Professional Documents
Culture Documents
NAME:…………………………………………….………………………………………………………….
PART II: [36 marks]
SECTION B Answer three (3) questions only from this part
This section consist of two parts, Part I and Part II. Answer
all questions in Part Iand any three questions from Part II. Q2a. What is a computer virus? 2marks
b. Mention three (3) effects of computer virus.
PART I:[24marks] 2marks each
Q1a. Study the diagram below carefully and answer the c. Mention two (2) sources of computer virus.
questions that follow: 1mark each
b. ate two (2) ways of protecting your computer from virus.
1mark each
i. What is the name of the window created above? 2marks Q4a. State two (2) main features of the title bar. 2marks
ii. State the main use of the above program. 2marks b. Name two (2) types of toolbar in Microsoft word.
iii. Name the parts labeled A, B, C, D, E and F. 2marks each 2marks
c. At time it becomes necessary to rename our files or
bi. In the space provided below, draw a well labelled folders, what is the procedure you would go through to
computer mouse. 2marks rename already saved file. 4marks
d. How do I empty my recycle bin? 4marks.
10. The series of operation that is performed to 23. Which of these keyboard characters cannot be used to
change the data is create a valid filename?
A. alphabets B. question mark C. numbers D. full stop
A. information B. technology
C. processing D. computer 24. Double clicking of the left mouse button can be to ……..
A. launch application B. save application
11. All the following are found on the standard tool bar
C. delete application D. copy application
except
A. Bold B. Cut C. Undo D. Paste
25. Word processing programs is suitable for
A. scanning files for virus B. typing letters and memos
12. Virus are classed into
C. graphical works D. performing calculations
A. File infection and application virus
B. Application and System virus
26. The appropriate command used for naming a newly
C. Boot sector and File infection virus
created document on the computer is
D. Boot sector and Application virus
A. save In B. save OnC. save With D. save As
13. Virus cleaners are also called
27. One of the navigational tools that can be used to explore
A. Firewall B. Vinegar C. Anti-virus D. Malware
information on the computer is ……………….
A. My Document icon B. Control menu box
C. Tabs D. Buttons
NAME:…………………………………………….………………………………………………………….
PART II: [36 marks]
SECTION B Answer three (3) questions only from this part
This section consist of two parts, Part I and Part II. Answer
all questions in Part Iand any three questions from Part II. Q2a. Mention four (4) storage devices one can use in
storing information. ½ mark each
PART I:[24marks]
b. Copy and complete the table below
1a. Study the diagram below carefully and use it to answer the Storage device Durability Capacity Cost Uses
questions that follow. Hard Disk
CD ROM
Floppy Disk
Pen Drive
½ mark each
c. What is a sub-folder? 2marks
4. Pen drives are connected to the part of the computer system 13. Which of the following differentiates a file from a folder?
through A. file type B. file extension
A. video ports B. USB port C. parallel port D. serial port C. number of characters D. file name
5. To identify files and folders easily in the computer, they 14. The location in the computer’s memory where copies file
must be or folder is temporary stored is called
A. store on the hard disk B. stored on the floppy disk A. My computer B. clipboard
C. given unique names D. stored in My document C. hard disk D. My document
6. The menu in word processing program that contains the 15. The output device of the computer that displays icons and
commands cut, copy and paste is instructions to the user is called
A. file menu B. Edit menu C. view menu D. help menu A. monitor B. printer C. plotter D. speaker
Use the part of the computer below to answer questions 7 to 9 16. A device that send data to the computer is called ………
A. indata B. output C. input D. printer
7. What part of computer is shown above? 18. Copyright is the right of an individual to
A. monitor B. keyboard C. printer D. scanner A. manufacture his products
B. prevent others from unauthorized copying
8. The part of the computer shown is an example of C. Copy peoples products
A. output hardware B. storage hardware D. Beat every thief
C. processing hardware D. input hardware
19. Which of the following are the home row keys for left
9. The computer device is commonly used for………… hand?
A. printing document B. displaying document A. ASDF B. HJKL C. GHSA D. QWEERTY
C. drawing shapes D. scanning pictures
20. All the following are ICT tools except
A. Radio B. Press Iron C. Phone D. Computer 34. The keyboard shortcut that can be used to paste copied text
is ……………..
21. Filenames are important in document creation A. Ctrl + V B. Alt + V C. Shift + V D. Tab + V
because……
A. it makes saving easy 35. Which of these commands can be used to transfer a copy
B. it makes it easy to identify document of selected text to the computer’s clipboard?
C. it makes typing easy A. paste B. cut C. copy D. move
22. All these features can be used to control the size of 36. Which of the following helps connect your connect to
window except communicate on the internet?
A. maximize button B. minimize button A. IP B. HTTP C. ISP D. IPS
C. windows borders D. close button
37. We can send E-mail if you have an
A. Cheque account B. Bank account
23. Which of these keyboard characters cannot be used to C. E-mail account D. None
create a valid filename?
A. alphabets B. question mark C. numbers D. full stop 38. A document printed onto a paper is called ………
A. soft copy B. hard copy
24. Double clicking of the left mouse button can be to …….. C. Paper copy D. raw copy
A. launch application B. save application
C. delete application D. copy application 39. The use of computer to cover the whole world is known as
A. Computerization
25. Word processing programs is suitable for B. Mobilization
A. scanning files for virus B. typing letters and memos C. Globalization
C. graphical works D. performing calculations D. Modern world
26. The position of the cursor in a word processing 40. The network that can link computers from far distance
document where copies text can be paste is referred to as to each other. Example Ghana to Landon is called ……….
………….. A. MAN B. WAN C. LAN D. SAN
A. pasting position B. text position
C. insertion point D. document point