COMPUTER STUDIES QUESTIONS WITH ANSWERS
Explain data series, axis and legends as used in spreadsheet charts. Data, Axis and Legend29/12/2020 Explain data series, axis and legends as used in spreadsheet charts. Data, Axis and Legend
Data Series
0 Comments
You have been asked to change your computer password. State a precaution you need to take in order to avoid each of the following: a) Forgetting the password
b) Hacking
The diagram below shows four common network topologies A, B, C and D.
i) Name the network topologies labeled a, B, C and D.
ii) Explain what happens if server X in topology A fails. iii) List two problems associated with network topology B. iv) List two disadvantages associated with network topology D. b) Differentiate between Interment and World Wide Web: c) Describe the following network services and identify their applications. i) Voice mail ii) Video conferencing
ANSWERS
i) Name the network topologies labeled A, B, C and A Tree/Hierarchy B Ring C Bus/Multi drop D Star ii) Explain what happens if server X in topology A fails. The terminal connected to X will be affected/stop communicating with the ret of the network iii) List two problems associated with network topology B. Difficult to trouble shoot "- Failure of one terminal results in network breakdown Extra cost of extra NIC card. iv) List two disadvantages associated with network topology D. Failure of central device/server results I total collapse of network Extra cost of cabling as each terminal must be cabled separately to the hub. b) Differentiate between Internet and World Wide Web. The Internet is a massive network of networks, a networking infrastructure. It connects millions of computers together globally, forming a network in which any computer can communicate with any other computer as long as they are both connected to the Internet. Information that travels over the Internet does so via a variety of languages known as protocols. The World Wide Web, or simply Web, is a way of accessing information over the medium of the Internet It is an information-sharing model that is built on top of the Internet The Web uses the HTTP protocol, only one of the languages spoken over the Internet, to transmit data. Web services, which use IfTTP to allow applications to communicate in order to exchange business logic, use the Web to share information. The Web also utilizes browsers, such as Internet Explorer or Netscape, to access Web documents called Web pages that are linked to each other via hyperlinks. Web documents also contain graphics, sounds, text and video. c) Describe the following network services and identify their applications. i) Voice mail Voicemail (or voice matt, voicemail or VMS, sometimes called message bank) is a centralized system of managing telephone messages for a large group of people. In its simplest form it mimics the functions of an answering machine, uses a standard telephone handset for the user interface, and uses a centralized, computerized system rather than equipment at the individual telephone. Voicemail systems are much more sophisticated than answering machines in that they can: Answer many phones at the same time Store incoming voice messages in personalized mailboxes associated with the user's phone number Enable users to forward received messages to another voice mailbox send messages to one or more other user voice mailboxes Add a voice introduction to a forwarded message Store voice messages for future delivery Make calls to a telephone or paging service to notify the user a message has arrived in his/her mailbox Transfer callers to another phone number for personal assistance Play different message greetings to different callers. ii) Video conferencing. A videoconference (also known as a video teleconference) is a set of interactive telecommunication technologies which allow two or more locations to interact via two-way video and audio transmissions simultaneously. It has also been called visual collaboration and is a type of groupware. Describe the following terms with reference to security of data:Â Log files and Firewalls29/12/2020 Distinguish between the following sets of terms as used in spreadsheets. Worksheet and workbook, Filtering and sorting
b) A student’ database comprises of students’ details table and fees received table as shown below:
Students’ details table
i) State the primary key field for each table.
ii) State the field, which should serve as the linking field for the two tables. c) Describe the following terms with respect to computer security: i) Logic bombs ii) Physical security iii) Tapping d) List three functions of antivirus software.
(i) Log files
(i)State the primary key field for each table.
c) Describe the following terms with respect to computer security: i)Logic bombs A computer virus that is activated after a series of event/commands/date ii) Physical security Threats that threaten the physical nature of computer equipment e.g. Fire, Lightening water, building access etc iii) Tapping.
Distinguish between the following sets of terms as used in spreadsheets. Worksheet and workbook, Filtering and sorting
b) State one way in which a user may reverse the last action taken in a spreadsheet package.
c) The following is a sample of a payroll. The worksheet row and column headings are marked 1, 2, 3, . and A, B, C. respectively
Use the following expressions to answer the questions that follow:
i) D2 ii) E4 iii) F10 iv) G7 v) H5 d) i) State three ways of moving round the page in a Desktop Publishing window. ii) State two ways on how information & Communication Technology (ICT) can be used to reduce the spread of HIV/AIDS
EXPECTED RESPONSES
(a) Distinguish between the following sets of terms as used in spreadsheets
(i) Worksheet and workbook
Use the undo command (ctrl + z) (c)The following is a sample of a payroll. The worksheet row and column headings are marked 1, 2, 3, and A, B, C respectively
Use the following expressions to answer the questions that follow
List two examples of:Third generation languages and Object oriented languages
b) List and explain three types of user interfaces.
c) Describe the following categories of software: i) Firmware ii) Proprietary software d) a new company XYZ intends to go into the business of desktop publishing. Advise the company on three computer hardware system specification features to consider as a measure of enhancing performance.
(a) One of the functions of an operating system is job scheduling.
Explain what is meant by job- scheduling Running of a particular job/ task under a system of priority, computer resource availability, time allocated to user etc. (b) List and explain three types of user interfaces
The Formula = k20 + p $18 was typed in cell L21 and then copied to cell M24 of a spreadsheet. Write the formula as it appears in cell M24 (2mks)
Distinguish between margins and borders as used in word processing
List two arithmetic operations that can be performed on a row of numeric data in a word processing table.In each case of (a) above, write the expression used.Explain the following graphic terms: Rotate and Crop
State two application areas of a desktop publishing software.
What is an Internet Service Provider?
b) An employee in a business company is charged with the responsibility of putting the company advertisements on the Internet.
ANSWERS
(a) What is an internet service provider?
A company that provides internet services. Connects users to the internet (b) An employee in a business company is charged with the responsibility of putting the company advertisement on the internet (i) State the professional title of the employee Web administrator, web designer (ii) Give an example of software used by this employee to carry out the above task HTML, Dream weaver, MS Front Page
The following car details are to be entered in a database: Make, date of manufacture, colour and cost.
(a) Prepare a suitable database structure showing field names and their field types (5mks)Explain how a paragraph can be removed form one place to another in word- processing (2mks)1. Highlight/ select the paragraphList any four tasks that an electronic spreadsheet should be able to perform other than calculations27/12/2020 (a) List any four tasks that an electronic spreadsheet should be able to perform other than calculations.
(b) Explain what is meant by automatic recalculation as used in a spreadsheet.
Feature of electronic spreadsheet system which runs anytime a cell is updated, causing all formulas, functions and macros which depend on that cell to automatically update their computations
Give three advantages of separating data from the application that use the data in database design.27/12/2020 Give three advantages of separating data from the application that use the data in database design.
The first column in the table below contains the formulae as stored into the cell F10 of a spreadsheet. Enter the formulae, as they would appear when copied to the cell M20 of the same spreadsheet. Expected ResponseA firm intends to purchase new software. List three items that should accompany the software26/12/2020 (a) A firm intends to purchase new software. List three items that should accompany the software (3mks)
(a) What are computer viruses?
A computer program designed specifically to damage other programs or cause irregular behaviour.
(b)
|
Categories
All
Archives
December 2024
|
We Would Love to Have You Visit Soon! |
Hours24 HR Service
|
Telephone0728 450425
|
|
8-4-4 materialsLevels
Subjects
|
cbc materialsE.C.D.E
Lower Primary
Upper Primary
Lower Secondary
Upper Secondary
|
teacher support
Other Blogs
|