0% found this document useful (0 votes)
68 views

Tutorials For Computer Stuides 1 Dla

This document provides a tutorial for a computer studies exam that is divided into three parts. Part I consists of 20 multiple choice questions worth 20% of the exam. Part II contains structural questions from various computer science courses worth 30% of the exam. Part III repeats the multiple choice question format from Part I, also worth 20% of the exam. The document provides samples of the types of questions that will be on the exam, covering topics like hardware, software, operating systems, applications and ethical issues in computing.

Uploaded by

abahthomasn
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
68 views

Tutorials For Computer Stuides 1 Dla

This document provides a tutorial for a computer studies exam that is divided into three parts. Part I consists of 20 multiple choice questions worth 20% of the exam. Part II contains structural questions from various computer science courses worth 30% of the exam. Part III repeats the multiple choice question format from Part I, also worth 20% of the exam. The document provides samples of the types of questions that will be on the exam, covering topics like hardware, software, operating systems, applications and ethical issues in computing.

Uploaded by

abahthomasn
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 18

TUTORIALS FOR COMPUTER STUIDES 1

I. This part is made up of MCQs and contributes for 20% of the entire paper. For each MCQs, four (04) answers
are proposed and only one is correct. (20 marks)

1. All the following are components of the CPU except.


a. ALU
b. Register
c. CU
d. RAM
2. When you see ######### in a cell in a spreadsheet software, It implies?
a. The data is corrupted
b. A user deleted the data
c. The data exist but its hidden
d. The cell width is too small to contain the data.
3. You want to send an e-mail to 2 friends. You do not want the second friend to see the e-mail id of
your first friend. Which field should you select to mark your first friend's e-mail id?
a. Subject
b. CC
c. BCC
d. To
4. You use your digital camera to record your friend riding his new bike. You want to remove the
portion in the video where he skids. What type of software will you use to do this?
a. Desktop publishing
b. IM
c. Presentation
d. Digital video editing
5. Which of the following allows you to write wipe and write again?
a. CD-R
b. CD-RW
c. CD-ROM
d. CD-Unlimited
6. What is hardware?
a. An item of information
b. A physical part of a computer
c. Instructions on what makes parts work
d. Rules designed to make a computer connect with each other
7. You use a word processor to create and save a text-based document on your computer. What type
of information is the text in your document?
a. Operating system
b. Hardware
c. Application
d. Data
8. What is the Internet?
a. A product that results from the world wide interconnection of networks
b. An electronic device used in the past for printing and sharing documents
c. A backup source for data
d. A network of networks
9. What is the purpose of Microsoft Windows Firewall?
a. blocks unwanted popups
b. Blocks word processing programs
c. Install security patches
d. Restricts unauthorized access
10. Which technology will ensure that transactions between your computer and an online store are
secure?
a. Antivirus program
b. Cookies
c. Secure Sockets Layer
d. Microsoft Windows Firewall
11. What is the status of a computer that is connected to the Internet?
a. Online
b. Logged in
c. Stand by
d. Browsing
12. Which technology can a website use to allow you to listen to a live concert over the Internet?
a. Sampling
b. Streaming
c. Speech synthesis like for TV
d. Video recording and playing
13. Everyday, you receive e-mail messages from unknown senders. What is the term for this type of
security threat?
a. Slander
b. Spoofing
c. Spam
d. Blackmail
14. You like to help install new computers on a network, add and remove indiviuals from a list of
authorized users, and archive files on a computer. Which job role should you consider?
a. Database administrator
b. Network administrator
c. Software developer
d. System Administrator
15. Which type of program can you use to create business cards and brochures?
a. Movie maker
b. Desktop publishing
c. Antivirus
d. Instant messenger
16. Which program can help you detect and prevent malicious activities on your computer?
a. Ethernet protector
b. Trojan horse warriors
c. Worm killer
d. Spyware fighting software
17. Which action can you describe as a copyright violation?
a. Reading material from a publicly available website
b. Distributing someone else’ original work as yours
c. Quoting a paragraph and referencing the source
d. Sharing a website address on social media
18. You create a document by using Microsoft Word 2010. You want to place a title in the center of
the page. Which feature can you use to do this?
a. Spacing
b. Font size
c. Alignment
d. Font style
19. Which device can you use to record a video?
a. Scanner
b. MP3 recorder
c. Camcorder
d. Player
20. It is not concerned with messages on the internet?
a. POP3
b. SNMP
c. SMTP
d. IMAP

II. This part is made up of structural questions from all the various courses as in first part and it constitute of
30% of the entire question paper (30 marks)

1. How are computers useful in the following areas:


a. Health (2 marks)
b. Education (2 marks)
c. Business (2 marks)
d. Government (2 marks)
e. Banking (2 marks)
2. What’s a software? Distinguish between system software and application software.
What do you understand by a bespoke software? (2,4,2) marks

3. Explain the role of the following hardware in the computer:


a. RAM 2marks
b. ROM 2marks
c. CPU 2marks
d. CMOS battery 2marks
4. Discuss the following ethical terminologies:

a. Copyright 2marks
b. Piracy 2marks
III. This part is made up of MCQs and contributes for 20% of the entire paper. For each MCQs, four (04)
answers are proposed and only one is correct. (20 marks)

1. Your sister travels to another country for an on-site business project. You want to tell her
about your new job by sending her an e-mail message from your computer. Which of the
following devices will you use to connect your computer to the Internet?
A. Printer
B. Scanner
C. Modem
D. Sound card

2. A telephone number is to a telephone as -------------- is to a computer


A. MAC address
B. Email address
C. URL
D. IP address
3. Tom notices that when he runs several programs simultaneously on his computer, the
performance of the programs slows down considerably. What is the reason for this?
A. Nonfunctional keyboard
B. Nonfunctional mouse
C. Insufficient random access memory (RAM)
D. Low monitor speed
4. Arno’s uncle owns a small business with 20 office employees. The computers in his
office are connected on a network. Arno often helps his uncle to install new computers on
the network, add and remove individuals from the list of authorized users, and archive
files on a computer. He likes to perform these activities and wants to make them the
focus of his profession. Which of the following job opportunities can Arno consider?
A. System Administrator
B. Software developer
C. Network administrator
D. Database administrator
5. Morten wants to play a game online. He hears modem tones every time his computer
sends a request to the Internet service provider (ISP) to establish the Internet connection.
What type of Internet connection does Morten use?
A. Dial-up
B. Broadband
C. WiFi
D. Dedicated
6. Which web feature is used to gather information from the internet and present to the user
based on his typed keywords
A. Search engine
B. Plug-in
C. Uniform Resource Locator (URL)
D. World Wide Web (www)
7. Eric teaches his daughter Tina how to work with productivity programs. Tina notices a
small blinking bar that stays in place until Eric clicks the mouse in a new location in the
document. Tina wants to know the name of this blinking bar. Which of the following
terms will Eric use to answer Tina's question?
A. Mouse pointer
B. Insertion point
C. Scroll bar
D. Status bar
8. Markus creates a document by using Microsoft Office Word 2010 and saves it with the
name Office.docx. Which of the following components of Word 2010 will display the
document name?
A. Menu bar
B. Toolbar
C. Title bar
D. Status bar
9. Stephan creates a business presentation by using Microsoft Office PowerPoint 2010. He
saves it with the name Presentation.ppt. Stephan opens the file to make some changes,
and he wants to save it with a different name. Which of the following commands on the
File menu will Stephan use to save the file with a different name?
A. Save
B. Save As
C. Send To
D. Page Setup
10. Which of the following is not a magnetic storage device?
A. Floppy Disk
B. Hard Disk Drive
C. Magnetic Tape
D. RAM
11. Barbara wants to create a newsletter. She needs a program that provides several
newsletter templates. Which of the following programs will meet her needs?
A. Desktop publishing program
B. Presentation program
C. E-mail program
D. Spreadsheet program
12. You create a presentation by using PowerPoint. Which of the following toolbars will
you use to add geometric shapes to the presentation?
A. Drawing
B. Formatting
C. Reviewing
D. Illustrations
13. Paula manages the recruitments for A. Datum Corporation. The company hires 500
employees. Paula needs to store on her computer the personal details, compensation
structure, and insurance details for each employee. Which of the following programs
will Paula use?
A. Microsoft® Notepad
B. Photo editing program
C. Presentation program
D. Database program
14. Computer parts that you can actually touch are considered to be:
A. Systems
B. Platforms
C. Hardware
D. Software
15. The _____________ shows what files and applications are open.
A. Shortcut Menu
B. Documents Library
C. Taskbar
D. Start Button
16. Which of the following memories is volatile?
A. Primary memory
B. RAM
C. ROM
D. HDD
17. When you're connected to the Internet, you are:
A. Downloading
B. Offline
C. Online
D. Connected
18. All the following memories are volatile except?
A. Register
B. cache
C. RAM
D. Floppy Disk
19. A security hole in a system that can be exploited as a weakness of the system is called?
A. Virus
B. Thread
C. Vulnerability
D. Risk
20. A number that serves as a unique identity of a telephone device is called
A. SIM
B. Telephone number
C. IMEI
D. Phone ID
IV. This part is made up of structural questions from all the various courses as in first part and it constitute of
30% of the entire question paper (30 marks)

5. What is the internet? Distinguish between internet and intranet. (2, 4) marks

6. Distinguish between the following computer terminologies


a. Upload and Download 2marks
b. Update and upgrade 2marks
c. Streaming and download 2marks
d. Online and offline 2marks
7. Classify the following memories primary and secondary: RAM, ROM, HDD, CD,
DVD, USB, Buffer, Cache, Register and SD card. NB you should use the table
below:
(0.75 x
10)marks
Volatile None Volatine

8. Distinguish between system software and application software, stating one example
in each case. 4marks

9. Discuss the following ethical terminologies:


a. Copyright 2marks
b. Piracy 2marks
10. Give the full meaning of ENIAC 0.5 marks

Section B: Web and Digital Society (50 marks): This section is also made up of I &
II

I. Web knowledge (24 marks)


1. Explain the role of the following in web development: 8 marks
a. Text editor
b. HTML
c. Browser
d. HTTP request methods
2. What is the full meaning of the following web abbreviations?
a. www 1mark
b. http 1mark
c. html 1mark
d. ftp 1mark
e. smtp 1mark
3. what’s a website? Distinguish between a website and a web application (2, 4) marks
4. Describe the role of the following web development languages: 6
marks
a. CSS
b. JavaScript
c. PHP
II. Digital society: (26marks)
1. Explain any three parts of an email message 6marks
2. During the creation of an email account, it is often recommended to create a
password. What is a password? State three precautions to follow when using a
password.
(2, 3) marks
3. What do you understand by the following terms as used in computer ethics:
a. Unauthorized access 2marks
b. Unauthorized use 2marks
c. Phishing 2marks
4. Despite the rapid growth of information technology (IT) in Cameroon, many people
still don’t buy the idea of online business transactions. Explain three possible
reasons that account for this behavior.
6marks

5. What is social media? State two examples of social media platforms (1, 2) marks
SECTION A : GENERAL COMPUTER KNOWLEDGE (20MARKS)

21. Elisabeth reads an article on common computer terminology. She does not understand
the meaning of operating system. She comes to you for help. How will you explain
operating system to Elisabeth? Type question here
E. An electronic device connected to your computer
F. An electronic device connected to your computer
G. A program that controls and manages the computer
H. A circuit board that connects the input, output, and processing devices
22. Tom notices that when he runs several programs simultaneously on his computer, the
performance of the programs slows down considerably. What is the reason for this?
E. Nonfunctional keyboard
F. Nonfunctional mouse
G. Insufficient random access memory (RAM)
H. Low monitor speed
23. Arno’s uncle owns a small business with 20 office employees. The computers in his
office are connected on a network. Arno often helps his uncle to install new computers on
the network, add and remove individuals from the list of authorized users, and archive
files on a computer. He likes to perform these activities and wants to make them the
focus of his profession. Which of the following job opportunities can Arno consider?
E. Graphics designer
F. Software developer
G. Network administrator
H. Database administrator
24. Your sister travels to another country for an on-site business project. You want to tell her
about your new job by sending her an e-mail message from your computer. Which of the
following devices will you use to connect your computer to the Internet?
E. Printer
F. Scanner
G. Modem
H. Sound card
25. Morten wants to play a game online. He hears modem tones every time his computer
sends a request to the Internet service provider (ISP) to establish the Internet connection.
What type of Internet connection does Morten use?
E. Dial-up
F. Broadband
G. WiFi
H. Dedicated
26. You want to know more about active volcanoes in the world. You connect your computer
to the Internet to find information based on the keyword "active volcanoes." Which of the
following features of the World Wide Web (WWW) will you use?
E. Search engine
F. Plug-in
G. Uniform Resource Locator (URL)
H. World Wide Web (www)
27. Eric teaches his daughter Tina how to work with productivity programs. Tina notices a
small blinking bar that stays in place until Eric clicks the mouse in a new location in the
document. Tina wants to know the name of this blinking bar. Which of the following
terms will Eric use to answer Tina's question?
E. Mouse pointer
F. Insertion point
G. Scroll bar
H. Status bar
28. Markus creates a document by using Microsoft® Office Word 2010 and saves it with the
name Office.docx. Which of the following components of Word 2010 will display the
document name?
E. Menu bar
F. Toolbar
G. Title bar
H. Status bar
29. Stephan creates a business presentation by using Microsoft Office PowerPoint® 2010. He
saves it with the name Presentation.ppt. Stephan opens the file to make some changes,
and he wants to save it with a different name. Which of the following commands on the
File menu will Stephan use to save the file with a different name?
E. Save
F. Save As
G. Send To
H. Page Setup
30. Nina uses Office Excel 2010 to create a work plan for her team. She wants to print the
plan and discuss it with the team members in a meeting. Which of the following menus
will Nina use to print the plan?
E. File
F. View
G. Format
H. Tools
31. Barbara wants to create a newsletter. She needs a program that provides several
newsletter templates. Which of the following programs will meet her needs?
E. Desktop publishing program
F. Presentation program
G. E-mail program
H. Spreadsheet program
32. You create a presentation by using PowerPoint. Which of the following toolbars will
you use to add geometric shapes to the presentation?
E. Drawing
F. Formatting
G. Reviewing
H. Illustrations
33. Paula manages the recruitments for A. Datum Corporation. The company hires 500
employees. Paula needs to store on her computer the personal details, compensation
structure, and insurance details for each employee. Which of the following programs
will Paula use?
E. Microsoft® Notepad
F. Photo editing program
G. Presentation program
H. Database program
34. Any computer parts that you can actually touch are considered to be:
E. Systems
F. Platforms
G. Hardware
H. Software
35. The _____________ shows what files and applications are open.
E. Shortcut Menu
F. Documents Library
G. Taskbar
H. Start Button
36. "Desktop" is a computer term that refers to:
E. The initial screen showing icons for folders, files, and applications.
F. The part of your work area where the computer monitor sits.
G. Something that can and should be ignored by most users.
H. The list of all of the contents on a particular computer.
37. When you're connected to the Internet, you are:
E. Outline
F. Offline
G. Online
H. Out of line
38. You create a document by using Microsoft Word 2010. You want to place a title in the
center of the page. Which feature can you use to do this?
E. Spacing
F. Font size
G. Alignment
H. Font style
39. Which device can you use to record a video?
E. Scanner
F. MP3 recorder
G. Camcorder
H. Player
40. Which type of online community can you use to create an online journal?
E. Blog
F. News group
G. Chat group
H. Bulletin board
SECTION 2: GENERAL STRUCTURAL (30MARKS)
1. How many generations of computers are there, name and explain? (5 marks)
2. What contributions has computer science given to our World? (2mks)
3. What does download mean? (2mks)
4. What does a graphics card do? (2mks)
5. How does the ECC RAM differ from a normal RAM? (2mks)
6. What is the brain of the computer system? (1mks)
7. What is a Microsoft windows? State two examples. (2mks)
8. List two operating system Capabilities. (2mks)
9. List two Operating System Limitations. (2mks
10. What is Bios? State three main functions of the Bios. (2mks)
11. Classify the following under volatile and Non-Volatile Memory. (2mks)
A) RAM B) PROM ` C) EPROM D) Flash Prom
12. State two characteristics of Hard Disk Drive. (2mks)
13. Differentiate between a Main folder and a Briefcase folder. (2mks)
14. Differentiate between local area network and cloud computing. (2mks)

SECTION B : WEB AND DIGITAL SOCIETY (50MARKS)


1. How many HTML heading levels are there, and what is an HTML heading? (3mks)
2. What is the HTML5 element that represents a line break opportunity? (3mks)
3. According to the HTML5 W3C Recommendation, how many states/values does the
type attribute have? (3mks)
4. Which ARIA landmark role does the HTML5 footer element default to, if the footer
element isn’t inside an article or section element? (3mks)
5. What does URL mean? (3mks)
6. What is a domain suffix? 3mks
7. Why do I need a search engine? 3mks
8. Which are more secure, multi-word passwords or passwords made using a
combination of letters, numbers and symbols? 3mks
9. Why is the Heartbleed bug being called one of the biggest security threats the Internet
has ever seen? 3mks
10. A shrink wrap license agreement typically specifies limits to copying. When do the
terms of a shrink wrap license go into effect? 4mks
11. Difference between E-commerce and Traditional Commerce? 4mks
12. What are the advantages of E-commence to the organization? 4mks
13. Explain the technical disadvantages of e-commerce? 3mks
14. Tell us which different sector e-commerce applications are available in the market?
3mks
15. How does e-commerce work? 3mks

SECTION A : GENERAL COMPUTER KNOWLEDGE (20MARKS)

21. Which part of a computer performs calculations?


e. Hard disk
f. Monitor
g. CPU
h. DVD
22. What is the term for the point of intersection of a row and column?
e. Value
f. Cell
g. Label
h. Worksheet
23. You want to send an e-mail to 2 friends. You do not want the second friend to see
the e-mail id of your first friend. Which field should you select to mark your first
friend's e-mail id?
e. Subject
f. CC
g. BCC
h. To
24. You use your digital camera to record your friend riding his new bike. You want
to remove the portion in the video where he skids. What type of software will you
use to do this?
e. Desktop publishing
f. IM
g. Presentation
h. Digital video editing
25. Which device can you use to play an audio CD?
e. Microphone
f. DVD player
g. Analog Camcoder
h. Transistor radio
26. What is hardware?
e. An item of information
f. A physical part of a computer
g. Instructions on what makes parts work
h. Rules designed to make a computer connect with each other
27. You use a word processor to create and save a text-based document on your
computer. What type of information is the text in your document?
e. Operating system
f. Hardware
g. Application
h. Data
28. What is the Internet?
e. A world wide collection of networks
f. An electronic device used in the past for printing and sharing documents
g. A backup source for data
h. A software installed on the computer that can search for things
29. What is the purpose of Microsoft Windows Firewall?
e. blocks unwanted popups
f. Blocks word processing programs
g. Install security patches
h. Restricts unauthorized access
30. Which technology will ensure that transactions between your computer and an
online store are secure?
e. Antivirus program
f. Cookies
g. Secure Sockets Layers
h. Microsoft Windows Firewall
31. What is the status of a computer that is connected to the Internet?
e. Online
f. Logged in
g. Stand by
h. Browsing
32. Which technology can a website use to allow you to listen to a concert live over
the Internet?
e. Sampling
f. Streaming
g. Speech synthesis like for TV
h. Video recording and playing
33. Everyday, you receive e-mail messages from unknown senders. What is the term
for this type of security threat?
e. Slander
f. Spoofing
g. Spam
h. Blackmail
34. You like to help install new computers on a network, add and remove individuals
from a list of authorized users, and archive files on a computer. Which job role
should you consider?
e. Database administrator
f. Network administrator
g. Software developer
h. Graphics designer
35. Which type of program can you use to create business cards and brochures?
e. Movie maker
f. Desktop publishing
g. Antivirus
h. Instant messenger
36. Which program can help you detect and prevent malicious activities on your
computer?
e. Ethernet protector
f. Trojan horse warriors
g. Worm killer
h. Spyware fighting software
37. Which action can you describe as a copyright violation?
e. Reading material from a publicly available website
f. Distributing someone else original work as yours
g. Quoting a paragraph and referencing the source
h. Sharing a website address on social media
38. You create a document by using Microsoft Word 2010. You want to place a title in
the center of the page. Which feature can you use to do this?
e. Spacing
f. Font size
g. Alignment
h. Font style
39. Which device can you use to record a video?
e. Scanner
f. MP3 recorder
g. Camcorder
h. Player
40. Which type of online community can you use to create an online journal?
e. Blog
f. News group
g. Chat group
h. Bulletin board
SECTION 2: GENERAL STRUCTURAL (30MARKS)
1. What is digital literacy? 1mk
2. Who are the fathers of the computing? 1mk
3. What is the brain of the computer, and what does it do? 1mk
4. What are the three types of computers? 2mks
5. Is the CPU a computer peripheral device, what is a peripheral device? 2mks
6. What does the acronym PC stand for? 1mk
7. Process of feeding instructions into computer system is called. 1mk
8. Magnetic disks can be used by multiple users simultaneously because of. 1mk
9. What is required to connect a laptop to a wireless network? Network Interface
card. 1mk
10. Junk e-mail is also called: 1mk
11. Which command press from keyboard for increasing font size in ms word? 1mk
12. ICT stands for: 1mk
13. Computer follow a simple principle called GIGO which means? 1mk
14. The loss in signal power as light travel down the fibre optic is called? 1mk
15. Which protocol is used in browsing websites? 1mk
16. A repair for a known software bug, usually available at no charge on the internet,
is called: 1mk
17. In Internet terminology, what does the acronym WYSIWYG stand for what you
see is what you got? True or false 1mk
18. The primary job of the operating systems of a computer is to manage resource.
True or false 1mk
19. For fast transfer of data in a transmission line, we use twisted pair cable. True or
false 1mk
20. ROM is erasable. True or false 1mk
21. In an IP address scheme, the last IP address is called the network address. True or
false1mk
22. Interconnection of two network is called WAN. True or false 1mk
23. The computer size was very large in third generation of computers. True or false
1mk
24. One characteristic of an algorithm is that it must not be ambiguous. True or false.
1mk
25. MS DOS stands for Microsoft disk operation system. True or false.1mk
26. Computers have no IQ. True or false. 1mk

SECTION B : WEB AND DIGITAL SOCIETY (50MARKS)

1. What’s the name of the main international standards body that publishes HTML
specifications, what do they do?
2. If a hyperlink points to a resource containing copyright information about the
current web page’s main content, what link type can you specify on the hyperlink,
how can it be used?
3. What attribute can you use to specify a regular expression which describes a valid
value for an input element, give your reason?
4. Which HTML element can be used to express and annotate the pronunciation of
East Asian characters, give your reason?
5. What is the ISP?
6. What is the internet?
7. What's the difference between a Web directory like Yahoo and a Web search
engine like Google?
8. What are the risks associated with using public Wi-Fi?
9. What are your tips for protecting yourself against identity theft?
10. If you borrow and copy a friend's software in violation of the licensing agreement,
what kind of piracy is that?
11. A EULA is a legal agreement between a software producer and a user. What does
EULA stand for?
12. What are the features of E-commerce?
13. What are the different e-commerce business models?
14. Explain the advantages to society because of e-commerce?
15. What are the short-comings of e-commerce?

You might also like