MINISTRY OF EDUCATION
CENTRAL PROVINCE
JUNIOR SECONDARY SCHOOL PROVINCIAL COMMON MOCK EXAMINATION (GRADE 9) - 2023
COMPUTER STUDIES 402/2
PAPER 1
(INTERNAL CANDIDATES)
Time: 1 Hour 45 Minutes 70 Marks
NAME: …………………………………………………………………………………………………..........
CLASS: ………………………………………………………………………………………………….........
SCHOOL: ………………………………………………………...………………………………………......
Instructions to candidates
1. Write your name, Class and School name on the answer sheet.
2. There are three sections in this question paper, Section A, B and C. Answer all the questions in all
three (3) sections.
(i) In Section A for each question, four (4) suggested answers are given A, B, C and D are given.
Choose the best answer by Crossing (X) on the multiple choice provided in the questions.
(ii) In Section B and C write all your answers in the spaces provided in the questions.
Information to candidates
Cell phones are not allowed in the examination room.
©CP/2023/A1 This Question Paper Consists of 7 Printed Pages.
Page 2 of 7
SECTION A [15 MARKS]
1 A set of instructions that performs a specific task for a user is known as ……….
A software.
B operating system.
C application software.
D system software.
2 An example of the components of a multimedia presentation could include
A image, digital camera, sound.
B video, graphics, e-mail addresses.
C text, hypertext, Power Point.
D text, video, image.
3 A byte consists of ……
A 0 or 1 bit
B 0 bit
C 1 bit
D 8 bits
4 Which is not an example of a peripheral device?
A Keyboard
B Mouse
C Register
D Speakers
5 The speed at which a CPU processes data to convert it, is measured in
A megabytes.
B gigahertz.
C gigabytes.
D terabytes.
6 Which type of network is usually found in schools and businesses located in a small geographical
area?
A LAN
B WAN
C MAN
D PAN
7 Which of the following is an example of cyberbullying?
A Sending friendly emails to a classmate.
B Helping your friend with her homework online.
C Gathering and posting personal information on an individual online.
D None of the above.
8 Applications of computers in banking include all of the following, except:
A CAI
B EFT
C Smart cards
D ATM
9 From which group would you find the functions to apply effects to characters?
A Clipboard
B Font
C Paragraph
D Styles
Computer Studies/402/1/2023
Page 3 of 7
10 Which of the following is not an effective guideline to follow when creating a presentation?
A Use consistent animations
B Use as many graphics as possible
C Be mindful of the sound quality
D Limit the number of colors
11 The ALU processes data and stores it in:
A the main memory
B a flash drive
C a sound card.
D modem.
12 Which of these is used in banks to read cheques?
A OMR
B OCR
C Barcodes
D MICR
13 RAM is volatile. This means:
A that if the computer is rebooted, all the data and instructions held in RAM are lost.
B that the data and instructions held in RAM are permanent.
C that RAM holds data that can be quickly accessed by the control unit.
D all of the above.
14 A file name usually consists of two parts – the name and the extension, separated by a dot.
Which is an example of a graphic file extension?
A DOC
B SYS
C TXT
D JPEG
15 Utility programs are an example of:
A system software programs.
B application software programs.
C graphic programs.
D productivity software.
16 Lower back pain due to extended computer use may be reduced or eliminated by:
A using a firm, adjustable and comfortable chair.
B stretching your lower back now and then by standing up and pulling each knee to
your chest, holding that position for a few seconds.
C relaxing your shoulders.
D all of the above.
17 Which of these refers to Intellectual property (IP)?
A Ideas
B Art
C Inventions
D All of these
18 A website is a collection of:
A sound files.
B graphic images.
C animation files.
D webpages.
Computer Studies/402/1/2023
Page 4 of 7
19 The following are examples of software piracy except:
A internet piracy.
B counterfeiting.
C freeware duplication.
D licensed-user duplication for unlicensed users.
20 To find and load a file that has been saved, select the
A close command.
B new command.
C open command.
D save command.
SECTION B [20 MARKS]
There are fifteen (15) questions in this section.
Answer all questions in this section by using one word or short phrase
Write all your answers in the spaces provided.
1 All the input, output and storage devices connected to and dependent on a computer system
for operation are called …………………………………………………………………………………… [1]
2 ……………………………..…………………… memory is another name for primary memory, also
called main memory or Immediate Access Store (IMAS). [1]
3 ................................................. is a software you can use for free while
................................................. is a software you can use for free at a specified and then
pay for it when that period elapse. [2]
4 A …………………………………..….. is a group of two or more computers linked together so that
they can share resources and can communicate with one another. [1]
5 A computer system consists of both …………….……………… and ………………………………… [2]
6 ……………………………….. law prohibits unauthorised actions such as duplication,
publication, and sale of the material. [1]
7 ………………………………… program is used for publication while…………………………….……..
Program is used for calculations. [2]
8 Computers are accurate. When you input correct data it will produce correct output and
when you input incorrect data it will produce incorrect outputs. This is known as
………………………………………………………. [1]
9 A …………………………………..………….. is the smallest unit on the screen that can be turned
on and off or coloured in different shades. [1]
10 Memory is the component of CPU. Mention the other two components. [2]
(i) ………………………………………………………… (ii) …………………………………………………….
11 An ………………………………………… computer is a special-purpose computer that is used
inside a device to handle specific functions. [1]
12 The process of receiving data from the internet is known as ……………………………..…….. [1]
13 …………………………..…………….. devices are pieces of equipment that are used to put data
into a computer. [1]
14 A PC consists of a ……………………………………….…, a keyboard, a ………………….……………….
and a display screen. [2]
15 ………………………………………..….….. is entering or accessing an information system without
permission or authority. [1]
Computer Studies/402/1/2023
Page 5 of 7
SECTION C – [30 MARKS]
There are four (4) questions in this section.
Answer all the questions in the spaces provided.
1 The diagram below shows the LED television set. Study it and answer the questions that
follows.
(a) Name any one input and one output device of the diagram above. [2]
Input ……………………………………………………..…………………………………………..
Output ……………………………………………………………………………….……………….
(b) State any two uses of the LED tv. [2]
(i) ………………………………………..……………………………………………………………..
(ii) ………………………………………………………..…………………………………………….
(c) Mention any port found on the LED tv. [1]
……………………………………………………………………………………………………………
2 Long gone are days when people used to write letters to their relatives and friends. The
trend now is that people use emails.
(a) What is an email? [1]
………………………………………………………………………………..…………………………
…………………………………………………………………………….…………………………….
(b) Mention two (2) components of an email [2]
(i) ……………………………………………………………………………………………………….
(ii) ………………………………………………………………………………………………………
(c) List two (2) differences between ISP- based e-mails and web-based
e-mails. [2]
(i) ……………………………………………………………………………………………………...
……………………………………………………………………………………………………..
(ii) .………………………………………………………………………………………………..….
…………………………………...………………………………………………………………..
(d) State any one (1) web browser most frequently used. [1]
……………………………………………………………………………………………..
Computer Studies/402/1/2023
Page 6 of 7
3 The new dawn government through the Bank of Zambia is encouraging citizens make
cashless transaction for their goods and services.
(a) What is cashless transaction? [1]
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
(b) State one (1) advantage of cashless transaction to the seller and one advantage
to the buyer. [2]
(i) Seller ……………………………………………………………………………………………………
……………………………………………………………..….…………………………………
(i) Buyer …………………………………………………….………….….………………………………
…………………………………………………………………………………..…………………
(c) Highlight any two (2) reasons why communities may resist cashless transaction [2]
(i) ………………………………………………………………………………………………………….
……………………………………………………………….…………………………………………
(ii) …………………………………………………………………………………………….………….
…………………………………………………………………………………………………………
(d) State one example of cashless transaction. [1]
……………………………………………………………………………………..………………….
4 Study the diagram below and answer the questions that follows.
Server Computer 1
Computer 2
Network
device
Computer 3
(a) What type of network topology is this? [1]
………………………………………………………………………………………………
(b) Mention any two advantages of this network? [2]
(i) ………………………………………………….………………………………….………………….
………………..………………………………………….……………………………………………
(ii) ……………………………………………………………………….……………………………….
………………………………………………..………………….……………………………………
(c) Explain a situation when this network can malfunction. [1]
…………………………………………………………………………….……………………………….
(d) State any two devices that can enable this network to connect to the internet. [2]
(i) …………………….……….………………………………………………………………………….
(ii) ………………………………..………………………………….……………………………………
(e) State any two internet services that a user can find on the internet. [2]
(i) ………………………………………………………………………………………………………….
(ii) ………………………………………………………………..….……………………………………
Computer Studies/402/1/2023
Page 7 of 7
5 (a) The following table shows common file extensions used in computers. Complete the
table by filling in the missing file type. [3]
FILE EXTENSION TYPE OF FILE
DOCX WORD
XLSX
PPTX
PUB
(b) On each and every productivity it has work areas, for example in a PowerPoint
Presentation it uses a slide. Identify work areas for the following productivity tools;
(i) Spreadsheet:……………………………………………………………………………………. [1]
(ii) Word Processor:………………………………………………………………………………. [1]
The End
Computer Studies/402/1/2023