Digital Literacy Level 4

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

©2024 TVET CDACC

LEVEL 4
Demonstrate Digital Literacy
Nov/Dec 2024

TVET CURRICULUM DEVELOPMENT, ASSESSMENT AND CERTIFICATION


COUNCIL (TVET CDACC)

WRITTEN ASSESSMENT

Time: 2 HOURS

INSTRUCTIONS TO CANDIDATE

1. This paper consists of two sections; A and B


2. Answer ALL the question as guided in each section
3. Marks for each question are as indicated in the brackets
4. You are provided with a separate answer booklet to answer the questions
5. Do not write in this question paper

This paper consists of FIVE (5) printed pages


Candidates should check the question paper to ascertain that all pages are printed as
indicated and that no questions are missing
©2024 TVET CDACC

SECTION A (10 MARKS)


Answer all questions in this section. Each question carries one mark
1. __________________keyboard key is used to erase text from left to right.
A. Backspace
B. Spacebar
C. Tab
D. Delete
2. The following is a list computer applications used for different purposes. Identify the one
commonly used for accounting tasks.
A. Google Chrome

B. Microsoft Excel
C. Microsoft Word
D. Boom Play
3. The following are examples of search engines. Which one is NOT?
A. Yahoo
B. Google
C. Bing
D. Opera Mini
4. A Word processor is an example of _____________________software.
A. System
B. Antivirus
C. Application
D. Programming
5. Which one of the following computers is NOT most suitable for travellers?
A. Desktop
B. Laptop
C. Smart phone
D. Tablet PC

Page 2 of 5
©2024 TVET CDACC

6. ______________refers to combining more than one cell within table rows or columns in a
worksheet.
A. Splitting
B. Merging
C. Inserting
D. Expanding
7. ___________is navigating the world wide web by clicking on desired links.
A. Browsing
B. Searching
C. Connecting
D. Transmitting
8. The process of creating a new email is referred to as ___________
A. Replying
B. Forwarding
C. Texting
D. Composing
9. _____________is not a type of network topologies.
A. Bus
B. Star
C. Wireless
D. Ring
10. The following are types of computer viruses EXCEPT?
A. Worm
B. Trojan
C. M-pox
D. Hoax

Page 3 of 5
©2024 TVET CDACC

SECTION B (40 MARKS)


Answer all questions in this section.

11. The email address shown below belongs to Freedom Technical College. Identify the parts
labeled A and B. (2 marks)

A B

[email protected]
12. Transmission media are the means through which data is sent from one device to another on
a network. There are two types of transmission media i.e. wired and wireless. Highlight any
TWO examples of wireless transmission media. (2 marks)
13. Identify the THREE functional components of CPU. (3 marks)
14. Operating system is software that enables communication between the hardware and
computer applications. Highlight TWO examples of operating system software. (2 marks)
15. Explain the following editing features as used in word processing.
i. Find (1 mark)
ii. Cut (1 mark)
iii. Autocorrect (1 mark)
16. Computers can be classified according to their purpose. Highlight TWO types of computers
under this category. (2 marks)
17. Computer output devices are classified into hardcopy and softcopy devices. Identify ONE
example of each. (2 marks)
18. Use of electronic spreadsheets has become popular today. Outline any TWO advantages of
using electronic spreadsheets instead of recording by hand. (2 marks)
19. The process of starting a computer is known as booting. Outline any TWO types of booting a
computer. (2 marks)
20. A spreadsheet formula is a mathematical expression created by the user to perform
calculations on data on a worksheet. Identify THREE components that a formula must have.
(3 marks)

Page 4 of 5
©2024 TVET CDACC

21. During a Demonstrate Digital Literacy class, a trainer discussed TWO types of page
orientation in word processing. With the aid of a sketch identify the TWO types. (4 marks)

22. Computer theft is one of the computer security threats. Highlight any TWO control measures
to minimize this threat. (2 marks)
23. The following abbreviations refer to types of networks. Write them in full.
i. WAN (1 mark)
ii. LAN (1 mark)
iii. MAN (1 mark)
24. Explain the following categories of computer input devices
a. Keying devices (2 marks)
b. Pointing devices (2 marks)
25. Explain the following computer crimes.
i. Fraud (2 marks)
ii. Software Piracy (2 marks)

Page 5 of 5

You might also like