Exam

Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

GOZO COLLEGE

BOYS’ SECONDARY SCHOOL


Embracing Diversity

Half Yearly Exams


2013-2014

Subject: Information Communication Technology

Form: 3 Track 3

Time: 1 hour

Name: _____________________________

Class: _____________________________

Instructions to Candidates

Answer all questions.

Page 1 of 10
1. Fill in the table below by using the following words:
Malware GHz CPU bit Memory Card
RAM File Compression Data Backup Online File Storage Hard Disk

a) Also known as the ‘brain’ of the computer.


b) The unit used to measure CPU speed
c) The main storage device where we store data inside our computer.
d) Temporary Storage that holds the programs that are currently being used.
e) Keeping an extra copy of your data.
f) The device on which images are stored in a digital camera.
g) This is used to reduce the size of data files on our computer.
h) Programs that are intended to damage our computer.
i) The smallest unit of computer storage.
j) This allows you to store your files on the Internet. (Dropbox is an example.)

[1 x 10 = 10marks]

2. Underline the correct answer:

a) Malware is a
i. program designed to do harm to a computer system.
ii. program used to download software for free.
iii. hardware device found inside the computer system.

b) Virus, Worms, Trojan horses and Spyware are:


i. programs used to send files on a network.
ii. types of Malware.
iii. input devices.

c) An antivirus software:
i. is used to prepare documents.
ii. should not be updated regularly.
iii. detects the presence of viruses and removes them.

d) History.zip is an example of:


i. an Excel file.
ii. a powerpoint presentation.
iii. a compressed file.

Page 2 of 10
e) File compression:
i. reduces the size of the file.
ii. increases the size of the file.
iii. attaches the file to an E-mail.

f) Input/output ports are:


i. CDs with computer games.
ii. slots where cables from peripherals connect to the computer.
iii. are used to store important data.

g) Which one of the following is NOT an Input/Output Port?


i. USB
ii. Memory Card
iii. HDMI

[7 x 1 = 7marks]

3. List the units of storage starting from the smallest:

1 bit
2
3
4
5
6

[5 x 1 = 5marks]

4. Complete the following exercise, by filling in the appropriate storage device.

Memory Card External Hard Disk DVD


CD Online Storage Internal Hard Disk
Network Drive Blu-Ray Disc USB Flash Drive

a) An optical storage device with a capacity of 4.7GB. Dual Layer with


a higher capacity up to 17GB.

b) A disk which was developed recently to store large amounts of high


definition video. Storage capacity ranges between 25GB to 200GB.

c) A portable device that is attached to the computer using a USB cable


instead of being placed inside it. It is used to store large amounts of
data for backup purposes. Storage capacity usually 1TB or more.

d) An optical storage device with a capacity of 700MB

Page 3 of 10
e) A portable device which connects to the computer via USB. It is
small, lightweight and can be carried in your pocket very easily.
Storage capacity ranges between 2GB TO 256GB.

f) Typically found in the computer. All computer programs installed on


this device. Stores large amount of data. Storage capacity usually
1TB or more.

g) A small storage device which is used in smart phones and digital


cameras to store digital pictures or videos.

h) A drive which is shared among users on a network. Similar to the


‘Student’ drive we have at school.

i) A service which allows users to upload data on the Internet. The


advantage of such service is that the user can access the files from
everywhere being at home or at work.

[9 x 1 = 9marks]

5. What do the following abbreviations stand for?

a) RAM _________________ _________________ _________________

b) USB _________________ _________________ _________________

c) HDMI _________________ _________________ _________________ ________________

d) CPU _________________ _________________ _________________

[4 x 1 = 4marks]

6. Use the following terms to define the following malware definitions:

VIRUS SPYWARE TROJAN HORSE WORM

a) They make copies of themselves and are more concentrated on


slowing computer systems or Internet connections.

b) Do not replicate themselves. They are attached to other


programs, and when the program is run this type of malware
becomes activated.

c) It makes additional copies of itself and spreads from location to


location. Written for malicious intent to annoy the user or at
worst case corrupt/delete files.
d) A program that secretly installs itself in your computer and starts
sending information from your computer to other people.
[4x1=4marks]

Page 4 of 10
7. Give the name of the Input/Output port being described.

is a slot in the computer that supports fast transfer


data rates. Pen Drives, digital cameras, mice,
a)
keyboards etc can be connected to the computer
via this port.

is a slot on the computer that supports the transfer


b) of audio and video data through a single cable.

is used to connect the computer to a network or a


c) modem.

is a slot that connects digital video cameras to


d) the computer. FireWire supports faster transfer data rates
than USB ports.

