SlideShare a Scribd company logo
1 of 15
Download to read offline
CONFIDENTIAL
2
PART A : 30 marks
INSTRUCTIONS : Answer ALL questions. Choose the most appropriate answer.
1. There are five types of column in Microsoft Word 2010.
A. True
B. False
2. This tool that can only be used to strikethrough text in a table created using
Microsoft Word.
A. True
B. False
3. Times New Roman, Calibri and Arial are called Font Styles.
A. True
B. False
4. Both Microsoft Word 2010 and Microsoft Excel 2010 can sort list of text or number in
ascending or descending order.
A. True
B. False
5. By holding CTRL key while moving pressing either ← or → key, you will be able to
select text as you move.
A. True
B. False
6. is a tool in Microsoft Word that cannot be used to delete a strikethrough text.
A. True
B. False
7. Middle alignment is one of the four types of horizontal alignment in Font Group in
Microsoft Word 2010.
A. True
B. False
8. A user who wants to erase text backwards cannot use the Delete key.
A. True
B. False
9. Microsoft Word 2010 has no tab called Design.
CONFIDENTIAL
3
A. True
B. False
10. A user that applies a design template of a PowerPoint slides eventually change the look
of the slides without changing the contents.
A. True
B. False
11. Annie is editing her project report. She wants to edit the font size of text in the header
section. She could find the font size in Paragraph group.
A. True
B. False
12. When you enter a formula in a cell in Microsoft Excel 2010, you cannot leave the equal
sign at the beginning of a formula
A. True
B. False
13. Slide transition is a special effect used to introduce a slide in a slide show
A. True
B. False
14. You could use this tool to make a bullet list such as a book list.
A. True
B. False
15. Microsoft Excel 2010 has bullet tool in one of the tabs.
A. True
B. False
16. SUMIF is a basic function in Microsoft Excel 2010 that can be found by navigating in
the following order : Editing -> AutoSum
A. True
B. False
17. Sam printed out 5 pages of lecture notes that have 6 slides on each page. We could say
that the Sam actually has 30 pages of notes.
A. True
B. False
CONFIDENTIAL
4
18. The title of Brian’s report is 20 points. This is the title’s Font Style.
A. True
B. False
19. Maria created a poster about AIDS in her college. She placed images in her poster by
using tools in Insert tab.
A. True
B. False
20. You can set the timing for each object animation in Microsoft PowerPoint slides by
following this order : Animation -> Advanced Animation
A. True
B. False
21. The intersection between a row and a column in Microsoft Excel 2010 is called Excel
Box.
A. True
B. False
22. Each time you add a new object in Microsoft PowerPoint 2010, there’ll be added tab(s)
appear next to View tab.
A. True
B. False
23. You could only change paper margin to normal if the paper layout is A4.
A. True
B. False
24. You could not use this tool to reverse your actions should you make a mistake.
A. True
B. False
25. Fonts in Microsoft Word 2010 and Microsoft PowerPoint 2010 are measured in Points,
except for Microsoft Excel 2010.
A. True
B. False
26. It is possible to add a column to a table that you have already created and entered
information into.
A. True
B. False
CONFIDENTIAL
5
27. Page Border cannot be added by using Border tool in Home tab.
A. True
B. False
28. You could use this tool to take pictures from the internet and put it in your
document for a project report.
A. True
B. False
29. “Save As” command can only be used in Microsoft Word 2010 and Microsoft Excel
2010.
A. True
B. False
30. This tool cannot be used to change the highlighter colour when want to highlight a
text.
A. True
B. False
CONFIDENTIAL
6
PART B : 30 marks
INSTRUCTIONS : Answer ALL questions. Choose the most appropriate answer.
31. Features of a personal computer include ………………
A. Input, Computer system, Storage.
B. Input, Output, Process, Storage.
C. Hardware, Software, Application system, Storage, Output.
D. Speed, Reliability, Storage capability, Productivity, Decision making, Reduction in
cost.
32. ……………… is located in a computer case that is used to place Microprocessor for a
personal computer.
A. System Unit
B. Transistors
C. Motherboard.
D. Information
33. Which of these OS is based on UNIX?
A. Windows 8.
B. Windows XP.
C. Android.
D. Windows Vista.
34. Which of these statements is false for Network Media?
A. Infrared Wave is a type of unguided media.
B. Fiber Optic cable is only suitable for LAN.
C. It is divided into two types.
D. Twisted Pair cable is cheaper than Coaxial cable.
35. Computer security is usually dealing with three types of issues. Which of the following
does not fall into any of the types?
A. Internet.
B. Data loss.
C. Confidentiality.
D. Standalone.
CONFIDENTIAL
7
36.
The statements above are likely describing computers from ……………… generation
where it placed the chip on ………………
A. Third, Integrated Circuit
B. Fourth, Printed Circuit Boards.
C. Fourth, Microprocessor.
D. Third, Printed Circuit Boards.
37.
Figure 1
Figure XX shows the diagram for the components of Microprocessor. Choose the
appropriate component names for each component labelled as A, B, C, D and E.
A. Control Unit, Arithmathematic Logic Unit, Registers, Instruction Cache, Data Cache
B. Control Unit, Arithmathematic Logic Unit, Cache, Instruction Registers, Data
Registers
C. Control Unit, Arithmetic Logic Unit, Registers, Data Cache, Instruction Cache.
D. Control Unit, Arithmetic Logic Unit, Registers, Instruction Cache, Data Cache.
 Carry out billionth of instructions per second
 Cost is lowered considerably with such large
number of transistors in a single chip
The Microprocessor
C
A B
D
E
CONFIDENTIAL
8
38. How an Operating System manages a processor?
A. By determining when and how much time each process gets.
B. By managing how much memory each process gets.
C. By controlling where each process should be placed in a hard drive.
D. By executing the instructions in each process.
39.
The statements above can be used to describe ………………
A. Advantages of Satellite.
B. Advantages of Computer.
C. Advantages of Computer Networking.
D. Advantages of Information.
40. “In August 2013, Stephen bought three books from MPH Bookstore website. He provided
all personal details that are required in order for him to buy the books from the website
including his Identification Card number and his security number from his credit card.
After a month, he received his credit card bill and surprised that the amount is more than
what he spent earlier. He then decided not to reveal any other personal information online
in the future.”
From the event that is described above, which of the following should be best practiced
by the MPH Bookstore website developer to avoid the recurrence of such incident?
A. Ensure the e-commerce site continues to function as intended.
B. Ensure the ability to control the use of information about oneself.
C. Ensure the ability to ensure e-commerce participants do not deny their online
auctions.
D. Ensure the ability to identify identity of a person with whom the participant is
dealing with.
 Share different types of resources
 Can view, modify and copy files stored on a
different compute.
CONFIDENTIAL
9
41. Hannah works as a technical support personnel for IT department in XYZ Enterprise. She
is requested to perform backup for Finance Department. She could perform backup on
………………
I. Files
II. Systems
III. Hardcopy
IV. Information
A. I and II.
B. III and IV.
C. I, II and IV.
D. All of the above.
42. The following items show the four primary functions of CPU. Arrange the functions in
sequence.
I. Execute
II. Fetch
III. Decode
IV. Store
A. I, II, III and IV
B. II, III, I and IV
C. II, I, III and IV
D. IV, I, III and II
CONFIDENTIAL
10
43. Operating system is used as an intermediary between software and hardware. It could
also manage processes. One of the examples of Operating System is Real Time
Operating System (RTOS). Choose the true statement(s) regarding RTOS.
I. It has two types, which are Single-tasking and Multi-tasking.
II. It is often used in Air Traffic Control.
III. There can only be one user at certain point of time.
IV. It is usually use for slow response application to avoid downtime.
A. II only.
B. II and IV
C. II, III and IV
D. All of the above
44.
Figure 2
Choose the true statements that describe Figure 2.
I. It’s a type of unguided network media.
II. It is usually transmit data using the light wave.
III. It cannot transmit more information as compared to twisted pair cable.
IV. It is use in WAN.
A. I Only.
B. I and II.
C. I, III and IV.
D. None of the above.
CONFIDENTIAL
11
45. Michael registered as a member of an online shopping website. As a member, he should
have the privilege to enter the member pages in the website. However, he’s unable to
open the member pages in the website. He is probably facing which of the following
taxonomy issue?
A. Access control
B. Availability
C. Privacy
D. Authentication
46. Storage devices are used to store files or documents. Which of the following(s) best
describe Storage Devices?
I. Random Access Memory is a non-permanent memory
II. There are two types of storage devices which are ROM and RAM
