SECTION A: MCQ
Instructions: Answer ALL questions
1. Which Network Layer is responsible for
Encryption?
A. Application
B. Transport
C. Network
D. Link
2. Which of these Protocols is found in the
application layer?
A. IP
B. UDP
C. TCP
D. SMTP
3. Which of these Protocols is found in the
transport layer?
A. HTTP
B. SMTP
C. TCP
D. WIFI
4. What type of network is the Internet?
A. WAN
B. PAN
C. Broadband
D. LAN
5. What device sits in the centre of a star network?
A. Switch
B. Brouter
C. Router
D. Hub
6. What does a wireless network use to transmit
data?
A. Radio Waves
B. Microwaves
C. Light
D. Gamma Rays
7. A device that connects LANs together is a…
A. Router
B. Repeater
C. Bridge
D. Switch
8. What is the purpose of encryption?
A. To stop hackers
B. To prevent data from being read in transit
C. To reduce file sizes
D. To route packets of data
9. What is the purpose of a Firewall?
A. To detect viruses on a system
B. To prevent unauthorized connections
coming into and out of a Network
C. To stop students having fun
D. To organize data
10. What is the purpose of Authentication?
A. To prove that a user is who they claim to be
B. To check a password
C. To switch packets of data
D. To stop data being read
11. Which of the following protocols is used by web
browsers to access websites securely?
A. HTTP
B. HTTPS
C. IMAP
D. FTP
12. Which of the following protocols is used to send
emails between servers?
A. HTTP
B. FTP
C. SMTP
D. IMAP
13. Which of the following protocols is used to
transfer files across a network?
A. TCP
B. FTP
C. UDP
D. IP
14. Which data transfer method is the fastest?
A. Copper cabling
B. Fibre Optic cabling
C. Wireless
D. Coaxial cabling
15. What type of address uniquely identifies a
networked device?
A. IP
B. MAC
C. TCP
D. NIC
16. Which of these cannot be used as a method of
identification?
A. Encryption
B. MAC Address
C. Username
D. IP Address
17. Which Network Layer is responsible for
Encryption?
A. Application
B. Transport
C. Network
D. Link
18. What is the correct order of Network Layers?
A. Transport, Network, Application, Link
B. Application, Transport, Netwide, Link
C. Application, Transport, Network, Link
D. Link, Transport, Application, Network
19. What is TCP used for?
A. To send information across the internet in
packets
B. To ensure that information is sent to the
correct computer
C. To send mail across the internet
D. To transmit webpages across the internet
20. Which best explains what happens when a new
device is connected to the Internet?
A. A device driver is assigned to the device.
B. An Internet Protocol (IP) address is assigned
to the device.
C. A packet number is assigned to the device.
D. A Web site is assigned to the device.
21. Which of the following operating system reads
and reacts in actual time?
A. Quick Response System
B. Real Time System
C. Time Sharing System
D. Batch Processing System
22. The essential difference between an operating
system like Linux and one like Windows is that
A. Windows can run with an Intel processor,
whereas Linux cannot
B. Linux is a proprietary whereas Windows is
not
C. There are multiple versions of Linux, but
only one version of Windows
D. Any programmer can modify Linux code
which is not permitted with Windows
23. Which runs on computer hardware and serve as
platform for other software to run on?
A. Operating System
B. Application Software
C. System Software
D. All of the above
24. A traveling agency has a computerized system
whereby reservations can be made online. This is
an example of a (n):
A. Real-time processing system
B. Batch processing system
C. Decision support system
D. Off-line processing system
25. People who coordinate the development of an
information system are referred to as:_____
A. System users
B. System programmers
C. System analyst
D. Systems administrators
26. The number of attributes in a relation is called
A. Cardinality
B. Degree
C. Tuples
D. Entity
27. The turn-around time of a user job is the
A. Time since its submission to the time its
results become available.
B. Time duration for which the CPU is allotted
to the job.
C. Total time taken to execute the job.
D. Time taken for the job to move from
assembly phase to completion phase
28. Validation and verification checks are performed
to ensure
A. Data security
B. Data integrity
C. Data protection
D. Software security
29. Which of the following is designed to control the
operations of a computer
A. Application Software
B. System Software
C. Utility Software
D. User
30. The field that uniquely identifies a record in a
database is called:
A. Foreign Key
B. Primary Key
C. Secondary Key
D. Compound Key
31. Which of the following makes use of real time
processing?
A. Calculation of terminal averages
B. Reservation systems
C. Payroll systems
D. Billing systems
32. A preemptive scheduling algorithm that allocates
time slices to process in memory is
A. Shortest job first
B. Shortest remaining time next
C. Round Robin
D. None of the above
33. When using software, one should make sure to
avoid being a pirate by verifying
A. A digital Certificate
B. That software is virus free
C. The software key
D. The behaviour of the software
34. One of the following is not data compression
software. Identify the odd software
A. WinZip
B. WinRAR
C. WINDRAR
D. ISO
35. Which of the following statements is NOT true
of primary keys?
