Define authenticity as used in software selection
0 Comments
Jane has noticed the following problems in her computer keyboard
a) Disk is fragmented - Defragment the disk by running the defragment utility. "
b) Virus/bug infection - run the antivirus utility c) Capacity of RAM is small- Increase the size by replacing the existing chip with a higher capacity RAM chip. d) Processor speed is low - Replace processor with a high speed processor. State the functions of the following keys on the computer keyboard; Backspace and Insert (ins)29/12/2020 State the functions of the following keys on the computer keyboard; Backspace and Insert (ins)
Describe the computer booting process.
The diagram below shows four common network topologies A, B, C and D.
i) Name the network topologies labeled a, B, C and D.
ii) Explain what happens if server X in topology A fails. iii) List two problems associated with network topology B. iv) List two disadvantages associated with network topology D. b) Differentiate between Interment and World Wide Web: c) Describe the following network services and identify their applications. i) Voice mail ii) Video conferencing
ANSWERS
i) Name the network topologies labeled A, B, C and A Tree/Hierarchy B Ring C Bus/Multi drop D Star ii) Explain what happens if server X in topology A fails. The terminal connected to X will be affected/stop communicating with the ret of the network iii) List two problems associated with network topology B. Difficult to trouble shoot "- Failure of one terminal results in network breakdown Extra cost of extra NIC card. iv) List two disadvantages associated with network topology D. Failure of central device/server results I total collapse of network Extra cost of cabling as each terminal must be cabled separately to the hub. b) Differentiate between Internet and World Wide Web. The Internet is a massive network of networks, a networking infrastructure. It connects millions of computers together globally, forming a network in which any computer can communicate with any other computer as long as they are both connected to the Internet. Information that travels over the Internet does so via a variety of languages known as protocols. The World Wide Web, or simply Web, is a way of accessing information over the medium of the Internet It is an information-sharing model that is built on top of the Internet The Web uses the HTTP protocol, only one of the languages spoken over the Internet, to transmit data. Web services, which use IfTTP to allow applications to communicate in order to exchange business logic, use the Web to share information. The Web also utilizes browsers, such as Internet Explorer or Netscape, to access Web documents called Web pages that are linked to each other via hyperlinks. Web documents also contain graphics, sounds, text and video. c) Describe the following network services and identify their applications. i) Voice mail Voicemail (or voice matt, voicemail or VMS, sometimes called message bank) is a centralized system of managing telephone messages for a large group of people. In its simplest form it mimics the functions of an answering machine, uses a standard telephone handset for the user interface, and uses a centralized, computerized system rather than equipment at the individual telephone. Voicemail systems are much more sophisticated than answering machines in that they can: Answer many phones at the same time Store incoming voice messages in personalized mailboxes associated with the user's phone number Enable users to forward received messages to another voice mailbox send messages to one or more other user voice mailboxes Add a voice introduction to a forwarded message Store voice messages for future delivery Make calls to a telephone or paging service to notify the user a message has arrived in his/her mailbox Transfer callers to another phone number for personal assistance Play different message greetings to different callers. ii) Video conferencing. A videoconference (also known as a video teleconference) is a set of interactive telecommunication technologies which allow two or more locations to interact via two-way video and audio transmissions simultaneously. It has also been called visual collaboration and is a type of groupware. Distinguish between the following sets of terms as used in spreadsheets. Worksheet and workbook, Filtering and sorting
b) A student’ database comprises of students’ details table and fees received table as shown below:
Students’ details table
i) State the primary key field for each table.
ii) State the field, which should serve as the linking field for the two tables. c) Describe the following terms with respect to computer security: i) Logic bombs ii) Physical security iii) Tapping d) List three functions of antivirus software.
(i) Log files
(i)State the primary key field for each table.
c) Describe the following terms with respect to computer security: i)Logic bombs A computer virus that is activated after a series of event/commands/date ii) Physical security Threats that threaten the physical nature of computer equipment e.g. Fire, Lightening water, building access etc iii) Tapping.
Distinguish between the following sets of terms as used in spreadsheets. Worksheet and workbook, Filtering and sorting
b) State one way in which a user may reverse the last action taken in a spreadsheet package.
c) The following is a sample of a payroll. The worksheet row and column headings are marked 1, 2, 3, . and A, B, C. respectively
Use the following expressions to answer the questions that follow:
i) D2 ii) E4 iii) F10 iv) G7 v) H5 d) i) State three ways of moving round the page in a Desktop Publishing window. ii) State two ways on how information & Communication Technology (ICT) can be used to reduce the spread of HIV/AIDS
EXPECTED RESPONSES
(a) Distinguish between the following sets of terms as used in spreadsheets
(i) Worksheet and workbook
Use the undo command (ctrl + z) (c)The following is a sample of a payroll. The worksheet row and column headings are marked 1, 2, 3, and A, B, C respectively
Use the following expressions to answer the questions that follow
List two examples of:Third generation languages and Object oriented languages
b) List and explain three types of user interfaces.
c) Describe the following categories of software: i) Firmware ii) Proprietary software d) a new company XYZ intends to go into the business of desktop publishing. Advise the company on three computer hardware system specification features to consider as a measure of enhancing performance.
(a) One of the functions of an operating system is job scheduling.
Explain what is meant by job- scheduling Running of a particular job/ task under a system of priority, computer resource availability, time allocated to user etc. (b) List and explain three types of user interfaces
List two examples of:Third generation languages and Object oriented languages
i) Third generation languages
ii) Object oriented languages b) Draw a flowchart to compare three non-equal numeric values A, B, C and prints the largest of the three.
(a) List two examples of:
(i) Third generation languages Pascal, basic, c (ii)Object oriented languages VB, Small talk, C++ The diagram below shows a formatted plate surface of a storage disk.
Shade and label:
a) one sector b) One block Give one disadvantages of a single processor multi- user system (1mk)
List three disadvantages of using traditional file management method (3mks)
State two ways in which a computer may be used in efficient running of a hospital (2mks)
The Formula = k20 + p $18 was typed in cell L21 and then copied to cell M24 of a spreadsheet. Write the formula as it appears in cell M24 (2mks)
State any three activities that occur in a program compilation process (3mks)
Suppose an element array A contains the values 9, 12, 17, 7 and 20. Find the value in A after executing the loop below:
Repeat for k= 1 to 4
Set A {k + 1} = A {k} {End of loop} First time A {2}: = 9 Second time A {3}: = 9 Third Time A {4}:= 9 Fourth time A {5}: = 9 State two types of documentation in program development and give the purpose of each (4mks)
State three data representation codes used in computersASCIIAmerican Standard Coded for information interchange BCDBinary coded Decimal EBCDICExtended Binary Coded Decimal interchange Code Explain how each of the following would affect the suitability of a room for use as a computer room. (2mks)(a) Burglar proofed doorenhances the security system as it prevents Unauthorized users from entering (b) Availability of taps and sinks in the roomCould be detrimental since water can cause damage to computer equipment Related SearchesDescribe the purpose of each of the following computer functional units(a) ControlEssentially governs all the computer activities and monitors the execution of programs. (b) StorageTo holds internally before and after processing. Divided into two i.e. primary and secondary Primary holds data and information being handled by the CPU. Secondary stores data and information in a more permanent form List two methods of gathering information during system development process.
Distinguish between margins and borders as used in word processing
List two arithmetic operations that can be performed on a row of numeric data in a word processing table.In each case of (a) above, write the expression used.Explain the following graphic terms: Rotate and Crop
|
Categories
All
Archives
December 2024
|
Can't find what you are looking for? Don't worry, Use the Search Box Below.
Primary Resources
College Resources
|
Secondary Resources
|
Contact Us
Manyam Franchise
P.O Box 1189 - 40200 Kisii Tel: 0728 450 424 Tel: 0738 619 279 E-mail - sales@manyamfranchise.com |