ICT JUNE 2019 PAPER 1
1. B Device driver. When a new hardware 7. D) Prototyping. The technique of creating
device is connected to a computer, a device a system model and testing it iteratively,
driver needs to be installed. A device driver making adjustments until an acceptable
is a software program that allows the product is realized, is known as prototyping.
operating system to communicate with and This approach allows for feedback and
control the hardware device. refinement throughout the development
process, leading to an improved final
2. A OCR (Optical Character Recognition). product.
OCR is a technique that converts text
information on paper into editable text in a 8.A) 3E. The binary number 111110 is
computer. It uses optical scanning to capture the equivalent to the hexadecimal number 3E. In
text and then analyzes and translates it into hexadecimal, each digit represents four binary
machine-readable text. digits, so the binary number 111110 can be split
into two hexadecimal digits: 0011 (3 in
3. D) Bus. Components in the CPU (Central hexadecimal) and 1110 (E in hexadecimal).
Processing Unit) communicate with each
other through a bus. The bus is a 9. C) Credit card. A credit card is a necessary
communication pathway that allows data tool for making payments in e-commerce. It
and instructions to be transferred between allows users to securely and conveniently make
different components, such as the ALU online purchases by providing their credit card
(Arithmetic Logic Unit), registers, and information, which is processed by payment
memory. gateways to complete the transaction.
10. B. Logic Gates. Logic gates are the basic
building blocks of digital circuits and are used
4. B) Using LCD monitors. Eyestrain can be
to represent and manipulate data in computers.
reduced by using LCD (Liquid Crystal
Display) monitors. LCD monitors produce
11. C. Mesh. In a mesh network topology, each
less flicker and glare compared to CRT device is directly connected to all other devices
(Cathode Ray Tube) monitors, which can by a separate cable, providing redundant paths
help reduce eye fatigue and strain. for data to travel.
12.C. Data encryption. Data encryption is a
5. B) Main memory. Main memory, also measure used to ensure that transmitted data is
known as RAM (Random Access Memory), secure and error-free by encoding it in a way
is a volatile medium. Volatile means that the that only authorized parties can access it.
data stored in main memory is lost when the
computer is powered off or restarted. 13. A. the DBMS blocks the record to one
Where’s, non-volatile mediums like DVDs, user. When two users attempt to update the
ROM (Read-Only Memory), and Flash same record in a database, the Database
Management System (DBMS) typically blocks
memory retain data even when the power is
the record to one user to prevent conflicting
turned off.
updates.
6. A) Be a lag task. A task that is programmed 14. B. Fetch, Execute. The stages of the
to take longer than necessary is called a lag machine cycle in the control unit include
task. In this case, the task is programmed to fetching the instruction from memory and then
take 6 days, but it can be finished in 4 days, executing the instruction.
indicating a delay or lag in the schedule.
15.B. 8. When the input values N=5 and M=7 27. C. HTTP.
are used in the given algorithm, the output value Explanation: The Hypertext Transfer Protocol
of M after applying the algorithm is 8. (HTTP) is the protocol that defines the process
of requesting and transferring HTML webpages
16. D. Writing codes for interface. Writing across the internet.
codes for the interface is an activity in the
implementation phase rather than the design 28. A. Compression software.
phase of SDLC.
17. Please Question 17 is not visible (is half I Explanation: Compression software is a type of
can’t get the sence) utility software that is used to compress and
decompress files, reducing their size and
18. C. Multiplexer. A multiplexer is a device making them easier to store or transfer.
that combines multiple input signals into a
single output signal. 29. A. Debugging.
19. C. Loop. A loop is a control structure that Explanation: Debugging is the process that
executes a set of instructions repeatedly based programmers take to eliminate errors or bugs in
on a condition. a code.
20. B. Simulation. Simulation is a system 30. C. Video controller.
building tool that can be used to predict failures Explanation: The video controller is the
by modeling the behavior of a system under component that enables the monitor to display
different conditions. images. It is responsible for processing and
transmitting the video signal to the monitor.
21. D. Format software. Format software is
used to attribute file formats to different types 31. D. <b>John is a<i>boy</b></b>.
of files. Explanation: The correct HTML statement for
the sentence “John is a boy” is: <b>John is
22. A. Instruction set. Any instruction to be a<i>boy</b></b>./
processed by the CPU must be broken down to
correspond to the instruction set of the CPU. 32. A. Touchpad.
Explanation: A touchpad is a pointing device
23. C. Parallel. The method used by an that allows the user to control the cursor or
organization to completely do away with the old pointer on a computer screen by using their
system and use a new system is called parallel finger to move it across the surface of the
implementation. touchpad.
24. B. Half-duplex mode. Communication 33. C. A.¬B.
circuits that transmit data in both directions but
not at the same time are said to be operating in Explanation: The equivalence of the Boolean
half-duplex mode. expression NOT (A+¬B) is A.¬B.
25. D. Compiler. A compiler is a software that 34. C. The bandwidth is low.
can convert codes written by programmers into
machine code. Explanation: The low bandwidth is the most
26. A. Iteration. likely reason for the poor communication speed
Explanation: Iteration is a design method that between the two students communicating
uses successive improvement on a model to through the internet. Bandwidth refers to the
arrive at the desired result. It involves maximum amount of data that can be
repeatedly refining and testing a design until it transmitted over a network connection, and a
meets the desired specifications. low bandwidth can result in slow
communication speeds.