Computer Studies Grade 9 (Zedlessons)
Computer Studies Grade 9 (Zedlessons)
STUDIES
Examination
Questions
By
EXAMINATION QUESTIONS
Computer Studies Examination Questions (2024 - 2016).
By Chilufya Nsofwa
© 2025 Chilufya Nsofwa. All rights reserved.
Published by Zedlessons™ Media, Copperbelt, Zambia.
Zedlessons books may be purchased for educational use. Online editions are also available.
The Zedlessons logo is a registered trademark of Zedlessons™ Media. Computer studies Examination Ques-
tions, the cover image, and related trade dress are trademarks of Zedlessons™ Media. While the publisher
and the author have used good faith efforts to ensure that the information and instructions contained in
this work are accurate, the publisher and the author disclaim all responsibility for errors or omissions, in-
cluding without limitation responsibility for damages resulting from the use of or reliance on this work.
Use of the information and instructions contained in this work is at your own risk.
Zedlessons™ Media, is Not Affiliated With The Examination Council of Zambia (ECZ) In Any Way, and
Therefore; this book is made solely By The compiler at Zedlessons™ Media.
ABOUT ZEDLESSONS
ZEDLESSONS™
ABOUT THE COMPILER
Section
Section
Instructions
Question
number
Question
Marks
Page
Number
CONTENTS
2024
External
SECTION A............................................................................13
SECTION B............................................................................17
SECTION C.............................................................................18
2023
Internal
SECTION A............................................................................22
SECTION B............................................................................26
SECTION C.............................................................................27
2022
Internal
SECTION A............................................................................31
SECTION B............................................................................35
SECTION C.............................................................................37
External
SECTION A............................................................................41
SECTION B............................................................................45
SECTION C.............................................................................46
2021
Internal
SECTION A............................................................................49
SECTION B............................................................................53
SECTION C.............................................................................55
External
SECTION A............................................................................58
SECTION B............................................................................63
SECTION C.............................................................................65
2020
Internal
SECTION A............................................................................69
SECTION B............................................................................73
SECTION C.............................................................................74
External
SECTION A............................................................................78
SECTION B............................................................................81
SECTION C.............................................................................83
2019
Internal
SECTION A............................................................................86
SECTION B............................................................................89
SECTION C.............................................................................91
2018
Internal
SECTION A............................................................................95
SECTION B............................................................................98
SECTION C.............................................................................99
2017
Internal
SECTION A............................................................................103
SECTION B............................................................................106
SECTION C.............................................................................107
2016
Internal
SECTION A............................................................................110
SECTION B............................................................................113
SECTION C.............................................................................115
PC SHORTCUTS.....................................................117
COMMON TERMS..................................................121
DID YOU KNOW?
You can watch video tutorials of all the past papers covered in this
book on our YouTube channel (Zedlessons) for free.
visit https://youtube.com/@zedlessons-zm
...
YE
AR
YE
R
External
2024 External
SECTION A
[20 MARKS]
Answer all questions. Mark your answer with a cross(X) on
Instructions: the Answer Grid provided in the answer booklet.
2. Which key on the keyboard can be used to delete characters to the left of the cursor?
A. Alt
B. Back space
C. Ctrl
D. Delete button
3. In PowerPoint, which option is used to display the title and bullets only?
A. Navigation sorter view
B. Notes sorter view
C. Outline view
D. Slide view
Page 13 ZEDLESSONS
2024 External
SECTION A
6. To copy a sentence from one document to another, the user should … in the second
document.
A. Select the copy button
B. Select the paste button
C. Select the cut button
D. Select the move button
10. … displays the name of the application program and the document which is currently in
use.
A. Menu bar
B. Scroll bar
C. Title bar
D. Toolbar
Page 14 ZEDLESSONS
2024 External
SECTION A
11. Name the device shown in the following picture.
A. Scanner.
B. Plotter.
C. Projector.
D. Printer.
12. The text and pictures that appear in the background of a document are called …
A. clip art.
B. picture mark.
C. smart art.
D. watermark.
14. What name is given to the message that appears suddenly on the screen when using a
web browser?
A. Desktop message
B. Monitor message
C. Pop-up message
D. Screen message
15. The health problem that may be caused by prolonged use of computers is …
A. Headache
B. Infection
C. Influenza
D. Malaria
Page 15 ZEDLESSONS
2024 External
SECTION A
16. The refresh button Is used to … the screen.
A. Close
B. Maximize
C. Minimize
D. Update
19. Which of the following is fast in accessing data and has a large storage space? Regis-
ters and …
A. Optical Disk.
B. Memory Card.
C. Magnetic Tape.
D. Flash Disk.
20. How can multiple choice examination questions be marked automatically? By using the
…
A. multiple choice marker.
B. multiple choice reader.
C. optical character marker.
D. optical mark reader.
Page 16 ZEDLESSONS
2024 External
SECTION B
[20 MARKS]
There are fifteen (15) questions in this section.
Instructions: Answer all the questions in this section by using one word
or a short phrase.
8. A computer has a fan inside the system box to cool down the … and … [2]
11. A program menu consists of … the user can select to carry out tasks. [1]
13. The letters CPU stand for … and the letters DVD stand for … [2]
14. Before text is pasted, it is temporarily held in the … of the computer’s memory. [1]
15. The letters … stand for wireless local area network. [1]
Page 17 ZEDLESSONS
2024 External
SECTION C
[30 MARKS]
There are five (5) questions in this section.
Instructions: Answer all the questions in the answer booklet provided.
1. Companies sometimes use email and ordinary post to send letters and
documents to customers.
(d) Give two reasons why ordinary post might be used instead of email. [2]
[Total: 6 marks]
(b) Explain how a picture of the school could be added to the newsletter. [2]
(c) Apart from a picture of a school, name two other sources of graphics
(d) Give one reason why the school newsletters could be printed in colour. [1]
[Total: 6 marks]
Page 18 ZEDLESSONS
2024 External
SECTION C
3. Study the picture below and answer the questions that follow.
(a) (i) Name the application program in the picture above. [1]
(ii) What name is given to the boxes where a title and subtitle can be added? [1]
(c) Apart from charts and graphics, mention one other item that can be
(d) Give two uses of the application program shown in the picture. [2]
[Total: 6 marks]
Page 19 ZEDLESSONS
2024 External
SECTION C
(b) Write one cell address that can contain numbers. [1]
(c) How many rows are shown in the spreadsheet above? [1]
(d) Write two formulas that can workout the total profit per item. [2]
[Total: 6 marks]
5. The following table shows tasks and the suitable software to carry them out. A few have
been filled in for you; complete the remaining.
