0% found this document useful (0 votes)
276 views7 pages

Digital Literacy Level 5

The document outlines the written assessment for the Perioperative Theatre Technology Level 5 qualification, focusing on digital literacy. It includes instructions for candidates, details about the assessment structure, and a series of questions divided into three sections, covering topics such as computer networks, data security, and the use of software applications. Candidates are required to answer multiple-choice questions, short answer questions, and essay-type questions within a specified time frame.

Uploaded by

limocamila218
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
276 views7 pages

Digital Literacy Level 5

The document outlines the written assessment for the Perioperative Theatre Technology Level 5 qualification, focusing on digital literacy. It includes instructions for candidates, details about the assessment structure, and a series of questions divided into three sections, covering topics such as computer networks, data security, and the use of software applications. Candidates are required to answer multiple-choice questions, short answer questions, and essay-type questions within a specified time frame.

Uploaded by

limocamila218
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

TVET CURRICULUM DEVELOPMENT, ASSESSMENT AND CERTIFICATION

COUNCIL (TVET CDACC)

Qualification Code : 091205T4PTT


Qualification : Perioperative Theatre Technology Level 5
Unit Code : HE/OS/TT/BC/03/5/A
Unit of Competency : Demonstrate Digital Literacy

WRITTEN ASSESSMENT
INSTRUCTIONS TO CANDIDATE
1. You have THREE hours to answer all the questions.
2. Marks for each question are indicated in the brackets.
3. The paper consists of THREE sections: A, B and C.
4. Do not write on the question paper.
5. A separate answer booklet will be provided.

Name of the Candidate: ……………………………………………………………


Registration Code of the Candidate: ………………………………………………
Date: ………………………………………………………………………………
Signature: …………………………………………………………………………
SECTION A (20 MARKS)
(Encircle the correct answer)
(Answer all question Each question is 1 mark)
1. A process control block (PCB) does not contain which of the following?
A. Code
B. Stack
C. Bootstrap program
D. Data
2. Which one of the following is not the state of a process?
A. New
B. Old
C. Waiting
D. Running
3. Which of the following conditions must be satisfied to solve the critical section problem?
A. Mutual Exclusion
B. Progress
C. Bounded Waiting
D. All of the mentioned
4. The two kinds of main memory are
A. CDs and DVDs
B. RAM and ROM
C. Primary and secondary
D. Direct and sequential
5. _____ has the shortest access times.
A. Virtual Memory
B. Secondary Memory
C. Cache Memory
D. All of the above
6. Cache memory acts between
A. CPU and Hard disk
B. RAM and ROM
C. CPU and RAM
D. All of these
7. Functions in excel must begin with?
A. An () sign
B. An equal sign
C. A plus sign
D. A > sign
8. An excel file is generally called a/an:
A. E-spreadsheet
B. Worksheet
C. Workbook
D. Sheet
9. Ellipse motion is a predefined
A. Design template
B. Color scheme
C. Animation scheme
D. Bullet scheme
10. Command which we use in PowerPoint to change the color of different objects without
changing content is
A. Design
B. Color scheme
C. Font color
D. Object color
11. The PowerPoint view that displays only text (title and bullets) is
A. Outline view
B. Notes page view
C. Slide sorter
D. Slide show
12. Computer Network is
A. Collection of hardware components and computers
B. Interconnected by communication channels
C. Sharing of resources and information
D. All of the Above
13. With Uniform Resource Locator (URL), you can retrieve a web page from exact location on
the web. ________________ shows a secured URL during internet surfing.
A. https://www.aickapsowar.ac.ke
B. http://google.com
C. www.digitalworld.org/secured
D. www.google.uk/ secured
14. Unprocessed information, numbers, symbols etc. are collectively known as:
A. Information
B. Data
C. Databases
D. Information processing
15. Which of the following protocol is/are defined in Transport layer?
A. FTP
B. TCP
C. UDP
D. B & C
16. Router operates in which layer of OSI Reference Model?
A. Layer 1 (Physical Layer)
B. Layer 3 (Network Layer)
C. Layer 4 (Transport Layer)
D. Layer 7 (Application Layer)
17. What does Router do in a network?
A. Forwards a packet to all outgoing links
B. Forwards a packet to the next free outgoing link
C. Determines on which outing link a packet is to be forwarded
D. Forwards a packet to all outgoing links except the originated link
18. What is true about data security?
A. Data security is the protection of programs and data in computers and
communication systems against unauthorized access
B. It refers to the right of individuals or organizations to deny or restrict the collection
and use of information
C. Data security requires system managers to reduce unauthorized access to the systems
by building physical arrangements and software checks.
D. All of the above
19. ________ is the process of retaining or keeping of data at a secure place for long-
term storage.
A. Data archiving
B. Archival Storage
C. Disposal of Data
D. Backup
20. It can be a software program or a hardware device that filters all data packets coming
through the internet, a network, etc. it is known as the_______:
A. Antivirus
B. Firewall
C. Cookies
D. Malware
SECTION B (40 MARKS)
(Answer all questions in this section)
21. State at least FOUR underlying principles of ICT. (4 marks)
22. Ethics is the epic centre in digital environment such as Facebook and Instagram. Laws and
regulations ensure that individuals and organizations such as hospitals enjoy privacy rights.
State THREE laws and regulations governing ICT usage in Kenya. (3 marks)
23. Any process that shares data with other processes is a cooperating process. The OS supports
concurrency for different reasons. Identify at least FOUR (4) reasons. (4 marks)
24. Your desk mate, J has opened a window in her laptop so as to work on her assignment.
Highlight at least FIVE (5) parts of an active window. (5 marks)
25. Mr. Y has created an excel spreadsheet so as to tabulate his research findings. Define the
following terms as used in spreadsheets. (4 marks)
26. Outline FIVE (5) types of keys used in database management system (DBMS).
(5
marks)
27. Computer’s network is highly used in the current world to accomplish a variety of tasks.
Highlight at least FOUR (4) uses of computer network. (4 marks)
28. Electronic-mail has become quite essential to have in the current world. As you create an e-
mail account, you are required to create a password. What FIVE aspects of a strong
password will you consider? (5 marks)
29. Briefly explain THREE key parts of URL. (3 marks)
30. Give THREE examples of operating systems you would consider when buying a laptop.
(3
marks)
SECTION C (40 MARKS)
(This section has 3 questions answer only 2 questions)
31. The internet is widely used all over the world to accomplish a variety of tasks and activities.
a) Explain any FIVE (5) major uses of internet. (10 marks)
b) Describe any TEN (10) types of topologies used in computer networks.
(10
marks)
32. Computers are used in various areas of hospital workplace. For it to work it needs to have an
operating system.
a) State and explain at least FIVE (5) services of an operating system (OS).
(10
marks)
b) Explain FIVE major fields of health care in which computers plays a role.
(10
marks)
33. A theatre in charge wrote a letter and had it sent to all the theatre staff through mail merge.
a) State the FIVE (5) main benefits of mail merge. (10 marks)
b) The theatre in charge, became a victim of cybercrime and had her confidential
documents displayed in one of the social media accounts. Explain FIVE cyber
security threats that have been on the raise lately. (10 marks)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy