0% found this document useful (0 votes)
120 views18 pages

Computer Exam Attempted

This document provides the questions and answers to a quiz on computer fundamentals. It tests knowledge on topics like cloud computing services, computer hardware components, data types, memory, operating systems, file management, internet protocols, and networking. The correct answers to each multiple choice question are highlighted in bold for easy identification.

Uploaded by

MAGOMU DAN DAVID
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
120 views18 pages

Computer Exam Attempted

This document provides the questions and answers to a quiz on computer fundamentals. It tests knowledge on topics like cloud computing services, computer hardware components, data types, memory, operating systems, file management, internet protocols, and networking. The correct answers to each multiple choice question are highlighted in bold for easy identification.

Uploaded by

MAGOMU DAN DAVID
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 18

SECTION A ( N.

B : the correct answers for each question have been


selected and put in Bold for easy identification)

1. The following are the services provided by the cloud except


I. Software as a service(saas)
II. Platform as a service(paas)
III. Infrastructure as a service(iaas)
IV. Anything as a service (xaas)
A. None of the above
B. All the above
C. Only iv

D. Ii and iii
E. I and iv
2. When starting a computer, the following must be available.
I. RAM
II. BIOS
III. ROM
IV. CMOS
V. OPERATINF SYSTEM
A. I and iii C. I and v
B. Ii and iv D. Ii and iii
3. Whatever is transmitted to a computer by another computer, human or environment
is;
A. Computer system C. Output
B. Input D. Signal information
4. One of the fundamental functions of a computer is processing data into a meaningful.
The following are the examples of processing except;
A. Arithmetic calculations D. Drawing graphs
B. Sorting a list
E. All the above
C. Modifying pictures
F. None of the above
5. Which of the following perform both input and output;
A. Plotters C. Communication devices
B. VDU D. projectors
A. ---------perform the computer’s processing actions, including arithmetic calculations
and the generation of lines, images, and sound
B. A computer D. Signal
C. A CPU E. A Chip
6. Microcomputers contain a specific micro-processor chip as their CPU. This is put into a
protective package, and then mounted onto a board contained within the computer.
This board is called
A. Circuit board C. System board
B. Computer board D. Bread board
7. No processing takes place in memory. Instead, memory stores data, information and
instructions. Memory is divided into two types:
A. Main memory and secondary memory
B. Optic storage devices and none optic storage devices
C. Random access memory and Read only memory
D. Internal memory and external memory
8. The ……………includes instructions on how to load basic computer hardware.
A. BIOS C. POST
B. CPU D. Operating system
9. Numeric data consists of numbers that represent quantities and that might be used in
arithmetic operations. Computers understand data that is in form of 0`s and 1’s. the
decimal numbers (0-9) in computer can be presented as;
A. 00000000-00001001 C. 0-01001000
B. 00000000-10010000 D. 00000000-10111000
10. Character data is composed of;
A. Letters C. Numerals
B. Symbols D. All the above
11. ASCII uses…………..to represent data.
A. 8 bits C. 7 bits
B. 128 bits D. 91 characters
12. The ………………is responsible for the running of programs that are loaded into the
main memory.
A. Operating system C. control unit
B. Random access memory D. algorithm
13. The size of the ……………. determines the amount of data with which the computer
can work at any given time.
A. RAM C. Hard disk
B. Cache memory D. Word size
14. The two main buses in a computer are;
A. System bus and internal bus C. System bus and expansion bus
B. Expansion and external bus D. Address bus and data bus
15. The following are examples of application specific software except
A. Operating system D. Utility programs
B. Windows 11 E. None of the above
C. Drivers F. All the above
16. The following are the examples of system development software except;
A. Drivers D. Assemblers
B. Compilers E. All the above
C. Interpreters
17. When saving a document, the following symbols can’t be used except;
A. / \ D. / *
B. : ? E. All the above
C. <> F. None of the above
18. ………………….. are used as commands in Windows. You cannot use them as a
filename.
A. Binary words C. Special keys
B. Reserved words D. English words
19. Creating a folder in another folder is called;
A. Directory C. Nested folders
B. In built folders D. Path directory
20. Suppose we want the obtain students position in a test using the excel Function. Which
of the following formula can we use?
A. =RANK(D2,D2:D5,1) C. =RANK (D2, $D$2:$D$5,1)
B. =POSITION(D2,$D$2:$D$5,1) D. =RANK(D2 $D$2:$D$5,0)
21. The classifications of computers are;
A. main frame computers, microcomputers and macro computers.
B.size, technology and purpose.
C. super computers, desk top computers and microcomputers.
D. all the above.
22. The two most common types of programs are;
A. Hardware and software.
B. utility programs and application specific programs
C. system software and application software.
D. System management programs and system Development programs.
23. Bytes are units used to measure the storage capacity in computer systems. How
many bits make up a kilo byte? -……………………….
A. 800000bytes C. 8000000bytes
B. 80000bits D. 8000bits
24. ………………is a system of interlinked hypertext document accessed via the
network
A. Network C. WWW
B. Internet
D. HTTP
25. 1GB is approximately;

