COMPUTER STUDIES QUESTIONS WITH ANSWERS
Study the flowchart below and answer the questions that follow
i) Name the control structures used in the flowchart
ii) Determine the values of M, N, P and Q. M………………………….. N……………………….. P ………………………….. Q ……………………… iii) Write the pseudo code for the flowchart b) List four functions of an assembler
ANSWERS
i) Name the control structures used in the flowchart.
- Selection -Sequencing ii) Determine the values of M, N, P and Q. M………17………………..N……………….17………………….. P………..17………………..Q……………….17…………………. iii) Write the pseudo code for the flowchart Q=N
a) Translate assembly language to machine code. b) Execute assembly language statements. c) Create executable files (.exe) from the assembly language statements. d) Allocate memory for machine code. e) Debug for errors
0 Comments
Write an algorithm to compute the area of a triangle.
List four factors to be considered when purchasing an operating system.
Differentiate between the following pair of terms as used in database design:Input mask and design and Table and query
a)Input mask and design
An input mask often refers to a string expression that a developer defines which governs what is allowed to be entered into a typical edit/input box. b) Table and query Table - the basic unit of storing data in database Query - a view created from table(s) that returns specific records based on a criterion. List four types of publications that can be designed by using desktop publishing software.29/12/2020 List four types of publications that can be designed by using desktop publishing software.
State the function of each of the following: Network interface card, Network protocol and Hub29/12/2020 State the function of each of the following:Network interface card, Network protocol and Hub
a) Network interface card
Describe the term data integrity and State four situations in which data may lose integrity.29/12/2020 Describe the term data integrity and State four situations in which data may lose integrity.
a) Describe the term data integrity.
Explain data series, axis and legends as used in spreadsheet charts. Data, Axis and Legend29/12/2020 Explain data series, axis and legends as used in spreadsheet charts. Data, Axis and Legend
Data Series
State four benefits of using a computer in a school library
You have been asked to change your computer password. State a precaution you need to take in order to avoid each of the following: a) Forgetting the password
b) Hacking
Some of the storage disk available are: zip disks, 3 ½ inch floppy disks, DVDs and 5 ¼ inch floppy disks. Arrange these devices in ascending order of storage capacity.
List four ways of acquiring software in an organization
Define authenticity as used in software selection
Jane has noticed the following problems in her computer keyboard
a) Disk is fragmented - Defragment the disk by running the defragment utility. "
b) Virus/bug infection - run the antivirus utility c) Capacity of RAM is small- Increase the size by replacing the existing chip with a higher capacity RAM chip. d) Processor speed is low - Replace processor with a high speed processor. State the functions of the following keys on the computer keyboard; Backspace and Insert (ins)29/12/2020 State the functions of the following keys on the computer keyboard; Backspace and Insert (ins)
Describe the computer booting process.
The diagram below shows four common network topologies A, B, C and D.
i) Name the network topologies labeled a, B, C and D.
ii) Explain what happens if server X in topology A fails. iii) List two problems associated with network topology B. iv) List two disadvantages associated with network topology D. b) Differentiate between Interment and World Wide Web: c) Describe the following network services and identify their applications. i) Voice mail ii) Video conferencing
ANSWERS
i) Name the network topologies labeled A, B, C and A Tree/Hierarchy B Ring C Bus/Multi drop D Star ii) Explain what happens if server X in topology A fails. The terminal connected to X will be affected/stop communicating with the ret of the network iii) List two problems associated with network topology B. Difficult to trouble shoot "- Failure of one terminal results in network breakdown Extra cost of extra NIC card. iv) List two disadvantages associated with network topology D. Failure of central device/server results I total collapse of network Extra cost of cabling as each terminal must be cabled separately to the hub. b) Differentiate between Internet and World Wide Web. The Internet is a massive network of networks, a networking infrastructure. It connects millions of computers together globally, forming a network in which any computer can communicate with any other computer as long as they are both connected to the Internet. Information that travels over the Internet does so via a variety of languages known as protocols. The World Wide Web, or simply Web, is a way of accessing information over the medium of the Internet It is an information-sharing model that is built on top of the Internet The Web uses the HTTP protocol, only one of the languages spoken over the Internet, to transmit data. Web services, which use IfTTP to allow applications to communicate in order to exchange business logic, use the Web to share information. The Web also utilizes browsers, such as Internet Explorer or Netscape, to access Web documents called Web pages that are linked to each other via hyperlinks. Web documents also contain graphics, sounds, text and video. c) Describe the following network services and identify their applications. i) Voice mail Voicemail (or voice matt, voicemail or VMS, sometimes called message bank) is a centralized system of managing telephone messages for a large group of people. In its simplest form it mimics the functions of an answering machine, uses a standard telephone handset for the user interface, and uses a centralized, computerized system rather than equipment at the individual telephone. Voicemail systems are much more sophisticated than answering machines in that they can: Answer many phones at the same time Store incoming voice messages in personalized mailboxes associated with the user's phone number Enable users to forward received messages to another voice mailbox send messages to one or more other user voice mailboxes Add a voice introduction to a forwarded message Store voice messages for future delivery Make calls to a telephone or paging service to notify the user a message has arrived in his/her mailbox Transfer callers to another phone number for personal assistance Play different message greetings to different callers. ii) Video conferencing. A videoconference (also known as a video teleconference) is a set of interactive telecommunication technologies which allow two or more locations to interact via two-way video and audio transmissions simultaneously. It has also been called visual collaboration and is a type of groupware. Describe the following terms with reference to security of data:Â Log files and Firewalls29/12/2020 Distinguish between the following sets of terms as used in spreadsheets. Worksheet and workbook, Filtering and sorting
b) A student’ database comprises of students’ details table and fees received table as shown below:
Students’ details table
i) State the primary key field for each table.
ii) State the field, which should serve as the linking field for the two tables. c) Describe the following terms with respect to computer security: i) Logic bombs ii) Physical security iii) Tapping d) List three functions of antivirus software.
(i) Log files
(i)State the primary key field for each table.
c) Describe the following terms with respect to computer security: i)Logic bombs A computer virus that is activated after a series of event/commands/date ii) Physical security Threats that threaten the physical nature of computer equipment e.g. Fire, Lightening water, building access etc iii) Tapping.
Distinguish between the following sets of terms as used in spreadsheets. Worksheet and workbook, Filtering and sorting
b) State one way in which a user may reverse the last action taken in a spreadsheet package.
c) The following is a sample of a payroll. The worksheet row and column headings are marked 1, 2, 3, . and A, B, C. respectively
Use the following expressions to answer the questions that follow:
i) D2 ii) E4 iii) F10 iv) G7 v) H5 d) i) State three ways of moving round the page in a Desktop Publishing window. ii) State two ways on how information & Communication Technology (ICT) can be used to reduce the spread of HIV/AIDS
EXPECTED RESPONSES
(a) Distinguish between the following sets of terms as used in spreadsheets
(i) Worksheet and workbook
Use the undo command (ctrl + z) (c)The following is a sample of a payroll. The worksheet row and column headings are marked 1, 2, 3, and A, B, C respectively
Use the following expressions to answer the questions that follow
List two examples of:Third generation languages and Object oriented languages
b) List and explain three types of user interfaces.
c) Describe the following categories of software: i) Firmware ii) Proprietary software d) a new company XYZ intends to go into the business of desktop publishing. Advise the company on three computer hardware system specification features to consider as a measure of enhancing performance.
(a) One of the functions of an operating system is job scheduling.
Explain what is meant by job- scheduling Running of a particular job/ task under a system of priority, computer resource availability, time allocated to user etc. (b) List and explain three types of user interfaces
List two examples of:Third generation languages and Object oriented languages
i) Third generation languages
ii) Object oriented languages b) Draw a flowchart to compare three non-equal numeric values A, B, C and prints the largest of the three.
(a) List two examples of:
(i) Third generation languages Pascal, basic, c (ii)Object oriented languages VB, Small talk, C++ The diagram below shows a formatted plate surface of a storage disk.
Shade and label:
a) one sector b) One block List two methods of gathering information during system development process.
|
Categories
All
Archives
December 2024
|
We Would Love to Have You Visit Soon! |
Hours24 HR Service
|
Telephone0728 450425
|
|
8-4-4 materialsLevels
Subjects
|
cbc materialsE.C.D.E
Lower Primary
Upper Primary
Lower Secondary
Upper Secondary
|
teacher support
Other Blogs
|