Question and Answers
Question and Answers
TO
SUCCESS
GRADE 8 & 9 COMPUTER STUDIES
PAPER 1
PAST PAPER QUESTIONS
WITH ANSWERS 2nd
(2021 - 2014) Edition
Learn with Us! Note: Contribute K40 for a printable hardcopy - 260971640421
Education must also challenge the Mr. Manda Thomas is a graduate from Mulungushi University
use of ICT and ultimately produce (MU). Manda Thomas is a holder of a bachelor’s degree in
graduates that will be able to Mathematics and Information Communication and Technology Ed
compete in the world of ICT. (BSc. Ed).
Table of Contents
2021 (INTERNAL)
CTRL V
A Copy B Cut C Paste D Undo
6. How are files transferred from the computer to the Internet? By ...
A downloading. B saving. C surfing. D uploading.
7. Which of the following health problems is linked to prolonged use of computers?
A Athletes foot B Brain tumour C Stomach pain D Wrist pain
8. A ... is an electronic document or file stored on a computer.
A soft copy B print copy C hard copy D flash copy
9. A group of characters that identify a specific user of a computer system is known as...
A pass code. B password. C user account. D user name.
10. Convert 4096 bytes to kilobytes.
A 5.5 kilobytes B 4.2 kilobytes C 4.0 kilobytes D 0.4 kilobytes
11. What feature do the letters I and M represent in the term WIMP?
A Icons and Menus B Icons and Motherboard
C Internet and Menus D Internet and Motherboard
Which of the following functions can be used to count the number of students using column B?
A =count(B2:B4) B =countA(B2:B4) C =countIFC(B2:B4) D =countSum(B2:B4)
16. A network between organisations that allow external users to have limited access to their resources
is called ...
A Extranet. B Intranet. C Local Area Network. D Wide Area Network.
17. Which of the following is not a web browser?
A Chrome B Google C Internet Explorer D Mozilla Firefox
18. In a spreadsheet, AA, AB and BZ are examples of...
A alphanumeric. B cell addresses. C column labels. D formulae.
19. The process of preparing a magnetic disk to be used for the first time is called ...
A coding. B decoding. C encoding. D formatting.
20. The resources of a private network can be protected from outside users using a ....
A firewall. B router. C server. D switch.
2021 (EXTERNAL)
4. …. ............ is the term that refers to hardware that is connected externally to a computer.
A External device B Peripheral device
C Universal parallel bus D Universal serial bus
5. What device is used to transmit data and pictures over a telephone line?
A Data pic B Digitizer C Facsimile D Scanner
7. Which of the following is not an advantage of Electronic Fund Transfer at Point of Sale (EFTPOS)?
A Easy to change currency when abroad
B High costs of setting up the system
C Payment is guaranteed as long as transaction is successful
D Reduced theft of cash
8. Which feature in a presentation software allows a user to view all slides on one screen? Slide
…………... view.
A master B outline C show D sorter
9. A huge network made up of smaller networks is known as ...
A the Internet. B a local area network.
C a metropolitan area network. D a wireless network.
10. A device which changes analogue telephone signals into digital data is a ...
A modem. B ROM chip. C RAM chip. D sender.
11. How can a user send data from a word processing document to a spreadsheet document? By
…………….
A downloading. B exporting. C importing. D sending.
12. Teaching using computers and other electronic devices is known as ...
A e-commerce. B e-government. C e-learning. D e-teaching.
13. The following figure shows different devices connected together to form a network at Mr
Chakupopa's home.
2020 (INTERNAL)
2020 (EXTERNAL)
A % B = C * D -
2. A group of 8 bits is called a ...
A Byte. B Kilobyte. C Megabyte. D Nible.
3. Which of the following is not a danger to computers?
A Dust B Electricity C Food Particles D Liquids
4. Which of the following is not a benefit of using computers in entertainment?
2020 (SPECIMEN)
1. In a spreadsheet program, the cell which is currently in use is called………………………….
2020
A active cell. B active selector, C cell frame, D cell identifier.
2. ……………….is storage that holds start up instructions and configuration information of the computer
system.
A ALU B BIOS C RAM D ROM
3. An example of software that changes spoken words into data is
A Multi media, B operating system, C sound recognition, D speech recognition.
4. Which feature displays all slides in a presentation program?
A Normal view B Outline view C Slide show view D slide sorter view
5. The set of characters that have the same appearance is called
A default. B font. C style. D text.
6. …………………………... is the process of feeding instructions into a computer system.
A Accessing B Entering C Inputting D Outputting
7. Which device is used to read pencil marks on a questionnaire?
A OCR B OMR C M1CR D SMR
8. ………………….is program designed to perform specific tasks,
A Application software B Operating system C System software D utility software
9. Date and time are displayed on the ………….. bar.
A Scroll B. Status C System D Task
10. Portrait and landscape are page …………………….
A Defaults B. layouts C margins D orientations
11. A laser printer uses ……………………
A correction fluid, B ink cartridge, C photocopy ink. D toner cartridge
12. In word processing, to embolden means to ……………………
A change the loot colour of the text, B change the font name of the text,
C increase the font, D make the text bold.
13. The part of memory which temporarily holds information for later use is referred to as
…………………….
A Clipboard. B Clipart. C Desktop. D Flash disk.
14. Backing up of computer data is the process of …………………
A putting data in the memory of the computer,
B putting the computer in the back of the room,
C storing an extra copy of data on the hard disk,
D storing an extra copy on an external storage device.
15. Which input device is found in a washing machine?
A Heater B Keypad C Motor D Powder drawer
16. When using publishing software, what is the process of removing a portion of a graphic called?
A Cropping B Cutting C Resizing D Trimming
17. The process of transferring files from a computer to the Internet is called……………………..
A downloading. B forwarding, C surfing, D uploading.
18. Which shortcut key inserts a new slide in a current presentation?
A Ctrl + M B Ctrl + N C Ctrl + 0 D Ctrl + S
19. ………is the adjustment of the spacing between two characters to make text fit in a given space.
A Alignment B Body text C Drop cap D Kerning
20. ……………….. is the space placed between columns In a design.
A Emphasis B Gutter C Harmony D Scaling
2019 (INTERNAL)
1. An approximate value of a Gigabyte is …………. 2019
A 1 000. B 1 000 000. C 1 000 000 000, D 1 000 000 000 000.
11. The term that refers to the methods and equipment used to gather, process, communicate and store
information is…………………………..
A computer processing. B information networks. C information technology.
D networked computers.
12. An email can be sent using the following devices except ……………
2018
Email: [email protected] ©2022 Page 10 of 57
Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421
2018(INTERNAL)
2. Which of the following is used to insert a drawing done by a user into a word document?
A magnetic storage. B optical state storage. C sequential storage. D solid state storage.
8. The legal agreement between the software maker and the user of the software is called ……….. ….
12. How can backache be prevented when using the computer for a long time? By adjusting ...
13. Which key can move the cursor backwards without deleting text in a document?
14. Computer networks that are connected between distant towns are called ………………...
2017(INTERNAL)
2017
1. An example of a computer software is ...
A. ATM card. B document. C touch screen. D virus.
2. Which of the following is a threat to the well-functioning of a computer?
A. Keeping the door open for air to enter. B Locking the computer lab.
C Learners typing work all the time. D Using the computer the whole day.
3. Sitwala lost two documents he had saved on the computer and could not find them in the recycle bin
either. This could have been caused by ...
A Backspace. B Delete key. C Undo command. D Virus action.
4. A photocopier is not classified as an output device of the computer because it...
A cannot print without a computer.
B cannot be connected without a computer.
C produces hardcopy from hardcopy without a computer.
D produces hardcopy from softcopy without a computer.
5. Mainframe computers allow several users to work at the same time. This is referred to as ...
A multi-tasking. B multi-user. C collaboration. D cooperation.
6. Mr Chanda wants to safeguard learners' records stored on a computer. How many times should he
backup the records?
Two devices which can read the data above are ...
A Barcode Reader and Wand. B Code and Bar Reader.
C Code and Line Reader. D Optical Character Reader and Wand.
10. In a spreadsheet, the cell address C9 means ...
A Column 9 and row C. B Column C and row 9.
C Column C and column 9. D Row C and Column 9.
11. Scrolling is ...
A clicking the mouse on an icon. B dragging the mouse on desktop.
C moving an icon from one place to another. D using the mouse to move through a document.
12. The instruction "Divide the sum of B2 and B3 by the contents of B1" can be entered in a spreadsheet
as ...
A = (B1/B2+B3. B = B2+B3/B1. C = (B2+B3)/B1. D = B1/(B2+B3).
13. Which of the following devices can a user get to read an E-book?
A DVD B Flash disk C Printer D Tablet
14. Preparing an application program to run on a computer is known as ...
A copying. B downloading. C installing. D starting.
15. To prevent unauthorised users on the network, users are always required to...
A cold boot. B log on. C reboot. D connect.
2016 (INTERNAL)
2016
Email: [email protected] ©2022 Page 13 of 57
Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421
1. Which of the following statements best describes what a computer program is?
A The input stage of computing that gets data needed.
B The step by step instructions that tell the computer what to do.
C The step by step user manual on how to operate the computer.
D The output stage of computing that outputs data needed.
2. Data are ...
A letters entered into the computer.
B numbers entered into the computer.
C unprocessed facts entered into the computer.
D processed facts obtain from the computer.
3. Which key on a computer keyboard can be used to delete text in a word document?
A Alt B Backspace C Esc D Shift
4. The binary digits 1 and 0 are called ...
A bits. B codes C signal. D text.
5. Which of the following ports are suitable for connecting a USB printer?
A Serial port B Parallel port C Universal Serial Bus port D Universal Sequence Backup Port
6. Which of the following home appliances has no microprocessor?
A Steam pressing iron B DVD player C Television D Microwave oven
7. What can be found on the desktop of computer screen? ...
A Menu B Icons C Commands D Scroll buttons.
8. The ……… is a part of a computer where calculation, searching and sorting of data is carried out.
A Read Only Memory (ROM) B Random Access Memory (RAM)
C Central Processing Unit (CPU) D Backing Storage Unit (BSU)
9. Which of the following is a network of computers that are found in one building?
A LAN B PAN C SAN D WAN
10. An Uninterruptable Power Supply (UPS) unit can be used to ...
A protect the computer from solar power. B backup computer data.
C protect the computer from power blackouts. D protect the computer from virus blackouts.
11. ….... operating system lets many users at different terminals to share processing time on a powerful
central computer.
