0% found this document useful (0 votes)
13 views4 pages

ict CA - Copy

Uploaded by

gracious pezoh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views4 pages

ict CA - Copy

Uploaded by

gracious pezoh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

General computer knowledge(GENERAL ICT)

1-Multiple choice questions (20marks)

1.which of the following is temporal storage device?

A. ROM

B. RAM

C. hard disk drive

D. tape drive

2.which is considered the brain of the computer?

A. motherboard

B. RAM

C. CPU

D. power supply

3. which keyboard command is used to launch the start menu?

A. ALT +ESC

B. CTRL + ESC

C. CTRL + TAB

D. SHIFT +ESC

3. which one of the following software applications would be the most appropriate for performing
numerical and statistical calculations

A. Database

B. Document processor

C. graphics package

D . Spreadsheet

4. The primary difference between WAN and LAN is?

A. Number of programs installed

B. variety of hardware devices


C. Distance

D. Number of hardware devices

5. Which of the following is designed to control the operation of the computer?

A. System Software

B. Application software

C. users

D. Device drivers

6.Every device that is attached to the computer is connected to?

A. Main memory

B. BIOS

C. motherboard

D. Monitor

7. which of this devices is not an example of a computer peripheral?

A. Hard disk

B. Mouse

C. Keyboard

D. RAM

8.The language used by a computer is called?

A.english language

B. binary language

C. French language

D. computer language

9. Digitization is the process of converting information into?

A. an analog format

B. the analog and digital format


C. a digital format

D. a matlab format

10.Resources that can be managed by the operating system are

A. Hardware resources
B. Graphical user interface, hardware and software resources
C. Graphical user interface
D. Software interface

11, what is a computer network?

A. A connection of 2 computers
B. an interconnection of devices
C. a connection of computers for sharing resources
D. a service provider such as MTN and ORANGE

12.____ is a program to safeguard our computer system from the virus programs.

A. Antivirus

B. Data

C. Virus

D. None of these

13.The raw material to be processed by a computer is called

A. a program

B. software

C. data

D. information

14.Multitasking refers to

A. having several programs in RAM at the same time

B. the ability to run 2 or more programs concurrently

C. writing programs in multiple languages

D. none of the previous

15.Fingerprint is an example of ________ data


A. Human

B. Biometric

C. Marked

D. None of the above

16.A ____ is a collection of related files and subfolders.

A. Menu

B. Disk

C. Operating System

D. Folder

SECTION B

1. Classical the following into magnetic, optical and solid state. [6marks]
Floppy disk, DVD, RAM, ROM, CD, memory card, magnetic tape, flash drive
2. What is the Operating system?
State three (3) example of Windows Operating System. [3marks]
3. State four (4) qualities of a good software. (4marks)

b. Define computer software.(2marks)

4 a) Distinguish between the following computer terminologies

i.Upload and Download (2marks)


Ii. Update and upgrade (2marks)

iii. Streaming and download (2marks)

iv. Online and offline (2marks)

b) What do you understand by the following terms as used in computer ethics:

i) Unauthorized access (1marks)


ii) Unauthorized use (1marks)
iii) Phishing (1marks)

5.What is cloud computing? (1mark)

b.what are the different types of cloud computing? (3marks)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy