View Kamer

ICT PAPER 1 A/L – 2023

Welcome to your ICT PAPER 1 2023

1. The stored program concept states that:

2. Unwanted mails are known as:

3. A company is running a new computer system alongside the manual system. This is

4. The critical path is useful in project management in that it:

5. When we play an online game we are not:

6. A system that is capable of being run across different platforms is said to be:

7. The component that encrypts details of a network to outsiders is:

8. An organization responsible for establishing standards for computing devices is:

9. A software with fuli license to use, share but not to sell is;

10. In a complete mesh topology of n nodes, each node is directly connected to ________other nodes

11. A file format that cannot handle text data type is

12. An event that represents the completion of a group of related tasks in a project is called:

13. Why would a company choose to outsource the production of its own system?

14. A scenario in which two cars in opposite directions on a one-way bridge and none is ready to reverse is known in computing as:

15. A major mode of operation of a virus is:

16. The product I l l2 x 112 is:

17. In SDLC, feasibility studies is carried out in order to:

18. The following is a server side scripting language:

19. In mobile app development, XML is used to:

20. Below is the correct format of an email address:

21. The tag that does not define a section of a page:

22. USB stick uses a/an:

23. A processor architecture that processes multiple instructions at once:

24. Which of the following is not true about DVD?

25. The ALU is responsible for ________ instructions

26. A command structure mostly used in declarative programming languages is:

27. The quality of a dot matrix printer is given in:

28. When you buy from an online marketing platform (e.g Amazon), which of the following is NOT true:

29. A memory that needs frequent refreshing in order not to lose its contents is:

30. A device used for reading product information such as price from the code on the product is:

31. It uniquely identifies a computer in the internet

32. A malware that multiplies and makes a network slow is:

33. Which model of system development is not suitable to accommodate changes?

34. Communication in a ring topology is comparable to which mode of data transmission:

35. The equivalence of the decimal expression 512.125 in binary is

36. The logic expression ¯("A.B + A.B." ) simplifies to

37. A multiuser OS is one that permits:

38. The ring topology is said to be better than the bus and star in that:

39. The routines that are used for booting are found in the?

40. Between streaming video and email which of the following is NOT true?

41.___________is a function of an OS.

42. A sorting algorithm that compares two adjacent items and then swaps them, is

43. In algorithms, the statement x ← x+ 1

44. Why do local cable TV distributors use coaxial cables instead of twisted pair cables?

45. A graphical model showing the different tasks in a project and the relationships binding them is:

46. An Information System used by sales persons is

47. A technology that adds virtual features to real situation is

48. An error that makes a program's meaning or behavior to change from that intended by the programmer is

49. A method of programming which focuses only on the results is

50. which of the following is NOT the rule of a project manager?