Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
32 views8 pages

Digital Literacy Exam Guide

Uploaded by

nmargaret384
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views8 pages

Digital Literacy Exam Guide

Uploaded by

nmargaret384
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

DIGITAL LITERACY LEVEL 6 Marksheets

1. Identify THREE ways in which computers have made work easier in learning institutions.

(3 Marks)

Digital Simulations And Models

Improved Communication

Advanced Research

Effective Assessments

2. Differentiate between replying and forwarding an e-mail. (2 Marks)

*Replying** is used to continue a conversation or provide a response to the original sender or


recipients. - **Forwarding** is used to share the original email with new recipients who were not part
of the original conversation.

3. Jane was advised to purchase an uninterruptible power supply (UPS) for her computer.

State TWO uses of the device she purchased. (2 Marks)

 They offer an alternative power source to the load.


 UPSes are reliable sources of power for computers or devices connected to them.
 Provide a stable clean power source to the computer device.
 UPS helps reduce cases of data loss due to power issues.

4. State THREE computer network equipment’s used in networking other than a computer.

(3 Marks)

Hub, modem, repeater ,bridge, gateway

5. Define the term biometric access control as used in data security. (2 Marks)

A biometric access control system uses unique physical characteristics like fingerprints, facial
recognition, or iris scans to identify individuals and grant them access to restricted areas of buildings

6. A computer virus is a program which interferes the normal working of the computer

systems. Highlight the FOUR computer virus “symptoms”? (4 Marks)

 Shutting down of computers


 Deletion of data
 Problems unexpectedly shutting down or restarting
 Missing files
 Frequent system crashes
 Frequent error messages
 Unexpected pop-up windows

7. Computers nowadays are usually connected majorly through the internet resulting to a

global village. The major issue resulting from this is computers being exposed to attacks

on the internet which we call cybercrime. Define the term cybercrime. (2 Marks)

The illegal usage of any communication device to commit or facilitate in committing any illegal act

8. Outline the procedure for creating an e-mail account. (5 Marks)

 Visit a website that offers an email service


 Find where to sign up.
 Follow all the instructions on the page, filling out all the needed details
 Read over the service agreement and click the box saying that you agree to abide by the email
system's rules.
 You have now created an email address

9. You are an instructor for a digital media course at a community college. One of your

students, Sam, is confused about why a desktop publisher is preferred in designing

documents over a word processor. Sam has some experience using word processors like

Microsoft Word and Google Docs but has yet to explore desktop publishing software.

Explain TWO differences between word processors and desktop publisher. (4 Marks)

Word processing Software Desktop publishing Software

It is a kind of software that focuses on the line- It is a kind of software which allows the complex
by-line creation of text documents. pages of the given text and graphics.

It Cannot handle more of the graphical


It generally Handles more graphical elements.
elements into it as it has its own place.

They were created to create the document. They were originally created to design printed
Word processing Software Desktop publishing Software

documents.

10. Differentiate between workbook and worksheet as used in a spreadsheet. (2 Marks)

A workbook is a file that contains one or more worksheets. A worksheet, also known as a spreadsheet,
exists in the same workbook.

11. Peter has been tasked to proofread a document created using a word processing program.

State the features that he could use to perform each of the following;

i. Look for the occurrence of the word “church and change it to “company”. (1 Mark)
The Replace tab of the Find and Replace dialog box. In the Find What box, enter church. In
the Replace With box, enter ^&.
ii. Correct misspelt words. (1 Mark)
1. Press the F7 function key to run the spell checker. 2. When the spell checker comes to a
commonly misspelled or mistyped word click on the AutoCorrect button.

12. The following functions are used in a spreadsheet program: AND, Average, OR, TRUE,

IF, Average IF. Classify them as either statistical or Logical functions. (6 Marks)

Statistical: Average, average if,if,

Logical functions: AND,OR,TRUE

13. Ken created slides in a presentation program. Outline three examples of slide layouts he

could have used in the presentation. (3 Marks)

 Title slide
 Text slide
 Picture slide

SECTION B: (60 MARKS)

(Answer any three questions in this section)

14.

a. As small business owners, you are aware of the rising threat of computer crimes and
the potential risks they pose to your business's sensitive data. Implementing robust

cybersecurity measures is crucial for safeguarding your business’ information and

reputation. Considering this, what are FIVE effective methods you can adopt to

protect yourself and your business from computer crimes? (10 Marks)

Train Employees on Cybersecurity Awareness

One of the most critical steps in preventing cyber attacks is to train employees on cybersecurity
awareness.

Strong Passwords and Multi-Factor Authentication

Passwords are often the first line of defence against cyber attacks, and it's essential to use strong
passwords.

Keep Software Up-to-Date

Hackers often exploit vulnerabilities in outdated software to gain access to a system

Implement a Firewall

A firewall is a network security system that monitors and controls incoming and outgoing network
traffic.

Backup Data Regularly

Data backups are critical in case of a cyber attack, as they can help organisations recover their data
quickly

b. Discuss FIVE advantages of using wireless transmission media to connect to the

internet. (10 Marks)

Freedom from wires: Can be configured with the use of any physical connection.

Easy to setup: Wireless network is easy to expand and setup

Better or global coverage: It provides global reach by providing networking in places such as rural areas,
battlefields, etc… where wiring is not feasible.

Flexibility: Wireless network is more flexible and adaptable compared to a wired network.

Cost-effectiveness: Since it is easy to install and doesn’t require cables, the wireless network is relatively
cheaper.

Mobile and portable: Wireless network is easy to carry and re-install in another place
15.

a. Discuss FIVE disadvantages of the internet. (10 Marks)

Information overload,

privacy concerns,

addiction, social isolation,

diminished productivity, and negative impacts on mental health are all significant challenges associated
with the digital realm.

b. A technician was asked to purchase a monitor to be used in a conference room.

Explain the FIVE factors that she should consider when purchasing the device.

(10 Marks)

1) Display Technology

Different computer monitors are powered by different display technologies. In the past, most computer
monitors used cathode-ray rube (CRT) technology. In recent years, though, alternative display
technologies have emerged, some of which include liquid-crystal display (LCD), light-emitting diode
(LED) and organic light-emitting diode (OLED). Of those available display technologies, OLED offers the
highest level of performance.

#2) Resolution

Along with display technology, you should consider the resolution when shopping for a computer
monitor. Resolution, of course, refers to the total number of pixels in a computer monitor that can be
displayed at any given time. A computer monitor with 4K resolution, for instance, features 4,000 pixels.
Known as ultra-high definition (UHD), it’s capable of producing crystal-clear images with a high level of
detail.

#3) Screen Size

Computer monitors are available in a wide range of sizes. Some are as small as just 17 inches, whereas
others measure up to 40 inches. The screen size refers to the diameter of the display. Large computer
monitors have a large display, which generally makes them preferable over smaller computer monitors.
The downside to a large computer monitor, though, is the price. Not surprisingly, they usually cost more
than smaller computer monitors. If you’re planning to purchase multiple computer monitors for your
business, you may want to stick with a medium size to save money.
#4) Ports

Something else to consider when shopping for a computer monitor is the ports. All computer monitors
contain at least one display port. It’s essentially a socket that’s used to connect a cable between the
monitor and the computer. Some of the most common types of ports used in computer monitors
include DisplayPort (DP), Digital Visual Interface (DVI) and High-Definition Multimedia Input (HDMI).

#5) Refresh Rate

Finally, you should consider the refresh rate when shopping for a computer monitor. Refresh rate refers
to the number of times a computer monitor updates with images in a given second. A computer monitor
with a 144 Hz refresh rate updates 144 times per second, whereas a computer monitor with a 60 Hz
refresh rate updates 60 times per second.

16.

a. Utility software are the programs used frequently to carry out routine jobs in

computer systems. Explain the FIVE types of utility software. (10 Marks)

Antivirus

A virus is a malicious software that enters the system along with a host program. Moreover, it multiplies
with time and makes several copies which in turn slows down and corrupts the system.

Disk Management Tools

These utility software are used to manage data on disks. Moreover, they perform functions like
partitioning devices, manage drives, etc.Examples of disk management tools are MiniTool Partition
Wizard, Paragon Partition Manager, etc.

Disk Cleanup Tool

This utility software helps to free up the disk space. In addition, the files which are no longer in use are
removed from the disk. Examples are Razer Cortex, Piriform CCleaner, etc.

Disk Defragmenter
This utility software helps to reduce the fragmentation and hence, reduces the access speed.
Defragmenting refers to rearranging files and storing them in contiguous memory locations. Moreover,
saves time in reading from files and writing files to disk. Examples of disk defragmenters are Perfect disk,
Deflaggler, etc.

Backup Utility

This utility software helps to back up the files, folders, databases, or complete disks. Moreover, backup
refers to duplicating the disk information so that the data can be restored if any data loss happens.

b. Akili Bora enterprise integrated mobile technology into its business practices. Clarify

the advantages of embracing this technology by explaining FIVE key benefits.

(10 Marks)

Better communication

Mobile devices has been driving business communication allow organizations to get better
communication within workers and with customers and vendors. The increase of digital communication
has helped to eliminate time and distance as obstacles, which has been beneficial to many parts of
society, including business.

Increased collaboration with your team

Telecollaboration has been boost by the use of technology and mobile devices into business. Mobile
technology means teams can connect from anywhere and provide them access to the documents and
materials needed to get collaborative work done. Mobile devices and Internet have made it possible to
conduct teleconferences, online meetings, video calls and so on.

Remote work

Mobile technology is redefining work. Employees no longer need to stay in their desks to work; they can
do it from everywhere in the world. Remote work isn’t just convenient for both employers and
employees; studies have shown that it’s also more effective. According to Gallup’s report, employees
across various industries who spent 60 to 80 percent of their time working remotely had the highest
rates of engagement.

Reduced operational costs and saved time


Mobile technology can save your business time and money in many ways. Employees working remotely
or even from home can save you thousands of dollars regularly. Mobile devices reduce the need for
expensive technology, such as landline carrier services. Cloud-based services are cheaper than using any
of the systems Technology can also give your business more flexibility and improved productivity.

Increased productivity

Mobile technology can has a huge impact on productivity. Mobile application integration saves around
7.5 hours per employee, per week. Smartphones and mobile devices also enable workers to become
more productive. Surveys of remote employees show that working from home can be more beneficial
than working from an office because workers are more likely to do extra hours and perform tasks
outside their regular ones to help the organization.

Real time data

Mobile technology provides tools to help businesses access to real-time data. Mobile-integrated data
software usage has increased as more businesses have realized the importance of turning data
actionable. Many enterprise resource planning (EPR) systems allows users to access real-time, live data
updates and reports wherever they are.

You might also like