ICT Topical Revision Kit
ICT Topical Revision Kit
CPA
CS
FOUNDATIONAL LEVEL
REVISION KIT
QUESTIONS
Topic 1 Introduction to ICT 3
Topic 2 Computer systems 5
Topic 3 Computer hardware 8
Topic 4 Computer software 11
Topic 5 Introduction to operating systems 13
Topic 6 Computer files 15
Topic 7 An overview of application packages 17
Topic 8 An overview of information systems 20
Topic 9 Computer networks 24
Topic 10 The internet 28
Topic 11 Emerging issues and trends 30
SOLUTIONS
Topic 1 Introduction to ICT 31
Topic 2 Computer systems 38
Topic 3 Computer hardware 45
Topic 4 Computer software 56
Topic 5 Introduction to operating systems 61
Topic 6 Computer files 73
Topic 7 An overview of application packages 80
Topic 8 An overview of information systems 91
Topic 9 Computer networks 106
Topic 10 The internet 123
Topic 11 Emerging issues and trends 134
TOPIC 1
INTRODUCTION TO ICT
QUESTION 1
(a) (i) Define the term "computerisation"'
(ii) Identify four benefits of computerisation to an organisation.
QUESTION 2
a) Explain three demerits of computerizationon
b) Outline five methods of entering data into a computer system
QUESTION 3
a) Demonstrate briefly how introduction of information technology could affect the following:
i. Products and services
ii. Production economics.
iii. Buyers.
iv. Suppliers.
v. Substitute products.
vi. Competitors.
QUESTION 4
a) (i) Briefly explain four approaches to computing in an organisation
(ii) Give one advantage and one disadvantage of each of the approaches explained in (b) (i)
above
QUESTION 5
a) Explain two ways in which the use of information communication technology (ICT) is
managed by organisations.
b) Information communication technology (ICT) can be categorized into two broad
products; traditional computer-based technologies and digital data communication
technologies.
Required
i. Using suitable examples highlight six traditional office applications of ICT.
ii. Briefly describe three specialized applications of ICT.
iii. Differentiate between "internal networks" and "external networks" as used in digital data
communication.
QUESTION 6
Briefly describe the concepts of downsizing as used in computer technology.
QUESTION 7
Your managing director has requested you to assist in preparing a presentation on the impact of
information communication technology (ICT) in your country.
Required:
Identify how the development of ICT has impacted on any four industries in your country.
TOPIC 2
COMPUTER SYSTEMS
QUESTION 1
Highlight six characteristics of a computer system
QUESTION 2
Briefly describe five characteristics of computer memory
QUESTION 3
(a) (i) Describe the specific technological developments in each of the five computer generations,
(ii) Highlight three devices that contributed towards evolution of computers
QUESTION 4
(a) Write the following acronyms in full:
i. HDD.
ii. Kbps.
iii. HDMI
iv. P2P
QUESTIONS 5
a) Describe four characteristics of fifth generation computers.
QUESTION 6
a) A computer was purchased with the following specification
Required:
Match the appropriate letter with the corresponding description of the computer above:
i. Operating system
ii. Main memory.
iii. Optical storage.
QUESTION 7
Kepha Kaunda has installed a note book computer Y and a desktop computer X to form a local
area network (LAN) connecting to the internet through a 10 Megabite (MB) broadband
connection in his bedroom. The configurations on the computers are as follows
Notebook Y Desktop X
CPU Ml73 GHZ P43GHZ
2MB 2MB
RAM 256MB 512 MB
1011 00 LAN and 54 M 1011 00 LAN card
wireless card
Required .
i. Kepha Kaunda wants to connect an external digital video disk (DVD) writer to desktop X
State two different types of external DVD drives and briefly describe how Kepha Kaunda
could install DVD writer to each of the external DVD drives
ii. ' hr desktop X, the size of the cache is smaller than that of the random access memory
(RAM)
iii. Briefly explain what Kepha Kaunda should do to enhance the performance of desktop X
iv. Identify six factors that might affect the connectivity of desktop X and note book Y in the
LAN
QUESTION 8
A sales person will be giving a multimedia presentation to a large gffiup of people in an
exhibition using a laptop computer
Required
i. Briefly describe typical features of a laptop computer
ii. Highlight four extra devices that may be needed for presentation and state the purpose of
each
QUESTION 9
a) Describe three types of computers according to their structure speed and architecture.
b) Briefly explain the purpose of each of the following elements of a computer system:
i) The system bus.
ii) The motherboard.
QUESTION 11
a) While reading a computer magazine, Mr. Luka Ongeri came across the following
specification of a personal compiler (PC) system: ■**
"Pentium IV 3.0 GHZ, 1GB RAM, 150 GB LID and 17" TFT Monitor".
TOPIC 3
COMPUTER HARDWARE
QUESTION 1
A friend has approached you for advice on the purchase of a new computer. He wishes to use the
computer to edit video clips taken on his video camera, play games, email friends and family and
write his college work.
Required:
Advise the friend on:
i. RAM.
ii. Processor.
iii. Secondary storage.
iv. Internet connection
b) Four items of commercial software that would be required in order to accomplish the
tasks described above.
c) Four types of input devices required, stating the role of each device.
QUESTION 2
Define the term "primary storage" in the context of computing.
QUESTION 3
Explain the following computer hardware and software specifications:
QUESTION 4
(a) (i) Defme the term “optical storage media”.
(ii) Explain four types of optical storage media.
QUESTION 5
(a) Describe four output devices that could be found in a television broadcasting station
QUESTION 6
a) Describe the following hardware devices:
(i) Memoiy stick.
(ii) Plotter.
QUESTION 7
a. (i) Explain the use of two equipment’s used during videoconferencing,
(ii) Highlight two advantages of videoconferencing to an organisation.
QUESTION 8
a) Describe the following characteristics of computer "memory
i. Mutability
ii. Accessibility
iii. Addressability
iv. Volatility
QUESTION 9
a) Explain the two main reasons why the following types of memory are used for certain
functions in a computer:
QUESTION 10
a) Highlights six hardware devices found inside the computers’ system unit.
b) Briefly describe four classifications of printers based on their technology
QUESTION 11
State three types of computer keyboards
QUESTION 12
Briefly explain the functions of the following peripheral devices of a computer system
i. Webcam
ii. Head set
iii. Joystick
QUESTION 13
a) Distinguish between the following terms in the context of information communication
technology (ICT):
QUESTION 14
Examine five functions which are performed by computer hardware devices.
QUESTION 15
A personal computer (PC) uses a number of different connectors or ports to connect to peripheral
devices such as a printer.
QUESTION 16
Discuss the factors that determine the processing power of a computer.
QUESTION 17
a) Printers can be classified as either impact or non-impact.
i) Briefly explain the differences between impact printers and non-impact printers.
ii) State die type of printer that an organisation which prints customer invoices would
prefer..
b) Highlight four factors which could be considered by an organisation when selecting a
data input device.
TOPIC 4
COMPUTER SOFTWARE
QUESTION 1
Explain the following computer hardware and software specifications:
QUESTION 2
(ii) Systems software and applications-software.
QUESTION 3
a) Outline four examples of computer utility programs,
b) Briefly discuss four1 factors to be considered when, selecting open source software.
QUESTION 4
a) (!) Briefly explain the term "machine level programming language".
(ii) State two advantages and three disadvantages of a machine level programming language.
QUESTION 5
People who use modern general purpose computers usually observe three layers of computer
software performing a variety of tasks
Identify and briefly describe the three layers of computer software as usually observed by
general purpose computer users
QUESTION 6
The following diagram gives an overview of computer software:
Required:
b) Identify two examples of each of the following computer software’s:
i. General purpose application programs.
ii. Application specific programs.
iii. System management programs.
iv. Systems development programs.
pro
QUESTION 7
A systems developer requires a range of software utilities.
Required:
Define the term "software utility" and describe three types of software utilities.
QUESTION 8
Mr. Charles Midika operates a computer bureau which specializes in preparing customers'
curriculum vitae (CVs) and in developing and printing organizations’annual reports.
Required:
Identify four features of computer software which would be suitable for Mr. Charles Midika's
bureau.
QUESTION 9
Fourth generation languages (4GL’s) consist of a variety of software tools which enable end
users to .develop software applications with minimal or no technical assistance or that enhance
the productivity of professional programmers.
Required:
Describe the features of 4GLs which make them to be preferred by programmers for application
development.
TOPIC 5
i. Unguided media.
ii. Router.
iii. Network interface card
iv. Hot Spot
v. Wi-Fi
QUESTION 2
i. Multitasking and single tasking operating system
ii. old booting and warm booting
QUESTION 3
Distinguish between the following terms as used in the context of information technology:
QUESTION 4
Explain how operating systems create an impression of doing several jobs at the same time.
QUESTION 5
a) (i) State three activities that take place during computer booting process.
(ii) Identify three features of a Basic Input/output system,
QUESTION 6
Identify five activities of tin operating system in regard to file management
QUESTION 7
a) Briefly describe five types of operating systems.
b) Highlight ten tasks performed in the creative stage of systems development life cycle.
QUESTION 8
a) Briefly explain six functional areas Served by a computer operating system.
b) Outline six activities undertaken during the information system implementation and
evaluation stage.
c) Highlight eight situations in a typical, office environment where connection between
computing devices might be required.
QUESTION 9
a) The operating system primarily provides services for running applications on a computer
system Briefly discuss the need for an operating system
QUESTION 10
The operating system acts as the resource manager of a computer system
Highlight four functions which are performed by an operating system in managing a computer
system's resources.
QUESTION 11
Briefly describe the following types of operating systems:
QUESTION 12
Mr. Jackson Wabengo, the information communication manager of Vijana Enterprises Ltd.
intends to change the operating system platform in his organisation. He intends to embrace open
source platforms in order to save the cost of annual licenses.
Required:
i) Define the term "open source platform".
ii) Briefly explain three advantages of open source platforms.
QUESTION 13
In the context of a computerised environment:
TOPIC 6
COMPUTER FILES
QUESTION 1
Citing a suitable application in each case, briefly explain the following types of computer files
i. Master file.
ii. Transaction file.
QUESTION 2
Explain the following methods of organising computer file:
QUESTION 3
Describe three file access methods
QUESTION 4
Explain three reasons why it is important to manage computer files
QUESTION 5
Identify five types of file extensions
QUESTION 6
Briefly explain four types of computer files.
QUESTION 7
a) Explain three types of computer files organisation.
b) List three advantages of direct file access method.
QUESTION 8
a) Describe four aspects of file design that should be considered for a file in which
performance has high priority.
b) Outline four differences between a file system and a database management system.
QUESTION 9
Highlight the criteria used to determine computer file organization
QUESTION 10
Briefly explain the features of the following- file system
QUESTION 11
Describe the following methods of organizing computer files:
QUESTION 12
Briefly explain any three types of media used for data storage
TOPIC 7
Screenshot 2
Screenshot 3
Screenshot 4
Required:
a) Identify the type of application package from which the screenshots 1 to 4 have been
captured.
b) Describe the application of each of the packages identified in (i) above.
QUESTION 2
Highlight two uses of each of the following application packages in business:
i) Presentation program,
ii) Database program,
iii) Spreadsheet program,
QUESTION 3
a) Outline four major steps/or mail merging a document in word processing.
QUESTION 5
Briefly explain five features of a spreadsheet package.
QUESTION 6
a) (i) Define a presentation program.
(ii) Highlight two major components of a presentation program.
QUESTION 7
a) Outline six data processing operations in an organisation
QUESTION 8
a) State three common factors to consider in selecting a data processing method.
b) Briefly explain the five stages of data processing.
QUESTION 9
a) i) Define the term "data processing"
ii) Briefly describe four types of data processing methods
QUESTION 10
Modern accounting software packages are designed to simplify and automate complex manual
financial management processes and improve the accessibility, accuracy and timelines of
financial data
Discuss the key features and capabilities of accounting software packages which enable
organizations to simplify and automate financial management processes
QUESTION 11
A new database is being designed for Joka Enterprises
i) Outline five major steps that should be undertaken during the design process
ii) Identify any three advantages of databases over the traditional file systems
QUESTION 12
Data are raw facts which are further processed into useful information.
Required:
QUESTION 13
List seven application packages of a computer system,
QUESTION 14
Explain the meaning of the following terms in the context of computerised data processing:
TOPIC 8
i. Cost.
ii. Security.
iii. Reliability.
iv. Time taken to complete transactions
(c) Citing examples explain the following key concepts of information security:
i. Confidentiality.
ii. Integrity.
iii. Availability.
QUESTION 2
Describe six guidelines for managing computer passwords.
QUESTION 3
(a) Distinguish between the following terms:
QUESTION 4
Discuss the evolution of information systems.
QUESTION 5
b) (i) Highlight four benefits of office automation systems.
(iii) Explain four characteristics of information that is suitable for decision making.
QUESTION 6
a) (i) Define the term "management information systems" in the context of information systems.
(ii) Explain three advantages of management information systems to the banking sector.
QUESTION 7
Briefly explain four authentication techniques that could enhance security of information
systems in an organisation.
QUESTION 8
a) Outline three functions of an organisation that could be automated.
b) Briefly, describe how a computer system could be modified for use by physically challenged
persons
QUESTION 9
Briefly explain the following terms:
QUESTION 10
a)
(i) Define the term "knowledge management system".
(ii) Highlight four benefits of a knowledge management system to a business organisation,
(iii) Outline three major problems a company might face when implementing a new
knowledge management system
QUESTION 11
For each of the following threats to information systems, security, identify two conditions that
might increase the vulnerability of the information systems security:
i. Operator error.
ii. Hardware malfunction,
iii. Software bugs.
iv. Data errors.
v. Accidental disclosure of information.
vi. Theft.
vii. Vandalism and sabotage. .
QUESTION 12
a) To be considered an executive information system (EIS), a software product should address
certain needs of the executive.
b) Briefly explain six needs of the executive which an EIS is able to address.
c) Briefly describe four structural elements of a computer system.
QUESTION 13
Small and micro-business enterprises have greater access to a variety of information technology
tools that improve productivity such as netbooks, smartphones and cloud computing-based
services. However, without adequate end point security practices in place, many enterprises
are exposed to both external and internal threats that could cripple their operations.
Identify the end point security threats to small and micro-business enterprises,
QUESTION 14
Explain four security concerns that personal computer users face in an organization
QUESTION 15
a) i) Define the term "information systems
ii) State five types of information systems
b) As the information system manager of a company whose operations are highly automated,
you have noticed that a large number of employees are suffering from occupational over-use
syndrome otherwise known as repetitive strain injury (RSI)
Identify four measures that you could adopt in order to minimize occupational over-use
syndrome
QUESTION 16
a) Organizations individual use different types of information systems for different purposes.
Describe the characteristics of the following information systems:
QUESTION 17
a) Identify three roles of- information systems in-an. organisation.
b) State and explain the components of an information system.
QUESTION 18
a) Outline five types of information systems
QUESTION 19
a) Identify three vital services which information systems can provide to a business organization.
QUESTION 20
a) Identify the procedures that could be adopted to control the spread of computer viruses in
an organisation.
a) Name six threats to an organization’s information system that could arise as a result of
computer crime.
QUESTION 21
a) Differentiate between information systems (IS) and information technology (IT).
b) Write short notes on the following types of information systems:
QUESTION 22
Information systems controls consist of all methods, policies and organizational procedures that
ensure the safety of the organization’s assets, the accuracy and reliability of its accounting
records and operational adherence to management standards.
Required:
Describe five types of general information systems controls.
TOPIC 9
COMPUTER NETWORKS
QUESTION 1
Analyse the following modes of communication with reference to-cost, speed of transmission
and reliability:
(i) Serial mode.
(ii) Parallel mode.
QUESTION 2
(a) With the aid of diagrams, briefly explain the following computer network topologies:
b) State an advantage and a disadvantage of each of the network topologies in (a) above
QUESTION 3
(a) (i) Define the term "mobile computing”
(ii) Outline five limitations of mobile computing devices
QUESTION 4
ii) Explain three modes of data communication and their practical use,
QUESTION 5
a) (i)Define the term "protocol" in the context of computer networks.
(ii)Illustrate two types of wireless media necessary when setting up a network.
QUESTION 6
Briefly discuss four advantages of the virtual private network.
QUESTION 7
a) (i) State one end device used in computer networks.
(ii) Explain five intermediary devices used in computer networks.
.
QUESTION 8
a) (i) Define the term "logical topology" as used in computer networks.
(i!) Explain two types of logical topologies.
QUESTION 9
a) Distinguish between data privacy and data security,
a) Outline three countermeasures to information security threats,
QUESTION 10
a) (i) Define the terra "network firewall
(ii) Describe three advantages and three disadvantages of adopting hardware firewall.
QUESTION 11
Joyce Kubo is a Marketing Manager with Kay Ltd She intends to use her home computer to
connect to the company's network in order to analyse sales data but suspects that her home
computer might.be infected by computer viruses.
Required:
i) Illustrate any four unusual events that could alert Joyce Kubo of possible computer virus
infection.
ii) Suppose after completing her analysis, Joyce Kubo prepares her results in PDF file format
and posts them to the company's website.
Briefly explain two reasons why Joyce Kubo could prefer the PDF file format.
iii) Suppose Joyce Kubo intends to display her results using a presentation package.
Describe four precautions which Joyce Kubo should observe when putting text in
presentation.
QUESTION 12
a) i) Briefly explain the graphical user interface (GUI) %
ii) State two reasons why a GUI is considered easier to use than a command line interface
QUESTION 13
Identify nine basic computer network configurations
QUESTION 14
Outline five factors that determine the processing power of a computer.
QUESTION 15
a) Briefly describe three types of computer networks.
b) Distinguish between synchronous and asynchronous data transmission modes.
QUESTION 16
a) Define the term “world wide web”
b) The surface simplicity of the website is in fact that many individual protocols can be
contained within a single website.
Required
i) Define the term “Protocol”
ii) Describe any four protocols used in the World Wide Web.
iii) Outline four ways of accessing web pages.
QUESTION 17
Data can be communicated from one terminal to another or to the central computer through
different data communication media.
QUESTION 18
Transmission of data over computer networks raises certain security concerns.
Identify two possible causes of data insecurity and two mitigations that could be taken to secure
data.
QUESTION 19
Describe the type of computer network topologies represented by the following diagrams;
QUESTION 20
a) Mr. Shadrack Kalamba a technician with Icon Systems Technology Ltd. is setting up a local
area network (LAN) for a client
Required:
i) Identify four network devices that he would use in setting up the LAN.
ii) State six advantages of a LAN.
i) TCP.
ii) FTP.
iii) HTTP.
iv) HTML.
v) WWW.
vi) IP.
QUESTION 22
There is a global trend towards the adoption of digital data communication systems as opposed
to analog data communication systems.
Required:
Examine four advantages of digital data communication systems over analog data
communication systems.
TOPIC 10
THE INTERNET
QUESTION 1
(a) Briefly describe the flowing terms in relation to computer networking
i. Intranet. .
ii. Extranet,
iii. Global system for mobile (GSM) communication.
iv. Bluetooth.
(b) Explain the role of interface message processor (IMP) in a computer network.
QUESTION 2
In relation to internet technology, briefly describe the importance of each of the following:
i. Web server.
ii. Web browser.
iii. HTML.
iv. Cyber cafe
QUESTION 3
Highlight four functions of an internet service provider (ISP)
QUESTION 4
(a) Describe the following e-commerce terms:
(b) Highlight four social-economic challenges brought about by the rapid advancements in
internet technology.
(c) "The practice of telecommuting has ensured that there exists a thin line between work,,
family and leisure". In relation to the above statement, evaluate the merits and demerits of
telecommuting.
QUESTION 5
Describe three resources which are necessary for connecting a computer to the internet.
QUESTION 6
Highlight four factors that determine the downloading speed of a We from a website
QUESTION 7
a) (i) Highlight three roles of internet service providers (ISP).
(ii) State three examples of internet service providers in your country.
QUESTION 8
Explain four benefits of e-government.
QUESTION 9
Briefly explain the meaning of the following terms as used in the context of information sharing:
(i) Bandwidth.
(ii) Browsing.
(iii) User net newsgroup.
(iv) File transfer protocol.
QUESTION 10
The information and connectivity of the internet have unique characteristics.
Briefly explain four such characteristics.
QUESTION 11
You were recently employed by an internet service provider (ISP) company. Part of your work
involves training of users on internet applications
A new client has requested your company to conduct a research on internet applications and the
impact of the internet on people and society training programme. Your supervisor has assigned
you this task
Required
i) Outline five applications of the internet
ii) Briefly explain three impacts of internet on people as individuals and three impacts of
internet in society.
QUESTION 12
Electronic mail (e-mail) is one of the main applications of the internet.
QUESTION 13
Examine the key factors which are essential to the success of a business to business (B2B) e-
commerce model.
QUESTION 14
The internet provides an array of capabilities for electronic communication that can help
companies reduce their communication costs.
Required:
Describe five internet services that could be used by companies for communication.
TOPIC 11
QUESTION 2
Office automation and advancement in information communication technology are likely to have
a major impact on business efficiency and the working life of employees;-
SUGGESTED SOLUTIONS
TOPIC 1
INTRODUCTION TO ICT
QUESTION 1
i. The definition of computerization involves the process of taking activities or tasks not
previously done on the computer and shifting them to being done on the computer.
QUESTION 2
a) Demerits of computerisation
Unemployment
Different tasks are performed automatically by using computers. It reduces the need of people
and increases unemployment in society.
Many people use computers without positive purpose. They play games and chat for a long
period of time. It causes wastage of time and energy. Young generation is now spending a lot of
time on the social media websites like Facebook, Twitter etc or texting their friends all night
through smartphones which is bad for both studies and their health. And it also has adverse
effects on the social life.
Data Security
The data stored on a computer can be accessed by unauthorized persons through networks. It has
created serious problems for the data security.
Computer Crimes
People use the computer for negative activities. They hack the credit card numbers of the people
and misuse them or they can steal important data from big organizations.
Privacy violation
The computers are used to store personal data of the people. The privacy of a person can be
violated if the personal and confidential records are not protected properly.
Health risks
The improper and prolonged use of computer can results in injuries or disorders of hands, wrists,
elbows, eyes, necks and back. The users can avoid health risks by using the computer in proper
position. They must also take regular breaks while using the computer for longer period of time.
It is recommended to take a couple of minutes break after 30 minutes of computer usage.
Impact on Environment
The computer manufacturing processes and computer waste are polluting the environment. The
wasted parts of computer can release dangerous toxic materials. Green computer is a method to
reduce tire electricity consumed and environmental waste generated when using a computer. It
includes recycling and regulating manufacturing processes. The used computers must be donated
or disposed off properly.
Typing
By scanning
Using voice recognition software
Using digital cameras
Using a Barcode readers
QUESTION 3
Products and services: It improves the quality of products and services being rendered and
reduces cost of product and services,
Production economics; Speed up the production process because there is minimal time spent on
production reduces the wastage of raw materials.
Buyers; They are able to acquire knowledge of prices of products being offered by various
sellers hence enabling them to choose the most suitable product for their consumption in terms of
prices and quantity. Provides quick and convenient services to the buyers.
Suppliers: Due to introduction of Information Technology suppliers are now able to table out
the products offered and quoting the prices of each products in their website hence reducing the
cost of advertising in media and other sources interaction is enhanced between suppliers and
improves competition.
Substitute products: One is able to obtain the knowledge of how substitute products is doing in
the market and evaluate most appropriate time to deliver the substitute product in the market.
Competitors: They are able to understand the activities of their competitors through their
websites as product prices hence coming up with a well-planned strategy that will outdo their
competitors in terms of profit or demand by the consumers. «•
QUESTION 4
Data base approach. Single organised collection of structured data, stored within a minimum
duplicated data so as to provide a consistent control pool of data.
Conventional approach
Advantage
Disadvantages
Advantages
Ease in auditing
Disadvantages
End User Computing (EUC) refers to systems in which non-programmers can create working
applications. EUC is a group of approaches to computing that aim at better integrating end users
into the computing environment
Advantages
Disadvantage
May not be applicable if the non-programmers do not have the programming knowledge
Advantages
Disadvantages
QUESTION 5
Word processors: Write letters, reports, minutes, memos etc. e.g. MS Word
Presentation software: Making presentations either directly using a computer screen or data
projector etc. e.g MS PowerPoint.
Spread sheets: calculations, forecast models, graphs, analyse financial information e.g.
Microsoft Excel
Database management software: Managing data in many forms e.g. MS Access, Oracle,
Microsoft SQL Server
Desktop publishing: producing magazines, newsletters etc. e.g. Microsoft Publisher, Quark
Express.
Graphics software: Creating or editing images such as logos, drawings and picture used in
website or publications, develop graphs, illustration and drawings etc.' e.g. Adobe Photoshop and
Illustrator, Corel draw, Macromedia Freehand etc.
Computer Aided Design (CAD) is the use of computers to assist the design process.-Specialized
CAD programs for many types of design: architectural, engineering, electronics, roadways
Accounting application
Customer Relations Management (CRM) Application CRM software allows businesses to better
understand their customers by collecting and analyzing data on them as their product
preferences, buying habits etc. e.g. software applications that run
Internal networks
Usually referred to as a local area network (LAN) and it is a network in which computers and
peripheral devices are in close physical proximity. It is a collection of computers within a single
office or building that connect to a common electronic connection - commonly known as a
network backbone. This type of network typically uses microcomputers in a bus organization
linked with telephone, coaxial, or fibre-optic cable. A LAN allows all users to share hardware,
software and data on the network. Minicomputers, mainframes or optical disk storage
External networks
Also referred to Wide Area Network (WAN), A WAN is a computer network that may be
countrywide or worldwide. It normally connects networks over a large physical area, such as in
different buildings, towns or even countries. The widest of all WANs is the Internet, which spans
the entire globs,
QUESTION 6
Downsizing is the creation of systems on a smaller platform than before. Although the term is
used very loosely, it essentially implies migration of a system or a set of systems from a
mainframe or minicomputer to a minicomputer or PC network respectively. This means that
downsizing is culturally in line with the business trend towards flatter, leaner organization.
QUESTION 7
TOPIC 2
COMPUTER SYSTEMS
QUESTION 1
i. Input devices - components used for entry of data into the computer system such as
online terminals, scanners, plotters etc.
ii. Output devices - components used for display/output of processed data from the
computer system. These devices include VDU and printers
iii. Communication devices - components used for transmitting data between computers and
other electronic devices. They include such devises as modems
iv. Processing devices- components used to process data input into the system and transform
it into information. The CPU is the main processing component, which contains the ALU,
Control Unit and Registers. Primary memory can also be classified as a processing
component
v. Storage devices — components used for secondary storage of information such as tapes,
discs, CCD-ROMs, DVDs
QUESTION 2
1. RAM (Random Access Memory) /RWM (Read Write Memory) - Also referred to as
main memory, primary storage or internal memory. Its content can be read and can be
changed and is the working area for the user. It is used to hold programs and data during
processing. RAM chips are volatile, that is, they lose their contents if power is disrupted.
Typical sizes of RAM include 32MB, 64MB, 128MB, 256MB and 512MB.
c. SDRAM - Synchronous
2. ROM (Read Only Memory) - Its contents can only be read and cannot be changed. ROM
chips is non-volatile, so the contents aren’t lost if the power is disrupted. ROM provides
permanent storage for unchanging data & instructions, such as data from the computer
maker. It is used to hold instructions for starting the computer called the bootstrap
program.
ROM; chips, the contents, or combination of electrical circuit states, are set by the
manufacturer and cannot be changed. States are permanently manufactured into the chip.
PROM; the settings must be programmed into the chip. After they are programmed,
PROM behaves like ROM - the circuit states can’t be changed. PROM is used when
instructions will be permanent but they aren’t produced in large enough quantities to
make custom chip production (as in ROM) cost effective. PROM chips are, for example,
used to' store video game instructions.
QUESTION 3
(a) (i) Specific technological developments in each of the five computer generations.
Employ Large Scale Integrated (LSI) and Very Large-Scale Integrated (VLSI) circuit
technology to construct computers. Over 1,000 components can be placed on a single
integrated-circuit chip.
Microprocessor
Storage devices
Integrated Circuit
QUESTION 4
i) HDD.-Hard Disk.Drive
QUESTION 5
QUESTION 6
QUESTION 7
DVD-R: Can write to a blank disc once and cannot be re-written. It is compatible with
most DVD players
DVD-RW: Can be written and rewritten and is compatible with most DVD players
DVD+RW: Can be written and rewritten to.
(ii) Since the cache memory cannot be increased, he can increase the size of RAM which
increases the size of the virtual memory.
QUESTION 8
- Keyboard on a laptop: The laptop’s keyboard is built into the body of the laptop unlike a
desktop where the keyboard is separate. It is smaller and the keys are closer together.
- Touchpad: laptops don’t have a mouse. They have a touch sensitive rectangular area in
front of the keyboard. One moves the fingers across the touch pad which causes the
cursor to move across the screen.
- Click button: There are two clickable buttons beneath or beside the laptop’s touchpad
which act like mouse buttons
- Audio and video cables: These are cables which connect the laptop and the projector
during presentation
- Projector and remote control;- The projector will project a video signal from the laptop.
- Remote control:- This is used to power the projector on and off and also used to navigate
through the various slides of the presentation
- Power Cords and power adapters which connects the projector and the laptop to the
power source .
QUESTION 9
a) Computer types
i) Supercomputers.
Supercomputers using custom CPUs traditionally gained their speed over conventional
computers through the use of innovative designs that allow them to perform many tasks in
parallel, as well as complex detail engineering.
They tend to be specialized for certain types of computation, usually numerical calculations, and
perform poorly at more general computing tasks. Their memory hierarchy is very carefully
designed to ensure the processor is kept fed with data and instructions at all times - in fact, much
of the performance difference between slower computers and supercomputers is due to the
memory hierarchy. Their 110 systems tend to be designed to support high bandwidth, with
latency less of an issue, because supercomputers are not used for transaction processing
The largest and most powerful. Used to process large amounts of data very quickly. Useful for
metrological or astronomical applications. Examples include Cray and Fujitsu
Large computers in terms of price, power and size. Require a carefully controlled environment
and specialist staff to operate them used for centralized processing for large commercial
organizations. Manufacturers include International Business Machine (IBM).
iii) Minicomputers.
Their size, speed and capabilities lie somewhere between mainframes and microcomputers. Used
as departmental computers in large organizations or as the main computer in medium-sized
organizations
Manufacturers of mini computers include IBM and International Computer Limited (ICL).
Is a single computer bus that connects the major components of a computer system. The
technique was developed to reduce costs and improve modularity. It combines the functions of a
data bus to carry information, an address bus to determine where it should be sent, and a control
bus to determine its operation
(ii) Motherboard
Is the central printed circuit board (PCB) in many modern computers and holds many of the
crucial components of the system, providing connectors for other peripherals. The motherboard
is sometimes known as the main, board, system board, or, on Apple computers, the logic board.
Is an expansion card which generates output images to a display. Most video cards offer various
functions such as accelerated rendering of 3D scenes and 2D graphics, MPEG-2/MPEG-4
decoding, TV output, or the ability to connect multiple monitors (multi-monitor).
QUESTION 10
A complete, working computer. Computer systems will include the computer along with any
software and peripheral devices that are necessary to make the computer function. Every
computer system, for example, requires an operating system.
QUESTION 11
Meaning of the specification “Pentium IV 3.0 GHZ, 1GB RAM, 150 GB HD and 17"TFT
Monitor”
TOPIC 3
COMPUTER HARDWARE
QUESTION 1
(a) Best specifications for the following hardware
i. RAM
RAM (Random Access Memory) /RWM (Read Write Memory) - Also referred to as main memory,
primary storage or internal memory. Its content can be read, and can be changed and is the working area
for the user. It is used to hold programs and data during processing. RAM ■ chips are volatile, that is,
they loose their contents if power is disrupted. Typical sizes of RAM include 32MB, 64MB, 128MB,
256MB and 512MB.
a) EDO - Extended Data Out
b) DRAM - Dynamic RAM
c) SDRAM – Synchronous
ii. Processor
Front end communication processors
Are the hardware devices that connect all network communication lines to a central computer to relieve
the central computer from performing network control, format conversion and message handling tasks.
(b) Items of commercial software that would be required to accomplish the tasks described
above
i. A camcorder (formally a video camera recorder) is an electronic device that combines a video
camera and a video recorder into one unit; typically for out-of-studio consumer video
recording.
ii. A portable media player (PMP), or digital audio player (DAP), is a consumer electronics
device that is capable of storing and playing digital media such as audio, images, video,
documents, etc. the data is typically stored on a hard drive, microdrive, or flash memory
iii. A webcam is a video camera that feeds its image in real time to a cpmputer or computer
network.
iv. A game controller is a device used with games or entertainment systems to provide input to a
video game, typically to control an object or character, in the game.
v. A gamepad (also called joypad or control pad), is a type of game controller held in two hands,
where the fingers (especially, thumbs) are used to provide input,
vi. A paddle is a game controller with a round wheel and one or more fire buttons, where the
wheel is typically used to control movement of the player object along one axis of the video
screen
QUESTION 2
a) Primary storage, also known as main storage or memory, is the main area in a computer in
which data is stored for quick access by the computer's processor.
QUESTION 3
i. Intel © Core (TM) is 650 3.20 GHz -processing speed of the computer
ii. 2.00GB (1.87 GB usabIe)-Memory capacity of the hardware
iii. TFT 17” Lenovo. — It is and LCD panel that applies a voltage across an LCD material
changes the alignment and light-polarising properties of its molecules so that they can be
used in conjunction with polarising filters to create an electronic shutter that will either
let 1 ight pass or stop it passing. Thus, the LCD display works by allowing different
amounts of white backlight through an active filter:
QUESTION 4
Optical storage is any storage method in which data is written and read with a laser for archival
or backup purposes. Typically, data is written to optical media, such as CDs and DVDs. For
several years, proponents have spoken of optical storage as a near-future replacement for both
hard drives in personal computers and tape backup in mass storage.
Optical media is more durable than tape and less vulnerable to environmental conditions. On the
other hand, It tends to be slower than typical hard drive speeds, and to offer lower storage
capacities.
CD-ROM
CD-ROM is a read-only format that is optimized for read performance, CD-ROMs are ideal for
wide- scale distribution of programs and data. The CD-ROM data format is identical to the one
that is used with personal computers. This makes it possible to develop CD-ROMs for use in
both personal computers and the system. You can read CD-ROMs in either a CD-ROM or DVD
drive.
DVD-ROM
DVD-ROM is a read-only format that provides a higher capacity than CD-ROM. Like CD-ROM,
DVD-ROMs are excellent for wide-scale distribution of programs and data. You can only read
DVD-
DVD-RAM
DVD-RAM' is writable optical media that is available in both double-sided (Type I) and single-
sided (Type II) formats, ranging from 2.6 GB per cartridge to 9.4 GB per cartridge, Both types
can be accessed in a RAM drive, and Type II media can be read in a DVD-ROM drive when the
media is removed from the catridge.
WORM storage is an economical way to archive data, yet still have it quickly and easily
accessible. WORM media is available in lx (650 MB), 2x (1.3 GB), 4x (2.6 GB), 8x (5.2 GB),
and 14x (9.1 GB or 8.6 GB) capacities. It is also available in 30 GB Ultra Density Optical
(UDO).
An erasable cartridge offers the most flexibility with similar capabilities as magnetic storage.
Erasable media is available in lx (650 MB), 2x (1.3 GB), 4x (2.6 GB), 8x (5.2 GB), and 14x (9.1
GB or 8.6 GB) capacities. It is also available in 30 GB Ultra Density Optical (UDO).
QUESTION 5
Speaker
T.V Monitor
Teleprompter
Headsets/Headphones
Lapel mics
Talk back system
QUESTION 6
QUESTION 7
Speakers: They are used to produce sound being communicated to the people connected in the
conference.
Fast hence time saving i.e. use of video conferencing instead of travelling to meetings.
Cost saving: Organizations today have eliminated the administration cost such as stationery cost,
hiring halls where the conferences are to be held, travelling cost etc.
i. Video graphic array splitter: hardware devices that allows you to display computers
video signal enabled with VGA
ii. System unit: The system unit houses the processing components of the computer
system.
iii. Universal serial bus port: is a serial communication physical interface through which
information transferring or out one bit at a time
QUESTION 8
i. Mutability: It is the ability of a computer memory to read and write storage and comes in
the form of immutable and mutable memory types. Mutable storage can be overwritten
more than once and it is used for both secondary and primary storage e.g. ROM
ii. Accessibility: Found in both random access forms and sequential forms, hr random
access storage can be accessed in any location in about the same amount of time.
Sequential memory is slower and information is gathered and accessed in serial order.
Usually this type may be seen commonly with offline storage
iii. Addressability: This has three forms which are location, file and content. Location is
done by numerical memory address usually limited to primary storage and accessed
internally. File is done by file names with human readability. Content addressability
concerns itself with a selected hash value a short identifier with a number that point to the
memory, address for information
iv. Volatility: This is the frequency with which records are added to the file or deleted from
it. If the frequency is high, the file, is said to'be volatile. A file that is not altered is
“static”. If frequency is low, the file is said to be “semi-static”. .
QUESTION 9
(i) Random access memory: (RAM)-is a volatile memory and holds-data as long as the
power is on hence used as a temporary storage when inputting data
(ii) Read only memory:-ROM refers to a storage that can only be read from but not
written to or altered hence used to store valuable information to safeguard against
overwriting or deletion.
Modem: Converts data from digital form for the sending computer and also from analogue to
digital for the receiving computer
Serial processing is the processing that occurs sequentially, each process occurs one at a time
while parallel processing is the ability to carry out multiple operations or tasks simultaneously.
- Secondary storage enables the data to be easily transported from one place to another
- Easily affordable and hence can be accessed by many people as compared to the main
memory which is very expensive
- They can be of high security when stored to secondary storage because it is not accessible
to all people
QUESTION 10
Dot matrix printers: Form characters from a matrix of dots produced by columns of pins in the
printing heard.
Ink Jet Printers. Print one character at a time,They form characters on paper by spraying in
from the tiny nozzles through an electrical field that arranges them to form characters on paper.
Band Printers. They utilize horizontal relating band containing characters and few harmers. The
characters are stripped by the hammer situated below the paper and the ribbon to create a line of
print.
Drum printers: Has a complex set of character engraved around circumference of each of the
printing position of the dram. The number of printing position across the drum equals the number
of position available across the page.
QUESTION 11
There are many types of computer keyboards. For instance, multimedia computer keyboard,
membrane computer keyboard, slim computer keyboard, etc... Different standards, different
results. We list the common classification of computer keyboards here.
These keyboards are usually used with PC, not mobile device.
Membrane keyboard are most popular because of its low price and high quality, takes up more
than 50% market. Scissor-switch is the next star. The latest apple wireless keyboard is scissor
switch keyboard.
Classification by size
Standard keyboards are used with PC, laptop-size keyboard come with laptop, not sale alone.
Thumb- size keyboard are small enough to be carried to anywhere.
Some types of computer keyboards are hard to classify. We list them here: compact keyboard,
mini keyboard, slim keyboard..
QUESTION 12
QUESTION 13
The term workstation has also been used to refer to a mainframe computer terminal or a PC
connected to a network, '
A server is a physical computer (a computer hardware system) dedicated to running one or more,
services (as a host), to serve the-needs of the-users of other computers #n the network.
Depending on the computing service that it offers it could be a database server, file server, mail
server, print server, web server, gaming server, or some other kind of server.
Light pen;- Is a computer input device in the form of a light-sensitive wand used in conjunction
with a.computer's CRT display. It allows the user to point to displayed objects or draw on the
screen in a similar way to a touch_screen but with greater positional accuracy.
Digitizer: This device for converting analogue signals into digital signals.
- Secondary storage enables the data to be easily transported from one place to another
- Easily affordable and hence can be accessed by many people as compared to the main
memory which is very expensive
- They can be of high security when stored to secondary storage because it is not accessible
to all people
- Can be used to back up data.
QUESTION 14
Keyboard: Keyboard is an input device that is used to give the input to the computer to process it
Mouse: Mouse is a pointing device that detects the motion of the mouse ball with the surface
Monitor or VDU: Monitor is a type of hardware device that is used to display the video signals
Motherboard: Motherboard is the hardware component inside the computer that provides the
platform for many devices such as RAM, hard disk, peripheral devices, PC cards and controllers.
Processor: Processor is the heart of the computer that processes the instructions that are given by
the user.
Memory Card (RAM): It is the physical memory inside the computer and it stores the data
temporarily.RAM is used by the processor and other devices to store the data temporarily. There
are two basic format memory cards of RAM namely SIMM and DIMM.
Video Card: Video card is an important component and it controls the display of the computer
screen.
Sound Card: Sound card enables the computer to output the sound to the audio devices. Today
most of the computer systems have built in sound circuits in the motherboards.
Modem: Modem is a communication device that connects the computer with the internet.. There
are two types of modems internal and external.
Hard Disk: Hard disk is a storage device inside the computer. The common types of the hard
disks include IDE and SCSI. Hard disk
QUESTION 15
(i) Serial port is a serial communication physical interface through which information
transfers in or out one bit at a time
(ii) Parallel port is a type of interface for connecting various peripherals. That is, several
bits sent simultaneously over separate wires.
QUESTION 16
(i) Processor Speed: The faster the processor speed the more powerful the computer
(ii) Bus Width or Path: The larger the bandwidth, the more the instructions it can hold and
thus faster processing power •
(iii)Processor Instruction's "Set: The higher the instruction set the faster the computer
processing power'
(iv) Cache Memory': The higher the cache memory, the more the virtual memory and thus the
more powerful the computer is
(v) Bus Speed: The higher the speed the more powerful computer is
QUESTION 17
Impact printers provide images that are relatively of poor quality, while non-
impact have high quality images and printouts
Impact printers print by the printing head element coming into contact with the
stationery against an ink ribbon while non-impact printers use thermal and laser
technology to print
Impact printers are less costly compared to non-impact printers which are
expensive
Impact printers are slow while the non-impact are fast
ii) An invoice has to be clear and properly visible. The organization should use non-impact
printer such Inkjet or LaserJet since they have excellent image quality.
TOPIC 4
COMPUTER SOFTWARE
QUESTION 1
i. Linux Mint II. - It’s in an operating system. Linux Mint is aimed at being a "modern,
elegant' and comfortable operating system which is both powerful and easy to use." Mint
provides full out-of-the-box multimedia support by including some proprietary software such as
Java and Adobe Flash. Mint's motto is "from freedom came elegance,
ii. Libre Office Impress- It’s a free and open source office suite. The LibreOffice suite
comprises programs to do word processing, spreadsheets, slideshows, diagrams, maintain
databases, and compose math formulae. It is designed to. be compatible with other major office
suites, including Microsoft Office, though some Microsoft Office layout features and formatting
attributes are handled differently or are unsupported.
QUESTION 2
System software consists of programs that control operations of the computer and enable user to
make efficient use of computers. They coordinate computer activities and optimize use of
computers. They are used to control the computer and develop and run application programs
examples of jobs done by the system software are management of computer resources,
defragmentation etc.
Application software are programs for user to do their jobs e.g. typing, recording keeping,
production of financial statements, drawing, and statistics.
QUESTION 3
These are system programs that provide a useful service to the user of the computer by providing
facilities for common tasks of a routine nature.
- Sort utilities: They are used to re-arrange file records in a specified sequence i.e.
numerically, alphabetically or chronologically
- Copy utility: Used to copy data from one media to another
- Tracing and debugging utilities.
- File maintenance
- Suitability: How suitable does it fit refitufements and how closely does it match the existing
procedure of the organization where relevant
- Configuration: What memory and peripherals are required to implement the desired features
and how portable will the system be in any future be in any future change of hardware
- Interface: How closely will the software link with systems which currently exists within an
organization
- System trials: If possible the programmes should be run through to access the timing
operating procedures, accuracy and performance etc.
QUESTION 4
Is a language in which a computer, actually does its processing it uses binary numbers i.e. series
of (0 and I)
Advantages Disadvantages
- Less time is spent during execution - They are machine dependant hence not portable
process since they do not require i.e. programmes depend on the processor chip.
translators.
- Machine- language programmes are error prone
- Programmes written in machine language due to use of binary system.
are secured since they are difficult to
alter. - Programmes written in machine language are
- Programmes written in machine language difficult to debug and understand.
occupy less storage space.
QUESTION 5
— Application Layer
— Transport Layer
Makes sure data is exchanged reliably between the two end systems
Needs to know how to identify the remote system and package the data properly
Makes sure data is exchanged reliably into and out of the computer.
Concerns the physical connection to the network and transfer of information across this
connection
Software here depends on physical medium used
QUESTION 6
- Word processing - Create, edit and print text documents. E.g. MS Word, Word Perfect.
- Spreadsheets - Provide a wide range of built-in functions for statistical, logical, financial,
database, graphics, data and time calculations. E.g. Lotus 1-2-3, Excel, Quattro Pro.
QUESTION 7
These are system programs that provide a useful service to the user of the computer by providing
facilities for common tasks of a routine nature. Common types of utility programs, are sort
utilities, editors, file copying, dumping, file maintenance and tracing and debugging utilities.
- Web utilities: These are programs that work with' a browser to increase your speed,
productivity and capabilities
- Backup Utilities: Backup utility is a data backup tool used to cepy all the information
when needed, for example in the problem of disk failure or corruption. Such utilities are
Netback up, Norton Ghost, Windows Home Server Computer Backup are a few examples
of software backup utilities.
- Antivirus Software: Is software that allows you to eliminate the threat of viruses on your
computer. There are many antivirus tools available on the market such as Kaspersky,
McAfee, Norton Antivirus, Windows Live OneCare, ESET NOD32, Ad-Aware Pro are
some examples of Antivirus Software.
- System Profiler:- System Profiler works to provide users with clear information about
the applications installed and also that connect hardware devices to the system. Local
SekChek, Belarc, HwiNF032, Lavalys EVEREST Ultimate Edition, CPU Speed and
Sisoft Sandra Pro are some examples of System Profiler
QUESTION 8
Features of computer software which would be suitable for Mr Charles Midika’s bureau
i) Compatibility of the software: how the software integrates with other software particularly
the operating system and the user programs
ii) Requirements of the user: the selected software or package should fit user requirement as
closely as possible
Processing time: these involves the response time e.g. if the response time is slow the user
might consider the software or package as unsuccessful ^
iii) Controls: the software should have in-built controls which may include password options,
validation checks, audit trails or trace facilities etc
QUESTION 9
1. 4GLs are non-procedural and as such, program functions are not produced by the user but
the 4GL itself. Users simply request for the data processing result or output instead of
providing the detail physical and logic used. This helps to come up with applications
more quickly and cheaply with minimal errors. This aspect is critical in the case of
program development and results to increased programmers productivity.
2. 4GLs are problem oriented in that programs are designed to solve particular problems
using English like structures. Being problem oriented makes the language more
productive to specific applications. This is vital in the case of information system
development since it ensures quality and productivity of applications developed.
3. 4GLs enhance user creativity and productivity. Unlike procedural languages, 4GL tends
to promote user computing spirit and skills. User acceptance acknowledgement and
understanding will enhance reduction of technophobia: thus more quality and reliable
systems.
4. The system maintenance and flexibility is enhanced. 4GL facilitate a continuous process
of application development. The rigid requirement and the technical requirement
involved in system development life cycle is reduced. Change in user requirements can
always be incorporated in the systems design from time to time.
5. 4GLs enhance end user computing and so limiting the use of IT staff.
6. They help the organisation to top over creativity thus new information systems I will be
of higher quality.
7. 4GLs help in the diffusion of information technology throughout the organisation.
TOPIC 5
INTRODUCTION TO OPERATING SYSTEMS
QUESTION 1
i. Unguided media.
The unguided media is the wireless media. It simply transports electromagnetic waves without
using any physical conductor. Signals are normally broadcast through the air and thus are
available to anyone who has the device capable of receiving them. Unguided signals can be
travelled from source to the destination in several ways. These ways include ground propagation,
sky propagation and line of sight propagation,
ii. Router.
A router is a device that forwards data packets between computer networks, creating an overlay
internetwork. A router is connected to two or more data lines from different networks. When a
data packet comes in one of the lines, the router reads the address information in the packet to
determine its ultimate destination. Then, using information in its routing table or routing policy,
it directs the packet to the next network on its journey, Routers perform the "traffic directing"
functions on the Internet. A data packet is typically forwarded from one router to another through
the networks that constitute the internetwork until it reaches its destination node.
A network interface card (NIC) is a computer circuit board or card that is installed in a computer
so that it can be connected to a network. Personal computers and workstations on a local area
network (LAN) typically contain a network interface card specifically designed for the LAN
transmission technology, such as Ethernet or token ring. Network interface cards provide a
dedicated, full-time connection to a network. Most home and portable computers connect to the
Internet through as- needed dial-up connection. The modem provides the connection interface to
the Internet service provider.
A hot spot is a site that offers Internet access over a wireless local area network (WLAN)
through the use of a router connected to a link to an Internet service provider. Hotspots typically
use Wi-Fi technology. Hotspots may be found in coffee shops and various other public
establishments in many developed urban areas throughout the world
v. Wi-Fi
It is a popular technology that allows an electronic device to exchange data or connect to the
internet wirelessly using radio waves. A device that can use Wi-Fi (such as a personal computer,
video-game console, smartphone, digital camera, tablet or digital audio player) can connect to a
network resource such as the Internet via a wireless network access point. Such an access point
(or hotspot) has a range of about 20 meters (65 feet) indoors and a greater range outdoors.
Hotspot coverage can comprise an area as small as a single room with walls that block radio
waves or as large as many square miles — this is achieved by using multiple overlapping access
points.
CPU
There are two CPU brands that you need to choose from: Intel or AMD. Intel CPUs are more
expensive, but deliver on performance and reliability. AMD microprocessors are, cheaper, but
aren't as fast and generally heat up quicldy-thus the need for additional cooling systems when
overclocking.
RAM
The more the RAM is always better, but if you're using the 32-bit Windows 7, anything above
4GB is useless. In fact, if you're using Windows 7 Starter, the limit is only 2GB. If you want a
good gaming or media rig, don't go lower than 8GB, as long as your budget permits it.
Storage capacity
If you plan on using the computer for video or picture editing, don’t go anywhere lower than
1TB, but otherwise, 500GB is good for desktops, while 250GB should be ample for laptops.
If you want drastic speed gains then look into solid-state hard drives, but beware their price.
Video card
If you won't do any major gaming or video editing on the computer, then you-'ll manage with
integrated graphics, which are still capable of handling Window 7's visual effects and any HD
video. If you're editing giant-sized textures, then you need discrete video cards, which come in
low, medium and high-end flavours.
Optical media
If you plan on putting together a Blu-ray library and use the computer as your media centre Then
you'll need a Blu-ray drive. Otherwise, stick with your standard DVD drive.
QUESTION 2
In a computer operating system, multitasking is allowing a user to perform more than one
computer task (such as the operation of gg application program) at a time. The operating system
is able to keep track of where you are in these tasks and go from one to the other without losing
information. Microsoft Windows 2000, IBM's OS/390, and Linux are examples of operating
systems that can do multitasking (almost all of today's operating systems can). When you open
your Web browser and then open word at the same time, you are causing the operating system to
do multitasking.
Single tasking operating system is an operating system is designed to manage the computer so
that one user can effectively do one thing at a time. The Palm OS for Palm handheld computers
is a good example of a modern single-user, single-task operating system.
The difference between cold boot and warm boot of your computer's operating system are
different methods of restarting your personal computer. A warm boot is a reboot with the
computer power placed in the on position. A cold boot is a reboot with the computer power being
off. A cold boot is better because it completes the boot-up sequence. Having had the power off,
your computer has cleaned out
QUESTION 3
Difference between
Closed source operating systems are those that are developed in house by the user and they are
not common whereas open source operating systems are those systems that have already been
developed and are ready to use.
After an initial round of j-n-house testing, software publishers often release new programs to be
tested by the public. These pre-release versions are called beta software .
Integrated software is software for personal computers that combines the most commonly used
functions of many productivity software programs
QUESTION 4
a) How operating systems creates an impression of doing several jobs at the same time
b) i) Define the term : “real time processing system” A real-time operating system is an
operating system that guarantees a certain capability within a specified time constraint. A key
characteristic of an RTOS is the level of its consistency concerning the amount of time it takes to
accept and complete an application task,
Anti-missile defense systems, airplane landing control system, flight simulation systems,
electronic fund transfer systems, and tickets reservation systems.
QUESTION 5
Basic Input/output system is a chip located on all motherboards that contain instructions and
setup for how your system should boot and how it operates.
The BIOS includes instructions on how to load basic computer hardware and includes a test
referred to as a POST (Power On Self Test) that helps verify the computer meets requirements to
boot up properly. If the computer does not pass the POST, you will receive a combination of
beeps indicating what is malfunctioning within the computer.
In most PCs, the BIOS has 4 main features or functions as mentioned below.
1. POST - Test the computer hardware and make no errors exist before loading the
operating system. Additional information on the POST can be found on our POST and
Beep Codes page
2. Bootstrap Loader - Locate the operating system. If a capable operating system is located,
the BIOS will pass control to it.
3. BIOS drivers - Low level drivers that give the computer basic operational control over
your computer's hardware.
4. BIOS or CMOS Setup - Configuration program that allows you to configure hardware
settings including system settings such as computer passwords, time, and date.
QUESTION 6
Through the use of passwords and file attributes the operating system prevent unauthorised
user/access to computer files.
The server’s operating system has an event log file that keeps an record of all event that took
place in a computer systems.
Job scheduling
In multi user multi programming systems the computer usually has several job to execute at any
one time for effective comparison of the results.
The operating system handle operator’s errors by reporting the errors and promoting how errors
can be solved.
The operating system allows loading of programmes into the main memory for the hard disk
drive so that the programme can be extended.
QUESTION 7
2) Operating system 2
3) Macintosh
4) Windows NT server
ii) technical feasibility to ensure that the organisation has sufficient hardware, software
and personnel resources to develop and support the proposed system.
iii) Operational feasibility the willingness and ability of management users the proposed
information.
iv) Evaluating the systems staffs in the organisation to build and use the proposed
systems.
v) Identifying the size and complexity of the new system and the .skills and
availability of user and information system staff.
vi) Identifying the potential risk to the organisation in developing the system.
QUESTION 8
The operating system uses device drive to control the operations of storage devices.
The operating system allocates processor time to the tasks executed in the main memory
Interrupt handling
An interrupt is an event that alters the sequence in which a computer can execute instructions.
An output is usually generated by computer hardware.
Job scheduling
In multi user multi programming system the computer usually has several jobs to execute at any
one time for effective companion of the results.
They are commonly put in a queue which creates and maintained by t^e operating system.
All computers have limited memory space and the operating system controls the usage of the
memory space to ensure that it is optimized. The operating system takes some of the space and
most of the reminder is taken up by the operating programme.
The operating system manager’s input/output devices by maintaining controlled input or output
processing some memories space is allocated for input data while some location hold data
received from particular input/output devices,
All affected users and organizations affected are notified of the implementation. Additionally, it
is good policy to make internal organizations not directly affected by the implementation aware
of the schedule so that allowances can be made for a disruption in the normal activities of that
section. The notification should include:
Typically, implementation includes converting existing data for use in the new system. The tasks
for this effort are two-fold: data input and data verification. When replacing a manual system,
hard copy data is entered into the automated system. Some sort of verification that the data is
being entered correctly should be conducted throughout this process. This is also the case in data
transfer, where data fields in the old system may have been entered inconsistently and therefore
affect the integrity of the new database. Verification of the old data becomes imperative to a
useful computer system.
One of the ways verification of both system operation and data integrity can be accomplished is
through parallel operations. Parallel operations consist of running the old process or system and
the new system simultaneously until the new system is certified. In this way if the new system
fails in any way, the operation can proceed on the old system while the bugs are worked out.
To ensure that the system is fully operational, install the system in a production environment.
During this phase, the documentation from all previous phases, is finalized to align it with the
Prior to the Operational Readiness Review, the Authority to Operate must be obtained and a
System of Record Notice published.
Final versions of the following documents are prepared during the Implementation Phase, and
are required before the project proceeds to the Operations and Maintenance Phase:
Business Product
Project Completion Report
Service Level Agreements (SLAs) and Memoranda of Understanding (MOU)
Monitoring activities
Controlling
Communication
Producing reports
Decision making
Updating records
Storage of records
Summarizing data
QUESTION 9
2. File Management: This includes physical storage location, file permission and file access.
Keeping track of all different files & maintaining the integrity data stored in the files
including file directory structure.
3. Device Management: Accept input and store data on disks and send data to output devices
5. Job Control: - When the user wants to run an application program, he must communicate
with the Operating System telling it what to do. He does this using Operating System job
control language or JCL. JCL consists of a number of Operating Systems commands, called
system commands that control the functioning of the Operating System.
QUESTION 10
Hardware functions: i.e. Accept input and store data on disks and send data to output
devices
Provide a user interface
Provide hardware independence
Manage system memory
Manage processing
Control access to system resources i.e.Protection against unauthorized access Logins and
passwords • Manage files
Physical storage location File permissions File access
QUESTION 11
A real-time operating system (RTOS) is an operating system that guarantees a certain capability
within a specified time constraint. A key characteristic of an RTOS is the level of its consistency
concerning the amount of time it takes to accept and complete-an application task.
A multi-user operating system is a computer operating system (OS) that allows concurrent access
by multiple users of a computer. These programs are often quite complicated and must be able to
properly manage the necessary tasks required by the different users connected to it.
QUESTION 12
A social media platform created and developed by an online community of developers that
members can build on and change for their specific purposes. Open source software is usually
developed as a public collaboration and made freely available.
Availability of source code where everybody has the right to modify. This means the
code can be implemented in other pieces of software and adapted to changing
environments. This enables the unlimited tuning and improvement of a software
product. It also makes it possible to port the code to new hardware, to adapt it to
changing conditions, and to reach a detailed understanding of how the system works.
Many people have access to the code and this means that there are a large number of
sources for support.
It is completely free i.e. it is free to use, free to distribute, and free to modify. To the
general public this means that they do not have to pay anything for the product.
The right to redistribute modifications and improvements to the code, and to reuse other
open source code, permits all the advantages due to the modifiability of the software to
be shared by large communities. This is usually the point that differentiates open source
software licences from "nearly free" ones.
QUESTION 13
(i) Define of an operating system: An operating system (OS) is a set of programs that
manage computer hardware resources and provide common services for application software.
The operating system is the most important type of system software in a computer system. A
user cannot run an application program on the computer without an operating system, unless the
application program is self-booting
The operating system uses device drive to control the operations of storage de vices.
The operating system allocates processor time to the tasks executed in the main memory
Interrupt handling
An interrupt is an event that alters the sequence in which a computer can execute instructions.
An output is usually generated bf computer hardware.
Job scheduling
In multi user multi programming system the computer usually has several jobs to execute at any
one-time for effective companion of the results.
They are commonly put in a queue which creates and maintained by the operating system.
All computers have limited memory space and the operating system controls the usage of the
memory space to ensure that it is optimised. The operating system takes some of the space and
most of the reminder is taken up by the operating programme.
The operating system manager’s input/output devices by maintaining controlled input or output
processing some memories space is allocated for input data while some location hold data
received from particular input/output devices.
TOPIC 6
COMPUTER FILES
QUESTION I
i) Master file
A master file is a permanent file which holds relatively static data relating to things that exist
(entities) e.g. customer file, employee file. It usually contains important corporate data which can
be accessed sequentially or directly. They are usually multi-user files,
Transaction files are temporary files which hold data relating to events or activities e.g. payments
received, deposits and withdrawals. Their purpose is usually that if updating a master file. They
are usually accessed sequentially and normally are single-user files.
QUESTION 2
i, Sequential organization
■ Sequential files are accessed sequentially, one record after the next
* Suitable
o for master files in a batch processing environment o where a large percentage of records (high
hit-rate) ar€*to be accessed
* Not suitable for online access requiring a fast 'response as file needs to be accessed
sequentially -
In a hash file, records are not stored sequentially in a file instead a hash function is used to
calculate the address of the page in which the record is to be stored.
The field on which hash function is calculated is called as Hash field and if that field acts as the
key of the relation then it is called as Hash key. Records are randomly distributed in the file so it
is also called as Random or Direct files. Commonly some arithmetic function is applied to the
hash field so that records will be evenly distributed throughout the file.
QUESTION 3
Hashed
In hashed files each new record is placed at the record number calculated by the hash function,
the record is then stored in that calculated slot. This method should be used for RMS files that
are static in nature and in which few additions and deletions of records need to be made.
Sequential
In sequential files, each new record is placed at the end of the file in the first unoccupied slot.
Sequential files are not typically used for data entry files but are used as temporary work files for
programs.
Indexed
Indexed files are often referred to as ISAM (indexed sequential access method) files. Each new
record is placed at the end of the file in the first unoccupied slot. The value of the record's
primary key and the record's location are then added to the RMS index file. In most cases,
indexed files are sufficient for data entry files and are the normal choice when creating RMS
definition files.
QUESTION 4
A well-managed, carefully arranged, files make it easy to obtain data for business
decisions in an organization.
It also provides the users with timely, accurate and relevant information.
It reduces costs, and there is flexibility in information processing.
QUESTION 5
QUESTION 6
(i) Master files: They are files that store fairly permanent information of long term
value to an organization and are used regularly in the organization key systems
e.g. stock master file
(ii) Transaction files: They had incoming data relating to business activity such as
sales purchases order etc.
(iii)Reference files: They contains reference data which is in frequently altered
(iv) Archive files: They contain information for long term storage e.g. details of
payment made • by customers over the past years
(v) Backup files: They store duplicated copies for existing operational files
(vi) Scratch files: They are files no longer needed in the systems
QUESTION 7
i) Serial: This is where records are arranged continuously one after the other in particular
sequence but in the order in which they come into the file.
ii) Sequential: Form the serial organisation since records are'arranged one after the other
but in the order of key field; Key field is a unique field in every record e.g. stock code.
iii) Random: Records are arranged anyhow with no particular order i.e. there is no
relationship between where and how a particular record is stored compared with other.
iv) Index Sequential: Records are arranged in a sequence of key field and additional feature
known as index that arouse for selective access. An index is particular portion where
records are stored in groups allowing by passing a group or records that are not required
in a particular process.
- Fast to access
- Instant retrieval and prompt action in the information
- Increase the speed of processing the file in case of low hit rate.
QUESTION 8
Aspects of file design that should be considered for a file in which performance has high
priority.
Growth
It is the increase or decrease in number of records in the file or it is the percentage increase
or decrease of records in relation to the existing records.
Volatility
This is the frequency with which records are added or deleted from the files.
Hit rate
QUESTION 9
QUESTION 10
Disk file systems are file systems which manage data on permanent storage devices. As magnetic
disks are the most common of such devices, most disk file systems are designed to perform well
in spite of the seek latencies inherent in such media.
Network File System (NFS) is a distributed file system protocol originally developed by Sun
Microsystems, in 1984, allowing a user on a client computer to access files over a network in a
manner similar to how local storage is accessed. NFS, like many other protocols, builds on the
Open Network Computing Remote Procedure Call (ONC RPC) system. The Network File
System is an open standard defined in RFCs, allowing anyone to implement the protocol.
A flash file system is a file system designed for storing files on flash memory devices. These are
becoming more prevalent as the number of mobile devices is increasing, the cost per memory
size decreases, and the capacity of flash memories increases.
A special file system is a system that presents non-file elements of an operating system as files
so they can be acted on using file system.
QUESTION 11
Describe the following methods of organizing computer files Computer file organization
- Line-sequential files are like sequential files, except that the records can contain only
characters as data.
- Line-sequential files are maintained by the native byte .stream files of the operating
system.
QUESTION 12
TOPIC 7
AN OVERVIEW OF APPLICATION PACKAGES
QUESTION 1
i) Types of application package from which the screenshots 1 to 4 have been captured.
ii) Describe the application of each of the packages identified in (i) above.
Screenshot 2- Writing tasks previously done on typewriters with considerable effort can now be
easily completed with word-processing software. Documents can be easily edited and formatted.
Revisions can be made by deleting (cutting), inserting, moving (cutting and pasting), and
copying data. Documents can be stored (saved) and opened again for revisions and/or printing.
Many styles and sizes of fonts are available to make the document attractive. Example: MS
Word, Word Pad
Screenshot 3- A database contains a list of information items that are similar in format and/or
nature. An example is a phone book that lists a name, address, and phone number for each entry.
Once stored in a database, information can be retrieved in several ways, using reports and
queries. For example, all the names listed for a given area code could be printed out and used for
a commercial mailing to that area. Examples of database software include Ms Access, Dbase,
Oracle etc.
Screenshot 4- It allows users to create visual presentation A speaker may use presentation
software to organize a slide show for an audience. Text, graphics, sound, and movies can easily
be included in the presentation. An added feature is that the slide show may be enhanced by
inclusion of handouts with two to six slides printed on a page. The page may be organized to
provide space for notes to be written in by the audience as the presentation ensues. An example
of this is Power Point. Preparation of the software is simplified by the use of' wizards that walk
the riser through the creation of the presentation.
QUESTION 2
i) Presentation program
QUESTION 3
Click on mail merge and then scroll down to Step by Step Mail Merge Wizard. Follow the steps
in the task pane to navigate your way through the Mail Merge process.
Choose a document type. This document contains the information that will remain the same in
each version, such as the return address or company logo. If you’ve already created this
document, you can click the USE CURRENT DOCUMENT. Otherwise, dick Start from a
template or Start from existing document, and then locate the template or document that you
want to use.
Connect to the data source. The information that you want to merge into your documents will be
stored in the data source, and can be found in your Outlook contacts or in an existing file. If you
have- not yet created this information, select Type a New List to begin creating.
Indicate what records you want to include by checking or un-checking the subsequent box.
Indicate what records you want to include by checking or un-checking the subsequent box,
Add fields to your document. Think of a “field” as that information that is unique to each letter.
For example, it might be the address of each recipient. You could also choose More Items. This
will allow you to add any specific information that you had included in your data file.
Preview and complete the merge. To preview, you can scroll through each merged document,
making sure that there are no mistakes. You can also search for a specific recipient, exclude a
recipient or edit the entire recipient list. After previewing the merged information, click next and
your merge will be complete. You can print, transmit, save all or save just a portion of the
document you created.
QUESTION 4
Data Integrity - The single greatest benefit of centralizing an assn’s data management is data
integrity. One of the cardinal rules of database design is that no redundancy is allowed. That is,
no piece of data should ever be repeated within the database. When an organization is operating
multiple databases for the same group of people (for example, a membership database with a
separate meeting registration database), they are by definition breaking this rule.And this leads to
major data integrity issues. A centralized database means that each member has one primary
record, with primary contact information. Thus when there is a change required (like a new
phone number or email address), there is only one place to look to make these changes.
Valuable broad marketing info/history - With all the information centralized, it is much easier
to develop reports that show the broad range of activities that your members are engaged in.
With multiple databases, records need to be matched, de-duping needs to occur, and the
opportunity for duplicate records is greatly increased.
Ease of training (it’s the same system for everything) - Another benefit of a centralized
system is that the learning curve for users is greatly reduced. If all processes (membership,
meetings, products, etc.) are in the same database, then users need only learn one system, not
multiple systems.
Support - With a centralize system, support is focused on one product. With many databases,
even if they are built on the same platform, separate support is required for each.
QUESTION 5
A spreadsheet is a grid consisting of columns and rows. Rows are labeled with numbers,
and columns are labeled with letters, giving each cell a unique address consisting of a
number and a letter. If you are familiar with the old game "Battleship", you'll be quite
comfortable with cell addressing.
A cell may contain labels or values. A label is a text entry, such as TOTAL, that cannot
be manipulated by the spreadsheet. A value can be a number, a date, a formula, or the
answer of a formula.
A single "grid", or page, is usually referred to as a worksheet.
Formulas
Formulas are used to express mathematical relationships between cells. For example,
C1=A1+B1 would calculate and display the sum of cells. Al and B1 into cell Cl. It could
also be a simple mathematical formula, such as (100 * 3) / 40. Formulas are not displayed
on spreadsheets. What you see in the cell is the result of the formula.
Don’t forget about order of operations; anything inside parenthesis happens first,
followed by multiplication and division, followed by addition and subtraction. When in
doubt, use parenthesis to say exactly what you mean.
Functions
Functions are used as shortcuts when performing .mathematical calculations. They are pre-
programmed formulae that give power and flexibility to spreadsheet calculations. They prevent
the user from having to continually enter long and cumbersome expressions. Some examples are
SUM, AVERAGE, MAX, and MIN. Ranges A range is a block of cells. Formulas can act on
single cells or be directed to act on a range of cells. For example, the range A1:D1 includes the
cell Al, Bl, Cl and D1. Any calculation performed in Al will also be performed in Bl, Cl and Dl,
Graphs and charts
QUESTION 6
a) i) Presentation program;
QUESTION 7
Data collection
Classifying of data
Data sorting
Merging
Summarising
Validation
QUESTION 8
The optimisation of the processing time control over the resources e.g. Files, input/output
devices.
Necessity of data communication equipment and the cost involved.
Time factor for decision making by the management
Data input- this is the process of data capture into the computer system for processing.
Input devices are used.
Storage - This is an intermediary stage where input data is stored within the computer
system or on secondary storage awaiting processing or output after processing. Program
instructions to operate on the data are also stored in the computer.
Processing - The central processing unit of the. computer manipulates data using
arithmetic and logical operations.
Data control- This is where data is managed
Data output - The results of the processing function are output by the computer using a
variety of output devices.
QUESTION 9
a)
(i) Data processing is defined as those activities, which are concerned with the systematic
recording, arranging, filing, processing and dissemination of facts relating to the physical events
occurring in the business.
Real Time Processing: This technique has the ability to respond almost immediately to various
signals in order to acquire and process information.
Batch Processing: This is a method where the information to be organized is sorted into groups
to allow for efficient and sequential
Online Processing: This is a method that utilizes Internet connections and equipment directly
attached to a computer; it is used mainly for information recording and research.
QUESTION 10
Most of the accounting software applications on the market provide the following features and
capabilities, to improve all facets of financial planning, management, control, and analysis. The
most basic features include:
This module enhances visibility into virtually all standard financial transactions such as
accounts, receivable, accounts payable, payroll, and sales orders. Additionally, accounting
software packages allow finance professionals to quickly and easily conduct consolidations by
dynamically combining multiple ledgers (such as those from different departments or business
units) into a single, complete financial statement.
With an accounting software solution, financial teams can achieve and maintain tighter control
over departmental and corporate budgets, and conduct more rapid and accurate internal and time
accounting, cost accounting, product costing/cost of goods sold assessment, and more.
Cash Management
Many businesses struggle to correctly anticipate their cash flow requirements. Accounting
software applications, and their cash management capabilities, can help a business more
accurately assess both their current and future cash needs. Additionally, it can automate
reconciliations, as well as the processing, execution, and Lacking of all transactions that directly
impact available cash levels.
Financial Forecasting
Effective financial management is about more than just analyzing past trends, it’s about using
that insight to enhance future planning. With an accounting software system, a business can more
accurately predict and estimate potential profits and pending losses, revenue and cash flows, and
other important financial events. They can then use this information to define and implement
more successful corporate strategies.
Tracking a fixed capital asset portfolio can be a complex process, particularly for those
businesses that own an extensive amount of real estate or capital equipment. But, with an
accounting software solution, the evaluation, acquisition, operation, maintenance, and valuation
of all types fixed assets is dramatically simplified.
Compliance Management
Because financial regulations have become much more stringent in the last several years, most
accounting software applications provide complete transaction audit trails, as well as rules-based
controls and advanced reporting capabilities that help facilitate compliance with Sarbanes-Oxley,
BASEL II, and other laws and guidelines.
In the past, most companies have created their financial and business plans by analyzing
historical data, to uncover patterns and trends that may provide some indication of future events.
However, that approach provides only a portion of the insight needed. That’s why some
accounting software packages have incorporated advanced planning tools that simulate potential
business scenarios, such as mergers and acquisitions. This can help a business better predict how
major decisions will impact their financial standing.
QUESTION 11
1. Determine the purpose of your database - This helps prepare you for the remaining steps.
2. Find and organize the information required - Gather all of the types of information you
might want to record in the database, such as product name and order number.
3. Divide the information into .tables - Divide your information items into major entities or
subjects, such as products or Orders. Each subject then becomes a table.
4. Turn information items into columns - Decide what information you want to store in each
table. Each item becomes a field, and is displayed as a column in the table. For example,
an Employees table might include fields such as Last Name and Hire Date.
5. Specify primary keys - Choose each table's primary key. The primary key is a column
that is used to uniquely identify each row. An example might be Product ID or Order LD.
6. Set up the table relationships - Look at each table and decide how the data in one table is
related to the data in other tables. Add fields to tables or create new tables to clarify the
relationships, as necessary.
7. Refine your design - Analyze your design for errors. Create the tables and add a few
records of sample data.
See if you caii get the results you want from your tables. Make adjustments to the design,
as needed.
8. Apply the normalization rules - Apply the data normalization rules to see if your tables
are structured correctly, make adjustments to the tables
QUESTION 12
Businesses and other organisations need information for many purposes: we have summarised
the five main uses in the table below.
Use Description
To plan properly, a business needs to know what resources it has (e.g. cash, people,
Planning machinery and equipment, property, customers). It also needs information about the
markets in which it operates and the actions of competitors. At the planning stage,
information is important as a key ingredient in decision-making.
Once a business has produced its plan it needs to monitor progress against the plan -
controlling and control resources to do so. So information is needed to help identify whether
things are going better or worse than expected, and to spot ways in which corrective
action can be taken
QUESTION 13
These are packages, which help the creation and maintenance of data for enquiry and reporting
purposes. Microsoft Access etc
2. Graphics packages
These are packages, which provide facilities that allow users to make presentations using
overheads. They include Microsoft PowerPoint, Harvard graphics etc.
3. Spreadsheet packages
These are computer packages which deal with computations involving inter-related rows and
columns of data. Spreadsheets can be based to perform calculations on the value displayed in the
rows and columns. Spreadsheets are important to organisations in that: -they contain numerous
cells thus can handle a lot of data, and they contain chart facilities such as pie charts and bar
charts which can be used in information analysis. Examples are MS Excel and Lotus 123.
These are special purpose packages used for the production of documents such as letters, reports
and contracts. They are Word perfect, Microsoft word etc
5. Desktop Publishing
DTP’S main function is to enable the page to be seen as the artwork image for editing and
production. Some common DTP packages include: PageMaker, Illustrator, Corel Draw, and
Photoshop
7. Web Browsers: Provide an easy to way surf the Internet; The mostly used web browsers are
Microsoft internet explorer and Mozillan Firefox.
QUESTION 14
a)
This refers to an approach to systems development where some types of information systems can
be developed by end users with little or no formal assistance from technical specialists. Users
develop their own systems with the aid of user friendly software e.g. application generators.
EDI is an electronic means for transmitting business transactions between organizations. The
transmissions use standard formats such as specific record types and field definitions.
The EDI process is a hybrid process of systems software and application systems. EDI system
software can provide utility services used by all application systems. These services include
transmission, translation and storage of transactions initialized by or destined for application
processing. EDI is an application system in that the functions it performs are based on business
needs- and activities. The applications, transactions and trading partners supported will change
over time and the co-mingling of transactions, purchase orders, shipping notices, invoices and
payments in the EDI process makes it necessary to include application processing procedures
and controls in the EDI process.
Information Resource Centers co-ordinate all information activities within their areas of interest
and expertise. Information within that area is analysed, abstracted arid indexed for effective
storage, retrieval and dissemination.
TOPIC 8
AN OVERVIEW OF INFORMATION SYSTEMS
QUESTION 1
MIS professionals usually design MRS rather than end users- using life cycle oriented
development methodologies.
They are large and complex in terms of the number of system interfaces with the various
users and databases.
MRS are built for situations in which information requirements are reasonably well
known and are expected to remain relatively stable. This limits the informational
flexibility of MRS but ensures that a stable informational environment exists.
They do not directly support the decision making process in a search for alternative
solutions to problems. Information gained through MRS is used in the decision making
process.
They are oriented towards reporting on the past and the present, rather than projecting the
future. Can be manipulated to do predictive reporting.
MRS have limited analytical capabilities. They are not built around elaborate models, but
rather rely on summarisation and extraction from the databases according to the given
criteria.
b) Case for and against the use of online technology in a business enterprise
i) Cost
Case against
The cost for installation of the online technology devices like computers, computer networks are
very expensive, training of workers to use such devices and cost of maintenance is also very high
thus an disadvantage to the organisation
Case for
In the long-run the benefits accrued to online technology would outweigh the cost incurred e.g.
in advertisement it is cheaper to advertise online than on media, bill boards and other form of
advertisements.
Online technology has enhanced security of documents as it prevent access of unauthorised users
through passwords and encryptions hence an organisation can maintain its confidential
information without leaking to public thus an advantage to the organisation.
Case against
Through online technology important information of business strategies can leak to its
competitors through hacking of the business systems
Information on online technology i.e. internet is not that reliable as information posted might be
misleading or provide false information thus making business decision at times relying on
internet might not be suitable thus an disadvantage
Using of online technology is very advantageous to the organisation because its transaction will
be done veiy fast e.g transaction between two companies in different countries is done very
easily and quick online.
ii) Integrity - ensure the accuracy and reliability of the information stored on the computer
systems. Information has integrity if it reflects some real world situation or is consistent,
with real world situation. Information should not be altered without authorization. Hardware
designed to perform some functions has lost integrity if it does not perform those functions
correctly. Software has lost integrity if it does not perform according to its specifications.
Communication channels should relay messages in a secure, manner to ensure that
.integrity. People should ensure the system functions according to the specifications.
iii) Availability - ensure the continued availability of the information system and all its assets to
legitimate users at an acceptable level of service or quality of service. Any event that
degrades performance or quality of a system affects availability
QUESTION 2
QUESTION 3
Data security refers to protective digital privacy measures that are applied to prevent
unauthorized access to computers, databases and websites, Data security also protects data from
corruption. Data security is the main priority for organizations of every size and genre. Data
security is also known as information security (IS) or computer security.
System security is control of access to a computer system's resources, especially its data and
operating system files.
QUESTION 4
Until the 1960s, the role of most information systems was simple. They were mainly used for
electronic data processing (EDP) purposes such as transactions processing, record-keeping and
accounting. EDP is often defined as the use of computers in recording, classifying, manipulating,
and summarizing data. It is also called transaction processing systems,-(TPS), automatic data
processing, or information processing.
In the 1960s, another role was added to the use of computers: the processing of data into useful
informative reports. The concept of management information systems (MIS) was born. This new
role focused on developing business applications that provided managerial end users with
predefined management reports that would give managers the information they needed for
decision-making purposes.
By the 1970s, these pre-defined management reports were not sufficient to meet many of the
decision making needs of management. In order to satisfy such needs, the concept of decision
support systems (DSS) was born. The new role for information systems was to provide
managerial end users with ad hoc and interactive support of their decision-making processes.
In the 1980s, the introduction of microcomputers into the workplace ushered in a new era, which
led to a profound effect on organizations. The rapid development of microcomputer processing
power (e.g. Intel’s Pentium microprocessor), application software packages (e.g. Microsoft
Office), and telecommunication networks gave birth to the phenomenon of end user computing.
End users could now use their own computing resources to support their job requirements instead
of waiting for the indirect support of a centralize corporate information services department. It
became evident that most top executives did not directly use either the MIS reports or the
analytical modelling capabilities of DSS, so the concept of executive information systems (EIS)
was developed.
QUESTION 5
Office automation entails the use of information technology to collect, process, store, manipulate
and disseminate information.
Benefits are:
- Cloud computing is the use of computing resources (hardware and software) that are
delivered as a service over a network (typically the Internet).
- The first is backup and recovery. Clearly, it is more efficient to make use of a cloud
computing service to provide backup and recovery.
- Software-as-a-Service (SaaS) is a form of cloud computing. Whether it’s a payroll or
customer relationship management (CRM) system, there are times when delivering those
applications as a service makes sense. A lot of times, the internal IT organization does
not have the expertise required to run a particular application or that application may not
be strategic enough to justify committing limited IT resources to managing it.
- Developing of more specialized application services which are able to meet the specific
needs
QUESTION 6
These are information systems at the management level of an organization that serve the
functions of planning, controlling and decision making by providing routine summary and
exception reports.
Convenience: Online banking sites never close; they're available 24 hours a day, seven
days a week, and they're only a mouse click away.' m
Ubiquity: If you're out of state or even out of the country when a money problem arises,
you can log on instantly to your online bank and take care of business.
Transaction speed: Online bank sites generally execute and confirm transactions at or
quicker speed.
Efficiency: You can access and manage all of your bank accounts, even securities, from
one secure site.
Effectiveness: Many online banking sites now offer sophisticated tools, including
account aggregation, stock quotes, rate alerts and portfolio managing programs to help
you manage all of your assets more effectively. Most are also compatible with money
managing programs such as Quicken and Microsoft Money.
QUESTION 7
- Management support and commitment - management should approve and support formal
security awareness and training.
- Access philosophy - access to computerized information should be based on a
documented need-to-know, need-to-do’ basis.
- Compliance with relevant legislation and regulations
- Access authorization - the data owner or manager responsible for the accurate use and
reporting of the information should provide written authorisation for users to gain access
to computerized information.
- Reviews of access authorization - like any other control, access controls should be
evaluated regularly to ensure they are still effective.
- Security awareness - all employees, including management, need to be made aware on a
regular basis of the importance of security.
QUESTION 8
b) How a computer system could be modified for use by physically challenged person
- Screen reader software application: This reads the information displayed on the screen
aloud, menus selections, and graphical icons on the desktop. It reads aloud the text within
a document, dialog boxes and also reads errors
- Screen magnification software: This enlarges the viewing area of a computer monitor
display. The magnification levels are measured in power levels such as 2x,4\.16x
- Optical character recognition
QUESTION 9
a) Explain
i) Uniform resource locator: Unique address for a file that is accessible to the internet.
ii) Cloud computing: delivery of computing as a service rather than a product whereby shared
resources, software and information are provided to computers and other devices
QUESTION 10
QUESTION 11
a) Conditions that might increase the vulnerability of the information systems security
i) Operator error:
- Inconsistence in data
- Missing error
vi) Theft
- Permeable firewall
- Access by unauthorized personnel
QUESTION 12
- Provide summarized data from organization system since they want structured forms
for viewing and want summaries rather than details.
- Direct access to information from high level of information to low levels of information
- they have the facilities which allow the executives to drill down their information.
All data and instructions pass in and out of the processor through the memory data register.
Before the fetch execute cycle between the memory and the other device the source and the
destination address being accessed in the memory must be specified by loading these address
form the sequence control register to the memory address register.
It keeps track of memory address of the next instruction to be performed and this address is
transferred to the memory address register.
QUESTION 13
- Disclosure: Where messages and data traversing internet can be seen by other machines
including e-mail files, passwords and in some cases key-strokes as they are being entered
in real time.
- Unauthorized access: since many internet software packages can render system subject
to attack. Lack of proper configuration can result to unauthorized access incidents. The
perimeter can be protected with firewalls
- Viruses and worms: this can be from from e-mail attachments. An email anti-virus
gateway to filter incoming email messages can be used for protection.
QUESTION 14
QUESTION 15
a) Define
(i) Information system is a set of interrelated components that collect, manipulate, process and
transform data into information and provide feedback to meet a specified objective.
QUESTION 16
a) Characteristics of
TPS are large and complex in terms of the number of system interfaces with the various
users and databases and usually developed by MIS experts.
TPS’s control collection of specific data in specific formats and in accordance with rules,
policies, and goals of organisation- standard format
They accumulate information from internal operations of the business.
They are genera] in nature—applied across organisations.
QUESTION 17
i. People - These use the system to fulfill their informational needs. They include end users
and operations personnel such as computer operators, systems analysts, programmers
information systems management and data administrators.
ii. Computer Hardware - Refers to physical computer equipment and devices, which
provide for five major functions.
i. Input or data entry
ii. Output
iii. Secondary storage for data and programs
iv. Central processor (computation, control)
v. Communication
iii. Computer Software - Refers to the instructions that direct the operation of the computer
hardware. It is classified into system and application software.
iv. Telecommunication System/Communication network
v. Databases - Contains all data utilized by application software. An individual set of stored
data is referred to as a file. Physical storage media evidences the physical existence of
stored data, that is: tapes, disk packs, cartridges, and diskettes.
vi. Procedures - Formal operating procedures are components because they exist in physical
forms as manuals or instruction booklets. Three major types of procedures are required.
a) User instructions - for application users to record data, to use a terminal for data
entry or retrieval, or use the result.
b) Instructions for preparation of input by data preparation personnel.
c) Operating instructions for computer operations personnel.
QUESTION 18
i. Transaction processing systems (TPSs): These are systems that perform and record
daily routine transactions necessary to conduct the business. An example is a point of
sale system.
ii. Management Information Systems (MISs): These are information systems at the
management level of an organization that serve the functions of planning, controlling
and decision making by providing routine summary and exception reports.
iii. Decision Support System (DSSs): These are information systems at the organization’s
management level that combine data and sophisticated analytical models or data
analysis tools to support non-routine decision making.
iv. Executive Support Systems: These are information systems at the organization’s
strategic level designed to address unstructured decision making through advanced
graphics and communication.
QUESTION 19
(i) Accounting: These are systems that maintain records concerning the flow of funds in
the firm and produce financial statements, such as balance sheets and income
statements. They are among the earliest systems to be computerized.
(ii) Sales and marketing: These are systems that support the sales and marketing function
by facilitating the movement of goods and services from producers to customers.
(iv) Human resource: These are systems that deal with recruitment, placement,
performance evaluation, compensation and career development of the firm’s
employees.
QUESTION 20
Ensure you have an update ant-virus software and scanning definitions frequently
Allow no disk to be used until it has been scanned on a stand-alone machine that is used
for no other purpose and is not connected to the network.
Ensure that the network administrator uses workstation and server anti-virus software
•Insist that field technicians scan their disks bn a test machine before they use any of their
disks on the system
Enforce a rule of not using shareware without first scanning the shareware thoroughly for
a virus '
Build any system from original, clean master copies. Boot only from original diskettes
whose write protection has always been in place.
Write-protect all diskettes with EXE or COM extensions
- Sabotage - some perpetrators are not looking for financial gain. They merely want to
cause damage due to dislike of the organization or for self-gratification
- Financial loss - these losses can be direct, through loss of electronic funds or indirect,
through the costs of correcting the exposure.
- Legal repercussions - Not having proper security measures could expose the
organization to lawsuits from investors and insurers if a significant loss occurs from a
security violation. Most companies also must comply with industry-specific regulatory
agencies.
QUESTION 21
b)
These are computerized systems that perform and record daily routine transactions necessary to
conduct the business. An example is a point of sale system. Transaction processing systems serve
the operational level of an organization. The inputs to a TPS are transactions and events. The
processing consists of listing, sorting, merging, and updating. The outputs are detailed reports,
lists and ' summaries. TPSs specifically serve operational personnel and supervisors. They enable
supervisors to make structured decisions by the reports they provide e.g. a decision to restock
based on the stock levels report.
These are information systems at the organization’s management level that combine data and
sophisticated analytical models or data analysis tools to support non-routine decision making.
The information inputs to a DSS include low-volume data or massive databases optimized for
data analysis, analytical models and data analysis tools. The processing consists of interactive
simulations and analysis. Tim output consists of special reports, decision analyses and responses
to queries. DSSs specifically serve professionals and staff managers. They enable them to make
unstructured decisions e.g. business contract analysis, corporate planning and forecasting.
Knowledge Management System (KM System) refers to a system for managing knowledge in an
organization for supporting creation, identify, capture, store, share, exploit and disseminate
information.
The idea of a KM system is to enable employees to have ready access to the organization's
documented base, of facts, sources of information, and solutions. Examples are Document based
i.e. any technology that permits creation, management, sharing of formatted documents such as
Lotus Notes, Share Point, web, distributed databases etc.
Office automation systems support general office work for handling and managing documents
and facilitating communication. Text and image processing systems evolved as from word
processors to desktop publishing, enabling the creation of professional documents with graphics
and special layout features. Spreadsheets, presentation packages like PowerPoint, personal
database systems and note- taking systems (appointment book, notepad, card file) are part of
OAS.
In addition OAS includes communication systems for transmitting messages and documents (e-
mail) and teleconferencing capabilities.
QUESTION 22
- Administrative controls: They ensure that the organization activities are properly
executed by definition of recovery procedures and job rotation
- Computer operations control: To oversee the work of computer users and to ensure that
user activities are consistent with the organization policies
- Software controls: They ensure that the computer software and data are safe from
unauthorized accessibility and computer viruses ^
- Hardware controls: They ensure that the computer hardware is secure from theft and
damage
- Implementation controls: Ensure that information systems are developed and
implemented as per the initial specification
TOPIC 9
COMPUTER NETWORKS
QUESTION 1
i) Serial transmission
In serial transmission, bits flow in a continuous stream. It is the way most data is sent over
telephone lines. It is used by external modems typically, connected to a microcomputer through a
serial port. The technical names for such serial ports are RS-232C connector or asynchronous
communications port. .
In parallel transmission, bits flow through separate lines simultaneously (at the same time).
Parallel transmission is typically limited to communications over short distances (not telephone
lines). It is the standard method of sending data from a computer’s CPU to a printer.
QUESTION 2
i) Star network
In a star network there are a number of small computers or peripheral devices linked to a central
unit called a main hub. The central unit may be a host computer or a file server. All
communications pass through the central unit and control is maintained by polling. This type of
network can be used to provide a time-sharing system and is common for linking
microcomputers to a mainframe.
In a ring network each device is connected to two other devices, forming a ring. There is no
central file server or computer. Messages are passed around the ring until they reach their
destination. Often used to link mainframes, especially over wide geographical areas. It is useful
in a decentralized organization called a distributed data processing system.
b) Advantage and disadvantage of the topologies mentioned above Star network topology
Advantages:
Disadvantages:
Advantages:
Ring networks offer high performance for a small number of workstations or for larger
networks where each station has a similar work load
Ring networks can span longer distances than other types of networks
Ring networks are easily extendable m
Disadvantages
QUESTION 3
Mobile Computing is a variety of wireless devices that has the mobility to allow people to
connect to the internet, providing wireless transmission to access data and information from
where ever location they may be.
Mobile computing has three aspects: mobile communication, mobile hardware, and mobile
software. The first aspect addresses communication issues in ad-hoc and infrastructure networks
as well as communication properties, protocols, data formats and concrete technologies. The
second aspect is on the hardware, e.g., mobile devices or device components. The third aspect
deals with the characteristics and requirements of mobile applications.
Insufficient bandwidth
Mobile Internet access is generally slower than direct cable connections, using technologies such
as GPRS and EDGE, and more recently PISDPA and HSUPA 3G networks. These networks are
usually available within range of commercial cell phone towers. Higher speed wireless LANs are
inexpensive but have very limited range.
Security standards
When working mobile, one is dependent on public networks, requiring careful use of VPN.
Security is a major concern while concerning the mobile computing standards on the fleet. One
can easily attack the VPN through a huge number of networks interconnected through the line.
Power consumption
When a power outlet or portable generator is not available, mobile computers must rely entirely
on battery power. Combined with the compact size of many mobile devices, this often means
unusually expensive batteries must be used to obtain the necessary battery life.
Transmission interferences
Weather, terrain, and the range from the nearest signal point can all interfere with signal
reception. Reception in tunnels, some buildings, and rural areas is often poor.
People who use mobile devices while driving are often distracted from driving are thus assumed
more likely to be involved in traffic accidents. (While this may seem obvious, there is
considerable discussion about whether banning mobile device use while driving reduces
accidents or not. Cell phones may interfere with sensitive medical devices. There are allegations
that cell phone signals may cause health problems.
Screens and keyboards tend to be small, which may make them hard to use. Alternate input
methods such as speech or handwriting recognition require training.
QUESTION 4
Simplex
Data travels in one direction (from A to B). An example of a simplex link would be scoreboards
such as those used in hockey, basketball, or other sports. The information is entered at a console
by the. score/timekeeper and sent serially to large displays that everybody can see.
Half-duplex
Data travels in one direction (from A to B) and then the other direction (from B to A) but not at
the same time. The RS-485 is half-duplex.
Full-duplex
QUESTION 5
Protocol is the special set of rules that end points in a telecommunication connection use when
they communicate. Protocols specify interactions between the communicating entities. Protocols
exist at several levels in a telecommunication connection. For example, there are protocols for
the data interchange at the hardware device level and protocols for data interchange at the
application program level
QUESTION 6
A virtual private network (VPN) is a technology for using the Internet or another intermediate
network to connect computers to isolated remote computer networks that would otherwise be
inaccessible. A VPN provides security so that traffic sent through the VPN, connection stays
isolated from other computers .on the intermediate network. VPNs can connect individual users
to a remote network or connect multiple networks together.
Advantages
1. Cost Savings - By leveraging third party networks, with VPN, organizations no longer
have to use expensive leased or frame relay lines and are able to connect remote users to
their corporate networks via a local Internet service provider (ISP) instead of via
expensive 800- number or long distance calls to resource-consuming modem banks.
2. Security - VPNs provide the highest level of security using advanced encryption and
authentication protocols that protect data from unauthorized access.
3. Scalability - VPNs allow corporations to utilize remote access infrastructure within ISPs.
Therefore, corporations are able to add a virtually unlimited amount of capacity without
adding significant infrastructure.
5. VPNs enable you to create secure, business-critical communication links over the
Internet.
QUESTION 7
QUESTION 8
a) i) Logical topology as used in computer networks: Refers to how data is transmitted between
the network component or in a physical topology (physical topology refers to physical layout of
networks).
- Shared media topology. All systepis have the ability to access the physical layout
whenever they are needed.
- Token based topology. Works by using a token to produce access to the physical media.
QUESTION 9
Data privacy is the protection of data from unauthorised access by use of password e.g.
encryptions usernames etc. whereas Data security is the protection of data system from loss
damage or theft by either using physical security such as employing security personnel.
QUESTION 10
A firewall is a barrier between two networks, an internal network (trusted network) and an
external network (untrusted network). Here the external network is the Internet, Firewalls
examine incoming and outgoing packets and according to a set of rules defined by an
administrator, either let them through or block them out.
Hardware firewall is peripheral devices of a computer that checks information coming from the
internet or a network then allows it or blocks it to pass through the computer.
Advantages Disadvantages
1. Speed: hardware firewalls have high 1. Hardware firewalls are costly: that is the
response rate thus enabling transmission of cost of purchasing and installing them is
information to be easier. very expensive hence not easily affordable.
2. Security: Hardware firewalls reduces the 2. Hardware firewalls are difficult to install
security risks of data and information in the and upgrade that is before installation it
computer by allowing required information will need knowledge of an expert and on
to pass in the computer and blocks the one upgrading because of the technology
that may be seem to be threat in the changing environment is going to be
computer. difficult.
QUESTION 11
a) i) Unusual events that could alert Joyce Kubo of possible computer virus infection
- Double extension on recently opened documents ii) Reasons why Joyce Kubo prefers
PDF file format
- Supports high levels of data encryption and security and provides an easy and secure
approach for data
- Preserves all visual element which have been created in another document such as word,
or excel document when saving as a PDF file
- Allows file compression from raw data file such as PowerPoint. It is useful in graphics
laden documents since PDF can achieve effective reduction.
- With the necessary software to read PDF file, PDF documents are portable and can be
easily accessed
iii) Precaution Joyce Kubo should observe when putting text in a presentation
QUESTION 12
(i) Explain Graphical User Interface (GUI): refers to the interaction between end users
and the computer based upon a graphical display. These are tools which are designed to enhance
persona] computing work. They are mostly fitted on work stations or personal computers with
graphical adaptors able to support high resolution graphics.
(ii) Reasons why GUI is easier to use than command line interface
- Graphical symbols are more easily recognized and memorized than text.
- Direct manipulation, for example by pointing and clicking on graphical objects with a
mouse, reduces learning time for users and gives them a greater feeling of control over
the HCI.
- Make computer operations more intuitive and thus easier to use and learn.
- Provide users with immediate, visual feedback about the effect of each action.
QUESTION 13
Star.
Bus
Ring
Hierarchical (hybrid)
Completely connected (mesh)
Peer-To-Peer
Client-Server
QUESTION 14
i) Processor Speed: The faster the processor speed the more powerful the computer
ii) Bus Width or Path; The larger the bandwidth, the more the instructions it can hold and
thus faster processing power
iii) Processor Instructions Set: The higher the instruction set the faster the computer
processing power
iv) Cache Memory; The higher the cache memory, the more the virtual memory and thus the
more powerful the computer is
v) Bus Speed; The higher the speed the more powerful computer is.
QUESTION 15
A computer network is a communications system connecting two or more computers that work
to exchange information and share resources (hardware, software and data).
A LAN is a computer network in which computers and peripheral devices are in close physical
proximity. An example of a local area network would be the network inside a particular company
or the network at our home
A MAN is a computer network that may be citywide. This type of network may be used as a link
between office buildings in a city. The use of cellular phone systems expands the flexibility of a
MAN network by linking car phones and portable phones to the network.
A WAN is a computer network where the networks and the hosts are very widely distributed
geographically. It normally connects networks over a large physical area, such as in different
buildings, towns or even countries.
It is a proprietary open wireless technology standard for exchanging data over short distances
using short wave lengths radio transmissions from fixed and mobile devices, creating personal
area networks.
Asynchronous transmission - data is sent and received one byte at a time. Used with
microcomputers and terminals with slow speeds.
Synchronous transmission — data is sent and received several bytes (blocks) at a time. It
requires a synchronized clock to enable transmission at timed intervals.
QUESTION 16
This refers to a system with universally accepted standards for storing, formatting and displaying
information in a networked environment. Information is stored as electronic “pages” that contain
text, graphics, animations, sound and video.
b)
i) Protocol:
It refers to a set of communication rules for exchange of information. Protocols define speeds
arid modes for connecting one computer with another computer. An example of communication
protocols is the Open System Interconnection (OSI) set of communication protocols which are
used to identify functions provided by any network and to separate each network function into
seven ‘layers’ of communication roles. . '
Simple Mail Transfer Protocol (SMTP)-used with the TCP/IP suite. It has traditionally been
limited to the text-based electronic messages.
Transmission Control Protocol/Internet Protocol - are the rules for communicating over the
internet, a message is broken down into small parts called packets before it is sent over the
Internet. HyperText Transfer Protocol-HTTP defines how messages are formatted and
transmitted, and what actions Web servers and browsers should take in response to various
commands FTP (File Transfer Protocol) - allows you to copy files on the Internet or download
where you copy a file from an internet to your computer
1. Search tools: Search tools developed for the Internet help users locate precise
information. The search tools can be accessed from the web.
2. Indexes: These are web directories that have organized information which is in
categories such as education, health etc. the categories are further organization into sub
categories where one can search further until the desired document appears. Such
indexes are Yahoo, Ask etc.
3. Applets and Java: Web pages contain links to special programs called .applets written in
a programming language called Java. Java applets are widely used to add interest and
activity such as interactive games, graphics, animation etc. to a website.
Search engines: This are organized like a database and are also known as web spiders or web
crawlers. These databases are maintained by special programs called agents, bots or spiders.
Widely used search engines are Google, AltaVista and HotBot.
QUESTION 17
Telephone line cables made up of copper wires called twisted pair. A single twisted pair.
Culminates in a wall jack where you plug your phone. Telephone lines have been the standard
communication channel for both voice and data.
Coaxial cable
Coaxial cable is a high-frequency transmission cable that replaces the multiple wires of
telephone lines with a single solid copper core. It is often used to link parts of a computer system
in one building.
Fibre-optic cable
Fibre-optic cable transmits data as pulses of light through tubes of glass. Fibre-optic cables are
immune to electronic interference and more secure and reliable.
Microwave
Microwaves transmit data as high-frequency radio waves that travel in straight lines through air.
They can only be transmitted over short distances.
Satellite
Satellites are used to amplify and, re lay microwave signals from one transmitter on the ground
to another. Bluetooth
It is a proprietary open wireless technology standard for exchanging data over short distances
using short wave lengths radio transmissions from fixed and mobile devices, creating personal
area networks.
QUESTION 18 '
a) Possible causes of data security and mitigations that could be taken to secure data
Unauthorized access: since many internet software packages can render system subject to
attack. Lack of proper configuration can result to unauthorized access incidents. The
perimeter can be protected with firewalls
Viruses and worms: this can be from e-mail attachments. An email anti-virus gateway to
filter incoming email messages can be used for protection.
Corporate network intrusion - protect the perimeter with firewalls. If you want remote
users to access sensitive internal data, set up an authentication server on the network and
equip remote users with authentication tokens or smart cards.
QUESTION 19
a) Bus topology
In a bus network each device handles its communications controls. There is no host computer;
however there may be a file server, all communications travel along a common connecting cable
called a bus. It is a common arrangement for sharing data stored on different microcomputers. It
is not as efficient-as star network for sharing common resources, but is less expensive. The
distinguishing feature is that all devices (nodes) are linked along one communication line - with
endpoints - called the bus or backbone.
Advantages:
Disadvantages:
- Heavy network traffic can also slow a bus considerably. Because any computer can
transmit at any time, bus networks do not coordinate when information is sent.
Computers interrupting each other can use a lot of bandwidth
- Each connection between two cables weakens the electrical signal
- The bus configuration can be difficult to troubleshoot, A cable break or malfunctioning
computer can be difficult to find and can cause the whole network to stop functioning,
b) Ring Topology
In a ring network each device is connected to two other devices, forming a ring. There is no
central file server or computer. Messages are passed around the ring until they reach their
destination. Often used to link mainframes, especially over wide geographical areas. It is useful
in a decentralized organization called a distributed data processing system.-
Advantages:
- Ring networks offer high performance for a small number of workstations or for larger
networks where each station has a similar work load
- Ring networks can span longer distances than other types of networks
- Ring networks are easily extendable
Disadvantages
• Failure of one component on the network can affect the whole network
c) Star topology
In a star network there are a number of small computers or peripheral devices linked to a central
unit called main hub. The central unit may be a host computer or a file server. All
communications pass through the central unit and control is maintained by polling. This type of
network can be used to provide a time-sharing system and is common for linking
microcomputers to a mainframe. .
Advantages:
Disadvantages:-
• It costs more to cable a star configuration than other topologies (more cable is required
than for a bus or ring configuration).
d) Mesh topology
Is a network topology in which devices are connected with many redundant interconnections
between network nodes.
Advantages:
- Yields the greatest amount of redundancy (multiple connections between same nodes) in
the event that one of the nodes fails where network traffic can be redirected to another
node
- Network problems are easier to diagnose
Disadvantages
- The cost of installation and maintenance is high (more cable is required than any other
configuration)
e) Hybrid topology
Advantages:
QUESTION 20
Gateway: A gateway can be hardware or software and it acts as a bridge between two
networks. A gateway is an entrance point of a network, e.g. a router or computer server
which acts as a gateway device in a network. A gateway computer is usually attached
with the router and switch.
Hub: This is where a number of computers or peripheral devices are linked to a central
unit. It is a networking device
LAN Card: This is a network Interface card which is used to join the computers in a
network.
Switch: Ali tire computers in a wired network are directly connected with the switch
through Ethernet cable. They transmit the data towards its destination based on the IP
address.
Repeater; A repeater is a network device that is used to retransmit the weaker signals in a
network. A repeater receives the. signals on the'electromagnetic or optical transmission
mediums.
QUESTION 21
a) Expound Acronyms
i) TCP: Transmission Control Protocol: These are standard protocol for the Internet and
they are the rules for communicating over the Internet.
ii) FTP-File Transfer Protocol. FTP allows you to copy files on the Internet he.
downloading or uploading
iii) HTTP-Hypertext Transfer Protocol. HTTP defines how messages are formatted and
transmitted, and what actions Web servers and browsers should take in response to
various commands
iv) HTML- Hypertext Markup Language. HTML is a special command code used to
structure text and multimedia documents and to set up hypertext links between
documents, used extensively on the World Wide Web.
v) WWW-World Wide Web; A system of Internet servers that support specially formatted
documents, The documents are formatted in a markup language called HTML
(HyperText Markup Language) that supports links to other documents, as well as
graphics, audio, and video files.
vi) IP- Internet Protocol which are the rules for communicating over the Internet; it is the
primary protocol that establishes the Internet.
QUESTION 22
- Extra information can be added to digital signals so that errors can either be detected or
corrected.
- Digital data tends not to degrade over time
TOPIC 10
THE INTERNET
QUESTION 1
a) (i) Intranets
a) Intranets are in-house, tailor-made networks for use within the organization and provide
limited access (if any) to outside services and also limit the external traffic (if any) into the in
tran etc An intranet might have access to the Internet but there will be no access from the
Internet to the organization’s intranet
• WWW browsers
• A firewall
(ii) Extranets
Extranets (external Intranets) allow two or more companies to share parts of their Intranets
related to joint projects. For example two companies may be working on a common project, an
Extranet would allow them to share files related with the project.
Global system for mobile communication (GSM) is a wide area wireless communications system
that uses digital radio transmission to provide voice, data, and multimedia communication
services. A GSM system coordinates the communication between a mobile telephones (mobile
stations), base stations (cell sites), and switching systems.
(iv) Bluetooth
Bluetooth technology is a wireless protocol that connects electronic devices while they are close
to each another.
Bluetooth technology was designed primarily to support simple wireless networking of personal
consumer devices and peripherals, including cell phones and wireless headsets. Wireless signals
transmitted with Bluetooth cover short distances, typically up to 30 feet (10 meters).
To transfer the message from the host network to other branches within the network
To defragment the message in the network to protect it from threats such as viruses
QUESTION 2
Is software that runs on the web site hosting Server computer. Its main purpose is serving web
pages, which means it waits for requests from web browsers (also known as clients) and
responds by sending the required data back.
Is a software program that allows you to browse, search, and receive various types of
information such as: websites, videos and audio files, images, and other documents on the Web.
The primary functions of a web browser are to retrieve or fetch information to the user, allow
them to view it, and access information.
Is the main markup language for creating web pages and other information that can be displayed
in a web browser.
HTML elements form the building blocks of all websites. HTML allows images and objects to
be embedded and can be used to create interactive forms. It provides a means to create structured
documents by denoting structural semantics for text such as headings, paragraphs, lists, links,
quotes and other items.
Is a place which provides internet access to the public, usually for a fee.
Global system for mobile communication (GSM) is a wide area wireless communications system
that uses digital radio transmission to provide voice, data, and multimedia communication
services. A GSM system coordinates the communication between a mobile telephones (mobile
stations), base stations (Tell sites'), and switching systems,
QUESTION 3
An Internet Service Provider (also known as an ISP or even as an LAP, internet access provider)
is a firm-that offers subscribers access to the internet
1) A basic Internet Service Provider (ISP) will buy a connection and bandwidth to an internet
backbone in bulk and move that connection over one (or more) of many different data
transport mediums, such as coaxial cable ("Broadband cable"), phone line (Dial-up, ISDN,
DSL, etc), UTP, or fiber optic, to name a few.
2) They provide e-mail, DNS, Newsgroup and other services to entice customers to join.
Some services, such as e-mail and DNS, are so common, they are considered to be part of
the "bare minimum" that an ISP should provide.
3) Educate their customer on services that can improve their lives accessible to the internet
4) This internet service provider maintains large runs of cabling and maintains network
services in order to transfer and deliver web content to those paying the subscription fee.
QUESTION 4
B2G networks or models provide a way for businesses to bid on government projects or
products that government might purchase or need for their organizations. This can
encompass public sector organizations that propose the bids. B2G activities are
increasingly being conducted via the Internet through real-time bidding.
i) Moral degradation
Internet technology has led to increase of immorality in the society this is because of certain sites
in the internet which displays pornographic videos which is later brought in the'society.
ii) Unemployment
Due to internet technology most of the people have been rendered jobless as most of the jobs
which were previously done manually have been computerized and are being done online e.g.
advertisements, mailing of letters to mention but a few.
As a result of internet technology most of the organization tend to lose most of their important
information or manipulation of the information due to hacking,
iv) Cost
Purchase cost, maintenance cost and training cost of the and the use of the devices of internet
technology is very high thus small organization or poor family cannot afford e.g computers.
c) Definition:
Telecommuting is a work arrangement in which the employee works outside the office, often
working from home or at a location close to home (including coffee shops, libraries, and various
other locations).
Rather than travelling to the office, the employer “travels” via telecommunication links, keeping
in touch with coworkers and employers via telephone and email.
Advantages of Telecommuting:
• No Commuting. Depending on your current commute, this can save you anywhere
from minutes to hours every day, which you can spend doing things you enjoy, like
sleeping, spending more time with your kids or spouse, going to the dog park, or any
other activity you’d like to have more time for.
• Increased Independence. Working from home puts the onus on you to complete your
work without constant reminders, which some people absolutely love. No office
politics, no boss breathing down your neck, no distracting coworkers — telecommuting
can be glorious. And yet, it’s veiy easy to get distracted by things in your home —
television, laundry, a comfy bed for napping — some days these seem like a much
better alternative to actually doing work. Having a high degree of self-control and self-
discipline is essential to being a productive telecommuter.
• Increased Savings. Most people who work from home have very little need for
professional clothing, which not having to buy can save lots of money every year.
Other things you’ll find less need for: gas or public transit passes for commuting,
lunches out, dry cleaning, and child care (depending on your situation). And most
people who work from home are able to save on their taxes each year because of the
tax-deductible expenses associated with working from home.
• More Flexibility. Again this depends on the type of job you’ll have at home, but many
work- from-home jobs allow for a flexible schedule, so if you need to go grocery
shopping or do a load of laundry in the middle of the day, it’s simple: you can. Or, if
you’re a morning person or a night owl, you can adjust your work schedule
accordingly.
• Fewer sick days. Working in a traditional office exposes you to many people’s germs,
but if you work from home, you have less exposure to people, and therefore, to their
germ's. Also, if you are feeling under the weather, it’s much easier to pamper yourself
and still get some work done when you’re at home, meaning you’ 11 probably take
fewer sick days.
Disadvantages of Telecommuting
Career Stagnation
Working from home makes it difficult for a manager to monitor the performance of
teleworkers, and people who adopt this work arrangement often find it hard to gain
recognition for their efforts through promotions or performance reviews, Some
telecommuters do not get clear performance goals because their managers consider
employees who are often ■ in the office to be harder workers. In such a situation, the
affected teleworker can opt to work both in the office and at home.
QUESTION 5
(a) Resources which are necessary for connecting a computer to the internet.
• A computer
• A modem and telephone line (if you are using dial up access) or a data line of some
sort (if you are not using dial up access).
A modem is necessary if you are using a telephone line to access the Internet. It translates the
language that computers talk into a language that can travel across the phone lines, and vice
versa.
You need two types of software to connect to the Internet. The first is the software that connects
you to your ISP. This is different for each ISP. Some ISP’s will give you a disk with the
connection software on it. Other ISP’s will use the connecting software that comes with the
operating systems Windows 95, OS7 and OS8. They will give you the settings to put into this
software.
The second type of software you need is a browser. Browsers go and get web pages and display
them on your computer. The two most popular and commonly used browsers are iVIozilla and
Microsoft Internet Explorer. These browsers also provide the software for e-mail and to read
Usenet newsgroups. If you have a browser that is just a browser, you will also need software for
e-mail and for reading newsgroups.
The ISP is your gateway to the Internet. You access the ISP over the phone line, and the ISP will
connect you to the Internet, The ISP provides you with e-mail and access to the Internet. It does
this through many hardware and software, which the average user cannot afford. You will have
an account with the ISP - you will pay some amount of money per month in return for accessing
the Internet through the 1ST. This account will come with a user name and a password that you
use to log on to the Internet
QUESTION 6
(a) Factors that determine the downloading speed of a file from a website
Web design
• Design of the web page - number of graphics and their size, use of frames and tables
• Having valid, compliant html/css coding on your website will allow your browser to
render the page much more quickly
Whether or not you have ever accessed the site before. If you have accessed it recently, the
files may be in your cache and the site will load more quickly the second and subsequent
times.
How full your web browser cache is - you may need to clear your cache if you've set it to
only reserve a small amount of space.
How much memory you have in your computer - the more RAM the better.
The size of your network buffer - most overlooked setting, have your IT staff review the
settings.
How fragmented the data on your hard drive is - you may need to run a defrag program.
The number of programs you have running simultaneously while downloading. Running
multiple programs hogs valuable RAM space.
Cookies should be cleared regularly (bi-weekly or monthly) to help reduce the load on
your browser thus slowing down your performance.
QUESTION 7
a)
- Orange
- Airtel
- Safaricom
- Equitel
QUESTION 8
a) Benefits of e-government
E-government is the activity or process by which the government organizes, controls and
monitors its activities through the computer networks-and the following are the
advantages/benefits
i) Better services delivery to the customers, this enables the government to reach the
citizens within a short period and fast hence improving the service to customers.
ii) Reduce cost of getting information: The government is. able to acquire information from
the citizens online without necessarily conducting survey through questionnaires and
other forms of collection of data which are very expensive in terms of paying for people
conducting the survey, cost of stationary and other facilities required.
iii) More information is accessible 24 hours a day, online communication enables or allows
citizens to inquire about government queries throughout the day compared to manual
where offices are closed early.
iv) Increase efficiency - the government is able to run it activities more effectively because
there is less monitoring of its activities.
v) Help the public to see the government as a positive force in their fives rather than a
burden.
QUESTION 9
QUESTION 10
- It is single standard
- The cost of connecting is minimal
- Information is easily accessible
- The information is worldwide
QUESTION 11
- Library Websites: Many Library websites have plenty to offer for any information needed
- Blogging: A blog is used as a communication platform to interact with people, The owner
of the blog can create the blog about anything of their preference.
- Online shopping: You can find anything to buy on the Internet. I here are many books
and all other types of educational materials.
- Networking: Social network service creates online communities of people who share
interests and/or activities, or who are interested in exploring the interests and activities of
others
- Current events: Everyone can know what is going on in the world despite their
geographical ' location and time difference,
- Email: Electronic mail or E-Mail is an electronic way of keeping in touch with someone.
E-mails can be read anywhere and sent from anywhere,
- Electronic Books: Reading is now-just a click away. There are number of books online
and for all different ages. Children's Storybooks Online
TOPIC 11
QUESTION 1
Virtual reality or virtual realities (VR), which can be referred to as immersive multimedia or
computer-simulated reality, replicates an environment that simulates a physical presence in
places in the real world or an imagined world, allowing the user to interact with that world.
Virtual realities artificially create sensory experience, which can include sight, touch, hearing,
and smell.
Most up-to-date virtual realities are displayed either on a computer screen or with an HD VR
special stereoscopic displays, and some simulations include additional sensory information and
focus on real sound through speakers or headphones targeted towards VR users. Some advanced
haptic systems now include tactile information, generally known as force feedback in medical,
gaming and military applications. Furthermore, virtual reality covers remote communication
environments which provide virtual presence of users with the concepts of telepresence and
telexistence or a virtual artifact (VA) either through the use of standard input devices such as a
keyboard and mouse, or through multimodal devices such as a wired glove or omnidirectional
treadmills. The immersive environment can be similar to the real world in order to create a
lifelike experience—for example, in simulations for pilot or combat training—or it can differ
significantly from reality, such as in VR games.
i. Military
VR plays an important role in combat training for the military. It allows the recruits to train
under a controlled environment where they are to respond to different types of combat situations.
A fully immersive virtual reality that uses Head-mounted display (HMD), data suits, data glove,
and VR weapon are used to train for combat. This setup allows the training's reset time to be cut
down, and allows more repetition in a shorter amount of time. The fully immersive training
environment allows the soldiers to train through a wide variety of terrains, situations and
scenarios.
VR is also used in flight simulation for the Air Force where people are trained to be pilots. The
simulator would sit on top of a hydraulic lift system that reacts to the user inputs and events.
When the pilot steer the aircraft, the module would turn and tilt accordingly to provide haptic
feedback. The flight simulator can range from a fully enclosed module to a series of computer
monitors providing the pilot's point of view. The most important reasons on using simulators
over learning with a real aircraft are the reduction of transference time between land training and
real flight, the safety, economy and absence of pollution. By the same token, virtual driving
simulations are used to train tank drivers on the basics before allowing them to operate the real
vehicle. Finally, the same goes for truck driving simulators, in which Belgian firemen are for
example trained to drive in a way that prevents as much damage as possible. As these drivers
often have less experience than other truck drivers, virtual reality training allows them to
compensate this. In the near future, similar projects are expected for all drivers of priority
vehicles, including the police.
Medical personnel are able to train through VR to deal with a wider variety of injuries. An
experiment was performed by sixteen surgical residents where eight of them went through
laparoscopic cholecystectomy through VR training. They then came out 29% faster at
gallbladder dissection than the controlled group.
VR application was used to train road crossing skills in children. It proved to be rather
successful. However some students with autistic spectrum disorders after such training might be
unable to distinguish virtual from real. As a result, they may attempt quite dangerous road
crossings.
ii. Education
Strides are being made in the realm of education, although much needs to be done. The
possibilities of VR and education are endless and bring many advantages to pupils of all ages.
Few are creating content that may be used for educational purposes, with most advances being
made in the entertainment industry, but many understand and realize the future and the
importance of education and VR.
iii. Medicine
virtual reality is used in many areas of healthcare which range from diagnosis, treatment, e.g.
surgery, rehab and counselling. it is also used to train the next generation of doctors, paramedics
and other medical personnel and has shown a range of benefits from doing so.
so what are the advantages of virtual reality in healthcare? there are several which are related to
medical/surgical training, preventative medicine, counselling and architectural design of new
hospitals.
let’s start with virtual reality as a means of training healthcare professionals. it is used in medical
schools and other similar settings as a means of education and instruction. it enables medical
students to acquire knowledge and understanding about the human body by means of interaction
within a virtual environment.
medical students can perform ‘hands on’ procedures but in a safe and controlled setting. they are
able to make mistakes – and learn from them but in an environment where there is no risk to the
patient. they interact with a virtual patient and as a result of this, learn skills which they can then
apply in the real world.
but virtual reality isn’t only confined to medical schools. dentistry is another area in which it
plays a part. for example, there is a system known as ‘haptel’ which is based upon haptics (greek
for touch) in order to train new dentists. this virtual dental chair includes a training scenario in
which the student is shown a 3d set of teeth that they work on.
they perform a range of procedures, e.g. a filling using a virtual drill which replicates the
movement and pressure of a real drill by means of force feedback. this feedback takes the form
of subtle changes of pressure which enables the student to adjust their technique accordingly.
it is also used to train paramedics and other similar personnel who need to learn life saving skills
but without placing themselves and their patients at risk. they are able to do this by interaction
with a simulated accident or emergency in a virtual environment but with minimal risk. these
scenarios are realistic and enable them experience a high pressure situation and respond
accordingly.
virtual reality is used to educate patients about positive lifestyle choices, such as stopping
smoking, moderate alcohol intake, healthy eating and exercise. there is an emphasis on educating
people to make positive changes about their health which will reduce the risk of illnesses, many
of which are preventative.
both desktop and fully immersive cave systems can be used to demonstrate the effects of
negative lifestyle choices, e.g. smoking on health with the aim of changing people’s behaviour.
counselling is another area where virtual reality has been utilised. a classic example is phobia
treatment, for example a fear of public speaking where the sufferer is able to learn skills and
build up their confidence in a virtual environment.
this is discussed in greater detail in our virtual reality in phobia treatment article.
it also used to treat people who have developed post traumatic stress disorder (ptsd) as a result of
a life threatening situation. one example is that of soldiers who have served on the front line in
afghanistan and have become traumatised as a result. they are taught a range of techniques for
dealing with the symptoms of their condition using virtual reality. this takes the form of a pair of
virtual reality glasses or head mounted display (hmd), data glove and input device, e.g. joystick.
QUESTION 2
Office automation refers to the varied computer machinery and software used to digitally create,
collect, store, manipulate, and relay office information needed for accomplishing basic tasks and
goals. Raw data storage, electronic transfer, and the management of electronic business
information comprise the basic activities of an office automation system.
Generally, there are three basic activities of an office automation system: data storage of
information, data exchange, and data management. Within each broad application area, hardware
and software combine to fulfill basic functions.
1. Computers hardware
2. Computer software
3. Digital copiers
4. Scanners
5. Fax machines
6. Printers
7. Digital storage equipments