Data Processing
Data Processing
1. _______ is the program which makes it possible for the working of internal operations of a
computer. (a) system software (b) system hardware (c) operating system (d) desktop publishing
2. _______ is the pivot upon which the working of the computer revolves. (a) VDU (b) CPU (c) IP (d)
SIP
3. These are examples of graphic packages (a) PowerPoint (b) PDF (c) Ms-word (d) none of the
above
4. Write three uses of graphic packages (I) _________. (Ii) _________. (III) _________
5. Write three features of CorelDraw (I) _________ (Ii) __________. (III) _________
6. Give two examples of graphic packages (I) _________ (Ii) _________
7. Write three types of software (I) ________ (Ii) ________
8. CorelDraw can be used to prepare (a) invitation card (b) arithmetic work (c) animation (d) all of
the above
9. CorelDraw is a/an ______ software (a) system (b) application (c) ICT (d) people
10. Describe the CorelDraw environment
11. List three basic items of CorelDraw (I) ________ (Ii) ________ (III) _________
12. Write two uses of CorelDraw
13. Who is web designer?
14. What is web design package ?
15. What is website?
16. www means _________________
17. Where there uses of web design packages. (I) _________ (Ii) ___________ (III) __________
18. Define Internet. _________________
19. The internet can be used to _______ (a) browse (b) chat )c) communication (d) all of above
20. What is Presentation package?
SS 1
1. The use of digital techniques to change a business model and provide new provide new
revenue is _________ (a) communication (b) digitalization (c) regulation (d) ethics
2. ________ copy stores data in the form of form of physical files. (a) hard (b) soft (c) boot (d)
cool
3. ________ has data and information in the form of virtual files. (a) soft copy (b) drive (c) disc
(d) nature
4. ________ is an example of hard copy. (a) teleprinter pages (b) scanned copy (c) PDF )d)
word document
5. An example of soft copy is ________ (a) e-books (b) radio photo prints (c) computer print
out (d) B and C
6. ________ refers to conversion of non- digital material to digital form (a) digitalization (b)
data transfer (c) transcription (d) none of the given
7. A common reason for changing an information system is (a) new requirement (b) problem in
the exiting (c) all of the above (d) new technology
8. Input devices that use a special ink that use for converting into digital format (a) digitizer (b)
digital pens (c) light pens (d) MICR
9. What is another word for ethics? (a) loyal (b) character (c) value (d) honesty
10. Etiquette on the internet is known as ______ (a) intiquette (b) nettiquette (c) etiquette (d)
webiquette
11. A fraudulent act designed to trick individuals into spending their time and money for little or
no return is called _______ (a) attack (b) worm (c) virus (d) scam
12. The term used to describe harmful stress associated with computer use ________ (a) stress
injury (b) comp stress (c) cyber-stress (d) techno-stress
13. _______ refers to set of moral principles that regulate the use of computer (a)!safety
measures (b) computer ethics (c) computer software (d) computer
14. A computer crime ________ (a) an illegal activities in which the perpetrator uses special
knowledge of computer technology ((b) an immoral action in which the thief was special
knowledge of computer technology (c) activities in which the thief uses computer
technology (d) any threat to computer or data security
15. Safety measures are needed to protect computer against _______ (a) professionalism (b)
experts (c) hazard (d)!all of above
16. ________ is a place where students learns practical uses of computer (a)! biology lab (b)
chemistry lab (c) computer lab (d)! computer village
17. Spilling liquids on computer can cause _______ (a) effectiveness (b) dust free (c) electrical
fire (d) tripping
18. Students need to cook for cables in the computer lab to avoid ________ (a) connection (b)
tripping (c) electrocution (d) all of the above
19. ________ refers to using the computer to create, edit and print documents. (a) word
process (b) word processing (c) word processor (d) word perfect
20. The following are examples of word processors are EXCEPT ________ (a) access (b) MS word
(c) word star (d) word perfect
THEORY.- Answer three questions only
1a. Define computer Ethics. b. List 3 computer ethics
2a. Define Digitalization of data. b. Mention the three types of computer
3a. List 5 safety measures for computer users b. What is safety measures?
4a. What is word processing? b. State 5 applications for word processing
2a. What is device? (b) define INPUT DEVICE and OUTPUT DEVICE
4a. Write the functions of these keys on the keyboard. I. Numeric keys:________. Ii. Control
keys:________ III. Enter key:_________ iv. Caps lock keys: __________
1. The internet connects _____ all over the world. (a) electricity (b) machinery (c) computer (d)
dartorola
2. The internet enable people to ______ information (a) truncate (b) subdue (c) share (d) eradicate
3. One major disadvantage of the internet is that, it can be used for _______ (a) education (b)
frustration (c) business (d) internet fraud
4. W.W.W simply means ______ (a) worldwide wider (b) what went wrong (c) world wide web (d)
world wide wonde
5. The ________ is global connection system (a) internet (b) cable (c) wire (d) rod
6. The internet is primarily designed for _______ (a) fraud (b) abuse (c) communication (d) quarrel
7. _______ is an electronic device used for internet activities (a) television (b) microcosm (c) laptop
(d) handtop
8. _____ is a new way of abusing the internet (a) chatting (b) researching (c) making calls (d)
fraudulent activity
9. Users who hack other people’s internet account are called ______ (a) criminals (b) thieves (c)
hackers (d) users
10. One of the disadvantages of using the internet is the presence of _______ (a) users (b) tourist (c)
blackmailers (d) advertisers
11. ______ is an example of the internet environment (a) theory (b) room (c) internet (d) cables
12. ______ helps to locate website (a) chat (b) group (c) internet browser (d) section
13. ______ is an internet network (a) page (b) yahoo(c) desktop (d) handtop
14. Internet environment helps in various internet activities (a) true (b) false
15. Internet search ______ are huge database (a) engine (b) frame (c) toy (d) plate
16. ______ helps in locating information (a) track (b) data (c) search engines (d) groups
17. File sharing helps in _______ (a) problem (b) banters (c) viewing information (d) creating crime
18. File sharing can be done on _____ group (a) Whatsapp (b) unknown (c) telephone (d) nortural
19. Ethics simply means moral ______ (a) heart (b) principles (c) institution (d) adage
20. Computer environment requires adequate _______ (a) water (b) oil (c) ventilations (d) chemicals
2a. What is safety measures? (b) list 3 safety measures to be taken when using the computer.
5a. State two benefits of the internet. (b) state two ways of abusing the internet