Ict Test 3
Ict Test 3
Ict Test 3
1
A. Software.
B. Hardware.
C. Scroll bar.
D. Flash drive.
1.4 Microsoft Office 2013 is an example of (1)
A. Application Software
B. Microsoft word
C. System Software
D. Antivirus program
1.5 Which of the following is an example of a computer threat? (1)
A. Wi-max
B. Ms-word
C. Anti-virus
D. Trojan
QUESTION 2 (5 MARKS)
Match the statement in column A with corresponding term in column B e.g. 2.1 C
Column A Column B
2.1 An electronic device that has the ability to store, retrieve and A.Application
process data. software
2.2 A computer program used to prevent, detect and remove B. Viruses
malware
2.3 The physical components of a computer. C. Computer
2.4 A vast network that connects computers all over the world D. Antivirus
2.5 An Application software that performs specific task for users. E. Hardware
F. System software
G. Network
H. Internet
QUESTION 3 (5 MARKS)
2
3.1. An electronic device capable of accepting data, processing it, giving it out and storing it
for later use is called _____________________
QUESTION 4 (5 MARKS)
Define the following terms?
4.1. Search engine
(1)
___________________________________________________________________________
___________________________________________________________________________
3
SECTION B (30 MARKS)
Answer all the questions.
1. Use the diagram below of a typical modern-day computer to describe the function of each
component numbered 1 to 4 (4)
1
3 2
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
2. Explain the difference between INPUT and OUTPUT. Give two examples of each (6)
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
4
3. Mr Haipopo is a Nurse Manager at Rundu State Hospital and the hospital have received
new computers to be used in the wards. Explain the 5 advantages of using computers in the
ward with relevant examples? (10)
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
4. Computer security is important because it keeps your information protected. It's also
important for your computer's overall health.
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
4.2 Explain measures to protect yourself as a computer user from computer harm? (5)
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________