WASSCE 2019

Objectives



1. The personnel who deal with computer and its management is called?

A. Software

B. Live ware

C. Hardware

D. Firmware


2. The map of Nigeria is an example of?

A. Alphabetic data

B. Audio data

C. Biometric data

D. Graphic data


3. The Hexadecimal number 13, expressed as a binary number is?

A. 00010011

B. 001101100

C. 00010110

D.00100100


4. Which of the following stamen are true an about computer?

i It is constructed from electronic components

Ii It has self generation capacity

Iii It has facility for storage of data and programs

Iv It has provision for input and output of data

A. I, II and III only

B. I, III and IV only

C. I, III and III only

D. II, III and IV only


5. Computers are classified using the following criteria except?

A. Cost and portability

B. Data representation and purpose

C. Size and speed

D. Speed and storage



6. The Slide Rules is accurate to

A. 1 – 2 decimal places

B. 3 – 4 decimal places

C. 5 decimal places

D. 6 decimal places


7. Modern computers components are?

A. Faster and larger

B. Faster and smaller

C. Larger and Stronger

D. Less reliable


8. An input device that converts an imagine into text is known as?

A. Optical Character Reader

B. Optical Code Reader

C. Optical Display Reader

D. Optical Mark Reader


9. The types of printer which works on the same principle as photocopiers is?

A. Dot Matrix Printer

B. Ink jet printer

C. Laser jet printer

D. Thermal printer


10. The output of a NAND gate is 1 when?

A. All inputs are 0

B. All input is 1

C. Any of the input is 0

D. Any of the input is 1



A computer known as CIBITO has the following memory modules in four of its computers as shown in table 1

Use the information in Table 1 to answer questions 11 to 13





11. Which of the memory modules is appropriate for a notebook computer?

A. P

B. Q

C. R

D. S


12. The memory module with the smallest physical size is?

A. P

B. Q

C. R

D. S


13. Identify the memory module with the largest physical size/

A. R

B. Q

C. R

D. S


14. The scanner and the floppy disk are:

A. Both input devices

B. Both output devices

C. Input and output devices respectively

D. input and storage devices respectively


15. The set of instructions written by computer experts to solve specific task of the user is called

A. Operating System

B. Application software

C. System software

D. Utility software



16. A collection of software that allows the computer to operate is called?

A. General-purpose software.

B. Utility software

C. Operating system

D. Specific software


17. A suite of software that control and manages the basic operation of a computer is?

A. Application software

B. Management software

C. Software package

D. System software


18. The Window PC and the Apple Macintosh are examples of two different?

A. Input devices

B. Platforms

C. Programs

D. Storage device


19. Machine language instructions are expressed in?

A. Binary

B. Decimal

C. Hexadecimal

D. Octal


20. The following symbols are used in flowcharting except the?

A. terminal symbol

B. Process symbol

C. Input/output symbol

D. Close symbol



21. Three major types of language translators are?

A. Assembler, Compiler and editor

B. Assembler. Compiler and interpreter

C. Compiler, Debugger and editor

D. Debugger, Assembler and interpreter


22. Translate 2m2 13n+9 as a BASIC arithmetic expression

A. 2*m *2+3 *n-9

B. 2* m*2+3 *//n-9

C. 2*2*m +3 *n-9

D. 2*m *m*n+3 *n-9


23. The term Compiler in computer programming refers to a?

A. Key punch operator of the computer

B. Person who compiles source program

C. Person writes the computer programming codes

D. Program which translates source program into object program


24. The IF… THEN statement in BASIC programming is?

A. A transfer if control

B. Used to redirect a statement

C. Used to eliminate the need for prompting each INPUT statement

D. A conditional branch statement.


25. Flexibility of a good program means?

A. Handing of any changes without having to rewrite the entire program

B. The length of processing time and memory to process the instruction

C. The program has to be broken down into a number of subtasks

D. The program should work for two similar tasks in the same domain./



26. Fibre Optic cable transmits signal in the form of?

A. Sound

B. Electricity

C. Light

D. Microwave


27. Data transfer can be initiated through the following media except.

A. Coaxial cable

B. Fibre Optics

C. Trunking pipe

D. Twisted pair cable


Figure 1





28. The topology represent in Figure1 is?

A. Bus topology

B. Mesh topology

C. Ring topology

D. Star topology


29. To send a created MS PowerPoint document using email to a user, the document can be added as?

A. Attachment

B. Draft

C. Reply

D. Chat


Figure 2





30. What type of network is represented in figure2?

A. Local Area Network

B. Metropolitan Area Network

C. Personal Area Network

D. Wide Area Network



31. The major advantages of free software is that it is

A. Free and contains unlimited components

B. Licensed and available always

C. Licensed and can be copied by anyone

D. Superior in quality but not robust


32. In MS Excel, the cell that contains the point or cursor is called?

A. Active cell

B. Current cell

C. Default cell

D. Passive cell


33. One major difference between paper spreadsheet and electronic spreadsheet is?

A. Arrangement of Columns

B. Headings formatting

C. Arrangement of rows

D. Speed of processing


34. To hold raw and column titles in places do that they do not scroll when he user scrolls a worksheet, click the?

A. Freeze panes command on the window menu

B. Hold titles command on the edit menu

C. Slit titles command on the edit menu

D. Show grid command on the window menu


35. In Microsoft PowerPoint, two kinds of sound effect file that can be added to a presentation are?

A. wav file and mid files

B. wav file and gif files

C. wav file and jpg files

D. jpg file and gif file



36. A cell with a red triangle in the top-right corner in a spreadsheet application signifies?

A. An error in the cell

B. A comment associated with the cell

C. That the front color for text in the cell is red

D. That a formula cannot be entered into the cell


37. Spreadsheet packages can be use for?

A. Database and painting

B. Drawing and painting

C. Budgeting and inventory

D. Word processing


38. Which of the following is true when data management in MS Excel work is linked to a word document? The word document?

A. Cannot be edited

B. Must contain a hyperlink

C. Contains a copy of the actual data

D. Contains a reference to the original source application


39. Data that is copied from an application is stored in the?

A. Clipboard

B. Drive

C. Prompt

D. Terminal


40. After several “save” and “delete” operations, there remain many scatted areas of data too small to be used productivity. This describes

A. Utilization

B. Protection

C. Fragmentation

D. Backing up



41. The disk operating system will label three hardware drives as?

A. A, B and C

B. C, D and e

C. C, B and D

D. E, G and H


42. Which of the options labeled I to IV give the two stages involved in booting?

I Power on Self Test

II Loading of Operating system

III Loading of email

IV Power on Safe Mode

A. I and II only

B. I and III only

C. III and IV only

D. III and IV only


43. A bit as used in computing in digital communication is?

A. A decimal digit

B. An octal digit

C. A binary digit

D. a hexadecimal digit


44. Multiply 1012 by 112

A. 10012

B. 10112

C. 11102

D. 11112


45. In BCD encoding system, 2510 will be represented as?

A. 01100101

B. 01010110

C. 00100101

D. 01010010



46. The following actions are source of security breaches in computing except?

A. Carelessness

B. Hacker threat

C. Piracy

D. Viruses


47. Effect of file insecurity include the following except?

A. Virus infection

B. File corruption

C. Encrypted data

D. Data loss


48. Which of the file organization methods can be accessed both randomly and sequentially?

A. Direct files

B. Indexed sequential file

C. Random file

D. Sequential file


49. A computer program that gather information about a person or organization without their knowledge or consent is known as?

A. Adware

B. Time Bomb

C. Malware

D. Spyware


50. Password reset disk should be created

A. Every time the disk should password

B. Once only

C. only when the user forgets the password

D. Twice only.



WASSCE JUNE 2019 COMPUTER STUDIES OBJECTIVE TEST

ANSWERS

​1.A 2.D 3.A 4.C 5. A 6. C 7. B 8. A 9. B 10. A 11. A 12. A 13. D 14. D 15. B 16. C 17. D 18. C 19. A 20. D 21. B 22. A 23. D 24. A 25. A 26. D 27. C 28. B 29. A 30. B 31. A 32. A 33. D 34. A 35. A 36. A 37. C 38. B 39. A 40. A 41. B 42. A 43. C 44. D 45. C 46. A 47. C 48. B 49. C 50. A