[Total: 6 marks]
Page 20 ZEDLESSONS
2023
...
YE
AR
YE
R
Internal
2023 Internal
SECTION A
[20 MARKS]
Answer all questions. Mark your answers with a cross (x)
Instructions: on the Answer Grid provided in the answer Booklet.
4. … bar is the top row of a window of an application where its name is shown.
A. Menu
B. Task
C. Title
D. Tool
Page 22 ZEDLESSONS
2023 Internal
SECTION A
6. Which function key on the keyboard opens the “Spell checker” dialog box?
A. F12
B. F9
C. F8
D. F7
7. … is used to connect computers so that files are shared on a network without using
wires.
A. Protocol
B. Server
C. Sensor
D. Wifi
8. Which of the following optical storage media show the storage size from the largest to
the smallest?
A. DVD VCD CD
B. DVD CD VCD
C. VCD DVD CD
D. VCD CD DVD
Page 23 ZEDLESSONS
2023 Internal
SECTION A
11. The CPU and … are two examples of processing devices.
A. compact disk.
B. hard disk.
C. memory card.
D. network card.
13. Which file extension is suitable for storing images for web pages?
A. Png
B. Pdf
C. Tif
D. Txt
14. How are activities controlled in the computer system? By using the …
A. CPU
B. Flash disk
C. Hard disk
D. NIC
15. The type of licence that gives users the right to use and what to use an application
software for is called …
A. End User Licence Agreement.
B. End User Licence Rights.
C. Shareware Licence Agreement.
D. Shareware Licence Rights.
Page 24 ZEDLESSONS
2023 Internal
SECTION A
16. What is produced on a document in Word when
same time?
= and Ctrl are pressed at the
A. Double line
B. Strike through
C. Subscript
D. Superscript
17. In Excel, the correct formula to add numbers from column C and column F in row num-
ber 3 is …
A. =Add C3, F3.
B. =Add (C3,F3).
C. =C3 + F3.
D. =(C3 : F3).
18. … is the type of software that hides itself and damages other computer software and
files.
A. Antivirus
B. Hacker
C. Trojan horse
D. Virus tracker
19. In Word, the feature that enables a user to send one common letter to many people at
once is called …
A. mail merge.
B. mail navigation.
C. template.
D. wizard.
20. Payments of goods at a supermarket using a debt card is done through a system
known as Electronic Fund …
A. Exchange at Point-of-Sale.
B. Exchange at Supermarket.
C. Transfer at Point-of-Sale
D. Transfer at Supermarket.
Page 25 ZEDLESSONS
2023 Internal
SECTION B
Answer all the questions in this section by using one word
Instructions: or a short phrase.
5. To type the first letter of a word in uppercase without using the caps lock key, a
user can hold down the … button while pressing the key of the letter. [1]
8. A scanner copies … documents and creates the … that is stored in the computer. [2]
9. … allows users to find a website even if they do not know the Uniform Resource
Locator (URL). [1]
11. … is the licence that gives a company the right to own software it has developed. [1]
15. To use a computer network, a user must first log on by entering the user name
and … [1]
Page 26 ZEDLESSONS
2023 Internal
SECTION C
There are five questions in this section. Answer all the
Instructions: questions.
1. (a) The following diagram shows part of the components of a multimedia system.
(b) Give one multimedia device that can be used for audio in the system. [1]
2. Complete the following table by filling in the missing errors and meaning. The first part
has been completed for you as an example.
Name of Program Error Meaning of error
Microsoft Excel #DIV/0 ERROR Cell value devided by zero
Microsoft Excel Width of Column too small
[2]
Microsoft Word Word Words underlined in green
[2]
Microsoft Desktop Publisher Misspelling word
[2]
Page 27 ZEDLESSONS
2023 Internal
SECTION C
3. Study the picture of Microsoft desktop publishing program and answer the questions
that follow.
(a) Mention one input device apart from a keyboard that can be used to enter details of
patients. [1]
(c) Give two ways of protecting records of patients stored on computers. [2]
(d) Give one storage medium for backing up records of patients. [1]
Page 28 ZEDLESSONS
2023 Internal
SECTION C
5. Study the following picture of the spreadsheet program and answer the questions that
follow.
(a) Give the cell address for the active cell shown in the picture. [1]
(b) (i) Write the formula that was entered in cell B9 to calculate the total. [2]
(ii) What formula was entered in cell B10 to calculate the biggest price? [1]
(c) What formula was entered in cell B11 to obtain number of devices? [1]
(d) In what order have ITEMS in the spreadsheet been entered? [1]
Page 29 ZEDLESSONS
2022
...
YE
AR
YE
R
Internal
2022 Internal
SECTION A
[20 MARKS]
Answer all questions. Mark your answers with a cross (x)
Instructions: on the Answer Grid provided in the answer Booklet.
3. Which of the following shows memory size from the highest to the lowest?
A. Bit Byte Kilobyte
B. Byte Bit Kilobyte
C. Kilobyte Bit Byte
D. Kilobyte Byte Bit
4. The text format for the number 2 used in the symbol H2O is called …
A. subtext.
B. subscript.
C. superscript.
D. supertext.
5. In computer based learning, which program allows learners to learn at their own speed?
A. Drill and practice program
B. Problem solving program
C. Simulation program
D. Tutorial program
Page 31 ZEDLESSONS
2022 Internal
SECTION A
6. A number used to open locked files or data stored on a computer is called …
A. coding identification number.
B. identification number opener.
C. personal identification number.
D. Tutorial program
9. Which part of the Central Processing Unit is used by the computer to compare two
numbers?
A. Arithmetic logic unit
B. Arithmetic comparison unit
C. Number logic unit
D. Number processing unit
Page 32 ZEDLESSONS
2022 Internal
SECTION A
11. … is the first page of a website.
A. Front page
B. Home page
C. Local page
D. Visited page
12. Which of the following is the last device that should be switched off when shutting down
a computer?
A. Keyboard
B. Monitor
C. Printer
D. System unit
13. How can a dollar sign be inserted in a text being typed? By pressing …
A. Shift + $
B. Del + $
C. Ctrl + $
D. Alt + $
15. How can back pains be prevented when using a computer for a long time? By using an
…
A. adjustable keyboard.
B. adjustable screen.
C. ergonomic chair.
D. ergonomic keyboard.
Page 33 ZEDLESSONS
2022 Internal
SECTION A
16. In an email account, a message awaiting to be sent is found in the …
A. draft folder.
B. inbox folder.
C. sent item folder.
D. spam folder.
18. The term used to refer to a network that connects computers between two towns is …
A. Local Area Network.
B. Metropolitan Area Network.
C. Personal Area Network.
D. Wide Area Network.
Page 34 ZEDLESSONS
2022 Internal
SECTION B
Answer all the questions in this section by using one word
Instructions: or a short phrase.
1. … is a type of memory which does not loss its content after switching a Computer
off. [1]
6. The two suitable printers for printing magazines and identity cards are … and … [2]
7. … prevents the computer from losing documents being used when electricity
8. A file deleted by mistake can be found in the … while a word deleted by mistake
9. … refers to working on more than one program at a time while … refers to a computer
that only allows one person at a time to have control of its resources.
11. In a spreadsheet, the formula used to find the average of marks in cells ranging
A3 to C3 is … [2]
Page 35 ZEDLESSONS
2022 Internal
SECTION B
12. … is a device used to convert a hard copy into a soft copy. [1]
14. A type of cybercrime where personal details are stolen is known as … [1]
15. A software that is loaded to enable the computer to work is the … [1]
Page 36 ZEDLESSONS
2022 Internal
SECTION C
There are five questions in this section. Answer all the
Instructions: questions.
(a) Name a device that is used to read information from the picture above. [1]
(b) State one piece of information obtained when the device you named in (a) reads
(c) Give two advantages of using the picture on products in a supermarket. [2]
(d) Explain how information is obtained from the picture when the device
Page 37 ZEDLESSONS
2022 Internal
SECTION C
3. (a) The following table shows common file extensions used in computers.
(c) State one reason why an old antivirus can not protect computer files. [1]
(d) Give one reason why it is important to keep backups in another place. [1]
(a) Name the type of user interface shown in the picture. [1]
(d) State two advantages a smartphone has over a desktop computer. [2]
Page 38 ZEDLESSONS
2022 Internal
SECTION C
5. The following table shows part of a spreadsheet used to keep track of the ages of
(a) Explain how records can be arranged in alphabetical order by surname. [2]
(b) State what comment will be displayed in cell E3 after entering the function
(c) What will be displayed if the function =B3 + C3 is entered in F3. [1]
(d) How can a new row be added between row 5 and row 6? [2]
Page 39 ZEDLESSONS
2022
...
YE
AR
YE
R
External
2022 External
SECTION A
[20 MARKS]
Answer all questions. Mark your answers with a cross (x)
Instructions: on the Answer Grid provided in the answer Booklet.
Page 41 ZEDLESSONS
2022 External
SECTION A
6. A type of network formed between a Bluetooth earpiece and a smartphone is a …
A. Local Area Network.
B. Metropolitan Area Network.
C. Personal Area Network.
D. Storage Area Network.
7. The keyboard shortcut that allows a user to undo the last command is …
A. Alt+shift+z.
B. Alt+z.
C. Control+Alt+z.
D. Control+z.
Page 42 ZEDLESSONS
2022 External
SECTION A
11. A software that is used to find information on the Internet is called a …
A. finder.
B. search engine.
C. web engine.
D. browser.
14. How can a user who spends a long time on a computer avoid a health risk? By …
A. playing music using headphones
B. regularly changing sitting positions
C. regularly backing up data
D. regularly changing the computer
15. In PowerPoint presentations, previewing and displaying of slides is done in the … view.
A. note page
B. outline
C. slide sorter
D. slide show
Page 43 ZEDLESSONS
2022 External
SECTION A
16. Computer actions such as calculations, changing of font colours and deleting of text
are examples of …
A. application.
B. elements.
C. processing.
D. publishing
18. Performing financial transactions such as money transfers using the Internet is called
…
A. e-ATM.
B. e-Banking.
C. e-Buying.
D. e-Deposit.
20. How are signals and information from a computer displayed for the user to see?
Through the …
A. keyboard.
B. monitor.
C. speaker.
D. viewer.
Page 44 ZEDLESSONS
2022 External
SECTION B
Answer all the questions in this section by using one word
Instructions: or a short phrase.
2. … is a type of repetitive strain injury caused by typing for a long time on a keyboard
and … is a danger posed by electrical wires that are not covered. [2]
3. … converts hardcopy into softcopy while … converts softcopy into hardcopy. [2]
4. A crime of harassing, mocking and insulting others using the internet is called … [1]
goods. [1]
6. The three elements of fonts used in desktop publishing are …, … and font size. [2]
9. How can a computer be protected from damage caused by electrical fire? By … [1]
11. Apart from item identification, the other use of a barcode is … [1]
15. A device that is used by artists to produce freehand drawings is called … [1]
Page 45 ZEDLESSONS
2022 External
SECTION C
There are six questions in this section.
Instructions: Answer all the questions.
1. The Covid-19 pandemic has caused schools to adopt the use of Information and
Communication Technologies (ICTs) in the learning and teaching process.
(a) What term describes the learning done using ICTs? [1]
(c) Give one way a teacher could give lessons using ICTs during the Covid-19
pandemic. [1]
2. Complete the following table by filling in the missing device names and uses.
Page 46 ZEDLESSONS
2022 External
SECTION C
3. USB is a common feature on many devices.
4. The following diagram shows an electronic pen fitted with several devices.
(a) Which part of the pen is for inserting a removable memory card? [1]
(b) State two ways data can be transferred from the pen to a desktop Computer. [2]
(c) What data will the microphone input to the pen? [1]
(d) Give one advantage of having a digital camera together with the microphone
(c) Mention one resource in an organisation that can be shared on a network. [1]
(d) What is meant by the term ‘Intranet’? [2]
Page 47 ZEDLESSONS
2021
...
YE
AR
YE
R
Internal
2021 Internal
SECTION A
[20 MARKS]
Answer all questions. Mark your answers with a cross (x)
Instructions: on the Answer Grid provided in the answer Booklet.
2. What mathematical operation is performed when a forward slash is placed between two
numeric values in a spreadsheet?
A. Addition
B. Division
C. Multiplication
D. subtraction
4. A gigabyte is equivalent to …
A. 1, 024 bytes.
B. 1, 024 kilobytes.
C. 1, 024 megabytes.
D. 1, 024 terabytes.
5. Which action is performed when the following keyboard keys are pressed together?
A. Copy
B. Cut
C. Paste
D. Undo CTRL V
Page 49 ZEDLESSONS
2021 Internal
SECTION A
6. How are files transferred from the computer to the internet? By …
A. downloading
B. saving
C. surfing
D. uploading
11. What feature do the letters I and M represent in the term WIMP?
A. Icons and Menus
B. Icons and Motherboard
C. Internet and Menus
D. Internet and Motherboard
Page 50 ZEDLESSONS
2021 Internal
SECTION A
12. Which of the following controls the processes in a washing machine?
A. Hard drive
B. Memory
C. Microchip
D. Spinner
13. The loss of human skills and the acquired knowledge to computer systems is Known
as …
A. computerizing.
B. deskilling.
C. job loss.
D. reskilling.
14. Which of the following application software uses the extension docx on saved files?
A. Microsoft Excel
B. Microsoft PowerPoint
C. Microsoft Publishing
D. Microsoft Word
15. The figure below shows part of a spreadsheet used to keep marks obtained by
students in a test.
Which of the following functions can be used to count the number of students using column
B?
A. =count(B2:B4)
B. =countA(B2:B4)
C. =countIFC(B2:B4)
D. =countSum(B2:B4)
Page 51 ZEDLESSONS
2021 Internal
SECTION A
16. A network between organisations that allow external users to have limited access to
their resources is called …
A. Extranet.
B. Intranet.
C. Local Area Network
D. Wide Area Network
19. The process of preparing a magnetic disk to be used for the first time is called …
A. coding.
B. decoding.
C. encoding.
D. formatting.
20. The resource of a private network can be protected from outside users using a …
A. firewall.
B. router.
C. server.
D. switch.
Page 52 ZEDLESSONS
2021 Internal
SECTION B
Answer all the questions in this section by using one word
Instructions: or a short phrase.
4. Escape (Esc) key on the keyboard allows a user to ………… an operation. [1]
5. The application software that models the cash coming in and going out of a
7. …… is a part of a smartphone that takes commands and displays the output. [1]
9. A ………… is a pattern of thick and thin lines which are scanned to quickly Identify
a product. [1]
10. The keyboard buttons ………… and ………… when pressed together is an
11. ………… are processed facts and figures that provide meaning to the user. [1]
12. A duplicate of an original file kept off-site for future reference is known As … [1]
Page 53 ZEDLESSONS
2021 Internal
SECTION B
13. ………… and ………… are examples of programmes that corrupt and destroy
14. A printer that produces images made up of several individual dots is ............, and
the type of printer that uses heat to transfer images from the Print head to
Page 54 ZEDLESSONS
2021 Internal
SECTION C
There are five questions in this section. Answer all the
Instructions: questions.
(b) Write a formula that can be used in cell D3 to calculate the cost of fuel used. [2]
(c) Explain the steps involved to replicate the formula in cell D3 through to D7. [2]
(a) Apart from a computer, name one hardware needed to connect to the Internet. [1]
(d) Explain why it is important to log out of a user account after using the Internet. [2]
Page 55 ZEDLESSONS
2021 Internal
SECTION C
3. A school uses a memory stick as a backup device to store Computer Studies assess-
ment projects.
(a) Name two other storage devices that the school could use to store
A microprocessor. [2]
(c) Explain how a computer can be used to monitor criminals or thieves. [2]
(a) Give one cause of electrocution that might occur in a Computer Laboratory. [1]
(b) Explain how electrocution can be prevented in a computer Laboratory. [2]
(c) State two general safety rules for a Computer Laboratory which learners
(d) Give one health problem that may result from using a fixed chair. [1]
Page 56 ZEDLESSONS
2021
...
YE
AR
YE
R
External
2021 External
SECTION A
[20 MARKS]
Answer all questions. Mark your answers with a cross (x)
Instructions: on the Answer Grid provided in the answer Booklet.
1. A monitor is an example of …
A. hardware.
B. shareware.
C. spyware.
D. software
5. What device is used to transmit data and pictures over a telephone line?
A. Data pic
B. Digitizer
C. Facsimile
D. Scanner
Page 58 ZEDLESSONS
2021 External
SECTION A
6. A device used to print out drawings of building plans is …
A. an actuator
B. a motor
C. a plotter
D. a robot
7. Which of the following is not an advantage of Electronic Fund Transfer at Point of Sale
(EFTPOS)?
A. Easy to change currency when abroad
B. High cost of setting up the system
C. Payment is guaranteed as long as transaction is Successful
D. Reduced theft of cash
8. Which feature in a presentation software allows a user to view all slides on one screen?
Slide … view.
A. master
B. outline
C. show
D. sorter
10. A device which changes analogue telephone signals into digital data is a …
A. modem.
B. ROM chip.
C. RAM chip.
D. sender.
Page 59 ZEDLESSONS
2021 External
SECTION A
11. How can a user send data from a word Processing document to a spreadsheet docu-
ment? By …
A. downloading.
B. exporting.
C. importing.
D. sending.
13. The following figure shows different devices connected together to form a network at
Mr Chakupopa’s home.
14. A text, picture or graphic button used to move from a current webpage to another
webpage when clicked is called …
A. home page.
B. hyperlink.
C. search engine.
D. web browser.
Page 60 ZEDLESSONS
2021 External
SECTION A
15. Which input device is not suitable for the physically disabled users?
A. Braille keyboard
B. Eye typer
C. Foot mouse
D. QWERTY keyboard
16. … is software that can be acquired without paying for its licence and can be used for a
specified period of time.
A. Adware
B. Freeware
C. Malware
D. Shareware
18. When a document is saved without specifying its file destination, it goes to …
A. local disk
B. my document
C. my computer
D. recycle bin
Page 61 ZEDLESSONS
2021 External
SECTION A
20. How would a picture size be changed to fit the available space in a document?
By …
Page 62 ZEDLESSONS
2021 External
SECTION B
Answer all the questions in this section by using one word
Instructions: or a short phrase.
3. The blank space outside the printing area on a page of a document is called ……
While the appearance of a document before printing is checked in the print … [2]
4. The slide view that displays one slide at a time with presenters’ notes is called … [1]
10. The part of a computer that temporarily stores data is … while the … stores
11. In a spreadsheet, the function that gives the highest value if data in a range of
cells is … and the function that produces the lowest value is … [2]
[1]
Page 63 ZEDLESSONS
2021 External
SECTION B
13. … is a crime committed using the internet. [1]
14. Apart from a username, a … is used to log into a social media account. [1]
15. The method of accessing computer files without permission is known as … and
Page 64 ZEDLESSONS
2021 External
SECTION C
There are five questions in this section. Answer all the
Instructions: questions.
1. Study the picture of an application below and answer the questions that follow.
(b) State the tab in the picture that must be clicked to open the print preview option. [1]
(c) Which feature or tool shown in the picture must be selected to copy the Attributes
(d) Explain the purpose of the tool Aa shown in the part labelled C. [2]
2. (a) Name one device other than a laptop that can be used to send electronic mail. [1]
(b) What feature is used to send an email to several recipients at once? [1]
(c) Apart from sending emails, state two ways of communicating electronically using
Page 65 ZEDLESSONS
2021 External
SECTION C
3.
(b) Give two reasons why open source software is becoming popular for use in
computers. [2]
4.
(b) State one cause of data or information loss apart from being corrupted by a virus. [1]
(d) Give two ways in which a document being typed can be protected from accidental
loss. [2]
Page 66 ZEDLESSONS
2021 External
SECTION C
5. The following picture shows a digital camera. Study it and answer the questions that
follow.
(a) Name the part of the digital camera used to capture audio data. [1]
(c) Name the part of the digital camera that stores images. [1]
(d) How can images on the digital camera be transferred to a laptop Computer? [2]
Page 67 ZEDLESSONS
2020
...
YE
AR
YE
R
Internal
2020 Internal
SECTION A
[20 MARKS]
Answer all questions. Mark your answers with a cross (x)
Instructions: on the Answer Grid provided in the answer Booklet.
Page 69 ZEDLESSONS
2020 Internal
SECTION A
6. All can be regarded as text except ............
A. punctuation marks
B. sentences
C. words
D. watermark
8. Which of the following represents the correct sequence of flow of data in a computer?
A. input, output, process
B. input, output, save
C. input, process, output
D. output, process, save
Page 70 ZEDLESSONS
2020 Internal
SECTION A
11. To calculate the number of items in a row or column in Excel, the function used is?
A. COUNT
B. MAX
C. MIN
D. SUM
12. A type of barcode when scanned take a user to an image video or website is called
…………
A. Barcode
B. Hot spot
C. QR code
D. Wi-Fi code
13. In a word processor, if you type the first four letter of a word e.g. AUGU followed by
pressing the Enter key you obtain the word AUGUST. Such a feature is known as …………
A. Auto complete
B. Auto correct
C. Auto summarise
D. Auto Text.
14. The shortcut method to rum a PowerPoint presentation using the keyboard is by
pressing the keys
A. Fn + F2
B. Fn + F3
C. Fn + F4
D. Fn + F5
Page 71 ZEDLESSONS
2020 Internal
SECTION A
16. The process of producing high quality printed leaflets, magazines or calendars is
called …
A. Desktop printing
B. Desktop publishing
C. Document publishing
D. Front office publishing
17. Which of the following set of items satisfies construction of a network in a school
computer room?
A. NIC, UTP-cable, computer and server
B. NIC, UTP-cable, computer and switch
C. NIC, UTP-cable, ISP and computers
D. NIC, UTP-cable, ISP and server
18. To take a screen-short of the entire screen content, a user should press ... on the
keyboard.
A. Ctrl + A
B. Ctrl + A + Prtscr
C. Ctrl + Prtscr
D. Ctrl + Prtscr + A
19. During the copy and paste process, the items are stored in the …………
A. Clip Art
B. Clip Board
C. Smart Art
D. Word Art
Page 72 ZEDLESSONS
2020 Internal
SECTION B
Answer all the questions in this section by using one word
Instructions: or a short phrase.
4. The parts of a mail box of an email system include spam, ………… and ………… [2]
8. The general term for business done using the internet is …………. [1]
10. The two types of Desktop Publisher (DTP) frames for entering information are
………… and ………… [2]
Page 73 ZEDLESSONS
2020 Internal
SECTION C
There are five questions in this section. Answer all the
Instructions: questions.
1. Study the storage media devices shown below and answer the questions that follow.
(b) Use letters A, B, and C to arrange the above devices in decreasing order of
2. Study the diagram below of a spreadsheet extracted which shows two separate
Page 74 ZEDLESSONS
2020 Internal
SECTION C
a) Explain how you can highlight the separate ranges of data. [2]
(b) How can you move highlighted content in (a) above to Column D? [2]
(c) The current sheet is saved as Expenses, explain how to rename it as income. [2]
3. Part of a network at Kalenbela School is shown below. Study it and use it to answer
the questions that follow.
Page 75 ZEDLESSONS
2020 Internal
SECTION C
4. The diagram below represents the main parts of a computer system. Use it to answer the
questions that follow.
(b) On the diagram above, use arrows to indicate the direction of how data flows in
a computer. [2]
(a) Name two things required for him to be connected to enable e-learning and
(b) State two things which Lemelelo should guard against once on the internet. [2]
(c) How should Lemelelo protect himself from the concerns in (b) above? [2]
Page 76 ZEDLESSONS
2020
...
YE
AR
YE
R
External
2020 External
SECTION A
[15 MARKS]
Answer all questions. Mark your answers with a cross (x)
Instructions: on the Answer Grid provided in the answer Booklet.
5. What kind of software is used to create flyers, magazines and business cards?
A. Database publisher
B. Desktop publisher
C. Presentation
D. Spreadsheet
Page 78 ZEDLESSONS
2020 External
SECTION A
6. The following are reasons of networking computers except …
A. easy communication
B. easy virus distribution
C. sharing of files and software
D. sharing of peripheral hardware
10. What term is given to a local area network which is private to a company but
information is accessed the same way as on the internet?
A. Extranet
B. Globalnet
C. Internet
D. Intranet
Page 79 ZEDLESSONS
2020 External
SECTION A
11. Which of the following is a correct format of an E-mail address?
A. @john.mushiwandi.com
B. com.john@mushiwandi
C. [email protected]
D. [email protected]
13. The difference between a personal identification number (PIN) and a password is …
A. PIN consists of letters while password consists of numbers and special characters.
B. PIN consists of special characters while password consists of numbers and letters.
C. PIN consists of numbers while password consists of letters and special characters.
D. PIN consists of numbers and letters while password consists of special characters.
15. ………… is a programme that is used to prevent data from being corrupted and lost.
A. Anti-theft
B. Anti-virus
C. Spyware
D. Spam
Page 80 ZEDLESSONS
2020 External
SECTION B
Answer all the questions in this section by using one word
Instructions: or a short phrase.
3. The moving of selected text from its location in a word document to another
Known as … [1]
5. The identity given to a user on a computer is … and the locking code or key for
7. The two examples of point and click input devices are … and … [2]
10. … are lines of varying thickness found on items sold in a supermarket. [1]
Page 81 ZEDLESSONS
2020 External
SECTION B
11. A person who gains unauthorised access to a computer is knowns as … while
12. Companies that provide internet access to users are called … [1]
15. The Graphical User Interface is made up of ……, Icons, ……, Pointer. [2]
Page 82 ZEDLESSONS
2020 External
SECTION C
There are four questions in this section. Answer all the
Instructions: questions.
1.
(c) Explain what happens to the text insertion point when part C is presses twice. [2]
(d) What health problem can be caused by using the above input device for long
(b) State one advantage and one disadvantage of using a wireless network. [2]
(c) Mention one hardware equipment needed for Weluzani’s computer to have a
(d) Give two methods the school can use to prevent unauthorised access to it’s
Page 83 ZEDLESSONS
2020 External
SECTION C
3. Mobile phones such as Smart phones are common computing devices now.
(a) State two operations done by a mobile phone which a computer can also do. [2]
(b) Give two other computing devices apart from a computer and a Smart phone. [2]
(c) Give two ways a computer can be used to change data into information. [2]
(d) State two ways a computer can be used at a police station. [2]
4. The diagram below shows the layout of an application software as seen in normal view.
(a) What is the name of the application software which as the layout shown above? [1]
(c) Mention one example of data that can be inserted in part C apart from text. [1]
(d) Write down two tasks that can be done using this application software. [2]
Page 84 ZEDLESSONS
2019
...
YE
AR
YE
R
Internal
2019 Internal
SECTION A
[15 MARKS]
Answer all questions. Mark your answers with a cross (x)
Instructions: on the Answer Grid provided in the answer Booklet.
Page 86 ZEDLESSONS
2019 Internal
SECTION A
6. By increasing font size, which of the following is affected?
A. Colour
B. Picture
C. Sound
D. Text
Page 87 ZEDLESSONS
2019 Internal
SECTION A
11. The term that refers to the methods and equipment used to gather, process,
communicate and store information is …
A. computer processing.
B. information networks.
C. information technology.
D. networked computers.
Page 88 ZEDLESSONS
2019 Internal
SECTION B
Answer all the questions in this section by using one word
Instructions: or a short phrase.
1. The part of the central processing unit where calculations are performed and logical
comparisons made is the … [1]
5. … software controls the operations of the computer and … software performs user
6. A … is a program that enables users to navigate the world wide web. [1]
8. … is memory held on a chip that can have its contents changes by the user. [1]
9. Video output on a smart phone is seen on its … while audio output is obtained
Page 89 ZEDLESSONS
2019 Internal
SECTION B
11. In a spreadsheet, the symbol used for division is … whereas the symbol for
multiplication is … [2]
14. A … device is any piece of hardware that is connected to the system unit. [1]
15. Computers use only two digits to process data and these are … and … [2]
Page 90 ZEDLESSONS
2019 Internal
SECTION C
There are four questions in this section. Answer all the
Instructions: questions.
1. Study the picture below and answer the questions that follow.
2. The picture below shows a card used in transaction system. Study it and answer the
questions that follow.
Page 91 ZEDLESSONS
2019 Internal
SECTION C
(a) Name this card. [1]
(b) Give one item of data that should be entered in the system in order to use the
(d) E-commerce is now accepted by many users. What is meant by E-commerce? [1]
(e) State two advantages of using the above card when making transactions. [2]
(f) Give one situation where the card would fail to make transactions go through. [1]
3. Study the diagram below and answer the questions that follow.
(a) Show the direction of data movement by putting arrows on lines C, D and E. [3]
(b) Add another input device and another output device in boxes A and B. [2]
Page 92 ZEDLESSONS
2019 Internal
SECTION C
4. (a) Explain the meaning of the term LAN. [1]
(d) Name a device that changes digital data into analogue Signals and analogue
Page 93 ZEDLESSONS
2018
...
YE
AR
YE
R
Internal
2018 Internal
SECTION A
[15 MARKS]
Answer all questions. Mark your answers with a cross (x)
Instructions: on the Answer Grid provided in the answer Booklet.
2. Which of the following is used to insert a drawing done by a user into a word document?
A. Chart
B. ClipArt
C. Picture
D. WordArt
Page 95 ZEDLESSONS
2018 Internal
SECTION A
6. A computer virus is a …
A. Copyright
B. Hardware
C. Liveware
D. Software
8. The legal agreement between the software maker and the user of the software is
called?
A. Copyright Licence Agreement
B. Data Integrity
C. End-User Licence Agreement
D. Software Product
Page 96 ZEDLESSONS
2018 Internal
SECTION A
11. Importing involves …
A. Cutting
B. Moving
C. Scanning
D. Uploading
12. How can backache be prevented when using the computer for a long time? By adjust-
ing …
A. Chair to suit user height
B. Chair to suit user wrist
C. User height to suit chair
D. User wrist to suit chair
13. Which Key can move the cursor backwards without deleting text in a document?
A. Backspace
B. Down Arrow Key
C. Enter
D. Left Arrow Key
14. Computer networks that are connected between distant towns are called …
A. LANs
B. MANs
C. WANs
D. Wi-Fi
Page 97 ZEDLESSONS
2018 Internal
SECTION B
Answer all the questions in this section by using one word
Instructions: or a short phrase.
1. The only time the cursor moves from right to left is when text is … aligned. [1]
2. A … and a … can both be used to capture images in a document being typed. [2]
… and … [3]
7. The … printer produces output by spraying smaller drops of ink on paper. [1]
9. An … is an electronic form of a letter sent from one user to another using the … [2]
10. … is making use of many media such as text, images, sound, animation
11. What term is used to adding motion to graphics on a computer slide presentation? [1]
12. … is the keeping of computer files for future reference in case of loss of original
file. [1]
13. The … key is used to start a new line in a word document. [1]
14. Unauthorised use of an ICT system with a view to change data is called? [1]
Page 98 ZEDLESSONS
2018 Internal
SECTION C
There are four questions in this section. Answer all the
Instructions: questions.
1. Study the picture of the interface below and answer the questions that follow.
(a) Give the name of the user interface shown above. [1]
(d) From the diagram, which icon can be double clicked to open the internet? [1]
Page 99 ZEDLESSONS
2018 Internal
SECTION C
(a) Apart from device C and D, name two other devices not shown in the figure Which
(b) Give one device from the diagram that can be useful for a person who is physically
disabled. [1]
(c) State the part on the diagram where inspecting of data entered takes place. [1]
(d) On a smart phone, the functions of device care are done by … [1]
(e) Write down two advantages of using laptops rather than desktop computers. [2]
(b) Give the cell reference for the part labelled B. [1]
(c) State two uses of this application in our day to day life. [2]
(b) State two health problems associated with using computers apart from backaches.[2]
(c) Explain two ways or methods that can be used to protect information on computers
in schools. [2]
...
YE
AR
YE
R
Internal
2017 Internal
SECTION A
[15 MARKS]
Answer all questions. Mark your answers with a cross (x)
Instructions: on the Answer Grid provided in the answer Booklet.
3. Sitwala lost two documents he had saved on the computer and could not find them in
the recycle bin either. This could have been caused by …
A. Backspace
B. Delete key
C. Undo command
D. Virus action
5. Mainframe computers allow several users to work at the same time. This is referred to
as …
A. Multi-tasking
B. Multi-user
C. Collaboration
D. cooperation
11. Scrolling is …
A. Clicking the mouse on an icon
B. Dragging the mouse on desktop
C. Moving an icon from one place to another
D. Using the mouse to move through a document
12. The instruction “Divide the sum of B2 and B3 by the contents of B1” can be entered in a
spreadsheet as …
A. = (B1/B2+B3
B. = B2+B3/B1
C. = (B2+B3)/B1
D. = B1/(B2+B3)
13. Which of the following devices can a user get to read an E-book?
A. DVD
B. Flash disk
C. Printer
D. Tablet
15. To prevent unauthorised users on the network, users are always required to …
A. Cold boot
B. Log on
C. Reboot
D. Connect
referred to as … [1]
called … [1]
7. If you delete a word in a document by mistake, you can use the … to put it back. [1]
9. An example of keys which occur twice on the keyboard are … and … [2]
11. … screens are sometimes used as input devices for multimedia systems. [1]
13. If a password is entered wrongly three times the computer will … [1]
known as … [1]
1. Study the diagram below and answer the questions that follow.
(c) Give the requirement needed for one to access this network. [1]
(d) Give one place where this type of network can be used. [1]
2. Study the picture of an application shown below and answer the questions that follow.
(d) Name the feature of a word processor which saves work at regular intervals. [1]
(d) What is the term used to refer to two successive clicks of part A? [1]
(e) Why do users prefer using the mouse other than a keyboard in a Graphical User
Interface? [2]
4. Mwandamando runs an NGO that takes care of street Kids. The NGO has agents who
capture information about the street kids.
(b) List one hardware device and a software that can be used to present a report about
the street kids to an audience. [2]
...
YE
AR
YE
R
Internal
2016 Internal
SECTION A
[15 MARKS]
Answer all questions. Mark your answers with a cross (x)
Instructions: on the Answer Grid provided in the answer Booklet.
1. Which of the following statement best describes what a computer program is?
A. The input stage of computing that gets data needed.
B. The step by step instructions that tell the computer what to do.
C. The step by step user manual on how to operate the computer.
D. The output stage of computing that outputs data needed.
2. Data are …
A. letters entered into the computer.
B. numbers entered into the computer.
C. unprocessed facts entered into the computer.
D. processed facts obtained from the computer.
3. Which Key on a computer keyboard can be used to delete text in a word document?
A. Alt
B. Backspace
C. Esc
D. Shift
5. Which of the following ports are suitable for connecting a USB printer?
A. Serial port
B. Parallel port
C. Universal Serial Bus port
D. Universal Sequence Backup Port
9. Which of the following is a network of computers that are found in one building?
A. LAN
B. PAN
C. SAN
D. WAN
12. Formatting a disk results in all the data being erased from the …
A. storage media.
B. screen.
C. keyboard.
D. printer.
13. Which of the following software will be loaded first to the memory when the computer is
switched on?
A. Spreadsheet software
B. Word processing software
C. Operating system software
D. Presentation software
14. The type of computer which allows a user to input, edit and output audio is …
A. multi media computer.
B. multi audio computer.
C. music computer.
D. speaker computer.
15. What is the best way to prevent data loss on the computer?
A. Use a bigger computer
B. Not to use laptops
C. Backup the printer
D. Backup the data
5. The margin in a document determines how much … is left between the edge of
6. A … is a malicious program that copies itself and destroys computer files. [1]
9. To use a computer network, a user must first log on by entering the user ID and … [1]
10. Cameras that do not require film and can transfer images and video into the
12. … allows users to find a website even if they do not Know the Universal Resource
Locator (URL) [2]
15. A program stored in … of the computer directs the computer to start up each time
1. The diagram below shows the four basic actions of the computer to produce
information.
(a) State one device that can be used at stage 3 and one that can be used at stage 4. [2]
(b) Name stage 1 and stage 3. [2]
2. The pictures below show different hardware devices found on a computer network.
[email protected]
A B
(a) Name parts A and B. [2]
(b) If pjbanda receives an email message from his friend, what is the name of the
(c) Give two reasons why it is not advisable to open emails from unknownsources. [2]
(d) Give two reasons why users prefer to send e-mails instead of letters. [2]
4. Beenzu and Niza have been playing a video game all day on the computer using
a keyboard.
(a) State one health problem that Beenzu and Niza may face due to the continuous
(b) Give one way of preventing the health problem you stated in (a). [1]
(c) Give one input device that can be used to play the video game instead of the
keyboard. [1]
(d) Give one disadvantage of playing computer games apart from health related
problems. [1]
WINKEY SHORTCUTS
application (app) A piece of software designed to biometric data Any biological information – such
achieve a particular purpose. as a person’s height or weight.
application programming interface (API) bit The basic unit of information in the binary sys-
An API is a set of functions that accesses the features tem, a bit is a single 0 or 1. Eight bits make up one
of data of an operating system, application, or other byte.
service.
Boolean logic A branch of mathematics that has
array A collection of similar elements with a spe- two values, 0 and 1. Also called Boolean algebra.
cific order.
bug A software error in code.
artificial intelligence (AI) A type of intelli-
gence that is demonstrated by computers. Cascading Style Sheets (CSS) A programming
language that describes how to display HTML ele-
ASCII Short for American Standard Code for Infor- ments in a web browser.
mation Interchange. ASCII is a character-encoding
standard for electronic communication. central processing unit (CPU) The part of
a computer that controls most of its operations. It
assembler A program that translates assembly consists of the control unit (CU), which carries out
language (a low-level programming language) into instructions, and the arithmetic logic unit (ALU),
machine code. which performs calculations. The CPU is also known
as the microprocessor.
augmented reality A view of a physical, real-
world environment that has been enhanced with cloud A term used for specialized computers that
virtual ele provide services through the internet, such as storing
ments. files.
code Instructions written in a programming lan-
augmented virtuality A view of a mostly virtual guage that tell a computer to do something.
environment that has been enhanced with re-
al-world elements. compiler A program that converts an entire pro-
gram into an OS-specific file in one go.
bandwidth The amount of data that can flow into a
network. compression Reducing the size of a file in order to
make it easier to share or store. Lossless compression
big data A huge amount of data, such as that col- keeps the original information intact; lossy compres-
lected by internetconnected smart devices. sion results in some loss of information.
dark web The most restricted part of the internet, file A resource for storing information on a comput-
viewable only by using a special web browser. er.
firmware A type of program that is embedded into a
data Information that is processed or stored by a device’s CPU and controls how the device works.
computer.
function A mathematical formula that takes input
database A program that lets people store and data and acts upon it to produce output data. Func-
search data effectively. tions are made up of variables, constants, and arrays.
debugging The process of finding and fixing bugs geek An informal term for someone who is obses-
(errors) in programs. sive about a certain topic, or group of related topics.
decomposition The process of breaking a prob- hacking Any act that makes a piece of technology
lem down into smaller sub-problems. do something it wasn’t intended to do.
decryption The process of using a cipher and a key Hackers can be grouped into white, grey, and black
to reveal the meaning of encrypted text. hat hackers, depending on their intentions.
heuristic Any approach to problemsolving or machine code Instructions that a computer can
learning that uses a quick and simple approach as understand and uses to send instructions to the com-
opposed to a thorough one. A “rule of thumb” is an puter’s hardware.
example of a heuristic.
machine learning The branch of computer sci-
hub The central part of a network, through which ence that gives a computer the ability to learn to do
information flows into and out of the network. something with data, rather than explicitly program-
ming it.
Hypertext Markup Language (HTML) A pro-
gramming language for creating webpages and web malware Malicious software that gains illegal access
applications. HTML is divided into elements called to a computer or system. Malware includes worms,
tags, semantics, and attributes that each hold a specif- viruses, spyware, trojans, rootkits, ransomware, back-
ic type of information. doors, and hybrid threats.
Hypertext Transfer Protocol (HTTP) The microprocessor Another name for the central
data transfer protocol used on the world wide web. processing unit (CPU).
imperative language A programming language motherboard The main circuit board of a com-
that operates as a series of commands that are execut- puter, which holds the CPU, memory, and connectors
ed one by one. for the hard drive and optical drives, among oth-
er connections. The motherboard allows hardware
input Any information that is put in, taken in, or components of a computer to communicate with each
operated on by a process or system. other.
internet A massive global network of created from net neutrality The principle that governments or
connections between billions of computers. ISPs should not block, discriminate, or charge users
differently to access the internet.
Internet of Things The name given to the
network of interconnected devices with embedded network A group of connected devices that can
computers. share resources and data. Networks can be classified
by size or topology (layout).
interpreter A program that translates and exe-
cutes the source code of another computer program node Any device that sends or receives data through
one line at a time. a network.
pattern recognition The process of seeing repe- relational database The most common type
tition in a predictable manner. Pattern recognition is of database, where information is stored in tables.
an important part of computational thinking. The tables are made up of rows, called records, and
columns, called fields.
peripheral Any piece of hardware that allows users
to interact with a computer. resolution A measure of the amount of informa-
tion in a computer file, such as an image.
photoresist A substance that is used in the manu-
facture of computer chips that protects parts of a chip routing The process of finding the shortest path
in development from being eroded by the manufac- between two devices across the internet.
turing process.
search engine A program that looks through the
pixel Short for picture element. A tiny area of illu- world wide web for webpages containing particular
mination on a computer display screen, one of many words or phrases inputted by the user.
from which an image is composed.
server A computer program or device that re-
programming The process of giving instructions sponds to requests across a computer network to
to a computer. provide a network or data service.
protocol A set of rules that governs the transmis- software The operating system, programs, and
sion of data between devices; for example, Hypertext firmware that allow a user to access a computer’s
Transfer Protocol, which is used for visiting websites. hardware.
translation The process of converting one pro- virtual reality A computer-generated 3D image
gramming language into another. Translation usually or environment that can be interacted with in a
refers to breaking a high-level language down into a seemingly real way.
low-level language.
viruses Tiny pieces of code that attach themselves
Transmission Control Protocol / Internet Proto- to pre-existing files before replicating themselves. Vi-
col (TCP/IP) A set of rules that governs the connec- ruses corrupt data and slow down operating systems.
tion of computer systems to the internet.
visual language A programming language that is
troubleshooting The process of fixing common based on blocks of code instructions that the pro-
problems that arise when using computer hardware grammer fits together. Visual languages are ideal for
or software. children or people new to programming.
truth tables A diagram of inputs and outputs of a visualization The process of turning information,
logic gate or circuit. In a truth table, the binary value such as a coordinates or a big dataset, into a model,
1 equals the logical value TRUE, and the binary value graphs, or images.
0 equals FALSE.
website A collection of webpages.
Turing test A test outlined by English mathema-
tician Alan Turing that centres on the ability of an webpage A single destination on the world wide
evaluator to assess whether any particular machine web.
can be said to be intelligent.
Wi-Fi A facility allowing computers to connect to the
unicode The single worldwide standard for encod- internet or communicate with each other wirelessly
ing characters used in electronic communication. in a particular area.
Unicode is much larger than ASCII.
world wide web An information system that runs
Uniform Resource Locator (URL) Also on the internet that allows webpages to be connected
known a web address, URL is a standardized system to other webpages by hypertext links.
for locating and identifying content on the world
wide web.
Make sure to Look out for the next Edition by following us on our social
media platforms.
All that i can hope for, is to see this book help Students, Parents, Teachers,
and individuals everywhere . I hope to continue making more learning
material like this in the future.