We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 21
1.
A computer is made up of hardware and
……………….. 2. What is the advantage of using backup tools? 3. What is a white hat hacker? 4. When data is being sent from the computer to the Internet this is called ………….. 5. Draw a star topology. 6. State one advantage of star topology. 7. State one disadvantage of ring topology. 8. Explain in full the acronym LAN. 9. What is cyberbullying? 10. A picture or word that appears when you do not use a computer for a certain period of time is called ………… 11. Name the application used to transfer files from one smartphone to another
12. A …….. is an input device which can take
videos and pictures. A. keyboard B. scanner C. camera D. bar-code reader 13. A ……… is a storage device that can be used in smart phone. A. memory card B. external hard drive C. DVD D. flash drive 14. You get a …….. after printing out information 15. New slide, layout, font and font size are found on ……….. A. view B. home C. slide show D. insert 16. A new presentation can be created from ………. A. blank presentation B. existing presentation C. design template D. title and content 17. Your work must be …….. at regular intervals. A. formatted B. updated C. saved D. deleted 18. ……… is used to create a database. A. Microsoft Power Point B. Microsoft WordPad C. Microsoft Word D. Microsoft Access 19. Give one advantage of saving data on an external device. A. It is portable B. It stores data forever C. If the computer is affected or stolen, you can still access your files D. It has a large memory
20. Name a device that can be used externally
by the computer. 21. Name any two data types used in database creation. 22. State any one program used to create an invitation card. 23. What is the importance of saving your work at regular intervals? 24. What determines whether a certain type of data can be saved in flash disk or not? 25. A …… is a storage device. A. Printer B. Memory card C. WIFI D. ESD tool 26. A …… is a peripheral device of a computer. A. Printer B. Mouse C. Keyboard D. Monitor 27. One of the following is an input part of a computer A. Mouse B. Motherboard C. Speaker D. Camera 28. A ……… is a program used for creating databases. A. Microsoft Access B. Microsoft Word C. Microsoft Excel D. Power Point 29. A database table is made up of fields and ……. A. names B. records C. data types D. queries 30. The process of reducing an unwanted part from an image is known as ….., A. cropping B. editing C. mopping D. reducing 31. We edit images for ……. Purposes. A. beauty B. adding information C. reducing space D. changing its font 32. Which software is used to protect a computer from virus attack? A. Antivirus B. Malware C. Firewall D. Program 33. Which one of the following is an example of a virus? A. Trojan B. Malware C. Spyware D. Firewall 34. <!DOCTYPE html> informs the …….. that this is a hypertext document. A. search engine B. html C. browser D. computer 35. Name any one computer cleaning tools 36. Give one example of an input device of a computer. 37. Give two examples of output devices of a computer. 38. Which part of a computer can be both an input and an output device. 39. Which name is given to programmers who gains access to other people’s accounts without their consent? 40. Which important thing should not be shared when you have opened an account online? 41. Give two examples of social media platforms. 42. …….. is an ESD tool. A. Antistatic mat B. Pliers C. Wire cutter D. Flashlight 43. Name one tool that can be used as a printer cleaner. A. Air blower B. Pliers C. Side cutter D. Torch 44. A multi – meter is used to ……. A. scan B. take measurements C. print D. make phone calls 45. The process of systematically keeping records is known as ……. A. data storing B. database C. data usage D. spread sheet usage 46. The program used to create databases is known as …… A. Microsoft Office Word B. Microsoft Office Power Point C. Microsoft Office Access D. Microsoft Office Excel 47. ……… is whereby someone uses Internet to harm other users. A. Hacking B. Cyber bullying C. Cyber protection D. Internet breaking 48. Which software is used to protect a computer from a virus attack? A. Antivirus B. Malware C. Viruses D. Worms 49. Which software is used to monitor incoming and outgoing data on the Internet? A. Malware B. Antivirus C. Firewall D. Hardware 50. There are ……. main types of a firewall. A. one B. two C. three D. four 51. A collection of web pages under a domain name is known as …….. A. Web page B. Website C. html D. Header 52. What does html stand for? A. hyper text multi languages B. hyper text multi language C. hyper text mark up language D. hyper text made language 53. Which software is used to create a web page? A. Browser B. Html code C. Notepad D. Word 54. Which statement informs the browser that this is a hypertext document? A. <header> B. <body> C. <!DOCTYPE html> D. <html> 55. Why is the cropping of images important? A. It removes the unnecessary part of an image B. It beautifies a bad image C. It saves space D. It changes image quality 56. Which best gadget can be used to take a video for editing? A. A video camera B. A tablet C. A cell phone D. Laptop 57. Name two external storage devices of a computer. 58. Give two examples of computer peripherals. 59. State one gadget that is an output device. 60. What name is given to items like name, age, contacts and ID in a database table? 61.
