View Kamer

ICT PAPER 1 A/L- 2024

Welcome to your ICT PAPER 1 2024

1. The size of the monitor is determined by the ______ of the monitor

2. Which of the following does not influence the processing ability of a computer?

3. A professional who gives advice on a set up of computers in a room is a/an

4. A system that can track the movement of animals in a forest area is

5. The security measure that converts information to unreadable form is

6. The i7 laptop that is mostly used today by students is classified as _______ computer.

7. An office door that is opened through eye scan is said to use

8. The act of modifying data from a remote position without authorization is known as

9. Which of the following does not imply presence of a virus in a computer?

10. Computer performance can be improved by:

11. The probable need for a computer that cannot output sound is

12. The quality of images in the computer can be improved by

13. The network in which signals are made to move direction is the

14. The unit in a CPU that performs binary operation is

15. Signal interference in data transmission is reduced by

16. The amount of data that flows in a network medium at a given moment is defined by the

17. Systems that collect data over a period of time before processing is done are known as

18. The organization of files in the local storage of a computer is caried out by the

19. A DBMS is classified as a/an

20. Instructions from the local storage get to the central processing unit through the

21. Which of the following text editor is suitable for programing

22. A programming language structured data type whose items can be accessed by an index

23. A feature in e-mail accounts that keeps unwanted mails coming from particular person is

24. A development strategy in which the final product is constructed from a model is

25. The steps on how to solve a problem are clearly stated. This programming paradigm is known as

26. A technique that results to independent sub programs that can work together to solve a problem is

27. A typical encryption algorithm makes use of

28. The network configuration is done at the

29. The function of a modem is to

30. Transmitted data in a network is secured by

31. The abstract data type that is defined by the head and a tail is the

32. A sign showing that the printer is effectively connected to a computer is

33. The internet stores information in

34. The best cable transmission medium for broadband communication is

35. The physical layout on how devices are connection in a network is called

36. An HTML script can be displayed to the user with the help of

37. A network cable is connected to a computer through

38. The role of a gateway in a network is to

39. In HTML, the tags ---- are used to

40. If the 1st character in the ASCII code is 00000001, then the code of the 74th character is

41. The meaning of instructions on the machine cycle can be derived at the ____ phase?

42. Which of he following is not a good characteristic of an algorithm?

43. The function defined as F(n)=F(n-1)+F(1) is

44. A code that cannot be modified by the programmer that is not only executable by the machine is

45. Which of these is a specific advantage of object-oriented programming?

46. The series of tasks that gives the shortest time that the project can be completed is known as

47. Which of the following is an activity in the design phase of the SDLC?

48. One cause of repetitive stress injury is

49. The system that is use to manage database is

50. To avoid redundancy in a large database