Documente Academic
Documente Profesional
Documente Cultură
1. Read carefully the instructions on the Answer Sheet and insert the information required in the
spaces provided.
2. When told to open this book, you should check that all the questions are there. Look for the
words ‘END OF PAPER’ after the last question.
4. ANSWER ALL QUESTIONS. You should mark all your answers on the Answer Sheet.
5. You should mark only ONE answer for each question. If you mark more than one answer, you
will receive NO MARKS for that question.
2007-CE-MOCK-CIT-1A-1 –1–
There are 40 questions in this section. Choose the most suitable answer for each question.
1. Which of the following hardware devices can be connected to a computer via a USB port?
(1) keyboard
(2) monitor
(3) printer
A. (1) and (2) only
B. (2) and (3) only
C. (1) and (3) only
D. (1), (2) and (3)
2. While using the merge printing feature of a word processor, the source of data cannot be stored in a
A. word processing file.
B. database file.
C. spreadsheet file.
D. presentation file.
6. What is the minimum number of bits to represent the ten digits ‘0’, ‘1’, …, ‘9’?
A. 1
B. 4
C. 5
D. 10
2007-CE-MOCK-CIT-1A-2 –2–
7. Many banks in Hong Kong adopt ‘two-factor authentication’ in Internet banking. In addition to user ID and
password, it uses something a user has (e.g. digital certificate) to verify the user’s identity.
Using user ID and password cannot verify a user’s identity because
A. user ID and password are not enough to form a primary key.
B. there may be another user who has the same user ID and password.
C. the user’s user ID and password may be known by another person.
D. the user may forget his/her user ID and password.
8. You run a company which accept customers’ orders through emails. Wai Yan is one of your customers. His
email address is waiyan1889@pcbroadband.com, which is obtained from an ISP. One day, you received an
email which indicated the sender was ‘waiyan1889@pcbroadband.com’. You could have a chance to check
whether the email was really sent by Wai Yan only when
A. the email was received at a web-based email account.
B. the email was encrypted.
C. a digital signature was added to the email.
D. Wai Yan’s HKID card number was attached at the end of the email.
9. Compared with using a low level programming language, a programmer can use a high level programming
language
A. to produce an object program.
B. to write a program which takes fewer memory spaces.
C. to write a program which handles multimedia more efficiently.
D. to write a source program which is more readable.
2007-CE-MOCK-CIT-1A-3 –3–
14. A is a small text file that a Web server stores on a user's computer.
A. worm
B. spam
C. cookie
D. payload
15. Given that cell A1 of a spreadsheet file stores 15, find the result of the following formula.
= IF(A1>20,IF(A1>40,1,2),IF(A1<10,3,4))
A. 1
B. 2
C. 3
D. 4
16. Which of the following spreadsheet functions should be used to find the position of each student in a class
according to the scores they achieved in an examination?
A. AVERAGE
B. MAX
C. RANK
D. COUNTIF
20. The main reason of representing information using hexadecimal numbers instead of binary numbers in most
computer system is
A. under a given number of digits, hexadecimal system can represent more information.
B. computer hardware store information in hexadecimal format and hence no conversion is needed before
showing the information.
C. the hexadecimal system may contain alphanumeric data while the binary system may not.
D. it is faster to process information in hexadecimal system.
2007-CE-MOCK-CIT-1A-4 –4–
21. A fraudulent online bank
(1) misleads others to its web site by email.
(2) steals others’ logon information to a genuine web site.
(3) has the same URL but different IP address as the genuine web site.
A. (1) only
B. (1) and (2) only
C. (1) and (3) only
D. (1), (2) and (3)
22. A computer system adds an extra odd parity bit to all of its data storing to its main memory. Which of the
following bytes retrieved back from the main memory is invalid?
A. 0100 1011 1
B. 0000 0000 1
C. 1010 1010 0
D. Cannot be determined without the pattern of the original data
23. Which of the following tasks is most likely processed by a desktop publishing software?
A. printing a financial report with statistical charts
B. printing the student academic report card
C. printing a regional newspaper
D. printing 8R photos
25. The whole implementation of the Java platform includes the concepts of using
(1) compilers.
(2) interpreters.
(3) assemblers.
A. (1) and (2) only
B. (1) and (3) only
C. (2) and (3) only
D. (1), (2) and (3)
2007-CE-MOCK-CIT-1A-5 –5–
Read the following program flowchart and answer questions 27 to 29.
27. How many iterative loop(s) is/are formed in the above program flowchart?
A. None
B. 1
C. 3
D. 6
28. At the start of the program, if the current TX record is 1 and current MF record is 2, which of the following
statement will be executed?
A. MF_AMT = MF_AMT + TX_AMT
B. Print Error Message
C. Read Next MF Record
D. Stop
2007-CE-MOCK-CIT-1A-6 –6–
29. If there are 2 TX records with values {3, 5} in sequence and 4 MF records with values {1, 3, 5, 7} in
sequence, how many times will the statement “Write to New MF records” will be executed before program
ends?
A. 1
B. 2
C. 4
D. 6
30. Which of the following statement about IBM deep blue computer is NOT correct?
A. IBM deep blue was the first machine to win a chess game against a reigning world champion under
regular time controls.
B. It is a supercomputer with hundreds special purpose VLSI microprocessor chips.
C. It is a human like robot with AI system.
D. Its chess playing program was written in C and ran under a kind of unix operating system.
32. X sends a digitally signed document to Y. The digital signature is generated with
A. X’s private key.
B. X’s public key.
C. Y’s private key.
D. Y’s public key.
35. Which of the following can be reduce the number of keystrokes in creating text?
(1) short-cut key
(2) OCR
(3) text formatting
A. (1) only
B. (2) only
C. (1) and (2) only
D. (2) and (3) only
2007-CE-MOCK-CIT-1A-7 –7–
36. Which of the following is/are the characteristic(s) of command line interface?
(1) easy to learn
(2) fast for experienced users
(3) not designed for ordinary users
A. (1) only
B. (2) only
C. (1) and (2) only
D. (2) and (3) only
39. Which of the following stores HTML files and delivers them on request?
A. client browser
B. web server
C. Internet
D. World Wide Web
40. Which of the following input devices is associated with transcription errors?
A. keyboard
B. smart card reader
C. bar code reader
D. OCR reader
END OF PAPER
2007-CE-MOCK-CIT-1A-8 –8–