WASSCE 2016


Objectives



1. The first calculating device is the

A. Abacus.

B. Census machine.

C. Difference engine.

D. Napier's bones.


2. Which of the following represents features of a computer?

I. It is constructed from electronics components.

II. It has self regeneration capability.

III. It has facility for storage of data and programs.

IV. It has provision for input and output data.

A. I, II and III only

B. I, II and IV only

C. I, III and IV only

D. II, III and IV only


3. Arrange in a hierarchical order by date, the following inventions:

I. Slide rule II. Pascaline III. Analytical engine IV. Difference engine.

A. I, Ii, IV and III

B. Ill, IV, I and II

C. Ill, IV, II and I

D. I, II, III and IV


4. Which of the following is true about raw data?

A. It is well categorized

B. It exists in oral form only

C. It exists in written form only

D. It cannot be relied on to make decision


5. Which of the following was used by Joseph Marie Jacquard in inventing the Loom?

A. Punched card

B. Smart card

C. Smart chip

D. Sound card



6. Which generation of computers used vacuum tubes in their circuitry?

A. First generation

B. Second generation

C. Third generation

D. Fourth generation


7. The full meaning of the acronym ENIAC is

A. Electronic Numerical Integrator and Calculator.

B. Electronic Numerical Integrator and Computer.

C. Electronic Numeric Integration Automatic Calculator

D. Electronic Numeric Integrated Automatic Calculator.


8. The primary memory of the computer can be divided into

A. register and .random access memory.

B. mass storage and read only memory.

C. volatile memory and auxiliary memory,

D. random access memory and read only memory.


9, A common communication pathway shared by hardware components in the computer is called

A. bus.

B. channel.

C. firmware.

D. register.


10. Which of the following can be described as the brain of the computer hardware?

A. BIOS

B. Microprocessor

C. RAM chip

D. System clock



11. Which of the following is not a computer output device?

A. Disk

B. Plotter

C. Printer

D. Speaker


12. The computer process that electronically prepares a disk to store data is called

A. coupling.

B. initialization.

C. decoding.

D. standardization.


13. Data to be processed by the microprocessor is temporarily stored in the

A. auxiliary storage.

B. backing storage.

C. main storage.

D. random access memory.


14. The smallest unit of information representation which is addressable on the computer memory is

A. 1 bit.

B. 2 bits.

C. 4 bits.

D. 8 bits.


15. Software is referred to as the

A. generic term for computer programs.

B. physical components of the computer.

C. part of the computer for communication.

D. part of the computer which is breakable.



16. The software whose output is intended for the human user is called

A. Application software.

B. firmware.

C. malware.

D. system software.


17. The parts of the taskbar include:

I. Recycle bin II. Start button III. System tray IV. Quick launch toolbar.

A. I, II and IV only

B I, III and IV only

C. II, III and IV only

D. I, II, III and IV


18. The similarities between main memory and registered is that they are:

I. volatile II. under the direct control of the user III. protected by the system unit IV. for system use only

A. I, II and IV only

B. I, III and IV only

C. II, III and IV only

D. I, II, III and IV


19. A pictorial representation of the logic of a program is called

A. diagram

B. flowchart

C. pseudocode

D. software


20. A subroutine is called in a flowchart through the use of

A. data

B. predefined process

C. process

D. terminator



21. The symbol used to represent an execution flow in a Flowchart is





22. A suitable BASIC notation for the expression mc2 is

A. m * c ^ 2.

B. m * c * 2.

C. m * c^2

D. m * c * ^2


Use the BASIC program below to answer questions 23 to 25.

10 LET K= 2

20 LET L = 9

30 LET SUM = 0

40 FOR J = K TO STEP 2

50 SUM = SUM + J^2

60 PRINT "ANSWER = ", SUM

70 NEXT J

80 END


23. How many times will the statement lines 50 and 60 be repeated?

A. 2

B. 3

C. 4

D. 5


24. Which of the following best represents the sequence of output from the program?

A. 2, 4

B. 4, 20, 36

C. 4, 16, 36, 64

D. 4, 20, 56, 120


25. The last output that will be displayed by the program is

A. 20.

B. 36.

C. 64.

D. 120.



26. Which of the following networks can be extended to cover continents?

A. Metropolitan Area Network

B. Personal Area Network

C. Wide Area Network

D. Wireless Area Network


27. Identify the browsers in the following list:

I. Telnet

II. Netscape Navigator

III. Opera

IV. Mozilla Firefox.

A. I, II and III only

B. I, III and IV only

C. II, III and IV only

D. I, II, III and IV


28. Trap doors and bombs are typical examples of

A. adware.

B. computer worms.

C. firewall.

D. Trojan horses.


29. The first four steps required to open an email account include:

I. click on 'Create my account' II. go to home page of the service provider III. click create 'New Account' IV click on 'Mail'.

A. 1,11,1V and III

B. II, I, IV and III

C. II, IV, III and I

D. IV, II, I and III


30. The two main components of a radio communication system are

A. transmitter and terminal.

B. receiver and terminator.

C. transmitter and receiver.

D. transmitter and terminator.



31. Which of the following can a traveler who finds himself in a new environment rely on for direction to his final destination?

A. DNS

B. GPRS

C. GPS

D. TCP


32. The default number of sheets of a workbook is

A. one.

B. two

C. three

D. four.


33. The chart type that does not have the X and Y axes display is the

A. area chart

B. bar chart.

C. pie chart

D. scatter diagram.


34. When a worksheet is deleted from a workbook, it is

A. lost forever

B. sent to the recycle bin.

C. sent to the original folder.

D. stored permanently in main memory.


35. A block of text that is marked by the tab key when the enter key is pressed can be referred to as

A. margin

B. paragraph

C. white space

D word wrap



36. Principal uses of word processing software packages include: I. preparing deft articles for publication II. preparing reports for top management III. preparing accounts IV. preparing organisation's newsletter.

A. I, II and IV only

B. I, III and IV only

C. II, III and IV only

D. I, II, III and IV


37. In a database, a primary key is a field which contains

A. text only

B. unique entries

C. duplicate values

D. numeric value only


38. One megabyte is equivalent to

A. one million bytes.

B. two million bytes.

C. three million bytes.

D. four million bytes.


39. Converting 4B716 to binary is

A. 0100 1010 01112.

B. 0100 1011 01112.

C. 0100 1000 01112.

D. 0100 1100 01112.


40. The speed of data transfer in the computer can be determined in terms of

A. protocol and bus speed.

B. bus speed and width.

C. bus speed and storage media.

D. bus width and storage media.



41. The initial screen that is displayed after a computer booting is referred to as

A. desktop

B. interface

C. software.

D. taskbar.


42. Which of the following is not a biometric data?

A. Finger prints.

B. Password.

C. Pattern of eye iris.

D. Sound of the voice.


43. The main advantage of intellectual property right is

A. maximization of profit.

B. discovering of brilliant persons.

C. discovering of sharing.

D. encouragement of innovations.


44. The word bit refers to

A. the value zero or one.

B. the value zero or more.

C. central processing unit command.

D. central processing unit instructions.


45. The decimal number 1024 in hexadecimal equivalent is

A. 2416

B. 40016.

C. 3E816.

D. 8BB16.



46. Which of the following is true of a digital logic gate?

A. It has at least two inputs but only one output.

B. It has many outputs and inputs.

C. It has at least one or more inputs but only one output.

D. It has at least one input and two outputs.


47. Which of the following is a temporary file that can be used only once and then discarded?

A. Refresh file

B. Master file

C. System file

D. Transaction file


48. Sorting of records is sufficient and a necessary condition for creating

A. random file.

B. indirect file.

C. sequential file.

D. indexed sequential file.


49. The illegal copying and use of proprietary/copyrighted software is called

A. hacking.

B. spamming.

C. hardware piracy.

D. software piracy.


50. Symptoms of computer virus attack include: I. improved processing speeds II. drive light coming up without apparent reason III. unexplainable printer activity IV. file disappearance or strange files appearance on-screen.

A. I, Hand III only

B. I, III and IV only

C. II, III and IV only

D. I, II, III and IV



WASSCE JUNE 2016 COMPUTER STUDIES OBJECTIVE TEST

ANSWERS

1. A 2. A 3. C 4. B 5. C 6. D 7. B 8. C 9. A 10. B 11. A 12. B 13. C 14. D 15. A 16. C 17. C 18. B 19. C 20. D 21. C 22. A 23. B 24. C 25. A 26. A 27. C 28. B 29. C 30. A 31. B 32. D 33. D 34. B 35. B 36. A 37. C 38. D 39. B 40. C 41. A 42. B 43. D 44. B 45. B 46. A 47. D 48. C 49. A 50. D