0% found this document useful (0 votes)
21 views5 pages

2023 2024 Holiday Assignment For Yr 9

The document contains a 20 question multiple choice quiz about topics related to cyber security, file types, computer viruses, and Excel functions. The quiz covers topics such as corporate identity, variable assignment, image file extensions, audio compression formats, zip file extensions, opening different file types, hard drive storage capacity, computer virus characteristics and types, firewalls, anti-virus software, and creating charts and using functions in Excel.

Uploaded by

babygrirl2011
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views5 pages

2023 2024 Holiday Assignment For Yr 9

The document contains a 20 question multiple choice quiz about topics related to cyber security, file types, computer viruses, and Excel functions. The quiz covers topics such as corporate identity, variable assignment, image file extensions, audio compression formats, zip file extensions, opening different file types, hard drive storage capacity, computer virus characteristics and types, firewalls, anti-virus software, and creating charts and using functions in Excel.

Uploaded by

babygrirl2011
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

2023_2024 HOLIDAY ASSIGNMENT FOR YR 9

(Multiple choice)

1. Which of the following can be found in corporate identity?


A. mascot B. header C. footer
D. content

2. An Assignment statement is used to,


A. assign value to a variable
B. assign value to an operator
C. assign value to an operand
D. create a variable

3. _________ is file type for document converted to image format


A. .gif B. .png C. .rtf D. .pdf

4. A looseless compression without the loss of image quality is represented by ___________


extension
A. .gif B. .png C. .rtf D. .pdf

5. A compressed file format for storing audio files is ____________


A. .mp3 B. .png C. .mpg D. .pdf

6. A file extension for compressing file or image to be sent through email is ________
A. .int B. .ent C. .zip D. .pdf

7. Which of the following can not be use to open a .rtf file extension?
A. Spreadsheet database B. Ms Powerpoint
C. Ms Word D. Notepad

8. Which of the following can be use to open a .csv file extension?


A. Spreadsheet database B. Ms Powerpoint
C. Ms Word D. Notepad

9. The property of a disk that determines the amount of data it may contain is
A. size B. volume C. storage capacity D. storage power

10. Which of the following items best describes the term HARDCOPY?
A. Print out B. Written on a hard board
C. Information stored on a hard disk D. Amount of data

11. A virus can best be described as a program that


A. Spreads across the computer B. hacks the computer
C. manages computer hardware D. corrupts data stored on files

12. Which of the following is not an example of a virus


A. Logic bomb B. Alabama virus C. Christmas virus D. Executable virus

13. The sources of virus does not include


A. Infected diskette B. Infected Cd ROM C. E:mails D. https downloading from internet

14. Which of the following is a non destructive virus?


A. Massive destructive B. Partial Destructive virus
C. Selective destructive virus ails D. Annoyance virus

15. A type of virus that falls character on the screen is


A. Massive destructive B. Random havoc virus
C. Selective destructive virus ails D. Annoyance virus

16.A destructive virus type that changes keystroke is


A. Massive destructive B. Random havoc virus
C. Selective destructive virus ails D. Annoyance virus

17. A firewall is a or an
A. software that set virus on fire B. software that blocks virus from entering
the system
C. antivirus D. scans and protect the system from virus

18. A system that could not run when the power button is pressed is most likely to infected by
A. power executable virus B. post virus C. boot sector
D. executable virus

19. Which of the following is not an anti-virus?


A. Penicillin B. AVG C. Dr. Solomon D. sleeper

20. When a virus is isolated, then it is said to be


A. deleted B. killed C. sent to recycle bin D. quarantined
QUESTION 1

Describe cyber security


______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________

[2 marks]

c. Describe THREE ways to prevent cyber-attacks


________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
[3 marks]

QUESTION 2
a. Describe THREE ethical ways of using the computer
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
___________________________________________________________________
[3 marks]

b. Highlight any FOUR computer professional bodies and a function for each.
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
[2 marks]

QUESTION 3
State THREE steps to create chart in Excel spreadsheet
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
[3 marks]

(b). What is the difference between function and formula in Excel?


________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
[2 marks]
QUESTION 4

(a). What is Virus?


________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
[1 mark]
(b) State THREE virus warning signs
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
[3 marks]
(c). Describe TWO ways of protecting your device from virus attack
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
[1 mark]

You might also like