Computing Term 3
Computing Term 3
1. In this topology, the computers are connected to 11. This computer depends on the server computer for
each other in a round (circle) shape each and every resource
(a) Ring (b) Bus (c) Star (d) None of these (a) Client (b) Server (c) IBM (d) Macintosh
2. Host computer is the other name 12. There are two (2) scroll bars in a word document
(a) Client (b) Server (c) IBM (d) Macintosh ……… and ………..
(a) Horizontal , Vertical (b) Left , Right (c)
3. This computer depends on the server computer for Upper bar , Lower bar (d) none of these
each and every resource
(a) Client (b) Server (c) IBM (d) Macintosh 13. The …….’’View’’ shows the document as it will look
when it is printed.
4. A flexible metal or fibre-optic wire that is sued (a) Print out (b) Draft (c) Outline (d) full size
connect computers and other devices in the
network. 14. Below the ruler, the large area is called the ……
(a) Connectors (b) Cables (c) NIC cards (d) (a) Task area (b) Open area (c) Close area
Internet (d) All of these
5. This network connects the computers and the 15. The temporary files downloaded by programs are
devices in a limited geographical area such as known as ………
home, school, etc. (a) Little files (b) Cache files (c) Cash files
(a) LAN (b) WAN (c) WLAN (d) MAN (d) Non-permanent files
16. Which of the following is an example of solid-state
6. This network includes one or more LAN’s but device?
covers a small geographic area as compared to (a) Compact disc (b) Flash drive (c) Diskette
WAN. (d) Zip disk
(a) LAN (b) WAN (c) WLAN (d) MAN
17. An example of application software is
7. This network is used to connect the computers at a (a) MacOS (b) Windows XP (c) Chrome (d)
very far distance say globally. Linux
(a) LAN (b) WAN (c) WLAN (d) MAN
18. The start menu button can be located on the
8. The structure of the computers that are connected ……….
to each other in a network. (a) Title bar (b) Task bar (c) Still bar (d) Menu
(a) Topology (b) Maps (c) Graphs (d) bar
Routes
19. All other parts connected externally to a computer
9. In this topology, the computers are connected to are called…..
each other in a round (circle) shape (a) software (b) flash drives (c) external (d)
(a) Ring (b) Bus (c) Star (d) None of these peripherals
10. Host computer is the other name 20. A word processing application is used for creating a
(a) Client (b) Server (c) IBM (d) Macintosh …….
(a) document (b) wallpaper (c) folder (d) new
folder
21. A ……. Store data permanently. 31. ……… means reading through your document
(a) mouse pad (b) RAM (c) cable (d) hard disk carefully while for errors.
(a) Read through (b) Scanning (c) Screening
22. Which of the following ICT items shows the (d) Proofing
desktop?
(a) Monitor (b) keyboard (c) RAM (d) ROM
32. …….. is the vertical portion of the cell on a
worksheet and it is represented by letters.
23. Which computer peripheral magnifies the desktop
on a wider surface? (a) Row (b) Column (c) Cell (d) Name Box
(a) touchscreen (b) mouse (c) plotter (d)
projector 33. ……. is the horizontal portion of the cell on a
worksheet and it is represented by number.
24. Which of the devices below out put sound in the (a) Name Box (b) Column (c) Cell (d) Row
form of sound? 34. ……. refers to the electronic page in a work book
(a) antenna (b) PSU (c) ALU (d) speaker made of cells.
(a) Worksheet (b) Workpads (c) Worknote
25. The CPU has …… components. (d) Workbook
(a) 4 (b) 3 (c) 2 (d) 5
35. The process of opening an application program on
26. …… is the secret code that prevents unauthorized
a computer is called?
people from accessing an account or device.
(a) pin code (b) secret code (c) password (d) (a) Starting (b) Lunching (c) Launching (d)
privacy Restoring
27. …… is a command button used to display the 36. The Find command is used to search a given word
compose window. in a document.
(a) write (b) write button (c) compose button (a) True (b) False
(d) compose
37. One of the functions of the Insert Tab is to help us
28. …….is a command button used to add additional add pictures to a word document.
file from a storage location to e-mail message. (a) True (b) False
(a) insert file (b) add file (c) attach file (d)
include file
38. The function of the Thesaurus tool helps us to
check spelling mistakes in a word document.
29. A collection of several applications that are bundled
(a) True (b) False
together and sold or distributed as a package is
called?
39. The Home Tab in MS Word is located on the
(a) Software Collections (b) Application Suite
Ribbon.
(c) Software Application (d) Software Suite
(a) True (b) False
30. …….refers to a piece of information in a given cell
40. The Find, Replace and Select is located in
which are usually raw numbers or dates.
paragraph group on the Ribbon.
(a) Formula (b) Values (c) Labels (d)
(a) True (b) False
Range
SECTION B
Answer all questions
1. What is social media? (2 marks)
……………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………….
2. What is social networking site? (2 marks)
……………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………
3. How many classifications of social media network do we have? List them. (5 marks)
……………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………….
4. What is electronic mail? (2 marks)
……………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………
5. What is the meaning of the abbreviation ‘Bcc’. State is function. (5 marks)
……………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………….
6. What is the meaning of the abbreviation ‘Cc’. State its function. (5 marks)
……………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………
7. (10 marks)
Application Name File Extension
Microsoft Word
.txt
WordPad
.html
Microsoft Excel
8. List two (2) application uses of robotics under industries and manufacturing. (2 marks)
……………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………….
9. List two (2) application uses of robotics under health. (2 marks)
……………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………….
10. List the four (4) application uses of robotics. (8 marks)
……………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………
11. What is information security? (3 marks)
……………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………
12. List the three (3) principles of information security. (6 marks)
……………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………….
13. List four (4) open learning websites. (8 marks)
……………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………