CSEC IT Specimen Paper 1 2017
CSEC IT Specimen Paper 1 2017
01229010
PRINT your name on the line below and return
this booklet with the answer sheet. Failure to doTEST CODE
so may result in disqualification.
SPEC 2017/01229010
CAR I B B EAN E XAM I NAT I O N S C O U N C I L
INFORMATION TECHNOLOGY
1. This test consists of 60 items. You will have 1 hour and 15 minutes to answer them.
3. Each item in this test has four suggested answers lettered (A), (B), (C), (D). Read each item
you are about to answer and decide which choice is best.
4. On your answer sheet, find the number which corresponds to your item and shade the space
having the same letter as the answer you have chosen. Look at the sample item below.
Sample Item
The best answer to this item is “Spreadsheet and database software”, so (A) has been shaded.
5. If you want to change your answer, erase it completely before you fill in your new choice.
6. When you are told to begin, turn the page and work as quickly and as carefully as you can. If
you cannot answer an item, go on to the next one. You may return to that item later.
01229010/CSEC/SPEC2017
- 2 -
1. When the computer is working on given 5. Which of the following storage media
instructions, it is called uses laser technology to store data?
(A) plotter
4. Which of the following is a disadvantage (B) laser printer
of cloud storage? (C) graphics tablet
(D) light pen
(A) Accessibility (offline/without
internet)
(B) Reduction of storage cost to 9. Which of the following output is an
organization example of a hard copy?
(C) Increased possibility for disaster
recovery (A) An oral speech delivered by a
(D) Efficient management of stored speaker
data (B) A bill produced from a printer
(C) The display on a monitor
(D) A picture on a wall produced
from a multimedia projector
10.
Which of the following tasks would MOST 14. Desreen has a desktop computer system.
likely require an advance graphics card? She turns on the system and waits five
minutes but no image is displayed. During
(A) Program development troubleshooting, which of the following is
(B) Web browsing MOST likely to be identified as the
(C) SBA development problem?
(D) Video editing
(A) Screen setting incorrect
(B) The power cable to the Monitor is
11. In modern computers, the CPU speed is loose
measured in (C) The battery power connected to the
system is loose
(A) kilohertz (D) The resolution is set too low
(B) gigabytes
(C) kilobytes
(D) gigahertz 15. Which of the following is the name of
the interface used by blind persons to
perform operations on a computer?
12. Quality Developers is a company that
writes programs to do specific jobs for (A) Icon
other companies. These programs are (B) Sensor
called (C) Braille
(D) Touchscreen
(A) general-purpose software
(B) special-purpose software
(C) custom-purpose software 16. John is required to email a copy of his
(D) off-the-shelf software SBA to his teacher. This emailed copy is
referred to as
18. Which of the following would be the BEST 23. Each website on the Internet can be accessed
option to expand your laptop’s storage by entering a unique address. This address
capacity? is referred to as the
19. James Café keeps payroll information 24. Which of the following network components
stored in files on a cloud account. Which is BEST suited for connecting LANS in a
of the following BEST describes how metropolitan area network?
these files can be accessed?
(A) Hub
(A) Serial (B) Switch
(B) Random (C) Router
(C) Sequential (D) Modem
(D) Indexed sequential
(A) blogging
(B) instant messaging
(C) Internet relay chat
(D) file transfer protocol
27. You received an email from someone who 31. Which of the following is a job task of a
claims to be a representative from your social media specialist?
school. The email asked you to click on a
link to reset your password. You should (A) Maintaining a website
proceed with caution because the email (B) Developing software for social
may be a use
(C) Installing or upgrading social
(A) spam threat media software on a computer
(B) malware attack system
(C) phishing attack (D) Generating and sharing content
(D) legitimate request daily over a social media network
28. Using electronic devices to view a chat 32. Which of the following are physical
conversation between two friends, in real restrictions with respect to data security?
time, without their knowledge is
I. Firewall
(A) propaganda II. Locking up the hardware
(B) a violation of privacy III. Biometric systems
(C) a denial of service attack
(D) an electronic eavesdropping (A) I and II only
(B) I and III only
(C) II and III only
29. The use of “*********” to hide a password (D) I, II and III
being entered into a computer system is
termed
33. Which of the following actions is NOT
(A) antivirus considered a computer crime?
(B) phishing
(C) biometrics (A) Piracy
(D) encryption (B) Hacking
(C) Encryption
(D) Industrial espionage
30. In an effort to secure data on a system, users
are required to set a password in a specific
format. Which of the following types of 34. Including material obtained from online
measures is this an example of? sources in an assignment and then
submitting the assignment without giving
(A) Physical credit to the online sources is referred to as
(B) Software
(C) Hardware (A) plagiarism
(D) Personal (B) e-learning
(C) fraternization
(D) collaboration
35. Telecommuting can BEST be described as 39. Which of the following should be done
before publishing a website?
(A) communicating between two
companies (A) Compile the source code.
(B) working from home by (B) Create the algorithm for the
connecting home and office website.
(C) working from home by (C) Ensure that all hyperlinks are
having employees at home working correctly.
(D) communicating between home and (D) Purchase the software needed
office to develop the website.
36. In word processing, an efficient way to 40. What is the name of the highlighted word
move the third paragraph in order to place or picture in a webpage that a user can click
it after the fifth paragraph is on to go to another webpage?
37. The two files used to produce merged letters 41. Text entered into a spreadsheet is aligned
during a mail merge are the towards the left by default. These entries
are called
(A) primary document and data
source (A) labels
(B) primary document and (B) values
merged letters (C) formulae
(C) data source and merged (D) functions
letters
(D) primary document and
current letter 42. Which of the following formatting features
is unique to numbers in spreadsheets?
44. Which of the following is an example of 48. Which database feature can be used to
a spreadsheet function? list the names of the male students from
a particular class?
(A) function sum(A1, A2, A3)
(B) sum = A1 + A2 + A3 (A) Table
(C) = sum(A1:A3) (B) Form
(D) = A1 + A2 + A3 (C) Query
(D) Report
47. A field in a table that appears as a match 51. The following variables s, t and u, have
of the primary key in another table is been assigned the values shown.
called a
s=5
(A) foreign key t=6
(B) candidate key u=3
(C) secondary key
(D) composite key Which of the following statements does
NOT evaluate to true?
52. Based on the following algorithm, what 54. The representation of the pseudocode
would be displayed for k? statement “Read number” in a flowchart
symbol is
j=5
k=j
j=j+k
k=i+3
display k
(A) 10
(B) 11
(C) 13
(D) 14
(A) for v = 2 to 5
display v
55. The term used to describe a memory location
whose value changes during program
h=1(B)
execution is
while h < 5
display h
(A) variable
h=h+1
(B) volatile
end while
(C) constant
(D) dynamic
(C) for k = 7 down to 4 step −1
display k
(D) f=6
56. Which of the following are high-level
while f < 3
languages?
display f
f=f–1
I. Pascal
II. COBOL
III. ASSEMBLY
(A) I and II only
(B) I and III only
(C) II and III only
(D) I, II and III
57. Program implementation involves a 59. Errors that occur in a program when the
number of steps. Which of the following rules of the programming languages are
steps is NOT legitimate? NOT obeyed are called
58. Which of the following languages is only 60. Which of the following is an example of a
understood by computers? conditional construct?
END OF TEST
IF YOU FINISH BEFORE TIME IS CALLED, CHECK YOUR WORK ON THIS TEST.
01229010/CSEC/SPEC/2017
Syllabus Syllabus
Question Key Profile Question Key Profile
Objective Objective
1 C 1.4 P1 31 D 3.5 P1
2 B 1.2 P1 32 D 3.5 P1
3 C 1.3 P1 33 A 3.2 P1
4 A 1.5 P1 34 C 3.6 P1
5 C 1.3 P1 35 B 3.6 P1
6 C 1.2 P1 36 D 4.3 P2
7 B 1.6 P1 37 A 4.7 P2
8 A 1.6 P1 38 D 4.9 P2
9 B 1.6 P1 39 B 4.12 P2
10 D 1.9 P1 40 C 4.11 P2
11 D 1.9 P1 41 A 5.2 P2
12 C 1.7 P1 42 D 5.7 P2
13 B 1.8 P1 43 D 5.6 P2
14 B 1.10 P1 44 D 5.2 P2
15 C 1.8 P1 45 C 5.1 P2
16 A 1.11 P1 46 C 6.2 P2
17 C 1.13 P1 47 D 6.2 P2
18 C 1.4 P1 48 A 6.4 P2
19 C 1.14 P1 49 B 6.2 P2
20 B 1.11 P1 50 A 6.2 P2
21 B 2.1 P1 51 A 7.1 P3
22 A 2.4 P1 52 C 7.8 P3
23 D 2.4 P1 53 D 7.8 P3
24 A 2.2 P1 54 C 7.6 P3
25 A 2.3 P1 55 C 7.4 P3
26 A 3.2 P1 56 D 8.3 P3
27 B 3.1 P1 57 B 8.2 P3
28 C 3.2 P1 58 B 8.1 P3
29 C 3.3 P1 59 A 8.3 P3
30 B 3.3 P1 60 B 8.5 P3