You are on page 1of 28

FERSCOAT COMPREHENSIVE ACADEMY

6, Lawal Close, Off Kosegbe str., Fatolu, Ipaja, Lagos


2/4 Ogo-Oluwatedo Strt. Fatolu, Ipaja. Lagos
E-mail:info@ferscoat.com Website:
www.ferscoat.comwww.ferscoat.com
THIRD TERM SCHEME OF WORK

WEEK TOPIC

1 REVISION/Practical on MS-Excel

2 COMPUTER VIRUS

3 SOURCES OF COMPUTER VIRUS

4 VIRUS WARNING SIGNS

5 VIRUS DETECTION (ANTIVIRUS)

6 REVISION
WEEK 1

Holiday assignment/REVISION QUESTIONS


1. Define technology.
2. List the technology used for each generation of computers.
3. list four input and four output devices.
4. Define information age.
5. Define information transmission.

OBJECTIVES
1. Information can be transmitted through the following ways EXCEPT.
A. courier. B. dancing. C. oral.
D. television E. town crier.
2. The following are examples of electronic media EXCEPT.
A. computer. B. fax. C. radio. D. telegram.
E. television set.
3. The present information age is known as______ age.
A. early B. electronic C. local D. mathematical
E. social
4. An electronic device that is used to process, manipulate and store data is called
A. booting B. computer C. machine
D. radio E. video
5. In data processing circle, the last stage is
A. analyzing. B. code checking. C. collection.
D. distribution. E. processing
6. The first generation of computers were built with
A. copper chip. B. nitrogen chip.
C. silicon chip. D. transistors.
E. vacuum tubes.
7. The characteristics of a good information include the following EXCEPT.
A. accuracy. B. completeness. C. relevance.
D. reliable. E. scanty.
8. The following are non-electronic media EXCEPT.
A. bill board. B. pasculine. C. prints. D. telegram.
E. television.
9. The oldest information age is known as age.
A. early B. iron C. non-electronic D. oracle
E. stone
10. Which of the following is NOT an example of analog computers?
A. Barometer B. Calculator C. Fuel gauge
D. Speedometer E. Thermometer
11. A notebook computer is an example of ______ device.
A. analog B. digital C. electrical
D. mechanical E. mini
12. AT M simple means
A. Activation Teller Machine.
B. Automated Teller Machine
C. Automated Teller Mercury.
D. Automatic Teller Machine
E. Automation Teller Machine.
13. Which of these is an example of operating system?
A. 0 M R B. Mouse C. Spreadsheet
D. UNIX E. Utilities
14. The output device that is common to ALL the fifth generation of computer is A. monitor. B.
plotter. C. printer. D. projector. E. speaker.
15. Which of the following is an application software?
A. CD-ROM B. FORTRAN
C. PASCAL D. SPREADSHEET
E. ZENIX
16. A system software includes
A. d BASE B. RAM C. ROM
D. Spreadsheet E. UNIX
17. Projector is a/an ___________ device.
A. camera B. d BASE C. input
D. output E. processing
18. Which of these is a network topology?
A. Cable B. Machine C. Radio D. Ring
E. Wire
19. Which of the following is NOT used in Information Technology?
A. Computer B. Satellite C. Telegram
D. Webcam E. Website
20. The following are graphic packages EXCEPT.
A. CorelDraw B. logo graphics C. paint
D. photo shop E. power point
21. The following are the features in the paint environment EXCEPT.
A. colour palette B. menu bar
C. printable area D. tool bar
E. view bar
22. The number of arrow keys on a keyboard is
A. 2 B. 3 C. 4 D. 5 E. 6
23. A laser-jet printer is known as a/an_________device
A. input B. input-output C. output
D. software E. storage
24. A gigabyte is equal to______bytes.
A. 105 B. 106 C. 107 D. 108 E. 109
25. The_______elements is associated with integrated circuit of a computer.
A. carbon B. copper C. lead D. silicon E. sodium
26. Read only memory is a kind of______storage.
A. back-up B. external C. information
D. permanent E. temporary
27. A speaker is an example of_________device.
A. dancing B. input C. music D. output E. sound
28. Which of the following is NOT the function of the system analyst?
A. Analysis of existing system with a view to computerizing them
B. Design of computer based system, their implementation and review
C. Input data into computer system
D. Produce flowchart for the programmer to use
E. Responsible to the data processing manager
29. Which of these computer languages can only be run without modification?
A. Assembly B. High level C. Low level
D. Machine E. Program
30. The value of 01012 in base ten is
A. 4 B. 5 C. 6 D. 7 E. 8
Practical on MS-Excel
Basic Formulas in Excel
1. SUM
The SUM() formula performs addition on selected cells. It
works on cells containing numerical values and requires two or
more cells.

2. MIN and MAX


The MIN() formula requires a range of cells, and it returns the
minimum value. For example, we want to display the minimum
weight among all athletes on the E6 cell. The MIN formula will
search for the minimum value and show 60.

The MAX() formula is the opposite of MIN(). It will return the


maximum value from the selected range of cells. The formula
will look for the maximum value and return 82.

3. AVERAGE
The AVERAGE() formula calculates the average of selected
cells. You can provide a range of cells (C2:C5) or select
individual cells (C2, C3, C5).

To calculate the average of athletes, we will select the age


column, apply the average formula, and return the result to the
C7 cell. It will sum up the total values in the selected cells and
divide them by 4.

4. COUNT
The COUNT() formula counts the total number of selected cells.
It will not count the blank cells and different data formats other
than numeric.

We will count the total number of athlete weights, and it will


return 4, as we don’t have missing values or strings.
5.
POWER
In the beginning, we learned to add power using “^”, which is
not an efficient way of applying power to a cell. Instead, we
recommended using the POWER() formula to square, cube, or
apply any raise to power to your cell.

In our case, we have divided D2 by 100 to get height in meters


and squared it by using the POWER formula with the second
argument as 2.

6. CEILING and FLOOR

The CEILING() formula rounds a number up to the nearest given multiple. In our case, we will round 3.24
up to a multiple of 1 and get 4. If the multiple is 5, it will round up the number 3.24 to 5.

The FLOOR() rounds a number down to the nearest given multiple. As we can see in the image below,
instead of converting 3.24 to 4, it has rounded the number to 3.

7. CONCAT

The CONCAT() Excel formula joins or merges multiple strings or cells with strings into one. For example, if
we want to join the age and sex of the athletes, we will use CONCAT. The formula will automatically
convert a numeric value from age to string and combine it.

“24”+“M” = “24M”

8. TRIM

TRIM is used to remove extra spaces from the start, middle, and end. It is commonly used to identify
duplicate values in cells, and for some reason, extra space makes it unique.

For example:

There are extra two spaces at A3 “A Lamusi”, and it has been successfully removed by TRIM.

At A4 “ Christie Jacoba Aaftink”, there is extra space at the start, and without writing any complex
formula, the TRIM has removed it.

REPLACE and SUBSTITUTE


REPLACE is used for replacing part of the string with a new string.

REPLACE(old_text, start_num, num_chars, new_text)

old_text is the original text or cell containing the text.

start_num is the index position that you want to start replacing the character.

num_chars refers to the number of characters you want to replace.

new_text indicates the new text that you want to replace with old text.

For example, we will change A Dijiang with B Dijiang by providing the positing of character, which is 1,
the number of characters that we want to replace, which is also 1, and the new character “B”.

=REPLACE(A2,1,1,"B")

The SUBSTITUTE formula is similar to REPLACE. Instead of providing the location of a character or the
number of characters, we will only provide old text and new text.

SUBSTITUTE(text, old_text, new_text, [instance_num])

In our case, we are replacing "Jacoba" with "Rahim" to display the result on A4 cell “Christine Rahim
Aaftink.”

This formula is quite useful as it does not change the text without “Jacoba” as shown below in cell A5,
“Per Knut Aaland.” Whereas, REPLACE will replace the text every time.

10. LEFT, RIGHT, and MID

The LEFT returns the number of characters from the start of the string or text.

For example, to display the first name from the text “Christine Jacoba Aaftink”, you will use LEFT with 9
numbers of characters. As a result, it will show the first nine characters; “Christine.”

The MID formula requires starting position and length to extract the characters from the middle.

For example, if you want to display a middle name, you will start with “J” which is at the 11th position,
and 6 for the length of the middle name “Jacoba”.

The RIGHT will return the number of characters from the end. You just need to provide a number of
characters.

For example, to display the last name “Aaftink,” we will use RIGHT with seven characters.

11. UPPER, LOWER, and PROPER

The UPPER, LOWER, and PROPER are basic string operations. You can find similar in Tableau or in Python.
These formulas only require a text, the location of the cell containing string, or the range of cells with
string.

UPPER will convert all the letters in the text to uppercase.

LOWER will convert the selected text lower case.

PROPER will convert the string to the proper case. For example, the first letter in each word will be
capitalized, and the rest of them will be lowercase.

12. NOW and TODAY

NOW returns the current time and date, and TODAY returns only the current date. These are quite
simple, and we will use them to extract a day, month, year, hours, and minutes from any date time data
cell.

The example below returns the current date and time.

To extract the seconds from the time, you will use the SECOND() formula.

=SECOND(NOW())

Similarly, TODAY will return only the current date.

To extract the day, you will use the DAY() formula.


Furthermore, you can extract month, year, weekday, day names, hours, and minutes from the date time
data field.

13. IF

The IF Excel formula is straightforward. It is similar to an if-else statement in a programming language.


We will provide the logic of the formula. If the logic is correct, it will return a certain value; if the logic is
False, it will return a different value.

For example, if the BMI of athletics is less than 23.9, the formula will return the string “Fit”, else “Unfit”.
It is quite useful to convert numerical values into categories.

=IF(G2<24.9,"Fit,"Unfit")
WEEK 2

COMPUTER VIRUS

REFERENCE BOOK/MATERIALS: Complete studies in computer/ICT for junior


secondary schools book3 pages 89 - 91 by Atoyebi
Emmanuelhttps://antivirus.comodo.com/blog/computer-safety/what-is-virus-and-its-definition/

MALICIOUS SOFTWARE OR MALWARE

Malware is any software intentionally designed to cause damage to a computer, server, client, or
computer network. A wide variety of types of malware exist, including computer viruses, worms,
Trojan horses, ransomware, spyware, adware, and scareware. Their mission is often to
accomplish unlawful tasks such as robbing protected data, deleting confidential documents or
add software without the user’s consent.

TYPES OF MALICIOUS SOFTWARE

COMPUTER VIRUS

A computer virus is a malicious software which self-replicates and attaches itself to other
files/programs. It is capable of executing secretly when the host program/file is activated.

WORMS

A worm is a malicious software which is similar to a computer virus in that it’s a self-replicating
program. However, a worm automatically executes itself. Worms spread over a network and are
capable of launching a cumbersome and destructive attack within a short period.

TROJAN HORSES
Unlike a computer virus or a worm – the Trojan horse is a non-replicating program that appears
legitimate. After gaining the trust, it secretly performs malicious and illicit activities when
executed. Hackers make use of Trojan horses to steal a user’s password information, destroy data
or programs on the hard disk. It is hard to detect!

Spyware/Adware

Spyware secretly records information about a user and forwards it to third parties. The
information gathered may cover files accessed on the computer, a user’s online activities or even
user’s keystrokes.

Adware as the name interprets displays advertising banners while a program is running. Adware
can also work like spyware, it is deployed to gather confidential information. Basically, to spy on
and gather information from a victim’s computer.

ROOTKIT

A root kit is a malicious software that alters the regular functionality of an OS on a computer in a
stealthy manner. The altering helps the hacker to take full control of the system and the hacker
acts as the system administrator on the victim’s system. Almost all the root kits are designed to
hide their existence.
MORE ON COMPUTER VIRUS

A computer virus is a type of program that, when executed, replicates itself by modifying other
computer programs and inserting its own code. When this replication succeeds, the affected areas
are then said to be "infected" with a computer virus.

It is a malicious program that self-replicates by attaching itself to another program. In other


words, the computer virus spreads by itself into other executable codes or documents.

TYPES OF COMPUTER VIRUS

1. Direct Action Virus


2. Resident Virus
3. Multipartite Virus
4. Polymorphic Virus
5. Overwrite Virus
6. Space filler Virus
7. Boot Sector Virus
Examples of computer virus include creeper, Elk cloner, the morris worm, I love you, code red,
Nimda etc.

WEEKLY TEST 1

---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------

WEEK 3
SOURCES OF COMPUTER VIRUS
REFERENCE BOOK/MATERIAL: Complete studies in computer/ ICT for junior secondary
schools book3 pages 92-93 by Atoyebi Emmanuel
https://www.reveantivirus.com/blog/en/computer-virus-sources
Introduction
Where do computer viruses (and other malware) come from? How do computers get infected by
this software that is created with a bad intent?
Well, the fact that it is a software already suggests that it gets into computers in similar ways that
other software or programs get into computers.
Some of the sources of computer viruses are highlighted below.
• E-MAIL ATTACHMENTS

Anyone can send you an email attachment whether you know them or not. Clicking on
unknown links or attachments can harm your device. Think twice before clicking anything
and make sure that file type is not ‘.exe’. Viruses attach themselves to executable files and so
they execute when these files execute. Don’t open attachments of unsolicited mails from
unknown sources.

• DOWNLOADING PROGRAMS

Programs that contains the downloadable files are the commonest source of malware such as
virus,freeware, worms and other executable files. Whether you download an image editing
software, a music file or an e-book, it is important to ensure the reliability of the source of the
media. Unknown, new or less popular sources should be avoided. That is why many people
use sources like Apple and Amazon.

• INTERNET

One of the easiest ways to get a virus on your device is through the Internet. Make sure to
check URL before accessing any website. For a secured URL always look for ‘https’ in it.
For example, when you click videos published on social media websites, they may require
you to install a particular type of plug-in to watch that video. But in reality, these plug-ins
might be malicious software that can steal your sensitive information.

• PIRATED OR CRACKED SOFTWARE

Every time you open a cracked software, your antivirus software might flag it as a malware
as the cracks consist of malicious scripts. Always say “No” to cracks as they can inject
malicious script into your PC. Many users only buy pirated software. Some of these are
forced to work on PCs without paying proper fees. The security codes around the software is
cracked so as to install it. This is a potential source of computer virus.

• BOOTING FROM UNKNOWN CDS

A malicious software can get into your device through an unknown CD. A good practice to
be safe from malicious infection is to remove CD when your device is not working at all.
Your system could reboot the CD if it is not removed before switching off the computer.

• UNPATCHED SOFTWARE

Unpatched software is also a leading source of virus infection. Security holes in a software
are exploited by attackers and are unknown to software makers until the attackers release
them in the form of zero-day attacks. It is therefore recommended that you install software
updates as soon as they are available on your PC.

• BLUETOOTH/FILE TRANSFER

Bluetooth transfers can also infect your system, so it is important to know what type of media
file is being sent to your computer whenever a transfer takes place. An effective armor would be
to allow Bluetooth connectivity with only known devices and activate it only when required.
Other file sharing networks can also be a source of computer virus attacks too.
• INFECTED STORAGE MEDIA
Auxiliary storage devices like flash drive, CDROM or DVDROM or external hard drive are a
great source of computer virus. A flash drive can copy a virus software along with documents
from an infected PC or from the internet thereby infecting every system it is used on
subsequently.

WEEK 4
VIRUS WARNING SIGNS
REFERENCE BOOK: Complete studies in computer /ICT for junior secondary schools bk3
pages 93-94 by Atoyebi Emmanuel
https://www.reveantivirus.com/blog/en/computer-virus-sources

There are tell-tale signs of virus infection in a computer system. Just like a human body, animal
or plant shows sign of contacting a disease, a computer system shows signs or symptoms of
being infected by a computer virus. Some of them are listed below.
• YOUR COMPUTER BECOMES SLOW: One of the most common computer virus
symptoms is slow down. You can know that your computer has been affected by malware if
your operating system, computer applications, and internet speed begins to drop drastically.
If you note such a tendency and you’re not running heavy applications or programs, there
may be a virus infection.

• POP-UPS: One of the most annoying computer virus symptoms is characterized by


unwanted pop-ups. If these unexpected pop-ups appear on your system, know that your
computer has probably been affected by a virus.

• WHEN YOU ARE SUDDENLY RUNNING OUT OF STORAGE: When a virus executes
it replicates itself through the codes of other programs thereby taking up more storage space
and filling storage space up. The system soon starts to complain of not enough storage.
• UNWANTED PROGRAMS OR MESSAGES STARTING OR COMING UP ON
THEIR OWN.

Some of the warning signs that you should be suspicious about include:

i. Windows shutting down suddenly without reason

ii. Programs opening or closing automatically

iii. Strange windows as you boot

iv. Message from windows that you lost access to your drive

• WHEN YOUR COMPUTER SENDS STRANGE E-MAIL MESSAGES ON IT’S


OWN.

The first step however is to confirm whether the messages were sent from your account.
However, if you discover that you weren’t the sender, then the messages were sent by an
uncontrollable application.

