0% found this document useful (0 votes)
40 views5 pages

Form 2

This document contains a practice exam for a Form Two computer science class at All Saints Catholic College in Bamenda, Cameroon. The exam has two sections - Section A contains 20 multiple choice questions testing core computer science concepts. Section B includes 6 structured response questions requiring definitions, explanations and problem solving around topics like BIOS, computer hardware, storage, networks and security. The exam tests both conceptual understanding and practical problem solving skills in computer science.

Uploaded by

leoyuyleo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views5 pages

Form 2

This document contains a practice exam for a Form Two computer science class at All Saints Catholic College in Bamenda, Cameroon. The exam has two sections - Section A contains 20 multiple choice questions testing core computer science concepts. Section B includes 6 structured response questions requiring definitions, explanations and problem solving around topics like BIOS, computer hardware, storage, networks and security. The exam tests both conceptual understanding and practical problem solving skills in computer science.

Uploaded by

leoyuyleo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

ALL SAINTS CATHOLIC COLLEGE

BAYELLE,
BAMENDA
ARCHDIOCESE OF BAMENDA

P.O. BOX 113, NKWEN, BAMENDA

COMPUTER SCIENCE TIME ALLOWED: 1HR: 15MINS


SECTION A: MCQ
FORM TWO

NAME: _______________________________________________ CLASS: ___ No: __

SECTION A: MCQ (20MKS)

Instructions: Draw a horizontal line across the letter with the corresponding answer

1. The results of the binary


operation 1101 – 1010 is; 4. It is the way we take to protect
A) 101 our computers and its content
B) 011 from intentional or unintentional
C) 100 harm
D) 010 A) computer security
2. It is an electronic set of B) computer protection
instruction that tells the hardware C) computer ergonomics
what to do. D) computer software
A) Computer instruction 5. which of the following is NOT a
B) Computer hardware method of protecting your
C) Computer software A) build a firewall to protect
D) Machine language your computer from
3. Computer software can be intruders
classified under two main groups B) cover your computer
which are; when it is not in use to
A) Software and hardware protect it from dust
B) System and application C) keep your computer in
software well ventilated
C) Inputs and outputs environment
D) Processing and storage
D) Do not back up your files C) Web browser
regularly
6. Programs that are used for 12. ISP stands for
exchanging of information on a A) International source profit
computer network are called; B) Internet source profit
A) Word processor C) Internet service provider
B) Desktop publishing programs D) International service provider
C) Graphic software
D) Communication software 13. The meaning of SMS as used in
7. What is the full meaning of the mobile communication is:
acronym BIOS?
A) Bias information of software A) Short messaging service
B) Basic input output software B) Short mobile service
C) Basic input output system C) Short message sender
D) Basic information output D) Short mobile sender
system
14. Given that a computer uses one
8. It is a step by step method of
byte to represent a character,
solving a problem.
how many bits are used to
A) MODEM
represent a character?
B) Algorithm
A) 8
C) Programming language
B) 16
D) Machine language
C) 4
9. Which of the following is
D) 20
arranged in the increasing
Questions 16-18 requires
order?
you to give the full meaning
A) Kilobyte- nibble –megabyte of the following acronyms:
B) Megabyte-kilobyte-gigabyte 15. SIM
C) Kilobyte-megabyte-gigabyte --------------------------------------------
D) Byte- megabyte-kilobyte ----------------
16. PDF
10. To highlight a word we need to; --------------------------------------------
----------------
A) Triple click on the word 17. SMS
B) Click and drag across the --------------------------------------------
entire sentence ----------------
C) Double click on the word 18. It opens up a list of options from
D) Press and hold down the which you can choose from
control key and click on the A) Title bar
word B) Menu bar
11. The first page you see when you C) Status bar
log onto a website is called a; D) Notification area
19. It is a folder in the computer that
A) Web page stores all deleted files
B) Homepage A) The dust bin
B) Recycle bin A) Status bar
C) Folder B) Menu bar
D) Desktop C) Title bar
20. It shows the name of the D) Tool bar
application and the document
name

SECTION B: STRUCTURAL

1. A) What is a BIOS? 1mk


_____________________________________________________________________
_____________________________________________________________________
B) Bring out three functions of a bios.(3mks)
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________

2. a) Define computer ergonomics (1mk)


____________________________________________________________________________
____________________________________________________________________________

b) List four common ergonomic problems you know. (2mks)


____________________________________________________________________________
____________________________________________________________________________

c) Give ways in which you can prevent the ergonomic problems you just listed in “b” above.
(4mks)
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________

3. How many bits do we have in 8kilobytes? Clearly show your working. (3MKS)
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________

4. a) What are computer malwares? (1mk)


____________________________________________________________________________
____________________________________________________________________________

b) List and explain how four of the malwares operate. (8mks)


____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________

5. Computer hardware can be classified under four main units, list them. (2mks)
____________________________________________________________________________
____________________________________________________________________________

6. A) What is a storage device? (1mk)


____________________________________________________________________________

There are two types of storage devices which are __________________________________


and _______________________________ (2mks)

B) Explain why the primary storage device is termed a volatile memory. (2mks)

7. Define the following (10mks)

i. Algorithm

ii. Programming language

Iii.Computer network

iv. Servers

v. Nodes

Good luck

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy