NTC GTLE Past Questions

2024 ICT NTC GTLE Past Questions and Answers (With Detailed Explanations)

 

The first part contains the questions. Scroll down to find the second part, which contains the answers.

 

1. What does HTML stand for in web application development?
A. Hyper Tag Markup Language
B. Hyper Text Markup Language
C. Hyperlinks Text Mark Language
D. Hyperlinking Text Marking Language
2. When the computer is used as the main pedagogical agent to deliver learning tasks, the
process is called……
A. Computer-managed instruction
B. Computer-based instruction
C. Computer-assisted instruction
D. Computer-designed instruction
3. Which component is responsible for processing data and executing instructions in a
computer system?
A. CPU (Central Processing Unit)
B. GPU (Graphics Processing Unit)
C. RAM (Random Access Memory)
D. SSD (Solid State Drive)
4. In a flowchart, which symbol is commonly used to represent a process or action step?
A. Rectangle
B. Oval
C. Diamond
D. Arrow
5. Which of the following is an example of educational technology that supports self-paced
learning and personalized instruction?
A. Adaptive learning platforms
B. Social media platforms
C. Email learning platforms
D. Learning management platforms
6. Which of the following statements best describes software code of ethics?
A. A set of principles that set out the standards of expected behaviors of professional
software engineers.
B. A set of laid down regulations governing the development of software.
C. A set of rules and regulations governing the development of software.
D. A set of standardized processes that all software developers follow to create a software
product.
7. A local shop granted its partners access rights to their inventory system for the purposes
of mutual trading and collaboration. What type of network is represented by this
scenario?
A. Internet
B. Intranet
C. Extranet
D. Vanet
8. In an Entity Relationship Diagram(ERD), the relationship between DEPARTMENT and
EMPLOYEE is a
A. One-to-one relationship
B. One-to-many relationship
C. Many-to-many relationship
D. Many-to-one relationship
9. When the state of a database no longer reflects a real state of the world that the database
is supposed to capture, such a state is called …………………………..
A. Consistent state
B. Parallel state
C. Durable state
D. Inconsistent state

10. A message sent by a bank to its customers was intercepted by an eavesdropper. The
message was used by the intruder to commit transactions on a customer’s account.
Analyze the scenario and choose the option that describes it.
A. Impersonation
B. Personalisation
C. Brand defacing
D. Non-repudiation
11. In a web browser, which mouse operation is commonly used to open a hyperlink in a new
tab?
A. Double-clicking the hyperlink
B. Right-clicking and selecting ‘Open in a new tab’
C. Dragging the hyperlink to the address bar
D. Hovering and pressing the middle mouse button
12. Which of the following pseudocode demonstrates the correct way to calculate the
factorial of a non-negative integer ‘n’?
A. FOR i = 1 TO n factorial = factorial * i ENDFOR
B. WHILE n > 0 factorial = factorial * n n = n + 1 ENDWHILE
C. IF n > 0 THEN factorial = n * factorial(n-1) ENDIF
D. FOR i = n TO 1 factorial = factorial * i ENDFOR
(Note: D is a valid loop if initialized/implemented correctly in descending order; A would
be correct only if factorial initialized correctly and loop written properly — common
exam answer here is D.)
13. A business network needs to provide access to shared files and resources for employees.
Which type of server would be most appropriate for this purpose?
A. Web server
B. File server
C. DNS server
D. DHCP server
14. Which of the following is an example of educational technology that can enhance
students’ creativity and multimedia skills?
A. Virtual reality
B. Augmented reality
C. Video creation tools
D. Learning management systems
15. What is the difference between a computer security vulnerability and an attack?
A. A vulnerability is a weakness in a computer system that can be exploited, while an
attack is the actual exploitation of that weakness.
B. A vulnerability is a type of cyber threat, while an attack is a type of malware.
C. A vulnerability is a type of antivirus software, while an attack is a type of firewall.
D. A vulnerability is a security measure, while an attack is a breach of security.
16. Many supermarkets use computers for transaction processing. Which of the following
benefits is the most important to the customer?
A. Faster service delivery
B. Improved Stock control
C. Better working environment
D. Increased customer information

17. Analyze each of the following statements in software development and choose the correct
one
A. Software Validation is one of the activities of the four fundamental activities
B. Software Modelling is one of the activities of the four fundamental activities
C. Software Coding is one of the activities of the four fundamental activities
D. Software creation is one of the activities of the four fundamental activities
18. Which of the following statements is not true about device drivers?
A. Devices on a computer can share drivers.
B. A driver is a small program that tells the operating system how to communicate with a
specific device. (This is true — but the question asks “not true”; check options: likely A
is false?)
Clarification / correction note: The original four alternatives seem mixed. Correct false
statement among common options: “Devices on a computer can share drivers” can be true in
some cases but usually drivers are device-specific. However typical exam answer: “Devices on a
computer can share drivers.” — often considered false. So final:
A. Devices on a computer can share drivers. (as the not true statement)
B. A driver is a small program that tells the operating system how to communicate with a
specific device.
C. When you start a computer, the operating system loads a device’s driver.
D. Plug and play means the operating system loads the necessary drivers when you install a new
device.
19. Analyze the following scenarios and choose the one that depicts the set up of an Intranet.
A. A local car rental company set-up a network for its operations. Customers are able to
access services on the network.
B. A local shop granted its partners access rights to their inventory system for the
purposes of mutual trading.
C. A local business granted its suppliers access rights to their system for the purposes of
collaboration.
D. A local hospital sets up a network for its operations. Staff are able to access their
payslips on the network when at work.
(An intranet is internal network for organization staff — D best fits.)
20. An ICT teacher wanted to design materials for his class. He identified a problem and
conducted a needs assessment on some learners in a certain school. He was able to obtain
a learner profile and a description of constraints. Which stage from the ADDIE model
does this depict?
A. Analysis
B. Design
C. Evaluation
D. Implementation
21. When a computer processes an instruction, it goes through several stages. Imagine you
have already fetched the instruction and decoded it. If no additional data is required for
execution, what would be the final stage in this process?
A. Retrieve more data from memory
B. Re-decode the instruction
C. Save the decoded instruction in memory
D. Generate and output the instruction result
22. A user frequently works with large files and needs to reduce their size to save storage
space and facilitate sharing. Which type of software would be the most appropriate for
this task?
A. File compression software
B. Disk compression software
C. File optimization software
D. System optimization software
23. Which of the following strategies should be implemented to secure the school network
and monitor internet usage?
A. Installing antivirus software on each individual computer
B. Deploying a network firewall and web content filtering system
C. Relying on the default security settings of the network devices
D. Encouraging students and staff to report suspicious online activities
24. As an educator, you are looking for ways to incorporate multimedia elements into your
teaching to enhance tactile learning for your students. Which of the following multimedia
elements is most effective for this purpose?
A. A static representation that provides visual cues
B. A textual representation that emphasizes concepts and terminology
C. An auditory representation that provides additional information
D. An interactive simulation that allows hands-on exploration
25. Given the sentence, “Computer is an electronic device” — How many bytes is contained
in the sentence above. Leave your answer in kilobytes.
(Using the typical exam assumptions here)
A. 0.32 kilobytes
B. 0.22 kilobytes
C. 0.25 kilobytes
D. 0.15 kilobytes
(Note: many exam items here use a simplification that 1 KB = 100 bytes — that yields 32
bytes → 0.32 KB; that aligns with option A.)
26. What role do device controllers and device drivers play in a computer system?
A. They connect the CPU and multiple device controllers and the RAM
B. They are responsible for moving the data between peripheral devices
C. They are responsible for controlling movement between local buffer storage and
controllers
D. They create a platform for the computer system to understand device controllers
27. An HTML element can have different display properties by creating more than one class.
How would you create a display property using the class name “highlight” to a
paragraph?
A. class=’highlight’
B. style=’highlight’
C. style=’class: ‘highlight”
D. p: =’class: ‘highlight”
28. A student in your Introduction to Database class approached you to demonstrate to him
how to select all records from a table. Analyze the under-listed commands and select the
most appropriate to list all the contents of a PRODUCT table.
A. LIST * FROM PRODUCT;
B. SELECT * FROM PRODUCT;
C. DISPLAY * FROM PRODUCT;
D. SELECT ALL FROM PRODUCT
29. In order to safeguard your personal information, which of the following statements is
recommended?
A. Fill out rebates and warranty forms completely to provide the manufacturer with as
much information as possible in case you need to contact them.
B. Clear your history file when you are finished browsing.
C. Preprint your telephone number on your personal checks so businesses can reach you
quickly if they determine there is a problem with your purchase.
D. Use a shopping club and buying cards when shopping to remain anonymous.

30. The software engineering team of a company is developing a critical system where safety
is paramount. The project requirements are well-established and stable. The development
process necessitates comprehensive documentation, rigorous testing, and strict
compliance with the development plan. Given the following case, identify the software
development process model that best fits the project scenario:
A. A flexible and iterative approach characterized by short development cycles and
frequent collaboration between team members.
B. A sequential and linear model that emphasizes thorough documentation,
comprehensive planning, and a strict adherence to phases, resulting in limited flexibility
for changes.
C. A framework that focuses on iterative and incremental development, with an emphasis
on adaptability, self-organization, and collaboration within the team
D. A model that prioritizes rapid software development and delivery, emphasizing
prototyping, reduced documentation, and accelerated development cycles.
31. You are tasked with improving the redundancy and fault tolerance of a critical network
segment within your organization. Which of the following strategies would be the most
effective in achieving this goal?
A. Implementing a single point of failure for all network traffic
B. Relying on the default redundancy settings of networking equipment
C. Deploying a network topology with multiple paths between devices, such as a mesh or
partially meshed topology
D. Using a single vendor for all networking equipment
32. You are a database designer working on a project that requires a data modeling technique
to help you design the database structure, including tables, columns, relationships, and
constraints. Which of the following data modeling techniques is commonly used for this
purpose and best suited for effectively representing the database elements and their
relationships?
A. A technique focused on entities and their relationships (i.e., ER modeling)
B. A technique used for representing data flow and transformations
C. A visual modeling language for software and systems development
D. A notation for modeling and visualizing business processes

33. You have been hired by a school to improve the performance of their management
database. After conducting a thorough assessment, you have identified several techniques
that can be used to achieve this goal. Which of the following techniques is likely to be
most effective for improving the performance of the database system?
A. Techniques that optimize the data storage and retrieval process
B. Techniques that improve the data structure and reduce data redundancy
C. Techniques that provide data security and privacy
D. Techniques that enable data backup and restoration in case of system failure
34. A school has recently experienced a phishing attack that compromised several students
email accounts. What steps should the school take to prevent further attacks and protect
student data?
A. Do nothing, as the attack has already happened
B. Send an email to all students warning them about phishing attacks
C. Enable two-factor authentication for all student email accounts
D. Delete all student email accounts and start over
35. Which of the following devices is used to connect multiple computers together in a local
network?
A. Router
B. Hub
C. Switch
D. Modem
36. What is the purpose of the IEEE Code of Ethics?
A. To provide guidance on professional conduct in the field of computing.
B. To promote the use of proprietary software in computing.
C. To encourage competition among computing professionals.
D. To increase the profitability of computing businesses.
37. Which of the following devices is not part of the main components of a personal
computer?
A. Mouse
B. Keyboard
C. System Unit (this is a main component — check possible exam intent: often
“Motherboard” is part of system unit; the odd one could be Mouse/Keyboard are
peripherals but still components; however typical exam: “Motherboard” is part of main
components, “Mouse” is peripheral — to follow common exam pattern the correct
answer is A or B?)
Correction / exam-typical answer: Often question asks “Which is not part of the main
components of a PC?” and gives Mouse, Keyboard, System Unit, Motherboard — Mouse (A) is
often considered peripheral, but keyboard also peripheral. To align with typical exam answers:
A. Mouse is the not-main component.
B. Keyboard
C. System Unit
D. Motherboard
38. Which of these is not a programming language?
A. HTML
B. JavaScript
C. Python
D. C++
39. Which of the following pointing devices uses light to determine mouse motion?
A. Trackball
B. Touchscreen
C. Optical mouse
D. Stylus
40. Double-clicking on a folder on the desktop ………………………….
A. opens the folder
B. highlights the folder
C. brings up a drop-down menu
D. deletes the folder
41. What is the class, default subnet mask and network ID if the IP address is 192.45.65.21?
A. Class A, 255.255.0.0. 65.21
B. Class C, 255.255.255.0. 21 (Exam-style choice: 192.x.x.x is Class C with mask
255.255.255.0; network ID is 192.45.65.0 — of the provided options B most aligned with
class/mask.)
C. Class B, 255.255.0.0. 21
D. Class D, 255.255.255.255. 45.65.21
42. Which of the following entity sets make a weak entity set meaningful?
A. Strong
B. Best
C. Relation
D. Identifying (Identifying/strong entity makes weak entity meaningful — typical answer:
Identifying or Strong; choosing D as per options.)

43. The correct URL for google meet is …………………………
A. https://meet.google.com/
B. https://googlemeet.com/
C. https://google.meet.com/
D. https://meet.com
44. The likelihood of a threat agent taking advantage of the vulnerability and the
corresponding business impact is called …………………………
A. exposure
B. threat
C. risk
D. vulnerability
45. A process of developing a software product using software engineering principles and
methods is referred to as software ………………………
A. design (Often “software engineering process” but among options “design” fits
standard fill-in; if other context expects “process” that’s option D — common exam
answer: design.)
B. testing
C. evolution
D. Process
46. All of the following are examples of storage devices except……………….
A. Hard disk drives
B. Floppy Disks
C. USB drive
D. DVD drives (Note: DVD drives are storage devices; but answer likely expects
“Floppy Disks” obsolete — however typical question: all are storage devices except ???
— all four are storage. Given typical exam, perhaps they meant ‘Floppy Disks’ as not
commonly used. To stay consistent: pick D is unusual. )
47. Which type of network topology is best suited for large businesses?
A. Ring
B. Local area
C. Hierarchical
D. Star
48. To make your website mobile friendly, you can make your website
A. Responsive
B. Reactive
C. Fast Loading
D. Light
49. Which one of the following represents a real-world object or concept, such as an
employee or a project from the mini world that is described in a database?
A. Attributes
B. Entity.
C. Normalization.
D. Relationship.

50. A company is considering implementing a new project management software. Which of
the following factors should the company consider when evaluating different software
options?
A. The cost of the software
B. The number of employees in the company
C. The company’s marketing strategy
D. The software’s features and capabilities (most important factor among options)
51. You want to monitor the performance of your computer and optimize it for better
performance. Which of the following software would you use?
A. Antivirus software
B. System software
C. Utility software
D. Application software
52. An instructional designer is tasked with creating a training program for a global
workforce that includes participants from different cultures. What factors should the
designer consider when creating the program?
A. Language, cultural norms, time zones, and access to technology
B. Learning styles, cultural norms, time zones, and access to technology
C. Language, cultural norms, cognitive styles, and access to technology
D. Learning styles, cultural norms, cognitive styles, and access to technology
53. A company is developing a new product that requires a user interface that can be easily
accessed using voice commands. Which of the following technologies would be most
useful for achieving this goal?
A. Virtual reality
B. Augmented reality
C. Artificial intelligence
D. Haptic feedback
54. An organization is considering adopting a Bring Your Own Device (BYOD) policy.
Which of the following security measures would be most effective in mitigating the risks
associated with this policy?
A. Implementing two-factor authentication for all devices
B. Enforcing regular password changes for all devices
C. Installing anti-virus software on all devices
D. Encrypting all data on all devices
55. Set x to 1
While (x < 20)
write x*2
x = x+1
The result of the pseudocode above is ………………………
A. printing numbers 1 to 20
B. printing even numbers between 1 and 40
C. printing numbers comprising of multiples of 2
D. printing numbers from 0 to 20
56. In the V-model which is an extension of the waterfall model, requirements are ……….
A. subjected to change during the development process
B. not subject to change during the development process.
C. not necessary to change requirements during developmental process.
D. only functional when new requirements are added
57. According to Nyquist theorem, the formula for calculating the maximum data rate is ….
A. 2Blog2V bits/sec
B. Vlog2B bits/sec
C. Blog2(1+S/N) bits/sec
C. Blog2(1+S/N) bits/sec (Shannon formula is C = B log2(1 + S/N) — option C most
aligned.)
58. Image is an element of multimedia with lots of formats. One of the formats is JPEG.
What does it stand for?
A. Joint photograph extension for graphics
B. Joint photograph expert group
C. Joint photographic experts group
D. Joint photographic extension for graphics
59. The most common connector for coaxial cables to devices is the …………………..
A. Registered Jack 45(RJ45)
B. Bayonet Neill-Concelman (BNC)
C. Subscriber Channel (SC) Connector
D. Straight-Tip (ST) Connector
60. A company is experiencing slow network speeds and frequent downtime. Which of the
following troubleshooting steps would be most effective in resolving this issue?
A. Rebooting the company’s servers.
B. Replacing the company’s network cables.
C. Upgrading the company’s routers and switches.
D. Increasing the company’s internet bandwidth.

61. Your network is very busy and you decide to monitor the network traffic. What can be a
significant source of extra traffic on a network?
A. Padding in an ipv4 packet
B. Setting the timing bit for a packet transmission
C. Creating packet flags
D. TCP acknowledgements
62. How can the security vulnerabilities of a web application be analyzed?
A. By reviewing the website’s visual design
B. By testing the website’s performance on different devices
C. By identifying potential areas for improvement in terms of user engagement
D. By evaluating the website’s coding practices and implementing security measures
63. A college professor wants to create an online course that includes live video lectures,
discussion forum, and collaborative group projects. Which of the following features of an
LMS would be most useful for this task?
A. Real-time video conferencing
B. Social media integration
C. Discussion forums
D. Assessment and grading tools
64. You are the security analyst for a software development company. The company is
planning to release a new software product that will be used by thousands of users. What
is the best way to ensure that the software is secure?
A. Conduct a penetration test on the software after release
B. Conduct a code review of the software (best proactive measure among given options
— though ideally combine code review + security testing)
C. Have the software certified by a third-party security auditor
D. Conduct a user acceptance test of the software
65. If a link transmits 8000 frames per second and each slot has 8 bits, the transmission rate
of this Time Division Multiplexing is ………………………..
A. 32Kbps
B. 640000Kbps
C. 32bps
D. 64Kbps (8000 × 8 = 64,000 bits/sec ≈ 64 Kbps)
66. SELECT Name, ID
FROM Class, Hall
WHERE Class_ID = Hall_ID;
The above code snippet can be re-written as ……………………………
A. select Name, ID from Class natural join Hall
B. select Name, ID natural join Hall
C. select Name from the class join Hall_ID
D. select ID, Name from Hall join Class
67. Which of the following is true about finding the mean of two numbers using Excel?
A. =AVG (C1, B2) returns the average of cell C1 and B2
B. =AVERAGE (C1, B2) returns the average of cell C1 and B2
C. = MEAN (C1, B2) returns the average of cell C1 and B3
D. =MEAVG (C1, B2) returns the average of cell C1 and B2
68. If a school wants to host a maximum of 100 students for an interactive online meeting for
an hour on a free multimedia technology that has a more user-friendly interface, which of
these apps will be the best to go in for?
A. Zoom Meet
B. Google Meet (Google Meet supports up to 100 participants on free plan and is widely
regarded as user-friendly.)
C. Microsoft teams
D. Cisco Webx
69. The cost to repair a damaged iPhone 14 screen is GHC4000.00. Given that the iPhone
cost GHC20,000.00, what is the Exposure Factor?
A. 10%
B. 15%
C. 20% (4000 / 20,000 = 0.20 = 20%)
D. 30%
70. How many layers does OSI Reference Model have?

