Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

OLD NTRONANG M/A BASIC SCHOOL

END OF SECOND TERM ASSESSMENT

2023/2024 ACADEMIC YEAR

SUBJECT: COMPUTING DATE: ……………

CLASS: BASIC 8

NAME: …………………………………………………

[20 marks]
Answer Question 1 (compulsory)
1. Study the devices in Figure 1 carefully and answer the questions that
follow.

I II III
Figure 1
a) i. Write the general name given to the devices in Figure 1. 2 marks
ii. Name the devices in Figure 1. 10 marks
iii. Mention two advantages of the device labelled II. 4 marks

SECTION B
[36 MARKS]
Answer three questions only from this section.
1. Give two (2) advantages of using Instagram. 4 marks
b. List four (4) examples of data entry devices 4 marks
c. State two (2) uses of USB flash drives 2 marks

2. Give two (2) storage devices that use flash memory 2 marks
b. Classify the following social media sites into the headings into
Photo Sharing social media Video sharing social media.

(YouTube, TikTok, 500px, Vimeo, Snapchat, Pinterest) 6 marks

3 . Give any two (2) uses of smart watch. 4 marks

b. Write the following acronyms in full as used in computer networking. 2


marks

i. TCP ii. DNS

PAPER 1
OBJECTIVE TEST
Answer All Questions
1. Fifth generation of computers used ……
A. microprocessor. B. artificial intelligence. C. vacuum tube based
D. integrated circuit based.
2. A cartoon avatar that represents you is called A. Emoji. B. bitmoji.
C. filter. D. Flickr.
3. A special photo overlays which are used to dress up a snap is referred
to as
A. stickers. B. emojis. C. geo-filters. D. pinboard.
4. Which of the following is true about quantum computing? Quantum
computers…..
A. calculateswith cubits. B. have high error rates. C. are well-suited
for data analysis.
D. calculates in transistors.
5. To upload images on the photo sharing website, first ………..them so
that it is easy to find them while uploading. A. remove B. organize
C. create D. delete
6. Posting a picture or a video in Pinterest is known as………….. A.
pinning. B. snapping. C. tweeting. D. living.
7. One of the commonly used photo sharing website is A. Facebook
lives B. TikTok C. Google Photos D. Pinterest
8. To defraud someone or an organization by creating fake documents or
modifying an existing document is called A. forgery. B. vandalism. C.
plagiarism. D. piracy.
9. Network fabrication attacks the …….of the system. A. confidentiality
B. integrityC. authenticity D. security
10. Which of the following hackers use their knowledge to hack to check
their own security system to make it more hack-proof? A. White hat
hacker B. Black hat hacker
C. Grey hat hacker D. Red hat hacker
11. The type of threat in which an attacker floods the server resources and
exhausts the network bandwidth is known as A. network delivered
threat. B. data extortion.
C. blackhole attack. D. data security.
12. The term used to describe a group of individuals who scam users is
termed as
A. plagiarism. B. phishing. C. virus. D. malware.
13. Google uses automated programs known as ………which finds pages
on the web.
A. crawlers B. meta search C. finders D. searcher
14. Which one of these is used to raise one value to the power of second
value and calculates it? A. Exponentiation B. Modulus C. Division
D. Multiplication
15. Logical note takes only ……….operand(s). A. zero B. one C. two
D. three
16. The errors that occur in MS Excel when the text in the formula is not
recognized is …… A. #### Error B. #REF! Error C. #NUM! Error
D. #NULL! Error
17. In programming, the flowchart symbol for processing symbol
is……… A. rectangular.
B. diamond. C. oval. D. square.
18. Visual impairment refers to the categories of people who are not able
to ……….. A. blind. B. deaf. C. dumb. D. walk.
19. When a computer program runs, a value that does not change is
termed as…. A. variable. B. constant. C. expression. D. statement.
20. All the listed below are examples of sites use for sharing video except
…………. A. Facebook Live. B. Vimeo. C. YouTube. D.
Instagram.

You might also like