Advertise here ✔️

Phone: +255 692 127 931 Email: njoholes@gmail.com

https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhG5GSwn5UBLXuOOUyUDGcmuQRzn3NFkRk47bJzhk44ktBL7H0hlgUZOHqp4Y7HVlkKJd3MToAGxkygkNoG4t4kxCfjG9pCINqkA3KhHIDeudh4Sv1rRQ9uYAQJLrlxGWYzQWUGD9d8Za8/s930/3.png

Saleh Njohole

Always be inspired in your life.

My Life

What goes around is what comes around.

Brave

Be happy this moment because this moment is your life.

Friday, May 22, 2026

RACES AND GAMES APTITUDE QUESTIONS AND ANSWERS

 








Share:

SECURITY - MAT


CLICK HERE 👇 

SECURITY

 




Share:

Tuesday, May 19, 2026

TUTOR II ORAL INTERVIEW QUESTIONS AND ANSWERS

 


Tutor II Oral Interview Questions and Answers

1. Tell us about yourself.
Answer:
My name is ____________. I have a background in education and training with specialization in ____________. I am passionate about teaching, mentoring students, and helping learners gain both theoretical knowledge and practical skills. I am hardworking, adaptable, and committed to professional ethics and continuous learning.


2. Why do you want to work as a Tutor II?
Answer:
I want to work as a Tutor II because I enjoy teaching and sharing knowledge with students. This position gives me an opportunity to contribute to academic development, research, and community service while also improving my professional experience.


3. What are the duties of a Tutor II?
Answer:
The duties of a Tutor II include:

Teaching and assisting students in practical and theoretical lessons.
Preparing teaching materials.
Conducting assessments and marking assignments.
Supervising students during practical sessions.
Participating in research and consultancy.
Providing academic guidance to students.
Maintaining academic discipline and ethics.

4. What teaching methods can you use in class?
Answer:
I can use several teaching methods depending on the topic and learners’ needs, such as:

Lecture method
Discussion method
Demonstration method
Group work
Question and answer method
Problem-solving approach
Practical and project-based learning

5. How do you handle students with different learning abilities?
Answer:
I use learner-centered approaches by identifying students’ strengths and weaknesses, giving additional support where needed, encouraging group discussions, and using different teaching aids to accommodate different learning styles.


6. How do you manage classroom discipline?
Answer:
I manage classroom discipline by setting clear rules and expectations, treating students fairly, encouraging respect, maintaining professionalism, and addressing problems calmly and objectively.


7. What is the importance of lesson planning?
Answer:
Lesson planning helps a teacher organize content, manage time effectively, achieve learning objectives, select appropriate teaching methods, and evaluate students properly.


8. What qualities make a good teacher?
Answer:
A good teacher should:

Have strong communication skills
Be patient and professional
Be knowledgeable in the subject area
Be creative and innovative
Be ethical and responsible
Motivate learners
Be committed to continuous learning

9. How do you assess students’ performance?
Answer:
I assess students using:

Tests and examinations
Assignments
Presentations
Practical exercises
Projects
Continuous assessment methods

10. What is student-centered learning?
Answer:
Student-centered learning is an approach where learners actively participate in the learning process while the teacher acts as a facilitator. It encourages critical thinking, participation, and problem-solving.


11. How can technology improve teaching and learning?
Answer:
Technology improves teaching and learning through:

Online learning platforms
Multimedia presentations
Virtual simulations
Easy access to educational resources
Better communication between teachers and students

12. What challenges may affect teaching and how can you overcome them?
Answer:
Some challenges include lack of resources, large classes, low student motivation, and limited technology. These can be addressed through creativity, proper planning, teamwork, effective communication, and continuous professional development.


13. What is the difference between formative and summative assessment?
Answer:

Formative assessment is conducted during the learning process to monitor progress.
Summative assessment is conducted at the end of a course or topic to evaluate overall performance.

14. How would you motivate students?
Answer:
I would motivate students by encouraging participation, recognizing achievements, giving constructive feedback, connecting lessons to real-life situations, and creating a supportive learning environment.


15. How do you handle examination malpractice?
Answer:
I would follow institutional regulations, maintain fairness, report incidents appropriately, educate students on academic integrity, and ensure proper supervision during examinations.


16. What is communication?
Answer:
Communication is the process of exchanging information, ideas, thoughts, or messages between people through speaking, writing, gestures, or other means.


17. What are the barriers to effective communication?
Answer:
Barriers include:

Language differences
Noise
Poor listening skills
Emotional factors
Cultural differences
Lack of feedback

18. What is curriculum?
Answer:
Curriculum is a planned set of learning experiences, subjects, objectives, content, and assessment methods designed to achieve educational goals.


19. What is the importance of research in education?
Answer:
Research helps improve teaching methods, solve educational problems, generate new knowledge, and support evidence-based decision-making.


20. Explain the meaning of professionalism.
Answer:
Professionalism refers to behaving with competence, ethics, responsibility, integrity, and respect while performing duties.


Scenario-Based Oral Questions
21. What would you do if students are not participating in class?
Answer:
I would use interactive teaching methods, ask engaging questions, encourage group discussions, create a friendly learning environment, and motivate students to express themselves.


22. What would you do if a student continuously performs poorly?
Answer:
I would identify the root causes, provide guidance and counseling, offer extra support, encourage peer learning, and monitor the student’s progress closely.


23. Suppose there is conflict between students in class. How would you handle it?
Answer:
I would listen to both sides fairly, identify the cause of the conflict, encourage peaceful resolution, remind them of institutional rules, and involve relevant authorities if necessary.


24. What would you do if teaching resources are limited?
Answer:
I would improvise teaching materials, use available technology, encourage group sharing of resources, and apply creative teaching approaches.


25. How would you handle pressure and workload?
Answer:
I would prioritize tasks, manage time effectively, maintain organization, cooperate with colleagues, and remain focused on achieving objectives.


Cognitive and Analytical Oral Questions
26. Why is critical thinking important in education?
Answer:
Critical thinking enables learners to analyze information, solve problems, make informed decisions, and become independent thinkers.


27. What is the role of ethics in teaching?
Answer:
Ethics guide teachers to act fairly, maintain confidentiality, respect learners, avoid discrimination, and uphold professional standards.


28. How can education contribute to national development?
Answer:
Education develops skilled human resources, promotes innovation, reduces poverty, improves productivity, and supports social and economic growth.


29. What is inclusive education?
Answer:
Inclusive education ensures that all learners, including those with disabilities or special needs, have equal access to quality education.


30. Why should teachers engage in continuous professional development?
Answer:
Continuous professional development helps teachers improve skills, update knowledge, adapt to new technologies, and enhance teaching effectiveness.


Computer Science Related Oral Questions (for ICT/Computer Science Applicants)
31. What is a computer network?
Answer:
A computer network is a system that connects computers and devices to share data and resources.


32. What is the difference between RAM and ROM?
Answer:

RAM is temporary memory used while a computer is running.
ROM is permanent memory used to store essential startup instructions.

33. What is a database?
Answer:
A database is an organized collection of related data stored electronically for easy access, management, and retrieval.


34. What is cybersecurity?
Answer:
Cybersecurity is the protection of computer systems, networks, and data from unauthorized access, attacks, or damage.


35. What is the importance of backup?
Answer:
Backup helps protect data against loss caused by system failure, viruses, accidental deletion, or disasters.


Final Interview Questions
36. Why should we hire you?
Answer:
You should hire me because I possess the required academic qualifications, communication skills, commitment to teaching, teamwork spirit, and willingness to contribute positively to the institution.


37. What are your strengths?
Answer:
My strengths include teamwork, communication skills, adaptability, problem-solving ability, professionalism, and commitment to learning.


38. What are your weaknesses?
Answer:
One of my weaknesses is spending too much time ensuring work is perfect, but I am learning to balance quality and time management effectively.


39. Where do you see yourself in five years?
Answer:
In five years, I see myself growing professionally, contributing to research and academic development, and becoming a highly competent educator.


40. Do you have any questions for us?
Answer:
Yes. I would like to know more about professional development opportunities, teaching expectations, and research support within the institution.


Tips for Oral Interview Success
Dress professionally.
Arrive early.
Speak clearly and confidently.
Maintain eye contact.
Be honest and concise.
Support answers with examples where possible.
Show professionalism and positive attitude.
Demonstrate knowledge of your subject area.
Practice common interview questions before the interview.

Share:

Monday, May 18, 2026

EXAMINATION OFFICER (COMPUTER SCIENCE) QUESTIONS AND ANSWERS

 


Examination Officer II (Computer Science)


Section A: Examination Management
1. A university examination officer discovers that some students have been allocated to the wrong examination rooms due to a database mismatch. What should be done FIRST?

A. Print new examination cards immediately
B. Suspend all examinations
C. Verify the student allocation records from the database backup
D. Remove all students from the system

Answer: C

2. During online examination registration, students complain that the portal becomes very slow when many users log in simultaneously. Which concept BEST explains this issue?

A. Data redundancy
B. Network congestion
C. Deadlock
D. Data mining

Answer: B

3. An examination officer notices unauthorized changes in examination marks. Which security principle has MOST likely been violated?

A. Availability
B. Confidentiality
C. Integrity
D. Scalability

Answer: C

4. A candidate claims that his results disappeared from the examination system after a power outage. Which mechanism would BEST help prevent such data loss?

A. Antivirus software
B. Database transaction logs and backups
C. Firewall installation
D. Screen locking

Answer: B

5.  An institution wants examination records to remain accessible even if one server fails. Which solution is MOST appropriate?

A. Data normalization
B. Server redundancy
C. File compression
D. Encryption

Answer: B

6.
A lecturer accidentally uploads wrong examination scores to the system. Which database feature can help restore previous correct data?

A. Rollback
B. Sorting
C. Compilation
D. Query optimization

Answer: A

7. The examination office wants only authorized staff to access examination results. Which approach should be implemented?

A. Open access policy
B. Role-based access control
C. Data duplication
D. Shared passwords

Answer: B

8. A student attempts to log into the examination system multiple times using random passwords. This is an example of:

A. Brute-force attack
B. Phishing
C. Data mining
D. Spoofing

Answer: A

9. An examination database contains repeated student information in several tables, causing inconsistencies. Which process can solve this problem?

A. Compilation
B. Normalization
C. Encryption
D. Routing

Answer: B

10. An institution plans to move examination services to cloud computing. Which advantage is MOST significant?

A. Reduced accessibility
B. Increased hardware dependency
C. Scalability and remote access
D. Elimination of internet usage

Answer: C

Section B: Database and Information Systems

11. An examination officer wants to retrieve all students who scored above 80 in Database Systems. Which SQL command should be used?

A. DELETE
B. UPDATE
C. SELECT
D. DROP

Answer: C

12. A database administrator creates relationships between Students and Results tables using student IDs. The student ID acts as a:

A. Foreign key
B. Candidate key
C. Super key
D. Composite key

Answer: A

13. A university stores examination records in a centralized database server. What is the MAIN advantage?

A. Increased duplication
B. Easier data management
C. Reduced security
D. Slower processing

Answer: B

14. An examination system suddenly crashes because two transactions access the same data simultaneously. Which issue is this?

A. Concurrency conflict
B. Token passing
C. Fragmentation
D. Compression

Answer: A

15. The examination office needs a report showing the average marks per course. Which SQL function is MOST suitable?

A. COUNT()
B. SUM()
C. AVG()
D. MAX()

Answer: C

16. A student record is deleted accidentally. Which database mechanism can recover it?

A. Primary key
B. Backup restoration
C. Query processing
D. Indexing

Answer: B

17. A database index is primarily used to:

A. Increase storage requirements
B. Speed up data retrieval
C. Reduce security
D. Duplicate records

Answer: B

18. An examination officer wants to prevent duplicate student registration numbers in the database. Which constraint should be applied?

A. DEFAULT
B. CHECK
C. UNIQUE
D. NULL

Answer: C

19. The examination office needs to combine student information from multiple campuses into one system. Which approach is BEST?

A. Distributed database system
B. Standalone system
C. Analog processing
D. Manual recording

Answer: A

20. A query is taking too long to execute because the table has millions of rows. Which action can improve performance?

A. Deleting all rows
B. Adding indexes
C. Removing constraints
D. Increasing redundancy

Answer: B

Section C: Networking and Security

21. An online examination system becomes inaccessible due to excessive traffic from attackers. This is MOST likely a:

A. Phishing attack
B. SQL injection
C. Denial-of-Service attack
D. Trojan attack

Answer: C

22. An institution installs a firewall in the examination office network. The MAIN purpose is to:

A. Increase monitor size
B. Control network traffic
C. Speed up typing
D. Replace antivirus software

Answer: B

23. A staff member receives an email requesting examination passwords and system credentials. This is an example of:

A. Spoofing
B. Phishing
C. Encryption
D. Multiprocessing

Answer: B

24. Which protocol is MOST secure for transmitting examination results over the internet?

A. HTTP
B. FTP
C. HTTPS
D. Telnet

Answer: C

25. An examination officer notices that computers restart automatically after opening unknown USB files. Which malware is MOST likely responsible?

A. Worm
B. Trojan
C. Spyware
D. Adware

Answer: A

26. The examination department uses biometric authentication. Which security objective does this MOST support?

A. Authentication
B. Compression
C. Fragmentation
D. Multiplexing

Answer: A

27. A hacker inserts malicious SQL commands into a login form. This attack is called:

A. Brute force
B. SQL Injection
C. Sniffing
D. Spoofing

Answer: B

28. An examination officer wants to ensure that data cannot be read by unauthorized users during transmission. Which method should be used?

A. Formatting
B. Encryption
C. Partitioning
D. Indexing

Answer: B

29. A network administrator divides a network into smaller sections to improve security and performance. This process is called:

A. Segmentation
B. Duplication
C. Broadcasting
D. Multiprocessing

Answer: A

30. Which device forwards data packets between different networks?

A. Hub
B. Switch
C. Router
D. Repeater

Answer: C

Section D: Operating Systems and Computer Applications

31. A computer used for examination processing freezes because too many applications are running simultaneously. Which issue is MOST likely occurring?

A. Resource exhaustion
B. Normalization
C. Encryption
D. Indexing

Answer: A

32. An examination officer accidentally closes a program without saving results data. Which memory type loses data immediately after power loss?

A. ROM
B. Cache
C. RAM
D. SSD

Answer: C

33. A university wants multiple users to access one server simultaneously. Which operating system feature supports this?

A. Single-user processing
B. Multi-user capability
C. File compression
D. Formatting

Answer: B

34. An examination office uses virtualization to run multiple operating systems on one physical server. The MAIN advantage is:

A. Increased hardware cost
B. Better resource utilization
C. Reduced storage
D. Slower performance

Answer: B

35. Which utility software helps detect and remove malicious software from examination computers?

A. Compiler
B. Antivirus
C. Assembler
D. Debugger

Answer: B

36. A staff member cannot print examination reports because the printer queue is full. Which operating system function is involved?

A. Process management
B. Memory management
C. Device management
D. File compression

Answer: C

37. An examination office plans to automate repetitive tasks such as report generation. Which tool is MOST suitable?

A. Scripting
B. Defragmentation
C. Formatting
D. Partitioning

Answer: A

38. A candidate’s results file becomes inaccessible due to corruption. Which file management strategy BEST reduces such risks?

A. Regular backups
B. Deleting old files
C. Renaming files daily
D. Disabling permissions

Answer: A

39. An operating system schedules processes to ensure fair CPU usage among users. This is handled by:

A. CPU scheduling
B. Encryption
C. Routing
D. Fragmentation

Answer: A

40. An examination officer needs to share files securely between offices. Which method is MOST appropriate?

A. Public USB sharing
B. Shared cloud storage with permissions
C. Open Wi-Fi transfer
D. Printing all files

Answer: B

Section E: Software Engineering and Systems Analysis

41. Before developing a new examination system, the institution gathers user requirements from staff and students. This phase is called:

A. Coding
B. Testing
C. Requirement analysis
D. Maintenance

Answer: C

42. A software developer tests whether the examination system modules work correctly together. This is known as:

A. Unit testing
B. Integration testing
C. Acceptance testing
D. Regression testing

Answer: B

43. An examination system is implemented in phases instead of all at once to reduce risk. This strategy is:

A. Parallel implementation
B. Phased implementation
C. Direct changeover
D. Pilot rejection

Answer: B

44. A programmer updates the examination software to fix discovered bugs after deployment. This activity is:

A. Feasibility study
B. Maintenance
C. Analysis
D. Documentation

Answer: B

45. An institution evaluates whether a proposed examination system is affordable and practical. This study is called:

A. Feasibility study
B. Stress testing
C. Benchmarking
D. Reverse engineering

Answer: A

46. A flowchart is mainly used to:

A. Encrypt data
B. Illustrate program logic
C. Remove malware
D. Configure hardware

Answer: B

47. A system analyst creates diagrams showing interactions between users and the examination system. These are called:

A. Use case diagrams
B. Pie charts
C. Histograms
D. Topologies

Answer: A

48. An examination office wants software that can be modified freely by developers. Which type is MOST suitable?

A. Proprietary software
B. Open-source software
C. Commercial software
D. Trial software

Answer: B

49. The examination system fails after new updates are installed. Which testing type ensures existing functions still work?

A. Regression testing
B. Alpha testing
C. White-box testing
D. Black-box testing

Answer: A

50. A software team uses Agile methodology for examination system development. Which characteristic BEST describes Agile?

A. Rigid planning only
B. Continuous feedback and iteration
C. No testing required
D. One-time deployment

Answer: B


Section F: ICT Ethics and Professionalism
51.
An examination officer shares student results with unauthorized individuals. Which ethical principle is violated?

A. Accountability
B. Confidentiality
C. Accessibility
D. Transparency

Answer: B


52.
A staff member installs pirated software in the examination office. This practice violates:

A. Data mining policies
B. Intellectual property rights
C. Cloud computing rules
D. Multiprocessing principles

Answer: B


53.
An examination officer discovers errors in released results. What is the MOST professional action?

A. Ignore the errors
B. Correct and communicate transparently
C. Delete all records
D. Blame students

Answer: B


54.
Using another programmer’s code without permission is an example of:

A. Virtualization
B. Plagiarism
C. Authentication
D. Benchmarking

Answer: B


55.
An institution introduces policies requiring strong passwords. This mainly improves:

A. Physical security
B. Logical security
C. File compression
D. Device cooling

Answer: B


56.
A staff member intentionally alters marks for personal gain. This act is BEST described as:

A. Professionalism
B. Cyber ethics violation
C. Data normalization
D. Optimization

Answer: B


57.
An examination officer is required to maintain accurate records and be answerable for actions performed. This principle is:

A. Accountability
B. Redundancy
C. Fragmentation
D. Scalability

Answer: A


58.
An institution stores examination records according to legal requirements for future reference. This process is:

A. Archiving
B. Routing
C. Debugging
D. Defragmentation

Answer: A


59.
A candidate requests correction of wrongly entered biodata before certification. Which data quality attribute is MOST relevant?

A. Accuracy
B. Compression
C. Replication
D. Availability

Answer: A


60.
An examination office establishes disaster recovery procedures. The MAIN objective is to:

A. Increase downtime
B. Ensure business continuity
C. Reduce internet usage
D. Eliminate backups

Answer: B


Section G: Advanced Scenario-Based Questions
61.
An examination portal crashes during online exams because the server CPU reaches 100% usage. Which upgrade would MOST directly improve performance?

A. Increasing RAM only
B. Replacing monitors
C. Upgrading CPU resources
D. Installing speakers

Answer: C


62.
Students are unable to access examination results because DNS services are down. What is the MAIN role of DNS?

A. Encrypting data
B. Translating domain names into IP addresses
C. Compressing files
D. Allocating memory

Answer: B


63.
An institution wants examination data synchronized automatically between campuses. Which technology BEST supports this?

A. Replication
B. Formatting
C. Defragmentation
D. Virtual memory

Answer: A


64.
An online examination platform logs users out automatically after inactivity. This primarily improves:

A. Availability
B. Security
C. Compression
D. Scalability

Answer: B


65.
The examination office introduces two-factor authentication. Which combination BEST represents this?

A. Username and username
B. Password and PIN
C. Password and fingerprint
D. Email and username

Answer: C


66.
A database administrator splits one large examination table into smaller related tables. Which process is this?

A. Redundancy
B. Normalization
C. Compilation
D. Encryption

Answer: B


67.
An institution needs to ensure examination data remains unchanged during transmission. Which technique BEST supports this?

A. Hashing
B. Formatting
C. Compression
D. Fragmentation

Answer: A


68.
A candidate submits online examination answers, but the internet disconnects before submission confirmation. Which database property ensures incomplete transactions are not saved?

A. Atomicity
B. Scalability
C. Virtualization
D. Multiplexing

Answer: A


69.
A university plans to store huge examination archives for many years at low cost. Which storage solution is MOST suitable?

A. Cache memory
B. Magnetic tape/cloud archival storage
C. CPU registers
D. ROM chips

Answer: B


70.
An examination officer needs graphical summaries of student performance trends. Which software category is MOST suitable?

A. Spreadsheet software
B. Antivirus software
C. Compiler software
D. Operating systems

Answer: A


Section H: Data Communication and Internet Technologies
71.
A university uses Wi‑Fi for examination office communication. Wi‑Fi is an example of:

A. Wired network
B. Wireless network
C. Optical storage
D. Parallel processing

Answer: B


72.
An examination officer sends confidential reports using email attachments protected by passwords. This mainly supports:

A. Data confidentiality
B. Data redundancy
C. Device management
D. Load balancing

Answer: A


73.
Which topology has a central device connecting all computers in the examination office?

A. Ring topology
B. Bus topology
C. Star topology
D. Mesh topology

Answer: C


74.
An institution experiences packet loss during online examinations. Which network issue is MOST likely responsible?

A. Low latency
B. Congestion
C. Authentication
D. Compression

Answer: B


75.
The examination department uses VPN technology for remote access. The MAIN advantage is:

A. Reduced security
B. Secure remote communication
C. Eliminating internet use
D. Faster typing speed

Answer: B


76.
An examination officer notices duplicate IP addresses causing communication failure. Which service can automatically assign unique IP addresses?

A. DNS
B. DHCP
C. FTP
D. SMTP

Answer: B


77.
A student accesses the examination portal using a smartphone. Which technology enables responsive display on mobile devices?

A. Responsive web design
B. Multiprocessing
C. Defragmentation
D. Normalization

Answer: A


78.
An institution uses video conferencing for remote viva examinations. Which network requirement is MOST critical?

A. High bandwidth
B. Low storage
C. Weak authentication
D. Reduced RAM

Answer: A


79.
An examination office experiences unauthorized wireless access. Which action BEST improves Wi‑Fi security?

A. Disable passwords
B. Enable WPA2/WPA3 encryption
C. Increase monitor size
D. Share credentials publicly

Answer: B


80.
The examination office website becomes inaccessible because its domain registration expired. Which service was MOST affected?

A. Hosting
B. Domain name registration
C. Routing
D. Indexing

Answer: B


Section I: Programming and Logic
81.
A programmer writes a loop that never ends while processing examination records. This is called:

A. Finite loop
B. Infinite loop
C. Nested loop
D. Recursive call

Answer: B


82.
An examination officer wants software to validate student IDs automatically before submission. Which programming concept is MOST relevant?

A. Input validation
B. Virtualization
C. Fragmentation
D. Routing

Answer: A


83.
A program crashes when invalid marks are entered. Which programming practice helps avoid this?

A. Exception handling
B. File formatting
C. Compression
D. Routing

Answer: A


84.
A software developer stores examination marks in an array. What is the MAIN advantage?

A. Stores mixed unrelated data only
B. Allows indexed access to multiple values
C. Eliminates memory use
D. Replaces databases

Answer: B


85.
An examination system calculates grades automatically based on marks ranges. Which programming structure is MOST suitable?

A. Sequence only
B. Decision structure
C. Infinite loop
D. Compilation

Answer: B


86.
A programmer wants reusable code for generating examination reports. Which concept is MOST appropriate?

A. Function/procedure
B. Fragmentation
C. Multiplexing
D. Encryption

Answer: A


87.
An examination system stores student objects with attributes such as name and registration number. Which paradigm is this?

A. Procedural programming
B. Object-oriented programming
C. Assembly programming
D. Machine language

Answer: B


88.
A programmer tests individual modules separately before combining them. This is:

A. Unit testing
B. Integration testing
C. Acceptance testing
D. Beta testing

Answer: A


89.
An examination portal displays an error because variables were declared incorrectly. Which stage would MOST likely detect this?

A. Compilation
B. Routing
C. Transmission
D. Scheduling

Answer: A


90.
An institution wants examination software to work on different operating systems. Which approach is BEST?

A. Platform-dependent development only
B. Cross-platform development
C. Manual processing
D. Analog computing

Answer: B


Section J: Comprehensive Mixed Scenarios
91.
An examination officer receives complaints that online results are displayed very slowly. Monitoring shows excessive database queries. Which solution is BEST?

A. Increase paper usage
B. Optimize queries and indexes
C. Remove the database
D. Disable networking

Answer: B


92.
An institution wants automatic alerts when suspicious login attempts occur. Which technology is MOST suitable?

A. Intrusion detection system
B. Spreadsheet software
C. Printer drivers
D. File compression

Answer: A


93.
An examination database stores passwords in plain text. What is the BEST improvement?

A. Use password hashing
B. Print passwords
C. Share passwords openly
D. Store passwords in Word files

Answer: A


94.
An examination office migrates from paper-based records to digital systems. Which challenge is MOST likely during transition?

A. User resistance and training needs
B. Elimination of all risks
C. Reduced need for policies
D. Removal of all hardware

Answer: A


95.
A university stores examination data in the cloud and wants guaranteed uptime. Which agreement is MOST important?

A. Service Level Agreement (SLA)
B. Routing table
C. Source code license only
D. BIOS settings

Answer: A


96.
An examination officer notices that system logs show repeated failed login attempts from one IP address. What should be done FIRST?

A. Ignore the logs
B. Block or investigate the suspicious IP
C. Delete all user accounts
D. Shut down all computers permanently

Answer: B


97.
A university examination system allows students to recover forgotten passwords through email verification. Which security concept is being applied?

A. Authentication recovery
B. Data redundancy
C. Multiplexing
D. Defragmentation

Answer: A


98.
An examination officer exports student results into PDF format before sharing. Why is PDF commonly preferred?

A. Easy modification by everyone
B. Consistent formatting across devices
C. Requires compilation
D. Removes security automatically

Answer: B


99.
An institution introduces automated backup schedules for examination data every night. Which security objective does this MOST support?

A. Availability
B. Routing
C. Compression
D. Fragmentation

Answer: A


100.
An examination officer is asked to design a secure and efficient examination management environment. Which combination is MOST appropriate?

A. Shared passwords and no backups
B. Encryption, role-based access, backups, and audit logs
C. Public Wi‑Fi with no authentication
D. Manual-only processing without verification

Answer: B


Share:

Contact Us

SALEHE NJOHOLE P.O.BOX 2428, DAR ES SALAAM, TANZANIA EAST AFRIKA. Call: 0692 127 931