0% found this document useful (0 votes)
13 views

Form 1 First Term Examination 2020 A

The document provides instructions for a term examination in Information Technology for forms 1-4 and 1-5. It outlines three sections - multiple choice questions, fill in the blank questions, and true/false questions - and provides content for each section related to internet safety, computer hardware and software, and other IT topics.

Uploaded by

Shannel Edwards
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views

Form 1 First Term Examination 2020 A

The document provides instructions for a term examination in Information Technology for forms 1-4 and 1-5. It outlines three sections - multiple choice questions, fill in the blank questions, and true/false questions - and provides content for each section related to internet safety, computer hardware and software, and other IT topics.

Uploaded by

Shannel Edwards
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

North East Comprehensive School

First Term Examinations

DECEMBER 2020

Subject: Information Technology


Form: 1-4, 1-5
Paper: 1 and 2
Duration: 1 1/2 Hours

READ THE FOLLOWING INSTRUCTIONS CAREFULLY


Attempt ALL Questions on the papers provided.

SECTION 1: 20 Multiple Choice Questions (20 marks)

Circle the letter corresponding to the correct answer.

SECTION 2: 16 Fill in the blank spaces (20 marks)

SECTION 3: 10 TRUE OR FALSE Questions (10 marks)

DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO DO SO


SECTION 1 - CIRCLE THE LETTER WHICH CORRESPONDS WITH THE CORRECT ANSWER. –
(20MARKS)

1. A hacker is someone who

a. gains authorized access to data in a system or a computer


b. gains unauthorized access to data in a system or a computer
c. prevents one from using the computer
d. restricts one from using the internet

2. The following are used to identify a safe website

a. the web address should start with https alone


b. there should be an icon of a locked padlock
c. the website should have a note saying safe.
d. there should be an icon of a locked padlock and the address should start with https.

3. This method cannot be used to protect against internet dangers

a. Never post personal information online


b. Do not open e-mails from persons you do not know
c. Do not place photos of yourself online
d. Never use nicknames when playing games with strangers online

4. A computer virus cannot be spread by

a. opening emails received


b. using an infected flashdrive
c. opening attachments
d. coughing

5. This method cannot be used to communicate online

a. Chatting in online games


b. Using a telephone with no internet connection or data
c. Bloggs
d. Instant Messaging

6. A computer that has a computer virus is said to be

a. invented
b. infected
c. invaded
d. infested

7. A computer virus cannot

a. delete data/information
b. send pop up messages
c. access personal data
d. encrypt data
8. ………………………. is not a danger of using the internet.

a. data theft, identity theft


b. burglary to our home
c. physical harm
d. receiving of money from a hacker

9. Another name for software is

a. hardware
b. people
c. procedures
d. application

10. A Computer mouse is used for

a. drawing
b. creating lines
c. selecting options
d. all of these

11. Computer hardware consists of

a. input/output devices
b. CPU
c. storage devices
d. all of these

12. The following are authentication methods that can be used to protect against computer hacking

i. encrypt data
ii. people and hardware
iii. use biometics
iv. use firewall softeware
a. I, II and III
b. I, III and IV
c. I, II and IV
d. All above

13. Biometric Authorisation allows

i. the use of a special size of people as identification


ii. the use of body measurements and calculations as a form of identification
iii. the use of eye measurements and calculations as a form of identification
iv. the use of height only as a form of identification
a. I and II only
b. II and III only
c. III and IV only
d. All above
14. E-commerce means

a. to buy and sell online


b. to buy online only
c. to shop online
d. to buy online only

15. A hacker can use two of the following methods to gain access to a computer system.

i. guess passwords
ii. a key logger
iii. a key
iv. a special password
a. i only
b. i and ii
c. i and iii
d. ii and iv

16. A website which can be accessed using search engines like google are part of

a. the deep web


b. the surface web
c. the deep surface web
d. the side web

17. What should you do if a stranger asks you to send a picture of yourself to them?

a. Do not send any pictures online


b. Send the picture if you think you know them
c. Send the picture even though they’re a stranger
d. Ignore it until you find out who the stranger is

18. Who can you share your passwords with?

a. Your friends
b. Nobody – you should keep them to yourself
c. Your family
d. Your teacher

19. You need to create a password for a website. What should you use?

a. Your full name (e.g. jacksmith)


b. Part of your name and a number (e.g. jack123)
c. A random word, number and punctuation combination (e.g. 1cecr3am!)
d. A nickname that your friends call you (e.g. jumpingjacks)

20. Who should you accept friend requests from online?

a. Anyone
b. A friend of a friend
c. Someone you think you’ve met before
d. Only from people you definitely know
SECTION 2 - FILL IN THE BLANK SPACES WITH THE CORRECT WORD/PHRASE (25 MARKS)

anonymity, address, SSL, Deep, for fun, guess passwords, HTTPS, digital certificates, padlock,

keylogger, physical safety, use safe websites, personal data, don’t share personal information with

people you do not know, esafety, name, don’t use correct name or use a nick name, fires, learn how to

block people, delete files, electrocution, keep drinks away from electronic equipment, never open up an

electrical device,

1. Two methods that hackers will use to gain unauthorized access to computer systems are by

……………………………. ………………and using ………………………………………………..

…………………………………………………………………………………………………………

2. Two safety measures that can be applied when using the internet are ………………………………..

…………………………………………………………………………………………………………

…………………………………………………………………………………………………………

……………………….………………………………………………………………………………..

3. Internet …………………….……………... is using the internet while remaining unidentified.

4. ……………………………………………………………. is anything used to identify someone.

5. ……………………………….. and ………………………………can be used to identify someone.

6. …………………..…………………… is ensuring that you do not suffer any harm while using the

computer.

7. ……………………………………. refers to using the internet and remaining safe while doing so.

8. Two precautions that can be used to keep data safe whilst online are

………………………………………………………………………………………………………….

………………………………………………………………………………………………………….
9. Two precautions that one can use to remain safe while playing games online are

………………………………………………………………………………………………………

………………………………………………………………………………………………………

………………………………………………………………………………………………………

10. A hacker may break into a computer system to …………………………….……………………...

and

………………………………………………………………………………………………….

11. A reliable website address starts with the letters ………………………………………………….

and there is an icon/picture of a …………………………………………………………………..

12. Two physical safety issues that can occur when dealing with computers are ….….………………

and …………….……………………………………………………………………………………

13. Two preventative measures that can be used to avoid physical issues while using computers are

……………………………………………………………….. and …………………………….

….................................................................................................................................

14. A method which I can use to secure my data online is ……………………………..

15. One method that I can use to ensure that the sender of an email is someone who

can be trusted and is known is …………………………………………………..

16. Persons who post adult material on line usually use the …………………….. web

because they know that they can remain unidentified.


SECTION 3 – TRUE OR FALSE. 10 MARKS

INDICATE WHETHER EACH OF THE FOLLOWING STATEMENTS IS TRUE (T) OR FALSE


(F)

1. Identity theft is when pretends to be you.


2. E-BAY and Amazon are examples of computers.

3. A user-id is usually a word or a number that identifies a user as they log into a
computer system or network

4. You should always write down your password in case you forget it.

5. Information given to a computer is output.

6. A Blogg is a way of communicating online.

7. To have a secure password, you should never change it at all.

8. VOIP stands for Voice Over Internet Program.

9. A keylogger is a computer program.

10. An Input Mask is used to cover the face when one logs onto a computer
system.

You might also like