Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Grade 9 Computer

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

Page 1 of 5

SAMFYA SECONDARY SCHOOL


COMPUTER STUDIES 402/1 GRADE 9 TERM 2 TEST 1 2023
InstructionsTime: 1 hour

Answer all the questions in section A, B and C100 marks No additional materials are
required
Cell phones are not allowed in the Examination Room

NAME DATE

SECTION A [10 marks]


1. Which of the following is not a backup device? A mouse B hard disk C flash disk D
memory card.
2. refers to the whole of the computer hardware components,
peripherals and data communication system. A desktop system B CPU C computer
system D communication system.
3. What is the name given to the storage device below?

A Floppy disk B Memory Card C hard disk D Flash disk


4. Tembo wants to protect his computer from virus attack. He must clean the computer
with …………… A anti software B anti-virus software C virus software D virus malware
5. which of the following is an Optical storage? A flash B phone C Memory card D CD
6. The theft of computer and computer devices is called……………….. A monitor theft B
Computer theft C Copyright theft D hardware theft
7. A................device verifies a person's identity by translating a personal characteristic. A
input B biometric C output D storage
8.is the visual display that people use to communicate with a computer.
A Monitor B Computer C Bluetooth D User interface
9. Computer......................are computer programs specially created to cause harm on a
computer system.

Computer Studies/402/1 2 0 2 3 [Turn over]


Page 2 of 5

A virus B software C Data D hardware


10. RAM stands for ………………..
A Read Access Memory B Random Active Memory C Random Access Memory D
Random Access Monitor
SECTION B [15 marks]
There are ten (10) questions in this section. Answer all.
11. A program that affects the smooth operations of a computer and destroys computer
files is a.............................................................................................................................[1]
12. State two Consequences of hardware theft
i………………………………………………………………………………………………………………………………………
ii.........................................................................................................................................[2]
13................................................refers to the copying and archiving of computer data so that
it may be used to restore original data after a data loss. [1]
14. Arrange the following storage devices in descending order of size Hard disk, CD and DVD
……………………………………………………………………………………………………………………………… [2]
15. State one good habits to prevent virus infections…………………………………………………..
……………………………………………………………………………………………………………………………… [1]
16.................................................................is a device intended to protect electrical devices
from voltage spikes in alternating current circuits. [1]
17. ……………………….. and ……………………….can damage the parts inside a computer. [2]
18. How can a computer user who spends a lot of hours on a computer can avoid health
risks? By............................................................................................................................[1]
19.............................................................Is a type of repetitive strain injury caused by typing
for a longtime on a keyboard and.............................................is a danger posed by
electrical wires that are not covered. [2]
20. The use of icons is a characteristic of.................................................user interface while
the use of text is …………………………………………… user interface. [2]

Computer Studies/402/1 2 0 2 3 [Turn over]


Page 3 of 5

SECTION C [15 marks]


There are three questions in this section. Answer all the questions
21. Study the two pictures below and answer the questions.

A B
(a) What is user interface? ………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………… [2]
(b) Name user interface A and B..........................................................................................and
…………………………………………………………………………………………………………………………………….. [2]
(c) Which of the two interfaces make use of icons?...................................................................[1]
22. In school computers have been introduced to keep data for the school.
(a) State two storage media that can be used to keep data…........................................and
…………………………………………………………………………………………. ………………………………………… [2]
(b) One of the computers is failing to open some files. State what could be the problem to the
file..........................................................................................................................................[1]
(c) What can the school do in order to avoid losing the files.
…………………………………………………………………………………………………………………………………………. [1]
(d) Why is it important to do what you have suggested in question (c) above?
………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………. [1]
23. The school has bought new computers in the lab. You are a school computer lab coordinator.
(a) State one way of caring for computer hardware………………………………………………………………
………………………………………………………………………………………………………………………………………… [1]
(b) State one way of caring for computer software………………………………………………………………
………………………………………………………………………………………………………………………………………… [1]
(c) State two things that can damage the computer............................................................and
…………………………………………………………………………………………………………………………………………. [2]
(d) Why should magnets be kept away from magnetic storage media?
………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………. [2]

Computer Studies/402/1 2 0 2 3 [Turn over]


Page 4 of 5

Marking Key
SECTION A
1. A
2. C
3. C
4. B
5. D
6. D
7. B
8. D
9. A
10. B

SECTION B

11. viruses
12. Loss of information, Inconvenience, Cost, Software theft, Identity theft:
13. Back up
14. Hard disk, DVD, CD
15. Install and regularly update anti-virus software, All floppy disks or peripherals must remain
within the confines of the computer room, Files should be saved to designated hard drive
where incoming files can be scanned automatically, Creating backups of files.
16. Surge suppressor
17. Dirty and water (liquids
18. Get up and walk around every half hour, Work where lights are good, make sure your
posture is correct when you sit at a computer.
19. Wrist pain and electrocution
20. Graphical interface and command line.

SECTION C

21. (a) is the visual display that people use to communicate with a computer.
(b) A = Graphical interface B = Command line interface.
(c) A

22. (a) flash disk, hard disk, CD, Memory Card

(b) corrupt with viruses

(c) Back Up, install anti-virus

(d) in case of loss of data it can be recovered.

23. (a) Keep the computer safe in a clean, cool and dry place, Clean the computer case and

screen regularly, Move the computer only when it is turned off, Turn the computer off

during storms and when there is power surges. This is when the electrical voltage

Computer Studies/402/1 2 0 2 3 [Turn over]


Page 5 of 5

suddenly increase

(b) Shut the system down properly. Never switch it off with a power button or at wall plug,
Install an anti-virus program, Keep software updated, Use firewall to stop people with bad intentions
from entering your system from the internet.

(c) water, dust etc

(d) it can erase data.

Computer Studies/402/1 2 0 2 3 [Turn over]

You might also like