Professional Documents
Culture Documents
A. Cables
B. Software
C. Protocols
D. Hardware
E. None of the above
2. Internet Explorer is an example of a
A. E-mail program
B. Chat system
C. Web page
D. Voice mail
E. Browser
3. Arrange the following data representation in increasing order
A. Terabyte, Gigabyte, Megabyte, Kilobyte
B. Byte, Kilobyte, TeraByte, Megabyte
C. Byte, Kilobyte ,Gigabyte, Megabyte,
D. Gigabyte, Megabyte, Kilobyte, Terabyte
E. Kilobyte, Megabyte, Gigabyte, Terabyte
CSE1010e
A. Hard disk
B. 64-Bit processors
C. Dual Core
D. Hyperthreading
E. None of the above
6. Which of the following is NOT an output device?
A. Barcode Reader
B. Printers
C. Projector
D. Speaker
E. Plotter
CSE1010e
8. Diskettes and hard disks that can store data permanently are referred to as:
A. Primary storage devices
B. Secondary storage devices
C. Tertiary storage devices
D. Virtual memory devices
E. None of the above
9. The structured programming technique that graphically presents the detailed steps needed
to solve a problem is known as:
A. Object Oriented programming
B. Logic
C. Pseudocode
D. Flow chart
E. Use case
CSE1010e
10. In which version order did the Windows desktop operating system evolved?
A. 3.1 95 98 2000 Millenium XP Vista
B. 95 98 Millenium 2000 XP Vista 3.1
C. 3.1 95 98 2000 XP Vista Millenium
D. 3.1 95 98 Millenium 2000 XP Vista
E. 3.1 95 98 Millenium 2000 Vista XP
12. To add two numbers together in cells A1 and A2, you use the following formula
A. =A1 + A2
B. =Add(A1, A2)
C. =Add(A1 + A2)
D. =Together(A1:A2)
E. A1 plus A2
CSE1010e
13. _________________ is an ongoing phase in System Development Life Cycle, where the
system is periodically evaluated and updated as desired.
A. System maintenance
B. Data analysis
C. Information gathering
D. Proper user training
E. None of the above
14. Which of the following technique is used to gather information during system analysis?
A. Interview
B. Questionnaire
C. Observation
D. Source document Analysis
E. All of the above
CSE1010e
17. Which protocol is used by a web server to hold and deliver web pages and other web
content?
A. File Transfer Protocol
B. Mail Transfer Protocol
C. Dynamic Web Pages Protocol
D. Active Server Pages
E. Hyper Text Transfer Protocol
CSE1010e
19. Which of the following can be used as a hyperlink to other web pages?
i Some text
ii An image
iii A video
A. i only
B. i and iii only
C. ii and iii only
D. None of the above
E. All of the above
20. Which of the following is NOT required to access the Internet or the WWW?
A. A modem
B. A telephone line or wireless device
C. An ISP
D. A special software
E. A Printer
CSE1010e
21. Which of the following is used for authentication purposes, to track users, to keep
information on user preferences and information on users when they are shopping online.
A. Cookies
B. Plug-ins
C. Wikis
D. Blogs
E. All of the above
22. A ___________ acts as a security buffer between a companys private network and all
external networks.
A. firewall
B. password
C. disaster recovery plan
D. virus checker
E. All of the above
23. Programs that come into a computer system disguised as something else are called
A. spoofers
B. loggers
C. defacers
D. Trojan horses
E. None of the above
CSE1010e
24. An attempt to slow down or stop a computer system or network by flooding the system
with requests for information is called a
A. virus
B. worm
C. denial-of-service attack
D. Trojan horse
E. All of the above
25. Which of the following is a computer program designed to increase the speed of reading the
file and the amount of usable space by rearranging the files and unused space.
A. Disk Defragmenter
B. Malware
C. WinRAR
D. Nagware
E. Download Manager
31. All of the following are examples of real security and privacy risks EXCEPT:
A. Hackers.
B. Viruses.
C. Spam.
D. Identity Theft.
E. Eavesdroppers
CSE1010e
33. _____________ binary digits (or bits) combine to create one byte.
A. Ten
B. Sixteen
C. Eight
D. Two
E. four
CSE1010e
38. After a picture has been taken with a digital camera and processed appropriately, the actual
print of the picture is considered as:
A. Data.
B. Output.
C. Input.
D. process.
E. Memory
CSE1010e
39. The type of monitor that looks like a traditional television set is called a ____________
monitor.
A. Display
B. Cathode-ray tube (CRT)
C. Liquid crystal display (LCD)
D. Flat-panel
E. Digital tablet
CSE1010e
3. A hard disk may contain several platters forming ___________ that increase the capacity of
data that can be stored by the device.
4. _______________ is the art of making a computer do what you want it to do.
5. For programs to be executed, they must first be loaded into the _____________
6. Multiple applications bundled together as a package are referred to as ___________
CSE1010e
10. ______________ is the name given to a number of injuries that occurs especially in people
who are involved in heavy repetitive work such that additional strain is imposed on their
neck, fingers, hands, wrists and arms resulting in serious pains to different body parts that
need medical care.
[10 Marks]
To binary
ii)
To Hexadecimal
[1+2 Marks]
To decimal
[2 Marks]
(d) List the five functions of an operating system.
[5 Marks]
CSE1010e
ii
What is a hyperlink?
[2 mark]
iii How do you recognize hyperlinks on the above web page? Give 2 examples of hyperlinks
found on the page.
[1 + 2 mark]
iv What kind of software is used to view a web page? Give the name of the software used
in the above case.
[1 + 1 mark]
CSE1010e
The above figure is a screenshot of Google.com. What kind of website is Google? What
is the purpose of these kind of websites?
[1 + 2 marks]
[4 Marks]
What is a virus?
[1 Mark]
ii
iii
iv
Why would backing up data not guard against the effect of a virus?
[2 Marks]
CSE1010e
(b) A new printer model VENUS has been introduced in the local market this year. Some
students purchased this model and tried to install it on their PCs. The printer successfully
installs on a Windows 7 as it is immediately recognised by the operating system.
i
ii
The printer did not install on a Windows XP PC. Explain why and what should be done to
be able to use this printer.
[3 Marks]
(c) The following flowchart shows how sensors (which can be analogue or digital) and a
computer are used to control the temperature of a greenhouse for plants. Complete the
flowchart using the items from the list below.
[1x8 Marks]
START
12
Y
es
11
N
o
List of statements
Y
es
Y
es
Y
es
N
o
N
o
N
o 10
CSE1010e
1. compare input
temperature with set
temperature
2. is input temperature = set
temperature
3. is input temperature < set
temperature
4. is input temperature > set
temperature
5. is input signal analogue
6. output error
7. read set is temperature
from file
8. switch on cooler
9. switch on heater
10. system fault
11.STOP
use ADC to convert signal
12. read temperature from
sensor