0% found this document useful (0 votes)
55 views

Computer Studies Grade 9 (Zedlessons)

The document is a compilation of computer studies examination questions from 2016 to 2024, authored by Chilufya Nsofwa and published by Zedlessons™ Media. It includes various sections with questions from different years, covering topics relevant to computer studies, and provides guidance on how to use the book effectively. Additionally, it promotes Zedlessons as an educational resource and offers contact information for further inquiries.

Uploaded by

zedlessons
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views

Computer Studies Grade 9 (Zedlessons)

The document is a compilation of computer studies examination questions from 2016 to 2024, authored by Chilufya Nsofwa and published by Zedlessons™ Media. It includes various sections with questions from different years, covering topics relevant to computer studies, and provides guidance on how to use the book effectively. Additionally, it promotes Zedlessons as an educational resource and offers contact information for further inquiries.

Uploaded by

zedlessons
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 126

COMPUTER

STUDIES




 Examination






Questions




By


2024 - 2016 CHILUFYA NSOFWA


COMPUTER STUDIES

EXAMINATION QUESTIONS
Computer Studies Examination Questions (2024 - 2016).
By Chilufya Nsofwa
© 2025 Chilufya Nsofwa. All rights reserved.
Published by Zedlessons™ Media, Copperbelt, Zambia.

Zedlessons books may be purchased for educational use. Online editions are also available.

For more information, contact: +260 969377538 or email us at;


[email protected]

Compiler/Production Editor : Chilufya Nsofwa


Co-Production Editor: Promise Nsofwa
Cover Artwork by : Chilufya Nsofwa
February 2025: Second Edition

The Zedlessons logo is a registered trademark of Zedlessons™ Media. Computer studies Examination Ques-
tions, the cover image, and related trade dress are trademarks of Zedlessons™ Media. While the publisher
and the author have used good faith efforts to ensure that the information and instructions contained in
this work are accurate, the publisher and the author disclaim all responsibility for errors or omissions, in-
cluding without limitation responsibility for damages resulting from the use of or reliance on this work.

Use of the information and instructions contained in this work is at your own risk.

Zedlessons™ Media, is Not Affiliated With The Examination Council of Zambia (ECZ) In Any Way, and
Therefore; this book is made solely By The compiler at Zedlessons™ Media.
ABOUT ZEDLESSONS

Zedlessons™ is an educational company that creates and designs


quality educational products and services for anyone in the
pursuit of Knowledge.

Our mission is to provide the best quality educational services


that empower individuals and organizations achieve more.

We believe in the power of quality education that empowers people


to dream, achieve more. Our services gives them the freedom to
create and achieve their goals.

We do this by using the best technologies available to create and


design quality learning material, incorporating proven learning
techniques that guarantee a better learning experience, which
helps the user learn and achieve more.

you can interact with us

on our social media platforms below

ZEDLESSONS™
ABOUT THE COMPILER

‘‘ My name is Chilufya Nsofwa. and As of this writing, i am a subject


teacher of Mathematics & Computer studies at Secondary School
level.
I started Zedlessons™, To help students and individuals like yourself
reach new heights, achieve your goals and excel in ways you never
thought possible.
I have compiled the most relevant computer studies examination
Pastpapers in this book from the examinations council of Zambia
(ECZ). The book has been made and designed in such a way that it is
easy to read and use as a reference material for all your educational
needs.
I have put in hours of work into making this book , and i hope that
you find it helpful.
All i can say for now is, enjoy!!!.
’’
HOW TO USE THIS BOOK
Year
category
Year

Section
Section
Instructions

Question
number

Question
Marks
Page
Number
CONTENTS
2024
External
SECTION A............................................................................13
SECTION B............................................................................17
SECTION C.............................................................................18

2023
Internal
SECTION A............................................................................22
SECTION B............................................................................26
SECTION C.............................................................................27

2022
Internal
SECTION A............................................................................31
SECTION B............................................................................35
SECTION C.............................................................................37
External
SECTION A............................................................................41
SECTION B............................................................................45
SECTION C.............................................................................46

2021
Internal
SECTION A............................................................................49
SECTION B............................................................................53
SECTION C.............................................................................55
External
SECTION A............................................................................58
SECTION B............................................................................63
SECTION C.............................................................................65

2020
Internal
SECTION A............................................................................69
SECTION B............................................................................73
SECTION C.............................................................................74
External
SECTION A............................................................................78
SECTION B............................................................................81
SECTION C.............................................................................83

2019
Internal
SECTION A............................................................................86
SECTION B............................................................................89
SECTION C.............................................................................91

2018
Internal
SECTION A............................................................................95
SECTION B............................................................................98
SECTION C.............................................................................99
2017
Internal
SECTION A............................................................................103
SECTION B............................................................................106
SECTION C.............................................................................107

2016
Internal
SECTION A............................................................................110
SECTION B............................................................................113
SECTION C.............................................................................115

PC SHORTCUTS.....................................................117

COMMON TERMS..................................................121
DID YOU KNOW?

You can watch video tutorials of all the past papers covered in this
book on our YouTube channel (Zedlessons) for free.

visit https://youtube.com/@zedlessons-zm

make sure to like, subscribe and share our videos :)


see you there!.
© 2024 - 2025 Zedlessons™ Media. All rights reserved.
2024

...
YE
AR
YE
R

External
2024 External
SECTION A
[20 MARKS]
Answer all questions. Mark your answer with a cross(X) on
Instructions: the Answer Grid provided in the answer booklet.

1. Portrait and landscape are page …


A. Lengths.
B. Sizes.
C. Organisations.
D. Orientations.

2. Which key on the keyboard can be used to delete characters to the left of the cursor?
A. Alt
B. Back space
C. Ctrl
D. Delete button

3. In PowerPoint, which option is used to display the title and bullets only?
A. Navigation sorter view
B. Notes sorter view
C. Outline view
D. Slide view

4. … is dragging a mouse while holding the left button to select text.


A. Activating
B. Double clicking
C. Highlighting
D. Single clicking

5. Which of the following is a correct e-mail address?


A. [email protected]
B. [email protected]
C. www.John.com
D. www.@John@com.

Page 13 ZEDLESSONS
2024 External
SECTION A
6. To copy a sentence from one document to another, the user should … in the second
document.
A. Select the copy button
B. Select the paste button
C. Select the cut button
D. Select the move button

7. Facebook is an example of a … network.


A. Local
B. Private
C. Social
D. Wide

8. To quickly bring text deleted by mistake in a document, the … can be used.


A. Recycle bin
B. Ruler guide
C. Scroll bar
D. Undo button

9. The device connected to a system unit of a computer are known as …


A. plugware.
B. peripherals.
C. gadgets.
D. Components.

10. … displays the name of the application program and the document which is currently in
use.
A. Menu bar
B. Scroll bar
C. Title bar
D. Toolbar

Page 14 ZEDLESSONS
2024 External
SECTION A
11. Name the device shown in the following picture.

A. Scanner.
B. Plotter.
C. Projector.
D. Printer.

12. The text and pictures that appear in the background of a document are called …
A. clip art.
B. picture mark.
C. smart art.
D. watermark.

13. … is the main screen area on the computer system.


A. Desktop
B. Task bar
C. Window
D. Window bar

14. What name is given to the message that appears suddenly on the screen when using a
web browser?
A. Desktop message
B. Monitor message
C. Pop-up message
D. Screen message

15. The health problem that may be caused by prolonged use of computers is …
A. Headache
B. Infection
C. Influenza
D. Malaria

Page 15 ZEDLESSONS
2024 External
SECTION A
16. The refresh button Is used to … the screen.
A. Close
B. Maximize
C. Minimize
D. Update

17. Files on a computer are stored in a …


A. Menu bar.
B. Folder.
C. Drawer.
D. Document.

18. … is a collection of webpages and related content.


A. Home
B. Internet
C. Network
D. Website

19. Which of the following is fast in accessing data and has a large storage space? Regis-
ters and …
A. Optical Disk.
B. Memory Card.
C. Magnetic Tape.
D. Flash Disk.

20. How can multiple choice examination questions be marked automatically? By using the

A. multiple choice marker.
B. multiple choice reader.
C. optical character marker.
D. optical mark reader.

Page 16 ZEDLESSONS
2024 External
SECTION B
[20 MARKS]
There are fifteen (15) questions in this section.
Instructions: Answer all the questions in this section by using one word
or a short phrase.

1. … are raw figures entered in the computer [1]

2. … and … are two types of user interfaces. [2]

3. … is an example of an … software used for creating, formatting and

editing letters on a computer. [2]

4. … is an example of an external storage device. [1]

5. The passing along of an email message to someone else is known as … [1]

6. Two devices that have digital cameras are … and … [2]

7. Alarms on doors and windows are a form of computer … [1]

8. A computer has a fan inside the system box to cool down the … and … [2]

9. The … command shows a user how a document would appear before

printing it. [1]

10. In Excel, a … is a group of cells. [1]

11. A program menu consists of … the user can select to carry out tasks. [1]

12. … is the process that deletes everything on a flash disk before it

can be used again. [1]

13. The letters CPU stand for … and the letters DVD stand for … [2]

14. Before text is pasted, it is temporarily held in the … of the computer’s memory. [1]

15. The letters … stand for wireless local area network. [1]

Page 17 ZEDLESSONS
2024 External
SECTION C
[30 MARKS]
There are five (5) questions in this section.
Instructions: Answer all the questions in the answer booklet provided.

1. Companies sometimes use email and ordinary post to send letters and

documents to customers.

(a) What do the letters CC in email stand for? [1]

(b) State two advantages of sending documents by email. [2]

(c) Give a feature of an email program. [1]

(d) Give two reasons why ordinary post might be used instead of email. [2]

[Total: 6 marks]

2. A school club creates newsletters for its members using a computer.

(a) Name the software used to make the newsletter. [1]

(b) Explain how a picture of the school could be added to the newsletter. [2]

(c) Apart from a picture of a school, name two other sources of graphics

that can be added to the newsletter. [2]

(d) Give one reason why the school newsletters could be printed in colour. [1]

[Total: 6 marks]

Page 18 ZEDLESSONS
2024 External
SECTION C
3. Study the picture below and answer the questions that follow.

(a) (i) Name the application program in the picture above. [1]

(ii) What name is given to the boxes where a title and subtitle can be added? [1]

(b) What is label X showing? [1]

(c) Apart from charts and graphics, mention one other item that can be

added on the page of the application shown. [1]

(d) Give two uses of the application program shown in the picture. [2]

[Total: 6 marks]

4. The following picture shows part of a design of a worksheet in Excel containing

data about a tuck-shop.

Page 19 ZEDLESSONS
2024 External
SECTION C

(a) Write two addresses where text can be entered. [2]

(b) Write one cell address that can contain numbers. [1]

(c) How many rows are shown in the spreadsheet above? [1]

(d) Write two formulas that can workout the total profit per item. [2]

[Total: 6 marks]

5. The following table shows tasks and the suitable software to carry them out. A few have
been filled in for you; complete the remaining.

[Total: 6 marks]

Page 20 ZEDLESSONS
2023

...
YE
AR
YE
R

Internal
2023 Internal
SECTION A
[20 MARKS]
Answer all questions. Mark your answers with a cross (x)
Instructions: on the Answer Grid provided in the answer Booklet.

1. RAM stands for …


A. Random Access Memory.
B. Random Accessing Memory.
C. Read Access Memory
D. Read Accessing Memory

2. A … is an example of an automatic input device.


A. keyboard
B. keypad
C. mouse
D. sensor

3. Which of the following memory sizes is the smallest?


A. 0.9GB
B. 1.8MB
C. 102KB
D. 2048 Bytes

4. … bar is the top row of a window of an application where its name is shown.
A. Menu
B. Task
C. Title
D. Tool

5. … is the type of software that manages hardware such as a storage device.


A .Application software
B. Generic software
C. Operating system
D. Payroll system

Page 22 ZEDLESSONS
2023 Internal
SECTION A
6. Which function key on the keyboard opens the “Spell checker” dialog box?
A. F12
B. F9
C. F8
D. F7

7. … is used to connect computers so that files are shared on a network without using
wires.
A. Protocol
B. Server
C. Sensor
D. Wifi

8. Which of the following optical storage media show the storage size from the largest to
the smallest?
A. DVD VCD CD
B. DVD CD VCD
C. VCD DVD CD
D. VCD CD DVD

9. In Excel, the ∑ symbol is used for …


A. addition.
B. division.
C. multiplication.
D. subtraction.

10. How can personal data be protected from hackers? By …


A. backing up information.
B. changing passwords frequently.
C. clicking on email attachments.
D. decrypting the information.

Page 23 ZEDLESSONS
2023 Internal
SECTION A
11. The CPU and … are two examples of processing devices.
A. compact disk.
B. hard disk.
C. memory card.
D. network card.

12. To … is to bring information into a program from another program.


A. export
B. forward
C. indent
D. import

13. Which file extension is suitable for storing images for web pages?
A. Png
B. Pdf
C. Tif
D. Txt

14. How are activities controlled in the computer system? By using the …
A. CPU
B. Flash disk
C. Hard disk
D. NIC

15. The type of licence that gives users the right to use and what to use an application
software for is called …
A. End User Licence Agreement.
B. End User Licence Rights.
C. Shareware Licence Agreement.
D. Shareware Licence Rights.

Page 24 ZEDLESSONS
2023 Internal
SECTION A
16. What is produced on a document in Word when
same time?
= and Ctrl are pressed at the

A. Double line
B. Strike through
C. Subscript
D. Superscript

17. In Excel, the correct formula to add numbers from column C and column F in row num-
ber 3 is …
A. =Add C3, F3.
B. =Add (C3,F3).
C. =C3 + F3.
D. =(C3 : F3).

18. … is the type of software that hides itself and damages other computer software and
files.
A. Antivirus
B. Hacker
C. Trojan horse
D. Virus tracker

19. In Word, the feature that enables a user to send one common letter to many people at
once is called …
A. mail merge.
B. mail navigation.
C. template.
D. wizard.

20. Payments of goods at a supermarket using a debt card is done through a system
known as Electronic Fund …
A. Exchange at Point-of-Sale.
B. Exchange at Supermarket.
C. Transfer at Point-of-Sale
D. Transfer at Supermarket.

Page 25 ZEDLESSONS
2023 Internal
SECTION B
Answer all the questions in this section by using one word
Instructions: or a short phrase.

1. The abbreviation U.S.B stands for … [1]

2. … and … are examples of system software. [2]

3. Addition, subtraction, … and … are the arithmetic operations performed by


the CPU. [2]

4. To delete a slide, one has to … click it on the navigation panel. [1]

5. To type the first letter of a word in uppercase without using the caps lock key, a
user can hold down the … button while pressing the key of the letter. [1]

6. An Icon represents a … and … [2]

7. … are items entered on a computer as input. [1]

8. A scanner copies … documents and creates the … that is stored in the computer. [2]

9. … allows users to find a website even if they do not know the Uniform Resource
Locator (URL). [1]

10. To read account numbers on cheques at a bank, … reader is used. [1]

11. … is the licence that gives a company the right to own software it has developed. [1]

12. … holds programs while the computer is on. [1]

13. Two examples of non-impact printers are … and … [2]

14. … is a device for sending images over a telephone line. [1]

15. To use a computer network, a user must first log on by entering the user name

and … [1]

Page 26 ZEDLESSONS
2023 Internal
SECTION C
There are five questions in this section. Answer all the
Instructions: questions.

1. (a) The following diagram shows part of the components of a multimedia system.

Complete the diagram by filling in the missing components.


TEXT

AUDIO MULTIMEDIA GRAPHICS

(b) Give one multimedia device that can be used for audio in the system. [1]

(c) State one advantage of using multimedia in presentations. [1]

(d) State two disadvantages of multimedia. [2]

2. Complete the following table by filling in the missing errors and meaning. The first part
has been completed for you as an example.
Name of Program Error Meaning of error
Microsoft Excel #DIV/0 ERROR Cell value devided by zero
Microsoft Excel Width of Column too small

[2]
Microsoft Word Word Words underlined in green

[2]
Microsoft Desktop Publisher Misspelling word

[2]

Page 27 ZEDLESSONS
2023 Internal
SECTION C
3. Study the picture of Microsoft desktop publishing program and answer the questions
that follow.

(a) Name the space labelled A. [1]

(b) What name is given to the outline labelled B? [1]

(c) State two types of publications. [2]

(d) Give two uses of the desktop publication program. [2]

4. Computers play a very important role in hospitals and clinics.

(a) Mention one input device apart from a keyboard that can be used to enter details of
patients. [1]

(b) State two uses of computers in hospitals. [2]

(c) Give two ways of protecting records of patients stored on computers. [2]

(d) Give one storage medium for backing up records of patients. [1]

Page 28 ZEDLESSONS
2023 Internal
SECTION C
5. Study the following picture of the spreadsheet program and answer the questions that
follow.

(a) Give the cell address for the active cell shown in the picture. [1]

(b) (i) Write the formula that was entered in cell B9 to calculate the total. [2]

(ii) What formula was entered in cell B10 to calculate the biggest price? [1]
(c) What formula was entered in cell B11 to obtain number of devices? [1]

(d) In what order have ITEMS in the spreadsheet been entered? [1]

Page 29 ZEDLESSONS
2022

...
YE
AR
YE
R

Internal
2022 Internal
SECTION A
[20 MARKS]
Answer all questions. Mark your answers with a cross (x)
Instructions: on the Answer Grid provided in the answer Booklet.

1. Which of the following is not an input device?


A. Joystick
B. Projector
C. Touchscreen
D. Webcam

2. Random Access Memory is also called … memory.


A. medium term
B. long term
C. main
D. secondary

3. Which of the following shows memory size from the highest to the lowest?
A. Bit Byte Kilobyte
B. Byte Bit Kilobyte
C. Kilobyte Bit Byte
D. Kilobyte Byte Bit

4. The text format for the number 2 used in the symbol H2O is called …
A. subtext.
B. subscript.
C. superscript.
D. supertext.

5. In computer based learning, which program allows learners to learn at their own speed?
A. Drill and practice program
B. Problem solving program
C. Simulation program
D. Tutorial program

Page 31 ZEDLESSONS
2022 Internal
SECTION A
6. A number used to open locked files or data stored on a computer is called …
A. coding identification number.
B. identification number opener.
C. personal identification number.
D. Tutorial program

7. What is the other name for a monitor?


A. Anode Ray Tube
B. Liquid Display Unit
C. Optical Ray Tube
D. Visual Display Unit

8. … is a key on the keyboard used to indent text to the right.


A. Enter
B. Home
C. Space bar
D. Tab

9. Which part of the Central Processing Unit is used by the computer to compare two
numbers?
A. Arithmetic logic unit
B. Arithmetic comparison unit
C. Number logic unit
D. Number processing unit

10. In Excel, a formula always begins with the … sign.


A. division
B. dollar
C. equal
D. subtraction

Page 32 ZEDLESSONS
2022 Internal
SECTION A
11. … is the first page of a website.
A. Front page
B. Home page
C. Local page
D. Visited page

12. Which of the following is the last device that should be switched off when shutting down
a computer?
A. Keyboard
B. Monitor
C. Printer
D. System unit

13. How can a dollar sign be inserted in a text being typed? By pressing …
A. Shift + $
B. Del + $
C. Ctrl + $
D. Alt + $

14. Magazines and business cards are created using a …


A. database application.
B. desktop publisher.
C. presentation software.
D. spreadsheet application.

15. How can back pains be prevented when using a computer for a long time? By using an

A. adjustable keyboard.
B. adjustable screen.
C. ergonomic chair.
D. ergonomic keyboard.

Page 33 ZEDLESSONS
2022 Internal
SECTION A
16. In an email account, a message awaiting to be sent is found in the …
A. draft folder.
B. inbox folder.
C. sent item folder.
D. spam folder.

17. Which of the following is an illegal activity when using a computer?


A. Buying a copyright CD
B. Copying a copyright CD
C. Listening to music
D. Playing a music CD

18. The term used to refer to a network that connects computers between two towns is …
A. Local Area Network.
B. Metropolitan Area Network.
C. Personal Area Network.
D. Wide Area Network.

19. Which of the following is the most powerful computer?


A. Micro computer
B. Mini computer
C. Personal computer
D. Super computer

20. What is the function of this button I ? To … text.


A. indent
B. indicate
C. italicise
D. itemize

Page 34 ZEDLESSONS
2022 Internal
SECTION B
Answer all the questions in this section by using one word
Instructions: or a short phrase.

1. … is a type of memory which does not loss its content after switching a Computer

off. [1]

2. A button used to turn the computer on is called the … [1]

3. … is a user interface where commands are typed in. [1]

4. A private network that is only accessed by staff in an organisation is known as … [1]

5. The Central Processing Unit (CPU) of a computer processes data by …,

comparing,sorting and. … [2]

6. The two suitable printers for printing magazines and identity cards are … and … [2]

7. … prevents the computer from losing documents being used when electricity

suddenly Cuts. [1]

8. A file deleted by mistake can be found in the … while a word deleted by mistake

can be put back using the … button. [2]

9. … refers to working on more than one program at a time while … refers to a computer
that only allows one person at a time to have control of its resources.

10. … is a special effect that introduces slides in a PowerPoint presentation. [1]

11. In a spreadsheet, the formula used to find the average of marks in cells ranging

A3 to C3 is … [2]

Page 35 ZEDLESSONS
2022 Internal
SECTION B
12. … is a device used to convert a hard copy into a soft copy. [1]

13. The clarity of an image on a computer is determined by the number of … [1]

14. A type of cybercrime where personal details are stolen is known as … [1]

15. A software that is loaded to enable the computer to work is the … [1]

Page 36 ZEDLESSONS
2022 Internal
SECTION C
There are five questions in this section. Answer all the
Instructions: questions.

1. The picture below is found on products in supermarkets.

(a) Name a device that is used to read information from the picture above. [1]

(b) State one piece of information obtained when the device you named in (a) reads

data from the picture. [1]

(c) Give two advantages of using the picture on products in a supermarket. [2]
(d) Explain how information is obtained from the picture when the device

named in (a) fails to read it. [2]

2. (a) What is a Local Area Network (LAN)? [1]

(b) State one disadvantage of a LAN. [1]

(c) Explain the function of a router in a LAN. [2]

(d) Give one difference between an Internet and Extranet. [2]

Page 37 ZEDLESSONS
2022 Internal
SECTION C
3. (a) The following table shows common file extensions used in computers.

Complete the table by filling in the missing file type.

(b) Explain why file backups are important. [2]

(c) State one reason why an old antivirus can not protect computer files. [1]

(d) Give one reason why it is important to keep backups in another place. [1]

4. The following picture shows a smartphone.

(a) Name the type of user interface shown in the picture. [1]

(b) State two input parts on a smartphone [2]

(c) Which feature of a smartphone enables it to connect to the Internet? [1]

(d) State two advantages a smartphone has over a desktop computer. [2]

Page 38 ZEDLESSONS
2022 Internal
SECTION C
5. The following table shows part of a spreadsheet used to keep track of the ages of

children below 5 years at Chikuni clinic.

(a) Explain how records can be arranged in alphabetical order by surname. [2]

(b) State what comment will be displayed in cell E3 after entering the function

=IF(D3<5, “under five age”, “over age”) [1]

(c) What will be displayed if the function =B3 + C3 is entered in F3. [1]

(d) How can a new row be added between row 5 and row 6? [2]

Page 39 ZEDLESSONS
2022

...
YE
AR
YE
R

External
2022 External
SECTION A
[20 MARKS]
Answer all questions. Mark your answers with a cross (x)
Instructions: on the Answer Grid provided in the answer Booklet.

1. A software that can be bought in a shop is called … software.


A. bespoke
B. off the shelf
C. on the shelf
D. tailor made

2. Which of the following can protect data being transferred on a network?


A. Backing up
B. Encrypting
C. Saving
D. Uploading

3. How many bytes are in the code 10110011?


A. 12
B. 8
C. 2
D. 1
4. … is a type of keyboard which contains fewer buttons and is used in special devices.
A. Braille keyboard
B. Concept keyboard
C. Keypad
D. Numpad

5. Which feature in a word processing programme is used to change selected sentences to


capital letters or small letters?
A. Change case
B. Change letter
C. Change size
D. Change word

Page 41 ZEDLESSONS
2022 External
SECTION A
6. A type of network formed between a Bluetooth earpiece and a smartphone is a …
A. Local Area Network.
B. Metropolitan Area Network.
C. Personal Area Network.
D. Storage Area Network.

7. The keyboard shortcut that allows a user to undo the last command is …
A. Alt+shift+z.
B. Alt+z.
C. Control+Alt+z.
D. Control+z.

8. A preformatted document which is edited when creating a brochure or magazine is


called a …
A. sample.
B. specimen.
C. template.
D. wizard.

9. Which of the following is not a benefit of introducing computers in a company?


Increasing the …
A. number of workers.
B. production levels.
C. revenue levels.
D. skills of workers.

10. In a spreadsheet programme, which function adds up values in a range of cells?


A. Average function
B. Count function
C. IF function
D. SUM function

Page 42 ZEDLESSONS
2022 External
SECTION A
11. A software that is used to find information on the Internet is called a …
A. finder.
B. search engine.
C. web engine.
D. browser.

12. What is the other term for website address?


A. Uniform resource locator
B. Universal bus locator
C. Web page address
D. Worldwide web address

13. Multimedia applications are used in the following except …


A. creating of musical videos.
B. production of audio files.
C. production of optical files.
D. recording a video conference.

14. How can a user who spends a long time on a computer avoid a health risk? By …
A. playing music using headphones
B. regularly changing sitting positions
C. regularly backing up data
D. regularly changing the computer

15. In PowerPoint presentations, previewing and displaying of slides is done in the … view.
A. note page
B. outline
C. slide sorter
D. slide show

Page 43 ZEDLESSONS
2022 External
SECTION A
16. Computer actions such as calculations, changing of font colours and deleting of text
are examples of …
A. application.
B. elements.
C. processing.
D. publishing

17. The following are types of operating systems except …


A. single user.
B. real-time.
C. multi-tasking.
D. end user.

18. Performing financial transactions such as money transfers using the Internet is called

A. e-ATM.
B. e-Banking.
C. e-Buying.
D. e-Deposit.

19. Why is it not advisable to open unsolicited e-mail? To avoid …


A. anti-virus installing itself on a computer.
B. users from sending open mails.
C. malware from attacking data on a computer.
D. users from receiving open mails.

20. How are signals and information from a computer displayed for the user to see?
Through the …
A. keyboard.
B. monitor.
C. speaker.
D. viewer.

Page 44 ZEDLESSONS
2022 External
SECTION B
Answer all the questions in this section by using one word
Instructions: or a short phrase.

1. A monitor must be switched off after the … switches off. [1]

2. … is a type of repetitive strain injury caused by typing for a long time on a keyboard
and … is a danger posed by electrical wires that are not covered. [2]

3. … converts hardcopy into softcopy while … converts softcopy into hardcopy. [2]

4. A crime of harassing, mocking and insulting others using the internet is called … [1]

5. … is a computerized teller station in a supermarket where customers pay for

goods. [1]

6. The three elements of fonts used in desktop publishing are …, … and font size. [2]

7. … is a global system of interconnected computer networks. [1]

8. In Excel, columns are labelled by … and rows are labelled by … [2]

9. How can a computer be protected from damage caused by electrical fire? By … [1]

10. A … is a folder inside another folder. [1]

11. Apart from item identification, the other use of a barcode is … [1]

12. … is a copy of an e-mail sent to a second recipient without the Knowledge of

the first recipient. [1]

13. In a Spreadsheet, Σ is used for … while is for … [2]

14. A network which connects computers in three towns is called … [1]

15. A device that is used by artists to produce freehand drawings is called … [1]

Page 45 ZEDLESSONS
2022 External
SECTION C
There are six questions in this section.
Instructions: Answer all the questions.

1. The Covid-19 pandemic has caused schools to adopt the use of Information and
Communication Technologies (ICTs) in the learning and teaching process.

(a) What term describes the learning done using ICTs? [1]

(b) Give two advantages of using ICTs. [2]

(c) Give one way a teacher could give lessons using ICTs during the Covid-19

pandemic. [1]

(d) Mention two disadvantages of learning using ICT. [2]

2. Complete the following table by filling in the missing device names and uses.

Page 46 ZEDLESSONS
2022 External
SECTION C
3. USB is a common feature on many devices.

(a) What do the letters USB stand for? [2]

(b) Mention two devices on which USB is used. [2]

(c) State two advantages of USB. [2]

4. The following diagram shows an electronic pen fitted with several devices.

(a) Which part of the pen is for inserting a removable memory card? [1]

(b) State two ways data can be transferred from the pen to a desktop Computer. [2]
(c) What data will the microphone input to the pen? [1]

(d) Give one advantage of having a digital camera together with the microphone

on the pen. [2]

5. Many organisations use networks.

(a) State two advantages of using a network. [2]

(b) Name a device used on a network to connect to the Internet. [1]

(c) Mention one resource in an organisation that can be shared on a network. [1]
(d) What is meant by the term ‘Intranet’? [2]

Page 47 ZEDLESSONS
2021

...
YE
AR
YE
R

Internal
2021 Internal
SECTION A
[20 MARKS]
Answer all questions. Mark your answers with a cross (x)
Instructions: on the Answer Grid provided in the answer Booklet.

1. An example of an output device is a …


A. mouse click.
B. mouse pad.
C. touch pad.
D. touch screen.

2. What mathematical operation is performed when a forward slash is placed between two
numeric values in a spreadsheet?
A. Addition
B. Division
C. Multiplication
D. subtraction

3. Which of the following is an optical storage medium?


A. Compact disc
B. Hard drive
C. Flash drive
D. Memory card

4. A gigabyte is equivalent to …
A. 1, 024 bytes.
B. 1, 024 kilobytes.
C. 1, 024 megabytes.
D. 1, 024 terabytes.

5. Which action is performed when the following keyboard keys are pressed together?
A. Copy
B. Cut
C. Paste
D. Undo CTRL V

Page 49 ZEDLESSONS
2021 Internal
SECTION A
6. How are files transferred from the computer to the internet? By …
A. downloading
B. saving
C. surfing
D. uploading

7. Which of the following health problems is linked to prolonged use of computers?


A. Athletes foot
B. Brain tumour
C. Stomach pain
D. Wrist pain

8. A … is an electronic document or file stored on a computer.


A. soft copy
B. print copy
C. hard copy
D. flash copy

9. A group of characters that identify a specific user of a computer system is known as …


A. pass code.
B. password.
C. user account.
D. user name.

10. Convert 4096 bytes to Kilobytes.


A. 5.5 Kilobytes
B. 4.2 Kilobytes
C. 4.0 Kilobytes
D. 0.4 Kilobytes

11. What feature do the letters I and M represent in the term WIMP?
A. Icons and Menus
B. Icons and Motherboard
C. Internet and Menus
D. Internet and Motherboard

Page 50 ZEDLESSONS
2021 Internal
SECTION A
12. Which of the following controls the processes in a washing machine?
A. Hard drive
B. Memory
C. Microchip
D. Spinner

13. The loss of human skills and the acquired knowledge to computer systems is Known
as …
A. computerizing.
B. deskilling.
C. job loss.
D. reskilling.

14. Which of the following application software uses the extension docx on saved files?
A. Microsoft Excel
B. Microsoft PowerPoint
C. Microsoft Publishing
D. Microsoft Word

15. The figure below shows part of a spreadsheet used to keep marks obtained by
students in a test.

Which of the following functions can be used to count the number of students using column
B?
A. =count(B2:B4)
B. =countA(B2:B4)
C. =countIFC(B2:B4)
D. =countSum(B2:B4)

Page 51 ZEDLESSONS
2021 Internal
SECTION A
16. A network between organisations that allow external users to have limited access to
their resources is called …
A. Extranet.
B. Intranet.
C. Local Area Network
D. Wide Area Network

17. Which of the following is not a web browser?


A. Chrome
B. Google
C. Internet Explorer
D. Mozilla Firefox

18. In a spreadsheet, AA, AB and BZ are examples of …


A. alphanumeric.
B. cell addresses.
C. column labels.
D. formulae.

19. The process of preparing a magnetic disk to be used for the first time is called …
A. coding.
B. decoding.
C. encoding.
D. formatting.

20. The resource of a private network can be protected from outside users using a …
A. firewall.
B. router.
C. server.
D. switch.

Page 52 ZEDLESSONS
2021 Internal
SECTION B
Answer all the questions in this section by using one word
Instructions: or a short phrase.

