0% found this document useful (0 votes)
52 views6 pages

Form 2 Trinity 2018

Uploaded by

Tamara Silochan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views6 pages

Form 2 Trinity 2018

Uploaded by

Tamara Silochan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

HOLY NAME CONVENT SECONDARY SCHOOL

POINT FORTIN

2018 TRINITY END OF TERM EXAM

INFORMATION TECHNOLOGY

FORM 2

TIME: 1 HOUR 30 MINUTES

TOTAL MARKS: 70

INSTRUCTIONS:

 THIS PAPER CONSISTS OF TWO SECTIONS- A AND B.

 READ THE INSTRUCTIONS CAREFULLY BEFORE EACH SECTION.

 DO NOT WRITE ON THE QUESTION PAPER!

1
Teachers: MR. D. RAMPERSAD
/ MS. . T. SILOCHAN
SECTION A (20 MARKS) - MULTIPLE CHOICE. SHADE YOUR ANSWERS ON THE
ANSWER SHEET PROVIDED. ANSWER ALL QUESTIONS.

1) Which program below is used to design a b. Reflex Strain injury.


spreadsheet? c. Reductive strain injury.
a. Microsoft Word. d. Repetitive shoulder injury.
b. Microsoft Access.
c. Microsoft Excel. 8) Jill, a computer user, is diagnosed with CVS.
d. Microsoft PowerPoint. She would experience which of the following
because of this condition?
2) Two types of data can be entered in a a. Back problems.
Spreadsheet. What are they? b. Pain the hands.
c. Numbness in the fingers.
a. Numbers and values. d. Blurred vision and watery eyes.
b. Labels and values.
c. Pictures and values. 9) Jill also complains of back problems because
d. Graphs and Letters. of long hours of computer use. What measure
can she adopt to help her alleviate this
3) Which of the following is an example of a problem?
valid cell address in Excel? a. Massage her forehead gently every hour.
a. 12C b. Keep a safe distance away from the monitor.
b. 7.1A c. Use a firm, adjustable, swivel chair.
c. DB d. Avoid stretching or walking around
d. G12 unnecessarily.

4) Which of the following is an example of a 10) Ergonomics is defined as _____________.


valid range? a. Finding the right computer to work with.
a. B5:E20 b. Finding the ideal working conditions for
b. 5A:20E man and machine.
c. A1:12 c. Avoiding computer injury.
d. C:F15 d. Identifying ways a computer user can get
injured.
5) Every formula that is entered in a spreadsheet
must begin with: 11) Data communication refers to the way data
a. A bracket is__________________.
b. The cell address a. Saved for later use.
c. An equal sign b. Deleted to create additional storage space.
d. The name of the function. c. Transmitted from one location to the next for
either direct use or further processing.
6) Which function, when typed in a cell, would d. Lost because of bad connections.
produce the current date and time?
a. =date
b. =now() 12) E-mail is an abbreviation for ___________.
c. =today() a. Educated mail.
d. =(time) b. End-user mail.
c. Efficient mail.
d. Electronic mail.

7) What RSI stands for? 13) A modem is a special device or programs that
a. Repetitive strain injury. _____________.

2
Teachers: MR. D. RAMPERSAD
/ MS. . T. SILOCHAN
c. Computer virus.
a. That enables devices to transmit data over d. Operating system.
the internet.
b. That encrypts data.
c. That prevents certain types of data from 18) Which of the following is regarded as a
entering a network. software safeguard?
d. Prevents the spread of computer viruses. a. Encryption.
b. Use of security personnel.
14) Which type of network topology uses a central c. Video monitoring systems.
hub to connect every other computer on the d. Locking the doors to the lab.
network?
a. Bus topology. 19) CAD is a special type of software used in
b. Ring topology. ____________________.
c. Star topology. a. Teaching students to design a
d. Line topology. spreadsheet.
b. The manufacturing of some products.
15) The ring topology connects every other c. Designing three dimensional technical
computer to _______________. drawings such as a building.
a. To the main cable in a straight line. d. Helping engineers manage a project.
b. A central hub.
c. To a neighboring computer on its left and 20) Computer Assisted Instruction is special
right thereby forming a circle. software that uses videos, audio and graphics
d. From each computer to a central hub. used for ________________.
a. The manufacturing of some products.
16) Data integrity refers to the _____________. b. Designing three dimensional technical
a. Incorrect data entries. drawings such as a building.
b. Corrupted data. c. To help control aspects of the manufacturing
c. Data that is outdated. process.
d. The accuracy and validity of data. d. Teaching students to do drills and computer
training exercises.

