Subsidiary
Subsidiary
RESOURCEFUL GUIDE
TO
SUBSIDIARY-ICT 850/1
©2018
Page 1 of 92
2 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
SET ONE:
(b). Mention two ways ICT can be used to improve teaching and learning.
(02 marks)
Computer-based training, which includes:
Computer-Assisted Instructions (CAI), so that teachers can use computers and other IT
equipment to present teaching materials in a more interesting way.
Computer-Assisted Learning (CAL), so that students can use computers and appropriate
software to learn at their own pace.
Computer-Assisted Assessment (CAA), which may reduce the time and labor to mark the
answer scripts.
The School Administration and Management System (SAMS) for keeping records of
students and producing report cards or other related documents.
(c). Give two ways ICT has affected work today. (02 marks)
Soft copy refers to a copy of work still on a computer or stored in a digital or electronic
form, while, Hard copy refers to a copy of work printed and kept in a more permanent
way of physical media like printing papers, plastic plates, e.t.c.
Page 2 of 92
3 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
(b). Mention two examples of display devices commonly used today. (02 marks)
Monitor.
Projector.
Smart board.
(c). State one advantage of using a softcopy over a hard copy. (01 mark)
3. (a). Mention any three components found inside a computer's system unit.
(03 marks)
Central Processing Unit. Buses.
Mother board. Expansion slots.
Memory chips. Power unit.
ROM BIOS. Drives.
CMOS battery.
These are external hardware components that are connected onto a systems case.
Speakers. Printer.
Barcode reader. Projector.
MIDI. Digital camera.
OCR QR code reader.
OMR Smart / Swipe card reader.
Scanner.
A computer laboratory is a place where students learn practical uses of computers, such
as programming or how to use a spreadsheet program.
(b). Give two ways a user can be safeguarded against accident while in a lab.
(02marks)
Should not run in a computer laboratory.
Should avoid eating and drinking in a computer laboratory.
Should avoid connecting and disconnection devices.
Should insulate all wires and cables in a laboratory.
Should install lightening arrestors.
Should install fire detection equipment.
Page 3 of 92
4 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
(c). Mention one way a computer resource can be abused. (01 mark)
5. (a). Give the difference between cold and warm booting. (02 marks)
Cold booting involves starting a computer that was previously off, while; warm booting
involves the starting up of a computer that was previously on.
6. (a). Mention any three activities that can be done on a computer file. (03 marks)
(b). State two advantages for backing up files by users. (02 marks)
It enables the user to have multiple copies of the same work which can be sent to different
people for editing e.g. A book, magazine, e.t.c.
It enables the user to recover work in case of data loss.
It enables the user to supply copies of the works to many people e.g. Software.
Page 4 of 92
5 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
C:\Users\Budo\Desktop\Exams\SubICT-BOT,2015.docx
(a). Write down the file name from the path above. (01 mark)
SUBICT-BOT,2015
(b). Mention the possible application program this file was created. (01 mark)
Ms. Word
(c). State the immediate folder name in which the file is located. (01 mark)
Exams
(d). Identify the user name in the file path above. (01 mark)
Budo
(e). What is the importance of having file extensions in a file path. (01 mark)
It enables the computer to easily identify the specific application program in which to
open a given file.
It refers to the keeping of data / information for some time in a given location.
(b). Write short notes on the following terms as used in relation to data storage.
It refers to the maximum amount of data / information that a storage medium / device
can hold.
It refers to the amount of time needed to transfer data / information from one place to
another e.g. from a CD ROM to Memory.
It refers to the method a storage medium / device uses to provide data / information to
the user. It can be sequential, random, e.t.c.
Page 5 of 92
6 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
(c). Give one factor to consider before buying a Compact Disc - ROM. (01 mark)
9. (a). State the difference between an address and a data bus. (02 marks)
An address bus consists of all the signals necessary to define any of the possible memory
address locations within the central processing unit, while; a data bus is used to transfer
instructions from memory to the CPU for execution. It carries data (operands) to and
from the CPU and memory as required by instruction translation.
(b). Mention any two mathematical operators carried out by the ALU. (02 marks)
(c). Give one way you can improve performance of the CPU. (01 mark)
(c). Mention two ways computer software can be obtained legally. (02 marks)
Page 6 of 92
7 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
A tool that provides a user with a list and categorised program pictures normally called
clip art that can be used for any purpose.
It refers to the display of slides at once in vertical rows, miniature or thumbnail view.
Is a rectangular dotted object that is used to hold content in a specific region on a slide.
12. Today, many people prefer buying items online. As an ICT student:
E-commerce.
(b). Give two advantages of using this type of trade. (02 marks)
Transactions can occur immediately and globally, thus save time for participants on both
ends.
Transactions can occur 24 hours per day.
Businesses have access to millions of people with Internet connections.
Businesses have the ability to gather customer information, analyze it, and react if
appropriate.
Information can be changed and be available quickly.
Customers can compare prices easily.
Feedback can be immediate.
Manufacturers can buy and sell directly, avoiding the cost of the middleman.
Distribution costs for information is reduced or eliminated.
Page 7 of 92
8 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
(c). Mention two other services provided by the internet. (02 marks)
kingscollegebudo
.sc
.ug
14. (a). Mention two ways through which computer viruses can be transmitted.
(02 marks)
Through sharing of computer files.
Through sharing of storage devices e.g. Flash disks.
Through sharing of computer networks / internet.
Through installation of already infected programs and software.
Opening of e-mail attachments that might be infected.
Booting from CD or floppy diskettes.
Through activities of computer crime like hacking through systems.
Page 8 of 92
9 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
Deletes files.
Makes some hardware devices not available.
Un installs devices.
Leads to system failure.
Makes the computer take long while booting.
Makes the computer to frequently restart.
Computer can play noises.
15. (a). In relation to a windows desktop environment, give one function of the
following:
Also called the trash, refers to the location where files and programs temporarily deleted
from the file manager are kept.
An icon that enables the used to see drives and other system properties.
(b). Give two reasons for formatting a storage medium. (02 marks)
To prepare a data storage device for initial use e.g. Hard disk.
It enable the disk to obtain a new filing system e.g. NTSF, xfat, e.t.c.
Needed to make a storage device visible to an operating system.
It is also used to clean a storage device.
16. (a). Write one function name used to evaluate the following assignments in Ms
Excel:
SUM
(ii). Obtaining the best done eight subjects out of the ten sat for. (01 mark)
Page 9 of 92
10 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
SUM, SMALL
(iii). Determining the average score for Senior One C out of three streams.
AVERAGEIF
(b). Mention any two data types that can be manipulated in a spreadsheet.
(02 marks)
Labels / text.
Numbers / values.
Formulas / functions.
Percentages.
Data and time.
It is a type of website that collects content from other sites mainly of a particular type.
It a type of website that is generally used to post online diaries which may include
discussion forums in reverse chronological order.
A site that provides a starting point or a gateway to other resources on the Internet or
an intranet.
18. In relation to word processing, write short notes on the following terms:
Text mainly citation that automatically appear at the bottom of the page.
Page 10 of 92
11 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
19. (a). Mention two advantages of using a laptop over a desktop computer. (02 marks)
(b). Give two reasons for switching off a computer after use. (02 marks)
Is the maximum angle at which images on the monitor can be viewed, without excessive
reduction in quality of the image
(b). Mention two ways data may be misused in an organization. (02 marks)
Deleting it accidently.