1. A byte is equal to ………… bits. [1]

2. ………… and ………… are examples of personal computers. [2]

3. The acronym I.S.P stand for ………… [1]

4. Escape (Esc) key on the keyboard allows a user to ………… an operation. [1]

5. The application software that models the cash coming in and going out of a

Business is ………… [1]

6. Changing the properties of a document is called ………… while changing Content

of a document is ………… [2]

7. …… is a part of a smartphone that takes commands and displays the output. [1]

8. In a spreadsheet, G9 is an example of ………… [1]

9. A ………… is a pattern of thick and thin lines which are scanned to quickly Identify

a product. [1]

10. The keyboard buttons ………… and ………… when pressed together is an

instruction for ‘select all’ text or icons. [2]

11. ………… are processed facts and figures that provide meaning to the user. [1]

12. A duplicate of an original file kept off-site for future reference is known As … [1]

Page 53 ZEDLESSONS
2021 Internal
SECTION B
13. ………… and ………… are examples of programmes that corrupt and destroy

Computer files. [2]

14. A printer that produces images made up of several individual dots is ............, and

the type of printer that uses heat to transfer images from the Print head to

paper is ………… [2]

15. A set of instructions that allow hardware to communicate on a computer system is

known as ………… [1]

Page 54 ZEDLESSONS
2021 Internal
SECTION C
There are five questions in this section. Answer all the
Instructions: questions.

1. The following diagram shows part of an Excel spreadsheet document.

(a) Which cells were merged? [1]

(b) Write a formula that can be used in cell D3 to calculate the cost of fuel used. [2]

(c) Explain the steps involved to replicate the formula in cell D3 through to D7. [2]

(d) What type of data is presented in cell C4? [1]

2. Mr Nzelu has a Café where he provides different Internet services.

(a) Apart from a computer, name one hardware needed to connect to the Internet. [1]

(b) State two services provided at the Internet café. [2]

(c) Give one disadvantage of connecting a computer to the Internet. [1]

(d) Explain why it is important to log out of a user account after using the Internet. [2]

Page 55 ZEDLESSONS
2021 Internal
SECTION C
3. A school uses a memory stick as a backup device to store Computer Studies assess-
ment projects.

(a) Name two other storage devices that the school could use to store

Computer Studies assessment projects. [2]

(b) Give two advantages of using the memory stick. [2]

(c) Explain why it is important to backup information regularly. [2]

4. Computer devices are common in home appliances and office equipment.


(a) Name one home appliance and one office equipment that is controlled by

A microprocessor. [2]

(b) Give two disadvantages of introducing computers in a work place. [2]

(c) Explain how a computer can be used to monitor criminals or thieves. [2]

5. Electrocution can be a safety hazard in a Computer Laboratory.

(a) Give one cause of electrocution that might occur in a Computer Laboratory. [1]
(b) Explain how electrocution can be prevented in a computer Laboratory. [2]
(c) State two general safety rules for a Computer Laboratory which learners

Must follow when using computers. [2]

(d) Give one health problem that may result from using a fixed chair. [1]

Page 56 ZEDLESSONS
2021

...
YE
AR
YE
R

External
2021 External
SECTION A
[20 MARKS]
Answer all questions. Mark your answers with a cross (x)
Instructions: on the Answer Grid provided in the answer Booklet.

1. A monitor is an example of …
A. hardware.
B. shareware.
C. spyware.
D. software

2. Which part of the Central Processing Unit (CPU) performs calculations?


A. Arithmetic Logic Unit
B. Calculator Unit
C. Control Unit
D. Memory Logic Unit

3. A … is a hand held barcode scanner.


A. coder
B. decoder
C. megapixel
D. wand

4. … is the term that refers to hardware that is connected externally to a computer.


A. External device
B. Peripheral device
C. Universal parallel bus
D. Universal serial bus

5. What device is used to transmit data and pictures over a telephone line?
A. Data pic
B. Digitizer
C. Facsimile
D. Scanner

Page 58 ZEDLESSONS
2021 External
SECTION A
6. A device used to print out drawings of building plans is …
A. an actuator
B. a motor
C. a plotter
D. a robot

7. Which of the following is not an advantage of Electronic Fund Transfer at Point of Sale
(EFTPOS)?
A. Easy to change currency when abroad
B. High cost of setting up the system
C. Payment is guaranteed as long as transaction is Successful
D. Reduced theft of cash

8. Which feature in a presentation software allows a user to view all slides on one screen?
Slide … view.
A. master
B. outline
C. show
D. sorter

9. A huge network made up of smaller networks is Known as …


A. the Internet.
B. a local area network.
C. a metropolitan area network.
D. a wireless network.

10. A device which changes analogue telephone signals into digital data is a …
A. modem.
B. ROM chip.
C. RAM chip.
D. sender.

Page 59 ZEDLESSONS
2021 External
SECTION A
11. How can a user send data from a word Processing document to a spreadsheet docu-
ment? By …
A. downloading.
B. exporting.
C. importing.
D. sending.

12. Teaching using computers and other electronic devices is Known as …


A. e-commerce.
B. e-government.
C. e-learning.
D. e-teaching.

13. The following figure shows different devices connected together to form a network at
Mr Chakupopa’s home.

What network is shown above?


A. LAN
B. MAN
C. PAN
D. SAN

14. A text, picture or graphic button used to move from a current webpage to another
webpage when clicked is called …
A. home page.
B. hyperlink.
C. search engine.
D. web browser.

Page 60 ZEDLESSONS
2021 External
SECTION A
15. Which input device is not suitable for the physically disabled users?
A. Braille keyboard
B. Eye typer
C. Foot mouse
D. QWERTY keyboard

16. … is software that can be acquired without paying for its licence and can be used for a
specified period of time.
A. Adware
B. Freeware
C. Malware
D. Shareware

17. … is a type of virus that will become active on a specific date.


A. Anti-virus
B. Time bomb
C. Trojan horse
D. Worm ware

18. When a document is saved without specifying its file destination, it goes to …
A. local disk
B. my document
C. my computer
D. recycle bin

19. What type of page orientation is shown in the following diagram?


A. Gutter
B. Landscape
C. page setup
D. Portrait

Page 61 ZEDLESSONS
2021 External
SECTION A
20. How would a picture size be changed to fit the available space in a document?
By …

A. cropping and cutting.


B. cropping and resizing.
C. minimizing and compression.
D. minimizing and maximizing.

Page 62 ZEDLESSONS
2021 External
SECTION B
Answer all the questions in this section by using one word
Instructions: or a short phrase.

1. The abbreviation VGA stands for … [1]

2. … is the identity given to a user on a network. [1]

3. The blank space outside the printing area on a page of a document is called ……

While the appearance of a document before printing is checked in the print … [2]

4. The slide view that displays one slide at a time with presenters’ notes is called … [1]

5. A … can cause damage to computer files. [1]

6. A system that allows resources to be shared by many different users is … [1]

7. A … holds all deleted items. [1]

8. A voice call that is broadcast to a group of users is called … [1]

9. A microprocessor chip is mounted on the … and the storage that supplements

the hard disk of a computer is … [2]

10. The part of a computer that temporarily stores data is … while the … stores

data permanently. [2]

11. In a spreadsheet, the function that gives the highest value if data in a range of

cells is … and the function that produces the lowest value is … [2]

12. … is an internal network that uses technologies of the internet to enable

communication between people.

[1]

Page 63 ZEDLESSONS
2021 External
SECTION B
13. … is a crime committed using the internet. [1]

14. Apart from a username, a … is used to log into a social media account. [1]

15. The method of accessing computer files without permission is known as … and

a person who performs that act is called … [2]

Page 64 ZEDLESSONS
2021 External
SECTION C
There are five questions in this section. Answer all the
Instructions: questions.

1. Study the picture of an application below and answer the questions that follow.

(a) Name the parts labelled A and B. [2]

(b) State the tab in the picture that must be clicked to open the print preview option. [1]
(c) Which feature or tool shown in the picture must be selected to copy the Attributes

of a selected text? [1]

(d) Explain the purpose of the tool Aa shown in the part labelled C. [2]

2. (a) Name one device other than a laptop that can be used to send electronic mail. [1]

(b) What feature is used to send an email to several recipients at once? [1]

(c) Apart from sending emails, state two ways of communicating electronically using

the internet. [2]

(d) Give two advantages of emails. [2]

Page 65 ZEDLESSONS
2021 External
SECTION C
3.

(a) What is open source software? [1]

(b) Give two reasons why open source software is becoming popular for use in

computers. [2]

(c) State one disadvantage of using open source software. [1]

(d) Give two examples of open source software. [2]

4.

(a) What is a virus? [1]

(b) State one cause of data or information loss apart from being corrupted by a virus. [1]

(c) Explain the difference between an anti-virus and antispyware. [2]

(d) Give two ways in which a document being typed can be protected from accidental

loss. [2]

Page 66 ZEDLESSONS
2021 External
SECTION C

5. The following picture shows a digital camera. Study it and answer the questions that

follow.

(a) Name the part of the digital camera used to capture audio data. [1]

(b) Give two outputs of the digital camera. [2]

(c) Name the part of the digital camera that stores images. [1]

(d) How can images on the digital camera be transferred to a laptop Computer? [2]

Page 67 ZEDLESSONS
2020

...
YE
AR
YE
R

Internal
2020 Internal
SECTION A
[20 MARKS]
Answer all questions. Mark your answers with a cross (x)
Instructions: on the Answer Grid provided in the answer Booklet.

1. Which of the following devices is used for output only?


A. CPU
B. Keyboard
C. Monitor
D. Touch Screen

2. In a spreadsheet, the function, =MAX(A1:A8) Is Known as …………


A. column
B. maximum
C. range
D. rows

3. A programme used to protect a computer from malware is termed as


A. anti-software
B. anti-spyware
C. anti-virus firmware
D. anti-virus software

4. Which of the following is not a multi-user operating system?


A. Command line interface
B. Linux
C. Graphical User interface
D. Unix

5. Which of the following is a file extension for an audio file?


A. jpeg
B. Mp3
C. Mpeg
D. Swf

Page 69 ZEDLESSONS
2020 Internal
SECTION A
6. All can be regarded as text except ............
A. punctuation marks
B. sentences
C. words
D. watermark

7. When using a desktop publisher, it is important to consider …………


A. if it will print publications properly
B. if the teacher likes the appearance
C. colour, rotation text and image
D. the audience of the publication

8. Which of the following represents the correct sequence of flow of data in a computer?
A. input, output, process
B. input, output, save
C. input, process, output
D. output, process, save

9. Communication using computer and mobile devices is called …………


A. IT
B. ICT
C. Link
D. Network

10. Which of the following is the definition of a Computer Room?


A. A room where computers are properly secured and well ventilated
B. A room where computers are stored for safe keeping
C. A properly designed and secured room where computers are installed for safe use.
D. A well ventilated and tidy room where computers are backed up for use.

Page 70 ZEDLESSONS
2020 Internal
SECTION A
11. To calculate the number of items in a row or column in Excel, the function used is?
A. COUNT
B. MAX
C. MIN
D. SUM

12. A type of barcode when scanned take a user to an image video or website is called
…………
A. Barcode
B. Hot spot
C. QR code
D. Wi-Fi code

13. In a word processor, if you type the first four letter of a word e.g. AUGU followed by
pressing the Enter key you obtain the word AUGUST. Such a feature is known as …………
A. Auto complete
B. Auto correct
C. Auto summarise
D. Auto Text.

