0% found this document useful (0 votes)
28 views

JS2 COMPUTER EXAM 2ND TERM 2019-2020

The document is an examination paper for Basic 8 Computer Studies at Deeper Life High School for the 2019/2020 session, consisting of objective and essay sections. Section A includes multiple-choice questions covering various computer concepts and tools, while Section B requires detailed explanations of specific topics related to internet misuse and graphic packages. A marking guide is also provided for grading the objective and essay responses.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views

JS2 COMPUTER EXAM 2ND TERM 2019-2020

The document is an examination paper for Basic 8 Computer Studies at Deeper Life High School for the 2019/2020 session, consisting of objective and essay sections. Section A includes multiple-choice questions covering various computer concepts and tools, while Section B requires detailed explanations of specific topics related to internet misuse and graphic packages. A marking guide is also provided for grading the objective and essay responses.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 6

DEEPER LIFE HIGH SCHOOL

SECOND TERM EXAMINATION 2019/2020 SESSION


COMPUTER STUDIES CLASS: BASIC 8 Time: 1hr 30min
Instruction: Answer all questions in sections A and three from B.
SECTION A (Objective Test: Choose the correct option from A – D)
1. _________ feature displays the application name and file name at the top of Corel Draw package. A.
Menu bar B. Status bar C. Title bar D. Properties Bar
2. The application of a colour to a selected text in a graphic package is called _____ A. Font type B. Font
colour C. Fill colour D. Text colour
3. Which of the following should NOT be found in the computer room? A. UPS B. AVR C. Water D.
Projector
4. The tool used for displaying various colours, aiding colouring of any selected object/Text is called
________ A. Colour palette B. Paint palette C. Colour tool D. Brush tool
5. ________ is an illegal access gained by an unauthorized person into confidential files, documents and
computer programs without owner’s permission A. Hacking B. Piracy C. Pornography D. Plagiarism
6. What can be used to prevent SPAM/JUNK? A. Antivirus B. Spam filter C. System cleaner D. Anti-glare
7. ________ are computer programs deliberately written to damage data by replicating itself A. Antivirus B.
Virus C. Malware D. Firmware
8. ________ is the explicit representation of human body on the internet A. Pornography B. Cyber crime C.
Movie D. Internet misuse
9. The following are ways to introduce virus into a computer, EXCEPT A. Fictitious e-mails B. Infected
disks C. Dropping of food on the system D. Downloading files from untrusted sites
10. Graphic packages allow users to create the following EXCEPT A. Pictures B. Logos C. Letter headed
papers D. Slides
11. Which of the following is NOT an example of a graphic software? A. Lotus 1-2-3 B. Instant Artist C.
Corel Draw D. 3D Paint
12. A graphic software uses the following to display information EXCEPT A. Lines B. Shapes C. Colours D.
HTML
13. All EXCEPT one is a feature of a graphic package A. Menu bar B. Tool bar C. Slide show D. Printable
area
14. Corel draw was developed by ________ in ________ A. Coral Corporation, 1995 B. Microsoft
Corporation, 1985 C. Corel Corporation, 1985 D. Microsoft Corporation, 1995
15. ________ displays the various commands used to work on a graphic package A. Standard tool bar B.
Menu bar C. Tool box D. Title bar
16. In designing a building plan, which of the following application software is best suitable? A. Corel Draw
B. Paint C. AUTO CAD D. Harvard Graphics
17. The work space for user’s work in a graphic package is called _________ A. White canvas B. Work sheet
C. Work area D. Work page
18. The following tools are freehand functions in MS Paint EXCEPT A. Irregular selection tool B. Regular
selection tool C. Pencil tool D. Eraser tool
19. Which tool is best required to create circles and ovals in MS Paint A. Circle tool B. Ellipse tool C.
Rounded rectangle tool D. Curve tool
20. Which of the following is NOT a misuse of the computer or internet? A. Hacking B. Plagiarism C.
Pornography D. The use of antiglare
21. __________is used to filter or minimize unwanted messages being sent to one’s e-mail A. Firewall B.
Spam filter C. Sieve D. Antivirus
22. An undesirable, unwanted and unpleasant occurrence that happens to man unexpectedly causing injury to
the person, damage to equipment and environment is called ______ A. Injury B. Accident C. Danger D.
Attack
23. _______ is a proactive step taken to prevent an unforeseen occurrence A. Computer ethics B. Safety C.
Ventilation D. Responsible use of the internet
24. All EXCEPT one is a computer safety measure A. Maintenance of dust free environment B. The use of
antiglare protection C. Well illuminated computer room D. Not checking e-mails regularly
25. The feature of graphic package that allows part of an image to be cut out or removed so that only the part
that is required remains is ________ A. Editing B. Photoshop C. Cropping D. Photo editing
26. ________ is used to create straight lines in MS Paint A. Shape tool B. Line tool C. Straight line tool D.
Pencil tool
27. _________ is a program that is used to create drawings on a white canvas or top of other pictures A. MS
Excel B. Adobe page maker C. MS Word D. MS Paint
28. The eraser tool is a tool for erasing ______ and ________ already drawn A. Object and photo B. Shape
and paint C. Image and picture D. Lines and objects
29. Images and objects made with graphic packages are made up of _______ A. Colours B. Inks C. Curves D.
Lines
30. _________ displays detailed information about a selected program A. Property bar B. Standard tool bar C.
Status bar D. Title bar
31. The earliest version of Corel Draw is ________ A. Corel 1 B. Corel 2 C. Corel 5 D. Corel 3
32. Which of the following tools is used for absorbing colours A. brush tool B. Air brush tool C. eyedropper
tool D. zoom tool
33. What two tools in MS Paint would you advise a graphic artist to use, in order to draw and colour a
triangle? A. Rectangle and brush tools B. Polygon and bucket tools C. Shape and airbrush tools D. Line
and brush tools
34. Which is the most effective computer peripheral to use with a graphic package? A. Mouse B. Joystick C.
Light pen D. Keyboard
35. The set of morals that govern and regulate the behaviors of an individual on the acceptable use of the
computer is called ______ A. Ethics B. Computer safety C. Computer ethics D. Computer rules
36. ______ protects the computer from shutting down abruptly and damage to the computer’s memory A.
AVR B. UPS C. Computer user interface D. Operating system
37. Typing or replying an e-mail quickly on the internet, when one is angry could trigger what is called
______ A. Shouting B. Flame C. Errors D. Spam
38. _______ is a form of war that happens on computers and internet, done purposely using drills and games
A. Internet war B. Computer war C. Cyber war D. Mortal combat
39. False data and information sent through mails and mailing lists to fraudulently collect money and other
items from unsuspecting victims is _______ A. Computer fraud B. 419 C. Yahoo D. Spam
40. Typing an e-mail using capital letters is equal to _______ A. Shouting B. Flame C. Errors D. Spam
41. ___________ is the act of making illegal copies of software and other materials such as software, music,
films, etc. A. Piracy B. Plagiarism C. Pornography D. Hacking
42. File attachments from unknown sources should not be opened because, ______ A. it has been hacked B. it
may contain virus C. it contains explosives D. it is a junk file
43. Which of the following is NOT an example of a graphic software? A. MS Word B. AUTO CAD C. Corel
Draw D. 3D Paint
44. _____ is used for scrolling page layout/work in the desired direction (Horizontal and Vertical) A. Lines B.
Shapes C. Colours D. Scroll bar
45. The following can be created using Corel Draw EXCEPT A. Business cards B. Banners C. Posters D.
Database
46. _______ contains the tools used to create, fill and modify drawings A. Standard tool bar B. Tool box C.
Fill tool D. Menu bar
47. All are various tools used in MS Paint EXCEPT A. Pencil tool B. Brush tool C. Gridline tool D.
Rectangle tool
48. The following are side effects of eating and drinking close to a computer EXCEPT A. It attracts rats B.
The water can damage the computer C. The water-spill can cause electrocution D. The computer might be
infected with virus
49. Choose the correct order of loading the version of Corel Draw 12.
(i) Click Corel draw graphics suite (ii) Click all programs
(iii) Click Corel draw 12 (iv) Click start in the task bar
A. iv, ii, i and iii. B. iv, iii, ii and i. C. iv, i, ii and iii D. ii, iv, i and iii (E) ii, i, iv, iii.
50. The smallest unit of a computer storage is a ________ A. Byte B. Nibble C. Word length D. Bit
51. One of the following is NOT a feature in MS Paint environment.
A. Title bar B. Mailings C. Close button D. Tool box
52. The study of how a workplace and the equipment used can best be designed for comfort, efficiency and
safety is called______ A. Ergonomics B. Economics C. Safety D. Technology
53. The _________is used for measuring objects in order to obtain accurate size
A. Scroll bar B. Zoom tool C. Ruler D. Freehand tool
54. The knife tool is used to ____________ an object in a graphic package A. Divide B. Share C. Cut D.
Smoothen
55. Which of the following operating system is associated with Bill Gates? A. DOS B. Linux C. iOS D.
Microsoft Windows
56. Power surges are sudden increase in _______ A. Current B. Light C. Voltage D. Power
57. In graphic packages BMP stands for _________ A. Bit Memory Program B. Basic Memory Program C.
Basic Menu Program D. Bitmap
58. The computer room should be well ventilated in order to prevent A. Rodents and insects B. Thieves C.
Over heating D. Over crowding
59. Which of the following is needed for safety in a computer laboratory? A. Air conditioner B. Chairs and
tables C. Fire extinguisher D. Water
60. Cyber bullying is an example of ________ A. Cyber war B. Internet fraud C. Internet crime D. Internet
abuse
SECTION B (ESSAY)
ANSWER QUESTION 1 AND ANY OTHER TWO (2) QUESTIONS
1. (a) Explain the following the following misuse/abuse of the internet and computer
(i) Invasion of privacy (ii) Pornography (iii) Piracy (iv) Plagiarism (v) Spam (5 Marks)
(b) List and explain three (3) features of a graphic package (3 Marks)
(c) State four (4) responsible use of the computer (2 Marks)
2. (a) State the uses of the following tools in MS Paint environment
(i) Eyedropper tool (ii) Air brush tool (iii) Text tool (iv) Polygon tool (v) Ellipse tool (5 Marks)
(b) State the steps taken to load MS Paint (5 Marks)
3. (a) Define a Graphic Package (2 Marks)
(b) State three (3) examples of a graphic package (3 Marks)
(c) State five (5) features of MS Paint environment (5 Marks)
4. (a) Define Safety (2Marks)
(b) State six (6) safety measures every computer user is expected to take while using the Computer
(3 Marks)
(c) Classify the following tools used in MS Paint into Freehand function tools and Non- Freehand
function tools
(i) Eraser tool (ii) Line tool (iii) Pencil tool (iv) Ellipse tool
(v) Rectangle tool (vi) Brush tool (vii) colour picker tool (viii) Curve tool
(ix) Irregular selection tool (x) Regular selection tool (5 Marks)
DEEPER LIFE HIGH SCHOOL
SECOND TERM EXAMINATION 2019/2020
COMPUTER STUDIES CLASS: BASIC 8
MARKING GUIDE
SECTION A (OBJECTIVE)
1 2 3 4 5 6 7 8 9 10 11 12
13 14 15 16 17 18 19 20
C B C A A B B A C D A D
C C B C A B B D
21 22 23 24 25 26 27 28 29 30 31 32
33 34 35 36 37 38 39 40
B B B D C B D D D C C C
B A C B B C A A
41 42 43 44 45 46 47 48 49 50 51 52
53 54 55 56 57 58 59 60
A B A D D B C D A D B A
C C D C D C C D
60/2 = 30 MARKS
SECTION B (ESSAY)
1. (a) Explain the following the following misuse/abuse of the internet and computer
(i) Invasion of privacy: This is an illegal access gained by an unauthorized person or someone into
confidential files, documents and computer programs without permission.
(ii) Pornography: This is the explicit representation of human body or sexual activity on the internet by
unscrupulous people to promote and distribute pornographic materials.
(iii) Piracy: This is the use CD or DVD writers in computers to make illegal copies of software and other
materials such as software, music, films, etc.
(iv) Plagiarism: This is the act of copying another person’s intellectual work such as a book, music, etc
and presenting it as one’s own without giving credit to the real owner of the idea.
(v) Spam: This involves sending of unwanted provocative messages containing disturbing images and
messages to people’s mail which they do not request for.
(1 mark each = 5 Marks)

(b) List and explain three (3) features of a graphic package


1. Title Bar: It displays application name and file name at the top of the package.
2. Menu Bar: It displays the various command used to work on the program.
3. Page Layout: This is a workspace for user’s work. It is otherwise known as printable page.
4. Standard Tool Bar: This bar contains icons and commands for performing operations on documents.
5. Status Bar: It displays detailed information about programs selected.
6. Ruler: This is used for measuring objects in order to obtain accurate size. There are two types:
horizontal and vertical.
7. Properties Bar: It displays detailed information about graphic/text selected.
8. Scroll Bar: They are used for scrolling page layout/work in the desired direction (Horizontal and
Vertical)
9. Colour Palette: It displays various colours used for colouring any selected object/text.
10. Tool Box: This contains the tools used to create, fill, and modify your drawing.
(Any three (3) @ 1 mark each = 3 Marks)
(c) State four (4) responsible use of the computer
1. Avoid dropping food or liquids on the system.
2. Avoid accessing restricted files on another person’s system
3. Refrain from displaying or using offensive pictures as desktop background.
4. Avoid cramming and typing of other people’s password and username instead look away.
5. Cover the computer and all peripherals with dust covers when not in use.
6. The system should be protected from power surges by using either a voltage stabilizer or a surge protector.
7. In places where power outages are common, the system should be connected to an uninterruptible power
supply unit (UPS) to protect the system from shutting down abruptly and avoid damage to the computer’s
memory.
8. The system should be unplugged from the power source when it is not going to be used for a long time.
(Any four (4) @ ½ mark each = 2 Marks)
2. (a) State the use of the following tools in MS Paint environment
(i) Eyedropper tool: The eyedropper tool is used for "absorbing" colours
(ii) Air brush tool: This is like spray. Select a colour and click around in the document to colour
pixels with random distance between each pixel (not very far though).
(iii) Text tool: The text tool is basically for typing
(iv) Polygon tool: The polygon tool is basically for creating different shapes
(iv) Ellipse tool: The ellipse tool is for making ellipses or circles
(1 mark each = 5 Marks)
(b) State the steps taken to load MS Paint
Loading Paint
i. Click on the start icon at the bottom left corner of the screen.
ii. Click the programs option.
iii. Click on Accessories to see sub menus.
iv. Click on the paint environment. (5 Marks)

3. (a) Define a Graphic Package


Graphic packages are programs that allow you to create graphic pictures, logos, letter headed
paper, brochures, calendars etc. It uses lines, shapes, colors and patterns to show information.
(2 Marks)
(b) State three (3) examples of a graphic package
i. Paint
ii. Corel Draw
iii. Instant Artist
iv. Harvard graphics
v. Photo shops
vi. Logo graphics (Any three @ 1 mark each = 3 marks)

(c) State five (5) features of MS Paint environment


a. Title bar
b. Tool box
c. Workspace
d. Restore Button
e. Minimize Button
f. Close Button (Any five (5) @ 1 mark each = 5 Marks)

4. (a) Define Safety


Safety is a proactive step or measure taken to prevent an unforeseen, unpleasant and undesirable
occurrence (2 marks)
(b) State six (6) safety measures every computer user is expected to take while using
the Computer
1. Good sitting habit must be exercised.
2. Using antiglare protection should be recommended.
3. Monitor base must be positioned correctly.
4. Dust free environment must be maintained.
5. Keep liquid away from the computer. Students are not expected to eat or drink beside the
computer.
6. A computer room must be adequately illuminated.
7. A computer laboratory or where computer is placed should be well ventilated. This can be done by
using air conditioner to keep the surrounding cool. (Any five (6) @
½ mark each = 3 Marks)
(c) Classify the following tools used in MS Paint into Freehand function tools and
Non- Freehand function tools

S/N Freehand Function tool Non-Freehand function tool


1. Eraser tool Line tool
2. Pencil Curve tool
3. Colour picker tool Rectangle tool
4. Irregular selection tool Ellipse tool
5. Brush tool Regular selection tool
(1/2 mark each = 5 Marks)

You might also like