Advanced level 2024 HIHS mock ICT 1

Advanced level 2024 HIHS mock ICT 1

Advanced level 2024 HIHS mock ICT 1

1) The computer that allows more than one user to
work at the same time is known as a:
A Mainframe computer
B Embedded computer
C Micro computer
D Multi-programmed computer
2) _____ is the technological basis on which the
Third-Generation computers were built:
A Transistors
B Vacuum tube
C Microprocessor
D Integrated circuits
3) A computer that exists in a system that cannot be
reprogrammed by the user is:
A Tablet computer system
B Embedded computer system
C Handheld computer system
D System access control
4) The De Morgan law for the logic AND states that
̅𝐴̅̅.̅𝐵̅ =:
A 𝑨 ̅̅̅+̅̅̅̅𝑩̅
B A+ 𝑩̅
C 𝑨̅ + B
D 𝑨̅ + 𝑩̅
5) Which of the following is NOT a function of an
operating system?
A Providing user interface
B Memory management
C Executing program instructions
D System access control
6) A chip in the computer that contains essential
information in a computer such as the date and
time is:
A CMOS
B BIOS
C RAM
D ROM
7) Which file format will you use for publishing and
distributing electronic text documents?
A .mpeg
B .jpeg
C .pdf
D .wav
8) A document created in an application package
which could be used over and over by many users
for the same purpose is known as:
A Wizard
B Template
C Draft
D Form
9) The check by computers to ensure that data
entered into a database is sensible is known as:
A Integrity check
B Verification
C Validation
D Redundancy check
10) Which of the following application packages
would be the most appropriate for representing
information on charts and performance
calculations:
A Presentation packages
B Database packages
C Word processing packages
D Spreadsheet packages
11) Which of the following is an advantage of a
vector-based graphics format?
A It allows graphs to be placed in a vector form
B It is device independent
C It allows vectors to be used to draw graphs
D It tolerates straight line graphs
12) The act of gaining unauthorized access by use of a
network to people’s computer is known as:
A Hacking
B Surfing
C Scamming
D Spoofing
13) Software designed to meet the needs of a
particular organization is called:
A Generic
B Surfing
C Integrated
D Bespoke
14) One way of limiting piracy of intellectual property
is by:
A Use of antivirus software
B Using encryption
C Enforcing legislation
D Use of firewall
15) An information system that provide periodic and
predetermined reports that summarizes
information only is called:
A MIS
B GIS
C HIS
D DDS
16) An information system consists of:
A Software and Hardware
B People, software and Hardware
C People, data, machine and procedure
D People, data, software and procedure

PDF is loading please wait...


Leave a comment

Your email address will not be published. Required fields are marked *

Download our application
kawlo
sponsors Ads