Page 1 of 7
Name: ……………………………………………….. Class: 9 Cobalt/Copper
MOPANI COPPER MINES NKANA SCHOOL
2024 Grade 9 Revision Toolkit #11
Computer Studies Paper 1 402/1
2024
Time: 1 hour 20 minutes Total Marks 70
INSTRUCTIONS TO CANDIDATES
1. Write your name class on top of the answer sheet.
2. Cross out the correct answer under section A.
3. Answers all questions in this paper. Answers for this examination must be written in the
space provided.
Information for Candidates
1 The number of marks is shown in brackets [ ] at the end of each question or part
question.
2 Cell phones are NOT allowed in the examination room
Turn Over
Page 2 of 7
Section A (20 marks)
Answer all questions.
1. Which of the following is a type of printer?
(a) Inkjet
(b) USB
(c) Ethernet
(d) ROM
2. What does the term “bit” refer to in computing?
(a) A file format
(b) A basic unit of data
(c) A processing speed
(d) A hardware component
3. Which of the following describes cloud storage?
(a) Storing data on an external hard drive
(b) Storing data on a local computer
(c) Storing data on a remote server
(d) Storing data on a flash drive
4. Which of the following is a characteristic of ROM?
(a) Volatile memory
(b) Can be rewritten
(c) Permanent storage
(d) Temporary storage
5. Which of these is a feature of a word processor?
(a) Writing code
(b) Editing text
(c) Managing files
(d) Compressing file
6. Which of the following describes the function of encryption?
(a) Allowing files to be shared across a network
(b) Compressing large files
(c) Securing data by converting it into a secret code
(d) Improving computer speed
7. Which of the following is NOT a storage device?
(a) Hard Disk
(b) DVD
(c) Keyboard
(d) Flash Drive
Page 3 of 7
8. What is the function of the control unit in a CPU?
(a) Perform calculations
(b) Store data
(c) Manage data flow within the CPU
(d) Display results on the monitor
9. Which of the following describes malware?
(a) A hardware component
(b) Software designed to harm a computer
(c) A tool for data recovery
(d) A feature of an operating system
10. What does BIOS stand for?
(a) Binary Input/Output System
(b) Basic Integrated Operating System
(c) Basic Input/Output System
(d) Binary Information Output System
11. What is the primary function of a router in a computer network?
(a) Store data
(b) Convert data into audio
(c) Direct data traffic between networks
(d) Perform virus scans
12. Which of the following is considered a system utility software?
(a) Disk Cleanup
(b) Microsoft Word
(c) Adobe Photoshop
(d) Google Chrome
13. What is the function of a barcode reader?
(a) Display output on a screen
(b) Read data encoded in barcodes
(c) Transfer data to a network
(d) Store digital data
14. The term “booting” refers to:
(a) Closing an application
(b) Starting up a computer
(c) Connecting to a network
(d) Installing software
15. What is the role of the task manager in Windows?
(a) Display files and folders
(b) Monitor and control running applications and processes
(c) Adjust screen resolution
(d) Format hard drives
Page 4 of 7
16. A computer virus is:
(a) A program that copies itself and infects a computer
(b) A type of hardware
(c) A computer network
(d) A software application
17. Which of the following is a network device?
(a) USB Drive
(b) RAM
(c) Router
(d) Monitor
18. Which of the following is a characteristic of open-source software?
(a) Free to use and modify
(b) Requires a license for each installation
(c) Cannot be distributed
(d) Only available for purchase
19. Which of the following describes a peer-to-peer (P2P) network?
(a) A network where all computers share resources equally
(b) A network with a central server
(c) A network designed for large corporations
(d) A cloud-based network
20. What does IP stand for in the context of computer networks?
(a) Internet Programming
(b) Input Processing
(c) Internet Protocol
(d) Internal Protocol
Section B (20 marks)
Answer all questions
1. A type of malware that holds data for ransom is called ……………….. [1]
2. A hardware device used to permanently store large amounts of data is called ……………..[1]
3. The ……………….. menu in Windows provides options to log off, shut down, or restart the
computer. [1]
