0% found this document useful (0 votes)
6 views

ICT 9

The document is a Spring Term Examination paper for Year 9 students at Pleroma International High School, focusing on Information and Communication Technology (I.C.T.). It contains multiple-choice questions covering various topics related to Excel functionalities, cybersecurity concepts, and data management. The exam tests students' knowledge on shortcuts, features, and security measures in technology.

Uploaded by

ENOBUN ANITA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views

ICT 9

The document is a Spring Term Examination paper for Year 9 students at Pleroma International High School, focusing on Information and Communication Technology (I.C.T.). It contains multiple-choice questions covering various topics related to Excel functionalities, cybersecurity concepts, and data management. The exam tests students' knowledge on shortcuts, features, and security measures in technology.

Uploaded by

ENOBUN ANITA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

PLEROMA INTERNATIONAL HIGH

SCHOOL
SPRING TERM EXAMINATION
SUBJECT: I.C.T. DURATION: 2 HOURS CLASS: YEAR 9

NAME

1. The collection of cells organised into rows and columnsc)where


Press Ctrl + U
data is stored and manipulated. d) Double-click the workbook
A. Worksheet B. Graph 10. What happens if you copy a worksheet within the
C. Workbook D. Active cell same workbook?
2. The space in a worksheet that is formed by the intersection
a) It of
creates a duplicate worksheet with the same name.
a row and a column. b) It creates a duplicate worksheet with a numbered
A. Workbook B. Sheet name.
C. Cell D. Cell Reference. c) It overwrites the existing worksheet.
3. There are ……… rows per worksheet in Excel. d) It deletes the original worksheet.
A. 1,048,576 B. 1,048,765 11. What is the shortcut key to move between
C.1,408,576 D. 1,022,333 worksheets in a workbook?
4. There are ___ columns per worksheet in Excel. a) Ctrl + Page Up/Page Down
A. 16,387 B. 16,384 b) Alt + Tab
C. 16,684 D. 15,341 c) Shift + Arrow Keys d) Ctrl + Tab
5. The address of a cell is known as: 12. Which view displays all worksheets in an Excel
A. Cell space B. Cell reference workbook?
C. Cell Menu D. Active cell a) Normal view b) Page Layout view
6. Which shortcut key is used to insert a new worksheet in c)
a Workbook view d) Page Break Preview
workbook? 13. How can you group multiple worksheets in Excel?
a) Shift + F11 b) Ctrl + F11 a) Hold Ctrl and click on the tabs
c) Alt + F11 d) Ctrl + Shift + F11 b) Hold Shift and click on the tabs
7. How can you delete a worksheet in Excel? c) Use the Group option in the View tab
a) Press Delete on the worksheet tab d) Both a and b
b) Right-click the tab and select "Delete" 14. Which feature allows you to protect the contents of
c) Use the "Delete Sheet" option in the Home tab a worksheet?
d) Both b and c a) Worksheet Encryption
8. Which of the following allows you to hide a b) Worksheet Protection
worksheet? c) Hide Tab d) Sheet Lock
a) Right-click the tab and select "Hide" 15. What is the default name of a worksheet in Excel?
b) Use the "Format" option in the Home tab a) Sheet1 b) Workbook1
c) Use a shortcut key d) Both a and b c) ExcelSheet d) MySheet
9. How do you unhide a hidden worksheet? 16. What does the “Freeze Panes” feature do in a
a) Use the "Unhide" option from the View tab worksheet?
b) Right-click any visible worksheet tab and select a) Locks specific cells
"Unhide" b) Keeps rows and columns visible while scrolling

PIHS SPRING TERM


c) Protects the worksheet d) To apply formulas
d) Hides data 27. Which shortcut key opens the "Find and Replace"
17. Which feature allows you to divide a worksheet dialog box?
into multiple panes? a) Ctrl + F c)Ctrl + H
a) Freeze Panes b) Split b) Ctrl + R d) Both a and b
c) Hide Panes d) Lock Panes 28. How can you edit multiple cells simultaneously?
18. How can you move a worksheet to another a) Use the Find and Replace tool
workbook? b) Select the cells and type the new content
a) Drag and drop the tab to another workbook c) Use Flash Fill
b) Right-click the tab, select "Move or Copy," and d) Both a and b
choose the workbook 29. What does the "Flash Fill" feature do in Excel?
c) Use the Cut and Paste option a) Fills data automatically based on a pattern
d) Both a and b b) Changes cell formats
19. Which tool in Excel allows you to check for errors c) Deletes duplicate values
in a worksheet? d) Inserts blank rows
a) Data Validation b) Formula Auditing 30. Which feature helps ensure consistent data entry in
c) Error Finder d) Debug Tool a column?
20. What happens when you double-click the boundary a) Data Validation
between column headers in a worksheet? b) Conditional Formatting
a) Deletes the column c) AutoFit d)Merge Cells
b) Adjusts the column width automatically 31. How can you insert a new row in Excel?
c) Hides the column d) Opens the format menu a) Right-click a row number and select "Insert"
21. A collection of cells organised into rows and columns where
b) Press Ctrl + I
data is stored and manipulated. c) Use the "Insert" option in the Home tab
A. Worksheet B. Graph d) Both a and c
C. Workbook D. Active cell 32. What happens when you drag the fill handle in Excel?
22. A space in a worksheet formed by the intersection of a rowa) Copies the content to the selected range
and a column. b) Deletes the content in the cell
A. Workbook B. Sheet c) Applies conditional formatting
C. Cell D. Cell Reference. d) Changes the font style
23. There are ……… rows per worksheet in Excel. 33. How can you edit the content of a merged cell in Excel?
A. 1,048,576 B. 1,048,765 a) Double-click the merged cell
C. 1,408,576 D. 1,022,333 b) Press F2 on the merged cell
24. There are ___ columns per worksheet in Excel. c) Both a and b
A. 16,387 B. 16,384 d) None of the above
C. 16,684 D.15,341 34. Which option allows you to apply formatting
25. The address of a cell is known as: changes to a cell without altering its content?
A. Cell space B. Cell reference a) Format Painter
C. Cell Menu D. Active cell
b) Conditional Formatting
26. What is the purpose of the "Find and Replace" feature
c) Cell Styles
in Excel
d) All of the above
a) To locate specific data and replace it with new
35. How can you delete an entire column in Excel?
data
a) Right-click the column header and select
b) To delete duplicate rows
"Delete"
c) To format cells

