0% found this document useful (0 votes)
690 views16 pages

Computer Studies Grade 9 Paper 1 Revision Pack 2020 Answer

This document contains answers to past ECZ Computer Studies P1 exam questions from 2015 to 2019. It includes answers to multiple choice and structured questions on various topics in computer studies, such as hardware, software, networks, health and safety issues, and applications of ICT. The answers are organized into sections for different types of questions on the exam.

Uploaded by

Bricious Mulimbi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
690 views16 pages

Computer Studies Grade 9 Paper 1 Revision Pack 2020 Answer

This document contains answers to past ECZ Computer Studies P1 exam questions from 2015 to 2019. It includes answers to multiple choice and structured questions on various topics in computer studies, such as hardware, software, networks, health and safety issues, and applications of ICT. The answers are organized into sections for different types of questions on the exam.

Uploaded by

Bricious Mulimbi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

ECZ Computer Studies P1 Past Papers 2015 to 2019

Section A Problems Answers


1. C
2. D
3. B
4. C
5. C
6. C
7. C
8. C
9. B
10. A
11. B
12. A
13. B
14. B
15. D
16. B
17. C
18. D
19. B
20. C
21. C
22. B
23. A
24. D
25. B
26. B
27. B
28. D
29. A
30. D
31. B
32. C
33. B
34. A
35. C
36. A
37. B
38. C

1 Dr. Mulimbi Bricious – [email protected]


39. A
40. C
41. D
42. A
43. C
44. A
45. D
46. D
47. D
48. B
49. C
50. B
51. C
52. D
53. C
54. A
55. B
56. D
57. C
58. D
59. C
60. B
61. B
62. C
63. A
64. A
65. D
66. A
67. D
68. C
69. C
70. D
71. D
72. B
73. B
74. C
75. D
76. C
77. B
78. C
79. C

2 Dr. Mulimbi Bricious – [email protected]


80. D
81. D
82. A
83. C
84. C
85. C
86. B
87. A
88. D
89. C
90. C
91. A
92. A
93. A
94. C
95. C
96. A
97. A
98. A
99. D
100. C
101. D
102. C
103. C
104. C
105. C
106. C
107. C
108. B
109. C
110. D
111. D
112. D
113. B
114. A
115. B
116. C
117. B
118. A
119. B
120. B

3 Dr. Mulimbi Bricious – [email protected]


121. A
122. D
123. D
124. D
125. B
126. C
127. B
128. A
129. D
130. D
131. D
132. D
133. A
134. D
135. B
136. A
137. D
138. A
139. C
140. B
Section B Problems Answers
1. Microphone
2. Deleted
3. One of the most common reasons for a slow computer are programs running in the
background/ computer is infected with viruses, small processor, RAM …
4. Compact Disk (CD) and laser light
5. soft copy output devices are monitors, projectors, video display terminals.
6. E-commerce
7. Cell
8. Slide Show
9. Booting
10. Application software
11. Networking and share
12. Data and volatile
13. Modem and router
14. Save
15. telegram
16. Speaker
17. 1.4GB
18. Password

4 Dr. Mulimbi Bricious – [email protected]


19. Network and share
20. System software/operating system and application software
21. Encryption
22. Internet
23. Application software
24. Local Area Network (LAN)
25. Machine language/ binary/ 0s and 1s
26. Optical storage and laser
27. CPU (ROM) and boot
28. Graphical User Interface and Command Line Interface
29. Back button
30. Double clicking
31. Auto sum button/ sum button
32. Icon
33. Megahertz/Gigahertz
34. CD and DVD
35. Width and line length
36. Computer Virus
37. Magnetic ink character recognition (MICR)
38. Starting at the beginning
39. Password
40. Digital camera
41. Word processing and Application Software
42. Search engine
43. Insertion pointer
44. Uninstall/delete and file/program
45. CPU/ROM
46. Local hard disk, DVD and CD.
47. Hacking
48. Cropping
49. I.S.P Stands for Internet Service Provider
50. Harm and Corrupt
51. Selecting or highlighting
52. Ctrl + Z or Undo button
53. Trackball or touchpad on the laptop
54. Ctrl, Shift, enter and Alt keys
55. Commands or options
56. Touch screens
57. Wireless/microwave
58. Lock

