S.6 Test2
S.6 Test2
SUB-ICT TEST
OCT.22.2022 INSTRUCTIONS: ATTEMPT ALL TIME: 2HRS
………………………………………………………………………………………………………………..
………………………………………………………………………………………………………………..
(c). Give two ways ICT has affected work today. 2mks
………………………………………………………………………………………………………………..
………………………………………………………………………………………………………………..
2. (a). Give the difference between soft copy and hard copy. 2mks
………………………………………………………………………………………………………
…………………………………………………………………………………………………………
(b). Mention two examples of computer soft copy display devices commonly used schools. 2mks
………………………………………………………………………………………………………………..
………………………………………………………………………………………………………………..
(c). State advantages of using a softcopy over a hard copy. 1mk
………………………………………………………………………………………………………………..
3(a (i) what is a computer peripheral device? 1mk
………………………………………………………………………………………………………………..
………………………………………………………………………………………………………………..
(ii). State any two examples of peripheral device that are used both as an input and output. 2mks
……………………………………………………………………………………………………………
…..………………………………………………………………………………………………………
c) Define device driver. 1mk
……………………………………………………………………………………………………………
…..…………………………………………………………………………………………………………
d) With examples, give functions of device drivers.
……………………………………………………………………………………………………………
…..…………………………………………………………………………………………………………
4(a). Define a computer laboratory. 1mk
……………………………………………………………………………………………………………..
………………………………………………………………………………………………………………..
(b). Give one way a user can be safeguarded against accident while in a lab. 1mk
………………………………………………………………………………………………………………..
………………………………………………………………………………………………………………..
(c). Mention one way a computer resource can be abused. 1mk
…………………………………………………………………………………………………………..
d) Explain the term computer servicing. 1mk
………………………………………………………………………………………………………………..
e) State one activity carried out during computer servicing. 1mk
………………………………………………………………………………………………………………..
f) State the reasons for carrying out computer servicing.
………………………………………………………………………………………………………………..
5. (a). Define the term computer literacy. 1mk
………………………………………………………………………………………………………………..
………………………………………………………………………………………………………………..
b) Describe the front end booting and back end booting as used in computer management. 2mks
………………………………………………………………………………………………………………..
………………………………………………………………………………………………………………..
………………………………………………………………………………………………………………..
(c). Mention two reasons for restarting a computer. 2mks
………………………………………………………………………………………………………………..
………………………………………………………………………………………………………………..
6. (a).i) Differentiate between a computer file and folder. 1mk
………………………………………………………………………………………………………………..
………………………………………………………………………………………………………………..
b) Mention any two activities that can be done on a computer file. 2mks
………………………………………………………………………………………………………………..
………………………………………………………………………………………………………………..
d) Study the file path given to you:
C:\Users\Budo\Desktop\Exams\SubICT-BOT,2015.docx . 2mks
i Mention the possible application program this file was created.
……………………………………………………………………………………………………
ii State the immediate folder name in which the file is located.
………………………………………………………………………………………………………
7) You are given the following URL:
https://www.kingscollegebudo.sc.ug 2mks
(i). what it the meaning of https?
………………………………………………………………………………………………………………..
(ii). Give the domain name in the URL.
………………………………………………………………………………………………………………..
(iii). Suggest the possible: 3mks
Top Level Domain Name........................................................................................................................
Second Top Level Domain Name………………….. ………………………………………………..
b) A part from http, write down any other communication protocol as used in networking.
………………………………………………………………………………………………………………..
8. a) Define computer malware 1mk
…………………………………………………………………………………………………………
……………………………………………………………………………………………………………
b) List examples of computer malware.
…………………………………………………………………………………………………………
(d). Suggest two possible functions of an antivirus to a computer. 2mks
………………………………………………………………………………………………………………
..…………………………………………………………………………………………………………
(e). Give dangers of computer viruses to computer hardware. 1mk
……………………………………………………………………………………………………………
…..…………………………………………………………………………………………
9 a i) Define computer desktop. 1mk
……………………………………………………………………………………………………………….
ii) Outline any two elements of a normal working computer desktop. 2mks
………………………………………………………………………………………………………
………………………………………………………………………………………………………
b. Define the following as used in Spreadsheets, for example MS Excel: 3mks
Worksheet……………………………………………………………………………………………
………………………………………………………………………………….
Workbook……………………………………………………………………………
10 a) Distinguish between a webpage from a website. 1mk
………………………………………………………………………………………………………………..
………………………………………………………………………………………………………………..
(b). Write short notes on the following types of websites. 2mks
i)Wiki
…………………………………………………………………………………………………………
……..………………………………………………………………………………………………….
A blog. ……………………………………………………………………………………………..
……………………………………………………………………………………………………….
c) What are the advantages of having school website? 2mks
………………………………………………………………………………………………………………..
………………………………………………………………………………………………………………..
11.a) In relation to email communication, write short notes on the following terms. 2mks
(i). bcc……………………………………………………………………………………………….
……..………………………………………………………………………………………………
ii). Foot note………………………………………………………………………………………….
………………………………………………………………………………………………………
12. (a). Define the term data………………………………………………………………………………
……………………………………………………………………………………………………………
(b). Mention two ways data may be misused in an organization.
………………………………………………………………………………………………………………..
………………………………………………………………………………………………………………..
(c). Give two ways data accuracy can be maintained at point of entry.
……………………………………………………………………………………………………………..
………………………………………………………………………………………………………………..
13 a). Mention two dangers of software piracy.
………………………………………………………………………………………………………………..
………………………………………………………………………………………………………………..
(b). Give one way a password can be kept secure.
…………………………………………………………………………………………………………..
c). State any two branches of system software.
…………………………………………………………………………………………………………
……..…………………………………………………………………………………………………
14.a)Use the following application tools to fill in spaces below: (05 marks)
Format Painter, Highlight, Water Mark, Footer, Footnote, Gallery, Insert, Centre, Justify.
i ………………………………….. Inserts a citation, narration, reference in a specific page.
ii Using the ……………………………………….. tool, text is distributed evenly in a page.
iii …………………………………………..….. allows a user to emphasize text in a document.
iv Word art collections can be obtained from …………………………………………. location.
v ………….. allows a user to copy a given pattern appearance to another piece of text in a document.
16) Differentiate green computing and cloud computing 1mk
………………………………………………………………………………………………………………..
………………………………………………………………………………………………………………..
b) List any two the goals of green computing. 2mks
………………………………………………………………………………………………………………..
………………………………………………………………………………………………………………..
(b). Give two requirements for conducting a live video conference.
………………………………………………………………………………………………………………..
………………………………………………………………………………………………………………..
17.a) Define an off - the - shelf software.
………………………………………………………………………………………………………………..
………………………………………………………………………………………………………………..
b) Explain any two functions of an operating system.
……………………………………………………………………………………………………………
…..………………………………………………………………………………………………………
(c). State any two factors to consider before buying a software program.
.
………………………………………………………………………………………………………………..
……………………………………………………………………………………………………………….
18 (a). Mention and explain any two computer crimes in our society today.
…………………………………………………………………………………………………………
……..
……………………………………………………………………………………………………
……………………………………………………………………………………………
19(a). Define the term data communication. 1mk
………………………………………………………………………………………………………………
………………………………………………………………………………………..………………………
b) Give two examples of data transmission media 2mks
………………………………………………………………………………………………………………..
………………………………………………………………………………………………………………
c) Mention two modes of data communication. 2mks
………………………………………………………………………………………………………………..
……………………………………………………………………………………………………………
20 (a). Outline one duty carried out by the following personnels in the computing environment: 2mks
i. Systems designer.
…………………………………………………………………………………………………
……………..…………………………………………………………………………………..
ii. NETWORK ADMINISTRATOR
…………………………………………………………………………………………………
……………..………………………………………………………………………………
b) Briefly describe the concept of computer ethics. 1mk
……………………………………………………………………………………………………………….
……………………………………………………………………………………………………………….
(b) State two unethical practices usually engaged in by ICT users. 2mks
………………………………………………………………………………………………………………..
………………………………………………………………………………………………………………