>>GO ON TO THE NEXT SECTION>>

17) A(n) _____________ is a program that copies


itself unknowing to a user and causes harm to
data and files stored in a computer.
a. Computer game.
b. Update.
SECTION B: (40 MARKS) -ANSWER ALL QUESTIONS ON YOUR OWN WRITING PAPER.
NUMBER YOUR ANSWERS CORRECTLY.

1) Computer Security means implementing good physical safeguards and software safeguards to protect
the computer lab and its contents.

a) State two ways that data can lose its integrity.


(2 marks)
b) Briefly describe any two Software Safeguards and any two Physical Safeguards.
(4 marks)

3
Teachers: MR. D. RAMPERSAD
/ MS. . T. SILOCHAN
c) Briefly explain, using an example, what is meant by each of the following terms:
i. Identity theft.
(2 marks)
ii. Internet fraud.
(2 marks)

(TOTAL : 10 MARKS)

2) LANs and WANs are two of the most common types of computer networks found in use today that
allows data, hardware and software to be shared.

a. State the meaning of the following abbreviations:


i. LAN
ii. WAN.

(2 marks)
b. Briefly describe how a LAN is different to a WAN.
(2 marks)
c. List ONE advantage and ONE disadvantage of a LAN.
(2 marks)

d. What type of network would a bank use? Give an example of information that a bank
would share with it’s customers.
(2 marks)

e. Briefly explain how Law Enforcement Officers, such as the Police, would use computers and
computing technology to carry out their work.
(2 marks)

(TOTAL: 10 marks)

3) The following Excel spreadsheet shows data collected on the rainfall levels over a five year period,
2013 to 2017, in T & T. Study the spreadsheet below, then answer the following questions.

A B C D E F G
1 RAINFALL LEVEL SURVEY - T & T
2 2013 – 2017
3
4 MONTH 2013 2014 2015 2016 2017 AVERAGE RAINFALL
5 JUNE 37.33 28.55 40.50 33.40 31.10 34.18
6 JULY 31.00 31.27 38.00 30.20 28.70 31.83
4
Teachers: MR. D. RAMPERSAD
/ MS. . T. SILOCHAN
7 AUGUST 27.20 30.40 29.70 27.00 21.20 27.10
8 SEPTEMBER 41.00 33.60 27.60 25.10 23.40 30.14
9 OCTOBER 33.40 28.00 32.00 34.50 38.10 33.20
10 NOVEMBER 27.10 34.20 30.70 35.70 40.50 33.64
11 DECEMBER 27.50 33.60 32.50 33.20 36.60 32.68

a) State TWO formatting features that have been applied to the title rows.
(2 marks)

b) What was the rainfall level in August, 2017?


(1 mark)
c) State the cell address of the following data item: AVERAGE RAINFALL.
(1 mark)

d) What is the range that contains the rainfall level for the five year period?
(2 marks)

e) The average formula was used in the range G5:G11. Write the formula that was entered to
calculate the average rainfall for the month of September.
(2 marks)

f) How many rows and columns are in the spreadsheet?


(2 marks)
(TOTAL: 10 MARKS)

4) Show all working for this question and underline your answer.

a. Convert the number 25 to binary.


(2 marks)

b. Convert the number 1010012 to base 10.


(2 marks)

c. Express the number – 93 in Binary Coded Decimal.


(2 marks)

d. Add 100102 + 100112


(2 marks)

e. Subtract 110012 -1012

(2 marks)

(TOTAL: 10 MARKS)

5)

5
Teachers: MR. D. RAMPERSAD
/ MS. . T. SILOCHAN
Kenya didn’t study for her I.T. exam and mismatched the terms to a wrong description. Your task is
to help Kenya out by rewriting each term to its correct description. (Answers are required only, for
e.g. 1 – E).

TERM DESCRIPTION
1. Phishing A. Use of finger prints or eye scans for
security purposes.
2. Password B. A combination of numbers used to
secure access to a computer or lab.
3. Software Piracy C. Using a computer to impersonate
another person.
4. Computer Crime D. A person who breaks into a computer
system owned by someone else.
5. Encryption E. A special secret word used to gain
access to a computer system or
network.
6. Biometric F. Sending e-mails pretending to be from
reputable companies.
7. Identity Theft G. Using a computer to do something
illegal.
8. Security Guard H. Copying programs illegally and
distributing them.
9. PINs I. Scrambling data so that it does not
resemble the original data.
10 Hacker J. Personnel placed to oversee the physical
. protection of a computer lab.

(1 mark each)
TOTAL: 10 MARKS

END OF EXAM.

6
Teachers: MR. D. RAMPERSAD
/ MS. . T. SILOCHAN

You might also like