67% found this document useful (3 votes)
3K views2 pages

JHS 2 Cat1 Ict Ii

This document contains an ICT exam for students at Catholic Jubilee Boys' JHS in Cape Coast. It includes questions about email, rules for using the computer lab, terms related to email and internet service providers, the purpose of usernames, importance of email, definitions of a computer lab and formatting, and examples of fonts in Microsoft Word. The second page provides a 10 question multiple choice exam about email and internet etiquette topics.

Uploaded by

edward nodzo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
67% found this document useful (3 votes)
3K views2 pages

JHS 2 Cat1 Ict Ii

This document contains an ICT exam for students at Catholic Jubilee Boys' JHS in Cape Coast. It includes questions about email, rules for using the computer lab, terms related to email and internet service providers, the purpose of usernames, importance of email, definitions of a computer lab and formatting, and examples of fonts in Microsoft Word. The second page provides a 10 question multiple choice exam about email and internet etiquette topics.

Uploaded by

edward nodzo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

CATHOLIC JUBILEE BOYS’ JHS- CAPE COAST

JHS 2 2ND TERM CLASS ASSESSMENT TASK 1


ICT
PAPER II
Answer all questions
1. i. What is Email? ……………………………………………………………………………….......................
……………………………………………………………………………………………………………………..

ii. Explain two(2) ways, how email have made communication very easy
……………………………………………………………………………………………………………………..
……………………………………………………………………………………………………………………..

iii. Why would you use password to protect your email account. ………………………………………………...
……………………………………………………………………………………………………………………..

2. State four (4) rules and regulation for using the computer laboratory.
……………………………………………………………………………………………………………………….
……………………………………………………………………………………………………………………….
……………………………………………………………………………………………………………………….
……………………………………………………………………………………………………………………….

3. a. Explains the following terms:


i. No Idling Policy ………………………………………………………………………………………………….
………………………………………………………………………………………………………………………..

ii. No Bag Policy …………………………………………………………………………………………………….


……………………………………………………………………………………………………………………….

b. i. The acronym ISP means ………………………………………………………………………………………..

ii. List one example of ISP as in (i) above


……………………………………………………………………………………
…………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………..

4. i. Explain the term User Name as used during creation of e-mail account ……………………………………….
………………………………………………………………………………………………………………………..

ii. State three (3) importance of e-mail. ……………………………………………………………………………


………………………………………………………………………………………………………………………..
………………………………………………………………………………………………………………………..

5. a. Explain the following:


i. Computer Laboratory …………………………………………………………………………………………
………………………………………………………………………………………………………………………..

ii. Formatting ……………………………………………………………………………………………………....


………………………………………………………………………………………………………………………..

b. Identify any two examples of fonts in MS Word ………………………………………………………………….


………………………………………………………………………………………………………………………..
PAPER II
Answer all questions
1. Electronic e-mail is
(a) an internet service (b) appular service
(c) a web page (d) just a term

2. Two important things in creating email account are


(a) user name and password (b) date of birth and date
(c) password and date of birth (d) time and date

3. Unsolicited email sent to a group is known as


(a) attachment (b) spam
(c) flame (d) email

4. Incoming messages are placed in


(a) inbox (b) draft
(c) out box (d) sent box

5. To sign- up means
(a) enter an account (b) delete an account
(c) move an account (d)create an account

6. Logging out your email account will


(a) enable people to access your email (b) prevent people from accessing your email
(c) facilitates signing in (d) easy access

7. The number of unread message is indicated in the


(a) sent box (b) inbox folder
(c) out box (d) trash

8. The internet etiquette is also known as


(a) netiquette (b) webtiquet
(c) internet fraud (d) rules

9. Typing capital letters throughout is referred to as


(a) span (b) shouting
(c) flaming (d) intrution

10. The flame is to


(a) use abusive words (b) type capital letters throughout
(c) send an email (d) watch pornography

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy