Answer B7 Computing
Answer B7 Computing
Answer B7 Computing
B7-COMPUTING
page 1
B7 COMPUTING - EOT EXAM TERM 2 2023
22. 34.The following are good computer security practices
EXCEPT
A. download from C. opening all incoming
What is this device called? trusted websites e-mail messages
A. transistor C.vacuum B. scan downloaded files D.updating antivirus
B. microprocessor D.RAM 35.Which is not a principle of information security?
23.The association of musicians that help the government in A. availability C. data handling
enforcing the copyright laws and protecting the works of B. confidentiality D. data integrity
musicians is 36.All are physical safeguards in data security EXCEPT
A.MUSICA C.MUSIGA A. distributing sensitive C.Using PIN to access
B. MUSIGH D.MISIGA data to a number of systems
24.All the following except .....................................is a threat employees rather than
to data security one
A. earthquake C. Firewall B. storing data in D.monitoring using
B. flood D.lightning fireproof safe security camera
25.A special surface for placing , moving and enhancing the 37.What was the main technology used in third- generation
speed of the computer mouse is called computers?
A.mouse file C.mouse pad A. Integrated circuits C.Artificial intelligence
B. scroll button D.mouse mat B. Vacuum tubes D.Microprocessors
26.............. confirms users are who they say they are 38.Which of the following devices are used to feed a
A. authorization C. availability computer system with data
B. authentication D. encryption A.mouse and printer C.mouse and monitor
27...............................is the protection of a system’s ability to B. keyboard and mouse D. keyboard and
make software systems and data fully available when a monitor
user needs it 39.Which of the following do not qualify for copyright
A. data handling C. data integrity protection under the copyright laws of Ghana?
B. availability D. confidentiality A.Audiovisuals and C. procedures and
28.Which of the following scans, delete, quarantine and artistic works movements
prevent malicious codes a computer system? B. Computer software D. Sound recordings and
A.Access C. Presentation and literary works musical works
B. McAfee D.Excel 40.Which of the following best explains data intergrity?
29.The following are a means of authentication except A.validity of data C. data compromise
A. encryption C. availability B. use of data D. data use
B. password D. biometrics
30.Entry of data into a computer is termed
A.Distribution C. Process
B. Input D. Output
31.The main circuit board in a computer is called the
________.
A.RAM C. power supply unit
B. motherboard D. dongle
32.The arrow on the computer monitor is the
________________ .
A.windows C. start
B. click D.mouse pointer
33.Harware malfunctioning is may be caused by
A. power fluctuations C. authorised access
B. storing fireproof safe D.installing firewall
page 2