0% found this document useful (0 votes)
482 views57 pages

Question and Answers

This document provides a compilation of past paper questions and answers for Grade 8 and 9 Computer Studies Paper 1 from 2021 to 2014. It contains questions from both internal and external examinations in Zambia. The questions cover topics such as hardware, software, file management, the internet, health and safety issues related to computers, and spreadsheet functions. Suggested answers with explanations are provided for each question. The creator of this document aims to help students learn and prepare for their Computer Studies exams.

Uploaded by

Pate Mtindya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
482 views57 pages

Question and Answers

This document provides a compilation of past paper questions and answers for Grade 8 and 9 Computer Studies Paper 1 from 2021 to 2014. It contains questions from both internal and external examinations in Zambia. The questions cover topics such as hardware, software, file management, the internet, health and safety issues related to computers, and spreadsheet functions. Suggested answers with explanations are provided for each question. The creator of this document aims to help students learn and prepare for their Computer Studies exams.

Uploaded by

Pate Mtindya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 57

BRIDGE

TO
SUCCESS
GRADE 8 & 9 COMPUTER STUDIES
PAPER 1
PAST PAPER QUESTIONS
WITH ANSWERS 2nd
(2021 - 2014) Edition

Learn with Us! Note: Contribute K40 for a printable hardcopy - 260971640421

By Mr. Thomas Manda facebook.com/thomas.manda www.zamtutor.com +260971640421


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

SMART REVISION KIT

Together, we can make a


difference. The world is changing
and advancing through the use
Information Technology
Communication (ICT).

Education must also challenge the Mr. Manda Thomas is a graduate from Mulungushi University
use of ICT and ultimately produce (MU). Manda Thomas is a holder of a bachelor’s degree in
graduates that will be able to Mathematics and Information Communication and Technology Ed
compete in the world of ICT. (BSc. Ed).

NOTE: This Examination Section pamphlet consists of Computer studies


“This Revision Kit is for learners final examination questions from 2021 – 2014 for both grade nine
in Grade 8 and 9.”
(9) internal and external levels (402/1). Suggested answers with all
Suggestions for corrections are necessary explanations are given at the end of questions. All the
welcome, send an email to Questions are copied directly from the examination past papers for
[email protected]. both grade nine (9) internal and external ordinary levels
Updates or any changes of the
examinations in Zambia.
document will be published once
every year after examinations,
look out for the latest copy.

I will appreciate and be thankful


for any Contribution or
Suggestions.

For free downloads visit:


http://www.zamtutor.com/freedo
wnloads

Email: [email protected] ©2022 Page 2 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

Table of Contents

..................................................................................1 2018(INTERNAL) .................................................................. 32


2021 (INTERNAL) ...................................................................1 2017 (INTERNAL) ................................................................. 34
2021 (EXTERNAL) ..................................................................2 2016 (INTERNAL) ................................................................. 36
2020 (INTERNAL) ...................................................................4 2014(SPECIMEN).................................................................. 38
2020 (EXTERNAL) ..................................................................6 ........................................................ 39
2020 (SPECIMEN) ...................................................................8 SECTION: A ........................................................................... 39
2019 (INTERNAL) ...................................................................9 SECTION: B ........................................................................... 41
2018(INTERNAL)...................................................................11 SECTION: C ........................................................................... 44
2017(INTERNAL)...................................................................12
2016 (INTERNAL) .................................................................13
2015 (INTERNAL) .................................................................15
2014 (SPECIMEN) .................................................................16
................................................................................17
2021 (INTERNAL) .................................................................17
2021 (EXTERNAL) ................................................................18
2020 (INTERNAL) .................................................................18
2020 (EXTERNAL) ................................................................19
2020 (SPECIMEN) .................................................................20
2019 (INTERNAL) .................................................................20
2018 (INTERNAL) .................................................................21
2017 (INTERNAL) .................................................................21
2016 (INTERNAL) .................................................................22
2015 (INTERNAL) .................................................................23
2014(SPECIMEN) ..................................................................23
................................................................................24
2021 (INTERNAL) .................................................................24
2021 (EXTERNAL) ................................................................25
2020 (INTERNAL) .................................................................26
2020 (EXTERNAL) ................................................................28
2020 (SPECIMEN) .................................................................29
2019 (INTERNAL) .................................................................31

Email: [email protected] ©2022 Page 3 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

GRADE 9 COMPUTER STUDIES PAPER 1


PAST PAPER QUESTIONS WITH ANSWERS (2021 - 2014)

2021 (INTERNAL)

1. An example of an output device is a ... 2021


A mouse click. B mouse pad. C touch pad D touch screen.
2. What mathematical operation is performed when a forward slash is placed between two numeric
values in a spreadsheet?
A Addition B Division C Multiplication D Subtraction
3. Which of the following is an optical storage medium?
A Compact disc B Hard drive C Flash drive D Memory card
4. A gigabyte is equivalent to ...
A 1, 024 bytes. B 1, 024 kilobytes. C 1, 024 megabytes. D 1, 024 terabytes.
5. Which action is performed when the following keyboard keys are pressed together?

CTRL V
A Copy B Cut C Paste D Undo
6. How are files transferred from the computer to the Internet? By ...
A downloading. B saving. C surfing. D uploading.
7. Which of the following health problems is linked to prolonged use of computers?
A Athletes foot B Brain tumour C Stomach pain D Wrist pain
8. A ... is an electronic document or file stored on a computer.
A soft copy B print copy C hard copy D flash copy
9. A group of characters that identify a specific user of a computer system is known as...
A pass code. B password. C user account. D user name.
10. Convert 4096 bytes to kilobytes.
A 5.5 kilobytes B 4.2 kilobytes C 4.0 kilobytes D 0.4 kilobytes
11. What feature do the letters I and M represent in the term WIMP?
A Icons and Menus B Icons and Motherboard
C Internet and Menus D Internet and Motherboard

Email: [email protected] ©2022 Page 1 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

12. Which of the following controls the processes in a washing machine?


A Hard drive B Memory C Microchip D Spinner
13. The loss of human skills and the acquired knowledge to computer systems is known as ...
A computerising. B deskilling. C job loss. D reskilling.
14. Which of the following application software uses the extension docx on saved files?
A Microsoft Excel B Microsoft PowerPoint C Microsoft Publishing D Microsoft Word
15. The figure below shows part of a spreadsheet used to keep marks obtained by students in a test.
A B C
1 Surname Other Name(s) Mark
2 Bwalya Peter 72
3 Banda Kondwani 83
4 Sombo Mubita 76

Which of the following functions can be used to count the number of students using column B?
A =count(B2:B4) B =countA(B2:B4) C =countIFC(B2:B4) D =countSum(B2:B4)
16. A network between organisations that allow external users to have limited access to their resources
is called ...
A Extranet. B Intranet. C Local Area Network. D Wide Area Network.
17. Which of the following is not a web browser?
A Chrome B Google C Internet Explorer D Mozilla Firefox
18. In a spreadsheet, AA, AB and BZ are examples of...
A alphanumeric. B cell addresses. C column labels. D formulae.
19. The process of preparing a magnetic disk to be used for the first time is called ...
A coding. B decoding. C encoding. D formatting.
20. The resources of a private network can be protected from outside users using a ....
A firewall. B router. C server. D switch.
2021 (EXTERNAL)

1. A monitor is an example of……….... 2021

A hardware. B shareware. C spyware. D software.


2. Which part of the Central Processing Unit (CPU) performs calculations?
A Arithmetic Logic Unit B Calculator Unit C Control Unit D Memory Logic Unit

3. A ………..... is a hand held barcode scanner.

Email: [email protected] ©2022 Page 2 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

A coder B detector C megapixel D wand

4. …. ............ is the term that refers to hardware that is connected externally to a computer.
A External device B Peripheral device
C Universal parallel bus D Universal serial bus

5. What device is used to transmit data and pictures over a telephone line?
A Data pic B Digitizer C Facsimile D Scanner

6. A device used to print out drawings of building plans is ..............


A an actuator. B a motor. C a plotter. D a robot.

7. Which of the following is not an advantage of Electronic Fund Transfer at Point of Sale (EFTPOS)?
A Easy to change currency when abroad
B High costs of setting up the system
C Payment is guaranteed as long as transaction is successful
D Reduced theft of cash
8. Which feature in a presentation software allows a user to view all slides on one screen? Slide
…………... view.
A master B outline C show D sorter
9. A huge network made up of smaller networks is known as ...
A the Internet. B a local area network.
C a metropolitan area network. D a wireless network.
10. A device which changes analogue telephone signals into digital data is a ...
A modem. B ROM chip. C RAM chip. D sender.
11. How can a user send data from a word processing document to a spreadsheet document? By
…………….
A downloading. B exporting. C importing. D sending.
12. Teaching using computers and other electronic devices is known as ...
A e-commerce. B e-government. C e-learning. D e-teaching.
13. The following figure shows different devices connected together to form a network at Mr
Chakupopa's home.

Email: [email protected] ©2022 Page 3 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

What network is shown above?


A LAN B MAN C PAN D SAN
14. A text, picture or graphical button used to move from a current webpage to another webpage when
clicked is called ...
A home page. B hyperlink. C search engine. D web browser.
15. Which input device is not suitable for the physically disabled users?
A Braille keyboard B Eye typer C Foot mouse D QWERTY keyboard
16. ….... is software that can be acquired without paying for its licence and can be used for a specified
period of time.
A Adware B Freeware C Malware D Shareware
17. …….... is a type of virus that will become active on a specific date.
A Anti-virus B Time bomb C Trojan horse D Worm ware
18. When a document is saved without specifying its file destination it goes to ...
A local disk. B my documents. C my computer. D recycle bin.
19. What type of page orientation is shown in the following diagram?

