Form 1 First Term Examination 2020 A
Form 1 First Term Examination 2020 A
DECEMBER 2020
a. invented
b. infected
c. invaded
d. infested
a. delete data/information
b. send pop up messages
c. access personal data
d. encrypt data
8. ………………………. is not a danger of using the internet.
a. hardware
b. people
c. procedures
d. application
a. drawing
b. creating lines
c. selecting options
d. all of these
a. input/output devices
b. CPU
c. storage devices
d. all of these
12. The following are authentication methods that can be used to protect against computer hacking
i. encrypt data
ii. people and hardware
iii. use biometics
iv. use firewall softeware
a. I, II and III
b. I, III and IV
c. I, II and IV
d. All above
15. A hacker can use two of the following methods to gain access to a computer system.
i. guess passwords
ii. a key logger
iii. a key
iv. a special password
a. i only
b. i and ii
c. i and iii
d. ii and iv
16. A website which can be accessed using search engines like google are part of
17. What should you do if a stranger asks you to send a picture of yourself to them?
a. Your friends
b. Nobody – you should keep them to yourself
c. Your family
d. Your teacher
19. You need to create a password for a website. What should you use?
a. Anyone
b. A friend of a friend
c. Someone you think you’ve met before
d. Only from people you definitely know
SECTION 2 - FILL IN THE BLANK SPACES WITH THE CORRECT WORD/PHRASE (25 MARKS)
anonymity, address, SSL, Deep, for fun, guess passwords, HTTPS, digital certificates, padlock,
keylogger, physical safety, use safe websites, personal data, don’t share personal information with
people you do not know, esafety, name, don’t use correct name or use a nick name, fires, learn how to
block people, delete files, electrocution, keep drinks away from electronic equipment, never open up an
electrical device,
1. Two methods that hackers will use to gain unauthorized access to computer systems are by
…………………………………………………………………………………………………………
2. Two safety measures that can be applied when using the internet are ………………………………..
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
……………………….………………………………………………………………………………..
6. …………………..…………………… is ensuring that you do not suffer any harm while using the
computer.
7. ……………………………………. refers to using the internet and remaining safe while doing so.
8. Two precautions that can be used to keep data safe whilst online are
………………………………………………………………………………………………………….
………………………………………………………………………………………………………….
9. Two precautions that one can use to remain safe while playing games online are
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
and
………………………………………………………………………………………………….
12. Two physical safety issues that can occur when dealing with computers are ….….………………
and …………….……………………………………………………………………………………
13. Two preventative measures that can be used to avoid physical issues while using computers are
….................................................................................................................................
15. One method that I can use to ensure that the sender of an email is someone who
16. Persons who post adult material on line usually use the …………………….. web
3. A user-id is usually a word or a number that identifies a user as they log into a
computer system or network
4. You should always write down your password in case you forget it.
10. An Input Mask is used to cover the face when one logs onto a computer
system.