III. External hard disk is not a type of Secondary Storage
IV. Computers uses ROM as the memory
A. I and IV.
B. I, II and IV.
C. I, III and IV.
D. None of the above.
47. Which of the following memory is not inside the Microprocessor?
A. RAM.
B. L2 Cache.
C. Translation Lookaside Buffer (TLB).
D. L1 Instruction Cache.
48. Stephanie works as a freelance researcher, which requires her to deal with number of
running applications at the same time in order to find information. Which of the
following could be the type of the Operating System that manages all the applications?
A. Real-Time Operating System.
B. Distributed Operating System.
C. Single User, Multi-Tasking.
D. Multi User, Multi-Tasking.
CONFIDENTIAL
12
49. ……………… is more of a concept than an actual tangible entity. It relies on a physical
infrastructure that connects networks to other networks.
A. Modem.
B. Internet.
C. Router.
D. Network Interface Card.
50. A hardware or software solution that enforce security policies that permits only
authorized users to access the internet is also known as ………………
A. Encryption.
B. Firewall.
C. Nonrepudiation
D. Antivirus software.
51.
Figure 3
Choose the most appropriate device types for all devices labelled as A, B, C, and D
shown in Figure XX.
A. Peripheral, Input, Primary Storage, Output
B. Processing, Input, Primary Storage, Output
C. Processing, Input, Secondary Storage, Output
D. Peripheral, Input, Secondary Storage, Output
CONFIDENTIAL
13
52. Which of the following statement(s) is (are) most likely describing Microprocessor?
I. Gigahertz denotes the processor’s speed which show that computer could carries out
millions of instructions per second.
II. Computer that is running more one CPU is called multitasking.
III. Microprocessor speed is measured through the system clock speed by counting how
many electric pulses the clock produces per second.
IV. Cache is the storage location that holds inputs and outputs for the ALU.
A. I and IV
B. III and IV
C. I, III and IV
D. All of the above.
53. Which of the following resources that are managed by Microprocessor?
I. External Hard Disk.
II. Microsoft Office.
III. Hard Disk.
IV. Wireless Mouse.
A. I, II and III
B. II, III and IV
C. None of the above
D. All of the above.
54. This device is used to connect network segments. Which of the following devices that
perform this function?
A. Modem
B. Router
C. NIC
D. Switches
55. ……………… does not prevent hacking but rather reduces the likelihood that the hacker
will be able to read the data.
A. Firewall.
B. Router.
C. Encryption.
D. Switches.
CONFIDENTIAL
14
56. Which of the following is (are) true statement(s) regarding the 4th generation computer?
I. It could do all processing of a full-scale computer.
II. It integrates thousands of transistors.
III. More calculation can be performed due to thousands of transistors in one single
chip.
IV. Computer becomes faster because the size of the chip is small.
A. I and IV.
B. I, II and III.
C. I, III and IV.
D. All of the above.
57. The simultaneous processing of two or more CPU by a single computer is ………………
A. Multitasking.
B. Multicore.
C. Time – sharing.
D. None of these.
58. Which of the following is not among the computer users?
A. Teacher.
B. Internet.
C. Servers.
D. Factory machine.
59. The internet is a global network connecting millions of computers. Choose the true
statement(s) regarding Internet.
I. Yahoo Mail is the example of Internet Service Provider (ISP).
II. Users could share information freely through Internet.
III. It is a massive public spider web of computer connection.
IV. It able to prevent computer from being attacked by computer viruses.
A. I and IV.
B. II and III.
C. II, III and IIV.
D. All of the above.
CONFIDENTIAL
15
60. ……………… may hack into a computer system for the sole purpose of notifying the
administrator that a system has a security flaws.
A. Ethical Hackers.
B. Crackers.
C. Grey Hat Hackers.
D. Computer Theft.
CONFIDENTIAL
16
PART C : 20 marks
INSTRUCTIONS : Answer ALL questions
1. State the two main objectives of Real-time Operating System. (2 marks)
2. State the shortcut keys for the following actions :
a) Save
b) Open new document
c) Undo
d) Redo
(4 marks)
3. Define Data and Information and provide 1 example for each term. (4 marks)
4.
Figure 4.
Figure 3 shows one of the groups that can be found in Microsoft PowerPoint.
Name all tools labelled as A, B, C, and D.
(4 marks)
5. Identify 2 categories of output and provide 1 example of each type. (4 marks)
6. State 2 steps that computer users can do to avoid viruses. (2 marks)
- END OF QUESTION SHEETS -

