CSEC ICT June 2019 Paper 1 Part 2

CSEC ICT June 2019 Paper 1 Part 2

9th - 10th Grade

9 Qs

quiz-placeholder

Similar activities

Code.org Unit 3 Post-Assessment: Intro to App Design

Code.org Unit 3 Post-Assessment: Intro to App Design

9th Grade

10 Qs

cyber security

cyber security

9th Grade

11 Qs

CSP 1.3.4 1.3.5 Branching and Input/Strings

CSP 1.3.4 1.3.5 Branching and Input/Strings

10th - 12th Grade

10 Qs

N5 Computing Science - Software Analysis

N5 Computing Science - Software Analysis

9th - 10th Grade

10 Qs

J277 1.4 Network Security Quiz (Forms of Attack)

J277 1.4 Network Security Quiz (Forms of Attack)

9th - 12th Grade

13 Qs

J277 Network Threats

J277 Network Threats

7th - 11th Grade

10 Qs

BTEC DIT C1 LAA - Choosing User Interfaces

BTEC DIT C1 LAA - Choosing User Interfaces

10th Grade

12 Qs

Digital Media Technology

Digital Media Technology

10th - 12th Grade

10 Qs

CSEC ICT June 2019 Paper 1 Part 2

CSEC ICT June 2019 Paper 1 Part 2

Assessment

Quiz

Computers

9th - 10th Grade

Easy

Created by

Keith Laban

Used 68+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Pressure sensors are used MAINLY to detect

light

motion

weight

warmth

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Scrambling of messages at the sending end and unscrambling them at the receiving end is called

coding

espionage

encryption

eavesdropping

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT an operating system?

Linux

Mac OS

Windows

MS Office

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Of the following can be termed

application software?

DOS

Linux

Mac OS

Internet Explorer

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following signals represent

the function of a modem?

Digital and upload

Analog and digital

Analog and download

Download and upload

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The illegal copying, distribution or sale of proprietary software is known as

Computer fraud

Computer theft

Software fraud

Software piracy

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Harry interacts with his computer by entering word-based instructions via the keyboard. This is an example of the following interfaces?

Menu driven

Graphical user

Keyboard driven

Command driven

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Item 28 refers to the following specification of a processor for a laptop.

Item 28: Intel Pentium V 64-bit 3.6 GHZ

The 64-bit in this specification means that the processor can :

access 4 characters at one time

access 8 characters at one time

process 4 characters at one time

process 8 characters at one time

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Advantages of electronic information processing include

retraining of staff

less human intervention

less savings on hard copies

an increased amount of equipment