Welcome to your ICT PAPER 1 2024
1. The size of the monitor is determined by the ______ of the monitor
2. Which of the following does not influence the processing ability of a computer?
3. A professional who gives advice on a set up of computers in a room is a/an
4. A system that can track the movement of animals in a forest area is
5. The security measure that converts information to unreadable form is
6. The i7 laptop that is mostly used today by students is classified as _______ computer.
7. An office door that is opened through eye scan is said to use
8. The act of modifying data from a remote position without authorization is known as
9. Which of the following does not imply presence of a virus in a computer?
10. Computer performance can be improved by:
11. The probable need for a computer that cannot output sound is
12. The quality of images in the computer can be improved by
13. The network in which signals are made to move direction is the
14. The unit in a CPU that performs binary operation is
15. Signal interference in data transmission is reduced by
16. The amount of data that flows in a network medium at a given moment is defined by the
17. Systems that collect data over a period of time before processing is done are known as
18. The organization of files in the local storage of a computer is caried out by the
19. A DBMS is classified as a/an
20. Instructions from the local storage get to the central processing unit through the
21. Which of the following text editor is suitable for programing
22. A programming language structured data type whose items can be accessed by an index
23. A feature in e-mail accounts that keeps unwanted mails coming from particular person is
24. A development strategy in which the final product is constructed from a model is
25. The steps on how to solve a problem are clearly stated. This programming paradigm is known as
26. A technique that results to independent sub programs that can work together to solve a problem is
27. A typical encryption algorithm makes use of
28. The network configuration is done at the
29. The function of a modem is to
30. Transmitted data in a network is secured by
31. The abstract data type that is defined by the head and a tail is the
32. A sign showing that the printer is effectively connected to a computer is
33. The internet stores information in
34. The best cable transmission medium for broadband communication is
35. The physical layout on how devices are connection in a network is called
36. An HTML script can be displayed to the user with the help of
37. A network cable is connected to a computer through
38. The role of a gateway in a network is to
39. In HTML, the tags ---- are used to
40. If the 1st character in the ASCII code is 00000001, then the code of the 74th character is
41. The meaning of instructions on the machine cycle can be derived at the ____ phase?
42. Which of he following is not a good characteristic of an algorithm?
43. The function defined as F(n)=F(n-1)+F(1) is
44. A code that cannot be modified by the programmer that is not only executable by the machine is
45. Which of these is a specific advantage of object-oriented programming?
46. The series of tasks that gives the shortest time that the project can be completed is known as
47. Which of the following is an activity in the design phase of the SDLC?
48. One cause of repetitive stress injury is
49. The system that is use to manage database is
50. To avoid redundancy in a large database