More Related Content

Similar to Exam question sample IT

Revision week 2
Revision week 2Revision week 2
Revision week 2fizahPhd
 
SS2 Data Processing Examination with Test of Practicals (Third Term)
SS2 Data Processing Examination with Test of Practicals (Third Term)SS2 Data Processing Examination with Test of Practicals (Third Term)
SS2 Data Processing Examination with Test of Practicals (Third Term)Ejiro Ndifereke
 
Revision week
Revision weekRevision week
Revision weekfizahPhd
 
INTRODUCTION TO COMPUTING.pdf
INTRODUCTION TO COMPUTING.pdfINTRODUCTION TO COMPUTING.pdf
INTRODUCTION TO COMPUTING.pdfoscardarius
 
Mcq+questions+cxc+it
Mcq+questions+cxc+itMcq+questions+cxc+it
Mcq+questions+cxc+itjimkana13
 
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)Ejiro Ndifereke
 
S3 DATA PROCESSING FIRST TERM PRE-WAEC (2ND HALF EXAMINATION)
S3 DATA PROCESSING FIRST TERM PRE-WAEC (2ND HALF EXAMINATION)S3 DATA PROCESSING FIRST TERM PRE-WAEC (2ND HALF EXAMINATION)
S3 DATA PROCESSING FIRST TERM PRE-WAEC (2ND HALF EXAMINATION)Ejiro Ndifereke
 
SS3 DATA PROCESSING EXAMINATION (FIRST TERM)
SS3 DATA PROCESSING EXAMINATION (FIRST TERM)SS3 DATA PROCESSING EXAMINATION (FIRST TERM)
SS3 DATA PROCESSING EXAMINATION (FIRST TERM)Ejiro Ndifereke
 
Bis 220 final exam university of phoenix final exams study guide 1 two info...
Bis 220 final exam  university of phoenix final exams study guide  1 two info...Bis 220 final exam  university of phoenix final exams study guide  1 two info...
Bis 220 final exam university of phoenix final exams study guide 1 two info...Ninna Basley
 
JS3 COMPUTER STUDIES FIRST TERM C.A 2
JS3 COMPUTER STUDIES FIRST TERM C.A 2JS3 COMPUTER STUDIES FIRST TERM C.A 2
JS3 COMPUTER STUDIES FIRST TERM C.A 2Ejiro Ndifereke
 
EE0-600 Exam Questions
EE0-600 Exam QuestionsEE0-600 Exam Questions
EE0-600 Exam Questionsadbil98
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final examgiquickly
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final exambubyslyke
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final examginistays
 
