Herentals Tynwald ICT HOLIDAY WORK Grade 6
ANSWER ALL QUESTIONS and WRITE FULL SENTENCES
1. The creation of a copy of data on a computer system for safe keeping is
referred to as ______
A. data backup B. data entry C. data filtering D. data restoration
2. All of the following are reasons for using ICT in education except __________
A. forcing students to learn at others’ pace
B. increasing learner motivation and engagement
C. facilitating the acquisition of basic skills in subject areas
D. enhancing teaching through the use of presentation software
3. Computer virus is capable of _________
A. enhancing the contents of a file
B. maintaining the computer system
C. making the work of the computer easy
D. slowing down the computer system performance
4. A program on the computer which enables users to type letters to friends
is_______
A. browser B. spreadsheet C. utility D. word processor
5. The command that enables the user to save a previously saved document
under a new name is_______
A. new B. rename C. save D. save as
6. Which of the following devices has the largest storage capacity _______
A. Compact disc (CD) B. Digital versatile disc (DVD) C. Floppy disk D. Hard
disk drive (HDD)
7. Processed data which is meaningful to the computer user is called ______
A. database B. information C. input D. output
8. The following are possible health hazards of prolonged use of the
computer system except _____________
A. back and neck pains B. eye strain C. tuberculosis D. wrist pains
9. Which key on the keyboard is used to erase typed characters in word
processing application?
A. Backspace B. Enter C. Insert D. Shift
10. The key on the QWERTY keyboard used to produce alphabetic upper
case letters is _______
A. Caps Lock B. Home C. Num Lock D. Tab
11. The internet is a ___________
A. global network of computers
B. government agency that links computers
C. software for designing programs
D. special network of computers in an office
12. A program that detects viruses and protects a computer system from
malware attacks is called __________
A. Computer virus B. Firewall C. Antivirus D. Barrier
13. The act of pressing a computer mouse button twice quickly without
moving the mouse is termed ________
A. double clicking B. right clicking C. single clicking D. normal clicking
14. Which of the following is a storage device?
A. Mouse B. Printer C. Keyboard D. USB Flash drive
15. Which of the following is an effect of listening to loud music through
earphones connected to a mobile phone?
A. Wrist pain B. Back and Neck pain C. Headache D. Hearing impairment
16. A mathematical calculation on a spreadsheet is called ________
A. label B. formula C. number D. value
17. A USB Flash drive _________
A. inputs information
B. puts out information
C. Processes information
D. stores information
18. To copy a file means to ________
A. cut the file from the desktop
B. delete the file into recycle bin
C. make a duplicate of the file
D. remove the file from a folder
19. Which one of the following is most likely to improve the performance of
the computer?
A. Increasing the number of applications running simultaneously
B. Increasing the size of the computer monitor being used
C. Increasing the amount of RAM
D. Attaching a bigger printer
20. What is the best way to protect a computer against data loss?
A. Lock the computer when it is not being used
B. Change your password regularly
C. Delete archive files each month
D. Make regular backups of data to an external storage device
21. A ________ on a database table contains uniform information according
to the set data type.
A. Record B. Field C. Row D. Grid
22. Disk defragmentation is important because it ______
A. Increases storage space and improves computer performance
B. Deletes important data files
C. Removes computer viruses
D. Stores data for later retrieval
23. A _______ is structured collection of related digital information that is
organised for easy maintenance, access and updating.
A. Database. B. Personal Digital Assistant
C. Microsoft Access D. Microcomputer
24. ______ is a process of arranging records in ascending or descending
order according to the user’s needs.
A. Searching B. Sorting
C. Resizing D. Browsing
25. Before entering data into fields on a database table, we set ______
A. Data styles B. Data types
C. Data files D. Datasheet