Professional Documents
Culture Documents
INFORMATION TECHNOLOGY
PAPER 1
Module I: Fundamentals of Information Technology
Module II: Information Technology Systems
1 Hour
INSTRUCTIONS TO CANDIDATES
D O N O T T U R N T H I S PA G E U N T I L Y O U A R E T O L D T O D O S O
a. WiFi
b. Cables
c. Frequency
d. Electrical Cables
11. The tool used for collecting data about 16. The IT professional that is charged with the
events that took place at a crime scene is: responsibility to determine the nature of a
problem, and carry out investigation in
a. Observation order to make recommendations of
b. ER Diagrams solutions to fix is a:
c. People
d. Investigation of printed materials a. Programmer
b. Systems Engineer
Processing c. Application Specialist Programmer
Devices d. Systems Analyst
Input Output
Devices Devices
20. 090.004.443.304 is referred to as: 25. The network that allows employees to
access the internal network for outside the
a. Domain name organization is termed as an:
b. Domain number
c. IP Address a. Internet
d. Domain Address b. Extranet
c. Externet
21. The following are statements about d. Local Area Network
XHTML. Which is not correct?
26. Which is not an advantage of Command
a. An extended version to HTML Interface:
b. Developed to make HTML more
increasingly interoperable a. Commands are hard to remember
c. Requires that all element tags be closed b. Commands must be entered exactly as
d. Only works on Windows platform they are provided
c. Commands are not case sensitive
22. Of the following, which is physical d. Makes more efficient use of computer
restriction method? memory
39. From the diagram above, the technique 44. When a report format does not exist in an
being used is: Information System, the type of report that
must be done up to meet a new requirement
a. Biometric for report format is:
b. Authentication
c. User access code a. Adhoc
d. Password denial b. Summarised
c. Exception
d. Detailed
45. The _____ allows authorised users and 49. The user interface method that uses images
outsiders to have limited access to an to represent programs or tasks, making
intranet allowing a closer relationship with software and hard more user friend is:
customers, a better exchange of information
and improved efficiency in business. a. Command Line Interface
b. Graphical User Interface
a. Internet c. Menu Interface
b. Intranet d. Voice Recognition Interface
c. Extranet
d. Network
47. The following threats are associated with 51. Of the following, which is not a method of
data security. Which is not initiated from Biometric Security System:
external sources:
a. Fingerprint scan
a. Hackers b. Facial recognition
b. Industrial Espionage c. Fingernail recognition
c. Physical theft of hardware and software d. Voice recognition
d. Disgruntled employee
52. _____________ is a major contribution for
48. This person is responsible for certifying the the accessing of the Internet.
information and information processing
systems within the organization meet a a. HTML
certain set of standards. b. HTTP
c. FTP
a. Data Processing Manager d. Modem
b. Electronic Data Processing Auditor
c. Data Control Clerk
d. Consultant
53. In the following domain name, the section 58. _________ is the best solution for
bolded is used for: establishing long distance and or secured
network connections. They are normally
www.sapporotfactory.com.jp deployed by business or organizations
rather than individuals.
a. Type of website
b. Country code a. Internet
c. Website name b. Virtual Private Network
d. Locating code c. Extranet
d. Intranet
54. When encoding data for it to be transmitted,
Embassies and Consulates use: 59. Manufacturers of devices make devices
with larger buttons and use large writings
a. Password because:
b. User access cards
c. Encryption a. People have problems seeing the keys
d. Biometric methods b. Persons who are aging have poorer eye
sights
55. __________ are used to connect web pages. c. It looks better to have bigger buttons
d. The size of the letters adds to the
a. URL appearance of the device.
b. Home Page
c. Domain Names Input Processing | Storage Output
d. Hyperlinks Data Information
56. Marcus had some data that was stored on 60. The diagram above express the:
his flash drive. He went home and placed it
in a computer and the data file though open a. Main activities carried out by computers
did not resemble the information he stored. b. The interrelationship between data and
It was unreadable. This is best described as: information through information
processing
a. Data Loss c. The movement of input, to processing to
b. Data Integrity storage to output.
c. Data Corruption d. The fact that information comes from
d. Data Failure data through information processing.
a. Easy to administer
b. Best to use to extract needed
information from users of the System
c. Interviews allow large number of
persons to speak at the same time, and
provide the same information
d. Interviews are the cheapest way to
eliminate conflicting points