View Kamer

ICT PAPER 1 A/L- 2020

Welcome to your ICT PAPER 1 2020

1. Which of the following is the most likely to slow down a computer’s performance?

2. Which technology innovation characterized third generation computers?

3. Which of the following best describes the backup process of computer data in case of disaster

4. The expression B1216 + 5CA16 evaluates to:

5. Which of the following best assist students to improve on their ICT knowledge and educational standards

6. What is the full meaning of the following network type, VPN?

7. Which of the following is NOT true about tables?

8. Data transmission rate usually refers to:

9. A management information system is used to

10. Which of the following describes voice internet protocol (VolP)?

11. Quality developer is a company that writes programs to do specific jobs for other companies. These programs are called?

12. Which of the following is FALSE concerning file names?

13. Data integrity constraints are used to:

14. Choose from the following statements the one which is NOT a function of an operating system

15. Which of the following statement about software end user license agreement is True?

16. Which one of the following is NOT web browser?

17. A data transmission process which does not use start or stop bits or gaps is called:

18. An airline reservation system is an example of

19. An information system that represents information in a map form is called

20. The e-commerce domain that involves business activities initiated by the consumer that targets a firm is known as:

21. Which of the following is a rare option that when ant-virus detects an infected file?

22. In which aspect is the analog computer better than the digital computer

23. A network topology where network components are connected physically to the same cable trunk is

24. A data structure that stores homogeneous data element is:

25. A pile in which items are added at one end and removed from the other is called?

26. Which of the following is NOT a basic quality of information security?

27. An advantage of teleworking is, it

28. Which type of visual object is used to analyze and represent the tasks involved in completing a project?

29. A conversion technique in which the new system is introduced one part at a time is called:

30. Someone physically monitoring you while entering your pin code at the ATM without your consent is said to be:

31. The expression 00001011 + 00001110 evaluates to:

32. To be able to create, view, change or delete data on a computer system you will need:

33. A super market with a new inventory system will need what type of software in managing it?

34. Which one of the following is NOT a feature of electronic commerce?

35. User requirement in an information system can be verified by:

36. Which of the following information systems best assists managers to deal with transactions that cannot be answered by reports from operational or tactical systems?

37. The protocol used to send and receive electronic mails over the internet is:

38. The programming language that is characterized by use of mnemonics is?

39. Which type of software controls the allocation of resources and software on the computer?

40. Which of the following shows the sequence of the operation of the microprocessor?

41. The De- Morgan’s law for the logic OR states that 41. The De- Morgan’s law for the logic OR states that Ᾱ + B =

42. Which of the following best describes a fundamental purpose of project management?

43. Which of the following best describes a malware that would replicate itself and uses a computer network to send copies to other computers?

44. Which of the following device sends data packets only to a receiving device?

45. Which of the following best describes a document created with an application package which could be uses repeatedly by many users for similar purposes?

46. The buying and selling of stocks over the internet is called

47. If two users attempt to update the same record in a database

48. An advantage of a vector-bases graphic format is:

49. A cable with central glass tube covered with protective shield which transmit data using photons over long distances is:

50. Select the method that best describes a programming paradigm that uses modules containing both data and processing operations: