Skip to main content

Computer Studies O'level Revision Questions with Answers

1 Memory that is called a read write memory is
D Registers.


2 Hard discs, fixed head discs, floppy discs and optical discs all are types of
A serial access storage.
B direct access storage.
C volatile access storage.
D non-volatile access storage.

Non-volatile access storage

3 All of the following are examples of real security and privacy risks except
A viruses.
B hackers.
C spam.
D identity theft.


4 A company provides its users with a private network that can be accessed from all its
offices worldwide. This network is called
A a LAN.
B a Man.
C an Intranet.
D a WAN.

An intranet

5 Software which control general operations of a computer system is classified as
A dump programs.
B function system.
C operating system.
D enquiry system.

Operating system

6 A small network that does not have a server is called
A peer-to-peer network.
B a ring network.
C a star network .
D a bus.

Peer-to-peer network

7 Line printer, voice synthesizer and computer terminal screen are examples of
A logic circuit devices.
B analogue circuit devices.
C AND gate devices .
D output devices.

Output devices

8 Broadband network technology means
A more bits of data are transmitted per second.
B more cables are used.
C thicker cables are used.
D fibre-optic cables are used.

More bits of data are transmitted per second

9 ‘Blue tooth’ technology allows
A satellite communication.
B wireless communication between equipment.
C signal transmission on mobile phone only.
D landline phone to mobile phone communication.

Wireless communication between equipment

10 Which of the following describes someone who gains illegal access to a computer
A hacker
B intruder
C identity thief
D cyber-terrorist


11 Intellectual property rights and ___________ are two of the most important
developing areas of law.
A cyber law
B copyright infringement
C patent law
D trademark infringement

Copyright infringement

12 Related fields in a database are grouped to form a _________________
A data file.
B menu.
C bank.
D data record.

Data record

13 In database, the acronym CRUD stands for
A Create Read Update Delete.
B Create Rewrite Update Delete.
C Clean Read Update Delete.
D Create Read Update Design.

Create Read Update Delete

14 Which of the following is not true about a firewall?
A a firewall can be both hardware and software
B a firewall protects only against external threats
C an antivirus software can be part of a firewall
D a firewall protects only against internal threats

A firewall protects only against internal threats

15 The following are cybercrimes except
A spoofing.
B sniffing.
C fraud.
D spam.


16 A batch processing system is a computer system that allows
A a number of programs to be executed at apparently the same time.
B a single user at a time to use it in an interactive mode.
C two or more programs to be executed at apparently the same time.
D a user to submit the specifications of a job in advance before processing

A user to submit specifications of a job in advance before processing begins

17 Which of the following tags is used to mark the beginning of a paragraph?
A < TD >
B < br >
C < P >
D < TR >


18 The term given to a small group of bits used to represent a character is
A bits.
B bytes.
C binary characters.
D input characters.


19 Which of the following is not a fact-finding technique?
A Third party enquiry
B Interview
C Questionnaire
D Record views

20 Collection, analysis and reporting of available data for any given marketing situation
is classified as
A external databases
B out sourced databases
C marketing research
D survey research

Marketing research

21 A person who produces or creates new programs for industrial and business users is
A system analysts.
B program coordinator.
C computer coordinator.
D user interface.

System analyst

22 Solve the binary problem below:
+ 00011001
A 111111100
B 11100110
C 01111101
D 01111111

23 In a temperature control system, what represents the output of the system?
A the heating element
B the required temperature
C the heat produced by the system
D the actual temperature achieved

The actual temperature achieved

24 Stock maintaining control system in store which consists of hardware and software to
contact and manage suppliers is called
A system.
B operating system.
C component classification.
D information processing system.

Information processing system

25 101101 converted to denary is
A 44.
B 15 .
C 45.
D 46.


26 842 + 537 to binary is
A 0001 0011 0111 0101
B 0111 0011 0111 0101
C 0001 0111 0111 0101
D 0001 0011 0111 0111

27 A system that automates the drafting process with interactive computer graphics is
A computer-aided engineering (CAE).
B computer-aided manufacturing (CAM).
C computer-aided instruction (CAI).
D computer-aided design (CAD).

Computer-aided design

28 HTML stands for
A High Text Markup Language.
B Hyper Tabular Mark up Language.
C Hyper Technique Markup Language.
D Hyper Text Markup Language.

