IT/OS/ICT/CC/01/4/A
USE OF THE INTERNET
NOV/DEC 2024
TIME: 2HOURS
KENDEGE TECHNICAL AND VOCATIONAL COLLEGE
ICT ASSISSTANT LEVEL 4
WRITTEN ASSESSMENT
USE OF THE INTERNET
2 HOURS
INSTRUCTIONS TO CANDIDATES
Answer ALL questions
Candidates should answer the questions in English.
SECTION A: 10 MARKS
1. The following are web browsers, which one is not.
A. Edge
B. Chrome
C. Java
D. Mozilla
2. ____ is an online service that allows users to look for information on the internet.
A. Search engine
B. Firewall
C. Wi-Fi
D. Internet Services
3. A cyber-attack in which attackers use fraudulent emails, messages or websites to deceive
individuals into disclosing sensitive information
A. Trojan horse
B. Spoofing
C. Phishing
D. Hacking
4. Which statement correctly defines the term Internet?
A. interconnection of computers
B. interconnection of communicating networks
C. interconnections of wireless fidelity
D. interconnection of routers
5. The process of getting information from the internet and saving it on a computer is known
as?
A. Uploading
B. Saving
C. Downloading
D. Forwarding
6. _______ is a unique identifier used for locating resources on the internet
A. URL
B. World Wide Web
C. TCP
D. IP Protocol
7. Which statement correctly describes a website
A. Interconnections of webpages
B. Inter-collection of webpages under a single domain
C. Word wide web
D. An online server where information is stored
8. Tabitha Realized that her webpage was responding slowly and then stopped completely even
though her internet was working correctly. Which type of attack was this likely to be
A. Hacking
B. DoS
C. Trojan Horse
D. Spoofing
9. The following are ways of protecting an internet user from internet security threats, which
one is NOT.
A. Virus
B. Passwords
C. Firewall
D. Secure Sites
10. The unique identity of a computer in a computer network is known as?
A. MAC address
B. IP address
C. Computer Number
D. Computer BIOS
SECTION B: 40 MARKS
11. Several needs must be satisfied to obtain internet access. Outline THREE such criteria.
[3 Marks]
12. Makau, an assistant IT Technician, was tasked with protecting the institution's systems
against online risks. Explain TWO ways he might accomplish this. [4 Marks]
13. Jonathan was browsing the internet when he noticed that the web address in the address bar
alternated between http and https: Explain the TWO categories he saw. [4 Marks]
14. Malware is software that often interrupts a computer's regular operation and is widely
utilized by cyber thieves. Explain THREE types of malware. [6 Marks]
15. Explain the following terms as used in the internet
a) Word wide web [2 Marks]
b) Internet Protocol [2 Marks]
16. It is advisable to avoid using public Wi-Fi when doing online shopping. Give THREE
reasons for the need for this precaution. [3 Marks]
17. Explain the functions of each of the following parts of an internet browser.
a) Bookmark bar [2 Marks]
b) Refresh button [2
Marks]
18. The use of the Internet has increased the rate and effectiveness of communication between
entities. List THREE mediums of communication over the Internet. [3 Marks]
19. The usage of the internet has resulted in a loss of morals among young people who are active
users. Explain the other THREE internet limitations that young people face. [6 Marks]
20. Internet users often experience cyberbullying. State THREE strategies to prevent this Cyber
bullying. [3 Marks]