COMPUTER STUDIES QUESTIONS WITH ANSWERS
Give two reasons why the use of finger prints and voice input can be used as reliable forms of security in computer systems.
They cannot be:
0 Comments
Study the pseudocode below and determine its output.
1. (a) T = O
(b) M = O (c) K = I 2. (a) M M±T (b) T = T+5 (c) K = K+1 3. Repeat step 2 while K < 3 4. Write M,T 5. Exit The word race is appearing several times in a long story document composed using a DTP package. How would this word be safely replaced with the word content?.
State four functions which are specific to Network Operating Systems.
Distinguish between a formula and a function as used in spreadsheets.Explain why an intranet is a more secure way to share files within an organisation compared to the internet.
Define data communication.
(b) State two characteristics of an effective data communication system.
Characteristics of an effective data communication system
List four activities carried out by a data processing system.
(a) Explain why the following controls should be implemented for computer based systems (2mks)
(b) For each of the following give one reason why they are not allowed in a computer laboratory.
Explain the following terms as used in word processing (3mks)
Distinguish between Real, Integer and Character data types as used in programming ( 3mks)
Related SearchesPerform the following binary arithmetic and give your answers in decimal notation:
(i)1010.101 + 11.011
(ii)1010.011 – 11.011 (b) Covert the following numbers into their binary equivalents (i)0.562510 (ii)0.312510 (c) Using four – bit twos compliment, perform the following arithmetic 1012- 1112 Study the following diagram and answer the questions that follow
From the diagram:
(i) Name two devices that are used for long term storage (ii) Name three peripherals shown on the diagram that are used for input (iii) Name two other devices that a computer Aided Design (CAD) user might wish to add to the set- up above (b)A customer wishes to purchase a computer system. The customer can buy a word processor, spreadsheet, database and a drawing package separately or as an integrated package. State three advantages why many computer users prefer integrated packages to separate packages. (c) (i) An anti- virus software installed in a computer is loaded into the main memory each time the computer is switched on Explain three ways in which computer virus are spread from one computer to another (ii) Give two reasons why an anti virus package should be updated regularly
RESPONSES
(a) (i)ROM
Hard disk 2GB HDD (ii)
To enable remove upcoming viruses/new viruses For maintenance purposes (patches) To upgrade/replace outdated antiviruses. The diagram below shows a layout of a computer network used by a law farm. A workstation and a printer are located in every consulting room
(i) Name the network topology depicted in the diagram
(ii) Name the device labeled D (iii) State four functions of the device labeled ‘server’ (iv) Give two advantages and one disadvantage of the above network design (v) If the firm intends to open extra offices in two different towns, name any three hardware devices that would be required (vi) State any two security problems that might arise by linking the offices in different towns (b) What is spyware?
RESPONSES
(a) (i)Star
(ii) Hub or Switch/Router (iii)File sharing
Advantages .
A lecturer keeps the following student details in a database: name, age, course
(a) write an expression you would use to compute the year of birth of a student using this year as the current year
(b) what query expressions would the lecturer use to list the students whose age is above 15 years and below 25 years? (c) Which expression would the lecturer use to generate? (i) The number of students in the database? (ii) The mean age of the students in the database? (d)Name and describe any two types of database models
RESPONSES
Study the flowchart below and answer the questions that follow
(a) What would the flowchart generate as output if the value of N at input was:
(i) 6? (ii)1? (b) Write a pseudocode that does the same thing as the flowchart above (c) Modify the flowchart so as to reject an input below and to avoid the looping when the input is 0
RESPONSES
(a) Subtract 01112 from 10012 (2 mks)00102 (b) Using twoâs compliment, subtract 7 from 4 and give the answer in decimal notation (4mks)7 = 1112 4 = 1002 -4 in twoâs compliment is 100 111 100 + (1)011 The resulting answer is 011 since the overflow is ignored. In decimal notation this is 310 (c) Convert(i) 91B16 to octalName and explain the function of the keyboard keys represented by the following symbols2/1/2021 (a) Name and explain the function of the keyboard keys represented by the following symbols (2mks)
(b) Simulation is one of the application areas of computers(a) Explain what the following DOS commands will do when executed
(i) A: \copy ** B
(b) (i) With the aid of a diagram, explain hierarchical (tree) network topology
A network topology that, from a purely topologies viewpoint, resembles an interconnection of star networks in that individual peripheral nodes are required to transmit to and receive from one other node only, toward a central node, and are not required to act as repeaters or regenerators.
(a) List three paragraph formatting activities in word processing(3 mks)
(a) State the stage of program development in which:
(i) A flowchart would be drawn
(b) State the output of the following flowchart segmentState two health issues that may result from prolonged use of computers
Arrange the following data units in ascending order of size (2mks)BYTE, FILE, BIT, NIBBLE
BIT, NIBBLE, BYTE, FILE (a) explain Binary Coded Decimal code of data representation (1mk)
(b) Write the number 45110 in BCD notation (1mk)
Outline two ways in which computer can be used in hotels (2mks)
|
Categories
All
Archives
December 2024
|
We Would Love to Have You Visit Soon! |
Hours24 HR Service
|
Telephone0728 450425
|
|
8-4-4 materialsLevels
Subjects
|
cbc materialsE.C.D.E
Lower Primary
Upper Primary
Lower Secondary
Upper Secondary
|
teacher support
Other Blogs
|