ID Firstna Surna DOB Contac
me me ts 00 Christia Murwir 10/10/20 00744 1 n a 03 98 00 Musa Adams 09/08/20 00877 2 03 69
What is the information in rows two and
three representing?
62. A crimping tool is part of ……….. tools
A. diagnostic B. cleaning C. esd D. hand 63. A book of instructions on how to operate and maintain a tool is called a ……… A. manual B. chassis C. multi – meter D. cartridge 64. Software faults …….. A. affect hardware performance only. B. affect software performance only C. may indicate hardware problems and affect hardware performance. D. have no fault origin. 65. ………… is a software that can damage files or disable computer systems. A. OS B. DLL C. Malware D. RAM 66. To ………… is to put together an ICT tool. A. disassemble B. connect C. screw D. assemble 67. The purpose of the power supply unit is to …………. A. control power in the unit. B. supply power every component in the unit. C. supply power to the motherboard. D. supply power to the cd/dvd. 68. A ………. is an organised way of keeping records. A. Spreadsheet B. Database C. Query D. Table 69. A datatype that allows you to enter the first name of a record is a ……… A. Look up wizard B. Date/Time C. Text D. Number 70. The best datatype to use for gender is ……….. A. Long text B. Short text C. Number D. Look up wizard 71. A query gets its information from ……. A. a database table B. design view C. an external source D. a user 72. Cutting part of an image in image editing is called ……….. A. cobbling B. cropping C. cutting D. dropping 73. In photo editing the word contrast means ………. A. crop B. black and white C. how bright the tones are D. differences in pictures 74. A ………. stops unauthorised traffic access to your computer through the Internet. A. virus B. firewall C. stop sign D. bookmark 75. Configuring a firewall is ………… a firewall. A. setting up B. updating C. downloading D. upgrading 76. You should avoid ………. when you are on Internet. A. downloading anything that you come across. B. watching videos C. signing up new accounts for social media platforms. D. being on email. 77. Virus scanning can be successfully done when you have …….. A. a fast antivirus B. a working antivirus C. an expensive antivirus D. two antiviruses on your machine 78. dpa stands for ……… A. Data Password Act B. Data Processing Act C. Data Protection Act D. Data Processed Act 79. ……… is an example of a search engine. A. Microsoft Excel B. Phoenix C. Opera D. Ask.com 80. A database for search engines is called …… A. a key word B. an index C. a stop word D. an algorithm 81. …… is when you get educational material from the Internet and save them for use. A. Researching B. Uploading C. Downloading D. Scanning 82. A website is a ……… of web pages under a single domain name. A. writing B. drawing C. single page D. collection 83. ……… is a social setting on WordPress. A. Bank details B. Gamming C. Twitter D. Scratch 84. The …….. page gives information on what the Website is about. A. Menu B. Header C. About us D. Comments 85. …… can intentionally damage information on a Website. A. Researchers B. Hackers C. Authors D. Web Developers 86. ……… is an example of a domain that contains relevant and reliable information. A. .com B. .ba C. .edu D. .co 87. Name the tool you would use to remove dust in a printer. 88. What is the importance of ESD tools? 89. What can possibly be a fault origin of a frozen screen? 90. Why should one wear an ESD wrist band when disassembling ICT tools? 91. Give one reason for editing images. 92. State any two areas that can be edited on an image. 93. Why is cropping done on an image? 94. Explain why would you trim a video. 95. Which tool can best be used to take a video? 96. What name is given to people who gain access into other people’s accounts without their permission? 97. What does html stand for? 98. Which software can be used to create a website? 99. Which term is used to describe a situation whereby one bullies other people on Internet? 100. Which search engine is mainly used for educational purposes?
Lesson Plan For Information Communication Technology Senior Secondary 1 Title 1st Term Examinations For Senior Secondary 1 Information Communication Technology