2024 M

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

©2024 TVET CDACC

LEVEL 5
DEMONSTRATE DIGITAL LITERACY
MARCH/APRIL 2024

TVET CURRICULUM DEVELOPMENT, ASSESSMENT AND CERTIFICATION


COUNCIL (TVET CDACC)

WRITTEN ASSESSMENT

TIME: 3 HOURS

INSTRUCTIONS TO CANDIDATES

1. This paper has three sections A, B and C.


2. You are provided with a separate answer booklet.
3. Marks for each question are as indicated.
4. Do not write on the question paper.

This paper consists of SEVEN (7) printed pages

Candidates should check the question paper to ascertain that all pages
are printed as indicated and that no questions are missing
Page 1 of 7
©2024 TVET CDACC
SECTION A (20 MARKS)

Answer all questions in this section. Each question carries one Mark.
1. The abbreviations WWW stand for?
A. Wide World Web
B. World Wide Web
C. Web World Wide
D. Window World Web
2. The term formatting is commonly used when creating a document in a word processor.
What does it mean?
A. Enhancing the appearance of the document
B. Making changes to a document
C. Saving the document
D. Editing the document
3. ____________ is a verification of a login name and password?
A. Configuration
B. Accessibility
C. Authentication
D. Logging in
4. A website’s front page or main page is called?
A. Browser page
B. Search page
C. Home page
D. Bookmark
5. The software used to navigate through the web is known as?
A. Website
B. Web browser
C. Internet
D. World Wide Web

Page 2 of 7
©2024 TVET CDACC
6. If you received an email and want to respond to the sender, which would be the best
method to use?
A. Forward this message to the sender
B. Create a new message to the sender
C. Reply to the sender
D. Cc the sender
7. The process of an illegal entity to gain access to a company’s data or information is
called?
A. Security threat
B. Data privacy
C. Data security
D. Data integrity
8. __________ is the name given to the intersection of rows and columns in a worksheet.
A. Cell
B. Workbook
C. Field
D. Record
9. Which software can damage a computer system?
A. Avast
B. Microsoft Excel
C. Kaspersky
D. Ransomware
10. What should a good password contain?
A. Year and date of birth
B. National identification number
C. A combination of random letters and numbers
D. Your school admission number

Page 3 of 7
©2024 TVET CDACC
11. A QR code is made up of a matrix filled with dark squares on a light background. What
does QR stand for?
A. Quick Role
B. Quick Response
C. Quick Registry
D. Quick Runtime

12. Tom has been tasked to prepare the annual newsletter for the organization he works for.
Which of the following programs will he need?
A. Ms. Excel
B. Ms. Publisher
C. Ms. Access
D. Ms. PowerPoint
13. ________is the act of using a computer with an ill-motive of obtaining money illegally.
A. Fraud
B. Hacking
C. Cracking
D. Stealing
14. is a network that connects computers within the same building.
A. WAN
B. MAN
C. PAN
D. LAN
15. Which feature has been used to type O2?
A. Strikethrough
B. Subscript
C. Superscript
D. Change case

Page 4 of 7
©2024 TVET CDACC
16. When working with word processors one can generate personalized letters and send them
to many recipients at once. Which feature allows this to happen?
A. Saving
B. Drop capping
C. Mail merging
D. E-mailing
17. What does CPU stand for?
A. Central Processor Uniform
B. Control Processing Unit
C. Center for Processing Union
D. Central Processing Unit
18. A student collected data and needed to analyze it using an application software. Which
software would be best suited for this task?
A. Ms. Word
B. Ms. Excel
C. Ms. Access
D. Ms. PowerPoint
19. is an interconnection of computers with an aim of sharing resources?
A. Internet
B. Network
C. Intranet
D. WWW
20. A speaker is an example of output device.
A. Softcopy
B. Hardcopy
C. Hardware
D. Sound

Page 5 of 7
©2024 TVET CDACC
SECTION B: (40 Marks)
Answer all questions in this section.

21. What is an electronic spreadsheet? (2marks)


22. List TWO common protocols for the Internet, and state their functions. (4marks)
23. Outline the THREE core principles of data security. (3marks)
24. Identify the parts of the following e-mail address labeled A, B, C, and D. (4marks)

[email protected]

A B C D

25. Explain the term computer crime. (2marks)


26. Give FOUR rules that must be observed to keep within the law when working with data
and information. (4marks)
27. Outline the functions of each of the following features in an email program. (4marks)
i. Compose
ii. CC
iii. BCC
iv. Forward
28. Differentiate between the Save and the Save As commands. (4marks)
29. Name FIVE types of services offered on the internet. (5marks)
30. Highlight the importance of the following features found in Ms. Word. (4marks)
i. Thesaurus
ii. Spelling and grammar checker
31. Outline TWO security measures against each of the following threats to computer
security. (4marks)
i. Terrorist Attack
ii. Fire

Page 6 of 7
©2024 TVET CDACC
SECTION C (40 MARKS)
Question 32 is compulsory and attempt any other one in this section
32. a) WXY Company wants to analyze its employee’s details using Microsoft Excel. The
company has five employees; Anne, Franc, Lena, Hellen, and Peter. Their ages are 20,
45, 90, 45, and 34 years respectively Anne and Lena are in the research department; Peter
is in the finance department, Franc is in the human resource department, and Hellen is in
Computer department Anne and Hellen are single whereas Franc, Lena, and Peter are
married.
Construct a worksheet showing the above information. Use appropriate column
headings. (6marks)
b) Explain FOUR features that are used in Ms. Excel. (8marks)
c) Most organizations have embraced the use of electronic word processors to create
their text-based documents. Describe THREE benefits of this approach . (6marks)

33. a) A computer lab technician wants to minimize illegal entry into the computer
laboratory. Explain FIVE measures that can be put in place to curb this illegal entry.
(10marks)
b) Describe FIVE measures that an office would employ to protect its computers from
viruses. (10marks)

34. a) Computer technology has greatly impacted people’s lives daily. Discuss FIVE
sectors where computers are used. (10marks)
b) Discuss FIVE functions of an operating system software. (10marks)

THIS IS THE LAST PRINTED PAGE.

Page 7 of 7

You might also like