WULUGU SHS
MOCK EXAMS - MAY,2024
ELECTIVE ICT
PAPER 1
(OBJECTIVES)
1. one quality of a good information system is
A. Accuracy
B. Ambiguity
C. Redundancy
D. Tactical
2. The term used to describe unsolicited mail message is
A. Spam
B. Virus
C. Worm
D. Trojan horse
3. A publication created by an individual that is distributed on regular basis is referred to as
A. Brochure
B. Flyer
C. Letterhead
D. Newspaper
4. The name of the zone on the worksheet where created chart appears is referred to as chart
A. Area
B. Position
C. Region
D. Sector
5. The command used to remove blank spaces in a spreadsheet cell containing data is
A. CONCATENATE
B. FIND
C. REPLACE
D. TRIM
6. Figure 1 shows the internal components of a
A. Printer
B. Motherboard
C. Power supply unit
D. Video display unit
7. The storage media recording process which involves burning tiny pits on a circular disk is the
A. Floppy disk
B. Magnetic tape
C. Optical disc
D. Punched card
8. The process of putting data into a storage location is called
A. Booting
B. Controlling
C. Reading
D. Writing
1
9. Which of the following address buses allows a device to send a signal requesting the attention of
the CPU?
A. Clock address
B. DMA address
C. I/O address
D. IRQ address
10. The CD-ROM audio cable in the computer is connected to the
A. Speaker
B. Hard drive
C. Sounf card
D. Power supply unit
11. The software that has no restrictions from the copyright holder regarding modification of internal
instruction and its redistribution is
A. Firmware software
B. Shareware software
C. Opensource software
D. Web application software
12. A collection of programs pre-written and stored in the read-only memory is referred to as
A. Adware
B. Firmware
C. Groupware
D. malware
13. which of the following programming languages is the most primitive?
A. BASIC language
B. C++ language
C. Java language
D. Machine language
14. The programming language that is more geared towards business solutions is
A. C++
B. Android
C. Java
D. COBOL
15. The program flowchart symbol used to represent decision is
A. Circle
B. Diamond
C. Rectangle
D. Oval
16. Special set of characters that the computer associates with specific user identification is classified as
A. Bar code
B. Standard code
C. Password
D. identity code
17. the logical design of a database is called
A. domain
B. instance
C. schema
D. relation
18. The two-state digit use by computers is referred to as
2
A. binary code
B. UNIX system
C. binary system
D. two state system
19. The highest number in the quinary data representation is
A. 2
B. 4
C. 8
D. 16
20. Which of the following statements makes computer widely accepted by all people?
I. Versatile in nature
II. High storage capacity
III. High speed of operation
A. I and II only
B. I and III only
C. II and III only
D. I, II and III
21. Which of the following options is not used in e-banking?
A. Bank teller
B. E-transac
C. Mobile bank app
D. Automated teller machine
22. Which of the following options is not one of the parts of an information system?
A. Network
B. Data
C. Procedure
D. People
23. Which of the following formulas in spreadsheet is using the correct syntax?
A. SUM(B2:B8,F2:F8)=
B. =SUM(B2:B8,F2:F8)
C. =B2:B8,(SUM),F2:F8
D. SUM=(B2:B8,F2:F8)
24. HARDWARE CAPABILITIES of a computer can be extended by the addition of
A. Hardware slots
B. Memory chips
C. Expansion cards
D. Personal digital assistance
25. Which of the following options is used to provide information, education or advertise a product ot
topic?
A. Letterhead
B. Brochure
C. Business card
D. Invitation card
26. When a workbook is modified, which o the following hardware components stores the challenges
till they are saved?
A. Random access memory
B. Flash disk
C. Read only memory
3
D. Hard disk
27. Which of the following acronyms is related to software licensing?
A. WWW
B. EULA
C. WLAN
D. GUI
28. An example of a software intended to satisfy a user’s specific processing needs is
A. Compiler
B. Interpreter
C. VisiCalc
D. Translator
29. The advantage of the flowchart to a programmer is that it
A. Promotes logical reuse
B. Leads to duplication of logic
C. Makes the application to run faster
D. Increases debugging time
30. The function of an operating system include:
I- Loading programs
II- Fault reporting
III- Debugging
A. I and II only
B. I and III only
C. II and III only
D. I, II and III
31. In programming development life cycle,problem definition is done
A. After testing and debugging
B. At the start of the life cycle
C. During algorithm
D. During coding
32. Figure 2 shows the different parts of a computer network IP address and Mask. The label M
represents
A. Host ID
B. Network ID
C. Network Address
D. Host Address
33. Figure 3 shows a star network topology.
The break down of the hub will
A. Cause the network to fail
B. Open the network for virus attack
C. Slow down network traffic
D. Affect only the wires used in the network
34. The term attribute in a database can be
referred to as
A. Key
B. Tuple
C. Record
D. Column
35. ICT in education can enhance students
4
A. Sight
B. Research
C. Handwriting
D. Popularity in school
36. To prevent a word from possible breaking to the next line in publishing application, use
A. Nonbreaking hyphens
B. Nonbreaking marks
C. Nonbreaking spaces
D. Hard lines break
37. Which of the following is nit considered for effective operation in a school’s ICT laboratory?
A. Dress code
B. Virus
C. File corruption
D. Users’ authentication
38. If a memory chip can store 300,100,020,000 bytes, it can hold approximately
A. 300 kilobytes
B. 300 megabytes
C. 300 gigabytes
D. 300 terabytes
39. The operators used to filter and display rows when two or more conditions are satisfied are
I. AND
II. IN
III. RANGE
Which of the following is correct?