SS2 DATA PROCESSING EXAMINATION (FIRST TERM)
SS2 DATA PROCESSING EXAMINATION (FIRST TERM)SS2 DATA PROCESSING EXAMINATION (FIRST TERM)
SS2 DATA PROCESSING EXAMINATION (FIRST TERM)Ejiro Ndifereke
 

Similar to Exam question sample IT (20)

Soalan ictl bi
Soalan ictl biSoalan ictl bi
Soalan ictl bi
 
Revision week 2
Revision week 2Revision week 2
Revision week 2
 
SS2 Data Processing Examination with Test of Practicals (Third Term)
SS2 Data Processing Examination with Test of Practicals (Third Term)SS2 Data Processing Examination with Test of Practicals (Third Term)
SS2 Data Processing Examination with Test of Practicals (Third Term)
 
Bece 2012
Bece 2012Bece 2012
Bece 2012
 
Revision week
Revision weekRevision week
Revision week
 
INTRODUCTION TO COMPUTING.pdf
INTRODUCTION TO COMPUTING.pdfINTRODUCTION TO COMPUTING.pdf
INTRODUCTION TO COMPUTING.pdf
 
Mcq+questions+cxc+it
Mcq+questions+cxc+itMcq+questions+cxc+it
Mcq+questions+cxc+it
 
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)
 
Set1 ict-question
Set1 ict-questionSet1 ict-question
Set1 ict-question
 
S3 DATA PROCESSING FIRST TERM PRE-WAEC (2ND HALF EXAMINATION)
S3 DATA PROCESSING FIRST TERM PRE-WAEC (2ND HALF EXAMINATION)S3 DATA PROCESSING FIRST TERM PRE-WAEC (2ND HALF EXAMINATION)
S3 DATA PROCESSING FIRST TERM PRE-WAEC (2ND HALF EXAMINATION)
 
SS3 DATA PROCESSING EXAMINATION (FIRST TERM)
SS3 DATA PROCESSING EXAMINATION (FIRST TERM)SS3 DATA PROCESSING EXAMINATION (FIRST TERM)
SS3 DATA PROCESSING EXAMINATION (FIRST TERM)
 
000 012
000 012000 012
000 012
 
Abc and w7.
Abc and w7.Abc and w7.
Abc and w7.
 
Bis 220 final exam university of phoenix final exams study guide 1 two info...
Bis 220 final exam  university of phoenix final exams study guide  1 two info...Bis 220 final exam  university of phoenix final exams study guide  1 two info...
Bis 220 final exam university of phoenix final exams study guide 1 two info...
 
JS3 COMPUTER STUDIES FIRST TERM C.A 2
JS3 COMPUTER STUDIES FIRST TERM C.A 2JS3 COMPUTER STUDIES FIRST TERM C.A 2
JS3 COMPUTER STUDIES FIRST TERM C.A 2
 
EE0-600 Exam Questions
EE0-600 Exam QuestionsEE0-600 Exam Questions
EE0-600 Exam Questions
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final exam
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final exam
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final exam
 
SS2 DATA PROCESSING EXAMINATION (FIRST TERM)
SS2 DATA PROCESSING EXAMINATION (FIRST TERM)SS2 DATA PROCESSING EXAMINATION (FIRST TERM)
SS2 DATA PROCESSING EXAMINATION (FIRST TERM)
 

Recently uploaded

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 

Recently uploaded (20)