5 Dr. Mulimbi Bricious – [email protected]


59. Brochures, business cards, greeting cards, web pages, posters, and more for
professional or desktop printing as well as for online or on-screen electronic
publishing.
60. Importing
61. Alt + F4/Close button
62. Commercial Software/Original Software
63. Setup
64. Pixels/resolution
65. ROM (Read Only Memory)
66. Small
67. Local Area Network (LAN) and Wide Area Network (WAN)
68. Formatting
69. Superscript
70. Point (Pt)
71. Average/Count
72. Letters and Numbers
73. Space bar
74. Horizontally or Vertically
75. Strikethrough
76. Right align
77. Screen capture or screenshot (digital camera and Computer)
78. Web camera
79. Wireless/PAN (Personal Area Network)
80. Input, Processing, Output and Storage
81. Enter key
82. Inkjet Printers
83. Program/Software
84. E-mail – Internet
85. Multimedia
86. Animation
87. Backup
88. Return or Enter key
89. Hacking
90. Letters and Numbers
91. Operating system and application software
92. Importing
93. MAN (Metropolitan Area Network) and LAN (Local Area Network)
94. Bold
95. Restore
96. Tab key
97. Undo

6 Dr. Mulimbi Bricious – [email protected]


98. Web browser and search engine
99. Animation
100. Column, row
101. Megahertz, gigahertz and Mbps Megabyte per second and Gbps Gigabyte per
second.
102. Modem
103. Cropping
104. Spreadsheets
105. Uninstalling
106. ALU Arithmetic Logic Unit
107. Email attachment
108. Modem or router
109. Bullets and Numbering
110. System software and Application software
111. Web browser
112. Virus or Malware
113. RAM Radom Access Memory
114. Touch screen, ear piece
115. Alphanumeric characters
116. Forward slanted slash, asterisk
117. Bar code
118. Hard drive, CD, DVD, Memory stick, memory chip (card) etc.
119. Peripheral
120. 0s and 1s
121. Graphical User Interface (GUI), Command Line Interface (CLI)
122. Recycle bin
123. Rotate
124. Auto sum
125. Back space, enter key (return key)
126. ROM (Read Only Memory)
127. Insertion point (cursor)
128. Trackball, scroll
129. Hardware (printer, scanner, router, modem) and Software (databases, application
software)
130. Computer program or software
131. Offline
132. Any from the following: Washing machines, Microwave cookers, Dishwashers,
Electric kettles, Fridges, DVD players, Remote control television, Hairdryers, Electric
toothbrushes, Central heating systems, Burglar Alarm system, External Security lights
133. Animation
134. Internet

7 Dr. Mulimbi Bricious – [email protected]


135. Clipart, SmartArt or charts
Section C Problem Answers
Section C Problems
1.
(a) Device labelled A: Webcam – short for ‘web camera’ – is a digital camera that is
connected to a computer to capture images.
(b) (i) Output B: Softcopy and (ii) C: hardcopy
(c) (i) Force shut down (ii) Restart your computer
2.
(a)
(i) A LAN (local area network) is a group of computers and network devices
connected together, usually within the same building while WAN (Wide Area
Network) is not restricted to geographical area.
(ii) WAN (Wide area network) is a larger network that usually spans several
buildings in the same city, town and entire world.
(b)
(i) Wireless networks enable multiple devices to use the same internet
connection remotely, as well as share files and other resources.
(ii) Wireless networks allow mobile devices, such as laptops, tablets and ipods
to move around within the network area freely and still maintain a
connection to the internet and the network.
(c)
(i) You may download a virus to harm your computer.
(ii) You may download a program used to hack systems.
(d) Search Engine
(e) 1. Server performance 2. Server location 3. Lots of traffic 4. Extra-large images
(and complex file format) 5. Code density 6. Text graphics 7. Too many file
requests (RTTs) 8. Too many plugins 9. Unnecessary redirects 10. An outdated
CMS

8 Dr. Mulimbi Bricious – [email protected]


3.
(a) A password is a secret word or phrase that must be used to gain admission to a
computer system.
(b) The system will lock or disabled.
(c) If the password is maintained for some time the chances of hacking it are so high.
(d) 1: Lock up the server room #2: Set up surveillance 3: Make sure the most
vulnerable devices are in that locked room #4: Use rack mount servers #5: Don't
forget the workstations #6: Keep intruders from opening the case #7: Protect the
portables #8: Pack up the backups #9: Disable the drives
4.
(a)
(i) Extended computer use deprives children of physical activity, increasing
their risk of obesity
(ii) excessive computers use may stunt the development of social skills and
interpersonal relationships etc.
(b)
(i) Sitting on the adjustable chair
(ii) Taking breaks
(iii) Using the right cables
5.
(a) Name box
(b) Numbers and letters
(c) Part C will be used when entering the formula or a function.
(d) Displaying what is being typed or used to edit the fields.
(e) It is used to find the total without using the formula
6.
(a) Binary digits are 0s and 1s
(b) 8 bits
(c) Television Stations, Radio Stations, Zamtel, MTN, Airtel etc.
(d) Washing machine and microwave cookers

9 Dr. Mulimbi Bricious – [email protected]


7.
(a) Web camera and digital camera
(b) Microsoft Publisher
(c) Colour LaserJet printer or Inkjet printer
(d)
(i) One advantage is that the computer will produce professional magazines.
(ii) One disadvantage is that the computer needs a skilled person.
8. (a) Repetitive Strain Injury (RSI) is a condition resulting from overusing the hands to
perform a repetitive task, such as typing, clicking a mouse or writing. This means
a microphone cannot cause RSI.
(b)
(i) During recording in a studio
(ii) During giving commands to a computer that recognizes speech.
(c) Virtual DJ, FL studio, Cubase etc.
9.
(a)
(i) Device at Stage 3: Hard drive
(ii) Device at stage 4: Monitor
(b)
(i) Stage 1: Input
(ii) Stage 3: Storage
(c) Processing
10.
(a)
(i) Network card
(ii) RJ45
(b) Give two uses of a computer network.
(i) Sharing resources
(j) Sharing software
(c) Wireless network is less expensive to setup

10 Dr. Mulimbi Bricious – [email protected]


(d) Wireless network is vulnerable hackers
(e)
(i) Providing a password
(ii) Installing an up-to-day antivirus
11. The following is a sample of an e-mail address of pjbanda.

(a)
(i) Part A: Username
(ii) Part B: Host name (domain name)
(b) Inbox
(c)
(i) You may open a virus.
(ii) Certain email messages are sent to track your personal information
(d)
(i) E-mail is fast to reach
(ii) E-mail can be sent from anywhere provided there network and the device
(computer, phone ….)
12.
(a) Repetitive strain injury (RSI)
(b) By taking break and have the right sitting posture.
(c) Joystick
(d) It is addictive
13.
(a) Bus Topology or LAN
(b) Printer
(c) Switch
(d) In an organization

11 Dr. Mulimbi Bricious – [email protected]


14.
(a)
(i) A: Show or hide paragraphs
(ii) Ruler
(iii) Scroll bar
(iv) Status bar
(b) When the user is typing work that has gone up to page 3.
(c) The uses of part B are:
(i) Width
(j) Line length
(d) Auto save
15.
(a)
(i) A: Left button
(ii) B: Scroll wheel
(iii) C: Right button
(b) Part B is used to scroll the page up and down.
(c) The drop-down menu pops up.
(d) Double clicking
(e) The mouse has less health effects as compared to a keyboard which causes
Repetitive Strain Injury (RSI).
16.
(a)
(i) Any graphics program – e.g. CorelDraw, Photoshop/ Microsoft Publisher
(ii) Spreadsheet (excel), Word Processor, Database (Microsoft Access)
(b)
(i) Hardware: - Data projector, Screen/ Television
(ii) Software: - Microsoft PowerPoint (Presentation)

12 Dr. Mulimbi Bricious – [email protected]


17.
(a) (i) ROM stands for Read-Only Memory/
(ii) RAM stands for Random Access Memory
(b) Blu-ray disc, CD-ROM disc, CD-R and CD-RW disc, DVD-R, DVD+R, DVD-RW
and DVD+RW disc
(c) (i) RAM
(ii) ROM
(iii) ROM
(iv) RAM
18.
(a) Setting a password
(b) Screen saver
(c) Locking the room, doors, cameras
(d) Natural disaster, earthquake, fire
19. (a) (i) E-commerce
(ii) Robotics
(iii) Manufacturing, Accounts (any three)
(b) (i) Hospitals/agriculture/space mission/weather
(ii) Mainframe/Super computers
(c) Sensors/touch inputs/touch screen/touch pads/voice recognition.
(d) There is no handwriting
20.
(a) Wireless/radio through the air
(b) Can be set up anywhere/it is cheaper to install
(c) Router/modem/dongle/MiFi
(d) (i) files
(ii) Database/software/storage/data/information
21.
(a) Graphical User Interface (GUI).
(b) (i) A = Taskbar
(ii) B = start button
(c) Part C: Storing typed documents/ files
(d) ‘e’ or the one next to B/ Google Chrome/ Mozilla Firefox
(e) (i) My documents/
(ii) Windows Explorer/ Shared/ Sage Evolution 7
22.
(a) (i) Camera/
(ii) Joystick/ Scanner/ Touch screen/ Microphone/ MICR/ OMR
(b) E or speaker
(c) Part: - A – Monitor /VDU

