Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

Africa Inland Church

AIC NAIVASHA TECHNICAL TRAINING INSTITUTE


CURRICULUM DEVELOPMENT, ASSESSMENT AND CERTIFICATION
COUNCIL (CDACC)

DEMONSTRATE DIGITAL LITERACY


END OF THE TERM EXAMINATION

March 2024
TIME: 2 HOURS

INSTRUCTIONS TO CANDIDATES

1. This assessment requires you to demonstrate competence against unit of competency: Demonstrate Digital
Literacy
2. You have TWO hours to answer all the questions.
3. Marks for each section are indicated in the brackets.
4. This paper consists of THREE sections: A, B and C
5. This paper consists of twenty nine questions in 4 printed pages.
6. This paper carries 70 Marks
SECTION A MULTIPLE CHOICE QUESTIONS (30 MARKS) (Encircle the correct
answer, each question carries one (2) mark.)

1. WAN stands for?


A. Wide area network
B. Wide access network
C. Wide arithmetic network
D. Wireless authentication network
2. The process of an illegal entity to gain access to a company’s data or information
is?
A. Security threat
B. Data privacy
C. Data security
D. Data integrity.
3. Program used to control system performance is classified as.
A. Experimental program
B. System program
C. Specialized program
D. Organized program
4. A computer network consists of two or more computing or other devices connected
by a?
A. Wireless signal
B. Cable
C. Communication media
D. Wire
5. Examples of system programs include
A. Operating system
B. Trace program
C. Compiler
D. All of the above
6. Security threats can be classified as.
A. Physical damage
B. Technical failures
C. Compromise of functions
D. All the above
7. Which one of the following is an odd one out when looking at the functions of ICT?
A. Generation of information
B. Storage of information
C. Data capture
D. None of the above
8. Which one of the following is not a classification of computers on the basis of size?
A. Analogue computers
B. Minicomputers
C. Mainframe computers
D. Supercomputers

2|Page
9. Types of computer software are
A. System software
B. Logic software
C. Both A and B
D. None of the above
10. Which of the following is not a computer hardware?
A. Malware
B. Monitor
C. Compact disk
D. Hard disk
11. Which is not a method of protecting data from computer threats?
A. Pursuing
B. Rootkit
C. Spam
D. All the above
12. Which one of the following is not a computer threat or crime?
A. Computer virus
B. Malware
C. Rootkit
D. None of the above
13. Which one of the following are categories of the risk of security threats?
A. Damage
B. Negligence
C. Affected user
D. Both a and c
14. What does download from the internet mean?
A. Retrieving files from the internet
B. Lowering your game level on the internet
C. Viewing web pages on the internet.
D. None of the above
15. The process of transferring files from a computer on the internet to your
computer is called?
A. Uploading
B. Forwarding
C. FTP
D. Downloading.

3|Page
SECTION B -20 marks (each question contains 2 marks)

16. Which network covers a relatively small geographical area?


17. WLAN stands for.
18. What is a computer software?
19. What are embedded computers?
20. What is an operating system?
21. What is data?
22. What is a computer virus?
23. What is data privacy?
24. What is data security?
25. What is a security threat?

SECTION C -20 answer any two (2) questions (each question contains 10 marks)

26) The computer will be of no use unless it is able to communicate with the User.
What are the five input devices a computer can use to bring information INTO the
computer? (10mks)

27) What are five functions of Operating System in computer System? (10mks)

28) A computer virus is a program written to alter the way a computer operates,
without the permission or knowledge of the user. What are the five methods a
computer user can use to prevent his/her computer from being infected with viruses?
(10mks)

29) Computing machines can be classified in many ways and these classifications
depend on their functions and definitions. Explain the two classifications of
computers based on the data they process? (10 marks)

<<< This is the last printed page>>>

4|Page

You might also like