PRIME MINISTER’S OFFICE REGIONAL ADMINISTRATION AND LOCAL GOVERNMENT
FORM TWO MARCH MIDTERM ASSESSMENT
036 INFORMATION AND COMPUTER STUDIES
TIME: 2:30 HRS
INSTRUCTIONS:
SECTION A (15 MARKS)
Answer all questions in this section.
1. For each of the following items (i) to (x) choose the most correct answer from the given alternatives and write its letter in the table indicated below the items.
i. Nyamogi told his classmate that computer science is the only about learning how to type and use Microsoft Word. Which statement best corrects his ideas? ______
ii. A company hires an expert to protect its system from hackers and viruses. This field is called: _________
iii. Early computers use vacuum tubes while modern computers use microprocessors. This difference shows: ________
iv. Mary types her essay using a keyboard and later scans a picture into the computer. Which device is she using? ___
v. A bank uses powerful computer for transactions while a student uses a laptop for assignments. Which is the correct classification? _____
vi. which of the following is good password practice? ______
vii. what is the primary purpose of a firewall in computer security? ____
viii. what is the purpose of software updates in cybersecurity? ______
ix. which of the following is an example of phishing? ______
x. what should you do if you have received a suspicious link in an email or text message? _____
ANSWERS:
| i | ii | iii | iv | v | vi | vii | viii | ix | x |
| . |
2. Match the items in LIST A with the responses in LIST B by writing the letter of the correct response beside the item number in the table provided below the items.
| LIST A | LIST B |
| i. A protective system that monitors incoming and outgoing networks and controls traffic based on rules. ii. Software designed to detect and remove viruses and other malware. iii. Malicious software designed to disrupt, damage, or gain unauthorized access to a system. iv. A security feature requiring users to verify identity using two methods (e.g., password and code). v. Malware that secretly monitors activities and sends personal information to third parties. |
|
ANSWERS:
| i | ii | iii | iv | v |
| . |
SECTION B 70 MARKS
Answer ALL questions from this section
3. Mention five ways individuals can protect themselves from cyber attacks
4.Explain five effects or changes that can occur in a computer when it becomes infected by harmful software, commonly referred to as malware.
5. Explain the main purpose of having an email address in facilitating communication and accessing online services.
6. Explain five benefits that users can gain from using cloud storage.
7. Explain five key requirements that a person or organization must have to effectively use such online storage and computing services commonly referred to as cloud services.
8. Explain briefly the following concepts as used in computer science
9. Your friend Juma has started using different social media platforms such as to communicate with friends and learn new things online. Using the examples of social media, identify the five social media platforms and explain one use of each platform in communication or learning.
SECTION C (15 Marks)
Answer question number ten (10)
10. With the rapid development of the Internet, students and teachers can now obtain educational information, communicate, and participate in learning activities through online platforms regardless of time and location. In relation to this, explain six ways in which the Internet has contributed to improving access to education and supporting online learning.
FORM TWO COMPUTER EXAM SERIES 231
FORM TWO COMPUTER EXAM SERIES 231