1. CONFIDENTIAL
2
PART A : 30 marks
INSTRUCTIONS : Answer ALL questions. Choose the most appropriate answer.
1. There are five types of column in Microsoft Word 2010.
A. True
B. False
2. This tool that can only be used to strikethrough text in a table created using
Microsoft Word.
A. True
B. False
3. Times New Roman, Calibri and Arial are called Font Styles.
A. True
B. False
4. Both Microsoft Word 2010 and Microsoft Excel 2010 can sort list of text or number in
ascending or descending order.
A. True
B. False
5. By holding CTRL key while moving pressing either ← or → key, you will be able to
select text as you move.
A. True
B. False
6. is a tool in Microsoft Word that cannot be used to delete a strikethrough text.
A. True
B. False
7. Middle alignment is one of the four types of horizontal alignment in Font Group in
Microsoft Word 2010.
A. True
B. False
8. A user who wants to erase text backwards cannot use the Delete key.
A. True
B. False
9. Microsoft Word 2010 has no tab called Design.
2. CONFIDENTIAL
3
A. True
B. False
10. A user that applies a design template of a PowerPoint slides eventually change the look
of the slides without changing the contents.
A. True
B. False
11. Annie is editing her project report. She wants to edit the font size of text in the header
section. She could find the font size in Paragraph group.
A. True
B. False
12. When you enter a formula in a cell in Microsoft Excel 2010, you cannot leave the equal
sign at the beginning of a formula
A. True
B. False
13. Slide transition is a special effect used to introduce a slide in a slide show
A. True
B. False
14. You could use this tool to make a bullet list such as a book list.
A. True
B. False
15. Microsoft Excel 2010 has bullet tool in one of the tabs.
A. True
B. False
16. SUMIF is a basic function in Microsoft Excel 2010 that can be found by navigating in
the following order : Editing -> AutoSum
A. True
B. False
17. Sam printed out 5 pages of lecture notes that have 6 slides on each page. We could say
that the Sam actually has 30 pages of notes.
A. True
B. False
3. CONFIDENTIAL
4
18. The title of Brian’s report is 20 points. This is the title’s Font Style.
A. True
B. False
19. Maria created a poster about AIDS in her college. She placed images in her poster by
using tools in Insert tab.
A. True
B. False
20. You can set the timing for each object animation in Microsoft PowerPoint slides by
following this order : Animation -> Advanced Animation
A. True
B. False
21. The intersection between a row and a column in Microsoft Excel 2010 is called Excel
Box.
A. True
B. False
22. Each time you add a new object in Microsoft PowerPoint 2010, there’ll be added tab(s)
appear next to View tab.
A. True
B. False
23. You could only change paper margin to normal if the paper layout is A4.
A. True
B. False
24. You could not use this tool to reverse your actions should you make a mistake.
A. True
B. False
25. Fonts in Microsoft Word 2010 and Microsoft PowerPoint 2010 are measured in Points,
except for Microsoft Excel 2010.
A. True
B. False
26. It is possible to add a column to a table that you have already created and entered
information into.
A. True
B. False
4. CONFIDENTIAL
5
27. Page Border cannot be added by using Border tool in Home tab.
A. True
B. False
28. You could use this tool to take pictures from the internet and put it in your
document for a project report.
A. True
B. False
29. “Save As” command can only be used in Microsoft Word 2010 and Microsoft Excel
2010.
A. True
B. False
30. This tool cannot be used to change the highlighter colour when want to highlight a
text.
A. True
B. False
5. CONFIDENTIAL
6
PART B : 30 marks
INSTRUCTIONS : Answer ALL questions. Choose the most appropriate answer.
31. Features of a personal computer include ………………
A. Input, Computer system, Storage.
B. Input, Output, Process, Storage.
C. Hardware, Software, Application system, Storage, Output.
D. Speed, Reliability, Storage capability, Productivity, Decision making, Reduction in
cost.
32. ……………… is located in a computer case that is used to place Microprocessor for a
personal computer.
A. System Unit
B. Transistors
C. Motherboard.
D. Information
33. Which of these OS is based on UNIX?
A. Windows 8.
B. Windows XP.
C. Android.
D. Windows Vista.
34. Which of these statements is false for Network Media?
A. Infrared Wave is a type of unguided media.
B. Fiber Optic cable is only suitable for LAN.
C. It is divided into two types.
D. Twisted Pair cable is cheaper than Coaxial cable.
35. Computer security is usually dealing with three types of issues. Which of the following
does not fall into any of the types?