[4x1=4marks]

8. Fill in the blanks with the following words:

Operating System Applications Processing


Main Memory GHz Brain

The CPU is the single most important item of all the hardware within the system and is labelled as

the ____________________________ of the computer. It is responsible for the running of the

____________________________ (e.g. Microsoft Windows) as well as your

____________________________. It performs all the ____________________________ within

the computer. It also accesses and uses the ____________________________ called RAM

available in your computer. In many ways, the CPU controls the overall speed of your computer

which is measured in ____________________________.

[6x1=6marks]

Page 5 of 10
9. File Compression is a useful feature in a computer system.

a) Give two reasons why a user may want to compress a file or folder.

b) Write the name of a utility program that can be used to compress a file ________________

[3x1=3marks]

10. Refer to the following picture and answer the questions below:

a) What Operating System is this computer using? ________________________

b) What is its Processor type? ________________________

c) At what speed does this processor run? ________________________

d) How much memory is installed on this computer? ________________________

[4x1=4marks]

Page 6 of 10
11. Look carefully at the image below and answer the questions on the right.

a) What is the total Storage


Capacity of this Hard Disk?
________________________

[1 mark]

b) How much storage space is still


empty?
________________________

[1 marks]

c) How much storage space is


used?
________________________

[1 marks]

d) How do you open the dialog box


shown on the left?
________________________

________________________

[1 marks]

12. We can set the word processor to display non-printing characters.

a) Draw a circle round the button that should be clicked to display the non-printing characters.

b) Match the non-printing formatting marks to their equivalent type by writing the letter.

[6x1=6marks]

Page 7 of 10
13. Look at the screenshot below:

a) The two words that are automatically hyphenated


are _______________ and ________________ .
[1 marks]

b) Number the steps to hyphenate a paragraph.


Click on Hyphenation
Click on the Page Layout Tab
Highlight the paragraph
Click on Automatic from the drop down menu
[4 marks]

14. Joey needs to create the table shown below in a document he is preparing.

Brand Mobile Price


Samsung Galaxy S4 €450.00
Nokia Lumia 525 €760.00
Apple iPhone 5s €800.00
Acer Liquid S2 €530.00

a) Draw a circle around the button that Joey needs to click to create the table.

[1 mark]
b) After clicking the button, the picture shown on the right
appears. Shade the cells required to create the Table
about Smartphones shown above.
[1 mark]
c) This table has _____ rows and _____ columns.
[1 mark]

Page 8 of 10
15. Input the correct letters according to the table tools shown in the picture.

A B C

D E

a) To apply borders to the table we click on the button marked with the letter ____ [1mark]

b) To apply a pre-set style to a table we click on the button marked ____ [1mark]

c) To apply shading to a cell we click on the button marked ____ [1mark]

d) To change the thickness of the border we click on the button marked ____ [1 mark]

e) To change the colour of the border we click on the button marked ____ [1mark]

16. The Mnarja Band Club Committee would like to send a personalized letter to every member
informing them about the upcoming concert.

a) Which word processing feature would you suggest to combine a single document (letter)
with a data file (containing names and addresses): ______________________.
[1mark]
b) How many files are needed to make the above mentioned task? _______ [1mark]
c) Number the following steps of mail merge in order. The first one is made for you.

i Save merged document


ii Select recipients (select data source)
iii Preview results
iv Complete and merge the document
v Start or load a document – select if you’re doing a 1
letter, envelopes, labels or normal word document.
vi Insert merge fields
[5marks]

Page 9 of 10
17. The image below shows the Mail Merge toolbar. Some items are numbered.
Write the appropriate number next to its matching description in the table below.

1 3 4 6

2 5 7 8

a Navigate through records in the recipient list – for example


preview the last record.
b Select recipients (select data source).

c Start a mail merge to create a letter, envelops, labels or a


normal word document. 1
d Make changes to the list of recipients and decide which of
them should receive your letter.
e Complete the mail merge to a separate document, directly
to printer or via e-mail.
f Replace the merge fields in your document with actual data
from your recipient list so you can see what it looks like.
g Add any field from your recipient list to your document
such as ‘Name’, ‘Surname’, ‘Address’, ‘Telephone’.
h Check for Errors – specify how to handle errors that occur
when completing the mail merge.

[14 marks]

Page 10 of 10

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy