Computing
Computing
CONSULT
b. Four pseudocode statements and five pseudocode uses are shown. 4marks
Draw one line to link each pseudocode statement to the most appropriate pseudocode use.
Not all pseudocode uses will be required.
Pseudocode statement Pseudocode use
Counti
CALL Colour(NewColour)
ng
Finding an average
Value (A1 + A2 +
A3)/3
Totalli
Loop1 Loop1 + 1 ng
Using a procedure
c. Name the actions for the operators below 6marks
Operator Action
+
-
*
/
^
()
i. Input device
………………………………………………………………………………………………………………
ii. Output device
……………………………………………………………………………………………………4marks
(b) State the three key principles of information security
i………………………………………………………………………………………………………………
ii………………………………………………………………………………………………………………
iii...........................................................................................................................................................................3marks
(c) Explain the following concerning copyright
i. Patent
………………………………………………………………………………………………………………..
……………………………………………………………………………………………………………….
ii. Freeware
………………………………………………………………………………………………………………..
……………………………………………………………………………………………………………….
iii. Shareware
………………………………………………………………………………………………………………..
……………………………………………………………………………………………………………….
iv. Crippleware
………………………………………………………………………………………………………………..
……………………………………………………………………………………………………………….
v. Piracy
………………………………………………………………………………………………………………..
………………………………………………………………………………………………………5marks
i. Cyberbullying
………………………………………………………………………………………………………………..
…………………………………………………………………………………………………………………
ii. Cyberstalking
………………………………………………………………………………………………………………..
…………………………………………………………………………………………………………………
iii. Digital footprint
………………………………………………………………………………………………………………..
…………………………………………………………………………………………………………………
iv. Digital shadow
………………………………………………………………………………………………………………..
…………………………………………………………………………………………………………4marks
(b) Isah is opening a social media account. Help Isah by stating four risks associated with the use of
social media
i. ………………………………………………………………………………………………………………..
…………………………………………………………………………………………………………………
ii. ………………………………………………………………………………………………………………..
…………………………………………………………………………………………………………………
iii. ………………………………………………………………………………………………………………..
………………………………………………………………………………………………………4marks
(c) Explain the following hacking techniques
i. Phishing
………………………………………………………………………………………………………………..
…………………………………………………………………………………………………………………
ii. Keyloggers
………………………………………………………………………………………………………………..
…………………………………………………………………………………………………………………
iii. Denial of service attack
………………………………………………………………………………………………………………..
…………………………………………………………………………………………………………………
iv. Eavesdropping
………………………………………………………………………………………………………………..
…………………………………………………………………………………………………………4marks
4(a) Explain the following in programming
i. Variables
……………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………..
ii. Operators
……………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………..
iii. Controls
……………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………..
iv. Events
……………………………………………………………………………………………………………………………
………………………………………………………………………………………………4marks
……………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………..…………
……………………………………………………………………………………………………………………………
…………………………………………………………………………………………4marks
1. Which of the following functions allows you to 10. Which of the following is a primary key in a
change the appearance of text in a word processing database table?
document? a) A field that uniquely identifies each record in the table
a) Format b) A field that can be null
b) Edit c) A field that is indexed for quick retrieval
c) View d) A field that is encrypted
d) Insert 11. In a spreadsheet, what is a cell reference?
2. Which option in a word processor allows you to a) The name of the spreadsheet file
automatically arrange text in alphabetical or numerical b) The location of a cell, based on its column and row
order? c) The formula used in a cell
a) Sort d) The type of data stored in a cell
b) Align 12. What function in a spreadsheet allows you to
c) Group automatically sum a range of cells?
d) Format a) MAX
3. What is the shortcut key to undo the last action in b) MIN
most word processing programs? c) AVG
a) Ctrl + Z d) SUM
b) Ctrl + X 13. Which of the following is NOT a valid
c) Ctrl + Y mathematical operator in spreadsheet formulas?
d) Ctrl + C a) +
4. Which feature in word processing software helps you to b) %
find and replace specific words or phrases throughout a c) /
document? d) ^
a) Spell check 14. What does it mean to "merge cells" in a spreadsheet?
b) Grammar check a) To combine two or more cells into one larger cell
c) Find and Replace b) To split a cell into smaller cells
d) AutoCorrect c) To format cells as currency
5. What is the purpose of a firewall in computer networks? d) To hide cells from view
a) To protect against viruses
b) To regulate network traffic 15. What does CPU stand for?
c) To improve network speed a) Central Processing Unit
d) To encrypt data transmission b) Computer Personal Unit
6. Which of the following is NOT an example of a network c) Computer Programming Unit
protocol? d) Central Personal Unit
a) TCP/IP 16. Which of the following is NOT a component of a
b) HTTP computer?
c) JPEG a) Monitor
d) FTP b) Keyboard
7. What does the acronym "VPN" stand for? c) Mouse
a) Virtual Private Network d) Java
b) Very Personal Network 17. What is the purpose of an operating system?
c) Virtual Public Network a) To manage computer hardware and software resources
d) Visible Private Network b) To browse the internet
8. Which programming language is commonly used for c) To create spreadsheets
web development? d) To write programs
a) Java 18. What is the purpose of RAM in a computer?
b) Python a) To permanently store data
c) HTML b) To temporarily store data and program
d) C++ instructions that a computer is actively using
9. What is the primary purpose of a loop in programming? c) To control input and output devices
a) To repeat a block of code d) To provide long-term storage
b) To terminate the program 19. Which of the following file extensions typically
c) To generate random numbers indicates a spreadsheet file?
d) To sort data a) .docx
b) .xls
c) .jpg
d) .html
b) To convert digital signals into analog signals for
transmission over telephone lines
20. What is the purpose of an IP address? c) To store data permanently
a) To identify a specific location on the internet d) To prevent unauthorized access to a network
b) To format text in a word document 31. Which of the following is NOT a type of
c) To store data in a database computer memory?
d) To encrypt emails a) RAM
21. What is the process of converting data into a code b) ROM
to prevent unauthorized access called? c) CPU
a) Decryption d) Cache
b) Encoding 32. What is the purpose of a search engine?
c) Compression a) To create spreadsheets
d) Encryption b) To browse the internet
22. What is the purpose of a hyperlink in a document? c) To manage computer hardware and software resources
a) To add formatting to text d) To encrypt data transmission
b) To insert a picture 33. Which of the following is NOT a function of an
c) To provide a quick way to navigate to another location operating system?
d) To embed a video a) To manage computer hardware resources
23. Which of the following is NOT a type of computer b) To create spreadsheets
network? c) To run applications
a) LAN d) To provide a user interface
b) MAN 34. Which of the following is an example of an
c) WAN output device?
d) USB a) Keyboard
24. Which of the following is NOT a characteristic of b) Mouse
a strong password? c) Monitor
a) Contains a mix of uppercase and lowercase letters d) Microphone
b) Contains personal information such as your name 35. What is the purpose of a spreadsheet program?
or birthdate a) To manage computer hardware and software resources
c) Includes numbers and special characters b) To create and manipulate numerical data
d) Is at least 8 characters long c) To browse the internet
25. Which of the following is NOT a valid data type in d) To write programs
most programming languages? 36. What is the primary purpose of a loop in programming?
a) Integer b) Float c) Text d) Sound a) To repeat a block of code
26. What is the purpose of a DNS server? b) To terminate the program
a) To store website data c) To generate random numbers
b) To translate domain names into IP addresses d) To sort data
c) To send emails 37. What is the purpose of ROM in a computer?
d) To provide network security a) To permanently store data
27. Which of the following is an example of an input b) To temporarily store data and program
device? instructions that a computer is actively using
a) Printer c) To control input and output devices
b) Monitor d) To provide long-term storage
c) Keyboard 38. What is the role of the controller in a robot?
d) Speaker a) To provide mechanical movement
28. What does the acronym URL stand for? b) To act as the brain of the robot
a) Universal Resource Locator c) To sense the environment
b) Uniform Resource Language d) To control the temperature
c) Universal Remote Link 39. Which of the following mechanical components of a
d) Uniform Remote Locator robot is responsible for gripping objects?
29. Which of the following is NOT a type of a) Motors
computer virus? b) Pistons
a) Trojan Horse c) Gears
b) Worm d) Grippers
c) Firewall 40. How can sensors contribute to a robot's functionality?
d) Spyware A) By providing mechanical power
30. What is the purpose of a modem? B) By acting as the brain of the robot
a) To connect to a network wirelessly C) By inputting data into a computer system
D) By controlling the robot's temperature