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 

Exam question sample IT

  • 1. CONFIDENTIAL 2 PART A : 30 marks INSTRUCTIONS : Answer ALL questions. Choose the most appropriate answer. 1. There are five types of column in Microsoft Word 2010. A. True B. False 2. This tool that can only be used to strikethrough text in a table created using Microsoft Word. A. True B. False 3. Times New Roman, Calibri and Arial are called Font Styles. A. True B. False 4. Both Microsoft Word 2010 and Microsoft Excel 2010 can sort list of text or number in ascending or descending order. A. True B. False 5. By holding CTRL key while moving pressing either ← or → key, you will be able to select text as you move. A. True B. False 6. is a tool in Microsoft Word that cannot be used to delete a strikethrough text. A. True B. False 7. Middle alignment is one of the four types of horizontal alignment in Font Group in Microsoft Word 2010. A. True B. False 8. A user who wants to erase text backwards cannot use the Delete key. A. True B. False 9. Microsoft Word 2010 has no tab called Design.
  • 2. CONFIDENTIAL 3 A. True B. False 10. A user that applies a design template of a PowerPoint slides eventually change the look of the slides without changing the contents. A. True B. False 11. Annie is editing her project report. She wants to edit the font size of text in the header section. She could find the font size in Paragraph group. A. True B. False 12. When you enter a formula in a cell in Microsoft Excel 2010, you cannot leave the equal sign at the beginning of a formula A. True B. False 13. Slide transition is a special effect used to introduce a slide in a slide show A. True B. False 14. You could use this tool to make a bullet list such as a book list. A. True B. False 15. Microsoft Excel 2010 has bullet tool in one of the tabs. A. True B. False 16. SUMIF is a basic function in Microsoft Excel 2010 that can be found by navigating in the following order : Editing -> AutoSum A. True B. False 17. Sam printed out 5 pages of lecture notes that have 6 slides on each page. We could say that the Sam actually has 30 pages of notes. A. True B. False
  • 3. CONFIDENTIAL 4 18. The title of Brian’s report is 20 points. This is the title’s Font Style. A. True B. False 19. Maria created a poster about AIDS in her college. She placed images in her poster by using tools in Insert tab. A. True B. False 20. You can set the timing for each object animation in Microsoft PowerPoint slides by following this order : Animation -> Advanced Animation A. True B. False 21. The intersection between a row and a column in Microsoft Excel 2010 is called Excel Box. A. True B. False 22. Each time you add a new object in Microsoft PowerPoint 2010, there’ll be added tab(s) appear next to View tab. A. True B. False 23. You could only change paper margin to normal if the paper layout is A4. A. True B. False 24. You could not use this tool to reverse your actions should you make a mistake. A. True B. False 25. Fonts in Microsoft Word 2010 and Microsoft PowerPoint 2010 are measured in Points, except for Microsoft Excel 2010. A. True B. False 26. It is possible to add a column to a table that you have already created and entered information into. A. True B. False
  • 4. CONFIDENTIAL 5 27. Page Border cannot be added by using Border tool in Home tab. A. True B. False 28. You could use this tool to take pictures from the internet and put it in your document for a project report. A. True B. False 29. “Save As” command can only be used in Microsoft Word 2010 and Microsoft Excel 2010. A. True B. False 30. This tool cannot be used to change the highlighter colour when want to highlight a text. A. True B. False
  • 5. CONFIDENTIAL 6 PART B : 30 marks INSTRUCTIONS : Answer ALL questions. Choose the most appropriate answer. 31. Features of a personal computer include ……………… A. Input, Computer system, Storage. B. Input, Output, Process, Storage. C. Hardware, Software, Application system, Storage, Output. D. Speed, Reliability, Storage capability, Productivity, Decision making, Reduction in cost. 32. ……………… is located in a computer case that is used to place Microprocessor for a personal computer. A. System Unit B. Transistors C. Motherboard. D. Information 33. Which of these OS is based on UNIX? A. Windows 8. B. Windows XP. C. Android. D. Windows Vista. 34. Which of these statements is false for Network Media? A. Infrared Wave is a type of unguided media. B. Fiber Optic cable is only suitable for LAN. C. It is divided into two types. D. Twisted Pair cable is cheaper than Coaxial cable. 35. Computer security is usually dealing with three types of issues. Which of the following does not fall into any of the types? A. Internet. B. Data loss. C. Confidentiality. D. Standalone.