A. Internet.
B. Data loss.
C. Confidentiality.
D. Standalone.
6. CONFIDENTIAL
7
36.
The statements above are likely describing computers from ……………… generation
where it placed the chip on ………………
A. Third, Integrated Circuit
B. Fourth, Printed Circuit Boards.
C. Fourth, Microprocessor.
D. Third, Printed Circuit Boards.
37.
Figure 1
Figure XX shows the diagram for the components of Microprocessor. Choose the
appropriate component names for each component labelled as A, B, C, D and E.
A. Control Unit, Arithmathematic Logic Unit, Registers, Instruction Cache, Data Cache
B. Control Unit, Arithmathematic Logic Unit, Cache, Instruction Registers, Data
Registers
C. Control Unit, Arithmetic Logic Unit, Registers, Data Cache, Instruction Cache.
D. Control Unit, Arithmetic Logic Unit, Registers, Instruction Cache, Data Cache.
Carry out billionth of instructions per second
Cost is lowered considerably with such large
number of transistors in a single chip
The Microprocessor
C
A B
D
E
7. CONFIDENTIAL
8
38. How an Operating System manages a processor?
A. By determining when and how much time each process gets.
B. By managing how much memory each process gets.
C. By controlling where each process should be placed in a hard drive.
D. By executing the instructions in each process.
39.
The statements above can be used to describe ………………
A. Advantages of Satellite.
B. Advantages of Computer.
C. Advantages of Computer Networking.
D. Advantages of Information.
40. “In August 2013, Stephen bought three books from MPH Bookstore website. He provided
all personal details that are required in order for him to buy the books from the website
including his Identification Card number and his security number from his credit card.
After a month, he received his credit card bill and surprised that the amount is more than
what he spent earlier. He then decided not to reveal any other personal information online
in the future.”
From the event that is described above, which of the following should be best practiced
by the MPH Bookstore website developer to avoid the recurrence of such incident?
A. Ensure the e-commerce site continues to function as intended.
B. Ensure the ability to control the use of information about oneself.
C. Ensure the ability to ensure e-commerce participants do not deny their online
auctions.
D. Ensure the ability to identify identity of a person with whom the participant is
dealing with.
Share different types of resources
Can view, modify and copy files stored on a
different compute.
8. CONFIDENTIAL
9
41. Hannah works as a technical support personnel for IT department in XYZ Enterprise. She
is requested to perform backup for Finance Department. She could perform backup on
………………
I. Files
II. Systems
III. Hardcopy
IV. Information
A. I and II.
B. III and IV.
C. I, II and IV.
D. All of the above.
42. The following items show the four primary functions of CPU. Arrange the functions in
sequence.
I. Execute
II. Fetch
III. Decode
IV. Store
A. I, II, III and IV
B. II, III, I and IV
C. II, I, III and IV
D. IV, I, III and II
9. CONFIDENTIAL
10
43. Operating system is used as an intermediary between software and hardware. It could
also manage processes. One of the examples of Operating System is Real Time
Operating System (RTOS). Choose the true statement(s) regarding RTOS.
I. It has two types, which are Single-tasking and Multi-tasking.
II. It is often used in Air Traffic Control.
III. There can only be one user at certain point of time.
IV. It is usually use for slow response application to avoid downtime.
A. II only.
B. II and IV
C. II, III and IV
D. All of the above
44.
Figure 2
Choose the true statements that describe Figure 2.
I. It’s a type of unguided network media.
II. It is usually transmit data using the light wave.
III. It cannot transmit more information as compared to twisted pair cable.
IV. It is use in WAN.
A. I Only.
B. I and II.
C. I, III and IV.
D. None of the above.
10. CONFIDENTIAL
11
45. Michael registered as a member of an online shopping website. As a member, he should
have the privilege to enter the member pages in the website. However, he’s unable to
open the member pages in the website. He is probably facing which of the following
taxonomy issue?
A. Access control
B. Availability
C. Privacy
D. Authentication
46. Storage devices are used to store files or documents. Which of the following(s) best
describe Storage Devices?
I. Random Access Memory is a non-permanent memory
II. There are two types of storage devices which are ROM and RAM
III. External hard disk is not a type of Secondary Storage
IV. Computers uses ROM as the memory
A. I and IV.
B. I, II and IV.
C. I, III and IV.
D. None of the above.
47. Which of the following memory is not inside the Microprocessor?
A. RAM.
B. L2 Cache.
C. Translation Lookaside Buffer (TLB).
D. L1 Instruction Cache.
48. Stephanie works as a freelance researcher, which requires her to deal with number of
running applications at the same time in order to find information. Which of the
following could be the type of the Operating System that manages all the applications?
A. Real-Time Operating System.
B. Distributed Operating System.
C. Single User, Multi-Tasking.
D. Multi User, Multi-Tasking.
11. CONFIDENTIAL
12
49. ……………… is more of a concept than an actual tangible entity. It relies on a physical
infrastructure that connects networks to other networks.
A. Modem.
B. Internet.
C. Router.
D. Network Interface Card.
50. A hardware or software solution that enforce security policies that permits only
authorized users to access the internet is also known as ………………
A. Encryption.
B. Firewall.
C. Nonrepudiation
D. Antivirus software.
51.
Figure 3
Choose the most appropriate device types for all devices labelled as A, B, C, and D
shown in Figure XX.
A. Peripheral, Input, Primary Storage, Output
B. Processing, Input, Primary Storage, Output
C. Processing, Input, Secondary Storage, Output
D. Peripheral, Input, Secondary Storage, Output
12. CONFIDENTIAL
13
52. Which of the following statement(s) is (are) most likely describing Microprocessor?
I. Gigahertz denotes the processor’s speed which show that computer could carries out
millions of instructions per second.
II. Computer that is running more one CPU is called multitasking.
III. Microprocessor speed is measured through the system clock speed by counting how
many electric pulses the clock produces per second.
IV. Cache is the storage location that holds inputs and outputs for the ALU.
A. I and IV
B. III and IV
C. I, III and IV
D. All of the above.
53. Which of the following resources that are managed by Microprocessor?
I. External Hard Disk.
II. Microsoft Office.
III. Hard Disk.
IV. Wireless Mouse.
A. I, II and III
B. II, III and IV
C. None of the above
D. All of the above.
54. This device is used to connect network segments. Which of the following devices that
perform this function?
A. Modem
B. Router
C. NIC
D. Switches
55. ……………… does not prevent hacking but rather reduces the likelihood that the hacker
will be able to read the data.
A. Firewall.
B. Router.
C. Encryption.
D. Switches.
13. CONFIDENTIAL
14
56. Which of the following is (are) true statement(s) regarding the 4th generation computer?
I. It could do all processing of a full-scale computer.
II. It integrates thousands of transistors.
III. More calculation can be performed due to thousands of transistors in one single
chip.
IV. Computer becomes faster because the size of the chip is small.
A. I and IV.
B. I, II and III.
C. I, III and IV.
D. All of the above.
57. The simultaneous processing of two or more CPU by a single computer is ………………
A. Multitasking.
B. Multicore.
C. Time – sharing.
D. None of these.
58. Which of the following is not among the computer users?
A. Teacher.
B. Internet.
C. Servers.
D. Factory machine.
59. The internet is a global network connecting millions of computers. Choose the true
statement(s) regarding Internet.
I. Yahoo Mail is the example of Internet Service Provider (ISP).
II. Users could share information freely through Internet.
III. It is a massive public spider web of computer connection.
IV. It able to prevent computer from being attacked by computer viruses.
A. I and IV.
B. II and III.
C. II, III and IIV.
D. All of the above.
14. CONFIDENTIAL
15
60. ……………… may hack into a computer system for the sole purpose of notifying the
administrator that a system has a security flaws.
A. Ethical Hackers.
B. Crackers.
C. Grey Hat Hackers.
D. Computer Theft.
15. CONFIDENTIAL
16
PART C : 20 marks
INSTRUCTIONS : Answer ALL questions
1. State the two main objectives of Real-time Operating System. (2 marks)
2. State the shortcut keys for the following actions :
a) Save
b) Open new document
c) Undo
d) Redo
(4 marks)
3. Define Data and Information and provide 1 example for each term. (4 marks)
4.
Figure 4.
Figure 3 shows one of the groups that can be found in Microsoft PowerPoint.
Name all tools labelled as A, B, C, and D.
(4 marks)
5. Identify 2 categories of output and provide 1 example of each type. (4 marks)
6. State 2 steps that computer users can do to avoid viruses. (2 marks)
- END OF QUESTION SHEETS -