A Gutter B Landscape C Page setup D Portrait


20. How would a picture size be changed to fit the available space in a document is by?
A cropping and cutting. B cropping and resizing
C minimising and compression. D minimising and maximising.

2020 (INTERNAL)

1. Which of the following devices is used for output only? 2020

Email: [email protected] ©2022 Page 4 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

A CPU B Keyboard C Monitor D Touch Screen


2. In a spreadsheet, the function, = MAX(A1:A8), A1:A8 is known as………..
A column. B maximum. C range. D rows.
3. A programme used to protect a computer from malware is termed as
A anti-software. B anti-spyware. C anti-virus firmware. D anti-virus software.
4. Which of the following is not a multi-user operating system?
A Command line interface B Linux C Graphical User Interface D Unix
5. Which of the following is a file extension for an audio file?
A. Jpeg B. Mp3 C. Mpeg D. Swf
6. All can be regarded as text except…………….
A punctuation marks. B sentences. C words. D watermark.
7. When using a desktop publisher, it is important to consider …………….
A. if it will print publications properly. B. if the teacher likes the appearance.
C. colour, rotating text and images. D. the audience of the publication.
8. Which of the following represents the correct sequence of flow of data in a Computer?
A Input, output, process B Input, output, save
C Input, process, output D Output, process, save
9. Communication using computer and mobile devices is called ………...
A IT B. ICT C. Link. D. Network.
10. Which of the following is the definition of a Computer Room?
A. A room where computers are properly secured and well ventilated.
B. A room where computers are stored for safe keeping.
C. A properly designed and secured room where computers are installed for safe use.
D. A well ventilated and tidy room where computers are backed up for use.
11. To calculate the number of items in a row or column in Excel, the function used is
A. COUNT B. MAX. C. MIN. D. SUM.
12. A type of barcode when scanned takes a user to an image video or website is called ……………..
A Barcode. B Hot spot. C QR code. D Wi-Fi code.
13. In a word-processor, if you type the first four letters of a word eg. AUGU followed by pressing the
Enter key you obtain the word AUGUST. Such a feature is known as……………..

Email: [email protected] ©2022 Page 5 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

A. Auto complete. B. Auto correct. C. Auto summarise. D. Auto Text.


14. The shortcut method to run a PowerPoint presentation using the keyboard is by pressing the keys
A Fn +F2. B Fn+F3. C Fn +F4 D Fn+ F5.
15. The purpose of a microprocessor is to....
A. provide power to the computer. B. provide back-up to the computer.
C. process al the data and instructions. D. process all microcomputer hardware.
16. The process of producing high quality printed leaflets, magazines or calendars is called …………
A Desktop printing. B Desktop publishing. C Document publishing. D Front office publishing
17. Which of the following set of items satisfies construction of a network in a school computer room?
A. NIC, UTP-cable, computer and server B. NIC, UTP-cable, computers and switch
C. NIC, UTP-cable, ISP and computers D. NIC, UTP-cable, ISP and server
18. To take a screen-short of the entire screen content, a user should press…………... on the keyboard.
A Ctrl+A B Ctrl+A + Prtscr C Ctrl+Prtscr D Ctrl+Prtscr+A
19. During the copy and paste process, the items are stored in the …………...
A Clip Art. B Clip Board. C Smart Art. D Word Art.
20. An operating system can be defined as …………..
A. a piece of hardware.
B. a set of programme to create documents on the computer.
C. a set of programme that manages the operations of the computer.
D. the boot up programme.

2020 (EXTERNAL)

1. Formulas in a spreadsheet start with ….. 2020

A % B = C * D -
2. A group of 8 bits is called a ...
A Byte. B Kilobyte. C Megabyte. D Nible.
3. Which of the following is not a danger to computers?
A Dust B Electricity C Food Particles D Liquids
4. Which of the following is not a benefit of using computers in entertainment?

Email: [email protected] ©2022 Page 6 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

A Composing of musical songs. B Developing movies visual effects.


C Recording of music. D Reducing gambling.
5. What kind of software is used to create flyers, magazines and business cards?
A Database publisher B Desktop publisher C Presentation D Spreadsheet
6. The following are reasons of networking computers except
A easy communication. B easy virus distribution.
C sharing of files and software. D sharing of peripheral hardware.
7. What tool in presentation graphics software is used to remove unwanted parts of a picture during
editing?
A Cropping B Cutting C Pasting D Resizing
8. Which of the following is a peripheral device?
A Central Processing Unit B Mouse C Random Access Memory D Window
9. …………..is the illegal copying and distribution of software.
A Piloting B Piracy C Pirates D Pirating
10. What term is given to a Local Area Network which is private to a company but information is
accessed the same way as on the internet?
A Extranet B Globalnet C Internet D Intranet
11. Which of the following is a correct format of an E-mail address?
A @john.mushiwandi.com B com.john@mushiwandi
C [email protected] D [email protected]
12. One advantage of using a computer is that it..
A is expensive to maintain. B is highly accurate in making calculations.
C needs skilled manpower to operate. D takes long to complete a task.
13. The difference between a Personal Identification Number (PIN) and a Password is ...
A PIN consists of letters while Password consists of numbers and special characters.
B PIN consists of special characters while Passwords consists of numbers and letters.
C PIN consists of numbers while Password consists of letters and special characters.
D PIN consists of numbers and letters while Password consists of special characters.
14. WAN stands for...
A Wide Area Network.
B Wider Area Network.
C WIFI Area Network.

Email: [email protected] ©2022 Page 7 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

D World Area Network.


15. ………... is a programme which is used to prevent data from being corrupted and lost.
A Antitheft B Antivirus C Spyware D Spam

2020 (SPECIMEN)
1. In a spreadsheet program, the cell which is currently in use is called………………………….
2020
A active cell. B active selector, C cell frame, D cell identifier.
2. ……………….is storage that holds start up instructions and configuration information of the computer
system.
A ALU B BIOS C RAM D ROM
3. An example of software that changes spoken words into data is
A Multi media, B operating system, C sound recognition, D speech recognition.
4. Which feature displays all slides in a presentation program?
A Normal view B Outline view C Slide show view D slide sorter view
5. The set of characters that have the same appearance is called
A default. B font. C style. D text.
6. …………………………... is the process of feeding instructions into a computer system.
A Accessing B Entering C Inputting D Outputting
7. Which device is used to read pencil marks on a questionnaire?
A OCR B OMR C M1CR D SMR
8. ………………….is program designed to perform specific tasks,
A Application software B Operating system C System software D utility software
9. Date and time are displayed on the ………….. bar.
A Scroll B. Status C System D Task
10. Portrait and landscape are page …………………….
A Defaults B. layouts C margins D orientations
11. A laser printer uses ……………………
A correction fluid, B ink cartridge, C photocopy ink. D toner cartridge
12. In word processing, to embolden means to ……………………
A change the loot colour of the text, B change the font name of the text,
C increase the font, D make the text bold.

Email: [email protected] ©2022 Page 8 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

13. The part of memory which temporarily holds information for later use is referred to as
…………………….
A Clipboard. B Clipart. C Desktop. D Flash disk.
14. Backing up of computer data is the process of …………………
A putting data in the memory of the computer,
B putting the computer in the back of the room,
C storing an extra copy of data on the hard disk,
D storing an extra copy on an external storage device.
15. Which input device is found in a washing machine?
A Heater B Keypad C Motor D Powder drawer

16. When using publishing software, what is the process of removing a portion of a graphic called?
A Cropping B Cutting C Resizing D Trimming
17. The process of transferring files from a computer to the Internet is called……………………..
A downloading. B forwarding, C surfing, D uploading.
18. Which shortcut key inserts a new slide in a current presentation?
A Ctrl + M B Ctrl + N C Ctrl + 0 D Ctrl + S
19. ………is the adjustment of the spacing between two characters to make text fit in a given space.
A Alignment B Body text C Drop cap D Kerning
20. ……………….. is the space placed between columns In a design.
A Emphasis B Gutter C Harmony D Scaling

2019 (INTERNAL)
1. An approximate value of a Gigabyte is …………. 2019
A 1 000. B 1 000 000. C 1 000 000 000, D 1 000 000 000 000.

2. Which of the following is not an example of a computer hardware’?


A Compact Disk Drive B Floppy Disk Drive C Operating System D Hard Disk System

3. Kawana wants to protect his computer from virus attacks. He should .


A dean toe computer with anti software. B clean the computer with anti-virus software.
C dean the computer with virus software. D dean the computer with virus malware.

4. An example of an input device is a …………....


A Flash disk. B Screen. C Speaker. D Touch Screen.

Email: [email protected] ©2022 Page 9 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

5. What is the other name for the monitor?


A Digital Display Unit B Dot Display Unit C Visible Display Unit D Visual Display Unit

6. By increasing font size, which of the following is affected?


A Colour B Picture C Sound D Text

7. The right to use software is termed as…………..


A copyright. B installation. C licence. D patent.

8. The speed of a CPU is measured in .................


A Megahertz and Gigabyte. B Megahertz and Gigahertz.
C Byte and Terabyte. D Byte and megahertz.

9. The icon in word processor represents ..................


A change case. B change font. C word wrap. D word size.

10. Which of the following is an automatic method far Input of data?


A Data entry B Data capture C Data keying D Data typing

11. The term that refers to the methods and equipment used to gather, process, communicate and store
information is…………………………..
A computer processing. B information networks. C information technology.
D networked computers.

12. An email can be sent using the following devices except ……………

A computer. B fax. C mobile phone. D tablet

13. Which of the following commands is found in a spreadsheet?


A AutoSum B Speller C References D Paragraph

14. Thesaurus helps to ...


A copy and paste. B find similar words. C find-replace text. D search and paste.

15. What are the two commonly used printers?


A Dot matrix and laser Jet. B laser Jet and inkjet.
C plotter and dot matrix. D plotter and inkjet.

2018
Email: [email protected] ©2022 Page 10 of 57
Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

2018(INTERNAL)

1. The CPU can be classified as …………….. device.

A input B output C processing D storage

2. Which of the following is used to insert a drawing done by a user into a word document?

A Chart B ClipArt C Picture D WordArt

3. The electronic parts inside a computer are called ………………………..

A Electronware. B Firmware. C Hardware. D Physicalware.

4. The recycle bin can ………………..

A copy. B compress. C store. D archive.

5. A memory stick is a type of. …………………..

A magnetic storage. B optical state storage. C sequential storage. D solid state storage.

6. A computer virus is a …………………....

A copyright. B hardware. C liveware. D software.

7. One function of an operating system is to …………………...

A control the resources of a computer. B create spaces between paragraphs.

C create spaces between lines. D control the authencity of a computer.

8. The legal agreement between the software maker and the user of the software is called ……….. ….

A copyright licence agreement. B data integrity .

C end-user licence agreement. D software product.

9. Which one of these is the strongest password?

A. 2018 B. BBB B D. C. B? 18 dr!4. D. Peter 3.

10. The intersection of a column and a row in a spreadsheet is called ............................

A Address. B Box. C Cell. D Grid.

11. Importing involves ………………………..

Email: [email protected] ©2022 Page 11 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

A cutting. B moving. C scanning. D uploading .

12. How can backache be prevented when using the computer for a long time? By adjusting ...

A chair to suit user height. B chair to suit user wrist.

C user height to suit chair. D user wrist to suit chair.

13. Which key can move the cursor backwards without deleting text in a document?

A Backspace B Down arrow key C Enter D Left Arrow Key

14. Computer networks that are connected between distant towns are called ………………...

A LANS B MANS C. WANS D. Wi-Fi

15. Which of the following is an example of page orientation?

A Case B Cursor C Landscape D Margins

2017(INTERNAL)
2017
1. An example of a computer software is ...
A. ATM card. B document. C touch screen. D virus.
2. Which of the following is a threat to the well-functioning of a computer?
A. Keeping the door open for air to enter. B Locking the computer lab.
C Learners typing work all the time. D Using the computer the whole day.
3. Sitwala lost two documents he had saved on the computer and could not find them in the recycle bin
either. This could have been caused by ...
A Backspace. B Delete key. C Undo command. D Virus action.
4. A photocopier is not classified as an output device of the computer because it...
A cannot print without a computer.
B cannot be connected without a computer.
C produces hardcopy from hardcopy without a computer.
D produces hardcopy from softcopy without a computer.
5. Mainframe computers allow several users to work at the same time. This is referred to as ...
A multi-tasking. B multi-user. C collaboration. D cooperation.
6. Mr Chanda wants to safeguard learners' records stored on a computer. How many times should he
backup the records?

Email: [email protected] ©2022 Page 12 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

A Everyday B Once a month C Regularly D Twice


7. How many bytes make up 2 kilobytes?
A 8 bytes B 16 bytes C 200 bytes D 2000 bytes
8. The SAVE AS command is used to ...
A delete the backup document.
B delete the original document.
C rename a saved document.
D rename a saved folder.
9. Use the picture below to answer the question that follows.

Two devices which can read the data above are ...
A Barcode Reader and Wand. B Code and Bar Reader.
C Code and Line Reader. D Optical Character Reader and Wand.
10. In a spreadsheet, the cell address C9 means ...
A Column 9 and row C. B Column C and row 9.
C Column C and column 9. D Row C and Column 9.
11. Scrolling is ...
A clicking the mouse on an icon. B dragging the mouse on desktop.
C moving an icon from one place to another. D using the mouse to move through a document.
12. The instruction "Divide the sum of B2 and B3 by the contents of B1" can be entered in a spreadsheet
as ...
A = (B1/B2+B3. B = B2+B3/B1. C = (B2+B3)/B1. D = B1/(B2+B3).
13. Which of the following devices can a user get to read an E-book?
A DVD B Flash disk C Printer D Tablet
14. Preparing an application program to run on a computer is known as ...
A copying. B downloading. C installing. D starting.
15. To prevent unauthorised users on the network, users are always required to...
A cold boot. B log on. C reboot. D connect.

2016 (INTERNAL)

2016
Email: [email protected] ©2022 Page 13 of 57
Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

1. Which of the following statements best describes what a computer program is?
A The input stage of computing that gets data needed.
B The step by step instructions that tell the computer what to do.
C The step by step user manual on how to operate the computer.
D The output stage of computing that outputs data needed.
2. Data are ...
A letters entered into the computer.
B numbers entered into the computer.
C unprocessed facts entered into the computer.
D processed facts obtain from the computer.
3. Which key on a computer keyboard can be used to delete text in a word document?
A Alt B Backspace C Esc D Shift
4. The binary digits 1 and 0 are called ...
A bits. B codes C signal. D text.
5. Which of the following ports are suitable for connecting a USB printer?
A Serial port B Parallel port C Universal Serial Bus port D Universal Sequence Backup Port
6. Which of the following home appliances has no microprocessor?
A Steam pressing iron B DVD player C Television D Microwave oven
7. What can be found on the desktop of computer screen? ...
A Menu B Icons C Commands D Scroll buttons.
8. The ……… is a part of a computer where calculation, searching and sorting of data is carried out.
A Read Only Memory (ROM) B Random Access Memory (RAM)
C Central Processing Unit (CPU) D Backing Storage Unit (BSU)
9. Which of the following is a network of computers that are found in one building?
A LAN B PAN C SAN D WAN
10. An Uninterruptable Power Supply (UPS) unit can be used to ...
A protect the computer from solar power. B backup computer data.
C protect the computer from power blackouts. D protect the computer from virus blackouts.
11. ….... operating system lets many users at different terminals to share processing time on a powerful
central computer.
A Multi-tasking B Mufti-programming C Real-time D Multi-user
12. Formatting a disk results in all the data being erased from the ...
A storage media. B screen. C keyboard. D printer.
13. Which of the following software will be loaded first to the memory when the computer is switched on?

Email: [email protected] ©2022 Page 14 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

A Spreadsheet software B Word processing software


C Operating system software D Presentation software
14. The type of computer which allows a user to input, edit and output audio is ...
A multi media computer. B multi audio computer. C music computer. D speaker computer.
15. What is the best way to prevent data loss on the computer?
A Use a bigger computer B Not to use laptops C Backup the printer D Backup the data

2015 (INTERNAL)
1. Name a device which can be used both for input and output of data.
2015
A Printer B Touch screen C Soft screen D Soft touch
2. Which of the following statements best describes the action the computer performs to process data?
A Input -> storage/processing -> feedback B Input -> output/processing -> storage
C Input -> processing/storage -> output D Feedback -> input -> processing/storage
3. A microprocessor is a ...
A set of instructions. B storage for instructions. C piece of software. D piece of hardware.
4. RAM stands for...
A Random Access Media. B Random Access Memory.
C Random Advanced Memory. D Random Active Memory.
5. The space on the hard drive is measured in ...
A megahertz. B megaamps. C megabytes. D megawatts.
6. Which type of operating system is used in factories to control machines automatically?
A Multiuser system B On-line system C Real time system D Single user system
7. What term is used to describe the process of correcting and making changes to a document?
A Auditing B Editing C Spell checking D Find and replace
8. What is the correct formula for dividing B1 by the sum of B2 and B3 in a spreadsheet?
A = B1/(B2 + B3) B = B1 *(B2 + B3) C = B1\(B2 + B3) D = B3 + (B2/B1)
9. A ... can be used quickly to locate information on the internet.
A quick locator B quick finder C search finder D search engine
10. What should a user do to a computer not responding to commands?
A Switch it off B Switch it off and on C Plug it out D Plug it out and in
11. The CPU is the device that...
A stores data. B processes data. C prints data. D inputs data.
12. Gaining unauthorized access to a computer system and changing the data is known as ...
A breaking. B hacking. C spaming. D stealing.

Email: [email protected] ©2022 Page 15 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

13. When a user saves an existing document with a different name, what happens to the original
document?
A It is lost B It is kept C It Is moved D It is replaced
14. Back and neck problem which results from the use of the computer can be reduced by using ...
A a fully adjustable chair for correct posture. B a higher chair.
C a back and neck fitter. D an ergonomic keyboard.
15. A legal right given to the publisher or owner of a software is called ...
A publication rights. B user rights. C software rights. D copyrights.

2014 (SPECIMEN)
1. A computer is ……………………..
A an electronic machine found in an office. 2014

B an electronic device which is useful.


C an electronic device used to input, process, output and store data.
D An electronic machine which is more intelligent than a human being.
2. Which of the following is not an output device?
A Monitor B Printer C Projector D Scanner
3. Repetitive Strain Injury (RSI) can be increased by the use of a • • •
A digital camera. B keyboard. C modem. D printer.
4. Why is it important to install antivirus software on a computer?
A To protect computers from thieves
B To protect user's information from unauthorised people
C To protect computers from malicious programs which may delete or change information.
D To protect computers from being damaged due to power failure.
5. ……………. ..is equal to 1 024 kilobytes.
A Bit B Gigabyte C Megabyte D Terabyte
6. Which of the following terms describe the physical parts of a computer?
A Software B Malware C Hardware D Discware
7. ..…………... is a computer presentation that combines text, sound, animations, video and graphics.
A Composite B Compound C Multimedia D Multimix
8. Why is it important to use an Uninterruptible Power Supply (UPS) on a computer?
A It makes the computer fast
B It backs up files
C It allows for saving of important work when there is a power failure

Email: [email protected] ©2022 Page 16 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

D It allows for deleting of unnecessary files and folders.


9. ROM stands for ………………………..
A Reading Of Memory. B Read Only Memory. C Reading Over Memory. D Read On Memory.
10. A ………………. is a device that can be used for both input and output.
A touch screen B mouse C keyboard D joystick
11. A software that can be downloaded without paying for it is called • • •
A freeware. B open source. C proprietary. D shareware.
12. How can a computer user put a picture on the Internet?
A Uploading B Surfing C Downloading D Browsing
13. A grade 8 pupil accidentally deleted a file on a computer. Where can it be restored from?
A Task bar B Recycle bin C My document D Menu bar
14. Which of the following is the correct order of moving a sentence from one position to another in a
document?
A Copy and paste B Cut and paste C Paste and copy D Paste and cut
15. ……………………….. is a device used to mark shaded multiple choice answers on answer cards.
A Barcode Reader B Magnetic Mark Reader
C Magnetic Ink Mark Reader D Optical Mark Reader

2021 (INTERNAL)

1. A byte is equal to …………………….. bits. 2021


2. ………………….. and ………………….. are examples of personal computers.
3. The acronym I.S.P stands for ……………………
4. Escape (Esc) key on the keyboard allows a user to ……………………. an operation.
5. The application software that models the cash coming in and going out of a business is …………….
6. Changing the properties of a document is called …… while changing content of a document is…....
7. ………………………. is a part of a smartphone that takes in commands and displays the output.
8. In a spreadsheet, G9 is an example of ………………..
9. A …………………. is a pattern of thick and thin lines which are scanned to quickly identify a product.
10. The keyboard buttons ……… and ……… when pressed together is an instruction for 'select all' text
or icons.

Email: [email protected] ©2022 Page 17 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

11. …………………… are processed facts and figures that provide meaning to the user.
12. A duplicate of an original file kept off-site for future reference is known as ……………………
13. ………….. and ………….. are examples of programmes that corrupt and destroy computer files.
14. A printer that produces images made up of several individual dots is ………….., and the type of
printer that uses heat to transfer images from the printhead to paper is ……………….
15. A set of instructions that allow hardware to communicate on a computer system is known as ………
2021 (EXTERNAL)

1. The abbreviation VGA stands for................ 2021

2. …………….. is the identity given to a user on a network.


3. The blank space outside the printing area on a page of a document is called ……….
while the appearance of a document before printing is checked in the print ………...
4. The slide view that displays one slide at a time with presenters' notes is called ………..
5. A ……………... can cause damage to computer files.
6. A system that allows resources to be shared by many different users is ………....
7. A ……….. holds all deleted items.
8. A voice call that is broadcast to a group of users is called ………….
9. A microprocessor chip is mounted on the …………….... and the storage that supplements the
hard disk of a computer is ……………....
10. The part of a computer that temporarily stores data is ……….... while the ……….... stores data
permanently.
11. In a spreadsheet, the function that gives the highest value of data in a range of cells is ……....
and the function that produces the lowest value is ………..
12. ……….... is an internal network that uses technologies of the Internet to enable
communication between people.
13. ……..... is a crime committed using the Internet.
14. Apart from a username, a ……………. is used to log into a social media account.
15. The method of accessing computer files without permission is known as …….... and a person who
performs that act is called …....
2020 (INTERNAL)

1. To read cheques, banks use …………... while information on products sold in supermarkets is 2020
captured using ……..….. and to mark multiple choice examinations the…………... is used.
2. A computer is made up of the………………... and ………………….
3. In a spreadsheet, you can enter values, ……………... and labels.
4. The parts of a mail box of an email system include spam, …………..... and ………………..

Email: [email protected] ©2022 Page 18 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

5. A collection of pictures stored in a word-processor to choose from is called ………………. and a


collection of documents is stored in a ......................
6. Switching a computer on from shutdown is known as ………..…. and restarting it while it is on is
known as ……………
7. Features of a word processor include …………….... and ……………….
8. The general term for business done using the Internet is ……………………
9. Commonly used ports of desktop computers are for connecting…………... and ……………
10. The two types of Desktop Publisher (DTP) frames for entering information are .............. and…………

2020 (EXTERNAL)

16. ……….. is part of the main memory that is permanent.


2020
17. A printer that is disconnected from the computer system is said to be ………..
18. The moving of selected text from its location in a word document to another location in the same
document is ….... and ……...
19. The unit of measurement of speed of the Central Processing Unit is known as ……………...
20. The identity given to a user on a computer is ……... and the unlocking code or key for the user
account is ...
21. The presence of………. in laptops allows laptops to operate without being connected to a source of
electricity.
22. The two examples of point and click input devices are and ........... …
23. A tiny Processor that controls some household appliances such as a washing machine is known as
……….
24. ……………… is a website that helps users to find information on the internet by typing key words or
phrases.
25. ……… ... are lines of varying thickness found on items sold in a supermarket.
26. The person who gains unauthorised access to a computer is called a ……….... while the
unauthorised gaining of access to a computer is …………....
27. Companies that provide internet access to users are called ……………
28. The spreadsheet cell that is currently selected is called .................…..
29. The process of restarting a computer that is already on is known as ……………………..
30. The Graphical User Interface (GUI) is made up of ………………..., Icons,………….... and pointer.

Email: [email protected] ©2022 Page 19 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

2020 (SPECIMEN)
2020
1. The use of icons and windows are characteristics of ……………….. interface, while the use of text
only is done in the ……………... interface.
2. Deleted files and folders can be restored from ..........................
3. To ……………… is to spin an object to the left or right.
4. In excel, a large range of data can be summed up by selecting a tool button called…………...
5. On the keyboard, the ……………key deletes the text to the left of the cursor and the ……… key
moves the text to the next line.
6. ................... is a kind of memory which is both static and non-volatile.
7. The …………………... is a vertical line that indicates where text should be typed.
8. A …………… is like an upside down mouse and the user ……………… the ball when using it.
9. The two resources that are most likely to be shared in a computer network are …….. and…..…..
10. The instructions that tell the computer how to carry out the processing tasks are referred to as
computer ……………….
11. A device which Is not connected to a CPU is known as ………………
12. The two examples of household appliances that are controlled by an embedded microprocessor are
………... and ………...
13. ………… is the PowerPoint feature that is used to apply motion effects to different objects of a slide.
14. The ………………… is a network of networks in which millions of computers exchange information
around the world.
15. ………….. is a set of standard graphic designs which can be inserted in the work.

2019
2019 (INTERNAL)

16. The part of the central processing unit where calculations are performed and logical comparisons
made is the .................
17. A file sent with an e-mail message is known as ……………...
18. A …………….. is a device used to connect the computer to the internet.
19. An unordered list in a word processor is done using ……………….. whereas an ordered list is
created using ..................... Icon.
20. ………………software controls the operations of the computer and ………………. software performs
user required functions.
21. A ………………. is a program that enables users to navigate the world wide web.

Email: [email protected] ©2022 Page 20 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

22. A ……….….. is a program that affects smooth operations of a computer and destroys computer files.
23. ………...... is memory held on a chip that can have its contents changed by the user.
24. Video output on a smart phone is seen on its ………….. while audio output is obtained through
the…………….
25. 2479MBY is an example of…………... characters
26. In a spreadsheet, the symbol used for division is ..…. whereas the symbol for multiplication is ..........
27. A ………….. is a pattern of thick and thin lines on a product.
28. An example of secondary memory on a computer is …………......
29. A …………… device is any piece of hardware that is connected to the system unit.
30. Computers use only two digits to process data and these are …..……….. and…………..

2018 (INTERNAL)

16. The only time the cursor moves from right to left is when text is ……………….. aligned.
2018
17. A . ….…... and a ............. can both be used to capture images in a document being typed.
18. Video conferencing makes use of computers, communications equipment and . . ………….
19. A network formed using two phones to exchange music is called …………………
20. A computer system consists of four major hardware components: input, ….…, ….... and …… .
21. The common name for the Return Key is the …………………
22. The ……………... printer produces output by spraying smaller drops of ink on paper.
23. A . …………... is a set of instructions that tells the computer what to do.
24. An …….….. is an electronic form of a letter sent from one user to another using the ………..
25. ……………….. is making use of many media such as text, images, sound, animation and video.
26. What term is used to describe adding motion to graphics on a computer slide presentation?
27. ……………..... is the keeping of computer files for future reference in case of loss of original file.
28. The …………….... key is used to start a new line in a word document.
29. Unauthorised use of an ICT system with a view to change data is called ..................
30. Alphanumeric refers to ……..…….. and ..................

2017 (INTERNAL) 2017


16 Arrange the following storage devices in descending order of size.
Local hard disk, CD and DVD.

Email: [email protected] ©2022 Page 21 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

17 Unauthorised use of computer system with a view to seeing or changing data is referred to as ................
18 In a word processor, the cutting off of the unnecessary background of a picture is called …………..
19 The acronym I.S.P stands for ..........................
20 The danger of a virus is to ……………. and …………….... computer files.
21 Dragging a mouse over text is called …………………. or .....................
22 If you delete a word in a document by mistake, you can use the ……………. to put it back.
23 A …………….... is an input device which works like a mouse.
24 An example of keys which occur twice on the keyboard are ……………... and ……………….
25 In a program, a menu shows a list of....................
26 ………………. screens are sometimes used as input devices for multimedia systems.
27 With …………….. communication, data travels through the air.
28 If a password is entered wrongly three times the computer will …………..
29 A desktop publishing program, can be used to create .....................
30 When working in a word processor, copying a graph from a spreadsheet is known as ….………...

2016 (INTERNAL)

16 The…………… button is used to add up numbers quickly in a spreadsheet. 2016

17 The ………….. represents something on a computer in form of a picture.


18 …………….. is the unit for measuring the speed of the CPU.
19 A …………. and a ……….. are two examples of optical storage media.
20 The margin in a document determines how much….. Is left between the edge of the page and the …….
21 A ………….. is a malicious program that copies itself and destroys computer files.
22 To read account numbers of cheques at a bank ……….. reader is used.
23 In serial access used by a tape, data Is read from ……...
24 To use a computer network, a user must first log on by entering the user ID and...
25 Cameras that do not require film and can transfer Images and video Into the computer are called
………... cameras.
26 ……….. Is an example of an ……….... software used for creating, formatting and editing of documents
on a computer.
27 ……….. allows users to find a website even If they do not know the Universal Resource Locator (URL).
28 In a word processor, a line that blinks to Indicate where to type Is called a ……….
29 To ........... Is to remove a ………... no longer needed on the computer.
30 A program stored in ... of the computer directs the computer to start up each time you switch on.

Email: [email protected] ©2022 Page 22 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

2015 (INTERNAL)
16 A ………..….... is the hardware that allows a computer to produce audio output.
17 1,410,000,000 bytes is the same as …….... gigabytes. 2015

18 To protect data, a user must input a ………….... each time to log on.
19 A ……………….. is a collection of two or more computers that are connected to each other allowing them
to ………………….... resources.
20 The two main categories of software are ……………….….. and ………………..
21 ………………………. is making data unreadable during transmission over a network.
22 E-commerce means doing business using ………………………
23 A computer program that aids a computer user to complete a task is called ... ……………….
24 A network system designed and created to cover only an individual's digital devices in a home is called...
25 A computer system does not understand human readable language but understands ………….. only.
26 A ……………... is a storage on medium which ……………….. is read using light
27 A program stored in …………….... of the computer directs the computer to ………….... each time the
computer is switched on.
28 The two examples of operating system interface are the …………….... and ……………....
29 To re-visit a webpage recently viewed the ………………….. button is used.
30 ........................... is the pressing of a mouse button twice in rapid succession.

2014(SPECIMEN)
16. A ………………… is an input device that can be used to input sound into a computer.
17. To increase space on a computer, unwanted files and folders must be …………………. 2014
18. If a computer is becoming very slow, it may be ……………………..
19. ………………… and Digital Versatile Disks (DVDs) are called optical media because …………….is used
to read data from them.
20. Two devices that can produce softcopy output are ………………. and …………………
21. The buying and selling of goods and services through the internet is called ………………….
22. The box where data is entered in a spreadsheet is called a ……………………….
23. …………………… makes a presentation graphic to be moving when played.
24. …………………is the term used to refer to the process of starting up a computer.
25. The type of software that is used to handle specific tasks on a computer is called ………………
26. …. is the connecting of two or more computers so that they are able to...data, information and resources
27. Random Access Memory (RAM) can lose its ……… when power is switched off because it is ………..

Email: [email protected] ©2022 Page 23 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

28. Two devices that can be used to connect a computer to the internet are ……………and …………..
29. It is important to …………….. work in order to prevent loss of data when working on a computer.
30. A printed page can be electronically transmitted from one office to another by ………………….

2021 (INTERNAL)
1. The following diagram shows part of an Excel spreadsheet document. 2021
A B C D
1 FUEL COST ANALYSIS
2020
2 Car Number Amount of Cost of fuel per Cost of fuel
Plate fuel used litre (ZMW) used (ZMW)
3 ABC 3070 410 18.50
4 ADD 1717 215 17.25
5 AXL 5720 360 18.50
6 ADC 2021 290 17.25
7 LMN 4147 375 18.50
8

(a) Which cells were merged?


(b) Write a formula that can be used in cell D3 to calculate the cost of fuel used.
(c) Explain the steps involved to replicate the formula in cell D3 through to D7.
(d) What type of data is presented in cell C4?

2. Mr Nzelu has a cafe where he provides different Internet services.


(a) Apart from a computer, name one hardware needed to connect to the Internet.
(b) State two services provided at the Internet cafe.
(c) Give one disadvantage of connecting a computer to the Internet.
(d) Explain why it is important to log out of a user account after using the Internet.

3. A school uses a memory stick as a backup device to store Computer Studies assessment projects.
(a) Name two other storage devices that the school could use to store Computer Studies
assessment projects.
(b) Give two advantages of using the memory stick.
(c) Explain why it is important to backup information regularly.

4. Computer devices are common in home appliances and office equipment.


(a) Name one home appliance and one office equipment that is controlled by a microprocessor.
2021

2020
Email: [email protected] ©2022 Page 24 of 57
Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

(b) Give two disadvantages of introducing computers in a work place.


(c) Explain how a computer can be used to monitor criminals or thieves.

5. Electrocution can be a safety hazard in a Computer Laboratory.


(a) Give one cause of electrocution that might occur in a Computer Laboratory.
(b) Explain how electrocution can be prevented in a Computer Laboratory.
(c) State two general safety rules for a Computer Laboratory which learners must follow when using
computers.
(d) Give one health problem that may result from using a fixed chair.

2021 (EXTERNAL)
1. Study the picture of an application below and answer the questions that follow.

(a) Name the parts labelled A and B.


(b) State the tab in the picture that must be clicked to open the print preview option.
(c) Which feature or tool shown in the picture must be selected to copy the attributes of a selected text?
(d) Explain the purpose of the tool [Aa] shown in the part labelled C.

2 (a) Name one device other than a laptop that can be used to send electronic mail.
(b) What feature is used to send an email to several recipients at once?
(c) Apart from sending emails, state two other ways of communicating electronically using the
Internet.
(d) Give two advantages of emails.

3 (a) What Is open-source software?


(b) Give two reasons why open-source software is becoming popular for use in computers.
(c) State one disadvantage of using open-source software.

Email: [email protected] ©2022 Page 25 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

(d) Give two examples of open-source software.

4 (a) What is a virus?


(b) State one cause of data or information loss apart from being corrupted by a virus.
(c) Explain the difference between an anti-virus and antispyware.
(d) Give two ways in which a document being typed can be protected from accidental loss.

5 The following picture shows a digital camera. Study it and answer the questions that follow.

(a) Name the part of the digital camera used to capture audio data.
(b) Give two outputs of the digital camera.
(c) Name the part of the digital camera that stores images.
(d) How can images on the digital camera be transferred to a laptop computer?

2020 (INTERNAL)
2020
1. Study the storage media devices shown below and answer the questions that follow.
2020

(a) Identify the storage devices above.


(b) Use letters A, B and C to arrange the above devices in decreasing order of storage capacity.
(c) Why is A used on phones or digital cameras instead of B?

Email: [email protected] ©2022 Page 26 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

2. Study the diagram below fa spreadsheet extract which shows two separate ranges of numbers and
answer the questions that follow.

(a) Explain how you can highlight the separate ranges of data.
(b) How can you move highlighted content in (a) above to Column D?
(c) The current sheet is saved as Expenses, explain how to rename it as Income.
3. Part of a network at Kalembela School is shown below. Study it and use it to answer the questions
that follow.

(a) What network is shown above?


(b) What is the purpose of hardware X and Y on the network?
(c) State two disadvantages of this network.
(d) What term is used to describe www.exams-council.org.zm?
(e) Identify the parts numbered 1, 2, and 3

4. The diagram below represents the main parts of a computer system. Use it to answer the
questions that follow.

Email: [email protected] ©2022 Page 27 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

(a) Name and describe the components labelled A to D.


(b) On the diagram above, use arrows to indicate the direction of how data flows in a
computer.
5. Lemelelo bought a computer to use at home during the lockdown period of COVID-19, for e-
learning and shopping.
(a) Name two things required for him to be connected to enable e-learning and shopping
to take place.
(b) State two things which Lemelelo should guard against once on the Internet
(c) How should Lemelelo protect himself from the concerns in (b) above?

2020 (EXTERNAL)
31.
2020

2020

(a) Name the parts labelled A and B.


(b) State one function of the part labelled A.
(c) Explain what happens to the text insertion point when part C is pressed twice.
(d) What health problem can be caused by using the above input device for long periods of time?

Email: [email protected] ©2022 Page 28 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

32. Weluzani, a learner at Chato Secondary School, uses a wireless network connection to the internet
for research.
(a) What is a wireless network?
(b) State one advantage and one disadvantage of wireless network.
(c) Mention one hardware equipment needed for Weluzani's computer to have a wireless connection
on the internet.
(d) Give two methods the school can use to prevent unauthorized access to its wireless network.

33. Mobile phones such as Smart phones are common computing devices available now.
(a) State two operations done by a mobile phone which the computer can also do
(b) Give two other computing devices apart from a computer and a Smart phone.
(c) Give two ways a computer can be used to change data into information.
(d) State two ways a computer can he used at a Police station.

34. The diagram below shows the layout of an application software as seen in normal view.

(a) What is the name of the application software which has the layout shown above?
(b) Identify the parts labelled A and B.
(c) Mention one example of data that can be inserted in part C apart from text.
(d) Write down two tasks that can be done using this application software.

2020 (SPECIMEN) 2020


1. Today, people use many forms to telecommunications such as electronic mail to relay information.
(a) Explain what electronic mail is. 2020

(b) Write an example of a valid email address.


(c) State one advantage of using electronic mall.

Email: [email protected] ©2022 Page 29 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

(d) Give one situation where an electronic mail would fail to reach the recipient.
2. Computers are a common feature in many places.
(a) Name two components of a computer system.
(b) Give one action that a computer system performs.
(c) State one health issue associated with the use of a computer system.
(d) Give one safety risk of using a computer system.
3. Study the table below and answer the questions that follow:
A B C D E F G
1
2 SUBJECTS
Computer Social Total
3 S/No. Name of Pupil English Maths
Studies Studies marks
4 243 Hangombe 60 50 68 60 238
5 124 Kimavu 80 58 79 50 267
6 340 Bweupe 75 70 40 58 243
7 222 Likezo 50 66 63 62 241
8 180 Mabvuto 75 65 65 62 267

(a) What is the name of the application program in which this data was entered?
(b) Write the formula that was entered in Cell G4 to calculate the total marks.
(c) Name the feature used to create a single cell with the heading entitled 'SUBJECTS’.
(d) List the names of pupils with the same total marks.
(e) Give one in-built function found in the application program shown in the table.

4. (a) What is a Desktop publishing program?


(b) State two graphic elements that can be used when designing a business card.
(c) Explain how an image can be integrated into a business card.
(d) State two features of a Desktop publishing program.
(e) Give two products that can be created using Desktop publishing program.

5. (a) What is Computer Based Learning.


(b) State one multimedia device that can be used in Computer Based Learning.
(c) State one multimedia software that can be used in Computer Based Learning.
(d) Give one advantage of Computer Based Learning.
(e) Give one disadvantage associated with Computer Based Learning.

Email: [email protected] ©2022 Page 30 of2020


57

2020
Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

2019 (INTERNAL)

31. Study the picture below and answer the questions that follow.

(a) Give the name of the application shown above.


(b) Name the parts labelled A, B and C.
(c) Give one use of part D.
(d) What is the function of the feature C?
32. The picture below shows a card used in a transaction system. Study it and answer the questions that
follow.

(a) Name this card.


(b) Give one item of data that should be entered in the system in order to use the system with
this card.
(c) Give one example of information stored on the card.

Email: [email protected] ©2022 Page 31 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

(d) E-commerce is now accepted by many users. What is meant by E-commerce?


(e) State two advantages of using the above card when making transactions.
(f) Give one situation where the card would fail to make transactions go through
(g) Name a device similar to part X.
33. Study the diagram below and answer the questions that follow.

(a) Show the direction of data movement by putting arrows on lines C, D and E.
(b) Add another input device and another output device in boxes A and B.
34.
(a) Explain the meaning of the term LAN.
(b) Give one disadvantage of networking computers.
(c) What do the letters SAN stand for in networks?
(d) Name a device that changes digital data into analogue signals and analogue signals to digital
data.
(e) Give one example of crime committed using computers.

2018(INTERNAL) 2018
31. Study the picture of the interface below and answer the questions that follow

Email: [email protected] ©2022 Page 32 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

(a) Give the name of the user interface shown above.


(b) Identify parts labelled A and B.
(c) What is the use of part C?
(d) From the diagram, which icon can be double clicked to open the internet?
(e) Name two folders shown in the diagram above.

32. The figure below shows a computer system.

(a) Apart from the devices C and D, name two other devices not shown in the figure which can be
used to input data.
(b) Give one device from the diagram which can be useful for a person who is physically disabled.
(c) State the part on the diagram where inspecting of data entered takes place.
(d) On a smart phone the functions of device Care done by ………………

Email: [email protected] ©2022 Page 33 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

(e) Write down two advantages of using laptops rather than desktop computers.

33. Study the diagram below

(a) Name the parts labelled A and B.


(b) Give the cell reference for the part labelled B.
(c) State two uses of this application in our day to day life.
(d) Write down the use of the part labelled A.

34. Computers are a useful tool in homes and schools.


(a) Give one negative effect of using computers.
(b) State two health problems associated with using computers apart from backaches.
(c) Explain two ways or methods that can be used to protect information on computers in
schools.

2017 (INTERNAL)

31 Study the diagram below and answer the questions that follow.
2017

(a) What is the type of network shown above?


(b) State one item shared in this network.
(c) Give the requirement needed for one to access this network.
(d) Give one place where this type of network can be used.

32 Study the picture of an application shown below and answer the questions that follow.

Email: [email protected] ©2022 Page 34 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

(a) Name items labelled A, B, C and D.


(b) When could the status at D read 2 of 3? Explain.
(c) Give two uses of part B.
(d) Name the feature of a word processor which saves work at regular intervals.
33 The picture below shows a computer mouse.

(a) Name the parts labelled A, B and C.


(b) What is the function of part B when working in a document?
(c) What would happen if a user clicks part C on a Desktop?
(d) What is the term used to refer to two successive clicks of Part A?
(e) Why do users prefer using the mouse other than a keyboard in a Graphical User Interface?
34 Mwandamando runs an NGO that takes care of street kids. The NGO has agents who capture
information about the street kids.
(a) Mention a piece of software that can be used to edit
(i) images of street kids,
(ii) records of each street kid.
(b) List one hardware device and a software that can be used to present a report about the street
kids to an audience.

Email: [email protected] ©2022 Page 35 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

2016 (INTERNAL)

31. The diagram below shows the four basic actions of the computer to produce information.
2016

2020

(a) State one device that can be used at stage 3 and one that can be used at stage 4.
(b) Name stage 1 and stage 3.
(c) What action Is done at stage 2?

32 The pictures below show different hardware devices found on a computer network.

(a) Name the two hardware devices A and B.


(b) Give two uses of a computer network.
(c) (i) Give one advantage of a wireless network.
(ii) Give one disadvantage of a wireless network.
(d) Give two ways of protecting computers on a network.

33 The following is a sample of an e-mail address of pjbanda.

(a) Name parts A and B.


(b) If pjbanda receives an e-mail message from his friend, what is the name of the space where the
message is kept?
(c) Give two reasons why it is not advisable to open emails from unknown sources.
(d) Give two reasons why users prefer to send e-mails instead of letters.

34 Beenzu and Niza have been playing a video game all day on the computer using a keyboard.
(a) State one health problem that Beenzu and Niza may face due to the continuous use of the
computer.

Email: [email protected] ©2022 Page 36 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

(b) Give one way of preventing the health problem you stated in (a).
(c) Give one input device that can be used to play the video game instead of the keyboard.
(d) Give one disadvantage of playing computer games apart from health-related problems.

2015 (INTERNAL)
31 Study the diagram of a spreadsheet below.

2015

2020

(a) Name part A.


(b) State two types of data that can be entered in a cell labelled B.
(c) When can part C be used?
(d) What is the use of part D?
(e) What is the function of the button indicated by letter E?

32 A Computer represents data as binary digits.


(a) What are binary digits?
(b) How many binary digits (bits) make one byte?
(c) Name two places where analogue computers are mostly used.
(d) Name two household appliances which are digital in nature.

33 Kima Secondary School wants to produce a school magazine.

Email: [email protected] ©2022 Page 37 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

(a) State two input devices that the school should use to capture photographs in digital format.
(b) Name the best application software that can be used to make the school magazine.
(c) What type of printer could be used to print the school magazine?
(d) Give one advantage and one disadvantage of using a computer system to produce a magazine.

34 (a) Why is a microphone unlikely to cause repetitive strain injury?


(b) Give two situations where speech recognition systems can be used.
(c) What application software can make musical instruments work with a computer?

2014(SPECIMEN)
31. Study the diagram of a computer system below.

2014

2020

(a) Explain briefly how the device labelled A can be used on the computer system.
(b) Give the type of outputs that are produced by device B and device C.
(c) If part D is not responding to commands, explain two ways of resolving this problem.

32. (a) State two differences between a Local Area Network (LAN) and a Wide Area Network (WAN).
(b) Give two advantages that a wireless network has over a wired network.
(c) Give two reasons why it is advisable to avoid downloading any free software from the internet?
(d) What program in an internet browser is used to search for information?
(e) Why is downloading of information from a website sometimes slow?

33. The diagram below shows a log-in screen on a network. To gain access to the network the user ID and
password must be entered.

Email: [email protected] ©2022 Page 38 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

(a) What is a password?


(b) What would happen if a wrong password is entered more than the maximum number of times
allowed?
(c) Why is it not a good idea to keep using the same password for a long time?
(d) Give two physical ways of protecting computer systems.

34. (a) Give two negative social effects of using computers.


(b) Use of computers can lead to a number of health problems.
State one way of preventing each of the following: -
(i) Backache,
(ii) Eyestrain,
(iii) Electric shock.

