You are on page 1of 12

©2023 TVET CDACC

LEVEL 6
Demonstrate Digital Literacy
July/August 2023

TVET CURRICULUM DEVELOPMENT, ASSESSMENT AND CERTIFICATION


COUNCIL (TVET CDACC)

ASSESSORS GUIDE

TIME: 3 hours.

INSTRUCTIONS TO CANDIDATE
1. This paper has two sections A and B.
2. Attempt questions in each section as per instructions given in the section.
3. You are provided with a separate answer booklet.
4. Answer all questions in the answer booklet.
5. Marks for each question are indicated in the brackets.
6. Do not write on the question paper.

This paper consists of THIRTEEN (13) printed pages.


Candidates should check the question paper to ascertain that
All pages are printed as indicated and that no questions are missing.

Page 1 of 12
©2023TVET CDACC

SECTION A (40 Marks)


Answer ALL questions
1. Computers have been used in most organizations to manage their daily businesses, state TWO
functions of the computers? (2 marks)
 Process data  Researching
 Stores data  Marketing and analysis
 Communication  Advertising
 E-commerce

(Award 1 mark for each correct answer maximum 2 marks)


2. What do you understand by the term computer networking? (2 marks)
 This is the interconnection of computers together using Communication Media
and devices for communication and resource sharing.
(Award 2 Marks for correct definition maximum 2 marks)
3. Define the term network topology. (2 marks)
 This is the interconnection of computers together using Communication Media
and devices for communication and resource sharing.
(Award 2 Marks for correct definition maximum 2 marks)
4. Define the term data security. (2 marks)
 It is the practice of protecting data and information from unauthorized access
(Award 2 marks for correct definition maximum 2 marks)
5. Outline FOUR ways of preventing eye strain while using a computer. (4 marks)
 Reduce the light of the screen
 Take frequent breaks
 Change resolution of our computer
 Adjust your monitor
 Use of anti-glare screen
(Award 1 mark for each correct answer maximum 4 marks)
6. Data security and integrity is one of the core responsibilities of personnel within an
organization. State FOUR security threats an organization is likely to face. (4 marks)

 Hacking  Piracy
 Denial of service  Social engineering
 Phishing  Man-in-middle attack
 Fraud

Page 2 of 12
©2023TVET CDACC

(Award 1 mark for correct answer maximum 4 marks)

7. List FOUR publications that can be produced using desktop publisher (DTP). (4 marks)

 Posters  Certificates
 Calendars  Wedding cards
 AdvertiABCnts  Business cards
 Pamphlets  Flyers
 Brochures

(Award 1 mark for each correct answer maximum 4 marks)

8. State TWO types of cell referencing as used in spreadsheet application. (2 marks)


 Relative cell referencing
 Absolute cell referencing
 Mixed cell referencing
(Award 1 mark for any correct answer maximum 2 marks)

9. Highlight FIVE common errors found in spreadsheet application. (5 marks)


 #value  #####
 #Name  #Null
 #Div/0  #Num
 #N/A  #Ref
(Award 1 mark for any five correct answers maximum 5 marks)
10. Mr. Malachi is tasked with the responsibility of acquiring new computer software to be used
in Sot Training Institute. List THREE factors that he should consider when doing this. (3
marks)
 Hardware compatibility.
 User needs (requirements)
 User friendliness.
 Availability in the market.
 Portability.
 Cost.
 Reliability.
(Award 1 mark each for any three correct answers maximum 3 marks)

Page 3 of 12
©2023TVET CDACC

11. Differentiate between analog and digital computers. (4 marks)


 Digital (discrete) data: Digital data is discrete in nature. It must be represented in
form of numbers, alphabets or symbols for it to be processed by a computer.
Digital data is obtained by counting. E.g. 1, 2, 3 …
 Analogue (continuous) data: Analogue data is continuous in nature. It must be
represented in physical nature in order to be processed by the computer.
(Award 2 marks for each correct explanation maximum 4 marks)
12. Outline TWO types of Software. (2 marks)
 Application Software
 System Software
 Utility Software
(Award 1 mark for each correct answer maximum 2 marks)
13. Allan intends to insert a picture into a slide. State TWO sources he could get this picture from.
(2 marks)
 Pictures from clip Art
 Pictures from File gallery
(Award 1 mark each correct answer maximum 2 marks)
14. Outline advantages of Uninterruptible Power Supply (UPS) in a computer laboratory.
(2 marks)

 Provide power backup in case of blackouts or brownout


 Regulates amount of power getting into computer in case of power instability
 Provide alarms on certain error conditions.

 Monitoring and logging of the status of the power supply.

 Provide short-circuit protection.

 Display the voltage/current draw of the equipment.

(Award 1 mark each correct answer maximum 2 marks)

Page 4 of 12
©2023TVET CDACC

SECTION B (60 MARKS)


Attempt any THREE questions
15. a) ERIEZA Company experienced data loss and damage to computer system. Describe FOUR
causes that led to this. (8 marks)
 Hardware Failure: Hardware components like hard drives, servers, or power
supply units can fail unexpectedly, resulting in data loss or damage. For example, a
hard drive crash or a power surge could lead to the loss of critical data.
 Software Malfunctions: Bugs, glitches, or vulnerabilities in the software being used
by the company can cause data loss or system damage. This can include operating
systems, database software, or third-party applications. For instance, a software
bug might corrupt or delete important files.
 Cyber-attacks: Malicious actors can target the company's computer systems
through various cyber-attacks such as hacking, ransomware, or malware
infections. These attacks can result in data loss, system damage, or unauthorized
access to sensitive information.
 Human Error: Accidental mistakes by employees can also contribute to data loss
or damage. For instance, someone might accidentally delete critical files, mishandle
equipment, or fall victim to phishing attacks that compromise system security.
 Insufficient Data Backup and Recovery Measures: If proper backup and recovery
procedures were not in place, it can lead to data loss. Lack of regular backups or
inadequate backup systems can make it difficult or impossible to restore lost data.
 Lack of Security Measures: Inadequate security practices, such as weak passwords,
lack of encryption, or poor network security, can increase the risk of data breaches
and system damage.

(Award 1 mark each correct point and 1 mark for each correct explanation maximum 8 marks)

b) ABC TTI has set up an internet connection to explain FIVE advantages of the internet to the
school. (10 marks)
 Access to Information: The internet provides instant access to a vast amount of
information, including educational resources, research materials, e-books,
articles, videos, and more.
 Online Collaboration and Communication: Online platforms, such as email,
instant messaging, discussion forums, and video conferencing tools, facilitate real-
time interactions, allowing students to discuss ideas, work on group projects, and
seek guidance from teachers outside of the classroom.

Page 5 of 12
©2023TVET CDACC

 Enhanced Learning Opportunities: Online courses, educational apps, and


interactive websites provide opportunities for personalized learning experiences,
helping students develop their skills and interests beyond the confines of
traditional textbooks.
 Global Connectivity: The internet connects people from different parts of the
world, allowing students to connect with their peers, educators, and experts
worldwide.
 Multimedia Learning Resources: The internet offers a wealth of multimedia
resources, such as educational videos, interactive simulations, podcasts, and
virtual reality experiences.
 Professional Development for Teachers: Online courses, webinars, educational
forums, and educational blogs provide teachers with opportunities to enhance
their teaching skills, stay updated with the latest educational trends, and share
best practices with their peers.
 Educational Tools and Software: The internet provides access to a wide range of
educational tools and software that can enhance the teaching and learning
process.
 Career and College Readiness: Internet access allows students to explore career
options, research colleges and universities, and access resources for college
admissions and scholarship opportunities.
 Current News and Events: time. Students can stay informed about global affairs,
develop critical thinking skills, and engage in discussions about important issues
happening in real-time.
 Digital Citizenship and Internet Safety: Internet access in schools presents an
opportunity to educate students about digital citizenship, real time internet usage,
and online safety.
(Award 1 mark for each correct answer)
c) What is sabotage as used in computer Crime? (2 marks)
Sabotage is the illegal or malicious destruction of the system, data or information by
employees or other people with grudges with the aim of crippling service delivery or
causing great loss to an organization.
(Award 2 marks for correct answer)

16. a). Helen has been requested to propose different types of networking topologies for her
organization. With an aid of a diagram, explain FOUR different topologies. (12 marks)

Page 6 of 12
©2023TVET CDACC

 Star topology: Star topology consists of computers and other devices, each
connected to a common central server called the Hub. However, to connect to the
central machine, each computer uses a separate cable.

 Bus topology (Daisy-chain topology):In Bus topology, all the devices in the network
are connected directly, through appropriate interfacing hardware, to a single
transmission cable called the Bus (or Backbone) on which information is broadcast.

 Ring topology: In a ring topology, the computers are connected to one another in
the shape of a closed loop using a single cable.

 Mesh topology: Mesh topology uses separate cables to connect each device to every
other device on the network providing a straight communication path.

 Tree (Hierarchical) topology: This is a hybrid topology where groups of star-


configured networks are connected to a linear bus (backbone).

Page 7 of 12
©2023TVET CDACC

(Award 2 marks for each topology clearly explained


b) Explain FOUR classifications of Input devices. (8 marks)
 Keying Devices: These devices are primarily used for entering textual data.
Examples include keyboards, keypads, and virtual keyboards on touchscreens.
 Pointing Devices: Pointing devices are used to control the movement of a cursor or
pointer on the screen. They include devices such as mice, trackballs, touchpads,
and track points.
 Imaging and Scanning Devices: These devices capture images or scanned copies of
physical documents or objects. Examples include scanners, digital cameras,
webcams, and 3D scanners.
 Audio Input Devices: Audio input devices capture sound or voice inputs.
Microphones and audio recording devices fall into this category.
 Gesture-Based Input Devices: These devices interpret gestures and movements
made by users to input commands or interact with a system. Examples include
motion sensors, touch less interfaces, and devices utilizing computer vision
technology.
 Biometric Input Devices: Biometric devices capture unique physical characteristics
or traits of individuals for identification or authentication purposes. Examples
include fingerprint scanners, iris scanners, facial recognition systems, and voice
recognition systems.
 Game Controllers: Game controllers are specialized input devices used for gaming.
They can include joysticks, gamepads, steering wheels, motion-sensing controllers,
and specialized gaming keyboards.
 Remote Controls: Remote controls are handheld devices used to wirelessly control
electronic devices such as televisions, audio systems, and home automation systems.
 Sensors: Sensors capture various types of data from the environment or user
interactions. They include devices such as accelerometers, gyroscopes, proximity
sensors, temperature sensors, and light sensors.
 Touchscreen Devices: Touchscreen devices allow users to directly interact with a
display by touching it. This category includes smartphones, tablets, interactive
whiteboards, and kiosks.
(Award 2 marks for each correct answer)

Page 8 of 12
©2023TVET CDACC

17. a) A National Polytechnic wants to network its computers, as an ICT officer of the
organization, explain to the management the FOUR Networking devices they should acquire.
(8 marks)
 Hub (Concentrator): A Hub is a component that connects computers on a
network, and is able to relay signals from one computer to another on the same
network.

 Bridges: This is a network device that selectively determines the appropriate


network segment for which a message is meant to be delivered. It does this
through address filtering
 Repeater: A Repeater receives a signal from one segment of a network, cleans it to
remove any distortion, boosts it, and then sends it to another segment
 Gateways: A Gateway is any device that can be configured to provide access to a
Wide Area Network or the Internet.
 Switches: Unlike a hub, a Switch forwards a data packet directly to the terminal
equipment on the network without broadcasting. It does this by connecting the
two nodes point-to-point as if they were linked by a direct cable.
 Network Interface cards (NIC):A NIC acts as a physical connection
(link/interface) between the computer & a properly terminated transmission
cable.

b) Explain THREE formatting features of Microsoft Word. (6 marks)


 Font Formatting: bold, italic, underline.
 Paragraph Formatting: left, center, right, justified and indentation of paragraphs.
You can set line spacing, adjust spacing before and after paragraphs, and apply
bullet or numbering lists.
 Tables and Borders: Word enables the creation of tables with customizable
borders and shading.
 Page Formatting: page size, margins, orientation (portrait or landscape), and page
borders.
 Headers and Footers: Word allows you to add headers and footers to your
document.
 Hyperlinks and Cross-References: Word enables the creation of hyperlinks to web
pages, email addresses, or other locations within the document.

Page 9 of 12
©2023TVET CDACC

 Text Boxes and WordArt: Word provides text boxes and WordArt for adding
stylized text or decorative elements

c) Microsoft Excel is used for numerical data manipulation using formulas and functions
explain the following as used in MS Excel:
a. Workbook
A Workbook is a file in a spreadsheet package that contains one or more
worksheets

b. Worksheet
Worksheets are made up of rows & columns in which you work and store your
data

c. Cell.
A cell is an intersection of rows and columns
(Award 2 marks for each correct answer)
(6 marks)
18. a) The government has donated fifty new computers to technical training institute. For them to
become useful to the users they must be installed with an operating system. Explain FIVE
functions of an operating system. (10 marks)
 Job scheduling-The processor can only handle one task at a time. A job is a group
of tasks taken as a unit of work for a computer which may include one or more
computer programs, files and instructions to the Operating System. The scheduler
decides which of the jobs is allocated to the CPU for processing.
 Resource control and allocation Includes controlling the use of computer resources
by other system software and application programs being executed. The resources
include I/O devices, CPU and processing time. The OS strives to avoid deadlocks by
allocating resources wisely to tasks or programs that are competing for them. Each
device has unique identification number called an interrupt number. So when two
tasks request to use a resource at the same time, the one with higher4 priority
interrupt is granted control.
 Input / Output Handling The OS coordinates between I/O devices and other
peripheral devices making sure that data flows properly between them and sorting
out any possible confusion. It will also monitor the state of I/o devices and signal

Page 10 of 12
©2023TVET CDACC

any faults detected. It also governs the input/output of data and their location,
storage and retrieval.
 Memory management The OS organize the main memory into partitions and
ensures that each program and the data it requires are allocated adequate space in
memory to access data or instruction, the OS knows where to find each piece of data
as long as the correct address of the partition is used.
 Error handling The OS deals with errors produced during program execution by
expressing what the error is and provides the error correction routines to ensure
smooth operations within the CPU.
 Security Modern operating systems implement security policies such that
unauthorized users cannot get access to a computer or network resource.
 Job sequencing The OS keeps a list of tasks currently being run and arranges them
in a particular order to make it easy for the processor to execute them and to know
how and when to fetch instructions and data for each task. I.e. clocks them in and
out of the processor
b) Outline FOUR examples of utility programs of a computer system. (4 marks)
 Text editor – used to create & subsequently modify textual info using the
computer
 Language translators – used to convert source codes to object codes
 Sort utility – arrange records within a file according to some predetermined
sequence
 Merge utility – combines contents of two or more input files to produce one output
files
 Copy utility – maintains duplicate copies of operational files so that in case
something goes wrong their contents can be recreated from backup copies
 Dump utility– transfers contents of computers internal memory into a storage
media
(Award 1 mark each answer)
c) Printers are one of the most important components for obtaining hardcopy output.
Distinguish between impact and non-impact printers. (4 marks)
 Impact Printers
The print head comes into contact with the printing paper through an ink ribbon to
produce images.
 Non – Impact Printer
Non-impact printers the print head does not come into contact with the printing paper to
produce images while printing

d) Highlight two characteristics of impact printers. (2 marks)

Page 11 of 12
©2023TVET CDACC

 They produce low quality print out


 Produce a lot of heat while printing
 Make a lot of noise while printing

THIS IS THE LAST PRINTED PAGE

Page 12 of 12

You might also like