You are on page 1of 2

REPUBLIQUE DU CAMEROUN REPUBLIC OF CAMEROON

------------------- -------------------
MINISTERE DES ENSEIGNEMENTS SECONDAIRES MINISTRY OF SECONDARY EDUCATION
---------------- ----------------
DELEGATION REGIONALE DU CENTRE REGIONAL DELEGATION FOR THE CENTRE
---------------------------- ----------------------------
DELEGATION DEPARTEMENTALE DU MFOUNDI SUBDIVISIONAL DELEGATION OF MFOUNDI
COMPUTER SCIENCE DEPARTEMENT ACADEMIC YEAR : 2022 – 2023 DURATION : 2H
CLASS : FORM 1
Name & Surname :

PART I : Evaluation of ressources (11.5 marks)


1)Circle the letter of the right answer (0.5 X 6 = 3 marks)
Communication
a) Is the act or instance of transmitting information or knowledge between individuals using medium, sign or
behaviour.
b) Is the act of communicating and danse infront of people.
Communication by speech
a) Is a type of communication in which one talk to another or a group of individual
b) Is a type of communication in which speech is used
Communication by symbols
a) Is a type of communication where communication started rendering language visible
b) Is a type of communication when our fingers are used
Computer misuse
a) Is a method that consist to secure materials against unauthorised access or modicafication
b) Is a method that the user can use to avoid errors
Copyright
a) To guard against any uploading, downloading or printing of information which is not authorized by the copyright
law
b) is a law that protect the user
Defamation
a) To guard against ublication of untrue statement which adversely affect the reputation of a person or
group of persons
b) Is a law that allow people to say lies on the others

2-Assessment of skills (8.5 marks)


1)Answer True or False
1-Computer viruses is a program that infect executable files True False
2-Computer Worms these are programs that permit us to copy files from one computer to another
True False
3-A trojan Horse is a program that all function are known by the user True False
4-A Hoax is a program that warns about a noneexistent malicious program True False
5-A Logic Bomb is a program that « detonates » when some events occur. True False
6-Give 02 rules for the ethical use of computer………………………......……………………………
………………………………………………………………………………………………………………..
……………………………………………………………………………………………………..…1mark
7-Write out 02 advantages and 02 disadvantages of using the computer…………………………...
………………………………………………………………………………………………………………..
………………………………………………………………………………………………………………..
………………………………………………………………………………………………………2marks
Define Data processing…………………………………………………………………………………
……………………………………………………………………………………………………………….
…………………………………………………………………………………………………........1mark
PART II : Evaluation of Competents actors (8 marks)

1)Identify the connection ports on the diagram below (0.5 X 9) = 4.5 marks)

2) Complete the following diagram of the processing phases (0.5 X 7=3.5marks)

@By Mr. CLAUDIUS FRANCLIN


System Administration Network and Security Engineer

You might also like