Professional Documents
Culture Documents
2024 Grade 8 Pre Technical End Term Exam Term 1 15 24 Mar 10 40 07
2024 Grade 8 Pre Technical End Term Exam Term 1 15 24 Mar 10 40 07
PRE-TECHNICAL STUDIES
SCHOOL: ……….……………………………………………………..……
NAME: ……………….…………………..………………………...………..
G8
SIGNATURE: ………………ASSESSMENT NO…………………………..
OUT OF 100%
FOR FACILITATOR’S USE ONLY LEARNERS SCORE
PERCENTAGE SCORE
PERFORMANCE LEVEL
PRE-TECHNICAL STUDIES
SCHOOL: ……….……………………………………………………..……
NAME: ……………….…………………..………………………...………..
G8
SIGNATURE: ………………ASSESSMENT NO…………………………..
OUT OF 100%
FOR FACILITATOR’S USE ONLY LEARNERS SCORE
PERCENTAGE SCORE
PERFORMANCE LEVEL
copper
Bronze
Aluminum
35.Write in full. (3mks)
a.) ALU
The full form of ALU is arithmetic logic unit. It is a combinational digital circuit that performs
arithmetic operations on binary numbers.
b.) USB
USB, in full universal serial bus, technology used to connect computers with peripheral devices
c.) HDMI
The full form of HDMI is the High Definition Multimedia Interface. It is an all-digital audio-
video interface that transmits information to a computer monitor, video projector, digital
television and so on, in uncompressed mode.
36.State two problems experienced when setting up computers. (2mks)
c. The Computer Won't Start.
d. A computer that suddenly shuts off or has difficulty starting up
e. Have a failing power supply.
f. The Screen is Blank.
g. Abnormally Functioning Operating System or Software.
h. Windows Won't Boot.
i. The Screen is frozen.
j. Computer is Slow.
k. Strange Noises.
l. Slow Internet.
m. Forgotten passwords
37. List down three causes of Repetitive Strain Injury (RSI) (3mks)
c. Repetitive strain injury (RSI) is caused by repeated use of a body part, such as your
shoulder, elbow, forearm, wrist or hand.
d. Some examples of activities that can cause RSI are computer use, carpentry, material
handling, or even recreational activities
38. State three physical threats to computers. (3mks)
d. Virus.
e. Trojans.
f. Worms.
g. Spyware.
h. Key loggers.
i. Adware.
j. Denial of Service Attacks.
k. Distributed Denial of Service Attacks
d. Wood.
e. Stones.
f. Textile.
g. Soil.
h. Glass.
i. Leather.
j. Plastic.
k. Rubber.
l. Water.
m. Air among others
CPU/Processor
Monitor/screen
Keyboard Mouse
49.State three examples of safety measures. (3 mks)
d.Wearing face mask to prevent spreading of airborne diseases or breathing in dirty air.
e.Buckling a safety belt while in a vehicle to avoid falling off the seat in case of
emergency brakes.
f. Wearing hand gloves when working to avoid injury and dirt to the hands when working.
g.Wearing gum boots to protect the feet from injury when working in areas with mud or
sharp objects.
h.Wearing an overall to guard against soiling clothes.
e. Sharp edged tools and objects that can easily cut or poke someone.
f. Disarranged rooms where one can easily tumble and fall.
g. Naked electric wires that can easily cause electric shock.
h. Poorly lit rooms where one can easily know oneself against objects.
i. Poorly stored items on the shelves where they can easily fall off and hit someone.
j. Working without protective gear where one can easily be hurt or injured.
k. Rooms with wet slippery floors where one can easily slip and fall.
36
G
O70544
MWA N
80
I
e. Malware/virus attack.
f. Hacking.
g. Data theft.
h. Cyber bullying.
i. Friend requests from unknown people.
j. Phishing attacks.
k. Ransom ware-attempts to encrypt data and calling for ransom to release it or unlock
code
52.State three ideas and practices on how to personal and sensitive data from the public when
online. (3 mks)
d. Protect and manage personal information.
e. Do not accept friend requests from strangers.
f. Avoiding harmful or illegal content.
g. Buy online items from secure and trusted sites.
h. Installation of antivirus software.
i. Backing up data.
j. Use of strong passwords.
k. Log out from your online accounts after using public internet to browse.
l. Do not communicate with strangers online.