FORM TWO COMPUTER MIDTERM EXAMS

PRIME MINISTER’S OFFICE REGIONAL ADMINISTRATION AND LOCAL GOVERNMENT

FORM TWO MARCH MIDTERM ASSESSMENT

036 INFORMATION AND COMPUTER STUDIES

TIME: 2:30 HRS

INSTRUCTIONS:

  1. This paper consists of Sections A, B, and C with a total of ten (10) questions.
  2. Answer all questions.
  3. Use blue or black ink for writing.
  4. Non-programmable calculators may be used.
  5. Unauthorized materials are not allowed in the examination room.
  6. Section A and Section C each carry 15 marks, and Section B carries 70 marks.

SECTION A (15 MARKS)

Answer all questions in this section.

1. For each of the following items (i) to (x) choose the most correct answer from the given alternatives and write its letter in the table indicated below the items.

i. Nyamogi told his classmate that computer science is the only about learning how to type and use Microsoft Word. Which statement best corrects his ideas? ______

  1. Computer science is the use of computers for entertainment only
  2. Computer science is the study of computers, how they work and their applications
  3. Computer science is the repairing computer machines only
  4. Computer science is the learning how to browse the internet

ii. A company hires an expert to protect its system from hackers and viruses. This field is called: _________

  1. Networking
  2. Software engineering
  3. Cyber security
  4. Artificial intelligence

iii. Early computers use vacuum tubes while modern computers use microprocessors. This difference shows: ________

  1. Types of operating system
  2. Generations of computers
  3. Brands of computers
  4. Uses of computers

iv. Mary types her essay using a keyboard and later scans a picture into the computer. Which device is she using? ___

  1. Output devices
  2. Storage devices
  3. Processing devices.
  4. Input devices

v. A bank uses powerful computer for transactions while a student uses a laptop for assignments. Which is the correct classification? _____

  1. Bank- Supercomputer, Student- Multicomputer
  2. Bank – Mainframe, Student – Microcomputer
  3. Bank - laptop, Student – Supercomputer
  4. Bank – Microcomputer, Student - Mainframe

vi. which of the following is good password practice? ______

  1. Use your name as your password
  2. Use a combination of letters, numbers, and symbols
  3. Use the same passwords for all accounts
  4. Share your password with your friends.

vii. what is the primary purpose of a firewall in computer security? ____

  1. To store file securely
  2. To prevent unauthorized access to or from a private network
  3. To increase the speed of computer
  4. To fix computer bugs

viii. what is the purpose of software updates in cybersecurity? ______

  1. To fix security vulnerabilities and improve the systems functionality.
  2. To make your computer slower
  3. To unstall unnecessary program
  4. To change the appearance of your computer interference

ix. which of the following is an example of phishing? ______

  1. A hacker attempting to access a file directly
  2. An email looks like it is from a trusted source asking you to provide a sensitive information.
  3. Unstalling software updates
  4. Using a VPN to protect your browser activity

x. what should you do if you have received a suspicious link in an email or text message? _____

  1. click on it to check if it is safe.
  2. forward it to a friend
  3. ignore it and delete the message
  4. download the file attached to the message

ANSWERS:

i ii iii iv v vi vii viii ix x









.

2. Match the items in LIST A with the responses in LIST B by writing the letter of the correct response beside the item number in the table provided below the items.

LIST A 
LIST B

i. A protective system that monitors incoming and outgoing networks and controls traffic based on rules.

ii. Software designed to detect and remove viruses and other malware.

iii. Malicious software designed to disrupt, damage, or gain unauthorized access to a system. 

iv. A security feature requiring users to verify identity using two methods (e.g., password and code).

v. Malware that secretly monitors activities and sends personal information to third parties.

  1. Spyware
  2. Phishing
  3. Malware
  4. Data breach
  5. Antivirus
  6. Password manager
  7. Firewall
  8. Two –Factors Authentication(2FA)

ANSWERS:

i
ii
iii
iv
v




.

SECTION B 70 MARKS

Answer ALL questions from this section

3. Mention five ways individuals can protect themselves from cyber attacks

4.Explain five effects or changes that can occur in a computer when it becomes infected by harmful software, commonly referred to as malware.

5. Explain the main purpose of having an email address in facilitating communication and accessing online services.

6. Explain five benefits that users can gain from using cloud storage.

7. Explain five key requirements that a person or organization must have to effectively use such online storage and computing services commonly referred to as cloud services.

8. Explain briefly the following concepts as used in computer science

  1. Internet of things
  2. Video conferencing
  3. Cybersecurity
  4. Online forum
  5. Website

9. Your friend Juma has started using different social media platforms such as to communicate with friends and learn new things online. Using the examples of social media, identify the five social media platforms and explain one use of each platform in communication or learning.

SECTION C (15 Marks)

Answer question number ten (10)

10. With the rapid development of the Internet, students and teachers can now obtain educational information, communicate, and participate in learning activities through online platforms regardless of time and location. In relation to this, explain six ways in which the Internet has contributed to improving access to education and supporting online learning.

FORM TWO COMPUTER EXAM SERIES 231  

FORM TWO COMPUTER EXAM SERIES 231  

Download Learning
Hub App

For Call,Sms&WhatsApp: 255769929722 / 255754805256