Misrepresenting it.
Changing it.
Giving it out without permission.
(c). Give two ways data accuracy can be maintained at point of entry. (02 marks)
Data validation.
Data verification.
Page 11 of 92
12 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
(b). Give the difference between data and information. (02 marks)
Data refers to meaningless, raw, un summarized facts, while, information refers to
processed, summarized and meaningful data.
(c). State any two ways data may be lost in a computer laboratory. (02 marks)
Deleting files accidentally.
Viruses and damaging malware.
Mechanical damages of hard drive.
Power failures.
Theft of computer.
Spilling coffee, and other water damages.
Fire accidents and explosions.
Natural disasters.
2. (a). Write any two ways you can express =MAX(B4:B20) (02 marks)
=MAXA(B4:B20)
=LARGE(B4:B20,1)
(b). Describe how a shop keeper can use a spreadsheet program. (03 marks)
A B C
1 Item Quantity Unit price
2 Sugar 20 3,500
3 Salt 36 500
4 Soda 65 800
5 Rwenzori 98 2,000
6 Yoghurt 56 3,000
7 Toilet paper 23 1,000
3. (a). State two advantage of keeping work in a soft copy. (02 marks)
Convenient to store.
Can be easily transported from one computer to another.
Easily edited and formatted.
Can be shared by many people easily say in a network.
Data security can easily be achieved at least costs.
Not affected much by natural disasters like humidity, e.t.c.
Page 12 of 92
13 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
Cheaper to store.
Soft copies can easily be searched quickly and obtained.
(c). Give one way a password can be kept secure. (01 mark)
Use a different password for every website you visit.
Use a combination of upper case, lower case, numbers and symbols.
Change your passwords every three months.
If it's hard to remember all your passwords, try a password manager.
Set up two-step log-ins.
Do not give your passwords to other people.
4. (a). Give the difference between hardware and software. (02 marks)
Hardware refers to the physical / tangible parts or components of a computer, while;
Software refers to a set electronic instructions a computer needs to work.
5. (a). State two advantages of using a Graphical User Interface (GUI). (02 marks)
A GUI allows computer users to employ visual elements, such as desktop icons, to
navigate and operate software.
GUIs serve as a replacement for the earlier command line interface, or CLI, approach,
in which users type key terms and symbols to operate the computer.
You can create a more rich, and sensitive interface than is possible with CLI.
Most lay users will have a smaller learning time using a GUI.
Complex, multi-step, dependent tasks can easily be grouped together in a way that
discourages mistakes.
Ability to embed media
Page 13 of 92
14 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
(b). Give two requirements for conducting a live video conference. (02 marks)
Web cam.
Head set.
Computer / device e.g. mobile phone.
Internet connectivity.
Video conferencing software.
Page 14 of 92
15 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
(b). Suggest any two features of a good looking presentation. (02 marks)
Use of clear fonts.
Each slide should have a heading.
Use of appropriate colours and fonts.
Use minimal animations.
Use few but relevant graphics / images.
Should address needs of the user.
8. (a). Give two factors to consider before buying a printer. (02 marks)
Printing speed Economical printing
Print quality Supplies management
Supported operating systems Accessibility of the printer and other
Ease of use accessories.
Flexible paper handling Security of the printer
Interface connections
Energy savings
(c). Outline two reasons for scrolling a page / document. (02 marks)
When one wants to see hidden work in a document.
When one wants to zoom in or out of a document.
When one wants to go through a program menu list.
When one wants to see all the pages in a document.
9. (a). State any one component found in a title bar. (01 mark)
Maximize /Restore button. Minimize / collapse button.
Page 15 of 92
16 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
10. Write down an application example for carrying out each of the following tasks.
(05 marks)
(a). Typeset a letter to invite the Guest of Honour Ms. Word, Abi Word, Word Pro, e.t.c
(b). Draw a budget for Senor Six ICT club 2016 Ms. Excel, Sheetstar, e.t.c
(d). Prepare a talk to the senior ones in your school Ms. PowerPoint e.t.c.
(e). Search for information from the internet Google search engine, Bing search engine,
e.t.c.
Page 16 of 92
17 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
Refers to moving a page either direction in order to see hidden work, zoom in or out,
e.t.c.
12. (a). Under what circumstance may a user opt for a compact disk for data storage?
(02 marks)
When one wants to keep a copy permanently.
When one wants to keep a portable copy of the work.
When one wants to keep a lot of work in one location.
When one wants to keep data for distribution e.g. software, e.t.c.
(b). Give one reason for storing a document in a pdf format. (01 mark)
PDF documents can be quickly and easily created
It ensures required security without compromising originality.
It has the ability to compact and able to compress large files.
It has the ability to exist independently from the hardware, software and operating
system (OS) used to create or view the PDF document.
Less chance of information being lost, destroyed or being accessed inappropriately.
Records are managed throughout their lifetime.
(c). Many people today prefer buying goods online. State two advantages of using
this practice. (02 marks)
It is extremely convenient while carrying out transactions.
It is time saving.
Without driving from store to store the consumer can easily compare and contrast
products.
When products are placed online, they come with all the specifics, and they want you to
compare them with others, know they have the best options and come back for more.
Because the competition is high, companies online want you to look at other consumer
reviews.
Increasing customer base.
Rise in sales.
it is open for consumers 24/7 every day of the year. The doors never close and profits
will keep rising.
With the right marketing, every consumer around the globe can find the business site,
products and information without leaving home.
Page 17 of 92
18 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
Instant transactions.
13. (a). Distinguish a webpage from a website. (01 mark)
A webpage is a single page in a website, while a website is a collection of several
WebPages.
14. (a). Under what circumstances may a user carry out the following activities?
Page 18 of 92
19 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
(b). Muwanguzi carried out a fresh installation of his laptop and later, he
realized that some of the devices could not function.
State two possible causes of this occurrence (02 marks)
He had not yet installed device drivers.
Maybe there was device incompatibility.
15. (a). Outline any two functions of an operating system. (02 marks)
Provides basic working environment/interface on a computer.
Controlling the use of peripherals.
Controlling the loading and running of application programs.
Organizing the use of memory/Memory management
It helps in the booting process of a computer.
It helps in file management
It helps in protecting hardware and software.
It helps in the process of connecting devices to work with a computer (configuring
devices)
It helps in the processor management e.g. multitasking and time sharing.
(c). State one factor to consider before buying a software program. (01 mark)
Compatibility issue with the hardware.
Compatibility with the available software.
Needs of the organisation.
Is the product an up-to-date, current version or release?
Ease of use of the software/User friendly
Whether the manufacturer offers technical assistance of users of the programs.
Nature of the software manufacturer.
Efficiency and productivity of the program.
Whether the software vendor offers service support centre for routing updates.
Cost of the program to use.
Page 19 of 92
20 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
16. (a). Briefly, explain when the following functions can be used:
17. (a). State one practical use of the following keyboard keys.
Page 20 of 92
21 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
18. (a). Give two advantages of real - time data processing. (02 marks)
There is no significant delay for response.
Information is always up-to-date.
Output from the computer may be used to adjust and improve the input.
(b). State any two parts that make up a CPU. (02 marks)
ALU.
Control unit.
Registers.
(c). Mention one component that can be replaced or upgraded to improve the
general performance of the CPU. (01 mark)
RAM.
Video cards.
Hard disk drive.
19. (a). List two advantages of LCD over CRT monitors. (02 marks)
LCD monitors require less than one-third the power of a CRT.
LCD monitors take up less desk space than traditional CRT monitors.
Radiation emitted by LCD monitors is neglectable than that of CRTs.
They have a narrow viewing angle compared to CRT monitors.
They have a higher refresh rate compared to CRT monitors.
They have a higher and colour rich resolution than CRTs.
(b). State two factors to consider before buying a monitor. (02 marks)
Size
Resolution
Aspect Ratio
Backlighting
Twisted nematic (TN) or In-plane switching (IPS)
Video input
Ergonomic flexibility
Needs of the organisation.
Page 21 of 92
22 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
Format Painter, Highlight, Water Mark, Footer, Footnote, Gallery, Insert, Centre,
Justify. (05 marks)
(e).Format Painter allows a user to copy a given pattern appearance to another piece of text
in a document.
Page 22 of 92
23 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
SET THREE:
(b). State two ways data can be kept safe in a computer laboratory. (02 marks)
By using passwords.
Through activating firewalls.
By frequently backing up data.
Through having a thorough audit trail.
By installing antivirus programs to guard against data loss.
By use of biometric devices to allow access to the computer.
By sensitizing users.
By enforcing a data protection policy for an organization.
(c). Mention two devices used to enter text into a computer. (02 marks)
2. (a). State two ways of ensuring continuous use of a computer. (02 marks)
By regularly servicing the computer.
By upgrading computer software.
By updating computer software.
By covering a computer to avoid dust from entering a computer.
By use of air conditioner facility.
By training workers into better methods of using the computer facilities.
By writing an ICT policy that guides the use of computer facilities.
By employing trained personnel to help in areas of computer use difficulties.
Install an antivirus program to reduce damage caused by viruses onto hardware.
By implementing physical access guidelines to users.
Penalize users who intend to vandalize computers.
(b). Give two advantages of air conditioning in a computer laboratory. (02 marks)
Page 23 of 92
24 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
Personal Computer
3. (a). Mention two devices that can be used both as input and output devices. (02
marks)
Touch screen.
Smart board.
Galaxy, android and smart phones.
Digital camera
(b). State two disadvantages of dot-matrix printers over laser-jet printers. (02 mks)
(b). State the difference between registers and buffers. (02 marks)
Registers are high-speed temporary storage locations used to hold data and instructions,
while; buffers are used temporarily to store output or input data.
It causes the keyboard to go into a mode in which letter keys are interpreted as capital
letters by default
Page 24 of 92
25 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
Backspace deletes a character to the left of the cursor, while; delete key erases a
character to the right of the cuprsor.
(c). State one use of a computer keyboard in data processing. (01 mark)
(b). State two circumstances under which the following are done.
C:\Users\Student\Desktop\functionalcomputing.docx
(a). In which storage device was the file stored? (01 mark)
Hard disk.
Page 25 of 92
26 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
(c). In which account privilege was the file stored? (01 mark)
User
(d). State two features of the program used to store this work. (02 marks)
Word-wrap- Allows a user to type continually without pressing the Enter key at the end
of each line.
Find and search - Allows a user to locate all occurrences of a particular character,
word, or phrase.
Replace - Allows a user to substitute existing characters, words, or phrases with new
ones.
Spelling checker - Allows a user to check the spelling of a whole document at one time,
or to check and even correct the spelling of individual words as they are typed
(i.e., AutoCorrect).
Grammar checker - Reports grammatical errors and suggests ways to correct them.
Thesaurus - Suggests alternative words with same meaning (i.e., synonyms) for use in
the document.
Mail merge - Create form letters, mailing labels, and envelopes.
Automatic page numbering - Numbers the pages automatically in a document.
Tables - Allows a user to organize information into rows and columns.
Multi-columns - Arranges text in two or more columns that look similar to a newspaper
or magazine.
Macros - Allows a user to record or save frequently used keystrokes and instructions,
which can be executed later by running the corresponding macros.
Clip art gallery - Allows a user to insert drawings, diagrams, and photographs into a
document.
Mathematical formulae typesetting - Allows a user to typeset complex mathematical
formulae within the program.
(b). Give two advantages of using an e-mail in data communication. (02 marks)
Page 26 of 92
27 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
Carbon Copy
9. (a). State the difference between primary key and foreign key as used in Ms
Access. (01 mark)
A primary key is used to uniquely identify a record in a table, while; a foreign key is used
in one table to represent the value of a primary key in a related table.
Batch totals: Checks for missing records. Numerical fields may be added together for all
records in a batch. The batch total is entered and the computer checks that the total is
correct.
Check digits: The computer checks this calculation when data are entered.
Consistency checks: Checks fields to ensure data in these fields corresponds, e.g., If Title
= "Mr.", then Gender = "M".
Control totals: This is a total done on one or more numeric fields which appears in every
record.
Data type checks: Checks the data type of the input and give an error message if the input
data does not match with the chosen data type, e.g., In an input box accepting numeric
data, if the letter 'O' was typed instead of the number zero, an error message would
appear.
File existence check: Checks that a file with a specified name exists. This check is
essential for programs that use file handling.
Format or picture check: Checks that the data is in a specified format (template), e.g.,
dates have to be in the format DD/MM/YYYY.
Page 27 of 92
28 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
Hash totals: This is just a batch total done on one or more numeric fields which appears
in every record. This is a meaningless total, e.g., add the Telephone Numbers together
for a number of Customers.
Limit check: Unlike range checks, data is checked for one limit only, upper OR lower,
e.g., data should not be greater than 2 (<=2).
Logic check: Checks that an input does not yield a logical error, e.g., an input value
should not be 0 when there will be a number that divides it somewhere in a program.
Presence check: Checks that important data are actually present and have not been
missed out, e.g., customers may be required to have their telephone numbers listed.
Range check: Checks that the data lie within a specified range of values, e.g., the month
of a person's date of birth should lie between 1 and 12.
(c). Give two advantages of using a primary key in Ms. Access (02 marks)
A B C D
(a). Write the data type used in the range B2:B6? (01 mark)
Number
(b). What custom format was used to generate output in cell range C2:C6?
(01 mark)
“Ugx.” #,###
Page 28 of 92
29 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
(c). How many cells are in the range A2:C6? (01 mark)
15 cells
(d). State two ways data in cell range A1:D1 can be emphasized? (02 marks)
By bolding.
By underlining.
By changing font size.
By changing font colour.
By changing text direction.
By changing text alignment.
11. You are provided with the following figure prepared using a word processor.
Mwase D. 70 100 20 70
Swabulin M. 60 40 60 70
Kintu S. 70 20 20 81
Wandalo D. 70 60 10 81
Nalweyiso A. 70 70 15 90
(a). State the formula for determining total score for Wandalo D. (01 mark)
=sum(left)
(b). State one word processing feature used to prepare the figure above. (01 mark)
It is a table.
(c). When you arrange the total in descending order, write down the order
for all the students. (02 marks)
(d). When you sort Maths results in ascending order, write down the correct
order of marks. (01 mark)
Page 29 of 92
30 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
(b). State two examples of browsers a user can manipulate. (02 marks)
Is a software program that can be used to find Web sites, Web pages, and files on the
Internet.
Simplex channel
Half duplex channel
Full duplex channel
Multiplex channel
(c). Mention two areas where GPS is currently being used in business. (02 marks)
Page 30 of 92
31 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
information.
Ability Office
Apache OpenOffice (formerly known as OpenOffice.org)
Aster*x
AUIS — an office suite developed by Carnegie Mellon University and named after
Andrew Carnegie.
Breadbox Ensemble runs under the GEOS (16-bit operating system) and effectively
requires a version of DOS to be installed on the host system.
Breadbox Office — DOS software, but has been successfully tested with Win3.x,
Win95/98/98SE/ME, WinNT4.0, Win2000 and the 32bit-versions of WinXP, WinVista
and Win7.0.
Calligra Suite is the continuation of KOffice under a new name. It is part of the KDE
Software Compilation.
Celframe Office — supports Microsoft Office and other popular file formats, with a user
interface styled on Microsoft Office 2003.
ContactOffice - an AJAX-based online office suite. The suite includes personal and
shared Calendar, Document, Messaging, Contact, Wiki,... tools. Available free and as
an enterprise service.
Corel WordPerfect for DOS - A word processor, spreadsheet, and presentation software
from Corel (containing WordPerfect 6.2, Quattro Pro 5.6, Presentations 2.1, and Shell
4.0c).
Documents To Go (Android and others)
EasyOffice
Page 31 of 92
32 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
Magnetic tapes.
Hard discs.
Magnetic stripes.
Floopy diskettes.
Zip discs.
(ii). Solid-state (01 mark)
Flash discs.
SSD cards
Memory cards
DVD – ROM
CD – ROM
Blue –ray discs
(b). State two ways of ensuring data security on the devices mentioned above.
(02 marks)
Page 32 of 92
33 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
By avoiding bending and scratching on the disk side of the disk surface.
By right protecting of devices to avoid accidental erasers.
By installing latest copy of antivirus programs.
By sensitizing users.
By writing and emphasizing the data protection act for organizations.
By keeping them away from dust and smoke.
By ejecting them after properly stopping them.
By defragmenting discs for example hard disc.
By keeping them in protective jackets to avoid scrathes.
16. (a). State two ways IT is used at your school. (02 marks)
Computer-based training, which includes:
Computer-Assisted Instructions (CAI), so that teachers can use computers and other IT
equipment to present teaching materials in a more interesting way.
Computer-Assisted Learning (CAL), so that students can use computers and appropriate
software to learn at their own pace.
Computer-Assisted Assessment (CAA), which may reduce the time and labor to mark the
answer scripts.
The School Administration and Management System (SAMS) for keeping records of
students and producing report cards or other related documents.
Page 33 of 92
34 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
(b). Give two different applications where CAD is used. (02 marks)
Track ball.
Mouse.
Keyboard.
3D devices.
Printer.
Graphics plotters.
Microphone
Speaker
Web cam
(b). State one piece of specialist software needed to carry out Video – conferencing.
Skype
Lenovo you cam.
(c). State two advantages of using video - conferencing over instant messaging.
(02 marks)
Page 34 of 92
35 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
A record is a row in a table that contains information about a given person, product, or
event.
A field is a column in a table that contains a specific piece of information within a record.
Is a method used to check that data falls within the appropriate range or parameter
defined by the database user.
Clicking is most commonly used with a computer mouse when the pointer is placed over
an icon or object and the button pressed once.
Page 35 of 92
36 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
Double clicking is most commonly used with a computer mouse when the pointer is
placed over an icon or object and the button is quickly pressed twice. This action, when
performed without moving the location of the mouse, will produce a double click.
Is a pointing device gesture in which the user selects a virtual object by "grabbing" it
and moving it to a different location or onto another virtual object.
To select a document.
To play a computer game.
To control movement of the cursor.
To input text.
To draw objects.
Page 36 of 92
37 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
SET FOUR:
1. (a). State the difference between data and information. (02 marks)
Data refers to the raw facts entered into a computer, while; Information refers to
processed data.
(b). Mention any two devices that can be used to transfer data from one laptop
to another. (02 marks)
External hard disk. Blu-ray discs.
Flash disk. Magnetic tapes.
Memory cards. Floppy diskettes.
Compact disk. Blue tooth.
Digital versatile disk.
(c). Give two limitations to computer literacy in our community. (02 marks)
Computer phobia - people fear to use computers.
Myths about using a computer e.g. You will kill your sight.
Expensive hardware and software components.
Restricted to well to do people.
Some places lack connection to the power grid.
Page 37 of 92
38 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
(b). What is the importance of RAM in the booting process. (01 mark)
RAM provides the primary storage location where the main program in the operating
system in stored for execution.
(c). Define the following terms as used in relation to the Windows environment.
4. Study the file path given below and answer questions following:
C:\KCB-01\PCM\Desktop\Senior Six\EOTP1.docx
5. Use the following words to fill in the spaces below: (05 marks)
Page 38 of 92
39 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
(c). Mention two ways software piracy can be controlled in our society.(02 marks)
Copy protection system.
Separate demo and full version.
Online game features or online registration.
Give discounts or lower the product price.
Give your product for free.
Don’t give away your software source code.
Legal action.
Enforce copy rights.
7. (a). Distinguish between soft copy and hard copy. (01 mark)
A soft copy is an electronic copy of some type of data, such as a file viewed on a
computer's display or transmitted as an e-mail attachment, while, a hard copy is a
permanent reproduction, or copy, in the form of a physical object, of any media
suitable for direct use by a person (in particular paper), of displayed or transmitted
data.
(b). Mention two advantages of keeping data in a soft over hard copy.(02 marks)
It eliminates the use of paper and ink.
It makes editing and formatting simple.
It stores a lot of data.
It can be sent over a network to several people.
(c). State two activities that can be carried out on a file. (02 marks)
Editing. Saving.
Copying. Formatting.
Opening. Merging files.
Printing. Compressing a file.
8. (a). Explain how a shop-keeper can use a spreadsheet application. (03 marks)
A B C D
1 Item name Quantity Unit price Gross Sales
2 Soda 20 800
3 Doughnut 50 250
Page 39 of 92
40 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
4 Pancake 56 200
5 Water 32 250
6 Milk 12 800
7 Yoghurt 45 250
(c). Mention any two data types entered into a spreadsheet program.(02 marks)
Text. Date / time
Number. Currency
Formula.
Percentage.
9. (a). Give two advantages of using an e-mail over ordinary mail for communication.
(02 marks)
Emails are delivered extremely fast when compared to traditional post.
Emails can be sent 24 hours a day, 365 days a year.
Web mail means emails can be sent and received from any computer, anywhere in the
world, that has an Internet connection.
Cheap - when using broadband, each email sent is effectively free. Dial-up users are
charged at local call rates but it only takes a few seconds (for conventional email, eg
text only) to send an email.
Emails can be sent to one person or several people.
Computer files can be attached to an email.
Records and copies are kept automatically.
(b). State the difference between sign in and sign up as regard to an e-mail software.
(02 marks)
Sign in refers to the process of using certain details to obtain access to a computer
system or other restricted area, while sign up supplies the necessary information so as
to open an account with an e-mail software.
(c). Mention one computer crime related to use of e-mails today. (01 mark)
Spamming. IP hijacking.
Money laundering. Fraud.
Trespass. Distribution of offensive content.
Identity theft. Distribution of pornographic
Spoofing. content.
Communication channel.
(c). Briefly, explain the following data communication tools:
11. (a). Give the difference between the internet and World Wide Web. (01 mark)
Internet refers to a global interconnection of computer networks, while, Word Wide Web
refers to a collection of several web pages linked together
(b). Suggest two ways the internet can be used to improve teaching and
instruction in your school. (02 marks)
Computer-based training.
Distance learning through computer-based training and Web-based training.
Simulations of experiments or real-life situations that may be hazardous.
Electronic library system for searching, borrowing, and returning books.
The School Administration and Management System (SAMS) for keeping records of
students and producing report cards or other related documents.
Edutainment, which is a type of educational software that combines education with
entertainment.
Page 41 of 92
42 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
12. (a). Mention two advantages of using a custom - tailored software over an off
shelf application. (02 marks)
It is specifically designed for a particular requirement and can be tailored to fit in exactly
with the way the business or organization wishes to operate.
It can be customised to work with other software that operate with the potential to
provide a fully integrated IT infrastructure across the whole organisation
Users usually find it easier and more interesting to use as it does not contain unnecessary
or redundant facilities.
It is much more flexible than packaged software and can be modified and changed over
time requirements and business practices change
The user receives much better support and can in many cases talk directly to the
developers concerned.
If you are lucky and find a good developer then they can significantly add value to your
company by suggesting alternatives, improvements and by acting as a source of IT advice
and information
The use of professionally developed bespoke software applications can give you a
significant business advantage over your competition
The software more closely meets your requirements, as it is developed especially for you.
It can be more easily integrated with existing software/other systems you have, reducing
data duplication.
Custom software is able to perform tasks that your competitors cannot. Possibility to
licence the software to other companies to get back some/all of the investment.
(b). Give one way a good application software can be obtained legally. (01 mark)
Buying software from authorized vendor.
Developing your own software.
Downloading free ware.
(c). Katongole wants to design a database for his shop. What will be the importance
of the following to him?
Page 42 of 92
43 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
13. (a). What is the practical difference between backspace and delete key? (01 mark)
The backspace key erases a character to the left of the cursor, while the delete key
erases the character to the right of the cursor.
14. (a). What is a Graphical User Interface (GUI) environment. (01 mark)
It is a point and click software platform that involves the use of menus, icons, shortcut
key and others.
(b). Mention two advantages of using a Graphical User Interface (GUI) over a
Command Line Interface (CLI). (02 marks)
It is user friendly.
Commands and instructions are kept in pictorial objects - icons.
It is easy to understand.
(c). Give two factors a user will consider before buying a computer program.
(02 marks)
Cost of the program. Free from computer bugs.
Usability of the program. Software support and call centres.
System requirements. Type and quality of software
Type of program needed. developer.
\Needs of the organization.
nctionalities of the program.
15. Write True (T) or False (F) against the following statements.
a). T
b). F
Page 43 of 92
44 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
c). F
d). T
e). T
16. (a). Define a computer laboratory. (01 mark)
A computer laboratory is a place where students learn practical uses of computers, such
as programming or how to use a spread sheet program.
(b). State two ways computer hardware can be kept safe in a laboratory.
(02 marks)
Burglar proofing the room.
Installing fire prevention and control equipment.
Providing stable power supply.
Installing lightening arrestors on the computer room
The room should be well laid out with enough space for movement.
Dust and dump proofing the computer room.
Cables and power sockets should be well insulated and of the correct power rating to
avoid short circuits that can damage computer components.
The users should not eat or drink in the computer laboratory.
17. (a). Mention one example of chart that is appropriate to represent the following
data selection.
(ii). Performance comparison for three streams A,B and C. (01 mark)
Column graph.
Line graph.
Scatter graph.
Bubble graph.
(b). Give two characteristics of a good programming language. (02 marks)
Simplicity: A good programming language must be simple and easy to learn and use.
Naturalness:- A good language should be natural for the application area, for which it
has been designed. That is, it should provide appropriate operators, data
Page 44 of 92
45 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
structures, control structures, and a natural syntax to facilitate the users to code their
problem easily and efficiently.
Abstraction:- Abstraction means the ability to define and then use complicated
structures or operations in ways that allow many of the details to be ignored. The degree
of abstraction allowed by a programming language directly effects its writ ability. Object
oriented language support high degree of abstraction. Hence, writing programs in object
oriented language is much easier. Object oriented language also support re usability of
program segments due to this features.
Structured:- Structured means that the language should have necessary features to allow
its users to write their programs based on the concepts of structured programming. This
property of a moreover, it forces a programmer to look at a problem
in a logical way, so that fewer errors are created while writing a program for the
problem.
(c). State one example of a high level programming language. (01 mark)
Ada FORTRAN
ALGOL Go
BASIC Groovy
Blue Java
C Julia
C# Lua
C++ Object Pascal
COBOL Pascal
D PHP
18. (a).Mention two services offered by an Internet Service Provider (ISP) (02 marks)
Internet connectivity.
Page 45 of 92
46 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
Voice calls.
Website hosting.
Content filtering.
My Computer is shows all resources in the computer including drives, control panels
and data.
(b). Why should a user shut down a computer well? Give two reasons.(02 marks)
It enables the computer carry out its routine of file management well.
It enables the computer to register components under its care.
To enable the computer to start with no interruption at the next booting process.
To control dangers of damaging the operating system.
Page 46 of 92
47 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
Page 47 of 92
48 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
SET FIVE:
(c). Suggest one way data loss in a computer laboratory can be controlled.
(01 mark)
Use of passwords.
Backing up data.
Installing and activating firewalls.
Installing and updating computer antivirus programs.
Use of data recovery utility programs.
Sensitizing users.
Punishing offenders.
Creating resource access control rules.
Installing a data loss control software e.g. deep freeze.
(b). State any two ways computers can be damaged in a laboratory. (02 marks)
Defacing computers by use of sharp objects like a campus.
Eating and drinking in the lab.
Placing computers on non flat surfaces.
Using un grounded power sources.
Opening a computer when it is running.
Moving the computer while it is running.
Working with a computer in a dusty environment.
(c). Mention any two ways computers can be safeguarded against damage in a
computer laboratory. (02 marks)
Placing a computer on a flat surface.
Avoid drinking and eating in a computer lab.
Page 48 of 92
49 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
3. (a). Give the difference between cold and warm booting. (02 marks)
Cold booting refers to starting a computer that was previously off, while, warm booting
refers to starting a computer that was previously on.
(b). State any two reasons for carrying out a warm boot. (02 marks)
After installing a computer program.
After un installing a computer program.
After installing a new hardware component.
After un installing a hardware component.
After changing system settings.
(c). Give one reason why a computer may fail to start. (01 mark)
It could be having hardware problems.
It could be having a software problem.
4. (a). List three ways computers are used at home to promote education. (03 marks)
Carrying out educational research.
Communicating educational issues with parents, colleagues, e.t.c.
Completing assignments, exercises and home works while at home.
Encourages educational online corroboration.
Encourages online teaching, examinations and other issues.
Students can carry out / do projects from home for example workgroup computing.
Students can play academic games for leisure activities.
Using the internet, students can access a wealth of information that might be needed to
promote teaching and learning.
(b). Give two advantages of carrying out online purchase. (02 marks)
Faster buying/selling procedure, as well as easy to find products.
Buying/selling 24/7.
More reach to customers, there is no theoretical geographic limitations.
Low operational costs and better quality of services.
No need of physical company set-ups.
Easy to start and manage a business.
Customers can easily select products from different providers without moving around
physically.
It is cheap.
Page 49 of 92
50 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
(b). List any three features of a word processing application. (02 marks)
Word-wrap. Automatic page numbering.
Find and search. Tables.
Replace. Multi-columns.
Spelling checker. Macros.
Grammar checker. Clip art gallery.
Thesaurus. Mathematical formulae typesetting.
Mail merge.
(c). Give two practical activities done in a word processor and cannot be done by
another application program. (02 mark)
Mail merging.
Working with tables of content.
Working with list of figures.
Working with end notes.
Carrying out simple calculations.
Spell checking.
6. In relation to a computer's keyboard, mention one practical use of the following keys:
Page 50 of 92
51 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
(b). The Headmaster of your school is to buy computers for the laboratory.
Mention three specifications that He must consider before buying. (03 marks)
Processor speed.
Hard disk space.
Amount of RAM
Number and types of ports to use.
The type of operating system to use.
8. You are given the following table, study it and answer questions below.
A B C
1 Item Quantity Unit price
2 Daso 1,000 800
3 Afia 2,000 2,500
6 TOTAL OF UNIT PRICE
(b). State one formatting feature used on the label TOTAL OF UNIT PRICE?
(01 mark)
Merge and centre.
Upper case.
Bold.
(c). State the cell reference of the label TOTAL OF UNIT PRICE. (01 mark)
A6
(d). Give the formula for determining the total sales for Daso. (01 mark)
=PRODUCT(B2:C2)
=B2*C2
(e). How many rows do you see on the spreadsheet above? (01 mark)
06 rows.
Page 51 of 92
52 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
9. Briefly, state the major activity carried out during the following stages of information
processing.
10. (a). State the three parts that make up the CPU. (03 marks)
Main memory.
Arithmetic and Logical Unit (ALU).
Registers.
(b). Give one function of the following in relation to data processing and the CPU
11. (a). Give two advantages of using secondary storage to a computer user.(02 marks)
They store large amounts of data.
They are used to transfer data from one computer to another.
They are used to store data for future use.
They key computer files needed for the system to work.
They are cheaper per unit storage capacity.
(b). State two devices that use magnetic storage technology. (02 marks)
Magnetic tapes.
Hard disk.
Floppy diskette.
Jazz disc.
(c). Why is RAM said to be volatile? (01 mark)
Because it loses its content when power goes off.
12. Write short note on the following terms as used in a presentation.
Page 52 of 92
53 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
13. (a). Give the three branches of system software. (03 marks)
Utility programs.
Operating systems.
Programming languages.
Device drivers
Firmware
Ms. Word.
Ms. Excel.
Ms. PowerPoint.
Ms. Access, e.t.c.
Light Emitting Diode, LCD, Speakers, Relay Switches and Motors, Printers
(a). A Light Emitting Diode indicates that a device is available, ready, e.t.c.
(d). Relay Switches and Motors are used in garages to accurately spray car body
shells.
15. (a). Give the difference between a file and a folder. (02 marks)
A file is a collected of data that is related, while; a folder is directory where many files
can be stored.
(c). Mention one way you can recover a file lost from your computer. (01 mark)
Backing up data.
Use of data recovery utility programs.
Pressing undo.
16. (a).State any two parts that make up an e-mail address. (02 marks)
User name.
Domain name.
An extension
A separator (@sign)
(b). Give two advantages of using an e-mail for data communication. (02 marks)
Page 54 of 92
55 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
17. (a). Give two reasons for servicing computers regularly. (02 marks)
Getting the most from technology,
Protecting our personal information
Protecting your data.
Ensure continuous use of a computer.
To remove dust from the computer.
To replace worn out parts.
To remove viruses and worms in the computer.
(b). List three components you can use to service a computer. (03 marks)
Screw driver. Dust blower.
Form cleaner. Wrist chains.
Cotton wool. Necessary spaces, e.t.c.
18. (a). You are given the following URL, use it to answer questions below:
www.mak.ac.ug
(i). Write the domain name for the URL above. (01 mark)
mak
Page 55 of 92
56 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
19. (a). Give two advantages of using bar code readers for data entry in supermarket.
(02 marks)
It reduces input errors.
It is cheaper at data input.
(b). I want to draw a sketch map of using, mention two input hardware devices I
will engage. (02 marks)
Light pen. Mouse.
Digitizing tablet. Stylus pen.
(c). I want to conduct a video conference with a friend, mention one item I will
need. (01 mark)
Web cam.
Computer monitor.
Head set (or speakers, microphones)
20. In the table below, write True or False against each question following. (05 marks)
SET SIX:
Page 56 of 92
57 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
1. (a). State the difference between hardware and software. (02 marks)
(c). Mention two devices that can be used to enter computer instructions.
(02 marks)
Keyboard. Touch screen.
Mouse. QR code reader.
Tracker ball. Biometric devices (finger print
Joystick. recognition, iris reader, e.t.c.)
Microphone. Integrated pointing device (mainly on
Remote controller. old laptop computers
Touch pad / glide pad.
The two statements should be correct for the award of the two 02 marks
(b). Outline any two editing features found in a word processor. (02 marks)
Extra cost is required to employ specialised staff to operate and design the data
processing system.
Some jobs may be lost due to computerization and thus lower the morale of staff
members.
Some staff has / have to be trained or retrained. Face-to-face interactions among staff
may be reduced. Easier transmission of viruses via the internet, which may lead to
creating untimely, costs to the recipient and sender computers.
Computers load personal information, which may be misused. It is easy to misuse
personal information held about an individual but privacy rights have been enacted to
minimize this.
Problems may arise when computers cannot be used either because they are
malfunctioning or damaged. This can bring an organization to a halt if no backup exists.
Security has to be provided to protect personnel and staff from preying eyes.
(b). State any two parts that make up an e-mail address. (02 marks)
User name.
A symbol @ that separates the username and a domain name.
Domain name.
(c). While composing a mail, what is the use of the “TO” field? (01 mark)
It is where the addresses of mail recipients or beneficiaries are written.
5. (a). State the difference between system and peripheral devices. (02 marks)
Page 58 of 92
59 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
System devices are computer devices found and located inside a computer’s system
unit / case or cabinet, e.g. fixed hard drive while, Peripheral devices are computer
components that are connected to a computer’s system unit e.g. a printer.
(b). Define the term computer literacy. (01 mark)
Computer literacy refers to having the knowledge and understanding of computers
and their uses.
(c). Mention any two examples of specialized application programs.
(02 marks)
Accounting package.
Computer Aided Design.
Customer Relations Management (CRM).
6. Using the following words, fill in the spaced provided for (a) to (e) below.
(d). instant breaking news on a website can easily be accessed using a /an RSS
(e). Live and video instant communication using a website is referred to as vide
conferencing and with it, a webcam is used to capture images for uploading.
Page 59 of 92
60 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
Administrators, instructors, students and guests can be connected using the campus
network. This makes communication easy amongst users.
An organisation can provide services, such as registration, school directories, course
schedules, access to research, and email accounts, and many others.
The school can provide network users with access to the internet, via an internet
gateway.
The school can provide access to special purpose computing devices which individual
users would not normally own. For example, a school network might have high-speed
high quality printers strategically located around a campus for instructor or student use.
Computer networks enable people to access their information from connected devices
throughout the organisation. Students can begin an assignment in their classroom, save
part of it on a public access area of the network, then go to the media center after school
to finish their work. Students can also work co-operatively through the network.
Collaborative software allows many users to work on a document or project
concurrently. For example, educators located at various schools within a county could
simultaneously contribute their ideas about new curriculum standards to the same
document, spreadsheets, or website.
Computer peripheral devices can be shared e.g. printers, storage space, e.t.c.
9. (a). Give the difference between cold and warm booting. (01 mark)
Cold booting is the process of turning on a computer after it has been powered off
completely, While, Warm booting alternatively referred to as a soft boot, a warm boot
is one method of resetting a computer system that is already powered on.
(b). In relation to booting a computer, state one function of the following:
Page 60 of 92
61 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
(c). Mention how the following can control the spread of computer viruses:
(i). Antivirus program. (01 mark)
It detects computer viruses.
It cleans files that are infected with computer viruses.
It isolâtes / quarantaines / vaults computer viruses.
It blocks installation of programs that are infected or whose certificate is not trusted.
It scans files and devices with computer viruses.
It deletes computer files that have viruses.
Page 61 of 92
62 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
A B C D E
1 Item code Name Quantity Selling price Total Amount
2 C001 Mirinda 200 900
3 C004 Pepsi 400 900
4 C010 Quencher 600 900
5 C030 Ribena 1,200 1,500
6 C030 Rwenzori 800 1,500
7 C100 PK Sweets 1,000 250
(a). State the application program you will use to organise this work. (01 mark)
Spreadsheet application program.
(b). What data type will be suitable for the data in the item code field? (01 mark)
AutoNumber.
Text.
(c). Write the formula that will return Total Amount for Ribena. (01 mark)
=C5*E5
=PRODUCT (C5:E5)
=PRODUCT(C5, E5)
(d). what will happen when you enter Rwenzori after Ribena? (01 mark)
The spreadsheet is automatically updated.
Values are automatically recalculated.
(e). State one practical application of this program in your school. (01 mark)
To prepare roll call sheets.
To prepare a school budget.
To grade and analyse students’ results.
To manage and create teaching timetables.
To prepare payrolls for workers.
To track expenses like electricity.
To track school assets like food and other stock items.
It is used to prepare sitting plans for candidates.
To prepare lists and assignment of index numbers automatically to students.
Page 62 of 92
63 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
(b). Give the difference between shareware and freeware programs. 01 mark)
Shareware is copyrighted software that is distributed free for a trial period, and payment
is required for using the software beyond that trial period, While; Freeware is
copyrighted software provided at no cost to users.
13. (a). State two advantages of using e-commerce in business. (02 marks)
Transactions can occur immediately and globally, thus save time for participants on both
ends.
Transactions can occur 24 hours per day.
Businesses have access to millions of people with Internet connections.
Businesses have the ability to gather customer information, analyze it, and react if
appropriate.
Information can be changed and be available quickly.
Customers can compare prices easily.
Feedback can be immediate.
Manufacturers can buy and sell directly, avoiding the cost of the middleman.
Distribution costs for information is reduced or eliminated.
Page 63 of 92
64 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
Page 64 of 92
65 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
16. (a). Give two forms of wireless communication devices. (02 marks)
Broadcast radio.
Cellular radio.
Microwaves.
Communications satellites.
Infrared (IR).
(b). Mention one danger of using wireless communication in an organisation.
. (02 marks)
Network security is a challenge to many organizations
There is a lot of interference by obstacles like trees, e.t.c.
Inconsistent connections.
Wireless communication becomes slower when the user goes away from the hotspot.
(c). Why are majority of organizations still using cable networks? (01 mark)
17. (a). Give two differences between RAM and ROM. (02 marks)
Content in RAM is temporary, while, contents in ROM are permanent.
RAM is used to store files and programs currently the computer is working with, while,
ROM stores its content for good.
RAM is volatile and ROM is non volatile.
RAM can be discussed when buying a computer, while, ROM is not mentioned at all.
The amount of RAM can influence speed and performance of a computer, while, ROM
has no relationship with the computers’ speed.
System requirements always emphasise and mention the amount of RAM the system
should have as minimum for the proper performance of a software or hardware, while,
ROM is not mentioned anywhere under the system requirements.
Page 65 of 92
66 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
Game playing
speech recognition
understanding natural language
Expert systems
Computer vision
Time sharing
Page 66 of 92
67 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
Page 67 of 92
68 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
Computer forensics
Mobile device forensics
Network forensics
Database forensics
Because most of the computer problems can be solved via e-mail or by phone, all computer
support specialists need to possess excellent communication and explanatory skills as they
need to be able to give step-by-step directions so customers can solve the problems
themselves.
They are usually responsible for installing everything from software, printers, Wi-Fi, and
other computer tools and components.
They teach customers how to properly use the new devices and even write instructional
handbooks.
They check company's computer systems every day to ensure they are operating correctly
or working for a school and assisting other teachers and administrators who are having
computer issues.
Most of their work consists of dealing with people who are not as technologically gifted as
they are and it's important that they remember this and be patient when customers do not
understand how to correct the issue the first time.
(ii).Systems designer. (02 marks)
They work in computer systems design create computer and IT systems that allow
businesses and other entities to operate effectively and efficiently.
They facilitate these computer and IT systems, working to design custom software
programs, manage computer and information systems, as well as manage computer
facilities.
69 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
Work may be done onsite for one particular company, or you might do your work on a
contract basis for several organizations.
Some work in computer operations centers if they specialize in facilities management and
maintenance, and others are able to work from home or other remote locations.
(b). Mention one way you can care for a school network. (01 mark)
Cables should not run on the floor.
Network cables should not cross be crossed with electricity cables.
Frequently, cables should be checked for ascertain that they are working well.
Firewalls should be activated to ensure that hackers and intruders do not cross the network
campus or neighbourhood.
Some network gadgets should be made un available by encrypting or providing details for
network log in.
20. (a). State the difference between a file and a folder. (01 mark)
(b). Outline the steps you take to create a folder on your desktop. (02 marks)
Right click the desktop,
Select new, Folder.
(c). Give two causes of data loss in an organization. (02 marks)
System failure.
Computer virus.
Accidental deletion.
Computer crime.
Use of old storage devices.
Poor handling of storage devices.
SET SEVEN:
(c) State the meaning of the following data storage concepts (2mks)
Storage medium:
Is a physical material onto which a computer keeps/stores data e.g. CD, HDD ,Flash
,DVD etc
Storage drive:
The device that retrieves/reads and writes data to and from a storage medium
e.g. CD/DVD drive, Flash disk drive etc
2. (a) Briefly describe the concept of computer ethics
Moral guidelines of computer users while buying, utilizing and disposing off
computers or their parts. (2 marks)
The right or wrong behaviors exercised by computer users
(b) State three unethical practices usually engaged in by ICT users.
Phishing
Not alerting colleagues in cases of virus attacks
Sending un solicited mails/ messages
Using other people’s ICT resources without their permission / knowledge.
Sending nude pictures o controversial content to others. erodes human dignity
Copying and using proprietary software without pay / prior permission of the
manufacture or authorized vendor.
Plagiarism
Snooping / interfering into other people’s files or mail boxes, and ICT works or
resources.
Using ICTs to bear false witness.
Using ICTs to invade other people’s privacy- hacking, phishing and pharming.
Using ICTs forge, steal and cone some innocent others.
Cracking
Hardware theft
71 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
Hacking
Spoofing
Denial of service attack
Spamming
Cyber bullying
(Any 3 x 1 =3 marks)
3 (a) Distinguish between mail merge and word wrap word processing concepts.
Mail marge is a word processing feature that allows one to create multiple letters
from one main letter addressed to different people. While word wrap is a feature
used to refer to automatic movement of the cursor to the next line.(2 marks)
(b) State two forms of disasters that can befall computer systems and installations.
Terror attacks
Virus attacks / logic bomb
Destructive earthquakes
Floods
Lightning strikes
72 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
A synchronous technology that parcels data into uniform simple and small cells (8-
bytes cells) for high capacity transmission more especially for voice and video
signals. Whereas,
Synchronous is the term used for technologies where users must be online at the same time
in order to interact. This may include real-time chat, live conferencing or a scheduled
online discussion.
Ease of access
Easy to edit and format
Easily to distribute electronically
Reduce storage space considerably
Ability for online storage
(Any 2 x 1 = 2 marks)
c) List down two examples of impact printers
Dot matrix
Daisy wheel
Drum printers
Line printer band printers
Braille printers
Band printers
(Any 2 x 1 =2marks)
10. a) Briefly define the following terms as used in networks and internet based
communications
(i) Internet
Is a global or an international interconnection of computers and LAN.
Is the largest Network of Networks. (1mk)
(ii) Intranet
Is a LAN that uses WWW or internet standards/ protocols to relay data and information
within an organization (1 mk)
(iv) Extranet
Is an extended intranet of an organization to its customers and suppliers (1mk)
(ii) State one reason as to why the dollar sign is used on cell B10
To make its address absolute OR,
To ensure that the cell range does not change as the formula
gets pasted to other cells.
(Any 1 x 1 = 1 mark)
(iii) State the implication of having a zero at the end of the function
To define the order of ranking as descending order i.e., the
highest score takes the first position.
13. “ICTs have been grossly abused.” This was a lamentation by one of the
parents who attended the S.6 class day of The Girls School.
a. State one category of ICT abusers:
Individuals
Institutions / organizations
Hackers
Crackers
b. Give two ways in which ICTs are being abused
Forging documents
Abuse and insult others
Platforms for communicating , watching and storage of pornographic
materials plus other controversial content
Vandalism
Replacing people
Baring of false witness
Used to cheat and waste time (Any 2 x 1 = 2 marks)
Encryption
Lock and key
Biometric devices
Secures the network –fire walls , server base model
Software audits
Customize the software backup policy
Educate
Working rules and regulations
Anti –virus utilities
Avoid unnecessary sharing
Data destruction and recovery policy and plan (Any 2 x 1 = 2
marks)
(b) State one area in each case, where the following data transmission
modes can be used.
(03 marks)
Mode of transmission Area of application
Full duplex Mobile telephone operations
Half duplex Fax machines, credit cards, verification
systems, radio calls transmission for
security
Simplex General radio waves transmission
Television transmission
Keyboard operations (1 mark)
16. (a) Briefly explain how each of the following devices contributes to the
general operations of a computer system
(i) Hard disk
Holds /keeps the operating system plus important utilities
Keeps update for reference
Supplements RAM
b) State two methods you can use to enhance the speed of a computer
Increase RAM capacity where applicable
Virus cleaning and protection
Remove unnecessary files and programs
Re-install the O.S (Any 2 x 1 =01 marks)
17. (i) Define the concept of “crop marks” used in desktop publishing . (2
marks)
Crop marks are marks which facilitate trimming o business cards.
20. Hilda prefers to store her documents online rather than removable devices.
(a) What is online storage? (1
mark)
Refers to the practice of storing electronic data and third party service
accessed via the internet.
(b) State two examples of cyber (online) storage facilities you know.
Google drive
Skydive
Drop box
Open drive
Drive HQ file manager
One drive
I Cloud
Box all vie
Sugar Sync.
Amazon cloud drive
Windows live mesh
Box.net
Spider Oak
(c) Give one advantage of using cyber storage over removable devices.
Enables free sharing of files and folders with other users.
Provides large and limitless storage space.
Can be accessed from anywhere provided the user has internet
connection.
Provides security features to protect the data and third party files.
It provides quick recovery of your files and folders.
It provides for automatic and quick data
(d) How can Hilda ensure security of her data held by online data banks?
(1 mark)
Pick password.
Don`t reuse your passwords.
7 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
END
(c) Give two ways that can lead to file corruption in a laboratory. (02 marks)
Sending devices,
Receiving devices
Communication devices
Encoders and decoders
Or examples of the above e.g computers, modem, router, satellite, e.t.c.
7. Write down TRUE or FALSE against each of the following sub sections
(a) to (e)
4 Resourceful guide by: latif salim ©KVSS SUB-ICT 2018
Item T/F
i. PIXEL
Picture Element
ii. CRT
Cathode Ray Tube
(b) Give two characteristics of primary memory
Holds programs and data that the processor is actively working with
The processor interacts with it millions of times per second.
The contents are easily changed
Relatively low capacity
Fast access
Content is volatile e.g RAM.
(C)State one text input hardware device
i. Placeholder
A placeholder is a box with a dotted outline, designed for the placement of
content on the slide
ii. Rehearsed timing
A feature used to record the time that you need to present each slide, and then
use the recorded times to advance the slides automatically when you give your
presentation to your actual audience.
(b) State two qualities of a good presentation
Conducting workshops/seminars.
13. a) State any two parts that make up the central processing unit.
Control unit
ALU
Registers
b) . Give two devices that can be upgraded to improve performance of
the CPU
Hard disk
RAM
Video cards
(c). Mukwaya was printing a document and all the sudden, the printer
stopped.
Suggest one possible cause to this.
May be there tonner was used up.
May be there was paper jam
May be there were no paper s in the paper tray
May be power went off.
May be the printer was disconnected mid way the printing exercise
When the printing drivers have crashed
15 (a). Give two advantages of keeping computer files in soft copy over
hardcopy.
Easy to edit.
Easy to transfer to other computers and networks.
Easy to protect against damages.
Easy to format
Takes a small space.
Can be used by many people at the same time.
Reduces the cost of printing. Volumes and volumes of paper
(b) State two uses of a file extension.
Avoid extra long file names and complex hierarchical structures use
information-rich in filenames instead
Use simple and easy to remember file names.
Do not use spaces and other characters such as! # $ % etc
It should be connected to the file connected to the file content as much as
possible
16(a) State the difference between internet and the world wide web.
c) Mention two ways you can protect computer resources against physical
threats from users
Use of passwords.
Use of burglar proofing.
Maintaining user log.
Sensitizing users.
Lock hardware devices like laptops.
Use of surveillance cameras(CCTVs)
Use of strong doors and windows.
Recruitment of security quarters.
18. (a). State two factors you would consider before buying a computer.
Amount of RAM.
Hard disk space.
Speed of the processor (CPU)
Nature and size of monitor provided.
Operating system compatibility.
Warranty and guarantee.
Needs of the users.
(b). Give two main activities carried out during the data collecting stage.
20. (a). State three resources that can be shared across a computer network