COMPUTER
APPLICATIONS
TECHNOLOGY
GRADE 10
Theory
Test – Term 3
2025
Resources/ past papers: @ IMPAQ TASK 5: TERM 3 TEST 1_ 2020, TERM 3 TEST 1_
2021 @ IMPAQ TASK 5: TERM 3 TEST 1_ 2019, @IMPAQ NOV 2020. DBE NOTES
WCED 2021. DBE_KZN Sep 2023. Images: CANVA.COM
For more Juffrou_Ansie products, contact
Good luck. Juffrou Ansie
Content:
Network technologies: Networks 5
Internet technologies: Internet and WWW 13
Internet technologies: Communication 19
Social implications 25
@Juffrou_Ansie
, 2
Multiple-choice questions.
F1 - 10 Keys associated with the help function
The virus is placed When an antivirus program places a virus in a safe area of the
under quarantine disk so that it cannot affect the computer, we say the virus is
being spoofed
Holding Ctrl key Holding Ctrl key and click in a sentence means selecting the
whole sentence.
Restoring a file from Moves file to original location.
the recycle bin
A hotspot You can use a smartphone with its data bundle as a personal
hotspot to connect another smartphone to the internet. A
hotspot is a small area in which a wireless network is enabled
that uses Wi-Fi technology.
Malware Any software written with negative intentions.
Virus A type of program that is loaded secretly on a computer to
disrupt the functioning of the computer.
Worm Software designed to distribute itself over a network and
reproduce so many times that your computer’s available
memory is used up.
Trojan A destructive program disguise as a useful application.
Hoax A message intended to deceive or defraud others.
ADSL ADSL is a permanent digital connection to the Internet using a
telephone line. Fibre is faster electrical transmission than ADSL.
Fibre A type of network cable that can transfer data faster than
the type of cable used in an ADSL connection.
@Juffrou_Ansie
, 3
Hackers Breaks into computer systems for prestige and recognition. A
computer criminal who is often hired legitimately to test
security systems
Crackers Break into computer systems for criminal intentions
Botnet operator A person who used malicious software to get control over
your computer to be able to attack other computers online
Limited range The biggest disadvantage of a personal area network
ISP A company that offers Internet access for a monthly amount.
Providers of Internet connectivity to homes, businesses or
schools.
A blog A blog is an online diary created by a person with comment
facilities for the public.
HAN A type of network that can be found in a household
HTML An example of a computer language used to create web
pages
Network OS Software that controls communication within a network.
https:// Safe URL.
Internet Explorer A web browser
IM app Facebook Messenger is an example of an IM app.
Email list Personal online diary
Phishing Email appears from a trustworthy company, but you are
being misled to provide personal details
‘Re’ in an email The email has been answered.
subject
Advocacy websites This type of website describes an idea, opinion or cause and
usually presents the views of a particular group or
organisation
@Juffrou_Ansie