Information Technology: Test #2A - 2013 Grade 11
Information Technology: Test #2A - 2013 Grade 11
Information Technology: Test #2A - 2013 Grade 11
2. Each item in this test has four suggested answers lettered a, b, c, d. Read each item you are about
to answer and decide which is the best.
3. On the question paper, circle the letter that corresponds with the answer of your choice.
Name: ________________________________________________________
Teacher: ______________________________________________________
Date: __________________________________
Group: ________________
a) Audio
b) Graphics
c) Text
d) Video
a) Barcode reader
2. Which of the following can be considered as b) Joystick
peripheral devices? c) Light pen
d) Touch terminal
a) Primary storage media
b) User interfaces 6. Which of the following is an example of a
c) Secondary storage media manual input device?
d) Operating systems
a) Barcode reader
3. Three basic operations that are performed in b) Keyboard
CORRECT sequence by the computer are c) Mouse
d) Plotter
a) output, input, processing
b) input, processing, output 7. Which of the following is NOT an example of a
c) output, storage, input hexa-decimal number?
d) storage, input, output
a) 121
4. Which type of interface does the following b) ASCII
diagram illustrate? c) BCD
d) C
a) GUI
b) Icon
c) Menu
d) Touch screen
a) IDE
b) SATA
c) SCSI
d) USB
GO ON TO THE NEXT
PAGE
~3~
a)Pictures and text can be stored. 20. What is the corresponding decimal value of the
b)Can store large amount of data. octal number 12?
c)Reading and writing is through laser beans.
d)Information can be accessed faster that a) 3
magnetic disks b) 12
14. What is encryption? c) 10
d) 1010
a) The use of passwords on data
b) Committing a computer crime 21. What is the function of a network of computer?
c) Disguising data and programs
d) Writing security code a) Organizes data among computers
b) Allows users to obtain data from a central
15. Which of the following is NOT true about computer
writing custom software? c) Receives data from one computer
d) Enable two or more computers to
a) It takes a long time to produce. communicate
b) It contains all the features that are required.
c) Many other computers will have this same 22. Which of the following CANNOT represent
software. typical bi-stabe?
GO ON TO THE NEXT
PAGE
~4~
a) 1, 0 c) temperature
b) On, off d) weight
c) Red, green
d) Y, N 28. Which of the following is NOT a function of a
firewall?
23. What is the function of utility software?
a) Blocks external requests to connect to a
a) It checks the amount of memory needed to computer.
perform tasks. b) Is available to all homes and businesses.
b) It can be used to split a program into c) Prevents unauthorized access to a network or
manageable blocks. computer.
c) It coordinates the flow of information d) Protects a computer from hackers.
between the input and output devices.
d) It perform function such as checking disk 29. Cable transmission media does NOT include
space
a) co-axial
24. Jono is interested in fixing hardware faults and b) fibre-optic
malfunctions in computer equipment, and c) satellite
d) twisted-pair
installing new systems. He may want to consider
a career as 30. Which of the following is an example of a
CORRECTLY formatted e-mail address?
a) an electrical engineer
b) an end-user support
a) Lana.happy@net
c) a maintenance engineer
b) @lana.happy.net
d) a system engineer
c) lana@happy.net
d) lana@happy@net
25. Which of the following actions is an example of
a consistency check? 31. Which of the following activities is involved in
coding?
a) Examining whether or not a field is the
required type in a date field a) Compiling a program
b) Requiring a user to enter his or her e-mail b) Drawing a flowchart
address twice c) Planning a solution to a problem
c) Testing that only letters are entered in a name d) Writing a program
field
d) Ensuring that numbers are positive in a 32. A series of geometrically shaped boxes connected
quantity ordered field by arrows is an example of a
26. What is the name of the folder that houses the a) bar chart
web pages in the fictitious URL given below? b) flowchart
c) program chart
http://www.happy.com/fun/index.htm d) structure chart
33. At which stage of program development should
a) http documentation be included?
b) www.happy.com
c) Fun a) After the debugging phase
d) Index.htm b) During the design phase
c) During the testing phase
27. Heat sensors are used for detecting d) At every phase
GO ON TO THE NEXT
PAGE
~5~
a) ---
GO ON TO THE NEXT
PAGE
~6~
43. The Pascal term used to get data typed using a PC298 29.9 40 26 20
3 9
keyboard is called CP299 21.9 32 10 20
4 9
a) read CP304 29.9 20 2 10
b) input 5 9
CP305 32.7 22 2 12
c) write 6 5
d) output CP306 16.9 19 7 10
7 9
44. The Pascal code to declare an array LIST with 10 CP307 16.9 17 9 10
8 9
letters is 9 MB607 4.99 42 20 20
MB608 11.9 64 32 20
a) VAR LIST: ARRAY[1...10] of char; 10 9
b) VAR LETTERS:ARRAY[110] of string;
c) VAR LIST: ARRAY[1 to 10] of char; 49. The values in Column B should be formatted
d) VAR LETTERS: ARRAY[1 to 10] of string; using the
a) Number
b) Logical
c) String
d) Date
Items 49 51 refer to the spreadsheet below. Items 52 53 refer to the graphic below.
A B C D E F
NUMBER STOCK RE-
PHONE PRIC NUMBER
IN BALANC ORDER
MODEL E SOLD
1 STOCK E LEVEL
2 CP292 9.99 26 12 15
GO ON TO THE NEXT
PAGE
~7~
a) a mail merge
b) a block operation
c) saving the document
d) combining document
GO ON TO THE NEXT
PAGE
~8~
End of test
GO ON TO THE NEXT
PAGE