Welcome to your ICT PAPER 1 2022
1. Which of the following is the fastest memory
2. Frequently used instructions by the CPU are stored in the
3. The suitable computer to execute many programs for hundreds of users at the same time performing relatively simple operations and transactions is
4. The maximum number of characters that can be represented by a computer that operates a 4 bits system is
5. ____________ is a network device that contains multiple signals for transmission on a single channel
6. Critical path of the PERT chart is:
7. The formal way to close a project is to
8. A laptop performance can be improved by?
9. An operation code with n bits will imply that there are_______ possible distinct operations
10. the main purpose of digital certificate is to
11. the binary equivalent of the octal number 625 is
12. An operation that is executed a number of times at different places in your algorithm can be extracted out and made into
13. A variable type which can conveniently store different elements of the same type under a single element is called
14. A software subject to copyright that users can download from the internet and use for free is
15. The use of ________ makes it easier to organize files in a logical way
16. A system that can predict weather condition is
17. The memory device that holds current date and time on your computer is called
18. Which of the following is a characteristic of broadband?
19. A real-time operating system is used in
20. An air reservation system is an example of
21. Data redundancy is a database anomaly that
22. Why is it necessary for an organization to adopt a good password policy?
23. Which of the following monitors incoming network traffic to prevent unauthorized attacks?
24. A network topology whose components are connected physically to the cable trunk is.
25. The logic gate with one input and one output is
26. Which of the following is NOT a feature of electronic commerce?
27. Which of the following describes instant messaging?
28. Quality developer is a company that writes programs do specific jobs for other companies. These programs are called
29. One important role of interface in design is
30. The stream of bits used to control the flow of data in asynchronous communication is called
31. 4AC16 + 9BF16 is equal to
32. The quality sound of a speaker is best determined by
33. Which of the following about an end user license agreement is true?
34. The rules governing the right of data subjects are called?
35. A malicious attempt such as a to make a web site unavailable to its intended users can be termed?
36. A tool in the internet that assist users to locate resources in the world wide web is
37. Which of the following is a good password policy for a n organization?
38. Which one of the following statements about Internet connection services is true?
39. One function of an operating system is
40. The 2s complement of a binary expression 1001 is
41. A format that best guarantees file quality is:
42. The recycler in the computer that recovers deleted files is an example of
43. An abstract structure that use FIFO is
44. __________ is a property of a programming language
45. The appropriate action to take to determine why a software is failing to give the required result is
46. A foreign key in a relation refers to
47. Which of the following is the best way to maintain a good posture when working with a computer
48. Which of the following is the descending order of data hierarchy
49. JavaScript can be embedded in an HTML page between?
50. The technique preferred to transfer large amount of data to and from a memory in a short time is