0% found this document useful (0 votes)
32 views7 pages

CS101 Practice Questions Updated

The document consists of a series of questions and prompts related to computer science, covering topics such as abbreviations, software, hardware, operating systems, and data security. It includes questions about specific functions, shortcuts, and concepts in computing, as well as practical applications of technology in various fields. Additionally, it addresses the implications of artificial intelligence and the use of the internet in business and communication.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views7 pages

CS101 Practice Questions Updated

The document consists of a series of questions and prompts related to computer science, covering topics such as abbreviations, software, hardware, operating systems, and data security. It includes questions about specific functions, shortcuts, and concepts in computing, as well as practical applications of technology in various fields. Additionally, it addresses the implications of artificial intelligence and the use of the internet in business and communication.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

1.

Write the full meaning of the following abbreviations:


i. ISP
ii. HTTP
iii. AI
2. A software program that replicates itself and spreads to other computers is
called________
3. ______is the protocol used for sending email over the Internet.
4. _________ is an example of both input and output device.
5. A stylus and a barcode reader are both input devices. TRUE/FALSE [1]
6. Secondary storage devices are being sold at every corner of the street in Harare.
_____ and ______ are example of these devices.
7. ______ is a key combination used to make the text Italics.
8. “Ctrl + V”, is a shortcut for _____. [1]
9. “Ctrl + N”, is a shortcut for _____. [1]
10. Android, UNIX and Symbian are examples of________
11. _____________ software refers to prepackaged software applications or programs
that are commercially available and ready for purchase. However ________ is
designed and developed specifically tailored to meet unique requirements and
specifications.
12. ______ is the term for the practice of regularly backing up data to protect against data
loss from viruses
13. Computer viruses can infect both Windows and Mac operating systems
TRUE/FALSE
14. _________ is a type of computer port that is used for connecting a monitor to a
desktop computer.
15. _________is a component of a graphics card that is responsible for rendering 3D
graphics?
16. The intersection between a row and a column in spreadsheets is known as a____

17. A file created using a spreadsheet package is called a_______


18. ______ is the term for the space between the edge of the document and the text within
it. [1]
19. Which view in Word displays the document, as it will appear when printed? [1]
20. A superscript is a number or a letter that appears little above the normal text
(True/False) [1]
21. Give an example of any DBMS software [1]
22. What is the unit of measurement for the speed of data transfer in a network or storage
device? [1]
23. Which keyboard key is used to delete the character to the right of the insertion point?
[1]
24. Which Excel feature is used to create visual representations of data, such as charts and
graphs? [1]
25. _____ is the function used to round a number to the nearest integer in Excel [1]
26. _____ is the file extension for a PowerPoint presentation [1]
27. Which feature in PowerPoint allows you to add movement and visual effects to text or
objects? [1]
28. What command is used to start a PowerPoint slideshow from the beginning? [1]
29. In a computer, tool used to find a similar or alternative word in a document is called
[1]
30. _______and ______are the two main parts of a central processing unit (CPU) [2]
31. What is the term for purchasing products or services online using a computer or
mobile device? [1]
32. ______ is the term for the practice of using the Internet to harass or threaten others?
[1]
33. The slide that is used to introduce a topic and set the tone for the presentation is called
the____________________ [1]
34. Give an example of an AI system [1]
35. To move data from one part of the document to another, ____is used.
[1]
36. __is widely used to refer to the clock rate of a CPU [1]
37. Secondary storage devices are being sold at every corner of the street in Harare.
_____ and ______ are example of these devices. [2]
38. ____ is a key combination used to make the text Italics. [1]
39. “Ctrl + P”, is a shortcut for _____. [1]
40. “Ctrl + S”, is a shortcut for _____. [1]
41. Type of integrated circuit which consists of arithmetic unit, control unit and some
main store is called a [1]
42. In power point the arrangement of elements such as Title and subtitle text, pictures,
tables etc. is known as? [1]
43. When my computer has been affected by a virus, I use an ______ software to remove
the infection. [1]
44. Which a type of malware either pretends to have, or is described as having, a set of
useful or desirable features but actually contains damaging code. [1]
45. The intersection between a row and a column in spreadsheets is known as a? [1]
46. _____ and ____ are examples of web browsers. [2]
47. A dark border on a cell in Excel indicates the _____________cell. [1]
48. Internet has made it possible for us to access lots of services online. ____ is an
example of such a service. [1]
49. Which keyboard key delete the character to the right of the insertion point?[1]
50. The default cell reference in spreadsheet is known as _____. [1]
51. State any two examples of devices that serve only as an input device. [2]
52. There are a number of operating systems today in the market for mobile and personal
computers. State any three that you know. [3]
53. ROM is an abbreviation of ______. [1]
54. In a computer, tool used to find a similar or alternative word in a document is called
[1]
55. A central processing unit (CPU) consists of two main parts which are_________ and
_______. [2]
56. Computers can be classified in terms of their sizes. State the four classes. [4]
57. Computers that are used in large organizations such as insurance companies and
banks, where many people frequently need to use same data, are [1]
58. If you minimize a window, it is removed from the screen and stored as a (n): [1]
59. The slide that is used to introduce a topic and set the tone for the presentation is called
the____________________. [1]
60. A number of a letter that appears little below the normal text is called a subscript
(True/False) [1]
61. The process of removing unwanted part of an image in MS Word is
called__________ [1]
62. Input and Output devices such as monitors and keyboards are classified as [1]
63. One MB is equal to ___bits [1]
64. When a formatted number does not fit within a cell, it displays [1]
65. _____ is the action of recording the keys struck on a keyboard, typically covertly, so
that the person using the keyboard is unaware that their actions are being monitored.
[1]
66. The ALU of a computer contains a number of high-speed storage elements called [1]
67. A high-quality CAD system uses the ----- printer for printing drawing and graphs
[1]
68. In Microsoft Excel, the _______ bar show the used formula of selected active cell?
[1]
69. The linking of computers with a communication system is called [1]
70. Which category of computers would you place an N- series Nokia phone [1]
71. A device driver is__ [1]
72. What is a NIC? [1]
73. How many bits is a kilobyte? [1]
74. The Zebra stripped identifier on a store product is called [1]
75. In Microsoft Excel, ________ is the shortcut to highlight the whole column. [1]
76. The output quality of a printer is measured by ---------- [1]
77. VDU stands for________________________ [1]
78. A legend with respect to a spreadsheet is…………………. [1]
79. List any two examples of web browsers. [2]
80. MICR is used primarily in_________ [1]
81. Printers that forms characters by physically striking the paper are called [1]
82. List any three Internet Service Providers in Zimbabwe. [3]
83. Which keyboard key delete the character to the left of the insertion point? [1]
84. A device that inputs the sound made by a human voice is called________ [1]
85. State any two examples of devices that serve only as an input device. [2]
86. There are a number of operating systems today in the market for mobile and personal
computers. State any two that are command based. [2]
87. “Ctrl + Z”, is a shortcut for _____. [1]
88. Computers have evolved through a number of generations.
a) List any four characteristics of the first generation of computers. [4]
89. When using google services, the process of creating a new account on google platform is
called --------- [1]
90. In Internet terminology, what does the acronym WYSIWYG stand for? [1]
91. What is the name given to the computer's short-term memory that is lost when the
computer is turned off? [1]
92. The slide that is used to add notes and content about the topic being presented is called
the____________________. [1]
93. If a 5-minute song is sampled at 44 kHz, and each sample is stored as two 8-bit numbers
(stereo), it will need that much space: [1]
94. The process of removing unwanted part of an image in MS Word is called__________
[1]
95. What enables us to send the same letter to different persons? [1]
96. _________and________ are used for creating ordered/unordered list in a document.
[2]
97. Another name for a pre-programmed formula in Excel is [1]

Question 1
a. Explain the following giving an example of each
i. Secondary storage [3]
ii. Bespoke software [3]
b. Discuss any five factors should be taken into consideration when buying computer
hardware for any organisation like Bindura University of Science Education
[10]

Question 2
b) Explain the following modes of communication giving an example of where the mode
is appropriately used:
i. Half duplex transmission [2]
ii. Full duplex transmission [2]
c) List any four signs and symptoms of a computer virus [4]
d) Computers can affect the health of users. Give and explain any three known side
effects of computers on users [6]
e) Computer and data security are an area that demands heavy investment of financial and
at times human resources. Give five measures that can be taken to ensure that
computer and data security is maintained. [10]

Question 3
a. Explain each of the following terms with examples:
i. Quad core processor [3]
ii. Display resolution [3]
iii. Hard drive capacity. [3]
b. A number of organizations are now using internet in offering their services and they
have been exposed to cyber threats.
i. Examine any four pros and three cons of using the Internet. [14]
ii. What is cyber-attack [2]
iii. Explain any four cyber-crimes and also how best can an organization and
individuals prevent themselves from cyber-crimes. [8]
c. Give four symptoms of viruses in computers. [4]
d. State any three ways that are used to prevent computer virus. [3]
Question 2
Artificial Intelligence (AI) has emerged as a transformative force, impacting virtually every
field of study and industry. From healthcare to finance, transportation to entertainment, AI
systems have become essential tools for improving efficiency, making predictions, and
automating complex tasks.

a) Giving examples, explain how you can apply AI to achieve meaningful advancements
or solve critical problems within your field of study?
[6]
Question 1
a. Explain each of the following terms as used in computer networks:
i. Fiber-optic cable [3]
ii. Co-axial cable [3]
iii. Firewall [3]
f)
g) Question 2
a) All over the world, companies and individuals are now using the Internet to do their
day-to-day work.
i. Define the term cloud-computing [2]
ii. Explain the benefits and drawbacks of e-commerce [10]
iii. State any four disadvantages of using the internet at a work place [4]
b) State and explain any four common types of network topologies used in computer
networks. [8]
c) Give four online security measures individuals can take to protect their personal
information while using the Internet. [4]
d) List any three internet-based tools or apps that facilitate remote work and
telecommuting. [3]

You might also like