Uganda Advanced Certificate of Education: Subsidiary Ict (Theory Paper) 2 Hours 30 Minutes
Uganda Advanced Certificate of Education: Subsidiary Ict (Theory Paper) 2 Hours 30 Minutes
Signature…………………………………………………..
S850/1
Subsidiary Information
and Communication
Technology
(THEORY PAPER)
Paper 1
SUBSIDIARY ICT
(Theory Paper)
Paper 1
2 hours 30 minutes
INSTRUCTIONS TO CANDIDATES:
Attempt all questions in this paper
This paper is made up of 20 compulsory and equally weighed questions.
The maximum time allocated to this paper is 2 hours and 30 minutes.
Write all your answers in the spaces provided. No additional material will be
provided to the candidate.
Untidy work will lead to loss of marks.
1
(ii) # NULL (02 marks)
………………………………………………………………………………………
………………………………………………………………………………………
(b) List one example of data type used in a spread sheet application. (01 mark)
………………………………………………………………………………………
(b) List any two items that determine the computer spread. (02 marks)
………………………………………………………………………………………
………………………………………………………………………………………
3. (a) List down any five factors you would consider before choosing a network model.
(05 marks)
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
2
4. (a) Define the term email communication. (02 marks)
………………………………………………………………………………………
………………………………………………………………………………………
(b) List any three ways one can guard against unwanted emails. (03 marks)
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
5. (a) Differentiate between a search engine and a web browser. (02 marks)
………………………………………………………………………………………
………………………………………………………………………………………
3
(b) List any three devices directly linked to the information processing cycle.
(03 marks)
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
8. (a) State two tasks that are normally performed by a computer forensic specialist.
(02 marks)
………………………………………………………………………………………
………………………………………………………………………………………
9. (a) The following are data base functions commonly used in data manipulation.
Write the use of each of the functions.
(i) DGET (01 mark)
………………………………………………………………………………………
………………………………………………………………………………………
(b) State any three functions used in query criteria of a database management
system. (03 marks)
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
10. (a) Define the term troubleshooting as used in computing. (02 marks)
………………………………………………………………………………………
………………………………………………………………………………………
4
(b) State any three ways of caring for computers. (03 marks)
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
11. (a) Differentiate between the following terms as used in word processing
(i) Drop cap and case (02 marks)
………………………………………………………………………………………
………………………………………………………………………………………
(b) Write the file extension for word perfect. (01 mark)
………………………………………………………………………………………
(b) List down any three activities that occur in the program compilation process.
(03 marks)
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
5
………………………………………………………………………………………
(ii) Job scheduling (01 mark)
………………………………………………………………………………………
………………………………………………………………………………………
14. A school has just set up the internet infrastructure to be used by learners in the
learning process. The administrators have detected that learners may some
information that is considered illegal. State any five ways the school can prevent
access to such information from the internet. (05 marks)
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
(b) List down three advantages of electronic publication over traditional base
publications. (03 marks)
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
(c) List down any one application that can be used to design electronic publications.
(01 mark)
………………………………………………………………………………………
6
16. (a) Explain how the following can be used in presentation software.
(i) Slid sorter view. (01 mark)
………………………………………………………………………………………
………………………………………………………………………………………
17. (a) Differentiate between a computer virus and a bug. (02 marks)
………………………………………………………………………………………
………………………………………………………………………………………
(b) State three ways which can be adopted to protect computers from virus infection.
(03 marks)
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
18. State five ways how computers can be applied in the security sector. (05 marks)
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
19. Hamza realized that the hard disk of his computer was showing low storage space
after deleting some files. He was later advised to defragment the disk to create some
more space. As an ICT student describe how this can be done. (05 marks)
7
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
20. (a) Differentiate between a warm boot and a cold boot. (02 marks)
………………………………………………………………………………………
………………………………………………………………………………………
(b) State three kinds of information stored on the CMOS of a personal computer.
(03 marks)
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
END