A Multi-tasking B Mufti-programming C Real-time D Multi-user
12. Formatting a disk results in all the data being erased from the ...
A storage media. B screen. C keyboard. D printer.
13. Which of the following software will be loaded first to the memory when the computer is switched on?
2015 (INTERNAL)
1. Name a device which can be used both for input and output of data.
2015
A Printer B Touch screen C Soft screen D Soft touch
2. Which of the following statements best describes the action the computer performs to process data?
A Input -> storage/processing -> feedback B Input -> output/processing -> storage
C Input -> processing/storage -> output D Feedback -> input -> processing/storage
3. A microprocessor is a ...
A set of instructions. B storage for instructions. C piece of software. D piece of hardware.
4. RAM stands for...
A Random Access Media. B Random Access Memory.
C Random Advanced Memory. D Random Active Memory.
5. The space on the hard drive is measured in ...
A megahertz. B megaamps. C megabytes. D megawatts.
6. Which type of operating system is used in factories to control machines automatically?
A Multiuser system B On-line system C Real time system D Single user system
7. What term is used to describe the process of correcting and making changes to a document?
A Auditing B Editing C Spell checking D Find and replace
8. What is the correct formula for dividing B1 by the sum of B2 and B3 in a spreadsheet?
A = B1/(B2 + B3) B = B1 *(B2 + B3) C = B1\(B2 + B3) D = B3 + (B2/B1)
9. A ... can be used quickly to locate information on the internet.
A quick locator B quick finder C search finder D search engine
10. What should a user do to a computer not responding to commands?
A Switch it off B Switch it off and on C Plug it out D Plug it out and in
11. The CPU is the device that...
A stores data. B processes data. C prints data. D inputs data.
12. Gaining unauthorized access to a computer system and changing the data is known as ...
A breaking. B hacking. C spaming. D stealing.
13. When a user saves an existing document with a different name, what happens to the original
document?
A It is lost B It is kept C It Is moved D It is replaced
14. Back and neck problem which results from the use of the computer can be reduced by using ...
A a fully adjustable chair for correct posture. B a higher chair.
C a back and neck fitter. D an ergonomic keyboard.
15. A legal right given to the publisher or owner of a software is called ...
A publication rights. B user rights. C software rights. D copyrights.
2014 (SPECIMEN)
1. A computer is ……………………..
A an electronic machine found in an office. 2014
2021 (INTERNAL)
11. …………………… are processed facts and figures that provide meaning to the user.
12. A duplicate of an original file kept off-site for future reference is known as ……………………
13. ………….. and ………….. are examples of programmes that corrupt and destroy computer files.
14. A printer that produces images made up of several individual dots is ………….., and the type of
printer that uses heat to transfer images from the printhead to paper is ……………….
15. A set of instructions that allow hardware to communicate on a computer system is known as ………
2021 (EXTERNAL)
1. To read cheques, banks use …………... while information on products sold in supermarkets is 2020
captured using ……..….. and to mark multiple choice examinations the…………... is used.
2. A computer is made up of the………………... and ………………….
3. In a spreadsheet, you can enter values, ……………... and labels.
4. The parts of a mail box of an email system include spam, …………..... and ………………..
2020 (EXTERNAL)
2020 (SPECIMEN)
2020
1. The use of icons and windows are characteristics of ……………….. interface, while the use of text
only is done in the ……………... interface.
2. Deleted files and folders can be restored from ..........................
3. To ……………… is to spin an object to the left or right.
4. In excel, a large range of data can be summed up by selecting a tool button called…………...
5. On the keyboard, the ……………key deletes the text to the left of the cursor and the ……… key
moves the text to the next line.
6. ................... is a kind of memory which is both static and non-volatile.
7. The …………………... is a vertical line that indicates where text should be typed.
8. A …………… is like an upside down mouse and the user ……………… the ball when using it.
9. The two resources that are most likely to be shared in a computer network are …….. and…..…..
10. The instructions that tell the computer how to carry out the processing tasks are referred to as
computer ……………….
11. A device which Is not connected to a CPU is known as ………………
12. The two examples of household appliances that are controlled by an embedded microprocessor are
………... and ………...
13. ………… is the PowerPoint feature that is used to apply motion effects to different objects of a slide.
14. The ………………… is a network of networks in which millions of computers exchange information
around the world.
15. ………….. is a set of standard graphic designs which can be inserted in the work.
2019
2019 (INTERNAL)
16. The part of the central processing unit where calculations are performed and logical comparisons
made is the .................
17. A file sent with an e-mail message is known as ……………...
18. A …………….. is a device used to connect the computer to the internet.
19. An unordered list in a word processor is done using ……………….. whereas an ordered list is
created using ..................... Icon.
20. ………………software controls the operations of the computer and ………………. software performs
user required functions.
21. A ………………. is a program that enables users to navigate the world wide web.
22. A ……….….. is a program that affects smooth operations of a computer and destroys computer files.
23. ………...... is memory held on a chip that can have its contents changed by the user.
24. Video output on a smart phone is seen on its ………….. while audio output is obtained through
the…………….
25. 2479MBY is an example of…………... characters
26. In a spreadsheet, the symbol used for division is ..…. whereas the symbol for multiplication is ..........
27. A ………….. is a pattern of thick and thin lines on a product.
28. An example of secondary memory on a computer is …………......
29. A …………… device is any piece of hardware that is connected to the system unit.
30. Computers use only two digits to process data and these are …..……….. and…………..
2018 (INTERNAL)
16. The only time the cursor moves from right to left is when text is ……………….. aligned.
2018
17. A . ….…... and a ............. can both be used to capture images in a document being typed.
18. Video conferencing makes use of computers, communications equipment and . . ………….
19. A network formed using two phones to exchange music is called …………………
20. A computer system consists of four major hardware components: input, ….…, ….... and …… .
21. The common name for the Return Key is the …………………
22. The ……………... printer produces output by spraying smaller drops of ink on paper.
23. A . …………... is a set of instructions that tells the computer what to do.
24. An …….….. is an electronic form of a letter sent from one user to another using the ………..
25. ……………….. is making use of many media such as text, images, sound, animation and video.
26. What term is used to describe adding motion to graphics on a computer slide presentation?
27. ……………..... is the keeping of computer files for future reference in case of loss of original file.
28. The …………….... key is used to start a new line in a word document.
29. Unauthorised use of an ICT system with a view to change data is called ..................
30. Alphanumeric refers to ……..…….. and ..................
17 Unauthorised use of computer system with a view to seeing or changing data is referred to as ................
18 In a word processor, the cutting off of the unnecessary background of a picture is called …………..
19 The acronym I.S.P stands for ..........................
20 The danger of a virus is to ……………. and …………….... computer files.
21 Dragging a mouse over text is called …………………. or .....................
22 If you delete a word in a document by mistake, you can use the ……………. to put it back.
23 A …………….... is an input device which works like a mouse.
24 An example of keys which occur twice on the keyboard are ……………... and ……………….
25 In a program, a menu shows a list of....................
26 ………………. screens are sometimes used as input devices for multimedia systems.
27 With …………….. communication, data travels through the air.
28 If a password is entered wrongly three times the computer will …………..
29 A desktop publishing program, can be used to create .....................
30 When working in a word processor, copying a graph from a spreadsheet is known as ….………...
2016 (INTERNAL)
2015 (INTERNAL)
16 A ………..….... is the hardware that allows a computer to produce audio output.
17 1,410,000,000 bytes is the same as …….... gigabytes. 2015
18 To protect data, a user must input a ………….... each time to log on.
19 A ……………….. is a collection of two or more computers that are connected to each other allowing them
to ………………….... resources.
20 The two main categories of software are ……………….….. and ………………..
21 ………………………. is making data unreadable during transmission over a network.
22 E-commerce means doing business using ………………………
23 A computer program that aids a computer user to complete a task is called ... ……………….
24 A network system designed and created to cover only an individual's digital devices in a home is called...
25 A computer system does not understand human readable language but understands ………….. only.
26 A ……………... is a storage on medium which ……………….. is read using light
27 A program stored in …………….... of the computer directs the computer to ………….... each time the
computer is switched on.
28 The two examples of operating system interface are the …………….... and ……………....
29 To re-visit a webpage recently viewed the ………………….. button is used.
30 ........................... is the pressing of a mouse button twice in rapid succession.
2014(SPECIMEN)
16. A ………………… is an input device that can be used to input sound into a computer.
17. To increase space on a computer, unwanted files and folders must be …………………. 2014
18. If a computer is becoming very slow, it may be ……………………..
19. ………………… and Digital Versatile Disks (DVDs) are called optical media because …………….is used
to read data from them.
20. Two devices that can produce softcopy output are ………………. and …………………
21. The buying and selling of goods and services through the internet is called ………………….
22. The box where data is entered in a spreadsheet is called a ……………………….
23. …………………… makes a presentation graphic to be moving when played.
24. …………………is the term used to refer to the process of starting up a computer.
25. The type of software that is used to handle specific tasks on a computer is called ………………
26. …. is the connecting of two or more computers so that they are able to...data, information and resources
27. Random Access Memory (RAM) can lose its ……… when power is switched off because it is ………..
28. Two devices that can be used to connect a computer to the internet are ……………and …………..
29. It is important to …………….. work in order to prevent loss of data when working on a computer.
30. A printed page can be electronically transmitted from one office to another by ………………….
2021 (INTERNAL)
1. The following diagram shows part of an Excel spreadsheet document. 2021
A B C D
1 FUEL COST ANALYSIS
2020
2 Car Number Amount of Cost of fuel per Cost of fuel
Plate fuel used litre (ZMW) used (ZMW)
3 ABC 3070 410 18.50
4 ADD 1717 215 17.25
5 AXL 5720 360 18.50
6 ADC 2021 290 17.25
7 LMN 4147 375 18.50
8
3. A school uses a memory stick as a backup device to store Computer Studies assessment projects.
(a) Name two other storage devices that the school could use to store Computer Studies
assessment projects.
(b) Give two advantages of using the memory stick.
(c) Explain why it is important to backup information regularly.
2020
Email: [email protected] ©2022 Page 24 of 57
Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421
2021 (EXTERNAL)
1. Study the picture of an application below and answer the questions that follow.
2 (a) Name one device other than a laptop that can be used to send electronic mail.
(b) What feature is used to send an email to several recipients at once?
(c) Apart from sending emails, state two other ways of communicating electronically using the
Internet.
(d) Give two advantages of emails.
5 The following picture shows a digital camera. Study it and answer the questions that follow.
(a) Name the part of the digital camera used to capture audio data.
(b) Give two outputs of the digital camera.
(c) Name the part of the digital camera that stores images.
(d) How can images on the digital camera be transferred to a laptop computer?
2020 (INTERNAL)
2020
1. Study the storage media devices shown below and answer the questions that follow.
2020
2. Study the diagram below fa spreadsheet extract which shows two separate ranges of numbers and
answer the questions that follow.
(a) Explain how you can highlight the separate ranges of data.
(b) How can you move highlighted content in (a) above to Column D?
(c) The current sheet is saved as Expenses, explain how to rename it as Income.
3. Part of a network at Kalembela School is shown below. Study it and use it to answer the questions
that follow.
4. The diagram below represents the main parts of a computer system. Use it to answer the
questions that follow.
2020 (EXTERNAL)
31.
2020
2020
32. Weluzani, a learner at Chato Secondary School, uses a wireless network connection to the internet
for research.
(a) What is a wireless network?
(b) State one advantage and one disadvantage of wireless network.
(c) Mention one hardware equipment needed for Weluzani's computer to have a wireless connection
on the internet.
(d) Give two methods the school can use to prevent unauthorized access to its wireless network.
33. Mobile phones such as Smart phones are common computing devices available now.
(a) State two operations done by a mobile phone which the computer can also do
(b) Give two other computing devices apart from a computer and a Smart phone.
(c) Give two ways a computer can be used to change data into information.
(d) State two ways a computer can he used at a Police station.
34. The diagram below shows the layout of an application software as seen in normal view.
(a) What is the name of the application software which has the layout shown above?
(b) Identify the parts labelled A and B.
(c) Mention one example of data that can be inserted in part C apart from text.
(d) Write down two tasks that can be done using this application software.
(d) Give one situation where an electronic mail would fail to reach the recipient.
2. Computers are a common feature in many places.
(a) Name two components of a computer system.
(b) Give one action that a computer system performs.
(c) State one health issue associated with the use of a computer system.
(d) Give one safety risk of using a computer system.
3. Study the table below and answer the questions that follow:
A B C D E F G
1
2 SUBJECTS
Computer Social Total
3 S/No. Name of Pupil English Maths
Studies Studies marks
4 243 Hangombe 60 50 68 60 238
5 124 Kimavu 80 58 79 50 267
6 340 Bweupe 75 70 40 58 243
7 222 Likezo 50 66 63 62 241
8 180 Mabvuto 75 65 65 62 267
(a) What is the name of the application program in which this data was entered?
(b) Write the formula that was entered in Cell G4 to calculate the total marks.
(c) Name the feature used to create a single cell with the heading entitled 'SUBJECTS’.
(d) List the names of pupils with the same total marks.
(e) Give one in-built function found in the application program shown in the table.
2020
Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421
2019 (INTERNAL)
31. Study the picture below and answer the questions that follow.
(a) Show the direction of data movement by putting arrows on lines C, D and E.
(b) Add another input device and another output device in boxes A and B.
34.
(a) Explain the meaning of the term LAN.
(b) Give one disadvantage of networking computers.
(c) What do the letters SAN stand for in networks?
(d) Name a device that changes digital data into analogue signals and analogue signals to digital
data.
(e) Give one example of crime committed using computers.
2018(INTERNAL) 2018
31. Study the picture of the interface below and answer the questions that follow
(a) Apart from the devices C and D, name two other devices not shown in the figure which can be
used to input data.
(b) Give one device from the diagram which can be useful for a person who is physically disabled.
(c) State the part on the diagram where inspecting of data entered takes place.
(d) On a smart phone the functions of device Care done by ………………
(e) Write down two advantages of using laptops rather than desktop computers.
2017 (INTERNAL)
31 Study the diagram below and answer the questions that follow.
2017
32 Study the picture of an application shown below and answer the questions that follow.
2016 (INTERNAL)
31. The diagram below shows the four basic actions of the computer to produce information.
2016
2020
(a) State one device that can be used at stage 3 and one that can be used at stage 4.
(b) Name stage 1 and stage 3.
(c) What action Is done at stage 2?
32 The pictures below show different hardware devices found on a computer network.
34 Beenzu and Niza have been playing a video game all day on the computer using a keyboard.
(a) State one health problem that Beenzu and Niza may face due to the continuous use of the
computer.
(b) Give one way of preventing the health problem you stated in (a).
(c) Give one input device that can be used to play the video game instead of the keyboard.
(d) Give one disadvantage of playing computer games apart from health-related problems.
2015 (INTERNAL)
31 Study the diagram of a spreadsheet below.
2015
2020
(a) State two input devices that the school should use to capture photographs in digital format.
(b) Name the best application software that can be used to make the school magazine.
(c) What type of printer could be used to print the school magazine?
(d) Give one advantage and one disadvantage of using a computer system to produce a magazine.
2014(SPECIMEN)
31. Study the diagram of a computer system below.
2014
2020
(a) Explain briefly how the device labelled A can be used on the computer system.
(b) Give the type of outputs that are produced by device B and device C.
(c) If part D is not responding to commands, explain two ways of resolving this problem.
32. (a) State two differences between a Local Area Network (LAN) and a Wide Area Network (WAN).