14. The shortcut method to rum a PowerPoint presentation using the keyboard is by
pressing the keys
A. Fn + F2
B. Fn + F3
C. Fn + F4
D. Fn + F5

15. The purpose of a microprocessor is to …


A. provide power to the computer
B. provide back-up to the computer
C. process all the data and instructions
D. Process all microcomputer hardware

Page 71 ZEDLESSONS
2020 Internal
SECTION A
16. The process of producing high quality printed leaflets, magazines or calendars is
called …
A. Desktop printing
B. Desktop publishing
C. Document publishing
D. Front office publishing

17. Which of the following set of items satisfies construction of a network in a school
computer room?
A. NIC, UTP-cable, computer and server
B. NIC, UTP-cable, computer and switch
C. NIC, UTP-cable, ISP and computers
D. NIC, UTP-cable, ISP and server

18. To take a screen-short of the entire screen content, a user should press ... on the
keyboard.
A. Ctrl + A
B. Ctrl + A + Prtscr
C. Ctrl + Prtscr
D. Ctrl + Prtscr + A

19. During the copy and paste process, the items are stored in the …………
A. Clip Art
B. Clip Board
C. Smart Art
D. Word Art

20. An operation system can be defined as …………


A. a piece of hardware
B. a set of programme to create documents on the computer
C. a set of programme that manage the operations of the computer
D. the boot up programme

Page 72 ZEDLESSONS
2020 Internal
SECTION B
Answer all the questions in this section by using one word
Instructions: or a short phrase.

1. To read cheques, banks use ………… while information on products sold in

supermarkets is captured using ………… and to mark multiple choice examinations

the ………… is used. [3]

2. A computer is made up of the ………… and ………… [2]

3. In a spreadsheet, you can enter values, ………… and labels. [1]

4. The parts of a mail box of an email system include spam, ………… and ………… [2]

5. A collection of pictures stored in a word-processor to choose from is called …………


and a collection of documents is stored in a ………… [2]

6. Switching a computer on from shutdown is known as ………… and restarting it

while it is ON is known as ………… [2]

7. Features of a word processor include ………… and ………… [2]

8. The general term for business done using the internet is …………. [1]

9. Commonly used ports of desktop computers are for connecting

………… and ………… [2]

10. The two types of Desktop Publisher (DTP) frames for entering information are
………… and ………… [2]

Page 73 ZEDLESSONS
2020 Internal
SECTION C
There are five questions in this section. Answer all the
Instructions: questions.

1. Study the storage media devices shown below and answer the questions that follow.

(a) Identify the storage devices above. [3]

(b) Use letters A, B, and C to arrange the above devices in decreasing order of

storage capacity [2]

(c) Why is A used on phones or digital cameras instead of B? [2]

2. Study the diagram below of a spreadsheet extracted which shows two separate

Ranges of numbers and answer the questions that follow.

Page 74 ZEDLESSONS
2020 Internal
SECTION C
a) Explain how you can highlight the separate ranges of data. [2]

(b) How can you move highlighted content in (a) above to Column D? [2]

(c) The current sheet is saved as Expenses, explain how to rename it as income. [2]

3. Part of a network at Kalenbela School is shown below. Study it and use it to answer
the questions that follow.

(a) What network is shown above? [1]

(b) What is the purpose of hardware X and Y on the network? [2]

(c) State two disadvantages of this network. [2]

(d) What term is used to describe www.exams-coucil.org zm? [1]

(e) Identify the parts numbered 1, 2, and 3 [3]

Page 75 ZEDLESSONS
2020 Internal
SECTION C
4. The diagram below represents the main parts of a computer system. Use it to answer the
questions that follow.

(a) Name and describe the components labelled A to D [2]

(b) On the diagram above, use arrows to indicate the direction of how data flows in

a computer. [2]

5. Lemelelo bought a computer to use at home during the lockdown period of

COVID-19, for e-learning and shopping.

(a) Name two things required for him to be connected to enable e-learning and

Shopping to take place. [2]

(b) State two things which Lemelelo should guard against once on the internet. [2]

(c) How should Lemelelo protect himself from the concerns in (b) above? [2]

Page 76 ZEDLESSONS
2020

...
YE
AR
YE
R

External
2020 External
SECTION A
[15 MARKS]
Answer all questions. Mark your answers with a cross (x)
Instructions: on the Answer Grid provided in the answer Booklet.

1. Formulas in a spreadsheet start with …


A. %
B. =
C. *
D. -

2. A group of 8 bits is called a …


A. Byte
B. Kilobyte
C. Megabyte
D. Nible

3. Which of the following is not a danger to computers?


A. Dust
B. Electricity
C. Food Particles
D. Liquids

4. Which of the following is not a benefit of using computers in entertainment?


A. Composing of musical songs
B. Developing movie visual effects
C. Recoding of music
D. Reducing gambling

5. What kind of software is used to create flyers, magazines and business cards?
A. Database publisher
B. Desktop publisher
C. Presentation
D. Spreadsheet

Page 78 ZEDLESSONS
2020 External
SECTION A
6. The following are reasons of networking computers except …
A. easy communication
B. easy virus distribution
C. sharing of files and software
D. sharing of peripheral hardware

7. What tool in presentation graphics software is used to remove unwanted parts of a


picture during editing?
A. Cropping
B. Cutting
C. Pasting
D. Resizing

8. Which of the following is a peripheral device?


A. Central Processing Unit
B. Mouse
C. Random Access Memory
D. Window

9. ………… is the illegal copying and distribution of software.


A. Piloting
B. Piracy
C. Pirates
D. Pirating

10. What term is given to a local area network which is private to a company but
information is accessed the same way as on the internet?
A. Extranet
B. Globalnet
C. Internet
D. Intranet

Page 79 ZEDLESSONS
2020 External
SECTION A
11. Which of the following is a correct format of an E-mail address?
A. @john.mushiwandi.com
B. com.john@mushiwandi
C. [email protected]
D. [email protected]

12. One advantage of using a computer is that it …


A. it is expensive to maintain
B. is highly accurate in making calculations
C. needs skilled manpower to operate
D. takes long to complete a task

13. The difference between a personal identification number (PIN) and a password is …
A. PIN consists of letters while password consists of numbers and special characters.
B. PIN consists of special characters while password consists of numbers and letters.
C. PIN consists of numbers while password consists of letters and special characters.
D. PIN consists of numbers and letters while password consists of special characters.

14. WAN stands for …


A. Wide Area Network
B. Wider Area Network
C. WIFI Area Network
D. World Area Network

15. ………… is a programme that is used to prevent data from being corrupted and lost.
A. Anti-theft
B. Anti-virus
C. Spyware
D. Spam

Page 80 ZEDLESSONS
2020 External
SECTION B
Answer all the questions in this section by using one word
Instructions: or a short phrase.

1. … is part of part of the main memory that is permanent [1]

2. A printer that is disconnected from the computer system is said to be … [1]

3. The moving of selected text from its location in a word document to another

location in the same document is ………… and ………… [2]

4. The unit of measurement of the speed of the Central Processing Unit is

Known as … [1]

5. The identity given to a user on a computer is … and the locking code or key for

the user account is … [2]

6. The presence of ………… in laptops allows laptops to operate without being

Connected to a source of electricity. [1]

7. The two examples of point and click input devices are … and … [2]

8. A tiny processor that controls some household appliances such as a washing

machine is Known as … [1]

9. ………… is a website that helps users to find information on the internet by

typing keyword or phrases. [1]

10. … are lines of varying thickness found on items sold in a supermarket. [1]

Page 81 ZEDLESSONS
2020 External
SECTION B
11. A person who gains unauthorised access to a computer is knowns as … while

the unauthorised gaining of access to a computer is … [2]

12. Companies that provide internet access to users are called … [1]

13. The spreadsheet cell that is currently selected is called … [1]

14. The process of restarting a computer that is already on is called … [1]

15. The Graphical User Interface is made up of ……, Icons, ……, Pointer. [2]

Page 82 ZEDLESSONS
2020 External
SECTION C
There are four questions in this section. Answer all the
Instructions: questions.

1.

(a) Name the parts labelled A and B. [2]

(b) State the function of the part labelled A. [1]

(c) Explain what happens to the text insertion point when part C is presses twice. [2]
(d) What health problem can be caused by using the above input device for long

Periods of time. [1]

2. Weluzani, a learner at Chato Secondary School, uses a wireless network

Connection to the internet for research.

(a) What is a wireless network? [2]

(b) State one advantage and one disadvantage of using a wireless network. [2]
(c) Mention one hardware equipment needed for Weluzani’s computer to have a

wireless connection to the internet. [1]

(d) Give two methods the school can use to prevent unauthorised access to it’s

wireless network. [2]

Page 83 ZEDLESSONS
2020 External
SECTION C
3. Mobile phones such as Smart phones are common computing devices now.

(a) State two operations done by a mobile phone which a computer can also do. [2]

(b) Give two other computing devices apart from a computer and a Smart phone. [2]

(c) Give two ways a computer can be used to change data into information. [2]

(d) State two ways a computer can be used at a police station. [2]

4. The diagram below shows the layout of an application software as seen in normal view.

(a) What is the name of the application software which as the layout shown above? [1]

(b) Identify the parts labelled A and B. [2]

(c) Mention one example of data that can be inserted in part C apart from text. [1]
(d) Write down two tasks that can be done using this application software. [2]

Page 84 ZEDLESSONS
2019

...
YE
AR
YE
R

Internal
2019 Internal
SECTION A
[15 MARKS]
Answer all questions. Mark your answers with a cross (x)
Instructions: on the Answer Grid provided in the answer Booklet.

1. An approximate value of a Gigabyte is …


A. 1 000.
B. 1 000 000.
C. 1 000 000 000.
D. 1 000 000 000 000.

2. Which of the following is not an example of a computer hardware?


A. Compact Disk Drive
B. Floppy Disk Drive
C. Operating System
D. Hard Disk System

3. Kawana wants to protect his computer from virus attacks. He should …


A. clean the computer with anti software.
B. clean the computer with anti-virus software.
C. clean the computer with virus software.
D. clean the computer with virus malware.

4. An example of an input device is a …


A. Flash disk.
B. Screen.
C. Speaker.
D. Touch Screen.

5. What is the other name for the monitor?


A. Digital Display Unit
B. Dot Display Unit
C. Visible Display Unit
D. Visual Display Unit

Page 86 ZEDLESSONS
2019 Internal
SECTION A
6. By increasing font size, which of the following is affected?
A. Colour
B. Picture
C. Sound
D. Text

7. The right to use software is termed as …


A. copyright.
B. installation.
C. licence.
D. patent.

8. The speed of a CPU is measured in …


A. Megahertz and Gigabyte.
B. Megahertz and Gigahertz
C. Byte and Terabyte.
D. Byte and megahertz

9. The icon Aa in word processor represents …


A. change case.
B. change font.
C. word wrap.
D. word size.

10. Which of the following is an automatic method for input of data?


A. Data entry
B. Data capture
C. Data keying
D. Data typing

Page 87 ZEDLESSONS
2019 Internal
SECTION A
11. The term that refers to the methods and equipment used to gather, process,
communicate and store information is …
A. computer processing.
B. information networks.
C. information technology.
D. networked computers.

12. An email can be sent using the following devices except …


A. computer.
B. fax.
C. mobile phone.
D. tablet.

13. Which of the following commands is found in a spreadsheet?


A. Autosum
B. Speller
C. References
D. Paragraph

14. Thesaurus helps to …


A. copy and paste.
B. find similar words.
C. find-replace text.
D. search and paste.

15. What are the two commonly used printers?


A. Dot matrix and laser jet.
B. laser jet and inkjet.
C. plotter and dot matrix.
D. plotter and inkjet.

Page 88 ZEDLESSONS
2019 Internal
SECTION B
Answer all the questions in this section by using one word
Instructions: or a short phrase.

1. The part of the central processing unit where calculations are performed and logical
comparisons made is the … [1]

2. A file sent with an e-mail message is Known as … [1]

3. A … is a device used to connect the computer to the internet. [1]

4. An unordered list in a word processor is done using …, whereas an ordered list is

created using … icon. [2]

5. … software controls the operations of the computer and … software performs user

required functions. [2]

6. A … is a program that enables users to navigate the world wide web. [1]

7. A … is a program that affects smooth operations of a computer and destroys

computer files. [1]

8. … is memory held on a chip that can have its contents changes by the user. [1]

9. Video output on a smart phone is seen on its … while audio output is obtained

through the … [2]

10. 2479MBY is an example of … characters. [1]

Page 89 ZEDLESSONS
2019 Internal
SECTION B
11. In a spreadsheet, the symbol used for division is … whereas the symbol for

multiplication is … [2]

12. A … is a pattern of thick and thin lines on a product. [1]

13. An example of secondary memory on a computer is … [1]

14. A … device is any piece of hardware that is connected to the system unit. [1]

15. Computers use only two digits to process data and these are … and … [2]

Page 90 ZEDLESSONS
2019 Internal
SECTION C
There are four questions in this section. Answer all the
Instructions: questions.

1. Study the picture below and answer the questions that follow.

(a) Give the name of the application shown above. [1]

(b) Name the parts labelled A, B and C. [3]

(c) Give one use of part D. [1]

(d) What is the function of the feature C? [2]

2. The picture below shows a card used in transaction system. Study it and answer the
questions that follow.

Page 91 ZEDLESSONS
2019 Internal
SECTION C
(a) Name this card. [1]

(b) Give one item of data that should be entered in the system in order to use the

system with this card. [1]

(c) Give one example of information stored on the card. [1]

(d) E-commerce is now accepted by many users. What is meant by E-commerce? [1]
(e) State two advantages of using the above card when making transactions. [2]

(f) Give one situation where the card would fail to make transactions go through. [1]

(g) Name a device similar to part X. [1]

3. Study the diagram below and answer the questions that follow.

(a) Show the direction of data movement by putting arrows on lines C, D and E. [3]

(b) Add another input device and another output device in boxes A and B. [2]

Page 92 ZEDLESSONS
2019 Internal
SECTION C
4. (a) Explain the meaning of the term LAN. [1]

(b) Give one disadvantage of networking computers. [1]

(c) What do the letters SAN stand for in networks? [1]

(d) Name a device that changes digital data into analogue Signals and analogue

signals to digital data. [1]

(e) Give one example of crime committed using computers. [1]

Page 93 ZEDLESSONS
2018

...
YE
AR
YE
R

Internal
2018 Internal
SECTION A
[15 MARKS]
Answer all questions. Mark your answers with a cross (x)
Instructions: on the Answer Grid provided in the answer Booklet.

1. The CPU can be classified as … device.


A. Input
B. Output
C. Processing
D. Storage

2. Which of the following is used to insert a drawing done by a user into a word document?
A. Chart
B. ClipArt
C. Picture
D. WordArt

3. The electronic parts inside a computer are called? …………..


A. Electronware
B. Firmware
C. Hardware
D. Physicalware

4. The recycle bin can …


A. Copy
B. Compress
C. Store
D. Archive

5. A memory stick is a type of …


A. Magnetic Storage
B. Optical State Storage
C. Sequential Storage
D. Solid State Storage

Page 95 ZEDLESSONS
2018 Internal
SECTION A
6. A computer virus is a …
A. Copyright
B. Hardware
C. Liveware
D. Software

7. One function of an operating system is to …


A. Control the resources of a computer
B. Create spaces between paragraphs
C. Create spaces between lines
D. Control the authenticity of the computer

8. The legal agreement between the software maker and the user of the software is
called?
A. Copyright Licence Agreement
B. Data Integrity
C. End-User Licence Agreement
D. Software Product

9. Which of the following is the strongest password?


A. 2018
B. BBB B D
C. B? 2018 dr!4
D. peter 3

10. The intersection of a column and a row in a spreadsheet is called …


A. Address
B. Box
C. Cell
D. Grid

Page 96 ZEDLESSONS
2018 Internal
SECTION A
11. Importing involves …
A. Cutting
B. Moving
C. Scanning
D. Uploading

12. How can backache be prevented when using the computer for a long time? By adjust-
ing …
A. Chair to suit user height
B. Chair to suit user wrist
C. User height to suit chair
D. User wrist to suit chair

13. Which Key can move the cursor backwards without deleting text in a document?
A. Backspace
B. Down Arrow Key
C. Enter
D. Left Arrow Key

14. Computer networks that are connected between distant towns are called …
A. LANs
B. MANs
C. WANs
D. Wi-Fi

15. Which of the following is an example of page orientation?


A. Case
B. Cursor
C. Landscape
D. Margins

Page 97 ZEDLESSONS
2018 Internal
SECTION B
Answer all the questions in this section by using one word
Instructions: or a short phrase.

1. The only time the cursor moves from right to left is when text is … aligned. [1]

2. A … and a … can both be used to capture images in a document being typed. [2]

3. Video conferencing makes use of computers, communications equipment and … [1]

4. A network formed using two phones to exchange music is called … [1]

5. A computer system consists of four major hardware components: input, …,

… and … [3]

6. The common name for the Return key is the … [1]

7. The … printer produces output by spraying smaller drops of ink on paper. [1]

8. A … is a set of instructions that tells the computer what to do. [1]

9. An … is an electronic form of a letter sent from one user to another using the … [2]

10. … is making use of many media such as text, images, sound, animation

and video. [1]

11. What term is used to adding motion to graphics on a computer slide presentation? [1]

12. … is the keeping of computer files for future reference in case of loss of original

file. [1]

13. The … key is used to start a new line in a word document. [1]

14. Unauthorised use of an ICT system with a view to change data is called? [1]

15. Alphanumeric refers to … and … [2]

Page 98 ZEDLESSONS
2018 Internal
SECTION C
There are four questions in this section. Answer all the
Instructions: questions.

1. Study the picture of the interface below and answer the questions that follow.

(a) Give the name of the user interface shown above. [1]

(b) Identify parts labelled A and B. [2]

(c) What is the use of part C? [1]

(d) From the diagram, which icon can be double clicked to open the internet? [1]

(e) Name two folders shown in the diagram above. [2]

2. The figure below shows a computer system.

Page 99 ZEDLESSONS
2018 Internal
SECTION C
(a) Apart from device C and D, name two other devices not shown in the figure Which

can be used to input data. [2]

(b) Give one device from the diagram that can be useful for a person who is physically
disabled. [1]

(c) State the part on the diagram where inspecting of data entered takes place. [1]
(d) On a smart phone, the functions of device care are done by … [1]

(e) Write down two advantages of using laptops rather than desktop computers. [2]

3. Study the diagram below.

(a) Name the parts labelled A and B. [2]

(b) Give the cell reference for the part labelled B. [1]

(c) State two uses of this application in our day to day life. [2]

(d) Write down the use of the part labelled B. [1]

Page 100 ZEDLESSONS


2018 Internal
SECTION C
4. Computers are a useful tool in homes and schools.

(a) Give one negative effect of using computers. [1]

(b) State two health problems associated with using computers apart from backaches.[2]

(c) Explain two ways or methods that can be used to protect information on computers

in schools. [2]

Page 101 ZEDLESSONS


2017

...
YE
AR
YE
R

Internal
2017 Internal
SECTION A
[15 MARKS]
Answer all questions. Mark your answers with a cross (x)
Instructions: on the Answer Grid provided in the answer Booklet.

1. An example of a computer software is …


A. ATM card
B. Document
C. Touch Screen
D. Virus

2. Which of the following is a treat to the well-functioning of a computer?


A. Keeping the door open for air to enter
B. Locking the computer lab
C. Learners typing work all the time
D. Using the computer the whole day

3. Sitwala lost two documents he had saved on the computer and could not find them in
the recycle bin either. This could have been caused by …
A. Backspace
B. Delete key
C. Undo command
D. Virus action

4. A photocopier is not classified as an output device of the computer because it …


A. cannot print without a computer
B. cannot be connected without a computer
C. produces hardcopy from hardcopy without a computer
D. produces hardcopy from softcopy without a computer

5. Mainframe computers allow several users to work at the same time. This is referred to
as …
A. Multi-tasking
B. Multi-user
C. Collaboration
D. cooperation

Page 103 ZEDLESSONS


2017 Internal
SECTION A
6. Mr Chanda wants to safeguard learners’ records stored on a computer. How many times
should he backup the records?
A. Everyday
B. Once a month
C. Regularly
D. Twice

7. How many bytes make up 2 kilobytes?


A. 8 bytes
B. 16 bytes
C. 200 bytes
D. 2000 bytes

8. The SAVE AS command is used to …


A. delete the backup document
B. delete the original document
C. rename a saved document
D. rename a saved folder

9. Use the picture below to answer the question that follows.

Two devices which can read the data above are …


A. Barcode Reader and Wand
B. Code and Bar Reader
C. Code and Line Reader
D. Optical Character Reader and Wand

Page 104 ZEDLESSONS


2017 Internal
SECTION A
10. In a spreadsheet, the cell address C9 means …
A. Column 9 and Row C
B. Column C and Row 9
C. Column C and Column 9
D. Row C and Column 9

11. Scrolling is …
A. Clicking the mouse on an icon
B. Dragging the mouse on desktop
C. Moving an icon from one place to another
D. Using the mouse to move through a document

12. The instruction “Divide the sum of B2 and B3 by the contents of B1” can be entered in a
spreadsheet as …
A. = (B1/B2+B3
B. = B2+B3/B1
C. = (B2+B3)/B1
D. = B1/(B2+B3)

13. Which of the following devices can a user get to read an E-book?
A. DVD
B. Flash disk
C. Printer
D. Tablet

14. Preparing an application program to run on a computer is Known as …


A. Copying
B. Downloading
C. Installing
D. Starting

15. To prevent unauthorised users on the network, users are always required to …
A. Cold boot
B. Log on
C. Reboot
D. Connect

Page 105 ZEDLESSONS


2017 Internal
SECTION B
Answer all the questions in this section by using one word
Instructions: or a short phrase.

1. Arrange the following storage devices in descending order of size.

Local hard disk, CD, and DVD [2]

2. Unauthorised use of computer system with a view to seeing or changing data is

referred to as … [1]

3. In a word processor, the cutting off of the unnecessary background of a picture is

called … [1]

4. The acronym I.S.P stands for … [2]

5. The danger of a virus is to … and … computer files. [2]

6. Dragging a mouse over text is called … or … [2]

7. If you delete a word in a document by mistake, you can use the … to put it back. [1]

8. A … is an input device which works like a mouse. [1]

9. An example of keys which occur twice on the keyboard are … and … [2]

10. In a program, a menu shows a list of … [1]

11. … screens are sometimes used as input devices for multimedia systems. [1]

12. With … communication, data travels through the air. [1]

13. If a password is entered wrongly three times the computer will … [1]

14. A desktop publishing program can be used to create … [1]

15. When working in a word processor, copying a graph from a spreadsheet is

known as … [1]

Page 106 ZEDLESSONS


2017 Internal
SECTION C
There are four questions in this section. Answer all the
Instructions: questions.

1. Study the diagram below and answer the questions that follow.

(a) What is the type of network shown above? [1]

(b) State one item shared in this network. [1]

(c) Give the requirement needed for one to access this network. [1]

(d) Give one place where this type of network can be used. [1]

2. Study the picture of an application shown below and answer the questions that follow.

(a) Name items labelled A, B, C and D. [3]

(b) When could the status at D read 2 of 3? Explain. [2]

(c) Give two uses of part B. [2]

(d) Name the feature of a word processor which saves work at regular intervals. [1]

Page 107 ZEDLESSONS


2017 Internal
SECTION C
3. The picture below shows a computer mouse.

(a) Name the parts labelled A, B and C. [3]

(b) What is the function of part B when working in a document? [1]

(c) What would happen if a user clicks part C on a Desktop? [1]

(d) What is the term used to refer to two successive clicks of part A? [1]

(e) Why do users prefer using the mouse other than a keyboard in a Graphical User

Interface? [2]

4. Mwandamando runs an NGO that takes care of street Kids. The NGO has agents who
capture information about the street kids.

(a) Mention a piece of software that can be used to edit;

(i) Images of street kids [1]

(ii) Records of each street kid [1]

(b) List one hardware device and a software that can be used to present a report about
the street kids to an audience. [2]

Page 108 ZEDLESSONS


2016

...
YE
AR
YE
R

Internal
2016 Internal
SECTION A
[15 MARKS]
Answer all questions. Mark your answers with a cross (x)
Instructions: on the Answer Grid provided in the answer Booklet.

1. Which of the following statement best describes what a computer program is?
A. The input stage of computing that gets data needed.
B. The step by step instructions that tell the computer what to do.
C. The step by step user manual on how to operate the computer.
D. The output stage of computing that outputs data needed.

2. Data are …
A. letters entered into the computer.
B. numbers entered into the computer.
C. unprocessed facts entered into the computer.
D. processed facts obtained from the computer.

3. Which Key on a computer keyboard can be used to delete text in a word document?
A. Alt
B. Backspace
C. Esc
D. Shift

4. The binary digits 1 and 0 are called …


A. bits.
B. codes.
C. signal.
D. text.

5. Which of the following ports are suitable for connecting a USB printer?
A. Serial port
B. Parallel port
C. Universal Serial Bus port
D. Universal Sequence Backup Port

Page 110 ZEDLESSONS


2016 Internal
SECTION A
6. Which of the following home appliances has no microprocessor?
A. Steam pressing iron
B. DVD player
C. Television
D. Microwave oven

7. What can be found on the desktop of computer screen?


A. Menu
B. Icons
C. Commands
D. Scroll buttons

8. The … is a part of a computer where calculation, searching and sorting of data is


carried out.
A. Read Only Memory (ROM)
B. Random Access Memory (RAM)
C. Central Processing Unit (CPU)
D. Backing Storage Unit (BSU)

9. Which of the following is a network of computers that are found in one building?
A. LAN
B. PAN
C. SAN
D. WAN

10. An Uninterruptible Power Supply (UPS) unit can be used to …


A. protect the computer from solar power.
B. backup computer data.
C. protect the computer from power blackouts.
D. protect the computer from virus blackouts.

Page 111 ZEDLESSONS


2016 Internal
SECTION A
11. … operating system lets many users at different terminals to share processing time on
a powerful central computer.
A. Multi-tasking
B. Multi-programming
C. Real-time
D. Multi-user

12. Formatting a disk results in all the data being erased from the …
A. storage media.
B. screen.
C. keyboard.
D. printer.

13. Which of the following software will be loaded first to the memory when the computer is
switched on?
A. Spreadsheet software
B. Word processing software
C. Operating system software
D. Presentation software

14. The type of computer which allows a user to input, edit and output audio is …
A. multi media computer.
B. multi audio computer.
C. music computer.
D. speaker computer.

15. What is the best way to prevent data loss on the computer?
A. Use a bigger computer
B. Not to use laptops
C. Backup the printer
D. Backup the data

Page 112 ZEDLESSONS


2016 Internal
SECTION B
Answer all the questions in this section by using one word
Instructions: or a short phrase.

1. The … button is used to add up numbers quickly in a spreadsheet. [1]

2. The … represents something on a computer in form of a picture. [1]

3. … in the unit for measuring the speed of the CPU. [1]

4. A … and a … are two examples of optical storage media. [2]

5. The margin in a document determines how much … is left between the edge of

the page and the … [2]

6. A … is a malicious program that copies itself and destroys computer files. [1]

7. To read account numbers of cheques at a bank … reader is used. [1]

8. In serial access used by a tape, data is read from … [1]

9. To use a computer network, a user must first log on by entering the user ID and … [1]

10. Cameras that do not require film and can transfer images and video into the

computer are called … cameras. [1]

11. … is an example of an … software used for creating, formatting and editing of

documents on a computer. [2]

12. … allows users to find a website even if they do not Know the Universal Resource
Locator (URL) [2]

Page 113 ZEDLESSONS


2016 Internal
SECTION B
13. In a word processor, a line that blinks to indicate where to type is called a … [1]

14. To … is to remove a … no longer needed on the computer. [2]

15. A program stored in … of the computer directs the computer to start up each time

you switch on. [1]

Page 114 ZEDLESSONS


2016 Internal
SECTION C
There are four questions in this section. Answer all the
Instructions: questions.

1. The diagram below shows the four basic actions of the computer to produce

information.

(a) State one device that can be used at stage 3 and one that can be used at stage 4. [2]
(b) Name stage 1 and stage 3. [2]

(c) What action is done at stage 2? [2]

2. The pictures below show different hardware devices found on a computer network.

(a) Name the two hardware devices A and B. [2]

(b) Give two uses of a computer network. [2]

(c) (i) Give one advantage of a wireless network. [1]

(ii) Give one disadvantage of a wireless network. [1]

(d) Give two ways of protecting computers on a network. [2]

Page 115 ZEDLESSONS


2016 Internal
SECTION C
3. The following is a sample of an e-mail address of pjbanda.

[email protected]
A B
(a) Name parts A and B. [2]

(b) If pjbanda receives an email message from his friend, what is the name of the

space where the message is kept? [1]

(c) Give two reasons why it is not advisable to open emails from unknownsources. [2]

(d) Give two reasons why users prefer to send e-mails instead of letters. [2]

4. Beenzu and Niza have been playing a video game all day on the computer using

a keyboard.

(a) State one health problem that Beenzu and Niza may face due to the continuous

use of the computer. [1]

(b) Give one way of preventing the health problem you stated in (a). [1]

(c) Give one input device that can be used to play the video game instead of the

keyboard. [1]

(d) Give one disadvantage of playing computer games apart from health related

problems. [1]

Page 116 ZEDLESSONS


PC SHORTCUTS
CTRL+A.............................. Select All
CTRL+C............................. Copy
CTRL+X.............................. Cut
CTRL+V.............................. Paste
CTRL+Z.............................. Undo
CTRL+B.............................. Bold
CTRL+U............................. Underline
CTRL+I............................... Italic
F1....................................... Help
F2....................................... Rename selected object
F3....................................... Find all files
F4....................................... Opens file list drop-down in dialogs
F5....................................... Refresh current window
F6....................................... Shifts focus in Windows Explorer
F10..................................... Activates menu bar options
ALT+TAB............................ Cycles between open applications
ALT+F4............................... Quit program, close current window
ALT+F6............................... Switch between current program windows
ALT+ENTER....................... Opens properties dialog
ALT+SPACE....................... System menu for current window
ALT+¢................................. opens drop-down lists in dialog boxes
BACKSPACE..................... Switch to parent folder
CTRL+ESC......................... Opens Start menu
CTRL+ALT+DEL................ Opens task manager, reboots the
computer
CTRL+TAB......................... Move through property tabs
CTRL+SHIFT+DRAG......... Create shortcut (also right-click, drag)
CTRL+DRAG...................... Copy File
ESC.................................... Cancel last function
SHIFT+DRAG.................... Move file
SHIFT+F10........................ Opens context menu (same as right-click)
SHIFT+DELETE................. Full wipe delete (bypasses Recycle Bin)

Page 117 ZEDLESSONS


PC Keyboard Shortcuts
Document Cursor Controls

HOME................................. to beginning of line or far left of field


END.................................... to end of line, or far right of field or
screen
CTRL+HOME..................... to the top
CTRL+END........................ to the bottom
PAGE UP........................... moves document or dialog box up one
page
PAGE DOWN..................... moves document or dialog down one
page
ARROW KEYS................... move focus in documents, dialogs, etc.
CTRL+ >............................. next word
CTRL+SHIFT+ >................ selects word

WINKEY SHORTCUTS

WINKEY + D...................... Bring desktop to the top of other windows


WINKEY + M...................... Minimize all windows
WINKEY + SHIFT + M....... Undo the minimize done by WINKEY + M
and WINKEY + D
WINKEY + E...................... Open Microsoft Explorer
WINKEY + Tab................... Cycle through open programs on taskbar
WINKEY + F....................... Display the Windows® Search/Find
feature
WINKEY + CTRL + F......... Display the search for computers window
WINKEY + F1..................... Display the Microsoft® Windows® help
WINKEY + R...................... Open the run window
WINKEY + Pause/Break.... Open the system properties window
WINKEY + U...................... Open utility manager
WINKEY + L....................... Lock the computer (Windows XP® & later)

Page 118 ZEDLESSONS


OUTLOOK® SHORTCUT KEYS

Alt + S................................. Send the email


Ctrl + C............................... Copy selected text
Ctrl + X............................... Cut selected text
Ctrl + P............................... Open print dialog box
Ctrl + K............................... Complete name/email typed in address
bar
Ctrl + B............................... Bold highlighted selection
Ctrl + I................................ Italicize highlighted selection
Ctrl + U............................... Underline highlighted selection
Ctrl + R............................... Reply to an email
Ctrl + F............................... Forward an email
Ctrl + N............................... Create a new email
Ctrl + Shift + A.................... Create a new appointment to your
calendar
Ctrl + Shift + O.................... Open the outbox
Ctrl + Shift + I..................... Open the inbox
Ctrl + Shift + K.................... Add a new task
Ctrl + Shift + C.................... Create a new contact
Ctrl + Shift+ J...................... Create a new journal entry

WORD® SHORTCUT KEYS

Ctrl + A............................... Select all contents of the page


Ctrl + B............................... Bold highlighted selection
Ctrl + C............................... Copy selected text
Ctrl + X............................... Cut selected text
Ctrl + N............................... Open new/blank document
Ctrl + O............................... Open options
Ctrl + P............................... Open the print window
Ctrl + F............................... Open find box
Ctrl + I................................ Italicize highlighted selection
Ctrl + K............................... Insert link

