CS/JAN2015/CSC134/TEST1
C)
Network
D)Modem
8. A(n) _________ is a socket on the motherboard that can hold an adapter card.
A) peripheral
C) port
B) expansion slot
D) bay
9. Which of the following is NOT a input device?
A) Digital pen
B) microphone
C) speaker
D) scanner
10. _________ is the process of capturing full motion images into a computer and storing
them on storage medium such as a hard disk or DVD.
A) Voice input
C) Audio input
B) Video input
D) Biometric input
11. The primary disadvantage of multifunction peripherals is that _______________.
A)
B)
C)
D)
CONFIDENTIAL
CONFIDENTIAL
CS/JAN2015/CSC134/TEST1
12. Ink-jet printer resolution is measured by the number of _________ a printer can print.
A) pages per minutes (ppm)
C) pixel per inch (ppi)
B) line per minute (lpm)
D) dots per inch (dpi)
13. _________ is the number of bytes a storage medium can hold.
A) Bit depth
C) Capacity
B) Resolution
D) Transfer rate
14. If a read/write head touches the surface of a hard disk, it causes _________.
A) A hard-disk controller crash
C) the data on the disk is scrambled
B) the disk is demagnetized
D) a head crash
15. A (n) ____________ disc can be read, write to, and erased.
CD-ROM
B) CD-R
C) DVD-ROM
D)DVD+RW
16. __________ measures the amount of time it takes a storage device to locate an item on
a storage medium.
A) Latency
B)Tracking
C)Access time
D)Resolution
17. When turning on a computer that has been powered off completely, you are performing a
__________.
A) hot boot
B)reboot
C)warm boot
D)cold boot
18. Which of the following is a program that warns or blocks user from potentially fraudulent
or suspicious web site?
A) Spyware remover
C) pop-up blocker
B) phishing
D) adware remover
19. Below Are the embedded operating system EXCEPT
A) Symbian OS
C) NetWare
B) Palm OS
D) Embedded Linux
20. A _________ restrict access to specified web site.
A) Pop-up blocker
C) Anti-spam program
B) Spyware remover
D) Web filter
PART A
Indicate your answer by shading your choice. Example:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
=A=
=A=
=A=
=A=
=A=
=A=
=A=
=A=
=A=
=A=
=A=
=A=
=A=
=A=
=A=
=A=
=A=
=A=
=A=
=A=
=B=
=B=
=B=
=B=
=B=
=B=
=B=
=B=
=B=
=B=
=C=
=C=
=C=
=C=
=C=
=C=
=C=
=C=
=C=
=C=
=D=
=D=
=D=
=D=
=D=
=D=
=D=
=D=
=D=
=D=
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
=B=
=B=
=B=
=B=
=B=
=B=
=B=
=B=
=B=
=B=
=C=
=C=
=C=
=C=
=C=
=C=
=C=
=C=
=C=
=C=
=D=
=D=
=D=
=D=
=D=
=D=
=D=
=D=
=D=
=D=
CONFIDENTIAL
CONFIDENTIAL
CS/JAN2015/CSC134/TEST1
QUESTION 3
a) Differentiate between impact printer and non impact printer.
(3 marks)
b) Give One (1) example for impact and non impact printer.
(2 marks)
CONFIDENTIAL
CONFIDENTIAL
CS/JAN2015/CSC134/TEST1
QUESTION 4
Briefly describe THREE (3) reasons that encourage users to subscribe a cloud storage
service.
(6 marks)
1.
2.
3.
CONFIDENTIAL