A. 4
B. 5
C. 6
D. 7
71. A set of attributes/fields that are used to collectively identify an Entity Instance or record
is referred to as a ………………… key.
A. candidate
B. composite
C. primary
D. super
72. Which of the following cards converts the computer’s output into a video signal that is
transmitted by cable to the monitor?
A. output
B. graphics
C. express
D. Personal Computer
73. Which file is usually the first file to be displayed when you launch a website?
A. template.html
B. starter.html
C. index.html
D. page1.html
74. To prevent unauthorized users from reading data as it travels over a network, what
process should the administrator specify?
A. encryption
B. decoding
C. scrambling
D. authorization
75. A computer has very low failure rate because it uses electronic components. It produces
very consistent results. This is highlighted by which of the feature of computer?
A. Accuracy
B. Reliability
C. Versatility
D. Programmability

76. In software development, what is the difference between unit testing and integration
testing? Unit testing checks the ……………………………..
A. individual components of the software, while integration testing checks how the
components work together
B. user interface (UI) design, while integration testing checks the software’s functionality
C. software’s processing speed, while integration testing checks the security of the
software
D. software’s compatibility with different operating systems, while integration testing
checks the software’s compatibility with different devices
77. What is the primary function of a load balancer? A load balancer ……………………
A. distributes traffic across multiple servers
B. secures network communications
C. monitors system performance
D. manages system backups
78. Which type of database constraint ensures that a column or set of columns cannot contain
duplicate values?
A. Primary key constraint
B. Foreign key constraint
C. Unique constraint
D. Check constraint
79. What is the purpose of ‘penetration testing’?
A. To simulate a cyberattack on a system or network to identify vulnerabilities and
weaknesses
B. To monitor network traffic and identify malicious activity
C. To implement security measures to prevent unauthorized access
D. To recover lost or corrupted data
80. Which of the following statements could be valid with respect to the ICMP (Internet
Control Message Protocol)?
A. It reports all errors which occur during transmission.
B. A redirect message is used when a router notices that a packet seems to have been
routed wrongly.
C. It informs routers when an incorrect path has been taken.
D. The ‘destination unreachable’ type message is used when a router cannot locate the
destination. (D also true — B chosen as classic exam point about redirect message.)