(b) Give two advantages that a wireless network has over a wired network.
(c) Give two reasons why it is advisable to avoid downloading any free software from the internet?
(d) What program in an internet browser is used to search for information?
(e) Why is downloading of information from a website sometimes slow?
33. The diagram below shows a log-in screen on a network. To gain access to the network the user ID and
password must be entered.
SECTION: A
2021 (INTERNAL)
1. D 2. B 3. A 4. C 5. C
6. D 7. D 8. A 9. D 10. C
11. A 12. C 13. B 14. D 15. B
16. A 17. B 18. C 19. D 20. A
2021 (EXTERNAL)
1. A 2. A 3. D 4. B 5. C
6. C 7. B 8. D 9. A 10. A
11. B 12. C 13. C 14. B 15. D
16. D 17. B 18. B 19. D 20. B
2020 (INTERNAL)
21. C 22. C 23. D 24. A 25. B
26. D 27. A 28. C 29. D 30. C
31. A 32. C 33. A 34. D 35. C
2020 (EXTERNAL)
1. B 2. A 3. B 4. D 5. B
6. B 7. B 8. B 9. B 10. A
11. C 12. B 13. C 14. A 15. B
2020 (SPECIMEN)
1. A 2. B 3. D 4. D 5. B
6. C 7. A 8. A 9. D 10. D
11. D 12. D 13. A 14. D 15. B
16. A 17. D 18. A 19. D 20. B
2019 (INTERNAL)
1. A 2. C 3. B 4. D 5. D
6. D 7. C 8. B 9. A 10. B
11. C 12. B 13. A 14. B 15. B
2018 (INTERNAL)
1. C 2. C 3. C 4. D 5. A
6. D 7. A 8. C 9. C 10. C
11. D 12. A 13. D 14. B 15. C
2017 (INTERNAL)
16. D 17. D 18. D 19. C 20. B
21. A 22. D 23. C 24. A 25. B
26. D 27. C 28. D 29. C 30. B
2016 (INTERNAL)
1. B 2. C 3. B 4. A 5. C
6. A 7. B 8. C 9. B 10. C
11. D 12. A 13. C 14. A 15. D
2015 (INTERNAL)
1. B 2. C 3. D 4. B 5. C
6. C 7. B 8. A 9. D 10. B
11. B 12. B 13. B 14. A 15. D
2014 (SPECIMEN)
1. C 2. D 3. B 4. C 5. C
6. C 7. C 8. C 9. B 10. A
11. A 12. A 13. B 14. B 15. D
SECTION: B
2021-INTERNAL
1. 8 2. Laptop, Tablet, smart phone
3. Internet Service provider 4. Cancel, end
5. Spreadsheet/MS Excel 6. Formatting, Editing
7. Touch Screen 8. Cell address
9. Barcode 10. Ctrl + A
11. Information 12. Backup
13. Virus, worms, trojan horse (malware) 14. Dot Matrix printer, Thermal Printer
15. System Software, Operating System
2021-EXTERNAL
1. Video Graphics Adapter/Array 2. Username
3. Margins, Print Preview 4. Slide Show view
5. Virus 6. multi-user operating system (OS)
7. Recycle Bin 8. Voice Broadcasting
9. Motherboard, External hard drive 10. RAM , ROM
11. MAX() , MIN() 12. Intranet
13. Cybercrime 14. Password
15. Hacking , Hacker
2020-INTERNAL
2020-EXTERNAL
2020-SPECIMEN
1. Graphical User (GUI) and Command
2. Recycle bin
line or text user interface
3. Rotate 4. AutoSum
5. Backspace and Enter Key 6. Read-Only Memory (ROM)
7. insertion point (blinking cursor) 8. Trackball and top
9. Printer and Files 10. Software
11. Offline Device 12. Washing Machine and Television
13. Animations 14. Internet
15. Illustrations
2019-INTERNAL
16. Arithmetic logic Unit (ALU) 17. Attachment
18. Modem 19. Bullets and Numbering
20. System and Application 21. Browser
22. Malware 23. Random Access Memory (RAM)
24. Screen and speaker 25. Alphanumeric
26. Forward slash (/) and asterisk (*) 27. Barcode
28. Hard disk/hard drive 29. Peripheral Device
2018-INTERNAL
2017-INTERNAL
2016-INTERNAL
2015-INTERNAL
2014-INTERNAL
SECTION: C
2021-INTERNAL
1.
(a) B1 : D1 or (B1, C1, D1)
(b) = B3 * C3 or = Product (B3,C3)
(c) Using auto fill
Select cell D3,
Hold the handle filler,
Drag to cell D7
(d) Number/Numeric
2.
(a) Tablet, Smartphone, modem, etc
3.
(a) Memory Card, External hard drive, DVD, SD card, Flash disk, etc.
(b) High transferring speed
It is more durable because it has no moving parts
It is portable
It is reliable
Easy to carry
(c) Backup is used so that it can be used to restore the original copy after a data loss event.
4.
(a) Microwave cooker, Washing Machine, Digital Camera, Television etc
(b) - Loss of Jobs
- Loss of skills/Deskilling
- Workers suffering from R.S.I
- Company data is Vunerable Cyber Attacks/Viruses
(c) - Biometric features eg eyes, fingers etc
- Connecting computer to Security Cameras such as CCTV etc
5.
(a) - Faulty equipment
- Using bare wire (naked socket wire)
- Opening up an electrical device
- Overloading outlet Sockets
- Spilling drinks over water/input device electrical
(c) - Know the location of the fire extinguisher and how it is used
- Turn off the power of the equipment before inspecting
- Never open a power supply or CRT monitor.
- Avoid contacting circuits with wet hands
2021-EXTERNAL
1.
(e) A - Title Bar B- Group Tabs/bar
(f) File tab
(g) Format Painter
(h) Change the font case i.e uppercase, lowercase
2.
4.
(a) A computer virus is malicious code that replicates by copying itself to another program.
(b) Human error, Hardware theft, power failure, etc.
(c) Antivirus is a software used to prevent, scan, detect and delete viruses from a computer.
Anti-spyware is a type of software that is designed to detect and remove unwanted spyware
programs.
(d) Using an antivirus, using the auto save feature, using Power Savers (UPS)
5.
(a) Speaker
(b) Speaker and Screen
(c) SD Card
(d) Using a USB (Universal serial Bus) cable, Bluetooth, removing the SD card from camera and put
it laptop.
2020-INTERNAL
1.
(i) A- Memory Card B- Hard disk/drive C- Flash disk/Memory stick
(j) B, C and A
(k) It is sufficient to meet the requirement/ portability and mobility of device A
5.
(a) Hold the Ctrl key while selecting the cells
(b) By dragging (after highlighting and selecting the content, the selected content can be dragged
to column D by moving the mouse from column A towards column D. OR Cut the highlighted
content and paste in column D.
(c) Point the mouse to expenses and right click to see options and choose rename.
6.
(a) Local Area Network
(b) X – is a router, it enables the computers to connect to the internet.
Y – is a server, it accesses, holds and transfers files and data from one computer to another
computer over the computer network.
(c) It is expensive to setup, Covers Limited Area
(d) Domain or URL (Uniform Resource Locator).
(e) 1 – Subdomain 2 – Domain Name 3 – top level domain/ domain extension
7.
(a) A - ALU: performs mathematical calculations OR Control Unit: Controls all functions of the
computer
B – RAM: holds data and instructions temporally, volatile in nature.
(b) C - ROM: holds data and instructions permanently. Non-volatile in nature
D – Output: display data and information to the user.
(c)
8.
(a) Modem/Router and ISP (Internet Service Provider)
(b) Cyber-crime, cyber bulling and Malicious software
(c) - Visit and Download software well known websites
- not opening and reading anonymous emails.
2020 (EXTERNAL)
31.
(a) Part A – Tab Key (tabulator key or tabular key) Part B – Shift Key
(b) The tab key ↹ on a keyboard is used to move the cursor to the next tab stop.
(c) The text insertion point moves twice to the right.
(d) Repetitive Strain Injury (RSI).
32.
(a) A Wireless network is computer network that is not connected by cables of any kind.
(b) Advantages – Increased efficiency, Security, Less expensive, access and availability.
Disadvantages – expensive to set up, transfer speed is slow, risk of data leak, difficult to set up.
(c) Network Card or a Modem
(d) 1. Use strong passwords 2. Keeping the Firewall On.
33.
(a) 1. Perform Calculations 2. Browsing the internet.
(b) 1. Tablet 2. Personal Digital Assistant (PDA)
(c) Performing calculations, generating reports, presentations, creating multimedia files
(d) Record keeping, Tracking System, communications systems
34.
(a) Microsoft PowerPoint
(b) Part A – Slides Part B – Ribbon
2020 (SPECIMEN)
1.
(a) It is a method of exchanging messages or ‘mail’ between people.
(b) [email protected]
(c) delivered extremely fast, Cheap.
(d) If the receiver’s email address is wrongly spelt or if sender does not have an internet connection.
2.
(a) Input, Output, Process, Storage
(b) Processing data – Converting data to information
(c) Repetitive Strain Injury (RSI), Eye Strain
(d) Long and hanging cables, Overloading sockets and adaptors, can cause accidents
3.
(a) Microsoft Excel
(b) =SUM(C4:F4) or =C4+D4+E4+F4
(c) Merge and Centre
(d) Kimavu and Mabvuto
(e) AutoSum(), AVERAGE(), COUNT(), COUNTIF(), etc.
4.
(a) It is a program that allows design and layout of documents like cards, magazines, flyers, and so
on in a computer.
(b) Logo, shape and Layout
(c) On the insert tab, click Pictures . In the Insert Picture dialog box, browse to the location with
the picture that you want to insert into the business card, and then double-click the picture
(d) Layout, text and graphic tools
(e) Calendar, birthday card, magazines, flyers, posters
5.
(a) Learning with the use of computers
(b) Camera, tablet, smart phone
(c) Zoom, skype,
(d) Cost-effective, reduced travel expenses, reduced downtime.
2019 (INTERNAL)
31.
(a) Microsoft PowerPoint
(b) Part A – New Slide, Part B – Increase font size Part C – Find Text
(c) Add text to the slide/presentation
(d) Find/search for a word within the presentation
32.
(a) Automatic Teller Machine (ATM) Card
(b) Personal Identification Number (PIN)
(c) Name of the card holder, Name of the bank, CVC Number
(d) This is the selling and buying of products online.
