Demonstrate Digital Literacy Nov/Dec 2021 Past Paper (L 5)
INSTRUCTIONS TO CANDIDATES Maximum marks for each question are indicated in brackets ( ). This paper consists of THREE sections: A, B and C. Answer questions as per instructions in each section. You are provided with a separate answer booklet. This paper consists of SEVEN (7) printed pages Candidates should check the question paper to ascertain that all pages are printed as indicated and that no questions are missing SECTION A (20 MARKS) Attempt ALL questions in this section. Each Question has one (1) Mark 1.Which of the following is an operating system? A. Windows B. Avast C. Microsoft D. Microsoft windows 2.Which of the following is a computer hardware device? A. Malware B. Microsoft word C. Network D. Monitor 3.Which of the following is a temporary storage medium? A. Flash disc B. Hard disc C. RAM D. CD RW 4. Which computer device is used to produce softcopy output? A. Scanner B. Camera C. Monitor D. Plotter 5. Which of the following runs computer programs? A. Word processing B. Presentation C. Database Management D. Operating system 6. Which of the following is a computer input device? A. Mouse B. Operating system C. Monitor D. RAM 7. Which of the following is a legal method of acquiring software in an organization? A. piracy B. spoofing C. Tailor making D. Cracking 8. Which of the following is an application program used to make documents such as letters, memos and minutes in an office? A. Microsoft excel B. Microsoft power point C. Microsoft word D. My SQL 9. Which of the following terms refer to elimination of programs and its associated files from a computer hard drive? A. Deleting B. Uninstalling C. Scanning D. Restarting 10. Which technology was used by computers in the first generation? A. Vacuum tubes B. IC C. VLSI D. Transistors 11. Which of the following devices is used to convert soft copy to hard copy in computing? A. Scanner B. Camera C. Printer D. Speakers 12. Which of the following is a data security threat? A. Privacy protection B. Malware attack. C. Properly saving files. D. Scanning external drives. 13. Which one of the following is an attribute of computer classification? A. Physical size B. software C. company D. hardware 14. What is the process of removing unwanted part of an image? A. Hiding B. Bordering C. Cropping D. Cutting 15. Which of the following is a legal method of acquiring a software? A. piracy B. spoofing C. Tailor making D. Cracking 16. What does the term email in full? A. Everyday mail B. Exciting mail C. Electronic mail D. Electric mail 17. What is the name of the space left between the margin and the start of a paragraph? A. Spacing B. Gutter C. Indentation D. Alignment 18. What term refers to the intersection of rows and columns in a spreadsheet file? A. Cells B. Worksheets C. Spreadsheets D. None of these. 19. Which program should be installed to protect a computer from malicious attack? A. backup wizard B. disk clean-up C. antivirus D. disk defragmenter 20. Which of the following practices may lead to spread of computer virus? A. Sharing infected secondary storage devices B. Installing antivirus software C. Downloading programs from the internet D. Sharing a monitor with a colleague. SECTION B (40 MARKS) Answer all the questions in this section on the answer booklet provided. 21. State TWO functions of information communication technology in an organization (2Marks) 22. List TWO examples of optical computer storage media (2Marks) 23. Describe computer input, output and storage devices giving an example in each case. (6Marks) 24. What is the meaning of the following terms as used in computer security? i. cyber bullying (2Marks) ii. cracking (2Marks) 25. State FOUR factors you would consider when purchasing a software (4Marks) 26. Draw a labelled diagram of a star network topology (4Marks) 27. List FOUR networking devices used to create networks in organizations. (4Marks) 28. Differentiate between a worksheet and workbook as used in MS spreadsheets (4 Marks) 29. Distinguish between database and data bank. (2Marks) 30. You have been asked to save a word document on your computer. List the steps you would follow in accomplishing the task. (4Marks) 31. Distinguish between Sorting and Searching as used with computer files. (4Marks) SECTION C (40 MARKS) Answer two of the two questions in this section. 32. John has been appointed as the head of the newly created Information Communications Department of ABC limited. He is contemplating on setting up a computer network infrastructure to coordinate the activities between departments within the company. a) Define the term computer network. (2 marks) b) List six devices that John will require to setup the computer network (6 marks) c) State six benefits that ABC will enjoy after the installation of the computer network (6 marks) d) List six challenges the company may experience after the installation of the computer network (6 marks) 33. Jane is in the process of acquiring computer hardware for her newly established firm. She has approached you as an ICT expert to guide her in the computer hardware acquisition process. a) Define the term computer hardware (2marks) b) List two categories of computer hardware that Jane is likely to buy (2 marks) c) State six factors to consider when selecting the computer hardware (6 marks) d) Highlight six measures that you would advise Jane to follow to ensure computer hardware security (6 marks) e) Jane has tasked you to assemble the computer hardware after purchase. List four computer hardware devices you are likely to come across. (4 marks) 34. Computer technology has become an integral part of our daily lives. This has resulted to different challenges from the use of the technology. a) Discuss the challenge of this technology in the following areas i. Health (5 marks) ii. Security (5 marks) b) Despite the inroads made in the field of computing technology, some people are yet to enjoy these benefits. i. List five causes that make people
Demonstrate Digital Literacy Nov/Dec 2021 Past Paper (L 5) Read Post »