CXC CSEC Information Technology 2016 June P1

July 12, 2017 | Author: Anonymous1908 | Category: Computer Data Storage, Read Only Memory, Flash Memory, Spreadsheet, Computer Data
Share Embed Donate


Short Description

CXC CSEC Information Technology 2016 June P1 - Multiple Choice...

Description

TEST CODE

FORM TP 2016083

OI229OIO

MAY/JUNE 2016

CARIBBEAN EXAMINATIONS COUNCIL

CARIBBEAII SECOI\IDARY EDUCATION CERTIFICATE@ EXA]VIINATION

.

INFORMATIONTECHNOLOGY Paper 01 - General ProficiencY 7

hour 30 minutes

31 MAY 2016 (p.m.)

READ THE F'OLLOWING INSTRUCTIONS CAREFULLY. 1

This test consists of 60 items. You will have I hour and 30 minutes to answer them.

2

In addition to this test booklet, you should have an answer sheet.

3

Each item in this test has four suggested answers lettered (A), (B), (C), you are about to answer and decide which choice is best'

4

On your answer sheet, flnd the number which corresponds to your item and shade the space having the same letter as the answer you have chosen. Look at the sample item below.

(D)'

Read each item

Sample Item

Which of the following pairs represents general-purpose software tools?

(A) (B)

(C) (D)

Spreadsheet and database software Word processor and accounting sofbware Student record system ana aataUase Insurance processing and spreadsheet software

.ot*ur"

Sample Answer

O @@@

shaded' The best answer to this item is "spreadsheet and database software", so (A) has been

I

If you want to change your

6.

When you are told to begin, tum the page and work as quickly and as carefully as you can. If you cannot answer an item, go on to the next one. You may return to that item later.

Copyright @ 2Ol4 Caribbean Examinations Council All rights reserved.

I

I

I

answer, erase

DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO DO

I

-

it completely before you fill in your new choice.

5

012290r01F 2016

SO.

I

2

1.

Keyboards, speakers and CD drives

(A) (B) (C) (D) 2.

are

6.

example

management occurs

(A) (B) (C) (D)

File Process

Memory InpuVoutput

t2

of

(c)

input output storing

(D)

processing

Which ofthe following has the largest data storage capacity?

(A) (B) (C) (D)

The Arithmetic/Logic Unit (ALLD is part

Optical drive. USB flash dnve Flash memory card Hard drive

l3

of the

(A) (B)

(c) (D)

4.

11

communication between a printer and the system unit?

7

3

of

when the operating system undertakes peripheral devices storage devices output devices input devices

Scanning an item at a computerized checkout station in a supermarket is an (A) (B)

What type

8.

Control Unit (CI-D Read Only Memory (ROM) Central Processing Unit (CpU) Random Access Memory GAM)

Which of the following primary storage devices can be programmed only once?

(A) (B) (c) (D)

RAM PRoM EPROM EEPROM

t4

The binary equivalent ofthe decimal number

7is 9

(A) (B)

1012

(c)

1102

(D)

1112

1002

The time taken by the read/write head to locate and transfer data is termed

(A) (B)

(c) (D) 5.

Which of the following is MOST suitqble for printing building plant?

(c) (D)

Plotter Laser printer Dot-matrix printer Thermal transfer printer

To use a prograrn stored on a flash drive, must be transferred into

(A) (B)

(c) (D)

012290101F 2016

transfer time rotational time 15.

10.

(A) (B)

seek time access time

RAM ROM PALU PROM

GO ON TO THE NEXT PAGE

it

-311.

li

I I'

is dividedinto anumber ofconcentric circles called

Adiskette

16.

In the URL http://www.shoes.com, 'shoes.com' represents the

LI

t2

(A) (B)

tracks sectors

(A) (B)

(c)

clusters

(c)

(D)

cylinders

(D)

(c) (D)

13.

Touchscreen

Programs that duplicate the knowledge and diagnostic skills displayed by humans performing specialized tasks are referred to as

Menu driven Braille keyboard Command driven

(A) (B)

virtual systems

(c)

engineering systems

(D)

knowledge systems

Which ofthe following user interfaces/devices is BEST suited for avisually impairedperson?

(A) (B)

17.

expert systems

Laser beam technology is used by a

(A) (B)

(c) (D)

floppy disk optical disk magnetic disk magnetic tape

18.

The use of Inforrnation and Communications

Technology (ICT) to conduct meetings at different locations is called

(A) (B) 14.

internet company company name domain name extension

Which of the following prefixes which relate to bytes are alTanged from the smallest to the

(c) (D)

teleconferencing

telecommuting telemarketing telephony

largest?

(A) (B) (C) (D) 15.

19

Half Duplex Full Duplex Null Duplex Simplex

'

": .'

Transferring data from a remote computer to your computer is referred to as

(A) (B) (C) (D)

Which of the following provides transmission of data in BOTH directions at the same time?

(A) (B) (C) (D) :ll,

Mega, giga, tera, kilo M"gq tera, giga, kilo Kilo, mega, giga,tera Kilo, giga, mega, tera

20.

uploading browsing downloading data mining

Scrambling ofmessages before sending is called

(A) (B)

coding encryption

(c)

espionage

(D)

eavesdropping

GO ON TO THE NEXT PAGE 2Arc

4

21.

Telecommuting can be BEST described

(A) (B)

(c) (D)

as

t.;....r

25.

using the computer while commuting using the telephone while commuting working from home by connecting home and offi.ce

(A) (B) (C) (D)

working from the office after

_.)

.

Motion Light Weight

26

A webmaster is important to the

company

because he/she

(A)

.j

:i.

Warrnth

backs up files and stores the disks at another location

(B)

monitors the shutting down of

(c)

assigns web addresses to all users

The illegal copying, distribution or sale of proprietary software is known as

(A) (B) (C) (D)

computer fraud computer theft software fraud software pimcy

competitors' websites

in

a comp:rny

(D)

27

is responsible for the company's

(A) (B)

another person's name by merely providing a phone number to a service representative at a telephone company. This is an example of

24.

t-r

( j.i. ill

.

&::,

*

integer boolean character

(c) (D)

28.

violation of privacy

Which ofthe following types ofdocuments is used for the initial recording of data relating to business transactions?

(A) (B)

Main

validation technique?

(c) (D)

Primary Tumaround

Which

of

Range

(c)

Double entry Inconsistency

(D)

Reasonableness

t

29

Source

the following is a sequential

access medium?

i,. ',}

(A) (B)

ir,-,

?.t:.

i,: 1..:

(c)

li

iirr'

(D)

;i.

I,

Floppy disk Compact disk Magnetic tape Winchester disk

i.

ls.

:1: '-

'l':ir.r

;

l,'r.

,:

iii*l

,-ri

lf.t

.

,[ir;:,{}

ttrr'll ffiffiff

$:rl;t ffi,;',*

$,i:4

GO ON TO TIIE NEXT PAGE 0t229010tF 2016

a

a

real

Which of the following checks is NOT a (A) (B)

air,:

propaganda eavesdropping computer fraud

is

grocdry item. The MOST appropriate data type usedfor item_price is

Any unauthorized person is allowed to view

(A) (B) (C) (D)

item_price

variable used to store the price of

website

23.

In an algorithm,

'iil

,.t

establishing a connection at home

22.

"

Which of the following is detected by the use of a pressure sensor?

5

f the

30.

Which ofthe following is NOT an example of commercial data processing?

(A) (B) (C) (D) rle

of

35.

Budgeting Invoice processing Payroll Processing Forecasting hurricanes

(A) (B)

(c) (D)

31.

(c) (D)

Isa

placing text around a graPhic placing text at the back of a graphic the automatic carrying forward of text once the current line is filled the user having to manuallY Place the cursor on a new line when the previous one is filled

36.

II. Itr. (A) (B)

Which word processing feature MUST John use if he wants to include his company's logo in the bottom margin of every page of a document? (A) (B)

(c) (D)

(c) (D)

37

Header

Footer Endnote Footnote

a document it

(c)

maY be While typing necessary to change the height of the characters. Which word processing feature

(D)

should be used? 38.

(A) (B)

(c)

ential

(D)

3.1.

Letter size

i

Paper siZe Page size Font size

When text is aligned with both the left and right margins atthe same time, this is called

(A) (B) (C) (D)

I only III only I and II only II and III only

You have typed the characters '3'd'. Which ofthe following forrnatting features should

(A) (B)

data

33

represent a smaller version of a larger image provide a link to the other contents emphasize text and images

be used to create

ments

i

A thumbnail image on a webpage is used to I.

ocery 32

type over word wrap delete insert

In computing, 'word wtap'refers to

(A) (B)

'type

While entering text in a word processing document, Michelle noticed that each new letter entered was replacing the previous one. The mode activated in this case is

'd'?

Superscript

Hishlisht Subscript Italics

Which of the following types of software shouldbe used for applications that involve repetitive numerical calculations?

(A) (B)

Database Spreadsheet

(c)

Word processing Operating system

(D)

left and right alignment right and Ieft alignment justified alignment centre alignment

GO ON TO THE NEXT PAGE

TGE

nt r:ronl 0E )n1 6

,'

,r

6

39.

In what form is data stored in a database? 42

(A) (B)

Table

Chart Numeric String

(c) (D)

40.

WEEKLY

In creating a query, a student entered the following criteria for the date field. >

:

051

11/201

The output

(A) (B)

(c)

I

will

and <

:

REPORT January

05ll4l20ll

February March

(A) (B)

after l4th May 2011 only between 1lth and l4th May 2011 before 1 1 th Mayand after l4th May

(c) (D)

2,550

Centre the text Indent the cells Merge and centre Merge the columns

between the 14th May and 5th November 2011 43

Which of the following can be used in a spreadsheet to copy the same number across multiple rows in a single column?

Which of the following MUST be placed in front ofthe colurnn letter and row numberto create an absolute reference?

(A) (B)

1,245 1,450

show days

20lr (D)

4t

You need to enter the text "WEEKLY REPORT" to appear in the middle of the space used by the five columns below. Which of the following spreadsheet commands will enable this to be done?

* +

(A) (B)

Fill handle

(c)

Label Cell

(D)

Cursor

(c) (D)

$

44

In a spreadsheet, the column titles will always be visible when you scroll the spreadsheet ifyou first

(A) (B)

(c) (D)

nl rnonl

freeze the top row lock the last column lock the spreadsheet fueeze the first column

GO ON TO THE NEXT PAGE n

/E ,n14

,,li!: t,l

r.

7

(

45

Which of the following is the correct sequence of steps to delete a fleld in a

47,

Which of the following flowchart represents a process?

qmbols

database table?

t

(A)

(A) Choose the delete row option. Select row to be deleted and right

click.

(B)

Open table in design view. Choose yes to confirm deletion.

(B)

Open table in design view. Select row to be deleted and right

(c)

click. Choose the delete row option. Choose yes to confirrn deletion.

(C)

(D)

Select row to be deleted and right

click. Open table in design view. Choose the delete row option. Choose yes to confirm deletion.

48.

(A) (B) (C) (D)

t (D)

s

Select row to be deleted and right

click. Choose the delete row option. Open table in design view Choose yes to confirrr deletion.

Program debugging should be performed

49

during the designphase during the testing phase before compiling the program before identifuing any test data

In representing algorithms, which of the following statements would be placed in the flowchart box shown below?

46. u €

Consider the following algorithm.

a:7 b:9 a:b-a b:a+b

(A) (B)

Write a, b

(c) (D)

The output of this'algorithm is

(A) (B) (c) (D)

A>25 ReadA Output C Count
View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF