COMPUTER STUDIES QUESTIONS WITH ANSWERS
What is program documentation? Give two examples of program documentations.
This refers to information that serves to explain the purpose of a program.
Documentation may be internal in the form of comments and appropriate named variables and constants e.t.c. or may be extended in the form of a written description and structure diagram. E.g. user oriented and program oriented.
0 Comments
Differentiate between the hardware and software components off a computer giving an example of each21/12/2020 Differentiate between the hardware and software components off a computer giving an example of each
Features of word processor
There are two categories of word processor features namely:
Types of Storage Devices Used By a Computer Giving an Example of Each
Introduction;
There are various categories under which storage devices can be classified;
Precautionary measures considered to ensure the safety of computers in a computer laboratoryThe Keyword Here Is 'Safety'
Safety here means, a condition or a measure taken to protect computers from unlikely damage, risk, danger or burglary.
DEFINE THE FOLLOWING TERMS; 1)FILE; 2) RECORD; 3) FIELD
A file, record and a field are database terms used especially when dealing with tables.
What is a file
A file is a collection of records, database files organize the data into records and fields.
Definition of Normalization
Normalization is the process of organizing data in a database by establishing relationships between tables according to rules designed both to protect the data and to make the database more flexible by eliminating redundancy and inconsistent dependency, insertion anomaly, update anomaly & deletion anomaly.
Operational Methods of an Organization Ensuring the Safety of Data01. USE OF PASSWORDS AND PIN NUMBERS
A password is a secret code provided to a system to access its resources. Passwords and pin numbers are provided to an individual to deter any unauthorized access.
02. USER ACCESS LEVEL
This is a process by which the system administrator gives separate accounts with different access rights for each user to protect sensitive data from unwanted audience. Each user in the system is given a set of resources to access the system depending on his/her nature of the job he does. In most cases, the top management are given access to confidential data and employees are given access to filtered and limited data.
03. USING FILE ATTRIBUTES SUCH AS READ ONLY, HIDING ETC.
Most systems provide features such as hiding data or changing file properties to Read Only. This move ensures that original files are not tampered with or altered to change meaning.
Why do systems reboot?
State any two machines mentioned in the history of computers
Explain why smart phones and personal digital assistants (PDAs) may be regarded as personal computers.
PDAs and smart phones are powered by microprocessors, which coordinate all of the functions according to programmed instructions just like all other personal computers.
State four reasons why a mobile phone is regarded as a computer.(a) List four devices which though traditionally analog, have evolved to digital systems.
(b) State four advantages of digital technology over analog technology.
Distinguish between general and special purpose computers
General purpose computers are designed to be able to perform variety of tasks when loaded with appropriate programs, while special purpose computers are designed to accomplish a single task.
Differentiate between discrete and analog data
Computers can be classified in many ways.
|
|
A computer network is an interconnection of computers that communicate to each other through network media, protocols and communication media devices.
A computer network can be classified as:-
Definition of LAN
A local area network is a computer network that spans a small geographical area such as an office, a building or a compound.
This can be at least a peer-to-peer connection of two computers or a connection of many computers within a restricted small geographical area Components of a Local Area Network
Components of a local area network are requirements that can be used to establish/initiate/build a local area network. These requirements include:-
|
Characteristics of Computers That Makes Them Smarter Than Human Beings
1. THEY ARE EFFICIENT
ADVANTAGES OF COMPUTERS
1) Computers process data faster:
2) Computers are more accurate & reliable:
3) Computers are more efficient:
4) Computers can quickly and effectively store & retrieve large amounts of data.
5) They are very economical when saving information, for it can conserve a lot of space.
- First generation computers were very large in size and used thousands of electronic gadgets called vacuum tubes or thermionic valves. They emitted a lot of heat and were difficult to program, use and maintain.
- Second generation computers were smaller in size and used electronic devices called transistors. They produced less heat and were also difficult to program, use and maintain.
- Third generation computers were made of integrated circuits (ICs). They emitted less heat, were smaller in size and easier to program, use and maintain compared to their predecessors.
- Fourth generation computers were made of large scale integrated (LSI) and very large scale integrated (VLSI) circuits. They were characterised by very low emission of heat, were small in size, easy to use and maintain.
- Fifth generation computers are today’s computers that have very high processing power and speeds and are designed to solve complex problems. They are characterized by artificial intelligence, connectivity to the internet, superior hardware and software products and are very small in size.
(a) Name four other such devices.
- Napiers bone .
- Slide rule
- La Pascaline machine
- Weaving loom
(b) Explain how the devices listed in (a) above contributed to the development of modern electronic computers.
Components that may be housed inside the system unit
- Central processing unit (CPU)
- Hard disk
- Drives such as optical and floppy drives
- Main memory
- Power supply unit
- Mother board/ System board
- Internal Speakers
- Cards such as VGA cards, network card or TV cards
- Fans
- Heat Sink
- Data cables such as the ribbon, HDMI, and some other parallel cables
- Power cables
Highlight six peripheral devices that can be connected to a typical computer
- Monitor
A television-like device used for displaying information. - Keyboard
A keying device used to enter data and instructions into a computer. - Mouse
A pointing device that enables the user to execute commands. It is used to control an arrow displayed on the screen. - Speakers
sound output devices used to output sound from the computer. - Printer
An output device used to produce information on a piece of paper (hard copy or print-out) from the computer. - Scanner
An input device used to automatically capture data from source documents or objects.
Using an illustration, explain how a computer operates
- The computer gets input from input devices such as the keyboard.
- The input is then processed in the CPU and is output as information on a device such as the monitor
Categories
All
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2022
Analogue And Digital Systems
Applications Areas Of ICT
Areas Where Computers Are Used
Auxiliary Storage Devices
Basic Computer Set Up And Cabling
Binary Conversion
Booting
CABLES AND PORTS
Career Opportunities In ICT
Classification Of Computers
Coaxial Cables
Coding Schemes
COMPACT DISK
COMPLETE PAPERS
Computer Crimes
Computer Files
Computer Memory
Computer Software
Computer Systems
COMPUTER VIRUS
Dashboard
Database
Data Collection
Data Communication
Data Integrity
Data Processing
Data Representation In A Computer
Data Security And Controls
Definition And Development Of Algorithm
Desktop Publisher
Development-of-computers
DTP
DVD
Electronic Data Processing Modes
Elementary Programming Principles
Errors-in-data-processing
Evolution-of-computer-systems
Fibre Optic Cables
File Management Using An Operating System
File-organization-methods
Flowchart
Form 1 Level
Form 2 Level
Form 3 Level
Form 4 Level
Formatting Features
Hands On Skills
HARDCOPY OUTPUT DEVICES
Hard Disk
Hardware
Impact Of Ict On Society
IMPACT PRINTERS
Information
Input Devices
Internet And Email
Introduction To Computers
Introduction To Networking And Data Communication
ISP
Levels-of-programming-languages
Midterm-exams
Mind-blowing-q-a
Mocks
Network Topologies
Network-topology
NON-IMPACT PRINTERS
Ones And Twos Compliments
Operating Systems
Output Devices
Paper 1
Parts Of A Computer
Practical Hands On Skills
Printers
Processing-devices
Processors
Program-construction
Program-control-structures
Program-design
Program Development
Program-documentation
Protocols
Registers
Review Questions
Revision Kits
Secondary Storage Media
Section A
Section B
Security Threats And Control Measures
Software
Spreadsheets
Stages Of System Development
Storage Devices
Symbolic-representation
System-design
System Development
System-documentation
Term-1
TERM 2
The Computer Laboratory
The CPU
The Keyboard
Types Of Computer Files
Types-of-networks
User Interface
Uses-of-computers
Word Processors
Worksheet-formatting
Archives
December 2024
June 2024
January 2024
December 2023
October 2023
September 2023
July 2023
June 2023
February 2023
November 2022
September 2022
April 2022
January 2022
December 2021
November 2021
July 2021
March 2021
February 2021
January 2021
December 2020
October 2020
April 2020
February 2020
October 2019
August 2019
July 2019
April 2019
March 2019
November 2018
August 2018
July 2018
December 2017
November 2017
October 2017
July 2017
August 2016
June 2016
January 2016
December 2015
November 2015
We Would Love to Have You Visit Soon! |
Hours24 HR Service
|
Telephone0728 450425
|
|
8-4-4 materialsLevels
Subjects
|
cbc materialsE.C.D.E
Lower Primary
Upper Primary
Lower Secondary
Upper Secondary
|
teacher support
Other Blogs
|