Page 119 ZEDLESSONS


Ctrl + U............................... Underline highlighted selection
Ctrl + V............................... Paste
Ctrl + Y............................... Redo the last action performed
Ctrl + Z............................... Undo last action
Ctrl + G............................... Find and replace options
Ctrl + H............................... Find and replace options
Ctrl + J................................ Justify paragraph alignment
Ctrl + L................................ Align selected text or line to the left
Ctrl + Q............................... Align selected paragraph to the left
Ctrl + E............................... Align selected

Page 120 ZEDLESSONS


COMMON TERMS
abstraction The process of filtering out unneces-
sary information when solving a problem. biological interface A technology that con-
nects a biological system (such as a human’s muscle)
algorithm A series of steps taken to solve a prob- to a digital system (such as a computer). The interface
lem or carry out a task. is the point where the two meet.

application (app) A piece of software designed to biometric data Any biological information – such
achieve a particular purpose. as a person’s height or weight.

application programming interface (API) bit The basic unit of information in the binary sys-
An API is a set of functions that accesses the features tem, a bit is a single 0 or 1. Eight bits make up one
of data of an operating system, application, or other byte.
service.
Boolean logic A branch of mathematics that has
array A collection of similar elements with a spe- two values, 0 and 1. Also called Boolean algebra.
cific order.
bug A software error in code.
artificial intelligence (AI) A type of intelli-
gence that is demonstrated by computers. Cascading Style Sheets (CSS) A programming
language that describes how to display HTML ele-
ASCII Short for American Standard Code for Infor- ments in a web browser.
mation Interchange. ASCII is a character-encoding
standard for electronic communication. central processing unit (CPU) The part of
a computer that controls most of its operations. It
assembler A program that translates assembly consists of the control unit (CU), which carries out
language (a low-level programming language) into instructions, and the arithmetic logic unit (ALU),
machine code. which performs calculations. The CPU is also known
as the microprocessor.
augmented reality A view of a physical, real-
world environment that has been enhanced with cloud A term used for specialized computers that
virtual ele provide services through the internet, such as storing
ments. files.
code Instructions written in a programming lan-
augmented virtuality A view of a mostly virtual guage that tell a computer to do something.
environment that has been enhanced with re-
al-world elements. compiler A program that converts an entire pro-
gram into an OS-specific file in one go.
bandwidth The amount of data that can flow into a
network. compression Reducing the size of a file in order to
make it easier to share or store. Lossless compression
big data A huge amount of data, such as that col- keeps the original information intact; lossy compres-
lected by internetconnected smart devices. sion results in some loss of information.

binary system A coding system that uses 0s and


1s to represent information in a computer.

Page 121 ZEDLESSONS


COMMON TERMS
computational thinking The thought process in deep web The part of the internet that is not listed
figuring out problems and finding solutions in ways on search engines.
that can be understood by a computer, a human, or
both. digital Involving the use of computer technology,
or the use or storage of data as digital signals. Digital
computer An electronic device that manipulates signals are expressed in 0s and 1s.
data.
digital divide The difference between people who
computer chip A set of electronic circuits on a have access to digital devices and the internet, and
small piece of semiconducting material, usually sili- those who do not.
con. Also known as an integrated circuit.
digital identity The set of identifiers used by or-
computer science The study of the use of com- ganizations to authenticate who a user is, so the user
puters: how they work, and what they can be used can access the organization’s services.
for.
digital literacy The ability to be able to find, use,
cookie A packet of data sent by a website to a user’s and share accurate information online.
computer that is used to identify the user and track
their browsing. encoding The process of turning information, such
as images, sounds, or text, into a format a computer
cryptocurrency A wholly digital form of curren- can understand.
cy that operates without a central bank.
encryption The process of making a message
cybersecurity The protection of computers and unreadable to everyone except the person or people it
data from attacks by malicious people online. was intended for.

dark web The most restricted part of the internet, file A resource for storing information on a comput-
viewable only by using a special web browser. er.
firmware A type of program that is embedded into a
data Information that is processed or stored by a device’s CPU and controls how the device works.
computer.
function A mathematical formula that takes input
database A program that lets people store and data and acts upon it to produce output data. Func-
search data effectively. tions are made up of variables, constants, and arrays.

debugging The process of finding and fixing bugs geek An informal term for someone who is obses-
(errors) in programs. sive about a certain topic, or group of related topics.

decomposition The process of breaking a prob- hacking Any act that makes a piece of technology
lem down into smaller sub-problems. do something it wasn’t intended to do.

decryption The process of using a cipher and a key Hackers can be grouped into white, grey, and black
to reveal the meaning of encrypted text. hat hackers, depending on their intentions.

Page 122 ZEDLESSONS


COMMON TERMS
hardware The physical parts of a computer that logic gate A device that carries out computer cal-
exist as objects in the real world. culations with binary numbers.

heuristic Any approach to problemsolving or machine code Instructions that a computer can
learning that uses a quick and simple approach as understand and uses to send instructions to the com-
opposed to a thorough one. A “rule of thumb” is an puter’s hardware.
example of a heuristic.
machine learning The branch of computer sci-
hub The central part of a network, through which ence that gives a computer the ability to learn to do
information flows into and out of the network. something with data, rather than explicitly program-
ming it.
Hypertext Markup Language (HTML) A pro-
gramming language for creating webpages and web malware Malicious software that gains illegal access
applications. HTML is divided into elements called to a computer or system. Malware includes worms,
tags, semantics, and attributes that each hold a specif- viruses, spyware, trojans, rootkits, ransomware, back-
ic type of information. doors, and hybrid threats.

Hypertext Transfer Protocol (HTTP) The microprocessor Another name for the central
data transfer protocol used on the world wide web. processing unit (CPU).

imperative language A programming language motherboard The main circuit board of a com-
that operates as a series of commands that are execut- puter, which holds the CPU, memory, and connectors
ed one by one. for the hard drive and optical drives, among oth-
er connections. The motherboard allows hardware
input Any information that is put in, taken in, or components of a computer to communicate with each
operated on by a process or system. other.

internet A massive global network of created from net neutrality The principle that governments or
connections between billions of computers. ISPs should not block, discriminate, or charge users
differently to access the internet.
Internet of Things The name given to the
network of interconnected devices with embedded network A group of connected devices that can
computers. share resources and data. Networks can be classified
by size or topology (layout).
interpreter A program that translates and exe-
cutes the source code of another computer program node Any device that sends or receives data through
one line at a time. a network.

key In cryptography, any additional information that object-oriented language A programming


is used to encrypt or decrypt a message. language that includes the concept of objects that
model real-world things. An object usually has fields
keylogger A computer malware program that (containing data) and methods (containing code) that
tracks what keyboard keys are pressed in order to represent behaviours.
gain access to passwords and other information.

Page 123 ZEDLESSONS


COMMON TERMS
online identity The self or selves that a user pres- random-access memory (RAM) A computer
ents to the online world. system’s short-term memory, used to store calcula-
tion data.
operating system (OS) A piece of software that
manages a computer’s hardware and software resourc- read-only memory (ROM) A place where data
es, and makes it easier for them to be used. The most that is needed for the computer to function, such as
common examples are Linux, macOS, and Windows. firmware and start-up instructions, is usually stored.
output Something that is produced by a person or
machine, or the place where information leaves a register A place in a CPU where data currently
system. being used can be stored temporarily.

pattern recognition The process of seeing repe- relational database The most common type
tition in a predictable manner. Pattern recognition is of database, where information is stored in tables.
an important part of computational thinking. The tables are made up of rows, called records, and
columns, called fields.
peripheral Any piece of hardware that allows users
to interact with a computer. resolution A measure of the amount of informa-
tion in a computer file, such as an image.
photoresist A substance that is used in the manu-
facture of computer chips that protects parts of a chip routing The process of finding the shortest path
in development from being eroded by the manufac- between two devices across the internet.
turing process.
search engine A program that looks through the
pixel Short for picture element. A tiny area of illu- world wide web for webpages containing particular
mination on a computer display screen, one of many words or phrases inputted by the user.
from which an image is composed.
server A computer program or device that re-
programming The process of giving instructions sponds to requests across a computer network to
to a computer. provide a network or data service.

programming language A formalized set of social media platform A type of website or


words and symbols that allows a person to give application that allows users to connect to each other,
instructions to a computer. High-level languages are and create and share content.
closer to human language. Low-level languages are
closer to binary code. social media bubble The phenomenon of a user
seeing only things they like on social media. Users in
program A collection of instructions that performs a social media bubble may be isolated from the ideas
a specific task when executed by a computer. and opinions of anyone not in the bubble.

protocol A set of rules that governs the transmis- software The operating system, programs, and
sion of data between devices; for example, Hypertext firmware that allow a user to access a computer’s
Transfer Protocol, which is used for visiting websites. hardware.

Page 124 ZEDLESSONS


COMMON TERMS
STEAM An acronym for science, technology, engi-
neering, arts, and mathematics. universal serial bus (USB) A standard devel-
oped to define cables, connectors, and their protocols
streaming The process of allowing a user to access for connection, communication, and power supply
information not stored on their computer over the between computers and peripheral devices.
internet. Streaming is popular for watching films or
listening to music online. update New code that is released by a programmer
or company that fixes bugs or adds new features to a
syntax The structure of statements in a computer website, application, software, or program.
language.
upgrade Completely new software that is designed
transistor A tiny device that is used to amplify or to replace an older website, application, software, or
switch electric current. program.

translation The process of converting one pro- virtual reality A computer-generated 3D image
gramming language into another. Translation usually or environment that can be interacted with in a
refers to breaking a high-level language down into a seemingly real way.
low-level language.
viruses Tiny pieces of code that attach themselves
Transmission Control Protocol / Internet Proto- to pre-existing files before replicating themselves. Vi-
col (TCP/IP) A set of rules that governs the connec- ruses corrupt data and slow down operating systems.
tion of computer systems to the internet.
visual language A programming language that is
troubleshooting The process of fixing common based on blocks of code instructions that the pro-
problems that arise when using computer hardware grammer fits together. Visual languages are ideal for
or software. children or people new to programming.

truth tables A diagram of inputs and outputs of a visualization The process of turning information,
logic gate or circuit. In a truth table, the binary value such as a coordinates or a big dataset, into a model,
1 equals the logical value TRUE, and the binary value graphs, or images.
0 equals FALSE.
website A collection of webpages.
Turing test A test outlined by English mathema-
tician Alan Turing that centres on the ability of an webpage A single destination on the world wide
evaluator to assess whether any particular machine web.
can be said to be intelligent.
Wi-Fi A facility allowing computers to connect to the
unicode The single worldwide standard for encod- internet or communicate with each other wirelessly
ing characters used in electronic communication. in a particular area.
Unicode is much larger than ASCII.
world wide web An information system that runs
Uniform Resource Locator (URL) Also on the internet that allows webpages to be connected
known a web address, URL is a standardized system to other webpages by hypertext links.
for locating and identifying content on the world
wide web.

Page 125 ZEDLESSONS


MY FINAL REMARKS

Make sure to Look out for the next Edition by following us on our social
media platforms.

All that i can hope for, is to see this book help Students, Parents, Teachers,
and individuals everywhere . I hope to continue making more learning
material like this in the future.

Thank you once more for downloading this book.

You might also like