Professional Documents
Culture Documents
Grade 9
Grade 9
1. Explain what is meant by computer hardware and computer software, giving an example of
each. (4)
Hardware:____________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
Software:_____________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
3. ROM & RAM are two different types of memory found in computer.
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
(b)What is ROM? (2)
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
GUI:_________________________________________________________________________
_____________________________________________________________________________
CLI:_________________________________________________________________________
_____________________________________________________________________________
5. Several items of data are input to a computer using direct data entry methods. Write down the
most appropriate input device to input each item of data. (4)
(a) data written in special ink at the bottom of bank cheques
_______________________________________
(b) information on the label of a supermarket product
_______________________________________
(c) shaded in boxes on a students examination answer sheet
_______________________________________
(d) debit card details input at an ATM
_______________________________________
6. Complete the table by identifying the most appropriate input device for each type of
application. (4)
7. Complete the table by identifying the most appropriate output device for each type of
application. (4)
(a) Name two input devices shown on the phone diagram. (2)
1____________________________________________________________________________
2____________________________________________________________________________
(b) Name two storage device which would be available in the phone shown above. (2)
1____________________________________________________________________________
2____________________________________________________________________________
(c) Identify three ways the phone shown above could be used to contact a bank apart from
making a phone call to the bank. (3)
1____________________________________________________________________________
_____________________________________________________________________________
2____________________________________________________________________________
_____________________________________________________________________________
3____________________________________________________________________________
_____________________________________________________________________________
9. Identify two devices which are used in control systems to output data. (2)
_____________________________________________________________________________
_____________________________________________________________________________
10. Give two advantages of a fixed magnetic hard disc compared to an optical disc to store data.
(2)
1____________________________________________________________________________
_____________________________________________________________________________
2____________________________________________________________________________
_____________________________________________________________________________
13. Compare and contrast the use of magnetic tapes with removable magnetic disks to make
network server backups. (3)
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
(b)Explain the difference between the ROM, R and RW description. When would each be used?
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
15. A desktop computer is already used in an office which does not have an internet connection.
(a) Name two items of hardware which would enable the computer to be connected to a local
area network. (2)
1____________________________________________________________________________
2____________________________________________________________________________
(b) Name one item of hardware which would enable the network to be connected to the internet.
___________________________________________________________________________(1)
16. (a) Identify four different items of data that are input at an ATM when cash is withdrawn by
a customer or read from the card. (2)
1____________________________________________________________________________
2____________________________________________________________________________
3____________________________________________________________________________
4____________________________________________________________________________
(b) Discuss the advantages and disadvantages of the use of a local ATM to withdraw cash rather
than travelling to a bank. (4)
Advantage1:___________________________________________________________________
_____________________________________________________________________________
Advantage2:___________________________________________________________________
_____________________________________________________________________________
Disadvantage1:________________________________________________________________
_____________________________________________________________________________
Disadvantage2:________________________________________________________________
_____________________________________________________________________________
17. Tick which of these statements apply to a Blog, a Microblog or a Wiki. (2)
18. Complete each of the sentences using the most appropriate word from the list below. (3)
batch sensor OCR
fan MICR direct
serial motor
(a) The type of processing used for processing bank cheques is called ___________________
(b) The type of access used on a magnetic hard disc is called __________________________
(c) An item of hardware which is used to open windows is called a _____________________
19. Many computer networks are connected using cables but some are now connected using
wireless technology.
Discuss the advantages and disadvantages of using wireless networks compared to using cabled
networks. (4)
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
(b) Apart from saving costs and travelling time, describe the advantages to the company of
having a video-conference rather than a conference in a hotel. (3)
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
23. There are a number of different types of area networks.
Tick whether the following statements apply to a WAN, LAN, or a WLAN. (2)
24. To prevent the customers bank details being read by hackers, the bank uses encryption.
Explain what is meant by encryption. (2)
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
25. Recaud Inc. stock many CDs. Below is a small selection of CDs stored on their database. (2)
Write down the most suitable data type for the following fields.
CD_title_______________________________________________________________________
Price (Rs) _____________________________________________________________________
Year_released__________________________________________________________________
Number_of_tracks______________________________________________________________
26. A head teacher keeps all details of students in a database. (3)
(a) Describe what is meant by the following terms, using examples of student data.
Field:_________________________________________________________________________
_____________________________________________________________________________
File:__________________________________________________________________________
_____________________________________________________________________________
Record:_______________________________________________________________________
_____________________________________________________________________________
(b) Describe what is meant by a key field, using examples of student data. (2)
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
28. A school is going to install a new computer system that uses Wi-Fi. The head teacher is very
concerned about the problems that the introduction of such a system will cause.
The safety issue of students tripping over trailing cables has been minimized by using Wi-Fi, and
the risk of electrocution has been minimized by the use of automatic circuit breakers.
(a) Give two other safety issues which might occur and for each one describe a method of
preventing it. (3)
SafetyIssue1:___________________________________________________________________
_____________________________________________________________________________
Prevention:____________________________________________________________________
_____________________________________________________________________________
SafetyIssue2:___________________________________________________________________
_____________________________________________________________________________
Prevention:____________________________________________________________________
_____________________________________________________________________________
(b) Describe what a virus is and explain how viruses cause problems for computer users. (2)
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
(c) If hackers get into the system, they may plant spyware. Describe what is meant by spyware.
(2)
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________