0% found this document useful (0 votes)
34 views7 pages

Grade 9 Revision #14

The document is a Grade 9 revision toolkit for Computer Studies, specifically Paper 1, consisting of multiple-choice questions, fill-in-the-blank questions, and short answer questions. It covers various topics in computing such as data processing, storage devices, internet terminology, and e-banking. The exam is structured into three sections with a total of 70 marks and includes specific instructions for candidates.

Uploaded by

zedicthub
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views7 pages

Grade 9 Revision #14

The document is a Grade 9 revision toolkit for Computer Studies, specifically Paper 1, consisting of multiple-choice questions, fill-in-the-blank questions, and short answer questions. It covers various topics in computing such as data processing, storage devices, internet terminology, and e-banking. The exam is structured into three sections with a total of 70 marks and includes specific instructions for candidates.

Uploaded by

zedicthub
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Copyright (c) - Shephat Phiri

Name: ………………………………………………

ZED ICT HUB


2024 Grade 9 Revision Toolkit #14

Computer Studies Paper 1 402/1

Time: 1 hour 20 minutes Total Marks 70

INSTRUCTIONS TO CANDIDATES
1. Write your name class on top of the answer sheet.
2. Cross out the correct answer under section A.
3. Answers all questions in this paper. Answers for this examination must be written in
the space provided.

Information for Candidates


1 The number of marks is shown in brackets [ ] at the end of each question or part
question.
2 Cell phones are NOT allowed in the examination room

Turn Over
Copyright (c) - Shephat Phiri
Section A (20 marks)
Answer all questions.

1. The process of converting raw data into meaningful information is called:


(a) Storing
(b) Inputting
(c) Processing
(d) Outputting
2. What does the term "bit" stand for in computing?
(a) Binary Information Transfer
(b) Binary Digit
(c) Byte Integration Technology
(d) Bit Information Table
3. A ____is a portable device that allows users to save, delete, and transfer data.
(a) Mouse
(b) USB Flash Drive
(c) RAM
(d) Printer
4. The Internet is an example of a:
(a) LAN
(b) MAN
(c) PAN
(d) WAN
5. Which of the following is used to connect a computer to a wired network?
(a) Wi-Fi adapter
(b) Ethernet cable
(c) Bluetooth
(d) USB cable
6. The part of a computer where all the components are connected and communicate is
called the:
(a) CPU
(b) Motherboard
(c) Power Supply
(d) RAM
7. The main difference between a search engine and a web browser is:
(a) A search engine is used to create websites, while a web browser is used to view
websites
(b) A search engine helps find information on the internet, while a web browser displays
websites
(c) A search engine is software, while a web browser is hardware
(d) A search engine works offline, while a web browser works online
Copyright (c) - Shephat Phiri
8. The main function of a power supply in a computer is to:
(a) Provide backup power during a power outage
(b) Convert electrical energy into the correct voltage for internal components
(c) Store data temporarily
(d) Control the display of the monitor
9. A floppy disk is an example of:
(a) Input device
(b) Output device
(c) Portable storage device
(d) Network device
10. The background area of a desktop where icons, files, and folders are arranged is called:
(a) Taskbar
(b) Wallpaper
(c) GUI
(d) Command line
11. Which of the following is the correct order of storage device sizes from smallest to
largest?
(a) Kilobyte, Megabyte, Gigabyte, Terabyte
(b) Megabyte, Kilobyte, Gigabyte, Terabyte
(c) Gigabyte, Kilobyte, Terabyte, Megabyte
(d) Terabyte, Gigabyte, Megabyte, Kilobyte
12. Which of the following is an advantage of e-banking?
(a) It allows users to withdraw cash from their computer
(b) It allows for online transactions anytime
(c) It requires no internet connection
(d) It reduces transaction fees to zero
13. A Graphical User Interface (GUI) is characterized by:
(a) Text-based commands
(b) Use of icons, windows, and menus
(c) Direct hardware control
(d) Only one program running at a time
14. RSI (Repetitive Strain Injury) is commonly caused by:
(a) Sitting at a desk for too long without a break
(b) Incorrectly positioning a mouse and keyboard
(c) Viewing a screen for long hours
(d) Listening to loud sounds on the computer
15. Telecommuting primarily allows employees to:
(a) Work from home or remote locations
(b) Work only in the office
Copyright (c) - Shephat Phiri
(c) Attend meetings in person
(d) Take extended vacations
16. A video conference typically requires the use of:
(a) A web browser only
(b) Audio-only devices
(c) Video cameras and microphones
(d) Printers and scanners
17. Voice recognition technology is primarily used for:
(a) Translating written text
(b) Understanding and processing spoken language
(c) Increasing volume during calls
(d) Improving audio quality
18. Multimedia typically includes the combination of:
(a) Text and audio only
(b) Text, images, audio, and video
(c) Only images and audio
(d) Audio and hard copies
19. Which of the following is NOT a type of sensor?
(a) Pressure sensor
(b) Light sensor
(c) Sound sensor
(d) Hard drive
20. The command used to paste copied data in a word processor is:
(a) CTRL + S
(b) CTRL + C
(c) CTRL + P
(d) CTRL + V

Section B (20 marks)


Answer all questions
1. The physical components of a computer system are referred to as ………………….. [1]
2. A storage device that can be removed and replaced while the computer is running is
known as …………………………. [1]
3. The process of searching for information on the web is commonly done using a
…………………………….. [1]
4. A ………………….. is a location where files, folders, and programs are stored on a
computer. [1]
Copyright (c) - Shephat Phiri
5. ……….................... refers to the illegal practice of sending fake emails to steal sensitive
information. [1]
6. OTP stands for ………………………………………………………………………… [1]
7. The feature that automatically moves text to the next line in a word processor is called
……………………………… [1]
8. A ………………….. is the intersection of a row and a column in a spreadsheet. [1]
9. Prolonged use of computers without breaks can lead to …………………strain. [1]
10. The extension .mpeg is commonly for ………………….. and it stands for
………………………………………………………………………… [2]
11. Autofill is to Excel, page setup is to ………………………………….. [1]
12. …………………. and ………………….. are examples of modifier keys [2]
13. The two types of keyboard are …………………….and …………………. [2]
14. An …………………represents a folder, file or program [1]
15. Identify the device shown and state on the type of monitor where it is used

Device ………………….. Monitor where it is


used…………………….. [2]
16. How many bits are in a nibble? …………………. [1]

Section C (30 marks)


Answer all questions
1. Data can be stored for future use using storage devices
(a) (i) State the capacity of a floppy disk ........................................................................ [1]
(ii) Give a reason why floppy disks are no longer used
………………………………………………………………………………………….. [1]
(b) Give two examples of magnetic storage devices.
1. ………………………………………. 2. ……………………………………….. [2]
(c) What is the difference between primary storage and secondary storage?
Copyright (c) - Shephat Phiri
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………… [1]
(d) Give one advantage of using external storage devices.
………………………………………………………………………………………… [1]
[Total: 6 marks]
2. (a) What is an embedded computer?
………………………………………………………………………………………………
………………………………………………………………………………………… [2]
(b) Give one office and one household equipment which is an embedded computer.
Office ..………………………………………………………………………………… [1]
Household ..…………………………………………………………………………… [1]
(c) State one characteristic of embedded computers that differentiates them from general-
purpose computers.
………………………………………………………………………………………… [1]
(d) Explain why embedded computers are important in modern devices.
………………………………………………………………………………………… [1]
[Total: 6 marks]
3. Biometric is the use of body parts unique to an individual to access a system.
(a) Name two parts that can be used
1. ………………………………………. 2. ……………………………………….. [2]
(c) State one limitation of using biometric systems for security.
………………………………………………………………………………………….. [1]
(d) Give one example of where biometric systems are commonly used.
………………………………………………………………………………………….. [1]
[Total: 6 marks]
4. (a) Define e-banking.
………………………………………………………………………………………………
………………………………………………………………………………………… [2]
(b) Give one advantages of e-banking for customers and the employer.
Customer ………………………………………………………………………………. [1]
Copyright (c) - Shephat Phiri
Employer ………………………………………………………………………………. [1]
(c) State one potential risk of using e-banking.
………………………………………………………………………………………….. [1]
(d) Name one device commonly used to access e-banking services.
………………………………………………………………………………………….. [1]
[Total: 6 marks]

5. (a) Define Graphical User Interface


………………………………………………………………………………………………
………………………………………………………………………………………… [2]
(b) State two features of GUI
1. ………………………………………. 2. ……………………………………….. [2]
(c) Give one advantages of using a GUI compared to a CLI (Command Line Interface).
………………………………………………………………………………………….. [1]
(d) Explain how GUIs make computers easier to use for beginners
………………………………………………………………………………………….. [1]
[Total: 6 marks]

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy