ict - g8(1) (2)
ict - g8(1) (2)
ict - g8(1) (2)
1. Consider the following steps and arrange them in the proper order in which they occur.
A. Displaying “A” on the monitor
B. User presses key “A” on the keyboard
C. Processor identifies the bit pattern 01000001.
6. The very small port that can be found on many mobile phones, tablets and other portable
devices is,
a. USB port b. Micro USB port c. Parallel port d. HDMI port
7. The common port that can connect most computer devices is,
a. HDMI b. VGA c. PS2 d. USB
15. ____________ can be used to change the configurations and settings of a computer.
a. Operating System b. Application Software c. Utility software d. Virus
2. Fill in the blanks using the most suitable words given below.
(VGA / Extension / Hidden / Enter / Virus / Read only / Binary / Save as / Title / HDMI / Restart /
Base)
a. What is an algorithm?
b. Draw all the symbols used to create a flowchart and label them.
c. Draw a flowchart to solve the following problems.
To input basic salary of an employee, name, hours worked and rate paid for an hour. Calculate the
total salary and if the total salary is above $500, display “Good Employee” or else display
“Average”.
d. Write an algorithm for the given flowcharts. Mention which control structure it uses.
5. Convert the following decimal numbers to binary format. Please show the steps of
calculations clearly on the paper.
a. 221
b. 609
c. 114
d. 203
e. 715
a. 10012
b. 10112
c. 111002
d. 110112
e. 101012
7. Match correctly.
A B
PS/2 port - purple Connect printer
PS/2 port - green Connect Router
VGA port Connect Keyboard
HDMI port Connect multimedia projector
RJ45 port Connect monitor
Parallel port Connect Mouse
8.
1. Write down 3 devices that can be connected to a computer using the USB port.
2. Write down 3 examples for troubleshooting hardware problems.
3. Write down 3 examples for troubleshooting application software problems.
4. Write down 3 problems in the operating system.
9. Write down the HTML code for the following web page.
Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.
Alternative Proxies: