Digital Literacy Level 6-Assessors Guide
Digital Literacy Level 6-Assessors Guide
Digital Literacy Level 6-Assessors Guide
LEVEL 6
Demonstrate Digital Literacy
July/August 2023
ASSESSORS GUIDE
TIME: 3 hours.
INSTRUCTIONS TO CANDIDATE
1. This paper has two sections A and B.
2. Attempt questions in each section as per instructions given in the section.
3. You are provided with a separate answer booklet.
4. Answer all questions in the answer booklet.
5. Marks for each question are indicated in the brackets.
6. Do not write on the question paper.
Page 1 of 12
©2023TVET CDACC
Hacking Piracy
Denial of service Social engineering
Phishing Man-in-middle attack
Fraud
Page 2 of 12
©2023TVET CDACC
7. List FOUR publications that can be produced using desktop publisher (DTP). (4 marks)
Posters Certificates
Calendars Wedding cards
AdvertiABCnts Business cards
Pamphlets Flyers
Brochures
Page 3 of 12
©2023TVET CDACC
Page 4 of 12
©2023TVET CDACC
(Award 1 mark each correct point and 1 mark for each correct explanation maximum 8 marks)
b) ABC TTI has set up an internet connection to explain FIVE advantages of the internet to the
school. (10 marks)
Access to Information: The internet provides instant access to a vast amount of
information, including educational resources, research materials, e-books,
articles, videos, and more.
Online Collaboration and Communication: Online platforms, such as email,
instant messaging, discussion forums, and video conferencing tools, facilitate real-
time interactions, allowing students to discuss ideas, work on group projects, and
seek guidance from teachers outside of the classroom.
Page 5 of 12
©2023TVET CDACC
16. a). Helen has been requested to propose different types of networking topologies for her
organization. With an aid of a diagram, explain FOUR different topologies. (12 marks)
Page 6 of 12
©2023TVET CDACC
Star topology: Star topology consists of computers and other devices, each
connected to a common central server called the Hub. However, to connect to the
central machine, each computer uses a separate cable.
Bus topology (Daisy-chain topology):In Bus topology, all the devices in the network
are connected directly, through appropriate interfacing hardware, to a single
transmission cable called the Bus (or Backbone) on which information is broadcast.
Ring topology: In a ring topology, the computers are connected to one another in
the shape of a closed loop using a single cable.
Mesh topology: Mesh topology uses separate cables to connect each device to every
other device on the network providing a straight communication path.
Page 7 of 12
©2023TVET CDACC
Page 8 of 12
©2023TVET CDACC
17. a) A National Polytechnic wants to network its computers, as an ICT officer of the
organization, explain to the management the FOUR Networking devices they should acquire.
(8 marks)
Hub (Concentrator): A Hub is a component that connects computers on a
network, and is able to relay signals from one computer to another on the same
network.
Page 9 of 12
©2023TVET CDACC
Text Boxes and WordArt: Word provides text boxes and WordArt for adding
stylized text or decorative elements
c) Microsoft Excel is used for numerical data manipulation using formulas and functions
explain the following as used in MS Excel:
a. Workbook
A Workbook is a file in a spreadsheet package that contains one or more
worksheets
b. Worksheet
Worksheets are made up of rows & columns in which you work and store your
data
c. Cell.
A cell is an intersection of rows and columns
(Award 2 marks for each correct answer)
(6 marks)
18. a) The government has donated fifty new computers to technical training institute. For them to
become useful to the users they must be installed with an operating system. Explain FIVE
functions of an operating system. (10 marks)
Job scheduling-The processor can only handle one task at a time. A job is a group
of tasks taken as a unit of work for a computer which may include one or more
computer programs, files and instructions to the Operating System. The scheduler
decides which of the jobs is allocated to the CPU for processing.
Resource control and allocation Includes controlling the use of computer resources
by other system software and application programs being executed. The resources
include I/O devices, CPU and processing time. The OS strives to avoid deadlocks by
allocating resources wisely to tasks or programs that are competing for them. Each
device has unique identification number called an interrupt number. So when two
tasks request to use a resource at the same time, the one with higher4 priority
interrupt is granted control.
Input / Output Handling The OS coordinates between I/O devices and other
peripheral devices making sure that data flows properly between them and sorting
out any possible confusion. It will also monitor the state of I/o devices and signal
Page 10 of 12
©2023TVET CDACC
any faults detected. It also governs the input/output of data and their location,
storage and retrieval.
Memory management The OS organize the main memory into partitions and
ensures that each program and the data it requires are allocated adequate space in
memory to access data or instruction, the OS knows where to find each piece of data
as long as the correct address of the partition is used.
Error handling The OS deals with errors produced during program execution by
expressing what the error is and provides the error correction routines to ensure
smooth operations within the CPU.
Security Modern operating systems implement security policies such that
unauthorized users cannot get access to a computer or network resource.
Job sequencing The OS keeps a list of tasks currently being run and arranges them
in a particular order to make it easy for the processor to execute them and to know
how and when to fetch instructions and data for each task. I.e. clocks them in and
out of the processor
b) Outline FOUR examples of utility programs of a computer system. (4 marks)
Text editor – used to create & subsequently modify textual info using the
computer
Language translators – used to convert source codes to object codes
Sort utility – arrange records within a file according to some predetermined
sequence
Merge utility – combines contents of two or more input files to produce one output
files
Copy utility – maintains duplicate copies of operational files so that in case
something goes wrong their contents can be recreated from backup copies
Dump utility– transfers contents of computers internal memory into a storage
media
(Award 1 mark each answer)
c) Printers are one of the most important components for obtaining hardcopy output.
Distinguish between impact and non-impact printers. (4 marks)
Impact Printers
The print head comes into contact with the printing paper through an ink ribbon to
produce images.
Non – Impact Printer
Non-impact printers the print head does not come into contact with the printing paper to
produce images while printing
Page 11 of 12
©2023TVET CDACC
Page 12 of 12