Advanced level 2026 South West mock ICT 1
Advanced level 2026 South West mock ICT 1
I have extracted the data from your latest image, which contains several multiple-choice questions regarding Project Management, Operating Systems, Computer Architecture, and Database Design.
COMPUTER SCIENCE / IT EXAMINATION SECTION
1. Testing of a new product through simulation is necessary because:
-
A. simulation shows clearer results.
-
B. simulation requires human training.
-
C. simulation prevents accidents and loss.
-
D. simulation produces real physical results.
2. The main reason determining the critical path(s) by the project team is that..
-
A. It provides a detailed budget.
-
B. It identifies time-sensitive tasks for better control.
-
C. It defines slack tasks.
-
D. It breaks a project into manageable tasks.
3. In relation to operating system, preempted job
-
A. voluntarily gives up the CPU to another job.
-
B. moves to waiting state and wait for more resources.
-
C. is executed to completion as it gets the CPU.
-
D. queued up at the ready state and wait for CPU turn.
4. A communication medium for signals within computer internal components is the
-
a. motherboard.
-
b. sockets.
-
c. connections.
-
d. bus.
5. It establishes communication agreement between devices.
-
A. Protocol.
-
B. Spooling.
-
C. Handshaking.
-
D. Buffering.
6. Which of the following arrangements represents the memories in ascending order of speed?
-
A. Hard disk $\rightarrow$ RAM $\rightarrow$ cache $\rightarrow$ Register.
-
B. Register $\rightarrow$ Cache $\rightarrow$ RAM $\rightarrow$ Hard disk.
-
C. RAM $\rightarrow$ Cache $\rightarrow$ Register $\rightarrow$ Hard disk.
-
D. Cache $\rightarrow$ Register $\rightarrow$ RAM $\rightarrow$ Hard disk.
7. It Changes the appearance of a text.
-
A.
<SUB>****</SUB>. -
B.
<OL>***</OL>. -
C.
<DL>***</DL>. -
D.
<HTML>***</HTML>.
8. One of the most appropriate long-term strategies against cybercrime is
-
A. deleting infected files manually.
-
B. regular user education and updated security policies.
-
C. use secure passwords.
-
D. using only free software.
9. Exposure of students results in a digital system violates ______ ethical principles.
-
A. Availability.
-
B. Privacy.
-
C. Confidentiality.
-
D. Integrity.
10. The most suitable error control bit used in asynchronous data transmission mode is
-
A. Start and bits.
-
B. Parity bits.
-
C. Checksum bits.
-
D. Control bits.
11. The speed of a dot matrix printer is measured in
-
A. Characters per second (CPS).
-
B. line per second (LPS).
-
C. Characters per minute (CPM).
-
D. lines per minute (LPM).
12. The main purpose of NIC is to
-
A. connect computer to the internet network.
-
B. connect computers to network server.
-
C. connect computers to network.
-
D. connect computers to intranet.
13. A digital system uses 9 bits to store a symbol. How many symbols can be stored in the system?
-
A. 14 symbols.
-
B. 81 symbols.
-
C. 512 symbols.
-
D. 256 symbols.
14. Which of the following is a description of low-level programming language?
-
A. Easy to use by programmers.
-
B. Cost effective to design.
-
C. Codes written to suit computer problem.
-
D. Codes written to suit computer architecture.
15. Which of the following pairs could limit a project progress?
-
A. Time and project team.
-
B. Time and project size.
-
C. Budget and project tasks.
-
D. Budget and project team.
16. What makes a primary key unique in a database relation is the
-
A. presence of null index value.
-
B. absence of null index value.
-
C. presence of duplicate index value.
-
D. absence of duplicate index value.
17. A double oval shape in ER model signifies a
-
A. composite attribute.
-
B. cardinality.
-
C. multi-valued attribute.
-
D. weak entity.
Would you like me to explain the memory hierarchy (Question 6) or the 9-bit symbol calculation (Question 13)?