A. 1,000,000 bytes C. 1,000,000,000 bytes


B. 1, 000 bytes D. 1,000,000,000,000 bytes
26. A computer system comprises the following;
I. Hardware and software
II. People and procedures
III. Data and information
IV. RAM and ROM
V. Input devices and output devices

A.All the above C. Only IV and V


B. Only I, II, and III D. Only I

27. Which of the following statements is true?


A. A disk drive is a storage device
B.A disk drive is a device that reads data from and writes data to a disk.
C. A disk drive is the same as flash disk and floppy disk
D. All the above
28. when data is not needed for processing resides in;
A. cache memory D.Storage devices
B. Random access memory E. Registers
C. Read Only memory F. all the above.
29. The following are entities that can input data into a computer
A. Environment D. None of the above
B. A user E.All of the above
C. Another computer
30. 1000 in binary is?
A. 1000000000 C. 0001011111
B. 1111101000 D. 0111101000
31. A rectangular box that windows displays when it needs further information before it
can carry out a command or when it needs to provide you with more information.

A. Message box C. Windows box


B. Dialog box D. File explorer

32. When you create a file, you must provide it with a valid filename that adheres to
specific rules, referred to as----------------.

A. File extension C. File explorer


B. File naming conventions D. File management
33. Press and hold the -----------to select Non-consecutive text.

A. Ctrl key C. Enter key


B. Shift Key D. Alt key

34. Computer program that retrieves documents or files or data from a database or from
a computer network.

A. URL (uniform resource locator) C. Browser


B. Search engine D. The web

35. The following are the protocols used on internet except;

A. SMTP (Simple Mail Transfer Protocol) D.DHCP (Dynamic host


B. FTP (File Transfer Protocol) configuration protocol)
C. TCP (Transmission Control Protocol)

36. …………. manages the assembling of a message or file into smaller packets that are
transmitted over the Internet and received by a TCP layer that reassembles the
packets into the original message.

A. SMTP (Simple Mail Transfer C.TCP (Transmission Control


Protocol) Protocol)
B. FTP (File Transfer Protocol)
D. DHCP (Dynamic host configuration
protocol)

37. …………. are groups of Computers on the same network and are a method to isolate
communications between the members in the domain and the other data traffic.
A. Network
B.Domains
C. Hosts
D. Cloud
38. The following are search methods except;
A. Keyword B. Field
C. Boolean D. Miscellaneous
E. None of the above.
39. Which of the following is the smallest unit of data in a computer?
C. Bit B. KB

C.. Nibble Byte D. Byte

40.Which of the following service allows a user to log in to another computer somewhere on the Internet?

