Test Entry
Test Entry
DURATION : 2 HOURS
INSTRUCTIONS TO CANDIDATE:
1. Answer all the questions.
2. All answers must be written in the answer booklet provided. Use a new page for each
question.
3. The full marks for each question or section are shown in the bracket at the end of the
question.
4. You are not permitted to take the exam paper and the answer booklet(s) out of the exam
hall.
PART A : MULTIPLE ANSWER QUESTIONS
20 MARKS
2
7. Which OS is specially designed for smartphones and PDAs?
A. Windows XP
B. Windows Vista
C. Mac OS X
D. Windows Mobile
9. What phase of the systems life cycle that used structured programming techniques?
A. Program design
B. Program maintenance
C. Program development
D. Program analysis
11. In this generation Time sharing, Real time, Networks, Distributed Operating System
was used
A. 1st
B. 2nd
C. 4h
D. 5th
3
14. A relational database consists of a collection of
A. Tables
B. Fields
C. Records
D. Keys
15. This level of management is involved with tactical planning and implementing the
long-term goals within an organization.
A. Top management
B. Middle management
C. Supervisors
D. Stockholders
16. Which is NOT a hardware device used to attach a device to a wireless network?
A. PC card
B. Network Interface card (NIC)
C. USB Adapter
D. PCI card
19. _______ is the practice and precautions taken to protect valuable information from
unauthorised access, recording, disclosure or destruction.
A. Network Security
B. Database Security
C. Information Security
D. Physical Security
4
PART B : TRUE/FALSE QUESTIONS
20 MARKS
INSTRUCTION : ANSWER ALL QUESTIONS.
Please write your answer (True or False) in the answer booklet.
6. Elite Hackers is a types of hackers that are the most skilled hackers TRUE/FALSE
in the hackers’ community
9. Ethical hacking is the legal form of hacking based on which jobs are TRUE/FALSE
provided in IT industries and firms
11. Decision support systems (DSS) use data from the TPS to support TRUE/FALSE
supervisors
5
12. Program that allow you to surf the internet and provide access to TRUE/FALSE
Web resources known as URLs
13. Wireless networks are more vulnerable to attack than wired TRUE/FALSE
networks
14. Web directories, content evaluation, and search engines are TRUE/FALSE
examples of the Communication Channel
16. The Extranet is a private network within an organisation that works TRUE/FALSE
like the internet
17. The Internet affect the way you purchase your textbooks by TRUE/FALSE
decreases your bargaining power
18. Filters is a program that block access to selected sites and can set TRUE/FALSE
times limits
20. Keyword and Directory Search are specialised programs to assist in TRUE/FALSE
location information
6
PART C : STRUCTURED QUESTIONS
60 MARKS
QUESTION 1:
QUESTION 2:
i. What is the three (3) advantages and three (3) disadvantages of networking?
(5 marks)
QUESTION 3:
QUESTION 4: