set3 ict-question
TRANSCRIPT
SET3 ICT 2007
SECTION A - ANSWER ALL THE QUESTIONS.(36 marks)
Instruction : Circle the correct answer ( No 1 – 12)
1. ______________is any data or instruction you enter into the memory of a computer. A. Input B. Output C. Process D. Storage
2. The spreadsheet feature that blocks users from modifying or erasing information in a worksheet is called A lock. B shield. C blocker. D protection.
3. When you press a key on a board, the electronic signal is converted into a binary form that the computer can process and stored in? A. Memory B. Character code C. Computer code D. Morse
4. Camcorders and other video equipments use a to transmit data onto a computer. A. USB Port B. Serial Port C. Parallel Port D. FireWire Port
5. A _______________is designed to connect the system unit to a musical instrument, such as an electronic keyboard. A. MIDI port B. IrDA port C. SCSI port D. FireWire Port
6. For wireless devices to transmit signals to a computer, both the computer and the device must have a _________________A. MIDI port B. IrDA port C. SCSI port D. FireWire Port
7. _________ can transfer information between their mobile devices to another computer.A. SOHO users B. Power users C. Mobile users D. Large business users
8. What is the function of Macro?A Returning a value from the same table. B Solving tasks that contain lengthy lists. C Making use of shortcut keys. D Automating complex tasks and reducing the number of steps required to complete tasks that are performed frequently.
9. What are the codes used by computers to send and receive information? A. Binary code B. Baudot code C. Input and output D. Character code
10. Selvi is having a video conference with her colleagues in India. The most suitable input devices are …………..I. monitor II. Speaker III. webcam IV. microphone A. I & II B. II & IV C. II, III & IV D. All the above
11.An audio output device can produce ……I. music II. image III.speech IV. sounds A. I and II B. II and III C. III and IV D. I, III and IV
12.The Central Processing Unit (CPU) controls the operation of the computer. It …. A. connects the cable to the ports B. carries out the basic hardware function C. interprets and carries out the basic instructions that operate a computer D. is the socket, where the circuit boards or the adapter cards can be inserted into the motherboard
Fill in the blank with the correct answer. (No.13 – 17)13.Computer fraud is defined as the use of computer with _______________ to get advantage or causing loss to other people mainly on monetary basis.
14_________ can transfer information between their mobile devices to another computer.
15. A computer system requires four main aspects of data handling to function properly which are input devices, processor, ___________, and storage devices.
16. The CPU is an example of a___________. It has the same importance as the brain to human beings.
17. A _____________is defined as combination of components designed to process data and store files.
Instruction: Match the correct answer. (No.18 – 21)
Instruction: Choose either ‘True’ or ‘False’.
STATEMENT TRUE FALSE
22. An extranet is a private network that
uses Internet technology and the
public telecommunications system.
23. With e-banking, most of the
transactions can be done at home or
from the office only during banking
hours.
24. LAN is an acronym for Large Area
Network.
1
18.
19.
20.
21.
FetchPerforms the requested instruction, such as adding two numbers or deciding which one of them is larger.
ExecuteStores the results in an internal register (a temporary storage location or in memory).
Store Determines what the program is telling the computer to do.
DecodeRetrieves the next program instruction from the computer’s memory.
A.
B.
C.
D.
25. A server is needed in a peer-to-peer
network.
26. For communications across the
Internet, we need to have
protocols to demonstrate how data
should be packaged and sent.
27. ROM and Hard disk are examples of
secondary storage.
28. RAM is non-volatile.
29. Microsoft Windows is an example of
application software.
30. Open source software usually comes
without warranty and support should
the software fail or malfunction.
31. Computer threats can come in many
ways either from human or natural
disasters such as fire, flood,
earthquakes, storms and tornados.
32. Proxy gateway is one of the types of
Data Backup program.
33. Virus signature and inoculate a
program file are the techniques that
are used to identify a virus.
34. A computer system is only referring to
the monitor, keyboard, mouse and
central processing unit (CPU).
35. Microprocessor speeds are
determined by their clock speed.
36. Paedophiles are people who exploit
children for sexual pleasure.
SECTION B (20 marks)
Question 1 (4 marks)
Below is a list of step which shows how a BIOS works.
a) Turn ________________ the PCb) ___________ read instructions from BIOS.c) Instructions in BIOS tell the computer how to access
the _____________________d) Instructions in BIOS tell the computer for to find the
operating system.e) Load the operating system to ________________
Question 2 ( 4 marks)Instruction: Label the diagram correctly
Question 3 (Student’s Copy)
A _________________ gives authors and artists exclusive rights to duplicate, publish or sell their materials.
______________ are capable of disabling filters and gateway software of computer system.
A _____________ includes any activities taken to disrupt the equipment of computer systems, change processing control, or corrupt stored data.
Hidden writing, the practice of using password to conceal text.
2