0% found this document useful (0 votes)
22 views20 pages

Junior Secondary Certificate: Computer Studies

It's a grade nine question paper

Uploaded by

siyemochristine
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views20 pages

Junior Secondary Certificate: Computer Studies

It's a grade nine question paper

Uploaded by

siyemochristine
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

Candidate Number Candidate Name

JUNIOR SECONDARY CERTIFICATE


COMPUTER STUDIES 1502/1
PAPER − Written 2 hour 30 minutes
Marks 130 2015

Additional Materials: Non-programmable calculator


INSTRUCTIONS AND INFORMATION TO CANDIDATES


• Candidates answer on the Question Paper in the spaces provided.
• Write your Candidate Number and Name in the spaces at the top of this page.
• Write in dark blue or black pen.
• You may use a soft pencil for any rough work, diagrams or graphs.
• Do not use correction fluid.
• Do not write in the margin For Examiner’s Use.

• Answer all questions.

• Make sure that you receive the multiple choice answer sheet with your Candidate Number on it to
answer section A.
• The number of marks for section B is given in brackets [ ] at the end
of each question or part question.
For Examiner’s Use

Marker
Checker

This document consists of 19 printed pages and 1 blank page.

Republic of Namibia
MINISTRY OF EDUCATION, ARTS AND CULTURE

© MoEAC/DNEA JSC 2015, Computer Studies [Turn over


2
SECTION A
• Answer this section on the multiple-choice answer sheet provided.
• For each question there are four possible answers A, B, C and D.
• Choose the one you consider correct and mark your choice in soft pencil.
• Each question counts one mark.
• If you want to change an answer, erase the one you wish to delete completely.

1 From what location are the first computer instructions available on boot up?
A Rom
B Ram
C Hard Disk
D Flash Disk

2 Which of the following would typically be the best device or medium to use to backup
an entire hard drive?
A Flash disk
B DVD
C SD card
D External hard drive

3 The reason for using a modem is that it


A acts as a firewall.
B allows the computer to send and receive data over the internet.
C acts as a power source to the computer.
D allows multiple devices to be connected to a personal computer.

4 The URL of a website refers to


A the relative ranking of the website by search engine.
B the password needed to access the website.
C an address that identifies a website on the internet.
D the e-mail address of the webmaster of the website.

5 The librarian wishes to work on her laptop but forgot to bring the mouse to school.
What alternative to a mouse is built into a laptop computer?
A Touch pad
B Graphics pad
C Stylus
D Scanner

JSC 2015, Computer Studies


3
6 The illegal use of computer software is referred to as
A software piracy.
B shareware.
C copyright.
D firmware.

7 Which of the following statements about a firewall is FALSE?


A A firewall is not needed if you have an internet connection.
B A firewall monitors communication between your computer and the internet.
C Firewall software must be updated daily.
D Firewalls block messages that do not meet specific security measures.

8 The cable that consists of a centre glass core and carries data at great speed is called
A coaxial cable.
B fibre optic cable.
C twisted pair.
D power cable.

9 To burn a CD means to
A format the CD.
B put fire to the CD.
C copy documents or files onto the CD.
D delete documents or files that are on the CD.

10 A computer monitor is
A a processing device.
B a software device.
C an output device.
D an input device.

11 Which of the following components should be upgraded to allow more programs and
data to be loaded into memory?
A RAM
B ROM
C CPU
D Hard drive

JSC 2015, Computer Studies [Turn over


4
12 Tricking a user into revealing confidential information, such as banking details is
known as
A data manipulation.
B phishing.
C pharming.
D social blackmailing.

13 Which of the following technologies is designed only for wireless communication


over very short distances of a few metres?
A Wi-Fi
B Ethernet
C 3G
D Bluetooth

14 Which of the following is an example of batch processing?


A ATM
B Flight reservation
C Cellphone contract payment
D Electronic funds at point of sale

15 Translation of a source program as a whole into a copy of machine code is done by the
A interpreter.
B compiler.
C assembler.
D operating system.

16 A computer where shared software resources and files are stored, including network
software, is called a
A printer server.
B proxy server.
C file server.
D communication server.

17 The ...................... or typeface, defines the appearance and shape of letters,


numbers, and special characters.
A font
B font size
C point
D paragraph formatting

JSC 2015, Computer Studies


5
18 In Word processor programs, the default alignment for paragraphs is
A left-aligned.
B centered.
C right-aligned.
D justified.

19 What key should be pressed to erase a character to the right of the insertion point?
A Alt
B Cancel
C Backspace
D Delete

20 By default how do numeric values appear when entered in a spreadsheet?


A left aligned
B right aligned
C centred
D unaligned

21 The type of cell referencing in a formula that adjusts the cell references automatically
when the formula is copied to other cells is called
A relative cell referencing.
B absolute cell referencing.
C in between cell referencing.
D formulating.

22 Which of the following applications would a spreadsheet be most appropriate?


A creating a flyer
B playing computer games
C preparing management reports
D calculating mortgage repayments

23 A duplicate copy in case of a loss of data is called a


A data file.
B program file.
C copy file.
D backup file.

24 Low level language


A uses English like expressions.
B is portable.
C is machine orientated.
D uses variables.

JSC 2015, Computer Studies [Turn over


6
25 When setting your password, you are requested to enter the password twice.
This is called
A validation.
B verification.
C encryption.
D data testing.

26 Which of the following uses optical technology to save data?


A Flash stick
B CD
C Hard drive
D Memory card

27 The equivalent binary code of the denary number 55 is


A 110111.
B 101111.
C 111111.
D 101010.

28 Which of the following is not a characteristic of system software?


A Memory management
B Security features
C Utility programs
D Playing audio files

29 While a secretary was printing a letter, someone in the office accidentally switched
off the computer. The printer, however, still continued printing because the document
was stored in the
A accumulator.
B buffer.
C spool.
D micro processor.

30 Which of the following is not an example of hardware device?


A Scanner
B Modem
C Computer Game
D Flash disk

JSC 2015, Computer Studies


7
For
SECTION B Examiner's
Use

1 Explain, using examples where appropriate, the meaning of the following


computer terms.
(a) Biometric password

.......................................................................................................................

....................................................................................................................... [2]

(b) Data paths

.......................................................................................................................

....................................................................................................................... [2]

(c) LCD monitor

.......................................................................................................................

....................................................................................................................... [2]

(d) Mail merge

.......................................................................................................................

....................................................................................................................... [2]

(e) Cache memory

.......................................................................................................................

....................................................................................................................... [2]
[10]

JSC 2015, Computer Studies [Turn over


8
For
2 The diagram shows a display of the content of the C-drive. Use the information Examiner's
Use
to answer the questions that follows.

Maths

Geography

History

English

New

Arrays.doc 20 kb
Multimedia.doc 36 kb
Budget.xls 24 kb
Inputdevices.doc 25 kb
Marks.xls 26 kb

(a) One of the folder’s name is ‘New’. How would you change the name of ‘New’
to Life Science?

.......................................................................................................................

....................................................................................................................... [2]

(b) Which program was used to design the file Budget?

....................................................................................................................... [1]

(c) How would you go about copying the file Marks to a memory stick which is
in drive G?

.......................................................................................................................

....................................................................................................................... [2]

(d) How would you create a new folder in drive C?

.......................................................................................................................

....................................................................................................................... [2]

(e) What is the difference between a file and a folder?


.......................................................................................................................

....................................................................................................................... [2]

(f) Which one of the files is the largest?


....................................................................................................................... [1]
[10]
JSC 2015, Computer Studies
9
For
3 The manager of a supermarket uses a database to store data about the products Examiner's
Use
she sells. Part of the database is shown below.

Product ID Producer Food type Stock at hand Re-order level


0049179000794 I&G Frozen Carrots 112 50
0027200190653 Stampriet Cabbages 125 70
0010029000001 Stampriet Tomatoes 206 100
0048168310112 I&G Frozen peas 78 75
0049568523654 Stampriet Lettuce 50 48
0025645823468 Stampriet Onions 100 80
0035465710111 I&G Frozen sweet corn 87 50

(a) How many records are there in this part of the database?

....................................................................................................................... [1]

(b) How many fields are there in this part of the database?

....................................................................................................................... [1]

(c) The records shown are to be sorted in ascending order of Stock at hand.
What will be the Food type of the first record in the database after it has
been sorted?

....................................................................................................................... [1]

(d) Identify the field type of the Product ID field.

....................................................................................................................... [1]

(e) A customer comes to the Point of Sale (POS) with three packets of frozen
peas. The checkout operator scans the bar code of the first item and enters
the quantity using the number pad. Describe the computer processing which
now takes place for stock control.

.......................................................................................................................

....................................................................................................................... [2]

(f) How can I get a list of I&G Products only?

.......................................................................................................................

....................................................................................................................... [2]
[8]

JSC 2015, Computer Studies [Turn over


10
For
4 The diagram shows a spreadsheet which has been created to show the marks Examiner's
Use
of some students.

A B C D E F G
1 Marks for term 2
2 Test 1 Test 2 Test 3 Test 4 Total Average
3 Mark 56 67 76 45
4 Sheila 65 56 77 98
5 Rico 76 45 65 67
6 Tambo 67 66 62 59
7
8 Total
9 Average
10

(a) Write down the cell reference of a cell that contains a label.

....................................................................................................................... [1]

(b) Write down the formula which should be put into


(i) F3.
................................................................................................................ [2]

(ii) G3.
................................................................................................................ [2]

(iii) B8.
................................................................................................................ [2]

(iv) B9.
................................................................................................................ [2]

(c) How would you copy the formula which is in F3 into the cells F4 to F6.

....................................................................................................................... [1]

(d) If the spreadsheet is sorted in descending order according to Test 3, whose


name would be on top?

....................................................................................................................... [1]

(e) The average marks have decimal points when calculated. How would you
change the average so that there are no decimal points?

....................................................................................................................... [1]
[12]

JSC 2015, Computer Studies


11
For
5 Study the e-mail below that you have received. Examiner's
Use

To ... [email protected]
Cc ... [email protected]; [email protected]
Bcc ... [email protected]
Subject Yo!
Attach: Logo.bmp (2.7mb); plan. docx (212 kb); budget.xls (1mb)
HI GUYS
PLEASZE FIND ATTACHED THE LATEST LOGO. LET ME KNOW WHAT
YOU THINK. PLZ JUST SCAN FOR A VIRUS BEFORE OPENING IT AS My
ANTI-VIRUS PROGRAM IS OUT OF DATE.
SOL

(a) Briefly describe what an attachment is, in the context of an e-mail message.

.......................................................................................................................

....................................................................................................................... [2]

(b) Name the largest attachment in the e-mail shown above.

....................................................................................................................... [1]

(c) Name one way in which the size of the attachment Logo.bmp could have
been reduced.

....................................................................................................................... [1]

(d) How many people will receive this e-mail.

....................................................................................................................... [1]

(e) Give two examples of poor netiquette in the e-mail above, other than the
size of some of the attachments.

1.....................................................................................................................

.......................................................................................................................

2.....................................................................................................................

....................................................................................................................... [2]

(f) Give a better description for the subject ‘Yo!

....................................................................................................................... [1]
[8]

JSC 2015, Computer Studies [Turn over


12
For
6 John and his family have three computers in their home. He wants to connect Examiner's
Use
the computers into a network which will also connect to the internet.
(a) Give two advantages of doing this.

1.....................................................................................................................

.......................................................................................................................

2.....................................................................................................................

....................................................................................................................... [2]

(b) John decides to link the three computers using a star network. Briefly explain
what hardware he will be needing for this.

.......................................................................................................................

.......................................................................................................................

.......................................................................................................................

....................................................................................................................... [2]

(c) John is very concerned about computer crime. Suggest what he should do
to avoid hackers from intruding his computer network.

.......................................................................................................................

....................................................................................................................... [1]

(d) What should he do to avoid viruses.

.......................................................................................................................

.......................................................................................................................

.......................................................................................................................

....................................................................................................................... [2]
[7]

JSC 2015, Computer Studies


13
For
7 A desktop publishing (DTP) package is to be used to improve the appearance Examiner's
Use
of the following invitation.

YOU ARE INVITED TO DAVID’S BIRTHDAY


PARTY

ON THE 23RD OCTOBER 2015

PLEASE LET ME KNOW IF YOU ARE COMING


ASAP

(a) Give two ways of obtaining a picture to improve the party invitation.

1.....................................................................................................................

.......................................................................................................................

2.....................................................................................................................

....................................................................................................................... [2]

(b) Name four features of the DTP package that could be used to improve the
layout of this invitation.

1.....................................................................................................................

.......................................................................................................................

2.....................................................................................................................

.......................................................................................................................

3.....................................................................................................................

.......................................................................................................................

4.....................................................................................................................

....................................................................................................................... [4]
[6]

JSC 2015, Computer Studies [Turn over


14
For
8 Computer systems are extensively used in hospitals. Examiner's
Use

(a) The ICU uses hardware devices to monitor the condition of patients.
Name one monitoring device which is used in the ICU.

....................................................................................................................... [1]

(b) How does this device warn the nurses when the condition of the patient is
changing?

.......................................................................................................................

....................................................................................................................... [2]

(c) Readings of such devices are shown in graphic form as well as in numeric
form. Why would that be done?

.......................................................................................................................

....................................................................................................................... [1]

(d) The use of computer systems in hospitals can lead to problems of keeping
data secure and confidential. What precautions should be taken to protect
the data?

.......................................................................................................................

.......................................................................................................................

.......................................................................................................................

....................................................................................................................... [2]
[6]
9 Indicate whether the statements in column A are TRUE or FALSE, by inserting
letter T or F in the table below.

column A T or F
(a) Wearing glasses when looking at a monitor cures eye strains.
(b) Computer users should take regular breaks.
(c) A wrist rest will help prevent strain when typing.

[3]

JSC 2015, Computer Studies


15
For
SECTION C Examiner's
Use

1 What will be the output after the execution of the following algorithm segments?

(a) Begin
N1 ← 15
N2 ← 24
If n1 < n2 then
n1 ← n1 + n1
Else
n2 ← n2 + n2
End if
Output n1
End
.......................................................................................................................

....................................................................................................................... [2]

(b) Begin
Sum ← 5
For i ← 1 to 5
Sum ← sum + i
End(for)
Output sum
End
.......................................................................................................................

....................................................................................................................... [2]

(c) Begin
Num ← 5
If num > 0 then
Ans ← num div 2
Else
Ans ← num * num
End if
Output ans
End
.......................................................................................................................

....................................................................................................................... [2]

JSC 2015, Computer Studies [Turn over


16
For
(d) begin Examiner's
Use
num ← 5
temp ← 9
while num < temp do
num ← num + 2
temp ← temp + 1
end(while)
output num
end
.......................................................................................................................

....................................................................................................................... [2]

e) begin
hours ← 60
if (hours > 40) and (hours < 48) then
overtime ← 1.5 * 10 * hours
else
overtime ← 2 * 10 * hours
end if
output double
.......................................................................................................................

....................................................................................................................... [2]
[10]

JSC 2015, Computer Studies


17

BLANK PAGE

Question 2 is on page 18

JSC 2015, Computer Studies [Turn over


18
For
2 Using the trace table, attached to the question paper, dry run the following Examiner's
Use
flowchart. Show the output at each stage.

1 begin

Num1 ← 0
2 Num2 ← 1
Num3 ← 0

3 Num1<=4? F 7
end

T
k

4 Num3← Num1 + Num2

5 Print Num3

Num3← Num2
Num2←Num1
6
Num1←Num1 + 1

JSC 2015, Computer Studies


19
For
Trace table ( for Question 2) Examiner's
Use

box Num 1 Num 2 Num 3 dec output

[10]

JSC 2015, Computer Studies [Turn over


20
For
3 Temperatures (°C) are being collected once per day for one week. Write an Examiner's
Use
algorithm, using pseudocode or otherwise, which inputs each temperature and
outputs
• the average temperature of the week.
• the highest temperature reading of the week.
• and the lowest temperature reading of the week.
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
.............................................................................................................................. [10]

JSC 2015, Computer Studies

You might also like