A. e-mail
B. UseNet
C. Telnet
D. FTP
TRUE AND FALSE STATEMENTS
1) FALSE: A 64-bit register is designed to work with 64-bit
software, and a 32-bit software is designed to work with a 32-bit
register. They are not compatible with each other.
2) FALSE: Memory refers to both hardware and software
components. In this context, memory can refer to physical
hardware like RAM (Random Access Memory), as well as virtual
memory managed by the operating system.
3) TRUE: Peripheral devices can be attached to a computer system
wirelessly using technologies like Bluetooth, Wi-Fi, or infrared.
4) FALSE: Excel formulas and functions are not inbuilt in an Excel
sheet. Instead, Excel provides a set of pre-defined formulas and
functions that users can utilize for various calculations and data
manipulation.
5) FALSE: A compiler translates the entire source code into
machine code, rather than line by line.
6) FALSE: The internet is a global network that connects various
networks, while the web refers to the collection of interconnected
websites and web pages.
7) TRUE: The IP address 131.123.35.4 can be assigned as either
dynamic (assigned dynamically by a DHCP server) or static
(manually assigned and does not change).
8) FALSE: Computers do not possess the capability to think or have
consciousness. They can execute predefined instructions and
algorithms to perform tasks but do not possess the ability to think
in the human sense.
9) TRUE: Cache memory is a component of a CPU and is a high-
speed memory used to temporarily store frequently accessed
instructions and data.
10) FALSE: The IP address 131.123.35.4 is an example of an
IPv4 address, not an IPv6 address.
11) FALSE: Memory refers to the physical hardware
components, while software refers to the programs and
instructions that run on a computer.
12) FALSE: Whaling attack is a kind of phishing attack that
specifically targets senior executives and high-profile individuals,
attempting to trick them into revealing valuable information. It is
not limited to accessing information.
13) FALSE: The hexadecimal number system contains digits
from 0 to 15, represented as 0-9 and A-F.
14) TRUE: A firewall can be both a hardware device and
software that helps protect a computer or network from
unauthorized access.
15) FALSE: A terabyte is equal to 1,024 gigabytes, not 1
million.
16) FALSE: Software that is available for trial use is typically
referred to as trialware or shareware. Shareware typically refers
to software that can be shared or distributed freely, but may
require payment for continued use or enhanced features.
17) FALSE: An SD card is a storage device and not an output
device. It is used for storing data, such as files, photos, videos,
etc.
18) FALSE: An IPv6 address is represented as eight groups of
four hexadecimal digits, not octal digits.
19) FALSE: DNS stands for Domain Name System, not
Domain Name Service.
20) TRUE: A pen drive, also known as a USB flash drive, is a
portable storage device used to store and transfer data.
SECTION C

QUESTION ONE

(a) Differentiation between Alignment and Merging:

i. Alignment: Alignment refers to the positioning or arrangement of text or data within a cell. It
determines how the contents of a cell are horizontally or vertically aligned. In Microsoft Excel,
you can align cell contents to the left, right, or center horizontally, and top, bottom, or center
vertically. For example:

Left alignment: The contents of the cell are aligned to the left side of the cell.

Center alignment: The contents of the cell are centered horizontally or vertically.

Right alignment: The contents of the cell are aligned to the right side of the cell.

ii. Merging: Merging cells in Excel allows you to combine multiple cells into a single larger cell.
When cells are merged, the content of the upper-left cell in the range becomes the content of the
merged cell, and the rest of the cells in the range are cleared. Merged cells span across multiple
columns and rows. For example:

Merging cells A1, A2, A3, and A4 would create a single merged cell that spans four rows in
column A.

The merged cell can contain text or data that is centered within the merged cell.

(b) Impact of Freeze Top Row in Microsoft Excel:

When the Freeze Top Row feature is applied in Microsoft Excel, it keeps the top row of the
spreadsheet visible even when scrolling down through the rest of the data. This can be useful
when working with large datasets or tables where the column headers or other important
information in the top row need to remain visible at all times. By freezing the top row, users can
easily reference the column headers while navigating through the data.

(c) Formulas/Functions used in the given questions:

i. To calculate the average test mark for F7: The formula would be =AVERAGE(C7:E7). This
formula calculates the average of the test marks in cells C7, D7, and E7.
ii. To find the maximum test mark for G10: The formula would be =MAX(C10:E10). This
formula finds the maximum value among the test marks in cells C10, D10, and E10.

iii. To find the minimum test mark for H6: The formula would be =MIN(C6:E6). This
formula finds the minimum value among the test marks in cells C6, D6, and E6.

iv. To deduce the coursework mark for I9: The formula would be
=(AVERAGE(C9:E9)*B12). This formula calculates the average of the two best test marks in
cells C9, D9, and E9, and multiplies it by the fixed coursework percentage (40%) taken from cell
B12.

v. To deduce a student's final mark for K8: The formula would be =(I9+(B13*0.6)). This
formula adds the coursework mark in cell I9 to 60% of the exam mark (taken from cell B13) to
calculate the final mark for the student in cell K8.
QUESTION TWO

(a) Definitions of the following terms:

(i) Computer hardware: Computer hardware refers to the physical components of a computer
system that can be seen and touched. It encompasses all the tangible parts of a computer,
including the central processing unit (CPU), memory modules, storage devices, input devices
(keyboard, mouse), output devices (monitor, printer), and other peripheral devices (such as
scanners or speakers). Hardware provides the necessary physical infrastructure for a computer to
function.

(ii) Utility software: Utility software refers to a type of software that provides additional
functionality and tools to enhance the performance and maintenance of a computer system. It
includes programs designed for tasks such as system optimization, disk management, data
backup, antivirus protection, file compression, and system diagnostics. Utility software assists
users in managing and optimizing their computer systems, improving efficiency and security.

(iii) System software: System software is a collection of programs that facilitate the operation of
a computer system and provide a platform for running application software. It includes the
operating system, device drivers, firmware, and other essential software components. System
software acts as an intermediary between the hardware and application software, managing
system resources, providing a user interface, and ensuring proper communication between the
hardware and software components.

(b) Description of how CPU, RAM, Input, and Output devices process data:

CPU (Central Processing Unit): The CPU is the brain of the computer and performs most of
the processing tasks. It executes instructions stored in the computer's memory, performs
arithmetic and logical operations on data, and controls the flow of data between different
components. For example, when you open a web browser, the CPU retrieves the necessary
instructions and data from RAM, processes them to render the web page, and sends the output to
the display for the user to see.

RAM (Random Access Memory): RAM is a type of computer memory that provides temporary
storage for data and instructions that are actively being used by the CPU. When a program is
running, its instructions and data are loaded into RAM for faster access. For example, when you
open a document, the document's content is loaded into RAM so that the CPU can quickly
retrieve and manipulate the data while you are editing it.

Input devices: Input devices allow users to enter data or commands into the computer system.
Examples include keyboards, mice, scanners, and microphones. When you type on a keyboard,
the input device sends signals to the CPU, which processes the keystrokes and performs the
desired actions accordingly.

Output devices: Output devices display or present the processed data to the user. Examples
include monitors, printers, speakers, and projectors. When you view a video on a monitor, the
output device receives the video data from the CPU and displays it on the screen for you to see.

(c) Components of a computer system:

A computer system is composed of the following components:

Hardware: This includes all the physical components of a computer system, such as the CPU,
memory, storage devices, input devices, output devices, and peripheral devices.

Software: Software refers to the programs or instructions that run on a computer system. It
includes the operating system, application software, utility software, and system software.

Data: Data represents the raw facts, figures, or information that is processed by the computer. It
can be in various forms, such as text, numbers, images, audio, or video.

User: The user interacts with the computer system by providing input, executing programs, and
receiving output. Users can be individuals or other computer systems that communicate with the
computer.

Network: A network connects multiple computers and devices together, allowing them to
communicate and share resources. Networks can be local area networks (LANs), wide area
networks (WANs), or the internet.
(d) Functions of an operating system:

An operating system performs various functions to manage and control the overall operation of a
computer system.

Five functions of an operating system include:

Process management: The operating system manages and controls the execution of processes or
programs. It allocates system resources, such as CPU time, memory, and input/output devices, to
different processes, ensuring efficient multitasking and resource utilization.

Memory management: The operating system manages the computer's memory resources,
allocating memory space to different processes and ensuring efficient memory utilization. It
tracks which parts of memory are in use, manages memory allocation and deallocation, and
handles memory swapping or paging.

File system management: The operating system provides a file system that organizes and
manages files and directories on storage devices. It handles file creation, deletion, and
manipulation, as well as providing mechanisms for file access, security, and data storage.

Device management: The operating system controls and manages input and output devices
connected to the computer system. It handles device drivers, which are software components that
enable communication between the operating system and hardware devices, allowing users to
interact with devices such as keyboards, printers, and disks.

User interface: The operating system provides a user interface that allows users to interact with
the computer system. Thisinterface can be command-line based, graphical (GUI), or a
combination of both. It enables users to run programs, access files, configure system settings,
and perform various tasks in a user-friendly manner.
QUESTION THREE

(a) Definitions of the following terms:

i. Search Engine: A search engine is a software program or online service that allows users to
search for information on the internet. It indexes and catalogs web pages and other content
available on the internet and provides users with search results based on their queries. Examples
of popular search engines include Google, Bing, and Yahoo.

ii. Folder: In the context of computer fundamentals, a folder is a virtual container or directory
used for organizing and storing files on a computer or in a file system. It provides a way to group
related files together and helps users maintain a hierarchical structure for organizing their digital
documents, images, videos, and other types of files.

iii. Dialog box: A dialog box is a graphical user interface element that appears on the screen to
prompt the user for input or to display important messages or notifications. It typically contains
buttons, checkboxes, text fields, and other controls to interact with the user. Dialog boxes are
used in various software applications to configure settings, make selections, or display
informative messages.

iv. Menu: In computer fundamentals, a menu is a list of options or commands presented to the
user in a software application or operating system. It provides a way to access different functions
or features of the application or system. Menus can be displayed as a dropdown list, a sidebar, or
a toolbar, and they allow users to navigate and choose desired actions or settings.

v. Icon: An icon is a small graphical representation or symbol that represents a file, folder,
application, or action in a graphical user interface. Icons are used to visually represent objects or
functions and provide a quick and intuitive way for users to interact with the computer system.
Icons are typically displayed on the desktop, in file explorers, or in application interfaces.

(b) Possible threats to Kimbugwe's business:

i. Data breaches: Kimbugwe's business involves handling financial information, and a possible
threat is the unauthorized access or theft of sensitive customer data, leading to financial loss or
identity theft.
ii. Phishing attacks: Attackers may attempt to deceive Kimbugwe or his employees through
fraudulent emails or websites that mimic legitimate financial systems, aiming to steal login
credentials or sensitive information.

iii. Malware infections: Malicious software, such as viruses, worms, or ransomware, can infect
Kimbugwe's computer systems, compromising their security, disrupting operations, or
demanding ransom payments.

iv. Network attacks: Hackers may target the network infrastructure used by Kimbugwe's
business, attempting to gain unauthorized access, intercept sensitive data during transmission, or
launch denial-of-service attacks to disrupt services.

v. Social engineering attacks: Attackers may try to manipulate or deceive Kimbugwe or his
employees through tactics like impersonation, pretexting, or baiting, aiming to gain access to
sensitive information or perform unauthorized transactions.

(c) Ways to avoid the above threats:

i. Implement strong security measures: Use robust firewall and antivirus software, keep them
updated, and regularly scan for malware. Also, employ strong passwords, encryption techniques,
and multi-factor authentication to protect sensitive data.

ii. Educate employees: Provide training and awareness programs to employees regarding
cybersecurity best practices, including identifying phishing emails, avoiding suspicious websites,
and following secure protocols for handling sensitive information.

iii. Regularly update software: Keep all computer systems, applications, and firmware up to
date with the latest security patches and updates to address known vulnerabilities.

iv. Backup and disaster recovery: Implement regular data backups and establish a disaster
recovery plan to ensure that critical data can be restored in the event of a data breach, malware
infection, or other forms of data loss.

v. Monitor and detect: Employ intrusion detection systems, security monitoring tools, and log
analysis to identify and respond to any suspicious activities or security breaches promptly.

By implementing these measures, Kimbugwe can enhance the security of his computerized
financial systems, mitigate potential risks, and protect the confidentiality, integrity, and
availability of sensitive business information.
QUESTION FOUR

(a) Differences between internet-related terminologies:

i. World Wide Web (WWW) and HTTP:

The World Wide Web (WWW) refers to a collection of interconnected web pages that are
accessible over the internet. It is a system of hypertext documents linked together through
hyperlinks and accessed using web browsers.

HTTP (Hypertext Transfer Protocol) is a protocol used for transmitting data over the internet. It
defines a set of rules for how web browsers and web servers communicate with each other to
request and deliver web pages. HTTP is the foundation of data communication on the World
Wide Web.

ii. Web browser and web address:

A web browser is a software application that allows users to access and view web pages on the
World Wide Web. It interprets HTML (Hypertext Markup Language) code, processes web
content, and presents it in a user-friendly format.

A web address, also known as a URL (Uniform Resource Locator), is a unique identifier that
specifies the location of a web page or resource on the internet. It consists of a protocol (e.g.,
HTTP or HTTPS), a domain name (e.g., www.example.com), and a specific path or filename
that points to the desired content.

iii. Network and the internet:

A network refers to a collection of interconnected devices, such as computers, servers, routers,


and switches, that communicate and share resources with each other. Networks can be local
(LAN) or wide area (WAN) and can be set up within a home, office, or across multiple locations.

The internet is a global network of networks that connects millions of devices worldwide. It is a
vast infrastructure that allows information and data to be transmitted and accessed across
different networks. The internet is not limited to a specific geographic location and provides a
platform for various services and applications.

(b) Services provided by the internet:

World Wide Web (WWW): The internet enables access to the World Wide Web, which
provides a wide range of services such as websites, web pages, online content, and multimedia
resources.
Email: The internet allows users to send and receive electronic messages, commonly known as
email, to communicate with others globally.

File Transfer: The internet facilitates the transfer of files between computers and servers,
allowing users to share documents, images, videos, and other data.

Instant Messaging and Voice/Video Calling: Through the internet, users can engage in real-
time communication using instant messaging platforms and make voice or video calls to
individuals or groups.

Online Shopping and E-commerce: The internet provides platforms for online shopping,
allowing users to browse and purchase products and services from various vendors or online
marketplaces.

Social Media: The internet hosts numerous social media platforms that enable users to create
profiles, connect with others, share content, and participate in online communities.

(c) Explanation of Internet Protocol (IP) address with an example:

An Internet Protocol (IP) address is a numerical label assigned to each device connected to a
computer network that uses the Internet Protocol for communication. It serves as a unique
identifier for devices, allowing them to send and receive data over the internet.

For example, an IP address could be represented as "192.168.0.1". In this case, the IP address is
composed of four sets of numbers separated by periods. Each set can range from 0 to 255. The IP
address identifies a specific device on a network, similar to a phone number identifying a
particular telephone.

(d) Factors considered when choosing an Internet service provider (ISP):

Availability and Coverage: Consider the ISP's availability in your location and the extent of
their network coverage to ensure that you can access reliable internet service.

Connection Types and Speeds: Evaluate the different connection types offered by the ISP, such
as DSL, cable, fiber-optic, or wireless, and compare their speeds to meet your bandwidth
requirements.

Service Reliability and Uptime: Look for an ISP with a reputation for reliable service and
minimal downtime to ensure consistent internet connectivity.

Pricing and Packages: Compare the pricing structures and service packages offered by ISPs to
find a plan that fits your budget and meets your specific needs in terms of data caps, speed tiers,
and additional features.
Customer Support: Consider the quality and availability of customer support provided by the
ISP, including technical assistance, troubleshooting, and responsiveness to queries or concerns.

Security and Privacy: Assess the ISP's measures for network security, data protection, and
privacy policies to ensure the safety of your online activities and personal information.

You might also like