A. I and II only
B. I and III only
C. II and III only
D. I, II and III
40. The results of using the spreadsheet formula =ROUND(A2-B2,0) in cell C2 in Figure 4 is
A. 594
B. 595
C. 594.88
D. 595.88
41. The battery life of most mobile devices when being used for online activities is consumed by the
A. Memory
B. Processor
C. Screen
D. Speaker
42. The HTML tag <table bgcolor =”yellow”> means the
A. Border of the cell is yellow
B. Border of the table is yellow
C. Content of the row is yellow
D. Background of the table is yellow
5
The flowchart in Figure 5 shows part of an algorithm for computing employee’s salary.
Use Figure 5 to answer questions 43 and 44
43. Which of the following statements correctly describes the
flowchart?
A. A full program for computing employees salaries.
B. A subroutine defined for computing employees salaries
C. No salary is returned if the employee is not a supervisor
D. An invalid flowchart because if dos not have a start and
stop in any of the symbols
44. If the logic in the flowchart must be used elsewhere, the
suitable symbol to use is
A
A
B
45. If the network printer in Figure 6 was connected to the cable between client 4 and client 5, which
of the clients can send print jobs to it?
A. Client 5 only
B. Client 2 and client 3 only
C. Client and Client5 only
D. Client1, Client2, Client3, Client4 and
Client5
46. The method of connecting UTP cable to the four hosts in Figure 7 to the hub is
A. Console
B. Crossover
C. Rollover
D. Straight through
47. If the printer in Figure 8 was connected to the network cable between client 4 and client 5, which
type if cable was used?
A. STP
B. UTP
C. Wave guide
D. Coaxial
48. One method to secure MS Access database to prevent accidental damage is to
A. Sort the tables
B. Filter the cables
C. Use pivot command
D. Hide the navigation pane
6
49. In creating database relationship, what happens when a user releases the mouse pointer after
dropping the primary key of a table into a foreign key of another table?
A. A connector symbol is created
B. A connecting line becomes visible
C. A referential integrity is enforced
D. Edit relationship dialogue box appears.
50. The correct order of keywords used in an SQL SELECT statement is
A. FROM, SELECT, WHERE
B. WHERE, SELECT, FROM
C. SELECTT, WHERE, FROM
D. SELECT, FROM, WHERE
7
PAPER 2
(THEORY)
Answer three (3) questions from this section.
1. (a) What is physical topology with respect to computer networking?
(b) Identify the following network topologies
(c) Explain the network topologies identified in 1 (b) above.
2. (a) (i) What are datatypes as used in database environment?
Give four examples.
(ii) Explain any three of the four examples you gave in (i) above.
(b) Databases can be computerised as well as non-computerised.
Give four examples of non-computerised databases.
3. (a) Explain the following terms:
(i) E-mail
(ii) E-business
(iii) E-learning
(b) (i) Distinguish between software and hardware.
(ii) Give two examples each of software and hardware.
4. What is:
(a) (i) Computer port.
(ii) Computer bus.
(iii) Clock speed of a CPU.
(b) State one difference between:
(i) Data bus and address bus.
(ii) Magnetic disk and optical disc.
8
PAPER 3
(PRACTICALS)
Answer all question in this section.
1. (a) Use an appropriate spreadsheet package to create the table below:
INDEX NO. JANUARY FEBRUARY MARCH
27 81 81
11678G
55 61 63
11679G
72 63 33
11680G
42 14 42
11681G
63 81 55
11682G
72 72 72
11683G
(b) Use formula only to determine the average for each month.
(c) Save the work as ‘Result’.
(d) Use an appropriate function\formula to find the frequency of the numbers 55, 63, 72, 81.
(e) Using the result from (d), create an embedded pie chart with heading Quarterly Performance.
(f) Name the sheet as ‘Performance’.
(g) Use headers to insert your index number and save as ‘Results A’.
2. Write a program in QBasic that will ask the user for his score in maths and say whether s/he has
passed the test the pass mark is 45.
3. (a) With the aid of an appropriate text editor, create the HTML codes to produce the below;
Customer Name
First Name:
Last Name:
(b) Set the title of the page to your full name and index number. The program codes must be
properly indented.
e.g:
<p>
<u>Items</u>
<p>
(c) Save the file as FORM_HTML in the folder created.