Click to follow our Afritutor YouTube Channel, subscribe and click notifications and get updates on new learning videos


<=Back

<=CDACC ICT Technician Level 5 : Install Computer Software past paper July 2023

Which of the following is a list of system data backup?
A. Full, differential, incremental
B. Differential, synthetic, full
C. Digital, mirroring, full
D. Differential, synthetic, digital

    Viewed:  31  times
For Better experience and learning,for video answers, after video ends playing, click next question in the questions list!!!

  Share in:
        

Question Answer:





Questions List:

1. A computer program that installs files, such as applications, drivers, or other software, onto a computer is called__________. A. Windows B. Set up program C. Defragmenter D. Word processing
2. Operating system identifies and controls hardware in coordination with _____. A. Power cable B. Mouse C. SMPS D. BIOS
3. 3. Maintaining software integrity is important. _____is an aspect of software configuration used to achieve this. A. Version control B. User interface design C. Database management D. Hardware compatibility testing
4. Why is it essential to check for software prerequisites before installation? A. To determine the software cost B. To verify the software licensing terms C. To ensure software can be run on the system D. To choose the software’s installation directory
5. _________is a software testing technique which involves identifying and eliminating unnecessary codes and improving code readability. A. Code Refactoring B. Unit testing C. Performance optimization D. Error handling
6. The primary goal of software testing is___________.
7. A software which provides a platform for other software’s to run on is known as A. Application software B. System software C. Utility software D. Firmware
8. Why is user training essential in an organization? A. To increase employee productivity B. To eliminate need of user support C. To reduce cost of software production D. To replace user manual and documentation
9. Which of the following is a key benefit of implementing software configuration? A. Increase software development time B. Enhance software security C. Reduce software functionality D. Limit software scalability
10. A software acquisition method that involves developing software in-house from scratch is A. Commercial off-the-shelf B. Open source C. Custom development D. Software as a service
11. Software is classified according to_________. A. Resource requirements, functionality and the type of computer B. Functionality, purpose, duty and resource requirement C. Functionality, resource requirement and use D. Purpose intended for, cost effectiveness, use and resource requirement
12. _________known as an “intermediary” serves as a bridge between a computer user and the hardware of the computer. A. Software B. Hardware C. Operating system D. Driver
13. Which testing technique aims to evaluate the software behavior under unusually high workloads or resource constraints? A. Performance testing B. Usability testing C. Functional testing D. Stress testing
14. A program in execution is called A. Process B. Instruction C. Procedure D. Function
15. Which of the following is a list of system data backup? A. Full, differential, incremental B. Differential, synthetic, full C. Digital, mirroring, full D. Differential, synthetic, digital
16. When installing software on a network, what crucial consideration should you make? A. Available software version B. Number of user accounts C. Type of internet connection D. Network bandwidth and capacity
17. The type of software which is embedded in hardware devices and is responsible for controlling their operation is? A. System software B. Application software C. Utility software D. Firmware software
18. ______is the type of training that involves hands-on skills and interaction with the software. A. Online training B. Classroom training C. Webinar D. Documentation reading
19. A file included in the installation package that contains instructions on how to install a program is A. README B. Product key C. Setup D. EXE
20. ____is a software that controls a particular type of device plugged in a computer. A. Device driver B. Operating system C. Windows D. Utility software
21. Software testing acts as a tool for examining the behavior of the software. List FOUR benefits of software testing to an organization
22. Software upgrade is essential as it improves the software integrity and functionality to benefit the user. Outline THREE factors to consider before performing a software upgrade.
23. Software configuration management (SCM) is a systematic process of managing software system changes. Describe any TWO components of SCM.
24. Installation manual is an important document which provides guidelines on how a specific software is installed. State FOUR reasons for having a software installation manual.
25. A company was planning on introducing a software system in their organization. Outline THREE main benefits of the system to the company.
26. Data back-up is a common practice in all organizations. Highlight FOUR factors that would necessitate data back-up in an organization.
27. When choosing a software installation file, several factors should be considered to ensure smooth and reliable installation process. Identify FOUR factors to be considered.
28. A user vendor agreement is a legal contract between the user and the vendor and cuts across different software models and business needs. Enumerate FOUR types of user vendor agreement.
29. When purchasing software, it is important to consider several factors to ensure that you choose the software that best meets your needs. State FOUR factors you should consider.
30. Software is usually categorized into three main categories. State the THREE main categories.
31. When software is tested, a report is generated. Highlight THREE benefits of the report.
32. Having a user vendor agreement benefits both the software vendor and the user by establishing clear terms protecting intellectual property. Discuss THREE benefits of having a user vendor agreement to both the vendor and the user.
33. Several key elements are included in the user vendor agreement to establish the software usage. Describe THREE elements of a user vendor agreement.
34. Outline FIVE hardware factors to consider before software installation.
35. Define the term software testing.
36. Security testing focuses on identifying weaknesses in a software system to ensure it is resistant to potential security threats and attacks. Describe THREE types of security testing.
37. Software test reports are often used in phases when conducting software tests. Describe FOUR types of test reports.
38. Outline FOUR sources of software installation files.
39. A company in Nairobi wanted to purchase software. Describe THREE methods of software acquisition they would consider.
40. Discuss FIVE characteristics which a good software must meet before it is deployed in an organization.
41. Outline FOUR benefits of user training.


About Us

Contact us

Terms of use | Privacy policy

Follow Us:               

All Rights Reserved © 2024; pscustudies.com