cameroon gce O level June 2024 computer science 1
cameroon gce O level June 2024 computer science 1
are used to interpret IITML code. 9.
A Browsers
B Compilers
C Interpreters
D Assemblers
I.
The spreadsheet cell ranges A 1- E5 has
number of cells.
A 25
B 30
C 5
D 15
Arranging storage units from smallest to
largest capacity:
A Terabyte, Kilobyte, Byte, Bit
B Kilobyte, Terabyte, Byte, Bit
C Bit, Byte, Kilobyte, Terabyte
D Byte, Bit, Kilobyte, Terabyte
10.
The result of the binary subtraction
101012 -11112 is:
A 1100
B 01 10
C 1000
D 1010
j.
At Tinasoft Cybercafe, all computers are
connected to a computer in the control room.
This type of network architecture is known as:
A Peer-to-peer
B Proxy-server
C Client-server
D Peer-to-server
1 1.
4. The control structure that enables the
computer to repeat processes is called:
A Sequence
B Iteration
C Repeater
D Choice
Which of the following is NOT a characteristic
of a good Algorithm?
A Precise
Ambiguous
C Takes finite time
D Logical flow
12.
B
5. A validation method to ensure that data has
been received correctly is the
A Format
Length
C Automatic
D Parity
check.
13. Given the web address
https://www.ceceboard.cm/homatze.html.
Which portion is the domain name?
A https
B cgceboard.cm
C homepage.html
D wwvv
B
Signals from a transmission station are being
faintly received by a user. A
to boost it.
A Modem
B Repeater
C Gate way
D Router
6.
is needed
14. Technology now enables users to send images
over telephone lines using a:
A Telegram
B Fax
C Telex
DBMS is an example of D Fixed phone
A System
B Application
C Operating system
D Utility
7. software.
A malware that looks legitimate and it is
hidden within another program is a:
A Virus
B Worm
C Trojan horse
D Bomb
Angèle ava
October 13, 2024
Is there
Tiwu mark
November 4, 2024
I need u guys help please