Computer Studies Grade 8-9: Read These Instructions First
Computer Studies Grade 8-9: Read These Instructions First
Computer Studies Grade 8-9: Read These Instructions First
Grade 8-9
READ THESE INSTRUCTIONS FIRST
You may use a soft pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, highlighters, glue or correction fluid.
Page 1 of 8
www.simplyzambian.com
SECTION A [15 MARKS] Answer ALL the questions
Page 2 of 8
6 Which of the following is true about ROM?
A It is temporal storage
B It is inserted via USB port
C It is volatile in nature
D Data on it cannot easily be altered
A Printer
B Scanner
C Sensor
D Projector
9 A scam that tricks the computer user into sending personal and financial information through
email is known as…
A Defrauding
B phishing
C hacking
Page 3 of 8
D cyber theft
11 ...Is used to move the insertion point to the next line in a Word Processing Software.
A Tab key
B Enter Key
C Backspace key
D Alt key
13 Highlighting means selecting a certain text for formatting. How can you highlight the whole text
using a keyboard?
A Ctrl button + A
B Ctrl button + U
C Ctrl button + C
D Ctrl button + Z
Page 4 of 8
D Keyboard
16 A ... is a pattern of lines on a product label that is used to identify and describe it.
17 To move a text in a word processor by deleting it from one part of the document and placing
it on another you ... and ...
18 ... is the amount of information that can be transmitted over a communication channel at a
given time.
19 A ... is a socket on the CPU into which Peripheral device are plugged.
21 When using an ATM to pay for goods you will be first asked to confirm your identity by typing
in your ...
23 A device that links computers to a telephone network by converting analog signals to digital
is called ...
24 A file that has been accidentally deleted on a computer can be recovered from ...
25 To protect computers from malicious programs which may delete or change information, it is
important to install ... on a computer.
Page 5 of 8
26 The process of entering a username and a password to gain access to a computer system is
called ...
27 A hard copy image can be converted into soft copy by using an input device called a ...
28 Files kept in case the originals are lost are known as ...
30 The term ... refers to cases where a user watches digital video content and/or digital audio
content over the internet without downloading it.
31 When something is stored on the ..., it means it is stored on servers on the internet instead of
on your computer.
32 Staring at the computer for long periods can cause a health problem known as ...
33 A ...is used to locate information quickly on the internet, especially if one does not know the
web address
34 What device is commonly used to detect pencil marks by reflecting light on them and is used
to mark Grade 7 examinations by the Examination Council of Zambia? …..
35 Study the diagrams shown below and answer the questions that follow.
A B C
Page 6 of 8
b) A company has decided to produce some educational software. Give two (2) reasons
why the company has decided to save the software on storage device A rather than B?
[2]
c) Distinguish between RAM from ROM? [2]
36 Thompson General Hospital has decided to connect all their computers to a Local Area
Network (LAN)
a) What is a computer network? [1]
b) Give three (3) advantages of having computers connected to a network for an
organisation such as Thompson Hospital? [3]
c) Computers are used in a variety of situations in our day to day lives. Identify
three (3) uses of embedded or dedicated computers for a large hospital such as
Thompson Hospital? [3]
37 ICT security refers to the defense necessary to wade off threats imposed on ICT resources
a) Identify three (3) measures you should take to protect your data from external
physical threats [2]
b) Explain three (3) signs that your computer may be infected by a virus? [3]
Page 7 of 8
Page 8 of 8