0% found this document useful (0 votes)
204 views

G9 Mock Exam

Computer studies paper 1

Uploaded by

Timothy Kamoya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
204 views

G9 Mock Exam

Computer studies paper 1

Uploaded by

Timothy Kamoya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

SECTION A: [20 MARKS]

Answer all questions. Mark your answers with a cross (X) on the Answer Grid provided
in the Answer Booklet.
1. A monitor is an example of ……………………….
A hardware
B software
C screen
D computer
2. …………is the term that refers to the hardware that is connected externally to a
computer.
A external device
B mouse
C peripheral
D flash disk
3. The CPU can be classified as…………….device.
A input
B processing
C output
D central processing unit
4. A computer virus is a………………………………….
A hardware
B live ware
C disease computer
D software
5. Which key can move the cursor backwards without deleting text in a document?
A enter
B left arrow key
C backspace
D right arrow key
6. ……..is a box for holding data in the spreadsheet.
A text box
B data box
C spreadsheet box
D cell
7. Desktop publishing is used to publish packages on the computer to produce publications
such as…….
A Newspapers
B Presentations
C Calculations
D word documents
8. What is the correct formula for performing the sum of B2 and B3 in a spreadsheet?
1
A sum= (B2-B3)
B =B2+B3
C Sum B2 + B3
D =Sum (B2:B3)
9. A small computer found in household appliances is called………………….
A microprocessor
B program
C sensor
D appliance computer
10. Convert 4096 bytes to kilobytes.
A 6.5 kilobytes
B 4.2 kilobytes
C 0.4 kilobytes
D 4.0 kilobytes
11. The following shape shows………………..orientation
A Portrait
B Rectangular
C Landscape
D Shape
12. What are two types of commonly used printers?
A. Plotter and dot matrix
B. Digital scanner and DVD burner
C. Colour and black & white
D. Laser and inkjet
13. What is the most distinctive difference between LAN and a WAN?
A. Wireless combined with wired network being used
B. Different topology used (i.e. Star, bus or other)
C. Distance Covered by the network
D. The different types of users for each network

14. Which kind of mathematics does the computer use in performing its
operations/functions?
A. Binary
B. Decimal
C. Spreadsheet calculations
D. Algebra

15. Which command will delete a file permanently?


A. Ctrl + backspace
B. Ctrl + D’
C. Shift + Delete
2
D. Windows key + Delete
16. Which is the smallest storage unit in memory?
A. Bit
B. Word.
C. Byte
D. Bit stream
17. The QWERTY keyboard is named after the .
A. Inventor of typewriters.
B. First computer programmer.
C. company who developed keyboards.
D. Layout of the alphabetic keys.
18. A temporary holding area for data, application instructions and the operating system
is the
A. Hard disk
B. RAM
C. Register
D. ROM
19. Which of the following components has the highest failure risk?
A. Hard Disk.
B. Magnetic Tape.
C. Compact disk.
D. RAM.
20. To protect a computer from the damaging effects of power surge, one needs to have a …
A. UPS.
B. Suitable software.
C. Transformer.
D. New motherboard.

3
SECTION B: [20 MARKS]

There are fifteen (15) questions in this section.

Answer all the questions in this section by using one word or a short phrase.

Write all answers in the answer booklet provided.

1. A byte is equal to…………………………………bits. [1]

2. ……………………..and……………………..are examples of personal computers. [2]

3. The acronym I.S.P stands for……………………………………………………………[1]

4. Addition, subtraction……………………and……………………..are the arithmetic

operations performed by the CPU. [2]

5. Escape (Esc) key on the keyboard allows a user to………………………an operation. [1]

6. …………………and……………….are examples of programmers that corrupt and

destroy computer files. [2]

7. The keyboard buttons…………….and………………..when pressed together is an

instruction for selecting all text or icons. [2]

8. A type of cybercrime where personal details are stolen is known as……………….. [1]

9. The clarity of an image on a computer is determined by the number of……………….[1]

10. The two suitable printers for printing magazines and identity cards are…………………...

.and………………………. [2]

11. ………………………… are items entered on a computer as an input. [1]

12. ………………………….holds programs while the computer is on. [1]

13. …………………………is a device for sending images over a telephone line. . [1]

14. To use a computer network, a user must log on by entering the username and.……… [1]

15. A quick way to reproduce the same words typed is by using the………….…………...[1]

4
SECTION C [30 MARKS]
There are five questions in this section.
Answer all the questions in the Answer Booklet provided.

1. The diagram below shows a log-in screen on a network. To gain access to the network
the user ID and password must be entered

User ID*

Password*

Log on problems? Get support

(i) Why is it important to use passwords to log into a computer system?


……………………………………………………………………….
(ii) Why is it not a good idea to keep using the same password for a long time?
…………………………………………………………………………….
(iii) What is the characteristic of a good password?
………………………………………………………………………………..

2. Study the diagram below and questions that follow

a) What do we call the physical parts of the computer?


…………………………………………………………
b) Use numbers to list two input devices from the diagram above.
………………………………………………………………….

5
c) Distinguish between the output produced by 1 and 6.
…………………………………………………………………..

A school uses a memory stick as a backup device to store computer studies assessments projects.
(a) Name two other storage devices that the school could use to store computer studies
assessments projects……………………………………………………
…………………………………………………………………………
(b) Give two advantages of using the memory stick……………………………
……………………………………………………………………………..
(c) Explain why it is important to backup information regularly……………..
…………………………………………………………………………

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy