You are on page 1of 4

Section A: Input and Output devices [12 marks]

1. What type of device is a CPU?

A. Input B. Output C. Storage D. All of the above

2. What type of device is keyboard?

A. Input B. Output C. Storage D. All of the above

3. What type of device is a mouse?

A. Input B. Output C. Storage D. All of the above

4. A speaker is what type of device?

A. Input B. Output C. Storage D. All of the above

5. What type of device is a Hard Disk?

A. Input B. Output C. Storage D. All of the above

6. What type of device is scanner?

A. Input B. Output C. Storage D. All of the above

7. What type of device is a web camera?

A. Input B. Output C. Storage A. All of the above

8. What type of device is a Pendrive?

A. Input B. Output C. Storage D. None

9. What type of device is a microphone?

A. Input B. Output C. Processing D. None

10. What type of device is a Monitor?

A. Input B. Storage C. Output D. Processing

11. What type of device is a Speaker?

A. Input B. Output C. Processing D. None

12. What type of device is a printer?

A. Input B. Output C. Processing D. None


Types of printer [5 marks]

Fill in the blank spaces using the correct type of printer given in each question.

A ___________ printer uses a toner cartridge. The toner cartridges contain a fine powder
called toner spread onto the paper by heat. (Inkjet / Laser)
A printed copy of a document is called _____________ because it is a physical
representation of the document that can be touched and held. (Hardcopy / Softcopy)

The_____________ printer uses ink cartridges to spray tiny droplets of ink onto the paper
and can produce high-quality prints. (Inkjet / Laser)

Which of these options does not refer to the reason why we use printer: ____________. (to
print pictures, print receipts, play game).

The output shown inside the computer is called: ____________? (Hardcopy / Softcopy)

SECTION B: Circle the correct answer

1. Copying of files and data to a different medium (disk, tape, Flash drive, is
called_______________?

A. Copying B. data corruption C. Data Backup

2. The slowest way to backup data is called_______________?

A. Network backup B. Manual backup C. cloud backup

3. The more secure backup method is called________________?

A. Manual Backup B. Cloud Backup C. Windows Backup

4. You should backup your data before______________________.

A. Installing anything new B. anyone can browse the internet


C. opening the computer

5. One of the Window backup utilities is called____________________________?

A. Backup and restore B. File backup C. Backup


D. History file

6. Which option does not refer to the reasons why we backup data?

A. Data could be lost due to failure of the original storage device.

B. Hackers could be responsible for the corruption or even loss of data.

C. Data can be corrupted or stolen.

D. People can easily access our information.

7. Computer network is _______________ connect together


A. One computer B. three or more computers C. Two or more computers

8. Two or more computers connected together over a wide geographical area (e.g. county,
country, globe) is called: _________________________

A. LAN B. PAN C. WAN

9. Which type of Network connects devices in a range of a person?

A. Local Area Network B. Personal Area Network C. Wide Area Network

10. The process by which Bluetooth is connected to a device is called: ____________

A. Discovery B. Pairing C. peer-by-peer

11. All the computers are communicate using the same language called: __________

A. WWW B. Protocol C. Web

12. Network connections are created using: _______________________

A. wires (wired) or Wi-Fi (wireless) B. Printers and scanners C.


Computers and printers

Section B: write true or false to answer the following questions

1._________Virus is a program that is designed to damage and corrupt our computer.

2. ________ A software system used to corrupt our computer is called Antivirus.

3. _________ Firewall is a security network program that protects our computer system
and network from harmful virus.

4._________ Antivirus is a software program that protect our computer from harmful virus.

5._________ hacking means accessing information without legal authorization.

6._________ we should stop using internet to protect our computer from virus.

7. _________if we do not update our antivirus and windows virus will not infect our
computer.

Social and health risks of using computer


1. Mention three health problems caused by excessive use of computer [3 Marks]

______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
Mention 5 places where computers are used

1.________________________ 2.________________________
3.________________________ 4._______________________
5.________________________.

3List three uses of computers for students

_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________.

You might also like