0% found this document useful (0 votes)
35 views5 pages

Grade 5 ET1

This document is an end-term assessment for Grade 5 students in Information Communication Technology for the year 2025. It includes multiple choice questions, short answer questions, and practical application tasks related to computer viruses, malware, and word processing skills. The assessment aims to evaluate students' understanding of ICT concepts and their ability to apply this knowledge in practical scenarios.

Uploaded by

bonifaceombui
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views5 pages

Grade 5 ET1

This document is an end-term assessment for Grade 5 students in Information Communication Technology for the year 2025. It includes multiple choice questions, short answer questions, and practical application tasks related to computer viruses, malware, and word processing skills. The assessment aims to evaluate students' understanding of ICT concepts and their ability to apply this knowledge in practical scenarios.

Uploaded by

bonifaceombui
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

GOOD TESTIMONY INTERNATIONAL – BARAKA

END TERM ASSESSMENT


GRADE 5 END TERM 1 2025

INFORMATION COMMUNICATION TECHNOLOGY

Learner’s Name

Date

Class

SCORE

FOR OFFICIAL USE ONLY


FORMATIVE GRADING FOR INFORMATION COMMUNICATION TECHNOLOGY

Exceeding Meeting Approaching Below


Expectation Expectation Expectation Expectation
Section A: Multiple Choice Questions (5 Marks)

1. Which of the following is an example of a malicious program that can


replicate itself and spread to other computers?
A. Virus
B. Worm
C. Trojan
D. Spreadsheet

2. What happens when you open a computer file that contains a virus?
A. The computer runs faster.
B. The virus spreads and may damage the computer.
C. The file becomes a document.
D. Nothing happens.

3. Which of these is used to adjust the page orientation in a word


processing document?
A. Bold
B. Page Layout
C. Font Style
D. Save As

4. Which type of malware is known for spreading through email


attachments or websites and can replicate itself without needing the user
to do anything?
A. Virus
B. Trojan
C. Worm
D. Spyware
5. What is the function of the "columns" feature in word processing?
A. It changes the font of the text.
B. It splits the text into vertical sections.
C. It adjusts the page margins.
D. It increases the font size.

6. Fill in the table below (4 marks)


Analog Devices Digital Devices

Section B: Short Answer Questions

7. What is a computer virus, and how does it spread? (2 marks)


8. Explain what you understand by the term "malware." (2 marks)

9. Describe two methods to protect your computer from viruses and


worms. (2 marks)

10. What does the "paper size" setting do when preparing a document? (2
marks)

11. Why is it important to set the page orientation correctly before


printing a document? (2 marks)

12. Label the following parts of a computer correctly (10 marks)

13. Match the following terms with their correct description


Column A Column B

Virus The direction in which the document is laid out on


the page (e.g., Portrait or Landscape).

Worm Text formatting style that makes the text darker and
thicker.
Paper Size A type of malware that spreads via email or
websites and replicates itself.
Bold Text A program that damages or disrupts the normal
operations of a computer.
Page The size of the paper used for printing a document
Orientation (e.g., A4, Letter).

Section C: Practical Application Questions (20 Marks)

14. You are working on your school computer and you notice that it is
running very slowly. You also receive a pop-up message asking you to
download an update for a program you've never heard of.

a) What steps would you take to protect your computer from potential
malware? (4 marks)

b) Explain how you would use antivirus software to scan and remove
any threats. (1 mark)

15. You receive an email from an unknown sender with an attachment


named “UrgentUpdate.exe.” You know the sender's email address looks
suspicious.
a) What are the risks of opening this attachment? (2 marks)

b) What steps should you take before opening such emails in the
future? (2 marks)

16. You are at home, using your computer, when you notice that your files
have been moved or deleted without you doing anything. Your computer
also shows strange pop-up messages.
a) Based on what you've learned, what kind of malicious software
could be causing this behavior? (1 mark)
b) How would you protect your computer from such viruses or worms
in the future? (1 mark)

PRACTICAL. (5 Marks)

17. You are working on a report in a word processing program (e.g.,


Microsoft Word or Google Docs).

The report needs to have the following settings:

 The page orientation should be changed to Landscape.


 The paper size should be set to A4.
 The document should be divided into two columns.
 The title of the report should be Bold and the font size should be
18pt.
 The rest of the text should be in 12pt and aligned to the left.

Save your work as “Your name Grade 4 ICT Exam”


for example “Samantha Grade 4 ICT Exam”

You might also like