a, b
name.
(B) Composite keys.
The output of this algorithm is
(C) At least two tuples in the table.
(D) The same data in all tuples.
• (A) 2, 9
(B) 2, 11
42. You created a spreadsheet with 7 columns (C) 7, 9
and wish to enter the text "WEEKLY (D) 7,11
REPORT' to appear at the middle of the
space used by the 7 columns. Which of the
following spreadsheet features will enable 47. Which of the following is a symhol in a
this to be done? flow chart?

(A)
(B)
Centre
Merging (A) D
(C) Merge and Centre
(D) Indenting
(B) 0
43. Which of the following may NOT be used
as a primary key in a database table? (C) D
(A)
(B)
(C)
Composite key
Master key
Candidate key
(D)
0
(D) Foreign key
48. Program debugging should be performed J
}
44. The object that is used to produce a list of (A) during the design phase
records that meets a particular criterion is (B) during the testing phase
a (C) before compiling the program
(D) before identifying any test data
(A) form
(8) table
(C) module •
(D) qutry

00 ON TO THE NEXT PAGE


. 7

49. Consider the following fragment of 52. -The missing entry in the truth table bdow
code. IS

Var index:lnteger; a b a and b


begin I 0
index :=I;
While index< 4 do (A) I
begin (B) T
Write ('k'); (C) F
I index:= index+2;
end;
(D) 0

I end.
53. Which of the following is a valid Pascal
data type?
The output it produces is
(A) Numeric
(A) k
(B) Real
k
(C) Number
k
(D) Letter
k
(B) kk
(C) kkkk 54. The Pascal code var x, y would generate an
(D) k error. The term used to describe this type
k of error is

(A) run time error


so. Which of the following is a conditional (B) execution error
branching control structure in Pascal? (C) logical error
(D) syntax error
(A) for-do
(B) repeat-until
(C) if-then-else Item 55 refers to the following pseudocode.
(D) while-do
ReadA,B
IfA<2
SI. In Pascal the algorithm x:•x*2 will cause C+-2
x to be assigned Else
c +-6
(A) thrice the current value of x End if
(B) the square of the current value ofx D +-C*B+2
(C) twice the current value of x Write D
(D) half the current value of x
55. What is printed by the pseudocode if the
input values are 5 and 2 respectively?

(A) 6
(B) 12
(C) 14
(D) 24

GO ON 10 . . NMI !Mii
,. . 8.
56. Which of the following is a function of a 58. Which of the following symbols is used to
compiler? perform assignments in the pr9gramrning
language Pascal?
(A) It converts a program code one line
at a time. " (A) =
(B) It converts source code to objef (B)
code. • (C)
(C) It puts the instructions together. (D)
(D) It collects data.

59. Which of the following is the Pascal code


57. Which of the following tasks does the used to declare an array WORD with 20
algorithm listed below perform? letters?

Read (A, B) (A) VAR LIST: ARRAY(20) of char;


IfA<BTben (B) WORD: ARRAY[l..20) of char;
Print(A); (C) VAR WORD: ARRAY[! to 20) of
char;
(A) Reads two numbers and prints the (D) VAR WORD: ARRAY[l..20) of
first number if it is smaller than char;
the second number.
. (B) Reads two numbers and prints the
first number if it is larger than the 60. Pascal is categorized as a
second number.
(C) Reads two numbers and prints the (A) first generation language
first number. (B) second generation language
(D) Reads two numbers and prints the (C) third generation language
smaller number. (D) fourth generation language

END OFTEST

IF YOU FINISH BEFORE TIME IS CALLED, CHECK YOUR WORK ON THIS TEST.

01229010/P 2012

Вам также может понравиться