Welcome to your ICT PAPER 1 2023
1. The stored program concept states that:
2. Unwanted mails are known as:
3. A company is running a new computer system alongside the manual system. This is
4. The critical path is useful in project management in that it:
5. When we play an online game we are not:
6. A system that is capable of being run across different platforms is said to be:
7. The component that encrypts details of a network to outsiders is:
8. An organization responsible for establishing standards for computing devices is:
9. A software with fuli license to use, share but not to sell is;
10. In a complete mesh topology of n nodes, each node is directly connected to ________other nodes
11. A file format that cannot handle text data type is
12. An event that represents the completion of a group of related tasks in a project is called:
13. Why would a company choose to outsource the production of its own system?
14. A scenario in which two cars in opposite directions on a one-way bridge and none is ready to reverse is known in computing as:
15. A major mode of operation of a virus is:
16. The product I l l2 x 112 is:
17. In SDLC, feasibility studies is carried out in order to:
18. The following is a server side scripting language:
19. In mobile app development, XML is used to:
20. Below is the correct format of an email address:
21. The tag that does not define a section of a page:
23. A processor architecture that processes multiple instructions at once:
24. Which of the following is not true about DVD?
25. The ALU is responsible for ________ instructions
26. A command structure mostly used in declarative programming languages is:
27. The quality of a dot matrix printer is given in:
28. When you buy from an online marketing platform (e.g Amazon), which of the following is NOT true:
29. A memory that needs frequent refreshing in order not to lose its contents is:
30. A device used for reading product information such as price from the code on the product is:
31. It uniquely identifies a computer in the internet
32. A malware that multiplies and makes a network slow is:
33. Which model of system development is not suitable to accommodate changes?
34. Communication in a ring topology is comparable to which mode of data transmission:
35. The equivalence of the decimal expression 512.125 in binary is
36. The logic expression ¯("A.B + A.B." ) simplifies to
37. A multiuser OS is one that permits:
38. The ring topology is said to be better than the bus and star in that:
39. The routines that are used for booting are found in the?
40. Between streaming video and email which of the following is NOT true?
41.___________is a function of an OS.
42. A sorting algorithm that compares two adjacent items and then swaps them, is
43. In algorithms, the statement x ← x+ 1
44. Why do local cable TV distributors use coaxial cables instead of twisted pair cables?
45. A graphical model showing the different tasks in a project and the relationships binding them is:
46. An Information System used by sales persons is
47. A technology that adds virtual features to real situation is
48. An error that makes a program's meaning or behavior to change from that intended by the programmer is
49. A method of programming which focuses only on the results is
50. which of the following is NOT the rule of a project manager?