  • 6. CONFIDENTIAL 7 36. The statements above are likely describing computers from ……………… generation where it placed the chip on ……………… A. Third, Integrated Circuit B. Fourth, Printed Circuit Boards. C. Fourth, Microprocessor. D. Third, Printed Circuit Boards. 37. Figure 1 Figure XX shows the diagram for the components of Microprocessor. Choose the appropriate component names for each component labelled as A, B, C, D and E. A. Control Unit, Arithmathematic Logic Unit, Registers, Instruction Cache, Data Cache B. Control Unit, Arithmathematic Logic Unit, Cache, Instruction Registers, Data Registers C. Control Unit, Arithmetic Logic Unit, Registers, Data Cache, Instruction Cache. D. Control Unit, Arithmetic Logic Unit, Registers, Instruction Cache, Data Cache.  Carry out billionth of instructions per second  Cost is lowered considerably with such large number of transistors in a single chip The Microprocessor C A B D E
  • 7. CONFIDENTIAL 8 38. How an Operating System manages a processor? A. By determining when and how much time each process gets. B. By managing how much memory each process gets. C. By controlling where each process should be placed in a hard drive. D. By executing the instructions in each process. 39. The statements above can be used to describe ……………… A. Advantages of Satellite. B. Advantages of Computer. C. Advantages of Computer Networking. D. Advantages of Information. 40. “In August 2013, Stephen bought three books from MPH Bookstore website. He provided all personal details that are required in order for him to buy the books from the website including his Identification Card number and his security number from his credit card. After a month, he received his credit card bill and surprised that the amount is more than what he spent earlier. He then decided not to reveal any other personal information online in the future.” From the event that is described above, which of the following should be best practiced by the MPH Bookstore website developer to avoid the recurrence of such incident? A. Ensure the e-commerce site continues to function as intended. B. Ensure the ability to control the use of information about oneself. C. Ensure the ability to ensure e-commerce participants do not deny their online auctions. D. Ensure the ability to identify identity of a person with whom the participant is dealing with.  Share different types of resources  Can view, modify and copy files stored on a different compute.
  • 8. CONFIDENTIAL 9 41. Hannah works as a technical support personnel for IT department in XYZ Enterprise. She is requested to perform backup for Finance Department. She could perform backup on ……………… I. Files II. Systems III. Hardcopy IV. Information A. I and II. B. III and IV. C. I, II and IV. D. All of the above. 42. The following items show the four primary functions of CPU. Arrange the functions in sequence. I. Execute II. Fetch III. Decode IV. Store A. I, II, III and IV B. II, III, I and IV C. II, I, III and IV D. IV, I, III and II
  • 9. CONFIDENTIAL 10 43. Operating system is used as an intermediary between software and hardware. It could also manage processes. One of the examples of Operating System is Real Time Operating System (RTOS). Choose the true statement(s) regarding RTOS. I. It has two types, which are Single-tasking and Multi-tasking. II. It is often used in Air Traffic Control. III. There can only be one user at certain point of time. IV. It is usually use for slow response application to avoid downtime. A. II only. B. II and IV C. II, III and IV D. All of the above 44. Figure 2 Choose the true statements that describe Figure 2. I. It’s a type of unguided network media. II. It is usually transmit data using the light wave. III. It cannot transmit more information as compared to twisted pair cable. IV. It is use in WAN. A. I Only. B. I and II. C. I, III and IV. D. None of the above.
  • 10. CONFIDENTIAL 11 45. Michael registered as a member of an online shopping website. As a member, he should have the privilege to enter the member pages in the website. However, he’s unable to open the member pages in the website. He is probably facing which of the following taxonomy issue? A. Access control B. Availability C. Privacy D. Authentication 46. Storage devices are used to store files or documents. Which of the following(s) best describe Storage Devices? I. Random Access Memory is a non-permanent memory II. There are two types of storage devices which are ROM and RAM III. External hard disk is not a type of Secondary Storage IV. Computers uses ROM as the memory A. I and IV. B. I, II and IV. C. I, III and IV. D. None of the above. 47. Which of the following memory is not inside the Microprocessor? A. RAM. B. L2 Cache. C. Translation Lookaside Buffer (TLB). D. L1 Instruction Cache. 48. Stephanie works as a freelance researcher, which requires her to deal with number of running applications at the same time in order to find information. Which of the following could be the type of the Operating System that manages all the applications? A. Real-Time Operating System. B. Distributed Operating System. C. Single User, Multi-Tasking. D. Multi User, Multi-Tasking.
  • 11. CONFIDENTIAL 12 49. ……………… is more of a concept than an actual tangible entity. It relies on a physical infrastructure that connects networks to other networks. A. Modem. B. Internet. C. Router. D. Network Interface Card. 50. A hardware or software solution that enforce security policies that permits only authorized users to access the internet is also known as ……………… A. Encryption. B. Firewall. C. Nonrepudiation D. Antivirus software. 51. Figure 3 Choose the most appropriate device types for all devices labelled as A, B, C, and D shown in Figure XX. A. Peripheral, Input, Primary Storage, Output B. Processing, Input, Primary Storage, Output C. Processing, Input, Secondary Storage, Output D. Peripheral, Input, Secondary Storage, Output
  • 12. CONFIDENTIAL 13 52. Which of the following statement(s) is (are) most likely describing Microprocessor? I. Gigahertz denotes the processor’s speed which show that computer could carries out millions of instructions per second. II. Computer that is running more one CPU is called multitasking. III. Microprocessor speed is measured through the system clock speed by counting how many electric pulses the clock produces per second. IV. Cache is the storage location that holds inputs and outputs for the ALU. A. I and IV B. III and IV C. I, III and IV D. All of the above. 53. Which of the following resources that are managed by Microprocessor? I. External Hard Disk. II. Microsoft Office. III. Hard Disk. IV. Wireless Mouse. A. I, II and III B. II, III and IV C. None of the above D. All of the above. 54. This device is used to connect network segments. Which of the following devices that perform this function? A. Modem B. Router C. NIC D. Switches 55. ……………… does not prevent hacking but rather reduces the likelihood that the hacker will be able to read the data. A. Firewall. B. Router. C. Encryption. D. Switches.
  • 13. CONFIDENTIAL 14 56. Which of the following is (are) true statement(s) regarding the 4th generation computer? I. It could do all processing of a full-scale computer. II. It integrates thousands of transistors. III. More calculation can be performed due to thousands of transistors in one single chip. IV. Computer becomes faster because the size of the chip is small. A. I and IV. B. I, II and III. C. I, III and IV. D. All of the above. 57. The simultaneous processing of two or more CPU by a single computer is ……………… A. Multitasking. B. Multicore. C. Time – sharing. D. None of these. 58. Which of the following is not among the computer users? A. Teacher. B. Internet. C. Servers. D. Factory machine. 59. The internet is a global network connecting millions of computers. Choose the true statement(s) regarding Internet. I. Yahoo Mail is the example of Internet Service Provider (ISP). II. Users could share information freely through Internet. III. It is a massive public spider web of computer connection. IV. It able to prevent computer from being attacked by computer viruses. A. I and IV. B. II and III. C. II, III and IIV. D. All of the above.
  • 14. CONFIDENTIAL 15 60. ……………… may hack into a computer system for the sole purpose of notifying the administrator that a system has a security flaws. A. Ethical Hackers. B. Crackers. C. Grey Hat Hackers. D. Computer Theft.
  • 15. CONFIDENTIAL 16 PART C : 20 marks INSTRUCTIONS : Answer ALL questions 1. State the two main objectives of Real-time Operating System. (2 marks) 2. State the shortcut keys for the following actions : a) Save b) Open new document c) Undo d) Redo (4 marks) 3. Define Data and Information and provide 1 example for each term. (4 marks) 4. Figure 4. Figure 3 shows one of the groups that can be found in Microsoft PowerPoint. Name all tools labelled as A, B, C, and D. (4 marks) 5. Identify 2 categories of output and provide 1 example of each type. (4 marks) 6. State 2 steps that computer users can do to avoid viruses. (2 marks) - END OF QUESTION SHEETS -