• UNUSUAL NETWORK ACTIVITY:

Sometimes you may not be connected to the internet, and you aren’t running any
applications that can connect themselves to the internet, but you still observe high
network activity. Such computer virus symptoms can be confirmed by using a good
antivirus.

• WHEN YOUR APPLICATIONS ARE NOT RESPONDING

If you have tried to start applications from the start menu or desktop of your computer
and nothing happens, then your computer may be infected.

• MISSING FILES

Your computer will know when something is wrong even before you do. One of the
noticeable computer virus symptoms includes messages that warn you of missing files.

• ADVERTISMENTS

Ads are common when browsing. However, when you see them when not browsing, this
could be a sign of a virus.

• PRINTER ISSUES:
If your printer seems to have a mind of its own and randomly prints documents,
you could possibly be dealing with a virus.

• COMPUTER MALFUNCTION

Computer viruses can cause your computer to do all kinds of strange things. When your
computer starts to open files on its own, or acts like keys have been clicked, then you
may be experiencing computer virus symptoms.

• MANY INCOMPREHENSIBLE DIALOGUE BOXES

If your computer opens up many dialogue boxes on your screen all at once, this can be a
sign of malware and that suspicion is higher if most of the dialogue boxes show gibberish
messages that are not easily decoded.

• HARDWARE MALFUNCTION

When your keyboard types on its own or CDROM drive opens and closes at will without
being operated or the mouse pointer moves around on the screen uncontrollably etc. then
that computer is infected.

• AFFECTED APPLICATIONS

Some viruses are created to affect some applications, and as a result your computer may
fail to run such applications until they are reinstalled.
WEEKLY TEST 2

---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------

WEEK 5
VIRUS DETECTION (ANTIVIRUS)
REFERENCE BOOK: Complete studies in computer/ICT for junior secondary schools
book3 page 94 by Atoyebi
Emmanuel.https://www.researchgate.net/publication/228937695_Computer_virus_strategies
_and_detection_methods

With the extensive use of the Internet, networks, and email, computers have become more
vulnerable to virus attacks and threats. A virus can spread any time when files are shared on a
local system or the Internet and can do tremendous damage to individual PCs and network
servers. Therefore, an early detection and prevention mechanism is very important for the
security of the computer.
Using Antivirus software is a good way to detect viruses and it is advisable to use Anti-virus
software on network operating systems and workstations for adequate protection. The
widespread use of the always-on broadband, Wi Fi, USB connections in home and small office
networks has raised the need for proper Antivirus software. Antivirus software is specifically
written to defend a system against the threats that malware presents.
DEFINITION
An Antivirus is a software program you install on your computer or mobile device so as to
protect it from being infected by a computer virus (or other malware).
Examples of computer antivirus software are AVG, Norton, Avast and Kaspersky.
HOW AN ANTIVIRUS WORKS
Antivirus software runs in the background on your computer, checking every file you open. This
is generally known as on-access scanning, background scanning, resident scanning, real-time
protection, or something else, depending on your antivirus program.
When you double-click an EXE file, it may seem like the program launches immediately – but it
doesn’t. Your antivirus software checks the program first, comparing it to known viruses, worms,
and other types of malware. Your antivirus software also does “heuristic” checking, checking
programs for types of bad behavior that may indicate a new, unknown virus.

VIRUS DEFINITION

Virus definition is information and data gathered about a known virus, its codes and behavior
and this can be used to identify it and its variants.

Your antivirus software relies on this information to detect viruses. It must have information
about a virus to identify it as that virus. It’s like having descriptions of a person or even a
person’s photograph. You identify him/her because the features match the descriptions you
have. That’s why it automatically downloads updates once a day or even more often. Updates
are new information that the Antivirus vendor or developer has just gathered about new viruses.

The definition files contain signatures for viruses and other malware that have been encountered
in the wild. When an antivirus program scans a file and notices that the file matches a known
piece of malware, the antivirus program stops the file from running, putting it into “quarantine.”
Depending on your antivirus program’s settings, the antivirus program may automatically delete
the file or you may be able to allow the file to run anyway.

WHAT IF THE VIRUS IS UNKNOWN OR IS NEW?

Heuristics is the answer to this. Heuristics allow an antivirus program to identify new or
modified types of virus even without virus definition files. For example, if an antivirus program
notices that a program running on your system is trying to open every EXE file on your system,
infecting it by writing a copy of the original program into it (i.e. it’s behaving strange), the
antivirus program can detect this program as a new, unknown type of virus.

