EducationElective ICT Pasco

Elective ICT Pasco 2020 Objectives

Elective ICT Pasco 2020 Objectives

WASSCE 2020

Answer all questions

1. A report that shows out-of-the-ordinary data is called

A. confidential report

B. essential report

C. exception report

D. special report

Ans: C

2. The practice of sending unsolicited electronic mail to users of the internet is referred to as

A. hacking

B. hijacking

C. jamming

D. spamming

Ans: D

3. A computer program that combines two or more applications into single unified package is called

A. custom software

B. integrated software

C. off-the-shelf software

D. specialized software

Ans: B

4. The term What-if Analysis is associated with

A. database application

B. desktop publishing application

C. spreadsheet application

D. word processing application

Ans: C

5. Which of the following programs is an operating system?

A. Internet Explorer

B. Mozilla Firefox

C. Opera

D. Unix

Ans: D

6. The finite and ordered sequence of steps which must be taken in order to solve a given problem is known as

A. algorithm

B. compilation

C. flowcharting

D. iteration

Ans: A

7. A topology that has a central workstation from which all other nodes relate is called

A. bus

B. mesh

C. ring

D. star

Ans: D

8. In a one-to-many relationship, the table in one side and that on the many side respectively are referred to as

A. child, parent

B. parent, child

C. father, son

D. son, father

Ans: B

9. The ASCII code is used for information interchange by a binary code for

I. Alphabets;

II. Numbers;

III. Symbols;

Which of the following options is correct?

A. I and II only

B. I and III only

C. II and III only

D. I, II and III

Ans: D

10. BCD coding numbers are obtained when

A. converting decimal to octal

B. converting binary to decimal

C. converting decimal to binary

D. each decimal digit is represented by four bit binary

Ans: C

11. Which of the following options is not common between computer files and manual files? They can both

A. be accessed

B. be retrieved

C. store video

D. be arranged

Ans: C

12. False information dissemination in the broadcast of information technology assignment must have come from

A. wrong input selection

B. inadequate power supply

C. low capacity of the memory

D. invasion of the computer system by virus

Ans: A

13. Health hazards associated with the use of ICT include:

I. Repetitive-Strain Injury,

II. Carpel Tunnel Syndrome,

III. Computer Vision Syndrome,

IV. Magnetic Resonance Imaging.

Which of the following options is correct?

A. I, II and III only

B. II, III and IV only

C. I, II and IV only

D. I, III and IV only

Ans: A

14. Desktop publishing relies on hardware support such as

I. low resolution monitors,

II.  high resolution scanners,

III. low resolution scanners,

IV. high resolution monitors.

Which of the following options will give the best support?

A. I and III only

B. II and III only

C. II and IV only

D. III and IV only

Ans: D

15. Which of the following statements are true about gridlines in spreadsheet?

I. Gridline may be turned off for display but turned on for printing

II. Gridline may be turned on or off for printing

III. Gridline may be turned off for display and printing

A. I and II only

B. I and III only

C. II and III only

D. I, II and III

Ans: D

16. The size of the virtual memory depends on the size of the

A. address bus

B. control bus

C. data bus

D. main memory

Ans: A

17. Which of the following memory types are examples of non-volatile memory?

I.  PROM

II. SRAM

III. EEPROM

IV. DRAM

A. I and II only

B. I and III only

C. II and III only

D. III and IV only

Ans: B

18. Which of the following devices output can be measured by resolution?

I. Keyboard

II. Monitor

III. Printer

A. I and II only

B. I and III only

C. II and III only

D. I, II and III

Ans: C

19. Which of the following devices help prevent power surge?

A. Spike protector

B. Surge suppressor

C. High-grade multi-meter

D. Uninterrupted power supply

Ans: D

20. Formatting a hard disk results in all the data being

A. backup to the disk

B. copied from the disk

C. deleted from the disk

D. saved to another disk

Ans: C

21. Which of the following devices can be used to directly input printed text?

A. Joystick

B. Mouse

C. Touch pad

D. Optical Character Recognition

Ans: D

22. A set of instructions that determines how hardware and operating system will communicate with application software is referred to as

A. firmware

B. groupware

C. malware

D. testware

Ans: A

23. When the time slot given to a process in a time sharing operating system is completed, the process goes from running state to

A. blocked state

B. ready state

C. suspended state

D. terminated

Ans: B

Use figure 1 to answer question 24 to 26

Figure 1

24. The basic problem with the flowchart in Figure 1 is that, it has

A. no direction

B. no algorithm

C. ‘stop’ as a process

D. improper branch out

Ans: A

25. What activity is the flowchart made to represent

A. How to pick an orange

B. Instruction to pick an orange

C. Instruction not to pick an orange

D. Number of times to pick an orange

Ans: D

Also Check: Elective ICT Pasco 2018 Objectives

26. If N in the flowchart is represented by 10, which of the following conditions is not true?

A. If C > 10, do not pick orange

B. If C = 10, stop picking orange

C. If C < 10, keep picking orange

D. If C = 10, continue picking orange

Ans: D

27. Which of the following errors is not associated with computer programming?

A. Compile error

B. Grammar error

C. Logic error

D. Syntax error

Ans: B

28. Mozilla Firefox is an example of a

A. web crawler

B. web browser

C. web server

D. web site

Ans: B

29. Which of the following network topologies is most difficult to troubleshoot?

A. Bus

B. Mesh

C. Ring

D. Star

Ans: C

30. Which of the following terms will lead to communication between separate computer systems?

A. Bridging

B. Configuration

C. Connectivity

D. Routing

Ans: B

Also Read: Elective ICT Practicals 2020

Table 1, “SpareParts”, shows the data on car parts being sold by a dealer at the AbosseyOkai market. Use the table to answer questions 31 to 34.

 

Table 1: SpareParts

PartNumber PartDescription QuantityOnHand WareHouseNumber UnitPrice
EX214 Exhaust Pipe 300 22 200
BA345 Ball Bearing 200 4 400
WI671 Wind Screen 400 7 315
MI234 Mirror 590 6 45
SH234 Shock 300 8 570
IN568 injectors 200 20 1000

 

31. The data type for the field PartNumber in the SpareParts table is

A. Currency

B. Hyperlink

C. Number

D. Text

Ans: D

32. The number of fields in the SpareParts table is

A. 4

B. 5

C. 6

D. 7

Ans: B

33. How many records are in the SpareParts table?

A. 4

B. 5

C. 6

D. 7

Ans: C

34. The primary key in the SpareParts table is

A. SpareParts.UnitPrice

B. SpareParts.PartNumber

C. SpareParts.QuantityOnhand

D. SpareParts.WareHouseNumber

Ans: B

35. ICT in education includes the following resources except

A. blog

B. internet

C. onlineform

D. computer programming

Ans: D

36. The use of information and communications technology for health care practice support is known as electronic

A. book

B. business

C. health

D. learning

Ans: C

37. A hexadecimal number A0 has the decimal value

A. 80

B. 120

C. 160

D. 254

Ans: C

38. Text composition in desktop publishing does not include

A. creating drop caps

B. embedding fonts

C. adjusting line lengths

D. adding bold and italic type

Ans: C

39. To improve the appearance of a layout in desktop publishing applications, add more

A. Clipart

B. Font

C. Frames

D. White space

Ans: C

Use Figure 2 to answer questions 40 and 41.

Figure 2

40. Which of the following functions will calculate the products of all the numbers in the worksheet of the spreadsheet application?

A. =PRODUCT(A1:C4,E1:E4,A7:C7)

B. =PRODUCTS(A1:C4,E1:E4,A4:C7)

C. =PRODUCTS(C1:A4)

D. =PRODUCT(A1:E4)

Ans: A

41. Which of the following functions will calculate the average of all the numbers in the worksheet of the spreadsheet application?

A. =AVG(A1:C4,E1:E4,A7:C7)

B. =AVERAGE(A1:C4,E1:E4,A7:C7)

C. =AVERAGE(C4:A1)

D. =SUM(A1:E4/5)

Ans: B

42. The comment function in a spreadsheet application is used to:

I. Take and attach notes to cells

II. Remind the user of complex formulas

II. Provide feedback to others

A. I and II only

B. I and III only

C. II and III only

D. I, II and III

Ans: D

43. Which of the following formulas will display the present calendar month in a spreadsheet application?

A. =TODAY()

B. =MONTH()

C. =MONTH(NOW())

D. =TODAY(MONTH())

Ans: C

44. The value that will be printed at the end of the loop from the following QBASIC code is

LET C = 0

DO WHILE C <= 5

LET C = C + 1

LOOP

PRINT C

A. 1

B. 4

C. 5

D. 6

Ans: D

Check Also: Elective ICT Practicals 2021

45. Which of the following outputs will be displayed when a user executes the QBASIC program below:

READ A

READ B

READ C

READ D

READ E

READ F

LET P=(A*B^2)/2

LET Q=C+D*3

LET R=(E^2+50) + F

DATA 4,5,6,10,8,12

PRINT P, Q, R

END

A. 50      48       162

B. 11      36       126

C. 50      36       126

D. 400    36       48

Ans: C

46. To print the word SCORES beginning with the 24th column, use the QBASIC command

A. PRINT “SCORES”, 14.

B. PRINT (24) “SCORES”.

C. PRINT TAB(24);”SCORES”.

D. PRINT TAB, 24, “SCORES”.

Ans: C

47. Which of the following QBASIC commands demonstrates the correct way of coding the statement “Transfer control to the line labelled ONE if X is between 0 and 12 inclusive”?

A. IF X=12 THEN GOSUB ONE

B. IF X>12 THEN GOSUB ONE

C. IF (X>12 AND X<12) THEN GOSUB ONE

D. IF (X=0 AND X<=12) THEN GOSUB ONE

Ans: D

48. What value will be printed when the following QBASIC code is executed?

LET S=0

FOR C=1 TO 10

LET S=S+C

NEXT C

PRINT S

A. 45

B. 50

C. 55

D. 60

Ans: C

49. The QBASIC code given below has an error. Select the line of instruction in the options provided that will correct this error.

FOR I=1 TO 3

READ N$

PRINT N$

NEXT N

DATA “TOM”, “DICK”, “HARRY”

A. NEXT I

B. PRINT “N$”

C. FOR I$=1 TO 3

D. DATA TOM DICK HARRY

Ans: A

40. The command that is used to detect the presence of a computer on a network is called

A. ipconfig

B. netsh

C. ping

D. telnet

Ans: C

Recommended:

Please if you are on any of our WhatsApp platforms, do not join this one.

Join our Discussion Forum below.

<<< CLICK HERE TO JOIN OUR WHATSAPP GROUP >>>

<<< CLICK HERE TO JOIN STUDENTS FORUM ON WHATSAPP >>>

<<< CLICK HERE TO JOIN OUR TEACHERS PORTAL GH ON TELEGRAM >>>

<<< CLICK HERE TO JOIN OUR ICT TEACHERS PLATFORM>>>

Please don’t forget to share this post. Click on the WhatsApp, Facebook, Twitter, Instagram button below to share the post.

Casper

Casper works at Ghana Education Service as an ICT teacher. He graduated with a First Class Honor at University of Education, Winneba - Kumasi Campus now AAMUSTED. He is also a Certified Cisco Networking Engineer and passionate about students learning.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button
error: Content is protected !!