1.
Which of the following statements are true?
I. One of the main advantages of ROM is that the information stored on the ROM chip is not lost even when the power to the computer is turned off
II. ASCII is an acronym for American Standard Code for Intelligent Information
III. Compared to desktop computers, laptop computers are portable since all its components are together in one single unit
I and II only
I and III only
II and III only
I, II and III
2.
The speed of processor of a computer is measured in ......
Gigahertz
Baud
BPS
MIPS
3.
The main two components of CPU are ......
Control unit and ALU
ALU and BUS
Control unit and register
Registers and main memory
4.
Consider the statements below:
I: Compilers are software
II: Touch screen monitors are input/output devices
From the statements above, choose the most appropriate answer from the options below
Both I and II are true
Both I and II are false
I is true but II is false
I is false but II is true
5.
Identify the incorrect pair from the following file extensions:
.jpg - graphic file
.ttf - word text file
.wav - audio file
.exe - executable file
6.
Which of the following hardware was used by the first generation computers?
Transistors
Vacuum tubes
VLSI
Integrated circuits
7.
A type of memory that holds the computer startup routine is
cache
RAM
DRAM
ROM
8.
What is a computer network?
A device used to display information on a computer screen
A collection of interconnected computers and devices that can communicate and share resources
A type of software used to create documents and presentations
The physical casing that protects a computer’s internal components
9.
What is internet?
A network of interconnected local area networks
A collection of unrelated computers
Interconnection of wide area networks
A single network
10.
Which of the following is an example of Bluetooth?
wide area network
virtual private network
local area network
personal area network
11.
What are nodes in a computer network?
the computer that routes the data
the computer that terminates the data
the computer that originates the data
all of the mentioned
12.
Which topology requires a multipoint connection?
Ring
Bus
Star
Mesh
13.
What is the term for the data communication system within a building or campus?
MAN
LAN
PAN
WAN
14.
Which network topology requires a central controller or hub?
Ring
Bus
Star
Mesh
15.
Which of the following allows LAN users to share computer programs and data?
File server
Network
Communication server
Print server
16.
The term HTTP stands for?
Hyper terminal tracing program
Hypertext tracing protocol
Hypertext transfer protocol
Hypertext transfer program
17.
Which one of the following is a valid email address?
gmail.com
kuulchat@.com
smark@telecom
info@jobort.com
18.
Which one of the following is not a network topology?
Star
Ring
Bus
Peer to Peer
19.
The term WAN stands for?
Wide Area Net
Wide Access Network
Wide Area Network
Wide Access Net
20.
Which of the following is not a data type in computer programming?
Integer
String
Text
Float
21.
MS-Word is an example of ......
An operating system
A processing device
Application software
An input device
22.
Ctrl, Shift and Alt are called ...... keys.
modifier
function
alphanumeric
adjustment
23.
A computer cannot "boot" if it does not have the ......
Compiler
Loader
Operating system
Assembler
24.
Junk e-mail is also called ......
Spam
Spoof
Sniffer script
Spool
25.
By default, a document uses ...... orientation
Landscape
Portrait
Page Setup
Print View
26.
In HTML, ...... is at the bottom of the page and usually contains disclaimers, copyright information etc.
Header area
Menu bar
Body of the page
Footer area
27.
Which of the following is a Spreadsheet
Microsoft Excel
Microsoft Word
Microsoft PowerPoint
Google Slides
28.
Which software is best for writing a letter
Microsoft Publisher
Microsoft Word
Microsoft Excel
Microsoft PowerPoint
29.
Which software is the most productive for presenting information to other people?
Microsoft Excel
Microsoft PowerPoint
Paint
Microsoft Access
30.
The basic operations performed by a computer are
Arithmetic operation
Logical operation
Storage and relative
All the above
31.
The two kinds of main memory are:
Primary and secondary
Random and sequential
ROM and RAM
All of above
32.
A hybrid computer
Resembles digital computer
Resembles analogue computer
Resembles both a digital and analogue computer
None of the above
33.
Properly arranged data is called ......
Field
Words
Information
File
34.
A computer consists of
A central processing unit
A memory
Input and output unit
All of the above
35.
The word processing task associated with changing the appearance of a document is
Editing
Writing
Formatting
All of above
36.
Algorithm and Flow chart help us to ......
Know the memory capacity
Identify the base of a number system
Direct the output to a printer
Specify the problem completely and clearly
37.
A byte consists of ......
One bit
Four bits
Eight bits
Sixteen bits
38.
A light sensitive device that converts drawing, printed text or other images into digital form is
Keyboard
Scanner
Plotter
OMR
39.
In programming, an error is also known as ......
Bug
Debug
Mistake
Wrong
40.
Graphical pictures that represent an object like file, folder etc. are ......
Task bar
Windows
Icons
Desktop
This paper consists of two sections: A and B. Answer Question 1 in Section A and any other three questions in Section B.
Study Figure 1 carefully and use it to answer questions (a) to (k).
Figure 1
(a)
Write the name of the figure shown above ..........................
(b)
Name the parts labelled I, IV, VI, VII, VIII and X
(c)
Describe how to add a new slide
(d)
Which of the labelled parts is clicked in order to make changes to the look of the power point?
(e)
Describe how to duplicate a slide
(f)
What does the part labelled V do?
(g)
What is the extension of a file saved using the above figure?
(h)
Which of the labelled parts is clicked for the slide show?
(i)
Which of the labelled parts is clicked to change the duration of the slides in the slide show?
(j)
The above figure is a type of .................. software.
(k)
State one function each for the parts labelled VII and X
Use the image shown in Figure 2 to answer questions (a) to (e)
(a)
Identify the image shown.
(b)
Identify the parts labelled I, II, III and IV.
(c)
State one feature each for the parts labelled I, II, III and IV.
(d)
State one advantage and one disadvantage each for the parts labelled I, II, III and IV.
(e)
State two hardware for setting up the image shown.
(a)
Define the term computer network.
(b)
State and describe any two computer network types.
(c)
State three benefits of using computer networks.
(d)
State two challenges of using computer networks.
(a)
Define the following terms as applied to computer programming
(i)
Programming
(ii)
Debugging
(iii)
Integrated Development Environment (IDE)
(iv)
Variable
(v)
Constant
(b)
State two computer programming languages.
(c)
Convert the following decimals to binary and hexadecimal
(i)
65
(ii)
165
(d)
Table 1 contains data to be used programming. Complete the table by indicating against each data the data type to be used when writing the programming code.
# | Data | Data Type |
i) | Name of a person | |
ii) | Age of a person | |
iii) | Salary of an employee | |
iv) | Date of birth of a person | |
v) | The score of a student | |
vi) | True or false |
(a)
(i)
State and explain the four major data threats
(ii)
Explain how each of the major data threats stated in (i) can be prevented.
(b)
Atswei has been given an assignment to research on Ako Adjei, one of the Big Six.
Describe the steps to Atswei on how to research for the information on the internet.
(c)
(i)
State three components of robots
(ii)
State two uses of robots