Cameroon GCE advanced level June 2025 ICT 1
Cameroon GCE advanced level June 2025 ICT 1
Here is the extracted data from the provided images, presented as questions and their multiple-choice options:
Page 1
- The device that is used to automatically capture information about drugs in a pharmacy is called
A magnetic ink character recognition.
B optical mark reader.
C barcode reader.
D optical character recognition.
- A device that limits access to a private network is
A gateway.
B firewall.
C router.
D bridge.
- Information retrieval is faster from
A floppy disk.
B magnetic tape.
C CD-ROM.
D hard disk.
- Which of these groups contains graphic file extensions?
A JPG, CPX, GCM.
B GIF, TCE, AVI.
C JPG, GIF, BMP.
D JPG, GIF, TIFF.
- Weather forecasting can be done using
A decision support system.
B management information system.
C artificial intelligence.
D executive information system.
- A magnetic tape stores data ______ while a CD-ROM stores data ______.
A sequentially, randomly.
B serially, circularly.
C directly, randomly.
D directly, sequentially.
- The transmission of a group of bits, one after another through a single wire is known as
A full-duplex.
B parallel.
C synchronous.
D serial.
- The components in the motherboard communicate through the
A registers
B cache
C bus
D control unit
- When the hub of a LAN gets bad, which of the following devices can be used to replace it?
A Gateway.
B NIC.
C Bridge.
D Switch.
- A programming paradigms is characterised by
A language used.
B type of programming structures involved.
C environment used to program.
D methods used to program.
- A network cable is directly connect to a computer through the
A router.
B network interface card.
C universal Serial bus.
D switch.
- One strategy to implement a new system in SDLC is
A prototyping.
B waterfall.
C piece-meal.
D design.
- The duration of a project can be determined by
A counting the steps used in the project.
B counting the number of tasks involved.
C calculating the duration of tasks on the longest path.
D determine the number of workers.
- The longest path in a project, not necessarily with the highest number of tasks is known as the
A determinant
B lag path
C critical path
D slack path
- The calculation of the cost of a project is carried out in the ______ phase of SDLC.
A design.
B investigation.
C analysis.
D implementation.
- A student installed open source software in his/her laptop. One possible reason for this is
A it is never blocked during access
B it is free to use
C can be modified by user
D many users can use it.
- The formula =$C2$H$3-K1 is found in a spreadsheet cell F2. If the formula is copied, then the formula in F3 shall be
A =$C2$H$3-K1.
B =$C5$H$5-K4.
C =$C2$H$3-K4.
D =$C2*$H$3-K5.
- A database has three related tables. Which of the following is true about the tables?
A The tables do have corresponding records.
B The tables must have the same number of fields.
C There should be a key that is common between the linked tables.
D They should be a one-to-many relationships.
- Which of the following is not possible with spreadsheet?
A Link cells of different sheets.
B Insert pictures.
C Draw objects e.g. circles.
D Create relationships.
Page 2
- A programming structure that carries out repeated execution of a set of instruction is
A branch.
B decision.
C loop.
D sequence.
- Which of the following is true about synchronous transmission of data?
A All bits are sent simultaneously.
B Timing of streaming is by a clock.
C A group of bits is sent at a time through a single cable.
D Many lines are used to transmit a byte of bits.
- Parallel transmission is not suitable for long distance transmission because
A the signals will lose strength fast.
B the bits might become mixed up.
C transmission speed for some lines may.
D change but strength maintain.
D some lines will be underused.
- A security measure that limits information access and disclosure only to authorised users is referred to as
A confidentiality.
B integrity.
C availability.
D authenticity.
- When a node in a ring network breaks down the
A nodes that connect directly to it stop functioning.
B the whole network fails.
C the token continues to run.
D other nodes continue to function.
- Which of the following is the best action that can speed up communication in a network?
A Reduce cable distance between nodes.
B Step-up the RAM size of the computers.
C Reduce the number of devices in the network.
D Use wireless communication and not cable.
- A software that provides the environment between the user and computer system is known as
A utility software.
B language translator.
C operating system.
D compiler.
- A file format is used to describe
A how files are files displayed in the computer.
B how files function in the computer.
C arrangement of data inside a file.
D the way files are created by the computer.
- Which of the following affect the integrity of data?
A The number of people who access the data.
B The number of programs accessing the data.
C The technology of the storage medium.
D The speed of transmission of the data.
- The phenomenon that limits a group of people from making use of digital technology is known as
A digital divide.
B technology separation.
C digital illiteracy.
D digital disability.
- When people deceive people using networks and money without compliance it is known as
A hacking.
B phishing.
C cracking.
D scamming.
- Program execution time would be minimize if the programs are written in
A assembly language.
B high level language.
C machine language.
D 4G language.
- The main function of a spyware is
A protects our computers from intruders.
B gathers information from a computer and send to another person in a network.
C It takes records of activities in a computer and propose actions to avoid failure.
D takes video of the computer environment.
- The design of special equipment to reduce health problems in computer users is known as
A digital design.
B Digital Tunnel Syndrome.
C ergonomics
D tendonitis
- The complexity of an algorithm defines
A time and space
B time and cost.
C space and cost.
D time and scope.
- The right for people to know what information of organisations store about you is defined by
A laws on cyber security.
B data protection act.
C ethics.
D legacy.
- An action that can lead to faster access to files in system can be
A use of external storage
B use of antivirus software
C use of a common folder for files
D defragmentation of the hard disk
- What topology is used to describe a network with central controller?
A Star.
B Bus.
C Mesh.
D Ring.
