1. SET3 ICT 2007
SECTION A - ANSWER ALL THE QUESTIONS.(36 marks)
Instruction : Circle the correct answer ( No 1 – 12)
1. ______________is any data or instruction you enter into the
memory of a computer.
A. Input B. Output C. Process D. Storage
2. The spreadsheet feature that blocks users from modifying or
erasing information in a worksheet is called
A lock. B shield. C blocker. D protection.
3. When you press a key on a board, the electronic signal is
converted into a binary form that the computer can process and
stored in?
A. Memory B. Character code
C. Computer code D. Morse
4. Camcorders and other video equipments use a to transmit
data onto a computer.
A. USB Port B. Serial Port
C. Parallel Port D. FireWire Port
5. A _______________is designed to connect the system unit
to a musical instrument, such as an electronic keyboard.
A. MIDI port B. IrDA port
C. SCSI port D. FireWire Port
6. For wireless devices to transmit signals to a computer, both
the computer and the device must have a _________________
A. MIDI port B. IrDA port
C. SCSI port D. FireWire Port
7. _________ can transfer information between their mobile
devices to another computer.
A. SOHO users B. Power users
C. Mobile users D. Large business users
8. What is the function of Macro?
A Returning a value from the same table.
B Solving tasks that contain lengthy lists.
C Making use of shortcut keys.
D Automating complex tasks and reducing the number of steps
required to complete tasks that are performed frequently.
9. What are the codes used by computers to send and receive
information?
A. Binary code B. Baudot code
C. Input and output D. Character code
10. Selvi is having a video conference with her colleagues in
India. The most suitable input devices are …………..
I. monitor II. Speaker
III. webcam IV. microphone
A. I & II B. II & IV
C. II, III & IV D. All the above
11.An audio output device can produce ……
I. music II. image III.speech IV. sounds
A. I and II B. II and III
C. III and IV D. I, III and IV
12.The Central Processing Unit (CPU) controls the operation of
the computer. It ….
A. connects the cable to the ports
B. carries out the basic hardware function
C. interprets and carries out the basic instructions that operate a
computer
D. is the socket, where the circuit boards or the adapter cards
can be inserted into the motherboard
Fill in the blank with the correct answer. (No.13 – 17)
13.Computer fraud is defined as the use of computer with
_______________ to get advantage or causing loss to other
people mainly on monetary basis.
14_________ can transfer information between their mobile
devices to another computer.
15. A computer system requires four main aspects of data
handling to function properly which are input devices, processor,
___________, and storage devices.
16. The CPU is an example of a___________. It has the same
importance as the brain to human beings.
17. A _____________is defined as combination of components
designed to process data and store files.
Instruction: Match the correct answer. (No.18 – 21)
Instruction: Choose either ‘True’ or ‘False’.
STATEMENT TRUE FALSE
22. An extranet is a private network that
uses Internet technology and the
public telecommunications system.
23. With e-banking, most of the
transactions can be done at home or
from the office only during banking
hours.
24. LAN is an acronym for Large Area
Network.
25. A server is needed in a peer-to-peer
1
18.
19.
20.
21.
Fetch
Performs the requested instruction,
such as adding two numbers or
deciding which one of them is larger.
Execute
Stores the results in an internal
register (a temporary storage
location or in memory).
Store Determines what the program is
telling the computer to do.
Decode
Retrieves the next program
instruction from the computer’s
memory.
A.
B.
C.
D.
2. network.
26. For communications across the
Internet, we need to have
protocols to demonstrate how data
should be packaged and sent.
27. ROM and Hard disk are examples of
secondary storage.
28. RAM is non-volatile.
29. Microsoft Windows is an example of
application software.
30. Open source software usually comes
without warranty and support should
the software fail or malfunction.
31. Computer threats can come in many
ways either from human or natural
disasters such as fire, flood,
earthquakes, storms and tornados.
32. Proxy gateway is one of the types of
Data Backup program.
33. Virus signature and inoculate a
program file are the techniques that
are used to identify a virus.
34. A computer system is only referring to
the monitor, keyboard, mouse and
central processing unit (CPU).
35. Microprocessor speeds are
determined by their clock speed.
36. Paedophiles are people who exploit
children for sexual pleasure.
SECTION B (20 marks)
Question 1 (4 marks)
Below is a list of step which shows how a BIOS works.
a) Turn ________________ the PC
b) ___________ read instructions from BIOS.
c) Instructions in BIOS tell the computer how to access
the _____________________
d) Instructions in BIOS tell the computer for to find the
operating system.
e) Load the operating system to ________________
Question 2 ( 4 marks)
Instruction: Label the diagram correctly
Question 3 (Student’s Copy)
A _________________ gives authors and artists exclusive rights
to duplicate, publish or sell their materials.
______________ are capable of disabling filters and gateway
software of computer system.
A _____________ includes any activities taken to disrupt the
equipment of computer systems, change processing control, or
corrupt stored data.
Hidden writing, the practice of using password to conceal text.
2