Kramizo
Log inSign up free
CXC CSEC·💻 Information Technology

CXC CSEC Information Technology — Paper 1 (Multiple Choice)

75 minutes📊 60 marks📄 Paper 1 (Multiple Choice)
📚 Subject revision notes↩ All exam papers
ℹ️ About this paper: This is an exam-board-aligned practice paper written in the style of CXC CSEC — not an official past paper. Use it for timed practice, then check against the mark scheme included below. For official past papers, see the exam board's website.
00:00of 75:00

CXC CSEC Information Technology — Paper 1 (Multiple Choice)

Total marks: 60 · Duration: 75 minutes

Instructions to candidates

  • Answer ALL questions.
  • Each question is worth ONE mark.
  • For each question, there are four possible answers A, B, C and D. Choose the ONE you consider correct and record your choice in soft (HB or B) pencil on the Multiple Choice Answer Sheet provided.
  • If you need to change your answer, erase it completely before filling in your new choice.
  • Do ALL rough work in this booklet.
  • Calculators may be used but must be silent and non-programmable.

Paper

Section A — Multiple Choice (60 marks)

1. Which of the following is an example of volatile memory?

A) Hard Disk Drive
B) Random Access Memory (RAM)
C) Read Only Memory (ROM)
D) Solid State Drive

2. A company in Jamaica wishes to protect its customer database from unauthorized access. Which security measure would be MOST effective?

A) Installing antivirus software
B) Using data encryption
C) Creating regular backups
D) Using a firewall

3. Which data type would be MOST appropriate for storing a telephone number in a database?

A) Number
B) Currency
C) Text
D) Date/Time

4. The process of converting analogue data into digital format is called:

A) Modulation
B) Digitization
C) Synchronization
D) Compression

5. Which of the following file extensions indicates a compressed file format?

A) .docx
B) .xlsx
C) .zip
D) .exe

6. In a spreadsheet, the formula =SUM(A1:A10) performs which operation?

A) Multiplies the values in cells A1 through A10
B) Finds the average of cells A1 through A10
C) Adds the values in cells A1 through A10
D) Counts the number of cells from A1 to A10

7. Which protocol is used for sending email messages?

A) HTTP
B) FTP
C) SMTP
D) POP3

8. A school in Trinidad needs to connect 50 computers within one building. Which network type is MOST suitable?

A) Personal Area Network (PAN)
B) Local Area Network (LAN)
C) Metropolitan Area Network (MAN)
D) Wide Area Network (WAN)

9. Which of the following is an example of system software?

A) Microsoft Word
B) Adobe Photoshop
C) Windows 10
D) Google Chrome

10. The practice of sending fraudulent emails to trick users into revealing personal information is known as:

A) Hacking
B) Phishing
C) Spoofing
D) Spamming

11. In database design, a primary key is used to:

A) Sort records in ascending order
B) Link two tables together
C) Uniquely identify each record in a table
D) Encrypt sensitive data

12. Which input device would be MOST suitable for capturing three-dimensional objects for computer-aided design?

A) Scanner
B) Digital camera
C) Graphics tablet
D) 3D scanner

13. A company backs up its data every Friday at 5:00 PM. This is an example of:

A) Full backup
B) Incremental backup
C) Scheduled backup
D) Cloud backup

14. Which of the following represents one billion bytes?

A) Megabyte (MB)
B) Gigabyte (GB)
C) Terabyte (TB)
D) Kilobyte (KB)

15. In HTML, which tag is used to create a hyperlink?

A) <link>
B) <a>
C) <href>
D) <url>

16. The Copyright Act protects:

A) Company logos and trademarks only
B) Physical property and real estate
C) Original literary, artistic and musical works
D) Domain names and websites

17. Which topology connects all devices to a central hub or switch?

A) Bus topology
B) Ring topology
C) Star topology
D) Mesh topology

18. A hospital in Barbados stores patient records electronically. Which legislation PRIMARILY governs how this data must be handled?

A) Copyright legislation
B) Data protection legislation
C) Computer misuse legislation
D) Patent legislation

19. Which number system uses only the digits 0 and 1?

A) Decimal
B) Hexadecimal
C) Octal
D) Binary

20. In a relational database, a foreign key is used to:

A) Prevent duplicate records
B) Establish a relationship between two tables
C) Speed up query processing
D) Compress data for storage

21. Which of the following is a characteristic of e-commerce?

A) Transactions conducted only during business hours
B) Requires physical presence of buyer and seller
C) Enables 24-hour online buying and selling
D) Uses only credit card payments

22. The process of identifying and correcting errors in a program is called:

A) Compiling
B) Debugging
C) Executing
D) Interpreting

23. Which device is used to connect a LAN to the Internet?

A) Switch
B) Hub
C) Router
D) Repeater

24. When creating a website, which language is used to define the structure and content?

A) CSS
B) JavaScript
C) HTML
D) Python

25. A binary number 1010 is equivalent to which decimal number?

A) 8
B) 10
C) 12
D) 16

26. Which of the following is an advantage of using electronic mail over traditional postal mail?

A) More secure delivery
B) Faster transmission of messages
C) Does not require electricity
D) Guaranteed delivery confirmation

27. In a database table storing information about students, which field would be MOST suitable as a primary key?

A) First Name
B) Date of Birth
C) Student ID
D) Address

28. Malware that replicates itself and spreads to other computers without human intervention is called a:

A) Virus
B) Worm
C) Trojan horse
D) Spyware

29. Which type of software license allows users to try software before purchasing?

A) Freeware
B) Open source
C) Shareware
D) Proprietary

30. The term "bandwidth" refers to:

A) The physical width of a network cable
B) The amount of data that can be transmitted over a network in a given time
C) The distance a network signal can travel
D) The number of users connected to a network

31. Which validation check ensures that data entered falls within a specified range?

A) Presence check
B) Length check
C) Range check
D) Format check

32. A regional airline wants to allow customers to book flights online. This is an example of which e-commerce model?

A) B2B (Business-to-Business)
B) B2C (Business-to-Consumer)
C) C2C (Consumer-to-Consumer)
D) G2C (Government-to-Consumer)

33. Which of the following is an output device?

A) Microphone
B) Scanner
C) Projector
D) Mouse

34. The hexadecimal number F represents which decimal value?

A) 14
B) 15
C) 16
D) 17

35. Which software application would be MOST suitable for creating a company newsletter?

A) Spreadsheet
B) Database
C) Desktop publishing
D) Web browser

36. The process of organizing data in a database to reduce redundancy is called:

A) Validation
B) Normalization
C) Encryption
D) Indexing

37. Which protocol is used to transfer files between computers on the Internet?

A) HTTP
B) SMTP
C) FTP
D) TCP

38. A programmer writes instructions using words similar to English. This type of language is classified as:

A) Machine language
B) Low-level language
C) High-level language
D) Assembly language

39. Which of the following BEST describes cloud computing?

A) Storing data on local hard drives
B) Accessing applications and storage over the Internet
C) Using wireless networks within buildings
D) Backing up data to external drives

40. A query in a database is used to:

A) Add new records to a table
B) Design the structure of tables
C) Retrieve specific information from tables
D) Delete entire tables

41. Which of the following is a legal issue associated with downloading music from the Internet?

A) Bandwidth usage
B) Copyright infringement
C) Storage capacity
D) File format compatibility

42. The speed of a processor is measured in:

A) Bytes
B) Bits per second
C) Hertz
D) Pixels

43. Which chart type would be MOST appropriate for showing the proportion of each department's contribution to a company's total sales?

A) Line chart
B) Bar chart
C) Pie chart
D) Scatter plot

44. An absolute cell reference in a spreadsheet is indicated by:

A) Parentheses around the cell address
B) Dollar signs before the column and row
C) Single quotation marks around the cell address
D) An asterisk after the cell address

45. Which storage device uses flash memory technology?

A) Magnetic tape
B) CD-ROM
C) USB flash drive
D) Floppy disk

46. The term "teleworking" refers to:

A) Making telephone calls from home
B) Working from a location outside the traditional office using ICT
C) Technical support provided by telephone
D) Selling products by telephone

47. Which HTML attribute specifies an alternative text for an image?

A) alt
B) src
C) title
D) text

48. In a spreadsheet, which function would calculate the highest value in a range of cells?

A) MIN()
B) MAX()
C) AVG()
D) COUNT()

49. A company implements a policy requiring employees to change passwords every 30 days. This is an example of:

A) Physical security
B) Data backup
C) Access control
D) Network monitoring

50. Which of the following is a disadvantage of using biometric security systems?

A) Passwords can be forgotten
B) High initial implementation cost
C) Easy to duplicate
D) Requires additional hardware

51. The conversion of plaintext into ciphertext is called:

A) Decryption
B) Encryption
C) Compression
D) Conversion

52. Which of the following represents the correct order of data hierarchy from smallest to largest?

A) Field, Record, File, Database
B) Record, Field, Database, File
C) File, Record, Field, Database
D) Database, File, Record, Field

53. A network administrator restricts access to certain websites. This is an example of:

A) Filtering
B) Monitoring
C) Encryption
D) Authentication

54. Which data validation technique compares entered data against a list of acceptable values?

A) Range check
B) Type check
C) Lookup check
D) Length check

55. The process of converting source code into machine code is performed by a:

A) Loader
B) Linker
C) Compiler
D) Debugger

56. Which of the following is a health issue associated with prolonged computer use?

A) Electromagnetic interference
B) Repetitive strain injury
C) Data loss
D) Software piracy

57. A website that allows users to add, modify and delete content is called a:

A) Static website
B) Portal
C) Wiki
D) Blog

58. Which CSS property is used to change the background color of an element?

A) color
B) bgcolor
C) background-color
D) bg-color

59. In pseudocode, which structure is used to repeat a set of instructions while a condition is true?

A) CASE
B) IF-THEN-ELSE
C) WHILE-DO
D) BEGIN-END

60. Which of the following is an environmental concern related to ICT?

A) Bandwidth consumption
B) E-waste disposal
C) Software updates
D) Internet speed

📋 Mark Scheme & Sample Answers

Hidden by default — attempt the paper first, then check your work against the examiner-style mark scheme.

⚡ Unlock with Pro
Mark schemes are a Pro feature

Unlock full examiner-style mark schemes and grade-tiered sample answers across every paper.

See Pro pricing →
Finished the paper?

Reveal the mark scheme above, then dive into the topic notes to firm up anything you missed.

📚 Open subject revision notes →