13 Dr. Mulimbi Bricious – [email protected]


(d) Tapping/ touch
(e) (i) laptops are portable/ mobile
(ii) Does not depend on AC power source can use battery
23.
(a) (i) Part A: Formula bar
(ii) Part B: Cell/ Active cell
(b) A1
(c) (i) Budgeting/ creating charts/ calculations
(ii) Sorting list of records
(d) For editing text before it is entered
24.
(a) Playing games/ or unproductive activities/ fraud/ porno
(b) (i) Repetitive strain injury (RSI)
(ii) Eye strain/ headaches
(c) (i) Password protection/
(ii) Restricting physical access to computer lab
25.
(a) (i) Input/
(ii) Output
(b) Because Data moves from the processor to the storage and from storage to
processor. Or because the processor gets information from the storage and equally
stores what it has processed. The storage is a retrieval source as well as keeping
data.
(c) Storage
(d) Input
26.
(a) Presentation Program (Microsoft PowerPoint)
(b) Used to produce slide shows that can be used to communicate a message/ idea or
any other information to a group/ apart from slide shows Presentation Program
can be used to produce web pages/ handouts/ notes pages/ slide printouts/ a
presentation outline as a text-only document/ a presentation as a movie file or a
slide save as a graphic.
(c) Part: C
(d) Italize characters (text)
(e) (i) Part A: Font style/ Font type
(ii) Part B: Font Size
(iii) Part E; Paragraph Group
27.
(a) A1:E1
(b) =B3*C3
(c) =SUM(D3:D6)

14 Dr. Mulimbi Bricious – [email protected]


(d) Value
28.
(a) (i) CD-R only allows users to write once and disc contents cannot be erased.
(ii) CD-RW allows the user to write and erase multiple times.
(b) In information technology, a backup or data backup is a copy of computer data
taken and stored elsewhere so that it may be used to restore the original after a
data loss event.
(c) (i) The data can easily become corrupted if the removable storage device is
not handled properly.
(ii) Removable storage devices require special hardware to read or write.
29.
(a) Presentation Software (Microsoft PowerPoint)
(b) (i) Part A: New slide layout button.
(ii) Part B: Increase font size.
(iii) Part C: Find button.
(c) Use of part D: Title placeholder for inserting the title.
(d) The Find feature allows to quickly find text in a presentation.
30.
(a) ATM Card/Debit card or credit card
(b) Password/PIN/Secret code
(c) Account Name/ Holder’s Name/ Account Number/ Valid data
(d) E-commerce is the use of computers to buy, advertise or sell products/services
(e) (i) No need to carry huge sums of cash
(ii) It is secure.
(f) It is expired/ No network/ or insufficient funds/ faulty card/ wrong PIN
(g) Sim card/ chip
31.
(a)
D
MOUSE C COMPUTER SCREEN

KEYBOARD

(b) (i) Input device A: Scanner/ Microphone/ Joystick/ Game controller


(ii) Output device B: Speaker/ Projector etc.
32.
(a) Local Area Network – LAN – A link of computers in the same building, office or
confinement.

15 Dr. Mulimbi Bricious – [email protected]


(b) Viruses spread quickly on a network or security may be compromised on a
network.
(c) Storage Area Network (SAN)
(d) Modem/ dial up modem
(e) Fraud/ cybercrime/ stolen identity
33.
(a) Mail over the Internet.
(b) [email protected] / [email protected] / [email protected]
(c) Faster and efficient
(d) Poor network/ low bandwidth
34.
(a) (i) Software/
(ii) Hardware
(b) Any of the following: input/ processing/ output and storage
(c) Eye strain/ RSI/ Backache
(d) Cybercrime/ pornography.
35.
(a) Excel/ Spreadsheet
(b) =SUM(C4:F4) or C4+D4+E4+F4
(c) Merge and centre
(d) (i) Kimavu
(ii) Mabvuto
(e) SUM
36.
(a) Desktop publishing program is used for publication of different publications.
(b) (i) frames/
(ii) Text/ pictures
(c) By inserting into a frame.
(d) (i) text tools, printing and sharing
(ii) Layout tools/ graphic tools
(e) (i) calendars/
(ii) Business cards.
37.
(a) Computer Based Learning (CBL) is the term used for any kind of learning with the
help of computers.
(b) Digital camera/ VCR/ DVD
(c) Moodle
(d) Reduces travel time and costs learning can take place anywhere
(e) Students may feel isolated from the teacher/ learners with low motivation or bad
study habits may fall behold.

16 Dr. Mulimbi Bricious – [email protected]

You might also like