A. They do not contain blank value
B. They are unique identifiers
C. They are always in text form
D. They may be composed of one or more
attributes
36. Proof reading and double entry are two methods
of ……………?
A. Data validation
B. Data verification
C. Data verification
D. Data encryption
37. Which of the following devices is used to mark
responses to MCQS in the GCE?
A. OMR
B. OCR
C. MICR
D. Barcode reader
38. Which of the following is not a pointing device?
A. Mouse
B. Joystick
C. Track ball
D. Touchscreen
39. Which of the following compact disks can you
buy to store music, delete any song at random
and add more songs to it when you like?
A. CD-ROM
B. CD-R
C. CD-RW
D. FLASH memory
40. A nibble is a combination of?
A. 4 bits
B. 1 bit
C. 8 bits
D. 16 bits
SECTION B
Instructions: Answer THREE questions
You are reminded of the necessity for good English and orderly presentation in your answers. In
calculations,
you are advised to show all the steps in your working, giving your answer at each stage. For your
guidance, the
appropriate mark for each part of a question is indicated in brackets
1. (i) Define the following web terminologies and give an example of each.
a) Web page.
b) Search engine.
c) Browser. (6 marks)
(ii)
a) Give three impacts of computer virus to educational institutions,
b) Suggest two measures that can be taken by a school secretary to protect the computer
from being infected by computer viruses.
c) Give two effects of a virus to a computer system. (7 marks)
(iii)
a) What do you understand by the term multimedia? (1 mark)
b) Give three ways in which the installation of multimedia centres in schools in Cameroon
would affect both teachers and students? (3 marks)
(iv) Give the difference between the following pairs of transmission modes: (3 marks)
a) Parallel and serial.
b) Simplex and full-duplex.
c) Synchronous and asynchronous.
2. i) People who work in front of the computer for long period of time usually expose the selves to some
health
problems:
a.) List and briefly explain two health hazards that directly relates to prolonged usage of computers (2
marks)
b.) What are the necessary actions you would take to prevent/solve the hazards listed above
respectively.(2 marks)
ii) Define the following terms (4 marks)
-Robot
-Videoconferencing
-Virtual reality
-Artificial intelligence
iii) Explain the uses of computers in the following areas (3 marks)
-hospitals – education – multinational cooperatives
iv)
a) Give two reasons why data misuse is mostly carried out in computer system than manual systems (2
marks)
b) State two physical solutions to computer misuse (2 marks)
c) List three malignant computer programs you know of (3 marks)
d) State to possible actions that a computer might pulse to suggest that it is infected by virus (2 marks)
a.) Give the full meaning of the following : ROM, PROM, EPROM, and EEPROM.(4 marks)
b.) Explain the term processing unit and state why it is required (2 marks)
c.) Give the difference between primary and secondary storage listing possible examples in each case (4
marks)
d.) Define the following terms :
- Interrupt and polling (4 marks)
-computer bus lines (2marks)
-cache memory (1 mark)
e.) Briefly Explain the machine instruction cycle (3 marks)
i) State what is meant by the following, giving an area of application:
a.) Optical mark reader
b.) Barcode reader
c.) Storage device (5 marks)
ii.) A common mistake is to assume that 1KB is equal to 1000 bytes, instead of 1024 bytes.
a.) Explain why 1KB is equal to 1024 bytes and not 1000bytes (2 mark)
b.) Determine the storage capacity 2 GB in bytes (2 marks)
c.) Distinguish LCD monitors and CRT monitors (4 marks)
d.) What do you understand by memory, stating two characteristics of memory (4 marks)
e.) List two examples each of memory devices using the following memory technologies (3 marks)
-magnetic storage
-semiconductor storage
-optical storage
5. (i) A hospital uses a multi-user centralized database stored on a database server to allow
staff to access patient data.
a) Define database normalization and give the criteria for a database to be in 1NF. (3 marks)
b) Name the three levels in the three-level architecture of a DBMS. (2 marks)
c) Explain the concurrent update problem which could arise with this multi-user
database. (2 marks)
d) Distinguish between data validation and data verification. (2 marks)
(ii) Giving an example in each case, explain the following terms used in operating systems:
a) Preemptive scheduling / Non preemptive scheduling (2 marks)
b) Multi-user / Multi-tasking (2 marks)
c) Multiprocessing / Multiprogramming(2marks)
(iii) a) Describe the main difference between application software and system software. (1 mark)
b) Name the four types of system software and give one use for each class. (2 marks)
c) Name the type of application software you would use for the following purposes. (2 marks)
• To create, edit and format text-based documents.
• To work with numbers, calculations, charts and graphs.
• To present a lesson in a classroom.
• To produce good news letters and company magazines