0% found this document useful (0 votes)
4 views4 pages

Year 9 Ict C3 Time: 45 Minutes

The document is an examination paper for Year 9 students focusing on ICT, covering various topics such as operating systems, cyberbullying, and internet safety. It consists of multiple-choice questions divided into two sections, with Section A containing 20 questions and Section B containing 10 questions. Each question assesses students' understanding of key concepts in information and communication technology.

Uploaded by

judeperesso
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views4 pages

Year 9 Ict C3 Time: 45 Minutes

The document is an examination paper for Year 9 students focusing on ICT, covering various topics such as operating systems, cyberbullying, and internet safety. It consists of multiple-choice questions divided into two sections, with Section A containing 20 questions and Section B containing 10 questions. Each question assesses students' understanding of key concepts in information and communication technology.

Uploaded by

judeperesso
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

DEPARTMENT FOR CURRICULUM,

LIFELONG LEARNING AND EMPLOYABILITY


Directorate for Learning and Assessment Programmes
Educational Assessment Unit
Annual Examinations for Secondary Schools 2023

YEAR 9 ICT C3 TIME: 45 minutes


Name: _____________________________________ Class: _______________
Section A – Answer all questions. Each question carries 1 mark.
Write the letter of the correct answer in the respective Answer box.

Answer
1 Which of the following programs runs first when a computer is turned on?
A. Web Browser
B. Spreadsheet
C. Application software
D. Operating System
2 Choose ONE of the following tasks that is usually carried out by the operating
system:
A. Simulating human intelligence processes by computer systems.
B. Providing the content that structure webpages.
C. Providing an interface for the user.
D. Providing a way to look at and interact with all the information on the
World Wide Web.
3 Which of the following operating systems is a mobile operating system that is
owned by Google?
A. Linux
B. Windows
C. Android
D. MacOS
4 On which type of operating system is iOS based on?
A. MacOS
B. Android
C. Linux
D. Windows
5 Which of the following terms refers to a way for programs to interact with the
operating system?
A. Adware
B. CMS
C. iOS
D. System Call
6 What does the term GUI stand for?
A. Google User Interface
B. Geographical User Interface
C. Graphical User Interface
D. Grammar User Interface
7 Which of the following describes the use of GUI?
A. It states that images and videos can be included in a website only if
authorised by the original creators or authors.
B. It allows users to interact with electronic devices through graphical icons.
C. It is a common way of bullying online.
D. It updates lists of users, plug-ins and site accessibility.

ICT C3 – Year 9 – 2023 Page 1 of 4


8 How do we refer to systems that are used to combine hardware and software
together to perform a single operation?
A. Embedded systems
B. Basic computer systems
C. Transportation systems
D. Mainframes
9 Which of the following is a good example of an embedded computer?
A. Laptop
B. Dedicated Server
C. Tablet
D. Washing Machine
10 Which process is carried out when a computer carries out self-tests, loading
BIOS and configuration settings?
A. Bootstrapping
B. Multitasking
C. Printing
D. Saving

11 What is loaded as part of the booting procedure in a computer system?


A. Windows
B. Device Drivers
C. Linux
D. MP4
12 What is the OS feature called when a user can use more than one program at
the same time?
A. System Call
B. Booting
C. Multitasking
D. Programming
13 Define the term: CMS
A. Control Management System
B. Content Management System
C. Component Management System
D. Current Management System
14 Which of the following definitions explains what a CMS does?
A. A computer software or an application that uses a database to manage all
content, and it can be used when developing a website.
B. A system of interactive visual components for computer software.
C. A special kind of software program that controls a specific hardware
device attached to a computer.
D. It communicates with the device through the computer communications
subsystem to which the hardware connects.
15 Which of the following is a very popular CMS?
A. WordPress
B. Ubuntu
C. Unix
D. Google Chrome
16 Define the term cyberbullying.
A. Cyberbullying is an online banking system.
B. Cyberbullying is any bullying that takes place virtually and happens
repeatedly.
C. Cyberbullying is when you receive a text message on social media.
D. Cyberbullying is when you make new friends online without knowing
them in person.

Page 2 of 4 ICT C3 – Year 9 – 2023


17 If a classmate has filmed a student behaving inappropriately and you happen to
receive that video, what should you do?
A. Tell someone about it like a parent or teacher.
B. Do not act to put more importance on it.
C. Press the like button but do not share it with others.
D. Write a comment.
18 What should a cyberbullying victim do?
A. Save the messages and block or report the bully.
B. Take print screens and share with your friends.
C. Delete the messages and ignore.
D. Write back straight away and defend yourself.
19 Which of the following is a recommended security measure to use when online?
A. Always use the same username and password wherever you login.
B. Never update software on your computer.
C. Use 2-factor authentication or 2-step verification everywhere you can.
D. Sharing personal information when using social media.
20 One common risk of working online is cybercrime. Which of the following terms
may occur if a person takes control of the identity of someone else after hacking
an email or a social media account?
A. Cyber Theft
B. Identity Theft
C. Cyberstalking
D. Grooming

Section B – Answer all questions. Each question carries 2 marks.


Write the letter of the correct answer in the respective Answer box.

Answer
21 Which of the following terms refers to the set of rules of behaviour that one
must abide with, while using technology devices to interact with others?
A. Biomechanical Enhancement
B. Robotic Body Modification
C. Netiquette
D. Nanotechnology
22 Nowadays, people are making use of smart appliances that can be controlled
remotely via computers and smartphones. What is this phenomenon called?
A. World Wide Web
B. Internet of Things
C. Ubuntu
D. Drivers
23 Smart assistants are a type of what?
A. Kernel
B. Artificial Intelligence
C. Embedded System
D. CMS
24 Which of the following jobs makes use of AI and requires no human interaction?
A. Travel booking agent
B. Housekeeper
C. Construction worker
D. Welder

ICT C3 – Year 9 – 2023 Page 3 of 4


25 What measures should one consider taking when using social networking sites?
A. Enter personal information like home address and contact number.
B. Create a short password that is easy to remember.
C. Accept phone calls from strangers.
D. Set privacy settings so that your personal information is not visible to
everybody.
E.

26 Which of the following internet safety measures must be taken by a customer


while shopping online?
A. Trust all businesses and retailers that get to you via email fraud.
B. Use simple passwords to login to online shopping websites and never
check for website security before buying goods.
C. Shop with reputable retailers, check site security, guard your personal
information and pay with a credit card.
D. Provide the seller with all your personal details including credit card
details and never report scammers.
27 When someone threatens a victim to distribute private and sensitive material
unless that person provides images of a sexual nature, sexual favours, or
money, what is it called?
A. Phishing
B. Sextortion
C. Autonomous Tech
D. Homo Evolutis

28 Which of the following situations describes cyberbullying?


A. Sending hurtful, abusive, or threatening messages, images, or videos via
messaging platforms.
B. Making friends online from your neighbourhood or from around the world.
C. It protects computer systems and networks from information disclosure,
theft or damage to hardware and software.
D. Occasionally texting and calling friends online to show them that you care
for them.

29 Joomla! and Drupal are two popular platforms used to develop websites. What
are these applications called?
A. Multimedia Systems
B. System Analysis
C. Content Management Systems
D. Control Systems
30 Which of the following terms refers to technologies that are emerging human
beings to become new species?
A. Homo Evolutis
B. Ethical Dilemma
C. Autonomous Tech
D. Digital Blackmail

Page 4 of 4 ICT C3 – Year 9 – 2023

You might also like