0% found this document useful (0 votes)
62 views7 pages

YR 12 - ICT - MOCK - 2nd TERM 2022 23

A Year 12 MOCK exam on ICT
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
62 views7 pages

YR 12 - ICT - MOCK - 2nd TERM 2022 23

A Year 12 MOCK exam on ICT
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

YEAR 12 MOCK EXAMINATION FEBRUARY 2023

INFORMATION AND COMMUNICATION TECHNOLOGY

SECTION A: OBJECTIVES
Instruction: ANSWER ALL QUESTIONS

1. Which of the following options is not a A. perform memory test


similarity between computer file and B. power on or off the computer
manual file? Both can C. print a document from the computer
A. be accessed D. reset the computer to factory setting
B. be retrieved
C. store multimedia 6. A single character in an EBCDIC
D. contain information encoding system can be represented using
A. 4 bits
2. A computer program that gathers B. 6 bits
information about a person or organization C. 8 bits
without their knowledge or consent is D. 16 bits
known known as
A. adware 7. Evaluate 100112 - 11112
B. time bomb A. 000102
C. trojan horse B. 001002
D. spyware C. 010002
D. 100002
3. The following actions are the effects of
virus infection in a system except 8. The binary number 0.1101 in decimal is
A. deletion of files A. 0.8125
B. slow operation B. 0.8215
C. hard disk failure C. 0.8225
D. display of unwanted messages D. 0.8512

4. Changing the default settings or 9. Which of the following formulas will


appearance of the Taskbar in windows by a display the current seconds past the minute
user is known as of the clock in MS Excel?
A. customization A. =SECONDS()
B. designing B. =SECOND(NOW())
C. generalization C. =SECOND(YEAR())
D. globalization D. =SECONDS(NOW())

5. The part of the computer system


shown in Figure 11 is used to
10. The part of the MS Word interface B. current cell
labelled II in Figure 10 is called C. default cell
A. Read mode D. passive cell
B. Print Layout
C. Proofing error
D. Web layout 16. The part of the graphic interface in
Figure 8 labelled V is called
11. What type of relationship can you A. pan
deduce from the statement a department B. zoom in
has many employees? C. zoom out
A. One-to-one D. fit to window
B. One-to-many
C. Many-to-many 17. The figure 2 in the number 11012 is
D. Many-to-one indicated in MS Word using a feature called
A. superscript
12. The screen background where icons B. subscript
and windows are displayed is GUI is called C. root
A. explorer D. exponentiation
B. desktop
C. opening screen
D. homepage

13. The windows shortcut key for closing


an active application is
A. Alt+F4
B. Ctrl+Alt+Del
C. Ctrl+Esc.
D. Ctrl+Shift+Del

18. The part of the MS Access interface


labelled X in Figure 9 is called
A. Report view
B. Report wizard
C. Query design
D. Query view

19. A computer system on the network


that stores pages, takes request from
clients as well as send out information is
14. The type of network represented in
called a
Figure 7 is called
A. client
A. LAN
B. web page
B. MAN
C. web server
C. PAN
D. website
D. WAN

15. In MS Excel, the cell that contains the


pointer or cursor is called
A. active cell
20. The device is Figure 5 uses a
transmission method called
A. broadcast Use figure 4 to answer question 27 to 29
B. podcast
C. multicast 27. The basic problem with the flow chart
D. unicast is that it has

21. In Figure 6 the signals from modem X


to modem Y is
A. analogue
B. digital
C. imaginary
D. aperiodic

22. The "/exams" in the web address;


https://www.waec.org.ng/exams is called
A. domain name A. no direction
B. path B. no algorithm
C. port C. END is a process
D. subdomain D. improper branch out

23. Which of the following statements 28. What activity is the flowchart made to
about URL is true? It is represent?
A. a computer software program A. How to pick an orange
B. a type of web server B. Instruction to pick an orange
C. an acronym for unlimited resources for C. Evaluation on how to pick an orange
learning D. Number of times to pick an orange
D. the address of document or 'page' on
the world wide web
29. If N in the flowchart is represented by
24. Which of the following stages of the 10, which of the following conditions is not
SDLC is post operational stage? true?
A. Analysis A. If C > 10, do not pick orange.
B. Design B. If C = 10, stop picking orange
C. Investigation C. If C < 10, keep picking orange
D. Maintenance D. If C = 10, continue picking orange

25. The expression 5 + 3*4/2 - 3^2 in 30. The fundamental purpose of the BIOS
QBASIC evaluate to is
A. 7 A. initializing and testing hardware
B. 4 components
C. 2 B. testing the system performance
D. 1 C. updating the system performance
D. saving the operating system's file
26. COBOL was developed for
A. business operations 31. The IF... THEN statement in BASIC is
B. game developers called
C. mobile application developers A. an assignment statements
D. search engines optimization B. an object
C. a class 38. A collection of wires through which
D. a control structures data are transmitted from one part of the
computer to another is known as
32. The operating system performs the A. address
following operations except B. bus
A. organization of data C. driver
B. resource allocation D. register
C. creation of data
D. arrangement of files 39. The total possible combinations of the
input variables for a logic gate containing
33. The use of natural language and three input variables is
symbols to write instructions for the A. 3
computer is called B. 4
A. machine language programming C. 8
B. assembly language programming D. 12
C. algorithm language programming
D. high level language programming 40. What is the least number of 750 MB
capacity CD-ROM discs needed to transfer
10 GB size file?
A. 75
B. 31
C. 14
D. 13

41. Quantitative data can exist in


A. continuous form only
34. The logical equation for the logic circuit B. continuous and discrete forms
in Figure 3 is C. nominal and ordinal forms
A. |A+|BC D. ordinal form only
B. Z=A.B+C
C. Z=A+B.C 42. Data created by the user is called
D. Z=|A.B+ |C A. primary data
B. qualitative data
35. The operation of a computer and C. quantitative data
peripherals attached to it is controlled by D. secondary data
A. application
B. hardware 43. The sequence of operation of a
C. live ware computer is
D. system software A. accept data, process data and produce
output
36. The Slide Rule is accurate to B. accept data, produce data and produce
A. 1-2 decimal places information
B. 3-4 decimal places C. produce data, supply data and produce
C. 5 decimal places output
D. 6 decimal places D. process data, produce data and display
information
37. What factors will motivate a field
engineer into choosing a notebook 44. Which of the following descriptions is
computer over a desktop computer? not true about data?
A. Cost, convenience and battery life A. It can be converted to information
B. Cost, size and convenience B. is a collection of raw facts and figures
C. Size, convenience and battery life C. is unorganized
D. Size, cost and battery life D. is used for decision making
45. Which of the following statements is 48. An advantage of sequential access over
true about super computers? They serial access is that_______
A. can fit on a single small chip
B. are easily affordable A. Sequential file is slow
C. can process billions of operations in a B. Sequential file is detailed
second C. Sequential file does not use key
D. are found across various homes and D. Individual records can be located more
offices quickly

46. The transaction file can also be 49. The Use of electronic systems to send
described as _______ an unsolicited e-mail to someone's address
A. Master File is known as ______
B. Movement file A. Hacking
C. Reference file B. Spamming
D. Historical file C. Internet fraud
D. Piracy
47. Which of the following statements is
not true about a computer file? 50. Which of the following ideals is
A. It is very fast to access any record protected by copyright?
within a file
B. It is created electronically A. Ideas
C. Initial setup is inexpensive B. Profit
D. File creation and access are less C. Expression of ideas
laborious D. Inexperience
SECTION B: THEORY
ANSWER ANY FIVE (5) QUESTIONS

1. (a) What are "Reports" in a database system?


(b) List four (4) ways in which Reports can be viewed in database management system.
(c) Outline the steps to prints a Report in MS Access.

2. Perform the following conversions in the stated number bases;


(a) AB11616 to Octal system
(b) 1110111.1012 to Denary system
(c) 5072 to Binary system.

3. (a)(i) What is Universal Serial Bus (USB)?


(ii) State two benefits of using USB connection between a computer and another device.
(b) In Table 1, three storage devices are described, Use it to answer questions 3(b)(i) and 3(b)
(ii).
(i) In column 2, name the storage device being described in column 1.
(ii) Show the category of storage device being described in column 1 by ticking in any of the
column 3, 4 or 5

SN 1 2 3 4 5
Name of Storage
Description of Storage Device Category of Storage Device
Device
Secondar
Primary Offline
y
Magnetic storage medium which
1 is composed of a thin flexible disk
sealed in a square plastic carrier.
Optical media - which uses one
spiral track. Red lasers are used to
read and write data on the media
2
surface and it makes use of dual-
layering technology to increase
the storage capacity to over 1 GB.
Non-volatile memory chip which
contents cannot be altered. It is
3 often used to store the start-up
routines in a computer (e.g the
BIOS).

4. (a)(i) Define computer graphics.


(ii) List two applications of computer graphics in advertising.
(b) Give one use of the following computer graphics application tools;
(i) Interactive Fill Tool (ii) Texture Fill Tool (iii) Envelops Tool (iv) Extrude Tool
(c) Name one Fill Tool in computer graphic application which is needed to (i) create a
background that is faded from light blue to white (ii) fill an object with two colours that blend
from one to another.

5. (a) Define programming language.


(b) Write the 3 following mathematical expressions in BASIC notation:
(i) x (w + y)2 (ii) ab/cd (ii) p = 2 (1+b).
(c) Write a simple BASIC program to calculate the area (A) of a rectangle with length (L) and
breath (B).
(d) List two levels of programming language.

6. (a) List three criteria that are used in classifying file.


(b) State: (i) two advantages and two disadvantages of computer files;
(ii) three methods of file security.

7. (a) (i) Define the term encryption.


(ii) Tick two authentication techniques involved in security measure from
Table 1
TICK
TECHNIQUE
Firewall
Biometric
Password
Intranet

(iii) Outline two features of data encryption.


(b) While exchanging data with a friend through your mobile phone, you observed that it
took a longer time than usual. Outline four factors that may be responsible for the delay in
the data transfer.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy