0% found this document useful (0 votes)
238 views12 pages

ICT Paper2 Essay SHS 2

The document is an examination paper for Information Communication Technology with multiple-choice questions and essay prompts. It consists of three parts: Part 1 includes 50 multiple-choice questions, Part 2 contains essay questions requiring detailed answers, and Part 3 involves practical tasks. The questions cover various topics in ICT, including computer hardware, software, programming languages, and networking.

Uploaded by

kingsley.freeman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
238 views12 pages

ICT Paper2 Essay SHS 2

The document is an examination paper for Information Communication Technology with multiple-choice questions and essay prompts. It consists of three parts: Part 1 includes 50 multiple-choice questions, Part 2 contains essay questions requiring detailed answers, and Part 3 involves practical tasks. The questions cover various topics in ICT, including computer hardware, software, programming languages, and networking.

Uploaded by

kingsley.freeman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

GRACE ACADEMY

END OF THIRD TERM EXAMINATION


INFORMATION COMMUNICATION TECTNOLOGY 2
PART 1: (25 marks)
1 hour

Answer all the questions.

Each question is followed by four options lettered A to D. Find the correct option for each question
and shade in pencil on your answer sheet, the answer space which bears the same letter as the option
you have chosen.

Give only one answer to each question. An example is given below:

The computer's physical parts attached to the system unit are called
A. hardware units.
B. input units.
C. output units.
D. peripheral units.

The correct answer is peripheral units, which is lettered D, and therefore answer space D would be
shaded.

[A] [B] [C] [D]

Think carefully before you shade the answer spaces; erase completely any answer(s) you wish to
change.

Do all rough work on this question paper.

Now answer the following questions.

1. Which of the following data is alpha-numeric? D. collation.


A. 568
B. SS3 3. The BCD equivalent of 135 is
C. 10.00 A. 111101.
D. Twenty-five B. 001011101.
C. 100110101.
2. The process of converting data into D. 000100110101.
information is known as data
A. analysis. 4. Which of the following is an example of
B. collection. information?
C. processing. A. Student's score in a test
B. Recorded observations B. scanner.
C. List of items C. optical mark reader.
D. Average score of students in a test D. barcode reader.

5. The technology used for the first generation of 11. The unit of the computer system that directs
computers was and supervises other units is called the
A. vacuum tubes. A. accumulator.
B. integrated circuit. B. arithmetic logic unit.
C. transistors. C. control unit.
D. microprocessors. D. memory unit.

6. The main distinguishing feature of fifth 12. Input devices are computer devices that can
generation computers is A. be used to get data from the computer
A. liberal use of microprocessor memory.
B. artificial intelligence B. send data and instructions into the computer
C. extremely low cost. memory.
D. versatility. C. receive data and instructions from the
computer memory.
7. The first attempt at using the punch card D. send results to the memory of the computer.
principle to do mathematical calculations led to
the invention of 13. The central processing unit consists of
A. Napier’s bone. A. input output and processing.
B. Abacus. B. control unit primary storage and secondary
C. Charles Babbage Difference Engine. storage.
D. Charles Babbage Analytical Engine. C. control unit arithmetic logic unit and
primary storage.
8. An opening on the motherboard of a system D. control unit processing and primary storage.
unit where expansion cards can be inserted is
known as 14. A wait state of zero in hardware means the
A. extension board A. processor speed is higher than that of
B. extension box. memory.
C. expansion port. B. processor speed is slower than that of the
D. expansion slot. memory.
C. memory is faster than the processor in terms
9. One kilobyte is equivalent to of speed.
A. 1024 bits. D. processor and the memory are equally
B. 1024 bytes. matched in speed.
C. 2 bits.
D. 2 bytes. 15. The set of instructions used to solve specific
user tasks is called
10. An input device that converts an image into a A. application software.
text is known as B. editor.
A. optical character reader. C. system software.
D. utility software.
22. The command used for adding comments in
16. Which of the following commands can be QBASIC programming is
used to switch between open windows? A. CLS.
A. Alt + P4 B. INPUT.
B. Alt + Tab C. REM
C. Ctrl + D D. PRINT
D. Ctrl + F
23. Which of the following QBASIC arithmetic
17. The command used to seek for assistance in operations is the last in order of precedence?
Microsoft disk operating system is A. Addition
A. Helper. B. Division
B. /? C. Exponentiation
C. Attrib. D. Subtraction
D. /S.
Source code Y
(in high level language)
18. The software responsible for allocating and
managing system resources is called
A. driver. Figure 1
B. operating system.
C. translator. 24. The part labelled Y in the compiler interface
D. utility software. in Figure 1 indicates
A. intermediate code.
19. The LET statement in QBASIC B. input code.
A. allows users to assign a value to a variable. C. object code.
B. checks the errors within the code. D. stored code.
C. allows the users to enter data into the
computer from "outside" the program. 25. A program that converts source code
D. allows the users to enter data into the instructions in high-level programming language
computer during program execution. to object codes line by line is known as
A. assembler.
20. Datatypes in QBASIC programming B. compiler.
language include the following except C. interpreter.
A. double. D. editor.
B. float.
C. long. 26. The process of transferring a file from a
D. short server to a computer is called
A. downloading.
21. A good algorithm must be B. uploading.
A. concise and finite. C. browsing.
B. consistent and continuous. D. pinging.
C. detailed and verbose.
D. sequential and lengthy.
26. The protocol used to transfer web pages over B. Ctrl+C
the internet is: C. Ctrl+V
A. FTP D. Ctrl+P
B. HTTP
C. SMTP 33. Which storage device has the fastest access
D. POP3 speed?
A. HDD
27. Which of these is not a programming B. CD-ROM
language? C. SSD
A. Python D. USB Flash Drive
B. HTML
C. Java 34. The function of an operating system’s
D. C++ "kernel" is to:
A. Manage user accounts
28. A network covering a small geographical B. Control hardware/resources
area (e.g., a school) is called: C. Display graphics
A. WAN D. Run antivirus scans
B. LAN
C. MAN 35. A pixel is the smallest unit of a/an:
D. PAN A. Sound file
B. Digital image
29. The binary equivalent of decimal 25 is: C. Database
A. 11001 D. Network packet
B. 10101
C. 10011 36. Which is not a type of malware?
D. 11100 A. Virus
B. Spyware
30. Which device converts digital signals to C. Firewall
analog for telephone line transmission? D. Trojan
A. Modem
B. Router 37. In spreadsheets, the function
C. Switch `=SUM(A1:A5)` will:
D. Hub A. Add values in cells A1 to A5
B. Count cells
31. In databases, a single entry in a table is called C. Find the average
a: D. Multiply values
A. Field
B. Column 38. The inventor of the World Wide Web is:
C. Record A. Bill Gates
D. Primary key B. Tim Berners-Lee
C. Steve Jobs
32. The shortcut to paste in most applications is: D. Mark Zuckerberg
A. Ctrl+X
39. Which topology connects all devices in a 45. A phishing attack aims to steal:
circular chain? A. Hardware
A. Star B. Personal data
B. Mesh C. Software licenses
C. Ring D. Power supply
D. Bus
46. In networking, "IP" stands for:
40. A compiler checks for: A. Internet Password
A. Network errors B. Internet Protocol
B. Syntax errors C. Internal Processing
C. Hardware faults D. Integrated Program
D. User permissions
47. Which is not a search engine?
41. The "www" in a URL stands for: A. Google
A. Wireless Web Window B. Bing
B. World Wide Web C. Yahoo
C. Web Window Works D. WhatsApp
D. Wide Web World
48. The `IF` statement in programming is used
42. In Python, `print("Hello")` is an example of: for:
A. A variable A. Looping
B. A function call B. Decision-making
C. A loop C. Data storage
D. A data type D. Input handling

43. Which is an example of volatile memory? 49. The file extension `.mp3` is for:
A. Hard disk A. Video
B. RAM B. Audio
C. ROM C. Images
D. SSD D. Documents

44. The shortcut to save a file is: 50. A backup is used to:
A. Ctrl+N A. Speed up a computer
B. Ctrl+O B. Prevent data loss
C. Ctrl+S C. Install software
D. Ctrl+P D. Delete files

END OF PAPER 1
PAPER 2 – ESSAY (30 MARKS)
Answer three questions only
All questions carry equal marks–10.
1 hour

QUESTION 1.
Table 1 shows the specification of two laptop computers. Use the table to answer questions 2(a) to 2(c).
FEATURE LAPTOP X LAPTOP Y
Processor 2 GHz, 800 MHz, 1.8 MB 1.6 GHz, 700 MHz, 1.2 MB
cache cache
Storage 1 TB 500 GB
Screen 15.5 inches 10.1 inches
OS Windows 8 Windows 7
Wireless Capability Disabled Enabled
Battery Life 1 hour 4 hours
Weight 3 Kg 18 Kg
Bluetooth Enabled Disabled
Webcam Not available 2.0 MB

A journalist makes long trips by train as part of official assignments. The journalist also needs to make
live communication with editors.

(a) Which of the two laptop computers is more suitable for this journalist? [1 mark]

(b) State three features of the chosen laptop in 2(a) that makes it better. [3 marks]

(c) Give one reason for choosing each of the features stated in 2(b). [6 marks]

QUESTION 2.
The home network of a family has Internet access. A server is configured to control user access to the
network.

(a) (i) State two problems that will likely happen if the children in the family have uncontrolled access to
the Internet. [2 marks]

(ii) Suggest how the problems in 1(a)(i) can be prevented. [2 marks]

(b) Give one reason for the user control access. [1 mark]

(c) To have access to the network, each user logs in with a username and password. The flowchart in
Figure 1 illustrates the authentication process required to log in. Use the information below to complete
the flowchart by placing the letters A to E in the appropriate flowchart symbol numbered (i) to (v).

• A - "Please, enter password to log in."


• B - Is the username found?
• C - Search the username in the database.
• D - Check the password.
• E - Enter the username.

start

Please enter your


username

(i)

Confirm your
username
DB (ii)

(iii)

(iv)

Enter password

DB
(v)

Grant access if
password is found

end

[5 marks]:

QUESTION 3.

a) Define the term programing languages. (2 marks)


b) A flow chart is a type of a diagram that represents a process. In the table below, identify the symbols as
used in a flow chart and their functions.

Symbols Name Function

(5 marks)

c) Define an output device and list four examples. (3 marks)

QUESTION 4)

a) Explain the term algorithm. (1 mark)

b) You are required to design an algorithm to find the average of six values. Supposed the sum of the six
values were given, write your algorithm. (3 marks)

c) there are 6 stages in a program development life cycle which includes the following:

1. Program specification
2. Program design
3. Program code
4. Program test
5. Program documentation
6. Program maintenance

Write a brief note to explain each of the six stages. (6 marks)


QUESTION 5.

a) As a computing student, you are to program a robot to assist your colleagues to buy stationery from a
shop. The sequence of activities undertaken to buy the stationery at the shop is as follows:

– Go to the stationery shop


– Select the needed stationery
– Check the price of the selected stationery
– Go to the cash counter
– Pay money to the cashier
– Take the stationery along
– Leave the shop
Draw a flowchart using the sequence of activities. (5 marks)

b). Programming languages can be classified into two broad categories namely the low-level languages
and the high-level languages. Explain low-level language, describing two examples. (5 marks)

END OF PAPER 2
PAPER 3 – PRACTICAL (45 MARKS)
ANSWER ALL QUESTION IN THIS SESION
ALL QUESTIONS CARRY EQUAL MARKS–15
1 hour

QUESTION 1

As an employee in an IT company, it is your responsibility to see the administrative matters of the


company. Use figure 1 to draft an agreement form to be signed by every trainee in the company.
Figure 1

Use a suitable application to prepare an agreement form with a company name of your choice.
Note: The heading font is Bookman Old Style and size is 15. The agreement form should include:

1. Agreement between the company and a trainee as shown in Figure 1 with the heading,
AGREEMENT FORM
2. Terms of agreement such as:
3. obeying rules and regulations,
4. punctuality to work,
5. taking responsibility,
6. being good ambassador.

Note: must be in bullets.

1. Provide a space for the director to sign on the next paragraph towards the right margin as shown in
Figure 1
2. On the next paragraph, create a portion for guarantor's signature in block form in the following
order:
3. Guarantor’s Signature and Date,
4. Name;
5. Address;
6. Occupation.
7. Provide a space for the trainee to sign on the next paragraph towards the right margin as shown in
Figure 1.
8. Create a portion in the next paragraph for a witness’ signature in block form in the following
order:
9. Witness' Signature and Date;
10. Name;
11. Address;
12. Occupation.
13. Insert a Watermark showing your Index Number.
14. Save your work with your Index Number in the folder created on the desktop.
15. Print your work and submit it to the supervisor.

QUESTION 2

As a member of Road Safety Club in your school, you are to make presentation on the analysis of road
accidents within a week. With an appropriate application package, produce a four-slide presentation as
shown in the information provided.

Slide 1- Introduction: Font – Garamond, Size – 54;


Subhead; Font – Garamond, Size – 18.
Body: Font – Times New Roman, Size – 18.

Slide 2 – Heading: Font – Garamond, Size – 44;


Body: Font – Garamond, Hallow Square Bullet.

Slide 3 – Heading: Font – Accord Heavy, Size 25;


Body: Font- Times New Roman, Size – 24;
Table: Format as desired.

Slide 4 – Heading: Font – Accord Heavy, Size – 28;


Chart: Clustered Column.
1. Use an appropriate background of your choice.
2. Insert Header with the text: Statistical Analysis for Records of Accident in a week.
3. Insert a Footer and type in your Index Number.
4. Save your work in the folder created on the desktop.
5. Print your work as a handout of four slides on a page and submit to the supervisor.

QUESTION 3
Using any graphic application package, draw the object shown in Figure 2 with any dimension of your choice.

Figure 2

1. Fill the spaces F and G with two different colors of your choice.

2. Type in your name in space F

3. Type in your Index Number in space G

4. Fill the inner circle with any picture of our choice.

5. Save your work with your Index Number in the folder created on the desktop.

6. Print your work and submit to the supervisor.

You might also like