COMPUTER STUDIES QUESTIONS WITH ANSWERS
State two: functions of an email software; protocols used in sending and receiving of emails.5/1/2021 State two: functions of an email software;protocols used in sending and receiving of emails.(a) functions of an email software;
Facilitates mail creation.
(b) protocols used in sending and receiving of emails.
0 Comments
Differentiate between relative cell referencing and absolute cell referencing.
A student saved a document in a diskette. Later on, the student found that the diskette could not open arid therefore the work got lost.Give three precautions the student should have taken to ensure the work was not lost.
State the function of each of the following features in a word processor application:
(a) Thesaurus. (1 mark)
It is a feature in a word processor that suggest words with similar or opposite meaning to the selected word @1. (b) Comments (1 mark) It is a feature in WP that allows a user to attach a remark about the selection @1. In a spreadsheet the formula =If(AI>10, A1 *77, A1*50) is entered in a cell. Interpret the results5/1/2021 In a spreadsheet the formula =If(AI>10, A1 *77, A1*50) is entered in a cell. Interpret the results. (3 marks)=If(A1>10,A1 *77,A1 *50)
Compares the value in cell Al ¡fit is greater than 10, if comparison is True, the results of operations Al * 77 is displayed, if it is False the results of the operations A1 * 50 is displayed. Name three types of graphics used in a word processor.
(a) State four activities of the planning stage of systems development. (4 marks)
Activities at the planning stages
One way in which an organisation enforces security of its computer systems is by restricting the use of removable media such as floppy disks and flash memories. Give two reasons for this.
(a) (1) Explain the term search engine as used in the Internet. (2 marks)
(i) Search-engine
It is a web-based application used to locate for an item or information from world wide web.
(ii) Peter intends to download a movie from the Internet. State the three factors that may determine the total time taken to complete the download. (3 marks)
Factors that affects duration of download
Explain the function of protect sheet feature in a spreadsheet program. (2 marks)Function of protect sheet:
What is meant by each of the following terms as used in the Internet?,surf, uploading and inbox.4/1/2021 What is meant by each of the following terms as used in the Internet?,surf,uploading and inbox.
(b) A school has set up its network using wireless technology to link computers. State three problems that the school is likely to experience when using this technology.
(c) List three ways by which parents can protect their children from accessing inappropriate content from the internet. (d) Explain three problems associated with using e-mail technology for communication.
(a) Surfing: Its the process of accessing /browsing/visiting internet resources like webpages.
What is meant by each of the following terms as used in table creation?
(a) What is meant by each of the following terms as used in table creation?
(i) cell margin; (ii) nested table. (b) State four types of text wrap that can be applied to a graphic. (c) Distinguish between each of the following: (i) axis labels and data labels; (ii) cropping and sizing. (d) Figure 1 shows a section of a worksheet containing information on household items. Use it to answer the questions that follow.
(i) Write a formula to calculate the total cost of rice.
(ii) The prices of all items increased by 10% and the value 10% is placed in cell B8. Using cell addresses with absolute referencing only, write a formula to calculate the new unit price of salt. (iii) Write a function to display the number of cells in which the cost per unit is equal to 110. (iv) Write a function to display the least total cost for all items.
(a) (i) Cell margin: Its the space between the boundary of the cell and the text/content inside the cell.
(ii) Nested table: is a table created inside another table. (b) In line with text.
State the purpose of each of the following in database design.(a) input mask
(b) default value
Pesa Mingi company has offices in Nairobi and Kampala connected in a network. The management is convinced that someone is illegally gaining access to the data in their computers. State three ways in which the company can overcome this problem.
State two measures that can be put in place to control piracy of software.
The text in the box below was composed using a word processor. The current cursor position is between the words “is” and “an”.
Describe what happens to the text in the box above when each of the following keyboard keys are pressed.
(a) tab (b) enter (c) home
(a) Tab: Moves the text ahead to the next tab stop or several stops ahead! right) forward.
(b) Enter: Break the line after the word ‘is’ so that the word ‘an’ starts on a new line. Words from “an” forms a new paragraph. (c) Home: Takes the cursor to the beginning of the line. Nothing happens to the text Explain how data in a computer system is secured using:
(i) password;
(ii) user access level. (b) State three characteristics of a suitable password. (c) State two characteristics of a computer that is infected by computer viruses. (d)(i) The figure below shows how data is transmitted through a public telephone line.
Name A, B, C and D.
(ii) State two advantages of using fibre optic cables over satellite in data communication.
(a) (i) Password
Using two examples, explain the term field properties as used in database design.
(b) Below is an extract from a hospital database table.
(i) State with reasons the most suitable data types for the following fields:
(iii) What is the purpose of a primary key field in database design? (iv) Describe how information about patients who registered after 09/08/06 can be extracted from the database.
(a)Field property:
Describe the following terms as used in mail merging: main document; and data source.(a) main document;
(b) data source.
Copyright laws are laws granting authors the exclusive privilege to produce, distribute, perform or display their creative works. It is a legal framework for protecting the works such as book publishing, motion-picture production and recording. State two challenges that are posed to these laws by ICT’.
Give two reasons why the use of finger prints and voice input can be used as reliable forms of security in computer systems.
They cannot be:
The word race is appearing several times in a long story document composed using a DTP package. How would this word be safely replaced with the word content?.
Distinguish between a formula and a function as used in spreadsheets.Explain why an intranet is a more secure way to share files within an organisation compared to the internet.
Explain the following terms as used in word processing (3mks)
|
Categories
All
Archives
December 2024
|
We Would Love to Have You Visit Soon! |
Hours24 HR Service
|
Telephone0728 450425
|
|
8-4-4 materialsLevels
Subjects
|
cbc materialsE.C.D.E
Lower Primary
Upper Primary
Lower Secondary
Upper Secondary
|
teacher support
Other Blogs
|