Hyper Text Markup Language

29 A variable name is also called a (n)
A placeholder.
B identifier.
C constant.
D hexadecimal.


30 When a variable is __________ it is both declared and initialized.
A set
B defined
C documented
D instantiated


31 Writing a program into a suitable language is called
A program instructions.
B program debugging.
C program testing.
D program coding.

Program coding

32 In flowcharts of algorithms, messages are classified as
A steps of algorithm.
B selection of steps.
C cancellation of procedures.
D addition of steps.

33 Which loop structure continues to execute as long as the answer to the controlling
question is yes or true?
A do ........then
B do ........when
C do ........until
D do.........while


34 A graphic representation of an algorithm which shows the order in which operations
will be performed is
A a decision table.
B a top-down chart.
C a flowchart .
D pseudocode.

A do flowchart

35 The following pseudocode is an example of a (n) __________ structure:
Get number
While number is positive
Add to sum
Get number
A sequence.
B decision.
C nested.
D loop.


36 Cost-Benefit Analysis is performed during
A analysis phase.
B design phase.
C feasibility study phase.
D maintenance phase.

37 Verification of a login name and password is known as
A configuration.
B accessibility.
C authentication.
D logging in.


38 Structured programming involves
A functional modularization.
B localization of errors.
C decentralized programming.
D stress on requirements gathering

Functional modularization

39 A relational database developer refers to a record as
A a criteria.
B a relation.
C an attribute.
D a tuple.

40 A key that consists of more than one attributes to uniquely identify rows in a table is
A composite key.
B candidate key.
C primary key.
D foreign key.

Primary key


Popular posts from this blog

Best Dating Apps in Zimbabwe

Tinder is one of the most popular dating apps. However it is used mostly in upmarket suburbs and it is not useful in some areas, especially the ghetto. 

Jaumo is best for those who do not want to reveal their true identity. This is ideal for new people on the dating scene since it helps them build confidence knowing that nobody will ever know their personal details like email or phone number. However this can be taken advantage of by people with sinister intentions. Women especially end up falling prey to men with evil intentions. 

Badoo is our favourite. It is trendy just like Tinder and has users across the social divide. What we like the most about Badoo is its face recognition feature. It can verify if the profile picture is really of the person behind the profile. It takes less than 5 minutes to get verified. To avoid scammers and those who are into cat phishing, users should chat with other verified users. Badoo verifies from the profile picture up to the email and phone number. L…

How Econet helped shape my career

I can code in several languages though I specialize in full stack web development thanks to Econet Zimbabwe.

During the  days when I started writing code in early 2014 I visited the Econet Zimbabwe website and found that they had some zero rated websites. This meant that, as an econet subscriber, I could access some sites for free without the need to buy any internet bundles.

The zero rated content was arranged into different categories and I headed to the education section where I started reading articles on coding. I enjoyed the tutorials titled "Learn Python The Hard Way". I followed most if not all the instructions on a PC I had assembled by myself. I became proficient in coding in Python.

My relationship with econet did not end in learning to code from zero rated content. In 2016 while attending a course in photojournalism I met a guy who was interested with my achievements in coding, by then I had already become a Google developer and I had published an app in the Play…

How to write and compile code as well as to publish android apps on a smartphone.

Getting Started
There is a guide which I recommend that you read first. It contains a list of all the resources you might need in developing android applications on smartphones. Some of the resources are required for accessing the full course content or for one to be able to carry out practicals as well as for providing the means to interact with the tutor. However, if you want to jump into the course click here.

Prior knowledge of how to develop simple android applications is an advantage as this course mainly focuses on how to use smartphones in the development process and therefore does not dwell much on teaching an in-depth knowledge of how to create different types of Android apps. However, if you are totally new to Android development you can still be able to learn how to write code and complete this tutorial at the same time by reading Java for Dummies and Android development for Dummies. How lessons will be conducted
The tutorial is self paced and most of the learn…

How to make money from home in Zimbabwe

It is not a hoax, it is real. Making money from home is a possibility which needs to be explored. All you need is a smartphone at least and the will to succeed.

There are several ways you can achieve this. Let's start with some services which are based on some websites that you can offer.

Airbnb should be your first stop (to those who own a house) if you need to try a few of the ways on how to earn a living from home. All you need to do is list a room on Airbnb and provide guest house services. Such guest houses are proving to be popular to many people nowadays considering their affordability and privacy.
Blogging. You can also make money from blogging. If you have a website or a huge following on social media, you can join an affiliate program. I recommend Share a Sale. Go on to their website and find a sponsor so that you get paid for great content.

Affiliate programs can make you earn a living. You might not have a website but a large following on social media. Being an affiliat…

Why Zimbabweans buy fuel from the black market

Many Zimbabweans turn to the black market when they need fuel for their cars. I sought to find out why considering that the prices on the black market are actually higher than on the formal market.
Fuel is sometimes scarce in Zimbabwe and when it is available one has to get into a huge que and wait for hours at a fuel service station before buying the fuel. In huge cities like Harare and Bulawayo, one has to ask around for information on the availability of fuel and may have to travel long distances to find  . the fuel. To avoid disappointment and inconvenience, most people prefer buying the fuel from the black market. That is not the only reason though.
Zimbabwe uses blended petrol. The fuel can be leaded or unleaded but it will definitely be a blend of ethanol and petrol. Many drivers believe that blended petrol does not last as much as pure petrol and that is the main reason why they would rather pay a higher amount of money for fuel on the black market.

Best app to stream to your Roku or Kwese play

Kwese play which is roku powered, is a device that brings more fun when it comes to entertainment in the home. One of the features I like the most is the ability to cast from a mobile device to a TV. All you need to do is go to the app store on the TV and choose the right app for casting. We tried on an android tablet the Allconnect app and another one called All Screen. The latter won. All Screen is the best app for casting to your TV when using a Kwese play device. To use it you install the app on both the Kwese play and on your phone. Open the app on your phone and choose casting device which in this case is the roku or Kwese play device. If the settings allow it the app will open automatically on your TV and you can enjoy watching videos, audio and photos seamlessly without lagging or buffering as well as using your mobile data.

My top three social media apps

WhatsApp gained traction due to its ease of login absence of adverts. It is also affordable and does not have privacy issues and for that I place it on third position. On second position is bigo live which uses video streaming as its mainstay. The younger generation is moving away from texting to live streaming. According to research , Facebook users are aged on average between 24 to 35. On pole position is whisper. WhatsApp gained popularity because if its use of just a phone number to login. Now imagine a scenario whereby a user does not need to provide any information at all but the app automatically assigns a username and is able to differentiate each user. This is what makes whisper unique. It relies on information  that it stores on the phone to identify the user. You can uninstall the app and reinstall it later to start of from where you left as long as you do not delete the whisper folder which is created upon initially installing the app. Whisper respects privacy. There is no…

Google Drive Direct Link Generator

Google Drive Direct Link Generator

Do you have any files on Google Drive that you would like to share with others so that they can easily download them? We all know that if you share a file from Google Drive the person you send the link to can not directly download the file. The file first opens in Google Drive before and then one has to click on the option to download. Follow the instructions below on how to make any file saved on Google Drive downloadable by just clicking on a link.


Step 1 You must have a file saved on Google Drive. If you do not have it yet then upload a file to Google Drive.

Step 2 Click on the file you have uploaded on Google drive and turn on link sharing.

Step 3 Now edit permissions on the link sharing so anyone with the link can view.

Step 4 Now go on to the file and click. An option to copy the file's link will appear. Copy the link.

Step 5 Now go and paste the link into the above link generator and click the generate button.

A new l…

Recent Work

The following is a gallery of some of the pictures I took recently. My high resolution photos can be downloaded for free on Pexels or on Unsplash. If there is a particular image you want from this blog which is not available on Pexels or Unsplash get in touch with me via Email.


Solutions to powercuts and water crisis

Plumtree residents frequently go for several days without water or electricity. This is not perculiar to Zimbabwe alone but to most countries in Africa. Experts say eratic rainfall which culminate in water shortage is due to climate change. Global warming is a major factor drought and heat waves.

Even though there is a crisis, there are some solutions which can be used to alleviate some of the problems bedeviling Zimbabweans and Africans akike.  Water harvesting, for example, can be a temporary solution for shortage of water for household use  during this rainy season.

The use of solar lights can alleviate blackouts and save on the electricity bill.