Cameroon GCE advanced level June 2025 ICT 1

Cameroon GCE advanced level June 2025 ICT 1

Cameroon GCE advanced level June 2025 ICT 1

Here is the extracted data from the provided images, presented as questions and their multiple-choice options:

Page 1

  1. The device that is used to automatically capture information about drugs in a pharmacy is called

    A magnetic ink character recognition.

    B optical mark reader.

    C barcode reader.

    D optical character recognition.

  2. A device that limits access to a private network is

    A gateway.

    B firewall.

    C router.

    D bridge.

  3. Information retrieval is faster from

    A floppy disk.

    B magnetic tape.

    C CD-ROM.

    D hard disk.

  4. Which of these groups contains graphic file extensions?

    A JPG, CPX, GCM.

    B GIF, TCE, AVI.

    C JPG, GIF, BMP.

    D JPG, GIF, TIFF.

  5. Weather forecasting can be done using

    A decision support system.

    B management information system.

    C artificial intelligence.

    D executive information system.

  6. A magnetic tape stores data ______ while a CD-ROM stores data ______.

    A sequentially, randomly.

    B serially, circularly.

    C directly, randomly.

    D directly, sequentially.

  7. The transmission of a group of bits, one after another through a single wire is known as

    A full-duplex.

    B parallel.

    C synchronous.

    D serial.

  8. The components in the motherboard communicate through the

    A registers

    B cache

    C bus

    D control unit

  9. When the hub of a LAN gets bad, which of the following devices can be used to replace it?

    A Gateway.

    B NIC.

    C Bridge.

    D Switch.

  10. A programming paradigms is characterised by

    A language used.

    B type of programming structures involved.

    C environment used to program.

    D methods used to program.

  11. A network cable is directly connect to a computer through the

    A router.

    B network interface card.

    C universal Serial bus.

    D switch.

  12. One strategy to implement a new system in SDLC is

    A prototyping.

    B waterfall.

    C piece-meal.

    D design.

  13. The duration of a project can be determined by

    A counting the steps used in the project.

    B counting the number of tasks involved.

    C calculating the duration of tasks on the longest path.

    D determine the number of workers.

  14. The longest path in a project, not necessarily with the highest number of tasks is known as the

    A determinant

    B lag path

    C critical path

    D slack path

  15. The calculation of the cost of a project is carried out in the ______ phase of SDLC.

    A design.

    B investigation.

    C analysis.

    D implementation.

  16. A student installed open source software in his/her laptop. One possible reason for this is

    A it is never blocked during access

    B it is free to use

    C can be modified by user

    D many users can use it.

  17. The formula =$C2$H$3-K1 is found in a spreadsheet cell F2. If the formula is copied, then the formula in F3 shall be

    A =$C2$H$3-K1.

    B =$C5$H$5-K4.

    C =$C2$H$3-K4.

    D =$C2*$H$3-K5.

  18. A database has three related tables. Which of the following is true about the tables?

    A The tables do have corresponding records.

    B The tables must have the same number of fields.

    C There should be a key that is common between the linked tables.

    D They should be a one-to-many relationships.

  19. Which of the following is not possible with spreadsheet?

    A Link cells of different sheets.

    B Insert pictures.

    C Draw objects e.g. circles.

    D Create relationships.

Page 2

  1. A programming structure that carries out repeated execution of a set of instruction is

    A branch.

    B decision.

    C loop.

    D sequence.

  2. Which of the following is true about synchronous transmission of data?

    A All bits are sent simultaneously.

    B Timing of streaming is by a clock.

    C A group of bits is sent at a time through a single cable.

    D Many lines are used to transmit a byte of bits.

  3. Parallel transmission is not suitable for long distance transmission because

    A the signals will lose strength fast.

    B the bits might become mixed up.

    C transmission speed for some lines may.

    D change but strength maintain.

    D some lines will be underused.

  4. A security measure that limits information access and disclosure only to authorised users is referred to as

    A confidentiality.

    B integrity.

    C availability.

    D authenticity.

  5. When a node in a ring network breaks down the

    A nodes that connect directly to it stop functioning.

    B the whole network fails.

    C the token continues to run.

    D other nodes continue to function.

  6. Which of the following is the best action that can speed up communication in a network?

    A Reduce cable distance between nodes.

    B Step-up the RAM size of the computers.

    C Reduce the number of devices in the network.

    D Use wireless communication and not cable.

  7. A software that provides the environment between the user and computer system is known as

    A utility software.

    B language translator.

    C operating system.

    D compiler.

  8. A file format is used to describe

    A how files are files displayed in the computer.

    B how files function in the computer.

    C arrangement of data inside a file.

    D the way files are created by the computer.

  9. Which of the following affect the integrity of data?

    A The number of people who access the data.

    B The number of programs accessing the data.

    C The technology of the storage medium.

    D The speed of transmission of the data.

  10. The phenomenon that limits a group of people from making use of digital technology is known as

    A digital divide.

    B technology separation.

    C digital illiteracy.

    D digital disability.

  11. When people deceive people using networks and money without compliance it is known as

    A hacking.

    B phishing.

    C cracking.

    D scamming.

  12. Program execution time would be minimize if the programs are written in

    A assembly language.

    B high level language.

    C machine language.

    D 4G language.

  13. The main function of a spyware is

    A protects our computers from intruders.

    B gathers information from a computer and send to another person in a network.

    C It takes records of activities in a computer and propose actions to avoid failure.

    D takes video of the computer environment.

  14. The design of special equipment to reduce health problems in computer users is known as

    A digital design.

    B Digital Tunnel Syndrome.

    C ergonomics

    D tendonitis

  15. The complexity of an algorithm defines

    A time and space

    B time and cost.

    C space and cost.

    D time and scope.

  16. The right for people to know what information of organisations store about you is defined by

    A laws on cyber security.

    B data protection act.

    C ethics.

    D legacy.

  17. An action that can lead to faster access to files in system can be

    A use of external storage

    B use of antivirus software

    C use of a common folder for files

    D defragmentation of the hard disk

  18. What topology is used to describe a network with central controller?

    A Star.

    B Bus.

    C Mesh.

    D Ring.

PDF is loading please wait...

information and communication technologies
information and communication technologies

Click Here for answers and pamphlets

A LEVEL 2025 ICT 1


Leave a comment

Your email address will not be published. Required fields are marked *

JOIN OUR WHATSAPP GROUP! / REJOIGNEZ NOTRE GROUPE WHATSAPP!
sponsors Ads