PIHS SPRING TERM


b) Select the column and press Ctrl + D 43. What is a "phishing" attack?
c) Use the "Delete" option in the Home tab A) Inserting malware into a system
d) Both a and c B) Trying to steal sensitive data through fake websites
36. What does Excel display if you enter a formula C) Hacking a network by brute-forcing passwords
incorrectly? D) Denying access to a website
a) #REF! #VALUE! 44. Which of the following is a type of malware that
b) #DIV/0! locks a system's data and demands a ransom?
c) Any of the above, depending on the error A) Virus B) Worm
37. Which tool helps to trace and correct errors in C) Trojan horse D) Ransomware
formulas? 45. What does "SQL injection" exploit?
a) Formula Auditing A) Network protocols
b) Data Validation B) Database vulnerabilities
c) Flash Fill C) Web server configurations
d) Conditional Formatting D) Operating system flaws
38. How can you change the case of text in Excel (e.g., 46. What is the purpose of a VPN (Virtual Private
upper to lower)? Network)?
a) Use the UPPER, LOWER, or PROPER A) To accelerate internet speed
functions B) To encrypt internet traffic and hide the user's IP
b) Use the "Change Case" option in the Home tab address
c) Use Flash Fill C) To reduce bandwidth usage
d) Both a and c D) To monitor network traffic
39. What is the purpose of the "AutoCorrect" feature 47. Which of the following is the most common target
in Excel? of "Denial-of-Service" (DoS) attacks?
a) To apply formatting changes automatically A) Network cables B) Web servers
b) To correct common typing errors automatically C) Personal computers D) Database systems
c) To delete duplicate data 48. What is a "zero-day" vulnerability?
d) To create charts A) A software bug discovered after release
40. How can you quickly replace all instances of a B) A vulnerability that is patched immediately
word in a worksheet? C) A flaw in software that is unknown to the developer
a) Use the Replace option under the "Find and D) An attack that occurs on the first day of a month
Replace" dialog 49. Which of the following is an ethical hacker?
b) Press Ctrl + H A) A hacker who exploits vulnerabilities for personal
c) Select "Find All" and replace the word gain
manually B) A hacker who tests systems for weaknesses to help
d) Both a and b improve security
41. What is hacking? C) A hacker who disrupts services as a form of protest
A) Legal modification of systems D) A hacker who creates viruses to damage systems
B) Unauthorized access to data 50. What is "social engineering" in the context of
C) Programming in any language hacking?
D) Managing computer networks A) Using computer scripts to hack
42. Which of the following is a common hacking tool B) Manipulating individuals to disclose sensitive
used to find vulnerabilities in a network? information
A) Photoshop B) Nmap C) Exploiting software vulnerabilities
C) Excel D) PowerPoint D) Physically tampering with hardware

PIHS SPRING TERM


51. Which of these is an example of "brute force" D) All of the above
hacking? 59. What is "penetration testing"?
A) Sending a virus to a target machine A) Testing the physical security of a building
B) Guessing passwords by trying many combinations B) Testing a system's defenses by simulating a
C) Tricking a user into revealing their credentials cyberattack
D) Overloading a website with traffic C) Testing software updates
52. Which of the following is a method used to prevent D) Testing the usability of a website
"Man-in-the-Middle" (MitM) attacks? 60. Which of the following is a key feature of a
A) Using firewalls only "botnet"?
B) Encrypting communications with HTTPS A) A group of infected devices controlled by a hacker
C) Avoiding public Wi-Fi networks B) A system used to monitor network traffic
D) Running antivirus software C) A security protocol for
53. What does the acronym "DDoS" stand for?
A) Dynamic Data Overload System
B) Distributed Denial of Service
C) Digital Denial of Service
D) Direct Data Operating System
54. Which tool is commonly used by hackers to
intercept and modify network traffic?
A) Metasploit B) Wireshark
C) PowerShell D) CCleaner
55. What is a "rootkit"?
A) A network protocol used for secure communication
B) A set of software tools used by hackers to hide
malicious activity
C) A type of virus that attacks computer hardware
D) A method for bypassing firewalls
56. What is "exfiltration" in the context of
cyberattacks?
A) The process of preventing data leaks
B) The act of deleting sensitive data from a system
C) The unauthorized transfer of data from a
compromised system
D) The process of encrypting data on a server
57. Which of the following best describes "white-hat"
hacking?
A) Hacking for malicious purposes
B) Hacking to expose flaws for security improvement
C) Hacking to steal sensitive information
D) Hacking to test encryption algorithms
58. Which of these is a common method used to
bypass user authentication?
A) Using an incorrect password repeatedly
B) Keylogging C) Phishing

PIHS SPRING TERM

You might also like