ict f.3

download ict f.3

of 2

Transcript of ict f.3

  • 8/3/2019 ict f.3

    1/2

    1 | P a g e

    MOCK 3

    (January, 2012)

    Informationand Communication Technology

    Section A

    1. Which device is termed as the brain of the computer?2. The vertical line ofcells that stretches top to bottom along a worksheet iscalled.................3. The operation of the computer that helps us to keep information for future use iscalled.....4. The items found on the desktop are called......5. The horizontal line ofcells that stretches left to right across a worksheet iscalled6. The cell in which the cursor iscurrently found iscalled..........................7. A typeface iscommonly known as..........................................................8. ........................commands are used to move selected text from one place to another.9. What method does the computer use to create information?10.The background to the windows desktop iscalled.............................................11.....................contains deleted items from the computer.12.The address of a cell in a worksheet is known as...............................................13.The address of a cell in a worksheet is displayed in the.....................................14.What is the shortcut command to save in word application?15.The type of virus that multiplies on their ownis known as................................16.The law by government to protect original work is known as...........................17.The command is used to change the name of an existing folder using the mouse?18.The permanent storage system in the computer system is the.........................19.The print out from a printer iscalled................20.When a person makes use of an original work and doesnot seek the expressed permission

    from the originator, it issaid to be an..............

    21.Aninternal permanent store of memory whichcan be read but cannot normally be changesis the......................

    22.The command used to make document ready for printing is known as............................23.The official website of the government of Ghana is..........................................................24.Which memory is termed asnon-volatile memory?25.Which memory is termed as volatile memory?26.When a computer is restarted it issaid to have undergone......................................27.To keep files organised, related documents are oftenstored in................................28.The mainsoftware of the computer iscalled...29.The main memory of the computer iscalled....30.The keys you would press to manage a non-responding program are........................31.The initial start-up of the computer is termed...............................32.Anewcomer to the internet iscalled.............33.File management is a task performed by..........34.The key used to switch betweencharacters on the keyboard is............................35.The name given to the rules and regulations that govern the use of the internet is...............36.The speed of the central processing unit is measured in..........................37.The ability of an operating system to run more than one program at a time is.....................

  • 8/3/2019 ict f.3

    2/2

    2 | P a g e

    38.The means by which any program interacts with the user is termed............................39.Ininternet concept, the term http stands for................................................................40.The system which enables the computer to run for a while on backup battery when the

    supply is turned offiscalled......................

    SECTION BAnswer all

    1. (a) Information processing isconcerned with;Input, processing, Output, Storage

    Briefly describe these four elements ofinformation processing using a diagram to

    illustrate your answer.

    (b) Give two advantages of a firm using electronic mail as a method of keeping in touch with

    its large number of travelling salesperson.

    (c) A large company hasintroduced a communicationsystem whichincludes electronic mail

    Thissystem will be used for internal use within the company and for external links toother organizations.

    (i) Describe two features of an electronic mail system which may encourage its use.

    (ii) Compare and contrast the use of an electronic mail system with the conventional way

    ..of postage.

    2. (a) List 4 factors that could give rise to health and safety problems associated with the use oinformation and communication technology equipments.

    (b) Give two advantages and disadvantages ofcomputer-aided learning packagescompared

    withconventional classroom teaching.(c) Describe briefly 2 waysin whichinformation technology can aid pupilsstudying other

    subjects.

    (d) State 2 advantages ofspeech recognitionsystem to a PC user.

    3. (a) The illegal use ofcomputer systemsissometimes known ascomputer-related crimes orsakawa.

    (i) Give three examples ofcomputer-related crimes.(ii) Give 3 steps that can be taken to help prevent computer-related crimes.

    (b) Describe two ways by which a personcould gain unauthorized access to informationstored on a computer.

    (c) Draw the two hands used for typing and label the fingers.

    4. (a) What is an operating system?(b) State 3 uses of the operating system.

    (c) State 4 versions of Microsoft Windows.

    (d) Distinguish between operating system and applicationsoftware.