This document provides a summary of a half-yearly exam on Information Communication Technology taken by students in Form 3 at Gozo College Boys' Secondary School. The exam consists of 17 multiple choice and written response questions testing students' knowledge of topics like hardware, software, file compression, data storage units, and mail merge features in word processing. The questions require students to identify components, understand functions, define terminology, and demonstrate skills like creating tables and merging data files with documents.
ICT CSS 9 Summative exam for computer system servicing for evaluation of students. Summative test conducted 3 x per quarter for grade 9 and 10 students. To check if all learners learned some skills in ICT part and components. CSS Computer system servicing.
B Sc IT II Sem NHSB Networking For Home And Small Business Amity UniversityKanhaiya Murarka
This file is the Lab File for the Networking For Home and Small Business Subject which is a part of the curriculum of Amity University for the course B Sc IT in the Second (II) Semseter. This file is graded for a total of 30 marks that is included in the internal assesments.
ICT CSS 9 Summative exam for computer system servicing for evaluation of students. Summative test conducted 3 x per quarter for grade 9 and 10 students. To check if all learners learned some skills in ICT part and components. CSS Computer system servicing.
B Sc IT II Sem NHSB Networking For Home And Small Business Amity UniversityKanhaiya Murarka
This file is the Lab File for the Networking For Home and Small Business Subject which is a part of the curriculum of Amity University for the course B Sc IT in the Second (II) Semseter. This file is graded for a total of 30 marks that is included in the internal assesments.
Concepts and Applications of Information Technology IFSM.docxmaxinesmith73660
Concepts and Applications of Information Technology
IFSM201-C806
Midterm Exam
Name:_________________________
Exam Directions:
The exam is open book and notes are allowed
You will have 2 days to complete the exam
Select the best answer for each question
Place your answers on your answer sheet
The completed answer sheet should be posted in the Assignment Folder by the assigned date and time.
Part 1 - Multiple Choice (25 points total)
Identify the choice that best completes the statement or answers the question.
____ 1. Ultra-mobile PCs are also called ____.
a. mini computers c. range computers
b. handheld computers d. frame computers
____ 2. A ____ is a collection of hardware and other devices that are connected together so that users can share
hardware, software, and data, as well as electronically communicate with each other.
a. computer bank c. data bank
b. database d. computer network
____ 3. Similar to the way an IP address or domain name uniquely identifies a computer on the Internet, a ____
uniquely identifies a Web page.
a. universal resource identifier (URI) c. uniform resource locator (URL)
b. Web ID (WID) d. Web resource identifier (WRI)
____ 4. Each place value in a binary number represents ____ raised to the appropriate power.
a. 0 c. 2
b. 1 d. 10
____ 5. A ____ is an electronic path over which data can travel.
a. bus c. word
b. lane d. cache memory
____ 6. A USB ____ is a device that plugs into your PC’s USB port to convert one port into several USB ports.
a. hub c. bus
b. module d. connector
____ 7. The elements shown in the accompanying figure are ____, which are used to organize related documents.
a. files c. folders
b. drives d. clipboards
Case-Based Critical Thinking Questions
Case 3-1
Dan is a small business owner who depends on his computer to keep track of customer and sales data. He
is investigating storage options because it is critical for him to ensure that his data is safe in the event of a
computer failure.
____ 8. A friend of Dan suggested to him that he can use an external hard drive for his data storage and backup
needs. To use an external hard drive, Dan should make sure that his computer has an available USB or
____ port.
a. ScanDisk c. flash
b. Zip d. FireWire
____ 9. ____ includes all the programs that allow a user to perform specific tasks on a computer, such as writing a
letter.
a. System software c. Application software
b. Utility programs d. Background programs
____ 10. A computer’s ____ is a collection of programs that manage and coordinate the activities taking place
within a computer system.
a. database system c. application system
b. storage system d. operating system
____ 11. ____ refers to the ability of an operating system to work with more than one program at one time.
a. Multidimensional c. Polyprogramming
b. Multiprogramming d. Multitaski.
Group 11. Which of the following is NOT a basic computer ope.docxJeanmarieColbert3
Group 1
1. Which of the following is NOT a basic computer operation?
a. Processing
b. Storage
c. Input
d. Throughput
2. The computer function in which raw data is received is known as:
a. processing.
b. output.
c. input.
d. storage.
3. The most important type of memory that a typical computer uses during the processing operation is ________ memory.
a. flash
b. storage
c. random access
d. read-only
4. Typing a document into the computer is an example of:
a. output.
b. processing.
c. storage.
d. input.
5. A feeling of anxiety and incapacity experienced when people are presented with more information than they can handle is known as:
a. digital distress.
b. digital anxiety.
c. computerized stress syndrome.
d. information overload.
6. Which of the following is a type of product that complements the human body’s best posture and functionality?
a. Esoteric
b. Ergocentric
c. Ergonomic
d. Natural
7. ________ is a portable, wireless, paperback-sized e-book reading device that includes a text-tospeech function.
a. Kindle 2
b. Netbook
c. Wiki
d. Digital e-book
8. The most widely used pointing device is the:
a. keyboard.
b. trackball.
c. mouse.
d. joystick.
9. The ________ is a pattern of bars printed on merchandise that stores information about the item.
a. MICR
b. OMR
c. EDI
d. UPC
10. A representation of an image as a matrix of pixels is called a ________ image.
a. digit recognition
b. scanned
c. digitized
d. bit-mapped
11. What is the resolution of an Ultra Extended Graphic Array adapter?
a. 800 x 600
b. 1,280 x 1,024
c. 1,024 x 768
d. 1,600 x 1,200
12. A pie-shaped wedge of a hard disk is called which of the following?
a. Track
b. Cluster
c. Platter
d. Sector
13. The amount of time it takes a device from the request for information to that information’s delivery is known as: a. cycle time.
b. cache time.
c. read time.
d. access time.
14. Starting a computer that is already turned on is called a:
a. power on.
b. warm load.
c. cold boot.
d. warm boot.
15. System utilities:
a. have to be accessed through applications.
b. are loaded before the operating system is loaded.
c. perform functions such as protecting your computer from viruses.
d. include features such as a word-processing program.
16. Virtual memory is an enhanced way to utilize the main memory by:
a. creating pages of variable size to use when the swap file is full.
b. using a part of ROM as an extension of RAM to conserve the main memory.
c. using a hard disk swap file when memory is full.
d. dividing data and instructions into multitasking units.
17. Which of the following computer interfaces is the most popular?
a. GUI
b. Menu-driven
c. Shortcut keystrokes
d. Command-line
18. ________ is a Windows 7 feature, which enables users to instantly see a list of relevant documents, pictures, music, and e-mails on their PCs that match the entered description.
a. Snap
b. Jump list
c. Windows Search
d. Pin
19. The right way to select a computer requires all of the following EXCEPT.
C Programming Language is the most popular computer language and most used programming language till now. It is very simple and elegant language. This lecture series will give you basic concepts of structured programming language with C.
Concepts and Applications of Information Technology IFSM.docxmaxinesmith73660
Concepts and Applications of Information Technology
IFSM201-C806
Midterm Exam
Name:_________________________
Exam Directions:
The exam is open book and notes are allowed
You will have 2 days to complete the exam
Select the best answer for each question
Place your answers on your answer sheet
The completed answer sheet should be posted in the Assignment Folder by the assigned date and time.
Part 1 - Multiple Choice (25 points total)
Identify the choice that best completes the statement or answers the question.
____ 1. Ultra-mobile PCs are also called ____.
a. mini computers c. range computers
b. handheld computers d. frame computers
____ 2. A ____ is a collection of hardware and other devices that are connected together so that users can share
hardware, software, and data, as well as electronically communicate with each other.
a. computer bank c. data bank
b. database d. computer network
____ 3. Similar to the way an IP address or domain name uniquely identifies a computer on the Internet, a ____
uniquely identifies a Web page.
a. universal resource identifier (URI) c. uniform resource locator (URL)
b. Web ID (WID) d. Web resource identifier (WRI)
____ 4. Each place value in a binary number represents ____ raised to the appropriate power.
a. 0 c. 2
b. 1 d. 10
____ 5. A ____ is an electronic path over which data can travel.
a. bus c. word
b. lane d. cache memory
____ 6. A USB ____ is a device that plugs into your PC’s USB port to convert one port into several USB ports.
a. hub c. bus
b. module d. connector
____ 7. The elements shown in the accompanying figure are ____, which are used to organize related documents.
a. files c. folders
b. drives d. clipboards
Case-Based Critical Thinking Questions
Case 3-1
Dan is a small business owner who depends on his computer to keep track of customer and sales data. He
is investigating storage options because it is critical for him to ensure that his data is safe in the event of a
computer failure.
____ 8. A friend of Dan suggested to him that he can use an external hard drive for his data storage and backup
needs. To use an external hard drive, Dan should make sure that his computer has an available USB or
____ port.
a. ScanDisk c. flash
b. Zip d. FireWire
____ 9. ____ includes all the programs that allow a user to perform specific tasks on a computer, such as writing a
letter.
a. System software c. Application software
b. Utility programs d. Background programs
____ 10. A computer’s ____ is a collection of programs that manage and coordinate the activities taking place
within a computer system.
a. database system c. application system
b. storage system d. operating system
____ 11. ____ refers to the ability of an operating system to work with more than one program at one time.
a. Multidimensional c. Polyprogramming
b. Multiprogramming d. Multitaski.
Group 11. Which of the following is NOT a basic computer ope.docxJeanmarieColbert3
Group 1
1. Which of the following is NOT a basic computer operation?
a. Processing
b. Storage
c. Input
d. Throughput
2. The computer function in which raw data is received is known as:
a. processing.
b. output.
c. input.
d. storage.
3. The most important type of memory that a typical computer uses during the processing operation is ________ memory.
a. flash
b. storage
c. random access
d. read-only
4. Typing a document into the computer is an example of:
a. output.
b. processing.
c. storage.
d. input.
5. A feeling of anxiety and incapacity experienced when people are presented with more information than they can handle is known as:
a. digital distress.
b. digital anxiety.
c. computerized stress syndrome.
d. information overload.
6. Which of the following is a type of product that complements the human body’s best posture and functionality?
a. Esoteric
b. Ergocentric
c. Ergonomic
d. Natural
7. ________ is a portable, wireless, paperback-sized e-book reading device that includes a text-tospeech function.
a. Kindle 2
b. Netbook
c. Wiki
d. Digital e-book
8. The most widely used pointing device is the:
a. keyboard.
b. trackball.
c. mouse.
d. joystick.
9. The ________ is a pattern of bars printed on merchandise that stores information about the item.
a. MICR
b. OMR
c. EDI
d. UPC
10. A representation of an image as a matrix of pixels is called a ________ image.
a. digit recognition
b. scanned
c. digitized
d. bit-mapped
11. What is the resolution of an Ultra Extended Graphic Array adapter?
a. 800 x 600
b. 1,280 x 1,024
c. 1,024 x 768
d. 1,600 x 1,200
12. A pie-shaped wedge of a hard disk is called which of the following?
a. Track
b. Cluster
c. Platter
d. Sector
13. The amount of time it takes a device from the request for information to that information’s delivery is known as: a. cycle time.
b. cache time.
c. read time.
d. access time.
14. Starting a computer that is already turned on is called a:
a. power on.
b. warm load.
c. cold boot.
d. warm boot.
15. System utilities:
a. have to be accessed through applications.
b. are loaded before the operating system is loaded.
c. perform functions such as protecting your computer from viruses.
d. include features such as a word-processing program.
16. Virtual memory is an enhanced way to utilize the main memory by:
a. creating pages of variable size to use when the swap file is full.
b. using a part of ROM as an extension of RAM to conserve the main memory.
c. using a hard disk swap file when memory is full.
d. dividing data and instructions into multitasking units.
17. Which of the following computer interfaces is the most popular?
a. GUI
b. Menu-driven
c. Shortcut keystrokes
d. Command-line
18. ________ is a Windows 7 feature, which enables users to instantly see a list of relevant documents, pictures, music, and e-mails on their PCs that match the entered description.
a. Snap
b. Jump list
c. Windows Search
d. Pin
19. The right way to select a computer requires all of the following EXCEPT.
C Programming Language is the most popular computer language and most used programming language till now. It is very simple and elegant language. This lecture series will give you basic concepts of structured programming language with C.
Instagram has become one of the most popular social media platforms, allowing people to share photos, videos, and stories with their followers. Sometimes, though, you might want to view someone's story without them knowing.
Italy Agriculture Equipment Market Outlook to 2027harveenkaur52
Agriculture and Animal Care
Ken Research has an expertise in Agriculture and Animal Care sector and offer vast collection of information related to all major aspects such as Agriculture equipment, Crop Protection, Seed, Agriculture Chemical, Fertilizers, Protected Cultivators, Palm Oil, Hybrid Seed, Animal Feed additives and many more.
Our continuous study and findings in agriculture sector provide better insights to companies dealing with related product and services, government and agriculture associations, researchers and students to well understand the present and expected scenario.
Our Animal care category provides solutions on Animal Healthcare and related products and services, including, animal feed additives, vaccination
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Ready to Unlock the Power of Blockchain!Toptal Tech
Imagine a world where data flows freely, yet remains secure. A world where trust is built into the fabric of every transaction. This is the promise of blockchain, a revolutionary technology poised to reshape our digital landscape.
Toptal Tech is at the forefront of this innovation, connecting you with the brightest minds in blockchain development. Together, we can unlock the potential of this transformative technology, building a future of transparency, security, and endless possibilities.
1. Page 1 of 10
Embracing Diversity
GOZO COLLEGE
BOYS’ SECONDARY SCHOOL
Half Yearly Exams
2013-2014
Subject: Information Communication Technology
Form: 3 Track 3
Time: 1 hour
Name: _____________________________
Class: _____________________________
Instructions to Candidates
Answer all questions.
2. Page 2 of 10
1. Fill in the table below by using the following words:
Malware GHz CPU bit Memory Card
RAM File Compression Data Backup Online File Storage Hard Disk
a) Also known as the ‘brain’ of the computer.
b) The unit used to measure CPU speed
c) The main storage device where we store data inside our computer.
d) Temporary Storage that holds the programs that are currently being used.
e) Keeping an extra copy of your data.
f) The device on which images are stored in a digital camera.
g) This is used to reduce the size of data files on our computer.
h) Programs that are intended to damage our computer.
i) The smallest unit of computer storage.
j) This allows you to store your files on the Internet. (Dropbox is an example.)
[1 x 10 = 10marks]
2. Underline the correct answer:
a) Malware is a
i. program designed to do harm to a computer system.
ii. program used to download software for free.
iii. hardware device found inside the computer system.
b) Virus, Worms, Trojan horses and Spyware are:
i. programs used to send files on a network.
ii. types of Malware.
iii. input devices.
c) An antivirus software:
i. is used to prepare documents.
ii. should not be updated regularly.
iii. detects the presence of viruses and removes them.
d) History.zip is an example of:
i. an Excel file.
ii. a powerpoint presentation.
iii. a compressed file.
3. Page 3 of 10
e) File compression:
i. reduces the size of the file.
ii. increases the size of the file.
iii. attaches the file to an E-mail.
f) Input/output ports are:
i. CDs with computer games.
ii. slots where cables from peripherals connect to the computer.
iii. are used to store important data.
g) Which one of the following is NOT an Input/Output Port?
i. USB
ii. Memory Card
iii. HDMI
[7 x 1 = 7marks]
3. List the units of storage starting from the smallest:
1 bit
2
3
4
5
6
[5 x 1 = 5marks]
4. Complete the following exercise, by filling in the appropriate storage device.
Memory Card External Hard Disk DVD
CD Online Storage Internal Hard Disk
Network Drive Blu-Ray Disc USB Flash Drive
a) An optical storage device with a capacity of 4.7GB. Dual Layer with
a higher capacity up to 17GB.
b) A disk which was developed recently to store large amounts of high
definition video. Storage capacity ranges between 25GB to 200GB.
c) A portable device that is attached to the computer using a USB cable
instead of being placed inside it. It is used to store large amounts of
data for backup purposes. Storage capacity usually 1TB or more.
d) An optical storage device with a capacity of 700MB
4. Page 4 of 10
e) A portable device which connects to the computer via USB. It is
small, lightweight and can be carried in your pocket very easily.
Storage capacity ranges between 2GB TO 256GB.
f) Typically found in the computer. All computer programs installed on
this device. Stores large amount of data. Storage capacity usually
1TB or more.
g) A small storage device which is used in smart phones and digital
cameras to store digital pictures or videos.
h) A drive which is shared among users on a network. Similar to the
‘Student’ drive we have at school.
i) A service which allows users to upload data on the Internet. The
advantage of such service is that the user can access the files from
everywhere being at home or at work.
[9 x 1 = 9marks]
5. What do the following abbreviations stand for?
a) RAM _________________ _________________ _________________
b) USB _________________ _________________ _________________
c) HDMI _________________ _________________ _________________ ________________
d) CPU _________________ _________________ _________________
[4 x 1 = 4marks]
6. Use the following terms to define the following malware definitions:
VIRUS SPYWARE TROJAN HORSE WORM
a) They make copies of themselves and are more concentrated on
slowing computer systems or Internet connections.
b) Do not replicate themselves. They are attached to other
programs, and when the program is run this type of malware
becomes activated.
c) It makes additional copies of itself and spreads from location to
location. Written for malicious intent to annoy the user or at
worst case corrupt/delete files.
d) A program that secretly installs itself in your computer and starts
sending information from your computer to other people.
[4x1=4marks]
5. Page 5 of 10
7. Give the name of the Input/Output port being described.
a)
is a slot in the computer that supports fast transfer
data rates. Pen Drives, digital cameras, mice,
keyboards etc can be connected to the computer
via this port.
b)
is a slot on the computer that supports the transfer
of audio and video data through a single cable.
c)
is used to connect the computer to a network or a
modem.
d)
is a slot that connects digital video cameras to
the computer. FireWire supports faster transfer data rates
than USB ports.
[4x1=4marks]
8. Fill in the blanks with the following words:
Operating System Applications Processing
Main Memory GHz Brain
The CPU is the single most important item of all the hardware within the system and is labelled as
the ____________________________ of the computer. It is responsible for the running of the
____________________________ (e.g. Microsoft Windows) as well as your
____________________________. It performs all the ____________________________ within
the computer. It also accesses and uses the ____________________________ called RAM
available in your computer. In many ways, the CPU controls the overall speed of your computer
which is measured in ____________________________.
[6x1=6marks]
6. Page 6 of 10
9. File Compression is a useful feature in a computer system.
a) Give two reasons why a user may want to compress a file or folder.
b) Write the name of a utility program that can be used to compress a file ________________
[3x1=3marks]
10. Refer to the following picture and answer the questions below:
a) What Operating System is this computer using? ________________________
b) What is its Processor type? ________________________
c) At what speed does this processor run? ________________________
d) How much memory is installed on this computer? ________________________
[4x1=4marks]
7. Page 7 of 10
11. Look carefully at the image below and answer the questions on the right.
a) What is the total Storage
Capacity of this Hard Disk?
________________________
[1 mark]
b) How much storage space is still
empty?
________________________
[1 marks]
c) How much storage space is
used?
________________________
[1 marks]
d) How do you open the dialog box
shown on the left?
________________________
________________________
[1 marks]
12. We can set the word processor to display non-printing characters.
a) Draw a circle round the button that should be clicked to display the non-printing characters.
b) Match the non-printing formatting marks to their equivalent type by writing the letter.
[6x1=6marks]
8. Page 8 of 10
13. Look at the screenshot below:
a) The two words that are automatically hyphenated
are _______________ and ________________ .
[1 marks]
b) Number the steps to hyphenate a paragraph.
Click on Hyphenation
Click on the Page Layout Tab
Highlight the paragraph
Click on Automatic from the drop down menu
[4 marks]
14. Joey needs to create the table shown below in a document he is preparing.
Brand Mobile Price
Samsung Galaxy S4 €450.00
Nokia Lumia 525 €760.00
Apple iPhone 5s €800.00
Acer Liquid S2 €530.00
a) Draw a circle around the button that Joey needs to click to create the table.
[1 mark]
b) After clicking the button, the picture shown on the right
appears. Shade the cells required to create the Table
about Smartphones shown above.
[1 mark]
c) This table has _____ rows and _____ columns.
[1 mark]
9. Page 9 of 10
15. Input the correct letters according to the table tools shown in the picture.
a) To apply borders to the table we click on the button marked with the letter ____ [1mark]
b) To apply a pre-set style to a table we click on the button marked ____ [1mark]
c) To apply shading to a cell we click on the button marked ____ [1mark]
d) To change the thickness of the border we click on the button marked ____ [1 mark]
e) To change the colour of the border we click on the button marked ____ [1mark]
16. The Mnarja Band Club Committee would like to send a personalized letter to every member
informing them about the upcoming concert.
a) Which word processing feature would you suggest to combine a single document (letter)
with a data file (containing names and addresses): ______________________.
[1mark]
b) How many files are needed to make the above mentioned task? _______ [1mark]
c) Number the following steps of mail merge in order. The first one is made for you.
i Save merged document
ii Select recipients (select data source)
iii Preview results
iv Complete and merge the document
v Start or load a document – select if you’re doing a
letter, envelopes, labels or normal word document.
1
vi Insert merge fields
[5marks]
D
C
A B
E
10. Page 10 of 10
17. The image below shows the Mail Merge toolbar. Some items are numbered.
Write the appropriate number next to its matching description in the table below.
a Navigate through records in the recipient list – for example
preview the last record.
b Select recipients (select data source).
c Start a mail merge to create a letter, envelops, labels or a
normal word document. 1
d Make changes to the list of recipients and decide which of
them should receive your letter.
e Complete the mail merge to a separate document, directly
to printer or via e-mail.
f Replace the merge fields in your document with actual data
from your recipient list so you can see what it looks like.
g Add any field from your recipient list to your document
such as ‘Name’, ‘Surname’, ‘Address’, ‘Telephone’.
h Check for Errors – specify how to handle errors that occur
when completing the mail merge.
[14 marks]
1 3 4 6
2 5 7 8