SECTION: A

2021 (INTERNAL)
1. D 2. B 3. A 4. C 5. C
6. D 7. D 8. A 9. D 10. C
11. A 12. C 13. B 14. D 15. B
16. A 17. B 18. C 19. D 20. A

2021 (EXTERNAL)
1. A 2. A 3. D 4. B 5. C
6. C 7. B 8. D 9. A 10. A
11. B 12. C 13. C 14. B 15. D
16. D 17. B 18. B 19. D 20. B

2020 (INTERNAL)
21. C 22. C 23. D 24. A 25. B
26. D 27. A 28. C 29. D 30. C
31. A 32. C 33. A 34. D 35. C

Email: [email protected] ©2022 Page 39 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

36. B 37. B 38. C 39. B 40. C

2020 (EXTERNAL)
1. B 2. A 3. B 4. D 5. B
6. B 7. B 8. B 9. B 10. A
11. C 12. B 13. C 14. A 15. B

2020 (SPECIMEN)
1. A 2. B 3. D 4. D 5. B
6. C 7. A 8. A 9. D 10. D
11. D 12. D 13. A 14. D 15. B
16. A 17. D 18. A 19. D 20. B

2019 (INTERNAL)
1. A 2. C 3. B 4. D 5. D
6. D 7. C 8. B 9. A 10. B
11. C 12. B 13. A 14. B 15. B

2018 (INTERNAL)
1. C 2. C 3. C 4. D 5. A
6. D 7. A 8. C 9. C 10. C
11. D 12. A 13. D 14. B 15. C

2017 (INTERNAL)
16. D 17. D 18. D 19. C 20. B
21. A 22. D 23. C 24. A 25. B
26. D 27. C 28. D 29. C 30. B

2016 (INTERNAL)
1. B 2. C 3. B 4. A 5. C
6. A 7. B 8. C 9. B 10. C
11. D 12. A 13. C 14. A 15. D

2015 (INTERNAL)

1. B 2. C 3. D 4. B 5. C
6. C 7. B 8. A 9. D 10. B
11. B 12. B 13. B 14. A 15. D

2014 (SPECIMEN)

Email: [email protected] ©2022 Page 40 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

1. C 2. D 3. B 4. C 5. C
6. C 7. C 8. C 9. B 10. A
11. A 12. A 13. B 14. B 15. D

SECTION: B

2021-INTERNAL
1. 8 2. Laptop, Tablet, smart phone
3. Internet Service provider 4. Cancel, end
5. Spreadsheet/MS Excel 6. Formatting, Editing
7. Touch Screen 8. Cell address
9. Barcode 10. Ctrl + A
11. Information 12. Backup
13. Virus, worms, trojan horse (malware) 14. Dot Matrix printer, Thermal Printer
15. System Software, Operating System

2021-EXTERNAL
1. Video Graphics Adapter/Array 2. Username
3. Margins, Print Preview 4. Slide Show view
5. Virus 6. multi-user operating system (OS)
7. Recycle Bin 8. Voice Broadcasting
9. Motherboard, External hard drive 10. RAM , ROM
11. MAX() , MIN() 12. Intranet
13. Cybercrime 14. Password
15. Hacking , Hacker

2020-INTERNAL

1. Magnetic Ink Character Recognition (MICR),


2. Hardware and Software
Barcode reader, Optical Mark Recognition (OMR)
3. Formulas 4. Inbox, outbox and Drafts
5. ClipArt Organizer, Folder 6. Cold boot, Warm boot(soft boot)
7. Grammar Check, synonyms, spell check 8. E-Commerce

Email: [email protected] ©2022 Page 41 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

9. Input devices(keyboard/mouse) and VGA


10. Text boxes and Shapes
connector (VGA cable)

2020-EXTERNAL

16. Read-Only Memory (ROM) 17. Offline


18. Copy and Paste 19. Megahertz or Gigahertz
20. Username and Password 21. Rechargeable Battery
22. Mouse and Touchpad 23. Embedded Microprocessor
24. Search Engine 25. Barcode
26. Hacker and Hacking 27. Internet Service Providers (ISP)
28. Active Cell 29. Warm Boot/Soft Boot
30. Images and Menus

2020-SPECIMEN
1. Graphical User (GUI) and Command
2. Recycle bin
line or text user interface
3. Rotate 4. AutoSum
5. Backspace and Enter Key 6. Read-Only Memory (ROM)
7. insertion point (blinking cursor) 8. Trackball and top
9. Printer and Files 10. Software
11. Offline Device 12. Washing Machine and Television
13. Animations 14. Internet
15. Illustrations

2019-INTERNAL
16. Arithmetic logic Unit (ALU) 17. Attachment
18. Modem 19. Bullets and Numbering
20. System and Application 21. Browser
22. Malware 23. Random Access Memory (RAM)
24. Screen and speaker 25. Alphanumeric
26. Forward slash (/) and asterisk (*) 27. Barcode
28. Hard disk/hard drive 29. Peripheral Device

Email: [email protected] ©2022 Page 42 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

30. Ones and Zeros (1 and 0).

2018-INTERNAL

16. Right aligned 17. Picture and ClipArt


18. Internet(Network) 19. Peer to peer network
20. Output, storage and process 21. Enter Key
22. Inkjet Printer 23. Software/program
24. Email, internet 25. Multimedia
26. Animation 27. Back Up
28. Enter key/Return Key 29. Cracking/Hacking
30. Numbers and letters

2017-INTERNAL

16. Local hard disk, DVD and CD 17. Cracking/Hacking


18. Keying/retouching 19. Internet Service Provider
20. Corrupt and delete 21. Highlighting or selecting text
22. Undo (Ctrl+Z) 23. Trackball
24. Ctrl key and Shift key 25. Options or Commands
26. Touch 27. Wireless
28. Lock itself or block user 29. Calendar, posters, flyers, cards, etc
30. Inserting

2016-INTERNAL

16. Alt 17. Icon


18. Megahertz or Gigahertz 19. CD-ROM and DVD-ROM
20. Spacing, ... main content 21. Worm(Virus)
22. Magnetic Ink Character Recognition (MICR) 23. The beginning (first) to the end (last)
24. Password/PIN 25. Digital
26. Ms word, ….. application 27. Search engine
28. Cursor 29. Delete, ….. file
30. ROM

Email: [email protected] ©2022 Page 43 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

2015-INTERNAL

16. Speaker 17. 1.41GB


18. Password/PIN 19. Network, Share
20. Application, System 21. Encryption
22. Electronics/Internet 23. Utility Program (Application)
24. Personal Area Network (PAN) 25. 1s and 0s (machine language)
26. Optical drive, Data 27. ROM, Start(boot)
28. Graphical User Interface and command-line 29. Back or forward
30. Double-clicking

2014-INTERNAL

16. Microphone 17. Deleted


18. Infected by a malicious program 19. Compact Disks (CDs), light
20. Scanner, Camera 21. E-commerce
22. Cell 23. Animations
24. Booting 25. Utility Program
26. Networking, Share 27. Data, volatile
28. Modem, Router 29. Save
30. Fax machine

SECTION: C
2021-INTERNAL
1.
(a) B1 : D1 or (B1, C1, D1)
(b) = B3 * C3 or = Product (B3,C3)
(c) Using auto fill
Select cell D3,
Hold the handle filler,
Drag to cell D7
(d) Number/Numeric
2.
(a) Tablet, Smartphone, modem, etc

Email: [email protected] ©2022 Page 44 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

(b) Internet services, Photocopying, printing, scanning, etc


(c) Vulnerable to virus attacks, Hacking, No privacy.
(d) -Anyone can have access to your account
-Committing fraud using your account (Impersonation)
-Stealing data about the owner of the account
-Can have access to personal data

3.
(a) Memory Card, External hard drive, DVD, SD card, Flash disk, etc.
(b) High transferring speed
It is more durable because it has no moving parts
It is portable
It is reliable
Easy to carry
(c) Backup is used so that it can be used to restore the original copy after a data loss event.
4.
(a) Microwave cooker, Washing Machine, Digital Camera, Television etc
(b) - Loss of Jobs
- Loss of skills/Deskilling
- Workers suffering from R.S.I
- Company data is Vunerable Cyber Attacks/Viruses
(c) - Biometric features eg eyes, fingers etc
- Connecting computer to Security Cameras such as CCTV etc

5.
(a) - Faulty equipment
- Using bare wire (naked socket wire)
- Opening up an electrical device
- Overloading outlet Sockets
- Spilling drinks over water/input device electrical

(b) - Make sure wire are insulated


- Keep drinks away from equipment
- Never open up an electrical device
- Avoid overloading outlets
- Inspect electrical code

Email: [email protected] ©2022 Page 45 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

(c) - Know the location of the fire extinguisher and how it is used
- Turn off the power of the equipment before inspecting
- Never open a power supply or CRT monitor.
- Avoid contacting circuits with wet hands

(d) Backache, Neck pain, Waist pain, etc

2021-EXTERNAL
1.
(e) A - Title Bar B- Group Tabs/bar
(f) File tab
(g) Format Painter
(h) Change the font case i.e uppercase, lowercase

2.

(a) Mobile phone, Tablet or IPad


(b) BCC (Blind Carbon Copy)
(c) Text messages, Voice Calls (VoIP) and Video Calls.
(d) delivered extremely fast, it is Cheap and allows for easy referencing
3.
(a) Refers to a software that can be modified and shared because its design is publicly accessible.
(b) because it is free, it is decentralized, the rapid development cycles and the availability of open
source to everyone.
(c) It is Free and easy to use
(d) Firefox, Moodle, VLC, Linux

4.

(a) A computer virus is malicious code that replicates by copying itself to another program.
(b) Human error, Hardware theft, power failure, etc.
(c) Antivirus is a software used to prevent, scan, detect and delete viruses from a computer.
Anti-spyware is a type of software that is designed to detect and remove unwanted spyware
programs.
(d) Using an antivirus, using the auto save feature, using Power Savers (UPS)

Email: [email protected] ©2022 Page 46 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

5.

(a) Speaker
(b) Speaker and Screen
(c) SD Card
(d) Using a USB (Universal serial Bus) cable, Bluetooth, removing the SD card from camera and put
it laptop.

