KIIRUA TECHNICAL TRAINING INSTITUTE
P.O BOX 1931-60200 MERU-KENYA
Cell: 0718621864
E-Mail:
[email protected] Website: www.kiiruatti.ac.ke
IM/ LEVEL 4/ JAN 2024
UNIT OF COMPETENCE: DIGITAL LITERACY.
WRITTEN ASSESSMENT.
TIME: 3 HOURS.
INSTRUCTIONS TO CANDINDATES.
1. This assessment requires you to demonstrate competence against unit of competency:
Digital literacy.
2. You have THREE HOURS to answer all the questions.
3. Marks for each question are indicated in the brackets.
4. This paper consists of THREE sections: A, B & C.
5. You are provided with a separate answer booklet.
This paper has 5 printed pages.
1
SECTION A (20 MARKS)
(Answer all the questions it this section)
1. WAN stands for?
a) Wide area network b) Wide access network
c) Wide arithmetic network
2. Program used to control system performance is classified as.
a) Experimental program b) System program
c) Specialized program d) Organized program
3. Examples of system programs include
a) Operating system b) Trace program
c) Compiler d) All of the above
4. Which of the following is not a computer hardware?
a) Malware b) Monitor
c) Compact disk d) Hard disk
5. A computer network consists of two or more computing or other devices connected
by?
a) Cable b) wireless signal
c) Communication media d) Wire
6. Which is not a method of protecting data from computer threats?
a) Pursuing b) Rootkit
c) Spam d) All the above
7. The process of an illegal entity to gain access to a company’s data or information
is?
a) Security threat b) Data privacy
c) Data security d) Data integrity.
8. Which one of the following is not a computer threat or crime?
a) Computer virus b) Malware
c) Rootkit d) None of the above
9. Which one of the following are categories of the risk of security threats?
a) Damage b) Negligence
c) Affected user d) Both a and c
10. Security threats can be classified as.
a) Physical damage b) Technical failures
c) Compromise of functions d) All the above
11. What stores information in databases?
a) Query b) Report
c) Table d) All the above
12. In a computer, a tool which is used to find a similar or alternative word in a
document is called?
a) Finder b) Thesaurus
c) Dictionary d) Style Cluster
13. Computer word processing includes process of?
2
a) Entering text b) Editing text
c) Formatting document d) All of the above
14. The program that lets the user browse through information on the web is called.
a) Intranet b) Extranet
c) Web browser d) Web pages
15. In internet technology IP means?
a) Internet provider b) Internet protocol
c) Internet procedures d) Internet processor.
16. A website’s front page/main page is called?
a) Browser page b) Search page
c) Home page d) Bookmark
17. Verification of a log in name and password is known as?
a) Configuration b) Accessibility
c) Authentication d) Logging in
18. You have finished your travel brochures for social studies. How can you see what
your document will look like before printing?
a) View brochure b) Print review
c) Open the brochure d) You can’t you must print it first
19. Typing in ALL CAPS and small CAPS is the same thing?
a) True
b) False
20. Which photography file format is common printed documents?
a) TYEG b) GIF
c) TIFF d) AVL
SECTION B (40 MARKS)
(Answer all the questions it this section)
21. Define the following terms (10 marks)
a) ICT
b) Data
c) Information
d) Security threats
e) Operating systems
22. Differentiate between computer hardware and software. (2 marks)
23. State four components of a computer (4 marks)
3
24. Explain two types of computer software (4 marks)
25. Explain two types of computer booting (4 marks)
26. Write the procedure for changing the name of the existing folder. (2 marks)
27. Differentiate between LAN and WAN in networking (4 marks)
28. State and explain the two special types of computer memory (4 marks)
29. State four Functions of operating system (4 marks)
30. State Two uses of word processor (2 marks)
SECTION C. (40 MARKS)
(Attempt any TWO questions in this section, Each question has 20 marks.)
31.
a) Joel was asked to source for an internet service provider to supply his college
with internet. Discuss FOUR factors to consider during the selection.
(8 marks)
b) Explain Four advantages of using computers in banking. (8 marks)
c) Hacking is the gaining access to data in a computer system. It is a major threat
to any business that has automated its operations. Identify FOUR measures
you should undertake to prevent hacking of your online account, phone, tablet
or personal computers. (4 marks)
32.
a) Computing machines can be classified in many ways and these classifications
depend on their functions and definitions. Describe THREE types of
computers based on their processing power. (6 marks)
4
b) The internet is a vast network that connects computers all over the world.
Through the internet, people can share information and communicate from
anywhere with an internet connection. Based on a recent survey of internet
traffic, internet is widely being used in education institutions, cyber, homes
and almost all organizations that have automated their operations. Explain
FOUR uses of internet that makes it popular in our society today.
(8 marks)
c) Explain THREE ways in which ICT has impacted Education in Kenya.
(6 marks)
33.
a) Utility software is a program used frequently to carry out routine jobs in
computer systems. Explain the FIVE types of utility software (10 marks)
b) Due to the evolving world of technology new computers are developed day in
day out. Explain the FIVE generation of computers (10 marks)
THIS IS THE LAST PRINTED PAGE.