0% found this document useful (0 votes)
63 views

Computing B9 End of 2ND Term

Computing paper

Uploaded by

ziblima001
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views

Computing B9 End of 2ND Term

Computing paper

Uploaded by

ziblima001
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

CHOGGU DEMONSTRATION ‘A’ JUNIOR HIGH SCHOOL

END OF SECOND TERM EXAMINATION-APRIL, 2024


COMPUTING BASIC 9
SECTION ‘A’
Answer all questions in this section

1. Which of the following is an example of computer hardware?


a) Microsoft Word
b) Printer
c) Google Chrome
d) Facebook

2. What is the primary function of a CPU?


a) Store data
b) Process data
c) Display data
d) Transmit data

3. Which programming concept involves repeating a set of instructions until a condition is


met?
a) Sequence
b) Selection
c) Iteration
d) Variables

4. Which of the following is a key component of computational thinking?


a) Memorization
b) Creativity
c) Rote learning
d) Repetition

5. What does the acronym URL stand for?


a) Uniform Resource Locator
b) Universal Record Locator
c) Unique Resource Link
d) Unified Resource Locator

6. Which software application is commonly used for creating presentations?


a) Microsoft Excel
b) Adobe Photoshop
c) Microsoft PowerPoint
d) Google Docs

7. Which of the following is an example of a cybersecurity threat?


a) Encryption
b) Firewall
c) Malware
d) Biometrics

8. What is the purpose of a search engine?


a) To create websites
b) To store data
c) To retrieve information from the internet
d) To design graphics

9. Which programming language is commonly used for building websites?


a) Python
b) Java
c) HTML
d) C++

10. What does the acronym IP address stand for?


a) Internet Protocol Address
b) Internal Protocol Address
c) Internet Provider Address
d) Internet Protocol Authorization

11. Which of the following is NOT an example of an input device?


a) Keyboard
b) Mouse
c) Printer
d) Scanner

12. What is the purpose of a variable in programming?


a) To store data
b) To execute commands
c) To delete files
d) To print output

13. Which of the following is an example of an operating system?


a) Microsoft Windows
b) Microsoft Excel
c) Microsoft Word
d) Microsoft PowerPoint

14. Which of the following is an example of a social media platform?


a) Google
b) YouTube
c) Amazon
d) Wikipedia

15. What is the purpose of a firewall in computer security?


a) To prevent unauthorized access
b) To enhance internet speed
c) To store passwords
d) To create backups

16. Which programming concept involves making decisions based on certain conditions?
a) Iteration
b) Selection
c) Sequence
d) Variables

17. Which of the following is NOT an example of a storage device?


a) Hard disk drive
b) USB flash drive
c) RAM
d) CD-ROM

18. What does the acronym HTML stand for?


a) Hyper Text Markup Language
b) High Tech Machine Learning
c) Hyper Transfer Machine Language
d) Human Testing Machine Learning

19. Which of the following is an example of an internet browser?


a) Microsoft Word
b) Google Chrome
c) Adobe Photoshop
d) Microsoft Excel

20. What is the purpose of a modem?


a) To connect to the internet
b) To print documents
c) To store files
d) To process data

21. Which of the following is a characteristic of a strong password?


a) Short and simple
b) Contains personal information
c) Contains a mix of letters, numbers, and special characters
d) Easily guessable

22. What is the purpose of an algorithm in computer programming?


a) To solve a problem
b) To create a virus
c) To delete files
d) To slow down the computer
23. Which of the following is an example of a file extension?
a) .exe
b) Microsoft Word
c) Google
d) YouTube

24. What is the purpose of a spreadsheet software?


a) To create presentations
b) To manage databases
c) To perform calculations and data analysis
d) To edit images

25. Which of the following is NOT an example of an internet service provider (ISP)?
a) AT&T
b) Verizon
c) Facebook
d) Comcast

26. What is the purpose of RAM in a computer?


a) To store permanent data
b) To perform calculations
c) To store temporary data while the computer is running
d) To display images

27. Which of the following is an example of a creative commons license?


a) All rights reserved
b) Public domain
c) Creative commons attribution
d) GNU General Public License

28. What is the purpose of a URL?


a) To locate and identify resources on the internet
b) To send emails
c) To edit text
d) To print documents

29. Which of the following is NOT a type of computer virus?


a) Trojan horse
b) Spyware
c) Firewall
d) Worm

30. What is the purpose of a DNS server?


a) To convert domain names to IP addresses
b) To block websites
c) To create websites
d) To store passwords

SECTION B

Answer question One and any other three (3) questions from this section

Practical Question:
1. i) Write a simple program in Python that asks the user to enter their name and age,
and then prints out a message saying "Hello, [name]! You are [age] years old."
[10 Marks]
ii) Create a flowchart to represent the process of making a cup of tea, including steps such
as boiling water, adding tea leaves, adding sugar (if desired), and serving.
[10 Marks]
iii) identify the devices lettered A to G:

[5 Marks]
Theory Questions:
2. Explain what a search engine is and how it works. Provide three (3) examples of
popular search engines and briefly describe its features.
[15
Marks]

3. Describe the role of an operating system in a computer. Discuss three (3) common
operating systems used in personal computers and their characteristics.
[15 Marks]

4. Explain the concept of cybersecurity and discuss five (5) importance for individuals
and organizations in today's digital age.
[15 Marks]
5. Discuss five (5) importance of data backup in computing. Explain different methods
of data backup that can be used to prevent data loss.
[15 Marks]

GOODLUCK!!!!

You might also like