Use the Internet Nov/Dec 2023 Past Paper
INSTRUCTIONS TO CANDIDATES 1.This paper has TWO sections A and B. Attempt questions in each section as per instructions given in the section. 2.You are provided with a separate answer booklet. 3.Marks for each question are indicated in the brackets. 4.Do not write on the question paper This paper consists of 4 printed pages Candidates should check the question paper to ascertain that all pages are printed as indicated and that no questions are missing. SECTION A: 10 MARKS Answer ALL questions in this section. Each question carries ONE Mark. 1. The following are web browsers, which one is not. A. Edge B. Chrome C. Java D. Mozilla 2. ____ is an online service that allows users to look for information on the internet. A. Search engine B. Firewall C. Wi-Fi D. Internet Services 3. A cyber-attack in which attackers use fraudulent emails, messages or websites to deceive individuals into disclosing sensitive information A. Trojan horse B. Spoofing C. Phishing D. Hacking 4. Which statement correctly defines the term Internet? A. interconnection of computers B. interconnection of communicating networks C. interconnections of wireless fidelity D. interconnection of routers 5. The process of getting information from the internet and saving it on a computer is known as? A. Uploading B. Saving C. Downloading D. Forwarding 6. _______ is a unique identifier used for locating resources on the internet A. URL B. World Wide Web C. TCP D. IP Protocol 7. Which statement correctly describes a website A. Interconnections of webpages B. Inter-collection of webpages under a single domain C. Word wide web D. An online server where information is stored 8. Tabitha Realized that her webpage was responding slowly and then stopped completely even though her internet was working correctly. Which type of attack was this likely to be A. Hacking B. DoS C. Trojan Horse D. Spoofing 9. The following are ways of protecting an internet user from internet security threats, which one is NOT. A. Virus B. Passwords C. Firewall D. Secure Sites 10. The unique identity of a computer in a computer network is known as? A. MAC address B. IP address C. Computer Number D. Computer BIOS SECTION B: 40 MARKS Answer ALL questions in this section. 11. Several needs must be satisfied to obtain internet access. Outline THREE such criteria. (3 Marks) 12. Makau, an assistant IT Technician, was tasked with protecting the institution’s systems against online risks. Explain TWO ways he might accomplish this. (4 Marks) 13. Jonathan was browsing the internet when he noticed that the web address in the address bar alternated between http and https: Explain the TWO categories he saw. (4 Marks) 14. Malware is software that often interrupts a computer’s regular operation and is widely utilized by cyber thieves. Explain THREE types of malware. (6 Marks) 15. Explain the following terms as used in the internet a) Word wide web (2 Marks) b) Internet Protocol (2 Marks) 16. It is advisable to avoid using public Wi-Fi when doing online shopping. Give THREE reasons for the need for this precaution. (3 Marks) 17. Explain the functions of each of the following parts of an internet browser. a) Bookmark bar (2 Marks) b) Refresh button (2 Marks) 18. The use of the Internet has increased the rate and effectiveness of communication between entities. List THREE mediums of communication over the Internet. (3 Marks) 19. The usage of the internet has resulted in a loss of morals among young people who are active users. Explain the other THREE internet limitations that young people face. (6 Marks) 20. Internet users often experience cyberbullying. State THREE strategies to prevent this cyberbullying. (3 Marks)
Use the Internet Nov/Dec 2023 Past Paper Read Post »