0% found this document useful (0 votes)
7 views5 pages

ICTD

Introduction to CTD
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views5 pages

ICTD

Introduction to CTD
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

IT/OS/ICT/CC/01/4/A

USE OF ICT DEVICES


NOV/DEC 2024
TIME: 2HOURS

KENDEGE TECHNICAL AND VOCATIONAL COLLEGE

ICT ASSISSTANT LEVEL 4

WRITTEN ASSESSMENT
USE OF ICT DEVICES
2 HOURS

INSTRUCTIONS TO CANDIDATES
Answer ALL questions
Candidates should answer the questions in English.
SECTION A: (10 MARKS)
1. The following is a list of software. Identify one that is used to protect computers against
viruses.
A. MS-Windows
B. Kaspersky
C. Mac OS
D. Linux

2. Which of the following is a network topology?


A. WAN
B. PAN
C. HYBRID
D. MAN

3. A___________ is used as a data privacy and threat control measure that prevents
unauthorized access to information.
A. Password
B. Malware
C. Hacker
D. Virus
4. The following is a list of application software used to accomplish specific tasks. Identify one
that is used for statistical analysis.
A. Databases
B. Word processor
C. spreadsheet
D. Desktop publishing

5. From the list provided, identify a hardware component that is used to feed data into the
computer.
A. Keyboard
B. Flash disk
C. Visual Display Unit
D. Printer

6. Which of the following statements best describes booting?


A. Stopping the computer
B. Starting the computer
C. Saving work
D. Duplicating work

7. ______ is abbreviated as ICT.


A. Information centre technology
B. Inside communication technology
C. Information communication technology
D. Information communication training
8. A computer keyboard comprises of many keys that perform different functions. Which of the
following is not a computer keyboard key?
A. Shift key
B. Escape
C. Pause
D. Exit

9. Which shortcut key is used to refresh a computer windows desktop?


A. F1
B. F2
C. F5
D. F12

10. Which of the following terms best describes the user’s safety and comfort while using a
computer?
A. Safety precautions
B. Human interaction
C. Ergonomics
D. Computer security
SECTION B: 40 MARKS
11. The operating system performs several functions in a computer. Outline four such functions.
[4 marks]
12. a) Explain the term computer network. [2 marks]
b) Distinguish between local area network and metropolitan area network. [4 marks]
13. Josh bought a new computer and installed it with different application software to perform
daily office activities. Using examples, state four categories of these application software may
have installed. [4 marks]
14. Computers are used in various fields such as teaching and learning. Explain any other three
areas where they could be used. [6 marks]
15. List four computer output devices. [4 marks]
16. Mercy wanted to purchase a new laptop; state any four factors she could consider when
purchasing her computer. [4 marks]
17. Differentiate between right-clicking and double-clicking mouse techniques. [4 marks]
18. Kilonzo has been browsing the internet for a while now. Identify four security threats that he
is likely to encounter while using his computer. [4 marks]
19. Explain two circumstances that would necessitate the use of bar-code readers as an input
method. [4 marks]

THIS IS THE LAST PRINTED PAGE

You might also like