However, no antivirus software is perfect as it can flag some programs as being a virus while
they are not.
WEEKLYTEST 3

-------------------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------------------------

WEEK SIX – START OF BECE


REVISION & PRACTICAL
Using of AWKA series and the LASWELL evergreen past questions with
Intensive Practical

WEEKLY TEST

---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
MORE REVISION QUESTIONS

• The supervisory software of a computer is called _____ (a) operating system (b) high –
level language (c) transistor

• An example of application software is called _____ (a) Ms excel ( b) Ms dos (c) Unix.

• Which of the following has negative impact on ICT on the society? (a) Employment (b)
perpetration of fraud (c) data processing.

• The following are use to classify computer EXCEPT (a) purpose (b) type (c) size.
• The following are example of Operating system EXCEPT (a) windows (b) Linux (c) page
maker.
• Convert 30ten to hexadecimal (a) 1E (b) F2 (c) 2F.
• Covert 1111012 to decimal (a) 16 (b) 61 (c) 72.
• Binary digit is also known as _____ (a) byte (b) bit (c) nibble.
• The world – wide connectivity of computer is known as ____ (a) O ‘ NET (B)
INTERNET (c) FAX
• The intersection of row and column in spreadsheet application is called. ______ (a) work
sheet (b) cell (c) column-row
• Another name for the Monitor is _____ (a) VDU (b) DUC (c) UCD
• Information displayed on the monitor screen is ____ (a) hardware (a) spyware (c)
softcopy

• The longest key on the keyboard is ______ (a) return key (b) control key (c) space bar
• Flash disc is an example of ____ (a) storage device (b) ALV (c) control device.
• The software for cleaning virus – attack in the computer system is called _____
(a)vaccum cleaner (b) anti – virus (c) virus – erazor.
• A presentation is created using _______ (a) MS – Excel (b) Ms- power point (c) corel
draw.
• What is the full meaning of BASIC? (a) Beginners All - purpose Symbolic Instructional
Code. (b) Be all symbolic instruction code (c) Basic symbolic code.
• What is the output of the following program segment?
10 LET A = 10
20 LET C = A^ 2
30 PRINT C
(a) 2 (b) 100 (c) 20

• which of the following is an example of search engine (a) Google (b) Data (c) Glass

• yahoo mail is used mainly for ________ (a) sending and receiving (b) playing games (c)
degrame.

• which of the following is an example of ICT gadget? (a) Drum (b) Telephone (GSM) (c)
Ruler.

• program currently in use for processing data are in ______ (a) Hard – Disk (b) ROM (c)
RAM

• storage currently in use when processing data is _____ (a) RAM (b) flash disk (c) ROM .

• A person that uses computer to accomplish a particular objective is referred to a _____


(a) user (b) Programmer (c) Scientist.

• Deleted files in the computer can be found in the (a) printer (b) icon (c) Recycle bin.

• How many bits are there in 4 – bytes? (a) 8 (b) 24 (c) 32.

• The part of a computer that holds data and instructions is (a) ALU (b) memory unit (c)
control unit.

• The lowest unit of measuring information in a computer is ______ (a) byte (b) bit (c)
megabyte .

• Charles Babbage invented difference engine in ______ (a) 1833 (b) 1923 (c) 1642

• Information stored in RAM is ______ (a) volatile in nature (b) non – volatile (c) virus.
THEORY

• (a) i. Define information.


ii. In what way is information different from data?
(b) List five qualities of good information
• (a) What is a computer?
(b) Distinguish between computer hardware and software.
• Convert the following:
(a) 111011102 into octal system.
(b) 56218 into decimal.
(c) 1001100102 into hexadecimal
(d) 2568 into hexadecimal

• (a) What is the full meaning of the acronyms BASIC?


(b) Mention 5 BASIC statements that you know.
(c) Write a BASIC program that will add set of three numbers.

CLASS EXERCISES/ASSIGMENTS
WEEK ONE
CLASS ACTIVITY 1
perform 6 fuctions on data providered by yourself which would be items bought by ten
customers and their prices presented in rows and colums.
perform 5 functions on the scores of fours subjects writen by seven children presented in rows
and columns.

ASSIGNMENT
List 10 examples worksheets.
WEEK TWO

CLASS ACTIVITY 1
1. The term malware in full is ……………………………………
2. A computer virus is a……….
3. Hardware (b) software (c) people ware (d)all of these
4. A computer virus is a type of malware. T/F
5. ………..…… and ………….…are other types of malware.
6. A virus replicates itself. T/ F
CLASS ACTIVITY 2
• A worm is similar to a virus in that it ………………
• is a hardware (b) moves (c) replicates (d) all of these
• …………………..is a non-replicating malware.
• Virus (b) Trojan horse (c) worm (d) antivirus
• A worm differs from a virus in that it does not ………………….
• Attach itself to other files (c) destroy files
• Replicate fast (d) execute
• A virus activates when the host file is executed. True/ False
• A worm does not need a host program to execute. True/ False
ASSIGNMENT
1. Define computer ethics.
2. The creation and launching of a malware is a/an….…of computer.
3. List five types of malware.
4. Give 2 examples of computer virus.
5. The malware that secretly records information from the host computer and sends it to a
third party is called a………………………………

WEEK THREE
CLASS ACTIVITY 1
1. The major way by which computer viruses spread is via the ……
Air (b) light (c) internet (d) satellite
2. Viruses can also spread through the use of auxiliary storage devices. T/F
3. E-mail attachment is a possible way by which a computer can get a virus. T/F
4. When you download files from the internet, you must be sure of the …...........in order to
avoid a virus.
5. List any three ways by which computer can get virus

CLASS ACTIVITY 2
1. A secured protocol for accessing the web is ………….(a) http (b) https (c) ftps
(d) ftp
2. Viruses can execute on their own without an executable file to attach to. T/ F
3. File Transfer via Bluetooth or xender can bring computer virus. True/ False
4. The solution to unpatched software a s a potential source of computer virus is to install
software…………….. (a) CDs (b) updates (c) packs (d) solution
5. A cracked software is a…………………software. (a)Pirated (b) purchased (c)
original (d) designed
6. List 2 ways to protect computer from virus

ASSIGNMENT
List 5 examples of Antiviruses
WEEK FOUR
CLASS ACTIVITY 1
1. Hardware malfunction is one the symptoms of computer virus. T/F
2. File loss is a symptom of computer virus. T/ F
3. Slow start-up may be signaling a virus attack. T/ F
4. A computer virus will be activated when the ………file it is attached to is opened or
begins to run. (a) doc (b) .exe (c) .txt (d).com
5. Viruses that affect the boot sector of computers are called ………virus.
6. (a) boot sector(b) I love you (c) .exe (d) creep
7. List 2 signs of virus on the computer system

CLASS ACTIVITY 2
1. When your printer prints on its own without you sending a print instruction, your system
may be infected by a virus. T/ F
2. Give one example of computer virus.
3. An example of auxiliary storage device is …………….(a) RAM (b) flash drive (c) hard
disk(d) motherboard
4. An auxiliary storage device can be a source of computer virus. T/ F
5. List 4 auxiliary storages that can transmit virus from one computer to another

ASSIGNMENT
• Define a computer virus
• List 5 sources of computer virus.
• Who is a programmer?
• Copying files from a computer on the internet into your local computer is called

WEEK FIVE

CLASS ACTIVITY 1
1. Define computer antivirus.
2. Give 2 examples of computer antivirus software
3. Antivirus vendors constantly release ……… that will make their antivirus software continue
to be effective. (a) New software (b) updates (c) patches (d) news
4. Can antivirus software detect and delete all virus software? Yes/No
5. Computer virus causes a lot of economic loss. T / F
CLASS ACTIVITY 2
1. Information about viruses stored in an antivirus software to help it identify viruses is
called virus …………………… (a) Picture(b) definition(c) secret(d) name
2. The process of making your antivirus check through your entire system to check if there is
any virus infection is called system ………………. (a) Check (b) combing(c)
raking(d) full scan
3. An antivirus automatically scans any program that you want to open or run. True/ False
4. Is it possible for antivirus software to flag a program as being a virus while it is not? Yes/
No
5. Mention 5 antiviruses you know.
ASSIGNMENT
1. How many megabytes are in 2 terabytes?
2. Convert 111110001112 to base 16. Show workings. Use the 4-bit method.
3. …………….is a computer accessory.
4. If the input into a certain logic gate is 0, the output is 1. Which gate is that?
5. Which logic gate takes only one input signal?

ASSIGNMENT
1. Define virus definition.
2. Computer virus always attaches itself to executable files. T/ F
3. Malware means?
4. Define computer antivirus.
5. Convert 3FB16 to base 8.

You might also like