Professional Documents
Culture Documents
2
23. Which of the following truth tables is derived from
an AND gate which receives two inputs A and B? 25. In a spreadsheet, cell C12 contains the value 6, D12
A. contains the value 12 and E12 contains the value 10.
INPUTS OUTPUT Cell F12 contains the expression = C12*D12-E12.
A B What is the value displayed in cell F12?
1 1 1
1 0 1
A. 62
0 1 1 B. 12
0 0 0 C. -12
B.
D. 8
INPUTS OUTPUT E. 28
A B
1 1 1 26. Why is it a good idea NOT to open emails from
1 0 1
0 1 0 unknown sources?
0 0 0 A. Opening them will lead to more junk emails.
C. B. Opening them will waste space on the hard disk.
INPUTS OUTPUT
C. Opening them may reveal passwords.
A B D. The emails may carry viruses.
1 1 1 E. Disk defragmentation may occur.
1 0 0
0 1 0
0 0 0 27. Select a combination of software that could be used
D. in the creation of mail-merged letters.
INPUTS OUTPUT
A. Database and spreadsheet.
A B B. Graphics package and word processing
1 1 1 C. Presentation package and word processing
1 0 1
D. Word processing and database
0 1 1
0 0 1 E. CorelDraw and MS paint
B. Laser printer
29. Which field would be the best choice as the key field C. Dot-matrix printer
of a student’s performance record system in a D. Inkjet printer
school? E. Character printer
A. Student surname
B. Student admission number 31. In an expert system, searches, comparisons and
C. Date of birth deductions are performed by the
D. Birth entry number A. knowledge base.
E. Score in best subject B. knowledge acquisition program.
C. user interface.
30. Choose a printer that is most suitable for producing D. inference engine.
monthly electricity bills by an electricity company E. expert base.
with thousands of customers.
A. Line printer
3
32. A set of instructions specifying how records would be A. Game Using interface.
extracted from a set of records is known as a _____ . B. Google User interface.
A. table C. Graphical User interface.
B. query D. Graphical Unique interface.
C. report E. Give Up Immediately.
D. macro
E. field 39. An example of a peripheral device is the
A. CPU.
33. Which of the following strategies cannot effectively B. LAN.
C. RAM.
prevent a computer from being infected by viruses?
A. Use virus scanning programs. D. Scanner.
E. ROM.
B. Refuse to use pirated software.
C. Switch off computers that are not in use.
40. Which of the following is a correct cell address for
D. Do not open emails coming from questionable
the first cell in the fourth column of a worksheet?
sources.
A. A1
E. Use up-to-date antivirus program.
B. A4
C. D1
34. An encoding system for changing numbers and
D. D4
letters to binary is E. C4
A. DBMS.
B. ASCII.
C. ROM. 41. The feature in word processing that enables users to
D. RAM.
type words continually without pressing the ENTER
E. Bits.
key when the cursor reaches end of each line is
35. The local hard drive is the A. find.
A. A drive. B. replace.
B. C drive. C. word-wrap.
C. H drive. D. mail-merge.
D. S drive. E. stopline.
E. B drive. 42. The acronym SQL stands for
A. Standard Query Language.
36. A manager wants to project profit for next year. B. Sequential Query Language.
C. Standard Question Language.
Which of the following programs should he use?
D. Structured Query Language.
A. Spreadsheet
E. System Queue Learning.
B. Word processor
C. Graphics package
43. Which of the following field types, in database, can
D. Presentation software
E. Profit Projector only have two possible values?
A. Text
37. The function =AVERAGE(B2:B8) in a cell B9 has been B. Date
C. Number
copied and pasted to cells C9 TO K9 in spreadsheet.
D. Boolean
Which of the following formulas would be displayed E. Alphanumeric
in cell D9?
A. =AVERAGE (C9:K9) 44. An internet user is worried that his files sent over the
B. =AVERAGE (D2:D8) internet are being intercepted by hackers or
C. =AVERAGE (B2:B8)
investigators. What would you recommend to reduce
D. =AVERAGE (D2:D9)
E. =AVERAGE (B2,B8,C9,K9) the risk of this invasion of privacy?
A. To use encryption techniques during
38. The acronym GUI stands for transmission.
B. To change his ISP regularly.
4
C. To set the browser to disallow cookies. E. 11111101
D. To increase the level of security settings on the
browser. 48. A diagram that represents an algorithm is called
E. To call in the EFCC. A. a program flowchart.
B. a system flowchart.
45. A temporary holding area for data, application C. a sequence flowchart.
instructions and the operating system is the ______ . D. an entity relation diagram.
A. RAM E. a pseudocode.
B. ROM
C. Register 49. Sam wants to enter Computer Studies tests marks in
D. Hard disk a spreadsheet. Which of the following keys will make
E. CD-ROM the data entry faster?
A. Control keys
46. A company provided its users with a network that B. Function keys
can be accessed from all its offices worldwide. This C. Document keys
network is D. Numeric keypad
A. a local area network. E. Ctrl+Alt+Del
B. a metropolitan area network.
C. a wide area network. 50. During the running of developed programs, it was
D. an intranet. discovered that the programs did not produce the
E. a special network. expected output. To correct the problem, the
programmers needed to
47. When the denary number 19 is converted to its A. check the programs for syntax errors.
binary form and represented in 8-bit format it B. change program translators.
becomes______ . C. check hardware for errors.
A. 01010011 D. test programs for logical errors with test data
B. 10011011 and compare outputs with expected results.
C. 00010011 E. service the computer.
D. 10010011