Answer B7 Computing

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

B7 COMPUTING - EOT EXAM TERM 2 2023

NAME: Duration: 1 hour 45 minutes

B7-COMPUTING

SECTION A 10.All the following are effects of copyright infringement


except
1.What did second-generation computers use for circuitry? A. pardon C. confiscation of illegal
A.Transistors C.Microprocessors
Integrated circuits items
B. D.Vacuum tubes
2.Which of the following involves not disclosing information B. imprisonment D.fines
to unauthorized persons? 11.The protection of software and hardware from accidental
A. confidentiality C. availability or malicious damage is referred to as
B. data integrity D. data handling A. adware safeguard C.hardware malfunction
3. B. data integrity D. physical safeguard
12.Processed or transformed facts which are meaningful to the
user is called
A.input C. output
B. information D. data
13.The period of ________ generation was 1946-1959.
What is this device called? A. 3rd C. 1st
A. digicam C.light pen B. 2nd D. 4th
B. barcode reader D.webcam
14.Which of the following is not an intellectual property?
4.The period of ________ generation was 1959-1965. A. orphan work C. patent
A. 2nd C. 1st B. trade secrete D.watermarks
B. 3rd D. 4th
15.Which of the following involves not disclosing information
5.Scrambling data during transmission for security purposes to unauthorized persons?
is referred to as A. confidentiality C. availability
A. data decoding C. data encryption B. data integrity D. data handling
B. data password D. data mixing
16.To ensure that data is accurate it should not be
6.Computers can do many things, for example...... compromised by the following except
A.it stores information C.it connects people
A. deletions C. passwords
from different places
B. additions, D. alterations
B. it manipulates data D. a computer can do all
17.A computer accepts data input, processes the data and
these
produces
7.Which of the following device sends commands into the A.Data C. Storage
computer? B. Output D.Byte
A. keyboard C. pen drive 18..............gives users persmission to access a resource.
B. system unit D. printer A. encryption C. availability
8.Double-clicking on a program icon on a computer B. authentication D. authorization
desktop….. 19.______ generation of computer started with using vacuum
A. copies the programs C. closes the programs tubes as the basic components.
icons icons A. 2nd C. 3rd
B. open the programs D. cuts the programs B. 4th D. 1st
icons icons 20.A term in computer terminology is a change in technology a
9.___________ is an emerging branch in computer science, computer is/was being used.
which interprets means and method of making computers A.growth C. development
think like human beings. B. advancement D.generation
A.AI C. Cloud computing 21.Illegal copying of operating system, application software,
B. VR D.Block chain music and videos is referred to as copyright
A.issues C.law
B. infringement D. protection

page 1
B7 COMPUTING - EOT EXAM TERM 2 2023
22. 34.The following are good computer security practices
EXCEPT
A. download from C. opening all incoming
What is this device called? trusted websites e-mail messages
A. transistor C.vacuum B. scan downloaded files D.updating antivirus
B. microprocessor D.RAM 35.Which is not a principle of information security?
23.The association of musicians that help the government in A. availability C. data handling
enforcing the copyright laws and protecting the works of B. confidentiality D. data integrity
musicians is 36.All are physical safeguards in data security EXCEPT
A.MUSICA C.MUSIGA A. distributing sensitive C.Using PIN to access
B. MUSIGH D.MISIGA data to a number of systems
24.All the following except .....................................is a threat employees rather than
to data security one
A. earthquake C. Firewall B. storing data in D.monitoring using
B. flood D.lightning fireproof safe security camera
25.A special surface for placing , moving and enhancing the 37.What was the main technology used in third- generation
speed of the computer mouse is called computers?
A.mouse file C.mouse pad A. Integrated circuits C.Artificial intelligence
B. scroll button D.mouse mat B. Vacuum tubes D.Microprocessors
26.............. confirms users are who they say they are 38.Which of the following devices are used to feed a
A. authorization C. availability computer system with data
B. authentication D. encryption A.mouse and printer C.mouse and monitor
27...............................is the protection of a system’s ability to B. keyboard and mouse D. keyboard and
make software systems and data fully available when a monitor
user needs it 39.Which of the following do not qualify for copyright
A. data handling C. data integrity protection under the copyright laws of Ghana?
B. availability D. confidentiality A.Audiovisuals and C. procedures and
28.Which of the following scans, delete, quarantine and artistic works movements
prevent malicious codes a computer system? B. Computer software D. Sound recordings and
A.Access C. Presentation and literary works musical works
B. McAfee D.Excel 40.Which of the following best explains data intergrity?
29.The following are a means of authentication except A.validity of data C. data compromise
A. encryption C. availability B. use of data D. data use
B. password D. biometrics
30.Entry of data into a computer is termed
A.Distribution C. Process
B. Input D. Output
31.The main circuit board in a computer is called the
________.
A.RAM C. power supply unit
B. motherboard D. dongle
32.The arrow on the computer monitor is the
________________ .
A.windows C. start
B. click D.mouse pointer
33.Harware malfunctioning is may be caused by
A. power fluctuations C. authorised access
B. storing fireproof safe D.installing firewall

page 2

You might also like