ICT TEST
ICT TEST
E BOOSTER
2&1
INFORMATION AND COMMUNICATION
Name: ………………………………………………………………
This booklet consists of two papers. Answer Paper 2 which comes first, in your answer booklet and Paper
1 on your Objective Test answer sheet. Paper 2 will last 1 hour 15 minutes. Do not start paper 1 until
you are told to do so. Paper 1 will last 45 minutes. At the end of the examination, submit the entire
question paper to the invigilator.
Any candidate who tears off any part of the question paper will be severely penalized.
Whether you answer all the questions in this paper or not, hand the entire question paper to the
invigilator.
1|Page
PAPER 2[60 MARKS]
Answer all questions on the question paper
Part one
PART 1 Practical skills (24 marks)
(a) Outline the steps involved in performing
the following tasks:
(i) opening a document
…………………………………………………
…………………………………………………
…………………………………………………
…………………………………………………
…………………………………………………
…………………………………………………
…………………………………………………
…………………………………………………
…………………………………………………
2|Page
…………………………………………………
…………………………………………………
…………………………………………………
…………………………………………………
…………………………………………………
…………………………………………………
…………………………………………………
…………………………………………………
…………………….6marks
…………………………………………………
…………………………………………………
3|Page
…………………………………………………
…………………………………………………
…………………………………………………
…………………………………………………
…………………………………………………
…………………………………………………
…………………………………………………
…………………………………………………
…………………………………………………
…………………………………………………
…………………………………………………
…………………………………………………
…………………………………………………
4|Page
…………………………………………………
…………………………………………………
…………………………………………………
………………………………6marks
…………………………………………………
…………………………………………………
…………………………………………………
…………………………………………………
…………………………………………………
…………………………………………………
…………………………………………………
5|Page
…………………………………………………
…………………………………………………
…………………………………………………
…………………………………………………
…………………………………………………
…………………………………………………
…………………………………………………
…………………………………………………
…………………………………………………
…………………………………………………
…………………………………………………
……………………………6marks
6|Page
(d) Study the diagrams below and answer the
questions on them
A B C D E
(i) A……………………………………..
D…………………………………..
B……………………………………..
E……………………………………
C……………………………………..5marks
(ii) What is the name given to diagram A, B, C,
D and
E……………………………………………………1marks
PART 2 (36 marks) [ANSWER THREE QUESTIONS
FROM THIS SECTION]
2. (a) (i) What is a computer virus?
…………………………………………………………………………
…………………………………………………………………………
7|Page
.………………………………………………………………………
………………………………………………………………2marks
(ii) State three sources of a computer
virus?
…………………………………………………………………………
…………………………………………………………………………
…………………………………………………………………………
…………………………………………………………………………
………3marks
…………………………………………………………………………
8|Page
…………………………………………………………………………
……….
…………………………………………………………………………
…………………………………………………………………………
……….
(ii) Copyright infringement
…………………………………………………………………………
…………………………………………………………………………
…….…………………………………………………………………
…………………………………………………………………………
……………….
…………………………………………………………………………
……………………………………………………………4marks
…………………………………………………………………………
9|Page
…………………………………………………………………………
……….
…………………………………………………………………………
…………………………………………………………………………
……….
……..…………………………………………………………………
…………………………………………………………………………
3marks
3. (a) (i) Define a search engine
…………………………………………………………………………
…………………………………………………………………………
……….
…………………………………………………………………………
…………………………………………………………………1mar
k
(ii) List three examples of search engines
10 | P a g e
…………………………………………………………………………
…………………………………………………………………………
……….
…………………………………………………………………………
…………………………………………………………………………
……….
…………………………………………………………………………
………………………………………………………1 ½ marks
(b) State four basic storage devices
…………………………………………………………………………
…………………………………………………………………………
……….
…………………………………………………………………………
…………………………………………………………………………
……….
11 | P a g e
…………………………………………………………………………
…………………………………………………………………………
…….
…………………………………………………………………………
………………………………………………………………4marks
(c) (i) Differentiate between a file and a folder
…………………………………………………………………………
…………………………………………………………………………
……….
…………………………………………………………………………
…………………………………………………………………………
……….
…………………………………………………………………………
……………………………………………………………2marks
12 | P a g e
(ii) List four keyboard symbols
…………………………………………………………………………
…………………………………………………………………………
……….
…………………………………………………………………………
…………………………………………………………………………
……….
…………………………………………………………………………
…………………………………………………………………………
……….
…………………………………………………………………………
……………………………………………………………2marks
(d) State three importance of an e-mail.
…………………………………………………………………………
13 | P a g e
…………………………………………………………………………
……….
…………………………………………………………………………
…………………………………………………………………………
….
…………………………………………………………………………
…………………………………………………………………1 ½
marks
…………………………………………………………………………
…………………………………………………………………………
……….
…………………………………………………………………………
14 | P a g e
…………………………………………………………………………
……….
…………………………………………………………………………
…………………………………………………………………………
…….
…………………………………………………………………………
…………………………………………………………………………
……..
…………………………………………………………………………
…………………………………………………………………………
…….
15 | P a g e
…………………………………………………………………………
…………………………………………………………………………
…3marks
…………………………………………………………………………
…………………………………………………………………………
……….
…………………………………………………………………………
…………………………………………………………………………
……….
…………………………………………………………………………
………………………………………………………………………2
marks
(c) Explain the following expressions
16 | P a g e
(i) Composing an e-mail
…………………………………………………………………………
…………………………………………………………………………
……..
…………………………………………………………………………
…………………………………………………………………………
……….
…………………………………………………………………………
…………………………………………………………………………
……….
…………………………………………………………………………
17 | P a g e
…………………………………………………………………………
……….
…………………………………………………………………………
………………………………………………………………4marks
(d) State three ways of sharing information
through the internet
…………………………………………………………………………
…………………………………………………………………………
……….
…………………………………………………………………………
…………………………………………………………………………
……….
…………………………………………………………………………
……………………………………………………3marks
18 | P a g e
5. (a) (i) List four features of MS word
application window
…………………………………………………………………………
…………………………………………………………………………
……….
…………………………………………………………………………
………………………………………………………………………..
………..
…………………………………………………………………………
…………………………………………………………………………
……….
…………………………………………………………………………
…………………………………………………………………2mar
ks
(ii) Define typing
19 | P a g e
…………………………………………………………………………
…………………………………………………………………………
……….
…………………………………………………………………………
…………………………………………………………………………
…2mark
(b) State four importance of ICT in teaching
and learning
….……………………………………………………………………
…………………………………………………………………………
………….
….……………………………………………………………………
…………………………………………………………………………
………….
….……………………………………………………………………
20 | P a g e
…………………………………………………………………………
………….
….……………………………………………………………………
…………………………………………………………………………
………….
….……………………………………………………………………
……………………………………………………………………2m
arks
(c) Differentiate between editing tools and
formatting tools
…………………………………………………………………………
…………………………………………………………………………
………..
…………………………………………………………………………
…………………………………………………………………………
………..
21 | P a g e
…………………………………………………………………………
………………………………………………………………………2
marks
(d) (i) List the main hardware components of
a computer
…………………………………………………………………………
…………………………………………………………………………
………..
…………………………………………………………………………
…………………………………………………………………………
…3marks
(ii) State the two main components of a
personal computer
…………………………………………………………………………
…………………………………………………………………………
………..
22 | P a g e
..………………………………………………………………………
………………………………………………………………………1
mark
23 | P a g e
4. The process of restarting the computer which
is already running is referred to as
A. cold booting B. fire booting
C. restart booting D. warm booting
5. The rectangular working area of an application
is called a
A. desktop B. notepad
C. screen D. window
6. Items deleted on the computer are moved to
the
A. clipboard B. computer box
C. dust bin D. recycle bin
7. The information processing cycle is divided
into
A. two stages B. three stages
C. five stages D. six stages
8. Which of the following symbols shows that
information is copyright protected?
A. @ B. © C. ® D. TM
24 | P a g e
9. An example of a function key on the computer
keyboard is
A. @ B. F1 C. Q D. 10
10. The power of spreadsheet lies in its
A. cells B. formulae
C. labels D. worksheets
11. Which of the following is a feature of an
operating system?
A. Desktop Screen B. Mavis Beacon
C. Microsoft Word D. Mozilla Firefox
12. The following are features of the random
access memory except
A. accessible to user B. non-volatile
B. temporary storage D. volatile
13. Which of the following devices produces
softcopies of documents?
A. Monitor B. Photocopier
C. Printer D. Speaker
14. The following are storage media except
A. compact disc B. diskette
25 | P a g e
C. flash disk D. plotter
15. When a computer is shut-down incorrectly,
which of the following is likely to happen?
A. The computer reboots
B. The computer may be infected with virus
C. The files may be damaged
D. The files will be upgraded
16. Opening an application can also be termed
A. deleting B. dragging
C. installing D. launching
17. Clicking is usually associated with the
A. left button B. right button
C. scroll button D. scroll ball
18. Data that are copied from an application are
temporarily stored in the
A. clip art B. clipboard
C. document D. recycle bin
19. The following are good posture positions
when using a computer except
A. back straight
26 | P a g e
B. elbows on the table
C. eyes on the monitor
D. feet on the floor
20. The computer program written to cause
harm or damage to the computer and its files is
known as
A. anti-virus B. file C. virus D. window
21. Computerized text editing can appropriately
be applied to
A. database application
B. desktop application
C. spreadsheet application
D.word processing application
22. Which of the following buttons is used to
reload a web page?
A. Back B. Forward C. Go D. Refresh
23. All the following are unethical use of e-mails
except
A. HHdeleting any message that you do not
need
27 | P a g e
B.sending damaging information about people
C.sending of malicious software
D. sending spams
24. In which of the following categories does the
magnetic tape fall?
A. Input B. Output
C. Processing D. Storage
25. To connect a computer to the internet
through the telephone line, one needs
A. a blue tooth B. a modem
C. a mobile phone D. an infrared
26. The scroll bar enables users to
A. close an application
B. maximize a window
C. restore a window
D.view hidden information
27. Which of the following programs is used to
search for information on various topics?
A. CorelDraw B. Encarta
C. MS Excel D. Adobe PageMaker
28 | P a g e
28. An alternate means to save an existing
document is
A. Alt + S B. Ctrl +S C. F5 D. F12
29. The computer keyboard key which is used to
change alphabets to capital letters is the
A. Caps Lock key B. Enter key
C. Num Lock key D. Space bar key
30. The command button used to recall existing
documents in Word Processing application is
A. copy B. open C. Save D. Save As
31. A Word Processor is used to
A. browse on the internet
B. change wallpaper
C. search for audio files
D.type letters
32. Which of the following is not a language tool
in a Word Processing application?
A. Find and Replace
B. Grammar Checker
C. Spell Checker
29 | P a g e
D.Thesaurus
33. The symbols B, I, U are commonly used
buttons found on the
A. Drawing toolbar B. Formatting toolbar
C. Menu bar D. Standard toolbar
34. Which of the following are types of scroll
bars?
A. Left and right bars
B. Top and bottom bars
C. Up and down bars
D.Vertical and horizontal bars
35. Which of the following options is used to
create an e-mail message?
A. Attachment B. Compose
C. Inbox D. Send
36. An element in an electronic document that
links one place to another place in the same
document or another document is called
A. connect B. hyperlink
C. link D. search
30 | P a g e
37. Unsolicited bulk electronic messages are
generally referred to as
A. communication B. e-mail
C. spam D. virus
38. In Spreadsheet application, which of the
following symbols represents division?
A. ÷ B. * C. # D. /
39. Which of the following is used for addition
operation in Spreadsheet functions?
A. ADD
B. AVERAGE
C. MULTIPLICATION
D.SUM
40. Which of the following is used to find the
maximum number among a set of numbers in
Spreadsheet functions?
A. MAX A. MIN C. MAXIMIZE D. MINIMIZE
31 | P a g e
32 | P a g e