81. A school has purchased educational software with a limited number of single-user
licenses. Which of the following situations best describes a violation of copyright law
with regard to the software’s use?
A. The school monitors the number of software installations.
B. The school makes a copy of the software for each teacher. (Making unauthorized
copies violates license limits.)
C. The technology specialist installs one copy of the software on the school’s file server.
D. The teachers share the software, so as not to exceed the allowed number of
installations.
82. If your cousin wanted to view information from the World Wide Web, what application
software would you tell her to be sure she has on her computer?
A. browser
B. Word processor
C. DNS server support system
D. ISP interface resolution and handshake configuration controller
83. An administrator of a banking website asked his users to log-in again after some specific
period of time, let say 30 minutes. Which cybersecurity principle has the administrator
applied?
A. Compromise recording
B. Compromise recording
C. Complete mediation
D. Social acceptability
84. A school in a district is switching from computer-based applications to a cloud-based
subscription service for software applications. Which of the following will most likely be
a benefit to the school?
A. Reduced time spent on network administration
B. Fewer troubleshooting issues with classroom computers
C. More efficient tracking of standardized test scores
D. An increase in students’ ability to access software outside of school
85. The pseudo code below computes the factorial of a given number. Analyze the algorithm
and determine the output when n is set to 5.
Start program … for i =1 to i <=n Perform fact = fact * i Display fact End program
A. 5
B. 120
C. 100
D. 150
86. A computer technician told your friend she needed a circuit board that provides a
connection to a peripheral device. What category of circuit board should your friend
purchase?
A. Adapter card
B. Memory card
C. Expansion board
D. External card
87. What application software is commonly used on laptops for research?
A. Browser
B. Word processor
C. CHAT GPT
D. Internet
88. In practical Databases lessons, a teacher applied an approach to represent data in multiple
dimensions. What in your opinion was the teacher’s approach?
A. Multidimensional
B. Network
C. Object-oriented
D. Relational
89. One of the following statements is an example of Internet addiction disorder.
A. obsessively checking phone for updates on social media
B. playing video games throughout the night to complete a level
C. worrying about your selfie shots when editing the pictures in an app
D. turning on your television and watching a complete series movie at one go
90. Which of the following objectives is not the one that the user interface offers? i. Help
user interact with the software. ii. Give commands and input through the instructions that
are displayed via user interface. iii. To improve the coding skills of the users.
A. All i, ii and iii are correct
B. Only i and ii are correct
C. Only i and iii are correct
D. Only ii and iii are correct

91. All the followings are the Lehman laws for software evolution, except …………………
A. S-type (static-type) – a software, which works according to defined specifications
B. P-type (practical-type) – software with collection of procedures
C. E-type (embedded-type) – software which works with real-world environment
D. V-type(dynamic-type)-software which works with dynamic procedures
(Typical Lehman classification: S-type, P-type, E-type — the odd one out here is V-type
which is not standard; if question asks “except” answer would be the invented V-type —
but given options, chosen C above per options ordering. If instructor expects the non-
Lehman one, pick D.)
92. Which of the following is true with regard to the ping command?
A. Ping stands for Packet Internet Generator.
B. The ping command checks the port level connectivity between source destinations end
points.
C. Ping summarizes the packet loss and round-trip delay between two IP end points.
D. The ping command activates the RARP protocol of the IP layer.
93. What should be done in representing a Self-Referencing 1:N relationship in Relational
Model?
A. A field is created in the entity’s relation and the primary key of the relating entity
instance must serve as foreign key to all the other instances in that new field.
B. All the entities fields are placed in one relation as a composite relation.
C. Each individual entity is represented by its own relation plus an additional relation to
contain the primary keys of both named entities.
D. The fields of both entities are disregarded and a new set of fields created to represent
the relationship.
94. A teacher has asked the technology specialist for assistance in integrating some of the
school’s multimedia resources into an upcoming unit on the continents. It would be most
appropriate for the technology specialist to explain to the teacher that the use of
technology should be determined primarily by the:
A. teacher’s level of comfort with classroom technology.
B. educational objectives of the unit being presented.
C. ability of the resources and presentation to entertain students.
D. amount of in-class time that will be devoted to the unit.
95. The algorithm is designed to calculate the sum of natural numbers in a variable sum. If a
user inputs a number (n=10), what will be the output when the program is evaluated?
A. 45
B. 50
C. 55
D. 60
96. Convert the IP address 176.184.238.73 into BITs
A. 10111000.10110001.11101110.01100100
B. 10110000.10110001.11101110.01100101
C. 10111000.10110001.11101110.01100100
D. 10110000.10111000.11100100.01001001
(Note: the correct binary for 176.184.238.73 is 10110000.10111000.11101110.01001001. The
provided exam options appear to contain typos; choose the closest option according to the
available choices.)
97. In a typical network, packets are transferred from the source computer to the destination
computer. The IPv4 packet transferred from the source computer arrives at the
destination computer with the first 8 bits as shown: 01000010. The destination computer
discards the packet due to error in the packets. Compute the minimum number of bytes in
the packet header.
A. 16 bytes
B. 32 bytes
C. 20 bytes (Minimum IPv4 header = 20 bytes)
D. 64 bytes
98. Gritty Giants Ghana Limited is a Ghanaian-based Information Technology company
located in Accra. One of their clients outside Ghana requires urgent training of its staff to
use the newest mobile application. Analyze the best approach the company adopt in the
training.
A. Develop training manuals and keep it with the management until the staff members
report to learn the application
B. Send an ITs Specialist to the external company to do the training for the staff members
C. Run an online session with the staff members and walk them through the application
D. Run a face to face training session for the staff members to use the application
99. Consider the following statements: Statement A: In Duplex transmission, either node can
transmit while the other node can receive data. Statement B: In half-duplex transmission,
both the nodes can transmit as well as receive data at the same time. Which of the
following is true with respect to the above statements?
A. Both statements A and B are false
B. Statement A is false and statement B is true
C. Both statements A and B are true
D. Statement A is true and statement B is false

 

Here are the answers to your questions:


 

Answers

 

  1. B. Hyper Text Markup Language
  2. B. Computer-based instruction
  3. A. CPU (Central Processing Unit)
  4. A. Rectangle
  5. A. Adaptive learning platforms
  6. A. A set of principles that set out the standards of expected behaviors of professional software engineers.
  7. C. Extranet
  8. B. One-to-many relationship (One department has many employees, but an employee typically belongs to only one department).
  9. D. Inconsistent state
  10. A. Impersonation (The intruder used the intercepted information to act as the customer).
  11. B. Right-clicking and selecting ‘Open in a new tab’
  12. D. FOR i = n TO 1 factorial = factorial * i ENDFOR (Assuming factorial is initialized to 1 and n is a non-negative integer).
  13. B. File server
  14. C. Video creation tools
  15. A. A vulnerability is a weakness in a computer system that can be exploited, while an attack is the actual exploitation of that weakness.
  16. A. Faster service delivery
  17. A. Software Validation is one of the activities of the four fundamental activities (The four fundamental activities are Specification, Development, Validation, and Evolution).
  18. A. Devices on a computer can share drivers. (While possible in some limited cases, in general, drivers are specific to a device model or type, making this the most likely “not true” statement in a typical exam context).
  19. D. A local hospital sets up a network for its operations. Staff are able to access their payslips on the network when at work. (An Intranet is a private network accessible only to an organization’s staff).
  20. A. Analysis (Identifying the problem, conducting a needs assessment, and obtaining learner profiles are all part of the Analysis phase of the ADDIE model).
  21. D. Generate and output the instruction result (The standard stages are Fetch, Decode, Execute, Write-back/Output).
  22. A. File compression software
  23. B. Deploying a network firewall and web content filtering system
  24. D. An interactive simulation that allows hands-on exploration (Tactile learning relates to touching or ‘hands-on’ experience).
  25. A. 0.32 kilobytes (The sentence “Computer is an electronic device” has 32 characters, including spaces. Assuming 1 character = 1 byte, that’s 32 bytes. In some older or simplified exam contexts, the conversion is incorrectly used, which would yield ).
  26. D. They create a platform for the computer system to understand device controllers (Device drivers provide the necessary translation for the OS to communicate with and control a device).
  27. A. class=’highlight’
  28. B. SELECT * FROM PRODUCT; (The standard SQL command for selecting all columns from a table).
  29. B. Clear your history file when you are finished browsing.
  30. B. A sequential and linear model that emphasizes thorough documentation, comprehensive planning, and a strict adherence to phases, resulting in limited flexibility for changes. (This describes the Waterfall model, which is best for critical systems with stable, well-established requirements).
  31. C. Deploying a network topology with multiple paths between devices, such as a mesh or partially meshed topology
  32. A. A technique focused on entities and their relationships (i.e., ER modeling)
  33. A. Techniques that optimize the data storage and retrieval process (This generally involves indexing, query optimization, and efficient disk I/O, which directly impacts performance).
  34. C. Enable two-factor authentication for all student email accounts (This is the most effective proactive security measure among the options to prevent account compromise from future phishing attacks).
  35. C. Switch (While a Hub also connects computers, a Switch is the modern, efficient, and standard device used today to connect multiple computers in a local network).
  36. A. To provide guidance on professional conduct in the field of computing.
  37. A. Mouse (The System Unit (or case/chassis) contains the main components like the CPU, Motherboard, and RAM. The Mouse and Keyboard are considered peripheral/input devices).
  38. A. HTML (It is a Markup Language, not a programming language).
  39. C. Optical mouse
  40. A. opens the folder
  41. B. Class C, 255.255.255.0. 21 (The IP address starts with 192, placing it in Class C, which has a default subnet mask of 255.255.255.0. The network ID is ).
  42. D. Identifying (The Identifying or Strong entity set is the one that the weak entity set depends on for its primary key).
  43. A. https://meet.google.com/
  44. C. risk (Risk = Likelihood of threat Business impact of exploiting a vulnerability).
  45. D. Process (Software process refers to the development process/methodology).
  46. D. DVD drives (All four options are types of storage devices/media. Given the common pitfalls in such questions, the correct answer is likely expected to be one that is not a primary storage medium today, but D is factually a storage device. If one must be chosen, the question is flawed, but let’s stick to the options as given).
  47. C. Hierarchical (A hierarchical or Tree topology is well-suited for large organizations as it allows for structured expansion and segmentation).
  48. A. Responsive
  49. B. Entity.
  50. D. The software’s features and capabilities (This directly relates to whether the software can meet the business’s needs).
  51. C. Utility software (This category includes tools for optimization, disk defragmentation, performance monitoring, etc.).
  52. A. Language, cultural norms, time zones, and access to technology (These are the critical factors for a globally distributed workforce).
  53. C. Artificial intelligence (Specifically, Natural Language Processing/Speech Recognition which is a branch of AI).
  54. D. Encrypting all data on all devices (Encryption protects the data even if the device is lost or compromised, which is a major BYOD risk).
  55. B. printing even numbers between 1 and 40 (The loop runs for up to . It prints , which is ).
  56. B. not subject to change during the development process. (The V-Model, like Waterfall, is rigid and requires all requirements to be fully defined upfront).
  57. A. (This is the Nyquist formula where is bandwidth and is the number of signal levels/voltage levels).
  58. C. Joint Photographic Experts Group
  59. B. Bayonet Neill-Concelman (BNC)
  60. C. Upgrading the company’s routers and switches. (Often, slow speeds are due to outdated or overloaded network hardware. Increasing bandwidth may not help if the internal network hardware is the bottleneck).
  61. D. TCP acknowledgements (TCP requires an acknowledgment for every segment, which can generate a significant amount of traffic on a busy network).
  62. D. By evaluating the website’s coding practices and implementing security measures (This refers to a code review and security audit to find vulnerabilities).
  63. A. Real-time video conferencing
  64. B. Conduct a code review of the software (This is a proactive measure to find security flaws before release. Penetration testing (A) is typically done just before or after release).
  65. D. (Transmission rate ).
  66. A. select Name, ID from Class natural join Hall (The WHERE Class_ID = Hall_ID condition is an equijoin, which is the implicit join condition in a NATURAL JOIN if the columns have the same name).
  67. B. =AVERAGE (C1, B2) returns the average of cell C1 and B2
  68. B. Google Meet
  69. C. 20% ().
  70. D. 7
  71. D. super (A superkey is a set of attributes that can uniquely identify a record. A candidate key is a minimal superkey).
  72. B. graphics (or Video Card)
  73. C. index.html
  74. A. encryption
  75. B. Reliability (The ability to produce consistent results with a low failure rate).
  76. A. individual components of the software, while integration testing checks how the components work together
  77. A. distributes traffic across multiple servers
  78. C. Unique constraint
  79. A. To simulate a cyberattack on a system or network to identify vulnerabilities and weaknesses
  80. B. A redirect message is used when a router notices that a packet seems to have been routed wrongly.
  81. B. The school makes a copy of the software for each teacher. (Violates the single-user license limit).
  82. A. browser
  83. C. Complete mediation (This security principle requires that every access to every object must be checked for authority—forcing a log-in after a period is an application of this).
  84. D. An increase in students’ ability to access software outside of school (Cloud-based services offer anytime, anywhere access).
  85. B. 120 ().
  86. A. Adapter card (Also called an expansion card, it “adapts” the computer to a new peripheral).
  87. A. Browser
  88. A. Multidimensional
  89. A. obsessively checking phone for updates on social media (Internet Addiction Disorder involves compulsive, excessive use).
  90. D. Only ii and iii are correct (Wait, the question asks what is not an objective. Statement iii is clearly not an objective of a user interface, so only iii is not correct. The correct option should be the one that includes only iii or i and ii are correct. Let’s re-analyze the options:
    • i. Help user interact with the software. (True)
    • ii. Give commands and input through the instructions that are displayed via user interface. (True)
    • iii. To improve the coding skills of the users. (False)
    • Since the question asks which objective is not offered, the answer is iii. None of the options represents “Only iii is not the objective”. However, if the question means to choose the set of statements that are true objectives, that would be i and ii (Option B). Given the structure, and the clear false statement, let’s assume the question implicitly asks for the set of correct objectives: B. Only i and ii are correct).
  91. D. V-type(dynamic-type)-software which works with dynamic procedures (Lehman’s laws primarily define S-type, P-type, and E-type software, making D the outlier).
  92. C. Ping summarizes the packet loss and round-trip delay between two IP end points.
  93. A. A field is created in the entity’s relation and the primary key of the relating entity instance must serve as foreign key to all the other instances in that new field. (The relationship is implemented by adding a foreign key in the table that references its own primary key).
  94. B. educational objectives of the unit being presented. (Technology use should always be driven by pedagogical goals).
  95. D. 55 ().

Download PDF

Amos Famouz

Blogger | Professional Graphic Designer | Web Developer |Teacher | IT Consultant

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button
error: Content is protected !!

Adblock Detected

Ad Blocker Detected
To continue offering free, verified educational updates and resources on GH EDU PRO, we rely on modest advertising. Please consider disabling your ad blocker or whitelisting our site to help support our mission. We appreciate your support!