2020-INTERNAL

1.
(i) A- Memory Card B- Hard disk/drive C- Flash disk/Memory stick
(j) B, C and A
(k) It is sufficient to meet the requirement/ portability and mobility of device A
5.
(a) Hold the Ctrl key while selecting the cells
(b) By dragging (after highlighting and selecting the content, the selected content can be dragged
to column D by moving the mouse from column A towards column D. OR Cut the highlighted
content and paste in column D.
(c) Point the mouse to expenses and right click to see options and choose rename.
6.
(a) Local Area Network
(b) X – is a router, it enables the computers to connect to the internet.
Y – is a server, it accesses, holds and transfers files and data from one computer to another
computer over the computer network.
(c) It is expensive to setup, Covers Limited Area
(d) Domain or URL (Uniform Resource Locator).
(e) 1 – Subdomain 2 – Domain Name 3 – top level domain/ domain extension
7.
(a) A - ALU: performs mathematical calculations OR Control Unit: Controls all functions of the
computer
B – RAM: holds data and instructions temporally, volatile in nature.
(b) C - ROM: holds data and instructions permanently. Non-volatile in nature
D – Output: display data and information to the user.
(c)

Email: [email protected] ©2022 Page 47 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

8.
(a) Modem/Router and ISP (Internet Service Provider)
(b) Cyber-crime, cyber bulling and Malicious software
(c) - Visit and Download software well known websites
- not opening and reading anonymous emails.

2020 (EXTERNAL)
31.
(a) Part A – Tab Key (tabulator key or tabular key) Part B – Shift Key
(b) The tab key ↹ on a keyboard is used to move the cursor to the next tab stop.
(c) The text insertion point moves twice to the right.
(d) Repetitive Strain Injury (RSI).
32.
(a) A Wireless network is computer network that is not connected by cables of any kind.
(b) Advantages – Increased efficiency, Security, Less expensive, access and availability.
Disadvantages – expensive to set up, transfer speed is slow, risk of data leak, difficult to set up.
(c) Network Card or a Modem
(d) 1. Use strong passwords 2. Keeping the Firewall On.
33.
(a) 1. Perform Calculations 2. Browsing the internet.
(b) 1. Tablet 2. Personal Digital Assistant (PDA)
(c) Performing calculations, generating reports, presentations, creating multimedia files
(d) Record keeping, Tracking System, communications systems
34.
(a) Microsoft PowerPoint
(b) Part A – Slides Part B – Ribbon

Email: [email protected] ©2022 Page 48 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

(c) Audio, images, videos (Multimedia files).


(d) 1. Creating Presentations 2. Creating Slide Shows

2020 (SPECIMEN)
1.
(a) It is a method of exchanging messages or ‘mail’ between people.
(b) [email protected]
(c) delivered extremely fast, Cheap.
(d) If the receiver’s email address is wrongly spelt or if sender does not have an internet connection.
2.
(a) Input, Output, Process, Storage
(b) Processing data – Converting data to information
(c) Repetitive Strain Injury (RSI), Eye Strain
(d) Long and hanging cables, Overloading sockets and adaptors, can cause accidents
3.
(a) Microsoft Excel
(b) =SUM(C4:F4) or =C4+D4+E4+F4
(c) Merge and Centre
(d) Kimavu and Mabvuto
(e) AutoSum(), AVERAGE(), COUNT(), COUNTIF(), etc.
4.
(a) It is a program that allows design and layout of documents like cards, magazines, flyers, and so
on in a computer.
(b) Logo, shape and Layout

(c) On the insert tab, click Pictures . In the Insert Picture dialog box, browse to the location with
the picture that you want to insert into the business card, and then double-click the picture
(d) Layout, text and graphic tools
(e) Calendar, birthday card, magazines, flyers, posters
5.
(a) Learning with the use of computers
(b) Camera, tablet, smart phone
(c) Zoom, skype,
(d) Cost-effective, reduced travel expenses, reduced downtime.

Email: [email protected] ©2022 Page 49 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

2019 (INTERNAL)
31.
(a) Microsoft PowerPoint
(b) Part A – New Slide, Part B – Increase font size Part C – Find Text
(c) Add text to the slide/presentation
(d) Find/search for a word within the presentation
32.
(a) Automatic Teller Machine (ATM) Card
(b) Personal Identification Number (PIN)
(c) Name of the card holder, Name of the bank, CVC Number
(d) This is the selling and buying of products online.
(e) i) It allows buying of products online.
ii) it is convenient if you want to buy something that costs a lot of money.
(f) When user input is a wrong PIN
(g) Sim card
33.
(a)

(b) A – Scanner B – Printer


34.
(a) Local Area Network (LAN)
(b) Communication and sharing of files, documents with ease.
(c) Storage Area Network
(d) Modem
(e) Cyber Crime

2018(INTERNAL)

Email: [email protected] ©2022 Page 50 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

31.
(a) Graphical User Interface
(b) A – Task Bar B – Windows start button
(c) A folder is a collection, container and stores multiple files and documents
(d) Google chrome, (MTN mobile connection)
(e) My documents, SAGE Evaluation
32.
(a) Scanner and Microphone
(b) Device E (speakers) useful for a visually impaired person.
(c) Device A (Monitor)
(d) Touch screen
(e) i. Laptops are portable ii. Laptops have low power usage
33.
(a) A – formula bar B – Cell
(b) A1
(c) i. Perform accurate calculations ii. For creation of statistical analysis (charts, tables, etc)
iii. used for record keeping
(d) It is used to enter data or formula to appear in the active cell
34.
(a) Risk of having physical health problems.
(b) i. Repetitive Strain Injury ii. Eye Stain
(c) - By using a password to have access to the computer.
– installing an ant-virus software.
- encrypting sensitive information.
- Restricting usage/access of the computers in school.

2017(INTERNAL)

31.
(f) Bus Network topology
(g) Server
(h) User ID and password
(i) School Computer Laboratory

Email: [email protected] ©2022 Page 51 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

32.
(f) A – Paragraph Marks B- Ruler C- Scroll bar D- Page Number (document info)
(g) When the cursor is put on page 2 of the word document.
(h) i) to control the page margins ii) to change the indentation of paragraphs.
(i) Auto-Save
33.
(e) A - Left button B – Scroll Wheel C – Right Button
(f) Scrolling through a document
(g) A menu will pop up
(h) Double clicking
(i) A mouse is a pointing device hence, it is easy to select, drag.
34.
(d) (i) Ms Publisher, photoshop, CorelDraw, etc
(ii) Ms Spreadsheet Excel, Ms Access
(e) Hardware - Projector
Software – Ms PowerPoint

2016(INTERNAL)

31.
(a) Stage 3 - Hard disk (Storage Device) Stage 4 - Monitor (Output device)
(b) Stage 1 – Input Stage 3 - Output
(c) Processing
32.
(a) A –Network Interface Card (NIC) B- Ethernet cable
(b) i) Share computer resources ii) Simultaneous access (easy access)
(c) i) convenience of mobility, easy to setup ii) wireless is unreliable, can jam any time.
(d) Building a firewall, or update passwords regularly.
33.
(a) A - username B – domain
(b) Email Body
(c) i) you can be vulnerable to virus attacks. ii) you can be victim to cybercrime.
(d) i) Delivery of emails is faster than letters,
ii) emails do not go missing or misplaced during/after delivering.

Email: [email protected] ©2022 Page 52 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

34.
(a) Repetitive Strain Injury (RSI)
(b) Taking regular breaks while using the computer
(c) Joystick/Game Pad/Game controller
(d) – Risk of having physical health problems.
- Playing games all day may lead pupils/Students not concentrate on their academic work.

2015(INTERNAL)

31.
(a) A – Name box
(b) Text, Formula
(c) To add/insert a function/formula from a list of predefined functions
(d) To add/insert a formula or data in the active cell
(e) AutoSum : automatically adds/sums values in the selected cells.
32.
(a) These are numbers in base 2 (1s and 0s).
(b) 8 bits
(c) Industries and advanced scientific labs
(d) Washing machine and refrigerator.

33.
(a) Digital Camera and Smart Mobile Phone
(b) Ms Publisher
(c) Laser color printer
(d) i) Advantage: It is easy to edit and print
ii) Disadvantage: An internal data processing of the printer may take a long time when
processing a large amount of data.
34.
(a) Because these devices don to require a user to make the same movement again and again.
(b) i. Search for files or documents on the computer
ii. Schedule and record meetings
(c) FL Studio

Email: [email protected] ©2022 Page 53 of 57


Computer Studies Paper 1 Grade 8 & 9 Complied by Mr. Thomas Manda BSc Ed, Contact: +260971640421

2014(SPECIMEN)

31.
(a) Device A is a web camera, it is used for video communications.
(b) Device B is a monitor, it outputs/display data or information on the computer screen.
Device C is a printer, it outputs data or information on paper.
(c) i. Try computer troubleshooting
ii. restarting the computer (warm boot/soft boot)
32.
(a) i. LAN covers a small geographical area while WAN covers a wide geographical area such as a country.
ii. LAN has High data transfer rate while WAN can be relatively slow when there is network congestion.
(b) i. convenient for mobility ii. It is easy to implement (setup)
(c) i. free software may contain malicious code or (malicious program/virus)
ii. free software might cause permanent damage top the computer system.
(d) Search Engine (e.g Google)
(e) can be relatively slow when there is congestion on the website(server)
33.
(a) It is a secret code of characters usually alphanumeric.
(b) The service is temporally locked, user may not be able to enter passwords temporally
(c) Changing the password regularly, is a security measure that safeguards credentials.
(d) i) Closing and Locking the computer room with a lock.
ii) Restricting usage/access of the computers in school.
iii) Put out computer room rules, such as no liquids in the computer room
iv) Cover computers are using them.
34.
(a) i. Contribute Moral decay, learners learn and adopt other cultures on the internet
ii. Harmful to learners instead of learning they are distracted with social media and start chatting.
(b) i) Backache - Use fully adjustable chairs to give the correct posture.
ii) Eyestrain - take regular breaks and try focusing on a point which is some distance away.
iii) Electric Shock - check insulation on wires regularly or check equipment regularly

Email: [email protected] ©2022 Page 54 of 57

You might also like