4. A ……………….. is a series of instructions that tells a computer how to perform a task [1]
5. A printer’s resolution is measured in ……………….. [1]
6. To remove an application from the system, you can use the ……………….. option in the
control panel. [1]
7. ……………….. software is used to monitor and remove spyware from a computer. [1]
8. In a spreadsheet application, a ……………….. is a collection of rows and columns [1]
Page 5 of 7
9. A file format commonly used for images is …………………….. [1]
10. To increase the performance of a computer, you can add more …………………….. [1]
11. A …………………….. is a harmful program that spreads itself by attaching to other files [1]
12. ………………….. is a type of device that helps prevent data loss during a power failure [1]
13. A device that captures images or text from documents is called a …………………….. [1]
14. A file extension like .jpg indicates that the file is an ……………………... [1]
15. The term bandwidth refers to the amount of …………………….. that can be transmitted
over a network. [1]
16. The process of upgrading software to improve performance and security is called
…………………….. [1]
17. A gigabyte (GB) is equal to …………………….. megabytes (MB). [1]
18. The process of turning off a computer safely is called………………. [1]
19. ………..is a general term for malicious software. [1]
20. A ……….. is used to create copies of data to restore in case of data loss [1]
Section C (30 marks)
Answer all questions
1. (a) Define the term “internet”
…………………………………………………………………………………………………
…………………………………………………………………………………………….. [1]
(b) Give two examples of web browsers:
1. ……………………………………. 2. ………………………………… [2]
(c) State one difference between the World Wide Web (WWW) and the Internet
…………………………………………………………………………………………………
…………………………………………………………………………………………………
……………………………………………………………………………………………. [1]
(d) What does ISP stand for? ……………………………………………………………. [1]
(f) How does a search engine work?
…………………………………………………………………………………………………
Page 6 of 7
…………………………………………………………………………………………….. [1]
[Total: 6 marks]
2. (a) What is encryption?
…………………………………………………………………………………………………
……………………………………………………………………………………………… [1]
(b) Give one example of a secure communication protocol: ………………………………. [1]
(c) Explain two ways to protect personal data online:
1. ………………………………….. 2. …………………… [2]
(d) Describe a situation where encryption is important:
…………………………………………………………………………………………………
……………………………………………………………………………………………… [2]
[Total: 6 marks]
3. (a) What is the difference between primary storage and secondary storage?
…………………………………………………………………………………………………
…………………………………………………………………………………………….. [1]
(b) Give one example of primary and secondary storage devices.
Example of primary storage …………………………….. [1]
Example of secondary storage …………………………... [1]
(c) Describe how data is stored on a hard disk
………….……………………………………………………………………………………...
…………………………………………………………………………………………….. [1]
(d) Explain the difference between volatile and non-volatile memory
………….……………………………………………………………………………………...
………….……………………………………………………………………………………...
………….……………………………………………………………………………………...
…………………………………………………………………………………………….. [2]
[Total: 6 marks]
4. (a) What is an operating system?
…………………………………………………………………………………………………
…………………………………………………………………………………………….. [1]
Page 7 of 7
(b) Give one example of an operating system: ……………………………………………. [1]
(c) State two functions of an operating system:
1. …………………………………………….. 2. …………………………………… [2]
(d) What is the purpose of system updates?
……………………………………………………………………………………………… [1]
(e) Explain the difference between system software and application software
…………………………………………………………………………………………………
…………………………………………………………………………………………………
……………………………………………………………………………………………… [1]
[Total: 6 marks]
5. (a) What is cybersecurity?
……………………………………………………………………………………………… [1]
(b) Name two types of cyber threats:
1. ………………………………….. [1]
2. …………………………………. [1]
(c) Explain two methods to prevent cyberattacks:
………………………………………………………….………………………………….. [1]
(d) What is the role of a firewall in network security?
……………………………………………………………………………………………… [1]
(e) Describe the difference between a virus and a worm:
…………………………………………………………………………………………………
…………….……………………………………………………………………………… [1]
[Total: 6 marks]
END OF EXAMINATION.