(e) i) It allows buying of products online.
ii) it is convenient if you want to buy something that costs a lot of money.
(f) When user input is a wrong PIN
(g) Sim card
33.
(a)
2018(INTERNAL)
31.
(a) Graphical User Interface
(b) A – Task Bar B – Windows start button
(c) A folder is a collection, container and stores multiple files and documents
(d) Google chrome, (MTN mobile connection)
(e) My documents, SAGE Evaluation
32.
(a) Scanner and Microphone
(b) Device E (speakers) useful for a visually impaired person.
(c) Device A (Monitor)
(d) Touch screen
(e) i. Laptops are portable ii. Laptops have low power usage
33.
(a) A – formula bar B – Cell
(b) A1
(c) i. Perform accurate calculations ii. For creation of statistical analysis (charts, tables, etc)
iii. used for record keeping
(d) It is used to enter data or formula to appear in the active cell
34.
(a) Risk of having physical health problems.
(b) i. Repetitive Strain Injury ii. Eye Stain
(c) - By using a password to have access to the computer.
– installing an ant-virus software.
- encrypting sensitive information.
- Restricting usage/access of the computers in school.
2017(INTERNAL)
31.
(f) Bus Network topology
(g) Server
(h) User ID and password
(i) School Computer Laboratory
32.
(f) A – Paragraph Marks B- Ruler C- Scroll bar D- Page Number (document info)
(g) When the cursor is put on page 2 of the word document.
(h) i) to control the page margins ii) to change the indentation of paragraphs.
(i) Auto-Save
33.
(e) A - Left button B – Scroll Wheel C – Right Button
(f) Scrolling through a document
(g) A menu will pop up
(h) Double clicking
(i) A mouse is a pointing device hence, it is easy to select, drag.
34.
(d) (i) Ms Publisher, photoshop, CorelDraw, etc
(ii) Ms Spreadsheet Excel, Ms Access
(e) Hardware - Projector
Software – Ms PowerPoint
2016(INTERNAL)
31.
(a) Stage 3 - Hard disk (Storage Device) Stage 4 - Monitor (Output device)
(b) Stage 1 – Input Stage 3 - Output
(c) Processing
32.
(a) A –Network Interface Card (NIC) B- Ethernet cable
(b) i) Share computer resources ii) Simultaneous access (easy access)
(c) i) convenience of mobility, easy to setup ii) wireless is unreliable, can jam any time.
(d) Building a firewall, or update passwords regularly.
33.
(a) A - username B – domain
(b) Email Body
(c) i) you can be vulnerable to virus attacks. ii) you can be victim to cybercrime.
(d) i) Delivery of emails is faster than letters,
ii) emails do not go missing or misplaced during/after delivering.
34.
(a) Repetitive Strain Injury (RSI)
(b) Taking regular breaks while using the computer
(c) Joystick/Game Pad/Game controller
(d) – Risk of having physical health problems.
- Playing games all day may lead pupils/Students not concentrate on their academic work.
2015(INTERNAL)
31.
(a) A – Name box
(b) Text, Formula
(c) To add/insert a function/formula from a list of predefined functions
(d) To add/insert a formula or data in the active cell
(e) AutoSum : automatically adds/sums values in the selected cells.
32.
(a) These are numbers in base 2 (1s and 0s).
(b) 8 bits
(c) Industries and advanced scientific labs
(d) Washing machine and refrigerator.
33.
(a) Digital Camera and Smart Mobile Phone
(b) Ms Publisher
(c) Laser color printer
(d) i) Advantage: It is easy to edit and print
ii) Disadvantage: An internal data processing of the printer may take a long time when
processing a large amount of data.
34.
(a) Because these devices don to require a user to make the same movement again and again.
(b) i. Search for files or documents on the computer
ii. Schedule and record meetings
(c) FL Studio
2014(SPECIMEN)
31.
(a) Device A is a web camera, it is used for video communications.
(b) Device B is a monitor, it outputs/display data or information on the computer screen.
Device C is a printer, it outputs data or information on paper.
(c) i. Try computer troubleshooting
ii. restarting the computer (warm boot/soft boot)
32.
(a) i. LAN covers a small geographical area while WAN covers a wide geographical area such as a country.
ii. LAN has High data transfer rate while WAN can be relatively slow when there is network congestion.
(b) i. convenient for mobility ii. It is easy to implement (setup)
(c) i. free software may contain malicious code or (malicious program/virus)
ii. free software might cause permanent damage top the computer system.
(d) Search Engine (e.g Google)
(e) can be relatively slow when there is congestion on the website(server)
33.
(a) It is a secret code of characters usually alphanumeric.
(b) The service is temporally locked, user may not be able to enter passwords temporally
(c) Changing the password regularly, is a security measure that safeguards credentials.
(d) i) Closing and Locking the computer room with a lock.
ii) Restricting usage/access of the computers in school.
iii) Put out computer room rules, such as no liquids in the computer room
iv) Cover computers are using them.
34.
(a) i. Contribute Moral decay, learners learn and adopt other cultures on the internet
ii. Harmful to learners instead of learning they are distracted with social media and start chatting.
(b) i) Backache - Use fully adjustable chairs to give the correct posture.
ii) Eyestrain - take regular breaks and try focusing on a point which is some distance away.
iii) Electric Shock - check insulation on wires regularly or check equipment regularly